reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker was asked if Jeffrey Epstein worked for an intelligence agency and why a minute was missing from the jailhouse tape on the night of his death. Regarding the client list, the speaker stated the file is sitting on their desk to be reviewed, along with the JFK and MLK files. The tens of thousands of videos turned out to be child porn downloaded by Epstein and will never be released. The speaker has no knowledge of Epstein being an agent. Evidence showed he committed suicide. The missing minute from the video was due to the Bureau of Prisons resetting the video every night, and every night should have the same minute missing. They are looking for that video to release.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the ongoing examination of Jeffrey Epstein’s files and what they reveal, with a focus on disturbing content, coded language, and the reliability of the material. - The speakers note the FBI’s earlier claim that there was no sex trafficking, calling that claim gaslighting given the scale of material now public. They emphasize the last four file dumps as “unbelievable” in their volume and in the disturbing, often coded language contained within. - They discuss how widespread Epstein’s influence appears to be, noting that Epstein’s activities touch many high-profile figures across politics and business. Names that repeatedly surface include former president Bill Clinton (clearly named in one journal entry) and former president Donald Trump (referenced repeatedly, sometimes with redactions that leave the identity ambiguous). Other figures mentioned include Prince Andrew, Alan Dershowitz, and Ivanka Trump, among others. They point out that some references are explicit, while others are obfuscated or redacted. - A central feature of the material is the use of code words to describe sexual abuse and trafficking. The participants give several examples: - The journal of a 16-year-old Epstein trafficking victim uses coded language; words like “yucky,” “gross,” and other terms are interpreted by an attorney as code for sexual assault. The journal explicitly mentions Chelsea Clinton in one passage and references to Bill Clinton, with the implication of inappropriate acts. - “Pizza” is repeatedly identified as a common code word in emails and journals, linked by some to the broader Pizza Gate lore, and sometimes paired with “grape soda” or “beef jerky” as coded references. They note that “pizza” appears over 900 times in some files, and “grape soda” is mentioned in the context of sexual references or secret messages. - The reliability and credibility of victims’ accounts are discussed. The 16-year-old victim’s journals include extraordinary claims (for example, about having Epstein’s child), and the speakers acknowledge that some allegations are “out outrageous” and may be difficult to corroborate. They stress the need for more forensic verification to determine what is authentically attributable to the victim and what may be embellishment or misinterpretation. They mention claims that a baby allegedly connected to Ghislain Maxwell and Epstein existed, but note that there is no independent corroboration of a child, while other entries discuss the possibility of egg freezing and related issues. - Redactions are scrutinized. Some names are clearly identifiable (e.g., Clinton, Chelsea), while others (including a Trump-related item) are redacted or partially disclosed. The hosts suggest the redactions may reflect AI-assisted and manual redaction, with some omissions caused by the sheer volume of material and potential misses during processing. They acknowledge that some files were removed after the initial release due to redaction errors, which complicates interpretation. - The discussion moves to Epstein’s personal network and possible roles as a liaison or intelligence asset. They observe Epstein’s connections to Middle Eastern figures and governments, including Saudi Arabia, Qatar, and the UAE, and speculate about possible associations with Mossad, Saudi intelligence, and other agencies. They discuss Epstein’s travel history, mentions of forged or fake passports, and the possibility that he might have contemplated operating outside the United States. - The material includes extensive photographic and video evidence. The speakers remark on the sheer number of images and videos, the presence of many well-known individuals in Epstein’s orbit, and body-language cues suggesting Epstein treated others as objects for his pleasure. They note that even after his 2008 conviction, Epstein remained photographed in public settings, implying ongoing power dynamics and influence. - The possibility that Epstein is alive is entertained, sparked by references to a possible escape plan and by discussion of questions around his death. They analyze a document scribbled in jail that the speaker interprets as an escape plan, including references to red notices, visas, banks, and “blackmail,” and discuss the idea that the death could have been staged or influenced by external actors. They contrast this with official accounts that describe Epstein’s death as suicide, while acknowledging inconsistencies in the DOJ and inspector general reports, and noting new observations such as delayed camera activity and reports of document shredding. - They conclude that the scope of material is enormous (tens of thousands to millions of pages, images, and videos), with three point something million released out of six point something million known to exist. They caution that the released files likely represent the tip of the iceberg and emphasize the value of collaboration among investigators, journalists, and researchers to parse the data. - Throughout, Epstein’s associates—including Maxwell and high-profile figures in politics and entertainment—are repeatedly examined in terms of possible roles, affiliations, and complicity, alongside broader questions about intent, corroboration, and the interpretation of coded language within the files.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the Defense Department's interest in patenting software that can manipulate elections. They question which division within the Department of Defense is involved, specifically mentioning intelligence divisions. One of the speakers mentions two key patents, one from 2005 that enables real-time monitoring of elections through dynamic auditing. This patent was developed in collaboration with the National Institute of Help, although its purpose is not fully understood.

