reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The Treasury's main payment system, PAM, handles about $5 trillion a year, roughly a billion dollars an hour. When we first looked at it, payments could be processed with no categorization or description – basically, untraceable blank checks. If this were a public company, it would be delisted, and the executives would be in jail. We recommended making payment categorization codes mandatory with some explanation required for each payment. This radical change is being implemented now, and I think it probably saves $100 billion a year. Where was that money going? It's hard to say what was waste and what was fraud. If the government sends money to someone who doesn't deserve it, is that waste, or fraud?

Video Saved From X

reSee.it Video Transcript AI Summary
We found that the government was essentially sending untraceable blank checks. If a public company did this, they'd be delisted and executives would go to prison, but it's normal in the government. We recommended to the Treasury and Federal Reserve that payment categorization codes be mandatory, not optional, and that every payment need some explanation, even if we don't judge the quality of it. This is a radical change that's now being implemented. I'm guessing it probably saves about $100 billion a year. Where was that money going? It's hard to say if it was waste or fraud. Many payments were just approved and kept going even after the approving officer changed jobs, retired, or died. It's like forgetting to cancel a gym membership, but instead of $20 a month, it's $20 billion a year.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker emphasizes the necessity of a long-term effort to combat waste and fraud, claiming that it will return if vigilance is relaxed, especially if Democrats regain power. The goal is to eliminate funding and grants, making it difficult to restart wasteful and fraudulent activities. The speaker questions whether government employees respect taxpayer money, suggesting a lack of incentive to do so. They assert that incentives determine outcomes and that the payment system is structured such that requests for money are automatically approved.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces a campaign to cut government waste, specifying that deficit reduction requires cutting billions from valued programs, but eliminating pointless waste should be easy. Speaker 1 claims there has been a tremendous amount of waste and fraud in the government during the Biden administration, estimating federal government fraud at half a trillion dollars. The goal is to reduce this figure, saving taxpayer money by stopping spending on things that very few taxpayers would agree makes sense, such as transgender animal surgeries. Speaker 1 also questions why twenty million people who are definitely dead are mocked as alive in the Social Security database.

Video Saved From X

reSee.it Video Transcript AI Summary
"Big Balls" says that "Big Balls" is their LinkedIn username because people on LinkedIn take themselves too seriously and are adverse to risk, and they wanted to be neither of those things. "Big Balls" is working on payment computer stuff to root out fraud and waste. There is no accounting of what payments actually go to in the payment computer. When looking at a specific line item, like $20,000,000, for the majority of payment systems, they don't know what the money is going to. This is a huge cause for concern because the upstream thing which is distributing the money literally has no checks, and no accountability to the actual American taxpayer, making it a huge vector for fraud, waste, and abuse. There is no incentive if you work in the government to respect taxpayer money, and incentives decide the outcomes.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1, Clinton Eugene Curtis, testifies that he wrote a prototype program in 2000 that could secretly fix elections. The program could flip votes to any desired candidate without detection by election officials. Curtis explains that the only way to detect such a program would be to view the source code or compare paper receipts to the actual vote totals. When asked if he could have designed a protective program to prevent election rigging in Ohio, Curtis says no, as it would require examining the source code and involving programmers from all parties. Curtis believes that the Ohio presidential election was hacked based on statistical anomalies between exit polling data and tabulated results. He also reveals that he was asked to design the program by Tom Feeney, who was a lobbyist for Yang Enterprises.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims government computers don't synchronize and numbers presented to senators aren't real, potentially off by 5% to 10%. They define a "magic money computer" as one that makes money out of thin air by issuing payments. There are supposedly 14 such computers, mostly at the Treasury, but also at HHS, State, and DOD. These computers allegedly send money out of nothing.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asked Chat GPT how much money the Pentagon had unaccounted for in its last audit. Chat GPT initially stated the Pentagon had about $220 billion in assets. The speaker thought the figure was closer to $1.5 trillion and corrected Chat GPT. Chat GPT responded that the speaker was correct and that in its most recent audit, the Pentagon could not account for $1.5 trillion in assets. The speaker then prompted Chat GPT to put $1.5 trillion into perspective. Chat GPT stated that if you spent $1 million every day since the birth of Christ, you still would not have spent $1.5 trillion, and it would take over 4,100 years to reach that amount. The speaker emphasizes that $1.5 trillion is just the amount of money that is unaccounted for.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes having friends in the US embassy in Belize and knowing what was coming. He says he arranged with the head of security to enter the embassy, but the head of security told him, “we have it from the highest authority. We are not to allow you entry into the US embassy. Understand me.” He asserts, “Who was the highest authority in the state department? Hillary Clinton.” He emphasizes that he is an American citizen with “a fucking American passport,” stating, “I'm sorry. I'm not wanted in America. I've got no crimes in America. Is it not reason to say, I don't think I'm gonna vote for you?” Speaker 1 notes, “And yet you're here now.” Speaker 0 explains that for a month and a half he was on the run. He claims the government wanted to collect him because, after they raided his property in 2012 in the jungle, they shot his dog, abused him, and destroyed “a half million dollars worth of my property over a bogus charge.” He says he was pissed off and then “donated too many secretaries within the government laptop computers, really nice ones that were preloaded with viral spyware.” He contends that within a week, “the entire government computer system was in under my control. I was watching, monitoring, listening.” He continues that he was looking for information that they had set him up for that raid, and he didn’t find that. Instead, he discovered that “the minister of national defense was the largest drug trafficker in all of Central America, and the minister of immigration, the largest human trafficker.” Speaker 1 responds, “We don't wanna get killed by them either, so we're probably not—” and Speaker 0 agrees, “You're not gonna,” adding, “That's fine.”

