reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion Systems, the owner of Sequoia and Premier, has a customer portal called dominion.dominionvoting/portal. This portal can be easily accessed and manipulated, allowing customers to view and modify data, including election results. It doesn't require a nation state's level of sophistication to manipulate these sites or gain unauthorized access. Even with limited resources, someone could potentially manipulate the election using these systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0, Speaker 1, and Speaker 2 discuss Dominion’s access to election systems during the 2020 election period in Georgia, with Gwinnett County cited as a specific example. The dialogue confirms that the questioning period was during the 2020 election, and the focus is on whether Dominion remotely accessed election systems and whether such access occurred in Georgia. Speaker 2 asks if there is any indication of nonelection personnel remotely accessing a Dominion system. Speaker 3 responds that they have reviewed a series of emails produced by Dominion in which they’re discussing remoting into Gwinnett County, Georgia. Speaker 1 then notes that Speaker 0 had mentioned Dominion remote collection or connection to election systems but lacks evidence that it occurred in Georgia. Speaker 0 asserts that there was one county and that they have seen many Dominion emails, requiring translation from Serbian to English to verify technical questions and translations. Speaker 1 asks specifically: “So it's your testimony that there is evidence of dominion remotely accessing Georgia election equipment?” Speaker 0 answers: “Yes, on the one county. It was included with stuff that I was researching and reading through considering Colorado. Michigan was also involved and there were other ones.” Speaker 2 inquires about Dominion’s ability to remotely connect to these election systems and whether they could do so without detection. Speaker 0 responds: “Yes.” Speaker 2 then asks if the interviewee is aware of any instances in which that has occurred, and Speaker 0 confirms: “One would be the Denver, Colorado server was granted or requested to grant Belgrave, Only Belgrade. Did search. There is a Belgrade Montana.” The speaker questions why Montana would need to connect to a Colorado file transfer server as part of the election system, noting there are other components and things done in the background concerning the database and the configuration of the database server that still do not have an engineering change order. Speaker 0 explains that in operational environments, things sometimes break and need fixing, leading to the submission of a change request or, in this case, an engineering change order that is retroactive. The goal is to record the process to ensure change management and integrity of the system. If changes are not recorded, it leads to a bad situation, according to Speaker 0.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Break a little bit of news on your program, Jesse. Our partners that do sort of geotagging with devices, they told us that they tracked over 277,000 devices in the vicinity of State Farm Stadium in Glendale, Arizona. 277,000. That's unbelievable. Gives you an idea of the scale of humanity out there.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The election was stolen. A graph shows people who worked for ES&S, Hart, Dominion Voting Systems, ClearBallot, and Smartmatic, recycling through companies. People who worked at Dominion Voting Systems are entering the political sphere and taking over election offices; one county in Texas, after hiring someone who worked for Dominion, went blue for the first time. The speaker walks through information: Dominion using “Serbian technology with Chinese characteristics.” Huawei Bank is involved; there’s no public board saying Bank of China funds anything, but research on Roaming Networks—a relatively unknown Serbian company until 2013—shows it signed a value-added contract with Huawei Bank. Huawei is “the Bank of China.” Roaming Networks built ICT infrastructure and data centers in Serbia, with owner Nenad Kovac identified as the enterprise partner. Some Roaming Networks information may come off their site after this presentation. Dominion Voting Systems has a corporate office in Serbia; a screenshot of the office and a developer on their site is noted. A Serbian legislative leader said, “I know Dominion Voting Systems back in November. They have an office here.” Dominion started rapidly removing Serbian coders from their site/LinkedIn. Code is built in Serbia for a system used in the United States, using infrastructure funded by China, not just China but the Bank of China. A slide discusses Dominion’s enterprise partnership with Huawei, added to the restricted list on 05/16/2019. Roaming Networks references show Dominion Voting Systems using a pure flash storage solution in Dominion’s data center. A photo of Sacramento shows Dominion hardware coming from China, with a bill of lading from a Chinese supplier to Dominion’s McKinney, Texas office. Testing and approval of Dominion hardware show similarities with Smartmatic; the same hardware with different branding. They claim a “tail” behind the scenes—evidence of connections among ES&S, Hart, Dominion, ClearBallot, Smartmatic, with people cycling through these companies. People who once worked at Dominion are now entering election offices; in Texas, a county that hired a former Dominion employee “went blue” by accident with ES&S involved. The speaker calls out Gina Griswold for commenting on Tina Peters and Mesa, and Matt Crane’s role as Arapahoe County clerk and recorder, now head of the County Clerks Association; Crane’s wife previously worked for Dominion and Sequoia Voting Systems. The speaker asserts a public breach of trust requires an audit; if there’s nothing to hide, audits should restore trust. They argue, whether Dominion is the bad actor or not, removal of logs, altering code, and a “trusted build” are problematic, and emphasize the need for audits and investigations to restore trust in elections. Speaker 1: Indicators: a senior Dominion vice president’s name appears on patents; a software engineer involved in the Wayne County, Michigan tabulation center is connected to the software. Coincidences accumulate, suggesting there is a preponderance of evidence with affidavits across the country. The speaker asks which computer produced certain files analyzed yesterday; whether it came from the central count or precincts. Speaker 0: Answers with a non-answer, noting they imaged the main EMS and the tabulation system; servers in the county coordinate precinct information and house audit reports, cast vote reports, error reports, adjudication reports, and access logs. Thumb drives can contaminate the county and state systems if connected to a machine; it’s not unique to Dominion or voting systems but a general risk. They emphasize avoiding white noise and focusing on facts: Dominion is in Serbia; Huawei Bank funds the enterprise partnership and Serbia-based data centers; code is written in Serbia; imaging shows fingerprints of this. They call for audits, note deviations in Georgia (ballots appearing identical in different batches, a shredder truck before January 20 in Georgia, and a leaky arena water claim later proven to be a leaky toilet), and point to media silence. They argue against accepting the gold standard claim and highlight perceived connections to Soros-funded groups. They stress deviations in state and county behavior, urge audits, and compare the election system to a serial killer—unacceptable to let foreign systems run it. Speaker 2: Adds that with 100 indicators, a pattern emerges; reiterates the need to examine which files came from which computer, and questions the integrity of the central count. Speaker 3: Notes the risk of a non-internet-connected thumb drive introducing malware; emphasizes auditing all machines for that reason.