Video Saved From X

reSee.it Video Transcript AI Summary
Do you believe votes were manipulated electronically in favor of Joe Biden? Yes, I do. I saw reports of votes switching from Trump to Biden—around 12,000 and 20,000 votes in two instances, with Trump's numbers decreasing exactly as Biden's increased. I suspected something was wrong, especially with claims of intelligence involvement. The Dominion Company, a Canadian firm, stored its records in Germany and Spain, raising concerns about foreign interference. It seems there may have been CIA involvement, as U.S. forces seized servers in Germany, which were linked to CIA operations. Now, those servers are with the FBI, which makes me uneasy, but at least they are in American hands.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The election was stolen. A graph shows people who worked for ES&S, Hart, Dominion Voting Systems, ClearBallot, and Smartmatic, recycling through companies. People who worked at Dominion Voting Systems are entering the political sphere and taking over election offices; one county in Texas, after hiring someone who worked for Dominion, went blue for the first time. The speaker walks through information: Dominion using “Serbian technology with Chinese characteristics.” Huawei Bank is involved; there’s no public board saying Bank of China funds anything, but research on Roaming Networks—a relatively unknown Serbian company until 2013—shows it signed a value-added contract with Huawei Bank. Huawei is “the Bank of China.” Roaming Networks built ICT infrastructure and data centers in Serbia, with owner Nenad Kovac identified as the enterprise partner. Some Roaming Networks information may come off their site after this presentation. Dominion Voting Systems has a corporate office in Serbia; a screenshot of the office and a developer on their site is noted. A Serbian legislative leader said, “I know Dominion Voting Systems back in November. They have an office here.” Dominion started rapidly removing Serbian coders from their site/LinkedIn. Code is built in Serbia for a system used in the United States, using infrastructure funded by China, not just China but the Bank of China. A slide discusses Dominion’s enterprise partnership with Huawei, added to the restricted list on 05/16/2019. Roaming Networks references show Dominion Voting Systems using a pure flash storage solution in Dominion’s data center. A photo of Sacramento shows Dominion hardware coming from China, with a bill of lading from a Chinese supplier to Dominion’s McKinney, Texas office. Testing and approval of Dominion hardware show similarities with Smartmatic; the same hardware with different branding. They claim a “tail” behind the scenes—evidence of connections among ES&S, Hart, Dominion, ClearBallot, Smartmatic, with people cycling through these companies. People who once worked at Dominion are now entering election offices; in Texas, a county that hired a former Dominion employee “went blue” by accident with ES&S involved. The speaker calls out Gina Griswold for commenting on Tina Peters and Mesa, and Matt Crane’s role as Arapahoe County clerk and recorder, now head of the County Clerks Association; Crane’s wife previously worked for Dominion and Sequoia Voting Systems. The speaker asserts a public breach of trust requires an audit; if there’s nothing to hide, audits should restore trust. They argue, whether Dominion is the bad actor or not, removal of logs, altering code, and a “trusted build” are problematic, and emphasize the need for audits and investigations to restore trust in elections. Speaker 1: Indicators: a senior Dominion vice president’s name appears on patents; a software engineer involved in the Wayne County, Michigan tabulation center is connected to the software. Coincidences accumulate, suggesting there is a preponderance of evidence with affidavits across the country. The speaker asks which computer produced certain files analyzed yesterday; whether it came from the central count or precincts. Speaker 0: Answers with a non-answer, noting they imaged the main EMS and the tabulation system; servers in the county coordinate precinct information and house audit reports, cast vote reports, error reports, adjudication reports, and access logs. Thumb drives can contaminate the county and state systems if connected to a machine; it’s not unique to Dominion or voting systems but a general risk. They emphasize avoiding white noise and focusing on facts: Dominion is in Serbia; Huawei Bank funds the enterprise partnership and Serbia-based data centers; code is written in Serbia; imaging shows fingerprints of this. They call for audits, note deviations in Georgia (ballots appearing identical in different batches, a shredder truck before January 20 in Georgia, and a leaky arena water claim later proven to be a leaky toilet), and point to media silence. They argue against accepting the gold standard claim and highlight perceived connections to Soros-funded groups. They stress deviations in state and county behavior, urge audits, and compare the election system to a serial killer—unacceptable to let foreign systems run it. Speaker 2: Adds that with 100 indicators, a pattern emerges; reiterates the need to examine which files came from which computer, and questions the integrity of the central count. Speaker 3: Notes the risk of a non-internet-connected thumb drive introducing malware; emphasizes auditing all machines for that reason.

