TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion Systems, the owner of Sequoia and Premier, has a customer portal called dominion.dominionvoting/portal. This portal can be easily accessed and manipulated, allowing customers to view and modify data, including election results. It doesn't require a nation state's level of sophistication to manipulate these sites or gain unauthorized access. Even with limited resources, someone could potentially manipulate the election using these systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0, Speaker 1, and Speaker 2 discuss Dominion’s access to election systems during the 2020 election period in Georgia, with Gwinnett County cited as a specific example. The dialogue confirms that the questioning period was during the 2020 election, and the focus is on whether Dominion remotely accessed election systems and whether such access occurred in Georgia. Speaker 2 asks if there is any indication of nonelection personnel remotely accessing a Dominion system. Speaker 3 responds that they have reviewed a series of emails produced by Dominion in which they’re discussing remoting into Gwinnett County, Georgia. Speaker 1 then notes that Speaker 0 had mentioned Dominion remote collection or connection to election systems but lacks evidence that it occurred in Georgia. Speaker 0 asserts that there was one county and that they have seen many Dominion emails, requiring translation from Serbian to English to verify technical questions and translations. Speaker 1 asks specifically: “So it's your testimony that there is evidence of dominion remotely accessing Georgia election equipment?” Speaker 0 answers: “Yes, on the one county. It was included with stuff that I was researching and reading through considering Colorado. Michigan was also involved and there were other ones.” Speaker 2 inquires about Dominion’s ability to remotely connect to these election systems and whether they could do so without detection. Speaker 0 responds: “Yes.” Speaker 2 then asks if the interviewee is aware of any instances in which that has occurred, and Speaker 0 confirms: “One would be the Denver, Colorado server was granted or requested to grant Belgrave, Only Belgrade. Did search. There is a Belgrade Montana.” The speaker questions why Montana would need to connect to a Colorado file transfer server as part of the election system, noting there are other components and things done in the background concerning the database and the configuration of the database server that still do not have an engineering change order. Speaker 0 explains that in operational environments, things sometimes break and need fixing, leading to the submission of a change request or, in this case, an engineering change order that is retroactive. The goal is to record the process to ensure change management and integrity of the system. If changes are not recorded, it leads to a bad situation, according to Speaker 0.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
We now possess the official 1929 Chicago Tunnel Network map, revealing exactly which buildings the Chicago Tunnel system connects to, and no longer needing to ask others about tunnel connections. The map, hidden in the Chicago History Museum and never digitized until today, is shown in full to identify buildings with current tunnel connections. The presenter asserts that the old-world buildings were connected by a vast underground web, not just independent structures, and that the tunnels predate roads and selective routing suggests a purposeful network rather than a mail-centric system. Key points and claims: - The 1929 map shows tunnels linking to various buildings in Chicago, and the presenter emphasizes that these tunnels were already present before the roads and were not built merely to transport mail. - The official narrative claims that the interconnected tunnels were constructed in the 1890s to transport mail and move freight, and were officially shut down in 1959; the presenter finds this story illogical and inconsistent with the evidence of widespread tunnel connections and reliance on underground transport. - The map’s black lines are tunnels, not roads, and the tunnels appear to skip entire blocks and connect specific buildings rather than following streets or uniform routes. - Examples highlighted on the map and in accompanying discussion: - The Palmer House shows two tunnel entrances. The presenter questions the repeated construction of multiple Palmer Houses on the same site, and notes the Palmer House entrances on the map. - The Temple (33rd Lodge) is discussed, with the building demolished in 1939 due to “poor internal services,” and replaced by a Walgreens. - The La Salle Hotel and the Stock Exchange are shown with a tunnel between them; the Stock Exchange building was demolished in 1972. - The Rookery Building is examined; 1891 photos show subterranean features and an alleyway that is identified as a tunnel connection between the Rookery and nearby structures. - The map indicates that these tunnels existed under streets that were surface-dirty and congested in the early 1900s, suggesting underground transport as a primary mode. - The presenter argues that access to publicly funded buildings (like City Hall) is possible for tunnel entrances and intends to press for access to sub-basement plans, arguing that publicly funded buildings are subject to public records and tours. - The plan includes visiting the actual buildings to verify tunnel entrances visible on the map, leveraging public records requests to uncover entrances that may be overlooked or unknown by building administrations. - The presenter claims that the underground network extends beyond Chicago and suggests a similar web exists in cities worldwide, implying that the 1929 map is a snapshot of an ongoing, larger network that has expanded since. - The upcoming work involves contacting publicly funded buildings to request tunnel-entry information and documenting the responses. Note: The transcript includes sponsor and channel-promotional material, which has been omitted from this summary per content guidelines.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity experts have provided signed affidavits stating that Dominion Voting Machines were tampered with over Internet connections. The machines used an unencrypted VPN with easily accessible login credentials, allowing foreign adversaries to monitor and manipulate votes. IP addresses showed that China, Iran, and other countries accessed the servers, while Edison Research also communicated with these adversaries. Claims that Dominion machines were not connected to the Internet are false. Dominion Voting Systems is linked to a Chinese-owned company, and its software is licensed from a Venezuelan-owned company. Forensic audits revealed significant errors in the machines. Georgia recently signed a $100 million contract with Dominion, despite the machines being easily hackable.

