reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker questions the Minister about whether her chief of staff read an issues management note. The Minister denies that her chief of staff read it. The speaker accuses the Minister of providing inaccurate testimony in previous committee meetings. The Minister admits that she did not read the issues management note but argues that it was not brought to her attention. The speaker criticizes the Minister for not knowing the location of a secure terminal on the same floor as her office. The Minister defends herself, stating that she does not have access to the terminal. The speaker questions whether the Minister instructed her officials to bring important memos to her attention. The Minister explains that she was not advised about the memo and that it was not shared with her. The speaker argues that the Minister should take responsibility for not reading the memo. The Minister acknowledges the need for responsibility and states that steps have been taken to address the issue. The speaker accuses the Minister of blaming others and asserts that she has failed. The Minister disagrees with the characterization and emphasizes the importance of addressing what did not happen.

Video Saved From X

reSee.it Video Transcript AI Summary
The committee's report on potential treasonous behavior is concerning, but no charges have been filed. The government takes foreign interference seriously, with new measures in place. The public's right to know about involved parliamentarians is debated, especially with an upcoming election. Foreign interference is a significant threat to democracy, with authoritarian regimes seeking to undermine it. Vigilance and defense of democracy are crucial in the face of global challenges. Law enforcement, not politics, should handle enforcement actions.

Video Saved From X

reSee.it Video Transcript AI Summary
A commission of inquiry must balance the need for transparency with protecting Canada's national security. It is important for the public and journalists to know if foreign actors targeted Canada's democratic process, but revealing sensitive information could harm national interests. While transparency is crucial, secrecy is also necessary in certain situations to prevent more harm than good.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss a dangerous and divided world, citing threats from Iran, Russia, and China, as well as changing security and commercial relationships with the United States. One speaker mentions having obtained top secret security clearance within three weeks to be informed and make decisions. He then points out that another speaker has refused the opportunity to obtain top secret security clearance for 950 days. The other speaker explains that while he previously held top secret clearance as a minister, he refused the recent offer because it would have gagged him under security law, preventing him from speaking freely about foreign interference without fear of prosecution. He claims Canada has experienced Chinese interference in two elections. He says that refusing the clearance allowed him to speak freely about issues such as a candidate who allegedly threatened a political opponent, and a quarter billion dollar loan obtained in China. The first speaker responds that robust debate has occurred despite the situation, and observes that China is not the only country accused of foreign interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The FBI alerted our team about the possibility of a Russian propaganda dump similar to what happened in the 2016 election. They advised us to be on high alert.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that, regarding election security, everyone must acknowledge egregious behavior and foreign influence, of which there is direct evidence. Other foreign partners also have evidence and were watching attacks on the election system on November 3rd. They are willing to provide that evidence directly to the president, and this evidence was received today. These foreign partners and allies are willing to help. The speaker concludes that foreign influence against election security and the SolarWinds system is dangerous, and more must be done.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that every Canadian prime minister has been compromised by agents of influence working for Chinese intelligence. This poses a significant security risk, raising concerns about who is truly in control of the country. They suggest the need for an independent investigation to protect against future threats, citing Australia's law against foreign interference as a model to follow.

Video Saved From X

reSee.it Video Transcript AI Summary
We hebben veel informatie gekregen van de AIVD. Het rapport is echter pas na het referendum openbaar gemaakt. Buitenlandse inlichtingendiensten kregen het rapport al in november en hadden drie weken om te reageren. Op 15 maart, een week voor het referendum, besloot de minister om het rapport pas na het referendum te verzenden. Dit zorgde voor kritiek omdat de Tweede Kamer niet goed geïnformeerd werd en belangrijke informatie werd achtergehouden. Het lijkt erop dat de minister bewust heeft gekozen om de Kamer en Nederland pas achteraf te informeren. Dit wordt als zeer kwalijk beschouwd.

