reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript asserts that the Moderna technology used in COVID shots is described in a 248-page patent filed in 2020, which lists several embodiments or variations of the technology. It states that although it is unknown which embodiment each batch used, several different batch numbers were deployed, and some were far deadlier than others. According to the Moderna patent, the technology contains self-assembled nanoparticles, and in certain variations these nanoparticles can be used for the controlled release of compounds once they are in the human body. The lipid nanoparticles are encapsulated into a polymer hydrogel, a controlled release coating that includes polyvinyls. This has been verified by Anna Mielchia and Clifford Karnikom's research. In a 2013 TEDMED talk, Doctor Ito Bachelet says that these nanorobots have already been successfully developed in Israel and that they can be injected into the human body with a basic syringe. He shows an image of what they look like, and they appear to be the same structures that the fifth column found in their research and claimed was powered by five g, which was confirmed by doctor Bachelet. Speaker 1 adds that developed nanorobots carry antennas made from metal nanoparticles, and the antenna enable the nanobots to respond to externally applied electromagnetic fields, so these versions of nanobots can actually be activated with a press of a button on a joystick. The transcript further cites work by Todd Callender's team at Vaxchoice dot com, which has concluded that these shots contain a variety of synthetic pathogens that can be released with external five g frequencies. It states that the Moderna patent describes these nanoparticle mimics, which mimic the delivery of a variety of pathogens and lists over a hundred of them within the patent. According to the work at Vaxchoice, these synthetic pathogens each have an IP address. They are cataloged by the Department of Energy, and they use cesium-137, which the transcript claims we have been contaminated with from the environment, as a building block for their construction within our bodies using external frequency. The research allegedly shows that the Microsoft patent filed in 2020-06-06 060606 cryptocurrency system using body activity data is now in effect and that this technology is turning the human body into an antenna, which can output energy, meaning that humans are being turned into batteries to fuel the digital AI prison that is being built around us. And it is claimed that if you choose not to comply, the technology includes a built-in kill switch. The transcript closes by noting that independent researchers and scientists are uncovering this agenda, but they continue to walk freely among us, unrestrained by any justice whatsoever.

Video Saved From X

reSee.it Video Transcript AI Summary
Neo cons like Lindsey Graham are salivating about what's happening in Iran, hoping for a regime change, and the ongoing protests over the weekend gave plenty of fuel to their fire. Let's talk about what's actually happening in Iran right now, because your timeline is being flooded with rage bait and all sorts of fake news clips, old clips. If you've been online the past few days, you've seen the clips that Iran is exploding, cities on fire, the people have risen up, The regime is finished. That's what you're hearing. A lot of that content is either mislabeled, it's years old, it's from a different country entirely, or it's edited to look like it's new, it's actually not. A lot of fact checkers have already tracked down where a lot of people are using older protest video from Iran. Sometimes the video is from totally other countries, but don't let facts get in the way, so it's crazy. This is the same thing, by the way, that happened in Venezuela two weeks ago. All these conservative influencers just keep sharing this stuff. A friend of the show Glenn Greenwald called them out, he's like, hey, just keep sharing all this fake news, like, do you keep putting this out there? So what is real? Well, according to our sources, Iran is going dark digitally on purpose. Other news organizations have reported a nationwide blackout when the Internet goes down or is being blocked. The information war gets turned up to eleven. Gotta fill that void. A lot of fake news, rage bait, and even satellite workarounds right now are getting squeezed. Reports today that Iran is not only shutting down normal Internet traffic, but also attempting to disrupt Starlink connections. We can tell you that Starlink service is being interfered with beyond just the normal basic GPS jamming. Our own sources are telling us that foreign partners are helping Iran with this blackout, China and Russia specifically, helping to jam communications. Satellite phones, satellite internet, and other links that are going out. You're hearing names like Starlink, Iridium, Inmarsat, Theory Theorya. So if those names pop up being blocked. What we can say again according to our own sources is that Iran is in an unusually sophisticated communications clamp down right now, and on purpose. To basically close down prying eyes, looking into their country, and information going out of their country. It's a two way street right now, being closed down. China is the key player in this, in this jamming equipment that's being used right now. We're also hearing reports of concerning health risks within the radius of this equipment, where it has been deployed.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
I am in a Faraday cage to block signals. The system enslaves us, but we can break free. Life is beautiful without control and lies. I will keep speaking out. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
A founder's group at Peking University developed source code for typing Chinese characters, which was seized by the Chinese intelligence bureau. They inserted a backdoor into apps that allow Chinese typing, potentially compromising them for surveillance by the Chinese Communist Party and military. WeChat is just one of many apps that could be used for this purpose. While not everyone will be targeted, the CCP has the resources to monitor US cell phones, especially if they believe someone can be of assistance to them.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
ICE is using fake cell towers to turn your phone into a tracking device. It's a technology called Stingray. They put it in a vehicle and drive through a neighborhood broadcasting a signal stronger than a real cell tower. Your phone automatically connects to the strongest signal, so it connects to the fake one, and you never know what happened. Once you're connected, they can pinpoint your exact location in real time. Here's the most terrifying part: the Stingray doesn't just connect to the target's phone. It forces every phone in the area to connect to it. Your phone, your neighbor's phone, anyone just walking down the street, it scoops up data from hundreds of people to find one person. This isn't a theory. Forbes just uncovered a warrant showing ICE used one to track a person across a 30 block area in Utah, and they've spent millions on these cell site simulator vehicles. Your phone is constantly looking for a signal. You just have to hope it's a real one. ICE

