TruthArchive.ai - Tweets Saved By @TheSCIF

Saved - March 9, 2026 at 11:26 PM
reSee.it AI Summary
I heard a Maricopa County election official testify that a Dominion employee copied votes onto hard drives and took them off site with absolutely no oversight or chain of custody during the 2020 election. Free rein with no oversight is a huge security breach; they could have changed anything.

@TheSCIF - The SCIF

Maricopa County, Arizona, election official testifies that a Dominion employee was observed copying votes onto hard drives and taking them off site with absolutely no oversight or chain of custody, whatsoever, during the 2020 election. Complete free rein with no oversight is a huge security breach in our elections. They could have uploaded or downloaded or changed anything during the 2020 election.

Saved - March 7, 2026 at 7:03 AM
reSee.it AI Summary
I read that George Soros was involved and allegedly knew of Hillary Clinton’s plan to frame Trump with Russia, arguing this treason at the highest levels. Intercepted 2016 emails from the Soros Foundation allegedly show Leonard Benardo stating Clinton approved highlighting Russian interference to distract from her email controversy. The piece blasts the FBI, and accuses Obama’s team and Clinton of fabricating a coup, calling it sedition and demanding accountability.

@TheSCIF - The SCIF

George Soros involved and allegedly knew about Hillary Clinton's plan to frame President Trump with Russia Collusion. How deep is this entire plot and does the corruption really go? This is treason at the highest levels. Intercepted emails from 2016, from the Soros Foundation, exposed that Leonard Benardo, an executive at the foundation, indicated that Hillary Clinton approved a plan to highlight alleged Russian interference in U.S. elections, specifically framing President Trump with ties Russian hackers, to distract from her own email controversy. The annex suggests this was intended to escalate to an "Olympic level" of scrutiny. The document also criticizes the FBI for dismissing potential Clinton campaign involvement or Russian disinformation without a thorough investigation. This exposes Obama's entire administration and national security team, especially then-CIA Director John Brennan, and Hillary Clinton herself fabricating and executing a coup on a sitting president and the United States itself. This is sedition and treason at the highest levels. They must be held responsible and pay for their crimes.

Saved - March 7, 2026 at 6:19 AM
reSee.it AI Summary
I recount that Obama and John Brennan allegedly met weekly to compile a list of people to assassinate. From 2009–2016: 563+ drone strikes, 4,000+ targeted deaths, 800+ civilian deaths; 91,930+ bombs dropped, 19,500+ targeted deaths, 4,950+ civilian deaths. I note that Obama has dropped the most bombs and conducted the most targeted drone strikes, with civilian deaths cited.

@TheSCIF - The SCIF

Obama's secret kill list. Every Tuesday, Barack Obama and John Brennan would meet and create a hit list of people to assassinate that week. Assassinations were conducted by drone, air strike, tactical teams, or individual hitman. DRONES STRIKES 2009-2016: - Total Drone Strikes: 563+ - Total Drone Strike Targeted Deaths: 4,000+ - Total Drone Strike Civilian Deaths: 800+ BOMBS DROPPED 2009-2016: - Total Bombs Dropped: 91,930+ - Total Targeted Deaths from Bombs: 19,500+ - Total Civilian Deaths from Bombs: 4,950+ Obama has dropped the most bombs and has conducted the most targeted drone strikes, which have also killed civilians, more than any other president in history.

Saved - March 3, 2026 at 7:55 AM
reSee.it AI Summary
I reference the Weiner laptop and the “Insurance Policy” file; claim 9+ NYPD cops didn’t die by accident. Once the Weiner laptop is exposed, the cabal will fall. This video will frazzle you. I ask who has copies of the hard drive and will release them to expose the truth.

@TheSCIF - The SCIF

The Anthony Weiner laptop and the "Insurance Policy" file. 9+ NYPD cops don't all end up with self-inflicted gun shots to the head by accident. Once the Weiner laptop is exposed. The cabal will fall. This video will have you all frazzled up after watching it. The most important question still remains... Who has copies of the hard drive and will they release it and expose the truth once and for all?

Video Transcript AI Summary
The FBI is reopening its investigation into Hillary Clinton's use of a private email server. The Wall Street Journal reports that 650,000 emails are sitting on Anthony Weiner's laptop, and thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, is now the focus of new inquiries. Sources say there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that Mrs. Clinton used while she was secretary of state. The laptop had previously not come up in the Clinton email probe. Anthony Weiner’s laptop reportedly contained kill switches and was not released before. Weiner’s laptop is connected to an investigation into whether he sent sexually charged emails to a teenage minor; the laptop hadn’t previously come up in the Clinton probe. In an exclusive interview with Inside Edition, a minor says she first sent Weiner a message on Twitter in January 2016 when she was 15 years old. She says the messages quickly turned obscene, and she was disgusted, which contributed to her coming forward. At the time, Weiner's wife, Huma Abedin, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Abedin, which led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server just days before the presidential election. Inside Edition says it is withholding the girl's name because she is underage, but her father gave permission for her face to be shown. Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators note that Comey’s October 2016 reopening announcement was controversial, with some saying it cost Hillary Clinton the election. It is argued that the NYPD started investigating via subpoena and warrant, and they found 650,000 emails on Weiner’s laptop, including Clinton emails, Huma Abedin’s emails, and evidence pertaining to Clinton Foundation. They reportedly found state department emails and material including money laundering and references to a trip to Epstein’s “sex island,” with Clinton and Bill Clinton allegedly there multiple times. The material was given to the FBI, with threats to go public if the investigation wasn’t reopened or indictments issued. There is testimony that “nine cops watched the videos on Wiener's laptop,” and that those officers were later dead. Another account says there were 12 individuals who saw the laptop, and none are dead. Reports note a surge in NYPD suicides this year, with nine or more officers dying by suicide, including the latest at Queens General Hospital. One account links deputy chief Steven Silks to overseeing evidence from the Weiner laptop and to copies made of that evidence; Silks reportedly died by an alleged self-inflicted gunshot wound one month before mandatory retirement. Other rumors claim the laptop contained numerous emails from Hillary Clinton during her time as secretary of state, “insurance policy” files, and family involvement, with allegations that the FBI lost the laptop. A high-ranking NYPD official reportedly warned of grave contents and indicated others had copies of the information. Proponents argue that, if the Weiner laptop were released, the government would fall.
Full Transcript
Speaker 0: We never thought we were going to say thank you to Anthony Weiner. Speaker 1: The FBI is reopening its investigation into Hillary Clinton's email scandal. The Wall Street Journal reports 650,000 emails are sitting on Anthony Weiner's laptop. Thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. Speaker 0: To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. Speaker 2: A computer used by former congressman Anthony Weiner and his estranged wife, Huma Avedin, is now the focus of new inquiries into Hillary Clinton's use of a private email server. Sources have told the Wall Street Journal's Devlin Barrett that there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that missus Clinton used while she was secretary of state. Why is this one laptop now so significant? Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. Speaker 2: Who sees from Weiner as part of an investigation into whether he sent sexually charged emails to a teenage minor. The laptop hadn't previously come up in the Clinton email probe. Speaker 4: Did he know that you were only 15 years old? Speaker 5: He did. Speaker 4: Her age was no deterrent for Carlos Danger. In an exclusive interview with Inside Edition, this minor says she first sent disgraced Queens Congressman Anthony Weiner a message on Twitter back in January 2016 when she was just 15 years old. Speaker 5: I just sent him a nice message, just hello. I'm a huge fan. Speaker 4: She says she wanted to see if he was up to his old antics during last year's presidential election. Turned out, he was. Speaker 5: I knew that it was going downhill and really fast. Speaker 4: She says the messages from the Democrat quickly turned obscene. I was Speaker 5: disgusted. That's part of the reason that I came forward. Speaker 4: At the time, Weiner's wife, Huma Abidine, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Aberdeen. That led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server while secretary of state, just days before the presidential election. Inside Edition says it's withholding the girl's name because she's underage, but her father gave permission for her face to be shown. Weiner went on to plead guilty to a charge of transferring obscene material to a minor. Speaker 6: Just striking about this is that, you know, announcement from James Comey in October 2016, you know, kind of saying that the investigation was being reopened here. Some people say that cost Hillary Clinton the election itself. But when we look at that incident and, you know, not with this all this other information we have, what jumps out to you about that? Speaker 7: That was Comey trying to cover Comey because they knew they hadn't done what they should have done with the Wiener laptop and the New York Police Department who were honest were gonna disclose all that. He just simply had to do it to try to save his own skin. Speaker 8: Because of Wienergates and the section scandal, the NYPD started investigating it. Through a subpoena, through a warrant, they searched his laptop and sure enough found those 650,000 emails. They found way more stuff than just the, more information pertaining to the the inappropriate texting the guy was doing. Speaker 7: 675,000 Clinton emails when they got Anthony Weiner's laptop in a search warrant because of all his sex perversion issues. It was all the Clinton emails, the Clinton Foundation, her secretary of state emails, Huma Abedin's emails. Lots of people emailed Huma as a proxy for Hillary. Speaker 8: They found state department emails. They found a lot of other really damning criminal information, including money laundering, including the fact that Hillary went to this, sex island with convicted pedophile Jeffrey Epstein. Bill Clinton went there more than 20 times. Hillary Clinton went there at least six times. The amount of garbage that they found in the emails of criminal activity by Hillary, by her immediate circle, and even by other, Democratic members of Congress was so disgusting. They gave it to the FBI, and they said, we're going to go public with this if you don't reopen the investigation, if you don't do the right thing with timely indictments. Speaker 9: We're not talking about one or two emails. We're talking about hundreds of thousands of emails. Speaker 8: NYPD was the first one to look at that laptop. Speaker 7: I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 10: Somebody sent it to me. I I would not advise you to have a look at it. She and her spokeswoman, they put a five year old girl naked on a table, bind it, And then with a scalpel, they start to remove the face. Speaker 0: Oh my Speaker 10: god. Then you hear this child screaming, screaming, and they take off the face. And Hillary Clinton puts it on her face and goes to the child. And you see, the child is all flesh, and then the eyes pour out, and this child sees her own face on the face of Clinton. I will never forget that image, and I I never scream. That's how evil these people are. Speaker 3: Supposedly, nine cops watched the videos on on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. Speaker 11: There were a total of 12 individuals who saw Anthony Winner's laptop computer. None of those 12 people are dead now. Speaker 12: Some sad news tonight. Another New York City police officer has taken his life. The second NYPD suicide in two days. Speaker 0: Well, Corey Tamsen, you know, with the latest suicide, the eighth this year, the sixth, just the last two months alone. Speaker 13: Another New York police department officer has died by suicide, becoming the ninth to do so this year. According to a law enforcement official, the 56 year old officer was off duty and at home. On Tuesday, another law enforcement official told CNN that an eighth officer had died by suicide. A 35 year old Speaker 9: Robert Escheverria died of a self inflicted gunshot wound at home last night. The 25 year veteran officer suicide came a little more than twenty four hours after a 35 year old officer took his own life. Commissioner James O'Neill is still struggling with the news. Speaker 0: You know, you think that, okay, this is gonna be the last one. And and last night I got a phone call and I just did it. It just almost knocked me down. I just took the wind right out of me. I just, you know, you know, what the hell is going on here? Speaker 9: So far this year, there have been nine NYPD suicides, seven since June. Last year, there were a total of four. We don't know why Nick did what he did. Doug Budney's son Nick, a fourteen year NYPD officer, took his own life last year. I just think it was a bad last decision. Speaker 12: Another NYPD officer has just died by suicide. It's the tenth suicide so far this year. News four's Gus Rosenthal is live at the site of the shooting in Queens. Gus, what can you tell us? Speaker 14: Yes. Renaud, an officer was pronounced dead at Queens General Hospital just a few minutes ago, and now a number of other officers are here trying to figure out exactly what happened. This is the scene at 178th And Union Turnpike in Utopia, Queens. Little known about who this officer was and the circumstances surrounding this. Again, we just know this was an off duty officer with a self inflicted gunshot wound. He was rushed to the hospital where he would pass away just a short while ago. Now leading up to this, as you mentioned, there have been nine previous suicides by active members of the NYPD happening this year in 2019. Speaker 11: Now that is a strange coincidence. Anthony Weiner is alive. Weiner shared the laptop with his estranged wife, Huma Abidine, a close aid to Hillary Clinton since 2000. Speaker 15: NYPD chief commits suicide one month before retiring was directly involved in Anthony Weiner laptop computer evidence handling. A high ranking New York City police department officer has died from an alleged self inflicted gunshot wound to the head. Deputy chief Steven Silks was found in an unmarked patrol car wearing civilian clothes Wednesday evening, just one month before he would turn 63 and face mandatory retirement. He allegedly shot himself in the head with the gun reportedly discovered beside him. He was very closely and heavily involved in the investigation of the laptop seized from the former congressman Anthony Weiner, which allegedly held volumes of Hillary Clinton email evidence on it. A fellow officer told the New York Daily News that Silks was deeply committed to the job Silks reportedly submitted his mandatory retirement paperwork the day before. Other sources, however, say that the deputy chief was heavily involved in the sex crimes investigations of former Democrat congressman Anthony Weiner and that the chief personally oversaw the evidence gathering from a laptop computer seized from Weiner in that investigation. The laptop is alleged to have contained numerous emails from Hillary Clinton during her time as secretary of state and numerous files in a folder titled insurance policy, which reportedly contain extraordinary details about child sex rings operated by and for use of high ranking government officials nationwide. Ultimately, that laptop had to be turned over by NYPD to the FBI who allegedly lost it. Rumors have circled for years that NYPD top brass took copies of the hard drive because they were suspicious of the feds in general and wanted to make certain that the evidence was preserved. One high ranking NYPD official at the time, the laptop was seized, told media outlets he was sickened by what he saw on that computer. And if the Fed did not pursue the necessary investigations, he would reveal what the laptop contained. It is now believed that deputy chief Silks was that official. No one is confirming or denying that information at this time. So deputy chief Silks was one of the now 10 officers, and he allegedly was the one who oversaw all the information on the Anthony Weiner laptop and made copies. Who else made copies, and who else has the information? Was it suicide? Probably not. Speaker 7: So one of the things if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted, I have no doubt, on that laptop. Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. It was filled with crap that wasn't supposed to be there. We never get to see it. Supposedly, nine cops watched the videos on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. You know, it's like the five cops who died after January 6. Right? Four of them were suicides. Out of according to AI, there were about 80 cops really in the thick of things. Four of them died from suicide.
Saved - March 3, 2026 at 3:14 AM
reSee.it AI Summary
I believe Obama literally created one of the worst terrorist groups by deploying the Brennan CIA to create ISIS, which splintered to overthrow Assad in a covert CIA-Saudi operation, causing hundreds of thousands killed and millions displaced in Syria.

@TheSCIF - The SCIF

Obama literally created one of the worst terrorist groups in history by deploying the Brennan CIA to create ISIS, which splintered into a jihadists group, in an attempt to overthrow Assad in a disastrous joint covert operation with the CIA and Saudi Arabia, which resulted in over 500,000 people killed, and displacing over 10 million in the U.S. proxy war with Syria. All roads lead to Obama.

Saved - February 28, 2026 at 5:56 AM
reSee.it AI Summary
I report that Jeff Lenburg, a nation-state vulnerability expert, exposed Dominion voting machines in Antrim County 2020 as swapping Trump and Biden votes: 4 Trump ballots inserted, 2 counted; 2 Biden ballots inserted, 4 counted. He warned, "The highest priority as a bad guy would be to subvert our election system."

@TheSCIF - The SCIF

Nation-state vulnerability expert Jeff Lenburg exposed Dominion voting machines and software used in the Antrim County 2020 election swapping Trump votes with Biden votes. Trump ballots inserted: 4 votes - Counted: 2 votes Biden ballots inserted: 2 votes - Counted: 4 votes "The highest priority as a bad guy would be to subvert our election system." — Jeff Lenburg: nation-state vulnerability expert

Saved - February 28, 2026 at 12:57 AM
reSee.it AI Summary
I report CAL DOGE alleges $928 million from California’s SOMAH program—meant for solar installs on affordable housing—was diverted to Democratic voter registration and activism. Funded by gas taxes and utility bills, only 269 projects totaling $72 million have been completed since 2015. GRID Alternatives and CEJA are implicated; CEJA’s affiliated entity reportedly used public funds for partisan activities, including voter mobilization and endorsements. CAL DOGE calls for a full audit.

@TheSCIF - The SCIF

HUGE: $928 MILLION Stolen from California Solar Program and diverted to Democratic Voter Registration & Activism Efforts A new report from CAL DOGE alleges that $928 million from California's Solar on Multifamily Affordable Housing (SOMAH) program, intended to fund solar installations on affordable housing, has been diverted to Democratic voter registration and activism efforts. Funded by gas taxes and utility bills, the program has completed only 269 projects worth $72 million since 2015, raising questions about the missing funds.Organizations like GRID Alternatives and the California Environmental Justice Alliance (CEJA) are implicated, with CEJA's affiliated entity reportedly using public dollars for partisan activities, including voter mobilization and candidate endorsements. CAL DOGE calls for a full audit to ensure accountability.This highlights ongoing concerns about transparency in green energy initiatives. Source: NY Post

Saved - February 27, 2026 at 8:05 AM
reSee.it AI Summary
I believe Hillary Clinton orchestrated the Russia Collusion operation to divert attention from her foreign dealings and an illegal private email server. I claim investigators found 650,000 emails with state secrets and crimes, allegedly destroyed with hammers and bleach. I say Clinton devised the plot; Brennan escalated it; Obama lit the fuse. Brennan and Clapper’s operatives allegedly carried out the coup—slander, spying, psy ops—to subvert the United States and Constitution. I demand accountability and imprisonment.

@TheSCIF - The SCIF

Hillary Clinton orchestrated the Russia Collusion operation against President Trump to divert attention from her foreign dealings and illegal private email server. Investigators found over 650,000 emails with state secrets, child exploitation content, pay-to-play schemes, money laundering, perjury, Obama's pseudonym for illicit communication, and more. Evidence was destroyed using hammers and bleach, despite claims of innocence. Clinton devised and approved the plot, Brennan ran it up the ladder after they knew no real collusion existed, and Obama lit the fuse. Brennan and Clapper's operatives executed the coup, involving slander, spying, taxpayer-funded psychological operations to not only undermine President Trump, but subverting the United States and the Constitution itself, all to conceal decades of crime and corruption and retain power. This constitutes high-level sedition and treason. Americans were deceived and gaslit for years by the mainstream media and our own government. It's time for accountability and imprisonment. What will it take for action against these criminals?

Saved - February 26, 2026 at 11:19 AM
reSee.it AI Summary
In 2020, Nevada Democrats mailed ballots, not applications, to every registered voter, including 41,000+ who hadn’t voted or updated in 10+ years—many were dead—yet they received ballots and voted. This is FRAUD.

@TheSCIF - The SCIF

In 2020, Nevada Democrats mailed ballots, not applications, to every registered voter, requested or not. They knew over 41,000 registrants hadn't voted or updated registrations in 10+ years. Why? They were dead, but got ballots anyway, and many voted. This is called FRAUD. https://t.co/ShjUXQjm3N

Saved - February 24, 2026 at 2:58 PM
reSee.it AI Summary
I see John Brennan as a traitor to the United States, involved in the coup against Trump, and who signed visas for half the terrorists in 9/11. He knew their plans. He’s as dirty and ruthless as they come and must be held accountable.

@TheSCIF - The SCIF

Former CIA Director John Brennan is not only a traitor to the United States and involved in the coup against President Trump, but also signed the visas for half of the terrorists involved in the 9/11 attack on the World Trade Towers. You really think he didn't know what their plans were? He is as dirty and ruthless as they come and must be held accountable.

Saved - February 23, 2026 at 7:20 AM
reSee.it AI Summary
I state that Democrats didn’t expect Trump to lead by hundreds of thousands in 2020, so they shut down swing-state voting locations to cheat and steal the election.

@TheSCIF - The SCIF

Democrats didn't expect Trump to be ahead by hundreds of thousands of votes in the 2020 election, which forced them to shut down multiple swing state's voting locations to cheat on top of already cheating in order to produce even more fraudulent votes to steal the 2020 election. https://t.co/rWxEvKr2oc

Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.
Full Transcript
Speaker 0: No matter which side of the fence people have been on, they've been saying, show me the evidence. I'll believe it when I see the evidence. And people on both sides agree that something went terribly wrong in November 2020, but there really has been no comprehensive place to see the evidence of widespread fraud until now. This video is pure data, so don't get mad. You can't be angry when a scientist confirms that gravity pulls downward at negative 9.8 meters per second squared, even when that fact works against the narrative you've heard. Here we go. Just before we show you some new disturbing video evidence, we'll talk about statistical anomalies in three states in question. In the early hours of 11/04/2020, Democratic candidate Joe Biden received several major vote spikes in Michigan, Wisconsin, and Georgia, suddenly placing him in the lead when he had been trailing Trump by a significant margin. 8,954 individual vote updates were analyzed. Across nearly all updates, there follows a clear statistical pattern. However, a very small number of batches are especially questionable. The four most notable aberrations were two in Michigan, one in Wisconsin and one in Georgia. And all occurred in the same five hour window in the middle of the night, when in some places counting reportedly had stopped. Not only do these updates not follow generally observed patterns, but their behavior is particularly extreme. For context, using publicly available data from the New York Times, here is a visualization of the number of votes by candidate in Michigan from the beginning of the election night to 7PM Eastern Time on November 4. Trump is in red, Biden is in blue. Notice the sudden and improbable spike in votes for Biden at 06:30AM, where Biden received a 141,258 votes, while Trump only received 5,968. This extreme ratio is surrounded by updates that are nearly the same in ratio. This particular update is 23 times more votes for Biden and is the most extreme update favoring Biden in all datasets across all states. The situation in Wisconsin is even more stark. A single update to the vote count brought Biden from trailing by over 100,000 votes into the lead. Thirdly, a vote update in Georgia at 01:34AM eastern time on November 4, which shows a 136,155 for Joe Biden and only 29,115 for Donald Trump. The extents of these four votes spikes in question are more than the margin of victory in all three states, which means the spikes were not only abnormal in regards to percentage for Joe Biden, but also in magnitude of the vote count. Out of roughly 9,000 updates, this election was decided by only four extreme updates, each with a probability of less than one tenth of 1%. Meaning that had these four unlikely updates not happened, we would have a different president in the White House. Detractors argue that these spikes were merely human error and not indication of fraud, and the errors have been corrected. If the errors have been corrected, where is their evidence? Why were the results never changed? Others have said that the spikes indicate heavily democratic precincts. If that were the case, then California would show many spikes of that magnitude, but it doesn't. Only one vote update in California is anomalous in percentage of Biden votes, but not enough magnitude to shift an outcome. The strangest anomaly visible in the data is consistently identical ratio of Biden to Trump votes across time, which is theoretically impossible. Here is Florida. These updates occurred over a week following the election. Notice all the ratios of Biden to Trump votes are a 100 identical over several days. This pattern shows up in many states. It appears that a computer algorithm is involved in the process, which is doing something called weighted race distribution, a feature of Diebold voting machines known as early as 2001, which gives values to votes rather than simply counting them. Here in California, we see an update of one vote. About 65% of that value is given to Biden and 32% to Trump. How can one vote go to more than one person? It is well known and not disputed that Diebold software was found to be switching votes through programming in past elections. Even though Diebold is no longer used, Dominion Voting Systems acquired ESNS in 2010, which had previously acquired Diebold under its new name of Premier Election Solutions. This does not exhaust all statistical data anomalies encountered in the twenty twenty election, but data anomalies is only one factor to consider. Next is eyewitness and video evidence. In Georgia, there's a case of a poll worker named Ruby who was seen on Instagram giving a secretive live video of her working in the backroom filled with absentee ballots. Speaker 1: I'm a look. I'm a let y'all see it here. Okay. Don't say nothing. Listen. Speaker 0: At 10:30PM on November 3, all media and poll watchers were told to leave State Farm Arena because ballot counting was going to stop. But Ruby and her daughter and three others remained behind at State Farm Arena. They pulled boxes of ballots out from under the table that was placed there in the morning and distributed them to several counting stations. Speaker 2: Back to Fulton County, Georgia right now, where our reporter, Blaine Alexander, apparently has some new reporting on the expectations for that count. Speaker 3: Rachel, we've learned that the counting continues tonight. You know, right here in State Farm Arena behind me, we've learned that there are five people who are still inside, still working to scan those absentee ballots and try and get those numbers tabulated. Now initially, we believe we were told that everybody went home at about 10:30, but I just got off the phone with the county spokesperson who tells me that indeed there are still some people in there quite literally burning the midnight oil, scanning ballot after ballot, and trying to get that information in. Speaker 2: And, Blaine, specifically, you said five people are inside that building? That's five of five actual individuals who are working on all the absentees in Fulton County right now? Just five? Wow. Talk about having that sort of fate of the nation in your hands. Speaker 0: Ruby is seen here in this video running the exact same stack of ballots to the machine three times. Other workers do the same. Note that a large surge in Biden votes can be observed after this tabulation at o 06:34 Greenwich Mean Time, which is 01:34AM in Georgia, just after the time in question. You may ask, can a ballot really be counted more than once? Here is your answer from Coffey County, Georgia. Speaker 4: Can you scan a ballot more than once? Speaker 3: I've just done it. Speaker 1: You just done just batch that she's Speaker 3: been doing. Speaker 4: Yeah. You just keep scanning. Speaker 3: Usually. I just kept scanning same Speaker 4: actually just keeps up with you. Speaker 3: I just scanned the same batches that y'all just voted. Mhmm. I never got any more until that one. Speaker 4: Don't know why they approved such a system. Speaker 0: Ruby allegedly posted this later on social media. Of course, the mainstream media calls this misinformation and most references to these videos have been deleted from internet search results. Apple News, the morning of the election, sent out a push message to Apple News subscribers that elections are secure. So if it's true that election fraud is rare, what about Raquel Rodriguez? She was recently arrested for election fraud in Texas because of overwhelming video evidence incriminating herself that she was harvesting ballots for pay. Speaker 1: Leave the top of ticket to get votes for either Biden. How many votes do you think you can deliver for us? Speaker 5: At least 5,000. Speaker 1: And what are we looking at as far as how much that's gonna cost? Speaker 5: For the entire team that I'm looking at, I'm looking at 55,000. Speaker 1: So $55,000 for 5,000 votes, pop the ticket, eager, Biden? Speaker 5: If not not more, I'm I'm not gonna over promise because remember, we we're we're sixteen days till election day. You you give me cash, you can do whatever you wanna do. Speaker 1: $55,000 upfront, 5,000 votes. Speaker 5: That's right. Speaker 0: Then there is cybersecurity evidence and the question of whether Dominion voting machines were tampered with over Internet connections. Signed affidavits under oath from cybersecurity experts indicate that Dominion Voter Systems and Edison Research were using an unencrypted VPN with login credentials that were easily accessible and used by foreign adversaries to monitor and manipulate votes. The IP addresses into the Edison Research host service went in both directions, meaning that not only were China and Iran and other countries accessing the servers, but also Edison Research was communicating back to these adversaries. The claims that Dominion voting machines were not connected to the Internet are completely false. Cybersecurity experts have followed the communication of the data from Dominion voting servers and Edison Research to foreign countries. A simple web search will uncover that dominionvotingsystems.com is registered to a company in Hunan, China. Three of the seven board members of UBS Securities are Chinese nationals. That company owns Staples Street Capital, which in turn owns Dominion. On top of that, the Dominion software is licensed from Smartmatic, which is a Venezuelan owned and controlled company. And we're all familiar with how their elections go. Furthermore, forensic audits of the machines reveal significant errors. Although the mainstream media and politicians are saying that it's dangerous misinformation that Dominion voting systems are unsecure, this was the very message that several left leaning news sources were claiming less than a year ago. NBC News and PBS found out just how easy it is to hack voting machines or cast fake votes. Speaker 4: It's important to know that Georgia just spent over 100 or is about spent over a $100,000,000 on a contract with Dominion to provide image cast hardware to the state in time for the '20, for the for the next primaries and for the twenty twenty election. And yet here these kids were who had opened it up. They said, look. You can pop the front off of it, and here's a port you can get into right here. That's easy. You know, all kinds of stuff that that you could certainly do within six minutes behind a curtain, much less, if you had extra time because any of these were, connected to the web as we discovered a couple days before, so many of them are. Speaker 0: Despite opposition and attacks, election security experts were able to audit Dominion voting machines in Antrim County, Michigan, revealing unusually high error and adjudication rates. What does that mean? According to the report, Dominion Voting Systems is intentionally designed with inherent errors to create systemic fraud and influence election results. Ballot errors are sent to adjudication, which means the vote can be decided by an election worker where there is no oversight, no transparency, and no audit trail. Speaker 6: We've scanned a 113,130 as of moments ago. We've adjudicated a 106,000 plus of those. Speaker 0: Experts identified an error rate of 68 o 5%, which is far above the federal election commission guidelines of point 0008% or one in 250,000. Although vote adjudication logs are available for prior election years, suspiciously, all the logs for the 2020 cycle were missing. Moreover, all security logs prior to 11:03PM on November 4 are also missing. If that's not enough, the election event designer log shows that the Dominion Image cast precinct cards were reprogrammed on October 23 and again on November 5, which violates the Help America Vote Act, which includes a ninety day safe harbor period that prohibits changes to election systems, registries, hardware, and software updates without undergoing recertification. Even if skeptics and critics persist that these issues are inconsequential, they should be willing for forensic audits to take place for transparency, yet they have viciously attacked attempts to review logs. Why is that if there's nothing to hide? Election officials in Maricopa County, Arizona have even ignored subpoenas for release of election data and Dominion Machine audits until after the inauguration. Then there's the mass influx of unsolicited mail in ballots. The keyword is unsolicited. In other words, people receiving ballots they never asked for. Politicians use the coronavirus to push mass mail in ballots and extending the time to receive those ballots till many days after the election. There are many reports of people who voted in person also receiving multiple unsolicited ballots in the mail. People who did not send in a mail in ballot denied person voting because they were told they had voted already by mail when they hadn't. This opened up chaos in the system and uncertainty as to who actually voted. Additionally, signature verification requirements were slackened in many states adding even more uncertainty. In fact, the Pennsylvania Secretary of State unilaterally removed legislative signature requirements for mail in ballots. More than a thousand signed affidavits have been given by poll workers who have witnessed illegal activities, non equal treatment of Republican poll watchers, counting ballots in locations with no poll watchers, poll not permitted close enough to see the counting process, shredding ballots, garbage bags full of ballots for Trump, entire boxes of hundreds of supposedly mail in ballots that have no folds indicating they were never actually mailed by anyone. The list goes on and on. These affidavits are signed by witnesses under penalty of perjury, so this should not have been taken lightly, but these witnesses were never heard in court. Unfortunately, what we have covered is only the tip of the iceberg on fraud, cover ups, federal election law violations, dishonesty on a global scale. Speaker 7: So either the secretary of state's office is recording and certifying results that have negative errors and fraudulent votes in them, or someone is giving them negative information. Speaker 0: Recent polls show an overwhelming percentage of The US don't trust the twenty election was without fraud. At the end of this video, the credits will be further data scrolling through that you can read for yourself and pause and go back and read again. So what can you do? Firstly, find a way to download this video and share it. Film it with your mobile phone. Do anything to duplicate this. Post it with a hashtag, here is the evidence, hashtag every legal vote. Because guaranteed, big tech and social media giants will do their best to erase it from the internet as they've already done with much of evidence we've already shared. And if they can't erase it, they'll fake fact check it. Well, guess what? We've already done the fact checking. We've gone through thousands of pages of data, sworn affidavits, forensic reports, and cyber security reports. Secondly, you can demand election reform from your election state and local officials. We cannot let another election ever be this questionable ever again. This is The United States Of America. People used to look to us on how to have democracy through our voting system. 2020 was a complete sham and it cannot ever happen again.
Saved - February 18, 2026 at 7:01 AM
reSee.it AI Summary
I claim Hillary Clinton's campaign manager testified she started the Russia Collusion hoax by pushing a fabricated story about Trump having a "secret server" tied to Russia, while she herself had a secret server linked to foreign crimes. They accuse Trump of crimes that they themselves commit; the patterns don’t lie.

@TheSCIF - The SCIF

Hillary Clinton's own campaign manager testified that she started the entire Russia Collusion hoax by giving the media the greenlight to run a completely fabricated story about Trump having a "secret server" tied to Russia, when in reality, she was the one with an actual secret server tied to foreign countries and illegal activities, which was said to contain evidence of child trafficking and abuse, pay to play politics, money laundering, and many other serious federal crimes. Whatever they accuse Trump and conservatives of, they are literally guilty of themselves. The patterns don't lie.

Video Transcript AI Summary
Hillary Clinton's 2016 campaign manager Robbie Mook testified that Clinton herself approved the idea of giving the Alpha Bank story to a reporter as part of the Trump-Russia narrative. He described a moment when the campaign told Clinton they had information alleging a link between the Trump Organization and a Russian-based bank through a back channel, and that she agreed to let it be shared with the media. To provide background, the report involved an allegation about the Trump Organization, via a back channel to a Russian bank named Alfa Bank, which has ties to the Kremlin and Russian oligarchs close to Vladimir Putin. In 2016, campaign attorney Michael Sussman went to James Baker, the FBI’s general counsel at the time, informing him that he had information linking the Trump Organization to a Russian bank through a back channel and via a computer server. James Baker took the information to the FBI, which investigated and found nothing substantial. The Clinton campaign also learned about the information, and Robbie Mook later stated that Clinton was briefed on the allegation and gave the approval to disseminate it to the media. Sussman faces one count of providing a false statement to the FBI. The moment described by Mook—that Clinton personally approved sending the story to a reporter—was presented as surprising in court, especially since the information later turned out to be baseless. During coverage, a reporter quotes Mook: “we told her, Hillary Clinton, we have this, and that's the information about this bank allegedly having this communication or at least the server suggested so with the Trump Organization. We told her we have this, and we wanna share it with a reporter. She agreed to that.” The discussion also notes that the information was ultimately false or lacking evidence. Questions are raised about why the information was given to reporters, including a claim that they did not have the expertise to judge the information and were briefed by Mark Elias about it. Mook says they decided to give it to a reporter so the reporter could run it down more. It’s argued that reporters may not have done due diligence to verify with the FBI or other sources, and that the story was amplified despite its lack of substantiation. Speaker commentary emphasizes the perceived strategic value of the release and critiques the media’s coverage, suggesting that the Russia narrative was intensified by those opposed to a Trump presidency. The discussion also references Mark Elias, who led the law firm that funded the Steele dossier, tying the episode to broader assertions about campaign desperation and attempts to influence the political outcome.
Full Transcript
Speaker 0: Hillary Clinton's 2016 campaign manager, Robbie Mook, testified that Clinton herself approved the idea of giving the Alpha Bank story to a reporter as part of the Trump Russia narrative. She was in a lot of trouble, if Speaker 1: you remember then, for her private server that where she was deciding which emails to delete. And, she was in a lot of trouble for that. So she was like, what can we do? I know. We'll say that Trump has a secret server with Russia. So that's where the whole Russia idea, got cooked. Speaker 2: When Robbie Mook, the 2016 Hillary Clinton campaign manager, just answered a question casually that she personally approved, sending that story to the media. As you mentioned, it deals with an allegation or an accusation about the Trump organization, not the Trump campaign, but the Trump organization having a back channel to a Russian bank named Alfa Bank, which has some ties to the Kremlin, some Russian oligarchs, that are close with Vladimir Putin. So to give everyone a little bit of a backstory, on this story, because it is complicated, there are a lot of twists and turns. Hillary Clinton had a campaign attorney named Michael Sussman. In 2016, September 2016, he went to his friend who happened to be the general counsel at the FBI, a man named James Baker. And Sussman said, James, I have or Jim, rather, I have some information linking the Trump organization to a Russian based bank via a back channel, via a computer server. James Baker took the information at the FBI. The FBI investigated. They found out there was nothing to it, Kaylee, as you mentioned. Hillary Clinton's team at the campaign also found out about that information, and we are learning today via Robbie Mook, the campaign manager. She personally was briefed on this allegation about the, Russian Bank and Trump Organization, and she said, okay. Go ahead. Give it to the media. And that's where we are right now. Sussman is charged with one count of, providing a false statement to the FBI. But, again, definitely a little bit of a surprise in the courtroom, I think, from not only but the defense when Robbie Mook, went ahead and admitted that Clinton herself, gave the go ahead for disseminating that story, which turned out to be false. Speaker 0: Wow. Powerful new information. Thank you very much, David. Keep us up to date. Emily, a quote that stood out to me by Robbie Mook, imagine, you know, he's with the Clinton campaign. He says this, we told her, Hillary Clinton, we have this, and that's the information about this bank allegedly having this communication or at least the server suggested so with the Trump Organization. We told her we have this, and we wanna share it with a reporter. She agreed to that. This is the information that turns out was baseless or nothing suspicious. Speaker 3: What I find so ironic, Kaylee, is that as this sort of explosive testimony has undercovered what was at the root and who gave the blessing for them to disseminate false information that was amplified a million times over by our mainstream media, we are hearing nothing but crickets from the media now over this. Let's look at what instead that they are focusing on. What what shells are they placing over what's actually important to this country because they want to divert our attention otherwise. But, obviously, here on Fox News, we are covering it minute to minute. And keep in mind as well, just in the back of our minds as we listen and watch this unfold, that this trial, as David said, this is over providing false information, right, and and perjury. That is a hook that a lot of people can be on the hook for, the more we learn and especially, potentially, the person that was just named as who did give that blessing, Kaylee. Speaker 0: Yeah. Really important information there. Kennedy, another quote that stood out to me. This is again from Robbie Mook. He says this, we didn't have the expertise to judge what we were briefed on, and he was briefed by Mark Elias, who was another attorney, about this information. He admits we didn't have expertise, but he says we decided to give it to a reporter so the reporter could run it down more. It's their decision whether to publish it. Sounds a little bit like passing the blame. Speaker 1: Well and you also give it to reporters that you know aren't going to do their due diligence and investigate the story and talk to the FBI and talk to sources. They ran with it because they were all so opposed to the idea of a Trump presidency. Mark Elias, of course, in charge of the law firm that paid for the Steele dossier. All of it has proven to be false, and it just goes to show that Hillary's campaign, they were desperate. They were losing. This is a case of wag the rat. And but, you know, talk about a political losing harpy who couldn't stand to see power escaping her her grasp. And, you know, she was in a lot of trouble, if you remember then, for her private server that where she was deciding which emails to delete. And she was in lot of trouble for that. So she was like, what can we do? I know. We'll say that Trump has a secret server with Russia. So that's where the whole Russia idea, got cooked.
Saved - February 14, 2026 at 8:12 AM
reSee.it AI Summary
I note that on Nov 5, 2020, an anonymous user with elevated privileges remotely accessed the county’s Election Management System and modified the database, showing unauthorized remote access altering results. Ballots also had altered timing marks in blocks 15, 18, 28, 41, and 44, causing about a 20% higher rejection rate for Republican ballots, directing them to adjudication where votes could be altered, potentially switching Trump votes to Biden.