Video Saved From X

reSee.it Video Transcript AI Summary
During a hearing, Republican Senator Josh Hawley questioned the FBI deputy director about the lack of accountability for lying to the FISA court and the agency's history of abuses. He expressed concerns about reauthorizing section 702 given the FBI's track record of illegal surveillance and political targeting. The speaker in the video encourages viewers to show their support by using the phrase "88 GIPHY" in the chat. They criticize the FBI for not being able to answer basic questions and accuse them of arresting Donald Trump while leaking information about Joe Biden.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on a set of claims and observations about January 6 that orbit around Sedition Hunters, Ray Epps, and the so-called “Northwest Scaffold Commander.” The speakers discuss and link multiple pieces of information to argue that the FBI and other agencies were paying close attention to, or coordinating with, covert actor networks on that day. - The discussion opens with a reference to a John Solomon article about Sedition Hunters and claims that the FBI and Justice Department paid Sedition Hunters about $150,000 to gather evidence on January 6 protesters to help the FBI make arrests. They note the figure was reported as over $100,000 in some places and $150,000 in a House hearing, and they say the FBI/DOJ paid Sedition Hunters, the SPLC, the ADL, the Atlantic Council, DFR Lab, and Bellingcat for intelligence. - The main focus shifts to a piece titled Meet Ray Epps (December 2021) by the speakers’ interlocutor, where they argue that the “main star of the show” was not Ray Epps, but a different figure labeled Northwest Scaffold Commander (referred to as Scaffold Commander). They emphasize that Sedition Hunters’ archives identified Scaffold Commander as their number-one suspect, although he was not placed on the FBI’s most-wanted list. - They recount how, on January 8, 2021, the FBI’s most-wanted list listed Ray Epps as a top suspect in the case, with public calls for information and a cash reward. By late June 2021, a Phoenix newspaper identified him as “Reyes,” and on July 1, 2021, the FBI removed Epps from the wanted list with no explanation and no arrest. They contrast this with Scaffold Commander, who was never added to the FBI’s public wanted list for identification by the public, despite being the focal point of Sedition Hunters’ investigations. - The speakers describe Scaffold Commander as an older man with glasses, a nerdy mask, and a blue cap, who allegedly directed the breach from the Northwest scaffold overlooking the Capitol. They claim he used a bullhorn to issue commands for approximately 18 minutes to an hour and a half, from 1:00 PM to about 2:30 PM, urging the crowd with phrases like “Move forward,” “Don’t just stand there,” “Help somebody over the wall,” and “We gotta fill up the capital.” - They juxtapose these observations with the chronology of the breach: the first breach around 12:53 PM, the crowd’s advance toward the Capitol, and the moment rioters entered the building. They argue Scaffold Commander acted as a ringleader and that Ray Epps was directly beneath him in the crowd, effectively functioning as an internal participant who helped draw people toward the front. - A key point they stress is that Scaffold Commander’s high perch and commanding role align with a long-cited CIA manual from 1983, Psychological Operations in Guerrilla Warfare, which describes a small cadre of crowd agitators operating from elevated positions to direct slogans and crowd movement. They quote and reference passages describing an “outside commando element” that stays above the crowd to observe and direct a demonstration, using high observation points to shout instructions and guide the crowd’s actions. - The speakers argue that the FBI has not acknowledged Scaffold Commander, has not included him on any public list, and has not publicly solicited identification for him, despite Sedition Hunters’ focus on him as the pivotal organizer. They suggest that internal FBI records, memos, or emails about Scaffold Commander could be highly revealing, potentially showing whether higher-ups instructed not to pursue him. - They conclude by urging the FBI and related investigators to search their internal records for “Northwest Scaffold Commander” and make any relevant documents public, implying that such records could undermine the official narrative of the event. They also frame the existence of an internal, externally guided command structure as a critical piece of the January 6 story that remains underexplored by authorities.

