reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
I'm sharing my ProtonMail inbox to provide transparency about recent communications. The first email I received was on December 29, 2024, followed by a manifesto on December 31 at 10:42 AM. I responded later that day, expressing skepticism about the sender, who claimed to be Matt Littlesberger. After the Trump Tower explosion, I sent the details to the Sean Ryan Show on January 2, 2025, while also speaking with the FBI. I reached out to the sender again to confirm their identity but received no reply. I forwarded the unredacted email to both the Sean Ryan Show and the FBI shortly after our conversation.

Video Saved From X

reSee.it Video Transcript AI Summary
Can I be transferred to Mike Johnson? This is Ryan Matt from LFA TV. We just interviewed Anthony Rubin from muckraker.com, who obtained footage showing that NGOs funded by our government are delivering unaccompanied minor children to sponsors. After tracking three of these sponsors, it was found that three out of four had individuals present with pending charges for aggravated sexual assault. I want to ensure that your office is aware of this situation, as Speaker Mike Johnson is continuing to support funding for these NGOs that are allegedly delivering children to known sex offenders. Please make sure this message reaches Mike Johnson. Thank you for your assistance.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses an email exchange between Tamara Lazaro and John Podesta, where Lazaro mentions children being transported to an event for entertainment. The speaker finds it suspicious that Lazaro lists the ages of the children and emphasizes that they will be joining the adults in a pool. Internet researchers discovered a website called "An Evie's Crib" that shows Lazaro with a group of children and offers raw and uncut footage of them. The speaker suggests that the most logical explanation for the children coming to Podesta's pool for entertainment is that these people have an interest in children. The speaker also mentions James Alefantis' Instagram, where disturbing images of children were found. The speaker concludes that if these people are involved in child trafficking, they would likely use code language and be discreet.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on Pizzagate, WikiLeaks, and a broad alleged network of child sex trafficking and political complicity. Pizzagate is described as an old, lingering conspiracy that began in 2016 and faded from mainstream news despite ongoing interest. The speakers claim DC pizza parlors, especially Comet Ping Pong, are part of a vast, global trafficking hub, with a “creepy network” visible in Instagram posts from the shop’s employees and connections. Besta Pizza, they say, is the deeper problem beyond Comet Ping Pong. Its logo, until addressed, is described as a symbol known to the FBI as a marker for pedophiles—a triangle that circles like a maze, linked to “boy lover.” They assert that many public figures—including Obama, Clinton, Bill Gates, Anthony Bourdain, Podesta, and Epstein—were seen visiting these DC pizza shops, suggesting these venues harbored a global trafficking network. The speakers claim there is “more behind the doors of these pizza parlors,” including the pickle shop and related Instagram hashtags that connect to child pornography networks. They allege the FBI and DOJ never seriously investigated, and that the evidence warrants investigation because of the connections people keep pointing to, yet no prosecutions followed. BH Kids is discussed as a code word tied to child predators. They describe a 2016-2017 Obama-era dinner with Anthony Bourdain at a Vietnamese restaurant after a major arms deal with Vietnam, noting a peculiar Vietnamese saying on the wall that allegedly connects to a YouTube channel featuring “b h kids,” with a logo on every video. They claim BH Kids leads to a deep web of child predation content, including images from a retail clothing site that, via hyperlinks, reveals hidden links to this material. The speakers reference emails purportedly leaked via WikiLeaks from Hillary Clinton’s emails as the start of Pizzagate, insisting the messages use coded language about “pizza” and “hot dogs” to refer to child pornography (CP). They discuss examples such as an email from 10/08/2015: Tamara Luzado to John Podesta about heating the pool and transporting children aged 9, 11, and almost seven, noting “almost seven” as significant. Wayfair cabinets are cited as another piece of the puzzle: listings priced around $11,000–$13,069, named after officially reported missing children (Amaya, Olivia, Kyla, Maria, Piper), raising questions about missing children and possible trafficking connections. They argue that the system is designed to cover up these activities to protect corporate interests, Mossad, MI6, and U.S. intelligence, with implications against Bill Gates and others. They claim Epstein’s clients are numerous but not publicly listed, and that a full, transparent release of information could reveal the truth, while suggesting the administration would face disruption if such information were released. The conversation ends with a call for transparency, asserting that the American people want answers, and suggesting that if government actions are transparent, trust could be rebuilt and bad actors prevented from regaining power. They acknowledge not all details are known, but insist there is enough concern to warrant continued scrutiny rather than dismissal as a hoax.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker confronts an individual, accusing them of grooming a child and planning to have sex with her, referencing condoms. The speaker claims to have evidence despite the individual possibly deleting it. The speaker questions the individual's early morning activities outside a flat and accuses them of using fake accounts to trap kids. They mention sending live locations and pictures of a front door. The speaker states the individual is getting arrested and remanded, as the police are present. They tell the individual to leave kids alone.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about child trafficking and the speaker's personal experience with their children being targeted. They express frustration at not receiving support and mention being an open book to anyone who wants to help. The other speaker acknowledges the situation but states they are already doing what they can and cannot offer further assistance. They mention the possibility of Epstein being alive and share their own encounters with danger. The conversation ends with the second speaker promising that things will improve in the next three months. The first speaker asks if they can still send a petition, but the second speaker declines, stating they don't have time.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss a conversation with a state's attorney and mention two different offices. They mention someone named Kevin Fucic and discuss his involvement in human trafficking and selling weapons. They express surprise and concern about his actions. One speaker mentions a photo and another speaker mentions a phone that has been erased. They briefly mention Twitter and the company's thoughts.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker contacts the state police computer crimes unit in Maine regarding a case involving child pornography. They mention that the police are aware of the group involved but cannot force the individual to provide information. The speaker also mentions that they have the passcode to the suspect's phone and that the suspect admitted to having child pornography on it. The speaker discusses the possibility of receiving a video but states that they cannot accept anything. The transcript ends with the speaker mentioning that they are following instructions.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker begins by promoting a clothing brand and encouraging viewers to join their online community. The conversation then shifts to two individuals discussing an Instagram account and messages exchanged on it. They try to determine who reactivated the account and consider the possibility of someone holding a grudge against one of them. The conversation also touches on family issues and the person's job in construction. The speaker asks about the person's hobbies and evaluates their performance as a father. Later in the video, Speaker 1 is confronted by Speaker 3 about inappropriate messages sent to an 11-year-old girl named Emma. Speaker 1 denies any wrongdoing and claims it was just a joke, but Speaker 3 expresses concern for the safety of Speaker 1's daughter and plans to involve law enforcement. Speaker 4, Speaker 1's stepdaughter, gets involved, and the video ends with Speaker 3 deciding to report the situation to the police. Additionally, the video features a group posing as minors online to catch predators. They confront a man who messaged someone he believed was a father about his own child. Initially denying the accusations, the man later admits to sending the messages. The group contacts the authorities and discusses the situation, mentioning the man's history with DHR and the concerning nature of the messages. The video concludes with a promotion to join their locals for early content and a sponsorship shoutout to Red Pill Threads for unique shirts.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received a text message from a concerned friend's wife, who sent screenshots of a disturbing website. The website contained graphic content and discussions about illegal activities involving children. The speaker decided to take action and found a vulnerability in the website's platform, allowing them to access and extract user data. They only downloaded publicly available information to avoid illegal content. The speaker shared some of the explicit text they encountered, which included discussions about child abuse and exploitation. The website had around 7,000 users who had to answer disturbing questions to gain access. The speaker also discovered that the website used a chat app called Telegram for further discussions. They successfully hacked the website without being detected.

Video Saved From X

reSee.it Video Transcript AI Summary
Blue Sky, on November 21st, we identified five pedophiles on your platform, including two registered sex offenders. This highlights a serious issue that needs addressing. Despite previous viral posts criticizing you, our goal is to collaborate to reduce the presence of pedophiles online. I urge the CEO or moderators of Blue Sky to contact me at ppoacher3@gmail.com. We request immunity for our decoy accounts to continue our efforts in identifying and reporting these individuals. Please reach out to me as soon as possible. To everyone watching on X, please tag Blue Sky and share this video.

Video Saved From X

reSee.it Video Transcript AI Summary
The lawyer denies any connection between his client and child exploitation on the rapey.su website. Cybersecurity expert reveals 7,000 email addresses linked to the site, including one possibly belonging to Abigail Gold Geller. Private investigator's report suggests the email hero12one@mail.com is associated with Abigail Gold. Abigail's lawyer refutes the claim, stating it is not her email address and warns against publishing defamatory allegations. The Department of Justice is informed of the email address for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker's lawyer strongly denies any association between his client and the child exploitation website rapey.su. They advise against publishing such allegations. The video discusses how cybersecurity professional Ryan Montgomery obtained user data from the website, revealing over 7,000 email addresses. The investigation focuses on an email address allegedly linked to Abigail Gold Geller, a BlackRock managing director. Background checks and a private investigator's report suggest that the email belongs to Abigail Gold Geller. However, her lawyer claims that the email address is not hers and can be registered by anyone. The Department of Justice has been provided with relevant information for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker confronts an individual, accusing them of grooming a child and planning to have sex with her, referencing condoms. The speaker claims to have evidence despite the individual possibly deleting it. The speaker questions the individual's early morning activities outside a flat and accuses them of trying to trap kids using different accounts. They mention sending live locations and pictures of a front door. The speaker states the individual is getting arrested and remanded, as Manchester police are present. The speaker repeatedly demands the individual leave children alone.

Video Saved From X

reSee.it Video Transcript AI Summary
On May 11, 2023, the Department of Justice issued a press release about 4 men sentenced for participating in a child exploitation enterprise called rapey.su. Cybersecurity professional Ryan Montgomery obtained user data from the network, revealing over 7,000 email addresses. One email address, hero121@mail.com, was connected to the username jackie222. Investigations suggested that this email belonged to Abigail Gold Geller, a BlackRock managing director. A private investigator's report further supported this claim. However, Abigail Geller's lawyer denied the allegations, stating that the email address was not hers. The team reached out to the Department of Justice for more information.

Video Saved From X

reSee.it Video Transcript AI Summary
The lawyer denies any association between his client and the child exploitation website rapey.su. The Department of Justice released a press release about four men sentenced for their involvement in the website. Cybersecurity professional Ryan Montgomery obtained user data from the website, revealing over 7,000 email addresses. One email address, hero12one@mail.com, was linked to a BlackRock managing director named Abigail Gold Geller. A private investigator confirmed this connection. However, the lawyer claims that the email address does not belong to his client. The Department of Justice has been provided with this information for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
10/10/2024: The speaker asks if an attempt to log in using their handle or email is originating from a stolen account.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers engage in a conversation about various topics. Speaker 0 asks Speaker 1 about her husband's involvement in the MDD. Speaker 1 mentions their work in catching online child predators and their goal to increase the number of arrests and convictions. Speaker 0 expresses belief in their cause. Speaker 1 discusses a disturbing incident involving a pedophile in Wyoming. Speaker 0 admits to coming to meet an 11-year-old for sex. Speaker 1 confronts Speaker 0 about illegal content on his phone, including nude pictures of children. They discuss their methods of catching predators and turning evidence over to law enforcement. Speaker 0 admits to struggling with his fantasies. The conversation ends with Speaker 1 asking about vaccine injuries and Speaker 0 questioning the necessity of the conversation.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on email leaks and allegations of hacking connected to a political context. One speaker notes that “one hour later, WikiLeaks starts dropping my emails,” suggesting a link between the leaks and his own communications. The group references those emails being public and questions about what might have been coincidental, with lines like “Just get lost into the public. One could say that there might those things might not have been a coincidence” and mentions “those things” that may or may not have been intended to surface. Two days after the initial events, the speaker recounts that “the FBI contacted me, the first thing the agent said to me was, I don’t know if you’re aware, but your email account had might have been hacked.” He confirms awareness of the hacking, stating “I said yes,” and recalls a demand that he change how he is addressed, with references to being told, “From now on, you won’t call me your father,” and “I you will call me your father,” coupled with the assertion “You think you hide shit, don’t you? Just get lost.” The dialogue shifts to broader implications: other campaign officials’ emails were divulged earlier than October 7, and the speakers discuss uncertainty about what exactly had been compromised, noting “there was a document that appeared to come from my account” and realizing “they had the contents of my email account.” The last time one speaker talked to the FBI is mentioned in the context of these disclosures. A separate thread introduces media narratives, with a speaker asking, “Media is telling you the entire story is a hoax or fake news. But what does that even mean?” and stating, “I spent the last month investigating. So what exactly is Pizzagate? And are there any actual facts to support the story?” There is a sense of frustration about interpretation and evidence, captured in the line, “They’re hearing what they wanna hear. They’re not really listening to what I’m telling them.” The transcript ends with a brief aside from another speaker, “What’s that?” indicating confusion or a request for clarification, tied to the ongoing discussion about the emails, hacks, and the Pizzagate inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker confronts someone who came to meet what they believed to be a child. They inform the person that the police have been called and that they have been exposed by a group called Predator Exposure. The speaker questions the person about their intentions and how they arrived in the country. They also mention the inappropriate conversations the person had with the supposed child. The speaker emphasizes that the person will be arrested for their actions.

Video Saved From X

reSee.it Video Transcript AI Summary
A lawyer denies allegations that his client is involved in child exploitation or rape. The Department of Justice issued a press release about 4 men sentenced for engaging in a child exploitation enterprise called rapey.su. Cybersecurity professional Ryan Montgomery obtained user data from the platform, revealing over 7,000 email addresses. One email address, hero12one@mail.com, was linked to Abigail Gold Geller, a BlackRock managing director. A private investigator corroborated this information. Abigail's lawyer denies the association and claims the email address is not hers. The Department of Justice has been provided with the username and email for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asks about the FBI's failure to investigate claims and the specific actions taken regarding the investigation of CSAM involvement. The other speaker acknowledges the interest in child sex exploitation and human trafficking. They mention working with prosecutors on the Epstein case but admit it has been a while since they reviewed it. The speaker emphasizes the importance of investigating the sex trafficking ring and obtaining the flight logs. They express the need for transparency and mention the redacted logs. The other speaker acknowledges the request for more information and promises to consult their team. The speaker highlights the lack of resolution in the Ghislaine Maxwell trial and the survivors' claims of a cover-up, urging the need for accountability.

Video Saved From X

reSee.it Video Transcript AI Summary
10/10/2024: The speaker asks if an attempt to log in using their handle or email is originating from a stolen account.
View Full Interactive Feed