@TheSCIF - The SCIF

On November 5, 2020, during the Antrim County presidential election results, an anonymous user with elevated privileges remotely accessed the county’s Election Management System (EMS) and modified the database. This incident proves unauthorized remote access altering the tabulated results. In addition, ballots were found with altered timing marks in blocks 15, 18, 28, 41, and 44. The changes produced a 20% higher rejection rate for Republican ballots, routing them into adjudication where votes could be manually altered, switching Trump votes for Biden.

Video Transcript AI Summary
Speaker 0 asserts that there was direct access to the Antrim County election management system (EMS). They claim that on November 5, an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This, they say, constitutes a significant development, proving that the machines were remotely accessed and that access was by an anonymous user with elevated system privileges. Speaker 0 also discusses ballots, referring to black boxes on the side of the ballot, noting that there are 59 such black boxes. They state that forensic images show that in Antrim County, blocks 15, 18, 28, 41, and 44 were intentionally modified. The modification involved altering the height, width, and shape of those blocks with the intention of generating errors. They describe the consequence of such modifications: by modding these specific blocks, they were able to cause rejections for Republican ballots. Specifically, they claim that if a ballot voted for Donald Trump and was fed into the machine, that ballot was rejected at a rate 20% higher than for Joe Biden ballots.
Full Transcript
Speaker 0: We've proved now that there was direct access to the Antrim County election management system because we show on November 5, we can see it in the forensic images, that an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the the database when they were trying to retabulate the election. So that's one huge, huge development, because now we prove that the, machines were remotely accessed. And more importantly, they were remotely accessed by an anonymous user who had elevated privileges in the system. That is pretty damning for the the the non forensic reviewers out there or people who do not want a forensic audit. And the other thing probably is equally explosive. Everyone's seen ballots before like these ballots here. On the side of the ballot, there's these black boxes. There's 59 black boxes on the side of the ballot. We now see within the forensic images that in Antrim County, those blocks blocks fifteen, eighteen, 28, 41, and 44 were all intentionally modified. The height and the width, the shape of those blocks were intentionally modified in order to generate errors. What does an error do? In this case, by modding modifying those specific blocks, they were able to cause rejections for Republican ballots. Meaning, if you voted for Donald Trump and then put your ballot in the machine, your ballot was rejected at a at a rate of 20% more than, Joe Biden ballots.
Saved - February 14, 2026 at 6:38 AM
reSee.it AI Summary
I claim that 130,000 to 280,000 completed ballots were shipped from Bethpage, NY to Lancaster, PA to steal the 2020 election. I say ballots should never cross state lines. I allege these fraudulent ballots aimed to overturn Trump’s 700,000 vote lead in PA, with 75% counted before swing-state sites were shut down to produce enough ballots to steal the election from Trump.

@TheSCIF - The SCIF

130,000 to 280,000 completed ballots for the 2020 election were shipped across state lines from Bethpage, New York to Lancaster, Pennsylvania to steal the 2020 election. There is no reason completed ballots should ever be transported across state lines from one state to another. These were fraudulent ballots to overturn Trump's massive 700,000 vote lead in PA with 75% of the votes already counted before they shut down swing state locations to produce and tabulate enough ballots to steal the 2020 election from President Trump.

Video Transcript AI Summary
A series of witnesses describe a large-scale movement of ballots from New York to Pennsylvania, claiming that hundreds of thousands of completed ballots were shipped and later disappeared. One witness asserts that “130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared.” The narrative emphasizes that the ballots were transported in a trailer from New York to Pennsylvania and subsequently vanished. Another witness recounts events on October 21, describing “a series of unusual events that cannot be a coincidence.” This person says, “I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania.” While initially believing the task was beneficial for the presidential race and feeling it was “cool,” the witness later reflects, upon things getting weirder, on why they were driving “complete ballots from New York to Pennsylvania,” and states that they decided to speak up about it. A third participant broadens the scope, estimating “It could be a 144 to over, to a quarter million ballots.” This witness adds that the investigation indicates “there was a number, as in like a bunch of different trucks which engaged in this.” Reflecting on the potential impact, they note the magnitude of votes that could appear “the night of the election after midnight,” suggesting that an “artifact” would be necessary to explain this phenomenon. They further state that, when something is impossible to reconcile, “whatever remains must be the truth.” They claim that “the truth is ballot showed up. They were counted. They do not match necessarily the records of who should have voted,” and that “in some instances, the stats don't add up, and we continue to analyze that.” Collectively, the speakers contend they have evidence of “a massive transfer of of completed curated ballots ready to be injected into counting centers.” The statements emphasize a coordinated movement of completed ballots from New York to Pennsylvania, the disappearance of the ballots and their trailer, and allegations that ballots appeared, were counted, and did not necessarily align with expected voting records, with ongoing analysis indicating a substantial, orchestrated transfer intended to inject ballots into counting centers.
Full Transcript
Speaker 0: This evidence demonstrates, and it's through eyewitness testimony that's been corroborated by others through their eyewitness statements, that a 130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared. Speaker 1: What happened on October 21 was a series of unusual events that cannot be a coincidence. I know I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania. At first, I didn't think it was a big deal. In fact, I thought it was really awesome. I was I really did. I was like, sweet. I'm doing something for the presidential race. You know? This is cool. But as things became weirder, I got to thinking and wondered why I was driving complete ballots from New York to Pennsylvania. I didn't know I didn't know why, so I decided to speak up. And that's what I'm doing today. Speaker 2: It could be a 144 to over, to a quarter million ballots. Let me tell you a little secret. Part of our developing investigation indicates that Jesse wasn't alone. There was a number, as in like a bunch of different trucks which engaged in this. So when you think about the magnitude of potential votes showing up the night of the election after midnight, you have to have an artifact. So if you eliminate the impossible with all things being equal, whatever remains must be the truth. The truth is ballot showed up. They were counted. They do not match necessarily the records of who should have voted. In some instances, the the stats don't add up, and we continue to analyze that. With that said, I believe beyond a shadow of a doubt, we have evidence of a massive transfer of of completed curated ballots ready to be injected into counting centers.
Saved - February 13, 2026 at 5:14 AM
reSee.it AI Summary
I report that ballots from Runbeck arrived for more than a week after Arizona’s 2020 election. A worker testified ballots kept coming after Nov. 10 via front and back doors, with unknown quantities or origins, despite access to voter books. Runbeck prints, mails, fills, and counts ballots off-site, partnering with Dominion and ES&S for machine compatibility. Arizona needed about 2.5 weeks after the election to count all ballots because that was the time to produce enough ballots to overturn Trump’s landslide.

@TheSCIF - The SCIF

Trucks of ballots arrived from Runbeck for over a week after Arizona's 2020 election. A worker testified ballots kept coming after Nov. 10 via front and back doors, with unknown quantities or origins, despite access to voter books. Runbeck prints, mails, fills, and counts ballots off-site without oversight, partnering with Dominion and ES&S for machine compatibility. Arizona needed an extra 2.5 weeks after the election to "count" all the ballots because that's how long it took to produce enough ballots to overturn Trump's massive landslide in the 2020 Election.

Video Transcript AI Summary
- The discussion centers on ballot processing in Maricopa County, with several shipments arriving after the initial belief that counting was near completion. Speaker 0 notes that the Wednesday before the Friday they quit voting, and ten days before they quit tabulating, more truckloads of ballots came in, leading to the question: “how can you not know how many ballots are still out there?” - Speaker 1 asks for clarification: “They thought they were done.” The conversation confirms multiple times that those running the counting rooms believed they were almost done, or would be done, on Wednesday morning, then Thursday morning, then Friday morning, and the process extended into the next week. - Trucks bringing ballots arrived on the third, fourth, and fifth days, continuing throughout the last week. The last day mentioned is the tenth, with ballots still arriving. The company involved is Runback, described as doing high-speed scanning and printing of duplications and military ballots. There was no observer presence at Runback, and Speaker 0 indicates she had not been called to work there; she does not know exactly what Runback was doing (printing vs. scanning). - It is stated that all high-speed scanning occurs at Runback, and the ballots go to Runback. There is uncertainty about off-site scanning and whether Dominion equipment was involved. Speaker 0 clarifies: “They were duplications, the ballots that wouldn’t read through the tabulation machines. They were ballots that came in from military and overseas.” The number of additional sources for ballots beyond military/overseas is unknown, and Speaker 0 suggests this is a question for county employees to explain. - About the counting process: Speaker 0 confirms that the ballots went through tabulation machines and that adjudication work took place for those late arrivals. They observed the ballots being processed, but did not know the exact totals for certain days. - Daily volumes are described. Speaker 0 estimates: one day a shift might handle 90,000 ballots, and some days had similar volumes across three shifts; other days had fewer. There were days when as few as 15,000 ballots were processed. The “back door” arrivals are contrasted with the front door, with Speaker 0 noting that all back door ballots were received through back entries, not the front door. The remaining ballots in the latter part of the period continued to come in and be tabulated, with ongoing full-time shifts through the eighth, ninth, and tenth days. - The episode concludes with Speaker 1 seeking further explanation, and Speaker 0 indicating that some of the details were not fully known and that a county employee should clarify where the incoming ballots came from during the latter part of the period.
Full Transcript
Speaker 0: Good. But I will tell you what you just said triggered another thought. The Wednesday before the Friday that we quit voting so ten days before they quit tabulating, they thought they were done. And then more truckloads of ballots would come in. I'm like, how can you not know how many ballots are still out there? Speaker 1: Mr. Chairman, I'm sorry. Would you repeat that? They thought they were done. Speaker 0: They thought they were done. Speaker 1: And then there was Multiple times. There was what? Speaker 0: Multiple times. The people that were running the rooms thought they were done, or almost done, or were going to be done Wednesday morning, then Thursday morning, then Friday morning. And then it went on the whole next week. And I'm like, I asked the question, I'm like, you don't know how many ballots are still left to come in? So I don't know who does, again, process project management. Speaker 1: Zero. On that point, ma'am, I'm tracking with you. But what day did the truck show up? Thank you, Mr. Chairman, because what I heard the first time, what I is a truckload of ballots showing up. Okay, just a minute. I want to make sure that we capture this properly. So there were trucks that showed up on the third, and then the fourth, and then the fifth. And how long did that go on? How many I wasn't Speaker 0: there the whole last week, Speaker 1: but I know as long you can recall. How many days? Speaker 0: My last day was the tenth, and they were still coming in. Speaker 1: Trucks. They're Speaker 0: coming from a company called Runback that does the high speed scanning and printing of duplications and, I think, the military ballots. And I'm getting out of my comfort level here talking about this. I don't know what they're doing, but those ballots were coming in from a high speed scanning company called Runback that apparently, you haven't heard of Runback? Speaker 1: No, I've heard of Runback, ma'am. What I'm trying to figure out is whether they printed them or they scanned them. And if they scanned them off-site, to what purpose? Speaker 0: I can't tell Speaker 1: you Because wasn't that your job to scan them? Well, not your job, but Yeah. Speaker 0: No. No. All the high speed scanning happens at Runback. So those ballots go to Runback. As far as I know, there were no observers there. I don't know. I never got called to work at Runback. That's all I can tell you. Speaker 1: Okay. With all due respect, Mr. Cook, now we've opened up a whole new can Oh, of Speaker 0: yeah. And again, we don't know enough about it to be the witness. Speaker 1: No, fine. Your observation is useful here. So what you're telling me I'm going to play this back to you a second. The scanning wasn't actually done on-site at Maricopa County structure. It was done someplace else. Speaker 0: Where they have very high speed scanners, yeah. Speaker 1: Well, now, I really don't care what the speed is. I want to know, were they Dominion scanners? Speaker 0: They were No, no, don't think it has anything to do with Dominion. Speaker 1: So I'm trying to understand. What was the purpose of scanning them in advance of them being tabulated on the Dominion equipment? Speaker 0: They were duplications, the ballots that wouldn't read through the tabulation machines. They were ballots that came in from military and overseas. But there were more ballots than that. So I don't know where the rest of them were coming from because they kept bringing trays of them in. So I don't know where they were coming from. That's a question for the county employees to explain to you where those ballots came from that whole next week. I don't know where they came from. Speaker 1: Mr. Cook, are you done? Left. Oh, I'm sorry, Mr. Cook. Speaker 2: Just like that. Mr. Giuliani. So you were there from the third until the tenth? Speaker 0: Yes. Speaker 2: Okay. So seven days later, ballots were still coming in. And were those ballots counted? Speaker 0: Yeah. I watched them go Speaker 2: through Did you observe them being I watched Speaker 0: them go through the tabulation machines, and I watched people working on the adjudication of those Speaker 2: And how many ballots? Speaker 0: Oh, I don't know. Speaker 2: What was the largest number you saw in any one day? Speaker 0: Oh, man. Speaker 2: No, just a guess. How many cartons? Speaker 0: Okay, there was, wasn't there, like, there was usually two or three shifts. So I want say one day they thought 90,000 was a good number. Speaker 2: So one day was Speaker 0: For a shift. And if they were running multiple shifts. Speaker 2: And which day was that? One of the middle days? One of the end Speaker 0: was in the middle, probably. Speaker 2: Somewhere in the middle between the third and the tenth? Yeah. 90,000? Speaker 0: Yeah. Speaker 2: And then other days, it was approximately the same or Speaker 0: Some some were less, some were more. So some days when they had the three shifts well, never had three shifts tabulating. Sorry. They just would run Speaker 2: a Sure. No. That's okay. Speaker 0: Just They Speaker 2: would run a Speaker 0: lot long tabulation shifts. Speaker 2: What was the lowest number, you think? Speaker 0: There were some days when maybe there was only 15,000. Boy, Not hold me to these numbers, because I Speaker 2: Was that toward the end? Speaker 0: No, that would have been earlier. To the beginning? Yeah. Speaker 2: In other words, there were more ballots at the end than the beginning? Speaker 0: There were ballots. They were backing up was what I would say. And what about Not more coming into the building, necessarily, but there's a room that we could see with rows and rows of bins Speaker 1: of ballots. Speaker 2: These were coming in a different way? Speaker 0: Yes. I don't know. Speaker 2: They're coming Speaker 1: in the Speaker 2: back door. Speaker 0: Some come from the mailbox or from the Postal Service. They all go through. They get the signature verified. Then they get separated from the envelope. And then they end up somehow in the room that I Speaker 1: was in. Speaker 2: So if I understand this correctly, ballots were coming in two different ways? Speaker 0: At least, yeah. The front Front door, back door. Well, think they were all the back door. Speaker 2: Oh, they Speaker 1: were all the back door. Speaker 0: All the back door. None came in the front door. Speaker 2: But this group was 15,000 for a low, 90,000 for a high. And then those last couple of days when you were there, the eighth, the ninth, and the tenth, how many Speaker 0: It was pretty average. They were still running full time Speaker 2: Like 90,000? Speaker 0: Shifts. Yeah, probably 80 to 70 to 80, maybe. Speaker 2: Wow. Anybody explain them? Explain. Did anybody explain what they were? Speaker 0: I did not ask every time. I asked a few times. So I understand some of them. Speaker 1: Senator Allen.
Saved - February 13, 2026 at 3:49 AM
reSee.it AI Summary
I read Epstein documents showing a 2011 email from Barry Josephson to Epstein about a question asked to Bill Gates, “how do we get rid of poor people as a whole,” with Josephson offering a response. It suggests Gates and Epstein discussed lowering the poor population, linked to Gates’s Covid vaccination push.

@TheSCIF - The SCIF

Epstein documents expose a 2011 email from Hollywood producer Barry Josephson to Jeffrey Epstein. In it, Josephson writes: "I've been thinking a lot about that question that you asked Bill Gates, 'how do we get rid of poor people as a whole' and I have an answer/comment regarding that for you…" It is Josephson referencing a supposed earlier conversation between Epstein and Gates discussing how to get rid of the "poor" population. And you wonder why Bill Gates was pushing the Covid vaccination so hard... They want to lower the population. You should clearly understand this by now, especially after experiencing what happened during Covid and what we know now.

Saved - February 12, 2026 at 1:02 PM
reSee.it AI Summary
I believe there’s a secret D.C. underground of elite child trafficking run by the world’s wealthiest and most powerful. The Epstein documents confirm horrific abuses of children. What does this say about the world and its rulers? The question remains: what are we going to do about it? Life isn’t only about solving problems, but this is one horror you can’t ignore—the trafficking, torture, and sexual abuse of children. It’s time to wake up.

@TheSCIF - The SCIF

There is a secret D.C. underground of elite child trafficking being run and operated by some of the wealthiest most powerful people in the world. The Epstein documents have just confirmed some of the darkest most horrific things being done to children that many have been trying to tell you for years... What does this tell you about the world we live in and about the ones who rule over us? The most important question of all still remains... "What are we going to do about it?" Life is about way more than just going around solving one horrible problem after the next, but this is one of those horrible things that you just can't ignore, or let slide. This is the trafficking, torture, and sexual abuse of children, and in my personal opinion, the worst thing that you could ever do. It's time to wake up.

Video Transcript AI Summary
The transcript centers on allegations surrounding James Alifantis, a DC figure described as an avid collector, prolific fundraiser, owner of multiple establishments including Comet Ping Pong, and a close associate of Tony Podesta. The speakers present a stream of claims and testimonies that connect Alifantis to alleged pedophilia networks and illicit activity, while also noting the broader context of similar scandals. - The discussion opens with a suggestion that if the speaker were president, they would demand the Anthony Weiner laptop and have it analyzed by the most trusted person in the military, claiming that “there’s a lot that can be prosecuted,” with even NYPD officers reportedly “had to go throw up” after viewing parts of it. - A presenter claims to have found “something new that’s never been reported by anyone” while researching Alifantis, who in 2012 was named by GQ as one of the 50 most powerful people in Washington DC. Alifantis is described as a collector and fundraiser, owner of Comet Ping Pong, and someone who was “personally thanked by Hillary Clinton for what she called his extraordinary talent during her Cooking with Fratelli Podesta fundraiser.” He is pictured with Tony Podesta, who celebrates his birthday with Alifantis almost every year. The speaker notes Alifantis’ prior boyfriend was David Brock, founder of Media Matters, and mentions donations to Pete Buttigieg as shown by the Federal Election Commission, implying ongoing influence in DC. - In an on-record recount, a source named JB, recounting a December meeting, introduces James Alifantis and describes a direct, traumatic encounter: “let’s hear it,” with a person claiming that James Alifantis walked into a restaurant (Carol Greenwood’s) to seek a manager job, and that “James butt fucking this boy in the kitchen,” with the boy’s friend Dylan Greenwood later committing suicide. The speaker asserts the existence of “underground rooms” at Comet Ping Pong, tunnels that go to other places including a building across the street associated with the Clinton Foundation, and states the tunnels go “all over there.” The witness claims to have seen these spaces “below the tie room” and to have witnessed sexual abuse. - The discussion extends to a pattern of alleged illicit activity at Comet Ping Pong, with the witness describing “underground rooms, all that stuff,” and stating that “the tie room” used to be part of that space. The witness claims to have seen a “change” in the venue from a manager-hopeful stage to involvement with funding connected to broader networks. - The narrative references a broader set of symbolism and affiliations: an FBI 2007 bulletin noting a blue spiral-shaped triangle symbol used by predators, and mentions that Comet Ping Pong is described as a “family restaurant with a backroom designated for children's birthdays.” It ties Alifantis’ social circle to art collections tied to Tony Podesta, including artists like Maria Marshall, Margie Gearlinks, Patricia Piccinini, Marina Abramović, and others, and notes Antinous imagery in Alifantis’ social media profile. - The transcript also catalogs a web of social media posts and images: images of children with questionable captions, a “goddaughter” statement, various hashtags such as panda-related themes, “Panda Head Morgan,” and references to “Things That Are Rectangles” interview material about a Portland-based coffins business run by Scott Cummings, along with mentions of death symbolism and disturbing posts, including captions about babies, “let’s hang a baby,” and comments about “priceless” experiences and pizza-themed predation references. - The closing segments reference a Portland, Oregon link—specifically Baby Doll Pizza and Voodoo Doughnut—tied to alleged child trafficking concerns raised by a witness who questioned why adults bring children to the back rooms and suggested a cultivation of protective behavior among perpetrators.
Full Transcript
Speaker 0: So one of the things if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted. In fact, I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 1: I'm fully aware this topic has been covered ad nauseam, but parts of it have been covered terribly, and the aspects covered well have been deleted. But more importantly, while researching, I discovered something new that's never been reported by anyone. Speaker 2: Dinner with American celebrity chef Anthony Bourdain, ABC's Bob Woodruff tonight with how that meal came together. Speaker 1: Initially, this video was structured in a way that debunked the more exaggerated claims from pizzagators and QAnon obsessives, while also shining a light on the facts of aristocratic pedophilia rings. If you think this has only occurred in the Catholic church, I encourage you to read the Dutroux dossiers and the recent findings from an inquiry in the former British MPs who were freely able to sexually abuse children for decades. But I trashed all that as soon as I found what I found. So instead, I'm just going to show you what I discovered while vetting a now infamous yet indecipherable man who in 2012 was named by GQ magazine as one of the 50 most powerful people in Washington DC. James Alifantis is an avid collector, prolific fundraiser, owner of multiple establishments including Comet Ping Pong, and was personally thanked by Hillary Clinton for what she called his extraordinary talent during her Cooking with Fratelli Podesta fundraiser. He is pictured here with Tony Podesta, who celebrates his birthday with Alifantis almost every year. His previous boyfriend was founder of media matters David Brock. And with the Federal Election Commission showing his donations for Pete Buttigieg, it's apparent that Alifantis' influence among the DC establishment remained strong. But why was anyone suspicious of him in the first place? More specifically, why did anyone equate him with something as monstrous as pedophilia? Speaker 3: Okay, guys. Yeah. Yeah. Okay, guys. It's December 17. It's one something in the afternoon here. And I'm with JB. JB's talking to us about who? Speaker 4: James Alafontas. Speaker 3: James Alafontas. Now now JB went to St. Alvin's? Speaker 4: Went to St. Alvin's. Speaker 3: From DC, and he's Speaker 1: got a Speaker 4: storytell Greenwood. Speaker 3: Let's hear it. Speaker 4: Restaurant for Carol Greenwood. Yep. Remember the day James Alphonus walked in the door and asked for a job. Mhmm. Carol's son, 11 years old at the time, friend of mine caught James butt fucking this boy in the kitchen, and that person, his name is Dylan Greenwood, has since committed suicide. I think it was two years ago. Mhmm. James is one of the dastardly worst person in the world. And yeah, they do bad things at Comet. There are underground rooms, all that stuff. Speaker 3: And you've seen that with your own eyes? Speaker 4: I've seen that with my own eyes. Speaker 3: So you've been under below the floor of Comet? Speaker 4: It used to be the tie room. Yeah. Speaker 3: The tie room before it Comet? Yes. Yeah. Yeah. Yeah. Yeah. Right by the zoo. Speaker 4: It's a little farther down from the zoo. It's more in Speaker 3: Not that far. I mean Speaker 4: It's Nebraska. It's all Speaker 3: Connecticut Avenue. Speaker 4: Nebraska and Connecticut. Speaker 3: Right. Speaker 4: Right. Yep. But, yeah, that's a fact. James Alfon is a bad person to this day. Speaker 3: And you met him when he was applying for a job or something? Speaker 4: He was trying to get the manager job with Carol at that restaurant. Speaker 3: How did you get how did you get so much money, that guy? Speaker 4: Probably selling kids and trafficking kids. Speaker 3: And you've been below Common Pizza. You've seen Speaker 4: what it looks like? Seen rooms, and I've seen tunnels that go other places, including underground to the other buildings. Think one was owned by, like, a Clinton Foundation or something across the street. Yeah. But the tunnels go all over there. Speaker 3: They say they go all over the White House, but I don't know. Speaker 4: Don't I know if Speaker 3: they go all Speaker 4: the way to the White House, but that area ended up itself. If they go a mile in that area in any direction, they're hitting some spots. Speaker 3: Okay, man. Thanks for the information. Yep. Nice to see you. Speaker 4: That's what you can do. Hope you can post it. Speaker 3: I will. I'll post it, man. Yeah. Of course, man. This is this is the truth that needs to get out of me. This is first hand information. Speaker 4: Yep. Primary source. Speaker 3: Yeah. Primary source. You've been there. You saw the change. Mhmm. Saw Los Fantos go from wanting a job as a manager to being funded Yeah. By Speaker 4: basically an art student at the Corcoran School, and she employed a lot of those people and wanted to be an arty place, and it got dark. Speaker 3: Yeah. It got dark. Yeah. We're Speaker 1: One reason surrounds the rhetoric of several bands who often performed at comet ping pong. This video shows Amanda Kleinman, keyboardist for a group called Heavy Breathing. In a separate venue, some in the audience appear to insinuate a person's preference for pedophilia. Speaker 3: He likes the world sounds to mollusks. And little boys. And children. I think I was his manager. No. You know that preferences. Speaker 1: Another group is DC punk band, Loud Boys, who we'll see again later. But for the sake of time, we'll end with sex stains. In a 2007 FBI bulletin, one of the symbols with which predators identified each other with was a blue spiral shaped triangle wrapping around itself clockwise. The symbol was so prominent it was etched into coins and rings. This music video is from The Sextanes. Their promotional posters said they were for, quote, all ages. According to Alifantis, Comet Ping Pong is a family restaurant with a backroom designated for children's birthdays. Speaker 3: This is the kids' party room in the back. Birthday parties. Speaker 1: Another reason some were suspicious of Alifantis surrounds his close relationship with Tony Podesta, a former super lobbyist who's had a lifetime friendship with convicted pedophile Dennis Hasturt. Additionally, Tony's art collection. Now any of these works on its own could merely be employing theatrical strategies to inspire insight, but it's when they're all collected by one person that it begins to say more about the collector than the artist's intent. Among those artists who made up Tony's collection included Maria Marshall, Margie Gearlinks, Patricia Piccinini, Marina Abramovic. Speaker 3: I'd like to tell you a story how we in Balkan killed the rats. Kim Noble. Speaker 1: Elephantus' previous Instagram profile picture is of Antinous, a Greek emperor whose influence reemerged in the early 2000s, forming a modern cult that attracted a subculture of LGBT polytheists who worshipped Antinous as a deity. Historian and author Lambert Royston writes, The sculptures of Antinous remain one of the most elevated and ideal monuments to Pederastic love of the whole ancient world. Dictionary.com defines Pederasty as quote sexual relations between two males, especially when one of them is a minor. Whether or not these are good reasons to become suspicious is up to you. Either way, it's for those reasons and because James Elephantis has no children, some questioned why he had so many kids on his Instagram. According to James, he took all the images of kids and infants from other Facebook pages and from family and friends whom he says haven't come forward for fear of retribution. Now, I'm simply going to show you some of those images and give context when necessary. I'm not, however, going to apply sinister interpretations to hashtags, which might seem out of place. If your damning case against James Alifantis includes references to the urban dictionary and arguments for why he might be using them, you failed. If there really is something here, it should reveal itself without argument. Aliphantus said that this is his goddaughter, with her arms taped to a table. Here's a baby in an art gallery, another baby. Now some of these are obviously the same newborn, it appears. But this is a baby doll, and in this image, there's two babies. I had to censor this because it shows a flat chested female whose age is ambiguous. Notice that it's liked by Panda Head Morgan, a name found in dozens of James posts that was very important and we'll get to later. Here's an image of Alifantis' friend Scott Cummings holding a toddler with the hashtag chicken liver. In 2010, the website Things That Are Rectangles interviewed Scott Cummings about his privately owned business in Portland, Oregon called Portland Natural Casket Company. During the interview, Mr. Cummings said, When I was a child, my mother taught classes on death and dying. She would often talk to me about how death is an important part of life and how different cultures have different rituals and burial rites. The interviewer stated, Even the tat on his wrist is death related. He snapped a photo of it. It's a body hanging. Alifantis uploaded this picture of a guy in a panda mask. Here are many other images of panda with the hashtag ComePanda. One of his tags is Panda Head Magazine, which used to be run by a small team of DC bloggers who also made this video, described by makezine.com as a perfectly creepy panda cult film, called Cult Panda, but with a u spelled with a v. Here, James commented murder, another user working on my night cheese, who I'll refer to as wc, commented kill room. Wc owned a workshop in the industrial complex pictured here called the pajama factory, where he, similar to mister Cummings, also built coffins, many of which were child size. WC can be found commenting here to another Instagram user, j blair smith, who uploaded this image commenting, my favorite pedo. J blair smith uploaded this drawing of a woman being hanged and what appears to be a baby statue that's been burnt. User Joshua Ryan v posted these while at Comet Ping Pong. He also played in a low budget independent film called Kill Dolly Kill. Speaker 3: Kill them, Benjie. Kill them. Speaker 1: This is miss summer camp's Instagram, James Alifantis commented sex. Miss summer camp also posted this picture of a little girl holding a watermelon with the end of a tagline saying priceless. He said quote, Priceless isn't the word most people use upon tasting me. A user below named Barrett C responded. He posted on his Instagram a picture of a baby changing station with the C etched out saying let's hang a baby. He also posted an apparent text message saying I put my baby in a slow cooker, it's been burning all day. And in this image uploaded by Barrett, one of the commenters is pizza fucking party who I'll refer to as PFP. PFP uploaded this image of a group of young children picking up either fake or real condoms, fake gold coins, and according to PFP's comment, little vials of alcohol. He also uploaded a bull like meme on a pentagram, a pizza cut into a pentagram, and this photo of him or someone else in front of a van with a logo that says Baby Doll Pizza. As it turns out, the logo is from an actual restaurant named Baby Doll Pizza in Portland, Oregon. The same city where a man named Michael Whelan used to live, who alleges to be a witness to illegal activity there, claiming the owners of Voodoo Doughnuts are trafficking children. Speaker 5: As to why Voodoo Doughnuts and why Portland, Oregon, it's because my question is why are they abusing kids? Then I see kids being brought into the back. Then I'm asking, who are these kids? Who are their parents? And and that immediately drew attention onto me. So when I'm asking why there are adult males and females taking children into the back, when you're confronted with these type of people, other survivors will know what I mean when I say that they flaunt this. They are proud of this. They feel protected in this, and they feel in this. Speaker 3: Sonic Delights of Voodoo Doughnut.
Saved - February 8, 2026 at 3:09 PM
reSee.it AI Summary
I describe how Pizzagate emails allegedly used “food” and “pizza” to disguise talks about child trafficking, released by Wikileaks. I claim Seth Rich, a DNC insider, downloaded the emails and gave them to Wikileaks to expose DNC corruption after the primary was rigged against Bernie Sanders. An ex-NSA employee supposedly confirmed the download came from inside the DNC, not a foreign hack. Seth was killed, police labeled it a botched robbery; some say Podesta/Hillary ties were involved.

@TheSCIF - The SCIF

The Pizzagate emails were originally discovered in John Podesta and Hillary Clinton's emails where secret comms involving "food," especially the word "pizza," were being used to disguise and talk about the trafficking and abuse of children. These emails were presented to the world by Wikileaks, which were originally obtained by a brave American patriot named Seth Rich. Seth Rich found out that the DNC rigged the primary against his favorite candidate, Bernie Sanders. Seth worked for the DNC and had special access. He then downloaded the emails and gave Wikileaks the DNC Podesta/Clinton emails. He exposed the Podesta/Clinton emails because he saw how corrupt his own party was. His perception of the government and his world was shattered when the truth revealed itself and he wanted to expose the truth to the world. An ex-employee of the NSA confirmed that the Podesta/Clinton emails were in fact downloaded from someone inside the DNC and NOT by a foreign nation like they wanted you to first believe. This was found through electronic analysis mentioned in this video. That someone who exposed these emails allegedly turned out to be Seth Rich. A message exposed by John Podesta stated that he supported the idea of "making an example" out of the DNC leaker. Not too long after, Seth Rich was found dead, less than a block from his own home. The cops did not cooperate and immediately closed the case as a botched robbery. The problem is, nothing was stolen, his phone, his wallet, and his watch were all found at the scene. Seth was shot multiple times in the back. Many allege that people tied to Podesta and Hillary had Seth killed to make an example out of him for anyone else planning to leak information to the press to expose them and their corruption. RIP Seth Rich and thank you.

Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.
Full Transcript
Speaker 0: Of DNC staffer Seth Rich who was murdered last summer. A federal investigator telling Fox News that an FBI forensic report of Rich's computer showed he made contact with WikiLeaks through a former reporter and London based WikiLeaks director, Gavin McFadden. The investigator told Fox News, Rich provided McFadden with more than 44,000 emails, nearly 18,000 attachments. Rich was murdered near his DC home on the morning of July 10, but his wallet, his cell phone, his watch not taken. WikiLeaks twelve days later published internal emails showing top DNC officials trading ideas on how to hurt senator Bernie Sanders at the polls and those emails resulting in the resignation of Debbie Wasserman Schultz, who is the chair of the DNC and the DNC's three top officials because of the obvious conclusion portrayed in those emails. Speaker 1: The stuff that you're sitting on, is is an October surprise in there? Do we even know what you're sitting on? Speaker 2: WikiLeaks never sits on material. Whistleblowers go to significant efforts to get us material and often very significant risks. As a 27 year old that works for the DNC who was shot in the back, murdered just two weeks ago for an unknown reasons as he was walking down the street in Washington. So Speaker 1: That was that was just a robbery, I believe, wasn't it? Speaker 2: No. It's there's no finding. So What are you suggesting? Speaker 1: What are you suggesting? Speaker 2: I'm suggesting that our sources take risks, and they are they become concerned to see things occurring like that. Speaker 1: But was he one of your sources then? I mean Speaker 2: We don't comment on who our sources are. Speaker 1: But why make the suggestion about a young guy being shelled in the streets of Washington? Speaker 2: Because we have to understand how high the stakes are in The United States and that our sources are you know, our sources face serious risks. That's why they come to us so we can protect their anonymity. Speaker 1: But it's quite something to suggest a murder. That's basically what you're doing. Speaker 2: Well, others have suggested that. We are investigating to understand what happened in that situation with Seth Rich. I think it is a concerning situation. There's not a conclusion yet. We wouldn't be willing to say a conclusion, but we are concerned about it. And more importantly, a variety of Wikileaks sources are concerned when that kind of thing happens. Speaker 3: This is a guy who is a real Bernie Sanders supporter. Open Bernie Sanders supporter who worked for the DNC. The DNC absolutely rigged the primary against Bernie Sanders. He was aware of this. He was there while this was all going down. So is Donald Brazil. Everyone was aware of it. The guy got fucking murdered after he leaked information to WikiLeaks. If you don't think that's a little weird, what are you looking at? What what what delusional rose colored glasses are you looking at your party from? Do you think you're in some Julie Roberts movie from 1990? This is real shit. Some guy got killed. He was 24 years old. He was a young guy who was very optimistic and had this view of the world where he I mean, the guy fucking wore American flag pants and shirt. There's a famous picture of him with a beer on. I mean, he's a patriot in a lot of ways. He wanted to be involved in the political process. He was very idealistic because he's probably shattered by finding out the party that he was working for was corrupting the democratic process. And because I've said this before, you know, I've been accused of helping Donald Trump win by really wacky people online. Like, by pointing out all the flaws of Hillary Clinton. Like, look, man, you can't ignore that shit because you want one side to win. I've talked about all of his flaws too. There's a lot of flawed human beings that run for president, pretty much all of them. I mean, it's very rare you have someone who's not flawed. Right. Extremely flawed. We're all flawed. But extremely flawed who wants to be the fucking king of the world. It's very rare. Listen, man. I'm not a fucking reputable person. That's what Speaker 4: I try to tell Speaker 3: my people. Political ideologies. I mean, I'm just not. I'm I'm not that well read when it comes to politics. I have my opinions on things. But when it comes to things that are rock solid and clear, like that Seth Rich was murdered and people wanna ignore it, I'm like, what the fuck do you think happened? There's has to be some sort of a disconnect here. When a person is giving information to WikiLeaks that exposes corruption inside the very organization that's responsible for the fucking Democratic party and he gets murdered. And you're like, oh, the conspiracy theories. No. He got murdered. There's no conspiracy. It was a botched robbery. Says who? Says who? Where is his how come his wallet was there? How come his watch was there? How come they didn't take his phone? What the fuck are you talking about that I'm a conspiracy theorist when I just tell you the facts? And this this WikiLeaks thing with Julian Assange is the craziest shit ever when he said there's consequences to sharing information with us. He works for Russia now. He works for Russia. So isn't it? Was the darling of the left when Obama was in office. Speaker 4: So isn't that amazing? If that's so Julian Assad, he's just a great news guy with who's tough as nails. Speaker 3: He's can't leave. He's stuck in the Ecuador Speaker 4: embassy forever. That case was so fucked. So fucked. So fucked. He he's been so fucked. And it's because the CA wants him so bad and they control everybody. And now they're try they they have influence over Ecuador and they're trying to fuck. They're trying to get a Halliburton guy to be their new anyway. Speaker 3: They might just blow up that place. Speaker 4: I think the gas leak. Speaker 5: No doubt. Right? I wouldn't Speaker 4: be surprised if shit like that. Speaker 3: And more stuff comes out like the Seth Rich stuff, the amount of people and I this is where I leak any conspiracy. The amount of people connected to Hillary Clinton organization, the Clinton Foundation, to Bill Clinton, the amount of people that have been heist is stunned. But then Some of them are bullshit and coincidental, and, you know, people, and they're in a weird job, and people get go there's a lot of people that have been killed. A lot. Speaker 6: The timing is so interesting here. The week that this breaks on Fox News in a story they later had to retract and acknowledge was didn't meet their editorial standards. Sean Hannity is shouting it from the rooftops. What's going on that week? It's the week that Mueller is appointed. It's the week Comey is fired. It's when the Russia story is blowing up. What better way to deflect from the Russia story than to point the finger at this, you know, this guy in Washington who was shot in an armed robbery. It wasn't the Russians. It was Seth Rich. Speaker 7: I would, firstly address the, the DNC data that was posted by WikiLeaks, and that clearly showed evidence of a property called a file a fat format file. That's the file allocation table, format, meaning every time it's it's reading, it's it's a program and a software used to read data to a storage device, either a thumb drive or CD ROM, something like that. And as it does that, it changes the last modified, time on each file to the nearest even second. Okay? It's just a function of that program. So when that occurs, all those times, last modified are changed on all the files. So when we looked at all the DNC, emails from the twenty third, twenty fourth, and May 25, all of them ended in emails. So, and that was 500, probably a little more than that. I didn't count also. But it that means that the the random chance of that occurring would be one chance in two to the five hundredth power. In other words, one chance in a one followed by over a 150 zeros. Meaning, it's obviously, that was a a factor that proved that that program was used to do that, the program that does it is FAT, file allocation table formatting. So, that that says that that data was downloaded to a physical device, either a thumb driver or CD ROM, and then transported physically before WikiLeaks could publish it or put it on the web. So that that said to us that it wasn't it wasn't a hack from Russia. It was an inside job or somebody close in that downloaded the data to the to the to a storage device and then took it physically. Speaker 6: That's what you know, that was the whole subtext of what Sean Hannity was pushing that week. And who does he have on? Jay Sekelow. Didn't say it at the time. Sekelow had just been named as Trump's lawyer in the Russia investigation, and he's saying what is he saying on Fox News? This undercuts the whole Russia narrative. That was the message they were pushing. Speaker 8: So the predicate for all of this, I think, and maybe even earlier, but to my knowledge, late in the '16 with the hacking of the DNC and the emails from the DNC, And the FBI never investigated it, never investigated the actual, you know, the physical removal of this data from their servers instead of a company called CrowdStrike, which worked for the Democratic Party, did. And then exactly at that moment or right around that moment, a DNC staffer was killed in Washington, DC in an apparent robbery in which nothing was taken from him that I happen to know for a fact the MPD, the Metropolitan Police Department, thought was, like, bizarre, and they kind of didn't believe it. A Fox News host went on air and asked questions about this killing. Why wouldn't you? And the parents of the man who was killed either sued or I think they sued. They certainly threatened to sue and basically scared the crap out of everyone. So no one's ever asked a question about it since. Speaker 9: They hired a private investigator who looked around in that case, I remember, and there were there were some odd details there. The FBI ended up in possession of his laptop then Speaker 1: Why ended up Speaker 8: did the FBI wind up in I mean, this is a local crime. Right? Speaker 9: Yeah. This was one of the first reasons I started to look at that case because I got a call from somebody about that. And, you know, I don't know why that was the case, but it is the case. But Speaker 8: And there were people at the DNC, one of whom I know, who thought that he was murdered for political reasons. At the DNC. A very high ranking person at the DNC told me that, and I probably should just say, but I everyone can guess who it is who's informed on this, but I don't want to betray confidence, but I'm I'm not making this up. Mhmm. And I don't know what happened, but like, as far as I know, not one person has looked into that in the media. Speaker 9: No. And, you know, even if it is just an unsolved murder of a type that they normally solve, The whole situation, that whole timeline was very strange. It doesn't really make sense. The hacking of the DNC, the bringing in of CrowdStrike, the when the information was released online. They never really proved that case, but they immediately made inferences about it. And there was an incredibly sophisticated kind of public campaign to create this narrative that, you know, upon closer examination, turns out not to be true. So we gotta go back and find out what did exactly happen there. Speaker 10: On 11/01/2016, Hillary and Bill Clinton and their entourage of assistance affected a civilian coup. In contrast to the usual concept of a coup where the military is involved and takes over the White House and communication centers, very much like the scenarios you see in a movie. This coup was done silently and very effectively through two methods, corruption and co optation. The Clintons have been involved in co opting our White House, our judiciary, our CIA, our Federal Bureau of Investigation, our attorney general Loretta Lynch, and our director of the FBI, James Comey, for some time now. What they've done is to make sure that they were part and parcel of a group of people who were interrelated through political cronyism. However, in order to stop this coup, we in the intelligence community and others involved have informally gotten together, and with their permission, I am beginning to announce that we've initiated a counter coup through Julian Assange and WikiLeaks. What has happened in effect when, Comey had to open up the case of Hillary Clinton and discuss the emails that were involved with the Anthony Weiner case. It was not the case itself that was as important as the fact that this was the entree for many of us in the counter coup to say to the administration, we have your number. Not only do we have your number, we're going to stop you from making Hillary the president of The United States. And at the same time, we will convict and indict the president of The United States, Loretta Lynch, and many others who were involved in the cover up of the massive corruption that occurred under the Clinton Foundation. Now in both cases, their coup was silent, and our counter coup was silent. And it was all transgressed or occurred on the Internet. And this is probably the first time in the history of any country where a coup was initiated on through the Internet and a counter coup was initiated through the Internet. I am just a small part of something far bigger than myself. It was the brave men and women who were in the FBI, the CIA, the director of intelligence, the military intelligence, and men and women in 15 other intelligence organizations who were sick and tired of seeing this corruption in the White House and the Justice Department and in the intelligence system, and we decided that there was something we had to do in order to save the republic. So we initiated a counter coup through Julian Assange, who's been very brave and and really quite formidable in his and his ability to come forth and provide all the necessary emails that we gave to him in order to undermine Hillary and Bill Clinton. Again, America, we're going through a major, major transition and, quite frankly, a second American revolution. We do not have guns. We do not have weapons. We do not intend to kill anybody. We do not intend to harm anybody. But we, the American public, and those of us who serve as veterans and in an intelligence service like myself, will stop the Clintons from assuming power that they don't deserve. At the same time, we will make certain that Obama leaves without any trail of a, pardon or any other act of treason. In effect, we want a peaceful transition in this great American republic. I bring you this news, and I want you to understand what has happened. A moment of history is occurring right now in front of us, and I'm proud to explain it to you.
Saved - February 4, 2026 at 4:19 AM

@TheSCIF - The SCIF

All of these mainstream media reporters constantly wrote articles declaring pizzagate was fake. Coincidentally, all of these same reporters were arrested and charged for rap*ng and sexually abusing children. Some of the victims were toddlers. There are NO coincidences. https://t.co/OfgF3huBte

Saved - February 2, 2026 at 9:31 AM

@TheSCIF - The SCIF

The Weiner laptop is one of the most important pieces of evidence next to the Epstein documents that has enough evidence on it to bring down some of the most wealthy, powerful people in the world, including Hillary Clinton, and the U.S. government itself. https://t.co/9v5q9y5tMC

Video Transcript AI Summary
The discussion centers on a set of interconnected rumors and reported events involving Hillary Clinton’s private email server, Anthony Weiner’s laptop, and a wave of NYPD suicides, with the following key points emphasized by the speakers: - The FBI is reopening its investigation into Hillary Clinton’s email scandal after the Wall Street Journal reported that 650,000 emails are on Anthony Weiner’s laptop, and thousands of those may involve Clinton’s server because Weiner was married to Clinton aide Huma Abedin during Clinton’s tenure as secretary of state. It is noted that Clinton “bleached and deleted 33,000 emails after receiving a congressional subpoena” to cover up her crimes. - A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, became the focus of new inquiries into Clinton’s use of a private email server. Sources say there could be as many as 650,000 emails on the computer, with metadata suggesting thousands could have been sent to or from Clinton’s private server. The laptop’s significance is tied to its potential connection to Clinton’s emails. - It is asserted that Anthony Weiner’s laptopsite had kill switches, and that the laptop had not previously been discussed in the Clinton email probe. Weiner’s communications with a minor are described in detail, including an exclusive interview with Inside Edition where a 15-year-old girl recounts sending a message to Weiner in January 2016, which escalated to obscene messages. - The exposure of those messages is linked to the FBI’s investigation; it is claimed that Weiner’s laptop revealed emails from Hillary Clinton to Huma Abedin, and that the FBI’s review of the Weiner laptop led James Comey to reopen the investigation into Clinton’s use of a private email server just days before the presidential election. The girl’s identity is being withheld due to being underage, though her father allowed her face to be shown. - Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators discuss the October 2016 Comey announcement reopening the investigation as potentially politically motivated or an attempt to cover prior inaction, with some asserting that the NYPD would have disclosed additional information if not for the FBI’s handling. - The NYPD reportedly found numerous Clinton emails, Clinton Foundation emails, and Huma Abedin’s emails on Weiner’s laptop, along with state department correspondences and other material, described as damning criminal information involving Hillary, her circle, and other Democrats. It is claimed they faced pressure to go public if the FBI did not reopen the investigation or pursue timely indictments. - Beyond the Clinton emails, the conversation includes sensational allegations of sex rings and criminal activity, including a claim that Hillary traveled to a place described as “sex island” with Jeffrey Epstein; Bill Clinton allegedly visited there many times. There are allegations that the material included “insurance policy” files and other damning content. Officers who reportedly reviewed the material allegedly suffered trauma and were said to have died, though specifics and verifications are disputed. - The dialogue notes that there were 12 individuals who saw Weiner’s laptop; it is claimed nine of those who viewed the material died, though one speaker later remarks that none of the 12 are dead. Additional reporting mentions a NYPD deputy chief, Steven Silks, who allegedly oversaw evidence from the Weiner laptop and died by suicide, with speculation about copies of the laptop being held by police brass. The discussion suggests that if the FBI hadn’t pursued the matter, there would be broader revelations. - Other speakers reference an influence of the Weiner laptop on broader investigations and imply that the material could have substantial legal consequences, including potential prosecutions.
Full Transcript
Speaker 0: We never thought we were going to say thank you to Anthony Weiner. Speaker 1: The FBI is reopening its investigation into Hillary Clinton's email scandal. The Wall Street Journal reports 650,000 emails are sitting on Anthony Weiner's laptop. Thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. Speaker 0: To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. Speaker 2: A computer used by former congressman Anthony Weiner and his estranged wife, Huma Avedin, is now the focus of new inquiries into Hillary Clinton's use of a private email server. Sources have told the Wall Street Journal's Devlin Barrett that there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that missus Clinton used while she was secretary of state. Why is this one laptop now so significant? Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. Speaker 2: Who sees from Weiner as part of an investigation into whether he sent sexually charged emails to a teenage minor. The laptop hadn't previously come up in the Clinton email probe. Speaker 4: Did he know that you were only 15 years old? Speaker 5: He did. Speaker 4: Her age was no deterrent for Carlos Danger. In an exclusive interview with Inside Edition, this minor says she first sent disgraced Queens Congressman Anthony Weiner a message on Twitter back in January 2016 when she was just 15 years old. Speaker 5: I just sent him a nice message, just hello. I'm a huge fan. Speaker 4: She says she wanted to see if he was up to his old antics during last year's presidential election. Turned out, he was. Speaker 5: I knew that it was going downhill and really fast. Speaker 4: She says the messages from the Democrat quickly turned obscene. I was Speaker 5: disgusted. That's part of the reason that I came forward. Speaker 4: At the time, Weiner's wife, Huma Abidine, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Aberdeen. That led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server while secretary of state, just days before the presidential election. Inside Edition says it's withholding the girl's name because she's underage, but her father gave permission for her face to be shown. Weiner went on to plead guilty to a charge of transferring obscene material to a minor. Speaker 6: Just striking about this is that, you know, announcement from James Comey in October 2016, you know, kind of saying that the investigation was being reopened here. Some people say that cost Hillary Clinton the election itself. But when we look at that incident and, you know, not with this all this other information we have, what jumps out to you about that? Speaker 7: That was Comey trying to cover Comey because they knew they hadn't done what they should have done with the Wiener laptop and the New York Police Department who were honest were gonna disclose all that. He just simply had to do it to try to save his own skin. Speaker 8: Because of Wienergates and the section scandal, the NYPD started investigating it. Through a subpoena, through a warrant, they searched his laptop and sure enough found those 650,000 emails. They found way more stuff than just the, more information pertaining to the the inappropriate texting the guy was doing. Speaker 7: 675,000 Clinton emails when they got Anthony Weiner's laptop in a search warrant because of all his sex perversion issues. It was all the Clinton emails, the Clinton Foundation, her secretary of state emails, Huma Abedin's emails. Lots of people emailed Huma as a proxy for Hillary. Speaker 8: They found state department emails. They found a lot of other really damning criminal information, including money laundering, including the fact that Hillary went to this, sex island with convicted pedophile Jeffrey Epstein. Bill Clinton went there more than 20 times. Hillary Clinton went there at least six times. The amount of garbage that they found in the emails of criminal activity by Hillary, by her immediate circle, and even by other, Democratic members of Congress was so disgusting. They gave it to the FBI, and they said, we're going to go public with this if you don't reopen the investigation, if you don't do the right thing with timely indictments. Speaker 9: We're not talking about one or two emails. We're talking about hundreds of thousands of emails. Speaker 8: NYPD was the first one to look at that laptop. Speaker 7: I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 10: Somebody sent it to me. I I would not advise you to have a look at it. She and her spokeswoman, they put a five year old girl naked on a table, bind it, And then with a scalpel, they start to remove the face. Speaker 0: Oh my Speaker 10: god. Then you hear this child screaming, screaming, and they take off the face. And Hillary Clinton puts it on her face and goes to the child. And you see, the child is all flesh, and then the eyes pour out, and this child sees her own face on the face of Clinton. I will never forget that image, and I I never scream. That's how evil these people are. Speaker 3: Supposedly, nine cops watched the videos on on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. Speaker 11: There were a total of 12 individuals who saw Anthony Winner's laptop computer. None of those 12 people are dead now. Speaker 12: Some sad news tonight. Another New York City police officer has taken his life. The second NYPD suicide in two days. Speaker 0: Well, Corey Tamsen, you know, with the latest suicide, the eighth this year, the sixth, just the last two months alone. Speaker 13: Another New York police department officer has died by suicide, becoming the ninth to do so this year. According to a law enforcement official, the 56 year old officer was off duty and at home. On Tuesday, another law enforcement official told CNN that an eighth officer had died by suicide. A 35 year old Speaker 9: Robert Escheverria died of a self inflicted gunshot wound at home last night. The 25 year veteran officer suicide came a little more than twenty four hours after a 35 year old officer took his own life. Commissioner James O'Neill is still struggling with the news. Speaker 0: You know, you think that, okay, this is gonna be the last one. And and last night I got a phone call and I just did it. It just almost knocked me down. I just took the wind right out of me. I just, you know, you know, what the hell is going on here? Speaker 9: So far this year, there have been nine NYPD suicides, seven since June. Last year, there were a total of four. We don't know why Nick did what he did. Doug Budney's son Nick, a fourteen year NYPD officer, took his own life last year. I just think it was a bad last decision. Speaker 12: Another NYPD officer has just died by suicide. It's the tenth suicide so far this year. News four's Gus Rosenthal is live at the site of the shooting in Queens. Gus, what can you tell us? Speaker 14: Yes. Renaud, an officer was pronounced dead at Queens General Hospital just a few minutes ago, and now a number of other officers are here trying to figure out exactly what happened. This is the scene at 178th And Union Turnpike in Utopia, Queens. Little known about who this officer was and the circumstances surrounding this. Again, we just know this was an off duty officer with a self inflicted gunshot wound. He was rushed to the hospital where he would pass away just a short while ago. Now leading up to this, as you mentioned, there have been nine previous suicides by active members of the NYPD happening this year in 2019. Speaker 11: Now that is a strange coincidence. Anthony Weiner is alive. Weiner shared the laptop with his estranged wife, Huma Abidine, a close aid to Hillary Clinton since 2000. Speaker 15: NYPD chief commits suicide one month before retiring was directly involved in Anthony Weiner laptop computer evidence handling. A high ranking New York City police department officer has died from an alleged self inflicted gunshot wound to the head. Deputy chief Steven Silks was found in an unmarked patrol car wearing civilian clothes Wednesday evening, just one month before he would turn 63 and face mandatory retirement. He allegedly shot himself in the head with the gun reportedly discovered beside him. He was very closely and heavily involved in the investigation of the laptop seized from the former congressman Anthony Weiner, which allegedly held volumes of Hillary Clinton email evidence on it. A fellow officer told the New York Daily News that Silks was deeply committed to the job Silks reportedly submitted his mandatory retirement paperwork the day before. Other sources, however, say that the deputy chief was heavily involved in the sex crimes investigations of former Democrat congressman Anthony Weiner and that the chief personally oversaw the evidence gathering from a laptop computer seized from Weiner in that investigation. The laptop is alleged to have contained numerous emails from Hillary Clinton during her time as secretary of state and numerous files in a folder titled insurance policy, which reportedly contain extraordinary details about child sex rings operated by and for use of high ranking government officials nationwide. Ultimately, that laptop had to be turned over by NYPD to the FBI who allegedly lost it. Rumors have circled for years that NYPD top brass took copies of the hard drive because they were suspicious of the feds in general and wanted to make certain that the evidence was preserved. One high ranking NYPD official at the time, the laptop was seized, told media outlets he was sickened by what he saw on that computer. And if the Fed did not pursue the necessary investigations, he would reveal what the laptop contained. It is now believed that deputy chief Silks was that official. No one is confirming or denying that information at this time. So deputy chief Silks was one of the now 10 officers, and he allegedly was the one who oversaw all the information on the Anthony Weiner laptop and made copies. Who else made copies, and who else has the information? Was it suicide? Probably not. Speaker 7: So one of the things if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted, I have no doubt, on that laptop. Speaker 3: Anthony Weiner's laptop were ever released. The government would fall. Weiner's laptop had kill switches in it. It was filled with crap that wasn't supposed to be there. We never get to see it. Supposedly, nine cops watched the videos on on on Wiener's laptop. They had to keep leaving the room because they couldn't stand what they were seeing, and all nine are now dead. There's names and faces and deadness. Right? They're they're real people. Now you can say, well, maybe they died for other reasons. I go, but it's still nine cops. You know, it's like the five cops who died after January 6. Right? Four of them were suicides. Out of according to AI, there were about 80 cops really in the thick of things. Four of them died from suicide.
Saved - February 2, 2026 at 8:55 AM
reSee.it AI Summary
I report that a Michigan 2020 election worker described a white van and two cars arriving at Detroit TCF Center on Nov 4, 3–4 am, with 138,000+ ballots, unsealed, no chain of custody, all 100% for Biden; this aligns with testimony and affidavits and was captured on video. The 2020 election was stolen.

@TheSCIF - The SCIF

Michigan 2020 election worker reports that a white van, and 2 other cars showed up at the Detroit TCF center on Nov. 4th between 3 and 4 am with 138,000+ ballots, unsealed, with no chain of custody, which were all 100% marked for Joe Biden. This report lines up with multiple testimonies and affidavits and was caught on camera. The 2020 election was stolen.

Video Transcript AI Summary
In Downtown Detroit at the TCF Center, a video discussion describes what a caller says happened during ballot processing. The account asserts that after precincts had counted ballots and were ready to close, three vehicles—a van, a Chrysler 300, and a Ferrari—arrived at about 4:00 a.m. with a claimed 130,000 ballots. The claim is that every one of these ballots were Biden ballots that had not been delivered to the precinct before its cutoff, constituting a “big irregularity” and suggesting voter fraud. The speakers say this is being contested by the president in a lawsuit for Michigan, with people who allegedly witnessed the event. Speaker 1 adds that back rooms at the facility enabled cars to drive in through a garage door, and that ballots appeared between 10:30 p.m. and 3:30 a.m. Approximately 38,000 ballots were said to have arrived in that window, with a reported count of 61 ballots described as being in USPS boxes. The boxes were not necessarily USPS-delivered; a white van with the city clerk’s emblem appeared to be delivering them, bearing the name Janice Winfrey and related tagline. The implication is that ballots arrived in an unverified, potentially improper manner. Speaker 2 notes possible additional vehicles present at the time and mentions that a mini panel truck with Detroit Elections Bureau regalia and a vehicle ID number was observed, with other people recording license plate information. The lack of verifiable chain of custody is emphasized: there was no confirmed Republican/Democrat presence during transfer, and seals on ballots were not verified. The speaker contrasts this with a suburbs experience where ballots were methodically processed, sealed, and tracked, implying Detroit’s process lacked similar controls. Speaker 3 explains that Gateway Pundit obtained video of the event after a delay, and that local media personnel claimed the event did not occur. The video shows an escort car and a lead car delivering items inside the facility, with the escort car reportedly from Pennsylvania and possibly a rental. The Michigan group, Patty’s group, counted drop-box ballots and reported about 1,340 to 1,400 ballots dropped in Detroit over the last two days. In contrast, after the shutdown, officials allegedly claimed 16,000 ballots were dropped in, with the question of where those additional ballots originated. Speaker 4 reinforces the Michigan group’s tally of roughly 1,340–1,400 ballots from drop boxes in Detroit in the adjacent period and points to the discrepancy between that count and the 16,000 ballots later cited, noting the eight-hour gap after the official closing time and the two separate deliveries to the TCF Center. The overarching claim is that these events indicate irregularities in ballot handling and raise questions about the source and legitimacy of the large ballot influx.
Full Transcript
Speaker 0: So I'm at in Downtown Detroit at the TCF Center, which is, in the heart of Detroit, in the heart of the D. And, I had a couple of people reach out to me and say, could you do another Facebook Live and explain where you're at and why you're here? You can see behind me that giant room behind me is where they are contesting ballots. So something that's very interesting that happened here in Detroit is, you know, I just talked to a guy that's been here all night. They were ready to shut down the precinct. They had counted all the ballots. Everything was good. Everything went smoothly. And then it was at about 4AM that three vehicles arrived, a van, a Chrysler 300, and a Ferrari with a 130,000 plus ballots. He said he was astonished as they started counting the ballots. He was astonished that every single ballot, like, literally a 100% of that, a 130,000 ballots was, were all Biden ballots that hadn't been delivered to the precinct before, the cutoff time for this precinct. So, obviously, there's you know, that's just a big irregularity, something that points to large scale voter fraud. And literally is being contested by the president of The United States in a lawsuit right now for the state of Michigan. We literally have people that watched it happen. I talked to people that are here. They're like, what? 130,000 ballots that haven't been verified. Speaker 1: In the back, there's a big facility where all the rooms were set up. You go to the back and there's a way that cars could just drive right into the facility, and that was like a garage door that opened and cars were coming in with the ballots. From what I saw, there was not one ballot that showed up from at least 10PM, or let me say at least 10:30 to the 03:30AM when roughly the number that Kohlbeck gave was 38,000 ballots showed up. There were, I counted over 50 different boxes of ballots that showed up all at once at 03:30 a. M. Someone gave an official count of 61. So 61 ballots, they were all in USPS boxes. Weren't it wasn't delivered by USPS boxes. Yes, yes. And it wasn't delivered by USPS necessarily. It was in a van, a white van, that had the city clerk's emblem on it. And the city it said, Janice Winfrey, some tagline. Speaker 2: Some reports indicate that there are two other vehicles there at the same time and I don't know if there's affidavits to that effect. Can say that me personally, I went back there and I witnessed a little mini panel truck if you will with Detroit Elections Bureau regalia over the side. It had a vehicle ID number on it. I didn't capture that but we had other people that captured that information and the license plate number associated with it. It looked legit and inside of it were a and this gets into some chain of custody discussions there's no verification that there is a Republican and Democrat during transfer. We don't know that they didn't take side stops to a nearby Coney Island to pick up a few more ballots from their buddies. We have no way of verifying any of that information. Are you supposed to be able to have that information? We're supposed to be able to have verification all the way along the line. The whole chain of custody we're supposed to be there and because they were not sealed. If they were sealed, all this stuff was sealed and you verified the seal and then when you came to another destination and you see if the seal is still intact, all right that's okay. So that's what the verification is supposed to That's what we're supposed to see. Yeah, when I do it in the suburbs where I was a senator, when I saw that come in, had pretty much a whole army that would get out of the van, get out there, pull up all the data from the precinct, put it into the van under configuration control, everything was sealed up with the tape and put out there. There was probably one of the most egregious aspects of what happened in the city of Detroit at the AV County Board was the utter lack of respect for chain of custody. Speaker 3: And she was working inside the TCF that morning. So we put in a request to get this video. It took months. And we got this at Gateway Pundit. We put this up on our site. We tweeted about it, and that's when we lost our Twitter account, by the way, by putting up this video. There's a lead car, an escort car that comes in. You can see here, each time he hands something to the people inside, and then this van drives in, and they actually came in twice. Now we had local media, one of the top reporters there. I'm not going to mention his name. He said that this never happened. He was there all night. There was no fraud. Nothing happened. So now we have the video of that. What's interesting about this, though, and that's why we included it today, is for one, it'd be wonderful to have some ping data on who these people are driving the escort car, because we found out later this escort car was from I was just thinking that. A Pennsylvania license. So it's a rental car, we believe. But what we found from Patty's group, the Michigan group, is they counted the drop box ballots the last couple of days. And there was only about 1,400 in the area that were dropped off the past the last two days, the ones that they counted. Speaker 4: They've actually watched every drop box and counted the ballots for every single person that dropped a ballot in in Detroit. So they counted the ballots, and that's about the number that they came up with, around 1,340. Speaker 3: Yeah. Thirteen, fourteen hundred. And then, when these were dropped off and they got caught, they came out and said, well, it was just 16,000 ballots. So we're not sure where they got these. This was eight hours after the after the, you know, everything was shut down. You're supposed to have your ballots in at 8PM. You know, eight hours later, they bring this inside the TCF, a big huge drop, and we know now they came in twice with 60 boxes of ballots the first time, another 13 or 12 or 13 the second time. And they're telling us that they had 16,000. We're wondering, because of the work this group in Michigan has done, where did those ballots come from? We have no idea.
Saved - February 2, 2026 at 8:49 AM

@TheSCIF - The SCIF

Michigan secretary of state official caught on video ordering 2020 election volunteers to count ballots that all contained the same signature, even after making her aware of the obvious and apparent election fraud. https://t.co/bHpCDht1tn

Video Transcript AI Summary
The discussion centers on completing an audit of ballots to obtain a count and address concerns about the precinct. The participants emphasize that without counts, they cannot move forward. They insist that the audit piece must be completed first, not an investigation, so that a number of ballots can be established and the overall tally can proceed. Key points raised: - The need to finish the audit to determine how many ballots are in the ballot can, and to move forward with the numbers. “We need to move forward with the audit so we can get the numbers, so we can see how many ballots are here.” - A concern has been raised about the precinct, including the issue of multiple ballots with the very same signature. The team discusses handling this by counting the ballots and later addressing the concern, rather than delaying the process. “we will separate out and count those and add those in. We're there going to be an asterisk saying these ballots have the same.” - There is tension between continuing the presidential race audit and addressing potential irregularities. The instruction given is to complete the audit portion first and then review any issues. “the process right now is for you to put them in the piles where they belong and for the presidential vote and count the presidential votes… finish the presidential race audit, not separate them out, and then we'll move forward from there.” - The officials acknowledge the underlying concern about the precinct and previous issues with county ballots, but reiterate that, at this moment, the priority is to obtain a count and finish the audit. “We understand that there may be possibly an issue with this precinct. We understand that. But what I need for you to do right now is to finish the audit process.” - They clarify that the current activity is not an investigation, and that the aim is to produce a number for how many ballots were in the can when counting began, enabling progress based on the audit results. “This is not an investigation right now… not an investigation, not counting… what I need you to do is complete the audit so we can get a number.” In sum, the participants are focused on completing the ballot-count audit to establish a definitive tally, while acknowledging concerns about signatures and precinct irregularities, and planning to address those concerns after the audit yields a numeric result for the presidential ballots. The priority repeatedly stated is to finish the audit to obtain a count, then proceed with any further review.
Full Transcript
Speaker 0: To test for these. Don't count. Yep. They've got I'll type this up in the bag. Can you tell us what Extra. Okay. Speaker 1: So you don't know what to count here. Yeah. You count. Good. How can you sell? You Alright. So, Dom, Is that right? Yeah. Speaker 0: Well, that's what this was about. Speaker 2: Mhmm. The counts. Because if we don't have the counts, then we can't move forward. And we understand that there is a concern with this precinct, but this is not a time for you to be investigated right now. Speaker 1: Did you find some noise? Speaker 2: No. No. So you need to move forward with the audit so we can get the numbers, so we can see how many ballots are here. Speaker 0: But wait. Then if okay. So when we're done Speaker 1: with the audit, there is still the opportunity to challenge the fact Speaker 0: that we have multiple ballots with the very same signature. Speaker 2: I I don't know if challenge is the right word, but until we get it Speaker 1: we're challenging We'll go ahead and count the ballots. Right. Speaker 2: We need we need we need you to move forward. Speaker 1: But we will separate out and count those and add those in. We're there's going to be an asterisk saying these ballots have the Speaker 2: same And and again, we know that you have a concern with this precinct, and and and as soon when you get done with the audit part of it, not an investigation, not counting, That's not that's not your rule right now this very minute. So what I need you to do is complete the audit so we can get a number of how many ballots were in this can when you started counting, and we can move forward from there. K? So what I what I need for you guys to do right now is to finish the audit process. We'll have Speaker 1: a number. We'll have a number, but we can't operate about Whether valid or invalid. Speaker 2: We'll have That that is not the process right now. The process right now is for you to put them in the piles where they belong and for the presidential vote and count the presidential votes. I we understand that there may there is possibly an issue with this precinct. We we understand that. But what I need for you to do right now is to finish the presidential race audit, not separate them out, and then we'll move forward from there. Okay? But I need you to continue the process right now. Speaker 1: Do you realize that the former state representative has had issues with county ballots that they've been invalidated. Speaker 2: I understand. But until we get a count, we we we need that piece done first. We need the audit piece done because that's why we're here. And we will look at the numbers. K? And and I understand that there may be an issue. And I understand your concerns. So if we can complete the audit piece right now Okay. Then we can move forward. Okay? Thank you. This one with this piece. This is not an investigation right now. Speaker 1: This is a valid
Saved - January 31, 2026 at 8:33 PM

@TheSCIF - The SCIF

New Epstein document states, "George Bush 1" (senior?) allegedly rap*d a male victim (child) and witnessed a type of ritualistic sacrifice. This should tell you everything you need to know about what people were screaming from the rooftops about for years. https://t.co/ZrIxECDtS6

Saved - January 29, 2026 at 6:34 AM
reSee.it AI Summary
I note analysis from the 2020 Georgia election claiming over 40 data points of negative voting or vote switching totaling more than 200,000 votes, with machine learning flagging over 500 precincts and over 1,000,000 corresponding votes for suspicious activity. The post calls the total fraud in the 2020 election absolutely mind-boggling and among the most sophisticated election fraud operations in U.S. history.

@TheSCIF - The SCIF

Analysis from the 2020 Georgia election found over 40 data points where negative voting, or outright vote switching occurred, totaling over 200,000 votes, along with machine learning algorithms, which flagged over 500 precincts, with over 1,000,000 corresponding votes that had suspicious activity in the 2020 Georgia election alone. The total amount of fraud that occurred during the 2020 election is absolutely mind-boggling and one of the most sophisticated election fraud operations in U.S. history.

Video Transcript AI Summary
Linda McLaughlin and her colleagues present a data-focused argument alleging election fraud in Georgia, supported by multiple data analyses and demonstrations. - Linda McLaughlin introduces the data integrity group and states that data is numerical and non-partisan; she aims to remedy a lack of presented data in the discussion. - Dave Labou, a lead data scientist, explains that their analysis across precincts, counties, and the state identified over 40 data points of negative voting or vote switching across candidates totaling over 200,000 votes. Separately, machine learning algorithms used for anomaly detection in fraud detection flagged over 500 precincts with over 1,000,000 corresponding votes showing suspicious activity. He emphasizes that the process is scientific and not tied to political affiliations. - Labou uses a banking analogy to illustrate data integrity concerns: in hypothetical online banking, deposits or withdrawals being redirected or split would indicate fraudulent activity. He applies this concept to voting data, arguing that the voting system data aligns with the Secretary of State data used to certify results, yet exhibits patterns akin to transfers and reallocation not authorized by voters. - He states that the data are publicly available but require advanced programming to extract, parse, and join datasets. Their independent team has made all analysis, programs, and data public to allow replication and has produced videos to translate the analysis for broader understanding. - A key claim is that receiving over 90% in a precinct is a marker for fraud; in Fulton County, more than 150 precincts voted 90% or more for Biden, and in the statewide race (decided by less than 13,000 votes), these 150 Fulton precincts accounted for 152,000 Biden votes, described as a clear indicator of suspicious or fraudulent activity. - Labou and team present a series of visuals and explanations indicating explicit vote count switching, e.g., in Dodge County, where Trump’s votes appear to be subtracted while Biden’s counts increase in tandem with county updates, leading to a shift in totals that would not appear in state totals due to timing of updates. - They reference adjudication as the review of ballots flagged during scanning, noting that only ballots with a contest causing questions about how the computer reads them are adjudicated. - In DeKalb County, they assert it is statistically impossible for nine out of ten voters to vote for Biden in 94 precincts. - They describe a data flow in Fulton County: poll pad check-in, ballot image saved on the machine, SD cards transported to drop-off locations, escorted to a warehouse, run through Democracy Suite, exported to a Dominion server, and inserted into a SQL Server database before transmission to the Secretary of State and data aggregators. - A critical point is the vulnerability within the county update data-entry process: the square box detailing data-entry options in the election software allows updating vote batches, projecting batches, and generating new or temporary batches that can be injected directly into the tally; these options can be validated and published, enabling potential manipulation before server upload. - They pose questions about validation: whether two observers from both parties were present during SD card transmissions and drop-off transmissions, and whether there is a public log of exchanges at drop-off points. They challenge why elected officials have not pursued these questions about voting integrity. - Labou notes the process is machine-to-machine and, by design, should not decrement sums; any decrement requires a robust explanation, and their data suggest negative drops are inconsistent with normal sequential processes. Speaker 2 clarifies the data sources (CITL election night data and Edison/New York Times data) and asserts that the process from poll pads to secretary of state is machine-driven, with no human entry of totals, thereby removing human entry error as an explanation for observed negative changes. Speaker 4 adds emphasis on the validation and potential vulnerabilities in the software options used for election administration, underscoring the need for transparency and inquiry into the electoral process.
Full Transcript
Speaker 0: Based on our extensive analysis across precinct, county, and state voting results, we've identified over 40 data points where negative voting or outright vote switching across candidates has totaled over 200,000 votes. Separately, we've applied machine learning algorithms that are regularly used for anomaly detection of fraud in financial services that flagged over 500 precincts with over 1,000,000 corresponding votes that exhibited suspicious activity. Speaker 1: My name is Linda McLaughlin. I have a background in politics and media. I have an MBA in business, and I am a part of the data integrity group. One of the things that we have unfortunately seen is that no one has presented data. We hope to remedy that this afternoon. I'll be introducing my two colleagues here, Dave Labou and Justin Mealy, both of who are data scientists, and we will look at data. Please understand that data is numerical. It is not partisan. It has no red or blue attached to it. It is just numbers, And numbers is all we need to prove what we're trying to tell you today. Speaker 2: What we have here is we actually have fraud that we can prove in this election. There was fraud in Georgia's election. We can prove it with data. And because we can prove it with data, the will the voting will of the people of Georgia is not reflected in what was certified by the secretary of state. So Dave is our lead data scientist, and go ahead. Speaker 0: I'm Dave Labou, a data scientist with over a decade of experience working directly with structured and unstructured data across a number of industries, specialized in machine learning and more recently artificial intelligence. I've worked with a multitude of data structures in the financial services, telecommunications, and in primary research consulting industries. The analysis we're gonna be reviewing is purely scientific and not based on any political affiliation of red, blue, left, or right. We objectively focus on numbers, data, and machine network systems. Based on our extensive analysis across precinct county and state voting results, we've identified over 40 data points where negative voting or outright vote switching across candidates has totaled over 200,000 votes. Separately, we've applied machine learning algorithms that are regularly used for anomaly detection of fraud in financial services that flagged over 500 cincts with over 1,000,000 corresponding votes that exhibited suspicious activity. So what's important to note here is that in alignment with standard fraud investigations, we've applied a rigorous, systematic, and sophisticated process that has consistently identified data points that other industries, including financial services, would label as suspicious activity or definitively declare fraudulent. So I'll pause and I'll just with this in mind, I wanna make this a little bit more relatable. And if you can take a moment just to think about how your online banking experience works. You probably have a checking, savings, and credit card account all on a single screen. Your online banking is designed so that built into this website interface is a back end connection to a database. And this will store all of your balances, including your with your deposits or withdrawals. So you can review your statement each month confirm that the transactions you made are accurate and true. So imagine now you logged into your account on November 5, and you noticed that there were something to the magnitude of 50 transfers across your accounts. Let's say you even deposited a few checks in the third and fourth, and you expect to see these transactions for each of the individual amounts you deposited. Now instead, imagine your activity reflects these deposits going into your account, then being switched to a checking account, sometimes as an exact dollar amount and other times being broken apart into slices and switched intermittently across different slice magnitudes. Now, is obviously strange in itself and deeply concerning from a data integrity standpoint. Now also imagine that some of these deductions are sent externally, and so the money is leaving your account entirely. You can see the exact amount that it deducted and where it was sent that you did not authorize. So this is what we have identified within the voting system data that has been confirmed to align with the Secretary of State data that's used to certify these election results. The data is freely available to the public, but does require some advanced programming skills to extract, parse, and join these datasets in order bring these types of insights to light. We're part of an independent team that has, in the spirit of transparency, made all of our analysis, programs, and data public so anyone can independently replicate. We've also put out a series of videos that help translate some of our more complicated analysis, which we're gonna play here that will help reinforce the message and maybe a different point of view that will help make these concepts more digestible. Receiving over 90% in a precinct is a marker for fraud. In Fulton County alone, we can see that more than 150 precincts voted 90% or more for Biden. In the statewide race that was decided by less than 13,000 votes, these 150 Fulton precincts alone accounted for a 152,000 Biden votes. This is a clear indicator of suspicious or outright fraudulent activity. Speaker 3: We've scanned a 113,130 as of moments ago. We've adjudicated a 106,000 plus of those. Speaker 4: Adjudication, the process of reviewing a ballot that may have been flagged during the ballot scanning process. Speaker 3: The only ballots that are adjudicated are if we have a ballot with a contest on it in which there's some question as to what how the computer reads it so that the vote review panel then determines voter intent. Speaker 5: In 94 precincts in DeKalb County, it is statistically impossible to have nine out of 10 voters voting for Joe Biden. Speaker 0: We've just seen a few examples of statistical irregularities and impossibilities. Now we'll take a closer look at some vote manipulation within the election database, including explicit vote count switching from one candidate to another. We can see in Dodge County, there's a lot of strange activity going on. The left side of the screen shows incremental votes as they were reported for both election day and absentee. On the right, we can see the total vote counts, which should only be incremental, moving as the county reported in real time. Again, here, we're focusing only on Donald Trump's votes. So this wouldn't necessarily be captured at the state totals as they reported on TV since one county's deduction in votes can be offset by another county's reporting of equal or greater votes. The first question you're gonna wanna ask or already have asked is, why are any bars going negative? And the answer is they shouldn't. Unbeknownst to the general public, votes for Donald Trump were being switched and removed from his total, which often coincided with other precinct updates that simultaneously offset deductions so that they appeared to remain neutral to outside observers. Across the three counties of Dodge, Daughtry, and Putnam, Trump has over 30,000 votes that simply disappear. Here, we have clear visibility of an event that occurred at the county level as we compare two data sources. In this case, Donald Trump reported 29,391 votes at 09:11 local time in Bibb County, Georgia. Simultaneously, Joe Biden was reported to have 17,218 votes. Minutes later, at the next reported time update from the precinct data sources, Donald Trump was reported to have 17,218 votes, and Biden now has 29,391 votes. A clear and exact switch of vote totals between candidates. Because there is a time lag between each state recorded aggregation of county results, this type of switch can go undetected in state reporting as long as it falls after the latest state refresh and before the next state update. Speaker 4: According to the Georgia secretary of state website, Trump lost by 12,670 votes. As you saw earlier in this video, far more than that were taken from president Trump. In statistics, an anomaly or outlier is an observation or event that deviates so much from other events that it arouses suspicions in its generation. In this, an isolation force is defined as a specialized learning algorithm for anomaly detection that works to the principle of isolating these outliers and flagging them for potential review. Remember these graphs when you meet your government officials in person. The burden of proof is on the system to prove our elections were fair and not the people. Okay. So here's how Speaker 2: your vote is counted in Georgia using Fulton County's process as an example. So after you check-in at a poll pad to vote on election day, you go to an image cast precinct terminal. After you cast your vote, a ballot image is saved on the machine. And after all the polls close, the SD cards containing all the ballot images are removed from the terminals and transported by car to, in Fulton County, one of four drop off locations. Then it's transferred by police escort to the 1365 English Street warehouse. Inside of there, it is run through a tabulation software called democracy suite, which counts the ballots and exports the totals to a Dominion server that inserts those totals into a SQL Server database. From that point, it's directly transmitted to the Seidl election night reporting server. The election night reporting server is responsible for transmitting the totals to the secretary of state for output to their website and data aggregators like Edison who then transmit that data to the networks. Speaker 0: As you just saw, there's a standard process for transferring votes by memory card from precinct to county vote aggregators. Now let's focus specifically on this square box detailing the data entry process for county updates. The following options are available to anyone with access to these computers working in the election software, updating vote batches, projecting vote batches, and even more notable, generating new or temporary batches that can be injected directly into the vote tally. Each of these options can then be validated and published into the system. Again, anyone working in the election software at this point has the power to manipulate large batches of votes. And all of this is before the data is even uploaded to the server. Speaker 4: What should have happened during the validation process? Were there two observers from both parties present for the transmission of the SD card? Were there two observers from both parties present in the car when the boats were taken to the drop off locations? Is there a public log of these exchanges at the various drop off points and locations? Why are elected officials not asking these questions about our most sacred right to vote? Okay. Speaker 2: So real quick, just wanna jump in there. And if you can go back to that chart, I wanna reference two things on side there. I'm sorry, the diagram. Okay. So in this diagram here, as I was telling you earlier, we use this CITL source, that election night reporting source. We have their data for all of Georgia. As also, we have the data that comes from New York time or the see the New York time Edison part on the right side there. Right? And for all intents and purposes, that election night reporting is going from there directly to the secretary of state. Right? This is the same data. It's the exact same data. Now the thing is, is that in every single aspect of this chart from poll you know, the poll pad, which doesn't really affect the thing to the the ballot marking device. More importantly, these these actual ballot marking devices on the precincts. When they go to when they're when they are tabulated at the end of the polling period and and the kind of these SD cards are removed or sort of the compact flash drives are removed, They're transmitted by person to these drop off points, tabulated, and so on and so forth. This whole process is a human sorry, a machine to machine to machine transfer for all intents and purposes using humans as a medium, at the same time, you're not having people enter, for instance, into a spreadsheet, these totals. Because you're not having people enter these totals into a spreadsheet, that removes the entire layer and the entire argument for any kind of human entry error because there's no human being entering anything anywhere in here. You can't show me a place where a human being enters stuff in here. Now if there were a human being entering something in there, then that would point to a type of fraud or fraud aspect of this this this whole thing. So the point is is that our data that's showing these negative drops is coming from a machine to machine to machine source. There's no reason that at any point something should be subtracted. And I wanna make that very, very clear that at no point in an incremental process should you decrement. Speaker 4: Dave? Are there any Speaker 0: We've mentioned the RTR software options in the video. And what's important here is that this is built into the software itself so that, you know, when anyone logs into their Windows or Apple machines, you have a certain set of, maybe you have parental controls on there for children. But in this particular case, there's no overarching controls and this type of flexibility of options you see here on that one through four is available. So there's this situation where new batches can be recreated, you can reject, which is outside of this typical chain of of sequence within this network diagram where votes should go in at the polling locations. Votes should be counted at the absentee counting locations and through SD cards and only in extreme situations if there there was an adjudication, are those processes met, should they be altered? And the fact that this exists anywhere within this sort of sequential supply is a vulnerability in the overall system. So this is here to identify that that vulnerability exists and also to reinforce the fact that what we had seen in our data analysis of votes going negative is should be outside of that process and also should not exist because we are thinking about a machine talking to a machine talking to a machine. And a machine, unless it's explicitly programmed to decrement, should not decrement, especially in a voting situation. Similar as the way you deposit money into a bank account mentioned earlier, votes no different. You only are adding here. And if there's a removal, there needs to be a a very good explanation as to why, and that has not been provided and simply nor is it consistent with how the data is structured and what we've seen in our analysis as to any part of the process that would be consistent with normal routine legal voting.
Saved - January 28, 2026 at 3:58 PM
reSee.it AI Summary
I see a military-style color-revolution operation unfolding on U.S. soil, tied to USAID, the NED, and the CIA funding NGOs to promote “democracy” abroad. Critics point to Soros’ Open Society Foundations and matching USAID funds, noting training and support for opposition movements in places like Ukraine (2004) and Georgia (2003). Domestically, I claim these grants influence protests and policy, allegedly to install globalist regimes. I want it shut down.

