TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the Defense Department's interest in patenting software that can manipulate elections. They question which division within the Department of Defense is involved, specifically mentioning intelligence divisions. One of the speakers mentions two key patents, one from 2005 that enables real-time monitoring of elections through dynamic auditing. This patent was developed in collaboration with the National Institute of Help, although its purpose is not fully understood.

Video Saved From X

reSee.it Video Transcript AI Summary
Do you believe votes were manipulated electronically in favor of Joe Biden? Yes, I do. I saw reports of votes switching from Trump to Biden—around 12,000 and 20,000 votes in two instances, with Trump's numbers decreasing exactly as Biden's increased. I suspected something was wrong, especially with claims of intelligence involvement. The Dominion Company, a Canadian firm, stored its records in Germany and Spain, raising concerns about foreign interference. It seems there may have been CIA involvement, as U.S. forces seized servers in Germany, which were linked to CIA operations. Now, those servers are with the FBI, which makes me uneasy, but at least they are in American hands.

Video Saved From X

reSee.it Video Transcript AI Summary
I'm calling about my representation of the Patrick, the spy cheese of clients. My partner, who is worth $323 billion, founded the company and is now missing. He was last seen in his $58 million apartment, trying to secure a $4 billion deal for the largest RNG port in the world. My son hasn't made money in terms of this.

Video Saved From X

reSee.it Video Transcript AI Summary
While on the oversight committee in the senate, Dominion was investigated. The president of Dominion and his software maker testified. Questions focused on whether Dominion machines had internet access. The president of Dominion said no, but this was a lie. The investigation was published, recorded, and should be online.