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: I never go back to the carpet store. Speaker 1: This guy's taken Roy off the grid, no social security number. Speaker 2: The Matrix is everywhere, even in this room. It blinds you from the truth. You're a slave, born into a prison you can't sense. Speaker 1: The Matrix is our enemy, but most people aren't ready to unplug. Speaker 2: They're dependent on the system and will fight to protect it. Speaker 1: Live again. Speaker 2: Not everyone can be a robot polisher.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The election was stolen. A graph shows people who worked for ES&S, Hart, Dominion Voting Systems, ClearBallot, and Smartmatic, recycling through companies. People who worked at Dominion Voting Systems are entering the political sphere and taking over election offices; one county in Texas, after hiring someone who worked for Dominion, went blue for the first time. The speaker walks through information: Dominion using “Serbian technology with Chinese characteristics.” Huawei Bank is involved; there’s no public board saying Bank of China funds anything, but research on Roaming Networks—a relatively unknown Serbian company until 2013—shows it signed a value-added contract with Huawei Bank. Huawei is “the Bank of China.” Roaming Networks built ICT infrastructure and data centers in Serbia, with owner Nenad Kovac identified as the enterprise partner. Some Roaming Networks information may come off their site after this presentation. Dominion Voting Systems has a corporate office in Serbia; a screenshot of the office and a developer on their site is noted. A Serbian legislative leader said, “I know Dominion Voting Systems back in November. They have an office here.” Dominion started rapidly removing Serbian coders from their site/LinkedIn. Code is built in Serbia for a system used in the United States, using infrastructure funded by China, not just China but the Bank of China. A slide discusses Dominion’s enterprise partnership with Huawei, added to the restricted list on 05/16/2019. Roaming Networks references show Dominion Voting Systems using a pure flash storage solution in Dominion’s data center. A photo of Sacramento shows Dominion hardware coming from China, with a bill of lading from a Chinese supplier to Dominion’s McKinney, Texas office. Testing and approval of Dominion hardware show similarities with Smartmatic; the same hardware with different branding. They claim a “tail” behind the scenes—evidence of connections among ES&S, Hart, Dominion, ClearBallot, Smartmatic, with people cycling through these companies. People who once worked at Dominion are now entering election offices; in Texas, a county that hired a former Dominion employee “went blue” by accident with ES&S involved. The speaker calls out Gina Griswold for commenting on Tina Peters and Mesa, and Matt Crane’s role as Arapahoe County clerk and recorder, now head of the County Clerks Association; Crane’s wife previously worked for Dominion and Sequoia Voting Systems. The speaker asserts a public breach of trust requires an audit; if there’s nothing to hide, audits should restore trust. They argue, whether Dominion is the bad actor or not, removal of logs, altering code, and a “trusted build” are problematic, and emphasize the need for audits and investigations to restore trust in elections. Speaker 1: Indicators: a senior Dominion vice president’s name appears on patents; a software engineer involved in the Wayne County, Michigan tabulation center is connected to the software. Coincidences accumulate, suggesting there is a preponderance of evidence with affidavits across the country. The speaker asks which computer produced certain files analyzed yesterday; whether it came from the central count or precincts. Speaker 0: Answers with a non-answer, noting they imaged the main EMS and the tabulation system; servers in the county coordinate precinct information and house audit reports, cast vote reports, error reports, adjudication reports, and access logs. Thumb drives can contaminate the county and state systems if connected to a machine; it’s not unique to Dominion or voting systems but a general risk. They emphasize avoiding white noise and focusing on facts: Dominion is in Serbia; Huawei Bank funds the enterprise partnership and Serbia-based data centers; code is written in Serbia; imaging shows fingerprints of this. They call for audits, note deviations in Georgia (ballots appearing identical in different batches, a shredder truck before January 20 in Georgia, and a leaky arena water claim later proven to be a leaky toilet), and point to media silence. They argue against accepting the gold standard claim and highlight perceived connections to Soros-funded groups. They stress deviations in state and county behavior, urge audits, and compare the election system to a serial killer—unacceptable to let foreign systems run it. Speaker 2: Adds that with 100 indicators, a pattern emerges; reiterates the need to examine which files came from which computer, and questions the integrity of the central count. Speaker 3: Notes the risk of a non-internet-connected thumb drive introducing malware; emphasizes auditing all machines for that reason.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 expresses a vision to transform government transparency and control over spending. The core goal is to blockchain the entire federal government, and to have every dime of federal spending online in real time, so there is day-by-day, month-by-month visibility into what the Department of Interior and Veterans Affairs (and other agencies) are spending money on. The speaker suggests there could be national security risks with such transparency, noting that some aspects could be “black box” or restricted, but asserts the ideal is real-time visibility into government spending. The speaker argues that the public should know exactly how money is spent, asking concrete questions like what the Department of Interior is spending money on, and whether they are buying items such as “$50 hammers” or “$200 bandages.” The overarching point is that this is “our money” and “we are the sovereign,” because “we create the government,” we earn the money, and “the government extract it from us with our consent.” Therefore, there is a right to know where the money goes.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker explains that the system consists of computers, machines, and software. The machines function like thumbs, handling the ballots and envelopes. The computers, whether hardware or software, are responsible for executing instructions and providing answers. The speaker emphasizes the importance of the program's setup, execution, and verification to ensure accurate results. Additionally, they mention the significance of the input provided to the system.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker announces anticipated savings of $150 billion in FY 2026 by reducing waste and fraud, citing examples such as people fraudulently receiving unemployment insurance. The speaker suggests waste and fraud are easily found within the government. The speaker believes these savings will result in better services for the American people and ensure tax dollars are spent sensibly. Speaker 0 praises the team's skills in identifying previously unnoticed issues and their computer proficiency, expressing a desire to retain them long-term. Speaker 1 mentions working with Howard on the "Trump gold card operation."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reviewed server logs and identified "Brian." The speaker found a database in the next vendor and new forensics. Christy is mentioned in connection to a server. The speaker shows access and a deletion on the log from the database. A previous tweet shows Christy letting Brian into the server. The speaker repeats "Here he is" multiple times. The speaker mentions another law proposal and altering.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers agree the current system is "pretty bad," and Speaker 1 attributes this to a lack of competition, stating the government has a monopoly on governing. Speaker 1 clarifies they are not advocating for privatizing government. The speakers then discuss corruption, with Speaker 0 stating they know some individuals involved. They then consider focusing on incompetency and waste instead of fraud. Speaker 0 agrees there is waste in the system.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker emphasizes the necessity of a long-term commitment to preventing waste and fraud, claiming that these issues will resurface if vigilance is relaxed, especially when Democrats regain power. The aim is to eliminate funding and grants to make restarting wasteful practices difficult. The speaker questions whether government employees respect taxpayer money, suggesting a lack of incentive to do so. They assert that incentives determine outcomes and that the current payment system readily provides funds upon request.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reviewed server logs and identified "Brian." The speaker found forensics in a database. The speaker shows access and a deletion on the log from the database. The speaker claims Christy previously tweeted about letting Brian into the server. The speaker repeats "Here he is" multiple times. The speaker mentions a law proposal.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 stated that people on LinkedIn take themselves too seriously and avoid risk, so they decided to do the opposite. Currently, they are working on payment computer initiatives to root out fraud and waste. Speaker 0 found that there is no accounting of where payments actually go within the payment computer. When looking at a specific line item, like $20,000,000, it is often unknown where the money is going. Speaker 0 believes this lack of accountability is a huge cause for concern because the upstream entity distributing the money has no checks and balances, making it a significant vector for fraud, waste, and abuse. They claim there is no incentive to respect taxpayer money when working in the government, and incentives determine outcomes.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 proposes a deal to Mr. Reagan, acknowledging that the state they are in is not real. They discuss the illusion created by the matrix, where even the taste of food is simulated. After 9 years, Speaker 0 realizes that ignorance is bliss. They finalize the deal, emphasizing their desire to forget everything and have no recollection.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: We have a problem with the CIA and FBI in Washington. Speaker 1: What's your plan to start over and fix them? Speaker 0: They've gotten out of control, with weaponization and other issues. The people need to bring about change. We were making progress, but more needs to be done.