@TheSCIF - The SCIF

A military style color revolution regime change operation is taking place on U.S. soil, right in front of us, in real time. Color revolutions, often characterized by mass protests and violent riots leading to regime changes, have been linked to U.S. foreign policy tools like USAID, the NED, and the CIA, which channel taxpayer dollars through non-governmental organizations (NGOs) to promote "democracy" abroad. Historically, in events such as Ukraine's 2004 Orange Revolution and Georgia's 2003 Rose Revolution, U.S.-funded groups like the National Endowment for Democracy (NED), described by critics as a CIA proxy, provided training, resources, and logistical support to opposition movements. These NGOs, often portrayed as independent, facilitate voter mobilization, media campaigns, and protest coordination, using funds from congressional appropriations to USAID and NED. This amounts to covert interference, while supporters frame it as legitimate aid for civil society. Key players include billionaire philanthropist George Soros through his Open Society Foundations, which have collaborated with or received matching funds from USAID in various countries. Allegations tie Democratic administrations to these efforts, with reports of USAID grants flowing to Soros-linked NGOs during the Biden era, totaling millions in taxpayer dollars. In foreign contexts, this network is accused of orchestrating unrest by funding local activists and media outlets to amplify grievances against incumbent governments, often under the guise of human rights promotion. Just like we see playing out against ICE and to also cover up massive operations of fraud, once again being stolen from American taxpayer dollars, with the Minnesota State government involved. Soros and related organizations have denied orchestrating revolutions, but we all know this is far from the truth, with Democrats and the cabal itself orchestrating our entire countries downfall which also has ties to China and the CCP. Domestically, similar dynamics are in play, with USAID and federal funds reportedly supporting progressive NGOs tied to Democratic causes and Soros, influencing U.S. protests and policy advocacy. These grants for "social justice" initiatives are actually fueling division, using taxpayer dollars via "shady" networks to lobby for far left communist reforms. All in an attempt to install globalist communist regimes, not just in the U.S. but abroad. It's all connected and is the blueprint running in multiple countries worldwide, which is also tied to the global election fraud cartel which is just another arm of this entire operation. Now, it's time to shut it all down.

Saved - January 28, 2026 at 6:31 AM
reSee.it AI Summary
I show how easy it is to hack electronic voting machines. I craft a virus that exploits OS flaws, silently redirecting votes to another candidate, with no signs of tampering and a altered tally. The malware erases traces, making post-election audits hard without independent verification. The process takes minutes, and such attacks aren’t just for nation-states—motivated groups with modest resources could do it. A $4 demo from 2006–2008 era, and now it’s easier, even remote with back doors.

@TheSCIF - The SCIF

Princeton Professor shows how easy it is to hack electronic voting machines. The researchers craft a virus that exploits software flaws in the machine's operating system. Votes are silently redirected from one candidate to another, symbolizing how an attacker could "steal" an election without detection. The machine's interface shows no signs of tampering, and the final tally reflects the altered results. The hack leaves no traceable evidence on the machine itself, as the malware erases its tracks after execution. This makes post-election audits challenging without independent verification methods. The entire process takes mere minutes, emphasizing that such attacks are not the domain of nation-state actors alone but could be executed by motivated individuals or groups with moderate resources. The part that anyone could buy costs $4 dollars and this was just ONE simple demonstration from all the way back in the 2006 to 2008 era. Now it's even easier and done remotely with built-in back doors.

Saved - January 28, 2026 at 5:50 AM
reSee.it AI Summary
I see a military-style color revolution operation unfolding on U.S. soil, with protests and riots linked to USAID, NED, and the CIA channeling taxpayer dollars to NGOs to promote democracy abroad. I reference Ukraine 2004 and Georgia 2003 where NED-funded groups trained and supported opposition. I believe Soros Open Society Foundations and related NGOs receive USAID funds to influence protests, media, and policy, domestic and foreign, aiming to install globalist regimes. I call to shut it down.

@TheSCIF - The SCIF

A military style color revolution regime change operation is taking place on U.S. soil, right in front of us, in real time. Color revolutions, often characterized by mass protests and violent riots leading to regime changes, have been linked to U.S. foreign policy tools like USAID, the NED, and the CIA, which channel taxpayer dollars through non-governmental organizations (NGOs) to promote "democracy" abroad. Historically, in events such as Ukraine's 2004 Orange Revolution and Georgia's 2003 Rose Revolution, U.S.-funded groups like the National Endowment for Democracy (NED), described by critics as a CIA proxy, provided training, resources, and logistical support to opposition movements. These NGOs, often portrayed as independent, facilitate voter mobilization, media campaigns, and protest coordination, using funds from congressional appropriations to USAID and NED. This amounts to covert interference, while supporters frame it as legitimate aid for civil society. Key players include billionaire philanthropist George Soros through his Open Society Foundations, which have collaborated with or received matching funds from USAID in various countries. Allegations tie Democratic administrations to these efforts, with reports of USAID grants flowing to Soros-linked NGOs during the Biden era, totaling millions in taxpayer dollars. In foreign contexts, this network is accused of orchestrating unrest by funding local activists and media outlets to amplify grievances against incumbent governments, often under the guise of human rights promotion. Just like we see playing out against ICE and to also cover up massive operations of fraud, once again being stolen from American taxpayer dollars, with the Minnesota State government involved. Soros and related organizations have denied orchestrating revolutions, but we all know this is far from the truth, with Democrats and the cabal itself orchestrating our entire countries downfall which also has ties to China and the CCP. Domestically, similar dynamics are in play, with USAID and federal funds reportedly supporting progressive NGOs tied to Democratic causes and Soros, influencing U.S. protests and policy advocacy. These grants for "social justice" initiatives are actually fueling division, using taxpayer dollars via "shady" networks to lobby for far left communist reforms. All in an attempt to install globalist communist regimes, not just in the U.S. but abroad. It's all connected and is the blueprint running in multiple countries worldwide, which is also tied to the global election fraud cartel which is just another arm of this entire operation. Now, it's time to shut it all down.

Video Transcript AI Summary
The discussion centers on allegations that the United States has used or could use domestic and international mechanisms to effect regime change, including through domestic unrest and foreign influence operations. Speaker 0 describes a 2021 Special Operations Command instruction manual, framed as a vision for 2021 and beyond, that purportedly contains instructions and examples on how the military could work with the State Department, intelligence services, and USAID to use race riots to destabilize nations. He points to examples labeled as part of this manual’s guidance for destabilization via combined military-government-civilian efforts. Speaker 1 lays out a model of how revolutions are allegedly structured, starting with a government at the top and support funneled through USAID, the State Department, or other administration entities. He then describes a degree of separation through privatized NGOs, including the National Endowment for Democracy, the International Republican Institute, and similar organizations, with money flowing from entities such as George Soros’s Open Society Foundations through tides and government-funded NGOs like NED. He suggests money ultimately comes from the people, and that demonstrators, youth movements, a sympathetic media, and labor unions contribute to organizing protests. He outlines conditions for regime change: an unpopular incumbent, a semi-automatic regime (not fully autocratic), a united and organized opposition, the ability to quickly frame the voting results as falsified, media amplification of that falsification, an opposition capable of mobilizing thousands, and divisions among coercive forces like the military or police. He asks whether those conditions are present and implies they are. Speaker 2 cites a declassified CIA guide from 1983 aimed at training operatives to organize riots in foreign countries, including using agitators and hiring professional criminals to manipulate mass meetings, with the goal of turning general anger into violence against the regime. The guide describes creating a climate where a few hundred agitators could mobilize tens of thousands, using 200 back channels and 200 human assets to generate a 10,000–20,000 demonstration. It also notes strategies such as setting up job fairs near riots to enlist disaffected workers. He references USAID’s Office of Transition Initiatives (OTI), implying that “transition” is a code for regime change, and cites a 2009 congressional report warning that OTI was a foreign operation aimed at toppling governments through organized political warfare, including mobilizing unions, boycotts, and shutdowns of roads, transportation, hospitals, and schools. Fulton Armstrong’s quote is cited regarding government secrecy surrounding such operations. The speakers conclude by condemning actions conducted in the shadows, destabilizing nations using race wars to achieve political aims, and advocating that the military be involved, arguing these efforts occur without oversight.
Full Transcript
Speaker 0: In 2021, the special operations command under Mark Milley as chairman of the joint chiefs put out an instruction manual, a vision for 2021 and beyond that contained instructions and examples on how the military could work with the state department, intel services, and USAID using race riots. Here's examples of some of the instruction manuals here. One and two, in order to destabilize nations. Speaker 1: So the question I started with tonight is are we currently in a domestic homegrown color revolution? Well, I wanna go back to this first chalkboard because it it frames out how our own government facilitated regime change all over the world. There's a government ultimately at the top. Support is given through organizations like USAID, the State Department or somewhere else within the administration. Then you have a degree of separation. It's privatized. NGOs, the National Endowment for Democracy, National Democratic Institute, International Republican, all of these things. Then there's the money. The people with the real money. And that's people like George Soros through his open society and tides. We should do a show again on tides or just look it up on YouTube. You'll find an old show of mine on tides. And even government funded NGOs like Ned again over here. The money this time is coming from you. Finally, the demonstrators, the youth movements, the people who hit the streets, and a sympathetic media that will help deliver their message. I'm gonna add labor unions in here because they are contributing to the organizing of these protests. This grassroots. Okay. So this is how revolutions are set up. But what are the conditions for one to be successfully conducted? When can regime change actually be attempted? Well, the State Department learned this by doing it over and over and over again. And we know it because Obama's ambassador to Russia, Michael McFoehl, literally wrote the book on it. This is what was required, as per Obama's administration, to topple a country. Are you ready? You need a semi automatic regime. Not fully autocratic. It has to be semi. You have to have an unpopular incumbent. You have to have a united and organized opposition. Do we have these things yet? Then you have to have the ability to quickly drive home the point that the voting results were falsified. You need the media to inform people about the falsified vote. You need an opposition capable of mobilizing thousands of demonstrators. And then you need divisions among the regimes, coercive forces like the military or the police. Sounds like we have all of those, doesn't it? Speaker 2: Here's a declassified CIA guide written in 1983 to train CIA operatives in the field on how to organize riots in foreign countries. And here's a tab on using agitators, including hiring professional criminals to manipulate mass meetings and assemblies of people in person, which can result in general violence. And you will see that they advocate for general violence, where the CIA tells the case officers, our psychological war team must develop in advance a hostile mental attitude among the target groups so that at the given moment, they can turn their anger into violence demanding the rights taken away by the regime. So make these ethnic minority groups so mad at their government in a general sense that whenever we snap the trigger at the given moment, they will turn that general anger into physical violence against the state that we wanna overthrow. But this is a CIA guide on getting teachers, doctors, attorneys, and businessmen in a cluster cell recruited as social crusaders for the CIA backed cause. And then note what it says. Through a gradual process, these cells, your 10 super teachers with a lot of influence in the teaching realm. Your 10 lawyers with a lot of influence in the legal realm. Your 10 captains of industry You are 10 medical professionals with a lot of of pull over the hospital systems. Will each work within their own spheres of influence? And at the appropriate time, their influence will be used to fuse the groups together into a united front. Using the tactics of a force of 200 to 300 agitators, one can create a demonstration in which 10,000 to 20,000 could take part. All we need are 200 back channels, 200 human assets that we've capacity built, and we can get 20,000 people to commit a violent riot in a fury of violence against their own government. Speaker 0: In addition to that, they advocated for setting up job fairs near some of these riots so that disaffected workers could gain employment. Now as a member of congress, I ask myself, did anyone in USAID get elected to congress? How about to a presidency? Speaker 2: US secretly created Cuban Twitter to stir unrest in the economy. To organize smart mobs. These are these are literal mobs, BLM style mobs. Now I'm just gonna read this here for a second. McSpeden was, you know, one of the guys running this. He worked for USAID's Office of Transition Initiatives. Now transition means government overthrow. We transition word these days. Transition means a few things. In 2009, a report by congressional researchers warned that the office of transition and and and, again, this is not a CIA division. This is a USA division for regime change for toppling governments through organized political warfare, mobilizing the unions to take to the streets, mobilizing boycotts and shutdown of roads and transportation systems and hospitals and schools. And then it goes on to say, okay. We were told we couldn't even be told in broad terms what was happening at USAID because people will die, said Fulton Armstrong, who worked for the Senate Foreign Relations Committee. Before that, he was the US intelligence community's most senior analyst on Latin America, advise for for Bill Clinton. So he was the top guy at CIA at the analyst division on all of Latin America, and even he can't get access to this secret operation being run out of USAID. Speaker 0: When you are acting in the shadows and you are destabilizing nations using race wars to do it and then advocating that the military does it, in my opinion, not only do you put the future generations that would have to fight in those wars in jeopardy, But at the end of the day, you're operating without any oversight.
Saved - January 28, 2026 at 4:11 AM

@TheSCIF - The SCIF

For anyone who hasn't seen this old document from Eric Coomer from Dominion when he used to be with Sequoia, he blantly talks about transmitting data from their machines through a wireless modem, including vote tallies, updates, changing voter rotation representation. These machines were specifically designed for fraud. How much more proof do you want?

@PatriotMarkCook - Mark Cook

Courtesy of ERIC COOMER when he worked for SEQUOIA! Pay attention to this summary, and the email is attached! Transmitting results via WIRELESS MODEM Updating throughout the night by wireless communication External tally source Append/Replace the tally data coming from the SPP file Changed logic for machine count in by location block to sum over all location assignments for precinct Ordered precinct lists by voter reg RotateAZPrecinctWeight to assist precinct voter registration weighting of rotation for AZ Distribute rotation sets across precincts for a contest based on registered voters so that all rotation sets have approximately equal voter representation. HELLO!?!?? McFly?!?!?! @WethePeopleAZA1 @GailGolec

Saved - January 28, 2026 at 2:01 AM

@TheSCIF - The SCIF

More mainstream media journalists and Minneapolis state employees involved and found in the Anti-ICE assault Signal Group Chat App. Ben Hovland: NPR journalist and photographer. Alyssa Polack: Employee of the Minnesota Department of Education. https://t.co/GwFZuwXijY

Saved - January 18, 2026 at 10:01 AM
reSee.it AI Summary
I read affidavits from GA voters, officials, experts, and engineers alleging massive 2020 election fraud in Georgia. They cite: 2,506 felons voted; 66,248 underage voters; 2,423 not registered; 1,043 ballots from P.O. boxes; 4,926 voted after registering past deadline; 10,315 voted who were deceased before election day; 395 ballots cast in another state; 15,700 moved AP, 2020; 40,279 moved counties but didn’t properly register. They claim hundreds of thousands to millions nationwide.

@TheSCIF - The SCIF

Over 100 affidavits from GA voters, election officials, experts, and engineers, found a MASSIVE amount of election fraud during Georgia's 2020 election. - 2,506 Felons voted - 66,248 Underage voters - 2,423 Not registered to vote - 1,043 Ballots were cast from people using a P.O. box - 4,926 Voted after registering after the deadline to vote - 10,315 Voted who were registered to vote but deceased before election day - 395 Casted ballots in another state which is illegal in both states - 15,700 Voted who filled out a national change of address before Nov. 3, 2020 - 40,279 Individuals voted and moved across county lines, at least 30 days prior to election day, who did not properly register in their new county This does NOT include fraudulent ballots or any type of electronic fraud. The total number of fraudulent votes is easily in the hundreds of thousands, even millions, just from Georgia alone. Imagine the fraud from the rest of the country... Trump won in a landslide.

Video Transcript AI Summary
The Georgia legislature is presenting a set of facts to the court asserting widespread voting irregularities in Georgia. They claim: - 2,506 felons voted illegally in Georgia. - 66,248 underage and therefore ineligible people were illegally registered to vote before their seventeenth birthday, when the law requires 17 years old. - At least 2,423 individuals voted who were not listed as registered. - 1,043 individuals cast ballots who had illegally registered to vote using a post office box. - 4,926 individuals voted in Georgia who had registered to vote after their Georgia voter registration date, thereby canceling their Georgia voter registration. - 10,315 or more individuals voted who were deceased by the time of the election. - 395 individuals voted in Georgia who had cast ballots in another state, which is illegal in both states. - 15,700 individuals voted in Georgia who had filed a national change of address with the United States Postal Service prior to 11/03/2020. - 40,279 individuals voted who had moved across county lines at least thirty days prior to election day and had failed to properly re-register to vote in their new county, also in violation of Georgia law. The petition to contest will include affidavits of more than one hundred Georgia voters sworn under penalty of perjury, attesting to and confirming multiple violations of the Georgia election code. You will hear from several of those witnesses today. They also assert there are issues of outright lies and potential fraud. The speakers contend that the actual results of legal ballots cast in the November election in compliance with the Georgia election code cannot be known ever, not by the secretary of state, not by the governor downstairs, not by the voting public, and not by this Georgia legislature.
Full Transcript
Speaker 0: What we are presenting to the court and to you today as the Georgia legislature are facts, facts. 2,506 felons voted illegally in Georgia. 66,248 underage and therefore ill ineligible people to illegally register to vote before their seventeenth birthday when the law requires 17 years old. At least 2,423 individuals to vote who were not listed as registered. 1,043 individuals to cast ballots who had illegally registered to vote using a post office box. 4,926 individuals voted in Georgia who had registered to vote after their Georgia voter registration date, thereby canceling their Georgia voter registration. 10,315 or more individuals to vote who are deceased by the time of the election. 395 individuals to vote in Georgia who had cast ballots in another state, which is illegal in both states. 15,700 individuals to vote in Georgia who had filed a national change of address with the United States Postal Service prior to 11/03/2020. 40,279 individuals to vote who had moved across county lines at least thirty days prior to election day and who had failed to properly reregister to vote in their new county after moving, also in violation of Georgia law. The petition to for contest will include affidavits of more than one hundred one hundred Georgia voters sworn under penalty of perjury, attesting to and confirming multiple violations of the Georgia election code. You will hear from several of those witnesses today. And then we have the issue of outright lies and potential fraud. The actual results of legal ballots cast in the November in compliance with the Georgia election code cannot be known ever, Not by the secretary of state, not by the governor downstairs, not by the voting public, and not by this Georgia legislature.
Saved - January 18, 2026 at 9:44 AM
reSee.it AI Summary
I watched the 2020 election testimony from the State Farm Center in Georgia: election workers closed and sent everyone home, including required poll watchers, while ballots were run all night. Afterward, a few Democrats stayed and pulled suitcases of alleged fraudulent ballots from under draped tables they had hidden earlier. With no oversight, they scanned these ballots repeatedly through the night, violating laws requiring officials’ presence, and committing alleged election fraud.

@TheSCIF - The SCIF

The FULL 2020 Election video testimony from the State Farm Center in Georgia, when election workers announced a closure and sent everyone home, including required poll watchers, and ran alleged fraudulent ballots all throughout the night. Once cleared out, a few Democrats remained and pulled suitcases of alleged fraudulent ballots from under draped tables that they hid there themselves earlier that day. With absolutely no oversight, they scanned these ballots repeatedly through the night, violating tons of laws requiring officials' presence, committing massive election fraud.

Video Transcript AI Summary
Jackie Pick, speaking as a volunteer and attorney not acting as counsel in this case, presented what she said is evidence from State Farm Arena in Fulton County concerning fraud or misrepresentation. She described the scene as a single large room where absentee and military ballots are tabulated on election day, with videotape from morning through close of polls. She stated that two Republican field organizers were sent as observers but were not allowed to observe meaningfully. They were “roped off with the press” in a roped-off area. She explained the timeline: the observers were to arrive around 08:00 to watch the tabulation of absentee and military ballots; about 10:00, a person working the polls allegedly told everyone in the room to leave because they were going to stop counting and would return at 08:30 in the morning. At approximately 10:00, workers remained, and the press and Republican observers left, but four people stayed behind and continued counting and tabulating well into the night, until about 10:25–10:30. The observers allegedly learned from a news crew that counting had continued after they had been told to leave. The observers returned to State Farm Arena around 01:00 in the morning and confirmed that people had left in contravention of the supervisors’ instructions. The video frames show the room becoming a ghost town between 10:25 and 10:37 as those who stayed behind were described as continuing work after the observers and press had left. The four people who remained behind were described as the lady in purple, two women in yellow (near the scanners), and the woman with blonde braids who had earlier instructed everyone to leave and stop counting. Pick asserted these four stayed behind to operate scanners once the area was clear of witnesses. She directed attention to the act of pulling ballots out from underneath a table, with the same blonde-braided woman having placed a table at 08:22 a.m. The video allegedly shows four suitcases of ballots being moved from under the table, prompting questions about the origin and chain of custody of those ballots, and why counting occurred only when the room was unsupervised. Her team calculated the possible volume: with three scanners processing about 3,000 ballots per hour over two hours, roughly 18,000 ballots could have been scanned during that unsupervised period. They noted six people involved in moving ballots in and out (the four workers plus two others), suggesting a prolonged period of unsupervised tabulation until about 12:55 a.m., after which the witnesses left again. The witnesses say counting resumed around five minutes before their return around 01:40–01:45. During the hearing, respondents questioned whether a water leak or water main break occurred and whether it affected operations; officials described conflicting accounts, with some asserting the leak did not disrupt work and others noting a toilet leak in some testimony. There were claims that a monitor was on-site throughout the process, which Fulton County officials reportedly disputed, stating the video had not been viewed by all parties. Additional questions from senators covered: who operates the cameras (the State Farm Arena) and whether the footage is secured and accessible; whether the scanners maintain real-time logs; and whether the video presents new information not previously reviewed by election authorities. The presenter emphasized the need for further hours of review to fully assess the frames and warrants.
Full Transcript
Speaker 0: So I'm Jackie Pick, and I'm here as a volunteer. I am a lawyer, but I'm not acting as a lawyer in this case. I'm just helping out the legal team here. And going to explain to you the evidence that we have from State Farm Arena here in Fulton County, which goes to what Ray was talking about in terms of fraud or misrepresentation. So when that queues, you're looking at one big room here. This is where, according to our witnesses who's given us sworn affidavits, this is where the absentee ballots and military ballots are being tabulated on election day. So we have the tape from first thing in the morning all the way past the close of the polls. What you have is essentially two Republican field organizers who were sent here to be observers. Observers. At no time were they actually permitted to observe in a meaningful way. I'm sorry. I have a voice issue today. They are roped off with the press. On the side Speaker 1: Tell you what what you could do to help us out so that everyone can hear who's live streaming. If you would tell us what you're going to point to, and then we'll point to it. Okay? Alright? Speaker 0: So now what will happen is these frames can move around. So this can get a little confusing, but I'll make sure to make it clear. We have two observers there that are going to show up, not at this point, this is in the morning, as you can see the daylight. They're going to get there at about 08:00 to watch the tabulation of absentee and military ballots. But according to their affidavits, at about 10:00, there was one person working the polls who told everyone in the room to leave on the basis they were going to stop counting and return at 08:30 in the morning. So if I can get the frame, for approximately ten or 10:20 ish. Speaker 2: 10PM. Speaker 0: Okay. Yes. We'll have to come back to the morning for a different reason in just a second. Okay, so you can see what time it is. Speaker 3: So Speaker 0: we're at about 10:00. And what you'll notice is that the workers are present, working, and you have back in that corner I pointed out to you, the press and the Republican observers. So according to the witnesses, the Republican observers, there is a lady who has blonde braids who comes out to announce we're going to stop counting. Everyone go home. And in fact, we see that. What happens is everyone clears out, the Republican observers in the press, but four people stay behind and continue counting and tabulating well into the night from that point, which is going to be about 10:25 when they all clear out or 10:30. And they will continue counting unobserved, unsupervised, not in public view as your statute requires until about one in the morning. The reason we know this is because when our Republican observers were forced to leave, they went to the Central Tabulation Center and they got news from a or word from a news crew that in fact counting had continued. They have information that not everybody left according to plan, and some people stay behind. So this shocked them. So they returned back to State Farm Arena at about 01:00 in the morning where they confirmed that in fact people had just left State Farm Arena in contravention of what they've been told by the supervisors who are running this operation. So okay. We're still at about 10:00. Can you take us to about 10:25 so we can see the change? You're going to watch this place be busy and filled up to emptied at some time between 10:25 and 10:35, which is consistent with what the affidavits say. Okay, so 10:25 they're still there. Let's go to 10:35. It takes just a few minutes for the frames to actually catch up with the there you go, with the time that you're seeing. So here you see it's all cleared out. We just went from 10:25 to 10:37. The place is a ghost town. This is where the people were vacated and told, go home, come back at 08:30. We will now stop working and stop counting. But notice who stays behind. You have four people consistent with our affidavits who stayed behind. And so you'll see the lady in purple. You'll see two women in yellow in the back, which is where the scanners are there at the top, top right frame. And then the lady with the blonde braids also who told everyone to leave. Those are the four people who will stay behind. Here. Those two. Okay. Observer's still there. So the Republican observers said they were the last people to leave State Farm Arena along with the Fox News crew accepting those four people. So what you're going to see, look at the ladies in yellow. You'll see that they will begin just sitting still, doing nothing, ostensibly not working because after all, they said they're gonna stop counting. They will wait until the witnesses over there in that roped off area, the press and the observers leave the room. Then you'll see them move into action and begin scanning ballots. Okay. So I think what we can do now is fast forward to about eleven. Do you see them? Yeah. Okay. There they walk. They're walking off. But the ladies in yellow are still there. Yes. Keep your eyes on the lady in purple, and the two in yellow, and the woman in the blue apron with blonde braids because those are the people who stay behind. Okay, so what you're going to see happen at about 11:00 is once everyone is gone, coast is clear, they are going to pull ballots out from underneath a table. Watch this table. So actually, this will take a few minutes, but we did not know when we first watched this. Okay. Is it normal to store suitcases of ballots under a table under a table cloth? Is that how they run the place? Maybe this is what they've been doing all day. Maybe this is what they're doing under all the tables. So we went back and watched the video as a a team of us. We don't see that. What we see is typically you're going to find ballots, you know, back in this corner or coming in through a door and then they get moved and circulated throughout the room. And it can get a little confusing because they have these black containers of ballots. They have the US Postal Service containers. But what we're trying to do when we determined that there were being ballots being pulled out from underneath this table is, you know, what was the chain of custody? Where did they come from? Who put them there? When did they put them there? We only reviewed this at about one in the morning last night for a couple of hours, so we're gonna need about fourteen hours to watch it carefully because we fast forwarded through it several times, and could not find that particular frame, but here's what we can tell you for sure. At about 08:00 in the morning and we're going to roll this back and show it to you. There you go. So, now they're going start pulling these ballots out from under this table. This table, the black one, was placed there by the lady with the blonde braids at about 08:22AM in the morning. So she put that table there. So the same person who's staying behind now, the same person who cleared the place out under the pretense that we're going to stop counting is the person who put the table there at 08:22 in the morning. Yeah. I saw four suitcases come out from underneath the table. Yeah. Upper right hand. You see the gentleman in in the red? So he just pulled one out. So, what are these ballots doing there separate from all the other ballots? And why are they only counting them whenever the place is cleared out with no witnesses? Is the question. So, these machines can process about 3,000 ballots an hour. You have multiple machines there, and they're there for two hours. So, you do the math. How many ballots went through those machines in those two hours when there was no one there to supervise, to be present, consistent with your statutes and rules, to supervise the tabulation? We believe that could easily be and probably is certainly beyond the margin of victory in this race. Because if it's only three scanners working for two hours, right, that's 18,000 ballots that went through. So we're now at eleven zero nine. There were, in addition to the four workers that you see there, there were two other people who were bringing ballots in and out. The gentleman in red that you saw, and then a second person, I can't tell if it's a male or female based on their hair being pulled back in their mask, but in any event, that's six total people. And so, if we were to sit here for the next two hours, what we would see is that this operation just goes on and on and on. They're scanning until about 12:55 in the morning. So we kept the video running. And, you know, we can show you the people who gave us the affidavits reappearing at that time, just as they said, around 1AM to find out, are they in fact counting after they told us they would stop working or not? And we will fast forward to that. But have you all seen as much as you'd like to see of what's happening here? Speaker 1: I think so. Speaker 0: I think you basically get the idea. Speaker 1: Unless any member wants to see more. Speaker 0: Or you have any questions? Speaker 1: No. No. Let's go ahead. Speaker 0: Okay. So let's fast forward to about 12:55 in the morning. Okay. So it's updated to 12:50. You can see these people are still there up in the upper right hand corner. Basically, they've wrapped up. This is the end of their operation. They've now completed about two hours of unsupervised tabulation of ballots. So now you're gonna watch them leave, and let's fast forward to let's go to 01:30. I think it's been between 01:30 and 01:45 is when our two witnesses come back. They had to fight through security to get in there, but they did. And they say in their affidavits that two different people affirm for them that people have been counting from, you know, 10:30 when they cleared out until about approximately five minutes before they arrived. And they have the names of those people who told them that. Okay. Now we're looking at what is that? 01:42 in the morning. Is there a way to fast forward a bit or make it go a little faster? Okay. There are guys right there in the lower left hand corner. So they've now returned to State Farm Arena having heard from the press that they had continued counting because they wanted to see for themselves that that was really happening, which was a complete contradiction to what they had been told by at least one person from Fulton County who's an employee and spokesperson, and also the lady in the blonde braids we spoke about earlier. And so they see for themselves. And from this, get the affidavit. I don't know the name of the lady in the blonde braids. They simply gave a description to us, and you can you can make out clearly who she is based on the people in the in the film. Lady in the blonde braids halfway down her back is the person who yelled out, everyone leave and stop counting. I believe miss Waller is the spokesperson for Fulton County elections who was who remain behind. The other two people they don't have names for. They just said they were older women, and one of them had the name Ruby across their her shirt somewhere. And that's as much as they know about who those people were. But so our guys go in. They look around. They ask a few questions, and they leave. It is from their affidavits that we even knew to ask about this. And you might recall that the press reported there was, like, a supposed water break or water main break or pipe break or whatever, and that this was an excuse for people clearing out of State Farm Arena. It's not clear from the affidavits I saw whether or not that was the reason given by the election official or whether they gave any reason at all. They just said, Stop. We're leaving. We'll be back at 08:30. So I don't know if that was at play here or not. Okay, can we back up to 08:22 a. M. In the morning, same frames, because we wanted to know when did that table get put there? Who put it there? When did the ballots get put there? Who put it there? Okay. So 08:21. You'll notice the table's not there at all. Here it comes. There's the table going in that we're talking about where the ballots were obscured. That lady who's moving it is the lady with the blonde braids. She's dressed differently in the morning, so it took us a while to figure out that's the same person that you see at night with the blue apron on who's yelling for everyone to leave and who stays behind to help tabulate ballots after they've all left. So I can see that she's the one who chose to place that table there, close to the scanners. And so the video is still under review. We need to spend hours reviewing carefully how those ballots got there. But we can tell you that it appears to be an aberration from how the other ballots were handled in that room throughout that day. So that's the gist of it. Do you have any questions? Speaker 1: Any questions? Senator D. Speaker 4: Fulton County chairman Rob Pitts testified in a committee earlier today that the water break occurred at 06:07AM and was repaired by 12:07AM. And that the water main break did not disrupt the work of the whole room that his example was that if we were counting ballots working in here and the water main break was in the back or the the leak, that we would just simply move out of the way of the the the leak. But he, testified this morning that the leak occurred 06:07 and was repaired by 08:07AM. From what I'm seeing here, I don't see anybody moving around to avoid a leak. No. He did state that the leak was greatly exaggerated and that it was not, like, wiped out the whole place. But I just thought that might be Speaker 0: What's that? Speaker 4: I mean, the water leak, according to the commission chairman, was at 06:07AM. Speaker 0: I'm told that we have a videos that it was a toilet leak and not a water main break. But I know that mister Pitts' name was mentioned, one of our affidavits, and our witness says that he was physically present in this room clear up until everyone was made to leave. So presumably, if he was in the room at the time, they made the announcement he would be a witness to that. He was one of the last to leave, but he did leave in front of our witnesses before our witnesses. Speaker 5: Yes. Senator Parent. Thank you. Thank you for being with us. We heard from the secretary of state's office earlier, just a couple hours ago, that they've investigated this repeatedly, that they had a monitor on-site the entire time. And frankly, this has been debunked for weeks by our secretary of state's office. Speaker 0: I doubt you've seen the video. Speaker 5: Then I think the courts will probably be able to handle this once you present your evidence to them. As I'm aware, there have been about 40 lawsuits dismissed already. And according to the law of the state of Georgia, we do not have the power to submit alternate electors. The provision in the law is quite clear at at twenty one two five zero one f. Speaker 0: Is there a question? Speaker 1: Senator may may sorry. Questions. We'll have a time for statements at the conclusion if we Speaker 6: Yeah. Speaker 5: My question is what the question is, since this has been debunked repeatedly, what evidence can you give to us counters what our elections officials have presented us with only an hour ago? You just saw it. Your officials need to watch the video. What about the fact that they say that they had a monitor there the entire time? Speaker 0: I can't speak for them. Well? Stop that. They did not Speaker 5: Thank you. Speaker 7: They did not have a video. Speaker 5: They said they had a monitor the whole time. Speaker 8: Okay. Okay. Speaker 0: You're looking at the room. Speaker 6: There's no there's no secretary of state. Speaker 5: Then maybe we should invite them back in. Speaker 1: Good call. Alright. Well, we may need to do that. Senator Tillery? You what number are you? Speaker 3: Number one. Number one. Thank you, mister chairman. Thank you, miss Tig. I I just have two questions just to try to follow through and understand this a little better. Thank you for presenting this. Speaker 8: Let me push on Yeah. Get a Speaker 9: little closer too. Speaker 3: Okay. Is that better? Just thank you again for being here. Thank you for presenting this. I just have two questions to kinda understand it a little better. My first is I didn't have this before, but when senator Perrin asked, made me ask, have you been able to figure out where our monitor would have been or the monitor? Can you point that Speaker 0: out to us? Yeah. Speaker 5: Right here. Speaker 6: Okay. So Speaker 3: And it's easier to see in from where I'm sitting slide in the top left. Can you see can you help me understand where if that's where sorry. Top right is where the scanners are. Where would the monitor be in that screen? I'm just trying able to understand it. Speaker 0: Yes. It's very confusing because these frames don't portray that accurately. What the witnesses said is that when they were in that roped off area I just pointed to with the press, not only could they not see a single ballot because they were so far away, they couldn't see those scanners at all. The only reason that they knew the scanners were there is because the election official, miss Waller, told them so. So I don't know if that means, and this is an enormous room, that there was like a curvature to the room, but that is not a straight shot from where you see where they would have stood to the scanners because they could not see those scanners. Now other people could depending on where you were in the room. Speaker 3: Mister chairman, may I ask a follow-up? Speaker 8: Yes. Speaker 3: The first thing is if when you do find out that information, if you don't mind getting it back to us, know you will, and thank you for that. Mhmm. The second thing is just a more like a chain of custody process. You we saw Speaker 1: Excuse me, senator. Is I'm getting reports that it's difficult to hear so you may need to get closer to the microphone. So promise you, I'm not doing it Speaker 7: for these guys. Speaker 3: I'm doing it for these guys. So I as long as they Speaker 10: can hear me, I'm good. Speaker 1: But a lot of people across the state wanna hear what's being said. On Speaker 3: the on the second question I have, and and thank you for your answer to that one. Thank you for getting us that. We'll look forward to answer back from you. Just a chain of custody question now. If we we could clearly see the ballots in the top right screen come out from underneath the table, I could not see that there was a cover on the front of the table until your 08:22 video. Mhmm. So that was very helpful. Can is there anything can you show us where other ballots were coming from? Have y'all been able to figure that out yet? Because I think if they were coming from a different place, obviously, that raises even more of a specter of concern or question. Right. So Speaker 0: if you see again, this is hard to understand where where this will be coming from, but so there, you have the black we call it a suitcase containers for ballots. You also have boxes. Those are being moved around the room throughout the day. So it appears to us they're coming from there. Speaker 3: From that back from the top corner of the bottom left screen. Is Speaker 0: that Correct. Yeah. Speaker 6: K. Speaker 0: And from there, they're shuffled around a lot. It gets confusing to watch this because, again, you're not looking at a linear representation of the room. Speaker 4: Right. Speaker 0: Where they're not coming from, as far as we can tell, is from under that table or any table. Speaker 3: Right. And it does not look like the top corner of that bottom left screen is concurrent or consecutive or so anyway tied into the bottom corner of the top right screen. It does not look like those are congruent. We're not seeing them come out of that corner by coming underneath that table. Correct? Speaker 0: I don't think we can tell that from the film. Speaker 3: And I'm sure y'all will will get more information on that as well. Thank you for helping me just understand that a little bit better. I appreciate it. Speaker 1: Okay. K. Was there another question? Speaker 10: And just for the Speaker 6: record, we did not receive this video until late last night, and we were reviewing it. Night last night. So we're we're still we're still reviewing it. There's still a lot more to review. Speaker 10: Senator senator Jones? Thank thank you, mister chairman, and thank you for presenting this. And then that was gonna be my question, mister Smith, was, when exactly did we receive this video or you guys get in possession of this video. And then also, so you've had no time to when questioning the four people who are having a lot of movement and activity during the time frame that everyone goes home, y'all have not had time to find out who those individuals are and actually question them on anything, correct? Speaker 3: That's correct. Speaker 1: Okay, thank you. Speaker 11: Senator Rett. Thank you, Mr. Chairman and welcome. Speaker 0: Thank you. Speaker 11: Appreciate it. Just quick refresher. When you talk with the authorities involved pertaining to the situation, what was the explanation or have you had a chance to speak with them? Speaker 0: Do you mean Fulton County officials? Speaker 11: Yes, Speaker 0: ma'am. I've not spoken with them because we just got the video. Speaker 1: Thank you. Speaker 6: Mhmm. Speaker 1: K. Senator Kennedy. Speaker 2: Thank you, mister chairman. Miss Pick, thank you for being here, mister Smith. Thank you as well for this very important presentation. My question is simply, if this was addressed earlier, forgive me, but who's in charge of the cameras? Who were they placed there under the Secretary of State's office or by Fulton County? And who's in charge of monitoring them and who's in charge of securing whatever footage is there and the data? Speaker 6: They're they're operated by the State Farm Arena. The State Farm Arena. Speaker 2: So these were not placed there for the purposes of that facility being used to count balance? Speaker 6: That's correct. Speaker 2: This is just regular old Speaker 6: security cameras that just happen to be there. For, you know, if if if you're in the arena and you have a slip and fall or there's a fight or something happens in the arena, there's these videos are, as I understand, are subpoenaed all the time. Speaker 2: Okay. Thank you. Yes. Speaker 1: Senator Beach, just let me get your microphone on. Speaker 8: Oh, yes. Is it on? Yes. Hello? Yes. Yes. I think you said there were three scanners. Correct? Is there a way to know if those scanners were used between 10:30 and 1AM? Do they track are they tracked by time when things are scanned through them ballots are scanned through them? Do you know? Speaker 6: I'm not sure. Okay. Speaker 0: There have been conflicting reports about whether or not those machines keep a log for in real time. They they certainly should. I mean, historically, that's the standard required. But whether or not they will hand those over or kept them, I don't know. Speaker 1: K. Are there any other questions? Okay. Senator Parent, one more question. Speaker 5: Did you mention that chairman Pitts was was there, or you you spoke to him about being there during this episode? Speaker 0: I was not there. This is a witness affidavit that says he was there. Okay. Almost up until he was one of the last people to leave. Not as late as the witnesses that we have, but he was there. Speaker 5: So he just told us he wasn't there just an hour ago. Speaker 0: Okay. Well, I don't know. One of the witness affidavits says he's there. Speaker 5: Well, okay. So we heard from Senator Brass? Speaker 0: Can I can Speaker 6: I ask you one more? Speaker 1: No, ma'am. We need to move on. We have a lot of questions. What number are you, senator Brass? 7. 7. Speaker 12: So in thank you, mister chairman. You, miss Pick. So the table was placed there around 08:30 ish, we said, AM? Speaker 0: 08:22 in the morning, approximately. Speaker 12: At what point or and y'all may not know this since you just got the video. At what point did the box of ballots go under the table? We don't have Speaker 0: the answer to that. So we fast forwarded through the tape several times to try to find that because we haven't had time to review it in real time, which would be fourteen hours of tape to review. Speaker 7: Right. Speaker 0: So we just haven't had time to look at that. Speaker 12: Understood. Do we know about how many ballots would go in each one of those suitcates? Speaker 0: So we have a witness who says that inside the suitcases, she estimates that about 6,000 ballots can fit in there. Speaker 12: And there were how many that were taken out? We don't know. Okay. Thank you. Speaker 1: Senator Gooch? Speaker 7: Maybe a question for senator Parent. I heard you say several times this has been debunked, but I also just heard that this video just appeared last night. So how could it have been debunked? Speaker 5: Well, my response, not being an expert, is that these very allegations came up right away after the election almost a month ago and have been repeatedly discussed by the secretary of state's office, including everything that we're seeing here. Speaker 1: But is Speaker 5: this not explanations for all of Speaker 10: it. Speaker 7: Is this not the first time this video has been shown? I Speaker 1: believe that this is the first time this video has been seen. And it is. Speaker 7: That's correct. Media hasn't seen this video or have not? Speaker 6: They they have not. Speaker 3: They have not. Because I've Speaker 6: been in I've been in contact with counsel for this SafeArm arena. Speaker 3: And hope that Speaker 7: it will be today. Speaker 1: Okay. Senator Anderson, you're on number seven. Correct? Speaker 9: Yes. Thank you. Thank you for being here today. My question is, if they said that they were gonna shut down and no more counting, Does the election system shut down to where it can't count no more, or can it keep on counting? Speaker 0: Well, so I referenced the statute which shows that the Georgia elections must be conducted in public view. That means the press can watch. That means the other party can watch. Both parties are represented to be observers or monitors, whatever. Here, they were made to leave. So it was done in contravention of the statute. Speaker 9: But my question is, is the equipment do you the the counting system, does it supposed to shut down when nobody's supposed to be counting? Speaker 0: I'll I'll defer to Ray on that. Speaker 6: I I I not know the answer to that question. Speaker 0: It has to be secured if they're going to leave the premises for sure. Speaker 9: That's that's getting leading to what I'm is it actually securing the count even though they say that we're not gonna count? Speaker 6: There's not supposed to be activity with election workers if there's not public view. That's the law in Georgia. Speaker 0: And the and the ballots have to be secured at all times. Speaker 1: K. Thank you. Okay. I think we may need to do you have anything else that you'd want to point out about the video? Speaker 0: I think that's everything. Right? Speaker 6: Okay. That's everything for Speaker 0: now. Speaker 2: Yes. Okay. Speaker 6: Alright. Speaker 0: Thank
Saved - January 14, 2026 at 1:41 PM
reSee.it AI Summary
I recount ASOG’s forensic findings in Antrim County: an anonymous user accessed the election management system remotely on Nov. 5 with escalated privileges and altered the database during retabulation. The ballot’s side boxes (15, 18, 28, 41, 44) were intentionally modified to trigger adjudication when Republicans were voted, causing errors. Over 15,000 errors were logged, with adjudication rates as high as 68.05% countywide and 81.96% in Central Lake Township.

