reSee.it - Tweets Saved By @TheSCIF

Saved - April 21, 2026 at 6:19 AM
reSee.it AI Summary
I report Dr. Daugherity's claim that Maricopa County's printers were misconfigured in 2020, causing up to 7,000 ballots per 30 minutes to be rejected and sent to manual adjudication with no oversight or paper trail. The glitch, echoed nationwide, produced non-random misfeeds, light timing marks, toner fusion failures, edge-marker errors, and 5% image shrinkage. She calls it deliberate tampering, not accident, with engineering proof.

@TheSCIF - The SCIF

Dr. Daugherity exposes the printer "glitch" and why 7,000 ballots every 30 minutes were rejected, proving that Maricopa County's printers were deliberately misconfigured in the 2020 election, turning thousands of ballots into unreadable rejects, which forced ballots into manual adjudication, where there is NO oversight, NO transparency, and NO paper trail. This same glitch happened all over the country where taxpayers votes are in the hands of a few people, in private, that can change hundreds of thousands of votes at the click of a button. Massive, non-random misfeeds, up to 7,000 ballots rejected every 30 minutes all day (far exceeding the legal 1-in-500 max misfeed rate). Hit 17K+ total in Maricopa, mostly in key vote centers. Changed from "heavy" to "normal" fusion. Timing marks (the critical black sync lines scanners need) came out too light/blotchy, toner never fused properly, so tabulators spat ballots back as "invalid/photocopy." 5% image shrinkage sabotage, ballot images printed at 19" instead of 20" length → edge markers + timing sync marks shrank/misaligned. Scanners threw constant errors, "edge marker #39 not found," "Determine Vertical edge markers failed," "Ballot misread." Daugherity calls it statistically impossible as "accidental" and accuses deliberate tampering to disrupt tabulation and open the door to manipulation. This isn't conspiracy, it's cold, hard engineering proof from the guy who reverse-engineered the exact PID-style vote control in prior AZ races.

Video Transcript AI Summary
Senator Bennett and others discuss how ballots are read by tabulation machines and what causes rejections. The corner marks (timing marks) determine top/bottom of the ballot, while the side marks determine the alignment of the bubble to be counted for a candidate or measure. The machines reject ballots when timing marks are incorrect or too small. The speakers explain that if timing marks are not exactly the right size and they are not perfectly black, the software will reject the ballot; blotchy printing can also trigger rejection because timing marks must be 100% black and of the correct size. Madam chair notes that many unreadable ballots were attributed to printers being set incorrectly and printing too lightly. The first reason ballots are rejected is timing marks being too small. A presenting slide shows that the bottom ballot has timing marks that are 5% larger on the edges, but the computer program requires precise, perfectly black timing marks; any white specs in the black box render the timing mark invalid and the ballot ejected. The blotchy printing is linked to printer fuser temperature settings; ballots printed on heavier paper (80 or 100 pound) require higher fuser temperatures. If the temperature isn’t high enough, toner doesn’t bind and appears blotchy, causing invalid timing marks. Speaker 1 asks whether central count machines or other systems could be set to accept lighter print, vs. those used at voting centers. Speaker 0 rejects this, stating the same ballot definition file is used and central count did not allow looser image requirements. The discussion clarifies two types of marks: timing marks (must be perfectly black and correctly sized) and voter bubbles (the threshold for counting a vote). The threshold setting on the scanner determines whether a bubble is counted: typically between 14% and 35% fill. If a bubble is less than about 14% filled, it is considered a stray mark; if more than about 35% filled, it is counted for the selected option. Some voters may partially fill an oval, or fill more extensively, and the software uses this threshold to decide if a vote is cast. In summary, ballots are rejected if timing marks are not perfectly black or incorrectly sized, or if printing is blotchy due to inappropriate printer settings. Central count uses the same ballot definition file, so lighter prints are not accepted. The bubble threshold determines which marks are counted as votes, with explicit percentage cutoffs to distinguish stray marks from valid votes.
Full Transcript
Speaker 0: The corner marks are important to determine top and bottom of the ballot, and the side marks are important to determine the alignment of where the bubble is and which candidate or measure that that should be counted for. Senator Bennett. Speaker 1: Madam chair, mister Dougherty, my recollection of the explanations given by Maricopa County for the reason that so many ballots were unreadable by the tabulators is that the printers were set incorrectly and that they were too lightly printed for lack of a better term. Would you agree that the tabulation machines can be set so that if a ballot is printed too lightly, that it would reject that ballot as well? Speaker 0: Madam chair, senator Bennett, that's exactly right, and that's the next graph I'm going to show. So the the first reason that ballots are rejected is because the timing marks are incorrect. They're too small. Speaker 2: You're looking at the bull's eye. Can we draw that up and try to keep them both in frame? Just the targets on the bottom. There you go. If we're looking at the bull's eye, the very thing that says, hey, look here. Well the left one's saying, look in my yard and the right one's saying, two houses over. Speaker 1: But you know what, Speaker 2: the ovals never moved because they were printed hard. So even as a mechanical engineer or photography or optics or camera, when you expect to take a picture and you hold it at somebody, you're not trying to photograph two people over. And this is what it tells the machine to do. This is a problem at the most lowest elementary level. And the number one way it's cloaked? Well, we can't see it in the code. We don't know how it's done. Show me the code that does it. Well, that's the code. That's the code. Any printer industry executive, any monetary printing executive, any engineer in the world that deals with printing will tell you this simple fact. If your machine is not calibrated to hit the target, it becomes something else. So if we talk about machines and we talk about code, it is a smoke and mirrors not to deal with what's real and physical. Here's my contention, this is the historical artifact of a voter. And states are telling voters, you have no right to that. The very voter that pays your salary, that paid for that ballot, that paid for that piece of paper, and paid for the machine that you're running it in. And so those people that pay your salary that you work for and do this for, you're telling them you can't look at them. That is both unacceptable and un American. Speaker 0: So they're they've been shrunk by 5%. So it's not clear it's not obvious to the naked eye that the little black boxes around the edge on the top are 5% larger than the little black boxes around the the edge at the bottom. But the computer program is extremely precise, and it requires two things. It requires all of those timing marks to be exactly the right size and to be perfectly black. So if either one of those criteria fails, then the software says reject the ballot. So the ballot will be rejected if the timing marks are too small as they are in the case of the bottom ballot. Or if you will turn the page to the next picture on page five, you'll notice a blotchy printing. So the blotchy printing here would occur when the printer was not set for a high enough fuser temperature. So basically, there's a setting on the printer that says how thick is the material you're going to print. Because if you're printing on 20 pound bond paper or you're printing an envelope or you're printing a ballot, which the manufacturer says has to be 80 pound or 100 pound paper, then you need a higher temperature setting on the fuser in order to basically melt the little dots of toner in into the paper. And if the temperature isn't high enough, then they don't stick, and they basically flake off. And that's what gives you this blotchy appearance that you can see in the top bar. The settings on those printers, obviously, since the manufacturer says that the ballot paper has to be 80 or 100 pound paper, should have been set on heavy. So I don't remember the exact words, but it's basically light, medium, and heavy is what kind of document are you wanting to print on. They should have been set on heavy. A number of the printers were not. And so that was one of the remedies that the technicians tried, in some cases successfully, in some cases not, at the various voting centers. So, yes, the printers should have been set for heavy media. They were not always set that way. And when they were not, the blotchy printing meant that those timing marks weren't perfectly black. And so if the computer software saw any white specs in that black box, it says, this is not a good timing mark. It's not a valid ballot. Ejected. Speaker 1: Madam chair. Speaker 0: Senator Bennett. Speaker 1: It's my recollection that in response to those situations, the county said that these ballots were taken to Central Count where the machines were set up to accept a lighter print or a blotchier. And that would you agree that the central count machines or other types of machines different than the ones in the voting centers can be set to accept a lighter print? Speaker 0: No, senator madam chair and senator Bennett. No. I would not agree with that statement because the same ballot definition file has to be used. So the central count did not say it's okay to have a 19 inch image. Okay. It it did Speaker 1: not make talking about the size of the image. I'm talking about the darkness of the print. During the six years I was secretary of state, it was always described to me, and maybe this was in layman terms because I'm not a computer specialist or whatever, but it was always described to me that when ballots are laid out, as you noted with the timing marks, the system is designed to basically say that so many inches down and so many inches in or in this case, it's probably more likely stated that if I come down 13 timing marks and go in five timing marks, if I find so many pixels of blackness there, I record a vote for Smith. If I come down 19 timing marks and then five, that's a vote for Garcia. But it was always described to me that those systems also had an element of how many pixels of blackness they see in that area. Some people fill in the oval and it's black almost to the bleeding through on the other side. Other people don't. And so I've always been under the understanding from the descriptions given by manufacturers or proprietors of election management software and systems that there's an aspect to pixels of blackness in whatever area the machine is looking for. Is that different from your understanding that it either finds a fully black mark and accepts it as a vote or anything less than 100% black it doesn't? Because it's been my understanding that some people get the whole oval marked and some people don't. But they get enough of it marked that it accepts a vote in that area. Speaker 0: Madam chair and senator Bennett, now I understand the the point of your question. And we're talking about two different types of marks. So the timing marks around the border have to be a 100% black. They cannot be blotchy. There is no adjustment to say if it's 50% black, count it as a timing mark because then it can't be sure where the bubble is. So the timing marks have to be a 100% black. They have to be the the full size. They can't be short or narrow. They can't be shrunk. They have to be the perfect size, and they have to be perfectly black, the timing marks. The bubbles where the voter fills in, now there is a configuration setting for the threshold of blackness to count it as a vote or not. Because what will happen, as you well know from your long experiences, secretary of state and participating in in many other election related activities, is that some voters will put their pin down on one dot and then say, oh, no. I wanna vote for the other person. Yeah. And so there'll be a big black dot for the second candidate and a small black dot for the first candidate. The standard configuration for these tabulators is between 1435%. So if it's less than 14% blacked in bubble, it says that's a stray mark. Just ignore it. If it's more than 35% filled in, then it says that's the person that they intended to vote for or the yes or no on the the water bond proposition or whatever. So the timing marks have to be perfectly black or it can't be scanned.
Saved - April 21, 2026 at 5:27 AM
reSee.it AI Summary
I claim that USPS whistleblowers say about 280,000 completed ballots were shipped from Bethpage, NY to Lancaster, PA to steal the 2020 election. I say Trump led PA by 700k with 70% counted before counting stopped, then fraudulent ballots were injected. I allege 280k from Lancaster plus 630k found by Phil Waldron in Philadelphia equal what Biden needed to beat Trump. I claim ballots were printed in China, entered via the Mexico border, flown in, posing a national security threat, and that the election was stolen through fraudulent mail-in ballots and backdoors.

@TheSCIF - The SCIF

USPS whistleblowers expose that around 280,000 completed ballots for the 2020 election were shipped across state lines from Bethpage, NY to Lancaster, PA to steal the 2020 election. Trump was ahead in PA by 700k votes with 70% already counted before they stopped the count. Fraudulent ballots were then injected into the count and the 2020 election was stolen. Coincidentally, the 280k fraudulent ballots from Lancaster and the 630k fraudulent ballots found by data expert Phil Waldron in Philadelphia equals the amount needed for Biden to overcome Trump's lead in PA. These fraudulent ballots were found to be printed in China and coming into the U.S. through the Mexico border and flown in by aircraft. An enormous national security threat to the U.S. and foreign involvement in our elections. The 2020 election was stolen using a combination of fraudulent mail-in ballots and compromised election equipment with engineered backdoors and remote internet access.

Saved - April 13, 2026 at 3:16 AM
reSee.it AI Summary
I report that in PA during 2020, over 1.2 million votes were allegedly altered: 221K switched Trump to Biden and 941K Trump votes deleted. Election and cyber security expert Phil Waldron says Dominion machines were built to manipulate elections and share DNA with Smartmatic. These systems can cancel, shift, or preload votes in real time, and connect to the internet, sending data abroad and linking to hostile foreign nations.

@TheSCIF - The SCIF

Over 1.2 MILLION votes were allegedly altered in Pennsylvania during the 2020 election. - 221K votes switched from Trump to Biden in PA - 941K Trump votes deleted in PA Election and cyber security expert dealing with intelligence and information warfare for over 30 years, Phil Waldron agreed and confirmed multiple findings that Dominion voting machines used in the U.S. were built for manipulating elections. Dominion has similar code, function, and have a common DNA to holding company SGO's Venezuelan-linked Smartmatic. These systems allow authorized and unauthorized users to cancel votes, shift votes, preload votes, vote blank ballots, all in real time and in large numbers. Most importantly these machines and are connected to the internet with backdoor access, send information to servers outside the U.S. and have connections to multiple hostile foreign nations.

Saved - April 10, 2026 at 12:58 AM
reSee.it AI Summary
I claim Dominion, SGO, Smartmatic, Scytl, and ES&S are all connected to foreign countries and engineering election results. U.S. data sits on Scytl’s foreign servers before returning to the U.S.; anything can be altered. Why send data overseas? To commit fraud.

@TheSCIF - The SCIF

Dominion, SGO, Smartmatic, Scytl, and ES&S, are ALL engaged In engineering election results, which are all connected to foreign countries. U.S. election data is held by Scytl on foreign servers before being sent back to the United States. ANYTHING can be altered before the data is sent back. WHY? Why would we EVER send sensitive data, especially election data, outside the U.S. to a foreign country? The answer is simple. To COMMIT FRAUD.

Saved - April 5, 2026 at 5:36 PM
reSee.it AI Summary
I allege Obama diverted $400 million from Iran via Dubai to Italian operatives and Merrill Lynch in Geneva to fuel the stolen 2020 election, exposed under oath by Maria Zack. Leonardo SpA allegedly used satellites and CIA tools to hack voting machines, flipping votes to Biden, plus fraud in machines, mail ballots, and remote access. China coordinated; the CIA oversaw; the FBI covered up, to install Biden as a puppet for a global cabal threatening democracy.

@TheSCIF - The SCIF

Obama diverted $400 million from Iran's pallets of cash through the Dubai Embassy to Italian operatives and Merrill Lynch in Geneva to fuel the stolen 2020 election, which was exposed, under oath, by Maria Zack. In return, Leonardo SpA officials used military satellites and CIA tools like Hammer and Scorecard to hack U.S. voting machines, flipping Trump votes to Biden along with other fraudulent methods, machines, mail-in ballots, and remote access. China coordinated the operation with tech and bribes, the CIA oversaw the stolen 2020 election, and the FBI covered it up, all to install Biden as a puppet to the cabal and foreign powers. This global election fraud cartel is the largest threat to American democracy and the world.

Video Transcript AI Summary
John Durham possesses documents claimed to include the moving of pallets of cash by Barack Obama through the Dubai Embassy, with a CIA agent allegedly present, stating that $400,000,000 were moved. Maria Zak, from Nations in Action, describes information received from Italian Secret Service via Arturo’s girlfriend (whom she considers wife). She says Arturo came home claiming he didn’t understand why “we’re stealing America’s election,” and that Italian intelligence investigated Leonardo, a defense contracting firm, after Arturo confessed. Italian intelligence contacted Nations in Action on November 18, saying, “We’re watching a coup d’etat in The United States Of America.” They recount two affidavits delivered to Congress from Italian citizens and claim intelligence agencies fear corruption and China buying off politicians worldwide to take over countries or own property. Zak promises an audio tape to testify, noting Kansas as a pro-Trump elector victor but arguing the real election results are unknown to the public. Leonardo and satellite-linked operations are described: Italian intelligence reported activity around the United States election involving Leonardo personnel and people moving from Frankfurt to the Italian US embassy in Rome on Via Veneto. Italian sources allege coordination with Leonardo to alter U.S. election results. They claim a broader pattern: 47 to 52 presidential elections worldwide and over 200 telemetry experts speaking diverse languages, described as a calculated effort to remove presidencies and control nations. Zak introduces an audio recording allegedly from a CIA and State Department member named Larry Johnson, claiming she delivered a letter to Donald Trump on Christmas Eve 2020 about who stole the election, where, and how, and that Arturo Dahlia was a key witness she hoped to rescue. In the provided transcript excerpt, Johnson asks Zak for help contacting a lawyer because a man in Italy in jail is needed for extradition, claiming a national security team can extradite him and provide witness protection, with a phone number to call. Zak asserts the need for law enforcement investigations into Larry Johnson’s activities in the United States during the election, stating “If you see something, say something” but noting that witnesses and affidavits had limited assistance and many signatures did not match ballots. She cites over 35,000 illegal cross-county votes in Georgia alone, aligning this with President Trump’s discussion with Secretary of State Brad Raffensperger about illegally cast votes, and claims those votes should not have been counted. She alleges IT-based voting irregularities, with machines online and affidavits supporting numerous irregularities. Further details name individuals and entities: Stefano Serafini, a state department retiree who allegedly coordinated with General Claudio Graziano (EU commander) and Ignacio Moncada (CEO of FATA SPA, a Leonardo subsidiary). They claim meetings occurred at the Saint Regis Hotel in March 2020 and involved IT and telemetry specialists including Charles Robinson, described as a “telemetry expert” who loaded MilSpec software after traveling from Frankfurt to Rome. Arturo Della (Arturo Dahlia) is said to have confessed to Italy’s authorities; Beta (a second person) allegedly corroborated Arturo’s story with Italian intelligence. The Italian Secret Service is said to have provided Arturo’s associates’ information, and the arrest of Arturo and others followed an article Zak dropped in Italy, which she claims triggered significant Italian government upheaval, including the firing of Italy’s head of cybersecurity and the head of telecom. Zak also references Alexander Nix (linked to Cambridge Analytica) as involved in elections globally, with alleged ties to MI6 per Italian intelligence, and claims he attended U.S. election integrity meetings as late as October 2020. She suggests Italian intelligence had intercepts confirming these events, and claims Joe Biden allegedly called Matteo Renzi to remove Giuseppe Conte, leading to Conte’s downfall and global chaos according to their sources. She asserts that pallets of cash ($400,000,000) were moved to Merrill Lynch in Geneva, and that Durham has documents corroborating these movements. The request ends with a call for senators and congressional delegation to investigate, arguing that stealing from American families, including in Kansas, is wrong. She concludes by asking for confirmation on whether a satellite could send codes to change elections worldwide, to which the response in the discussion is agreement.
Full Transcript
Speaker 0: John Durham is in possession of documents from me that include the moving of pallets of cash by Barack Obama through the Dubai Embassy. Our United States government CIA agent was present. $400,000,000 were moved. Speaker 1: Maria Zak. And this is, talking about the elections. Go ahead. Speaker 0: Good morning. I'm Maria Zak from Nations in Action, and we are an organization that's devoted to transparent government, transformative politicians, trustworthy parties, and truthful media. The Italian Secret Service actually received information from Arturo's girlfriend he considers wife because they've been together so long. Her uncle is part of the Italian intelligence services. She said, uncle? Arturo came home and said he doesn't understand why we're stealing America's election. They immediately go to Leonardo and investigate. Arturo confesses. The Italian intelligence services reached out to us November 18. They said something happened. We're watching a coup d'etat in The United States Of America. They were fearful of meeting with anyone. There were two affidavits that were delivered into congress, and they were delivered from Italian citizens that contacted us. Intelligence agencies had been trying to reach out because their country had already fallen, and that is what is happening around the world. The intelligence agencies are watching corruption and China come in to their their countries and buying off politicians and hiding things and using fraud to do amazing efforts to take over and own property and, in some instances, countries. So today I'm going to play for you an audio tape that should shock you all. It'll shock America. This is the first place I have chosen to testify in. I could've walked into any state. I know my way around. We've already proven my credentials. I know government affairs. I can walk in. And when I play this for you, and why Kansas? Because Kansas was a pro Trump victor of electors. But I would argue, you don't know. You do not know the real result of your election. You also probably have not been made aware of what was occurring in Italy. Leonardo, the defense contracting firm, had some strange occurrences happening with people coming in and out that the intelligence services witnessed of people coming from Frankfurt into the Italian US embassy in Rome on Via Veneto. This instance enabled individuals to come forward and supposedly, according to the Italian intelligence services, work with Leonardo to change the results of the United States election. But more frightening is that they claim there were 47 to 52 presidential elections around the world and they now have telemetry experts over 200 that speak foreign languages that are all different. So what you are dealing with is a very calculated attempt to take down presidencies and control countries. So this audio that I am about to play for you is from an individual who was a member of the CIA and the State Department. His name is Larry Johnson. Many of you may not know, but I am the person not only who hand delivered that letter to Donald Trump on Christmas Eve on in 2020 telling him who stole the election, where they stole it, and how they stole it. And my number one goal was to bring back one of the people who was in the satellite center. His name was Arturo Dahlia. My goal was to rescue him and bring him over to America because he was willing to testify. There were people that would not assist that I thought would assist, but what was most shocking was this voice recording that I will play now. Speaker 2: Maria, hi. Larry Johnson. We spoke yesterday. Listen, I needed to see if you would help us get in touch with the lawyer because after you talked to him yesterday, he went missing. We have people in Italy now and are ready to have the person that's in jail. We've got a national security team that can extradite him and bring him back safely to The United States. So that's already lined up. There's no need for an airplane because the airplane's gonna be provided and witness protection provided. If you could call me at your convenience, (301) 442-5957. Speaker 0: That's our United States government supposedly, national security, that are gonna go rescue our terrodelia. Anyone know about that? Probably not. Anyone? Because most Americans had this truth hidden from them, that there was an operation supposedly, but the number one thing that they were looking for in the beginning of that message was where the lawyers were and the people who did the affidavits who were being hunted to be killed. These are brave people around the world that are trying to tell the truth and having great difficulty with the United States government apparatus. Telling the truth is not easy and people are risking their lives. So that was the transcript. So you ask, okay, what proof is there? Well, I would definitely consider that, sir, mister chairman and members. That is called proof. That needs an investigation. Where is our law enforcement? It should be at the local, state, and federal levels immediately to investigate Larry Johnson and the activities that he did in The United States during this whole event. You know, everyone says if you see something, say something. Right? We're all supposed to see something, say something. And then what happens? You get blasted. We had patterns of illegal activity across the country. We had people not matching signatures on the ballots. We had witnesses galore filling out affidavits. I'm so proud of the team at Nations in Action because they filed many many many affidavits. They saw the computers actually online and there were photographs. So if anyone says the machines weren't online, that is false. So these witnesses that have come forward have also identified over 35,000 illegal cross county voting just in Georgia alone. And that relates to president Trump's talk with secretary of state Brad Raffensperger where he was saying, I know that there are votes there that were illegally cast. He was right. He is actually vindicated in the proof today because the cross reference with the state, documents and the US Postal Service, feed shows that these people did not live where they actually voted. Those votes should have never been counted. Now we have illegal votes that are cast using fake residences and business addresses, photocopied identical ballots and stacks fed into tabulators, and many fake unfolded unmailed absentee ballots. Of the thousands of affidavits just filed in Georgia alone, would you like to know how many arrests were made? Zero. Zero. All those great citizens who we ask to do us a favor and help us do our right to vote to go and volunteer to work polls had no no assistance at all in having a free and fair election, and they witnessed the failures of America. So now you should be asking me, who are the people in Italy, Maria? Who are they that actually coordinated and conspired? Because this is where we really break things down and show you the proof of what occurred. Stefano Serafini on your left is actually a member of our state department who retired just days before the election. It is said that he, in an intercept, it was picked up that he was retiring so he wouldn't lose his pension should he be caught. He was coordinating with General Claudio Graziano. General Graziano is also the at the time was the EU commander. And they were meeting across the street at the Saint Regis Hotel, And it was with Ignacio Moncada, who is the CEO of FATA, which is FATA SPA, which is a subsidiary of Leonardo, one of the largest defense contracting firms in the world. They are the largest in Italy, and they receive numerous United States military and intelligence contracts. That should frighten everybody right now. Now they were meeting in his hotel, and in March 2020, they were coordinating this plan. The Italian intelligence services actually provided me with the cell phone number for the go order, and it goes to general Graziano. So then you ask, well, they concoct the plan. They have to go get the IT guys. Who's gonna do it? Well, they already had a guy. His name is Charles Robinson. He is a telemetry expert. He came in a week prior to the election of November 2020. He uploaded Mil Spec software, and he had traveled from Frankfurt. He was working in there with Artura De Gallia. He is an IT guru in Italy. He's known as the smartest. The Italian Secret Service actually received information from Arturo's girlfriend, he considers wife because they've been together so long. Her uncle is part of the Italian intelligence services. She said, uncle, Arturo came home and said he doesn't understand why we're stealing America's election. They immediately go to Leonardo and investigate. Arturo confesses. What they don't know, what Arturo doesn't know and anyone else, the Italian intelligence services, the help of the Finanza Guardia, were conducting the investigation, and they said they were there to check for financial fraud. So they were checking all the other employees saying, hey, you got anything? What's going on around here? Any financial fraud? And one guy was a little nervous and he said, don't have financial fraud, but something strange happened in the satellite center I'd like to confess. There was actually a second person in his name we had named Beta. Beta confessed to the Italian Secret Service corroborating the entire story that Arturo Della told to the intelligence services of Italy. This is Arturo. Arturo was hiding in the facility for eighteen days while I tried to rescue him. Am just a citizen. I am not agency. I shouldn't have to go do this for my country, but I will bleed for my country. And I had an opportunity to bring the witness and try to rescue him before he would be murdered leaving Italy. For eighteen days, we hid him. And I personally funded and took money out of my retirement to do this. I can tell you that I was at the last straw, made a recommendation in the December to drop an article in Italy because I didn't know what else to do. I couldn't get to anyone. And I have thirty years of experience, and I had to wonder why is it that a lot of the elected officials I went to are so afraid of me coming out with this information. It didn't matter if they were Democrats or Republicans because I know everyone. I know Stacey Abrams. I know Brian Kemp. I know them all and they've known me for years and they have known me to be a very honest person. I will bleed for my country and I will not cover for my party or any individual that I consider a friend because we are at war and that is what America deserves. So I drop the recommendation and strategy to drop the article in Italy. The day the article dropped, all hell broke loose in Italy. They immediately put out for the arrest of Arturo Delia, and they arrested and jailed him. They fired their head of cybersecurity for the country, and they fired the head of telecom for the country. Oh, just on one day when I dropped one little article. Isn't that amazing? I'm sure that's just totally pure coincidence. So the timeline. We did an extensive timeline of what was occurring as this was happening. We knew that the meetings were taking place from March 2020 and then into the summer. November, the November, the crew arrived to the US embassy. There were data thrusts during the election because they said they couldn't keep up with all the votes and switching them. It was through the use of the Galileo satellite that was taken offline to load the MilSpec software. And let me make it very clear, I also own an IT company. I have friends who are both seal team six former members that are communications and IT specialists. You have a document in your folder that explains how the satellites can be used. There are many methods. Anyone get DISH Network? Anyone get satellite TV? It's the same thing. So I'm gonna make it real easy for you because I tell you IT can be a bit complex. And so they loaded the software, they used it. Arturo goes home and tells his, his significant other, the Italian intelligence services reach out to us November 18. They said something happened. We're watching a coup d'etat in The United States Of America. They were fearful of meeting with anyone. The Italian government heads changed and did the arrests of the Sparkle Telecom and CERT, and then the c c CIA operatives fled immediately from the embassy, the same day as the article dropping. That is not coincidence. This is one of the gentlemen, if you notice the sneaker, same guy. That picture is from the United States Rome embassy. Nobody can get that picture unless you're Italian intelligence services. The camera's super high up. It is a secured facility, secured item. They sent me that photo. They were sending me documents and sending me photos. Because they knew there was nobody in the United States Rome embassy that they could trust. And that is a sad, sad day for America to wake up to this reality. It is not partisan, I will remind everyone. This is a whole different operation and a whole different war we are fighting. These are the other operatives that were fleeing on that day. They told the ticket agent that they were returning back to Frankfurt, which confirmed everything. Leonardo actually had their facility, their secure facility for all of their cloud services in Frankfurt and they recently moved it. But at the time, it was in Frankfurt. They were also looking at renaming Leonardo and breaking it into pieces as we speak. Sound familiar? Maybe something that used to be called Facebook? So then we have the gentleman in the center. There's a gentleman with a very large bicep. And you would say, why do we care about that gentleman's bicep? We care a lot about that gentleman because that gentleman is out of Canada. He is not an American, he is Canadian. These gentlemen, this one in particular, we received a tip immediately that this gentleman, Charles Robinson, had confessed to stealing races in Arizona as early as early two thousand, including Janet Napolitano's race for governor. He returned back to Canada with a brand new sports car and confessed to a fellow coworker while he was working at one point for Dominion, then he was not working for Dominion, then he went back to Dominion, and then he left and was working for another company. This gentleman has an extraordinary large bicep. He's very well known by this source. This source worked with Canadian law enforcement who seemed to be a lot more willing than our federal agencies. And they started tracking the gentleman. The sources claim that this is the guy who is so brilliant as a telemetry expert that he was able to load the software and change the votes. He now has three women and there are people hunting him because people have followed my work and sadly some of them have done things that are in my opinion treasonous. They have gone to Italy under the guise of collecting money to go do an investigation on Italy. And they've taken this information and gone and gotten massages, rented villas, and they've also gotten people inspired to go hunt this guy down, as well as Stefano Serafini from the US Embassy. Serafini is still in Italy. He does not return to his McLean, Virginia home because he knows there are Americans looking for him. In my opinion, that was very wrong to incite Americans to go after and hunt these people. But Americans are desperate for politicians and law enforcement to do something. So I beg of you to work with law enforcement and make something happen after this presentation because there's too much proof to not have it happen. Now for Alexander Nix. That name should be familiar to all of you. He was very involved in races in 2016 and prior. He was involved in the Cruz campaign. He was involved in the Trump campaign. And he was fined and part of the use of people's data from Facebook, a huge massive fine that Mark Zuckerberg had to pay. And I always found it odd, why would Mark Zuckerberg be working with the IT guy from Cambridge Analytica out of London, and yet they're working to help Republicans. That doesn't seem to make sense because mister Zuckerberg seems to be on the other side. Well, the Italian intelligence services immediately started giving me downloads on all the people, including sending me their picture and phone numbers out of their phones showing and verifying that they not only knew who they were, they had relationships. One person actually drove Alexander Nix to the CEO's office at Leonardo in Italy. Now you must ask yourself why would an IT guy who has a voter technology actually be going to a defense contracting firm in Italy? Doesn't make sense, does it? No, it doesn't. And so you have to ask, okay, so Alexander Nix, is he MI6 like the Italian intelligence services says? Was he in meetings in America with CISA, the the security association that was ensuring our elections? I am told that he was actually given permission and attendance of our election integrity and security meetings in the United States federal government as late as October 2020, and he is a British citizen. He is not American, and he ran an IT company as his cover called Cambridge Analytica, where there are movies by Brittany Kaiser and others, Chris Wiley, who are two very liberal democrats who came out, they saw something and they said something. And these people know something is wrong and they have written books and I highly recommend reading those. So while this was going on, the Italian intelligence services started telling me how things were breaking down in Italy and the Italian Italian government was going to collapse. I am not one who's ever received an intelligence briefing in my life. I was a lobbyist, state lobbyist. You know many of people just like me. And so all of a sudden, I'm being told that Joe Biden called Mateo Renzi, who was the former prime minister prior to the collapse of the government, and he said, I need you to take down Giuseppe Conte as the prime minister. Within three weeks, Giuseppe Conte was down and Italy was in total chaos. That is proof that the intel intercepts that I was receiving were factual. Now Conte was not real happy about going down, but he was given millions of dollars, we were told, in a California bank. These are banking issues as well. There were movements and pallets of cash, including the information that I supplied to special counsel John Durham. You are the first government agency that I am making this very clear to everyone. John Durham is in possession of documents from me that include the moving of pallets of cash by Barack Obama through the Dubai Embassy. Our United States government CIA agent was present. $400,000,000 were moved from there with the help of Italians and the Finanza Guardia in Italy knows. And they supplied the names of the people in the room, and now we need you to get your United States senators and your congressional delegation, and I don't care what party they are, and they need to work together because stealing from the American families in Kansas is wrong. And they stole $400,000,000 and put it in the Merrill Lynch in Geneva, Switzerland. That is evidence that is sitting before us today. This story gets worse and more horrifying for the citizens of Kansas and America. So we knew that the plot was going to continue. They were gonna try to kill Arturo Dahlia. We knew that they were chasing the Italians that were helping us. They have been threatened. They have been in car chases. They have had their cars roll over and people injured. And there have been many Italians who have been murdered. Five government officials in March alone were murdered, including an ambassador. A brand new appointment to the cabinet was murdered the very day he was appointed. With that, mister chairman, I yield the floor for questions. Speaker 1: K. Do we have questions? You have us a lot. It's hard to grasp everything all you're saying, and a lot of it's very new for us. Speaker 0: Yes, sir. Speaker 1: Going to Italy and Lea Rondo, if I understanding what you're saying, is that that satellite there could send the codes, and they can affect and change elections, not only United States, but around the world. Is that did I understand that Speaker 0: correctly? Yes, sir.
Saved - April 1, 2026 at 8:29 PM

