TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that top law enforcement officials expected Hillary Clinton to win the 2016 election and manipulated the law to ensure her victory and Trump's defeat. He cites James Comey's alleged admission of operating in an environment where a Clinton victory was expected. The speaker discusses the alleged intrusion into the Democratic National Committee (DNC), pointing to "telltale signs in Cyrillic" and the name "Felix Dzerzhinsky" as either sloppy or overly clever attempts to implicate Russia. He alleges that the persona "Guccifer 2.0" is a fraud, based on forensic analysis of metadata by former NSA technical directors. The speaker criticizes Bob Mueller, claiming he falsified intelligence before the Iraq War and approved of torture and wiretapping. He recounts an encounter where he questioned Mueller about "parallel construction," the practice of using illegally acquired information in prosecutions without revealing its source. The speaker describes James Comey's leaking of a conversation with President Trump to prompt the appointment of a special prosecutor, Bob Mueller. He questions Comey's decision not to seize the DNC computers after the alleged Russian hacking, relying instead on CrowdStrike, a firm with a "disastrous record of veracity." The speaker claims that the DNC blamed Russia for the hacking to divert attention from the content of the leaked emails. He references Jennifer Palmieri, Hillary Clinton's PR person, allegedly pushing the "Russians hacked" narrative. Chuck Schumer is quoted as saying the intelligence community has "six ways to Sunday" to get back at Trump. The speaker discusses the Steele dossier and claims that the FBI also paid for it. He alleges that the intelligence community assessment on Russian hacking was based on handpicked analysts and that Obama stated the conclusions of Russian hacking getting to WikiLeaks were inconclusive. He claims NSA collects everything and there is no evidence of Russian hacking. The speaker references Peter Strzok and Lisa Page's text messages, where they expressed support for Hillary Clinton and a determination to "stop" Trump. He claims Strzok, who led the investigation of Hillary Clinton's emails, later said there was "no there there" regarding Russia gate. The speaker claims Julian Assange released documentation of the CIA's cyber tool to hack into systems and leave telltale signs giving the responsibility to someone else. He concludes that a "deep state" within the FBI, CIA, and Justice Department acted to ensure Hillary Clinton's victory and undermine Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and political connections. However, a counter coup has been initiated by the intelligence community through Julian Assange and WikiLeaks. The case involving Hillary Clinton's emails, particularly those related to Anthony Weiner, served as a warning to the administration that their corruption would be exposed. This counter coup aims to prevent Hillary Clinton from becoming president, while also indicting Loretta Lynch and others involved in the Clinton Foundation's cover-up. This historic event is happening online, marking a major transition and a second American revolution. The American public, including veterans and intelligence personnel, are determined to peacefully stop the Clintons from assuming power and ensure Obama's departure without any acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
The implications are far-reaching and concern the integrity of our democratic republic. An outgoing president took action to manufacture intelligence to undermine and usurp the will of the American people in that election. This launched what would be a years-long coup against the incoming president of the United States, Donald Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, there was controversy surrounding the hacking and recount of voting machines in Michigan and Wisconsin. Hillary Clinton was upset because the machines she had hacked got unhacked, and Jill Stein demanded a recount. It was believed that Hillary expected the same treatment as Joe Biden in the election. She had been promised that the game would be rigged for her, but it didn't happen. This caused her to lose her mind and throw things. In 2016, someone counterhacked the people who were going to hack on Hillary's behalf, but that didn't happen this time. The speakers know who did it but will save that for another discussion.

Video Saved From X

reSee.it Video Transcript AI Summary
Trump will not be president. Text messages between FBI officials Peter Strzok and Lisa Payne reveal bias. The peaceful transfer of power is a hallmark of our democracy. Declassified documents show officials in the Obama administration requesting the unmasking of Americans. Political spying and sabotage were aimed at undermining the incoming Trump administration. The FBI and Washington Post were involved in setting up the new administration. This conspiracy is often ignored.