@TheSCIF - The SCIF

A forensic dive into DOMINION Voting Systems by Allied Security Operations Group (ASOG), proved that Antrim County, Michigan's election management system was accessed remotely by an anonymous user on Nov. 5th with "escalated privileges" and made changes to the database when they were trying to retabulate the election. This alone PROVES the machines were remotely accessible, and by an "unknown" 3rd party. The second massive finding was that the "black solid boxes" on the side of the ballot were altered to trick machines and trigger and automatic error, "adjudication," if Republican candidates were selected on the ballot. There are 59 total "black solid boxes" on the side of a ballot for the machine to register specific information. Within the forensic images in Antrim County, blocks 15, 18, 28, 41, and 44 were ALL intentionally modified. The height, the width, and the overall shape were intentionally modified to generate errors if a republican was voted for on the ballots in order to cause an "error" and be sent to adjudication. And that ladies and gentleman, is where you can change all the rejected ballots, at one time, at the click of a button. In adjudication. ASOG reported that these were built-in features of a flawed system. With over 15,000 logged errors in a single forensic exam. The glitch is the steal, with error rates skyrocketing to 68.05%, far exceeding the federal allowable limit of 0.0008%. In Central Lake Township alone, 81.96% of ballots were reversed and sent for adjudication— a staggering rejection rate unheard of in prior elections. This is the blueprint for election fraud in the U.S. and around the world in over 100+ countries.

Video Transcript AI Summary
The speakers assert that there is evidence of direct access to the Antrim County election management system (EMS). In the forensic images, they note that on November 5 an anonymous user logged onto the EMS remotely and performed actions with escalated privileges, making changes to the database during attempts to retabulate the election. They describe this as a major development, because it demonstrates that the machines were accessed remotely, and crucially, that the remote access was by an anonymous user who possessed elevated privileges within the system. They present this as a significant point for those who oppose forensic auditing or who are against non-forensic reviews. They also reference visible features on ballots, specifically the black boxes along the side of the ballot. The ballots reportedly contain 59 of these black boxes. In the forensic images, they indicate that certain blocks—numbers 15, 18, 28, 41, and 44—were intentionally modified. The described modifications concerned the height, width, and overall shape of these blocks, with the stated purpose of generating errors. Regarding the consequences of these modifications, the narrative claims that by altering these specific blocks, errors were created that led to rejections of Republican ballots. In other words, ballots cast for Donald Trump that were processed through the machine allegedly faced a higher likelihood of being rejected due to these block modifications. The asserted outcome is that such ballots were rejected at a rate of 20% more than ballots cast for Joe Biden.
Full Transcript
Speaker 0: We've proved now that there was direct access to the Antrim County election management system because we show on November 5, we can see it in the forensic images, that an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the the database when they were trying to retabulate the election. So that's one huge, huge development, because now we prove that the, machines were remotely accessed. And more importantly, they were remotely accessed by an anonymous user who had elevated privileges in the system. That is pretty damning for the the the non forensic reviewers out there or people who do not want a forensic audit. And the other thing probably is equally explosive. Everyone's seen ballots before like these ballots here. On the side of the ballot, there's these black boxes. There's 59 black boxes on the side of the ballot. We now see within the forensic images that in Antrim County, those blocks blocks fifteen, eighteen, 28, 41, and 44 were all intentionally modified. The height and the width, the shape of those blocks were intentionally modified in order to generate errors. What does an error do? In this case, by modding modifying those specific blocks, they were able to cause rejections for Republican ballots. Meaning, if you voted for Donald Trump and then put your ballot in the machine, your ballot was rejected at a at a rate of 20% more than, Joe Biden ballots.
Saved - January 14, 2026 at 1:37 PM
reSee.it AI Summary
I review ASOG’s forensic dive into DOMINION in Antrim County, MI. They claim remote access on Nov 5 with escalated privileges altered the database during retabulation. They say the black side-boxes on ballots were deliberately modified (blocks 15, 18, 28, 41, 44) to trigger adjudication when Republicans were selected. They report 15,000+ errors, 68.05% error rate vs 0.0008% federal limit, and Central Lake Township at 81.96% adjudicated ballots, described as a fraud blueprint.

@TheSCIF - The SCIF

A forensic dive into DOMINION Voting Systems by Allied Security Operations Group (ASOG), proved that Antrim County, Michigan's election management system was accessed remotely by an anonymous user on Nov. 5th with "escalated privileges" and made changes to the database when they were trying to retabulate the election. This alone PROVES the machines were remotely accessible, and by an "unknown" 3rd party. The second massive finding was that the "black solid boxes" on the side of the ballot were altered to trick machines and trigger and automatic error, "adjudication," if Republican candidates were selected on the ballot. There are 59 total "black solid boxes" on the side of a ballot for the machine to register specific information. Within the forensic images in Antrim County, blocks 15, 18, 28, 41, and 44 were ALL intentionally modified. The height, the width, and the overall shape were intentionally modified to generate errors if a republican was voted for on the ballots in order to cause an "error" and be sent to adjudication. And that ladies and gentleman, is where you can change all the rejected ballots, at one time, at the click of a button. In adjudication. ASOG reported that these were built-in features of a flawed system. With over 15,000 logged errors in a single forensic exam. The glitch is the steal, with error rates skyrocketing to 68.05%, far exceeding the federal allowable limit of 0.0008%. In Central Lake Township alone, 81.96% of ballots were reversed and sent for adjudication— a staggering rejection rate unheard of in prior elections. This is the blueprint for election fraud in the U.S. and around the world in over 100+ countries.

Video Transcript AI Summary
The speaker asserts that there was direct access to the Antrim County election management system (EMS). According to the forensic images, on November 5 an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This is presented as a major development indicating remote access to the machines, and specifically remote access by an anonymous user with elevated privileges. Additionally, the speaker describes intentional modifications to ballot components. Ballots have black boxes along the side, with boxes 59 in total. The forensic images allegedly show that blocks 15, 18, 28, 41, and 44 were intentionally modified, altering their height and width to generate errors. The claimed consequence of these modifications is that errors were produced which led to ballot rejections. Specifically, ballots in which a voter chose Donald Trump and then fed the ballot into the machine were rejected at a rate 20% higher than ballots for Joe Biden.
Full Transcript
Speaker 0: We've proved now that there was direct access to the Antrim County election management system because we show on November 5, we can see it in the forensic images, that an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the the database when they were trying to retabulate the election. So that's one huge, huge development, because now we prove that the, machines were remotely accessed. And more importantly, they were remotely accessed by an anonymous user who had elevated privileges in the system. That is pretty damning for the the the non forensic reviewers out there or people who do not want a forensic audit. And the other thing probably is equally explosive. Everyone's seen ballots before like these ballots here. On the side of the ballot, there's these black boxes. There's 59 black boxes on the side of the ballot. We now see within the forensic images that in Antrim County, those blocks blocks fifteen, eighteen, 28, 41, and 44 were all intentionally modified. The height and the width, the shape of those blocks were intentionally modified in order to generate errors. What does an error do? In this case, by modding modifying those specific blocks, they were able to cause rejections for Republican ballots. Meaning, if you voted for Donald Trump and then put your ballot in the machine, your ballot was rejected at a at a rate of 20% more than, Joe Biden ballots.
Saved - January 11, 2026 at 4:31 PM
reSee.it AI Summary
Discussion notes that major programs have weaponized tech capable of reading, writing, manipulating, and projecting effects via AI, electromagnetics, and frequency weapons. The example cited is a recent Maduro raid. It’s argued these capabilities have existed for 50+ years and are now far more advanced. A commenter says such tech could be used on enemies instead of torture, while others urge that this reality must be acknowledged.

@TheSCIF - The SCIF

DARPA, Palantir, Boeing, foreign countries, and even Google have programs and technology that can read & write, manipulate, induce, project, and effect things and people in ways you never thought possible. All this is already here and already weaponized. The tech reported in the U.S. military raid on Maduro is just a taste. These DEWs have many layers and include, A.I., electromagnetics, and other frequency weapons.

@45Lori1 - TPLori2 🇺🇸

@TheSCIF This is beyond the pale for consumption on the Public. Using it on our captured enemies would be useful in lieu of torture.

@TheSCIF - The SCIF

These needs to come already. People need to start taking this more seriously because it's already here and has been here for over 50+ years. It is just extremely more advanced then back then with the adaptation and incorporating A.I. and newer tech into it, which what makes it extremely effective.

Saved - January 11, 2026 at 11:20 AM
reSee.it AI Summary
I’m a former Maduro security guard recounting a U.S. raid on Venezuela. Twenty elite operators used drones, electronic warfare, and overwhelming firepower; Venezuelan defenses were disabled and hundreds neutralized with no American casualties. Direct Energy Weapons caused rapid incapacitation, with bleeding from ears, nose, and mouth—likely LRAD/ADS-era tech. This is a glimpse of American supremacy. You think you can fight Americans? You’re about to find out. Don’t FAFO with the USA.

@TheSCIF - The SCIF

Former Nicolás Maduro security guard delivers a firsthand account of the advance technology used in the U.S. raid in Venezuela. State-of-the-art drones, massive firepower, but the Direct Energy Weapons were the most terrifying. 20 elite American soldiers, armed with cutting-edge technology, dismantled defenses and neutralized hundreds without a single casualty on their side. This isn't just a story of victory—it's a masterclass in modern warfare supremacy. The Americans arrived undetected, Advanced electronic warfare systems completely disabled Venezuelan radars and other equipment. Drones struck with lightning speed, obliterating bases and outpacing any counter-response. The guard notes Venezuela had "no technology to fight against drones," highlighting the asymmetric edge of U.S. unmanned aerial systems. Most interesting, was the mention of Direct Energy Weapons, causing immediate incapacitation, with victims bleeding from ears, nose, and mouth. This matches the Long Range Acoustic Device (LRAD) or emerging directed-energy systems like the Active Denial System (ADS). and other electromagnetic and acoustic weaponry. If you follow me, this is nothing new and a taste of what we really have and are capable of. The result? 20 operators vs. hundreds, equaling total domination. "You think you can fight Americans? You don't even know what their weaponry is like." With President Trump eyeing Mexico's cartels next—"You're on the list too" Don't FAFO with the USA!

Video Transcript AI Summary
A security guard who protected Maduro has spoken, and the report is being translated from Spanish. The speaker describes the impact of American military capabilities observed in Venezuela, noting that the Americans had technology superior to anything they've seen before. According to the guard, everything used for radar and related systems was taken offline. He claims the Americans had drones that were "taking out bases and taking out things faster," and that their opponents had no technology to compete with drones. The guard states that only eight helicopters and twenty men were sent in, yet those twenty killed hundreds of the enemy and left none of their own soldiers injured. He says it felt like the enemy was firing 300 rounds a minute, describing it as unmatched by anything they've seen. He also mentions a sonic shock boom used by the Americans, which caused everyone to bleed profusely from the nose. People reportedly could not gather themselves after the attack, and they vomited blood from their mouths and noses, becoming incapacitated immediately. The guard emphasizes that he never wants to fear or fight the Americans again. He is sending warnings to others, asserting that if you think you can fight the Americans, you do not understand their weaponry or capabilities. He asserts that twenty men defeated hundreds, and suggests this claim is spreading across Latin America. The broader political context referenced includes Trump’s statements that Mexico would be on a list of targets, which the speaker frames as changing the overall climate in Latin America. The narrative connects firsthand accounts from people who were there to the perception that the region’s geopolitical dynamics have shifted due to the Venezuela incident, including the implication that the United States possesses overwhelming military technology and capabilities.
Full Transcript
Speaker 0: A security guard that was protecting Maduro has spoken, and you gotta hear what he said. It's in Spanish, but I'll translate. Also, Trump announced that, you know, the cartels, they're going after him in Mexico. The whole vibe of Latin America has changed because of what happened in Venezuela. And, now that we're getting firsthand accounts from people that were there, the soldier says they didn't hear him coming. They said he says the Americans had technology superior to anything they've ever seen. Everything that they were using for radar for anything was completely taken offline. They had drones, and the drones were taking out bases and taking out things faster. They didn't have no technology. They've never had to fight against drones. He also talks about that there was only eight helicopters. There was only 20 men that were sent in, and those 20 men killed hundreds of their men, and none of those soldiers were injured. He talks about it felt like they were firing 300 rounds a minute. Nothing they've ever seen, Nothing that they can compete with. And then he also talks to the fact that the Americans had some kind of, sonic shock boom that was sent out, and everybody immediately started bleeding profusely out of their nose. They couldn't even gather themselves because whatever was sent at them made them fall to their knees and vomit blood out of their mouth and out of their noses. They were incapacitated immediately. He says he never wants to fear never wants to go through that again. Doesn't wanna have to fight with the Americans again. He's sending warnings to everybody out there that you you think you can fight the Americans. You don't even know what their weaponry is like and what they're capable of. 20 men took out hundreds, and that's starting to spread all through Latin America. And now they're not saying, do you want me, come and get me anymore. They're like, oh, shit. Especially after Trump says, hey. Mexico, you're on the list too.
Saved - January 10, 2026 at 9:37 PM
reSee.it AI Summary
I summarize Project Maven, the Pentagon’s AI program (launched 2017) that automates analysis of drone, satellite, and surveillance data to speed the kill chain. Under NGA, Maven processes petabytes of imagery via the Maven Smart System across all services, with human oversight. Coupled with Directed Energy Weapons—HELs like HELIOS and HPMs like THOR—it enables light-speed, targeted strikes and swarming defense, feeding JADC2 and the energy roadmap.

@TheSCIF - The SCIF

PROJECT MAVEN and the U.S. Military's Cutting-Edge Arsenal of AI-Driven Warfare and Directed Energy Weapons. This is an important deep dive into one of the U.S. Department of War's most transformative initiatives, a game-changer that's reshaping modern warfare through artificial intelligence. Launched in 2017 under the Algorithmic Warfare Cross-Functional Team, Project Maven isn't just another tech buzzword; it's the Pentagon's flagship AI program designed to supercharge military intelligence by automating the analysis of vast troves of data from drones, satellites, and surveillance feeds. Highlighting how Maven uses machine learning and computer vision to detect, classify, and track targets in real-time, compressing the "kill chain" from hours to minutes. The weapon and defense systems powering this revolution, including the seamless integration of Directed Energy Weapons (DEWs). Project Maven serves as the brain, processing petabytes of imagery to identify threats like enemy vehicles, personnel, or infrastructure with pinpoint accuracy—far beyond what human analysts could achieve alone. Initially deployed against ISIS in 2017, it fused data from full-motion video (FMV) and other sensors to flag potential strikes, always with human oversight in the loop to ensure ethical decision-making. Today, under the National Geospatial-Intelligence Agency (NGA), Maven has expanded to all military branches—Army, Air Force, Space Force, Navy, and Marines—via platforms like the Maven Smart System (MSS). MSS isn't just about detection; it's a force multiplier, enabling rapid targeting in exercises like Scarlet Dragon, where it slashed manpower needs from thousands to mere dozens while handling complex scenarios in CENTCOM and beyond. Now, pair this AI prowess with the U.S. military's Directed Energy Weapons, and you get a lethal, futuristic synergy. DEWs harness concentrated electromagnetic energy—think high-energy lasers (HELs) and high-power microwaves (HPMs)—to neutralize threats without traditional munitions, offering infinite "ammo." These aren't hypothetical; they're operational and evolving rapidly. High-Energy Lasers (HELs), systems like the Navy's HELIOS (High-Energy Laser with Integrated Optical-Dazzler and Surveillance) aboard destroyers like the USS Preble deliver speed-of-light strikes to down drones, missiles, or small boats for pennies per shot. Integrated with Maven's AI targeting, HELIOS can acquire, track, and zap threats in swarms, as demonstrated in recent Pacific tests. The Army's DE M-SHORAD (Directed Energy Maneuver-Short Range Air Defense) prototype, mounted on Stryker vehicles, recently shredded drone swarms at Fort Sill, blending lasers with kinetic defenses for layered protection. High-Power Microwaves (HPMs), weapons like the Air Force's THOR (Tactical High-Power Operational Responder) unleash radiofrequency waves to fry electronics in drones or missiles from afar, covering wide areas with a single pulse. In urban or congested environments, HPMs provide non-lethal options, disrupting signals without collateral damage—perfect for Maven-identified targets in sensitive ops. Broader Defense Ecosystems, Maven feeds into systems like the Joint All-Domain Command and Control (JADC2), linking sensors across domains for seamless ops. DEWs complement this by offering scalable effects—from dazzling sensors (e.g., Vigilant Eagle for airport defense) to outright destruction. The Pentagon's Directed Energy Roadmap, with $1 billion annual investments, pushes for higher power outputs to tackle hypersonic threats, while initiatives like the High Energy Laser Scaling Initiative bolster industrial production. What makes this combo so revolutionary? Speed, precision, and cost-efficiency. Maven's AI spots the threat; DEWs eliminate it at light speed, with deep "magazines" that outlast ammo stockpiles. Project Maven is the spark igniting this fire, keeping the U.S. ahead in an era where data and energy are the ultimate weapons.

Video Transcript AI Summary
Speaker 0 presents a critical, conspiratorial view of Project Maven, describing it as a 100% military operation at the epicenter of American artificial intelligence efforts. The speaker claims Maven uses machine learning to identify personnel and equipment, streamlining activities that were once done by human analysts, with hopes to replace humans with machine-to-machine AI learning in what is described as a HAL 9,000-like system. The Maven Smart System is said to fuse data sources including satellite imagery, geolocation data, and communications intercepts into a unified battlefield analysis interface. The speaker draws comparisons to consumer fitness and tracking devices, asking rhetorically if Maven sounds like Strava tracking bike rides, Garmin devices used during cycling, a Fitbit during runs, or a heart-rate monitor for tracking. They extend the analogy to hacking into emails, texts, and digital photographs, and even to keystroke surveillance associated with historical software like Looking Glass Keyhole, which is described as backdoor access to computer activity. A critical claim is that Maven enables the collection of intimate personal data — home and car photographs, movements, geolocation, and daily habits (when someone bikes, walks, or walks a dog, where they walk the dog) — to build actionable intelligence about individuals, including the hypothetical ability to determine when someone might be targeted for murder using such data. The speaker emphasizes that Maven is a 100% military operation and asserts that “the enemy is you,” framing the public as “the sheeple” and alleging a global effort to trace and track populations with constant surveillance, referencing various metals and toxins as part of a broader conspiracy. According to the speaker, Maven originated as a training Beta Test and has since evolved into a computer-driven system deployed in conflict zones such as Yemen, Iraq, and Syria, with alleged spread to major U.S. cities or regions (Manhattan, New York, Los Angeles, Holmby Hills). The narrative attributes Maven to NATO rather than the Pentagon, claiming NATO controls AI deployment and that the goal is to command and control human brains and hearts—thus enabling real-time tracing and tracking, 24/7. Eric Schmidt is cited as being aligned with Maven due to his roles with Google and Alphabet, with additional criticism aimed at Google, YouTube, and other tech entities as part of the broader military surveillance ecosystem. Siemens is named as involved with Maven, alongside companies like Google, Lockheed, Nokia Bell Labs, and Raytheon. The speaker describes Maven as the integration of surveillance, predictive programming, and lethal force, including the concept of Lethal Autonomous Weapon Systems (LAWS) such as drone or robotic systems that could disorient or kill. The account mentions Skaggs Island with helicopter pads and drones, predicting a future dominated by autonomous weapons, drone patrols, and robotic law enforcement. The speaker connects these developments to a larger narrative involving global power structures, the World Economic Forum, depopulation programs, and control over financial systems such as a potential central bank digital currency, tying Project Maven to broader geopolitical and socio-economic schemes, including alleged manipulation by Swiss bankers and Jewish anthropologists.
Full Transcript
Speaker 0: Project Maven integrating satellite photographs of your home, of your car, of your movements, pinpointing your geolocation, keeping track of your data meaning what are your habits? When do you go for your bike ride? When do you walk to the store? When do you walk your dog? Where do you walk your dog? You see that might be important if somebody wanted to let's say NATO Gladeo murder you, right? Wouldn't it be good to have that kind of intelligence in your dossier? That's what these people are doing. This is a 100% military operation. Project Maven? United States Department of Defense Project MAVEN is at the epicenter of the American artificial intelligence military efforts. This initiative uses machine learning to identify personnel and equipment streamlining the process once painstakingly carried out by human analysts. Those pesky human analysts are going to be replaced by machine to machine artificial intelligence learning what the juxtaposition channel refers to as the HAL 9,000 supercomputer. Let me continue. The Maven Smart System fuses various data sources from satellite imagery, geolocation data, communications intercepts into a unified interface for battlefield analysis. Does that sound like using Strava to keep track of your bicycle rides? Does that sound like using a Garmin computer when you go out to do a bike ride? Does that sound like a Fitbit when you go for a run? Does that sound like wearing a heart rate monitor so you can be traced and tracked? Does that sound like hacking into your emails and your text messaging and your downloads of digital photographs? Does that sound like hacking into your computer and looking at the keystrokes that you type in with your fingertips into your keyboard which would be an Eric Schmidt program at Novell, WordPerfect, called Looking Glass Keyhole. It was to hack into the keystrokes of word processing software. That's what WordPerfect was, right? It was word processing software but it came under the military heading of Looking Glass Keyhole. Looking into what you're doing on your computer. Right, it's kind of like backdoor, undisclosed backdoor operations. That was called Keyhole and Looking Glass. But here we have Project Maven integrating satellite photographs of your home, of your car, of your movements, pinpointing your geolocation, keeping track of your data meaning what are your habits? When do you go for your bike ride? When do you walk to the store? When do you walk your dog? Where do you walk your dog? You see that might be important if somebody wanted to let's say NATO Gladeo murder you, right? Wouldn't it be good to have that kind of intelligence in your dossier? That's what these people are doing. This is a 100% military operation and the enemy is you. You're the enemy. In other words, the sheeple because let's be honest there are no great armies of the world. It's just about controlling whoever's left on this planet and dumping as much meta material on them by the minute so that they can all get traced and tracked with all the aluminum and barium and arsenic poison and titanium and lithium etc etc. Anyway initially this Project Maven was designed as a training exercise. Hey aren't they all right? It's called Beta Test. And a computer version using algorithms is now actively used in places like Yemen, Iraq and Syria. Yeah, let me fill in some other places Manhattan, New York Los Angeles Holmby Hills. Anyway Project Maven like I said it's attributed to the Pentagon like DARPA is but I'm here to tell you it's attributed to NATO. There's only NATO forces. NATO controls all this artificial intelligence and they're deploying it against you. You're the enemy and they want to command and control your brain and your heart and they want to trace and track you 20 fourseven. Project Maven is what it's all about. Eric Schmidt would be all in on this because he's been the CEO of Google and before that he was the chairman of the parent company of Google which is Alphabet. It's a portfolio of investments. YouTube, 23andMe, Eric Schmidt, Google. All those companies are a disgrace. They're a complete disgrace. Google is a military intelligence trace and tracking surveillance platform. YouTube is a propaganda poppycock disinformation platform that promotes censorship. They have more Charlie Manson did it videos than any place on the planet earth. Means you don't know who the judge was in the case who's a drug dealer from Burma and you don't know who the district attorney was, Elvil Younger, who all the staff referred to as Evil Younger. He was a drug dealer from Burma during World War II. They plucked him out of the FBI at age 24 and sent him directly to Bangkok and Burma where he worked with Charles Older who was the judge in the Manson case and Evelyn Younger was the district attorney and they rigged the trial to avoid NATO Gladio kill teams operating in Los Angeles County which they do to this day. Anyway if it's on television and the story you know it's not important. Let me talk to you about Siemens Corporation. It's a German manufacturing company and they're involved with Project Maven. Of course Google is, Lockheed, Nokia Bell Labs, Raytheon Missile Guidance System because it's the integration Project Maven is the integration of everything. It's the integration of surveillance of you, tracing and tracking you in real time, looking at your former travel habits so that they can predict, do predictive programming of where best to take you out. In your bed or on a dog walk or on a bicycle ride and everyone says, Oh he had a heart attack. Oh his pacemaker didn't work. Oh his insulin pump malfunctioned. See, no one all the casualties will not be COVID and all the casualties will just be heart attacks or what the media has now coined the new term as sudden death syndrome. Oh he's 16 years old, he died of sudden death syndrome. He's 16 years old and he's dead. That's perfect warmth. It happens. Just like 33 year old women die of manic episodes. That's what the coroner called Aaron Valente's death. They called it a manic episode. Took him four months to come up with this poppycock balderdash explanation of how a 33 year old woman who was very vibrant, very active, and having no trouble whatsoever turns up dead in the back seat of her Nissan Murano SUV in a Masonic address on Bowes Lane 7 Houses south of, Diablo Way. Siemens is in the mix. They have offices at Lawrence Liberal Weapons Laboratory. I'm sure they're at Los Alamos. I'm they sure do business with SRI as well as UC Berkeley, Lawrence Science Laboratory, because they're everywhere. They're like poison oak. You just can't get rid of them. Artificial intelligence arms race. A military artificial intelligence arms race between two or more states to develop and deploy lethal autonomous weapons systems. This has a military acronym: LAWS. L A W S. That's the future of gladioinato kill teams. It will be done by artificial, either a drone, a direct energy pulse, an LED light, disorienting you and then blowing up your brain or giving you a heart attack. It'll be done via laws Lethal Autonomous Weapon Systems. They're not going to send a kill team in to bayonet you. We're not going to do bayoneting anymore. We're switching over to the AI, to the lethal autonomous weapons program. They're going to have robot dogs. They're going to have robot sheriff's deputies. They are going to have the helicopters, the drones. They've already got that set up 13 miles behind my head at Skaggs Island. They have set up helicopter pads out there for drones as well as McDonnell Douglas Hughes helicopters and Bell 206B and you could even land a Chinook helicopter out at Skaggs Island. No problemo. This is the new world people and you need to know what Project Maven is. Project Maven is the epicenter of everything that the military has been working on for the last one hundred years and they've been accelerating this program since 1995 which is going to call it thirty years and the program has already been rolled out. It's not that they're going to roll it out. It was rolled out and it was rolled out with vengeance during the COVID operations. So they can throw the switch anytime they want regarding your bank account and central bank digital currency. That can be thrown at any moment. But as you can tell they're more interested in dumping metamaterials on us. They've been doing it for almost a year and a half now. I don't know when they're going to be done if it's going to go on for another year or two or three or four if they're going to wait till 2030 which is the big reset supposedly according to the World Economic Forum there's going to be a reset in 2030. The Swiss bankers and the Jewish managers and the Jewish anthropologists they're in charge of how to use Project Maven. They're in charge of anthropology and the Eugenics depopulation programs that are in play as I'm recording this.
Saved - January 10, 2026 at 9:13 PM
reSee.it AI Summary
I claim DARPA, Palantir, Boeing, foreign powers, and even Google have programs that read, write, manipulate, induce, project, and affect people in unimaginable ways—already weaponized. The Maduro raid tech is a taste, with DEWs, AI, electromagnetics, and frequency weapons.

@TheSCIF - The SCIF

DARPA, Palantir, Boeing, foreign countries, and even Google have programs and technology that can read & write, manipulate, induce, project, and effect things and people in ways you never thought possible. All this is already here and already weaponized. The tech reported in the U.S. military raid on Maduro is just a taste. These DEWs have many layers and include, A.I., electromagnetics, and other frequency weapons.

Video Transcript AI Summary
This transcript centers on the emergence of neuroscience and neurotechnology as potential weapons and the privacy, security, and ethical implications that accompany them. Key points include: - The novelty and viability of neuroscience as a weapon: nanoparticulate aerosolizable nanomaterials could be breathed in to disrupt blood flow and neurological network activity, usable as enclosed weapons or broad disruption tools. Nanomaterials could also enable electrodes to be inserted into a head to create vast arrays of viable sensors and transmitters. DARPA’s N3D program (next generation non-invasive neuromodulation) aims to create implantable electrodes that read from and write into the brain remotely in real time, without surgical brain insertion. - Advances in AI and neuroscience: artificial intelligence is enabling medical breakthroughs, including devices that can read minds and alter brains to treat conditions like anxiety or Alzheimer's. - Privacy concerns and protective legislation: as brain data becomes more accessible, privacy protections are seen as essential. Colorado passed a first-in-the-nation law adding biological or brain data to the state privacy act, akin to fingerprints if used to identify people. However, a study by the Neuro Rights Foundation found that two thirds of private brain-data–collecting companies are sharing or selling data with third parties, and most do not disclose storage location, retention periods, access, or breach protocols. - Widespread readiness and access to brain-decoding tech: devices on the Internet can decode brainwaves to varying degrees, and tech from companies like Elon Musk, Apple, Meta, and OpenAI could change, enhance, and control thoughts, emotions, and memories. Lab-grade systems can decode brain activity to turn thought into text; brainwaves are described as encrypted signals readable by AI. - At-home attention monitoring devices: EarPods and other wearables can detect whether a person is paying attention or their mind is wandering, and can discriminate between types of attention (central tasks like programming, peripheral tasks like writing, or unrelated tasks like browsing). When combined with software and surveillance tech, the precision increases. - Ethical and societal risk considerations: this technology raises concerns about data insurance discrimination, law-enforcement interrogation, and advertising manipulation. Government access could extend to altering thoughts, emotions, and memories as the technology advances. Privacy protections are described as a no-brainer by Pazowski of the Neuro Rights Foundation, who emphasizes that brain data represents “everything that we are,” including thoughts, emotions, memories, and intentions. - Real-world and speculative applications and threats: debates about whether devices can truly control thoughts; references to brain-reading in mice; concerns about bi-directional interfaces, remote writing signals to the brain, and potential co-optation by malicious actors. There are mentions of preconscious recognition signals (P300, N400) used in interrogations to identify recognition of a potential co-conspirator or weapon, potentially without conscious processing. - Surveillance versus autonomy and safety: discussions about bossware and ubiquitous monitoring in workplaces, plus the possibility that such monitoring could extend to controlling attention or even thoughts. - Security, hacking, and potential misuse: Bluetooth-enabled headsets, write-capable technologies like transcranial magnetic stimulation (TMS), and the risk of systems being hacked, underscoring the need to anticipate and mitigate misuse. - Global and political dimensions: comments on rapid progress (faster than expected), substantial military investment by China in neurotech, and concerns that AI integration with neuroweaponry could create new, uncharted information warfare. - Narratives of secrecy and manipulation: debates about why information is publicly released or withheld, the potential for misinformation, and the idea that these technologies could be used to “read our thoughts” and weaponize them, with implications for targeting, torture, and control of the narrative.
Full Transcript
Speaker 0: This is why it becomes so important to understand the novelty and the viability of neuroscience as being leveraged as weapons. We then have the use of nanoparticulate agents, aerosolizable nanomaterials that can be breathed in and disrupt blood flow and neurological network activity that can be used as an enclosed weapon or perhaps that can be used as a more broad weapon of disruption and or destruction. We also have the capability to utilize nanomaterials to get electrodes into a head and to create a vast array of viable sensors and transmitters. This is DARPA's N3D program, next generation non invasive neuromodulation, utilizing these techniques and technologies to create vast arrays of implantable electrodes that need not be put into the brain surgically, that are then able to read from the brain and write into the brain remotely in real time. Speaker 1: Advances in artificial intelligence are leading to medical breakthroughs once thought impossible, including devices that can actually read minds and alter our brains to help treat conditions like anxiety, Alzheimer's. Speaker 2: But that technology raises privacy concerns. That's why Colorado passed a first of its kind law aimed at ensuring our private thoughts remain private. Our ear pods that can pick up brainwave activity and tell whether or not a person is paying attention or their mind is wandering. Okay. Well, you might think, fine. But even if we can tell whether a person is paying attention or their mind is wandering, you can't tell what they're paying attention to. You would be wrong. Speaker 1: Who has access to this technology? You know, Karen, everyone, believe it or not. You can buy devices on the Internet right now that can, to varying degrees, decode your brainwaves. And the technology being developed by the likes of Elon Musk, Apple, Meta, and OpenAI can change, enhance, and control your thoughts, emotions, even your memories. It's the dawn of a new era filled with promise and peril. If the at home devices are impressive, those being used in the lab are even more so. Our brain waves are like encrypted signals and using artificial intelligence, researchers have cracked the code, identifying frequencies for specific words to turn thought to text. That I just think it and AI knows what I'm thinking. Speaker 3: Yes. Speaker 1: Because of the pattern of my brain wave. Speaker 4: Yes. Speaker 1: But with the benefits come risks. Speaker 4: It is some of the most sensitive data that you could possibly share with anyone. Speaker 1: Data insurance companies could use to discriminate, law enforcement to interrogate, and advertisers to manipulate. Government too could get into our heads and potentially alter our thoughts, emotions and memories as the technology advances. Speaker 4: Nobody wants to live in a world where some of these misuses or abuses exist. Speaker 1: While medical research facilities are subject to privacy laws, private companies that are amassing large caches of brain data are not. And based on a study by the Neuro Rights Foundation, two thirds of them are already sharing or selling the data with third parties. The vast majority of them also don't disclose where the data is stored, how long they keep it, who has access to it, and what happens if there's a security breach. Which is why Pazowski, medical director of the foundation, led the passage of a first in the nation law in Colorado that includes biological or brain data in the state privacy act, similar to fingerprints, if the data is being used to identify people. Speaker 4: This is a first step, but we still have a long way to go. Speaker 1: And with companies and countries racing to access, analyze and alter our brains, Pazowski says privacy protections should be a no brainer. Speaker 4: It's everything that we are. You know, it's everything about our thoughts, our emotions, our memories, our intentions. Speaker 2: And Sean, we're also wondering, can any of these devices actually control a person's thoughts? Speaker 1: They have been used to control the thoughts of mice in a lab. All right, so much to take in. Sean, thank you for that report. Speaker 2: What do Speaker 1: you think? Speaker 2: Is it a future you're ready for? You may be surprised to learn that it's a future that has already arrived. Everything in that video that you just saw is based on technology that is already here today. Artificial intelligence has enabled advances in decoding brain activity in ways that we never before thought possible. Sensors that can pick up your brainwave activity, earbuds, headphones, tiny tattoos that you can wear behind your ear. We can pick up emotional states like, are you happy or sad or angry? We can pick up and decode faces that you're seeing in your mind. Simple shapes, numbers, your pin number to your bank account. It's not just your brain activity here that we can pick up. We can also pick up your brain activity in different places, like as your neurons fire from your brain down your arm and send signals to your hand to tell you how to type, move. All of that could be decoded through electromyography, and that's what you're seeing here is a device now in the form of a simple wearable watch that can pick up that activity. And one of the pivotal acquisitions of the field, Meta acquired this company, Control Labs in 2019, because major tech companies are investing and helping to make these devices universally applicable as the way in which we interact with the rest of our technology. What if everywhere has ubiquitous monitoring? In fact, during the pandemic, what we found was that 80% of companies admitted that they use at least some forms of so called bossware technology to monitor the productivity of their employees. Whether it's a white collar employee monitoring what's on their screen, or in any other context, surveillance is part of our everyday lives. Surveillance for productivity is part of what has become the norm in the workplace, and maybe with good reason. Nine out of 10 employees waste time during the workday. They focus on other things. There may be good reasons why we want to be able to find better ways to monitor whether somebody is paying attention or they're doing something different. The newest way to monitor attention is through a device like this one. These are EarPods that are launching later this year. These EarPods, much like the video you watched earlier, are EarPods that can pick up brainwave activity and tell whether or not a person is paying attention or their mind is wandering. Okay. Well, you might think, fine. But even if we can tell whether a person is paying attention or their mind is wandering, you can't tell what they're paying attention to. You would be wrong. Turns out that you can not only tell whether whether a person is paying attention or their mind is wandering, but you can discriminate between the kinds of things that they're paying attention to. Whether they're doing something like central tasks, like programming, peripheral tasks, like writing documentation, or unrelated tasks, like surfing social media or online browsing. When you combine brainwave activity together with other forms of software and surveillance technology, the power becomes quite precise. So what do we do with this? What do we do with technology that enables us to monitor brainwave activity for attention? Do we embrace it? Do we resist it? If you've heard of Havana syndrome, Havana syndrome is a belief that people have suffered from the leading theory is that it's targeted microwave activity of brains to disrupt brainwave activity. There's no proof of it yet. Speaker 5: I had a hearing this week in Homeland Security, and this this hasn't even become very mainstream yet, but it was about, different foreign adversaries using direct weapons, direct energy weapons against US citizens that completely incapacitate citizens of The United States. You guys might have heard of it called Havana syndrome. And then we went down to the skiff, and we got a classified briefing from some of the people on the on the panel and it was one of the most I'm a former Navy SEAL, so I've traveled around the world and hunted bad guys for a long time. But I can tell you this, when I went down to that skiff, it was one of the most terrifying briefs that I've ever been a part of. Okay? This is how brazen our enemies are becoming because of how foolish, corrupt, incompetent, and I would act act actually say wicked we have become. Speaker 2: But there's at least a couple dozen cases where there isn't a good explanation for why the individual suffered from disruption of mental abilities. And there's certainly a lot of investment in trying to figure out whether you could target the brain remotely. It's much more difficult to figure out how you could read the brain remotely. Speaker 6: Let's get to that, because I think it's one of the most important and crucial questions about how this develops. And by the way, raise your hands. I'm just going to ask this question and then we'll move to the audience. You talked at the beginning. At the beginning you said you won't be able to read complex thoughts. It seems as though we can understand emotions. There's some way you can recreate some images inside your head. Speaker 2: Already, gamers have figured out, for example, while a person is wearing a headset, how to, you know, prime a person through their brainwave activity to be able to decode their PIN number and their home address. So you don't have to have your full complex thought decoded to reveal your thoughts, right? It just, it gets at what we think thought is. Speaker 6: How do you decode somebody's pin number? You flash a series of numbers and see how their brain reacts to them? Speaker 2: So, you have recognition memory signals that are preconscious and subconscious. And this is part of why it's been used, for example, by governments to interrogate criminals. Do you recognize this potential co conspirator? Do you recognize, you know, this murder weapon? Those preconscious signals, like what we call the P300 wave or the N400 wave, these are before you even consciously process information. So, you could prime it with a number and then see if a person recognizes it. And you can do it without them realizing that that's what you're doing. Speaker 6: So will all of our passwords be cracked first by this or quantum computing? Hard to tell. Alright. Speaker 7: There's a whole set of things around hacking bad actors. So for example if you have some headset and it communicates over Bluetooth Bluetooth is just not that secure. Most of these things are kind of read and not write. But there are technologies like TMS that do try to write signals to the brain. And I'm sure people are going to try to do that for various reasons. Imagine those systems being hacked. So we really want to think this through. We want to get a jump on it. I think that's neat as fundamental point. I completely agree with it. No matter how long the time scales are on some of the specifics we need to get on it. Speaker 8: I do fall on the side of this is moving faster rather than slower. You know I'm working with one of the world's leading experts on neurotech Rafael Euste who says that things that he thought would take five years are now taking one or two. So I think we're moving faster. And also because a billion dollars a year is being spent just by China alone through its military and researching neurotech. And I'm quite confident that they're working on, even though they have no personal knowledge, decoding human thoughts, potentially using these devices for torture and other kinds of things. Speaker 9: Use this artificial intelligence voice in the head to break down the ego and control an individual. Speaker 10: Ultimately, yes. You can't plug your eardrums. You can't stop the sound. A lot of the targets are tricked into believing evil aliens have abducted their brains, demons. They're tricked. Speaker 11: Yes. How are they tricked? Speaker 10: They're told. By who? By the voices. In a lot of these school shootings, I think that you hear about on the news, they hear voices. Speaker 7: And we've learned that Cruz told the BSO detective that he heard a demon in his head. Speaker 11: And police now say he also heard voices. Who heard voices in his head. Speaker 10: The scripts they're called, and they're meant to confuse the very derogatory. That's just typical breakdown. And why would you wanna break down the ego of that person? To rebuild it. So this gets into creating Manchurian candidates. Speaker 1: Police have released video made by the man who opened fire at Florida State University Speaker 10: in Project Soul Catcher referred to a Myron May as a Myron May. Right. As a psychobomb. They didn't care who the target was. They were just trying to make him explode and do something bad. He was a lawyer trained there. His reasoning why he shot up the school was he needed news publicity to make sure people understood this was real, and he left the video testimony. Speaker 7: As sick as this may sound, I've even had stalkers following me into church. Speaker 9: He believed government stalkers were harassing him and using a direct energy weapon to hurt him. Speaker 10: But he gave out, seven packages in the mail, and the FBI intercepted them all. What were in these packages? Just information. Just information. Speaker 1: May then opened fire at an FSU library, wounding three people. He was killed in a shootout with police. Speaker 9: If these people do explode and do something bad like this, there's absolutely no way to prove that there's been any sort of manipulation to the brain. In this guy's case, he talked about it. I mean, obviously, he talked Speaker 10: But it but it was covered up. He the Speaker 9: way they they way they write the article, he sounds like a crazy person. Speaker 5: Guys, if your, assessments here are correct, these are very covert weapons, aren't they? Speaker 12: That's correct. There's no entry or exit wound. How they're designed is to make the target feel like they're crazy, like they're imagining things. Speaker 5: And you guys also said that these attacks are happening right here in this city. Is that correct? Speaker 11: I mean, there have been some that have gone public with respect to Washington DC. Speaker 5: I think it was mister you mister Grozov said, you spoke to a Russian agent who said that they believe that Americans are using the same weapons on them. Is that correct? Speaker 10: That is correct. Speaker 5: Might that have something to do, with part of the CIA's motto to cover up the existence of the this tech and these weapons? Speaker 10: Is a very logical possibility. Speaker 5: Thank you. Mister chairman, I yield back. Gentleman yields. Chair now recognized the gentleman from New York, mister Goldman for his random questioning. Speaker 3: Thank you, mister chairman, and thank you to our witnesses for being here. Mister Grozov, I wanna follow-up a little bit on the interactions you've had with Russian intelligence about these a AHIs. And mister Zaid, you I wanna ask, and this is a hypothetical, but I I'm trying to understand why our government would try to block information sharing or conceal information that they have. And one thing that comes to mind is whether there's an operational risk to revealing any of the of the details of their investigation. Is is that something that you have come across, in any of your work? Speaker 11: There's a lot of reasons why the information might not be publicly released. And I do think that's something we could address more in a classified environment to explain that, but there are understandable reasons why the US government has not revealed much of what it knows. Speaker 12: There's some long term things that needs to be done in terms of of new acts. But in the short term, we need to do things like implement the original Havana Act. Speaker 3: Yeah. Speaker 12: DOD still hasn't done it. Speaker 13: So this is not out of the realm of these very nefarious people like in the CIA and these other types of secret societies institutions of our government. We're now finding out the use of AI can be used against people. We've already heard from the World Economic Forum that they have the ability with AI to be able to read people's thoughts by putting in a little Bluetooth in someone's ear that they can actually see what someone is actually thinking about as they're working and they're gonna sell it to us, Allison, as this is gonna be good for employment because employers will know whether or not their employees are daydreaming or thinking about other things other than the job. But what is it saying? It is saying that they now possess the ability to read our thoughts and now weaponize us with acoustical types of things that can be sent to us that throws us off balance or makes us feel crazy. This is all, where is it going? All about controlling the narrative, controlling people. Speaker 14: Absolutely. That is most certainly what it is all about as has been made rather clear over the past couple years especially. But, yeah, I think this could obviously take an extremely dangerous turn here. I mean, wouldn't be surprised if this led to targeting and testing and even like torturing of innocent civilians, which brings me to my next thought, is the inevitable threat of artificial intelligence mixing into all this. Mix AI into the use of neuroweaponry and you get an entirely new uncharted territory. Speaker 13: The whole idea is that we would have these biological sensors in our bodies and then they could read our thoughts, know our emotions, know whether we're hungry or not or anything like that. So now it's a warfare of information. They will have everything on you. They will know we are coming and going. And so this kind of warfare, this kind of being able to target individuals. And think about this, there is no way to detect. There's no entry point. There's no exit point a bullet would have. They could just target somebody and they're saying, you know, yeah, he went crazy. Yeah, I'm sorry. We we you know, and then turn the kill switch on somebody and, you know, and then lose a threat. Now
Saved - January 9, 2026 at 3:43 AM
reSee.it AI Summary
I report that Rep. Anna Paulina Luna refers Seth Harp to the DOJ for investigation and pursues criminal charges over the intentional publication of information related to Operation Absolute Resolve, including the doxxing of a Delta Force operator. That conduct is not protected journalism; it was reckless, dangerous, and put American lives at risk. The First Amendment does not license exposing elite military personnel or aiding adversaries under the guise of reporting.

@TheSCIF - The SCIF

Rep. Anna Paulina Luna refers Seth Harp to the DOJ for investigation and pursues criminal charges regarding the intentional publication of information related to Operation Absolute Resolve, including the doxxing of a U.S. Delta Force operator. "That conduct is not protected journalism. It was reckless, dangerous, and put American lives at risk. The First Amendment does not give anyone a license to expose elite military personnel, compromise operations, or assist our adversaries under the guise of reporting."

Saved - January 7, 2026 at 1:45 PM
reSee.it AI Summary
I present explosive testimony from Arizona’s Senate Elections and House Oversight hearings. Witness Jackie Berger alleges a cartel-linked scheme involving Runbeck Election Services, Governor Katie Hobbs, law enforcement, and other officials taking bribes, committing election fraud, and laundering money. Claims span Maricopa County elections since 2004, with over $7.5B in drug money tied to election theft and systemic bribery, threatening fair voting.

@TheSCIF - The SCIF

Exposing how RUNBECK Election Systems, Governor Katie Hobbs, Arizona law enforcement, and other government officials are receiving bribes, and committing election fraud, along with other illegal activities, and working with the cartel. Explosive testimony from Arizona's Senate Elections and House Oversight hearings, witness investigator Jackie Berger detail a massive investigation revealing how the Sinaloa Cartel has allegedly bribed judges, police, and top officials—including Governor Katie Hobbs and her husband—through untraceable schemes like phony mortgages and deeds of trust. The first 3:30 is a condensed version of the testimony. The video then displays the full uncut unbelievable testimony from a 3 to 4 year investigation. You have to hear how elaborate this web of corruption and election fraud really is. - Elections in Maricopa County rigged since at least 2004. - Runbeck Election Services implicated in receiving cartel payoffs. - Over $7.5 BILLION in laundered drug money flooding Arizona politics since 2010. - Direct ties to election theft and systemic bribery threatening fair voting. This isn't just politics, it's a potential treasonous betrayal of public trust that demands immediate accountability and justice for voters like Kari Lake and everyday Arizonans. The greatest enemy we face is from within and are on the bench.

Video Transcript AI Summary
Jacqueline Greger testifies to a preliminary finding report on activities impacting Arizona’s election integrity, focusing on the 2020 and 2022 general elections. She outlines a multi-year pattern beginning in 2017, alleging that “accents points” were used to change vote totals and election results, with illegal transfers moving money to candidates through phantom entities and for-profit and non-profit PACs created by Brittany Ray Chavez. She claims that during the 2022 election, ballot scanners and printers at 70 precincts had their printer settings changed through computer infiltration after being tested the night before the election, leading to uncontrollable ballots being placed in Box 3 and allegedly driven to Runbeck’s office. Witness information from October 2020 is cited, including more than 100,000 filed-in ballots and more than 13,000,000 identified in two unmarked rental cars used to move ballots and cash to Runbeck’s office. Runbeck is described as operated by Robert Runbeck, with deeds for Runbeck provided in the materials. Greger asserts a planned strategy involving Hobbs and Fontes: Hobbs would receive the Democratic nomination for governor, Fontes would run for secretary of state to replace Hobbs, and both would be bribe recipients evidenced by “Britney deeds.” She argues the fix for 2020 and 2022 started in 2017 with appointments to election positions of individuals bribed through a mortgage scheme and money laundering via phantom appointments. She emphasizes “the problems with these documents are many” and connects money laundering to drug cartel activity and human trafficking, arguing cartel investment aims to place reliable figures in key positions to advance their objectives. The report titled Preliminary Findings of Activities Impacting Arizona’s Election Integrity with specific focus on the 2020 and 2022 general elections is introduced by Greger, who provides her background: she has a master’s in marketing and honors degrees in finance, accounting, statistics, economics, and business strategy; resident of Scottsdale since 1997; owner of Finebreder Insurance Agency; principal investigator with Harris Thaler Law Firm since 2019. The team, led by John Harris Thaler (a 32-year attorney), investigates racketeering and corruption across multiple states. Thaler’s past work includes uncovering laundering of cartel money through real estate in Illinois, Idaho, and Iowa; real estate agents, escrow companies, and title insurers indicted for racketeering; investigations into money laundering through Arizona real estate; and a broader operation intertwining narcotics trafficking, tax evasion, payroll theft, bankruptcy fraud, insurance fraud, and election fraud. Greger states that more than 120,000 documents have been reviewed and that 47 filings exist in the report. She outlines a pattern of money laundering through single-family residences, inflated construction invoices, fake charitable donations, fictitious students in private schools, and fake bankruptcies. Wells Fargo and other banks are alleged to have opened accounts for phantom people; municipal and state systems in Mesa, including a private police force, are said to be compromised to support racketeering. She claims numerous forged or altered documents, including falsified deeds of trust and notary acts, with signatures forged or copied, often associated with Brittany Chavez and Donna Chavez. Key individuals and entities are named as bribe recipients and conspirators: Kathleen M. Hobbs and Patrick T. Goodman appear in a series of deeds with signatures and notarizations that Greger says are fraudulent; Brittany and Donna Chavez are identified as principal preparers of documents; the Maricopa County Recorder’s Office and relevant courts are alleged to have been infiltrated to upload falsified documents and remove legitimate ones. Greger discusses targeted election service providers, including Runbeck, and asserts that “the county database” has “no integrity whatsoever,” with backdoor access enabling document upload or deletion. She describes bribes to judges, prosecutors, and public officials across the state, including 25% of active judges in certain jurisdictions, and claims that elections including the governor, attorney general, and other offices were affected. Greger notes investigations are not limited to Arizona; FBI, IRS, US attorneys’ offices, and attorney generals in California and New Mexico have engaged with the findings. She emphasizes that the final report will be a 300-page book with about 3,000 attachments, to be published as Report to the Governor, and that excerpts and documentation will be available at reporttothegovernor.com. She clarifies that she and Thaler do not represent political candidates or parties, and that Thaler had not voted or donated in 2022. She closes by describing the data’s potential utility for enforcement agencies and asks for questions; a constituent video is requested to be played.
Full Transcript
Speaker 0: Thank you so much for coming. You're very brave in my opinion. My my question is and I I guess it's a question for clarity. How this is, in my opinion, related to the election is what you're stating is potentially many people elected officials here have potentially been bribed or blackmailed to get certain election results. And I think the people have the right to hear that because the people in Arizona right now crave truth. Is that am I Absolutely. You are. Absolutely. And that is exactly why I'm here today. I think that we have gone round and round and round with the the concept of election integrity, but nobody is willing to actually speak the truth of how did our election get compromised. And as in nuts and bolts, you know, what happened to actually compromise our elections and compromise integrity of our state? Speaker 1: Beginning in 2017, the accents points have been used to change vote totals and there on election results. Illegal transfers have been made and provided to run back. And Jeff Ellison, the phony deeds used in the scheme to move money to candidates are created by Britney. For profit and non profit packs are also created by Britney and used to move money for candidates. During the twenty two election, ballot scanners, printers at 70 at 70 precincts suffered changes to their printer settings despite being tested the night before the election. The changes in those settings were made through computer infiltration, not manually or by some never before seen error. The uncontrollable ballots were placed in Box 3 and allegedly driven to run back. Witness information provided on October 2020 confirms that more than 100,000 filed in ballots and more than 13,000,000 were identified by some of our investigators in two unmarked rental cars. These vans were loaded with the ballots and cash at a private residence in Mesa and driven to Runbeck's office. The Runbeck company, as you know, is operated by Robert Runbeck. We have found deeds for Runbeck. This was a planned loss. Hobbs would receive the democratic nomination for governor, and Fontes would run for secretary of state to replace Hobbs. The strategy appeared to have been planned. I have shown you that both Hobbs and Fontes have bricked what we call Britney deeds, evidencing a strong likelihood that they are bribed recipients. Now Speaker 0: it may seem obvious, but I do Speaker 1: feel that it's necessary to explain nonetheless. Given that Arizona is a border state and that drug smuggling and human trafficking is a billion dollar business, it would appear that having our elected and appointed officials ensure that the cartel enterprise remain open for business would be paramount. The cartel invest substantially to ensure that the right people are in key positions so as to further their objectives. The fix for 2020 and for 2022 started in 2017 with appointment to election positions of individuals being bribed through the mortgage scheme and through monies being laundered by the appointment of phantom individuals. The problems with these documents are many. Speaker 0: Title of her report is preliminary findings of activities impacting Arizona's election integrity with specific focus focus on the twenty twenty and twenty twenty two general elections. Title of her report is preliminary findings of activities impacting Arizona's election integrity with specific focus focus on the twenty twenty and twenty twenty two general elections. Good afternoon, madam chair. Good afternoon to to everyone. My name is Jacqueline Greger. And speak real close to me. Sorry. That's okay. So the folks in show love can hear I don't know if they want to. More impressive. Just to tell you a little bit about myself, I do have a master's degree in marketing, honors degrees in finance financial accounting, business statistics, economics, and business strategy. So I've been a resident of Scottsdale, Arizona since 1997 and I own the Finebreder Insurance Agency which is a farmers insurance agency in Raleigh. Since 2019 I've been a principal investigator with the Harris Thaler Law Firm. We have been investigating multiple multi state rapid tearing and corruption. John Harris Thaler is our senior attorney, and he is in charge of this investigation. Mister Thaler has been practicing law for thirty two years. His firm specializes in investigating racketeering corruption for both the public and the private sector, and he has participated in some of the largest investigations both in The US and abroad. But with respect to the current matter at at hand, in 2006, the US attorney's office in Illinois, Idaho, and Indiana investigated the laundering of drug cartel monies through a complex series of single family home purchases in those particular states. By 2009, numerous real estate agents, escrow companies, and title insurers had been indicted, charged, and convicted of racketeering, and in 2014, our office was asked to review the case file. The reason for this was we were asked to determine whether monies from the sale of the properties had filtered to properties purchased in Arizona, specifically in Maricopa and Pima County. We concluded that several real estate agents convicted in Iowa had set up laundering systems in Arizona, and thereafter had transferred the proceeds of sales to the Panamanian corporations. In 2018, Mr. Thaler discovered, incidental to a completely independent matter, a series of trustees, evidence in their cash laundered through single family residences in Arizona, was pervasive and ongoing. With that, a new investigation began, with the focus being on money laundered and related racketeering activities in Narragua County and as well as in several other Arizona counties. We currently represent several parties directly damaged by these racketeering activities. The investigation originally focused on fake notarizations, fake deeds of trust, fraudulent buyers and or sellers of the real property transactions, as well as other companies used in real estate transactions, such as real estate brokers, mortgage companies, title and escrow companies, real estate inspection companies, service companies, and so on. Over 120,000 documents have been reviewed to date. These documents have definitely evidenced multiple racketeering enterprises, which include narcotic sales, money laundering, tax evasion, payroll theft, bankruptcy fraud, life insurance fraud, auto insurance fraud, bribe of elected and appointed officials, creating and modifying public record, falsifying professional licenses and related credentials, swatting individuals who pose a threat to these enterprises, and last but not least, election fraud. I walked in and heard briefly that you spoke about a compromised computer system. Well, that is something we will be addressing I will be addressing in quite some detail. I'm going to share with you that which we've uncovered, how we uncovered it, and the conclusions drawn therefrom. I'll also share with you how the racketeering enterprises inextricably are intertwined with election fraud. It is important to note that our office has been limited in resources and in terms of authority, such as subpoena power. As a result, the conclusions that I'm bringing here to you that we've reached to date are just the tip of the iceberg. As a result, our office stands ready to work with any of the relevant enforcement agencies. Our primary findings were first reported to Governor Ducey in 2022. Furthermore, Thaler has met with attorney generals in five states, the FBI, the IRS, the US bankruptcy trustee, and with several US attorneys' offices. Currently, there are active and ongoing investigations in federal and state jurisdictions, and both California and New Mexico have already used our report and and taken some corrective action. The final report will be will include the election fraud and will be complete completed and published as a book entitled Report to the Governor. This is going to be a book of 300 pages with approximately 3,000 attachments. Excerts from this book and other necessary documentation will be available on reporttothegovernor.com after this presentation. Our report contains 47 separate filings. I have provided you with a packet, and I do apologize that I failed to my assistant failed to number the pages, but in pages 11 to 14, show you those detail, those 47 findings that we had in our report. I am going to just mention a few of those that are very pertinent to this commitment. As I mentioned, beginning in Illinois, Idaho, and Iowa, in the early '80s, cash earned or otherwise collected in the sale of illegal narcotics and human trafficking activities conducted by the Sinaloan Hotel had been laundered through the purchase of single family residences. Laundering of this hotel money in Arizona through purchase and sale of the single family residence began in and about 1994, and focused on new construction, particularly in San Tan Valley, Lynchville Park, Goodyear, and Avon Park. Cartel monies mostly came from illicit narcotic sales, which include crystal meth, cocaine, heroin, and fentanyl, as well as human trafficking. In addition to purchase and sales of single family residents, cash is laundered through inflated and falsified construction invoices, falsified charitable donations, tuitions paid on fake students allegedly attending private trade schools, and falsified bankruptcies. Wells Fargo bankers in Arizona and in multiple additional states have engaged in opening, checking and direct deposit accounts for phantom people. Resources, including city government officials and agencies in Mesa, Arizona has also been integral in the laundering activities. Since 2010, money laundering has exceeded 7,500,000,000. In Arizona, laundered cash is used in part to bribe elected and appointed public officials and their support staff. The principal preparers of the documents necessary to affect the racketeering enterprise are Donna Ray Chavez, a resident of Mesa, and her daughter Brittany Ray Chavez. To date, more than 10,000 falsified documents have been recorded with the Maricopa County Reporter's Office. We estimate that more than 35,000 warranty deeds and trustees evidencing fraudulent transactions exist in the database. The number of falsified notarizations exceeds over 15,000. Donna and Brittany participate in racketeering activities which also include facilitating the bribes to the public officials, tax evasion, payroll theft, bankruptcy fraud, insurance fraud and extortion. The city of Mesa is a racketeering organization, as that term is defined in 18 USC section nineteen sixty one. To protect the enterprise, civil rights are systemically violated to preserve racketeering activities. Fines and outrageous cash bonds are used to collect monies which are then skimmed and redirected into the racketeering enterprises. The City of Mesa Police Department operates within it a private police department that is used to support and protect racketeering enterprises. Officers participating in this force are compensated with monies paid through the phony mortgage schemes and other related schemes. Officers operating within this private force systemically violate our fourth amendment rights by breaking an insurer into private properties, wiretapping, computer hacking, cell phoning, and by using relative related surveillance techniques without warrant. Officers also plant evidence and hide exculparia evidence. Multiple state agency databases have been infiltrated or hacked, thus allowing falsified documents to be uploaded into them and allowing legitimate documents to be removed. For example, the database for the University of Arizona, Arizona State and Northern Arizona have been infiltrated and hacked. It permits individuals to be given degrees who never attended or graduated from these schools and allows phantom individuals to be awarded degrees, thus lending legitimacy to their existence. Further, state licensing databases have been infiltrated and hacked to commit individuals with fake degrees to permit phantom individuals to have state licensing issues, and these licenses like accounting, real estate, mental health care, even law licenses. We have seen phantom attorneys registered with the State Bar. The Maricopa County database for the Recorder's Office and for the Superior Court were designed in 2014. They were set up for outside infiltration so that falsified documents could be uploaded or legitimate documents removed. Since 2015, hundreds upon hundreds of falsified court documents have been loaded into the database. These documents include falsified default judgments, criminal restitution orders, child support orders, all of these fused in swatting activities against individuals posing a threat to the racketeering activities. Since 2004, elections within Kemah County and Maricopa County have been manipulated through the infiltration of the county databases resulting from bribes paid to executives and election service providers including, but not limited to, principals that run back election services. In addition to impacting local elections, bribes and infiltration were used to affect the outcome of the races during the November, including the outcome of the race for Maricopa County reporter and the outcome of the November race for governor, secretary of state, and attorney general. Public officials who have received bribes include multistate office holders, state house and state senate, local office holders, county supervisors, judges in the Maricopa Supreme Court, judges of some city courts, including two presiding judges, judges' assistants, prosecutors within certain cities within Maricopa County, prosecutors for Maricopa County, peripheral legal specialists including attorneys, approved mental health care providers, as in court appointed advisers, and related specialists. In the Superior Court of Maricopa County and Bunnell County and Pima County, at least 25% of the active judges have accepted bribes in exchange for protecting the racketeering activities. Bribe payments generally begin before the individual is even appointed to the bench. Bribes are usually paid as an incentive for the attorney to leave their private practice. By way of example, Mesa City Prosecutor's Office routinely files charges and convicts innocent individuals who knowingly or unwittingly pose a threat to the racketeering enterprise. With respect to judges in the Mesa City Court, Judge Tatts, Judge Alicia Lawler preside over these indented cases filed by the city prosecutor, falsely convicting and sentencing the defendant. In the Maricopa County Superior Court Family Division, child custody evaluators commonly known as court appointed advisers routinely accept bribes in exchange for favourable adults. Bribes are often facilitated by attorneys representing one party. But let me explain. As I stated earlier, in 2018, mister Thaler found trustees recorded with the Maricopa County Reporter Office evidence in money laundering and tax evasion. These documents, as I mentioned, were prepared by both Brittany and Donna Chavez. Both of them are connected to the real estate agents suspected of setting up the home purchasing laundering systems in Arizona. The principal employer was and is the Cinna Loan Hotel. Today, we know that their participation in the creation of documents necessary for the criminal enterprise runs more than €25 and includes facilitating bribes to public officials. Our initial discovery included more than 100 fake trustees and warranty deeds in Maricopa County, where either Britney or Don executed the document as either buyer or seller or as the notary under an assumed name. At least half these documents reported to be executed by married individuals. The discovery of the falsified deeds led to the discovery of additional racketeering enterprises including but not limited to as I've mentioned insurance fraud, payroll fraud and bankruptcy fraud. It also led to the discovery of the extortion schemes I've already mentioned. Maricopa County Recorder's Office has at least five appointments made by Adrian Vontes, our county recorder from 2017 to 2021 who are phantoms, non existent individuals. These phantom individuals hold positions related to election services. Further during the same period, the office has at least 15 individuals whose appointments were false and thereafter kept hidden from the public during the twenty twenty election cycle. The appointment documents for all of the above individuals have forged forged signatures, falsified clerical signatures, which means that the tracings from the sick from a signature stamp, and fake fake dates. These falsified notarizations were made by Britney. Said falsified clerical signature and date were made by Donna Charles. I'll be sharing examples of this in a few minutes. In addition to election fraud, manipulation of the city and county databases include falsified default judgments, restitution orders, child custodyals and SARA's, as I've explained. Rivi and Donna have also been able to forge signatures of judges. Well, that summarizes the findings, at least those that pertain to you guys, of the book. But as I stated, the parameters of our investigation did not originally include election fraud. It's important to note that we do not have we we do not represent any political candidate or party or political action committee or any similar organization or individual. Mr. Thaler himself did not vote in 2022. He's not donated to any party. In November 2019, Britney approached Mr. Thaler and his colleague, Attorney John J. Stanley, with a request that they obtain for her with second protection. However, prior to obtaining approval, Britney was threatened in such a manner that she broke off direct communications without this. She has continued to surreptitiously provide evidence concerning these criminal activities. In October 2020, shortly before the November, Thaler was provided certain information. First was evidence that the Maricopa County computer database had been designed with various backdoor, allowing us outsiders to infiltrate it and to change the data. Second was the identities of bribed recipients, which included elected officials. And third, on 10/26/2020, Thaler's team discovered approximately 25,000 falsified of ballots being held with a significant sum of cash in a private residence in Mesa rented to Donna Chubbets. I do have a declaration in your packet that you can provide with detailing that. The investigation into election fraud is not limited to the state of Arizona. However, where Arizona is concerned, a plethora of individuals are implicated in the fraud, including elected and appointed officials, and as I've already mentioned, run back election services, the service provider to Maricopa County. The Maricopa County database has absolutely no integrity whatsoever. Let me explain. I chose to to invest to share with you my investigation of Katie Hobbs by way of example. But for purposes of this exercise, I could have pretty much selected any of those individuals that are listed on your page in your packets on page 70. I apologize if you don't have a page, but you'll see that it's near the end of the book. When our investigation leads to a name of a particular individual that we suspect to be involved in this racketeering activity in these racketeering activities, we we research their deeds of trust, which are recorded with the Maricopa County Recorder's Office and Publicly available. If there is an unusual amount of deeds of trust for that individual, and if there are deeds of trust for the same or similar named individual, or with multiple varying middle initials, we dig further. In the case of Caitlin Hobbs, please look at page 17 through 15 in your packet. I have shared with you 11 deeds of trust in the name of Kathleen M. Hobbs and Patrick T. Goodman. However, when we looked at the deeds in your packet on page 51 to 64, these have similar names, but we've discovered that they too were compromised. In some cases, we review deeds of trust filed under a spouse or a child, a parent or business partner, just depending on the specific circumstances. When the writings match that of Britney and Donna, we can determine that the note and when when we can determine that the notarization is fraudulent and or the buyer and or the seller signatures are fake, we know the deed is fraudulent. If you look at the deeds for Kathleen M. Hobbs and Patrick D. Goodman, I have provided you with the first signed pages of the deeds, and on page 65 is a comparison of just the signatures, And the pages with some red writing in them. For the buyers of each deed. This page will speak for itself. There's obviously some inconsistencies with the signatures. For Kathleen and for Patrick. This is apparent to anyone with any naked eye, but we have verified all our findings with a qualified forensic document expert who represents the state of California. Now let's look at the notaries who signed these deeds. Again, I provided you with a page of all the notary signatures on page 66. Next to this, I provided you with references to pages from our reports that we have from our qualified forensic document expert, where similar writings have been verified as either being that of Britney or Donna. The only other option is in some situations there are graphics or traces of other signatures where we can verify that an impostor has attempted to copy an original signature. Linda Mitchell's reports are lengthy. We have in over we have over 500 pages in reports. So unfortunately, unless I was going to walk in here with stacks like this for each of you, I could not bring those and give you each a copy, but they will be available to you if anyone wants to email me a request. On page 67, I've demonstrated some other writings on the deeds, which have also matched with pages from our forensic reports. What I've provided you on page 68 to 69 is where we delve even further. When you look at the deeds, you will notice that there is a title company and a mortgage company. As is pretty evident, the writings on the document filed with the Corporation Commission for these entities is also backed up Britney or Don. To summarize our findings with regards to Governor Haley Hobbs, taking into account just those documents in her name are as follows: their nine deeds of trust in the name of Kathleen M. Hobbs and Patrick T. Husband and wife from 1997 to 2021, which essentially means that they either purchased or refinanced a home every two to three years, which is not most not statistically statistically not likely, not improbable, but even more so when six of the nine deeds of trust were reported within a ten year period between '97 and 2007, the concentration of which is between 2001 and 2005, which was during miss Hobbs' tenure at Emerge Arizona. When researching the documents filed with the corporation commission for Emerge Arizona, we found that these documents evidence hand signing and hand printing that belongs to Britney and or Donovan. If one were to guess, and this is just a guess on our part, Emerge Arizona seems to have been formed as a medium to attract women interested in politics and bribe them through the proper scheme to adopt positions of power and to further the goals and objectives of the cartel. Most of these deeds have been fraudulently notarized, meaning that one or multiple parties' names in the transaction are either not present or do not exist at all. In some, if not all cases, it's evident by page 65 in your packet. Ms. Hubb's and Mr. Goodman's signatures are clearly inconsistent, indicating that the majority of the deeds were cleared by a different individual, who are attempting to copy Hubbs' and Goodman's signatures, particularly on the deeds where the notarizations have been found on file. We then research the title companies and the mortgage companies on these deeds of trust. Some of these do not or have never existed. Some do not even exist in Arizona. Speaker 2: Miss Berger, can I ask you to please, submit one of these packets to the pages so we can get this put in the record? And then we we are gonna have to, tighten this up and keep it germane to election so we don't exceed the scope of our. Sure. Speaker 0: Would you like me to finish with my partitions with that? How much more do you have? Okay. Me finish on this example and then I will go on to more of the election code. Okay, so when I said we research the title companies and the mortgage companies, some do not even exist. What can we conclude by these discoveries? The purpose of having a fake deal of trust is to move cash without it being traceable. A phony mortgage company provides a phony mortgage as the one primary method about which cash is moved invisibly. There are basically only three reasons to create a fake deal of trust. If the buyer does not exist, then the mortgage serves as a means of laundering money. If the buyer does exist, then the mortgage is used to provide the owner of the deed money that is untraceable. And when the person resides in the location of the deed, then that's even more further proof that money is being provided that is untraceable. I can take you through example after example, but in the interest of time, since at least 2004, ballot counts have been tampered with. Our county's current computer database, which was built between 2014 and 2015, has been and continues to be infiltrated and hacked. Its architects specifically designed the system with multiple backdoor entry points. These points permit the uploading of falsified documents and the removal of genuine documents from the client system. We have seen Brittany access the database and have an eyewitness to testify for that. Over the past fifteen years Britney has used her access to load falsified judgments and so on. Beginning in 2017 the accent prints have been used to change vote totals and thereon election results. Illegal transfers have been made and provided to run back. And Jeff Anderson, the phony deeds used in the scheme to move money to candidates are created by Britney. For profit and nonprofit packs are also created by Britney and used to move money for candidates. During the twenty two election, ballot scanners, printers at seventy seventy precincts suffered changes to their printer settings despite being tested the night before the election. The changes in those settings were made through computer infiltration. Not manually or by some never before seen error. The uncontrollable ballots were placed in Box 3 and allegedly driven to run back. Witness information provided on October 2020 confirms that more than 100,000 filed, filled in ballots, and more than 13,000,000 were identified by some of our investigators in two unmarked rental cars. These vans were loaded with the ballots and cash at a private residence in Mesa, and driven to Runway's office. The Runway Company, as you know, is operated by Robert Runway. We have found deeds for Runway and Alison. So I was going to drive home the point, but instead I will move on. We have heard, okay, that's the the statistical improbabilities of an improbable outcome with respect to the November. Let's look at Andre Fontes and Steven Ripen for Maricopa County. Ripen's win win was statistically impossible. To win Are are you referring to Steven Richer? Richer. Sorry. My apologies. Vontes is a Democrat and was the incumbent. Percentages for Biden Biden, Sinema, and Caddy ran up at approximately a 2.5% margin in the county against all the the against their opponents. Richard won by approximately 6,000 votes. This means that 50,000 individuals who voted for the Democratic ticket across the board had to choose the Republican candidate for reporter against an incumbent who never suffered in scandal. Never happened. This was a planned loss. Hobbs would receive a democratic nomination for governor, and Frantes would run for secretary of state to replace Hobbs. The strategy appeared to have been planned. I have shown you that both Hobbs and Frantes have what we call Britney Deeds, evidencing a strong likelihood that they are bribe recipients. Now, it may seem obvious, but I do feel that it's necessary to explain nonetheless. Given that Arizona is a border state and drug smuggling and human trafficking is a billion dollar business, it would appear that having our elected and appointed officials ensure that the cartel enterprise remain open for goodness will be paramount. The cartel invests substantially to ensure that the right people are in key positions. So as to further their objectives. The fix for 2020 and for 2022 started in 2017, with appointment to election positions of individuals being bribed through the mortgage thing, and through monies being laundered by the appointment of phantom individuals. The problems with these documents are many. If you look at your pages seventy one and seventy six, the recorded appointments from Fantas, which were notarized by a Jessica York. First, the handwriting and hand printing of Jessica York have been identified as belonging to Brittany by a forensic document expert. Secondly, York signatures are the same handwriting, but not the same style, And that change of style exists even when the documents were allegedly signed on the same day. You can see the June 4 documents. The December 9 date and the clerk handwriting matches done. The signature of the clerk at the bottom is actually a tracing of a signature stamp. The time between the signature and the notarization and alleged execution of the clerk and thereafter the reported date, evidence forgery. Normally, it's a two to three turnaround time. These took multiple months, and all were allegedly clerk executed and reported after the election certification. I have example after example where things do not add up. In addition to state representatives, there are three of the five Maricopa County supervisors have also reported documents evidencing the acceptance of bribes. Further, we've investigated pacts relating to state office holders and dark money transactions relating to said pacts. From late twenty eighteen to 2022, a significant number of questionable real estate transactions were facilitated by several law firms, including partners at Perkins Quarry. Mister Thaler would be here himself presenting this information. But there'd been multiple attempts on his life. Thaler was driving from Arizona to California when suddenly he lost control of his vehicle. Upon investigation, it was discovered that his tyre was purposefully slashed by a straight edge knife, about four to six inches. The cut was made at such a location on the other side of the tyre where the tyre would not lose air but instead would degrade to a point causing catastrophic failure, most likely at high speed. Again, declaration is included in your packet. The declaration, the reason I mentioned this, and the only reason I mentioned this, is because a similar attempt was made on the life of Carrie Lake's daughter during her campaign. To date, six attempts have been made on Bayless North. In Arizona, public officials accepting bribes include members of the legislature, the executive branches of the state government, more than two dozen judges on the Maricopa County Superior Court, at least two judges in the city of Mesa Court, at least one judge in the town of Gilbert, the mayor of Mesa, five members of Mesa City Council, several police Speaker 3: Madam chair, point of order. This is not the appropriate place to be to be alleging. Speaker 2: We we do have a rule in this chamber that we cannot impugn the motives of other members as as explosive as that testimony was. But that is our that is our rule. Speaker 0: Okay. So what we're gonna do is this. I need you to wrap up in terms of impact to the election. Thank you. Even though I invest in covers multiple states, Baylor and IT have interviewed over 30 witnesses in Arizona. Several individuals in the public officials' list have operated with the investigation. The team has collected and reviewed more than 120,000 documents, as I've said. The immense data that we have collected will assist enforcement agencies investigating the election fraud. Further, the data we have collected and the connections we have found and the vast details of this entire investigation will lead enforcement agencies to those participating in the courts and will help you restore election integrity within our beautiful state. Thank you. Thank you. And my first question is, to whom have you given this data other than to us today? As we said, the report was given to Governor Doug Ducey in May 2022. So he has been made aware. As has, as I mentioned in my, my presentation, FBI, some of the other, attorney generals, especially in New Mexico and California. Thank you. Okay. Speaker 3: Madam chair, miss Breger, how was this given to mister Ducey? Is it by you personally? Speaker 0: No. No. It was not given by me personally. Was given by one of our team members. Next question. Yes. Representative Johnson. Yeah. Just chair. Yes. Attorney general. We do know that governor Dushi did share this with the attorney general at the times. How do you know that? Speaker 3: Yeah. How do you know that? Speaker 0: Because he shared that information with mister Taylor directly. But I personally have not given a charred Arizona attorney general yet. Speaker 3: Madam chair, miss Brigger, was mister Taylor the one that gave this to the governor? Speaker 0: No. Not directly because mister Taylor is not in Arizona. Speaker 3: So how would mister Thaler how would mister Thaler know that governor Ducey shared this with the attorney general's office? Speaker 0: Because the governor Ducey and mister Thaler were in contact. Next question, representative Jones. Madam chair, ma'am, thank you so much for coming. You're very brave in my opinion. My my question is and I I guess it's a question for clarity. How this is, in my opinion, related to the election is what you're stating is potentially many people, elected officials here, have potentially been bribed or blackmailed to get certain election results. And I think the people have the right to hear that because the people in Arizona right now crave truth. Is that am I Absolutely. Yes. You are. Absolutely. And that is exactly why I'm here today. I think that we have gone round and round and round with the in the concept of election integrity, but nobody is willing to actually speak the truth of how did our election get compromised And as in nuts and bolts, you know, what happened to actually compromise our elections and compromise integrity of our state? Madam chair again. Yes. Madam chair, missus Grigor. What may I ask what political party are you? Oh, excuse me, madam chair. I'm unaffiliated. Madam chair, follow-up. Madam chair, missus Berger, how long has it taken for this information to be compiled, and how many people worked on this team? Madam chair, this information was compiled over approximately three and a half, four years, and we have had approximately five to 10 people at any given time because it hasn't always been a consistent working on this investigation. Speaker 3: To that point, madam chair Go ahead. Miss Breger. Madam chair, miss Breger, when did you say this was presented to governor Ducey? Speaker 0: Madam chair. Go ahead. May 2022. Speaker 3: Thank you. Speaker 0: Any other questions? Speaker 3: Yes. Madam Chair and Ms. Brigger, would you provide a copy for the committee that has the pages annotated, It was very difficult to you kept referring to page numbers, but none of the pages have any page numbers. Speaker 0: Any other questions from the diets? Speaker 3: I have a question. Speaker 0: Go ahead, mister Bennett. Speaker 3: Madam chair, miss Breger, how was it that you were invited to address the committee today? By whom? Speaker 0: I was invited by a representative. Speaker 3: Thank you. Speaker 0: Any further questions? Thank you, miss Gregory. You're a brave woman. You're Thank very brave. You got my attention. Thank you, madam chair. Thank you. Madam chair, permission to play the constituent video. Affirmative.
Saved - January 7, 2026 at 2:48 AM
reSee.it AI Summary
I see new images from Candace Owens showing no blood or exit wound behind Charlie Kirk on assassination day. The "cord" is his necklace; the only visible blood is in his hand by the mic. This doesn’t illustrate a .30-06 injury 99% of the time, especially on that thin spot. More questions than answers.