@TheSCIF - The SCIF

Dominion's foreign ties to the CCP and Serbia. It doesn't take a rocket scientist to figure out that our elections are rigged and have major foreign involvement. https://t.co/2YzStlWTyF

Video Transcript AI Summary
Speaker 0: The election was stolen. A graph shows people who worked for ES&S, Hart, Dominion Voting Systems, ClearBallot, and Smartmatic, recycling through companies. People who worked at Dominion Voting Systems are entering the political sphere and taking over election offices; one county in Texas, after hiring someone who worked for Dominion, went blue for the first time. The speaker walks through information: Dominion using “Serbian technology with Chinese characteristics.” Huawei Bank is involved; there’s no public board saying Bank of China funds anything, but research on Roaming Networks—a relatively unknown Serbian company until 2013—shows it signed a value-added contract with Huawei Bank. Huawei is “the Bank of China.” Roaming Networks built ICT infrastructure and data centers in Serbia, with owner Nenad Kovac identified as the enterprise partner. Some Roaming Networks information may come off their site after this presentation. Dominion Voting Systems has a corporate office in Serbia; a screenshot of the office and a developer on their site is noted. A Serbian legislative leader said, “I know Dominion Voting Systems back in November. They have an office here.” Dominion started rapidly removing Serbian coders from their site/LinkedIn. Code is built in Serbia for a system used in the United States, using infrastructure funded by China, not just China but the Bank of China. A slide discusses Dominion’s enterprise partnership with Huawei, added to the restricted list on 05/16/2019. Roaming Networks references show Dominion Voting Systems using a pure flash storage solution in Dominion’s data center. A photo of Sacramento shows Dominion hardware coming from China, with a bill of lading from a Chinese supplier to Dominion’s McKinney, Texas office. Testing and approval of Dominion hardware show similarities with Smartmatic; the same hardware with different branding. They claim a “tail” behind the scenes—evidence of connections among ES&S, Hart, Dominion, ClearBallot, Smartmatic, with people cycling through these companies. People who once worked at Dominion are now entering election offices; in Texas, a county that hired a former Dominion employee “went blue” by accident with ES&S involved. The speaker calls out Gina Griswold for commenting on Tina Peters and Mesa, and Matt Crane’s role as Arapahoe County clerk and recorder, now head of the County Clerks Association; Crane’s wife previously worked for Dominion and Sequoia Voting Systems. The speaker asserts a public breach of trust requires an audit; if there’s nothing to hide, audits should restore trust. They argue, whether Dominion is the bad actor or not, removal of logs, altering code, and a “trusted build” are problematic, and emphasize the need for audits and investigations to restore trust in elections. Speaker 1: Indicators: a senior Dominion vice president’s name appears on patents; a software engineer involved in the Wayne County, Michigan tabulation center is connected to the software. Coincidences accumulate, suggesting there is a preponderance of evidence with affidavits across the country. The speaker asks which computer produced certain files analyzed yesterday; whether it came from the central count or precincts. Speaker 0: Answers with a non-answer, noting they imaged the main EMS and the tabulation system; servers in the county coordinate precinct information and house audit reports, cast vote reports, error reports, adjudication reports, and access logs. Thumb drives can contaminate the county and state systems if connected to a machine; it’s not unique to Dominion or voting systems but a general risk. They emphasize avoiding white noise and focusing on facts: Dominion is in Serbia; Huawei Bank funds the enterprise partnership and Serbia-based data centers; code is written in Serbia; imaging shows fingerprints of this. They call for audits, note deviations in Georgia (ballots appearing identical in different batches, a shredder truck before January 20 in Georgia, and a leaky arena water claim later proven to be a leaky toilet), and point to media silence. They argue against accepting the gold standard claim and highlight perceived connections to Soros-funded groups. They stress deviations in state and county behavior, urge audits, and compare the election system to a serial killer—unacceptable to let foreign systems run it. Speaker 2: Adds that with 100 indicators, a pattern emerges; reiterates the need to examine which files came from which computer, and questions the integrity of the central count. Speaker 3: Notes the risk of a non-internet-connected thumb drive introducing malware; emphasizes auditing all machines for that reason.
Full Transcript
Speaker 0: You don't have to be a rocket scientist to figure out that the election was stolen. We were able to build an entire graph of the people that worked for ES and S, Hart, Dominion Voting Systems, ClearValot, Smartmatic, and they basically recycle people through the company. But one of the other things that's become very telling is that you have people that worked at Dominion Voting Systems that are now entering the political sphere and taking over election offices. And then coincidentally enough, you have those election offices for the first time, one in Texas, that that county after hiring someone that worked for Dominion Voting Systems went blue. Alright. So I'm gonna walk you through some information. So we talk about Dominion being, how we take Serbian technology with Chinese characteristics. There nobody's gonna come out and tell you that the Bank of China is is funding anything. They're not gonna do it. Right? They're not gonna come out and put a big board up and say that that's what's happened. But what we're able to do is, do some research on a company called Roaming Networks. So it was a relatively unknown, company out of Serbia until 2013. They signed a value added contract with Huawei Bank. So Huawei, just so you know, is the Bank of China. There'll be some information at the end of the slide that will tell you a little more information about them, But they were built out ICT infrastructure and data centers, and they had done some of that information for or some of that build for most of Serbia. So it's May it's basically the infrastructure of Serbia. I said basically because it doesn't fully encapsulate it, but they have a great impact in Serbia. And it talks about their strategic partnerships and who the owner is. So it's run by an oligarch named Nenad Kovac. And so he was selected as the enterprise partner. Now if you go to roaming networks, you'll see this information on their website. Some of it. Some of this information. Cause I assume that after that this presentation is done, some of that will come down off their website. So we did some research on Dominion Voting Systems. Dominion Voting Systems has a corporate office located in Serbia. We took an screenshot, the Google screenshot of the office that's there and one of the developers, which you'll find on the website. You'll know that you'll notice that one of the legislative leaders inside of Serbia said, I know Dominion Voting Systems back in November. They have an office here. Right? And so Dominion very quickly started taking off all of the Serbian coders that they had on on their website or on LinkedIn. The the interesting thing about this is that we're having code built in Serbia for a system that's used in The United States that uses infrastructure that is actually built by or funded by China. And not just China, but the Bank of China. And I'm gonna show you that I wanna remind you of something about Huawei Bank, right, or Huawei, and that is it's restricted in The United States of doing business in The United States. You cannot do business with them in The United States from 2019. You can't do business with enterprise partners from 2019. So by proxy, they're doing business with the Bank of China through this kind of web of business relationships. So this is a slide that talks about becoming an enterprise partner. Right? And you can kind of look or excuse me. This is a slide that talks about when Huawei was added to the restricted list on 05/16/2019. Many of you guys actually remember that. Right? You remember that at all? Bank of China? Okay. This right here is the information related to many voting systems using roaming networks. So over here on the far left, this is the references that were that were displayed by roaming networks on their site stating that the implementation of pure flash storage solution on the primary data or sorry, data center for Dominion Voting Systems. So you have the company which is funded in partnership by Huawei of China that is actually building the data centers for Dominion Voting Systems, building the code in the office in Serbia. Remember what I talked to you about yesterday, which is deviations. Right? A deviation should give you enough evidence that you just say the breach of the public trust has happened. We need to have an audit. And by the way, if there's nothing to hide, then why would we not have an audit? Why? So that's the first one which shows that they have as a reference Dominion Voting. If you move to the to the right side, this is a picture taken by Mark Cook in Sacramento, California election warehouse where you can see the dominating voting system, hardware is coming directly from China. Right? From China. And you would say, oh, lots of stuff is made in China. Okay. Well, then you have a bill of lading that lading that came in, and you can't really read this, but this goes from a supplier in China directly to the Dominion Voting Systems office in McKinney, Texas. Right? And then over here in this corner, you start talking about testing and approval of Dominion Voting Systems. This particular piece is actually talking about the the similarities in testing of the equipment, the hardware between Smartmatic and Dominion Voting Systems. So they're using the same hardware. They just have a new badge put on it. One says Dominion Voting, and one says Smartmatic. So look. At the end of the day, if you look behind you and you got a tail, everyone tells you you got a tail. Right? But you keep telling everyone you don't have a tail, but you got a tail hanging out there, you probably have a tail. Right? We were able to build an entire graph of the people that worked for ES and S, Hart, Dominion Voting Systems, ClearBallot, Smartmatic, and they basically recycle people through the company. But one of the other things that's become very telling is that you have people that worked at Dominion Voting Systems that are now entering the political sphere and taking over election offices. And then coincidentally enough, you have those election offices for the first time, one in Texas, that that county after hiring someone that worked for Dominion Voting Systems went blue by accident, and they had ES and S. Okay. So I wanna address something with Gina Griswold. I wanna do it right here. So Gina Griswold got on TV and talked about Tina Peters and talked about, Mesa and said that that it was, bad actors, and then they had Matt Crane get up after Gina Griswold and explain that the real heroes are the other 63 counties, that did not do a forensic imaging before and after the trusted build. And I can tell you right now that, you know, I don't know if it's Dominion itself that is the bad actor, if they have people in their company that are bad actors. But if you have nothing to hide, you don't go in and do a trusted build that includes removing logs, changing code. Right? And and and removing information and or components. Those aren't things that you do. The person that she had follow her up, and you guys are gonna be a chance to see this. There'll be lots of articles out there. The person that she had follow-up that on stage was Matt Crane. Matt Crane was the county clerk and recorder for Arapahoe County. He is now the, head of the County Clerks Association or County Clerks and Recorders Association. Right? An organization, by the way, that has some money that comes in and out of that organization that is suspect at best. But here's another thing you need know about Matt Crane who came down hard on Tina Peters. His wife worked for Dominion for many, many years. Before that, she worked for, I think, Sequoia Voting Systems. Right? Sixteen years in total. So the person standing on stage that's actually standing next to the secretary of state, Gina Gridwald, in Colorado is complicit in the behavior of what's happening all across the country saying that this is again the gold standard. If it's the gold standard, then you should do something when a public breach of trust has been done. If there's a breach of trust, it's really simple. The only way to restore that trust is to audit. Okay? You don't have to be a rocket scientist to figure out that the election was stolen. You don't. It it's a you you it's not something you have to stand out there and say, hey, maybe it was, maybe it wasn't. Put the if you if you really wanna get to the bottom of it, put the American people at ease. They were dealing with a massive fraud on the American people. I'm a I'm a I'm a realist. Right? I just want the truth. The only way we get to the truth is by doing audits make sure that they can put, you know, restore trust to the American people. Speaker 1: What what Joe's talking about is indicators. You know, you you get one indicator and that gives you one point of reference. But when you line up a 100 indicators, so another senior Dominion vice president, his name is on the patents was the tabulation center Dominion supervisor in Wayne County, Michigan. Nick Oconomachus. Yes. So Yeah. A senior VP whose names on the patents software, they use a software engineer, software designer, was running the tabulation center. So again, you know, coincidences are coincidences but a whole bunch of coincidences all of a sudden become not a coincidence. So, you just got to apply some common sense and look as Joe said, the preponderance of this this overwhelming evidence and literally, there there are legal boxes of affidavits across the country that are you know, five six feet high stacked of legal filing boxes. And one more question, Joe. Speaker 0: Yeah. Speaker 2: Yes. Yesterday afternoon, we had a really good presentation looking at some of the files, analyzing the files and say But what are they doing my question is exactly which computer did those files come from? Did that come from the central count? Did that come from a sample computer that was used in the precincts? Was that the computer that prepared the equipment that was sent to the precincts? I'm wondering exactly which computer it was where those files were were found. So Speaker 0: I'm gonna answer that with a non answer because I don't have enough information on what systems they image, but they were imaging the main EMS and the tabulation system. Speaker 1: But Yes. And according to the the election supervisor who was here, those and she observed those image. Those were the server images before and after the Dominion software upgrade. So that was a server. Speaker 0: Yes. Speaker 1: The MS server. Yeah. Speaker 0: There were the servers. Two of them. Speaker 1: So the server is where at a county level you coordinate all the precinct information and that server is the repository for all the the audit functions, all the cast vote reports, the error reports, the adjudication reports, the the logs, all the access logs. Everything that happens in that little ecosystem goes through that server. So, it's it's a central brain. Is that is that a way central brain for that county and it's got every everything that happened all throughout the county should be in that repository for that that county right there. Correct. Yes. Yeah. You Speaker 3: can load them out. You can if you pull it thank you. If you pull a thumb drive or put a thumb drive into one machine Yeah. That's not connected to the Internet and then you get the results from it. Upload that thumb drive into the county wide machine. If one machine has a malicious virus in it or you know some kind of malware, you can now upload it to the entire county machine and corrupt the county and the same thing again to the state. And I'm wondering if you I want to check that. I heard this the guys Yeah. So not Speaker 0: that's not a that's not unique to voting systems. That's not unique in Dominion voting systems or any. If you have a corrupted information or a virus on any thumb drive and you put it in any computer, it can corrupt that computer and anything that touches that would also be corrupted. Yes. Speaker 3: Okay. This is if it's in the one machine and the thumb drive, it would jump to the thumb drive at that point. Speaker 0: It possibly could do that. Yes. Okay. Speaker 3: Yeah. That's a problem. We need to audit all the machines for that reason. Speaker 0: That's Yes. So I I want to be really careful and speak truth, and and the truth is that that is a possibility. But we don't wanna come up with possibilities. We wanna eliminate all of the white noise and get down to the real facts. Right? This is facts. Like, we know this a fact that Dominion Voting Systems is in Serbia. We know that Huawei is the bank that that is funding as a as a, enterprise partner and organization in Serbia that's doing business that built their data center in Serbia. We know the code was written in Serbia. You can see some of that. Even the fingerprints of that when you do the imaging. Thank you for what you do. Yeah. Thank you. That we have to look at deviations. We have to look at ways in which they violate law. We have to look at ways in which they have behavioral deviations. And I'll use Georgia as an example. We know that we had video of somebody putting, ballots through the system multiple times. When they went to go do an audit of those images, what did they discover? They discovered that there was ballots that were identical in different batches. That's a that's a that happened. That would happen nine months later, but have they said anything about has the media even let that get out? No. We know that there was a shredder truck that showed up before January 20 in Georgia. We know that for a fact. Right? I have pictures of somebody hiding in a bush, taking pictures of it being surrounded by FBI agents and other people from the government. So they knew that there was a problem and that there was a shredder truck filled with ballots, and you were told nothing. We know that they in the in the main center, the what the arena, they said that there was a main water leak. It was parroted across main the mainstream media. That was parroted. I'm not everything that I'm telling you is something you can go do your own research on. It turned out to be a leaky toilet. They shut down an arena for a leaky toilet, deviation of behavior. We all we have to do is look at the basic deviations from state to state. It it doesn't take a mathematician. It doesn't take doctor Frank or Seth or Bobby Peyton or any of those people to understand that these things are dishonest acts. And yet they tell us it's a gold standard. It's the safest election in US history. You can also take the people that stood up against the election and what they're doing today. Some of them work for the same organizations that are funded by Soros and other aristocratic elites. This isn't again me making it up. It's very simple to see. There was a deviation in our state, in our county, in our area of behavior, law, code. And if there's a if there's a deviation of code or the deviation of a build for dominion in one state and it comes out like it did in Antrim County and now you have Mesa County, that those were compromised systems and that they erased information that by federal law, you have to keep for twenty two months, that should be all that should be the end of the conversation. There shouldn't be a debate about it. We spend all of this time going back and forth about, well, did this happen This happened? We we get to the transaction, and we don't look at it holistically as, listen. I I'm I'm not gonna I'm not gonna let my daughter date a serial killer. And you say, well, he seems like a nice guy. The fact that he's a serial killer, he's not gonna let him date your daughter. Why are we letting our why are we letting our election system get run by systems that are foreign systems?
Saved - March 31, 2026 at 4:28 AM

@TheSCIF - The SCIF

$3 BILLION worth of TAXPAYER DOLLARS funneled to protesters and rioters through corrupt front companies and NGOs. Neville Roy Singham tied to over 2k organizations, with 200 of them solely dedicated to producing anti-American propaganda. https://t.co/XDvG3S0bRH

Saved - March 31, 2026 at 12:56 AM

@TheSCIF - The SCIF

They engineered a coup, spied, fabricated intelligence, and silenced career professionals, all to get Trump. - Obama - Hillary Clinton - John Brennan - James Comey - James Clapper And many more... TRAITORS who commit TREASON must pay a price. https://t.co/i2MNkCh8Kk

Saved - March 31, 2026 at 12:56 AM
reSee.it AI Summary
I insist the journalists, influencers, mainstream media, and elites who gaslit you for years—smiling as they lied that there was no child trafficking sex rings—were actually the ones involved in the rings themselves. https://t.co/E5H9TEJB82

@TheSCIF - The SCIF

The journalists, the influencers, the mainstream media, and the elites who gaslit you for years, lying straight to your face with a smile, saying that there was no child trafficking sex rings, were actually the ones involved in the child trafficking sex rings themselves. https://t.co/E5H9TEJB82

Saved - March 29, 2026 at 8:05 AM
reSee.it AI Summary
I report that 45,000 more votes were added and certified to the Secretary of State from the 611,000 final count in California’s 2025 special election, prompting a Riverside Sheriff investigation the California Attorney General tried to block. Courts later allowed the investigation, raising questions about what they fear to find if fraud exists.

@TheSCIF - The SCIF

MORE ELECTION FRAUD as California Attorney General attempts to block investigation into fraud. 45,000 more votes were added and certified to the Secretary of State from the original final count of 611,000 votes in the 2025 special election in California, which prompted an investigation by CA Sheriff, which was interfered and stopped by the CA State Attorney General. Update: The courts have sided with the Riverside Sheriff to continue the investigation. What are they afraid of them finding if there is no fraud occurring?

Saved - March 27, 2026 at 8:21 AM
reSee.it AI Summary
I expose that Dominion Voting System's built-in feature can flip thousands of votes at a click, with remotely accessible backdoors; they knew this, lied under oath, until it was exposed.

@TheSCIF - The SCIF

Dominion Voting System's built-in feature to flip votes exposed. Whoever has access to the machine can flip thousands of votes at the click of a button, on top of the built-in remotely accessible backdoors. They knew this and kept it a secret, even lied under oath, until it was exposed.

Saved - March 24, 2026 at 5:33 PM
reSee.it AI Summary
I claim Dominion Voting Systems had internet-connected remote desktops in the 2020 election; Belgrade, Serbia, was a main hub where decisions are made and U.S. elections are monitored and altered via Huawei servers tied to China, Iran, and Serbian intelligence—the global election fraud cartel.

@TheSCIF - The SCIF

Dominion Voting Systems had remote desktops connected to the internet during the 2020 election. Belgrade, Serbia, was also revealed to be a main location of Dominion Voting Systems where all major decisions are made, and where U.S. elections are actually conducted, monitored, and altered, through Huawei servers with ties to China, Iran, and Serbian intelligence. This is the global election fraud cartel.

Saved - March 9, 2026 at 11:26 PM
reSee.it AI Summary
I heard a Maricopa County election official testify that a Dominion employee copied votes onto hard drives and took them off site with absolutely no oversight or chain of custody during the 2020 election. Free rein with no oversight is a huge security breach; they could have changed anything.

@TheSCIF - The SCIF

Maricopa County, Arizona, election official testifies that a Dominion employee was observed copying votes onto hard drives and taking them off site with absolutely no oversight or chain of custody, whatsoever, during the 2020 election. Complete free rein with no oversight is a huge security breach in our elections. They could have uploaded or downloaded or changed anything during the 2020 election.

Saved - March 7, 2026 at 7:03 AM
reSee.it AI Summary
I read that George Soros was involved and allegedly knew of Hillary Clinton’s plan to frame Trump with Russia, arguing this treason at the highest levels. Intercepted 2016 emails from the Soros Foundation allegedly show Leonard Benardo stating Clinton approved highlighting Russian interference to distract from her email controversy. The piece blasts the FBI, and accuses Obama’s team and Clinton of fabricating a coup, calling it sedition and demanding accountability.

@TheSCIF - The SCIF

George Soros involved and allegedly knew about Hillary Clinton's plan to frame President Trump with Russia Collusion. How deep is this entire plot and does the corruption really go? This is treason at the highest levels. Intercepted emails from 2016, from the Soros Foundation, exposed that Leonard Benardo, an executive at the foundation, indicated that Hillary Clinton approved a plan to highlight alleged Russian interference in U.S. elections, specifically framing President Trump with ties Russian hackers, to distract from her own email controversy. The annex suggests this was intended to escalate to an "Olympic level" of scrutiny. The document also criticizes the FBI for dismissing potential Clinton campaign involvement or Russian disinformation without a thorough investigation. This exposes Obama's entire administration and national security team, especially then-CIA Director John Brennan, and Hillary Clinton herself fabricating and executing a coup on a sitting president and the United States itself. This is sedition and treason at the highest levels. They must be held responsible and pay for their crimes.

Saved - March 7, 2026 at 6:19 AM
reSee.it AI Summary
I recount that Obama and John Brennan allegedly met weekly to compile a list of people to assassinate. From 2009–2016: 563+ drone strikes, 4,000+ targeted deaths, 800+ civilian deaths; 91,930+ bombs dropped, 19,500+ targeted deaths, 4,950+ civilian deaths. I note that Obama has dropped the most bombs and conducted the most targeted drone strikes, with civilian deaths cited.

@TheSCIF - The SCIF

Obama's secret kill list. Every Tuesday, Barack Obama and John Brennan would meet and create a hit list of people to assassinate that week. Assassinations were conducted by drone, air strike, tactical teams, or individual hitman. DRONES STRIKES 2009-2016: - Total Drone Strikes: 563+ - Total Drone Strike Targeted Deaths: 4,000+ - Total Drone Strike Civilian Deaths: 800+ BOMBS DROPPED 2009-2016: - Total Bombs Dropped: 91,930+ - Total Targeted Deaths from Bombs: 19,500+ - Total Civilian Deaths from Bombs: 4,950+ Obama has dropped the most bombs and has conducted the most targeted drone strikes, which have also killed civilians, more than any other president in history.

Saved - March 3, 2026 at 7:55 AM
reSee.it AI Summary
I reference the Weiner laptop and the “Insurance Policy” file; claim 9+ NYPD cops didn’t die by accident. Once the Weiner laptop is exposed, the cabal will fall. This video will frazzle you. I ask who has copies of the hard drive and will release them to expose the truth.

@TheSCIF - The SCIF

The Anthony Weiner laptop and the "Insurance Policy" file. 9+ NYPD cops don't all end up with self-inflicted gun shots to the head by accident. Once the Weiner laptop is exposed. The cabal will fall. This video will have you all frazzled up after watching it. The most important question still remains... Who has copies of the hard drive and will they release it and expose the truth once and for all?

Video Transcript AI Summary
The FBI is reopening its investigation into Hillary Clinton's use of a private email server. The Wall Street Journal reports that 650,000 emails are sitting on Anthony Weiner's laptop, and thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, is now the focus of new inquiries. Sources say there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that Mrs. Clinton used while she was secretary of state. The laptop had previously not come up in the Clinton email probe. Anthony Weiner’s laptop reportedly contained kill switches and was not released before. Weiner’s laptop is connected to an investigation into whether he sent sexually charged emails to a teenage minor; the laptop hadn’t previously come up in the Clinton probe. In an exclusive interview with Inside Edition, a minor says she first sent Weiner a message on Twitter in January 2016 when she was 15 years old. She says the messages quickly turned obscene, and she was disgusted, which contributed to her coming forward. At the time, Weiner's wife, Huma Abedin, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Abedin, which led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server just days before the presidential election. Inside Edition says it is withholding the girl's name because she is underage, but her father gave permission for her face to be shown. Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators note that Comey’s October 2016 reopening announcement was controversial, with some saying it cost Hillary Clinton the election. It is argued that the NYPD started investigating via subpoena and warrant, and they found 650,000 emails on Weiner’s laptop, including Clinton emails, Huma Abedin’s emails, and evidence pertaining to Clinton Foundation. They reportedly found state department emails and material including money laundering and references to a trip to Epstein’s “sex island,” with Clinton and Bill Clinton allegedly there multiple times. The material was given to the FBI, with threats to go public if the investigation wasn’t reopened or indictments issued. There is testimony that “nine cops watched the videos on Wiener's laptop,” and that those officers were later dead. Another account says there were 12 individuals who saw the laptop, and none are dead. Reports note a surge in NYPD suicides this year, with nine or more officers dying by suicide, including the latest at Queens General Hospital. One account links deputy chief Steven Silks to overseeing evidence from the Weiner laptop and to copies made of that evidence; Silks reportedly died by an alleged self-inflicted gunshot wound one month before mandatory retirement. Other rumors claim the laptop contained numerous emails from Hillary Clinton during her time as secretary of state, “insurance policy” files, and family involvement, with allegations that the FBI lost the laptop. A high-ranking NYPD official reportedly warned of grave contents and indicated others had copies of the information. Proponents argue that, if the Weiner laptop were released, the government would fall.
Full Transcript
Speaker 0: We never thought we were going to say thank you to Anthony Weiner. Speaker 1: The FBI is reopening its investigation into Hillary Clinton's email scandal. The Wall Street Journal reports 650,000 emails are sitting on Anthony Weiner's laptop. Thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. Speaker 0: To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. Speaker 2: A computer used by former congressman Anthony Weiner and his estranged wife, Huma Avedin, is now the focus of new inquiries into Hillary Clinton's use of a private email server. Sources have told the Wall Street Journal's Devlin Barrett that there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that missus Clinton used while she was secretary of state. Why is this one laptop now so significant? Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. Speaker 2: Who sees from Weiner as part of an investigation into whether he sent sexually charged emails to a teenage minor. The laptop hadn't previously come up in the Clinton email probe. Speaker 4: Did he know that you were only 15 years old? Speaker 5: He did. Speaker 4: Her age was no deterrent for Carlos Danger. In an exclusive interview with Inside Edition, this minor says she first sent disgraced Queens Congressman Anthony Weiner a message on Twitter back in January 2016 when she was just 15 years old. Speaker 5: I just sent him a nice message, just hello. I'm a huge fan. Speaker 4: She says she wanted to see if he was up to his old antics during last year's presidential election. Turned out, he was. Speaker 5: I knew that it was going downhill and really fast. Speaker 4: She says the messages from the Democrat quickly turned obscene. I was Speaker 5: disgusted. That's part of the reason that I came forward. Speaker 4: At the time, Weiner's wife, Huma Abidine, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Aberdeen. That led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server while secretary of state, just days before the presidential election. Inside Edition says it's withholding the girl's name because she's underage, but her father gave permission for her face to be shown. Weiner went on to plead guilty to a charge of transferring obscene material to a minor. Speaker 6: Just striking about this is that, you know, announcement from James Comey in October 2016, you know, kind of saying that the investigation was being reopened here. Some people say that cost Hillary Clinton the election itself. But when we look at that incident and, you know, not with this all this other information we have, what jumps out to you about that? Speaker 7: That was Comey trying to cover Comey because they knew they hadn't done what they should have done with the Wiener laptop and the New York Police Department who were honest were gonna disclose all that. He just simply had to do it to try to save his own skin. Speaker 8: Because of Wienergates and the section scandal, the NYPD started investigating it. Through a subpoena, through a warrant, they searched his laptop and sure enough found those 650,000 emails. They found way more stuff than just the, more information pertaining to the the inappropriate texting the guy was doing. Speaker 7: 675,000 Clinton emails when they got Anthony Weiner's laptop in a search warrant because of all his sex perversion issues. It was all the Clinton emails, the Clinton Foundation, her secretary of state emails, Huma Abedin's emails. Lots of people emailed Huma as a proxy for Hillary. Speaker 8: They found state department emails. They found a lot of other really damning criminal information, including money laundering, including the fact that Hillary went to this, sex island with convicted pedophile Jeffrey Epstein. Bill Clinton went there more than 20 times. Hillary Clinton went there at least six times. The amount of garbage that they found in the emails of criminal activity by Hillary, by her immediate circle, and even by other, Democratic members of Congress was so disgusting. They gave it to the FBI, and they said, we're going to go public with this if you don't reopen the investigation, if you don't do the right thing with timely indictments. Speaker 9: We're not talking about one or two emails. We're talking about hundreds of thousands of emails. Speaker 8: NYPD was the first one to look at that laptop. Speaker 7: I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 10: Somebody sent it to me. I I would not advise you to have a look at it. She and her spokeswoman, they put a five year old girl naked on a table, bind it, And then with a scalpel, they start to remove the face. Speaker 0: Oh my Speaker 10: god. Then you hear this child screaming, screaming, and they take off the face. And Hillary Clinton puts it on her face and goes to the child. And you see, the child is all flesh, and then the eyes pour out, and this child sees her own face on the face of Clinton. I will never forget that image, and I I never scream. That's how evil these people are. Speaker 3: Supposedly, nine cops watched the videos on on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. Speaker 11: There were a total of 12 individuals who saw Anthony Winner's laptop computer. None of those 12 people are dead now. Speaker 12: Some sad news tonight. Another New York City police officer has taken his life. The second NYPD suicide in two days. Speaker 0: Well, Corey Tamsen, you know, with the latest suicide, the eighth this year, the sixth, just the last two months alone. Speaker 13: Another New York police department officer has died by suicide, becoming the ninth to do so this year. According to a law enforcement official, the 56 year old officer was off duty and at home. On Tuesday, another law enforcement official told CNN that an eighth officer had died by suicide. A 35 year old Speaker 9: Robert Escheverria died of a self inflicted gunshot wound at home last night. The 25 year veteran officer suicide came a little more than twenty four hours after a 35 year old officer took his own life. Commissioner James O'Neill is still struggling with the news. Speaker 0: You know, you think that, okay, this is gonna be the last one. And and last night I got a phone call and I just did it. It just almost knocked me down. I just took the wind right out of me. I just, you know, you know, what the hell is going on here? Speaker 9: So far this year, there have been nine NYPD suicides, seven since June. Last year, there were a total of four. We don't know why Nick did what he did. Doug Budney's son Nick, a fourteen year NYPD officer, took his own life last year. I just think it was a bad last decision. Speaker 12: Another NYPD officer has just died by suicide. It's the tenth suicide so far this year. News four's Gus Rosenthal is live at the site of the shooting in Queens. Gus, what can you tell us? Speaker 14: Yes. Renaud, an officer was pronounced dead at Queens General Hospital just a few minutes ago, and now a number of other officers are here trying to figure out exactly what happened. This is the scene at 178th And Union Turnpike in Utopia, Queens. Little known about who this officer was and the circumstances surrounding this. Again, we just know this was an off duty officer with a self inflicted gunshot wound. He was rushed to the hospital where he would pass away just a short while ago. Now leading up to this, as you mentioned, there have been nine previous suicides by active members of the NYPD happening this year in 2019. Speaker 11: Now that is a strange coincidence. Anthony Weiner is alive. Weiner shared the laptop with his estranged wife, Huma Abidine, a close aid to Hillary Clinton since 2000. Speaker 15: NYPD chief commits suicide one month before retiring was directly involved in Anthony Weiner laptop computer evidence handling. A high ranking New York City police department officer has died from an alleged self inflicted gunshot wound to the head. Deputy chief Steven Silks was found in an unmarked patrol car wearing civilian clothes Wednesday evening, just one month before he would turn 63 and face mandatory retirement. He allegedly shot himself in the head with the gun reportedly discovered beside him. He was very closely and heavily involved in the investigation of the laptop seized from the former congressman Anthony Weiner, which allegedly held volumes of Hillary Clinton email evidence on it. A fellow officer told the New York Daily News that Silks was deeply committed to the job Silks reportedly submitted his mandatory retirement paperwork the day before. Other sources, however, say that the deputy chief was heavily involved in the sex crimes investigations of former Democrat congressman Anthony Weiner and that the chief personally oversaw the evidence gathering from a laptop computer seized from Weiner in that investigation. The laptop is alleged to have contained numerous emails from Hillary Clinton during her time as secretary of state and numerous files in a folder titled insurance policy, which reportedly contain extraordinary details about child sex rings operated by and for use of high ranking government officials nationwide. Ultimately, that laptop had to be turned over by NYPD to the FBI who allegedly lost it. Rumors have circled for years that NYPD top brass took copies of the hard drive because they were suspicious of the feds in general and wanted to make certain that the evidence was preserved. One high ranking NYPD official at the time, the laptop was seized, told media outlets he was sickened by what he saw on that computer. And if the Fed did not pursue the necessary investigations, he would reveal what the laptop contained. It is now believed that deputy chief Silks was that official. No one is confirming or denying that information at this time. So deputy chief Silks was one of the now 10 officers, and he allegedly was the one who oversaw all the information on the Anthony Weiner laptop and made copies. Who else made copies, and who else has the information? Was it suicide? Probably not. Speaker 7: So one of the things if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted, I have no doubt, on that laptop. Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. It was filled with crap that wasn't supposed to be there. We never get to see it. Supposedly, nine cops watched the videos on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. You know, it's like the five cops who died after January 6. Right? Four of them were suicides. Out of according to AI, there were about 80 cops really in the thick of things. Four of them died from suicide.
Saved - March 3, 2026 at 3:14 AM
reSee.it AI Summary
I believe Obama literally created one of the worst terrorist groups by deploying the Brennan CIA to create ISIS, which splintered to overthrow Assad in a covert CIA-Saudi operation, causing hundreds of thousands killed and millions displaced in Syria.