Video Saved From X

reSee.it Video Transcript AI Summary
Break a little bit of news on your program, Jesse. Our partners that do sort of geotagging with devices, they told us that they tracked over 277,000 devices in the vicinity of State Farm Stadium in Glendale, Arizona. 277,000. That's unbelievable. Gives you an idea of the scale of humanity out there.

Video Saved From X

reSee.it Video Transcript AI Summary
I found a video where the speaker goes through some server logs and discovers a database issue. They mention finding different forensics related to it. They also mention a person named Christy, who seems to be active in the GMC community.

Video Saved From X

reSee.it Video Transcript AI Summary
To access the affiliate dashboard, log in and you'll see either this page or another one with "Click Funnels" at the top. Click Funnels is the platform we use to track sales and give you commissions for referrals. Make sure to grab your unique affiliate link.

Video Saved From X

reSee.it Video Transcript AI Summary
While on the oversight committee in the senate, Dominion was investigated. The president of Dominion and his software maker testified. Questions focused on whether Dominion machines had internet access. The president of Dominion said no, but this was a lie. The investigation was published, recorded, and should be online.

Video Saved From X

reSee.it Video Transcript AI Summary
I noticed an Ethernet cable connected to a router, which was linked to the local data center and the voting machines. This suggested an external internet connection. I also found a wireless network called AV_connect, which probably refers to absentee voting.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion can remotely connect to election systems without detection. This has occurred in instances such as the Denver, Colorado server, which was requested to grant access to Belgrade. It is unclear why Belgrade, possibly Belgrade, Montana, would need to connect to a Colorado file transfer server for an election system. There were also background activities concerning the database and its configuration that lack an engineering change order.

Video Saved From X

reSee.it Video Transcript AI Summary
I have an iPhone. Does Google track my movement if I move to sit with my democrat friends? Google knows if I move, but it depends on the services I've opted into. Can you answer if Google knows I moved without more details?

Video Saved From X

reSee.it Video Transcript AI Summary
Independent developers and consultants are monitoring network traffic, observing unusual activities related to a DDoS incident. There’s uncertainty about the status of the BC election site and whether it can be refreshed.

Video Saved From X

reSee.it Video Transcript AI Summary
Chaya from Lives at TikTok explains she investigated an unmarked building in Burnsville, Minnesota, where nine health care companies are operating out of a single location, all with Somali names. She notes there are likely more than the nine discovered. One of the entities is Grace Care Center, run by Saeed Ahmad, which the site claims has a facility for kids with autism. She reports numerous red flags on that site, including slogans like “We cure your chill,” and suggests it is aimed at offering care for children. When contacting the listed numbers for these businesses, many do not work: some ring endlessly, others are disconnected. Most of the companies do not have websites, reviews, or additional information available. One company at the location does have a website, but it contains many spelling errors. The site’s gallery uses stock images that do not lead anywhere. Other links on the site do not function, redirecting back to the homepage. The “About Us” section states it was founded by Omar, accompanied by a stock image of a white woman, even though Saeed Ahmad is the founder. The contact information is described as fake, including a fake address, phone number, and email address. Chaya emphasizes that the situation appears highly suspicious.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational hub of Dominion. This office, staffed by Chinese nationals, manipulates election results using virtual machines created within the election equipment. The manipulation is done through software, leaving no trace unless a detailed forensic audit is conducted. This process involves using Huawei servers, linking back to China. For more information, visit Stolen Elections Facts for documentation.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, Brian Erch demonstrates the Rapid Information Overlay Technology (RIOT) cyber tracking system. He integrates social networking websites like Facebook, Twitter, Goala, and Foursquare to track an employee named Nick Kneese. Using the RIOT Object Browser, Brian searches for Nick's information and finds his check-in locations on a KML file. He also retrieves pictures taken by Nick and locates them on Google Earth. Brian then predicts Nick's future whereabouts by analyzing his top check-in places. The video concludes with a demonstration of the graphical RIOT Object Browser, which visualizes the relationships between objects and provides additional information about Nick's interactions on Twitter and linked phone numbers.

Video Saved From X

reSee.it Video Transcript AI Summary
The original post of the crazy plane lady video was made by Juan Frank We, also known as Knuckles Lawn Care. Juan Frank We is a US Federal Government employee in Fort Hood, Texas, and claims to be a logistics manager for the US Army and a computer operator at Fort Campbell, Kentucky. I traced the route to her business site, which led to an army recruitment place in Ohio on DOD servers. The connections between all these dots are undeniable.