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the breadth and invasiveness of data that can be accessed from a person’s phone, highlighting how such information can be retrieved and used in investigations. They enumerate the various types of data that can be obtained: call logs, chats, cookies, device notifications, emails, instant messages, and passwords. They note that deleted conversations on encrypted apps like WhatsApp and Signal can also be accessible, as well as Millie’s deleted web browsing history. The speakers emphasize that contact information for everyone the person has spoken to, and the locations of all their calls, can be seen. They point out that information about other people’s phone numbers can be accessed, and they ask whether those people’s messages to the person can be seen, with the answer being yes. The police can obtain information about people the person has contacted, not only in relation to any arrest that might have occurred but also concerning individuals who may have contacted the person securely (for example, through Signal) about work. The speakers express that the most worrying aspect is that this kind of data access can happen at the time of arrest, even when charges are never brought, and that it can also apply to witnesses and victims. They argue that there appears to be little clarity about deletion, implying that the police can effectively do what they want when they obtain someone’s phone, which they describe as a scary amount of information. Despite the fear, they also acknowledge that this data is extremely useful for the police in investigations. A central concern raised is the current lack of a required warrant to obtain any of this information. They argue that there should be a degree of checks and balances to determine whether it is proportionate to access such data in a given case, stating that in some cases it may not be necessary to access a person’s phone. Overall, the discussion highlights a tension between the usefulness of comprehensive digital data for investigative purposes and the potential for overreach or abuse in the absence of warrants or robust safeguards.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
I can disrupt individuals at various levels, from cellular to societal, with minimal traceability. Many feel under constant surveillance, with invasive methods like phone monitoring and retinal scans. Techniques exist to manipulate emotions, potentially leading to severe depression and apathy among targeted individuals. An extensive infrastructure intercepts digital and analog communications globally. Close access methods can invade personal spaces and devices, bypassing perceived security. This is part of a broader cold war dynamic, with advancements in microwave technology and acoustic manipulation allowing for direct communication into individuals' minds. Research has explored electronic telepathy, enabling the monitoring of thoughts and sending messages directly to the brain. The brain is emerging as a critical battleground in modern conflicts.

Video Saved From X

reSee.it Video Transcript AI Summary
There are many small devices that claim to block EMFs without affecting cell signals, but as an electromagnetic engineer, I am skeptical. If such a device existed, the military would use it widely, and I would be aware of it.

Video Saved From X

reSee.it Video Transcript AI Summary
I think they will want to implant smartphone technology into our bodies in the future.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
Let me tell you about how your phone works because it's related to how they log into your body. This has been going on for a long time, using radio frequency to interact with our biofields, which make up 80% of our immune system. They're hacking into our cells, changing them for transhumanism and life extension. Since 2005, coders have been working with biosensors for cybersecurity in digital IDs, using the human body for signals. They told us energy work and auras weren't real, but they're using our neurons for AI, pulling them out of our bodies and storing them in chipsets. Your body is now a wide body area network, accessible via web portals, where they perturbate cell structure. This leads to psionic abilities, but they'll try to take them away by logging into you with Geomancer, electrocuting the air molecules around your head, and hitting you with a terahertz bullet.

Video Saved From X

reSee.it Video Transcript AI Summary
"Never ever ever put a cell phone on your ear." "Tell your kids. I'm gonna prove it to you and to them." "This right here is measuring." "So we're at point two, point six. Now watch it when it comes closer. 28, 33, 29, 39." "Do you see the difference?" "What was that?" ""30 times the amount of radiation going into my head." "Always use speakerphone." "Make sure your kids see this because they're the biggest offenders." "Oh, and don't put it back in your pocket." "If you put it on your body, always have it on airplane mode."

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2005, kill box technologies have been targeting you within a perimeter using geofences, geocaching, drop locations, and electronic warfare databases. Terahertz bullets can stop your heart, or other harmful actions because you connected everything to the cloud, created algorithms, instilled fear of aliens, anticipation for Jesus, and feigned ignorance about 5G while standardizing and fully deploying it with the BioCyber interface. After enduring this for three years, I will no longer tolerate your lies about deployment.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed