TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
We now know without a doubt that Obama, Brennan, Clapper, and Comey were attacking our democracy, all while accusing us of attacking democracy. We know these things because director of national intelligence Tulsi Gabbard has released hundreds of documents revealing that the mindful objections of senior intel officials were ignored. Foreign spies were given a US government endorsed platform to smear Trump with abject lies. They used these lies to illegally spy on the Trump campaign. Former CIA director John Brennan lied to congress about his role. The cover up effort was real. Now that director Gabbard has revealed the truth, where will it all lead?

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that top law enforcement officials expected Hillary Clinton to win the 2016 election and manipulated the law to ensure her victory and Trump's defeat. He cites James Comey's alleged admission of operating in an environment where a Clinton victory was expected. The speaker discusses the alleged intrusion into the Democratic National Committee (DNC), pointing to "telltale signs in Cyrillic" and the name "Felix Dzerzhinsky" as either sloppy or overly clever attempts to implicate Russia. He alleges that the persona "Guccifer 2.0" is a fraud, based on forensic analysis of metadata by former NSA technical directors. The speaker criticizes Bob Mueller, claiming he falsified intelligence before the Iraq War and approved of torture and wiretapping. He recounts an encounter where he questioned Mueller about "parallel construction," the practice of using illegally acquired information in prosecutions without revealing its source. The speaker describes James Comey's leaking of a conversation with President Trump to prompt the appointment of a special prosecutor, Bob Mueller. He questions Comey's decision not to seize the DNC computers after the alleged Russian hacking, relying instead on CrowdStrike, a firm with a "disastrous record of veracity." The speaker claims that the DNC blamed Russia for the hacking to divert attention from the content of the leaked emails. He references Jennifer Palmieri, Hillary Clinton's PR person, allegedly pushing the "Russians hacked" narrative. Chuck Schumer is quoted as saying the intelligence community has "six ways to Sunday" to get back at Trump. The speaker discusses the Steele dossier and claims that the FBI also paid for it. He alleges that the intelligence community assessment on Russian hacking was based on handpicked analysts and that Obama stated the conclusions of Russian hacking getting to WikiLeaks were inconclusive. He claims NSA collects everything and there is no evidence of Russian hacking. The speaker references Peter Strzok and Lisa Page's text messages, where they expressed support for Hillary Clinton and a determination to "stop" Trump. He claims Strzok, who led the investigation of Hillary Clinton's emails, later said there was "no there there" regarding Russia gate. The speaker claims Julian Assange released documentation of the CIA's cyber tool to hack into systems and leave telltale signs giving the responsibility to someone else. He concludes that a "deep state" within the FBI, CIA, and Justice Department acted to ensure Hillary Clinton's victory and undermine Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and political connections. However, a counter coup has been initiated by the intelligence community through Julian Assange and WikiLeaks. The case involving Hillary Clinton's emails, particularly those related to Anthony Weiner, served as a warning to the administration that their corruption would be exposed. This counter coup aims to prevent Hillary Clinton from becoming president, while also indicting Loretta Lynch and others involved in the Clinton Foundation's cover-up. This historic event is happening online, marking a major transition and a second American revolution. The American public, including veterans and intelligence personnel, are determined to peacefully stop the Clintons from assuming power and ensure Obama's departure without any acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
The implications are far-reaching and concern the integrity of our democratic republic. An outgoing president took action to manufacture intelligence to undermine and usurp the will of the American people in that election. This launched what would be a years-long coup against the incoming president of the United States, Donald Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
To understand how the American government operates, consider Richard Nixon, the most popular president, who was forced to resign without a vote, replaced by Gerald Ford, the only unelected president. Nixon believed federal agencies were undermining the government. In 1972, he suggested to CIA Director Richard Helms that the CIA was involved in JFK's assassination. Shortly after, the Watergate scandal emerged, led by Bob Woodward, a former naval officer with ties to intelligence agencies. The FBI's Mark Felt was Woodward's main source, and the agencies aimed to discredit Nixon and Vice President Spiro Agnew, who resigned. Ford, tied to the Warren Commission, became president. This illustrates how unelected officials influence politics, undermining democracy. A similar fate befell General Michael Flynn in the Trump administration, showing the system's flaws. Ultimately, the public deserves a true democracy, not control by those who are unelected.