Video Saved From X

reSee.it Video Transcript AI Summary
Colonel Daniel Davis joins the discussion to address the idea of a forthcoming false flag attack aimed at provoking Iran into a broader war. The conversation threads through claims that key US and Israeli military hardware is in place, Russia has countermeasures ready, and that Israel and a US “deep state” war faction coordinated by the CIA are driving the move. There’s also the assertion that a US carrier strike group is in place for the operation, and that the New York Times reports Trump has received intelligence suggesting Iran’s position is weakening. The host questions the reliability of this intelligence flow, asking who is really transmitting such assessments and whether the CIA or others are shaping Trump’s view. Davis pushes back on the weakening Iran narrative, stating he has followed Iran for years and sees no evidence that Iran is weakening; to the contrary, he notes Iran used a forceful response to suppress a rebellion—an action that, in his view, suggests strength. He references outside voices, including Mossad and Pompeo’s New Year’s Eve tweets, to illustrate how Western narratives have portrayed the protests. He challenges the idea that the protests reveal Iran’s weakness, arguing that the regime’s security apparatus remained in control and that no IRGC defections or regime desertions appeared visible. He warns that if Trump is led to believe Iran is at its weakest point, a more aggressive push could backfire, potentially producing a strong repudiation. The discussion turns to what a “deal” with Iran might entail. The co-panelists note claims that Trump says they can make a deal, while Davis explains that reports indicate any deal would require Iran to remove enriched uranium, cap long-range missiles, change its regional proxy policies, and ban independent uranium enrichment—red lines Iran has repeatedly rejected. The implication is that such terms would, in practice, preclude a peaceful settlement and push toward a military strike. The debate then moves to the military buildup and international reactions. The host asks about possible actions in the next few days, given reports of an Israeli target date around January 30. Davis rejects the notion of a simple, quick conflict, arguing that some Trump administration insiders want a regime-change outcome, whereas he sees limited attainable objectives beyond bombing or destroying infrastructure. He emphasizes the risk of a miscalculation leading to American or Israeli casualties and the potential for a prolonged conflict. He warns there is zero upside to a strike on Iran and a high downside if Iran responds forcefully. Turning to regional dynamics, the panel discusses how Russia, China, and a new Saudi axis might respond. Davis suggests China and Russia would offer logistical support or dual-use equipment rather than direct military aid, preferring to watch the confrontation and preserve their own interests. He also speculates that Beijing and Moscow hope to avoid provoking a broader conflict that could erode their own alliances, while watching Western infighting. A brief, cautioned aside notes Pakistan’s stated red line response to any Israeli nuclear escalation, indicating a potential chain reaction in the region. The panelists acknowledge the risk of escalation but maintain that Israel, if pressured, might pursue a broader conflict with Iran, while noting the uncertainty of Iran’s exact response should a strike occur. The exchange ends with a consensus that the scenario described contains significant risk and complexity, with the overall sentiment that pursuing such a conflict could have catastrophic consequences. Note: Promotional content for ExpressVPN was removed from the summary.

Video Saved From X

reSee.it Video Transcript AI Summary
We created a website called Hamilton 68 to track Russian accounts. Our website shows that there are currently Russian bots spreading information.

Video Saved From X

reSee.it Video Transcript AI Summary
During my time in the Senate's oversight committee, we examined Dominion. The proceedings were recorded and are available online. The president of Dominion and his software engineer testified, primarily addressing whether their machines had Internet access. The president claimed there was no Internet access, which I believe was false.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 breaks a little bit of news on your program, Jesse. He reports that 'our partners that do sort of geotagging with devices, they told us that they tracked over 277,000 devices in the vicinity of State Farm Stadium in Glendale, Arizona.' He adds, 'Wow. 277,000. That's unbelievable.' He concludes, 'Gives you an idea of the scale of humanity out there.' These statements illustrate the large number of devices detected near a major venue, highlighting the scale of activity in the area during events. The segment emphasizes the reach of geotagging data and public disclosure in reporting near real-time device counts. It conveys a perspective on how many devices can be tracked in a single location.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting in America is conducted by private companies contracted by the county. However, there are no national security standards for these companies, making it easy to change votes without leaving a trace. Additionally, the votes from Texas and 28 other states are sent to a server in Frankfurt, Germany, owned by a multinational company based in Barcelona, Spain, which controls and reports the votes.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities allow for manipulation. Just before elections, a supposed "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational center of Dominion. This office, staffed by Chinese nationals, allows them to log into U.S. election machines and alter results. They use virtual machines to manipulate data without leaving traces. After the manipulation, they collapse the virtual server, making detection difficult unless a thorough forensic audit is conducted. This entire operation relies on Huawei equipment, linking back to China. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
According to the testimony, Dominion equipment is generally not connected to the internet, but there is evidence of a connection in Gwinnett County, Georgia, during the 2020 election. Non-election personnel have remotely accessed a Dominion system. Dominion emails discuss remotely accessing Gwinnett County, Georgia. There is evidence of Dominion remotely accessing Georgia election equipment in one county, along with involvement in Colorado and Michigan. Dominion can remotely connect to election systems without detection, and this has occurred. The Denver, Colorado server granted access to Belgrade, with questions raised about why Belgrade, Montana, would need to connect to a Colorado file transfer server. Changes to the database server lack an engineering change order, which is important for change management and system integrity.
View Full Interactive Feed