Video Saved From X

reSee.it Video Transcript AI Summary
On November 1, 2016, the Clintons orchestrated a silent civilian coup through corruption and cooptation, infiltrating key government agencies. In response, a counter coup was initiated by the intelligence community via Julian Assange and WikiLeaks, exposing Clinton corruption. This silent battle unfolded online, marking a unique moment in history. The goal is to prevent the Clintons from seizing power and ensure a peaceful transition of government. This movement, led by brave individuals in various intelligence agencies, aims to uphold the integrity of the American republic.

Video Saved From X

reSee.it Video Transcript AI Summary
In July 2016, Christopher Steele gave his dossier to the FBI while John Brennan, then head of the CIA, received information about the Hillary Clinton campaign's questionable activities. The evidence related to this was either destroyed or returned to the Clinton Global Initiative. The corruption within the DOJ and FBI is concerning, as an entire investigative team conducting a lawful investigation can be shut down by the Department of Justice. This should be a major story, given the magnitude of the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Bill Clinton and the Clinton Foundation were involved in a scheme where he would secure speaking engagements in exchange for weapons deals. This shows their corrupt nature. The Democratic party failed to hold them accountable, which led to people becoming desperate and electing Donald Trump, a political novice and game show host. Trump's reputation as a bull made people believe he would take action.

Video Saved From X

reSee.it Video Transcript AI Summary
There is now incontrovertible evidence that Barack Obama spearheaded a seditious conspiracy to subvert the will of the American people and overthrow the United States government in 2016. James Comey, John Brennan, Clapper, Rice, and Biden were involved. On July 28 in the Oval Office, they briefed Barack Obama on Hillary Clinton's plan to tie Trump to Russia collusion lies. This consumed national discourse for five years, undermined a sitting president, sabotaged an administration, framed a three-star general, and destroyed the country. This constitutional crisis was atrocious, and every one of them must be held accountable for these heinous crimes.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, nobody believed it possible for Donald Trump to defeat Hillary Clinton. When he did, it seems president Obama just couldn't take it. He convened in 12/09/2016 meeting in the White House Situation Room just weeks after Hillary Clinton conceded. He ordered an ICA or intelligence community assessment to functionally attribute Trump's unexpected win to the doings of Vladimir Putin. That Obama ordered phony assessment was about politics, not national security or the truth.

Video Saved From X

reSee.it Video Transcript AI Summary
A federal investigator told Fox News that Seth Rich, a DNC staffer murdered in July, contacted WikiLeaks through Gavin McFadden, providing over 44,000 emails. WikiLeaks then published DNC emails showing efforts to undermine Bernie Sanders, leading to resignations. Julian Assange alluded to risks faced by WikiLeaks sources, referencing Rich's murder. Some suggest Rich leaked the DNC emails to WikiLeaks and was killed because of it. The timing of the Fox News story, which was later retracted, coincided with the appointment of Mueller and the Comey firing, allegedly deflecting from the Russia investigation. It's claimed the FBI never investigated the DNC hack, instead relying on CrowdStrike. Some DNC members believed Rich was murdered for political reasons. One speaker alleges Hillary and Bill Clinton initiated a "civilian coup" by co-opting various government agencies. A "counter-coup" was allegedly initiated through Julian Assange and WikiLeaks by members of the intelligence community to undermine the Clintons and expose corruption. The speaker claims this was a peaceful effort to ensure a transition without pardons or acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
Trump will not be president. Text messages between FBI officials Peter Strzok and Lisa Payne reveal bias and certainty about the election outcome. The peaceful transfer of power is a cornerstone of our democracy. Declassified documents show Obama officials requesting the unmasking of Americans, including aides of the incoming president. This political spying could be a problem. The Washington Post published information about Michael Flynn without my knowledge. The Obama Administration sought to undermine the incoming Trump administration, creating a conspiracy involving the outgoing president, vice president, and FBI. This sabotage is rarely discussed.

Video Saved From X

reSee.it Video Transcript AI Summary
DNI Gabbard released 100 documents proving Hillary Clinton created a dossier. Obama's team was informed and then created a diversion to make it about Trump. The bureaucracy and the swamp must be drained. FBI and DOJ career employees who participated should be fired and prosecuted. The federal government was weaponized against a citizen and political opponent because the American people were not doing what they wanted. There was anecdotal evidence this was happening, and now the receipts have been shown. Prosecutions should begin.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a narrative about a coming, transformative event and an elite plan “so evil, so all encompassing that people will be shocked to the core.” The documentary is framed as a guide to help viewers understand and process the impending quantum leap in humanity, claiming that power structures built over thousands of years are being dismantled and that most of the world remains unaware. Key claims and overview: - The film promises to show evidence of an elite plan and asserts that the reality and timeline of humanity have been misrepresented. It invites viewers to join a journey “down the rabbit hole.” - It questions whether recent events are ordinary, citing forest fires in California as examples: “Did you know that these fires forgot to burn trees? That they were capable of cutting through houses? That they burned trees from the inside out? That they were able to lift cars, tilt them and smash them down?” - It asserts that mercury is highly toxic but is injected into children in absurd quantities, and references chemtrails now acknowledged as geoengineering aerosols sprayed to protect from global warming. It claims these sprays include heavy metals stored in the brain, alleged to cause Alzheimer’s and Parkinson’s disease. - It asserts that in some countries, including the Netherlands, one must explicitly say no to organ donation or organs become property of the state upon brain death, comparing the arrangement to Nazi-era law. - It alleges the current Pope has stated that hell does not exist, but the devil does, and notes the Vatican audience hall with references to reptilians, snakes, and serpents, plus the Vatican’s telescope named Lucifer and the Pope making the sign of the devil. - It questions the official 9/11 narrative, noting three planes with unusual details and inconsistencies, and mocks the idea that victims are only human flesh and blood, including a claim about a young man surviving multiple attacks with minimal injuries. - It asks about subliminal messages in children’s cartoons and raises abortion debates, contrasting fully grown fetuses and the development of the nervous system, and equating abortion of a fully grown baby with murder. - It references the migrant caravan, alleging thousands moved toward the U.S. as a political statement against President Trump, walking 2,000 miles in a month-and-a-half at about 45 miles per day, barefoot. - It asks why Hollywood celebrities promote creams containing foreskins of baby boys and claims foreskins are sold as part of a trade, then speculates about drinking baby blood. - It lists five additional claims: diseases such as AIDS, Zika, SARS, and Ebola are patented (characterizing them as man-made); cell phones, laptops, tablets, and TVs contain spyware that monitors 24/7, recording conversations at home or work; in 2018 Monsanto was bought by Bayer, placing carcinogenic poison control of the food supply under the producers of Roundup and Agent Orange; Hillary Clinton deleted 33,000 emails from a private server, used a hammer to destroy devices and destroyed other evidence by fire; Obama received the 2009 Nobel Peace Prize soon after inauguration despite invading seven countries and dropping bombs at a high rate. - It claims mainstream media ignored all these issues, and reflects a belief that two political sides (left and right) are actually two wings of the same bird. It discusses Obama’s election despite a background of controversy, the role of WikiLeaks in exposing Clinton Foundation/writings, and that WikiLeaks’ release occurred just before the elections. It mentions Seth Rich, murdered with two bullets in the back, as the source of Clinton corruption evidence, stating, “Who killed Seth Rich? We will find out in the next episodes.” The transcript concludes with “Donald Trump as president of The US” and introduces the “enigma of q.”