@TheSCIF - The SCIF

NEW images courtesy of Candace Owens shows no blood or exit wound from the camera behind Charlie Kirk on the day of his assassination. The "cord" is his necklace, and the only visible blood is in his hand by his microphone. This does not demonstrate the damage a .30-06 caliber round would cause 99% of the time, especially on such a thin, weak, part of the human body. More questions than answers.

Saved - January 6, 2026 at 7:59 AM
reSee.it AI Summary
I recount that the Dominion CEO lied under oath, insisting the Senator doesn’t understand ethernet or LANs, then conceded they connect to the internet. A Dominion sales rep described modems and GSM chips in voting machines with 3G/4G, using AT&T, Verizon, T-Mobile, Sprint, and others worldwide for remote access. Witnesses claim remote fixes, ethernet cables on machines, staff touring centers as “Trusted Build Maintenance,” wiping logs legally required to be kept, misleading clerks about erased logs. This unbelievable claim, to me, says everything you need to know.

@TheSCIF - The SCIF

DOMINION CEO gets caught lying under oath and has to correct himself thinking the Senator doesn't understand what an ethernet cable or LAN line is and admit that they do connect to the internet. Dominion's own sales rep explain what modems and chips the voting machines and tabulators use, including, modems with GSM cell phone chips, 3G and 4G capabilities, uses all providers, like AT&T, Verizon, T-Mobile, Sprint, and every other special providers like in Puerto Rico and Mongolia for remote access. Multiple witnesses testify about Dominion connecting remotely to machines to "fix" things, ethernet cables coming out of all the machines, and multiple Dominion employees going around the country to voting centers saying they are part of the "Trusted Build Maintenance," wiping voting records that have to be preserved by law, and then attempted to convince the voting clerks that they erased the voting logs and not them. This is unbelievable and should tell you everything you need to know.

Video Transcript AI Summary
Speaker 0 notes that there were at least more than two of your direct employees and one indirect at the TCF center, up to nine, though no names are provided to avoid threats; they request clarification on each person’s responsibilities and roles during the process. Speaker 1 states backups were created by Tina Peters, Mesa County, Colorado county clerk. They are receiving information across the country that Dominion reps were going in under the guise of trusted build maintenance and wiping records. Under one dash 12 dash 69, those records by law have to be preserved. They caution not to blame staff, explaining a knee-jerk reaction by Dominion in Michigan to convince clerk staff they must have done something wrong. When discussing county liability, they emphasize listening to Mr. Lindbergh’s expert opinion. Speaker 0 asks about Ethernet access for adjudicators and tabulators in the TCF Center. Speaker 2 responds that the devices are not connected to the Internet; they are designed to be completely standalone and connected locally in a local area network separate from the Internet. Speaker 3 explains the vehicle for transmission from the ICP is a cellular modem, which can be configured in a VPN; Chicago and Cook County work with Verizon to secure that network, implying the same capabilities are available elsewhere. They note that multiple wireless chipsets/modems are supported, depending on jurisdiction preferences and network compatibility. Speaker 4 adds that some jurisdictions use a 3G modem (GSM) but can support multiple modem varieties, including latest 4G/5G standards. They confirm applicability across different networks (Verizon, AT&T, Sprint). They mention transmitting from the ICP in Mongolia, indicating no network limitations. In Puerto Rico, three vendors are used (Claro, AT&T, and T-Mobile) due to incomplete island coverage. Speaker 0 asks again about Ethernet setup to join the LAN. Speaker 5 paraphrases a claim that Dominion could fix the problem, implying Dominion can communicate with the device. Speaker 6 explains, by analogy to Apple remote support, that permission was given to take over the device to reprogram it from Adams Park to SSO 2 A and B at West Balding Drive Elementary. Speaker 7 shares observations from the TCF Center on the third and fourth, noting irregularities on election day. Randy Bishop, who owns radio stations and is IT-savvy, showed him high-speed scanners and tabulators with Ethernet lines running out of the tabulators, all bundled together and connected to routers and a main computer, which he says are connected to the Internet and that such connectivity is illegal and should not happen because it opens them to hacking. Speaker 2 reiterates that the computers in the local area network are connected via an RJ45 connector.
Full Transcript
Speaker 0: I also have been told that there were at least there were more than two of your direct employees and and and one indirect, that there were as many as nine in the TCF center. I don't know that that's necessarily a problem, but that's the information that I have in front of me. I'm not going to give any names in in the interest of, you know, all the issues that you described earlier. I certainly would prefer that people remain protected and not threatened. But I would be interested in having that information if if there's any any mistake and then what their their roles were in the process, right? What what was what were their responsibilities while they were there? Speaker 1: We know that backups were created by Tina Peters, who's a county clerk in Mesa County, Colorado. And we started getting information across the country of Dominion Reps going in under the guise of this trusted build maintenance. And they were wiping records. So whether it's June, July, or February, we're getting more information right now as we're here. The fact of the matter is under one dash 12 dash 69, those records by law have to be preserved. And now we've got people that are questioning themselves, talking up to a mistake. And I want to caution you all to not blame yourselves because that was the knee jerk reaction dominion in Michigan. They wanted to convince the clerk staff that they must have done something wrong. Yep. And when we're talking about county liability, is very, very important to listen to Mr. Lindbergh's expert opinion. Speaker 0: And then your equipment, your adjudicators and your tabulators in the TCF, do they have Ethernet access? Speaker 2: No. They're they're not connect as I said, they're not connected to the Internet. They're designed to be completely standalone system. They are connected locally in a local area network designed to be separate from the Internet. Speaker 3: What is the vehicle for the transmission from the ICP? Is it cellular modem versus VPN? Well, it is a cellular modem that be can be configured in a VPN. Right? And we currently in Chicago and Cook County, we work with Verizon to, secure that network. So we would have the same capabilities here. What wireless chipset slash modem does the hardware have? We support a variety. So, it's really up to the jurisdictions what technology they wanna use, what's compatible with their with their networks. Speaker 4: Currently, in some jurisdictions, we're using, basically a modem that is a three d modem, GSM, but we can support multiple varieties of modem that can be Speaker 3: Including including latest 14 standards as well. Okay. So the answer is the next question. Is it three g or four g? Verizon, AT, or T, or Sprint? I'm assuming all. Yeah. All all networks. Right. Just to point a bit. Yeah. I mean, we actually transmit from the ICP in Mongolia as well, so, we're not limited in networks. Speaker 4: And in Puerto Rico, there's three vendors because the island is not covered by any by any of the vendors completely. So we use three different cellular vendors for some ICPs with this vendor, Claro, AT and T, and T Mobile, I think, in the different parts of the app. Speaker 0: Then they don't have an Ethernet set up in order to be a part of the LAN or Ethernet for any other reason? Speaker 5: What I thought I heard you say is that you were able to contact Dominion, they were able to fix the problem. That indicates to me that somehow they're able to communicate with the device that you have. Speaker 6: Yes, They were. And to give you an example, the way I am not a tech person but the best way I can explain it to you is when something happens with my phone that I can't I have an iPhone or something happens with my Apple computer where I need additional assistance with that. I call up Apple and I say, know, this is what's happening and they say, do I have permission to take over your computer? And of course, I give them the permission to do that because I want it fixed. That was the exact same thing. I had to give them permission to take over my pull pad so that they could reprogram it from Adams Park to, SSO 2 A And B, which is at West Balding Drive Elementary. Speaker 7: Two of the main observations that I witnessed at the TCF Center on both the third and the fourth when I was there, because I witnessed so many irregularities when I was there on election day on the third. Immediately upon walking in, I I ran into Randy Bishop. And Randy owns radio stations. He he's very IT savvy. He said, Brian, I was here all night. What what's going on here is unbelievable. He said, let me show you something right now before I leave. So he walked me over to the high speed scanners and tabulators and he said, see all these Ethernet lines running out of the, tabulators? They're all bundled together as they accumulate and then they're all connected to these routers and then they all go to the main, computer. He said these are all hooked into the Internet, and that is illegal, and it should not be happening because it opens them up to hacking. Speaker 2: Oh, I I sorry. Yes. They do. So to connect the computers in a local area network, they are connected through, I believe, an RJ45 connector.
Saved - January 5, 2026 at 4:16 PM
reSee.it AI Summary
I report that the Kansas AG claims 130,000–280,000 completed ballots for the 2020 election were shipped from Bethpage, NY to Lancaster, PA. A USPS subcontractor says he carried completed ballots from New York to Pennsylvania and questioned why, noting he spoke up. He asserts that completed ballots should never cross state lines, and says this happened nationwide.

@TheSCIF - The SCIF

Kansas AG states that 130,000 to 280,000 completed ballots for the 2020 ELECTION were shipped from Bethpage NY to Lancaster Pennsylvania. USPS subcontractor said he thought he was helping in the 2020 Presidential Election until he asked himself, "Why would I take completed ballots from one state to another?" "I was driving COMPLETED BALLOTS from New York to Pennsylvania. I didn’t know why, so I decided to speak up." Completed election ballots should NEVER cross state lines, from one state to another. This happened all over the country.

Video Transcript AI Summary
- The evidence, through eyewitness testimony corroborated by others, shows that a 130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared. - On October 21, there was a series of unusual events that cannot be a coincidence. I know I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania. At first, I didn't think it was a big deal. In fact, I thought it was really awesome. I was like, sweet. I'm doing something for the presidential race. You know? This is cool. But as things became weirder, I got to thinking and wondered why I was driving complete ballots from New York to Pennsylvania. I didn't know why, so I decided to speak up. And that's what I'm doing today. - It could be a 144 to over, to a quarter million ballots. Part of our developing investigation indicates that Jesse wasn't alone. There was a number, as in like a bunch of different trucks which engaged in this. So when you think about the magnitude of potential votes showing up the night of the election after midnight, you have to have an artifact. So if you eliminate the impossible with all things being equal, whatever remains must be the truth. The truth is ballot showed up. They were counted. They do not match necessarily the records of who should have voted. In some instances, the stats don't add up, and we continue to analyze that. - With that said, I believe beyond a shadow of a doubt, we have evidence of a massive transfer of completed curated ballots ready to be injected into counting centers.
Full Transcript
Speaker 0: This evidence demonstrates, and it's through eyewitness testimony that's been corroborated by others through their eyewitness statements, that a 130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared. Speaker 1: What happened on October 21 was a series of unusual events that cannot be a coincidence. I know I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania. At first, I didn't think it was a big deal. In fact, I thought it was really awesome. I was I really did. I was like, sweet. I'm doing something for the presidential race. You know? This is cool. But as things became weirder, I got to thinking and wondered why I was driving complete ballots from New York to Pennsylvania. I didn't know I didn't know why, so I decided to speak up. And that's what I'm doing today. Speaker 2: It could be a 144 to over, to a quarter million ballots. Let me tell you a little secret. Part of our developing investigation indicates that Jesse wasn't alone. There was a number, as in like a bunch of different trucks which engaged in this. So when you think about the magnitude of potential votes showing up the night of the election after midnight, you have to have an artifact. So if you eliminate the impossible with all things being equal, whatever remains must be the truth. The truth is ballot showed up. They were counted. They do not match necessarily the records of who should have voted. In some instances, the the stats don't add up, and we continue to analyze that. With that said, I believe beyond a shadow of a doubt, we have evidence of a massive transfer of of completed curated ballots ready to be injected into counting centers.
Saved - January 4, 2026 at 8:17 PM
reSee.it AI Summary
I claim that Obama and the intelligence community lead a plan to infiltrate the U.S. and the presidency, destined to destroy the United States, one institution at a time. He wasn’t for America or its people; he was against them and the Constitution itself.

@TheSCIF - The SCIF

All roads lead to Obama and the intelligence community. Raised by elites, and groomed by intelligence, not only to infiltrate the United States and the presidential seat of power, but to destroy the United States, one institution at a time. He was never for America or its people. He was against them and the Constitution itself.

Video Transcript AI Summary
The transcript covers a broad set of interwoven claims about global health security, intelligence operations, political conspiracies, and alleged CIA influence on U.S. leadership. Key points include: - Pandemic preparedness and global infrastructure: There is discussion that an airborne, deadly disease could emerge, and to deal with it effectively we must put in place infrastructure globally and domestically to see, isolate, and respond quickly. The investment is framed as a smart, long-term insurance against future flu strains like the Spanish flu, especially in a globalized world. - CIA and presidency dynamics: The day after an election, the CIA director allegedly authorizes a president-elect to begin receiving a President’s Daily Brief (PDB) and uses the briefing to “suck him in,” presenting impressive can-dos that shape the new president’s perceptions and questions. This is described as psychological profiling and manipulation, with the CIA using long-standing methods to influence a president and government direction. - Allegations of a covert cabal influencing U.S. institutions: The conversation suggests a cabal has aimed to destroy U.S. institutions from within, including defunding the military and ordering actions that undermine allies while aiding enemies. This cabal allegedly includes control over the FBI, DOJ, and the presidency, culminated in the appointment of James Comey to head the FBI, portrayed as a “cardinal” with ties to the Clinton Foundation and as part of broader cabal activity. - 2008–2011 FBI and political corruption narrative: An asset described as a high-level foreign agent allegedly influenced U.S. politics and was connected to multiple intelligence services, with claims about his role in internal U.S. political manipulation. The rise of a president referred to as “Renegade,” identified as Barry Sartaro (Barry Soetoro), is described as part of the cabal’s plan to destabilize the United States from within, including military demoralization and misdirection. - Barack Obama conspiracy theories: The dialogue asserts that Barack Obama’s origins and identity have been manipulated for political purposes, including claims about a forged birth certificate, ongoing questions about birth location, and various individuals connected to Hawaii’s health department and local authorities providing or denying birth certificate verification. References include Loretta Fuddy and investigations into Obama’s birth details, with assertions that Obama’s name and identity were manipulated in Indonesia (Barry Soetoro) and that his family connections tie to CIA-backed operations in Asia. - Indonesia coup and CIA involvement: The conversation links Obama’s family to CIA-backed activities in Indonesia, including the overthrow of Sukarno and the rise of Suharto, with relatives described as having roles in money channels and death squads. The narrative asserts that Lolo Soetoro acted in intelligence-adjacent roles and that Obama’s grandmother helped channel CIA funds in the region. - Claims about CIA media manipulation and “MK Ultra” style operations: The speakers reference Operation Mockingbird, MK Ultra, and other CIA operations as public knowledge used to undermine the American people. They suggest continued silencing and manipulation by those operations. - Kill lists and drone warfare under the Obama administration: The transcript alleges that John Brennan led “Tuesday morning kill list” meetings starting in 2009, with drones and targeted killings used to eliminate designated individuals, and asserts confidence that Obama’s administration excelled at deploying missile strikes and other covert actions, contrasted with the possibility of ongoing use by subsequent administrations. - Recurrent thread of distrust in institutions: Across pandemic planning, birth certificate controversy, foreign influence, CIA cabal theories, and drone warfare, the overarching theme is distrust of established institutions and assertion of deep, planned manipulation by covert actors.
Full Transcript
Speaker 0: Nobody knew there'd be a pandemic or an epidemic of this proportion. Speaker 1: There may and likely will come a time in which we have both an airborne disease that is deadly. And in order for us to deal with that effectively, we have to put in place an infrastructure, not just here at home, but globally, that allows us to see it quickly, isolate it quickly, respond to it quickly. So that if and when a new strain of flu like the Spanish flu crops up five years from now or a decade from now, we've made the investment, and we're further along to be able to catch it. It is a smart investment for us to make. It's not just insurance. It is knowing that down the road, we're gonna continue to have problems like this, particularly in a globalized world. Speaker 2: The day after an election, the director of the CIA authorizes a president-elect to begin receiving a PDB, a president's daily brief. And so the day after the election, they go with this 16 page document and they say, Mr. President-elect, wait till you see the cool things we're doing all around the world. And they've sucked him in. They made him one of the guys. And then we get the feedback at the CIA. Oh, the president loved this. The president had a follow-up question on that. Oh, the president said, oh my God, when he read this. Speaker 3: It almost sounds Speaker 4: like they're psychologically profiling the president. Speaker 5: Oh, I think Speaker 2: that's exactly what they do. Speaker 4: And so they use the tools that they have employed for decades to subvert foreign governments, to subvert their own government. Speaker 6: In 2008, something unbelievable happened for us in the FBI. We were getting lots of rumors about this high level asset that worked for several intelligence agencies at the same time. He worked for the Saudi intelligence service. He worked for the CIA, and he was being developed as a political asset in Chicago, Illinois. He was not even a United States citizen, but it was said that he was a student visa and that he was a a national from another country. In 2008, everyone in the intelligence structure found out who he was. It was this individual whose name I don't like to say, who became president in 2008 of The United States. Speaker 1: And I will faithfully execute. Speaker 4: The office of president of the United States. Speaker 1: The office of president of the United States. Speaker 6: One of his code names was Renegade. His real name was Barry Sartaro, but, he adopted a different name, for his political career. When they ran him for president, the cabal, basically, this was the culmination of so many of their plans for so many years. His mission was to destroy The United States from within, one institution at a time. One of the things he did, of course, was he he defunded our military. He brought down he brought down, the resources that they got. But then he ordered our military in many, many instances and in various theaters to attack our allies and to defend and supply and help our enemies. That's exactly how he created ICES. He would say publicly that the military were gonna bomb our our enemies, but then he would have the military actually bomb enemies of ISIS, our allies. He gave ISIS funding and equipment by basically ordering our military to take equipment into a certain theater and then abandon it. And the commanders would say, that's ridiculous. We'd just be handing that stuff over to ISIS. And the president's office would say, don't question orders. Just follow your orders. And that was very common. That happened so many times that it demoralized our military. And, basically, it took their heart away. It was just it was an awful, awful thing. And that whirlwind just got bigger and bigger and affected the lives of so many FBI agents with integrity, people at DOJ with integrity, that just went through everything in the American government up to and including when Renegade appointed James Comey to be director of the FBI. He was a he was a pretty well known, bagman for the Clinton Foundation. He had been in many places where investigations, against the Clinton cartel had been reduced or had been had been disappeared completely. And he was brought in to be the director of the FBI for the same purpose. We called him the cardinal, and he was named after the, the cardinal Richelieu from the time of Louis the fourteenth, who was a well known cabal agent who pretended to be religious, a religious authority, but all he wanted was to amass power. Comey was a person who had this theater of being a very holy person, a Boy Scout whose integrity was above reproach. And meanwhile, he was he was quietly a cabal agent in bed with the with the Clinton Foundation at all times. You know, as I saw things getting worse and worse with with Renegade and things that Renegade was doing, I decided it was time for me to retire from the FBI. JFK said, I'm gonna take CIA and break them into a thousand pieces and scatter them to the winds. These agencies have only gotten worse and worse. There's been no accountability. These operations that they have run against the American people are completely public. The stuff is in the public domain. It's known. Operation Northwoods that the CIA did against the American people. Operation Mockingbird to use elements in the mainstream media. MK Ultra. Speaker 7: Was the Kennedy assassination the start of a long form coup against the constitution of The United States by a network of criminal syndicates? Is that coup still trying to play itself out today? Has the mainstream media been complicit in covering up and protecting the groups behind this conspiracy? Speaker 6: Whenever the cabal has a successful project, it creates permutations into many other areas and creates more corruption. Like the JFK assassination spiraled out into many other assassinations that were also incredibly successful. Well, in the case of Renegade, the fact that they were able to get him into office and they were able to get him going with great momentum destroying American institutions. That spiraled into this huge tornado of corruption. Speaker 0: And I just say very simply, why doesn't he show his birth certificate? Why has he spent over $2,000,000 in legal fees to keep this quiet and to keep this silent? When I listened today to the tape of the grandmother, and she was saying he was born essentially in Kenya, and then all of a sudden, don't forget, this is when Barack Obama was hot as a pistol because it looked like he was gonna get the nomination. And there are a lot of people, a lot of handlers in there. And all of a sudden, hear people all over the room, no. No. No. He was born in Hawaii. He was born in Hawaii. Speaker 8: We ask you to bless this day. Bless everybody in this group. We are here with a family who have, been the closest people to mama. And I'm sure the news must have reached his grandson and his family, The former president Barack Obama. With this family, we share the loss of a great great grandmother, a great mother, a great Kenyan. Doctor Speaker 9: Chiyome Fukino is the former director of the Hawaii Department of Health and a devoted Republican. Until now, she had not talked on camera about this topic. Speaker 10: As a Republican member of Speaker 9: the last Republican governor of Hawaii, Linda Lingle's cabinet, do you have any doubt that Barack Obama was born in The United States? Speaker 11: Absolutely not. I have no doubt. Speaker 9: She found the original Obama birth certificate stored in a vault in the Department of Health Building. And what did it tell you? Speaker 10: Was it authentic? Was he born here in Speaker 9: the state of Hawaii? Speaker 11: It was absolutely authentic. He was absolutely born here in the state of Hawaii. Speaker 9: Barack Obama not only has the same proof of birth as millions of other Hawaiians, he also has the current Hawaii governor's memories of him as a baby. He saw when he was an infant. Oh, sure. Of course. Speaker 5: Some people said, ah, he has a more birth certificate. Well, first of all, it's true. I'm not American. Yeah. I was not born in Hawaii. I wasn't born in The United States. Come from Kenya. If that wasn't true, then somebody named Barack Hussein Obama, from Kenya, from Africa, would not be elected president of The United States. Speaker 11: When we took our trip to Africa and visited his home country in Kenya, when we took our trip to Africa and visited his home country in Kenya. Speaker 1: I happen to know that my approval ratings are still very high in the country of my birth. Speaker 3: Who is his real family? Well, we're not ready for that discussion. Okay. So we have 2011, Fadi, procuring, I'll say this, falsified forged birth certificate. In 2012, she's providing verifications. She's sitting there probably hoping against all hope that nobody gets, to look at the merits of this case because she would probably be brought in front of the court. Speaker 9: Loretta Fuddy. That's right. The same Loretta Fuddy, the Hawaii state health director who approved the release of Obama's long form birth certificate and who recently and mysteriously died in a plane crash off the coast of Molokai. Speaker 11: Finally, the Maui police issued a statement about what was the ultimate cause of death. And they said that Loretta Buddy died as a result of cardiac arrhythmia due to stress induced by stress, and they deemed this incident to be an accident. Well, her brother, Lewis Buddy, immediately said to the press, she had no history of health problems. She was healthy, and she had no history of heart problems. There's actually the footage of the plane crash. And what you see is everybody on that plane was calm. Nobody was panicking. Nobody was screaming. Nobody was trampling on one another. And then while they're in the water, everybody is calm. And why shouldn't they be calm? Because there's a plane hovering up up ahead, basically reassuring them that they're about to be rescued. So why would Loretta Fadi, who has nerves of steel generally, suffer such a massive panic attack or an irregular heartbeat, whatever you wanna call it, because she's breaking up because she's about to die when it's clear she's about to be rescued. Speaker 12: His legal name in Indonesia is Barry Soetoro as shown on this document recorded at the school he attended. It would have been unlawful in Indonesia to record any but his full legal name on this document. So as far as we know, to this day, in Indonesia, Barry Soetoro remains his legal name. Barry or Barak Hussein, if you will, attended a Catholic school in Indonesia, which was required by law to instruct him in the religion of Islam. Speaker 1: As a boy, I spent several years in Indonesia and heard the call of the Azan at the break of dawn. Speaker 13: An exceptional orator promised for the disillusioned and change from the status quo. These are all what helped Barack Obama to become president two years ago, But now the reality seems to be something far from them. In what is being called a bombshell, investigative journalist Wayne Matson has revealed in a report that in 1983, president Obama worked for the Business International Corporation, which was a CIA front. The company used to conduct seminars with the world's most powerful leaders as agents abroad with CIA espionage activities. Matson says this intelligence connection runs in Obama's family. Obama's maternal grandmother, Madeleine Dunham, was one of the first female vice presidents of the Bank of Hawaii in Honolulu. The report says this bank was also a CIA friend for funneling money to oppressive dictators and rulers such as former Indonesian president Suharto who came into power through a CIA backed coup. In the nineteen sixties, Obama's father had been selected by the leader of Kenyan African National Union, Tom Mboya. CIA files indicate that Mboya was an important agent of influence for the agency. The airlift was a CIA operation to train future agents of influence in Africa, which was a battleground between The US, The Soviet Union, and China for influence. As a Kenyan student in the University of Hawaii, Obama's father who was already married and had a child with another on the way in Kenya met Obama's mother, Ann Dunham, in a Russian class in Hawaii. This meeting eventually led to their marriage. Barack Obama's mother, Dunham, was divorced when his son was four. She married Lolo Satoro after meeting him at the East West Center at the University of Hawaii, the center affiliated with CIA activities in the Asia Pacific region. She worked for Tim Geithner's father, Peter, at the Ford Foundation, widely believed to be a CIA front. Speaker 14: The reason this is important, getting back to his mother, his mother goes village to village as a quote unquote anthropologist to find out who the communists are in the village so they could be executed. And she's she's an operative. She that's what she's doing. That's that's where the blood is on the hands of the family of Obama. And he refuses to acknowledge any activity about his mother during that time period, other than that she was an anthropologist and, you know, going through these villages, which is far from true. This this coup this coup is one of the most underreported American backed CIA coups in American history with the highest body count of any coup in American history, the coup in Indonesia of replacing Sukarno with Suharto. Speaker 15: Number 44 and the one before that, 43, Bush and Obama. Well, there are pictures of Bush with his arm around eight year old Barack Obama because his stepdaddy, adopted daddy, Lolo Sotoro, had done a lifetime where the business with the Bushes. Wow. Uncle George Herbert Walker, after whom George Herbert Walker Bush, Bush one president, was named, founded Halliburton in 1946 in Oklahoma. And Lolo Sotoro had been internationally executive vice president for Standard Oil. Speaker 6: There there was talk of him being a CIA assassin. Speaker 15: Oh, well, yeah. See, he ran the death squads for the Indonesian army. On his own call, anyone could be assassinated. So when George Herbert Walker Bush became head of the CIA under the Ford administration, he just got with his old buddy in the oil business, Lolo Sotoro, and pulled off the hits. See, Barack's grandmother has been acknowledged as being the woman that operated the channels through which CIA money went to the Southwest Pacific. So she introduced her daughter who had just had Barry Barack to Lolo Sotoro and they got married and Lolo Sotoro adopted Barack Obama. The name was changed to Barry Sotoro. Mhmm. Now when he went to high school in Hawaii, I know about that high school. I almost sent my oldest son to it. I could afford it, but I didn't think he observed deserved it. Speaker 13: Now Madsen is questioning that if Barack Obama, as a suspected, was subjected to the CIA project, either by brainwashing or being part of it, then it'll become problematic for an American president. He says if Obama has been brainwashed, then he can be controlled. And if he was simply part of this project, then he can be bribed. Speaker 2: All these other ones who thought they were untouchable, now they're gonna have to answer for their actions. In the Obama administration, John Brennan had the Tuesday morning kill list meetings because the tech got sophisticated enough that you could just write up a list of people that you wanna kill that week, and you dish out the assignments. The teams go out. They kill everybody that's on the list, and then they meet next Tuesday and get that kill list. And you just do it week after week. Well, if you're not having to devote armies of targeting analysts to to finding these guys, if if your computers can find them just based on their, you know, email messaging, text messaging, whatever, metadata. There. Your job's easy. You just fire a missile from the drone or you drop a guy in that does a close in shot, and then you get back on the helicopter and fly home. I hate to sound cynical like that, but that's just the way it is. Speaker 16: I think that's, just calling it how it is. What, what year or years was that was Brennan doing that Tuesday morning kill list? Speaker 2: He started in o nine and kept it going. I have no idea if Donald Trump kept it or Joe Biden kept it or revived it. But it was something that they were very proud of in the Obama administration. They were just going out whacking everybody. Speaker 16: Yeah. Well, no nobody dropped more missiles from drones than Obama did. Speaker 2: No. Nobody.
Saved - January 3, 2026 at 9:50 PM
reSee.it AI Summary
I note Pennsylvania received almost a million more mail-in ballots than sent out, and a witness testified non-election personnel uploaded USB devices to voting machines in 2020. Allegheny and Philadelphia got 2,589,242 million mail-in ballots when only 1,823,148 million were sent. After the anomaly, the 2.5 million figure was wiped from Philadelphia’s site 22 days after the election. The “most secure election in history”… what a joke.