Video Saved From X

reSee.it Video Transcript AI Summary
I am asking for your help in informing and alerting the American people about a global conspiracy that relies on infiltration rather than invasion. You have the money and power needed. This is not just an election, but a revolution and irregular warfare. We have citizen journalists and digital soldiers who are here because they have made a decision and feel a responsibility to fight for our country. It is a gift.

Video Saved From X

reSee.it Video Transcript AI Summary
On November 1, 2016, the Clintons executed a silent civilian coup through corruption and co optation. In response, the intelligence community initiated a counter coup via Julian Assange and WikiLeaks. The goal was to prevent Hillary Clinton from becoming president, expose corruption, and ensure a peaceful transition of power. This historic event unfolded online, marking a unique moment in history. The focus was on stopping the Clintons from seizing power and holding them accountable for their actions. This marks a significant shift in American politics towards a second revolution without violence.

Video Saved From X

reSee.it Video Transcript AI Summary
Trump will not be president. Text messages between FBI officials Peter Strzok and Lisa Payne reveal bias. The peaceful transfer of power is a hallmark of our democracy. Declassified documents show officials in the Obama administration requesting the unmasking of Americans. Political spying and sabotage were aimed at undermining the incoming Trump administration. The FBI and Washington Post were involved in setting up the new administration. This conspiracy is often ignored.

Video Saved From X

reSee.it Video Transcript AI Summary
There is now incontrovertible evidence that Barack Obama spearheaded a seditious conspiracy to subvert the will of the American people and overthrow the United States government in 2016. James Comey, John Brennan, Clapper, Rice, and Biden were involved. On July 28 in the Oval Office, they briefed Barack Obama on Hillary Clinton's plan to tie Trump to Russia collusion lies. This consumed national discourse for five years, undermined a sitting president, sabotaged an administration, framed a three-star general, and destroyed the country. This constitutional crisis was atrocious, and every one of them must be held accountable for these heinous crimes.

Video Saved From X

reSee.it Video Transcript AI Summary
We are facing a globalist takeover by unelected elites who control organizations like the World Bank, World Health Organization, and World Trade Organization. This plan has been in motion for years, with a timeline of 8 years under Barack Obama followed by 8 years under Hillary Clinton. The rise of independent voices like Donald Trump has allowed us to uncover the truth. We need to question everything, including past assassinations and events like the collapse of building number 7. Our country needs a government that truly represents the people and stands on the shoulders of great leaders. We must go through a period of cleansing to change our current destructive path.

Video Saved From X

reSee.it Video Transcript AI Summary
A federal investigator told Fox News that Seth Rich, a DNC staffer murdered in July, contacted WikiLeaks through Gavin McFadden, providing over 44,000 emails. WikiLeaks then published DNC emails showing efforts to undermine Bernie Sanders, leading to resignations. Julian Assange alluded to risks faced by WikiLeaks sources, referencing Rich's murder. Some suggest Rich leaked the DNC emails to WikiLeaks and was killed because of it. The timing of the Fox News story, which was later retracted, coincided with the appointment of Mueller and the Comey firing, allegedly deflecting from the Russia investigation. It's claimed the FBI never investigated the DNC hack, instead relying on CrowdStrike. Some DNC members believed Rich was murdered for political reasons. One speaker alleges Hillary and Bill Clinton initiated a "civilian coup" by co-opting various government agencies. A "counter-coup" was allegedly initiated through Julian Assange and WikiLeaks by members of the intelligence community to undermine the Clintons and expose corruption. The speaker claims this was a peaceful effort to ensure a transition without pardons or acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a hidden enemy, a vast transgenerational criminal mafia that has corrupted our world. They have infiltrated the highest levels of power, controlling the media, banking system, and governments. They have caused poverty, division, and war, all for personal gain. But there is hope. Good people in positions of power are working to expose and eradicate this criminal cabal. They are using the internet and the NSA to gather evidence and plan a takedown. The battle is ongoing, but the good guys are winning. High-profile arrests are coming, and the criminals will be held accountable. It's time to wake up, unite, and reclaim our freedom. The best is yet to come.