Video Saved From X

reSee.it Video Transcript AI Summary
The Prime Minister previously supported ENSCOCOP's role in examining foreign interference in Canada's democracy, but there seems to be a shift in stance. Questions arise about whether a recent ENSCOCOP report revealed involvement of Liberals seeking political and financial gain. Is the Prime Minister still committed to transparency and public trust in institutions, or has external influence changed this approach? In response, the Minister for Public Safety emphasizes the importance of oversight, noting that the government established a committee of parliamentarians to monitor security agencies for the first time. This committee includes members from all political parties, and their recommendations have been acted upon to enhance national security and combat foreign interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that files were fabricated by Comey, Obama, and Biden. They claim to have spent years dealing with similar situations, referencing the "Russia Russia Russia hoax." The speaker says that someone, presumably the person who gave the briefing, handled the situation well. They conclude that it is up to that person to decide what is credible and should be released.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a document revealing foreign interference in the 2019 Canadian federal election involving Chinese individuals, community leaders, and politicians. They mention CSIS briefings on PRC interference in the elections, implicating candidates and staff. The panel received briefings on PRC's pragmatic interference tactics. The speaker confirms CSIS briefings to the panel but struggles to recall specific details. The language used in the briefings aligns with public summaries on PRC's activities.

Video Saved From X

reSee.it Video Transcript AI Summary
The commission successfully balanced national security and transparency in investigating foreign interference in recent elections. While some information is classified, the public report highlights that our electoral system remains robust despite acts of interference. The commission will continue its work to shed more light on government responses to foreign interference. Preliminary findings suggest no impact on election outcomes, but communication issues and lack of understanding were identified in combating interference.

Video Saved From X

reSee.it Video Transcript AI Summary
During National Security Council meetings, the director of National Intelligence and the CIA director present the intelligence foundation for policy discussions. If this intelligence is skewed or lacks critical information, the resulting policy decisions could threaten national security. It's crucial that these leaders provide an accurate and comprehensive briefing to inform decision-makers. The presence of informed officials, like the Secretary of State and Secretary of Defense, helps ensure that the truth is prioritized over political preferences. Historically, presidents have sought honest assessments from the intelligence community to guide their policy decisions, rather than simply hearing what they want to hear.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the intelligence community's efforts to share information with social media platforms to address inauthentic content. They clarify that the office of the director of National Intelligence would only participate in approved election security briefings with private companies like Twitter, YouTube, Microsoft, and state election officials. These briefings focus on discussing threats and have nothing to do with content moderation or the Biden laptop as Russian disinformation. The speaker mentions that there were weekly meetings between the FBI, DHS, and Twitter, but only one reference to their office. They hope that this reference was part of the approved process for election security briefings.

Video Saved From X

reSee.it Video Transcript AI Summary
Public Safety Minister Dominic LeBlanc testified at the foreign interference inquiry, stating Canadians can vote with confidence. He expressed a preference for being promptly informed by senior staff about urgent matters, even if it meant being contacted at inconvenient times. PMO officials explained that some information, like notes about foreign interference, didn't reach the Prime Minister due to world events in early March 2020 that interrupted the process. They added that briefings are sometimes delivered in paper form for security reasons. According to PMO staff, CSIS never names individuals in briefings and is restricted in what information it can share outside the government, sometimes resulting in MPs not fully understanding the warnings they receive. Security expert Wesley Wark believes Bill C-70 will improve this by allowing CSIS to share some information with politicians and diaspora communities. Wark anticipates that India and China's alleged interference will be prominent in the inquiry's final report, and that all future governments will need to pay close attention to intelligence. Prime Minister Justin Trudeau is scheduled to testify on Wednesday.

Video Saved From X

reSee.it Video Transcript AI Summary
Americans spreading misinformation, whether intentionally or unknowingly, can pose a significant threat to elections. This misinformation can be shared on social media without us realizing it's fake. While foreign interference is a concern, we value and encourage free speech in our country. However, we also need to ensure that if we or the involved firms are aware of foreign-sponsored and covertly sponsored information, we take steps to manage it effectively.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that both the current and previous governments have ignored their warnings about interference. They believe there are two reasons for this delay: partisan interests and infiltration by Chinese intelligence agents. According to the speaker, every prime minister and government office has been compromised by these agents. This poses a significant security risk for Canadians, as it raises questions about who is really in control of the country. The speaker suggests the need for an independent investigation and the implementation of laws, similar to those in Australia, to protect against foreign interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that “they have taken control of our society” and urges everyone to stand up, from the White House to every American, insisting that surrender is not an option and that time is running out, with a comparison to the urgency seen in Hong Kong. The speaker claims the attack on the capital was carried out by Antifa but was enabled by political figures—McConnell, Schumer, Pelosi, and the mayor—who allegedly knew it was coming and were lax on security, allowing Antifa to act before the media picked it up. The speaker criticizes media coverage as disgraceful, referencing an affiliation with Fox for almost seventeen years and asserting that Rupert Murdoch and his sons are driving a merge with the rest of the mainstream media. The assertion is made that this consolidation represents a serious, expanding threat. Attention turns to alleged cyber and information warfare, with the speaker mentioning new information about battleground states where cyber warfare was used. The speaker claims that former FBI director James Comey sold HAMR and Scorecard, a top-secret program, to the Chinese. According to the speaker, HAMR is a program that simulates an iPhone-like app inside the voting network, enabling it to be installed and to modulate voting to favor one candidate over another, rather than by a large margin. The speaker recounts a specific telephone claim: on a Tuesday night at 11:30, they were told that the ISI of Pakistan was in the voting machines in Georgia. They say they informed someone about it. The claim is made that, in Georgia, the two candidates Loeffler and Purdue were ahead, but one hour later, they were behind, suggesting a dramatic and rapid shift attributed to external manipulation. Throughout, the speaker emphasizes urgency, global and domestic conspiracies, and the need to act immediately to counter perceived control over society, media, and the electoral process. The narrative ties together political figures, media influence, alleged clandestine cyber tools, and foreign involvement in U.S. voting systems, presenting a cohesive but controversial account of systemic manipulation and imminent danger.

Video Saved From X

reSee.it Video Transcript AI Summary
As a former member of the judiciary, I witnessed numerous FBI abuses. However, after becoming speaker, I received a confidential briefing on the importance of section 702 of FISA for national security, which changed my perspective. I urge all members to attend classified briefings to make informed decisions. Opinions have shifted after these briefings, highlighting the importance of being fully informed. Translation: The speaker discussed their experience with FBI abuses and how a confidential briefing on FISA section 702 changed their perspective on national security. They emphasized the importance of attending classified briefings to make well-informed decisions.

Tucker Carlson

Whistleblower Exposes the Real Puppet Masters Controlling the State Department and Plans for Gaza
Guests: Shahed Ghoreishi
reSee.it Podcast Summary
Inside the State Department's messaging operation, a whistleblower reveals how lines are drafted, cleared, and deployed on the Israel-Palestine controversy. Shahed Ghoreishi, who joined the Near Eastern Affairs Bureau in September 2024, explains that a press officer drafts lines, which then move from desk officers to the Seventh Floor for policy review before a spokesperson presents them at the podium. He explains the NEA’s broad remit as covering the Middle East from Morocco to Iran, with sub offices for Israeli-Palestinian affairs and the Arabian Peninsula. He notes that the Israeli-Palestinian desk attracts the most scrutiny because it generates the most questions and headlines. He says he was moved from Lebanon/Jordan coverage to ISA, and that his line work involved not just facts but how lines would influence outcomes, balancing clarity with defensibility if challenged. He recalls being asked to take on a heightened briefing role by the incoming administration, and describes the daily routine of preparing press guidance packets on Tuesdays and Thursdays two hours before a spokesperson’s podium appearance. He emphasizes that the official position often comes from quotes by principals like President Trump or Special Envoy Wittkopf, and that sometimes a line would be crafted to reflect those quotes rather than reproduce them verbatim. He recounts three concrete episodes that shaped his departure. The first involved a line on forced displacement presented as a possible policy prospect, cleared in July and routinely circulated in press guidance. When a reporter later asked about an alleged plan to move Gazans to South Sudan, the line was ultimately cut by the secretary’s office, even though the guidance had already been approved. The second episode concerned condolences for Anas, a journalist among those killed in Gaza. Ghoreishi says he drafted condolences, but senior officials objected that Anas’s conduct was unclear, and the line was dropped shortly before the briefing. The third issue centered on a West Bank reference. Milstein edited a line to praise Speaker Johnson for visiting Judea and Samaria, a term Ghoreishi argues is inflammatory and unhelpful, since it carries religious and territorial implications. He says Milstein’s edits were pushed up to the Seventh Floor and that, after this intervention, the pressure intensified on him and led to his firing a few days later.

The Why Files

The Real CIA Vol. 1: 693 Pages of Secret Crimes
reSee.it Podcast Summary
The episode recounts a curated history of CIA misconduct revealed through a 693-page release, detailing decades of domestic surveillance, covert operations, and abuses that targeted American citizens. It traces the arc from the 1970s disclosures to later revelations about mass data collection and influence operations, underscoring that these activities were not isolated incidents but part of broader programs approved at high levels of government. Through vivid examples, the narrative covers domestic spying, mail opens, wiretaps, and infiltration of protest movements, along with high-profile investigations and congressional inquiries that sought to bring accountability to the agency. The piece emphasizes the role of journalist Seymour Hersh in exposing major aspects of the story and outlines how the Church Committee and other investigations exposed systemic overreach, including programs that paired intelligence work with domestic civil rights activists, lawmakers, and media outlets. It also highlights the evolution of oversight failures, the later expansion of surveillance powers, and the uneasy continuity of practices into modern policy. In discussing MKUltra, COINTELPRO, CHAOS, and Mockingbird–alongside the NSA and Patriot Act era developments–the episode presents a continuous thread about power, secrecy, and the challenges of preserving civil liberties in the face of national security imperatives. The host closes by reflecting on the difficulty of fully knowing what remains redacted while urging scrutiny of how information and influence are wielded in a modern democracy.

Weaponized

Jay Stratton - The Most Important Government UFO Investigator, Ever : WEAPONIZED FLASHBACK
reSee.it Podcast Summary
The episode presents a retrospective conversation about the government’s UAP programs and the person who helped shape them, focusing on Jay Stratton, a high‑level intelligence officer who had a long career across ONI, DIA, and related offices. The speakers discuss how the government’s approach to unidentified aerial phenomena evolved from earlier efforts to a more formalized framework, highlighting the shift from calling the phenomena UFOs to UAP and the drive to establish structured reporting, analysis, and a path for reporting by service members and civilians alike. They describe the 2022/2023 UAP report as a compact document that nevertheless reflected an expanded catalog of cases, a mix of explainable incidents and genuinely unexplained events, and a deliberate choice to present findings in a way that could be acted upon within the intelligence and defense communities. The dialogue emphasizes the tension between public fascination and bureaucratic caution, noting how language, classification, and the need to protect sources and methods can shape how the story is conveyed to Congress and the public. A significant portion of the discussion centers on Stratton’s career trajectory, his role in connecting several major efforts—from the AATIP era through the UAP Task Force and the later Arrow/ATIP developments—and his influence on creating an environment where analysis could be conducted with a sober, professional stance. The interview delves into his methods, such as assembling multidisciplinary teams, including scientists with diverse expertise, to explore disruptive technologies and their potential threats, and to build a framework for evaluating unfamiliar phenomena without prematurely attributing them to known technologies. The hosts recount behind‑the‑scenes moments in Huntsville and Las Vegas, and reflect on Radiance Technologies and the private sector’s involvement in continued UFO research after Stratton’s public service. Towards the end, the conversation turns to accountability, transparency, and the future of government‑led inquiry. They discuss whistleblower protections, congressional oversight, and the hopeful prospect that more firsthand accounts from experienced officials will inform public understanding. The episode underscores that the work is about more than sensational footage; it aims to establish trustworthy processes, preserve national security while improving public insight, and recognize the quiet, persistent contributions of investigators who operated largely out of the spotlight.

Keeping It Real

Joe Kent: Leaks, Lies, & The Company He Keeps
reSee.it Podcast Summary
The episode centers on Joe Kent, a former national security official whose resignation over the Iran war is presented as part of a broader intelligence scandal within the administration. The hosts outline three reasons Kent cited for stepping down: Iran posing no imminent threat, Israeli influence driving the conflict, and a perceived deception campaign by Israeli officials and pro-war American media figures. They discuss Kent’s background as a Green Beret and his family history, highlighting how his past credibility complicates the narrative around his sudden policy shift. The conversation also examines alleged leaks of sensitive information to MAGA media figures, and they review conflicting public statements Kent made about Iran’s threat level, suggesting possible political or strategic motivations behind his changes in stance. The dialogue then turns to a trove of related rumors, including claims about leaks to Candace Owens and Charlie Kirk, the involvement of Tucker Carlson, and the role of online networks in amplifying Kent’s message. The hosts compare Kent’s rhetoric with earlier positions and question whether the timing indicates coordination with other media and political actors, noting that Kent’s wife is connected to a publication accused of propagating certain conspiracy theories. Examples from the guests, commentators, and journalists are cited to illustrate perceived inconsistencies and possible propaganda dynamics. The discussion expands to Iran’s capabilities, including enrichment levels and missile tests, and whether those developments constitute an immediate threat. The hosts contextualize the Strait of Hormuz crisis within broader geopolitical aims, including the petrodollar system and BRICS dynamics, arguing that the outcome of the situation could reshape energy markets and Western influence in the region. The episode closes with analysis of the potential risks and rewards of a forceful policy approach, and a reflective caveat that listeners should draw their own conclusions while recognizing the complexity of the actors involved and the information landscape in which this narrative operates.