@TheSCIF - The SCIF

Obama literally created one of the worst terrorist groups in history by deploying the Brennan CIA to create ISIS, which splintered into a jihadists group, in an attempt to overthrow Assad in a disastrous joint covert operation with the CIA and Saudi Arabia, which resulted in over 500,000 people killed, and displacing over 10 million in the U.S. proxy war with Syria. All roads lead to Obama.

Saved - February 28, 2026 at 5:56 AM
reSee.it AI Summary
I report that Jeff Lenburg, a nation-state vulnerability expert, exposed Dominion voting machines in Antrim County 2020 as swapping Trump and Biden votes: 4 Trump ballots inserted, 2 counted; 2 Biden ballots inserted, 4 counted. He warned, "The highest priority as a bad guy would be to subvert our election system."

@TheSCIF - The SCIF

Nation-state vulnerability expert Jeff Lenburg exposed Dominion voting machines and software used in the Antrim County 2020 election swapping Trump votes with Biden votes. Trump ballots inserted: 4 votes - Counted: 2 votes Biden ballots inserted: 2 votes - Counted: 4 votes "The highest priority as a bad guy would be to subvert our election system." — Jeff Lenburg: nation-state vulnerability expert

Saved - February 28, 2026 at 12:57 AM
reSee.it AI Summary
I report CAL DOGE alleges $928 million from California’s SOMAH program—meant for solar installs on affordable housing—was diverted to Democratic voter registration and activism. Funded by gas taxes and utility bills, only 269 projects totaling $72 million have been completed since 2015. GRID Alternatives and CEJA are implicated; CEJA’s affiliated entity reportedly used public funds for partisan activities, including voter mobilization and endorsements. CAL DOGE calls for a full audit.

@TheSCIF - The SCIF

HUGE: $928 MILLION Stolen from California Solar Program and diverted to Democratic Voter Registration & Activism Efforts A new report from CAL DOGE alleges that $928 million from California's Solar on Multifamily Affordable Housing (SOMAH) program, intended to fund solar installations on affordable housing, has been diverted to Democratic voter registration and activism efforts. Funded by gas taxes and utility bills, the program has completed only 269 projects worth $72 million since 2015, raising questions about the missing funds.Organizations like GRID Alternatives and the California Environmental Justice Alliance (CEJA) are implicated, with CEJA's affiliated entity reportedly using public dollars for partisan activities, including voter mobilization and candidate endorsements. CAL DOGE calls for a full audit to ensure accountability.This highlights ongoing concerns about transparency in green energy initiatives. Source: NY Post

Saved - February 27, 2026 at 8:05 AM
reSee.it AI Summary
I believe Hillary Clinton orchestrated the Russia Collusion operation to divert attention from her foreign dealings and an illegal private email server. I claim investigators found 650,000 emails with state secrets and crimes, allegedly destroyed with hammers and bleach. I say Clinton devised the plot; Brennan escalated it; Obama lit the fuse. Brennan and Clapper’s operatives allegedly carried out the coup—slander, spying, psy ops—to subvert the United States and Constitution. I demand accountability and imprisonment.

@TheSCIF - The SCIF

Hillary Clinton orchestrated the Russia Collusion operation against President Trump to divert attention from her foreign dealings and illegal private email server. Investigators found over 650,000 emails with state secrets, child exploitation content, pay-to-play schemes, money laundering, perjury, Obama's pseudonym for illicit communication, and more. Evidence was destroyed using hammers and bleach, despite claims of innocence. Clinton devised and approved the plot, Brennan ran it up the ladder after they knew no real collusion existed, and Obama lit the fuse. Brennan and Clapper's operatives executed the coup, involving slander, spying, taxpayer-funded psychological operations to not only undermine President Trump, but subverting the United States and the Constitution itself, all to conceal decades of crime and corruption and retain power. This constitutes high-level sedition and treason. Americans were deceived and gaslit for years by the mainstream media and our own government. It's time for accountability and imprisonment. What will it take for action against these criminals?

Saved - February 26, 2026 at 11:19 AM
reSee.it AI Summary
In 2020, Nevada Democrats mailed ballots, not applications, to every registered voter, including 41,000+ who hadn’t voted or updated in 10+ years—many were dead—yet they received ballots and voted. This is FRAUD.

@TheSCIF - The SCIF

In 2020, Nevada Democrats mailed ballots, not applications, to every registered voter, requested or not. They knew over 41,000 registrants hadn't voted or updated registrations in 10+ years. Why? They were dead, but got ballots anyway, and many voted. This is called FRAUD. https://t.co/ShjUXQjm3N

Saved - February 24, 2026 at 2:58 PM
reSee.it AI Summary
I see John Brennan as a traitor to the United States, involved in the coup against Trump, and who signed visas for half the terrorists in 9/11. He knew their plans. He’s as dirty and ruthless as they come and must be held accountable.

@TheSCIF - The SCIF

Former CIA Director John Brennan is not only a traitor to the United States and involved in the coup against President Trump, but also signed the visas for half of the terrorists involved in the 9/11 attack on the World Trade Towers. You really think he didn't know what their plans were? He is as dirty and ruthless as they come and must be held accountable.

Saved - February 23, 2026 at 7:20 AM
reSee.it AI Summary
I state that Democrats didn’t expect Trump to lead by hundreds of thousands in 2020, so they shut down swing-state voting locations to cheat and steal the election.

@TheSCIF - The SCIF

Democrats didn't expect Trump to be ahead by hundreds of thousands of votes in the 2020 election, which forced them to shut down multiple swing state's voting locations to cheat on top of already cheating in order to produce even more fraudulent votes to steal the 2020 election. https://t.co/rWxEvKr2oc

Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.
Full Transcript
Speaker 0: No matter which side of the fence people have been on, they've been saying, show me the evidence. I'll believe it when I see the evidence. And people on both sides agree that something went terribly wrong in November 2020, but there really has been no comprehensive place to see the evidence of widespread fraud until now. This video is pure data, so don't get mad. You can't be angry when a scientist confirms that gravity pulls downward at negative 9.8 meters per second squared, even when that fact works against the narrative you've heard. Here we go. Just before we show you some new disturbing video evidence, we'll talk about statistical anomalies in three states in question. In the early hours of 11/04/2020, Democratic candidate Joe Biden received several major vote spikes in Michigan, Wisconsin, and Georgia, suddenly placing him in the lead when he had been trailing Trump by a significant margin. 8,954 individual vote updates were analyzed. Across nearly all updates, there follows a clear statistical pattern. However, a very small number of batches are especially questionable. The four most notable aberrations were two in Michigan, one in Wisconsin and one in Georgia. And all occurred in the same five hour window in the middle of the night, when in some places counting reportedly had stopped. Not only do these updates not follow generally observed patterns, but their behavior is particularly extreme. For context, using publicly available data from the New York Times, here is a visualization of the number of votes by candidate in Michigan from the beginning of the election night to 7PM Eastern Time on November 4. Trump is in red, Biden is in blue. Notice the sudden and improbable spike in votes for Biden at 06:30AM, where Biden received a 141,258 votes, while Trump only received 5,968. This extreme ratio is surrounded by updates that are nearly the same in ratio. This particular update is 23 times more votes for Biden and is the most extreme update favoring Biden in all datasets across all states. The situation in Wisconsin is even more stark. A single update to the vote count brought Biden from trailing by over 100,000 votes into the lead. Thirdly, a vote update in Georgia at 01:34AM eastern time on November 4, which shows a 136,155 for Joe Biden and only 29,115 for Donald Trump. The extents of these four votes spikes in question are more than the margin of victory in all three states, which means the spikes were not only abnormal in regards to percentage for Joe Biden, but also in magnitude of the vote count. Out of roughly 9,000 updates, this election was decided by only four extreme updates, each with a probability of less than one tenth of 1%. Meaning that had these four unlikely updates not happened, we would have a different president in the White House. Detractors argue that these spikes were merely human error and not indication of fraud, and the errors have been corrected. If the errors have been corrected, where is their evidence? Why were the results never changed? Others have said that the spikes indicate heavily democratic precincts. If that were the case, then California would show many spikes of that magnitude, but it doesn't. Only one vote update in California is anomalous in percentage of Biden votes, but not enough magnitude to shift an outcome. The strangest anomaly visible in the data is consistently identical ratio of Biden to Trump votes across time, which is theoretically impossible. Here is Florida. These updates occurred over a week following the election. Notice all the ratios of Biden to Trump votes are a 100 identical over several days. This pattern shows up in many states. It appears that a computer algorithm is involved in the process, which is doing something called weighted race distribution, a feature of Diebold voting machines known as early as 2001, which gives values to votes rather than simply counting them. Here in California, we see an update of one vote. About 65% of that value is given to Biden and 32% to Trump. How can one vote go to more than one person? It is well known and not disputed that Diebold software was found to be switching votes through programming in past elections. Even though Diebold is no longer used, Dominion Voting Systems acquired ESNS in 2010, which had previously acquired Diebold under its new name of Premier Election Solutions. This does not exhaust all statistical data anomalies encountered in the twenty twenty election, but data anomalies is only one factor to consider. Next is eyewitness and video evidence. In Georgia, there's a case of a poll worker named Ruby who was seen on Instagram giving a secretive live video of her working in the backroom filled with absentee ballots. Speaker 1: I'm a look. I'm a let y'all see it here. Okay. Don't say nothing. Listen. Speaker 0: At 10:30PM on November 3, all media and poll watchers were told to leave State Farm Arena because ballot counting was going to stop. But Ruby and her daughter and three others remained behind at State Farm Arena. They pulled boxes of ballots out from under the table that was placed there in the morning and distributed them to several counting stations. Speaker 2: Back to Fulton County, Georgia right now, where our reporter, Blaine Alexander, apparently has some new reporting on the expectations for that count. Speaker 3: Rachel, we've learned that the counting continues tonight. You know, right here in State Farm Arena behind me, we've learned that there are five people who are still inside, still working to scan those absentee ballots and try and get those numbers tabulated. Now initially, we believe we were told that everybody went home at about 10:30, but I just got off the phone with the county spokesperson who tells me that indeed there are still some people in there quite literally burning the midnight oil, scanning ballot after ballot, and trying to get that information in. Speaker 2: And, Blaine, specifically, you said five people are inside that building? That's five of five actual individuals who are working on all the absentees in Fulton County right now? Just five? Wow. Talk about having that sort of fate of the nation in your hands. Speaker 0: Ruby is seen here in this video running the exact same stack of ballots to the machine three times. Other workers do the same. Note that a large surge in Biden votes can be observed after this tabulation at o 06:34 Greenwich Mean Time, which is 01:34AM in Georgia, just after the time in question. You may ask, can a ballot really be counted more than once? Here is your answer from Coffey County, Georgia. Speaker 4: Can you scan a ballot more than once? Speaker 3: I've just done it. Speaker 1: You just done just batch that she's Speaker 3: been doing. Speaker 4: Yeah. You just keep scanning. Speaker 3: Usually. I just kept scanning same Speaker 4: actually just keeps up with you. Speaker 3: I just scanned the same batches that y'all just voted. Mhmm. I never got any more until that one. Speaker 4: Don't know why they approved such a system. Speaker 0: Ruby allegedly posted this later on social media. Of course, the mainstream media calls this misinformation and most references to these videos have been deleted from internet search results. Apple News, the morning of the election, sent out a push message to Apple News subscribers that elections are secure. So if it's true that election fraud is rare, what about Raquel Rodriguez? She was recently arrested for election fraud in Texas because of overwhelming video evidence incriminating herself that she was harvesting ballots for pay. Speaker 1: Leave the top of ticket to get votes for either Biden. How many votes do you think you can deliver for us? Speaker 5: At least 5,000. Speaker 1: And what are we looking at as far as how much that's gonna cost? Speaker 5: For the entire team that I'm looking at, I'm looking at 55,000. Speaker 1: So $55,000 for 5,000 votes, pop the ticket, eager, Biden? Speaker 5: If not not more, I'm I'm not gonna over promise because remember, we we're we're sixteen days till election day. You you give me cash, you can do whatever you wanna do. Speaker 1: $55,000 upfront, 5,000 votes. Speaker 5: That's right. Speaker 0: Then there is cybersecurity evidence and the question of whether Dominion voting machines were tampered with over Internet connections. Signed affidavits under oath from cybersecurity experts indicate that Dominion Voter Systems and Edison Research were using an unencrypted VPN with login credentials that were easily accessible and used by foreign adversaries to monitor and manipulate votes. The IP addresses into the Edison Research host service went in both directions, meaning that not only were China and Iran and other countries accessing the servers, but also Edison Research was communicating back to these adversaries. The claims that Dominion voting machines were not connected to the Internet are completely false. Cybersecurity experts have followed the communication of the data from Dominion voting servers and Edison Research to foreign countries. A simple web search will uncover that dominionvotingsystems.com is registered to a company in Hunan, China. Three of the seven board members of UBS Securities are Chinese nationals. That company owns Staples Street Capital, which in turn owns Dominion. On top of that, the Dominion software is licensed from Smartmatic, which is a Venezuelan owned and controlled company. And we're all familiar with how their elections go. Furthermore, forensic audits of the machines reveal significant errors. Although the mainstream media and politicians are saying that it's dangerous misinformation that Dominion voting systems are unsecure, this was the very message that several left leaning news sources were claiming less than a year ago. NBC News and PBS found out just how easy it is to hack voting machines or cast fake votes. Speaker 4: It's important to know that Georgia just spent over 100 or is about spent over a $100,000,000 on a contract with Dominion to provide image cast hardware to the state in time for the '20, for the for the next primaries and for the twenty twenty election. And yet here these kids were who had opened it up. They said, look. You can pop the front off of it, and here's a port you can get into right here. That's easy. You know, all kinds of stuff that that you could certainly do within six minutes behind a curtain, much less, if you had extra time because any of these were, connected to the web as we discovered a couple days before, so many of them are. Speaker 0: Despite opposition and attacks, election security experts were able to audit Dominion voting machines in Antrim County, Michigan, revealing unusually high error and adjudication rates. What does that mean? According to the report, Dominion Voting Systems is intentionally designed with inherent errors to create systemic fraud and influence election results. Ballot errors are sent to adjudication, which means the vote can be decided by an election worker where there is no oversight, no transparency, and no audit trail. Speaker 6: We've scanned a 113,130 as of moments ago. We've adjudicated a 106,000 plus of those. Speaker 0: Experts identified an error rate of 68 o 5%, which is far above the federal election commission guidelines of point 0008% or one in 250,000. Although vote adjudication logs are available for prior election years, suspiciously, all the logs for the 2020 cycle were missing. Moreover, all security logs prior to 11:03PM on November 4 are also missing. If that's not enough, the election event designer log shows that the Dominion Image cast precinct cards were reprogrammed on October 23 and again on November 5, which violates the Help America Vote Act, which includes a ninety day safe harbor period that prohibits changes to election systems, registries, hardware, and software updates without undergoing recertification. Even if skeptics and critics persist that these issues are inconsequential, they should be willing for forensic audits to take place for transparency, yet they have viciously attacked attempts to review logs. Why is that if there's nothing to hide? Election officials in Maricopa County, Arizona have even ignored subpoenas for release of election data and Dominion Machine audits until after the inauguration. Then there's the mass influx of unsolicited mail in ballots. The keyword is unsolicited. In other words, people receiving ballots they never asked for. Politicians use the coronavirus to push mass mail in ballots and extending the time to receive those ballots till many days after the election. There are many reports of people who voted in person also receiving multiple unsolicited ballots in the mail. People who did not send in a mail in ballot denied person voting because they were told they had voted already by mail when they hadn't. This opened up chaos in the system and uncertainty as to who actually voted. Additionally, signature verification requirements were slackened in many states adding even more uncertainty. In fact, the Pennsylvania Secretary of State unilaterally removed legislative signature requirements for mail in ballots. More than a thousand signed affidavits have been given by poll workers who have witnessed illegal activities, non equal treatment of Republican poll watchers, counting ballots in locations with no poll watchers, poll not permitted close enough to see the counting process, shredding ballots, garbage bags full of ballots for Trump, entire boxes of hundreds of supposedly mail in ballots that have no folds indicating they were never actually mailed by anyone. The list goes on and on. These affidavits are signed by witnesses under penalty of perjury, so this should not have been taken lightly, but these witnesses were never heard in court. Unfortunately, what we have covered is only the tip of the iceberg on fraud, cover ups, federal election law violations, dishonesty on a global scale. Speaker 7: So either the secretary of state's office is recording and certifying results that have negative errors and fraudulent votes in them, or someone is giving them negative information. Speaker 0: Recent polls show an overwhelming percentage of The US don't trust the twenty election was without fraud. At the end of this video, the credits will be further data scrolling through that you can read for yourself and pause and go back and read again. So what can you do? Firstly, find a way to download this video and share it. Film it with your mobile phone. Do anything to duplicate this. Post it with a hashtag, here is the evidence, hashtag every legal vote. Because guaranteed, big tech and social media giants will do their best to erase it from the internet as they've already done with much of evidence we've already shared. And if they can't erase it, they'll fake fact check it. Well, guess what? We've already done the fact checking. We've gone through thousands of pages of data, sworn affidavits, forensic reports, and cyber security reports. Secondly, you can demand election reform from your election state and local officials. We cannot let another election ever be this questionable ever again. This is The United States Of America. People used to look to us on how to have democracy through our voting system. 2020 was a complete sham and it cannot ever happen again.
Saved - February 18, 2026 at 7:01 AM
reSee.it AI Summary
I claim Hillary Clinton's campaign manager testified she started the Russia Collusion hoax by pushing a fabricated story about Trump having a "secret server" tied to Russia, while she herself had a secret server linked to foreign crimes. They accuse Trump of crimes that they themselves commit; the patterns don’t lie.

@TheSCIF - The SCIF

Hillary Clinton's own campaign manager testified that she started the entire Russia Collusion hoax by giving the media the greenlight to run a completely fabricated story about Trump having a "secret server" tied to Russia, when in reality, she was the one with an actual secret server tied to foreign countries and illegal activities, which was said to contain evidence of child trafficking and abuse, pay to play politics, money laundering, and many other serious federal crimes. Whatever they accuse Trump and conservatives of, they are literally guilty of themselves. The patterns don't lie.

Video Transcript AI Summary
Hillary Clinton's 2016 campaign manager Robbie Mook testified that Clinton herself approved the idea of giving the Alpha Bank story to a reporter as part of the Trump-Russia narrative. He described a moment when the campaign told Clinton they had information alleging a link between the Trump Organization and a Russian-based bank through a back channel, and that she agreed to let it be shared with the media. To provide background, the report involved an allegation about the Trump Organization, via a back channel to a Russian bank named Alfa Bank, which has ties to the Kremlin and Russian oligarchs close to Vladimir Putin. In 2016, campaign attorney Michael Sussman went to James Baker, the FBI’s general counsel at the time, informing him that he had information linking the Trump Organization to a Russian bank through a back channel and via a computer server. James Baker took the information to the FBI, which investigated and found nothing substantial. The Clinton campaign also learned about the information, and Robbie Mook later stated that Clinton was briefed on the allegation and gave the approval to disseminate it to the media. Sussman faces one count of providing a false statement to the FBI. The moment described by Mook—that Clinton personally approved sending the story to a reporter—was presented as surprising in court, especially since the information later turned out to be baseless. During coverage, a reporter quotes Mook: “we told her, Hillary Clinton, we have this, and that's the information about this bank allegedly having this communication or at least the server suggested so with the Trump Organization. We told her we have this, and we wanna share it with a reporter. She agreed to that.” The discussion also notes that the information was ultimately false or lacking evidence. Questions are raised about why the information was given to reporters, including a claim that they did not have the expertise to judge the information and were briefed by Mark Elias about it. Mook says they decided to give it to a reporter so the reporter could run it down more. It’s argued that reporters may not have done due diligence to verify with the FBI or other sources, and that the story was amplified despite its lack of substantiation. Speaker commentary emphasizes the perceived strategic value of the release and critiques the media’s coverage, suggesting that the Russia narrative was intensified by those opposed to a Trump presidency. The discussion also references Mark Elias, who led the law firm that funded the Steele dossier, tying the episode to broader assertions about campaign desperation and attempts to influence the political outcome.
Full Transcript
Speaker 0: Hillary Clinton's 2016 campaign manager, Robbie Mook, testified that Clinton herself approved the idea of giving the Alpha Bank story to a reporter as part of the Trump Russia narrative. She was in a lot of trouble, if Speaker 1: you remember then, for her private server that where she was deciding which emails to delete. And, she was in a lot of trouble for that. So she was like, what can we do? I know. We'll say that Trump has a secret server with Russia. So that's where the whole Russia idea, got cooked. Speaker 2: When Robbie Mook, the 2016 Hillary Clinton campaign manager, just answered a question casually that she personally approved, sending that story to the media. As you mentioned, it deals with an allegation or an accusation about the Trump organization, not the Trump campaign, but the Trump organization having a back channel to a Russian bank named Alfa Bank, which has some ties to the Kremlin, some Russian oligarchs, that are close with Vladimir Putin. So to give everyone a little bit of a backstory, on this story, because it is complicated, there are a lot of twists and turns. Hillary Clinton had a campaign attorney named Michael Sussman. In 2016, September 2016, he went to his friend who happened to be the general counsel at the FBI, a man named James Baker. And Sussman said, James, I have or Jim, rather, I have some information linking the Trump organization to a Russian based bank via a back channel, via a computer server. James Baker took the information at the FBI. The FBI investigated. They found out there was nothing to it, Kaylee, as you mentioned. Hillary Clinton's team at the campaign also found out about that information, and we are learning today via Robbie Mook, the campaign manager. She personally was briefed on this allegation about the, Russian Bank and Trump Organization, and she said, okay. Go ahead. Give it to the media. And that's where we are right now. Sussman is charged with one count of, providing a false statement to the FBI. But, again, definitely a little bit of a surprise in the courtroom, I think, from not only but the defense when Robbie Mook, went ahead and admitted that Clinton herself, gave the go ahead for disseminating that story, which turned out to be false. Speaker 0: Wow. Powerful new information. Thank you very much, David. Keep us up to date. Emily, a quote that stood out to me by Robbie Mook, imagine, you know, he's with the Clinton campaign. He says this, we told her, Hillary Clinton, we have this, and that's the information about this bank allegedly having this communication or at least the server suggested so with the Trump Organization. We told her we have this, and we wanna share it with a reporter. She agreed to that. This is the information that turns out was baseless or nothing suspicious. Speaker 3: What I find so ironic, Kaylee, is that as this sort of explosive testimony has undercovered what was at the root and who gave the blessing for them to disseminate false information that was amplified a million times over by our mainstream media, we are hearing nothing but crickets from the media now over this. Let's look at what instead that they are focusing on. What what shells are they placing over what's actually important to this country because they want to divert our attention otherwise. But, obviously, here on Fox News, we are covering it minute to minute. And keep in mind as well, just in the back of our minds as we listen and watch this unfold, that this trial, as David said, this is over providing false information, right, and and perjury. That is a hook that a lot of people can be on the hook for, the more we learn and especially, potentially, the person that was just named as who did give that blessing, Kaylee. Speaker 0: Yeah. Really important information there. Kennedy, another quote that stood out to me. This is again from Robbie Mook. He says this, we didn't have the expertise to judge what we were briefed on, and he was briefed by Mark Elias, who was another attorney, about this information. He admits we didn't have expertise, but he says we decided to give it to a reporter so the reporter could run it down more. It's their decision whether to publish it. Sounds a little bit like passing the blame. Speaker 1: Well and you also give it to reporters that you know aren't going to do their due diligence and investigate the story and talk to the FBI and talk to sources. They ran with it because they were all so opposed to the idea of a Trump presidency. Mark Elias, of course, in charge of the law firm that paid for the Steele dossier. All of it has proven to be false, and it just goes to show that Hillary's campaign, they were desperate. They were losing. This is a case of wag the rat. And but, you know, talk about a political losing harpy who couldn't stand to see power escaping her her grasp. And, you know, she was in a lot of trouble, if you remember then, for her private server that where she was deciding which emails to delete. And she was in lot of trouble for that. So she was like, what can we do? I know. We'll say that Trump has a secret server with Russia. So that's where the whole Russia idea, got cooked.
Saved - February 14, 2026 at 8:12 AM
reSee.it AI Summary
I note that on Nov 5, 2020, an anonymous user with elevated privileges remotely accessed the county’s Election Management System and modified the database, showing unauthorized remote access altering results. Ballots also had altered timing marks in blocks 15, 18, 28, 41, and 44, causing about a 20% higher rejection rate for Republican ballots, directing them to adjudication where votes could be altered, potentially switching Trump votes to Biden.

@TheSCIF - The SCIF

On November 5, 2020, during the Antrim County presidential election results, an anonymous user with elevated privileges remotely accessed the county’s Election Management System (EMS) and modified the database. This incident proves unauthorized remote access altering the tabulated results. In addition, ballots were found with altered timing marks in blocks 15, 18, 28, 41, and 44. The changes produced a 20% higher rejection rate for Republican ballots, routing them into adjudication where votes could be manually altered, switching Trump votes for Biden.

Video Transcript AI Summary
Speaker 0 asserts that there was direct access to the Antrim County election management system (EMS). They claim that on November 5, an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This, they say, constitutes a significant development, proving that the machines were remotely accessed and that access was by an anonymous user with elevated system privileges. Speaker 0 also discusses ballots, referring to black boxes on the side of the ballot, noting that there are 59 such black boxes. They state that forensic images show that in Antrim County, blocks 15, 18, 28, 41, and 44 were intentionally modified. The modification involved altering the height, width, and shape of those blocks with the intention of generating errors. They describe the consequence of such modifications: by modding these specific blocks, they were able to cause rejections for Republican ballots. Specifically, they claim that if a ballot voted for Donald Trump and was fed into the machine, that ballot was rejected at a rate 20% higher than for Joe Biden ballots.
Full Transcript
Speaker 0: We've proved now that there was direct access to the Antrim County election management system because we show on November 5, we can see it in the forensic images, that an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the the database when they were trying to retabulate the election. So that's one huge, huge development, because now we prove that the, machines were remotely accessed. And more importantly, they were remotely accessed by an anonymous user who had elevated privileges in the system. That is pretty damning for the the the non forensic reviewers out there or people who do not want a forensic audit. And the other thing probably is equally explosive. Everyone's seen ballots before like these ballots here. On the side of the ballot, there's these black boxes. There's 59 black boxes on the side of the ballot. We now see within the forensic images that in Antrim County, those blocks blocks fifteen, eighteen, 28, 41, and 44 were all intentionally modified. The height and the width, the shape of those blocks were intentionally modified in order to generate errors. What does an error do? In this case, by modding modifying those specific blocks, they were able to cause rejections for Republican ballots. Meaning, if you voted for Donald Trump and then put your ballot in the machine, your ballot was rejected at a at a rate of 20% more than, Joe Biden ballots.
Saved - February 14, 2026 at 6:38 AM
reSee.it AI Summary
I claim that 130,000 to 280,000 completed ballots were shipped from Bethpage, NY to Lancaster, PA to steal the 2020 election. I say ballots should never cross state lines. I allege these fraudulent ballots aimed to overturn Trump’s 700,000 vote lead in PA, with 75% counted before swing-state sites were shut down to produce enough ballots to steal the election from Trump.

@TheSCIF - The SCIF

130,000 to 280,000 completed ballots for the 2020 election were shipped across state lines from Bethpage, New York to Lancaster, Pennsylvania to steal the 2020 election. There is no reason completed ballots should ever be transported across state lines from one state to another. These were fraudulent ballots to overturn Trump's massive 700,000 vote lead in PA with 75% of the votes already counted before they shut down swing state locations to produce and tabulate enough ballots to steal the 2020 election from President Trump.

Video Transcript AI Summary
A series of witnesses describe a large-scale movement of ballots from New York to Pennsylvania, claiming that hundreds of thousands of completed ballots were shipped and later disappeared. One witness asserts that “130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared.” The narrative emphasizes that the ballots were transported in a trailer from New York to Pennsylvania and subsequently vanished. Another witness recounts events on October 21, describing “a series of unusual events that cannot be a coincidence.” This person says, “I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania.” While initially believing the task was beneficial for the presidential race and feeling it was “cool,” the witness later reflects, upon things getting weirder, on why they were driving “complete ballots from New York to Pennsylvania,” and states that they decided to speak up about it. A third participant broadens the scope, estimating “It could be a 144 to over, to a quarter million ballots.” This witness adds that the investigation indicates “there was a number, as in like a bunch of different trucks which engaged in this.” Reflecting on the potential impact, they note the magnitude of votes that could appear “the night of the election after midnight,” suggesting that an “artifact” would be necessary to explain this phenomenon. They further state that, when something is impossible to reconcile, “whatever remains must be the truth.” They claim that “the truth is ballot showed up. They were counted. They do not match necessarily the records of who should have voted,” and that “in some instances, the stats don't add up, and we continue to analyze that.” Collectively, the speakers contend they have evidence of “a massive transfer of of completed curated ballots ready to be injected into counting centers.” The statements emphasize a coordinated movement of completed ballots from New York to Pennsylvania, the disappearance of the ballots and their trailer, and allegations that ballots appeared, were counted, and did not necessarily align with expected voting records, with ongoing analysis indicating a substantial, orchestrated transfer intended to inject ballots into counting centers.
Full Transcript
Speaker 0: This evidence demonstrates, and it's through eyewitness testimony that's been corroborated by others through their eyewitness statements, that a 130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared. Speaker 1: What happened on October 21 was a series of unusual events that cannot be a coincidence. I know I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania. At first, I didn't think it was a big deal. In fact, I thought it was really awesome. I was I really did. I was like, sweet. I'm doing something for the presidential race. You know? This is cool. But as things became weirder, I got to thinking and wondered why I was driving complete ballots from New York to Pennsylvania. I didn't know I didn't know why, so I decided to speak up. And that's what I'm doing today. Speaker 2: It could be a 144 to over, to a quarter million ballots. Let me tell you a little secret. Part of our developing investigation indicates that Jesse wasn't alone. There was a number, as in like a bunch of different trucks which engaged in this. So when you think about the magnitude of potential votes showing up the night of the election after midnight, you have to have an artifact. So if you eliminate the impossible with all things being equal, whatever remains must be the truth. The truth is ballot showed up. They were counted. They do not match necessarily the records of who should have voted. In some instances, the the stats don't add up, and we continue to analyze that. With that said, I believe beyond a shadow of a doubt, we have evidence of a massive transfer of of completed curated ballots ready to be injected into counting centers.
Saved - February 13, 2026 at 5:14 AM
reSee.it AI Summary
I report that ballots from Runbeck arrived for more than a week after Arizona’s 2020 election. A worker testified ballots kept coming after Nov. 10 via front and back doors, with unknown quantities or origins, despite access to voter books. Runbeck prints, mails, fills, and counts ballots off-site, partnering with Dominion and ES&S for machine compatibility. Arizona needed about 2.5 weeks after the election to count all ballots because that was the time to produce enough ballots to overturn Trump’s landslide.

@TheSCIF - The SCIF

Trucks of ballots arrived from Runbeck for over a week after Arizona's 2020 election. A worker testified ballots kept coming after Nov. 10 via front and back doors, with unknown quantities or origins, despite access to voter books. Runbeck prints, mails, fills, and counts ballots off-site without oversight, partnering with Dominion and ES&S for machine compatibility. Arizona needed an extra 2.5 weeks after the election to "count" all the ballots because that's how long it took to produce enough ballots to overturn Trump's massive landslide in the 2020 Election.