Video Saved From X

reSee.it Video Transcript AI Summary
DNI Gabbard released 100 documents proving Hillary Clinton created a dossier. Obama's team was informed and then created a diversion to make it about Trump. The bureaucracy and the swamp must be drained. FBI and DOJ career employees who participated should be fired and prosecuted. The federal government was weaponized against a citizen and political opponent because the American people were not doing what they wanted. There was anecdotal evidence this was happening, and now the receipts have been shown. Prosecutions should begin.

Video Saved From X

reSee.it Video Transcript AI Summary
To understand how the American government operates, consider the case of Richard Nixon, the most popular president in U.S. history, who was forced to resign without a single vote against him. Nixon believed federal agencies were undermining democracy. His downfall began with the Watergate scandal, which was reported by Bob Woodward, a former naval officer with ties to intelligence agencies. The investigation was fueled by Mark Felt, the FBI's deputy director, who was involved in discrediting Nixon. Following Nixon's resignation, Gerald Ford, who had served on the Warren Commission, became president. This illustrates how unelected officials can control the political system, undermining democracy. The targeting of figures like General Michael Flynn shows the ongoing struggle against this entrenched power. Ultimately, when unvoted individuals hold power, true democracy is compromised.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Seth Rich murder and its alleged connection to WikiLeaks and the 2016 DNC email controversy. An FBI forensic report purportedly found that Rich contacted WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and Rich allegedly provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10, but his wallet, phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later, showing top DNC officials discussing ways to hurt Bernie Sanders at the polls, which contributed to the resignation of Debbie Wasserman Schultz as DNC chair and the DNC’s top three officials. Speaker 1 questions whether there is an “October surprise” and whether material is being held. Speaker 2 of the Helix group states that they do not sit on material and emphasizes that whistleblowers take significant risks; they note Rich’s murder as an example of high stakes and risk to sources, asserting that sources seek anonymity with them. When Speaker 1 asks if Rich was a source, Speaker 2 declines to comment but says they are investigating what happened to Rich and are concerned about it, though no conclusion has been reached. Speaker 3 argues that Rich was a Bernie Sanders supporter who worked for the DNC and asserts that the DNC rigged the primary against Sanders; he notes that Rich was aware of this and was involved as it happened, with Donald Brazil also involved. He describes Rich as idealistic and patriotic, and recounts his murder after leaking information to WikiLeaks, insisting that this is not a conspiracy theory but a fact-based concern. He challenges others to acknowledge the alleged corruption within the Democratic party and suggests that those who ignore the facts are engaging in denial. He also critiques media portrayals and online accusations about his own credibility. Speaker 4 discusses Assange and WikiLeaks, criticizing the idea of a conspiracy theory and labeling Assange as a key figure who exposed corruption. He mentions that Assange now “works for Russia” and questions the Ecuadorian embassy situation, describing it as heavily manipulated by interests around Hillary Clinton and the Clinton Foundation. He connects the Seth Rich disclosures to broader allegations of a coordinated effort to undermine Clinton and her circle, while acknowledging that some related claims may be questionable. Speaker 6 notes that hacking of the DNC and the role of CrowdStrike remain controversial and points to the subsequent murder of Rich as a focal point for questions that have not been fully explored by the media. Speaker 7 echoes concerns about the timeline, the FBI’s involvement, and past inquiries that were not pursued, emphasizing a sense that the case and the broader narrative around the DNC emails have been inadequately examined. Speaker 8 presents a long, conspiratorial narrative alleging that on 11/01/2016 Hillary and Bill Clinton orchestrated a civilian coup through corruption and co-option of key institutions, while a countercoup through Julian Assange and WikiLeaks was initiated to undermine Hillary and the Clinton machine. The speaker claims a silent countercoup across the Internet, led by members of the intelligence community, to stop the Clintons from gaining power and ensure Obama leaves without pardon, framing the moment as a major transitional event and a second American revolution conducted without guns.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and cooperation to gain control of various institutions. However, a counter coup was initiated by the intelligence community through Julian Assange and WikiLeaks. The opening of the Hillary Clinton email case provided an opportunity for the counter coup to expose the corruption and prevent her presidency. This silent coup and counter coup were both carried out online, marking a historic moment. The speaker, a part of the counter coup, emphasizes that they do not intend harm but aim for a peaceful transition of power, preventing the Clintons from assuming control and ensuring Obama's departure without any acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript outlines the origin and propagation of the Pizzagate conspiracy theory and catalogs a wide range of alleged connections among political figures, businesses, and investigations, presenting these as