Video Saved From X

reSee.it Video Transcript AI Summary
- Kibbe on Liberty hosts Congressman Thomas Massey for part one of a mega episode focusing on the FBI-identified pipe bomber in the January 6 events and the anomalies in the official narrative; Massey argues he does not believe one loner acted alone. - Massey discusses prior coverage and context, noting a Steve Baker interview that documented inconsistencies in the official narrative. He points to fallout from that interview: a Capitol Hill Police official, who was third in command, resigned the day after the interview; another whistleblower contacted Massey about that officer, suggesting misconduct unrelated to the pipe bomb but part of a larger pattern of investigations. - Massey argues that the FBI’s announcement of a suspect came about a week after that interview and after reporting by The Blaze, and suggests the timing is suspicious. He says this coincidence is surprising and potentially a red flag, given that the investigation had been deemed inconclusive or dormant for years. - Massey emphasizes his own context: his staffer on the Hill watched hours of video to identify who found the second pipe bomb; he asserts that the individuals who found the second bomb should be considered suspects, and that the FBI admitted this to him. He recounts efforts with Kevin McCarthy to release video showing how the second pipe bomb was found, noting that those who found it were very lucky to locate it quickly. - He describes other connections and leads: his staffer now works for Kash Patel; Massey has spoken with a counter-surveillance officer who found the pipe bomb and with the officer’s handler, a Capitol Hill Police member who had previously worked for the ATF and later for Metro Police and Capitol Hill Police. He also mentions conversing with the assistant FBI director in charge of the Washington field office, in a transcribed interview with Jim Jordan about why cell phone data wasn’t used to geolocate the suspect (the provider allegedly corrupted data, which the judiciary committee and Barry Loudermilk’s committee disputed). - Massey references a 100-page report from Barry Loudermilk’s committee on the pipe bomb investigation, noting leads the FBI did not follow. He mentions a lead about an individual in Falls Church, Virginia (a former military man now in government service) whose metro card was used on January 5 and January 6; this person’s childhood friend allegedly used the metro card to approach the RNC/Capitol Hill Club area and take photographs near the pipe bomb sites. Massey asserts this person of interest, plus a neighbor who shared a wall with him, could be connected to others the FBI has not fully explored. - He contends that the arrest appears to derail other investigations and interviews that were being planned. He asserts that a “pro-Trump” motive has not been established for the suspect, contrasting the media’s framing with details such as the suspect’s My Little Pony interest and parental political donations. - Massey criticizes the prosecutor in the case, Jocelyn Ballantine, and recounts concerns about her track record (including involvement in the Flynn case, the Proud Boys case, and alleged attempts to obtain confessions implicating Trump). He questions why she remains at the DOJ. - They discuss broader concerns about FBI politicization and surveillance: Massey references reporters and contact with Kash Patel’s team to argue for cleaning house at the FBI, but notes Ballantine remains in place. He describes eight senators discovering they had been spied on, leading to a legislative push: in the last continuing resolution, lawmakers added a half-million-dollar payout and standing to sue the government for surveillance abuses, a provision he characterizes as carving exemptions out of the law; he says this was supported by most lawmakers, who voted for the CR due to Trump concerns. - They debate possible explanations for the pipe bomber case: the possibility that the FBI identified the suspect and cleared him, prompting no arrest due to exonerating information; or the possibility of a false narrative crafted by others to preserve the January 6 prosecution framework; or the involvement of a patsy or rogue actor. - Massey reiterates his three things he said on Twitter: the bomber was a lone wolf (which he disputes); the FBI was unwittingly incompetent for four years (which he says he questions and calls a cover-up); and it was not a Trump supporter. He stresses the need for more transcribed interviews and explanations from the FBI and ongoing oversight to uncover the full truth. - The discussion shifts toward Epstein files coverage and the broader goal of maintaining public pressure for transparency. They indicate a plan to release a separate bonus episode focusing on Epstein files.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Epstein file controversy, the DOJ's handling of it, and what the speakers see as systemic failures and political risk for Donald Trump and allied figures. - The Epstein/file issue is framed as predictable and frustrating. Alex Jones notes a “slow drip of nothing” and calls the initial promise of full file disclosure a pattern of “promise something, deliver nothing.” Pam Bondi’s statement that “the files were on my desk” is discussed as an apparent misstep or staged moment, but the core point is that large amounts of material are not being released despite public promises. - The discourse questions where the files actually reside and who controls access. The claim that a “truckload of files” existed and was hidden at DOJ is rejected as a mischaracterization; the speakers emphasize that the FBI and DOJ have files, but access and disclosure have been hampered by internal political dynamics. They highlight the tension between the Southern District of New York and the DOJ, noting that SDNY answers to the DOJ and the Attorney General, thereby questioning the premise that one regional office is independently sabotaging access. - There is a persistent critique of DOJ leadership and governance. The argument is that DOJ has not been “rooted out of corruption,” with mid-level and high-level managers and appointees still in place, propagating practices that the speakers deem contrary to transparency and accountability. They point to supposed failures by individuals such as Cash Patel and Pam Bondi in relying on FBI briefings rather than verifiable records, suggesting that power in intelligence agencies is still too dependent on information control. - The Epstein files are treated as emblematic of a broader issue: a two-tier or selective justice system. The speakers argue that there’s a pattern whereby powerful individuals have access to information and protection, while the public lacks full visibility. They mention that Trump’s response and the way the files have been handled have become a larger “Russiagate-like” narrative, with Epstein serving as a lightning rod for accusations of corruption and cover-up. - The political dynamic is central. Several participants emphasize that Trump’s stance and the responses of his allies are under intense scrutiny. They discuss the risk that Trump’s association with the Epstein disclosures could become a political liability if the files aren’t released. Marjorie Taylor Greene and Tom Massey are mentioned as consistent voices pushing for full disclosure, while Roger Stone’s warnings about CIA and foreign involvement in the Epstein nexus are cited as supporting the view that a larger, international financial/transnational network may be implicated. - There is criticism of how the media and political opponents handle the issue. The speakers claim Democrats are using hearings to turn the Epstein matter into a broader political weapon and to portray Trump as obstructive or complicit, regardless of the factual state of file disclosure. They argue that the public is being led by a PR war, with “photoshopped” or redacted material used to frame narratives rather than to reveal truth. - The discussion turns toward accountability and remedies. The speakers insist that federal law requires the release of the Epstein files by a deadline, and that failing to comply constitutes a constitutional or institutional crisis. They argue that Congress lacks direct enforcement power and must consider funding or other leverage to compel compliance, noting the apparent reluctance of Congress to act decisively. - There are predictions about personnel changes and institutional reform. Dan Bongino is discussed as likely to depart from his DOJ-related role, with Todd Blanche as the lead prosecutor taking heat for not meeting deadlines. Andrew Bailey is floated as a potential replacement. The broader implication is that there will be a shake-up in DOJ and possibly FBI leadership in the near term, though the speakers acknowledge uncertainty about how far reforms will go or whether entrenched interests will impede real change. - The Epstein matter is used to illustrate how compromises and cover-ups operate across power structures. The speakers argue that the problem isn’t just the existence of the files but how the system treats those files—how access is controlled, how redactions are justified, and how political narratives are constructed around high-profile investigations. Harmony Dillon and Liz Harrington are cited as voices who underscore the need for mid-level reform and more transparency, suggesting that the deepest issues lie in organizational culture and incentives rather than in isolated acts by a few individuals. - A broader reflection on American governance finishes the discussion. The speakers warn that a failure to release the Epstein files or to purge corrupt practices could deepen distrust in federal institutions and threaten the legitimacy of the government. They suggest that if reform stalls, the country might devolve into a state-by-state dynamic or other less cohesive arrangements, as confidence in a functioning central government erodes. In summary, the transcript frames the Epstein file disclosures as a litmus test for DOJ integrity and political accountability. It portrays a pattern of delayed or selective disclosure, questions about who controls information within the FBI/DOJ, and a risk that political calculations are interfering with lawful obligations. It also foresees significant leadership changes and intensified scrutiny of the department in the near future, with Epstein serving as a focal point for broader critiques of how power and information are managed in the United States.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the FBI's "failed investigation" of the January 6th pipe bomb, alleging the FBI has no leads or suspects, has lost information and evidence, and that the Secret Service deleted all texts from January 6th. The speaker claims Steve D'Antuono said cell phone data that could have been used to find the bomber was corrupted. The speaker states that the FBI does not have video footage of the DNC from January 6th. The speaker asks if confidential human sources were involved in the pipe bomb incident. The other speaker responded they would have to refresh themselves on the information gathered to date. The speaker suggests getting the information public before the election.