@TheSCIF - The SCIF

Pennsylvania receives back almost a MILLION more MAIL-IN ballots than it sent out, and witness testifies that non-election personnel uploading USB devices to voting machines over 24x during the 2020 ELECTION. Allegheny, and Philadelphia County, Pennsylvania received back 2,589,242 million mail-in ballots, when it only sent out 1,823,148 million mail-in ballots. After this anomaly and obvious fraud was made public, the 2.5 million mail-in ballot figure was wiped 22 days after the election from Philadelphia's official website. The most secure election in history... What a joke.

Saved - January 3, 2026 at 12:15 PM
reSee.it AI Summary
I claim USAID funded both the Wuhan Lab gain-of-function research and SMARTMATIC. I ask if it’s a coincidence that “covid” appeared near the 2020 election. I assert left-wing billionaires, NGOs, and USAID funded the color revolutions in America. I conclude USAID funded both alleged election-rigging tech and a weaponized virus to distract and depopulate. It’s all connected, and I’m outraged.

@TheSCIF - The SCIF

USAID was funding BOTH the WUHAN Lab gain-of-function research & SMARTMATIC Election Systems. Do you think it was a coincidence that "covid" came out right around the 2020 election? Coincidentally, the same left-wing billionaires, NGOs, and USAID also funded the 'NO KINGS' protest, aka, the color revolutions across America. This means that USAID was simultaneously funding BOTH the election-rigging technology that would steal the 2020 election WHILE manufacturing and releasing a WEAPONIZED VIRUS that would distract the world from the theft of said election while depopulating the planet at the same time. It's all connected. Everything is out in the open and face-up on the table... I don't even know what to say anymore. You can't be this naive anymore. We can't live under this fraud and tyranny anymore. Americans are suffering, and everyone else is robbing you blind getting filthy rich.

Saved - January 2, 2026 at 4:36 AM
reSee.it AI Summary
I report that a Minnesota NGO, 99% state-funded, is accused of election fraud, with alleged collusion among state representatives like Walz and Omar and the Somali community. It claims billions are stolen through fake daycares, plus massive election and voter registration fraud caught on video, with some pleading guilty. It calls this a nationwide criminal enterprise and demands harsher punishments in 2026.

@TheSCIF - The SCIF

Minnesota NGO that is 99% taxpayer funded by state grants caught engaging in ELECTION FRAUD. It goes so much MUCH deeper... Minnesota NGOs and state representatives like Tim Walz and Ilhan Omar are colluding with the Somali community. They're not only stealing BILLIONS of taxpayer dollars through fake daycares, but are also committing MASSIVE ELECTION and VOTER REGISTRATION FRAUD, which was caught on video. Some already pleaded guilty. This is a massive criminal enterprise being run out of the state of Minnesota. Stealing from America and it's taxpaying citizens, to enrich themselves, their own country, and steal elections. These same schemes are happening NATIONWIDE. The punishments need to be more severe than the crimes. It's 2026, this is the year we say, "NO MORE!"

Video Transcript AI Summary
A foundation hired independent contractors to conduct voter registration. Two of the contractors were found guilty. The foundation, whose budget is 99% funded by state grants, did not participate in fraud, but hired people with state dollars who then used that to create fake voter registrations. Project Veritas exposed alleged ballot harvesting by supporters of Democrat representative Ilhan Omar and her allies in Minnesota. They claim paid workers illegally gathered absentee ballots from elderly Somali immigrants, with new video footage showing one operative bragging about collecting hundreds of ballots. The question raised is who is filling out the absentee ballots, with the people who work with Omar and other candidates allegedly working for them. The video notes, “Where do they pay the money? The minute we sign the thing, the election, that's really good thing.” The claim also states this is the brother of one of the city council members in that city. Observers described the report as very surprising and noted that an investigation would need to confirm all allegations. They highlighted concerns about mail-in ballots in a contentious election year and whether ballots arrive at their destination or if voters are influenced on how they fill them out, raising questions about ballot handling. The county attorney said the matter is illegal and that an investigation will proceed. The illegal part is ballot harvesting; portions of it are allowed in certain states where you can have that, but in this state, “you can take up to three for somebody else in.” That was 300. The investigation is ongoing.
Full Transcript
Speaker 0: These people, as news reports flagged, they admitted in some instances that they were paid by the voter registration. So that brings me to the to the point of this foundation. Clearly, they hired people as independent contractors. Two of them were found guilty. This group, I've done a deep dive on their 990s, 99% of their budget comes from state grants. So this is a group that the state is funding and that then went out and did these voter registrations and they participated. The foundation didn't participate in fraud, but they hired people with state dollars who then used that to, create fake voter registration. Speaker 1: This time, the investigative activist group has exposed alleged ballot harvesting by supporters of Democrat representative Ilhan Omar and her allies in Minnesota. Project Veritas claims paid workers have been illegally gathering absentee ballots from elderly Somali immigrants. A new video footage showing one operative bragging about collecting hundreds of ballots. Watch this. Who is the one filling out the absentee ballots? The people who work with, like, and Omar and other candidates work for them. Where do they pay the money? The the minute we sign the thing, the election, that's really good thing. Yeah. So the question raised of of ballot harvesting and understanding what that is in that video, that is the brother of one of the city council members there in that city. Speaker 2: It is a very surprising report that has come out. Obviously, an investigation would need to to confirm all of the allegations here. But when this is happening during such a contentious election year, and we have covered so many stories about the issues surrounding mail in ballots, whether or not they arrive at their specific destination or, again, if you're filling them out at home and you've got some sort of influence as to how you fill them out, you know, a lot of questions arise. Speaker 1: So the county attorney the the county attorney there is, stating this is illegal. They're gonna be investigating. The illegal part about it is ballot harvesting, portions of it are allowed in certain states where you can have in this specific state, you can do it. You can take up to three for somebody else in. That was 300. So the investigation is ongoing.
Saved - January 2, 2026 at 3:12 AM
reSee.it AI Summary
I claim USAID funded both Wuhan Lab gain-of-function research and SMARTMATIC election systems. I question if it was coincidence that “covid” surfaced near the 2020 election. I allege the same left-wing billionaires, NGOs, and USAID funded color revolutions across America. I say USAID financed both election-rigging tech and a weaponized virus to distract from the theft of the election while depopulating the planet. It’s all connected. Americans suffer.

@TheSCIF - The SCIF

USAID was funding BOTH the WUHAN Lab gain-of-function research & SMARTMATIC Election Systems. Do you think it was a coincidence that "covid" came out right around the 2020 election? Coincidentally, the same left-wing billionaires, NGOs, and USAID also funded the 'NO KINGS' protest, aka, the color revolutions across America. This means that USAID was simultaneously funding BOTH the election-rigging technology that would steal the 2020 election WHILE manufacturing and releasing a WEAPONIZED VIRUS that would distract the world from the theft of said election while depopulating the planet at the same time. It's all connected. Everything is out in the open and face-up on the table... I don't even know what to say anymore. You can't be this naive anymore. We can't live under this fraud and tyranny anymore. Americans are suffering, and everyone else is robbing you blind getting filthy rich.

Saved - January 1, 2026 at 5:11 AM

@TheSCIF - The SCIF

The Secret D.C. Underground: Blackmail ops, Money laundering, and the Occult. It's always been about the children. They just didn't want you to know that it was. https://t.co/MGpr3vzsi1

Video Transcript AI Summary
- The discussion opens with a hypothetical plan about obtaining and examining the Anthony Weiner laptop, suggesting it contains prosecutable material and noting that New York police officers who viewed parts of it reportedly “had to go throw up.” - Speaker 1 then shifts to a reveal about Anthony Bourdain, ABC’s Bob Woodruff, and a shift away from debunked conspiracies to focus on James Alifantis, a DC figure described as an art collector, fundraiser, and owner of venues including Comet Ping Pong. He is noted as being personally thanked by Hillary Clinton for “extraordinary talent” during a Podesta fundraiser and pictured with Tony Podesta; his past boyfriend is identified as David Brock of Media Matters. Alifantis is described as having influenced donors including Pete Buttigieg, according to the Federal Election Commission. The speaker raises questions about why Alifantis would be equated with pedophilia. - Speaker 2 begins a first-hand account from December 17, with JB recounting James Alifantis’s connection to St. Albans in DC and Greenwood. The retelling includes an accusation that Alifantis walked in seeking a job and, in a separate claim, that he sexually abused an 11-year-old boy in the kitchen, with the boy (Dylan Greenwood) later reportedly committing suicide about two years prior. The account alleges underground rooms at Comet Ping Pong and tunnels to other buildings, including one possibly owned by the Clinton Foundation, and asserts the tunnels extend in the area, potentially reaching multiple locations. The speaker says Alifantis was attempting to obtain a manager job. There is also a suggestion that Alifantis earned money by trafficking children and that tunnels connect to other sites near Comet Ping Pong, including a place “across the street.” The speaker ends by indicating willingness to post these claims as “primary source” information. - Speaker 1 then notes bands associated with Comet Ping Pong and references members such as Amanda Kleinman of Heavy Breathing, as well as the DC punk group Loud Boys and the song “The Sextanes,” with insinuations about pedophilia in some audience members. They describe Comet Ping Pong as a family restaurant with a backroom for children’s birthdays. - The discussion references a 2007 FBI bulletin noting a blue spiral-shaped triangle symbol used by predators, reportedly etched into coins and rings, and connects this to the venue’s events and music videos by The Sextanes. It is claimed that Alifantis’s Instagram showed Antinous, a Greek emperor associated with a modern cult of LGBT polytheists; Antinous is described as a prominent symbol in pederastic culture. The claim is also made that Alifantis has no children, yet posts many images of children on Instagram, some stated to be taken from friends’ and family members’ pages. - The transcript lists various images and hashtags associated with Alifantis, including references to Panda Head Morgan, Panda Head Magazine, and a video describing Cultpanda. Specific images allegedly include a goddaughter with taped arms, a baby in an art gallery, and a baby doll image, with censorship of certain ambiguous images. The speaker alleges connections to people like Scott Cummings (owner of Portland Natural Casket Company) and notes tattoos and death-related imagery. - There are additional posts and comments linked to Alifantis’s social media, including a post about a “Miss Summer Camp” with sexualized captions, and comments referencing “let’s hang a baby,” “I put my baby in a slow cooker,” and other disturbing captions. A commenter group includes “Pizza F***ing Party,” who posted images of children with condoms, coins, vials of alcohol, a pentagram, a “Baby Doll Pizza” logo from a Portland restaurant, and a claim that Portland, Oregon is linked to alleged trafficking. A witness, Michael Whelan, is cited as a Portland resident who claims to have seen illicit activity involving Voodoo Doughnuts. The speaker questions why such activities would occur in Portland, asking why children are being taken to the back, and remarks that survivors would recognize such behavior as flaunted and protected. - The dialogue ends with a reiteration of the Voodoo Doughnuts reference and the question of why there is alleged abuse of children, noting that perpetrators appear to act with impunity.
Full Transcript
Speaker 0: So one of the things, if I were the president, I'd do is demand the Anthony Weiner laptop and get it to the most trusted person in the military to take apart everything on it and then start using it. There's a lot that can be prosecuted. In fact, I heard that the New York police officers who saw some of it, even though they're hardened investigators, literally had to go throw up. It's bad. Speaker 1: I'm fully aware this topic has been covered ad nauseam, but parts of it have been covered terribly, and the aspects covered well have been deleted. But more importantly, while researching, I discovered something new that's never been reported by anyone. Dinner with American celebrity chef Anthony Bourdain, ABC's Bob Woodruff tonight with how that meal came together. Initially, this video was structured in a way that debunked the more exaggerated claims from pizzagators and QAnon obsessives, while also shining a light on the facts of aristocratic pedophilia rings. If you think this has only occurred in the Catholic church, I encourage you to read the Dattroux dossiers and the recent findings from an inquiry in former British MPs who were freely able to sexually abuse children for decades. But I trashed all that as soon as I found what I found. So instead, I'm just going to show you what I discovered while vetting a now infamous yet indecipherable man who in 2012 was named by GQ magazine as one of the 50 most powerful people in Washington DC. James Alifantis is an avid art collector, prolific fundraiser, owner of multiple establishments including Comet Ping Pong, and was personally thanked by Hillary Clinton for what she called his extraordinary talent during her Cooking with Fratelli Podesta fundraiser. He is pictured here with Tony Podesta, who celebrates his birthday with Aliphantus almost every year. His previous boyfriend was founder of media matters David Brock. And with the Federal Election Commission showing his multiple donations for Pete Buttigieg, it's apparent that Alifantis' influence among the DC establishment remained strong. But why was anyone suspicious of him in the first place? More specifically, why did anyone equate him with something as monstrous as pedophilia? Speaker 2: Okay, guys. Yeah. Yeah. Okay, guys. It's December 17. It's one something in the afternoon here, and I'm with JB. JB's talking to us about who? James Alafontas. James Alafontas. Now now JB went to St. Albans? Went to St. Albans. From DC, Speaker 3: and he's got a Speaker 2: storytell Greenwood. Let's hear it. Restaurant for Carol Greenwood. Yep. Remember the day James Alphonus walked in the door and asked for a job. Mhmm. Carol's son, 11 years old at the time, friend of mine caught James butt fucking this boy in the kitchen and that person, his name is Dylan Greenwood, has since committed suicide. I think it was two years ago. Mhmm. James is one of the dastardly worst person in the world. And yeah, they do bad things at Comet. There are underground rooms, all that stuff. And you've seen that with your own eyes? I've seen that with my own eyes. So you've been under below the floor of Comet? It used to be the Thai room. The Thai room before it's Comet. Yes. Yeah. Yeah. Yeah. Yeah. Right by the zoo. It's a little farther down from the zoo. It's more in Not that far. Speaker 3: I mean Speaker 2: It's Nebraska. It's on Connecticut Avenue. Nebraska and Connecticut. Right. Right. Yep. But, yeah, that's a fact. James Alfon is a bad person to this day. Probably when he was applying for a job or something? He was trying to get the manager job with Carol at that restaurant. How did you get how did you get so much money, that guy? Probably selling kids and trafficking kids. And you've been below Common Pizza, and you see what it looks like? Rooms, and I've seen tunnels that go other places, including underground to the other buildings. Think one was owned by, like, a Clinton Foundation or something across the street. Yeah. But the tunnels go all over there. They say they go all to the White House, but I don't know. I don't know if they go all the way to the White House, but that area ended up itself. If they go a mile in that area in any direction, they're hitting some spots. Okay, man. Thanks for the information. Yep. Nice to see you. That's what you can do. Hope you can post it. I will. I'll post it, man. Yeah. Of course, man. This is this is the truth that needs to get out because this is firsthand information. Yep. Primary source. Yeah. Primary source. You've been there. You saw the change. Mhmm. Saw Los Fantos go from wanting a job as a manager to being funded by student at the Corcoran School, and employed a lot of those people and wanted to be an arty place and it got dark. Yeah. It got dark. Yeah. We're all Speaker 1: One reason surrounds the rhetoric of several bands who often performed at comet Ping Pong. This video shows Amanda Kleinman, keyboardist for a group called Heavy Breathing. In a separate venue, some in the audience appear to insinuate a person's preference for pedophilia. Speaker 2: You like some cool sounds? And little boys. And children. I think I was his manager. No. We all have references. Speaker 1: Another group is DC punk band, Loud Boys, who we'll see again later. But for the sake of time, we'll end with sex stains. In a 2007 FBI bulletin, one of the symbols with which predators identified each other with was a blue spiral shaped triangle wrapping around itself clockwise. The symbol was so prominent, it was etched into coins and rings. This music video is from The Sextanes. Their promotional posters said they were for, quote, all ages. According to Alifantis, Comet Ping Pong is a family restaurant with a backroom designated for children's birthdays. Speaker 2: This is the kids' party room in the back. Birthday parties. Speaker 1: Another reason some were suspicious of Alifantis surrounds his close relationship with Tony Podesta, a former super lobbyist who's had a lifetime friendship with convicted pedophile Dennis Hasturt. Additionally, Tony's art collection. Now any of these works on its own could merely be employing theatrical strategies to inspire insight, but it's when they're all collected by one person that it begins to say more about the collector than the artist's intent. Among those artists who made up Tony's collection included Maria Marshall, Margie Gearlings, Patricia Piccinini, Marina Abramovic. I'd Speaker 0: like to tell you a story how we in Balkan killed the rats. Kim Noble. Speaker 1: Aliphantus' previous Instagram profile picture is of Antinous, a Greek emperor whose influence reemerged in the early 2000s, forming a modern cult that attracted a subculture of LGBT polytheists who worshipped Antinous as a deity. Historian and author Lambert Royston writes, the sculptures of Antinous remain one of the most elevated and ideal monuments to Pederastic love of the whole ancient world. Dictionary.com defines Pederasty as quote sexual relations between two males, especially when one of them is a minor. Whether or not these are good reasons to become suspicious is up to you. Either way, it's for those reasons and because James Elephantis has no children, Some questioned why he had so many kids on his Instagram. According to James, he took all the images of kids and infants from other Facebook pages and from family and friends whom he says haven't come forward for fear of retribution. Now, I'm simply going to show you some of those images and give context when necessary. I'm not, however, going to apply sinister interpretations to hashtags which might seem out of place. If your damning case against James Alifantis includes references to the Urban Dictionary and arguments for why he might be using them, you've failed. If there really is something here, it should reveal itself without argument. Aliphantus said that this is his goddaughter with her arms taped to a table. Here's a baby in an art gallery, another baby. Now some of these are obviously the same newborn, it appears. But this is a baby doll and in this image there's two babies. I had to censor this because it shows a flat chested female whose age is ambiguous. Notice that it's liked by Panda Head Morgan, a name found in dozens of James' posts that was very important and we'll get to later. Here's an image of Alifantis' friend Scott Cummings holding a toddler with the hashtag chicken liver. In 2010, the website Things That Are Rectangles interviewed Scott Cummings about his privately owned business in Portland, Oregon called Portland Natural Casket Company. During the interview, Mr. Cummings said, When I was a child, my mother taught classes on death and dying. She would often talk to me about how death is an important part of life and how different cultures have different rituals and burial rites. The interviewer stated, Even the tat on his wrist is death related. He snapped a photo of it. It's a body hanging. Alifantis uploaded this picture of a guy in a panda mask. Here are many other images of pandas with the hashtag cumpanda. One of his tags is Panda Head Magazine, which used to be run by a small team of DC bloggers who also made this video, described by makezine.com as a perfectly creepy panda cult film called Cultpanda, but with a u spelled with a v. Here, James commented murder, another user working on my night cheese, who I'll refer to as WC, commented kill room. WC owned a workshop in the industrial complex pictured here called the Pajama Factory, where he, similar to mister Cummings, also built coffins, many of which were child size. WC can be found commenting here to another Instagram user, jblairsmith, who uploaded this image commenting, my favorite pedo. J blair smith uploaded this drawing of a woman being hanged and what appears to be a baby statue that's been burnt. User joshua ryan v posted these while at Comet Ping Pong. He also played in a low budget independent film called Kill Dolly Kill. Speaker 0: Kill them, Benjie. Kill them. Speaker 1: This is miss summer camp's Instagram, James Ellefantis commented sex. Miss summer camp also posted this picture of a girl a watermelon with the end of a tagline saying 'priceless'. He said quote, Priceless isn't the word most people use upon tasting me. A user below named Barrett C responded. He posted on his Instagram a picture of a baby changing station with the C etched out saying let's hang a baby. He also posted an apparent text message saying I put my baby in a slow cooker, it's been burning all day. And in this image uploaded by Barrett, one of the commenters is Pizza Fucking Party, who I'll refer to as PFP. PFP uploaded this image of a group of young children picking up either fake or real condoms, fake gold coins, and according to PSP's comment, little vials of alcohol. He also uploaded a bull like meme on a pentagram, a pizza cut into a pentagram, and this photo of him or someone else in front of a van with a logo that says Baby Doll Pizza. As it turns out, the logo is from an actual restaurant named Baby Doll Pizza in Portland, Oregon, the same city where a man named Michael Whelan used to live, who alleges to be a witness to illegal activity there, claiming the owners of Voodoo Doughnuts are trafficking children. Speaker 3: As to why Voodoo Doughnuts and why Portland, Oregon, it's because my question is why are they abusing kids? Then I see kids being brought into the back. Then I'm asking who are these kids? Who are their parents? And and that immediately drew attention onto me. So when I'm asking why there are adult males and females taking children into the back. When you're confronted with these type of people, other survivors will know what I mean when I say that they flaunt this. They are proud of this. They feel protected in this, and they feel untouchable in this. Speaker 2: Sonic Delights of Voodoo Doughnut.
Saved - December 29, 2025 at 6:42 AM
reSee.it AI Summary
I’m presenting a claim that the FBI asked intelligence agencies to destroy intel on a China-linked plot to aid Biden in 2020, exposing a layer of election fraud. A whistleblower, claiming Chinese royal descent, describes counterfeit ballots from Guangdong aimed at swing states, with photos, printing sites, and shipping manifests. The narrative links an FBI cover-up, Trump’s critiques, and calls for arrests and a full investigation to protect future elections. Free Tina Peters.

@TheSCIF - The SCIF

FBI asked intelligence agencies to DESTROY intel on alleged China plot to aid BIDEN in the 2020 Election. Another layer of election fraud exposed. The greatest threat we face is from within. A whistleblower claiming royal Chinese ancestry stepped forward earlier this year with stunning evidence of a sophisticated counterfeit ballot operation aimed at swaying the 2020 U.S. presidential election. This isn't just hearsay—it's backed by videos, photos, and detailed breakdowns that paint a chilling picture of foreign meddling. The Whistleblower claims and Identifies as a descendant of Chinese royalty, the informant reveals alleged printing facilities in Guangdong, China, churning out fake U.S. ballots for key swing states like Florida, Mississippi, and North Carolina. Photos show stacks of ballots, printing presses in action, and even shipping manifests routing these counterfeits to U.S. soil. This is where the FBI's alleged cover-up comes in, and even President Trump publicly called out the FBI for reportedly instructing intelligence agencies to destroy critical intel on this China-linked plot designed to boost Joe Biden. The video ties this to broader narratives of election integrity erosion, including OAN reports on over 500,000 fake ballots discovered in Guangdong. From truckloads of ballots being loaded in secret warehouses to phone records and customer lists linking Chinese operations to U.S. addresses (like 1365 English Street, NW Atlanta, GA), the footage methodically connects the dots. News clips from John Solomon and OAN amplify the story, highlighting whistleblower testimonies that have been suppressed until now. This exposé not only questions the 2020 results but demands accountability—potentially leading to treason charges, especially with all the new information coming out now. This explains an entire other layer to election fraud with fake ballots and where they were coming from. None of this should be shocking to any of you that have been paying attention. With Trump on a roll exposing these issues, the video urges viewers to demand arrests and a full investigation to safeguard future elections. FREE TINA PETERS.

Video Transcript AI Summary
The transcript presents a series of claims about foreign interference, voting-system vulnerabilities, and alleged cover-ups related to the 2020 U.S. elections. - A 2020 FBI intelligence memo warned that China might have been sending fake driver’s licenses into the U.S. to produce fake mail-in ballots to help Joe Biden win. The memo’s integrity was questioned because the FBI reportedly called the intelligence back, and the agencies were asked to destroy the report, allegedly to avoid negative optics for Trump and Biden. The claim is that the licenses intercepted by Customs and Border Protection in Chicago corroborated the intel, yet no investigation followed. It is further stated that the FBI’s handling was intended to prevent leak before the election that China preferred Biden. - A 60 Minutes segment featuring Chris Krebs, then head of Homeland Security Cybersecurity Division, purportedly stated there were no foreign intrusions in the 2020 election and that it was a perfectly clean election. The transcript asserts this was later shown to be false, noting: - A 2021 indictment of Iranians in Manhattan for interfering with the election and hacking a state database to obtain voter IDs for an influence operation against the U.S. election. - Colorado-specific allegations include: - From June onward, passwords (seventy-six of them) from 63 of 64 Colorado counties’ secretary of state bios/passwords were publicly accessible on a site, implying broad exposure. The speaker accuses Secretary of State Jenna Griswold of knowing about the leak during a trial and not informing clerks, and asserts she should be held to account. - The speaker asserts ongoing concerns about leaked passwords for Dominion machines, suggesting potential compromises across other states and tying this to a broader cartel narrative involving Arizona, Michigan, and Dominion’s Colorado headquarters in Denver, with a note that Dominion is also connected to Serbia. - Mentions a video by Gary Brunson and references to a 30-year CIA whistleblower, linking the events back to Venezuela (Hugo Chávez) and to Patrick Byrne, suggesting a broader international corruption thread. - The transcript then asserts a second, explicit foreign operation: - In August 2020, three and a half months before the votes, the FBI believed China had begun a mass operation to produce fake U.S. driver’s licenses, arrange to bring Chinese citizens into the U.S. with the intent of obtaining fake mail-in ballots to vote for Joe Biden. The intelligence purportedly came from a Chinese intelligence source handled by the FBI, and the operation aimed to help Biden beat Trump. The claim emphasizes that the operation’s intention was to assist Biden. - Additionally, there are various related claims and items: - A claim of sensational evidence about a factory in Guangdong producing 500,000 blank American ballots, with an asserted link to a source (Vanessa Olivarez, claimed as a third-generation member of the Chinese Communist Party) and a purported translated phone recording between a caller and a ballot-printing company, circulated by Gateway Pundit. - An assertion that 20,000 fake driver’s IDs were intercepted by Customs and Border Protection, corroborating the intelligence, while the Biden administration and FBI (Chris Ray) allegedly covered this up, with the information sent to Chuck Grassley by Kash Patel. - An assertion that, since 2020, tightening voting laws in several states increased voter confidence, but China viewed mail-in voting as a vulnerability to exploit. - Individual testimonies and incidents: - Arrests reported by Speaker 5 (HSI Miami and partners) of a permanent resident Haitian national convicted felon for unlawful voting and casting a false ballot. - Speaker 6 claims 130,000 to 280,000 completed ballots were shipped from Bethpage, New York to Lancaster, Pennsylvania, with the trailer disappearing. - Speaker 7 describes witnessing thousands of ballots with return addresses loaded onto a trailer in New York headed for Pennsylvania, and questions the purpose. - Speaker 8 notes tens of thousands of fake voters and illegally cast ballots in the November election, asserting impacts across down-ballot races. - The speakers reference broader connections among Venezuela, U.S. election irregularities, and international actors, tying together various claims about foreign interference, domestic vulnerabilities, and alleged concealment or delay of intelligence reports.
Full Transcript
Speaker 0: Twenty twenty FBI intel memo warning that China might have been sending fake driver's licenses in to create fake mail in ballots to help Joe Biden win. There's a busting headline in here. When the FBI called this back so they have this intel. It's corroborated by the licenses that are intercepted by customs and border in border protection in Chicago. But they call it back anyways and decide we're just not gonna investigate this because this would look good for Trump, bad for Biden. They ask all intelligence agencies to destroy the intelligence report that the FBI actually sent them as a federal records act. You're not supposed to do that. But they wanted it destroyed. Why? Because they probably didn't want it to leak out before the election that China preferred Joe Biden over Donald Trump. Sixty minutes aired a piece with the head of the homeland Security Cyber Security Division saying there were no foreign intrusions in the twenty twenty election. It was a perfectly clean election, he said. I think it was Chris Krebs was his name. We now know that to have been a false proclamation. First, we know a year later in '21, a bunch of Iranians were, indicted in Manhattan on charges that they interfered in the election and hacked into a state database to obtain voter IDs and use them in a mal influence operation against the American election. Speaker 1: We did subpoena Mike Frontera, Dominion's Dominion's lawyer, but they found a way to not let us have our witnesses. What Jenna did though that since at least June, those bios passwords, six seventy of them from 63 counties out of the 64 counties in Colorado have been on the public website website for the secretary's state, which means they were out there for anybody to grab. Hey. She should be locked up, and they should throw away the key and let me loose. Speaker 2: Yeah. We need a prisoner swap. Yeah. Yeah. For sure. Speaker 3: So so you think that this election in Colorado was definitely compromised because of the leaked passwords? Oh, Speaker 1: always. There is I mean, in Mesa County, in May there were they were finding fraudulent ballots. They were finding the same person was signing the ballot envelopes, and they brushed it off like it was nothing. And as a matter of fact, what Jenna Griswold did with the passwords, she knew while I was going through the trial that that was out there and did nothing. Speaker 3: So those passwords were leaked out there during your trial before your sentencing? Speaker 1: They were out there since June, but she knew about it and didn't tell the clerks about it. And now she's apologizing to the clerks. She should apologize to the American people or at least the people in Colorado, but there are other passwords besides just for Colorado, I've heard, for the The United States in there for Dominion machines. Speaker 3: So you think some of our other elections in other states could be compromised because of leaked passwords for Dominion machines? Speaker 1: Absolutely. Absolutely. That's what's going on with the cartel in Arizona and Michigan and, you know, I was so happy when I saw Florida for Trump and all these other places. But just remember, Dominion's headquarters is in Colorado. Denver, Colorado. Yes. And also, most people don't know that Dominion is out of Serbia as well. And then when you and if you could play that video Mhmm. By Gary Brunson Speaker 2: Yeah. Speaker 1: The thirty year CIA whistleblower, you will or or look at the transcript, you'll see exactly how this all started with Hugo Chavez at Venezuela. And that's why this stuff with Patrick Byrne and all this coming out, leads all the way back to Venezuela and then the corruption worldwide. Speaker 0: Now we know there was a second country that was more deeply involved in meddling into the election. The FBI in August 2020, so three and a half months before the votes votes were cast that put Joe Biden in the presidency. That FBI believed that China had begun a mass operation to produce fake US driver's license them, move them to The United States and have Chinese citizens here on our side both legally and illegally go out and get fake mail in ballots and vote to try to elect Joe Biden. By the way, the FBI intelligence says this Chinese operation from a Chinese intelligence source that the FBI was handling was designed to help Joe Biden beat Donald Trump. It's very important. That was the intention. Speaker 4: Sensational video and photo evidence has emerged exposing a factory in Guangdong producing 500,000 blank American ballots. The Gateway Pundit, an online news publication confirmed that the video was provided by Vanessa a Olivarez, a third generation member of the Chinese Communist Party. Vanessa tweeted on November 9 that the printing plant in Guangdong, China was printing out fake ballots, which were then mailed to Canada and Mexico under the name of medical supplies between August 2020 and from there flown into The United States. The release video of the phone call to a Chinese manufacturer requesting a bulk order of fake US twenty '20 ballots has been revealed by the Gateway Pundit. Here is the translated recording between the caller and the ballot printing company. Speaker 0: The intelligence was strong enough to send out to all of the intelligence agencies and then a few days later it was called back on the auspices that they wanted to re interview the source. Now the source was re interviewed a second time stuck to his story. In the meantime, the Customs and Border Patrol, Border Protection Agency intercepted 20,000 of these fake drivers IDs, essentially corroborating the intelligence. But the Biden administration Wow. The Chris Ray FBI, they simply covered this up. And for five years, we were kept in the dark until this intelligence document was sent last night to Chuck Grassley from Kash Patel. China saw mail in ballots as an enormous vulnerability during the COVID nineteen pandemic and because I you know, our enemies look for weaknesses, not for strengths. They don't look for the hardest thing to do. They look for the easiest thing to do to us. That is a warning sign. Now lots have happened since 2020 and with all of the voter ID and other things, we've tightened up laws in several states. And where we've tightened up the laws in the states, people vote more because they have greater confidence in the system. But China saw this as an exploitable operation, and, I think that should concern all of us. In any state that doesn't have their mail in voting to the proximal best, security measures, there's a foreign enemy looking to exploit it right now. Speaker 5: This morning, HSI Miami, along with our state and federal partners, FDLE, DSS, and USCIS, arrested a permanent resident who is a Haitian national and a convicted aggravated felon. He was arrested for unlawful voting and casting a false ballot. Speaker 6: This evidence demonstrates, and it's through eyewitness testimony that's been corroborated by others through their eyewitness statements that a 130,000 to 280,000 completed ballots for the twenty twenty general election were shipped from Bethpage, New York to Lancaster, Pennsylvania, where those ballots and the trailer in which they were shipped disappeared. Speaker 7: What happened on October 21 was a series of unusual events that cannot be a coincidence. I know I saw ballots with return addresses filled out, thousands of them, thousands, loaded onto my trailer in New York and headed for Pennsylvania. At first, I didn't think it was a big deal. In fact, I thought it was really awesome. I was I really did. I was like, sweet. I'm doing something for the presidential race. You know? This is cool. But as things became weirder, I got to thinking and wondered why I was driving complete ballots from New York to Pennsylvania. I didn't know I didn't know why, so I decided to speak up. And that's what I'm doing today. Speaker 8: At this point in time, we have already confirmed tens tens of thousands of fake voters of illegally cast ballots, and I'm speaking about the November. And think of how that would affect the down voting, down ballot voting also. We're talking senators, congressmen, local, elections. It's affecting all the the ballots.
Saved - December 27, 2025 at 7:06 AM
reSee.it AI Summary
I report Candace Owens’ claim of deep-state links to flight RCH 702. On July 11 a CIA shakeup: Dustin Gard-Weiss replaced Ratcliffe as executive director; Gard-Weiss had been undersecretary of defense for intelligence, filled by Bradley Hansell on July 22. Hansell’s office booked RCH 702 Fort Andrews–Colorado Springs–Tucson, switching to SAM at Fort Huachuca on Sept 8. The 12-seat plane prompts probe into passengers and Colorado Springs pickup. Exercise caution about disinformation.

@TheSCIF - The SCIF

Candace Owens just dropped a bombshell, exposing potential deep state maneuvers tied to a mysterious flight, RCH 702, the flight she has just confirmed. On July 11th—the same day Charlie Kirk was urged to ramp up anti-Israel rhetoric, sparking donor backlash—a major CIA shakeup occurred. Dustin Gard-Weiss replaced John Ratcliffe as executive director. Gard-Weiss vacated his prior role as undersecretary of defense for intelligence, filled by Bradley Hansell on July 22nd. Hansell's office booked the RCH 702 flight from Fort Andrews to Colorado Springs to Tucson, switching to SAM callsign upon entering Fort Huachuca on September 8th. The plane seats 12; Owens' team is probing passengers and why Colorado Springs prompted the change—possibly a pickup. A linked article confirms Hansell visited JTF South Border leaders in Colorado Springs, aligning with source "Mitch's" sighting of the unit at Huachuca the next day. Owens questions the smear campaign against Mitch with old allegations, dodging his September 8-9th claims. "Why the panic?" she asks, inviting tips to moretips@candaceowens.com. This ties into broader suspicions around Charlie's "war" with donors and shadowy ops. Wild connections, but they seem to check out, and they wouldn't attack her if she wasn't over the target. Pay attention, but be cautious of injected disinformation and operators. @RealCandaceO Link: https://www.dvidshub.net/image/9307230/under-secretary-war-intelligence-and-security-bradley-hansell-visits-jtf-sb-leaders

Under Secretary of War for Intelligence and Security Bradley Hansell visits JTF-SB leaders From left to right, U.S. Air Force Brig. Gen. Steven Gorski, Director of Intelligence, United States Forces Korea and deputy director of Intelligence, Combined Forces Command, U.S. Marine Corps Brig. Gen. Jeremy Winters, deputy commanding general of maneuver for Joint Task Force-Southern Border (JTF-SB), Bradley Hansell, Under Secretary of War for Intelligence and Security, and James Collins, Assistant Commissioner for the U.S. Customs and Border Protection Office of International Affairs, discuss JTF-SB’s capabilities in a UH-60 Black Hawk with 3rd Assault Helicopter Battalion, 1st Combat Aviation Brigade,1st Infantry Division, assigned to JTF-SB, at Libby Army Airfield, Ariz., Sept. 9. 2025. JTF-SB executes full-scale, agile, and all-domain operations in support of U.S. Customs and Border Protection to protect the territorial integrity of the United States and achieve 100% operational control of the southern border. (U.S. Army photo by Pfc. Sean Hoch) dvidshub.net
View Full Interactive Feed