Video Saved From X

reSee.it Video Transcript AI Summary
I found a video where the speaker goes through some server logs and discovers a database issue. They mention finding different forensics related to it. They also mention a person named Christy, who seems to be active in the GMC community.

Video Saved From X

reSee.it Video Transcript AI Summary
While on the oversight committee in the senate, Dominion was investigated. The president of Dominion and his software maker testified. Questions focused on whether Dominion machines had internet access. The president of Dominion said no, but this was a lie. The investigation was published, recorded, and should be online.

Video Saved From X

reSee.it Video Transcript AI Summary
I noticed an Ethernet cable connected to a router, which was linked to the local data center and the voting machines. This suggested an external internet connection. I also found a wireless network called AV_connect, which probably refers to absentee voting.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion can remotely connect to election systems without detection. This has occurred in instances such as the Denver, Colorado server, which was requested to grant access to Belgrade. It is unclear why Belgrade, possibly Belgrade, Montana, would need to connect to a Colorado file transfer server for an election system. There were also background activities concerning the database and its configuration that lack an engineering change order.

Video Saved From X

reSee.it Video Transcript AI Summary
I have an iPhone. Does Google track my movement if I move to sit with my democrat friends? Google knows if I move, but it depends on the services I've opted into. Can you answer if Google knows I moved without more details?

Video Saved From X

reSee.it Video Transcript AI Summary
Independent developers and consultants are monitoring network traffic, observing unusual activities related to a DDoS incident. There’s uncertainty about the status of the BC election site and whether it can be refreshed.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reviewed server logs and identified "Brian." The speaker found a database in the next vendor and new forensics. Christy is mentioned in connection to a server. The speaker shows access and a deletion on the log from the database. A previous tweet shows Christy letting Brian into the server. The speaker repeats "Here he is" multiple times. The speaker mentions another law proposal and altering.

Video Saved From X

reSee.it Video Transcript AI Summary
Introducing Cozone.com, the website for computer help and purchasing.

Video Saved From X

reSee.it Video Transcript AI Summary
Chaya from Lives at TikTok explains she investigated an unmarked building in Burnsville, Minnesota, where nine health care companies are operating out of a single location, all with Somali names. She notes there are likely more than the nine discovered. One of the entities is Grace Care Center, run by Saeed Ahmad, which the site claims has a facility for kids with autism. She reports numerous red flags on that site, including slogans like “We cure your chill,” and suggests it is aimed at offering care for children. When contacting the listed numbers for these businesses, many do not work: some ring endlessly, others are disconnected. Most of the companies do not have websites, reviews, or additional information available. One company at the location does have a website, but it contains many spelling errors. The site’s gallery uses stock images that do not lead anywhere. Other links on the site do not function, redirecting back to the homepage. The “About Us” section states it was founded by Omar, accompanied by a stock image of a white woman, even though Saeed Ahmad is the founder. The contact information is described as fake, including a fake address, phone number, and email address. Chaya emphasizes that the situation appears highly suspicious.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational hub of Dominion. This office, staffed by Chinese nationals, manipulates election results using virtual machines created within the election equipment. The manipulation is done through software, leaving no trace unless a detailed forensic audit is conducted. This process involves using Huawei servers, linking back to China. For more information, visit Stolen Elections Facts for documentation.

Video Saved From X

reSee.it Video Transcript AI Summary
The original post of the crazy plane lady video was made by Juan Frank We, also known as Knuckles Lawn Care. Juan Frank We is a US Federal Government employee in Fort Hood, Texas, and claims to be a logistics manager for the US Army and a computer operator at Fort Campbell, Kentucky. I traced the route to her business site, which led to an army recruitment place in Ohio on DOD servers. The connections between all these dots are undeniable.

Video Saved From X

reSee.it Video Transcript AI Summary
Colonel Daniel Davis joins the discussion to address the idea of a forthcoming false flag attack aimed at provoking Iran into a broader war. The conversation threads through claims that key US and Israeli military hardware is in place, Russia has countermeasures ready, and that Israel and a US “deep state” war faction coordinated by the CIA are driving the move. There’s also the assertion that a US carrier strike group is in place for the operation, and that the New York Times reports Trump has received intelligence suggesting Iran’s position is weakening. The host questions the reliability of this intelligence flow, asking who is really transmitting such assessments and whether the CIA or others are shaping Trump’s view. Davis pushes back on the weakening Iran narrative, stating he has followed Iran for years and sees no evidence that Iran is weakening; to the contrary, he notes Iran used a forceful response to suppress a rebellion—an action that, in his view, suggests strength. He references outside voices, including Mossad and Pompeo’s New Year’s Eve tweets, to illustrate how Western narratives have portrayed the protests. He challenges the idea that the protests reveal Iran’s weakness, arguing that the regime’s security apparatus remained in control and that no IRGC defections or regime desertions appeared visible. He warns that if Trump is led to believe Iran is at its weakest point, a more aggressive push could backfire, potentially producing a strong repudiation. The discussion turns to what a “deal” with Iran might entail. The co-panelists note claims that Trump says they can make a deal, while Davis explains that reports indicate any deal would require Iran to remove enriched uranium, cap long-range missiles, change its regional proxy policies, and ban independent uranium enrichment—red lines Iran has repeatedly rejected. The implication is that such terms would, in practice, preclude a peaceful settlement and push toward a military strike. The debate then moves to the military buildup and international reactions. The host asks about possible actions in the next few days, given reports of an Israeli target date around January 30. Davis rejects the notion of a simple, quick conflict, arguing that some Trump administration insiders want a regime-change outcome, whereas he sees limited attainable objectives beyond bombing or destroying infrastructure. He emphasizes the risk of a miscalculation leading to American or Israeli casualties and the potential for a prolonged conflict. He warns there is zero upside to a strike on Iran and a high downside if Iran responds forcefully. Turning to regional dynamics, the panel discusses how Russia, China, and a new Saudi axis might respond. Davis suggests China and Russia would offer logistical support or dual-use equipment rather than direct military aid, preferring to watch the confrontation and preserve their own interests. He also speculates that Beijing and Moscow hope to avoid provoking a broader conflict that could erode their own alliances, while watching Western infighting. A brief, cautioned aside notes Pakistan’s stated red line response to any Israeli nuclear escalation, indicating a potential chain reaction in the region. The panelists acknowledge the risk of escalation but maintain that Israel, if pressured, might pursue a broader conflict with Iran, while noting the uncertainty of Iran’s exact response should a strike occur. The exchange ends with a consensus that the scenario described contains significant risk and complexity, with the overall sentiment that pursuing such a conflict could have catastrophic consequences. Note: Promotional content for ExpressVPN was removed from the summary.

Video Saved From X

reSee.it Video Transcript AI Summary
We created a website called Hamilton 68 to track Russian accounts. Our website shows that there are currently Russian bots spreading information.