Video Saved From X

reSee.it Video Transcript AI Summary
A federal consulting group within the Department of Interior managed contracts for various agencies. One contract was for $830 million to conduct surveys. The surveys were simple, consisting of 10 questions on an 8.5 x 11 sheet of paper, easily created by a child or AI. This contract was stopped after the inauguration. The speaker stated that the contract was a fraud.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers discuss an IP patent by Inter Ravi Jaffi related to the domain name system and operating using restricted channels. They find it interesting that after the 2016 election, the filing attorney changed to Perkins Coie. They also mention that during a testimony, it was revealed that Rodney Joffe billed Perkins Coie over $3 million for work done by his firm, NuStar Technologies. They express curiosity about the nature of that work and how the money was spent. Additionally, they mention that Joffe was terminated from the FBI, but they don't provide any details about why.

Video Saved From X

reSee.it Video Transcript AI Summary
Daniel, while doing metrics review, noticed indicators of compromise, including a 200-300% increase in data being moved out of the NLRB system, specifically 10 gigabytes worth of data from an internal record-keeping device containing private information about union organizers and privileged business data. The White House stated this was part of an effort to eliminate waste, fraud, and abuse. However, within fifteen minutes of Doge engineers creating accounts, someone from Russia allegedly tried to log in with the credentials. There are also claims that data is being exfiltrated using Starlink, potentially funneling information directly into Russia. Internal databases throughout the government, including those at the Department of Treasury, Energy, and Defense, have reportedly been opened to the internet. Logs and records of what the Doge team accessed are missing specifically after the data spike incident, including whether they accessed information related to cases about Elon Musk, whose companies have faced complaints at the NLRB.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker questions why the FBI paid Christopher Steele $1 million to verify a dossier on Trump and offered $3 million to Twitter to suppress a story on Hunter Biden. They express concern over the FBI's actions being politically motivated. The FBI director responds by explaining the payments to social media companies are for legal process costs. The speaker accuses the FBI of damaging its reputation and questions if the FBI requested financial institutions to provide customer data. The FBI director is unsure and the speaker presents an email from Bank of America as evidence.

Video Saved From X

reSee.it Video Transcript AI Summary
The Director of National Intelligence reported that an FBI analyst ran queries based on a tip from his mother about his father's alleged affair. The speaker questions if the analyst was terminated or had their security clearance revoked. The speaker also raises concerns about intentional wrong searches conducted by FBI employees, but the other speaker cannot provide specific information on those instances. The speaker criticizes the lack of trust in the FBI's ability to address these issues and highlights the need for reforms. They argue that adding a warrant requirement for queries involving US persons would not hinder the government's efforts. The conversation ends with a disagreement on the constitutionality of Section 702 and the FBI's actions.