Unlimited Hangout

The Pre-Planned Chaos of the 2020 Election with Charlie Robinson
Guests: Charlie Robinson
reSee.it Podcast Summary
Whitney Webb and Charlie Robinson discuss predictions of chaos around the 2020 U.S. presidential election and how intelligence-linked simulations anticipated turmoil long before the coronavirus crisis, with outcomes ranging from a constitutional crisis to martial law. They point to simulations produced by networks tied to former Bush or Obama officials, neocon think tanks like PNAC, and allied groups. They argue these drills are not mere “war games” but part of a toolkit that maps possible futures, and note a pattern of simulations preceding major events such as 9/11, the anthrax attacks, London’s bombings, and the coronavirus crisis. Two organizations created around March are highlighted: the Transition Integrity Project and the National Task Force on Election Crises. The Transition Integrity Project’s cofounder Rosa Brooks is described as an Obama-era DOD and Hillary Clinton State Department adviser, previously special counsel to the president of George Soros’ Open Society Foundations, and affiliated with the New America Think Tank, funded by Eric Schmidt, the Gates Foundation, Pierre Omidyar, Jeff Skoll, Reid Hoffman, and Craig Newmark. The other cofounder, Nils Gilman, is vice president of programs for the Berggruen Institute, which envisions a transnational network addressing AI and gene editing. Membership overlaps exist across both groups, including Michael Chertoff, Max Boot, David Fromm, Bill Crystal, John Podesta, Robert Gates, and Larry Wilkerson, with Wilkerson being a prominent public figure in both efforts. The groups’ membership is not fully public, but various reports note their overlap and the presence of PNAC-linked figures. The groups reportedly gamed four election scenarios: ambiguous results, a Biden victory, a Trump victory, and a narrow Biden win. A particularly striking hypothetical under a clear Trump win describes the Biden campaign encouraging Cascadia—California, Oregon, and Washington—to secede unless Republicans agreed to reforms such as granting statehood to Washington, D.C., and Puerto Rico; dividing California into five states; mandating Supreme Court retirements at 70; and eliminating the Electoral College. The scenario then envisions Congress awarding the presidency to Biden, with Pence and Republicans resisting, leading to a constitutional crisis in which the military’s role remains unclear. The discussion emphasizes that the people behind these simulations—like PNAC alumni—“are not Nostradamus” but seek to shape outcomes by prefiguring them. The conversation also covers how some involved openly support Biden, and how the campaigns leverage narratives of democracy threats. Hillary Clinton’s recent remarks about not conceding are juxtaposed with the TIP projections. They discuss campaign energy differentials, the debate dynamics, and the perception that Biden’s team seeks stability and predictability, while Trump’s unpredictability complicates control. They examine cyber and foreign interference narratives. Cybereason, an Israeli-founded cybersecurity firm with Unit 8200 ties, has major investors such as Lockheed Martin and Microsoft-linked entities; its founder served in Israeli intelligence. Cybereason’s work, and broader CTI League efforts, are cited as manifesting the external dimension of election security narratives. The discussion critiques media and political elites who promote foreign-interference threats while overlapping with pro-Israel intelligence circles. They argue these dynamics intersect with broader agendas, including AI governance and the World Economic Forum’s Great Reset, suggesting a convergence of technocratic power, media narratives, and political operatives aimed at managing or engineering political outcomes. They close by signaling ongoing reporting on these themes, highlighting the need to recognize the pattern of simulations, prepositioning, and narratives intended to normalize drastic interventions around elections, including potential continuity-of-government scenarios.
View Full Interactive Feed