Video Saved From X

reSee.it Video Transcript AI Summary
To understand how the American government operates, consider the case of Richard Nixon, the most popular president in U.S. history, who was forced to resign without a single vote against him. Nixon believed federal agencies were undermining democracy. His downfall began with the Watergate scandal, which was reported by Bob Woodward, a former naval officer with ties to intelligence agencies. The investigation was fueled by Mark Felt, the FBI's deputy director, who was involved in discrediting Nixon. Following Nixon's resignation, Gerald Ford, who had served on the Warren Commission, became president. This illustrates how unelected officials can control the political system, undermining democracy. The targeting of figures like General Michael Flynn shows the ongoing struggle against this entrenched power. Ultimately, when unvoted individuals hold power, true democracy is compromised.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Seth Rich murder and its alleged connection to WikiLeaks and the 2016 DNC email controversy. An FBI forensic report purportedly found that Rich contacted WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and Rich allegedly provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10, but his wallet, phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later, showing top DNC officials discussing ways to hurt Bernie Sanders at the polls, which contributed to the resignation of Debbie Wasserman Schultz as DNC chair and the DNC’s top three officials. Speaker 1 questions whether there is an “October surprise” and whether material is being held. Speaker 2 of the Helix group states that they do not sit on material and emphasizes that whistleblowers take significant risks; they note Rich’s murder as an example of high stakes and risk to sources, asserting that sources seek anonymity with them. When Speaker 1 asks if Rich was a source, Speaker 2 declines to comment but says they are investigating what happened to Rich and are concerned about it, though no conclusion has been reached. Speaker 3 argues that Rich was a Bernie Sanders supporter who worked for the DNC and asserts that the DNC rigged the primary against Sanders; he notes that Rich was aware of this and was involved as it happened, with Donald Brazil also involved. He describes Rich as idealistic and patriotic, and recounts his murder after leaking information to WikiLeaks, insisting that this is not a conspiracy theory but a fact-based concern. He challenges others to acknowledge the alleged corruption within the Democratic party and suggests that those who ignore the facts are engaging in denial. He also critiques media portrayals and online accusations about his own credibility. Speaker 4 discusses Assange and WikiLeaks, criticizing the idea of a conspiracy theory and labeling Assange as a key figure who exposed corruption. He mentions that Assange now “works for Russia” and questions the Ecuadorian embassy situation, describing it as heavily manipulated by interests around Hillary Clinton and the Clinton Foundation. He connects the Seth Rich disclosures to broader allegations of a coordinated effort to undermine Clinton and her circle, while acknowledging that some related claims may be questionable. Speaker 6 notes that hacking of the DNC and the role of CrowdStrike remain controversial and points to the subsequent murder of Rich as a focal point for questions that have not been fully explored by the media. Speaker 7 echoes concerns about the timeline, the FBI’s involvement, and past inquiries that were not pursued, emphasizing a sense that the case and the broader narrative around the DNC emails have been inadequately examined. Speaker 8 presents a long, conspiratorial narrative alleging that on 11/01/2016 Hillary and Bill Clinton orchestrated a civilian coup through corruption and co-option of key institutions, while a countercoup through Julian Assange and WikiLeaks was initiated to undermine Hillary and the Clinton machine. The speaker claims a silent countercoup across the Internet, led by members of the intelligence community, to stop the Clintons from gaining power and ensure Obama leaves without pardon, framing the moment as a major transitional event and a second American revolution conducted without guns.