Video Transcript AI Summary
- The discussion centers on ballot processing in Maricopa County, with several shipments arriving after the initial belief that counting was near completion. Speaker 0 notes that the Wednesday before the Friday they quit voting, and ten days before they quit tabulating, more truckloads of ballots came in, leading to the question: “how can you not know how many ballots are still out there?” - Speaker 1 asks for clarification: “They thought they were done.” The conversation confirms multiple times that those running the counting rooms believed they were almost done, or would be done, on Wednesday morning, then Thursday morning, then Friday morning, and the process extended into the next week. - Trucks bringing ballots arrived on the third, fourth, and fifth days, continuing throughout the last week. The last day mentioned is the tenth, with ballots still arriving. The company involved is Runback, described as doing high-speed scanning and printing of duplications and military ballots. There was no observer presence at Runback, and Speaker 0 indicates she had not been called to work there; she does not know exactly what Runback was doing (printing vs. scanning). - It is stated that all high-speed scanning occurs at Runback, and the ballots go to Runback. There is uncertainty about off-site scanning and whether Dominion equipment was involved. Speaker 0 clarifies: “They were duplications, the ballots that wouldn’t read through the tabulation machines. They were ballots that came in from military and overseas.” The number of additional sources for ballots beyond military/overseas is unknown, and Speaker 0 suggests this is a question for county employees to explain. - About the counting process: Speaker 0 confirms that the ballots went through tabulation machines and that adjudication work took place for those late arrivals. They observed the ballots being processed, but did not know the exact totals for certain days. - Daily volumes are described. Speaker 0 estimates: one day a shift might handle 90,000 ballots, and some days had similar volumes across three shifts; other days had fewer. There were days when as few as 15,000 ballots were processed. The “back door” arrivals are contrasted with the front door, with Speaker 0 noting that all back door ballots were received through back entries, not the front door. The remaining ballots in the latter part of the period continued to come in and be tabulated, with ongoing full-time shifts through the eighth, ninth, and tenth days. - The episode concludes with Speaker 1 seeking further explanation, and Speaker 0 indicating that some of the details were not fully known and that a county employee should clarify where the incoming ballots came from during the latter part of the period.
Full Transcript
Speaker 0: Good. But I will tell you what you just said triggered another thought. The Wednesday before the Friday that we quit voting so ten days before they quit tabulating, they thought they were done. And then more truckloads of ballots would come in. I'm like, how can you not know how many ballots are still out there? Speaker 1: Mr. Chairman, I'm sorry. Would you repeat that? They thought they were done. Speaker 0: They thought they were done. Speaker 1: And then there was Multiple times. There was what? Speaker 0: Multiple times. The people that were running the rooms thought they were done, or almost done, or were going to be done Wednesday morning, then Thursday morning, then Friday morning. And then it went on the whole next week. And I'm like, I asked the question, I'm like, you don't know how many ballots are still left to come in? So I don't know who does, again, process project management. Speaker 1: Zero. On that point, ma'am, I'm tracking with you. But what day did the truck show up? Thank you, Mr. Chairman, because what I heard the first time, what I is a truckload of ballots showing up. Okay, just a minute. I want to make sure that we capture this properly. So there were trucks that showed up on the third, and then the fourth, and then the fifth. And how long did that go on? How many I wasn't Speaker 0: there the whole last week, Speaker 1: but I know as long you can recall. How many days? Speaker 0: My last day was the tenth, and they were still coming in. Speaker 1: Trucks. They're Speaker 0: coming from a company called Runback that does the high speed scanning and printing of duplications and, I think, the military ballots. And I'm getting out of my comfort level here talking about this. I don't know what they're doing, but those ballots were coming in from a high speed scanning company called Runback that apparently, you haven't heard of Runback? Speaker 1: No, I've heard of Runback, ma'am. What I'm trying to figure out is whether they printed them or they scanned them. And if they scanned them off-site, to what purpose? Speaker 0: I can't tell Speaker 1: you Because wasn't that your job to scan them? Well, not your job, but Yeah. Speaker 0: No. No. All the high speed scanning happens at Runback. So those ballots go to Runback. As far as I know, there were no observers there. I don't know. I never got called to work at Runback. That's all I can tell you. Speaker 1: Okay. With all due respect, Mr. Cook, now we've opened up a whole new can Oh, of Speaker 0: yeah. And again, we don't know enough about it to be the witness. Speaker 1: No, fine. Your observation is useful here. So what you're telling me I'm going to play this back to you a second. The scanning wasn't actually done on-site at Maricopa County structure. It was done someplace else. Speaker 0: Where they have very high speed scanners, yeah. Speaker 1: Well, now, I really don't care what the speed is. I want to know, were they Dominion scanners? Speaker 0: They were No, no, don't think it has anything to do with Dominion. Speaker 1: So I'm trying to understand. What was the purpose of scanning them in advance of them being tabulated on the Dominion equipment? Speaker 0: They were duplications, the ballots that wouldn't read through the tabulation machines. They were ballots that came in from military and overseas. But there were more ballots than that. So I don't know where the rest of them were coming from because they kept bringing trays of them in. So I don't know where they were coming from. That's a question for the county employees to explain to you where those ballots came from that whole next week. I don't know where they came from. Speaker 1: Mr. Cook, are you done? Left. Oh, I'm sorry, Mr. Cook. Speaker 2: Just like that. Mr. Giuliani. So you were there from the third until the tenth? Speaker 0: Yes. Speaker 2: Okay. So seven days later, ballots were still coming in. And were those ballots counted? Speaker 0: Yeah. I watched them go Speaker 2: through Did you observe them being I watched Speaker 0: them go through the tabulation machines, and I watched people working on the adjudication of those Speaker 2: And how many ballots? Speaker 0: Oh, I don't know. Speaker 2: What was the largest number you saw in any one day? Speaker 0: Oh, man. Speaker 2: No, just a guess. How many cartons? Speaker 0: Okay, there was, wasn't there, like, there was usually two or three shifts. So I want say one day they thought 90,000 was a good number. Speaker 2: So one day was Speaker 0: For a shift. And if they were running multiple shifts. Speaker 2: And which day was that? One of the middle days? One of the end Speaker 0: was in the middle, probably. Speaker 2: Somewhere in the middle between the third and the tenth? Yeah. 90,000? Speaker 0: Yeah. Speaker 2: And then other days, it was approximately the same or Speaker 0: Some some were less, some were more. So some days when they had the three shifts well, never had three shifts tabulating. Sorry. They just would run Speaker 2: a Sure. No. That's okay. Speaker 0: Just They Speaker 2: would run a Speaker 0: lot long tabulation shifts. Speaker 2: What was the lowest number, you think? Speaker 0: There were some days when maybe there was only 15,000. Boy, Not hold me to these numbers, because I Speaker 2: Was that toward the end? Speaker 0: No, that would have been earlier. To the beginning? Yeah. Speaker 2: In other words, there were more ballots at the end than the beginning? Speaker 0: There were ballots. They were backing up was what I would say. And what about Not more coming into the building, necessarily, but there's a room that we could see with rows and rows of bins Speaker 1: of ballots. Speaker 2: These were coming in a different way? Speaker 0: Yes. I don't know. Speaker 2: They're coming Speaker 1: in the Speaker 2: back door. Speaker 0: Some come from the mailbox or from the Postal Service. They all go through. They get the signature verified. Then they get separated from the envelope. And then they end up somehow in the room that I Speaker 1: was in. Speaker 2: So if I understand this correctly, ballots were coming in two different ways? Speaker 0: At least, yeah. The front Front door, back door. Well, think they were all the back door. Speaker 2: Oh, they Speaker 1: were all the back door. Speaker 0: All the back door. None came in the front door. Speaker 2: But this group was 15,000 for a low, 90,000 for a high. And then those last couple of days when you were there, the eighth, the ninth, and the tenth, how many Speaker 0: It was pretty average. They were still running full time Speaker 2: Like 90,000? Speaker 0: Shifts. Yeah, probably 80 to 70 to 80, maybe. Speaker 2: Wow. Anybody explain them? Explain. Did anybody explain what they were? Speaker 0: I did not ask every time. I asked a few times. So I understand some of them. Speaker 1: Senator Allen.
Saved - February 13, 2026 at 3:49 AM
reSee.it AI Summary
I read Epstein documents showing a 2011 email from Barry Josephson to Epstein about a question asked to Bill Gates, “how do we get rid of poor people as a whole,” with Josephson offering a response. It suggests Gates and Epstein discussed lowering the poor population, linked to Gates’s Covid vaccination push.

@TheSCIF - The SCIF

Epstein documents expose a 2011 email from Hollywood producer Barry Josephson to Jeffrey Epstein. In it, Josephson writes: "I've been thinking a lot about that question that you asked Bill Gates, 'how do we get rid of poor people as a whole' and I have an answer/comment regarding that for you…" It is Josephson referencing a supposed earlier conversation between Epstein and Gates discussing how to get rid of the "poor" population. And you wonder why Bill Gates was pushing the Covid vaccination so hard... They want to lower the population. You should clearly understand this by now, especially after experiencing what happened during Covid and what we know now.

Saved - February 12, 2026 at 1:02 PM
reSee.it AI Summary
I believe there’s a secret D.C. underground of elite child trafficking run by the world’s wealthiest and most powerful. The Epstein documents confirm horrific abuses of children. What does this say about the world and its rulers? The question remains: what are we going to do about it? Life isn’t only about solving problems, but this is one horror you can’t ignore—the trafficking, torture, and sexual abuse of children. It’s time to wake up.

@TheSCIF - The SCIF

There is a secret D.C. underground of elite child trafficking being run and operated by some of the wealthiest most powerful people in the world. The Epstein documents have just confirmed some of the darkest most horrific things being done to children that many have been trying to tell you for years... What does this tell you about the world we live in and about the ones who rule over us? The most important question of all still remains... "What are we going to do about it?" Life is about way more than just going around solving one horrible problem after the next, but this is one of those horrible things that you just can't ignore, or let slide. This is the trafficking, torture, and sexual abuse of children, and in my personal opinion, the worst thing that you could ever do. It's time to wake up.

Video Transcript AI Summary
The transcript centers on allegations surrounding James Alifantis, a DC figure described as an avid collector, prolific fundraiser, owner of multiple establishments including Comet Ping Pong, and a close associate of Tony Podesta. The speakers present a stream of claims and testimonies that connect Alifantis to alleged pedophilia networks and illicit activity, while also noting the broader context of similar scandals. - The discussion opens with a suggestion that if the speaker were president, they would demand the Anthony Weiner laptop and have it analyzed by the most trusted person in the military, claiming that “there’s a lot that can be prosecuted,” with even NYPD officers reportedly “had to go throw up” after viewing parts of it. - A presenter claims to have found “something new that’s never been reported by anyone” while researching Alifantis, who in 2012 was named by GQ as one of the 50 most powerful people in Washington DC. Alifantis is described as a collector and fundraiser, owner of Comet Ping Pong, and someone who was “personally thanked by Hillary Clinton for what she called his extraordinary talent during her Cooking with Fratelli Podesta fundraiser.” He is pictured with Tony Podesta, who celebrates his birthday with Alifantis almost every year. The speaker notes Alifantis’ prior boyfriend was David Brock, founder of Media Matters, and mentions donations to Pete Buttigieg as shown by the Federal Election Commission, implying ongoing influence in DC. - In an on-record recount, a source named JB, recounting a December meeting, introduces James Alifantis and describes a direct, traumatic encounter: “let’s hear it,” with a person claiming that James Alifantis walked into a restaurant (Carol Greenwood’s) to seek a manager job, and that “James butt fucking this boy in the kitchen,” with the boy’s friend Dylan Greenwood later committing suicide. The speaker asserts the existence of “underground rooms” at Comet Ping Pong, tunnels that go to other places including a building across the street associated with the Clinton Foundation, and states the tunnels go “all over there.” The witness claims to have seen these spaces “below the tie room” and to have witnessed sexual abuse. - The discussion extends to a pattern of alleged illicit activity at Comet Ping Pong, with the witness describing “underground rooms, all that stuff,” and stating that “the tie room” used to be part of that space. The witness claims to have seen a “change” in the venue from a manager-hopeful stage to involvement with funding connected to broader networks. - The narrative references a broader set of symbolism and affiliations: an FBI 2007 bulletin noting a blue spiral-shaped triangle symbol used by predators, and mentions that Comet Ping Pong is described as a “family restaurant with a backroom designated for children's birthdays.” It ties Alifantis’ social circle to art collections tied to Tony Podesta, including artists like Maria Marshall, Margie Gearlinks, Patricia Piccinini, Marina Abramović, and others, and notes Antinous imagery in Alifantis’ social media profile. - The transcript also catalogs a web of social media posts and images: images of children with questionable captions, a “goddaughter” statement, various hashtags such as panda-related themes, “Panda Head Morgan,” and references to “Things That Are Rectangles” interview material about a Portland-based coffins business run by Scott Cummings, along with mentions of death symbolism and disturbing posts, including captions about babies, “let’s hang a baby,” and comments about “priceless” experiences and pizza-themed predation references. - The closing segments reference a Portland, Oregon link—specifically Baby Doll Pizza and Voodoo Doughnut—tied to alleged child trafficking concerns raised by a witness who questioned why adults bring children to the back rooms and suggested a cultivation of protective behavior among perpetrators.
Full Transcript
Speaker 0: So one of the things if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted. In fact, I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 1: I'm fully aware this topic has been covered ad nauseam, but parts of it have been covered terribly, and the aspects covered well have been deleted. But more importantly, while researching, I discovered something new that's never been reported by anyone. Speaker 2: Dinner with American celebrity chef Anthony Bourdain, ABC's Bob Woodruff tonight with how that meal came together. Speaker 1: Initially, this video was structured in a way that debunked the more exaggerated claims from pizzagators and QAnon obsessives, while also shining a light on the facts of aristocratic pedophilia rings. If you think this has only occurred in the Catholic church, I encourage you to read the Dutroux dossiers and the recent findings from an inquiry in the former British MPs who were freely able to sexually abuse children for decades. But I trashed all that as soon as I found what I found. So instead, I'm just going to show you what I discovered while vetting a now infamous yet indecipherable man who in 2012 was named by GQ magazine as one of the 50 most powerful people in Washington DC. James Alifantis is an avid collector, prolific fundraiser, owner of multiple establishments including Comet Ping Pong, and was personally thanked by Hillary Clinton for what she called his extraordinary talent during her Cooking with Fratelli Podesta fundraiser. He is pictured here with Tony Podesta, who celebrates his birthday with Alifantis almost every year. His previous boyfriend was founder of media matters David Brock. And with the Federal Election Commission showing his donations for Pete Buttigieg, it's apparent that Alifantis' influence among the DC establishment remained strong. But why was anyone suspicious of him in the first place? More specifically, why did anyone equate him with something as monstrous as pedophilia? Speaker 3: Okay, guys. Yeah. Yeah. Okay, guys. It's December 17. It's one something in the afternoon here. And I'm with JB. JB's talking to us about who? Speaker 4: James Alafontas. Speaker 3: James Alafontas. Now now JB went to St. Alvin's? Speaker 4: Went to St. Alvin's. Speaker 3: From DC, and he's Speaker 1: got a Speaker 4: storytell Greenwood. Speaker 3: Let's hear it. Speaker 4: Restaurant for Carol Greenwood. Yep. Remember the day James Alphonus walked in the door and asked for a job. Mhmm. Carol's son, 11 years old at the time, friend of mine caught James butt fucking this boy in the kitchen, and that person, his name is Dylan Greenwood, has since committed suicide. I think it was two years ago. Mhmm. James is one of the dastardly worst person in the world. And yeah, they do bad things at Comet. There are underground rooms, all that stuff. Speaker 3: And you've seen that with your own eyes? Speaker 4: I've seen that with my own eyes. Speaker 3: So you've been under below the floor of Comet? Speaker 4: It used to be the tie room. Yeah. Speaker 3: The tie room before it Comet? Yes. Yeah. Yeah. Yeah. Yeah. Right by the zoo. Speaker 4: It's a little farther down from the zoo. It's more in Speaker 3: Not that far. I mean Speaker 4: It's Nebraska. It's all Speaker 3: Connecticut Avenue. Speaker 4: Nebraska and Connecticut. Speaker 3: Right. Speaker 4: Right. Yep. But, yeah, that's a fact. James Alfon is a bad person to this day. Speaker 3: And you met him when he was applying for a job or something? Speaker 4: He was trying to get the manager job with Carol at that restaurant. Speaker 3: How did you get how did you get so much money, that guy? Speaker 4: Probably selling kids and trafficking kids. Speaker 3: And you've been below Common Pizza. You've seen Speaker 4: what it looks like? Seen rooms, and I've seen tunnels that go other places, including underground to the other buildings. Think one was owned by, like, a Clinton Foundation or something across the street. Yeah. But the tunnels go all over there. Speaker 3: They say they go all over the White House, but I don't know. Speaker 4: Don't I know if Speaker 3: they go all Speaker 4: the way to the White House, but that area ended up itself. If they go a mile in that area in any direction, they're hitting some spots. Speaker 3: Okay, man. Thanks for the information. Yep. Nice to see you. Speaker 4: That's what you can do. Hope you can post it. Speaker 3: I will. I'll post it, man. Yeah. Of course, man. This is this is the truth that needs to get out of me. This is first hand information. Speaker 4: Yep. Primary source. Speaker 3: Yeah. Primary source. You've been there. You saw the change. Mhmm. Saw Los Fantos go from wanting a job as a manager to being funded Yeah. By Speaker 4: basically an art student at the Corcoran School, and she employed a lot of those people and wanted to be an arty place, and it got dark. Speaker 3: Yeah. It got dark. Yeah. We're Speaker 1: One reason surrounds the rhetoric of several bands who often performed at comet ping pong. This video shows Amanda Kleinman, keyboardist for a group called Heavy Breathing. In a separate venue, some in the audience appear to insinuate a person's preference for pedophilia. Speaker 3: He likes the world sounds to mollusks. And little boys. And children. I think I was his manager. No. You know that preferences. Speaker 1: Another group is DC punk band, Loud Boys, who we'll see again later. But for the sake of time, we'll end with sex stains. In a 2007 FBI bulletin, one of the symbols with which predators identified each other with was a blue spiral shaped triangle wrapping around itself clockwise. The symbol was so prominent it was etched into coins and rings. This music video is from The Sextanes. Their promotional posters said they were for, quote, all ages. According to Alifantis, Comet Ping Pong is a family restaurant with a backroom designated for children's birthdays. Speaker 3: This is the kids' party room in the back. Birthday parties. Speaker 1: Another reason some were suspicious of Alifantis surrounds his close relationship with Tony Podesta, a former super lobbyist who's had a lifetime friendship with convicted pedophile Dennis Hasturt. Additionally, Tony's art collection. Now any of these works on its own could merely be employing theatrical strategies to inspire insight, but it's when they're all collected by one person that it begins to say more about the collector than the artist's intent. Among those artists who made up Tony's collection included Maria Marshall, Margie Gearlinks, Patricia Piccinini, Marina Abramovic. Speaker 3: I'd like to tell you a story how we in Balkan killed the rats. Kim Noble. Speaker 1: Elephantus' previous Instagram profile picture is of Antinous, a Greek emperor whose influence reemerged in the early 2000s, forming a modern cult that attracted a subculture of LGBT polytheists who worshipped Antinous as a deity. Historian and author Lambert Royston writes, The sculptures of Antinous remain one of the most elevated and ideal monuments to Pederastic love of the whole ancient world. Dictionary.com defines Pederasty as quote sexual relations between two males, especially when one of them is a minor. Whether or not these are good reasons to become suspicious is up to you. Either way, it's for those reasons and because James Elephantis has no children, some questioned why he had so many kids on his Instagram. According to James, he took all the images of kids and infants from other Facebook pages and from family and friends whom he says haven't come forward for fear of retribution. Now, I'm simply going to show you some of those images and give context when necessary. I'm not, however, going to apply sinister interpretations to hashtags, which might seem out of place. If your damning case against James Alifantis includes references to the urban dictionary and arguments for why he might be using them, you failed. If there really is something here, it should reveal itself without argument. Aliphantus said that this is his goddaughter, with her arms taped to a table. Here's a baby in an art gallery, another baby. Now some of these are obviously the same newborn, it appears. But this is a baby doll, and in this image, there's two babies. I had to censor this because it shows a flat chested female whose age is ambiguous. Notice that it's liked by Panda Head Morgan, a name found in dozens of James posts that was very important and we'll get to later. Here's an image of Alifantis' friend Scott Cummings holding a toddler with the hashtag chicken liver. In 2010, the website Things That Are Rectangles interviewed Scott Cummings about his privately owned business in Portland, Oregon called Portland Natural Casket Company. During the interview, Mr. Cummings said, When I was a child, my mother taught classes on death and dying. She would often talk to me about how death is an important part of life and how different cultures have different rituals and burial rites. The interviewer stated, Even the tat on his wrist is death related. He snapped a photo of it. It's a body hanging. Alifantis uploaded this picture of a guy in a panda mask. Here are many other images of panda with the hashtag ComePanda. One of his tags is Panda Head Magazine, which used to be run by a small team of DC bloggers who also made this video, described by makezine.com as a perfectly creepy panda cult film, called Cult Panda, but with a u spelled with a v. Here, James commented murder, another user working on my night cheese, who I'll refer to as wc, commented kill room. Wc owned a workshop in the industrial complex pictured here called the pajama factory, where he, similar to mister Cummings, also built coffins, many of which were child size. WC can be found commenting here to another Instagram user, j blair smith, who uploaded this image commenting, my favorite pedo. J blair smith uploaded this drawing of a woman being hanged and what appears to be a baby statue that's been burnt. User Joshua Ryan v posted these while at Comet Ping Pong. He also played in a low budget independent film called Kill Dolly Kill. Speaker 3: Kill them, Benjie. Kill them. Speaker 1: This is miss summer camp's Instagram, James Alifantis commented sex. Miss summer camp also posted this picture of a little girl holding a watermelon with the end of a tagline saying priceless. He said quote, Priceless isn't the word most people use upon tasting me. A user below named Barrett C responded. He posted on his Instagram a picture of a baby changing station with the C etched out saying let's hang a baby. He also posted an apparent text message saying I put my baby in a slow cooker, it's been burning all day. And in this image uploaded by Barrett, one of the commenters is pizza fucking party who I'll refer to as PFP. PFP uploaded this image of a group of young children picking up either fake or real condoms, fake gold coins, and according to PFP's comment, little vials of alcohol. He also uploaded a bull like meme on a pentagram, a pizza cut into a pentagram, and this photo of him or someone else in front of a van with a logo that says Baby Doll Pizza. As it turns out, the logo is from an actual restaurant named Baby Doll Pizza in Portland, Oregon. The same city where a man named Michael Whelan used to live, who alleges to be a witness to illegal activity there, claiming the owners of Voodoo Doughnuts are trafficking children. Speaker 5: As to why Voodoo Doughnuts and why Portland, Oregon, it's because my question is why are they abusing kids? Then I see kids being brought into the back. Then I'm asking, who are these kids? Who are their parents? And and that immediately drew attention onto me. So when I'm asking why there are adult males and females taking children into the back, when you're confronted with these type of people, other survivors will know what I mean when I say that they flaunt this. They are proud of this. They feel protected in this, and they feel in this. Speaker 3: Sonic Delights of Voodoo Doughnut.
Saved - February 8, 2026 at 3:09 PM
reSee.it AI Summary
I describe how Pizzagate emails allegedly used “food” and “pizza” to disguise talks about child trafficking, released by Wikileaks. I claim Seth Rich, a DNC insider, downloaded the emails and gave them to Wikileaks to expose DNC corruption after the primary was rigged against Bernie Sanders. An ex-NSA employee supposedly confirmed the download came from inside the DNC, not a foreign hack. Seth was killed, police labeled it a botched robbery; some say Podesta/Hillary ties were involved.

@TheSCIF - The SCIF

The Pizzagate emails were originally discovered in John Podesta and Hillary Clinton's emails where secret comms involving "food," especially the word "pizza," were being used to disguise and talk about the trafficking and abuse of children. These emails were presented to the world by Wikileaks, which were originally obtained by a brave American patriot named Seth Rich. Seth Rich found out that the DNC rigged the primary against his favorite candidate, Bernie Sanders. Seth worked for the DNC and had special access. He then downloaded the emails and gave Wikileaks the DNC Podesta/Clinton emails. He exposed the Podesta/Clinton emails because he saw how corrupt his own party was. His perception of the government and his world was shattered when the truth revealed itself and he wanted to expose the truth to the world. An ex-employee of the NSA confirmed that the Podesta/Clinton emails were in fact downloaded from someone inside the DNC and NOT by a foreign nation like they wanted you to first believe. This was found through electronic analysis mentioned in this video. That someone who exposed these emails allegedly turned out to be Seth Rich. A message exposed by John Podesta stated that he supported the idea of "making an example" out of the DNC leaker. Not too long after, Seth Rich was found dead, less than a block from his own home. The cops did not cooperate and immediately closed the case as a botched robbery. The problem is, nothing was stolen, his phone, his wallet, and his watch were all found at the scene. Seth was shot multiple times in the back. Many allege that people tied to Podesta and Hillary had Seth killed to make an example out of him for anyone else planning to leak information to the press to expose them and their corruption. RIP Seth Rich and thank you.

Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.
Full Transcript
Speaker 0: Of DNC staffer Seth Rich who was murdered last summer. A federal investigator telling Fox News that an FBI forensic report of Rich's computer showed he made contact with WikiLeaks through a former reporter and London based WikiLeaks director, Gavin McFadden. The investigator told Fox News, Rich provided McFadden with more than 44,000 emails, nearly 18,000 attachments. Rich was murdered near his DC home on the morning of July 10, but his wallet, his cell phone, his watch not taken. WikiLeaks twelve days later published internal emails showing top DNC officials trading ideas on how to hurt senator Bernie Sanders at the polls and those emails resulting in the resignation of Debbie Wasserman Schultz, who is the chair of the DNC and the DNC's three top officials because of the obvious conclusion portrayed in those emails. Speaker 1: The stuff that you're sitting on, is is an October surprise in there? Do we even know what you're sitting on? Speaker 2: WikiLeaks never sits on material. Whistleblowers go to significant efforts to get us material and often very significant risks. As a 27 year old that works for the DNC who was shot in the back, murdered just two weeks ago for an unknown reasons as he was walking down the street in Washington. So Speaker 1: That was that was just a robbery, I believe, wasn't it? Speaker 2: No. It's there's no finding. So What are you suggesting? Speaker 1: What are you suggesting? Speaker 2: I'm suggesting that our sources take risks, and they are they become concerned to see things occurring like that. Speaker 1: But was he one of your sources then? I mean Speaker 2: We don't comment on who our sources are. Speaker 1: But why make the suggestion about a young guy being shelled in the streets of Washington? Speaker 2: Because we have to understand how high the stakes are in The United States and that our sources are you know, our sources face serious risks. That's why they come to us so we can protect their anonymity. Speaker 1: But it's quite something to suggest a murder. That's basically what you're doing. Speaker 2: Well, others have suggested that. We are investigating to understand what happened in that situation with Seth Rich. I think it is a concerning situation. There's not a conclusion yet. We wouldn't be willing to say a conclusion, but we are concerned about it. And more importantly, a variety of Wikileaks sources are concerned when that kind of thing happens. Speaker 3: This is a guy who is a real Bernie Sanders supporter. Open Bernie Sanders supporter who worked for the DNC. The DNC absolutely rigged the primary against Bernie Sanders. He was aware of this. He was there while this was all going down. So is Donald Brazil. Everyone was aware of it. The guy got fucking murdered after he leaked information to WikiLeaks. If you don't think that's a little weird, what are you looking at? What what what delusional rose colored glasses are you looking at your party from? Do you think you're in some Julie Roberts movie from 1990? This is real shit. Some guy got killed. He was 24 years old. He was a young guy who was very optimistic and had this view of the world where he I mean, the guy fucking wore American flag pants and shirt. There's a famous picture of him with a beer on. I mean, he's a patriot in a lot of ways. He wanted to be involved in the political process. He was very idealistic because he's probably shattered by finding out the party that he was working for was corrupting the democratic process. And because I've said this before, you know, I've been accused of helping Donald Trump win by really wacky people online. Like, by pointing out all the flaws of Hillary Clinton. Like, look, man, you can't ignore that shit because you want one side to win. I've talked about all of his flaws too. There's a lot of flawed human beings that run for president, pretty much all of them. I mean, it's very rare you have someone who's not flawed. Right. Extremely flawed. We're all flawed. But extremely flawed who wants to be the fucking king of the world. It's very rare. Listen, man. I'm not a fucking reputable person. That's what Speaker 4: I try to tell Speaker 3: my people. Political ideologies. I mean, I'm just not. I'm I'm not that well read when it comes to politics. I have my opinions on things. But when it comes to things that are rock solid and clear, like that Seth Rich was murdered and people wanna ignore it, I'm like, what the fuck do you think happened? There's has to be some sort of a disconnect here. When a person is giving information to WikiLeaks that exposes corruption inside the very organization that's responsible for the fucking Democratic party and he gets murdered. And you're like, oh, the conspiracy theories. No. He got murdered. There's no conspiracy. It was a botched robbery. Says who? Says who? Where is his how come his wallet was there? How come his watch was there? How come they didn't take his phone? What the fuck are you talking about that I'm a conspiracy theorist when I just tell you the facts? And this this WikiLeaks thing with Julian Assange is the craziest shit ever when he said there's consequences to sharing information with us. He works for Russia now. He works for Russia. So isn't it? Was the darling of the left when Obama was in office. Speaker 4: So isn't that amazing? If that's so Julian Assad, he's just a great news guy with who's tough as nails. Speaker 3: He's can't leave. He's stuck in the Ecuador Speaker 4: embassy forever. That case was so fucked. So fucked. So fucked. He he's been so fucked. And it's because the CA wants him so bad and they control everybody. And now they're try they they have influence over Ecuador and they're trying to fuck. They're trying to get a Halliburton guy to be their new anyway. Speaker 3: They might just blow up that place. Speaker 4: I think the gas leak. Speaker 5: No doubt. Right? I wouldn't Speaker 4: be surprised if shit like that. Speaker 3: And more stuff comes out like the Seth Rich stuff, the amount of people and I this is where I leak any conspiracy. The amount of people connected to Hillary Clinton organization, the Clinton Foundation, to Bill Clinton, the amount of people that have been heist is stunned. But then Some of them are bullshit and coincidental, and, you know, people, and they're in a weird job, and people get go there's a lot of people that have been killed. A lot. Speaker 6: The timing is so interesting here. The week that this breaks on Fox News in a story they later had to retract and acknowledge was didn't meet their editorial standards. Sean Hannity is shouting it from the rooftops. What's going on that week? It's the week that Mueller is appointed. It's the week Comey is fired. It's when the Russia story is blowing up. What better way to deflect from the Russia story than to point the finger at this, you know, this guy in Washington who was shot in an armed robbery. It wasn't the Russians. It was Seth Rich. Speaker 7: I would, firstly address the, the DNC data that was posted by WikiLeaks, and that clearly showed evidence of a property called a file a fat format file. That's the file allocation table, format, meaning every time it's it's reading, it's it's a program and a software used to read data to a storage device, either a thumb drive or CD ROM, something like that. And as it does that, it changes the last modified, time on each file to the nearest even second. Okay? It's just a function of that program. So when that occurs, all those times, last modified are changed on all the files. So when we looked at all the DNC, emails from the twenty third, twenty fourth, and May 25, all of them ended in emails. So, and that was 500, probably a little more than that. I didn't count also. But it that means that the the random chance of that occurring would be one chance in two to the five hundredth power. In other words, one chance in a one followed by over a 150 zeros. Meaning, it's obviously, that was a a factor that proved that that program was used to do that, the program that does it is FAT, file allocation table formatting. So, that that says that that data was downloaded to a physical device, either a thumb driver or CD ROM, and then transported physically before WikiLeaks could publish it or put it on the web. So that that said to us that it wasn't it wasn't a hack from Russia. It was an inside job or somebody close in that downloaded the data to the to the to a storage device and then took it physically. Speaker 6: That's what you know, that was the whole subtext of what Sean Hannity was pushing that week. And who does he have on? Jay Sekelow. Didn't say it at the time. Sekelow had just been named as Trump's lawyer in the Russia investigation, and he's saying what is he saying on Fox News? This undercuts the whole Russia narrative. That was the message they were pushing. Speaker 8: So the predicate for all of this, I think, and maybe even earlier, but to my knowledge, late in the '16 with the hacking of the DNC and the emails from the DNC, And the FBI never investigated it, never investigated the actual, you know, the physical removal of this data from their servers instead of a company called CrowdStrike, which worked for the Democratic Party, did. And then exactly at that moment or right around that moment, a DNC staffer was killed in Washington, DC in an apparent robbery in which nothing was taken from him that I happen to know for a fact the MPD, the Metropolitan Police Department, thought was, like, bizarre, and they kind of didn't believe it. A Fox News host went on air and asked questions about this killing. Why wouldn't you? And the parents of the man who was killed either sued or I think they sued. They certainly threatened to sue and basically scared the crap out of everyone. So no one's ever asked a question about it since. Speaker 9: They hired a private investigator who looked around in that case, I remember, and there were there were some odd details there. The FBI ended up in possession of his laptop then Speaker 1: Why ended up Speaker 8: did the FBI wind up in I mean, this is a local crime. Right? Speaker 9: Yeah. This was one of the first reasons I started to look at that case because I got a call from somebody about that. And, you know, I don't know why that was the case, but it is the case. But Speaker 8: And there were people at the DNC, one of whom I know, who thought that he was murdered for political reasons. At the DNC. A very high ranking person at the DNC told me that, and I probably should just say, but I everyone can guess who it is who's informed on this, but I don't want to betray confidence, but I'm I'm not making this up. Mhmm. And I don't know what happened, but like, as far as I know, not one person has looked into that in the media. Speaker 9: No. And, you know, even if it is just an unsolved murder of a type that they normally solve, The whole situation, that whole timeline was very strange. It doesn't really make sense. The hacking of the DNC, the bringing in of CrowdStrike, the when the information was released online. They never really proved that case, but they immediately made inferences about it. And there was an incredibly sophisticated kind of public campaign to create this narrative that, you know, upon closer examination, turns out not to be true. So we gotta go back and find out what did exactly happen there. Speaker 10: On 11/01/2016, Hillary and Bill Clinton and their entourage of assistance affected a civilian coup. In contrast to the usual concept of a coup where the military is involved and takes over the White House and communication centers, very much like the scenarios you see in a movie. This coup was done silently and very effectively through two methods, corruption and co optation. The Clintons have been involved in co opting our White House, our judiciary, our CIA, our Federal Bureau of Investigation, our attorney general Loretta Lynch, and our director of the FBI, James Comey, for some time now. What they've done is to make sure that they were part and parcel of a group of people who were interrelated through political cronyism. However, in order to stop this coup, we in the intelligence community and others involved have informally gotten together, and with their permission, I am beginning to announce that we've initiated a counter coup through Julian Assange and WikiLeaks. What has happened in effect when, Comey had to open up the case of Hillary Clinton and discuss the emails that were involved with the Anthony Weiner case. It was not the case itself that was as important as the fact that this was the entree for many of us in the counter coup to say to the administration, we have your number. Not only do we have your number, we're going to stop you from making Hillary the president of The United States. And at the same time, we will convict and indict the president of The United States, Loretta Lynch, and many others who were involved in the cover up of the massive corruption that occurred under the Clinton Foundation. Now in both cases, their coup was silent, and our counter coup was silent. And it was all transgressed or occurred on the Internet. And this is probably the first time in the history of any country where a coup was initiated on through the Internet and a counter coup was initiated through the Internet. I am just a small part of something far bigger than myself. It was the brave men and women who were in the FBI, the CIA, the director of intelligence, the military intelligence, and men and women in 15 other intelligence organizations who were sick and tired of seeing this corruption in the White House and the Justice Department and in the intelligence system, and we decided that there was something we had to do in order to save the republic. So we initiated a counter coup through Julian Assange, who's been very brave and and really quite formidable in his and his ability to come forth and provide all the necessary emails that we gave to him in order to undermine Hillary and Bill Clinton. Again, America, we're going through a major, major transition and, quite frankly, a second American revolution. We do not have guns. We do not have weapons. We do not intend to kill anybody. We do not intend to harm anybody. But we, the American public, and those of us who serve as veterans and in an intelligence service like myself, will stop the Clintons from assuming power that they don't deserve. At the same time, we will make certain that Obama leaves without any trail of a, pardon or any other act of treason. In effect, we want a peaceful transition in this great American republic. I bring you this news, and I want you to understand what has happened. A moment of history is occurring right now in front of us, and I'm proud to explain it to you.
Saved - February 4, 2026 at 4:19 AM