Video Saved From X

reSee.it Video Transcript AI Summary
During my time in the Senate's oversight committee, we examined Dominion. The proceedings were recorded and are available online. The president of Dominion and his software engineer testified, primarily addressing whether their machines had Internet access. The president claimed there was no Internet access, which I believe was false.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 breaks a little bit of news on your program, Jesse. He reports that 'our partners that do sort of geotagging with devices, they told us that they tracked over 277,000 devices in the vicinity of State Farm Stadium in Glendale, Arizona.' He adds, 'Wow. 277,000. That's unbelievable.' He concludes, 'Gives you an idea of the scale of humanity out there.' These statements illustrate the large number of devices detected near a major venue, highlighting the scale of activity in the area during events. The segment emphasizes the reach of geotagging data and public disclosure in reporting near real-time device counts. It conveys a perspective on how many devices can be tracked in a single location.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting in America is conducted by private companies contracted by the county. However, there are no national security standards for these companies, making it easy to change votes without leaving a trace. Additionally, the votes from Texas and 28 other states are sent to a server in Frankfurt, Germany, owned by a multinational company based in Barcelona, Spain, which controls and reports the votes.

Video Saved From X

reSee.it Video Transcript AI Summary
This is a deep-dive into TPUSA’s financials focusing on one of the largest vendors that appeared in the forms: Resource One, a printing company. The speaker, who previously worked for the CIA/NSA and now runs a corporate intelligence firm, frames the analysis as public and for entertainment purposes only, aiming to uncover why an audit was requested and to connect the dots in the nine-nine forms. Key findings and questions raised: - In the 2022 filing, Resource One appears as a new vendor with a charge of 2,900,000. - In the 2023 filing, Resource One becomes TPUSA’s top vendor, with expenses of just over 6,000,000 for printing services. - There is a discrepancy: TPUSA reports 6.1 million in printing expenses, yet a separate line item shows only 1.3 million spent on printing, leaving about 4.8 million unaccounted in printing expenses. The speaker asks, “Where’s the other 4,800,000?” - The Tulsa, Oklahoma address associated with Resource One appears to be a front; OpenCorporates lists the actual company as Worldwide Printing and Distribution, with Resource One doing business as Resource One. The LLCs connected to Resource One trace to Delaware, but the filing address points to Tulsa. - Worldwide Printing and Distribution is connected to James Moore, who is the CEO and the chairman of Moore DM Group. Moore DM Group is described as a $700,000,000 direct mail political conglomerate that brings in over $16,000,000 from PACs per FEC filings and has 33 subsidiary companies. Their website highlights political fundraising as one of their four major service lines. - The speaker notes that a 501(c)(3) cannot spend money on political activities, and TPUSA’s revenue reportedly comes largely from donations, making the financial links to a political fundraising conglomerate appear problematic. - The unaccounted $4.8 million is suggested to have gone to a politically affiliated entity; the speaker points to TPUSA’s 501(c)(4) or related arms and questions the clarity of the relationship. - Additional payments are noted: 1,100,000 paid to Conrad, another subsidiary of Moore, via TPUSA’s 501(c)(4) filings; 1,300,000 reported as printing expenses; 4,800,000 unaccounted for in relation to the Resource One/Worldwide Printing and Distribution connections. - The speaker mentions CREW has filed complaints about these issues and states that they have not been able to connect all the dots conclusively, but believes something noteworthy has been found. - The speaker reiterates that all claims are presented as alleged for entertainment purposes, and notes the White House’s stance on audits as a broader, related context. - Teases Part Three with more to come. Throughout, the speaker emphasizes tracing the money, the murky relationship between Resource One/Worldwide Printing and Distribution, Moore DM Group, and TPUSA’s fundraising-related expenditures, while highlighting discrepancies in reported printing expenses and the potential political nature of the funding. The segment concludes with a promise of further discoveries in Part Three.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities allow for manipulation. Just before elections, a supposed "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational center of Dominion. This office, staffed by Chinese nationals, allows them to log into U.S. election machines and alter results. They use virtual machines to manipulate data without leaving traces. After the manipulation, they collapse the virtual server, making detection difficult unless a thorough forensic audit is conducted. This entire operation relies on Huawei equipment, linking back to China. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
According to the testimony, Dominion equipment is generally not connected to the internet, but there is evidence of a connection in Gwinnett County, Georgia, during the 2020 election. Non-election personnel have remotely accessed a Dominion system. Dominion emails discuss remotely accessing Gwinnett County, Georgia. There is evidence of Dominion remotely accessing Georgia election equipment in one county, along with involvement in Colorado and Michigan. Dominion can remotely connect to election systems without detection, and this has occurred. The Denver, Colorado server granted access to Belgrade, with questions raised about why Belgrade, Montana, would need to connect to a Colorado file transfer server. Changes to the database server lack an engineering change order, which is important for change management and system integrity.
View Full Interactive Feed