Video Saved From X

reSee.it Video Transcript AI Summary
While on the oversight committee in the senate, Dominion was investigated. The president of Dominion and his software maker testified. Questions focused on whether Dominion machines had internet access. The president of Dominion said no, but this was a lie. The investigation was published, recorded, and should be online.

Video Saved From X

reSee.it Video Transcript AI Summary
They claim our society has been taken over, and they point to one person in the White House who supposedly stands in the way. They warn that every American will have to stand up, saying we read about it in history like Normandy, but now we are in it and must spread it. They insist we cannot surrender, and reference that the president wouldn’t surrender. They state it was an attack on the capital carried out by Antifa, but was enabled by McConnell, Schumer, Pelosi, and the mayor, saying they knew it was coming and that security was lacking as Antifa acted, with the media later picking it up. They accuse Fox of disgraceful coverage, claim Rupert Murdoch is driving that with his sons, and say they merged with the rest of the mainstream media. They describe the situation as serious and expanding, claiming we do not have four years and that time is against us, drawing a comparison to Hong Kong to emphasize urgency. They discuss information released about cyber warfare used in battleground states. They claim to have learned that James Comey, the former FBI director, sold the HAMR and SCORECARD, a top-secret program, to the Chinese. They describe HAMR as a top-secret program similar to an iPhone that gains access to voting networks, with an application like on an iPhone that can be installed to modulate voting results so they win by smaller margins. They say they received a call on Tuesday night at 11:30 about the ISI from Pakistan being in the voting machines in Georgia, and that they informed someone about it. They assert that the two candidates Loeffler and Purdue were ahead, but an hour later they were behind.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that sources claim Brennan used "reverse targeting" to entrap Trump advisors Carter Page and George Papadopoulos via Halper and Mifsud. Papadopoulos told former Australian ambassador Downer about Russian offers to help Trump. This appears to be how Russiagate started. Speaker 1 believes John Brennan is a dark figure. Speaker 1 was arrested in 2012 and charged with espionage for blowing the whistle on the sea ice torch program. Speaker 1 claims to have found memos where Brennan told Holder to charge him with espionage, even though Holder's people didn't think he committed it, and then to make him defend himself. The espionage charges were dropped after Speaker 1 went bankrupt from legal fees. Speaker 1 believes Brennan was responsible for the origin of Russiagate. Speaker 1 claims the FBI isn't capable of such operations, but the CIA and John Brennan are. Speaker 1 claims Brennan and his contemporaries devise operations to get from point A to point C, ruining people along the way, and discusses potential tactics.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the FBI's "failed investigation" of the January 6th pipe bomb, alleging the FBI has no leads or suspects, has lost information and evidence, and that the Secret Service deleted all texts from January 6th. The speaker claims Steve D'Antuono said cell phone data that could have been used to find the bomber was corrupted. The speaker states that the FBI does not have video footage of the DNC from January 6th. The speaker asks if confidential human sources were involved in the pipe bomb incident. The other speaker responded they would have to refresh themselves on the information gathered to date. The speaker suggests getting the information public before the election.