@TheSCIF - The SCIF

All of these mainstream media reporters constantly wrote articles declaring pizzagate was fake. Coincidentally, all of these same reporters were arrested and charged for rap*ng and sexually abusing children. Some of the victims were toddlers. There are NO coincidences. https://t.co/OfgF3huBte

Saved - February 2, 2026 at 9:31 AM

@TheSCIF - The SCIF

The Weiner laptop is one of the most important pieces of evidence next to the Epstein documents that has enough evidence on it to bring down some of the most wealthy, powerful people in the world, including Hillary Clinton, and the U.S. government itself. https://t.co/9v5q9y5tMC

Video Transcript AI Summary
The discussion centers on a set of interconnected rumors and reported events involving Hillary Clinton’s private email server, Anthony Weiner’s laptop, and a wave of NYPD suicides, with the following key points emphasized by the speakers: - The FBI is reopening its investigation into Hillary Clinton’s email scandal after the Wall Street Journal reported that 650,000 emails are on Anthony Weiner’s laptop, and thousands of those may involve Clinton’s server because Weiner was married to Clinton aide Huma Abedin during Clinton’s tenure as secretary of state. It is noted that Clinton “bleached and deleted 33,000 emails after receiving a congressional subpoena” to cover up her crimes. - A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, became the focus of new inquiries into Clinton’s use of a private email server. Sources say there could be as many as 650,000 emails on the computer, with metadata suggesting thousands could have been sent to or from Clinton’s private server. The laptop’s significance is tied to its potential connection to Clinton’s emails. - It is asserted that Anthony Weiner’s laptopsite had kill switches, and that the laptop had not previously been discussed in the Clinton email probe. Weiner’s communications with a minor are described in detail, including an exclusive interview with Inside Edition where a 15-year-old girl recounts sending a message to Weiner in January 2016, which escalated to obscene messages. - The exposure of those messages is linked to the FBI’s investigation; it is claimed that Weiner’s laptop revealed emails from Hillary Clinton to Huma Abedin, and that the FBI’s review of the Weiner laptop led James Comey to reopen the investigation into Clinton’s use of a private email server just days before the presidential election. The girl’s identity is being withheld due to being underage, though her father allowed her face to be shown. - Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators discuss the October 2016 Comey announcement reopening the investigation as potentially politically motivated or an attempt to cover prior inaction, with some asserting that the NYPD would have disclosed additional information if not for the FBI’s handling. - The NYPD reportedly found numerous Clinton emails, Clinton Foundation emails, and Huma Abedin’s emails on Weiner’s laptop, along with state department correspondences and other material, described as damning criminal information involving Hillary, her circle, and other Democrats. It is claimed they faced pressure to go public if the FBI did not reopen the investigation or pursue timely indictments. - Beyond the Clinton emails, the conversation includes sensational allegations of sex rings and criminal activity, including a claim that Hillary traveled to a place described as “sex island” with Jeffrey Epstein; Bill Clinton allegedly visited there many times. There are allegations that the material included “insurance policy” files and other damning content. Officers who reportedly reviewed the material allegedly suffered trauma and were said to have died, though specifics and verifications are disputed. - The dialogue notes that there were 12 individuals who saw Weiner’s laptop; it is claimed nine of those who viewed the material died, though one speaker later remarks that none of the 12 are dead. Additional reporting mentions a NYPD deputy chief, Steven Silks, who allegedly oversaw evidence from the Weiner laptop and died by suicide, with speculation about copies of the laptop being held by police brass. The discussion suggests that if the FBI hadn’t pursued the matter, there would be broader revelations. - Other speakers reference an influence of the Weiner laptop on broader investigations and imply that the material could have substantial legal consequences, including potential prosecutions.
Full Transcript
Speaker 0: We never thought we were going to say thank you to Anthony Weiner. Speaker 1: The FBI is reopening its investigation into Hillary Clinton's email scandal. The Wall Street Journal reports 650,000 emails are sitting on Anthony Weiner's laptop. Thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. Speaker 0: To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. Speaker 2: A computer used by former congressman Anthony Weiner and his estranged wife, Huma Avedin, is now the focus of new inquiries into Hillary Clinton's use of a private email server. Sources have told the Wall Street Journal's Devlin Barrett that there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that missus Clinton used while she was secretary of state. Why is this one laptop now so significant? Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. Speaker 2: Who sees from Weiner as part of an investigation into whether he sent sexually charged emails to a teenage minor. The laptop hadn't previously come up in the Clinton email probe. Speaker 4: Did he know that you were only 15 years old? Speaker 5: He did. Speaker 4: Her age was no deterrent for Carlos Danger. In an exclusive interview with Inside Edition, this minor says she first sent disgraced Queens Congressman Anthony Weiner a message on Twitter back in January 2016 when she was just 15 years old. Speaker 5: I just sent him a nice message, just hello. I'm a huge fan. Speaker 4: She says she wanted to see if he was up to his old antics during last year's presidential election. Turned out, he was. Speaker 5: I knew that it was going downhill and really fast. Speaker 4: She says the messages from the Democrat quickly turned obscene. I was Speaker 5: disgusted. That's part of the reason that I came forward. Speaker 4: At the time, Weiner's wife, Huma Abidine, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Aberdeen. That led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server while secretary of state, just days before the presidential election. Inside Edition says it's withholding the girl's name because she's underage, but her father gave permission for her face to be shown. Weiner went on to plead guilty to a charge of transferring obscene material to a minor. Speaker 6: Just striking about this is that, you know, announcement from James Comey in October 2016, you know, kind of saying that the investigation was being reopened here. Some people say that cost Hillary Clinton the election itself. But when we look at that incident and, you know, not with this all this other information we have, what jumps out to you about that? Speaker 7: That was Comey trying to cover Comey because they knew they hadn't done what they should have done with the Wiener laptop and the New York Police Department who were honest were gonna disclose all that. He just simply had to do it to try to save his own skin. Speaker 8: Because of Wienergates and the section scandal, the NYPD started investigating it. Through a subpoena, through a warrant, they searched his laptop and sure enough found those 650,000 emails. They found way more stuff than just the, more information pertaining to the the inappropriate texting the guy was doing. Speaker 7: 675,000 Clinton emails when they got Anthony Weiner's laptop in a search warrant because of all his sex perversion issues. It was all the Clinton emails, the Clinton Foundation, her secretary of state emails, Huma Abedin's emails. Lots of people emailed Huma as a proxy for Hillary. Speaker 8: They found state department emails. They found a lot of other really damning criminal information, including money laundering, including the fact that Hillary went to this, sex island with convicted pedophile Jeffrey Epstein. Bill Clinton went there more than 20 times. Hillary Clinton went there at least six times. The amount of garbage that they found in the emails of criminal activity by Hillary, by her immediate circle, and even by other, Democratic members of Congress was so disgusting. They gave it to the FBI, and they said, we're going to go public with this if you don't reopen the investigation, if you don't do the right thing with timely indictments. Speaker 9: We're not talking about one or two emails. We're talking about hundreds of thousands of emails. Speaker 8: NYPD was the first one to look at that laptop. Speaker 7: I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 10: Somebody sent it to me. I I would not advise you to have a look at it. She and her spokeswoman, they put a five year old girl naked on a table, bind it, And then with a scalpel, they start to remove the face. Speaker 0: Oh my Speaker 10: god. Then you hear this child screaming, screaming, and they take off the face. And Hillary Clinton puts it on her face and goes to the child. And you see, the child is all flesh, and then the eyes pour out, and this child sees her own face on the face of Clinton. I will never forget that image, and I I never scream. That's how evil these people are. Speaker 3: Supposedly, nine cops watched the videos on on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. Speaker 11: There were a total of 12 individuals who saw Anthony Winner's laptop computer. None of those 12 people are dead now. Speaker 12: Some sad news tonight. Another New York City police officer has taken his life. The second NYPD suicide in two days. Speaker 0: Well, Corey Tamsen, you know, with the latest suicide, the eighth this year, the sixth, just the last two months alone. Speaker 13: Another New York police department officer has died by suicide, becoming the ninth to do so this year. According to a law enforcement official, the 56 year old officer was off duty and at home. On Tuesday, another law enforcement official told CNN that an eighth officer had died by suicide. A 35 year old Speaker 9: Robert Escheverria died of a self inflicted gunshot wound at home last night. The 25 year veteran officer suicide came a little more than twenty four hours after a 35 year old officer took his own life. Commissioner James O'Neill is still struggling with the news. Speaker 0: You know, you think that, okay, this is gonna be the last one. And and last night I got a phone call and I just did it. It just almost knocked me down. I just took the wind right out of me. I just, you know, you know, what the hell is going on here? Speaker 9: So far this year, there have been nine NYPD suicides, seven since June. Last year, there were a total of four. We don't know why Nick did what he did. Doug Budney's son Nick, a fourteen year NYPD officer, took his own life last year. I just think it was a bad last decision. Speaker 12: Another NYPD officer has just died by suicide. It's the tenth suicide so far this year. News four's Gus Rosenthal is live at the site of the shooting in Queens. Gus, what can you tell us? Speaker 14: Yes. Renaud, an officer was pronounced dead at Queens General Hospital just a few minutes ago, and now a number of other officers are here trying to figure out exactly what happened. This is the scene at 178th And Union Turnpike in Utopia, Queens. Little known about who this officer was and the circumstances surrounding this. Again, we just know this was an off duty officer with a self inflicted gunshot wound. He was rushed to the hospital where he would pass away just a short while ago. Now leading up to this, as you mentioned, there have been nine previous suicides by active members of the NYPD happening this year in 2019. Speaker 11: Now that is a strange coincidence. Anthony Weiner is alive. Weiner shared the laptop with his estranged wife, Huma Abidine, a close aid to Hillary Clinton since 2000. Speaker 15: NYPD chief commits suicide one month before retiring was directly involved in Anthony Weiner laptop computer evidence handling. A high ranking New York City police department officer has died from an alleged self inflicted gunshot wound to the head. Deputy chief Steven Silks was found in an unmarked patrol car wearing civilian clothes Wednesday evening, just one month before he would turn 63 and face mandatory retirement. He allegedly shot himself in the head with the gun reportedly discovered beside him. He was very closely and heavily involved in the investigation of the laptop seized from the former congressman Anthony Weiner, which allegedly held volumes of Hillary Clinton email evidence on it. A fellow officer told the New York Daily News that Silks was deeply committed to the job Silks reportedly submitted his mandatory retirement paperwork the day before. Other sources, however, say that the deputy chief was heavily involved in the sex crimes investigations of former Democrat congressman Anthony Weiner and that the chief personally oversaw the evidence gathering from a laptop computer seized from Weiner in that investigation. The laptop is alleged to have contained numerous emails from Hillary Clinton during her time as secretary of state and numerous files in a folder titled insurance policy, which reportedly contain extraordinary details about child sex rings operated by and for use of high ranking government officials nationwide. Ultimately, that laptop had to be turned over by NYPD to the FBI who allegedly lost it. Rumors have circled for years that NYPD top brass took copies of the hard drive because they were suspicious of the feds in general and wanted to make certain that the evidence was preserved. One high ranking NYPD official at the time, the laptop was seized, told media outlets he was sickened by what he saw on that computer. And if the Fed did not pursue the necessary investigations, he would reveal what the laptop contained. It is now believed that deputy chief Silks was that official. No one is confirming or denying that information at this time. So deputy chief Silks was one of the now 10 officers, and he allegedly was the one who oversaw all the information on the Anthony Weiner laptop and made copies. Who else made copies, and who else has the information? Was it suicide? Probably not. Speaker 7: So one of the things if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted, I have no doubt, on that laptop. Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. It was filled with crap that wasn't supposed to be there. We never get to see it. Supposedly, nine cops watched the videos on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. You know, it's like the five cops who died after January 6. Right? Four of them were suicides. Out of according to AI, there were about 80 cops really in the thick of things. Four of them died from suicide.
Saved - February 2, 2026 at 8:55 AM
reSee.it AI Summary
I report that a Michigan 2020 election worker described a white van and two cars arriving at Detroit TCF Center on Nov 4, 3–4 am, with 138,000+ ballots, unsealed, no chain of custody, all 100% for Biden; this aligns with testimony and affidavits and was captured on video. The 2020 election was stolen.

@TheSCIF - The SCIF

Michigan 2020 election worker reports that a white van, and 2 other cars showed up at the Detroit TCF center on Nov. 4th between 3 and 4 am with 138,000+ ballots, unsealed, with no chain of custody, which were all 100% marked for Joe Biden. This report lines up with multiple testimonies and affidavits and was caught on camera. The 2020 election was stolen.

Video Transcript AI Summary
In Downtown Detroit at the TCF Center, a video discussion describes what a caller says happened during ballot processing. The account asserts that after precincts had counted ballots and were ready to close, three vehicles—a van, a Chrysler 300, and a Ferrari—arrived at about 4:00 a.m. with a claimed 130,000 ballots. The claim is that every one of these ballots were Biden ballots that had not been delivered to the precinct before its cutoff, constituting a “big irregularity” and suggesting voter fraud. The speakers say this is being contested by the president in a lawsuit for Michigan, with people who allegedly witnessed the event. Speaker 1 adds that back rooms at the facility enabled cars to drive in through a garage door, and that ballots appeared between 10:30 p.m. and 3:30 a.m. Approximately 38,000 ballots were said to have arrived in that window, with a reported count of 61 ballots described as being in USPS boxes. The boxes were not necessarily USPS-delivered; a white van with the city clerk’s emblem appeared to be delivering them, bearing the name Janice Winfrey and related tagline. The implication is that ballots arrived in an unverified, potentially improper manner. Speaker 2 notes possible additional vehicles present at the time and mentions that a mini panel truck with Detroit Elections Bureau regalia and a vehicle ID number was observed, with other people recording license plate information. The lack of verifiable chain of custody is emphasized: there was no confirmed Republican/Democrat presence during transfer, and seals on ballots were not verified. The speaker contrasts this with a suburbs experience where ballots were methodically processed, sealed, and tracked, implying Detroit’s process lacked similar controls. Speaker 3 explains that Gateway Pundit obtained video of the event after a delay, and that local media personnel claimed the event did not occur. The video shows an escort car and a lead car delivering items inside the facility, with the escort car reportedly from Pennsylvania and possibly a rental. The Michigan group, Patty’s group, counted drop-box ballots and reported about 1,340 to 1,400 ballots dropped in Detroit over the last two days. In contrast, after the shutdown, officials allegedly claimed 16,000 ballots were dropped in, with the question of where those additional ballots originated. Speaker 4 reinforces the Michigan group’s tally of roughly 1,340–1,400 ballots from drop boxes in Detroit in the adjacent period and points to the discrepancy between that count and the 16,000 ballots later cited, noting the eight-hour gap after the official closing time and the two separate deliveries to the TCF Center. The overarching claim is that these events indicate irregularities in ballot handling and raise questions about the source and legitimacy of the large ballot influx.
Full Transcript
Speaker 0: So I'm at in Downtown Detroit at the TCF Center, which is, in the heart of Detroit, in the heart of the D. And, I had a couple of people reach out to me and say, could you do another Facebook Live and explain where you're at and why you're here? You can see behind me that giant room behind me is where they are contesting ballots. So something that's very interesting that happened here in Detroit is, you know, I just talked to a guy that's been here all night. They were ready to shut down the precinct. They had counted all the ballots. Everything was good. Everything went smoothly. And then it was at about 4AM that three vehicles arrived, a van, a Chrysler 300, and a Ferrari with a 130,000 plus ballots. He said he was astonished as they started counting the ballots. He was astonished that every single ballot, like, literally a 100% of that, a 130,000 ballots was, were all Biden ballots that hadn't been delivered to the precinct before, the cutoff time for this precinct. So, obviously, there's you know, that's just a big irregularity, something that points to large scale voter fraud. And literally is being contested by the president of The United States in a lawsuit right now for the state of Michigan. We literally have people that watched it happen. I talked to people that are here. They're like, what? 130,000 ballots that haven't been verified. Speaker 1: In the back, there's a big facility where all the rooms were set up. You go to the back and there's a way that cars could just drive right into the facility, and that was like a garage door that opened and cars were coming in with the ballots. From what I saw, there was not one ballot that showed up from at least 10PM, or let me say at least 10:30 to the 03:30AM when roughly the number that Kohlbeck gave was 38,000 ballots showed up. There were, I counted over 50 different boxes of ballots that showed up all at once at 03:30 a. M. Someone gave an official count of 61. So 61 ballots, they were all in USPS boxes. Weren't it wasn't delivered by USPS boxes. Yes, yes. And it wasn't delivered by USPS necessarily. It was in a van, a white van, that had the city clerk's emblem on it. And the city it said, Janice Winfrey, some tagline. Speaker 2: Some reports indicate that there are two other vehicles there at the same time and I don't know if there's affidavits to that effect. Can say that me personally, I went back there and I witnessed a little mini panel truck if you will with Detroit Elections Bureau regalia over the side. It had a vehicle ID number on it. I didn't capture that but we had other people that captured that information and the license plate number associated with it. It looked legit and inside of it were a and this gets into some chain of custody discussions there's no verification that there is a Republican and Democrat during transfer. We don't know that they didn't take side stops to a nearby Coney Island to pick up a few more ballots from their buddies. We have no way of verifying any of that information. Are you supposed to be able to have that information? We're supposed to be able to have verification all the way along the line. The whole chain of custody we're supposed to be there and because they were not sealed. If they were sealed, all this stuff was sealed and you verified the seal and then when you came to another destination and you see if the seal is still intact, all right that's okay. So that's what the verification is supposed to That's what we're supposed to see. Yeah, when I do it in the suburbs where I was a senator, when I saw that come in, had pretty much a whole army that would get out of the van, get out there, pull up all the data from the precinct, put it into the van under configuration control, everything was sealed up with the tape and put out there. There was probably one of the most egregious aspects of what happened in the city of Detroit at the AV County Board was the utter lack of respect for chain of custody. Speaker 3: And she was working inside the TCF that morning. So we put in a request to get this video. It took months. And we got this at Gateway Pundit. We put this up on our site. We tweeted about it, and that's when we lost our Twitter account, by the way, by putting up this video. There's a lead car, an escort car that comes in. You can see here, each time he hands something to the people inside, and then this van drives in, and they actually came in twice. Now we had local media, one of the top reporters there. I'm not going to mention his name. He said that this never happened. He was there all night. There was no fraud. Nothing happened. So now we have the video of that. What's interesting about this, though, and that's why we included it today, is for one, it'd be wonderful to have some ping data on who these people are driving the escort car, because we found out later this escort car was from I was just thinking that. A Pennsylvania license. So it's a rental car, we believe. But what we found from Patty's group, the Michigan group, is they counted the drop box ballots the last couple of days. And there was only about 1,400 in the area that were dropped off the past the last two days, the ones that they counted. Speaker 4: They've actually watched every drop box and counted the ballots for every single person that dropped a ballot in in Detroit. So they counted the ballots, and that's about the number that they came up with, around 1,340. Speaker 3: Yeah. Thirteen, fourteen hundred. And then, when these were dropped off and they got caught, they came out and said, well, it was just 16,000 ballots. So we're not sure where they got these. This was eight hours after the after the, you know, everything was shut down. You're supposed to have your ballots in at 8PM. You know, eight hours later, they bring this inside the TCF, a big huge drop, and we know now they came in twice with 60 boxes of ballots the first time, another 13 or 12 or 13 the second time. And they're telling us that they had 16,000. We're wondering, because of the work this group in Michigan has done, where did those ballots come from? We have no idea.
Saved - February 2, 2026 at 8:49 AM

@TheSCIF - The SCIF

Michigan secretary of state official caught on video ordering 2020 election volunteers to count ballots that all contained the same signature, even after making her aware of the obvious and apparent election fraud. https://t.co/bHpCDht1tn

Video Transcript AI Summary
The discussion centers on completing an audit of ballots to obtain a count and address concerns about the precinct. The participants emphasize that without counts, they cannot move forward. They insist that the audit piece must be completed first, not an investigation, so that a number of ballots can be established and the overall tally can proceed. Key points raised: - The need to finish the audit to determine how many ballots are in the ballot can, and to move forward with the numbers. “We need to move forward with the audit so we can get the numbers, so we can see how many ballots are here.” - A concern has been raised about the precinct, including the issue of multiple ballots with the very same signature. The team discusses handling this by counting the ballots and later addressing the concern, rather than delaying the process. “we will separate out and count those and add those in. We're there going to be an asterisk saying these ballots have the same.” - There is tension between continuing the presidential race audit and addressing potential irregularities. The instruction given is to complete the audit portion first and then review any issues. “the process right now is for you to put them in the piles where they belong and for the presidential vote and count the presidential votes… finish the presidential race audit, not separate them out, and then we'll move forward from there.” - The officials acknowledge the underlying concern about the precinct and previous issues with county ballots, but reiterate that, at this moment, the priority is to obtain a count and finish the audit. “We understand that there may be possibly an issue with this precinct. We understand that. But what I need for you to do right now is to finish the audit process.” - They clarify that the current activity is not an investigation, and that the aim is to produce a number for how many ballots were in the can when counting began, enabling progress based on the audit results. “This is not an investigation right now… not an investigation, not counting… what I need you to do is complete the audit so we can get a number.” In sum, the participants are focused on completing the ballot-count audit to establish a definitive tally, while acknowledging concerns about signatures and precinct irregularities, and planning to address those concerns after the audit yields a numeric result for the presidential ballots. The priority repeatedly stated is to finish the audit to obtain a count, then proceed with any further review.
Full Transcript
Speaker 0: To test for these. Don't count. Yep. They've got I'll type this up in the bag. Can you tell us what Extra. Okay. Speaker 1: So you don't know what to count here. Yeah. You count. Good. How can you sell? You Alright. So, Dom, Is that right? Yeah. Speaker 0: Well, that's what this was about. Speaker 2: Mhmm. The counts. Because if we don't have the counts, then we can't move forward. And we understand that there is a concern with this precinct, but this is not a time for you to be investigated right now. Speaker 1: Did you find some noise? Speaker 2: No. No. So you need to move forward with the audit so we can get the numbers, so we can see how many ballots are here. Speaker 0: But wait. Then if okay. So when we're done Speaker 1: with the audit, there is still the opportunity to challenge the fact Speaker 0: that we have multiple ballots with the very same signature. Speaker 2: I I don't know if challenge is the right word, but until we get it Speaker 1: we're challenging We'll go ahead and count the ballots. Right. Speaker 2: We need we need we need you to move forward. Speaker 1: But we will separate out and count those and add those in. We're there's going to be an asterisk saying these ballots have the Speaker 2: same And and again, we know that you have a concern with this precinct, and and and as soon when you get done with the audit part of it, not an investigation, not counting, That's not that's not your rule right now this very minute. So what I need you to do is complete the audit so we can get a number of how many ballots were in this can when you started counting, and we can move forward from there. K? So what I what I need for you guys to do right now is to finish the audit process. We'll have Speaker 1: a number. We'll have a number, but we can't operate about Whether valid or invalid. Speaker 2: We'll have That that is not the process right now. The process right now is for you to put them in the piles where they belong and for the presidential vote and count the presidential votes. I we understand that there may there is possibly an issue with this precinct. We we understand that. But what I need for you to do right now is to finish the presidential race audit, not separate them out, and then we'll move forward from there. Okay? But I need you to continue the process right now. Speaker 1: Do you realize that the former state representative has had issues with county ballots that they've been invalidated. Speaker 2: I understand. But until we get a count, we we we need that piece done first. We need the audit piece done because that's why we're here. And we will look at the numbers. K? And and I understand that there may be an issue. And I understand your concerns. So if we can complete the audit piece right now Okay. Then we can move forward. Okay? Thank you. This one with this piece. This is not an investigation right now. Speaker 1: This is a valid
Saved - January 31, 2026 at 8:33 PM

@TheSCIF - The SCIF

New Epstein document states, "George Bush 1" (senior?) allegedly rap*d a male victim (child) and witnessed a type of ritualistic sacrifice. This should tell you everything you need to know about what people were screaming from the rooftops about for years. https://t.co/ZrIxECDtS6

Saved - January 29, 2026 at 6:34 AM
reSee.it AI Summary
I note analysis from the 2020 Georgia election claiming over 40 data points of negative voting or vote switching totaling more than 200,000 votes, with machine learning flagging over 500 precincts and over 1,000,000 corresponding votes for suspicious activity. The post calls the total fraud in the 2020 election absolutely mind-boggling and among the most sophisticated election fraud operations in U.S. history.

@TheSCIF - The SCIF

Analysis from the 2020 Georgia election found over 40 data points where negative voting, or outright vote switching occurred, totaling over 200,000 votes, along with machine learning algorithms, which flagged over 500 precincts, with over 1,000,000 corresponding votes that had suspicious activity in the 2020 Georgia election alone. The total amount of fraud that occurred during the 2020 election is absolutely mind-boggling and one of the most sophisticated election fraud operations in U.S. history.