part of an open-source online inquiry that spiraled into a real-world incident and a broader discourse about media and power. - Origins and method: WikiLeaks released emails hacked from Hillary Clinton’s private server and John Podesta’s account. Anons and various forums (Reddit, Steamit, 4chan, Vote, Websleuths) purportedly found strange references to pizza and hotdogs in the emails, which they reinterpreted as code language used by pedophiles. The narrative emphasizes an open-source investigative culture where people publicly contribute data and discuss what is pertinent, claiming that scandals have occurred on both sides of the political aisle and are bipartisan. - Core claim and media framing: The program asserts that Pizzagate originated from Podesta email dumps and evolved into a theory that Clinton and Podesta ran a child sex trafficking ring. It is claimed that the email references to pizza, handkerchiefs, hot dogs, and related terms were code words used by pedophiles, with Comet Ping Pong Pizza referenced multiple times in the emails and connected to Podesta through James Alefantis, its owner, described as a friend of Podesta and listed by GQ as a powerful DC figure. - Specific nodes and symbols: The narrative identifies a supposed FBI symbol system used by pedophiles (including a “boy love” triangle) and notes that Besta Pizza’s logo formerly contained a similar symbol, which it is argued changed after investigators pointed it out. It also links a number of performances at Comet Ping Pong (e.g., Heavy Breathing, Sex Stains) to disturbing symbols later identified as pedophile codes. James Alefantis is described with references to intimate associations (e.g., a relationship with David Brock, founder of Media Matters) and to his Instagram presence, which allegedly contained disturbing images and coded references. - Broader network and alleged ties: The film asserts extensive links among Alefantis, Podesta brothers, and other Washington figures, including references to donations to Hillary Clinton and George Soros, frequent White House visits, and dinners with Podesta. It cites pictures of Podesta with Alefantis and other figures, and claims a pattern of relationships with prominent Democrats and fundraisers. - Cultural artifacts and art world connections: The transcript describes connections to Marina Abramović and “spirit cooking” events, claiming Podesta attended such events, and cites museum-like art collections (e.g., Tony Podesta’s home) as evidence of a hidden culture. It recaps the idea that “spirit cooking” is a ritual performance and contrasts it with the artist’s explanation of context. - Notable individuals and incidents: The text references Dennis Hastert (the former House Speaker) in the context of criminal charges and alleged abuse, presenting Podesta’s emails as mentioning Hastert and tying that into a broader network. It describes various DC figures and businesses (e.g., Gordy’s Pickle Jar, Beyond Borders, Politics and Prose) as part of the alleged web of pedophilia-adjacent activity, with logos and social media posts interpreted as evidence. It claims that the Podesta brothers and others are part of a “deep state” or “occult” network. - Pizzagate in the real world: The narrative recounts the December 2016 incident in which Edgar Welch fired inside Comet Ping Pong Earth, saying he was investigating claims of a child sex ring and that the information originated online. It emphasizes the danger and harassment faced by Alefantis, staff, and customers, including death threats, and frames the gun incident as a consequence of fake-news-driven conspiracy theory. - Media coverage and accountability: The transcript includes a Kelly File segment in which James Alefantis speaks about the harassment and threats to staff and customers, underscoring that the claims had real-world consequences even as police and mainstream media reportedly found no evidence of a sex ring. It includes an Infowars segment in which Alex Jones and others discuss Pizzagate, acknowledge that they had initially reported on Podesta email code words, and later issued an apology and retraction regarding specific statements about Alefantis and Comet Ping Pong. - Investigative and ethical reflections: The piece features a video producer recounting alleged threats from Alefantis, including a phone call in which he purportedly threatened to kill the producer and his family unless the related video was deleted. It also includes a segment where a technician discusses alleged “kill room” imagery and references to underground tunnels and a Pegasus museum, tying them to the broader conspiracy. - Conclusion and framing of a larger struggle: The final portion frames Pizzagate as part of a larger battle against a supposed deep-state manipulation of media and government. It positions the narrative as a catalyst for a broader movement (referred to as Q and a coming “second American revolution”), calling for declassification of materials related to Epstein, Gates, Spygate, Russiagate, JFK, and 9/11 and presenting a claim that public trust in mass media and social platforms is in jeopardy. It ends with a call to action and a slogan about a movement that transcends party politics, asserting that government should be controlled by the people. Throughout, the transcript presents a chain of alleged connections, symbols, and events used to argue that a hidden, interconnected network of political and cultural elites engaged in child trafficking, with Pizzagate as a flashpoint that demonstrated broader cultural and media manipulation. It includes counterpoints from mainstream coverage, as well as self-professed apologies and retractions by some producers, but it maintains the core claim of a pervasive, concealed conspiracy supported by a web of social, political, and artistic figures.

Video Saved From X

reSee.it Video Transcript AI Summary
Our cyber command and special forces have arrested over 400 individuals, including Pelosi, Biden, Hunter Biden, and Romney. We are in a military coup, arresting corrupt officials. The recent events at the Capitol were a sting operation to retrieve Pelosi's computer. Trump orchestrated this to expose Democrat corruption. Biden won't be president, there will be mass arrests and military tribunals due to lack of trust in government officials.

Video Saved From X

reSee.it Video Transcript AI Summary
A crisis is unfolding in our democracy as federal workers are locked out of their offices while private operatives take control of government functions. Their actions include shutting down federal websites, deleting taxpayer-funded research, imposing speech codes, and accessing personal data of millions without authorization. This is happening as Trump appoints unqualified individuals to lead federal agencies, ensuring they won't intervene. Meanwhile, congressional Democrats issue letters and hold press conferences, while Republicans remain passive, allowing the government to deteriorate. If this were occurring in another country, it would be labeled a coup.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript covers a broad set of interwoven claims about global health security, intelligence operations, political conspiracies, and alleged CIA influence on U.S. leadership. Key points include: - Pandemic preparedness and global infrastructure: There is discussion that an airborne, deadly disease could emerge, and to deal with it effectively we must put in place infrastructure globally and domestically to see, isolate, and respond quickly. The investment is framed as a smart, long-term insurance against future flu strains like the Spanish flu, especially in a globalized world. - CIA and presidency dynamics: The day after an election, the CIA director allegedly authorizes a president-elect to begin receiving a President’s Daily Brief (PDB) and uses the briefing to “suck him in,” presenting impressive can-dos that shape the new president’s perceptions and questions. This is described as psychological profiling and manipulation, with the CIA using long-standing methods to influence a president and government direction. - Allegations of a covert cabal influencing U.S. institutions: The conversation suggests a cabal has aimed to destroy U.S. institutions from within, including defunding the military and ordering actions that undermine allies while aiding enemies. This cabal allegedly includes control over the FBI, DOJ, and the presidency, culminated in the appointment of James Comey to head the FBI, portrayed as a “cardinal” with ties to the Clinton Foundation and as part of broader cabal activity. - 2008–2011 FBI and political corruption narrative: An asset described as a high-level foreign agent allegedly influenced U.S. politics and was connected to multiple intelligence services, with claims about his role in internal U.S. political manipulation. The rise of a president referred to as “Renegade,” identified as Barry Sartaro (Barry Soetoro), is described as part of the cabal’s plan to destabilize the United States from within, including military demoralization and misdirection. - Barack Obama conspiracy theories: The dialogue asserts that Barack Obama’s origins and identity have been manipulated for political purposes, including claims about a forged birth certificate, ongoing questions about birth location, and various individuals connected to Hawaii’s health department and local authorities providing or denying birth certificate verification. References include Loretta Fuddy and investigations into Obama’s birth details, with assertions that Obama’s name and identity were manipulated in Indonesia (Barry Soetoro) and that his family connections tie to CIA-backed operations in Asia. - Indonesia coup and CIA involvement: The conversation links Obama’s family to CIA-backed activities in Indonesia, including the overthrow of Sukarno and the rise of Suharto, with relatives described as having roles in money channels and death squads. The narrative asserts that Lolo Soetoro acted in intelligence-adjacent roles and that Obama’s grandmother helped channel CIA funds in the region. - Claims about CIA media manipulation and “MK Ultra” style operations: The speakers reference Operation Mockingbird, MK Ultra, and other CIA operations as public knowledge used to undermine the American people. They suggest continued silencing and manipulation by those operations. - Kill lists and drone warfare under the Obama administration: The transcript alleges that John Brennan led “Tuesday morning kill list” meetings starting in 2009, with drones and targeted killings used to eliminate designated individuals, and asserts confidence that Obama’s administration excelled at deploying missile strikes and other covert actions, contrasted with the possibility of ongoing use by subsequent administrations. - Recurrent thread of distrust in institutions: Across pandemic planning, birth certificate controversy, foreign influence, CIA cabal theories, and drone warfare, the overarching theme is distrust of established institutions and assertion of deep, planned manipulation by covert actors.