Video Saved From X

reSee.it Video Transcript AI Summary
Trump will not be president. Text messages between FBI officials Peter Strzok and Lisa Payne reveal bias and certainty about the election outcome. The peaceful transfer of power is a cornerstone of our democracy. Declassified documents show that officials in the Obama administration requested the unmasking of American citizens, potentially disrupting the transition of power. The unmasking of Michael Flynn ended up in The Washington Post, raising questions. The Obama administration sought to undermine the incoming Trump administration, creating a conspiracy involving outgoing officials, a Washington Post columnist, and the FBI.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and cooperation to gain control of various institutions. However, a counter coup was initiated by the intelligence community through Julian Assange and WikiLeaks. The opening of the Hillary Clinton email case provided an opportunity for the counter coup to expose the corruption and prevent her presidency. This silent coup and counter coup were both carried out online, marking a historic moment. The speaker, a part of the counter coup, emphasizes that they do not intend harm but aim for a peaceful transition of power, preventing the Clintons from assuming control and ensuring Obama's departure without any acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript outlines the origin and propagation of the Pizzagate conspiracy theory and catalogs a wide range of alleged connections among political figures, businesses, and investigations, presenting these as part of an open-source online inquiry that spiraled into a real-world incident and a broader discourse about media and power. - Origins and method: WikiLeaks released emails hacked from Hillary Clinton’s private server and John Podesta’s account. Anons and various forums (Reddit, Steamit, 4chan, Vote, Websleuths) purportedly found strange references to pizza and hotdogs in the emails, which they reinterpreted as code language used by pedophiles. The narrative emphasizes an open-source investigative culture where people publicly contribute data and discuss what is pertinent, claiming that scandals have occurred on both sides of the political aisle and are bipartisan. - Core claim and media framing: The program asserts that Pizzagate originated from Podesta email dumps and evolved into a theory that Clinton and Podesta ran a child sex trafficking ring. It is claimed that the email references to pizza, handkerchiefs, hot dogs, and related terms were code words used by pedophiles, with Comet Ping Pong Pizza referenced multiple times in the emails and connected to Podesta through James Alefantis, its owner, described as a friend of Podesta and listed by GQ as a powerful DC figure. - Specific nodes and symbols: The narrative identifies a supposed FBI symbol system used by pedophiles (including a “boy love” triangle) and notes that Besta Pizza’s logo formerly contained a similar symbol, which it is argued changed after investigators pointed it out. It also links a number of performances at Comet Ping Pong (e.g., Heavy Breathing, Sex Stains) to disturbing symbols later identified as pedophile codes. James Alefantis is described with references to intimate associations (e.g., a relationship with David Brock, founder of Media Matters) and to his Instagram presence, which allegedly contained disturbing images and coded references. - Broader network and alleged ties: The film asserts extensive links among Alefantis, Podesta brothers, and other Washington figures, including references to donations to Hillary Clinton and George Soros, frequent White House visits, and dinners with Podesta. It cites pictures of Podesta with Alefantis and other figures, and claims a pattern of relationships with prominent Democrats and fundraisers. - Cultural artifacts and art world connections: The transcript describes connections to Marina Abramović and “spirit cooking” events, claiming Podesta attended such events, and cites museum-like art collections (e.g., Tony Podesta’s home) as evidence of a hidden culture. It recaps the idea that “spirit cooking” is a ritual performance and contrasts it with the artist’s explanation of context. - Notable individuals and incidents: The text references Dennis Hastert (the former House Speaker) in the context of criminal charges and alleged abuse, presenting Podesta’s emails as mentioning Hastert and tying that into a broader network. It describes various DC figures and businesses (e.g., Gordy’s Pickle Jar, Beyond Borders, Politics and Prose) as part of the alleged web of pedophilia-adjacent activity, with logos and social media posts interpreted as evidence. It claims that the Podesta brothers and others are part of a “deep state” or “occult” network. - Pizzagate in the real world: The narrative recounts the December 2016 incident in which Edgar Welch fired inside Comet Ping Pong Earth, saying he was investigating claims of a child sex ring and that the information originated online. It emphasizes the danger and harassment faced by Alefantis, staff, and customers, including death threats, and frames the gun incident as a consequence of fake-news-driven conspiracy theory. - Media coverage and accountability: The transcript includes a Kelly File segment in which James Alefantis speaks about the harassment and threats to staff and customers, underscoring that the claims had real-world consequences even as police and mainstream media reportedly found no evidence of a sex ring. It includes an Infowars segment in which Alex Jones and others discuss Pizzagate, acknowledge that they had initially reported on Podesta email code words, and later issued an apology and retraction regarding specific statements about Alefantis and Comet Ping Pong. - Investigative and ethical reflections: The piece features a video producer recounting alleged threats from Alefantis, including a phone call in which he purportedly threatened to kill the producer and his family unless the related video was deleted. It also includes a segment where a technician discusses alleged “kill room” imagery and references to underground tunnels and a Pegasus museum, tying them to the broader conspiracy. - Conclusion and framing of a larger struggle: The final portion frames Pizzagate as part of a larger battle against a supposed deep-state manipulation of media and government. It positions the narrative as a catalyst for a broader movement (referred to as Q and a coming “second American revolution”), calling for declassification of materials related to Epstein, Gates, Spygate, Russiagate, JFK, and 9/11 and presenting a claim that public trust in mass media and social platforms is in jeopardy. It ends with a call to action and a slogan about a movement that transcends party politics, asserting that government should be controlled by the people. Throughout, the transcript presents a chain of alleged connections, symbols, and events used to argue that a hidden, interconnected network of political and cultural elites engaged in child trafficking, with Pizzagate as a flashpoint that demonstrated broader cultural and media manipulation. It includes counterpoints from mainstream coverage, as well as self-professed apologies and retractions by some producers, but it maintains the core claim of a pervasive, concealed conspiracy supported by a web of social, political, and artistic figures.

Video Saved From X

reSee.it Video Transcript AI Summary
Our cyber command and special forces have arrested over 400 individuals, including Pelosi, Biden, Hunter Biden, and Romney. We are in a military coup, arresting corrupt officials. The recent events at the Capitol were a sting operation to retrieve Pelosi's computer. Trump orchestrated this to expose Democrat corruption. Biden won't be president, there will be mass arrests and military tribunals due to lack of trust in government officials.

Video Saved From X

reSee.it Video Transcript AI Summary
We look at where we are now over the last several weeks. We've declassified and released documents that exposed how president Obama and leaders in the intelligence community knowingly manufactured a false intelligence document after the twenty sixteen election was done, after the American people said, no, we want Donald Trump to go and be our commander in chief, not Hillary Clinton. And this manufactured document alleged that Russia aspired to help president Trump win the election with the aim of undermining his presidency and usurping the will and the voices of the American people who sent Trump to the White House.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and political connections. However, a counter coup was initiated by the intelligence community through Julian Assange and WikiLeaks. The case involving Hillary Clinton's emails, particularly those linked to Anthony Weiner, served as a warning to the administration that their corruption would be exposed. This counter coup aimed to prevent Hillary from becoming president and to hold Loretta Lynch and others accountable for their involvement in the Clinton Foundation's corruption. This historic event unfolded on the internet, with various intelligence organizations and brave individuals working together to save the republic. The goal is a peaceful transition of power without pardons or acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
The FBI's politicized hacks aimed to bring down Donald Trump, with the help of Hillary Clinton's campaign. The report revealed that Trump's political opponents provided leads for the investigation, relying on a fabricated dossier. While we reported on this, other media outlets downplayed it. Unfortunately, there were no consequences for those involved in the Crossfire Hurricane operation. In fact, they were emboldened and repeated their actions in 2022, this time protecting Hunter Biden.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2014, riots known as the rebellion occurred in Ukraine, but it was not widely known that the US was financing these riots. The riots led to a coup against Ukraine's democratically elected government, which refused to align with the West. A month before the coup, a secret call between Victoria Nuland, a high-level official in the State Department, and the US ambassador was recorded and made public. In the call, they discussed choosing a new cabinet for Ukraine, essentially picking a US-backed government before the old one was overthrown. This raises questions about democracy and the role of organizations like USAID and the CIA, which have a history of overthrowing governments, including democracies.
View Full Interactive Feed