Video Saved From X

reSee.it Video Transcript AI Summary
Encrypted relay tech matching the signature used in a TU-22 drone strike package was allegedly found in Congressman Nadler's office, which is located in a federal building in New York City. The signal originated on US soil before bouncing through European ghost servers. The speaker believes $7 billion worth of Russian assets were destroyed using classified NATO-style drone warfare. President Trump was briefed and DHS activated without media coordination to stop further compromise. A staffer was detained, possibly a digital handler, and a laptop was scrubbed mid-raid. The speaker questions who put the tech in Nadler's office, suggesting possibilities such as China using US politicians as proxy runners, Russia laundering sabotage evidence, or globalists operating as fifth column agents. The speaker asks if the ICE protest was staged to allow entry/exit of foreign agents disguised as demonstrators to extract, deliver, or destroy sensitive material. The speaker calls for a national security audit and a sweep of foreign tech in domestic offices.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript centers on a long-form discussion of the Epstein case, the alleged “deep state,” FOIA operations, and political maneuvering around Trump, with frequent calls to aggressively release and pursue Epstein-related documents and other investigations. The speakers assert that the FOIA department is being used to shield deep-state ties and that many federal offices are filled with anti-Trump figures who have prevented full disclosure. - Epstein files and the role of the deep state - The speakers claim the Epstein files are being selectively redacted by FOIA departments to conceal deep-state connections. They state that FOIA personnel are controlled by deep-state actors and that Epstein’s case involves a “fleet of aircraft” and operations linked to major power centers. They argue Epstein’s activities connect to money laundering, information laundering, and a broader set of deep-state assets and operations. - They propose a remedy: appoint Tom Fitton as special counsel on the Epstein files, arguing he “knows how FOIA really works,” understands key personnel, and has litigated Epstein-related cases for years. They assert this would restore public confidence and expedite the exposure of Democratic ties and other actors alleged to be involved. - They advocate for Trump to have executive-privilege-style powers to declassify and release Epstein materials, suggesting a broad interpretation of “Epstein file law” that would allow him to disclose or appoint an ombudsman with power to release materials at will. They emphasize the need to disclose Democratic ties and to hold press conferences when releasing documents, avoiding the use of fake documents or videos. - Specific figures and institutions named - Kash Patel is cited as saying there are “open files on a dozen plus coconspirators” and as someone who has noted alleged misdirections by those handling Epstein-related material. - Kyle Serafin and Phil Kennedy are mentioned as documenting a person at the FBI capacity who is “an anti-Trump advocate,” implying that deep-state appointments control FOIA and related processes. - Speaker 0 and Speaker 1 discuss replacing FOIA and related personnel who are deeply implicated; they specifically name Tom Fitton as the ideal choice and entertain other high-profile figures like Tulsi Gabbard as potential custodians of the Epstein disclosures. - Tulsi Gabbard is described as being in charge of broader investigations tied to the Epstein files and other major political issues (elections, COVID-19, etc.). They also reference “Epstein files” intersecting with other investigations they attribute to the deep state. - Epstein, Maxwell, and allied networks - Epstein is described as deeply embedded with Western intelligence agencies (French, Israeli, UK, and US) and tied to Robert Maxwell, with Maxwell’s daughter linked to Epstein. Epstein is portrayed as having been “recruited by Bill Barr” and as a central figure in a long-running intelligence and blackmail operation. - The discussion links Epstein to Leslie Wexner (Victoria’s Secret founder) and a French talent agency, portraying these connections as part of a large, interconnected network involved in money laundering, arms trafficking, blackmail, and intelligence work. - The speakers insist that Epstein’s activities extended to the late 1990s and beyond, including alleged involvement in “Shutters” in Santa Monica and other high-profile cases, with a consistent pattern of using underage girls and blackmail to exert influence. - They emphasize a broader motive: exposing the “deep state” to vindicate Trump and indict deep-state actors who allegedly engaged in illicit operations, including foreign intelligence services and Western governments. - The broader political frame and potential indictments - The Epstein files are presented as a potential hinge for indicting a wide array of figures across political lines, including references to Comey, Mueller, Hillary Clinton-era actors, and other “rogue actors” who allegedly hindered investigations. - The conversation ties Epstein to broader themes: the 2020 election, COVID policies, and anti-Trump actions by the “deep state.” They contend that the Epstein disclosures could demonstrate the depth of state interference in political processes and media, making Democrats and their institutions targets of accountability. - They argue the Epstien files could show criminal activity by multiple national actors, including Israeli, UK, and French components, and could reveal coordinated efforts to derail Trump and manipulate media narratives. - The Candace Owens angle and related criticisms - A substantial portion of the dialogue critiques Candace Owens, alleging she is running a “CIA-style” operation that distracts from the true conspiracy around the deep state and Tarantifa, and that she manipulates narratives related to Tyler Robinson and Charlie Kirk. - They accuse Owens of shifting narratives, fabricating alibis, and promoting disinformation, calling her a “SIOP” (psychological operation) and alleging her behind-the-scenes connections to MI6 or other international actors through her husband (George Farmer) and other associates. - They recount multiple incidents where Owens purportedly changed stories about meetings, alibis, and involvement in various investigations, asserting she uses “receipts” selectively and inconsistently to support divergent claims. - The speakers allege that Owens’s public warfare against Trump and TP USA is part of a broader intelligence operation intended to disrupt conservative momentum, link to Royal/MI6 circles, and undermine investigations into the deep state and its networks. - Tyler Robinson case and media dynamics - They describe Tyler Robinson as a Middle American figure whose transformation into a political actor is portrayed as a product of online radicalization and Tarantifa-linked influences. They claim there was a concerted effort to spoon-feed disinformation about Robinson and Candace Owens’ involvement. - They argue this is part of a larger pattern of media manipulation and disinformation designed to distract from real conspiracies and to target Trump and conservative movements. - Strategy and messaging guidance - The speakers advocate for Trump to go on the offensive with Epstein, releasing comprehensive, verified documentation, and pushing accountability for “rogue actors” in the FBI, the DOJ, the CIA, and the NSA. - They stress the need for aggressive prosecution and the appointment of trusted figures to lead the Epstein disclosures, arguing that this could restore public confidence and pivot the political conversation toward accountability for the deep state. - They urge addressing the statute of limitations issues in COVID, January 6, and 2020 election-related cases before the window closes in early 2026, warning that delays by Bondi, Blanche, and others could jeopardize prosecutions and political support. - Promotional and logistical notes - The dialogue includes frequent mentions of promoting Alex Jones programs, products, and stores (alexjonesstore.com and infowarsstore.com) to fund operations, along with appeals to listeners to support the broadcasts financially and through purchases, framing financial support as essential to sustaining investigations, media efforts, and broader political action. In sum, the transcript presents an entangled, aggressively conspiratorial narrative: a claim that Epstein’s files illuminate a vast, deeply embedded deep-state apparatus spanning multiple nations and agencies; a call to appoint trusted figures (notably Tom Fitton) to supervise full disclosure; a push for Trump to declassify and publicly prosecute the implicated actors; a harsh critique of Candace Owens as part of a disinformation ecosystem; and a broader strategy to use Epstein, along with related investigations, to dismantle perceived institutional corruption while fueling political narratives and fundraising.

Video Saved From X

reSee.it Video Transcript AI Summary
CrowdStrike claimed the Russians hacked the DNC, but DNC data downloads occurred after this claim. The speaker submitted this evidence in court cases for Flynn, Stone, and Butowski, but was not allowed to testify. Guccifer 2.0's data postings had transfer rates unsustainable on the internet, suggesting intelligence agency involvement. Timestamps indicated manipulated data, with files separated manually from one download. Files with Russian fingerprints posted by Guccifer 2.0 were absent in WikiLeaks' Podesta data. This aligns with Vault 7's Marble framework, potentially pointing to CIA involvement. Within 24-48 hours of discovering Seth Rich's WikiLeaks involvement, a Russian storyline emerged, involving Guccifer and CrowdStrike. CrowdStrike's credibility is questioned due to their alleged failure to detect a Russian penetration for 42 days. The speaker suggests that if Seth Rich's murder is connected, the NSA would have known immediately about his involvement via their database. This information could have been reported and accessed by CIA, potentially implicating them. Imran Alwon, a Pakistani intelligence asset, ran DNC servers. Pakistani intelligence may have targeted Seth Rich to protect their compromised penetration. Kirk Weeby found a Pakistani address on the California Secretary of State's email distribution network, exposing the entire US election process to Pakistanis.

Video Saved From X

reSee.it Video Transcript AI Summary
People are talking about Epstein's relations with Ahud Barak. A lot of emails got leaked, and it included Peter Thiel. Reporting Carbine, their security company. But all of that was mapped out a long time ago.

Video Saved From X

reSee.it Video Transcript AI Summary
- The discussion centers on Fulton County’s ballot-seizure case and the implication that the affidavit relied on was built from recycled conspiracy theories by a known conspiracy figure. It is asserted that the judge was not told these issues had already been relitigated, and that the administration appears intent on applying the same approach elsewhere. - Question raised: can these efforts be stopped, given the underlying pattern and what the other side is pursuing? And what is their plan for 2026 if they lack the 2020 conspiracies to lean on? - Jen notes her role as counsel in the Fulton County matter and declines to comment further on the specifics. - Jessica forecasts that Trump-aligned actors will pull out 2020 ballots and photos, arguing that the numbers don’t add up and that the machines were faulty and the people fudged because, allegedly, in Fulton County they did. She emphasizes that there is no evidence that the irregularities would have changed the outcome in Georgia, but acknowledges there were thousands of irregularities, with records destroyed and chain-of-custody issues, and that the recount and audit were of poor quality. She warns that in 2026 the same approach could be used again with untrustworthy machines and flawed audits, and warns that even if actual facts are shown, they would highlight known errors. - Marilyn adds the point that a Barack Obama-appointee judge confirmed the unreliability of the machines and notes a demonstrator at DEFCON Voting Village showed how easily a Dominion machine can be hacked. She cites a view that Biden still won Georgia, despite the “fudged audits,” and argues that the intent behind the questionable procedures was to obscure errors. - Jessica identifies Raffensperger as the official who chose the machines and funded the expansive spending on them, suggesting he did not want critical issues to be exposed. She asserts that the process was designed to avoid scrutiny and that the results were obtained by running ballots through the machine multiple times to adjust numbers, including using test ballots to influence results. - The conversation concludes with a focus on the importance of recounts and audits, and the need for a transparent process in 2026. Jessica argues that Georgia’s issues stemmed from an audit with bogus processes and a recount conducted through machines rather than a hand count at counting tables with observers from both campaigns and the clerk. She asserts that the transparency of the counting process could have mitigated much of the controversy and that the lesson for 2026 is to implement a transparent system.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on a big gap in the 9/11 story: where Epstein, Ghislaine Maxwell, and their networks fit into the 9/11 narrative and why a large tranche of related documents is missing or redacted. Jason Bermas is invited to unpack why information about Epstein and Maxwell is largely absent from the DOJ’s released documents around 9/11 and what the missing documents might reveal. He points to a notable gap in the late 1990s and suggests it may be connected to an Epstein-related FBI involvement in 1996, evidenced by Maria Farmer’s report to the FBI in 1996. He highlights that, despite the DOJ releasing about 3,000,000 pages and claiming two and a half million more, there are “gaps” in the late nineties and in the pre- and post-9/11 periods, including “15,000 ledger lines from the financing… completely gone.” He notes Epstein’s alleged involvement in arms dealing dating back to the Iran-Contra era and claims Israel’s role in arms dealing—“Israel actually bought the weapons from Czechoslovakia and Yugoslavia and then shipped them down”—as part of a broader network referenced in a New York Times piece described as “scam schemes, ruthless cons, the untold story of Jeffrey Epstein and how he got rich.” He cites two major relationships from that piece: Stanley Pottinger and Douglas Lease, who were involved in arms dealing. Bermas references a hard-to-interpret, highly redacted document about a possible grand jury on 9/11 in Epstein, noting that “Berman knows they connect,” given that Jeffrey Berman (SDNY prosecutor) worked on many 9/11 cases. He mentions an email from Lord Mandelson to Epstein regarding the EU bailout of 500,000,000,000 and asks what kind of leverage such information could provide. The conversation then shifts to Epstein’s pattern of influence and narrative management, including Epstein’s relationships with Maxwell’s circle (Leslie Groff, Sarah Kalin) and efforts to plant favorable stories with media outlets (Harvey Levin at TMZ; Faith Cates with Newsweek). A short reference is made to a shadow 9/11 commission organized by a figure named Edward J. Epstein (J. Edward Epstein), described as someone who had “put together a website” about a shadow commission and who “was big into the JFK assassination.” Bermas notes Epstein’s claimed interest in writing a book on the 9/11 Commission, which apparently never materialized. The Shadow Commission is discussed as potentially parallel to the official 9/11 Commission, with Henry Kissinger reportedly considered as chair and George Mitchell as co-chair; Mitchell later stepped down and has Epstein connections. Bermas says many pages and redactions leave open questions about how deep Epstein’s influence went and what would be revealed if the remaining 2.5 million pages were released. The conversation ends with Bermas inviting listeners to watch his own work (Fabled Enemies, Loose Change, Invisible Empire, A New World Order) to understand the Epstein network and 9/11 narrative, and with contact points to his YouTube channel and films.