Video Transcript AI Summary
Linda McLaughlin and her colleagues present a data-focused argument alleging election fraud in Georgia, supported by multiple data analyses and demonstrations. - Linda McLaughlin introduces the data integrity group and states that data is numerical and non-partisan; she aims to remedy a lack of presented data in the discussion. - Dave Labou, a lead data scientist, explains that their analysis across precincts, counties, and the state identified over 40 data points of negative voting or vote switching across candidates totaling over 200,000 votes. Separately, machine learning algorithms used for anomaly detection in fraud detection flagged over 500 precincts with over 1,000,000 corresponding votes showing suspicious activity. He emphasizes that the process is scientific and not tied to political affiliations. - Labou uses a banking analogy to illustrate data integrity concerns: in hypothetical online banking, deposits or withdrawals being redirected or split would indicate fraudulent activity. He applies this concept to voting data, arguing that the voting system data aligns with the Secretary of State data used to certify results, yet exhibits patterns akin to transfers and reallocation not authorized by voters. - He states that the data are publicly available but require advanced programming to extract, parse, and join datasets. Their independent team has made all analysis, programs, and data public to allow replication and has produced videos to translate the analysis for broader understanding. - A key claim is that receiving over 90% in a precinct is a marker for fraud; in Fulton County, more than 150 precincts voted 90% or more for Biden, and in the statewide race (decided by less than 13,000 votes), these 150 Fulton precincts accounted for 152,000 Biden votes, described as a clear indicator of suspicious or fraudulent activity. - Labou and team present a series of visuals and explanations indicating explicit vote count switching, e.g., in Dodge County, where Trump’s votes appear to be subtracted while Biden’s counts increase in tandem with county updates, leading to a shift in totals that would not appear in state totals due to timing of updates. - They reference adjudication as the review of ballots flagged during scanning, noting that only ballots with a contest causing questions about how the computer reads them are adjudicated. - In DeKalb County, they assert it is statistically impossible for nine out of ten voters to vote for Biden in 94 precincts. - They describe a data flow in Fulton County: poll pad check-in, ballot image saved on the machine, SD cards transported to drop-off locations, escorted to a warehouse, run through Democracy Suite, exported to a Dominion server, and inserted into a SQL Server database before transmission to the Secretary of State and data aggregators. - A critical point is the vulnerability within the county update data-entry process: the square box detailing data-entry options in the election software allows updating vote batches, projecting batches, and generating new or temporary batches that can be injected directly into the tally; these options can be validated and published, enabling potential manipulation before server upload. - They pose questions about validation: whether two observers from both parties were present during SD card transmissions and drop-off transmissions, and whether there is a public log of exchanges at drop-off points. They challenge why elected officials have not pursued these questions about voting integrity. - Labou notes the process is machine-to-machine and, by design, should not decrement sums; any decrement requires a robust explanation, and their data suggest negative drops are inconsistent with normal sequential processes. Speaker 2 clarifies the data sources (CITL election night data and Edison/New York Times data) and asserts that the process from poll pads to secretary of state is machine-driven, with no human entry of totals, thereby removing human entry error as an explanation for observed negative changes. Speaker 4 adds emphasis on the validation and potential vulnerabilities in the software options used for election administration, underscoring the need for transparency and inquiry into the electoral process.
Full Transcript
Speaker 0: Based on our extensive analysis across precinct, county, and state voting results, we've identified over 40 data points where negative voting or outright vote switching across candidates has totaled over 200,000 votes. Separately, we've applied machine learning algorithms that are regularly used for anomaly detection of fraud in financial services that flagged over 500 precincts with over 1,000,000 corresponding votes that exhibited suspicious activity. Speaker 1: My name is Linda McLaughlin. I have a background in politics and media. I have an MBA in business, and I am a part of the data integrity group. One of the things that we have unfortunately seen is that no one has presented data. We hope to remedy that this afternoon. I'll be introducing my two colleagues here, Dave Labou and Justin Mealy, both of who are data scientists, and we will look at data. Please understand that data is numerical. It is not partisan. It has no red or blue attached to it. It is just numbers, And numbers is all we need to prove what we're trying to tell you today. Speaker 2: What we have here is we actually have fraud that we can prove in this election. There was fraud in Georgia's election. We can prove it with data. And because we can prove it with data, the will the voting will of the people of Georgia is not reflected in what was certified by the secretary of state. So Dave is our lead data scientist, and go ahead. Speaker 0: I'm Dave Labou, a data scientist with over a decade of experience working directly with structured and unstructured data across a number of industries, specialized in machine learning and more recently artificial intelligence. I've worked with a multitude of data structures in the financial services, telecommunications, and in primary research consulting industries. The analysis we're gonna be reviewing is purely scientific and not based on any political affiliation of red, blue, left, or right. We objectively focus on numbers, data, and machine network systems. Based on our extensive analysis across precinct county and state voting results, we've identified over 40 data points where negative voting or outright vote switching across candidates has totaled over 200,000 votes. Separately, we've applied machine learning algorithms that are regularly used for anomaly detection of fraud in financial services that flagged over 500 cincts with over 1,000,000 corresponding votes that exhibited suspicious activity. So what's important to note here is that in alignment with standard fraud investigations, we've applied a rigorous, systematic, and sophisticated process that has consistently identified data points that other industries, including financial services, would label as suspicious activity or definitively declare fraudulent. So I'll pause and I'll just with this in mind, I wanna make this a little bit more relatable. And if you can take a moment just to think about how your online banking experience works. You probably have a checking, savings, and credit card account all on a single screen. Your online banking is designed so that built into this website interface is a back end connection to a database. And this will store all of your balances, including your with your deposits or withdrawals. So you can review your statement each month confirm that the transactions you made are accurate and true. So imagine now you logged into your account on November 5, and you noticed that there were something to the magnitude of 50 transfers across your accounts. Let's say you even deposited a few checks in the third and fourth, and you expect to see these transactions for each of the individual amounts you deposited. Now instead, imagine your activity reflects these deposits going into your account, then being switched to a checking account, sometimes as an exact dollar amount and other times being broken apart into slices and switched intermittently across different slice magnitudes. Now, is obviously strange in itself and deeply concerning from a data integrity standpoint. Now also imagine that some of these deductions are sent externally, and so the money is leaving your account entirely. You can see the exact amount that it deducted and where it was sent that you did not authorize. So this is what we have identified within the voting system data that has been confirmed to align with the Secretary of State data that's used to certify these election results. The data is freely available to the public, but does require some advanced programming skills to extract, parse, and join these datasets in order bring these types of insights to light. We're part of an independent team that has, in the spirit of transparency, made all of our analysis, programs, and data public so anyone can independently replicate. We've also put out a series of videos that help translate some of our more complicated analysis, which we're gonna play here that will help reinforce the message and maybe a different point of view that will help make these concepts more digestible. Receiving over 90% in a precinct is a marker for fraud. In Fulton County alone, we can see that more than 150 precincts voted 90% or more for Biden. In the statewide race that was decided by less than 13,000 votes, these 150 Fulton precincts alone accounted for a 152,000 Biden votes. This is a clear indicator of suspicious or outright fraudulent activity. Speaker 3: We've scanned a 113,130 as of moments ago. We've adjudicated a 106,000 plus of those. Speaker 4: Adjudication, the process of reviewing a ballot that may have been flagged during the ballot scanning process. Speaker 3: The only ballots that are adjudicated are if we have a ballot with a contest on it in which there's some question as to what how the computer reads it so that the vote review panel then determines voter intent. Speaker 5: In 94 precincts in DeKalb County, it is statistically impossible to have nine out of 10 voters voting for Joe Biden. Speaker 0: We've just seen a few examples of statistical irregularities and impossibilities. Now we'll take a closer look at some vote manipulation within the election database, including explicit vote count switching from one candidate to another. We can see in Dodge County, there's a lot of strange activity going on. The left side of the screen shows incremental votes as they were reported for both election day and absentee. On the right, we can see the total vote counts, which should only be incremental, moving as the county reported in real time. Again, here, we're focusing only on Donald Trump's votes. So this wouldn't necessarily be captured at the state totals as they reported on TV since one county's deduction in votes can be offset by another county's reporting of equal or greater votes. The first question you're gonna wanna ask or already have asked is, why are any bars going negative? And the answer is they shouldn't. Unbeknownst to the general public, votes for Donald Trump were being switched and removed from his total, which often coincided with other precinct updates that simultaneously offset deductions so that they appeared to remain neutral to outside observers. Across the three counties of Dodge, Daughtry, and Putnam, Trump has over 30,000 votes that simply disappear. Here, we have clear visibility of an event that occurred at the county level as we compare two data sources. In this case, Donald Trump reported 29,391 votes at 09:11 local time in Bibb County, Georgia. Simultaneously, Joe Biden was reported to have 17,218 votes. Minutes later, at the next reported time update from the precinct data sources, Donald Trump was reported to have 17,218 votes, and Biden now has 29,391 votes. A clear and exact switch of vote totals between candidates. Because there is a time lag between each state recorded aggregation of county results, this type of switch can go undetected in state reporting as long as it falls after the latest state refresh and before the next state update. Speaker 4: According to the Georgia secretary of state website, Trump lost by 12,670 votes. As you saw earlier in this video, far more than that were taken from president Trump. In statistics, an anomaly or outlier is an observation or event that deviates so much from other events that it arouses suspicions in its generation. In this, an isolation force is defined as a specialized learning algorithm for anomaly detection that works to the principle of isolating these outliers and flagging them for potential review. Remember these graphs when you meet your government officials in person. The burden of proof is on the system to prove our elections were fair and not the people. Okay. So here's how Speaker 2: your vote is counted in Georgia using Fulton County's process as an example. So after you check-in at a poll pad to vote on election day, you go to an image cast precinct terminal. After you cast your vote, a ballot image is saved on the machine. And after all the polls close, the SD cards containing all the ballot images are removed from the terminals and transported by car to, in Fulton County, one of four drop off locations. Then it's transferred by police escort to the 1365 English Street warehouse. Inside of there, it is run through a tabulation software called democracy suite, which counts the ballots and exports the totals to a Dominion server that inserts those totals into a SQL Server database. From that point, it's directly transmitted to the Seidl election night reporting server. The election night reporting server is responsible for transmitting the totals to the secretary of state for output to their website and data aggregators like Edison who then transmit that data to the networks. Speaker 0: As you just saw, there's a standard process for transferring votes by memory card from precinct to county vote aggregators. Now let's focus specifically on this square box detailing the data entry process for county updates. The following options are available to anyone with access to these computers working in the election software, updating vote batches, projecting vote batches, and even more notable, generating new or temporary batches that can be injected directly into the vote tally. Each of these options can then be validated and published into the system. Again, anyone working in the election software at this point has the power to manipulate large batches of votes. And all of this is before the data is even uploaded to the server. Speaker 4: What should have happened during the validation process? Were there two observers from both parties present for the transmission of the SD card? Were there two observers from both parties present in the car when the boats were taken to the drop off locations? Is there a public log of these exchanges at the various drop off points and locations? Why are elected officials not asking these questions about our most sacred right to vote? Okay. Speaker 2: So real quick, just wanna jump in there. And if you can go back to that chart, I wanna reference two things on side there. I'm sorry, the diagram. Okay. So in this diagram here, as I was telling you earlier, we use this CITL source, that election night reporting source. We have their data for all of Georgia. As also, we have the data that comes from New York time or the see the New York time Edison part on the right side there. Right? And for all intents and purposes, that election night reporting is going from there directly to the secretary of state. Right? This is the same data. It's the exact same data. Now the thing is, is that in every single aspect of this chart from poll you know, the poll pad, which doesn't really affect the thing to the the ballot marking device. More importantly, these these actual ballot marking devices on the precincts. When they go to when they're when they are tabulated at the end of the polling period and and the kind of these SD cards are removed or sort of the compact flash drives are removed, They're transmitted by person to these drop off points, tabulated, and so on and so forth. This whole process is a human sorry, a machine to machine to machine transfer for all intents and purposes using humans as a medium, at the same time, you're not having people enter, for instance, into a spreadsheet, these totals. Because you're not having people enter these totals into a spreadsheet, that removes the entire layer and the entire argument for any kind of human entry error because there's no human being entering anything anywhere in here. You can't show me a place where a human being enters stuff in here. Now if there were a human being entering something in there, then that would point to a type of fraud or fraud aspect of this this this whole thing. So the point is is that our data that's showing these negative drops is coming from a machine to machine to machine source. There's no reason that at any point something should be subtracted. And I wanna make that very, very clear that at no point in an incremental process should you decrement. Speaker 4: Dave? Are there any Speaker 0: We've mentioned the RTR software options in the video. And what's important here is that this is built into the software itself so that, you know, when anyone logs into their Windows or Apple machines, you have a certain set of, maybe you have parental controls on there for children. But in this particular case, there's no overarching controls and this type of flexibility of options you see here on that one through four is available. So there's this situation where new batches can be recreated, you can reject, which is outside of this typical chain of of sequence within this network diagram where votes should go in at the polling locations. Votes should be counted at the absentee counting locations and through SD cards and only in extreme situations if there there was an adjudication, are those processes met, should they be altered? And the fact that this exists anywhere within this sort of sequential supply is a vulnerability in the overall system. So this is here to identify that that vulnerability exists and also to reinforce the fact that what we had seen in our data analysis of votes going negative is should be outside of that process and also should not exist because we are thinking about a machine talking to a machine talking to a machine. And a machine, unless it's explicitly programmed to decrement, should not decrement, especially in a voting situation. Similar as the way you deposit money into a bank account mentioned earlier, votes no different. You only are adding here. And if there's a removal, there needs to be a a very good explanation as to why, and that has not been provided and simply nor is it consistent with how the data is structured and what we've seen in our analysis as to any part of the process that would be consistent with normal routine legal voting.
Saved - January 28, 2026 at 3:58 PM
reSee.it AI Summary
I see a military-style color-revolution operation unfolding on U.S. soil, tied to USAID, the NED, and the CIA funding NGOs to promote “democracy” abroad. Critics point to Soros’ Open Society Foundations and matching USAID funds, noting training and support for opposition movements in places like Ukraine (2004) and Georgia (2003). Domestically, I claim these grants influence protests and policy, allegedly to install globalist regimes. I want it shut down.

@TheSCIF - The SCIF

A military style color revolution regime change operation is taking place on U.S. soil, right in front of us, in real time. Color revolutions, often characterized by mass protests and violent riots leading to regime changes, have been linked to U.S. foreign policy tools like USAID, the NED, and the CIA, which channel taxpayer dollars through non-governmental organizations (NGOs) to promote "democracy" abroad. Historically, in events such as Ukraine's 2004 Orange Revolution and Georgia's 2003 Rose Revolution, U.S.-funded groups like the National Endowment for Democracy (NED), described by critics as a CIA proxy, provided training, resources, and logistical support to opposition movements. These NGOs, often portrayed as independent, facilitate voter mobilization, media campaigns, and protest coordination, using funds from congressional appropriations to USAID and NED. This amounts to covert interference, while supporters frame it as legitimate aid for civil society. Key players include billionaire philanthropist George Soros through his Open Society Foundations, which have collaborated with or received matching funds from USAID in various countries. Allegations tie Democratic administrations to these efforts, with reports of USAID grants flowing to Soros-linked NGOs during the Biden era, totaling millions in taxpayer dollars. In foreign contexts, this network is accused of orchestrating unrest by funding local activists and media outlets to amplify grievances against incumbent governments, often under the guise of human rights promotion. Just like we see playing out against ICE and to also cover up massive operations of fraud, once again being stolen from American taxpayer dollars, with the Minnesota State government involved. Soros and related organizations have denied orchestrating revolutions, but we all know this is far from the truth, with Democrats and the cabal itself orchestrating our entire countries downfall which also has ties to China and the CCP. Domestically, similar dynamics are in play, with USAID and federal funds reportedly supporting progressive NGOs tied to Democratic causes and Soros, influencing U.S. protests and policy advocacy. These grants for "social justice" initiatives are actually fueling division, using taxpayer dollars via "shady" networks to lobby for far left communist reforms. All in an attempt to install globalist communist regimes, not just in the U.S. but abroad. It's all connected and is the blueprint running in multiple countries worldwide, which is also tied to the global election fraud cartel which is just another arm of this entire operation. Now, it's time to shut it all down.

Saved - January 28, 2026 at 6:31 AM
reSee.it AI Summary
I show how easy it is to hack electronic voting machines. I craft a virus that exploits OS flaws, silently redirecting votes to another candidate, with no signs of tampering and a altered tally. The malware erases traces, making post-election audits hard without independent verification. The process takes minutes, and such attacks aren’t just for nation-states—motivated groups with modest resources could do it. A $4 demo from 2006–2008 era, and now it’s easier, even remote with back doors.

@TheSCIF - The SCIF

Princeton Professor shows how easy it is to hack electronic voting machines. The researchers craft a virus that exploits software flaws in the machine's operating system. Votes are silently redirected from one candidate to another, symbolizing how an attacker could "steal" an election without detection. The machine's interface shows no signs of tampering, and the final tally reflects the altered results. The hack leaves no traceable evidence on the machine itself, as the malware erases its tracks after execution. This makes post-election audits challenging without independent verification methods. The entire process takes mere minutes, emphasizing that such attacks are not the domain of nation-state actors alone but could be executed by motivated individuals or groups with moderate resources. The part that anyone could buy costs $4 dollars and this was just ONE simple demonstration from all the way back in the 2006 to 2008 era. Now it's even easier and done remotely with built-in back doors.

Saved - January 28, 2026 at 5:50 AM
reSee.it AI Summary
I see a military-style color revolution operation unfolding on U.S. soil, with protests and riots linked to USAID, NED, and the CIA channeling taxpayer dollars to NGOs to promote democracy abroad. I reference Ukraine 2004 and Georgia 2003 where NED-funded groups trained and supported opposition. I believe Soros Open Society Foundations and related NGOs receive USAID funds to influence protests, media, and policy, domestic and foreign, aiming to install globalist regimes. I call to shut it down.

@TheSCIF - The SCIF

A military style color revolution regime change operation is taking place on U.S. soil, right in front of us, in real time. Color revolutions, often characterized by mass protests and violent riots leading to regime changes, have been linked to U.S. foreign policy tools like USAID, the NED, and the CIA, which channel taxpayer dollars through non-governmental organizations (NGOs) to promote "democracy" abroad. Historically, in events such as Ukraine's 2004 Orange Revolution and Georgia's 2003 Rose Revolution, U.S.-funded groups like the National Endowment for Democracy (NED), described by critics as a CIA proxy, provided training, resources, and logistical support to opposition movements. These NGOs, often portrayed as independent, facilitate voter mobilization, media campaigns, and protest coordination, using funds from congressional appropriations to USAID and NED. This amounts to covert interference, while supporters frame it as legitimate aid for civil society. Key players include billionaire philanthropist George Soros through his Open Society Foundations, which have collaborated with or received matching funds from USAID in various countries. Allegations tie Democratic administrations to these efforts, with reports of USAID grants flowing to Soros-linked NGOs during the Biden era, totaling millions in taxpayer dollars. In foreign contexts, this network is accused of orchestrating unrest by funding local activists and media outlets to amplify grievances against incumbent governments, often under the guise of human rights promotion. Just like we see playing out against ICE and to also cover up massive operations of fraud, once again being stolen from American taxpayer dollars, with the Minnesota State government involved. Soros and related organizations have denied orchestrating revolutions, but we all know this is far from the truth, with Democrats and the cabal itself orchestrating our entire countries downfall which also has ties to China and the CCP. Domestically, similar dynamics are in play, with USAID and federal funds reportedly supporting progressive NGOs tied to Democratic causes and Soros, influencing U.S. protests and policy advocacy. These grants for "social justice" initiatives are actually fueling division, using taxpayer dollars via "shady" networks to lobby for far left communist reforms. All in an attempt to install globalist communist regimes, not just in the U.S. but abroad. It's all connected and is the blueprint running in multiple countries worldwide, which is also tied to the global election fraud cartel which is just another arm of this entire operation. Now, it's time to shut it all down.

Video Transcript AI Summary
The discussion centers on allegations that the United States has used or could use domestic and international mechanisms to effect regime change, including through domestic unrest and foreign influence operations. Speaker 0 describes a 2021 Special Operations Command instruction manual, framed as a vision for 2021 and beyond, that purportedly contains instructions and examples on how the military could work with the State Department, intelligence services, and USAID to use race riots to destabilize nations. He points to examples labeled as part of this manual’s guidance for destabilization via combined military-government-civilian efforts. Speaker 1 lays out a model of how revolutions are allegedly structured, starting with a government at the top and support funneled through USAID, the State Department, or other administration entities. He then describes a degree of separation through privatized NGOs, including the National Endowment for Democracy, the International Republican Institute, and similar organizations, with money flowing from entities such as George Soros’s Open Society Foundations through tides and government-funded NGOs like NED. He suggests money ultimately comes from the people, and that demonstrators, youth movements, a sympathetic media, and labor unions contribute to organizing protests. He outlines conditions for regime change: an unpopular incumbent, a semi-automatic regime (not fully autocratic), a united and organized opposition, the ability to quickly frame the voting results as falsified, media amplification of that falsification, an opposition capable of mobilizing thousands, and divisions among coercive forces like the military or police. He asks whether those conditions are present and implies they are. Speaker 2 cites a declassified CIA guide from 1983 aimed at training operatives to organize riots in foreign countries, including using agitators and hiring professional criminals to manipulate mass meetings, with the goal of turning general anger into violence against the regime. The guide describes creating a climate where a few hundred agitators could mobilize tens of thousands, using 200 back channels and 200 human assets to generate a 10,000–20,000 demonstration. It also notes strategies such as setting up job fairs near riots to enlist disaffected workers. He references USAID’s Office of Transition Initiatives (OTI), implying that “transition” is a code for regime change, and cites a 2009 congressional report warning that OTI was a foreign operation aimed at toppling governments through organized political warfare, including mobilizing unions, boycotts, and shutdowns of roads, transportation, hospitals, and schools. Fulton Armstrong’s quote is cited regarding government secrecy surrounding such operations. The speakers conclude by condemning actions conducted in the shadows, destabilizing nations using race wars to achieve political aims, and advocating that the military be involved, arguing these efforts occur without oversight.
Full Transcript
Speaker 0: In 2021, the special operations command under Mark Milley as chairman of the joint chiefs put out an instruction manual, a vision for 2021 and beyond that contained instructions and examples on how the military could work with the state department, intel services, and USAID using race riots. Here's examples of some of the instruction manuals here. One and two, in order to destabilize nations. Speaker 1: So the question I started with tonight is are we currently in a domestic homegrown color revolution? Well, I wanna go back to this first chalkboard because it it frames out how our own government facilitated regime change all over the world. There's a government ultimately at the top. Support is given through organizations like USAID, the State Department or somewhere else within the administration. Then you have a degree of separation. It's privatized. NGOs, the National Endowment for Democracy, National Democratic Institute, International Republican, all of these things. Then there's the money. The people with the real money. And that's people like George Soros through his open society and tides. We should do a show again on tides or just look it up on YouTube. You'll find an old show of mine on tides. And even government funded NGOs like Ned again over here. The money this time is coming from you. Finally, the demonstrators, the youth movements, the people who hit the streets, and a sympathetic media that will help deliver their message. I'm gonna add labor unions in here because they are contributing to the organizing of these protests. This grassroots. Okay. So this is how revolutions are set up. But what are the conditions for one to be successfully conducted? When can regime change actually be attempted? Well, the State Department learned this by doing it over and over and over again. And we know it because Obama's ambassador to Russia, Michael McFoehl, literally wrote the book on it. This is what was required, as per Obama's administration, to topple a country. Are you ready? You need a semi automatic regime. Not fully autocratic. It has to be semi. You have to have an unpopular incumbent. You have to have a united and organized opposition. Do we have these things yet? Then you have to have the ability to quickly drive home the point that the voting results were falsified. You need the media to inform people about the falsified vote. You need an opposition capable of mobilizing thousands of demonstrators. And then you need divisions among the regimes, coercive forces like the military or the police. Sounds like we have all of those, doesn't it? Speaker 2: Here's a declassified CIA guide written in 1983 to train CIA operatives in the field on how to organize riots in foreign countries. And here's a tab on using agitators, including hiring professional criminals to manipulate mass meetings and assemblies of people in person, which can result in general violence. And you will see that they advocate for general violence, where the CIA tells the case officers, our psychological war team must develop in advance a hostile mental attitude among the target groups so that at the given moment, they can turn their anger into violence demanding the rights taken away by the regime. So make these ethnic minority groups so mad at their government in a general sense that whenever we snap the trigger at the given moment, they will turn that general anger into physical violence against the state that we wanna overthrow. But this is a CIA guide on getting teachers, doctors, attorneys, and businessmen in a cluster cell recruited as social crusaders for the CIA backed cause. And then note what it says. Through a gradual process, these cells, your 10 super teachers with a lot of influence in the teaching realm. Your 10 lawyers with a lot of influence in the legal realm. Your 10 captains of industry You are 10 medical professionals with a lot of of pull over the hospital systems. Will each work within their own spheres of influence? And at the appropriate time, their influence will be used to fuse the groups together into a united front. Using the tactics of a force of 200 to 300 agitators, one can create a demonstration in which 10,000 to 20,000 could take part. All we need are 200 back channels, 200 human assets that we've capacity built, and we can get 20,000 people to commit a violent riot in a fury of violence against their own government. Speaker 0: In addition to that, they advocated for setting up job fairs near some of these riots so that disaffected workers could gain employment. Now as a member of congress, I ask myself, did anyone in USAID get elected to congress? How about to a presidency? Speaker 2: US secretly created Cuban Twitter to stir unrest in the economy. To organize smart mobs. These are these are literal mobs, BLM style mobs. Now I'm just gonna read this here for a second. McSpeden was, you know, one of the guys running this. He worked for USAID's Office of Transition Initiatives. Now transition means government overthrow. We transition word these days. Transition means a few things. In 2009, a report by congressional researchers warned that the office of transition and and and, again, this is not a CIA division. This is a USA division for regime change for toppling governments through organized political warfare, mobilizing the unions to take to the streets, mobilizing boycotts and shutdown of roads and transportation systems and hospitals and schools. And then it goes on to say, okay. We were told we couldn't even be told in broad terms what was happening at USAID because people will die, said Fulton Armstrong, who worked for the Senate Foreign Relations Committee. Before that, he was the US intelligence community's most senior analyst on Latin America, advise for for Bill Clinton. So he was the top guy at CIA at the analyst division on all of Latin America, and even he can't get access to this secret operation being run out of USAID. Speaker 0: When you are acting in the shadows and you are destabilizing nations using race wars to do it and then advocating that the military does it, in my opinion, not only do you put the future generations that would have to fight in those wars in jeopardy, But at the end of the day, you're operating without any oversight.
Saved - January 28, 2026 at 4:11 AM

@TheSCIF - The SCIF

For anyone who hasn't seen this old document from Eric Coomer from Dominion when he used to be with Sequoia, he blantly talks about transmitting data from their machines through a wireless modem, including vote tallies, updates, changing voter rotation representation. These machines were specifically designed for fraud. How much more proof do you want?

@PatriotMarkCook - Mark Cook

Courtesy of ERIC COOMER when he worked for SEQUOIA! Pay attention to this summary, and the email is attached! Transmitting results via WIRELESS MODEM Updating throughout the night by wireless communication External tally source Append/Replace the tally data coming from the SPP file Changed logic for machine count in by location block to sum over all location assignments for precinct Ordered precinct lists by voter reg RotateAZPrecinctWeight to assist precinct voter registration weighting of rotation for AZ Distribute rotation sets across precincts for a contest based on registered voters so that all rotation sets have approximately equal voter representation. HELLO!?!?? McFly?!?!?! @WethePeopleAZA1 @GailGolec

Saved - January 28, 2026 at 2:01 AM

@TheSCIF - The SCIF

More mainstream media journalists and Minneapolis state employees involved and found in the Anti-ICE assault Signal Group Chat App. Ben Hovland: NPR journalist and photographer. Alyssa Polack: Employee of the Minnesota Department of Education. https://t.co/GwFZuwXijY

Saved - January 18, 2026 at 10:01 AM
reSee.it AI Summary
I read affidavits from GA voters, officials, experts, and engineers alleging massive 2020 election fraud in Georgia. They cite: 2,506 felons voted; 66,248 underage voters; 2,423 not registered; 1,043 ballots from P.O. boxes; 4,926 voted after registering past deadline; 10,315 voted who were deceased before election day; 395 ballots cast in another state; 15,700 moved AP, 2020; 40,279 moved counties but didn’t properly register. They claim hundreds of thousands to millions nationwide.

@TheSCIF - The SCIF

Over 100 affidavits from GA voters, election officials, experts, and engineers, found a MASSIVE amount of election fraud during Georgia's 2020 election. - 2,506 Felons voted - 66,248 Underage voters - 2,423 Not registered to vote - 1,043 Ballots were cast from people using a P.O. box - 4,926 Voted after registering after the deadline to vote - 10,315 Voted who were registered to vote but deceased before election day - 395 Casted ballots in another state which is illegal in both states - 15,700 Voted who filled out a national change of address before Nov. 3, 2020 - 40,279 Individuals voted and moved across county lines, at least 30 days prior to election day, who did not properly register in their new county This does NOT include fraudulent ballots or any type of electronic fraud. The total number of fraudulent votes is easily in the hundreds of thousands, even millions, just from Georgia alone. Imagine the fraud from the rest of the country... Trump won in a landslide.

Video Transcript AI Summary
The Georgia legislature is presenting a set of facts to the court asserting widespread voting irregularities in Georgia. They claim: - 2,506 felons voted illegally in Georgia. - 66,248 underage and therefore ineligible people were illegally registered to vote before their seventeenth birthday, when the law requires 17 years old. - At least 2,423 individuals voted who were not listed as registered. - 1,043 individuals cast ballots who had illegally registered to vote using a post office box. - 4,926 individuals voted in Georgia who had registered to vote after their Georgia voter registration date, thereby canceling their Georgia voter registration. - 10,315 or more individuals voted who were deceased by the time of the election. - 395 individuals voted in Georgia who had cast ballots in another state, which is illegal in both states. - 15,700 individuals voted in Georgia who had filed a national change of address with the United States Postal Service prior to 11/03/2020. - 40,279 individuals voted who had moved across county lines at least thirty days prior to election day and had failed to properly re-register to vote in their new county, also in violation of Georgia law. The petition to contest will include affidavits of more than one hundred Georgia voters sworn under penalty of perjury, attesting to and confirming multiple violations of the Georgia election code. You will hear from several of those witnesses today. They also assert there are issues of outright lies and potential fraud. The speakers contend that the actual results of legal ballots cast in the November election in compliance with the Georgia election code cannot be known ever, not by the secretary of state, not by the governor downstairs, not by the voting public, and not by this Georgia legislature.
Full Transcript
Speaker 0: What we are presenting to the court and to you today as the Georgia legislature are facts, facts. 2,506 felons voted illegally in Georgia. 66,248 underage and therefore ill ineligible people to illegally register to vote before their seventeenth birthday when the law requires 17 years old. At least 2,423 individuals to vote who were not listed as registered. 1,043 individuals to cast ballots who had illegally registered to vote using a post office box. 4,926 individuals voted in Georgia who had registered to vote after their Georgia voter registration date, thereby canceling their Georgia voter registration. 10,315 or more individuals to vote who are deceased by the time of the election. 395 individuals to vote in Georgia who had cast ballots in another state, which is illegal in both states. 15,700 individuals to vote in Georgia who had filed a national change of address with the United States Postal Service prior to 11/03/2020. 40,279 individuals to vote who had moved across county lines at least thirty days prior to election day and who had failed to properly reregister to vote in their new county after moving, also in violation of Georgia law. The petition to for contest will include affidavits of more than one hundred one hundred Georgia voters sworn under penalty of perjury, attesting to and confirming multiple violations of the Georgia election code. You will hear from several of those witnesses today. And then we have the issue of outright lies and potential fraud. The actual results of legal ballots cast in the November in compliance with the Georgia election code cannot be known ever, Not by the secretary of state, not by the governor downstairs, not by the voting public, and not by this Georgia legislature.
Saved - January 18, 2026 at 9:44 AM
reSee.it AI Summary
I watched the 2020 election testimony from the State Farm Center in Georgia: election workers closed and sent everyone home, including required poll watchers, while ballots were run all night. Afterward, a few Democrats stayed and pulled suitcases of alleged fraudulent ballots from under draped tables they had hidden earlier. With no oversight, they scanned these ballots repeatedly through the night, violating laws requiring officials’ presence, and committing alleged election fraud.

@TheSCIF - The SCIF

The FULL 2020 Election video testimony from the State Farm Center in Georgia, when election workers announced a closure and sent everyone home, including required poll watchers, and ran alleged fraudulent ballots all throughout the night. Once cleared out, a few Democrats remained and pulled suitcases of alleged fraudulent ballots from under draped tables that they hid there themselves earlier that day. With absolutely no oversight, they scanned these ballots repeatedly through the night, violating tons of laws requiring officials' presence, committing massive election fraud.