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: I began my journey into chronicling the censorship industrial complex. Speaker 1: Some of the most terrifying conversations I've had with some of my dear friends who work inside CIA, and their jobs is to go to other countries, get involved in elections, protests that will help overthrow a regime. It's no secret at this point. The CIA has been doing that for years, for decades. But the most terrifying conversations I've had are the ones where they would look to me and say, my god. Like, the twenty twenty election? We're doing to our people what we do to others. Speaker 2: CIA, the other intelligence agencies were exposed with projects like Operation Mockingbird. Speaker 0: The State Department, USAID, the Central Intelligence Agency went from free speech diplomacy to promoting censorship. Speaker 2: They created, purchased, controlled assets at the New York Times, the Washington Post, all of these top down media structures that used to control the information that Americans got. Speaker 3: I pulled into the driveway, opened up my garage door, these two gentlemen come out of a blue sedan with government license plates. And they came up to me and said, you're mister Solomon? And I said, yes. And they said, you're at the tip of a very large and dangerous iceberg. Speaker 4: Oh, yeah. The the FBI sent agents over to my home to serve a subpoena. They're questioning me about my tweets. How is that not chilling? Speaker 2: Our whole page on Facebook for the world Seventh day Adventist World Church was removed. Speaker 5: The level of censorship that we experienced from publishing this documentary was beyond anything I could have imagined, and we really didn't even understand why. Speaker 3: We are going to win back the White House. The Russian collusion started broken '16. That's where the big lie first erupted. Speaker 6: Russian operatives used social media to rile up the American electorate and boost the candidacy of Donald Trump. Speaker 0: That's why they went after Trump with the Russia gate and with the FBI probes and with the CIA impeachments and things like that. Speaker 3: My FBI sources told me there's nothing there. And I kept wondering to myself, how could it be that something that's not true be taken so seriously and be portrayed as true? Speaker 7: How do you expand sort of top down control in this society? How do we flip? How do we invert America? Speaker 6: The evidence that the Supreme Court recounts is bone chilling. The federal government would call a private media company and say, cancel this speaker or take down this post. Speaker 3: I mean, just think about this. A sitting president of The United States had his Twitter and Facebook accounts frozen. Our founding fathers could not possibly have imagined that. Is there a chance that this documentary will be censored? Speaker 1: I think there's a huge chance this documentary gets censored. Speaker 2: Yeah. So it's interesting when you look at so many of the big censorship cases in The United States involving COVID, Hunter Biden's laptop. They all go back to a common thread. What is that thread? National security. Speaker 0: Google Jigsaw produced world's first AI censorship product. Things the model were trained on, support for Donald Trump, Brexit referendum that the State Department tried very desperately to stop. These are all these sort Speaker 5: of component pieces of what you called the censorship industrial complex. Speaker 3: Censorship Industrial Complex. Censorship Speaker 2: Industrial Complex. Speaker 7: Censorship Industrial Complex. Censorship Industrial Complex. Speaker 1: I've long felt that it was a bubbling god complex.

Video Saved From X

reSee.it Video Transcript AI Summary
Michael Koury raised a question about Ravi Javi's IP patent related to the domain name system and restricted channels, noting a significant change in the filing attorney to Perkins Coie after the 2016 election. This prompted a discussion about Rodney Joffe, who billed Perkins Coie over $1 million in 2016 and 2017 for his work with NuStar Technologies. There is interest in understanding the nature of that work and the reasons behind Joffe's termination from the FBI. However, the technical details of the patent remain unclear.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker questions why the FBI paid Christopher Steele $1 million to verify a dossier on Trump and offered $3 million to Twitter to suppress a story on Hunter Biden. They express concern over the FBI's actions being politically motivated. The FBI director responds by explaining the payments to social media companies are for legal process costs. The speaker accuses the FBI of damaging its reputation and questions if the FBI requested financial institutions to provide customer data. The FBI director is unsure and the speaker presents an email from Bank of America as evidence.