Video Saved From X

reSee.it Video Transcript AI Summary
During my time in the Senate's oversight committee, we examined Dominion. The proceedings were recorded and are available online. The president of Dominion and his software engineer testified, primarily addressing whether their machines had Internet access. The president claimed there was no Internet access, which I believe was false.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that the FBI settled two lawsuits, agreeing to give Peter Strzok $1,200,000 and Lisa Page $800,000. The other speaker believes the Department of Justice was involved, not the FBI, but will confirm if the FBI had to sign off on the settlement. The speaker references Lisa Page saying to Peter Strzok, "Trump's not ever going to become president," to which Strzok replied, "No. He won't. We will stop it." The speaker wants to know if the FBI signed off on the settlement and who signed off on it. The speaker asks if the other speaker or Chris Ray signed off on it. The speaker states that Merrick Garland must have agreed to the settlement. The other speaker will direct the Department of Justice to answer these questions.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
Maricopa County officials are refusing to provide routers or router images to election auditors, defying a judge's orders. Initially, they claimed to have replaced the equipment and would provide it to the Senate, but later suggested virtual access instead. After weeks of delays, they now express concerns about potential risks to other agencies if they share the information. Additionally, it was noted that Hannah Klein, daughter of Biden's chief of staff, signed a document to the DOJ on behalf of the Brennan Center for Justice. There are questions about the Biden administration's involvement in this situation, but there is no comment on whether President Biden is hiding anything.

Video Saved From X

reSee.it Video Transcript AI Summary
James Dennehy heads the New York FBI field office and may be withholding Epstein documents from the attorney general. After Trump took office, Dennehy emailed his staff to dig in. James Comey's daughter, an assistant US attorney for the Southern District of New York, worked on the Epstein and Maxwell cases, so she may be involved. The FBI has access to computers, videos, records, and photos from Epstein's properties. Seventeen years ago, the Justice Department gave Epstein a non-prosecution deal. Where are those files? Also, at the Bureau of Prisons, where are those files? Regarding Epstein's death, there were suspicious circumstances, such as a malfunctioning camera, a missing cellmate, and guards failing to check on him. An EMT source reported that upon arriving at the cell, seven people were already present, handling Epstein's body and moving items around.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.

Breaking Points

KA$H Patel FLIPS OUT After Kirk Assassination Foreign Ties Probed
reSee.it Podcast Summary
The podcast discusses a contentious investigation into Charlie Kirk's assassination, revealing a significant turf war between the FBI and the National Counterterrorism Center (NCTC)/Office of the Director of National Intelligence (ODNI). Joe Kent (NCTC) and Tulsi Gabbard (ODNI) examined FBI files, seeking foreign links, which FBI Director Cash Patel resisted, citing overstepping and interference. This leaked conflict raised concerns about government transparency and potential cover-ups, especially given the state-level nature of the case. Early investigations also looked into "anti-fascist" bullet inscriptions and the administration's alleged use of the murder to frame Antifa as a terror network. Furthermore, the hosts highlight a Tennessee man's month-long detention for a Facebook meme related to Kirk, held on a $2 million bond, before charges were dropped due to public pressure. This incident underscores significant free speech and due process concerns, contrasting it with other cases of detention and deportation threats. The discussion criticizes potential abuses of power and the weaponization of laws to quash speech, questioning the motivations behind the inter-agency conflicts and the lack of mainstream journalistic follow-up on the assassination details.
View Full Interactive Feed