Video Transcript AI Summary
Jackie Pick, speaking as a volunteer and attorney not acting as counsel in this case, presented what she said is evidence from State Farm Arena in Fulton County concerning fraud or misrepresentation. She described the scene as a single large room where absentee and military ballots are tabulated on election day, with videotape from morning through close of polls. She stated that two Republican field organizers were sent as observers but were not allowed to observe meaningfully. They were “roped off with the press” in a roped-off area. She explained the timeline: the observers were to arrive around 08:00 to watch the tabulation of absentee and military ballots; about 10:00, a person working the polls allegedly told everyone in the room to leave because they were going to stop counting and would return at 08:30 in the morning. At approximately 10:00, workers remained, and the press and Republican observers left, but four people stayed behind and continued counting and tabulating well into the night, until about 10:25–10:30. The observers allegedly learned from a news crew that counting had continued after they had been told to leave. The observers returned to State Farm Arena around 01:00 in the morning and confirmed that people had left in contravention of the supervisors’ instructions. The video frames show the room becoming a ghost town between 10:25 and 10:37 as those who stayed behind were described as continuing work after the observers and press had left. The four people who remained behind were described as the lady in purple, two women in yellow (near the scanners), and the woman with blonde braids who had earlier instructed everyone to leave and stop counting. Pick asserted these four stayed behind to operate scanners once the area was clear of witnesses. She directed attention to the act of pulling ballots out from underneath a table, with the same blonde-braided woman having placed a table at 08:22 a.m. The video allegedly shows four suitcases of ballots being moved from under the table, prompting questions about the origin and chain of custody of those ballots, and why counting occurred only when the room was unsupervised. Her team calculated the possible volume: with three scanners processing about 3,000 ballots per hour over two hours, roughly 18,000 ballots could have been scanned during that unsupervised period. They noted six people involved in moving ballots in and out (the four workers plus two others), suggesting a prolonged period of unsupervised tabulation until about 12:55 a.m., after which the witnesses left again. The witnesses say counting resumed around five minutes before their return around 01:40–01:45. During the hearing, respondents questioned whether a water leak or water main break occurred and whether it affected operations; officials described conflicting accounts, with some asserting the leak did not disrupt work and others noting a toilet leak in some testimony. There were claims that a monitor was on-site throughout the process, which Fulton County officials reportedly disputed, stating the video had not been viewed by all parties. Additional questions from senators covered: who operates the cameras (the State Farm Arena) and whether the footage is secured and accessible; whether the scanners maintain real-time logs; and whether the video presents new information not previously reviewed by election authorities. The presenter emphasized the need for further hours of review to fully assess the frames and warrants.
Full Transcript
Speaker 0: So I'm Jackie Pick, and I'm here as a volunteer. I am a lawyer, but I'm not acting as a lawyer in this case. I'm just helping out the legal team here. And going to explain to you the evidence that we have from State Farm Arena here in Fulton County, which goes to what Ray was talking about in terms of fraud or misrepresentation. So when that queues, you're looking at one big room here. This is where, according to our witnesses who's given us sworn affidavits, this is where the absentee ballots and military ballots are being tabulated on election day. So we have the tape from first thing in the morning all the way past the close of the polls. What you have is essentially two Republican field organizers who were sent here to be observers. Observers. At no time were they actually permitted to observe in a meaningful way. I'm sorry. I have a voice issue today. They are roped off with the press. On the side Speaker 1: Tell you what what you could do to help us out so that everyone can hear who's live streaming. If you would tell us what you're going to point to, and then we'll point to it. Okay? Alright? Speaker 0: So now what will happen is these frames can move around. So this can get a little confusing, but I'll make sure to make it clear. We have two observers there that are going to show up, not at this point, this is in the morning, as you can see the daylight. They're going to get there at about 08:00 to watch the tabulation of absentee and military ballots. But according to their affidavits, at about 10:00, there was one person working the polls who told everyone in the room to leave on the basis they were going to stop counting and return at 08:30 in the morning. So if I can get the frame, for approximately ten or 10:20 ish. Speaker 2: 10PM. Speaker 0: Okay. Yes. We'll have to come back to the morning for a different reason in just a second. Okay, so you can see what time it is. Speaker 3: So Speaker 0: we're at about 10:00. And what you'll notice is that the workers are present, working, and you have back in that corner I pointed out to you, the press and the Republican observers. So according to the witnesses, the Republican observers, there is a lady who has blonde braids who comes out to announce we're going to stop counting. Everyone go home. And in fact, we see that. What happens is everyone clears out, the Republican observers in the press, but four people stay behind and continue counting and tabulating well into the night from that point, which is going to be about 10:25 when they all clear out or 10:30. And they will continue counting unobserved, unsupervised, not in public view as your statute requires until about one in the morning. The reason we know this is because when our Republican observers were forced to leave, they went to the Central Tabulation Center and they got news from a or word from a news crew that in fact counting had continued. They have information that not everybody left according to plan, and some people stay behind. So this shocked them. So they returned back to State Farm Arena at about 01:00 in the morning where they confirmed that in fact people had just left State Farm Arena in contravention of what they've been told by the supervisors who are running this operation. So okay. We're still at about 10:00. Can you take us to about 10:25 so we can see the change? You're going to watch this place be busy and filled up to emptied at some time between 10:25 and 10:35, which is consistent with what the affidavits say. Okay, so 10:25 they're still there. Let's go to 10:35. It takes just a few minutes for the frames to actually catch up with the there you go, with the time that you're seeing. So here you see it's all cleared out. We just went from 10:25 to 10:37. The place is a ghost town. This is where the people were vacated and told, go home, come back at 08:30. We will now stop working and stop counting. But notice who stays behind. You have four people consistent with our affidavits who stayed behind. And so you'll see the lady in purple. You'll see two women in yellow in the back, which is where the scanners are there at the top, top right frame. And then the lady with the blonde braids also who told everyone to leave. Those are the four people who will stay behind. Here. Those two. Okay. Observer's still there. So the Republican observers said they were the last people to leave State Farm Arena along with the Fox News crew accepting those four people. So what you're going to see, look at the ladies in yellow. You'll see that they will begin just sitting still, doing nothing, ostensibly not working because after all, they said they're gonna stop counting. They will wait until the witnesses over there in that roped off area, the press and the observers leave the room. Then you'll see them move into action and begin scanning ballots. Okay. So I think what we can do now is fast forward to about eleven. Do you see them? Yeah. Okay. There they walk. They're walking off. But the ladies in yellow are still there. Yes. Keep your eyes on the lady in purple, and the two in yellow, and the woman in the blue apron with blonde braids because those are the people who stay behind. Okay, so what you're going to see happen at about 11:00 is once everyone is gone, coast is clear, they are going to pull ballots out from underneath a table. Watch this table. So actually, this will take a few minutes, but we did not know when we first watched this. Okay. Is it normal to store suitcases of ballots under a table under a table cloth? Is that how they run the place? Maybe this is what they've been doing all day. Maybe this is what they're doing under all the tables. So we went back and watched the video as a a team of us. We don't see that. What we see is typically you're going to find ballots, you know, back in this corner or coming in through a door and then they get moved and circulated throughout the room. And it can get a little confusing because they have these black containers of ballots. They have the US Postal Service containers. But what we're trying to do when we determined that there were being ballots being pulled out from underneath this table is, you know, what was the chain of custody? Where did they come from? Who put them there? When did they put them there? We only reviewed this at about one in the morning last night for a couple of hours, so we're gonna need about fourteen hours to watch it carefully because we fast forwarded through it several times, and could not find that particular frame, but here's what we can tell you for sure. At about 08:00 in the morning and we're going to roll this back and show it to you. There you go. So, now they're going start pulling these ballots out from under this table. This table, the black one, was placed there by the lady with the blonde braids at about 08:22AM in the morning. So she put that table there. So the same person who's staying behind now, the same person who cleared the place out under the pretense that we're going to stop counting is the person who put the table there at 08:22 in the morning. Yeah. I saw four suitcases come out from underneath the table. Yeah. Upper right hand. You see the gentleman in in the red? So he just pulled one out. So, what are these ballots doing there separate from all the other ballots? And why are they only counting them whenever the place is cleared out with no witnesses? Is the question. So, these machines can process about 3,000 ballots an hour. You have multiple machines there, and they're there for two hours. So, you do the math. How many ballots went through those machines in those two hours when there was no one there to supervise, to be present, consistent with your statutes and rules, to supervise the tabulation? We believe that could easily be and probably is certainly beyond the margin of victory in this race. Because if it's only three scanners working for two hours, right, that's 18,000 ballots that went through. So we're now at eleven zero nine. There were, in addition to the four workers that you see there, there were two other people who were bringing ballots in and out. The gentleman in red that you saw, and then a second person, I can't tell if it's a male or female based on their hair being pulled back in their mask, but in any event, that's six total people. And so, if we were to sit here for the next two hours, what we would see is that this operation just goes on and on and on. They're scanning until about 12:55 in the morning. So we kept the video running. And, you know, we can show you the people who gave us the affidavits reappearing at that time, just as they said, around 1AM to find out, are they in fact counting after they told us they would stop working or not? And we will fast forward to that. But have you all seen as much as you'd like to see of what's happening here? Speaker 1: I think so. Speaker 0: I think you basically get the idea. Speaker 1: Unless any member wants to see more. Speaker 0: Or you have any questions? Speaker 1: No. No. Let's go ahead. Speaker 0: Okay. So let's fast forward to about 12:55 in the morning. Okay. So it's updated to 12:50. You can see these people are still there up in the upper right hand corner. Basically, they've wrapped up. This is the end of their operation. They've now completed about two hours of unsupervised tabulation of ballots. So now you're gonna watch them leave, and let's fast forward to let's go to 01:30. I think it's been between 01:30 and 01:45 is when our two witnesses come back. They had to fight through security to get in there, but they did. And they say in their affidavits that two different people affirm for them that people have been counting from, you know, 10:30 when they cleared out until about approximately five minutes before they arrived. And they have the names of those people who told them that. Okay. Now we're looking at what is that? 01:42 in the morning. Is there a way to fast forward a bit or make it go a little faster? Okay. There are guys right there in the lower left hand corner. So they've now returned to State Farm Arena having heard from the press that they had continued counting because they wanted to see for themselves that that was really happening, which was a complete contradiction to what they had been told by at least one person from Fulton County who's an employee and spokesperson, and also the lady in the blonde braids we spoke about earlier. And so they see for themselves. And from this, get the affidavit. I don't know the name of the lady in the blonde braids. They simply gave a description to us, and you can you can make out clearly who she is based on the people in the in the film. Lady in the blonde braids halfway down her back is the person who yelled out, everyone leave and stop counting. I believe miss Waller is the spokesperson for Fulton County elections who was who remain behind. The other two people they don't have names for. They just said they were older women, and one of them had the name Ruby across their her shirt somewhere. And that's as much as they know about who those people were. But so our guys go in. They look around. They ask a few questions, and they leave. It is from their affidavits that we even knew to ask about this. And you might recall that the press reported there was, like, a supposed water break or water main break or pipe break or whatever, and that this was an excuse for people clearing out of State Farm Arena. It's not clear from the affidavits I saw whether or not that was the reason given by the election official or whether they gave any reason at all. They just said, Stop. We're leaving. We'll be back at 08:30. So I don't know if that was at play here or not. Okay, can we back up to 08:22 a. M. In the morning, same frames, because we wanted to know when did that table get put there? Who put it there? When did the ballots get put there? Who put it there? Okay. So 08:21. You'll notice the table's not there at all. Here it comes. There's the table going in that we're talking about where the ballots were obscured. That lady who's moving it is the lady with the blonde braids. She's dressed differently in the morning, so it took us a while to figure out that's the same person that you see at night with the blue apron on who's yelling for everyone to leave and who stays behind to help tabulate ballots after they've all left. So I can see that she's the one who chose to place that table there, close to the scanners. And so the video is still under review. We need to spend hours reviewing carefully how those ballots got there. But we can tell you that it appears to be an aberration from how the other ballots were handled in that room throughout that day. So that's the gist of it. Do you have any questions? Speaker 1: Any questions? Senator D. Speaker 4: Fulton County chairman Rob Pitts testified in a committee earlier today that the water break occurred at 06:07AM and was repaired by 12:07AM. And that the water main break did not disrupt the work of the whole room that his example was that if we were counting ballots working in here and the water main break was in the back or the the leak, that we would just simply move out of the way of the the the leak. But he, testified this morning that the leak occurred 06:07 and was repaired by 08:07AM. From what I'm seeing here, I don't see anybody moving around to avoid a leak. No. He did state that the leak was greatly exaggerated and that it was not, like, wiped out the whole place. But I just thought that might be Speaker 0: What's that? Speaker 4: I mean, the water leak, according to the commission chairman, was at 06:07AM. Speaker 0: I'm told that we have a videos that it was a toilet leak and not a water main break. But I know that mister Pitts' name was mentioned, one of our affidavits, and our witness says that he was physically present in this room clear up until everyone was made to leave. So presumably, if he was in the room at the time, they made the announcement he would be a witness to that. He was one of the last to leave, but he did leave in front of our witnesses before our witnesses. Speaker 5: Yes. Senator Parent. Thank you. Thank you for being with us. We heard from the secretary of state's office earlier, just a couple hours ago, that they've investigated this repeatedly, that they had a monitor on-site the entire time. And frankly, this has been debunked for weeks by our secretary of state's office. Speaker 0: I doubt you've seen the video. Speaker 5: Then I think the courts will probably be able to handle this once you present your evidence to them. As I'm aware, there have been about 40 lawsuits dismissed already. And according to the law of the state of Georgia, we do not have the power to submit alternate electors. The provision in the law is quite clear at at twenty one two five zero one f. Speaker 0: Is there a question? Speaker 1: Senator may may sorry. Questions. We'll have a time for statements at the conclusion if we Speaker 6: Yeah. Speaker 5: My question is what the question is, since this has been debunked repeatedly, what evidence can you give to us counters what our elections officials have presented us with only an hour ago? You just saw it. Your officials need to watch the video. What about the fact that they say that they had a monitor there the entire time? Speaker 0: I can't speak for them. Well? Stop that. They did not Speaker 5: Thank you. Speaker 7: They did not have a video. Speaker 5: They said they had a monitor the whole time. Speaker 8: Okay. Okay. Speaker 0: You're looking at the room. Speaker 6: There's no there's no secretary of state. Speaker 5: Then maybe we should invite them back in. Speaker 1: Good call. Alright. Well, we may need to do that. Senator Tillery? You what number are you? Speaker 3: Number one. Number one. Thank you, mister chairman. Thank you, miss Tig. I I just have two questions just to try to follow through and understand this a little better. Thank you for presenting this. Speaker 8: Let me push on Yeah. Get a Speaker 9: little closer too. Speaker 3: Okay. Is that better? Just thank you again for being here. Thank you for presenting this. I just have two questions to kinda understand it a little better. My first is I didn't have this before, but when senator Perrin asked, made me ask, have you been able to figure out where our monitor would have been or the monitor? Can you point that Speaker 0: out to us? Yeah. Speaker 5: Right here. Speaker 6: Okay. So Speaker 3: And it's easier to see in from where I'm sitting slide in the top left. Can you see can you help me understand where if that's where sorry. Top right is where the scanners are. Where would the monitor be in that screen? I'm just trying able to understand it. Speaker 0: Yes. It's very confusing because these frames don't portray that accurately. What the witnesses said is that when they were in that roped off area I just pointed to with the press, not only could they not see a single ballot because they were so far away, they couldn't see those scanners at all. The only reason that they knew the scanners were there is because the election official, miss Waller, told them so. So I don't know if that means, and this is an enormous room, that there was like a curvature to the room, but that is not a straight shot from where you see where they would have stood to the scanners because they could not see those scanners. Now other people could depending on where you were in the room. Speaker 3: Mister chairman, may I ask a follow-up? Speaker 8: Yes. Speaker 3: The first thing is if when you do find out that information, if you don't mind getting it back to us, know you will, and thank you for that. Mhmm. The second thing is just a more like a chain of custody process. You we saw Speaker 1: Excuse me, senator. Is I'm getting reports that it's difficult to hear so you may need to get closer to the microphone. So promise you, I'm not doing it Speaker 7: for these guys. Speaker 3: I'm doing it for these guys. So I as long as they Speaker 10: can hear me, I'm good. Speaker 1: But a lot of people across the state wanna hear what's being said. On Speaker 3: the on the second question I have, and and thank you for your answer to that one. Thank you for getting us that. We'll look forward to answer back from you. Just a chain of custody question now. If we we could clearly see the ballots in the top right screen come out from underneath the table, I could not see that there was a cover on the front of the table until your 08:22 video. Mhmm. So that was very helpful. Can is there anything can you show us where other ballots were coming from? Have y'all been able to figure that out yet? Because I think if they were coming from a different place, obviously, that raises even more of a specter of concern or question. Right. So Speaker 0: if you see again, this is hard to understand where where this will be coming from, but so there, you have the black we call it a suitcase containers for ballots. You also have boxes. Those are being moved around the room throughout the day. So it appears to us they're coming from there. Speaker 3: From that back from the top corner of the bottom left screen. Is Speaker 0: that Correct. Yeah. Speaker 6: K. Speaker 0: And from there, they're shuffled around a lot. It gets confusing to watch this because, again, you're not looking at a linear representation of the room. Speaker 4: Right. Speaker 0: Where they're not coming from, as far as we can tell, is from under that table or any table. Speaker 3: Right. And it does not look like the top corner of that bottom left screen is concurrent or consecutive or so anyway tied into the bottom corner of the top right screen. It does not look like those are congruent. We're not seeing them come out of that corner by coming underneath that table. Correct? Speaker 0: I don't think we can tell that from the film. Speaker 3: And I'm sure y'all will will get more information on that as well. Thank you for helping me just understand that a little bit better. I appreciate it. Speaker 1: Okay. K. Was there another question? Speaker 10: And just for the Speaker 6: record, we did not receive this video until late last night, and we were reviewing it. Night last night. So we're we're still we're still reviewing it. There's still a lot more to review. Speaker 10: Senator senator Jones? Thank thank you, mister chairman, and thank you for presenting this. And then that was gonna be my question, mister Smith, was, when exactly did we receive this video or you guys get in possession of this video. And then also, so you've had no time to when questioning the four people who are having a lot of movement and activity during the time frame that everyone goes home, y'all have not had time to find out who those individuals are and actually question them on anything, correct? Speaker 3: That's correct. Speaker 1: Okay, thank you. Speaker 11: Senator Rett. Thank you, Mr. Chairman and welcome. Speaker 0: Thank you. Speaker 11: Appreciate it. Just quick refresher. When you talk with the authorities involved pertaining to the situation, what was the explanation or have you had a chance to speak with them? Speaker 0: Do you mean Fulton County officials? Speaker 11: Yes, Speaker 0: ma'am. I've not spoken with them because we just got the video. Speaker 1: Thank you. Speaker 6: Mhmm. Speaker 1: K. Senator Kennedy. Speaker 2: Thank you, mister chairman. Miss Pick, thank you for being here, mister Smith. Thank you as well for this very important presentation. My question is simply, if this was addressed earlier, forgive me, but who's in charge of the cameras? Who were they placed there under the Secretary of State's office or by Fulton County? And who's in charge of monitoring them and who's in charge of securing whatever footage is there and the data? Speaker 6: They're they're operated by the State Farm Arena. The State Farm Arena. Speaker 2: So these were not placed there for the purposes of that facility being used to count balance? Speaker 6: That's correct. Speaker 2: This is just regular old Speaker 6: security cameras that just happen to be there. For, you know, if if if you're in the arena and you have a slip and fall or there's a fight or something happens in the arena, there's these videos are, as I understand, are subpoenaed all the time. Speaker 2: Okay. Thank you. Yes. Speaker 1: Senator Beach, just let me get your microphone on. Speaker 8: Oh, yes. Is it on? Yes. Hello? Yes. Yes. I think you said there were three scanners. Correct? Is there a way to know if those scanners were used between 10:30 and 1AM? Do they track are they tracked by time when things are scanned through them ballots are scanned through them? Do you know? Speaker 6: I'm not sure. Okay. Speaker 0: There have been conflicting reports about whether or not those machines keep a log for in real time. They they certainly should. I mean, historically, that's the standard required. But whether or not they will hand those over or kept them, I don't know. Speaker 1: K. Are there any other questions? Okay. Senator Parent, one more question. Speaker 5: Did you mention that chairman Pitts was was there, or you you spoke to him about being there during this episode? Speaker 0: I was not there. This is a witness affidavit that says he was there. Okay. Almost up until he was one of the last people to leave. Not as late as the witnesses that we have, but he was there. Speaker 5: So he just told us he wasn't there just an hour ago. Speaker 0: Okay. Well, I don't know. One of the witness affidavits says he's there. Speaker 5: Well, okay. So we heard from Senator Brass? Speaker 0: Can I can Speaker 6: I ask you one more? Speaker 1: No, ma'am. We need to move on. We have a lot of questions. What number are you, senator Brass? 7. 7. Speaker 12: So in thank you, mister chairman. You, miss Pick. So the table was placed there around 08:30 ish, we said, AM? Speaker 0: 08:22 in the morning, approximately. Speaker 12: At what point or and y'all may not know this since you just got the video. At what point did the box of ballots go under the table? We don't have Speaker 0: the answer to that. So we fast forwarded through the tape several times to try to find that because we haven't had time to review it in real time, which would be fourteen hours of tape to review. Speaker 7: Right. Speaker 0: So we just haven't had time to look at that. Speaker 12: Understood. Do we know about how many ballots would go in each one of those suitcates? Speaker 0: So we have a witness who says that inside the suitcases, she estimates that about 6,000 ballots can fit in there. Speaker 12: And there were how many that were taken out? We don't know. Okay. Thank you. Speaker 1: Senator Gooch? Speaker 7: Maybe a question for senator Parent. I heard you say several times this has been debunked, but I also just heard that this video just appeared last night. So how could it have been debunked? Speaker 5: Well, my response, not being an expert, is that these very allegations came up right away after the election almost a month ago and have been repeatedly discussed by the secretary of state's office, including everything that we're seeing here. Speaker 1: But is Speaker 5: this not explanations for all of Speaker 10: it. Speaker 7: Is this not the first time this video has been shown? I Speaker 1: believe that this is the first time this video has been seen. And it is. Speaker 7: That's correct. Media hasn't seen this video or have not? Speaker 6: They they have not. Speaker 3: They have not. Because I've Speaker 6: been in I've been in contact with counsel for this SafeArm arena. Speaker 3: And hope that Speaker 7: it will be today. Speaker 1: Okay. Senator Anderson, you're on number seven. Correct? Speaker 9: Yes. Thank you. Thank you for being here today. My question is, if they said that they were gonna shut down and no more counting, Does the election system shut down to where it can't count no more, or can it keep on counting? Speaker 0: Well, so I referenced the statute which shows that the Georgia elections must be conducted in public view. That means the press can watch. That means the other party can watch. Both parties are represented to be observers or monitors, whatever. Here, they were made to leave. So it was done in contravention of the statute. Speaker 9: But my question is, is the equipment do you the the counting system, does it supposed to shut down when nobody's supposed to be counting? Speaker 0: I'll I'll defer to Ray on that. Speaker 6: I I I not know the answer to that question. Speaker 0: It has to be secured if they're going to leave the premises for sure. Speaker 9: That's that's getting leading to what I'm is it actually securing the count even though they say that we're not gonna count? Speaker 6: There's not supposed to be activity with election workers if there's not public view. That's the law in Georgia. Speaker 0: And the and the ballots have to be secured at all times. Speaker 1: K. Thank you. Okay. I think we may need to do you have anything else that you'd want to point out about the video? Speaker 0: I think that's everything. Right? Speaker 6: Okay. That's everything for Speaker 0: now. Speaker 2: Yes. Okay. Speaker 6: Alright. Speaker 0: Thank
Saved - January 14, 2026 at 1:41 PM
reSee.it AI Summary
I recount ASOG’s forensic findings in Antrim County: an anonymous user accessed the election management system remotely on Nov. 5 with escalated privileges and altered the database during retabulation. The ballot’s side boxes (15, 18, 28, 41, 44) were intentionally modified to trigger adjudication when Republicans were voted, causing errors. Over 15,000 errors were logged, with adjudication rates as high as 68.05% countywide and 81.96% in Central Lake Township.

@TheSCIF - The SCIF

A forensic dive into DOMINION Voting Systems by Allied Security Operations Group (ASOG), proved that Antrim County, Michigan's election management system was accessed remotely by an anonymous user on Nov. 5th with "escalated privileges" and made changes to the database when they were trying to retabulate the election. This alone PROVES the machines were remotely accessible, and by an "unknown" 3rd party. The second massive finding was that the "black solid boxes" on the side of the ballot were altered to trick machines and trigger and automatic error, "adjudication," if Republican candidates were selected on the ballot. There are 59 total "black solid boxes" on the side of a ballot for the machine to register specific information. Within the forensic images in Antrim County, blocks 15, 18, 28, 41, and 44 were ALL intentionally modified. The height, the width, and the overall shape were intentionally modified to generate errors if a republican was voted for on the ballots in order to cause an "error" and be sent to adjudication. And that ladies and gentleman, is where you can change all the rejected ballots, at one time, at the click of a button. In adjudication. ASOG reported that these were built-in features of a flawed system. With over 15,000 logged errors in a single forensic exam. The glitch is the steal, with error rates skyrocketing to 68.05%, far exceeding the federal allowable limit of 0.0008%. In Central Lake Township alone, 81.96% of ballots were reversed and sent for adjudication— a staggering rejection rate unheard of in prior elections. This is the blueprint for election fraud in the U.S. and around the world in over 100+ countries.

Video Transcript AI Summary
The speakers assert that there is evidence of direct access to the Antrim County election management system (EMS). In the forensic images, they note that on November 5 an anonymous user logged onto the EMS remotely and performed actions with escalated privileges, making changes to the database during attempts to retabulate the election. They describe this as a major development, because it demonstrates that the machines were accessed remotely, and crucially, that the remote access was by an anonymous user who possessed elevated privileges within the system. They present this as a significant point for those who oppose forensic auditing or who are against non-forensic reviews. They also reference visible features on ballots, specifically the black boxes along the side of the ballot. The ballots reportedly contain 59 of these black boxes. In the forensic images, they indicate that certain blocks—numbers 15, 18, 28, 41, and 44—were intentionally modified. The described modifications concerned the height, width, and overall shape of these blocks, with the stated purpose of generating errors. Regarding the consequences of these modifications, the narrative claims that by altering these specific blocks, errors were created that led to rejections of Republican ballots. In other words, ballots cast for Donald Trump that were processed through the machine allegedly faced a higher likelihood of being rejected due to these block modifications. The asserted outcome is that such ballots were rejected at a rate of 20% more than ballots cast for Joe Biden.
Full Transcript
Speaker 0: We've proved now that there was direct access to the Antrim County election management system because we show on November 5, we can see it in the forensic images, that an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the the database when they were trying to retabulate the election. So that's one huge, huge development, because now we prove that the, machines were remotely accessed. And more importantly, they were remotely accessed by an anonymous user who had elevated privileges in the system. That is pretty damning for the the the non forensic reviewers out there or people who do not want a forensic audit. And the other thing probably is equally explosive. Everyone's seen ballots before like these ballots here. On the side of the ballot, there's these black boxes. There's 59 black boxes on the side of the ballot. We now see within the forensic images that in Antrim County, those blocks blocks fifteen, eighteen, 28, 41, and 44 were all intentionally modified. The height and the width, the shape of those blocks were intentionally modified in order to generate errors. What does an error do? In this case, by modding modifying those specific blocks, they were able to cause rejections for Republican ballots. Meaning, if you voted for Donald Trump and then put your ballot in the machine, your ballot was rejected at a at a rate of 20% more than, Joe Biden ballots.
Saved - January 14, 2026 at 1:37 PM
reSee.it AI Summary
I review ASOG’s forensic dive into DOMINION in Antrim County, MI. They claim remote access on Nov 5 with escalated privileges altered the database during retabulation. They say the black side-boxes on ballots were deliberately modified (blocks 15, 18, 28, 41, 44) to trigger adjudication when Republicans were selected. They report 15,000+ errors, 68.05% error rate vs 0.0008% federal limit, and Central Lake Township at 81.96% adjudicated ballots, described as a fraud blueprint.

@TheSCIF - The SCIF

A forensic dive into DOMINION Voting Systems by Allied Security Operations Group (ASOG), proved that Antrim County, Michigan's election management system was accessed remotely by an anonymous user on Nov. 5th with "escalated privileges" and made changes to the database when they were trying to retabulate the election. This alone PROVES the machines were remotely accessible, and by an "unknown" 3rd party. The second massive finding was that the "black solid boxes" on the side of the ballot were altered to trick machines and trigger and automatic error, "adjudication," if Republican candidates were selected on the ballot. There are 59 total "black solid boxes" on the side of a ballot for the machine to register specific information. Within the forensic images in Antrim County, blocks 15, 18, 28, 41, and 44 were ALL intentionally modified. The height, the width, and the overall shape were intentionally modified to generate errors if a republican was voted for on the ballots in order to cause an "error" and be sent to adjudication. And that ladies and gentleman, is where you can change all the rejected ballots, at one time, at the click of a button. In adjudication. ASOG reported that these were built-in features of a flawed system. With over 15,000 logged errors in a single forensic exam. The glitch is the steal, with error rates skyrocketing to 68.05%, far exceeding the federal allowable limit of 0.0008%. In Central Lake Township alone, 81.96% of ballots were reversed and sent for adjudication— a staggering rejection rate unheard of in prior elections. This is the blueprint for election fraud in the U.S. and around the world in over 100+ countries.

Video Transcript AI Summary
The speaker asserts that there was direct access to the Antrim County election management system (EMS). According to the forensic images, on November 5 an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This is presented as a major development indicating remote access to the machines, and specifically remote access by an anonymous user with elevated privileges. Additionally, the speaker describes intentional modifications to ballot components. Ballots have black boxes along the side, with boxes 59 in total. The forensic images allegedly show that blocks 15, 18, 28, 41, and 44 were intentionally modified, altering their height and width to generate errors. The claimed consequence of these modifications is that errors were produced which led to ballot rejections. Specifically, ballots in which a voter chose Donald Trump and then fed the ballot into the machine were rejected at a rate 20% higher than ballots for Joe Biden.
Full Transcript
Speaker 0: We've proved now that there was direct access to the Antrim County election management system because we show on November 5, we can see it in the forensic images, that an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the the database when they were trying to retabulate the election. So that's one huge, huge development, because now we prove that the, machines were remotely accessed. And more importantly, they were remotely accessed by an anonymous user who had elevated privileges in the system. That is pretty damning for the the the non forensic reviewers out there or people who do not want a forensic audit. And the other thing probably is equally explosive. Everyone's seen ballots before like these ballots here. On the side of the ballot, there's these black boxes. There's 59 black boxes on the side of the ballot. We now see within the forensic images that in Antrim County, those blocks blocks fifteen, eighteen, 28, 41, and 44 were all intentionally modified. The height and the width, the shape of those blocks were intentionally modified in order to generate errors. What does an error do? In this case, by modding modifying those specific blocks, they were able to cause rejections for Republican ballots. Meaning, if you voted for Donald Trump and then put your ballot in the machine, your ballot was rejected at a at a rate of 20% more than, Joe Biden ballots.
Saved - January 11, 2026 at 4:31 PM
reSee.it AI Summary
Discussion notes that major programs have weaponized tech capable of reading, writing, manipulating, and projecting effects via AI, electromagnetics, and frequency weapons. The example cited is a recent Maduro raid. It’s argued these capabilities have existed for 50+ years and are now far more advanced. A commenter says such tech could be used on enemies instead of torture, while others urge that this reality must be acknowledged.

@TheSCIF - The SCIF

DARPA, Palantir, Boeing, foreign countries, and even Google have programs and technology that can read & write, manipulate, induce, project, and effect things and people in ways you never thought possible. All this is already here and already weaponized. The tech reported in the U.S. military raid on Maduro is just a taste. These DEWs have many layers and include, A.I., electromagnetics, and other frequency weapons.

@45Lori1 - TPLori2 🇺🇸

@TheSCIF This is beyond the pale for consumption on the Public. Using it on our captured enemies would be useful in lieu of torture.

@TheSCIF - The SCIF

These needs to come already. People need to start taking this more seriously because it's already here and has been here for over 50+ years. It is just extremely more advanced then back then with the adaptation and incorporating A.I. and newer tech into it, which what makes it extremely effective.

Saved - January 11, 2026 at 11:20 AM
reSee.it AI Summary
I’m a former Maduro security guard recounting a U.S. raid on Venezuela. Twenty elite operators used drones, electronic warfare, and overwhelming firepower; Venezuelan defenses were disabled and hundreds neutralized with no American casualties. Direct Energy Weapons caused rapid incapacitation, with bleeding from ears, nose, and mouth—likely LRAD/ADS-era tech. This is a glimpse of American supremacy. You think you can fight Americans? You’re about to find out. Don’t FAFO with the USA.

@TheSCIF - The SCIF

Former Nicolás Maduro security guard delivers a firsthand account of the advance technology used in the U.S. raid in Venezuela. State-of-the-art drones, massive firepower, but the Direct Energy Weapons were the most terrifying. 20 elite American soldiers, armed with cutting-edge technology, dismantled defenses and neutralized hundreds without a single casualty on their side. This isn't just a story of victory—it's a masterclass in modern warfare supremacy. The Americans arrived undetected, Advanced electronic warfare systems completely disabled Venezuelan radars and other equipment. Drones struck with lightning speed, obliterating bases and outpacing any counter-response. The guard notes Venezuela had "no technology to fight against drones," highlighting the asymmetric edge of U.S. unmanned aerial systems. Most interesting, was the mention of Direct Energy Weapons, causing immediate incapacitation, with victims bleeding from ears, nose, and mouth. This matches the Long Range Acoustic Device (LRAD) or emerging directed-energy systems like the Active Denial System (ADS). and other electromagnetic and acoustic weaponry. If you follow me, this is nothing new and a taste of what we really have and are capable of. The result? 20 operators vs. hundreds, equaling total domination. "You think you can fight Americans? You don't even know what their weaponry is like." With President Trump eyeing Mexico's cartels next—"You're on the list too" Don't FAFO with the USA!

Video Transcript AI Summary
A security guard who protected Maduro has spoken, and the report is being translated from Spanish. The speaker describes the impact of American military capabilities observed in Venezuela, noting that the Americans had technology superior to anything they've seen before. According to the guard, everything used for radar and related systems was taken offline. He claims the Americans had drones that were "taking out bases and taking out things faster," and that their opponents had no technology to compete with drones. The guard states that only eight helicopters and twenty men were sent in, yet those twenty killed hundreds of the enemy and left none of their own soldiers injured. He says it felt like the enemy was firing 300 rounds a minute, describing it as unmatched by anything they've seen. He also mentions a sonic shock boom used by the Americans, which caused everyone to bleed profusely from the nose. People reportedly could not gather themselves after the attack, and they vomited blood from their mouths and noses, becoming incapacitated immediately. The guard emphasizes that he never wants to fear or fight the Americans again. He is sending warnings to others, asserting that if you think you can fight the Americans, you do not understand their weaponry or capabilities. He asserts that twenty men defeated hundreds, and suggests this claim is spreading across Latin America. The broader political context referenced includes Trump’s statements that Mexico would be on a list of targets, which the speaker frames as changing the overall climate in Latin America. The narrative connects firsthand accounts from people who were there to the perception that the region’s geopolitical dynamics have shifted due to the Venezuela incident, including the implication that the United States possesses overwhelming military technology and capabilities.
Full Transcript
Speaker 0: A security guard that was protecting Maduro has spoken, and you gotta hear what he said. It's in Spanish, but I'll translate. Also, Trump announced that, you know, the cartels, they're going after him in Mexico. The whole vibe of Latin America has changed because of what happened in Venezuela. And, now that we're getting firsthand accounts from people that were there, the soldier says they didn't hear him coming. They said he says the Americans had technology superior to anything they've ever seen. Everything that they were using for radar for anything was completely taken offline. They had drones, and the drones were taking out bases and taking out things faster. They didn't have no technology. They've never had to fight against drones. He also talks about that there was only eight helicopters. There was only 20 men that were sent in, and those 20 men killed hundreds of their men, and none of those soldiers were injured. He talks about it felt like they were firing 300 rounds a minute. Nothing they've ever seen, Nothing that they can compete with. And then he also talks to the fact that the Americans had some kind of, sonic shock boom that was sent out, and everybody immediately started bleeding profusely out of their nose. They couldn't even gather themselves because whatever was sent at them made them fall to their knees and vomit blood out of their mouth and out of their noses. They were incapacitated immediately. He says he never wants to fear never wants to go through that again. Doesn't wanna have to fight with the Americans again. He's sending warnings to everybody out there that you you think you can fight the Americans. You don't even know what their weaponry is like and what they're capable of. 20 men took out hundreds, and that's starting to spread all through Latin America. And now they're not saying, do you want me, come and get me anymore. They're like, oh, shit. Especially after Trump says, hey. Mexico, you're on the list too.
Saved - January 10, 2026 at 9:37 PM
reSee.it AI Summary
I summarize Project Maven, the Pentagon’s AI program (launched 2017) that automates analysis of drone, satellite, and surveillance data to speed the kill chain. Under NGA, Maven processes petabytes of imagery via the Maven Smart System across all services, with human oversight. Coupled with Directed Energy Weapons—HELs like HELIOS and HPMs like THOR—it enables light-speed, targeted strikes and swarming defense, feeding JADC2 and the energy roadmap.

@TheSCIF - The SCIF

PROJECT MAVEN and the U.S. Military's Cutting-Edge Arsenal of AI-Driven Warfare and Directed Energy Weapons. This is an important deep dive into one of the U.S. Department of War's most transformative initiatives, a game-changer that's reshaping modern warfare through artificial intelligence. Launched in 2017 under the Algorithmic Warfare Cross-Functional Team, Project Maven isn't just another tech buzzword; it's the Pentagon's flagship AI program designed to supercharge military intelligence by automating the analysis of vast troves of data from drones, satellites, and surveillance feeds. Highlighting how Maven uses machine learning and computer vision to detect, classify, and track targets in real-time, compressing the "kill chain" from hours to minutes. The weapon and defense systems powering this revolution, including the seamless integration of Directed Energy Weapons (DEWs). Project Maven serves as the brain, processing petabytes of imagery to identify threats like enemy vehicles, personnel, or infrastructure with pinpoint accuracy—far beyond what human analysts could achieve alone. Initially deployed against ISIS in 2017, it fused data from full-motion video (FMV) and other sensors to flag potential strikes, always with human oversight in the loop to ensure ethical decision-making. Today, under the National Geospatial-Intelligence Agency (NGA), Maven has expanded to all military branches—Army, Air Force, Space Force, Navy, and Marines—via platforms like the Maven Smart System (MSS). MSS isn't just about detection; it's a force multiplier, enabling rapid targeting in exercises like Scarlet Dragon, where it slashed manpower needs from thousands to mere dozens while handling complex scenarios in CENTCOM and beyond. Now, pair this AI prowess with the U.S. military's Directed Energy Weapons, and you get a lethal, futuristic synergy. DEWs harness concentrated electromagnetic energy—think high-energy lasers (HELs) and high-power microwaves (HPMs)—to neutralize threats without traditional munitions, offering infinite "ammo." These aren't hypothetical; they're operational and evolving rapidly. High-Energy Lasers (HELs), systems like the Navy's HELIOS (High-Energy Laser with Integrated Optical-Dazzler and Surveillance) aboard destroyers like the USS Preble deliver speed-of-light strikes to down drones, missiles, or small boats for pennies per shot. Integrated with Maven's AI targeting, HELIOS can acquire, track, and zap threats in swarms, as demonstrated in recent Pacific tests. The Army's DE M-SHORAD (Directed Energy Maneuver-Short Range Air Defense) prototype, mounted on Stryker vehicles, recently shredded drone swarms at Fort Sill, blending lasers with kinetic defenses for layered protection. High-Power Microwaves (HPMs), weapons like the Air Force's THOR (Tactical High-Power Operational Responder) unleash radiofrequency waves to fry electronics in drones or missiles from afar, covering wide areas with a single pulse. In urban or congested environments, HPMs provide non-lethal options, disrupting signals without collateral damage—perfect for Maven-identified targets in sensitive ops. Broader Defense Ecosystems, Maven feeds into systems like the Joint All-Domain Command and Control (JADC2), linking sensors across domains for seamless ops. DEWs complement this by offering scalable effects—from dazzling sensors (e.g., Vigilant Eagle for airport defense) to outright destruction. The Pentagon's Directed Energy Roadmap, with $1 billion annual investments, pushes for higher power outputs to tackle hypersonic threats, while initiatives like the High Energy Laser Scaling Initiative bolster industrial production. What makes this combo so revolutionary? Speed, precision, and cost-efficiency. Maven's AI spots the threat; DEWs eliminate it at light speed, with deep "magazines" that outlast ammo stockpiles. Project Maven is the spark igniting this fire, keeping the U.S. ahead in an era where data and energy are the ultimate weapons.

Video Transcript AI Summary
Speaker 0 presents a critical, conspiratorial view of Project Maven, describing it as a 100% military operation at the epicenter of American artificial intelligence efforts. The speaker claims Maven uses machine learning to identify personnel and equipment, streamlining activities that were once done by human analysts, with hopes to replace humans with machine-to-machine AI learning in what is described as a HAL 9,000-like system. The Maven Smart System is said to fuse data sources including satellite imagery, geolocation data, and communications intercepts into a unified battlefield analysis interface. The speaker draws comparisons to consumer fitness and tracking devices, asking rhetorically if Maven sounds like Strava tracking bike rides, Garmin devices used during cycling, a Fitbit during runs, or a heart-rate monitor for tracking. They extend the analogy to hacking into emails, texts, and digital photographs, and even to keystroke surveillance associated with historical software like Looking Glass Keyhole, which is described as backdoor access to computer activity. A critical claim is that Maven enables the collection of intimate personal data — home and car photographs, movements, geolocation, and daily habits (when someone bikes, walks, or walks a dog, where they walk the dog) — to build actionable intelligence about individuals, including the hypothetical ability to determine when someone might be targeted for murder using such data. The speaker emphasizes that Maven is a 100% military operation and asserts that “the enemy is you,” framing the public as “the sheeple” and alleging a global effort to trace and track populations with constant surveillance, referencing various metals and toxins as part of a broader conspiracy. According to the speaker, Maven originated as a training Beta Test and has since evolved into a computer-driven system deployed in conflict zones such as Yemen, Iraq, and Syria, with alleged spread to major U.S. cities or regions (Manhattan, New York, Los Angeles, Holmby Hills). The narrative attributes Maven to NATO rather than the Pentagon, claiming NATO controls AI deployment and that the goal is to command and control human brains and hearts—thus enabling real-time tracing and tracking, 24/7. Eric Schmidt is cited as being aligned with Maven due to his roles with Google and Alphabet, with additional criticism aimed at Google, YouTube, and other tech entities as part of the broader military surveillance ecosystem. Siemens is named as involved with Maven, alongside companies like Google, Lockheed, Nokia Bell Labs, and Raytheon. The speaker describes Maven as the integration of surveillance, predictive programming, and lethal force, including the concept of Lethal Autonomous Weapon Systems (LAWS) such as drone or robotic systems that could disorient or kill. The account mentions Skaggs Island with helicopter pads and drones, predicting a future dominated by autonomous weapons, drone patrols, and robotic law enforcement. The speaker connects these developments to a larger narrative involving global power structures, the World Economic Forum, depopulation programs, and control over financial systems such as a potential central bank digital currency, tying Project Maven to broader geopolitical and socio-economic schemes, including alleged manipulation by Swiss bankers and Jewish anthropologists.
Full Transcript
Speaker 0: Project Maven integrating satellite photographs of your home, of your car, of your movements, pinpointing your geolocation, keeping track of your data meaning what are your habits? When do you go for your bike ride? When do you walk to the store? When do you walk your dog? Where do you walk your dog? You see that might be important if somebody wanted to let's say NATO Gladeo murder you, right? Wouldn't it be good to have that kind of intelligence in your dossier? That's what these people are doing. This is a 100% military operation. Project Maven? United States Department of Defense Project MAVEN is at the epicenter of the American artificial intelligence military efforts. This initiative uses machine learning to identify personnel and equipment streamlining the process once painstakingly carried out by human analysts. Those pesky human analysts are going to be replaced by machine to machine artificial intelligence learning what the juxtaposition channel refers to as the HAL 9,000 supercomputer. Let me continue. The Maven Smart System fuses various data sources from satellite imagery, geolocation data, communications intercepts into a unified interface for battlefield analysis. Does that sound like using Strava to keep track of your bicycle rides? Does that sound like using a Garmin computer when you go out to do a bike ride? Does that sound like a Fitbit when you go for a run? Does that sound like wearing a heart rate monitor so you can be traced and tracked? Does that sound like hacking into your emails and your text messaging and your downloads of digital photographs? Does that sound like hacking into your computer and looking at the keystrokes that you type in with your fingertips into your keyboard which would be an Eric Schmidt program at Novell, WordPerfect, called Looking Glass Keyhole. It was to hack into the keystrokes of word processing software. That's what WordPerfect was, right? It was word processing software but it came under the military heading of Looking Glass Keyhole. Looking into what you're doing on your computer. Right, it's kind of like backdoor, undisclosed backdoor operations. That was called Keyhole and Looking Glass. But here we have Project Maven integrating satellite photographs of your home, of your car, of your movements, pinpointing your geolocation, keeping track of your data meaning what are your habits? When do you go for your bike ride? When do you walk to the store? When do you walk your dog? Where do you walk your dog? You see that might be important if somebody wanted to let's say NATO Gladeo murder you, right? Wouldn't it be good to have that kind of intelligence in your dossier? That's what these people are doing. This is a 100% military operation and the enemy is you. You're the enemy. In other words, the sheeple because let's be honest there are no great armies of the world. It's just about controlling whoever's left on this planet and dumping as much meta material on them by the minute so that they can all get traced and tracked with all the aluminum and barium and arsenic poison and titanium and lithium etc etc. Anyway initially this Project Maven was designed as a training exercise. Hey aren't they all right? It's called Beta Test. And a computer version using algorithms is now actively used in places like Yemen, Iraq and Syria. Yeah, let me fill in some other places Manhattan, New York Los Angeles Holmby Hills. Anyway Project Maven like I said it's attributed to the Pentagon like DARPA is but I'm here to tell you it's attributed to NATO. There's only NATO forces. NATO controls all this artificial intelligence and they're deploying it against you. You're the enemy and they want to command and control your brain and your heart and they want to trace and track you 20 fourseven. Project Maven is what it's all about. Eric Schmidt would be all in on this because he's been the CEO of Google and before that he was the chairman of the parent company of Google which is Alphabet. It's a portfolio of investments. YouTube, 23andMe, Eric Schmidt, Google. All those companies are a disgrace. They're a complete disgrace. Google is a military intelligence trace and tracking surveillance platform. YouTube is a propaganda poppycock disinformation platform that promotes censorship. They have more Charlie Manson did it videos than any place on the planet earth. Means you don't know who the judge was in the case who's a drug dealer from Burma and you don't know who the district attorney was, Elvil Younger, who all the staff referred to as Evil Younger. He was a drug dealer from Burma during World War II. They plucked him out of the FBI at age 24 and sent him directly to Bangkok and Burma where he worked with Charles Older who was the judge in the Manson case and Evelyn Younger was the district attorney and they rigged the trial to avoid NATO Gladio kill teams operating in Los Angeles County which they do to this day. Anyway if it's on television and the story you know it's not important. Let me talk to you about Siemens Corporation. It's a German manufacturing company and they're involved with Project Maven. Of course Google is, Lockheed, Nokia Bell Labs, Raytheon Missile Guidance System because it's the integration Project Maven is the integration of everything. It's the integration of surveillance of you, tracing and tracking you in real time, looking at your former travel habits so that they can predict, do predictive programming of where best to take you out. In your bed or on a dog walk or on a bicycle ride and everyone says, Oh he had a heart attack. Oh his pacemaker didn't work. Oh his insulin pump malfunctioned. See, no one all the casualties will not be COVID and all the casualties will just be heart attacks or what the media has now coined the new term as sudden death syndrome. Oh he's 16 years old, he died of sudden death syndrome. He's 16 years old and he's dead. That's perfect warmth. It happens. Just like 33 year old women die of manic episodes. That's what the coroner called Aaron Valente's death. They called it a manic episode. Took him four months to come up with this poppycock balderdash explanation of how a 33 year old woman who was very vibrant, very active, and having no trouble whatsoever turns up dead in the back seat of her Nissan Murano SUV in a Masonic address on Bowes Lane 7 Houses south of, Diablo Way. Siemens is in the mix. They have offices at Lawrence Liberal Weapons Laboratory. I'm sure they're at Los Alamos. I'm they sure do business with SRI as well as UC Berkeley, Lawrence Science Laboratory, because they're everywhere. They're like poison oak. You just can't get rid of them. Artificial intelligence arms race. A military artificial intelligence arms race between two or more states to develop and deploy lethal autonomous weapons systems. This has a military acronym: LAWS. L A W S. That's the future of gladioinato kill teams. It will be done by artificial, either a drone, a direct energy pulse, an LED light, disorienting you and then blowing up your brain or giving you a heart attack. It'll be done via laws Lethal Autonomous Weapon Systems. They're not going to send a kill team in to bayonet you. We're not going to do bayoneting anymore. We're switching over to the AI, to the lethal autonomous weapons program. They're going to have robot dogs. They're going to have robot sheriff's deputies. They are going to have the helicopters, the drones. They've already got that set up 13 miles behind my head at Skaggs Island. They have set up helicopter pads out there for drones as well as McDonnell Douglas Hughes helicopters and Bell 206B and you could even land a Chinook helicopter out at Skaggs Island. No problemo. This is the new world people and you need to know what Project Maven is. Project Maven is the epicenter of everything that the military has been working on for the last one hundred years and they've been accelerating this program since 1995 which is going to call it thirty years and the program has already been rolled out. It's not that they're going to roll it out. It was rolled out and it was rolled out with vengeance during the COVID operations. So they can throw the switch anytime they want regarding your bank account and central bank digital currency. That can be thrown at any moment. But as you can tell they're more interested in dumping metamaterials on us. They've been doing it for almost a year and a half now. I don't know when they're going to be done if it's going to go on for another year or two or three or four if they're going to wait till 2030 which is the big reset supposedly according to the World Economic Forum there's going to be a reset in 2030. The Swiss bankers and the Jewish managers and the Jewish anthropologists they're in charge of how to use Project Maven. They're in charge of anthropology and the Eugenics depopulation programs that are in play as I'm recording this.
Saved - January 10, 2026 at 9:13 PM
reSee.it AI Summary
I claim DARPA, Palantir, Boeing, foreign powers, and even Google have programs that read, write, manipulate, induce, project, and affect people in unimaginable ways—already weaponized. The Maduro raid tech is a taste, with DEWs, AI, electromagnetics, and frequency weapons.

@TheSCIF - The SCIF

DARPA, Palantir, Boeing, foreign countries, and even Google have programs and technology that can read & write, manipulate, induce, project, and effect things and people in ways you never thought possible. All this is already here and already weaponized. The tech reported in the U.S. military raid on Maduro is just a taste. These DEWs have many layers and include, A.I., electromagnetics, and other frequency weapons.

Video Transcript AI Summary
This transcript centers on the emergence of neuroscience and neurotechnology as potential weapons and the privacy, security, and ethical implications that accompany them. Key points include: - The novelty and viability of neuroscience as a weapon: nanoparticulate aerosolizable nanomaterials could be breathed in to disrupt blood flow and neurological network activity, usable as enclosed weapons or broad disruption tools. Nanomaterials could also enable electrodes to be inserted into a head to create vast arrays of viable sensors and transmitters. DARPA’s N3D program (next generation non-invasive neuromodulation) aims to create implantable electrodes that read from and write into the brain remotely in real time, without surgical brain insertion. - Advances in AI and neuroscience: artificial intelligence is enabling medical breakthroughs, including devices that can read minds and alter brains to treat conditions like anxiety or Alzheimer's. - Privacy concerns and protective legislation: as brain data becomes more accessible, privacy protections are seen as essential. Colorado passed a first-in-the-nation law adding biological or brain data to the state privacy act, akin to fingerprints if used to identify people. However, a study by the Neuro Rights Foundation found that two thirds of private brain-data–collecting companies are sharing or selling data with third parties, and most do not disclose storage location, retention periods, access, or breach protocols. - Widespread readiness and access to brain-decoding tech: devices on the Internet can decode brainwaves to varying degrees, and tech from companies like Elon Musk, Apple, Meta, and OpenAI could change, enhance, and control thoughts, emotions, and memories. Lab-grade systems can decode brain activity to turn thought into text; brainwaves are described as encrypted signals readable by AI. - At-home attention monitoring devices: EarPods and other wearables can detect whether a person is paying attention or their mind is wandering, and can discriminate between types of attention (central tasks like programming, peripheral tasks like writing, or unrelated tasks like browsing). When combined with software and surveillance tech, the precision increases. - Ethical and societal risk considerations: this technology raises concerns about data insurance discrimination, law-enforcement interrogation, and advertising manipulation. Government access could extend to altering thoughts, emotions, and memories as the technology advances. Privacy protections are described as a no-brainer by Pazowski of the Neuro Rights Foundation, who emphasizes that brain data represents “everything that we are,” including thoughts, emotions, memories, and intentions. - Real-world and speculative applications and threats: debates about whether devices can truly control thoughts; references to brain-reading in mice; concerns about bi-directional interfaces, remote writing signals to the brain, and potential co-optation by malicious actors. There are mentions of preconscious recognition signals (P300, N400) used in interrogations to identify recognition of a potential co-conspirator or weapon, potentially without conscious processing. - Surveillance versus autonomy and safety: discussions about bossware and ubiquitous monitoring in workplaces, plus the possibility that such monitoring could extend to controlling attention or even thoughts. - Security, hacking, and potential misuse: Bluetooth-enabled headsets, write-capable technologies like transcranial magnetic stimulation (TMS), and the risk of systems being hacked, underscoring the need to anticipate and mitigate misuse. - Global and political dimensions: comments on rapid progress (faster than expected), substantial military investment by China in neurotech, and concerns that AI integration with neuroweaponry could create new, uncharted information warfare. - Narratives of secrecy and manipulation: debates about why information is publicly released or withheld, the potential for misinformation, and the idea that these technologies could be used to “read our thoughts” and weaponize them, with implications for targeting, torture, and control of the narrative.
Full Transcript
Speaker 0: This is why it becomes so important to understand the novelty and the viability of neuroscience as being leveraged as weapons. We then have the use of nanoparticulate agents, aerosolizable nanomaterials that can be breathed in and disrupt blood flow and neurological network activity that can be used as an enclosed weapon or perhaps that can be used as a more broad weapon of disruption and or destruction. We also have the capability to utilize nanomaterials to get electrodes into a head and to create a vast array of viable sensors and transmitters. This is DARPA's N3D program, next generation non invasive neuromodulation, utilizing these techniques and technologies to create vast arrays of implantable electrodes that need not be put into the brain surgically, that are then able to read from the brain and write into the brain remotely in real time. Speaker 1: Advances in artificial intelligence are leading to medical breakthroughs once thought impossible, including devices that can actually read minds and alter our brains to help treat conditions like anxiety, Alzheimer's. Speaker 2: But that technology raises privacy concerns. That's why Colorado passed a first of its kind law aimed at ensuring our private thoughts remain private. Our ear pods that can pick up brainwave activity and tell whether or not a person is paying attention or their mind is wandering. Okay. Well, you might think, fine. But even if we can tell whether a person is paying attention or their mind is wandering, you can't tell what they're paying attention to. You would be wrong. Speaker 1: Who has access to this technology? You know, Karen, everyone, believe it or not. You can buy devices on the Internet right now that can, to varying degrees, decode your brainwaves. And the technology being developed by the likes of Elon Musk, Apple, Meta, and OpenAI can change, enhance, and control your thoughts, emotions, even your memories. It's the dawn of a new era filled with promise and peril. If the at home devices are impressive, those being used in the lab are even more so. Our brain waves are like encrypted signals and using artificial intelligence, researchers have cracked the code, identifying frequencies for specific words to turn thought to text. That I just think it and AI knows what I'm thinking. Speaker 3: Yes. Speaker 1: Because of the pattern of my brain wave. Speaker 4: Yes. Speaker 1: But with the benefits come risks. Speaker 4: It is some of the most sensitive data that you could possibly share with anyone. Speaker 1: Data insurance companies could use to discriminate, law enforcement to interrogate, and advertisers to manipulate. Government too could get into our heads and potentially alter our thoughts, emotions and memories as the technology advances. Speaker 4: Nobody wants to live in a world where some of these misuses or abuses exist. Speaker 1: While medical research facilities are subject to privacy laws, private companies that are amassing large caches of brain data are not. And based on a study by the Neuro Rights Foundation, two thirds of them are already sharing or selling the data with third parties. The vast majority of them also don't disclose where the data is stored, how long they keep it, who has access to it, and what happens if there's a security breach. Which is why Pazowski, medical director of the foundation, led the passage of a first in the nation law in Colorado that includes biological or brain data in the state privacy act, similar to fingerprints, if the data is being used to identify people. Speaker 4: This is a first step, but we still have a long way to go. Speaker 1: And with companies and countries racing to access, analyze and alter our brains, Pazowski says privacy protections should be a no brainer. Speaker 4: It's everything that we are. You know, it's everything about our thoughts, our emotions, our memories, our intentions. Speaker 2: And Sean, we're also wondering, can any of these devices actually control a person's thoughts? Speaker 1: They have been used to control the thoughts of mice in a lab. All right, so much to take in. Sean, thank you for that report. Speaker 2: What do Speaker 1: you think? Speaker 2: Is it a future you're ready for? You may be surprised to learn that it's a future that has already arrived. Everything in that video that you just saw is based on technology that is already here today. Artificial intelligence has enabled advances in decoding brain activity in ways that we never before thought possible. Sensors that can pick up your brainwave activity, earbuds, headphones, tiny tattoos that you can wear behind your ear. We can pick up emotional states like, are you happy or sad or angry? We can pick up and decode faces that you're seeing in your mind. Simple shapes, numbers, your pin number to your bank account. It's not just your brain activity here that we can pick up. We can also pick up your brain activity in different places, like as your neurons fire from your brain down your arm and send signals to your hand to tell you how to type, move. All of that could be decoded through electromyography, and that's what you're seeing here is a device now in the form of a simple wearable watch that can pick up that activity. And one of the pivotal acquisitions of the field, Meta acquired this company, Control Labs in 2019, because major tech companies are investing and helping to make these devices universally applicable as the way in which we interact with the rest of our technology. What if everywhere has ubiquitous monitoring? In fact, during the pandemic, what we found was that 80% of companies admitted that they use at least some forms of so called bossware technology to monitor the productivity of their employees. Whether it's a white collar employee monitoring what's on their screen, or in any other context, surveillance is part of our everyday lives. Surveillance for productivity is part of what has become the norm in the workplace, and maybe with good reason. Nine out of 10 employees waste time during the workday. They focus on other things. There may be good reasons why we want to be able to find better ways to monitor whether somebody is paying attention or they're doing something different. The newest way to monitor attention is through a device like this one. These are EarPods that are launching later this year. These EarPods, much like the video you watched earlier, are EarPods that can pick up brainwave activity and tell whether or not a person is paying attention or their mind is wandering. Okay. Well, you might think, fine. But even if we can tell whether a person is paying attention or their mind is wandering, you can't tell what they're paying attention to. You would be wrong. Turns out that you can not only tell whether whether a person is paying attention or their mind is wandering, but you can discriminate between the kinds of things that they're paying attention to. Whether they're doing something like central tasks, like programming, peripheral tasks, like writing documentation, or unrelated tasks, like surfing social media or online browsing. When you combine brainwave activity together with other forms of software and surveillance technology, the power becomes quite precise. So what do we do with this? What do we do with technology that enables us to monitor brainwave activity for attention? Do we embrace it? Do we resist it? If you've heard of Havana syndrome, Havana syndrome is a belief that people have suffered from the leading theory is that it's targeted microwave activity of brains to disrupt brainwave activity. There's no proof of it yet. Speaker 5: I had a hearing this week in Homeland Security, and this this hasn't even become very mainstream yet, but it was about, different foreign adversaries using direct weapons, direct energy weapons against US citizens that completely incapacitate citizens of The United States. You guys might have heard of it called Havana syndrome. And then we went down to the skiff, and we got a classified briefing from some of the people on the on the panel and it was one of the most I'm a former Navy SEAL, so I've traveled around the world and hunted bad guys for a long time. But I can tell you this, when I went down to that skiff, it was one of the most terrifying briefs that I've ever been a part of. Okay? This is how brazen our enemies are becoming because of how foolish, corrupt, incompetent, and I would act act actually say wicked we have become. Speaker 2: But there's at least a couple dozen cases where there isn't a good explanation for why the individual suffered from disruption of mental abilities. And there's certainly a lot of investment in trying to figure out whether you could target the brain remotely. It's much more difficult to figure out how you could read the brain remotely. Speaker 6: Let's get to that, because I think it's one of the most important and crucial questions about how this develops. And by the way, raise your hands. I'm just going to ask this question and then we'll move to the audience. You talked at the beginning. At the beginning you said you won't be able to read complex thoughts. It seems as though we can understand emotions. There's some way you can recreate some images inside your head. Speaker 2: Already, gamers have figured out, for example, while a person is wearing a headset, how to, you know, prime a person through their brainwave activity to be able to decode their PIN number and their home address. So you don't have to have your full complex thought decoded to reveal your thoughts, right? It just, it gets at what we think thought is. Speaker 6: How do you decode somebody's pin number? You flash a series of numbers and see how their brain reacts to them? Speaker 2: So, you have recognition memory signals that are preconscious and subconscious. And this is part of why it's been used, for example, by governments to interrogate criminals. Do you recognize this potential co conspirator? Do you recognize, you know, this murder weapon? Those preconscious signals, like what we call the P300 wave or the N400 wave, these are before you even consciously process information. So, you could prime it with a number and then see if a person recognizes it. And you can do it without them realizing that that's what you're doing. Speaker 6: So will all of our passwords be cracked first by this or quantum computing? Hard to tell. Alright. Speaker 7: There's a whole set of things around hacking bad actors. So for example if you have some headset and it communicates over Bluetooth Bluetooth is just not that secure. Most of these things are kind of read and not write. But there are technologies like TMS that do try to write signals to the brain. And I'm sure people are going to try to do that for various reasons. Imagine those systems being hacked. So we really want to think this through. We want to get a jump on it. I think that's neat as fundamental point. I completely agree with it. No matter how long the time scales are on some of the specifics we need to get on it. Speaker 8: I do fall on the side of this is moving faster rather than slower. You know I'm working with one of the world's leading experts on neurotech Rafael Euste who says that things that he thought would take five years are now taking one or two. So I think we're moving faster. And also because a billion dollars a year is being spent just by China alone through its military and researching neurotech. And I'm quite confident that they're working on, even though they have no personal knowledge, decoding human thoughts, potentially using these devices for torture and other kinds of things. Speaker 9: Use this artificial intelligence voice in the head to break down the ego and control an individual. Speaker 10: Ultimately, yes. You can't plug your eardrums. You can't stop the sound. A lot of the targets are tricked into believing evil aliens have abducted their brains, demons. They're tricked. Speaker 11: Yes. How are they tricked? Speaker 10: They're told. By who? By the voices. In a lot of these school shootings, I think that you hear about on the news, they hear voices. Speaker 7: And we've learned that Cruz told the BSO detective that he heard a demon in his head. Speaker 11: And police now say he also heard voices. Who heard voices in his head. Speaker 10: The scripts they're called, and they're meant to confuse the very derogatory. That's just typical breakdown. And why would you wanna break down the ego of that person? To rebuild it. So this gets into creating Manchurian candidates. Speaker 1: Police have released video made by the man who opened fire at Florida State University Speaker 10: in Project Soul Catcher referred to a Myron May as a Myron May. Right. As a psychobomb. They didn't care who the target was. They were just trying to make him explode and do something bad. He was a lawyer trained there. His reasoning why he shot up the school was he needed news publicity to make sure people understood this was real, and he left the video testimony. Speaker 7: As sick as this may sound, I've even had stalkers following me into church. Speaker 9: He believed government stalkers were harassing him and using a direct energy weapon to hurt him. Speaker 10: But he gave out, seven packages in the mail, and the FBI intercepted them all. What were in these packages? Just information. Just information. Speaker 1: May then opened fire at an FSU library, wounding three people. He was killed in a shootout with police. Speaker 9: If these people do explode and do something bad like this, there's absolutely no way to prove that there's been any sort of manipulation to the brain. In this guy's case, he talked about it. I mean, obviously, he talked Speaker 10: But it but it was covered up. He the Speaker 9: way they they way they write the article, he sounds like a crazy person. Speaker 5: Guys, if your, assessments here are correct, these are very covert weapons, aren't they? Speaker 12: That's correct. There's no entry or exit wound. How they're designed is to make the target feel like they're crazy, like they're imagining things. Speaker 5: And you guys also said that these attacks are happening right here in this city. Is that correct? Speaker 11: I mean, there have been some that have gone public with respect to Washington DC. Speaker 5: I think it was mister you mister Grozov said, you spoke to a Russian agent who said that they believe that Americans are using the same weapons on them. Is that correct? Speaker 10: That is correct. Speaker 5: Might that have something to do, with part of the CIA's motto to cover up the existence of the this tech and these weapons? Speaker 10: Is a very logical possibility. Speaker 5: Thank you. Mister chairman, I yield back. Gentleman yields. Chair now recognized the gentleman from New York, mister Goldman for his random questioning. Speaker 3: Thank you, mister chairman, and thank you to our witnesses for being here. Mister Grozov, I wanna follow-up a little bit on the interactions you've had with Russian intelligence about these a AHIs. And mister Zaid, you I wanna ask, and this is a hypothetical, but I I'm trying to understand why our government would try to block information sharing or conceal information that they have. And one thing that comes to mind is whether there's an operational risk to revealing any of the of the details of their investigation. Is is that something that you have come across, in any of your work? Speaker 11: There's a lot of reasons why the information might not be publicly released. And I do think that's something we could address more in a classified environment to explain that, but there are understandable reasons why the US government has not revealed much of what it knows. Speaker 12: There's some long term things that needs to be done in terms of of new acts. But in the short term, we need to do things like implement the original Havana Act. Speaker 3: Yeah. Speaker 12: DOD still hasn't done it. Speaker 13: So this is not out of the realm of these very nefarious people like in the CIA and these other types of secret societies institutions of our government. We're now finding out the use of AI can be used against people. We've already heard from the World Economic Forum that they have the ability with AI to be able to read people's thoughts by putting in a little Bluetooth in someone's ear that they can actually see what someone is actually thinking about as they're working and they're gonna sell it to us, Allison, as this is gonna be good for employment because employers will know whether or not their employees are daydreaming or thinking about other things other than the job. But what is it saying? It is saying that they now possess the ability to read our thoughts and now weaponize us with acoustical types of things that can be sent to us that throws us off balance or makes us feel crazy. This is all, where is it going? All about controlling the narrative, controlling people. Speaker 14: Absolutely. That is most certainly what it is all about as has been made rather clear over the past couple years especially. But, yeah, I think this could obviously take an extremely dangerous turn here. I mean, wouldn't be surprised if this led to targeting and testing and even like torturing of innocent civilians, which brings me to my next thought, is the inevitable threat of artificial intelligence mixing into all this. Mix AI into the use of neuroweaponry and you get an entirely new uncharted territory. Speaker 13: The whole idea is that we would have these biological sensors in our bodies and then they could read our thoughts, know our emotions, know whether we're hungry or not or anything like that. So now it's a warfare of information. They will have everything on you. They will know we are coming and going. And so this kind of warfare, this kind of being able to target individuals. And think about this, there is no way to detect. There's no entry point. There's no exit point a bullet would have. They could just target somebody and they're saying, you know, yeah, he went crazy. Yeah, I'm sorry. We we you know, and then turn the kill switch on somebody and, you know, and then lose a threat. Now
Saved - January 9, 2026 at 3:43 AM
reSee.it AI Summary
I report that Rep. Anna Paulina Luna refers Seth Harp to the DOJ for investigation and pursues criminal charges over the intentional publication of information related to Operation Absolute Resolve, including the doxxing of a Delta Force operator. That conduct is not protected journalism; it was reckless, dangerous, and put American lives at risk. The First Amendment does not license exposing elite military personnel or aiding adversaries under the guise of reporting.

@TheSCIF - The SCIF

Rep. Anna Paulina Luna refers Seth Harp to the DOJ for investigation and pursues criminal charges regarding the intentional publication of information related to Operation Absolute Resolve, including the doxxing of a U.S. Delta Force operator. "That conduct is not protected journalism. It was reckless, dangerous, and put American lives at risk. The First Amendment does not give anyone a license to expose elite military personnel, compromise operations, or assist our adversaries under the guise of reporting."

View Full Interactive Feed