Video Saved From X

reSee.it Video Transcript AI Summary
The extent of corruption in our elections is unknown. Many candidates, regardless of party, may have paid to manipulate the system for personal profit. This isn't just about seizing power; it's incredibly lucrative. Consider the global interests influencing news organizations and the pressure from social media to silence dissent. This is a massive, well-funded campaign to undermine our fundamental right to preserve our republic. This is a critical moment, a pivotal struggle for our nation's future, echoing the fight of 1775.

Video Saved From X

reSee.it Video Transcript AI Summary
The National Security Agency has tracked all illicit wealth globally for 15 years. Wall Street has stolen $100 trillion from Main Street via naked short selling and laundered another $100 trillion in illicit funds from trafficking. Ninety percent of individuals in the US government, military, and intelligence community are good people within a flawed system. The secret intelligence community serves the deep state, not the American public. The CIA engages in torture, rendition, drone assassinations, regime change, and war instigation based on lies because war and trafficking are profit centers for Wall Street and the deep state. Once the president accesses NSA data, everyone involved will be exposed. The only way to survive is to make a deal through truth and reconciliation.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and political connections. However, a counter coup was initiated by the intelligence community through Julian Assange and WikiLeaks. The case involving Hillary Clinton's emails, particularly those linked to Anthony Weiner, served as a warning to the administration that their corruption would be exposed. This counter coup aimed to prevent Hillary from becoming president and to hold Loretta Lynch and others accountable for their involvement in the Clinton Foundation's corruption. This historic event unfolded on the internet, with various intelligence organizations and brave individuals working together to save the republic. The goal is a peaceful transition of power without pardons or acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2014, riots known as the rebellion occurred in Ukraine, but it was not widely known that the US was financing these riots. The riots led to a coup against Ukraine's democratically elected government, which refused to align with the West. A month before the coup, a secret call between Victoria Nuland, a high-level official in the State Department, and the US ambassador was recorded and made public. In the call, they discussed choosing a new cabinet for Ukraine, essentially picking a US-backed government before the old one was overthrown. This raises questions about democracy and the role of organizations like USAID and the CIA, which have a history of overthrowing governments, including democracies.
View Full Interactive Feed