Video Saved From X

reSee.it Video Transcript AI Summary
My team at the Department of Government Efficiency (DOGE) uncovered $100 billion in wasted Medicare and Medicaid funds. Working with two senior CMS veterans, we had read-only access to their payment and contracting systems. Our mission was to find ways to use resources more effectively, but we discovered massive waste and potential fraud. CMS processes over a billion Medicare claims annually and manages billions in Medicaid funds. They recently suspended 850 agents for suspected fraud. The Department of Justice has also been prosecuting healthcare fraud cases, with billions of dollars in losses. This discovery highlights a massive scandal, potentially the biggest in US history, and is prompting calls for similar transparency initiatives in other countries. We need major reform, absolute transparency over tax spending, and human oversight to ensure this doesn't happen again.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that government computers, including those used by senators, do not accurately reflect real numbers and may be off by 5% to 10%. The speaker calls any computer that can make money out of thin air a "magic money computer." These computers issue payments and are primarily located at the Treasury Department, but also exist at HHS, State, and DOD. The speaker claims to have found 14 such "magic money computers" that send money out of nothing.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims $5 trillion in untraceable payments exist with no record of where the money went. They allege Social Security sent out $72 billion in bad checks, and the head of Social Security resigned. The speaker finds the resignation suspicious. Speaker 1 asserts there is no waste in the Pentagon, Treasury, or HHS. Speaker 1 asks why Speaker 0 is not celebrating cuts and reforms if they agree there is waste, abuse, and corruption. Speaker 1 claims billions of dollars are being saved. Speaker 0 attempts to calm Speaker 1 down, stating they are not having a debate. Speaker 1 insists they are not trying to debate and will speak freely about saving Americans billions of dollars.
View Full Interactive Feed