Video Saved From X

reSee.it Video Transcript AI Summary
FEC United founder Joe Oldman infiltrated an Antifa conference call and discovered Eric Coomer, a top executive at Dominion Voting Systems. During the call, Eric expressed confidence that Trump would not win the election. Joe conducted a Google search and found that Eric Coomer was associated with Dominion Voting Systems. Eric held a high position at Dominion and had a background in nuclear physics. Joe also found evidence linking Eric to Antifa and his involvement in manipulating the election. Eric traveled to battleground states in 2019 to ensure Dominion's presence in the 2020 election. Eric shared screenshots that revealed his disturbing profile.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript centers on a long-form discussion of the Epstein case, the alleged “deep state,” FOIA operations, and political maneuvering around Trump, with frequent calls to aggressively release and pursue Epstein-related documents and other investigations. The speakers assert that the FOIA department is being used to shield deep-state ties and that many federal offices are filled with anti-Trump figures who have prevented full disclosure. - Epstein files and the role of the deep state - The speakers claim the Epstein files are being selectively redacted by FOIA departments to conceal deep-state connections. They state that FOIA personnel are controlled by deep-state actors and that Epstein’s case involves a “fleet of aircraft” and operations linked to major power centers. They argue Epstein’s activities connect to money laundering, information laundering, and a broader set of deep-state assets and operations. - They propose a remedy: appoint Tom Fitton as special counsel on the Epstein files, arguing he “knows how FOIA really works,” understands key personnel, and has litigated Epstein-related cases for years. They assert this would restore public confidence and expedite the exposure of Democratic ties and other actors alleged to be involved. - They advocate for Trump to have executive-privilege-style powers to declassify and release Epstein materials, suggesting a broad interpretation of “Epstein file law” that would allow him to disclose or appoint an ombudsman with power to release materials at will. They emphasize the need to disclose Democratic ties and to hold press conferences when releasing documents, avoiding the use of fake documents or videos. - Specific figures and institutions named - Kash Patel is cited as saying there are “open files on a dozen plus coconspirators” and as someone who has noted alleged misdirections by those handling Epstein-related material. - Kyle Serafin and Phil Kennedy are mentioned as documenting a person at the FBI capacity who is “an anti-Trump advocate,” implying that deep-state appointments control FOIA and related processes. - Speaker 0 and Speaker 1 discuss replacing FOIA and related personnel who are deeply implicated; they specifically name Tom Fitton as the ideal choice and entertain other high-profile figures like Tulsi Gabbard as potential custodians of the Epstein disclosures. - Tulsi Gabbard is described as being in charge of broader investigations tied to the Epstein files and other major political issues (elections, COVID-19, etc.). They also reference “Epstein files” intersecting with other investigations they attribute to the deep state. - Epstein, Maxwell, and allied networks - Epstein is described as deeply embedded with Western intelligence agencies (French, Israeli, UK, and US) and tied to Robert Maxwell, with Maxwell’s daughter linked to Epstein. Epstein is portrayed as having been “recruited by Bill Barr” and as a central figure in a long-running intelligence and blackmail operation. - The discussion links Epstein to Leslie Wexner (Victoria’s Secret founder) and a French talent agency, portraying these connections as part of a large, interconnected network involved in money laundering, arms trafficking, blackmail, and intelligence work. - The speakers insist that Epstein’s activities extended to the late 1990s and beyond, including alleged involvement in “Shutters” in Santa Monica and other high-profile cases, with a consistent pattern of using underage girls and blackmail to exert influence. - They emphasize a broader motive: exposing the “deep state” to vindicate Trump and indict deep-state actors who allegedly engaged in illicit operations, including foreign intelligence services and Western governments. - The broader political frame and potential indictments - The Epstein files are presented as a potential hinge for indicting a wide array of figures across political lines, including references to Comey, Mueller, Hillary Clinton-era actors, and other “rogue actors” who allegedly hindered investigations. - The conversation ties Epstein to broader themes: the 2020 election, COVID policies, and anti-Trump actions by the “deep state.” They contend that the Epstein disclosures could demonstrate the depth of state interference in political processes and media, making Democrats and their institutions targets of accountability. - They argue the Epstien files could show criminal activity by multiple national actors, including Israeli, UK, and French components, and could reveal coordinated efforts to derail Trump and manipulate media narratives. - The Candace Owens angle and related criticisms - A substantial portion of the dialogue critiques Candace Owens, alleging she is running a “CIA-style” operation that distracts from the true conspiracy around the deep state and Tarantifa, and that she manipulates narratives related to Tyler Robinson and Charlie Kirk. - They accuse Owens of shifting narratives, fabricating alibis, and promoting disinformation, calling her a “SIOP” (psychological operation) and alleging her behind-the-scenes connections to MI6 or other international actors through her husband (George Farmer) and other associates. - They recount multiple incidents where Owens purportedly changed stories about meetings, alibis, and involvement in various investigations, asserting she uses “receipts” selectively and inconsistently to support divergent claims. - The speakers allege that Owens’s public warfare against Trump and TP USA is part of a broader intelligence operation intended to disrupt conservative momentum, link to Royal/MI6 circles, and undermine investigations into the deep state and its networks. - Tyler Robinson case and media dynamics - They describe Tyler Robinson as a Middle American figure whose transformation into a political actor is portrayed as a product of online radicalization and Tarantifa-linked influences. They claim there was a concerted effort to spoon-feed disinformation about Robinson and Candace Owens’ involvement. - They argue this is part of a larger pattern of media manipulation and disinformation designed to distract from real conspiracies and to target Trump and conservative movements. - Strategy and messaging guidance - The speakers advocate for Trump to go on the offensive with Epstein, releasing comprehensive, verified documentation, and pushing accountability for “rogue actors” in the FBI, the DOJ, the CIA, and the NSA. - They stress the need for aggressive prosecution and the appointment of trusted figures to lead the Epstein disclosures, arguing that this could restore public confidence and pivot the political conversation toward accountability for the deep state. - They urge addressing the statute of limitations issues in COVID, January 6, and 2020 election-related cases before the window closes in early 2026, warning that delays by Bondi, Blanche, and others could jeopardize prosecutions and political support. - Promotional and logistical notes - The dialogue includes frequent mentions of promoting Alex Jones programs, products, and stores (alexjonesstore.com and infowarsstore.com) to fund operations, along with appeals to listeners to support the broadcasts financially and through purchases, framing financial support as essential to sustaining investigations, media efforts, and broader political action. In sum, the transcript presents an entangled, aggressively conspiratorial narrative: a claim that Epstein’s files illuminate a vast, deeply embedded deep-state apparatus spanning multiple nations and agencies; a call to appoint trusted figures (notably Tom Fitton) to supervise full disclosure; a push for Trump to declassify and publicly prosecute the implicated actors; a harsh critique of Candace Owens as part of a disinformation ecosystem; and a broader strategy to use Epstein, along with related investigations, to dismantle perceived institutional corruption while fueling political narratives and fundraising.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: We have a problem with the CIA and FBI in Washington. Speaker 1: What's your plan to start over and fix them? Speaker 0: They've gotten out of control, with weaponization and other issues. The people need to bring about change. We were making progress, but more needs to be done.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker talks about the criticism they receive online for sharing conspiracy theories. They mention reading patents and provide examples such as a patent from 2000 about manipulating the central nervous system and a patent from 2013 that controls brain state through electromagnetic patterns. They also mention a patent from 2014 that induces desired brain states through music files and a patent from 2002 that remotely transmits sound into targeted consciousness. The speaker highlights that the United States Air Force is the original assignee of one of these patents and questions whether the government would use such patents on its people.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 and Speaker 1 discuss the ongoing investigations into the Epstein-Israel connection. Speaker 1 explains that Robsat has been examining Epstein’s ties to the Israeli government, Israeli security services, and Israeli private firms connected to the security sector, which are heavily involved in tech surveillance. Epstein is described as a very critical node in this network. The recent email dump is noted as chaotic and not fully accessible, with about 3,000,000 documents released, roughly half of what the DOJ reportedly has. There is mention of another roughly 3,000,000 files that remain unseen, and that lawmakers like Ro Khanna and Thomas Massey have raised this issue. The currently released material may only be the tip of the iceberg, and fuller analysis awaits chronological organization to understand the conversations in context. Speaker 1 notes that prior reporting relied on very limited Epstein files and involuntary releases from hacked material—such as an intrusion into Ehud Barak’s inbox—which revealed Epstein’s extensive, far-reaching involvement with figures and institutions in Israel’s political and security establishment. Epstein’s role is described as a resource and a critical node used for connections, money, political leverage, and global influence, rather than simply being a Mossad agent. The forthcoming documents are expected to enable more stories about Israel’s global influence through Epstein, including in Africa, Central Asia, Europe, North America, and Russia. Speaker 0 asks about the significance of Epstein informing Ehud Barak, especially in light of Palantir’s actions, and why Barak would need this information if Palantir would proceed independently. Speaker 1 responds by noting that Ehud Barak was leaving public service and, like many former politicians, sought to leverage access gained in office to generate private wealth while pursuing ongoing political aims. Epstein was assisting Barak in developing him as a tech security mogul. Barak apparently did not know Palantir well at that time, illustrating Epstein’s role in shaping and linking these tech surveillance interests. Speaker 1 adds that Palantir was reportedly attempting to hire Israel’s UN ambassador, Ron Prosor, indicating a very intimate relationship between the Israeli political/security establishment and Palantir, which also has ties to the American intelligence community. Epstein’s interest in surveillance technology aligned with his broader access to intelligence networks and financial resources to influence the technological landscape. The transcript ends with Speaker 0 interjecting a promotional advertisement for gold and silver (which should be omitted from the summary per instructions).

Video Saved From X

reSee.it Video Transcript AI Summary
During my time in the Senate's oversight committee, we examined Dominion. The proceedings were recorded and are available online. The president of Dominion and his software engineer testified, primarily addressing whether their machines had Internet access. The president claimed there was no Internet access, which I believe was false.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitchell Rosas, a senior FBI official, has been escorted out of the FBI building and terminated. A senior FBI spokesperson told OMG: "you are free to report the individual Mitchell Rosas has been dismissed, fired as of today. He was escorted from the building earlier." Rosas also sent OMG a message attempting to stop publication of the Epstein audio: "formal objection to publication... Do not publish, direct any further communication to official.correspondenceinbox@outlook.com." "Let's put that email address on the video." The speaker notes that he claims the words did not come out of his mouth and says he's not a government official, though he was escorted out; only one can be true. We are reporting on the FBI, DOJ, and firings. The host asks whether Donald Trump has a right to know these happenings inside the DOJ, and notes unprofessional statements. More videos are coming; the DOJ will be contacted. Stay tuned.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.

Breaking Points

KA$H Patel FLIPS OUT After Kirk Assassination Foreign Ties Probed
reSee.it Podcast Summary
The podcast discusses a contentious investigation into Charlie Kirk's assassination, revealing a significant turf war between the FBI and the National Counterterrorism Center (NCTC)/Office of the Director of National Intelligence (ODNI). Joe Kent (NCTC) and Tulsi Gabbard (ODNI) examined FBI files, seeking foreign links, which FBI Director Cash Patel resisted, citing overstepping and interference. This leaked conflict raised concerns about government transparency and potential cover-ups, especially given the state-level nature of the case. Early investigations also looked into "anti-fascist" bullet inscriptions and the administration's alleged use of the murder to frame Antifa as a terror network. Furthermore, the hosts highlight a Tennessee man's month-long detention for a Facebook meme related to Kirk, held on a $2 million bond, before charges were dropped due to public pressure. This incident underscores significant free speech and due process concerns, contrasting it with other cases of detention and deportation threats. The discussion criticizes potential abuses of power and the weaponization of laws to quash speech, questioning the motivations behind the inter-agency conflicts and the lack of mainstream journalistic follow-up on the assassination details.
View Full Interactive Feed