TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
I found Brian in the server logs, showing him the database. Christy Francois let him in, which could be a problem later on.

Video Saved From X

reSee.it Video Transcript AI Summary
At some point, there is a correlation between the purging of the database and the date of the audit. They both happen almost at the same time, the day before the audit. This connection requires an explanation.

Video Saved From X

reSee.it Video Transcript AI Summary
Christy has access to the server room, and we need to send her name there. The server logs reveal Brian's involvement, and there's a significant database that I expected to find. Brian is a valuable team member despite any criticism. We see Christy interacting with the logs and deleting entries. She is granting Brian access to the server, and I’m monitoring the console. At this point, Christy is not in the room, but she is coordinating with others. This situation raises concerns as multiple people are nearby, indicating potential issues.

Video Saved From X

reSee.it Video Transcript AI Summary
While on the oversight committee in the senate, Dominion was investigated. The president of Dominion and his software maker testified. Questions focused on whether Dominion machines had internet access. The president of Dominion said no, but this was a lie. The investigation was published, recorded, and should be online.

Video Saved From X

reSee.it Video Transcript AI Summary
We analyzed 4 deaths, one of which had corrupt data. We were able to retrieve all the data from that disk through forensic methods. We are confident that we have all the data from those 4 deaths, but the 2 hours of missing footage is still not found.

Video Saved From X

reSee.it Video Transcript AI Summary
On 2/11, 462 log entries were overwritten by a script. On 3rd March, 37,686 log entries were overwritten by the same script. The day before we received the system, 330 log entries were overwritten by that script. The EMS admin account was responsible for this. The challenge is that this occurred before an audit, and it deleted all the records and files related to the election. Someone deliberately ran a program to clear all the records in the system used for generating the official results.

Video Saved From X

reSee.it Video Transcript AI Summary
On various dates, an individual ran a script to find blank passwords for the accounts on the system. The script was executed multiple times, overwriting a significant number of log entries. The EMS admin account was responsible for this, but due to the lack of accountability in assigning the username, it is difficult to prove who exactly did it. Fortunately, historical data from MTech video feeds helped identify the individuals at the keyboards during those times. However, their names will not be released to protect them from scrutiny and potential impacts.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker is discussing the search for a PCR report from August 10, 2019, but it cannot be found in the fire department database. They speculate that the person may have been taken directly to the morgue. The speaker mentions having photographs of the person in the hospital. They discuss the possibility of the fire department personnel taking the person somewhere else, but the computer system does not have any record of it. The speaker acknowledges that the information they received from the fire department differs from what the computer system shows. They express confusion about why the record is missing.

Video Saved From X

reSee.it Video Transcript AI Summary
Independent developers and consultants are monitoring network traffic, observing unusual activities related to a DDoS incident. There’s uncertainty about the status of the BC election site and whether it can be refreshed.

Video Saved From X

reSee.it Video Transcript AI Summary
Christy accesses the server room and introduces Brian, a new forensics expert. She shows him the server logs and points out the deletion of certain logs. They discuss the importance of investigating further and mention the presence of other individuals. The video ends with a mention of someone named Matt.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reviewed server logs and identified "Brian." The speaker found a database in the next vendor and new forensics. Christy is mentioned in connection to a server. The speaker shows access and a deletion on the log from the database. A previous tweet shows Christy letting Brian into the server. The speaker repeats "Here he is" multiple times. The speaker mentions another law proposal and altering.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers assert that there is evidence of direct access to the Antrim County election management system (EMS). In the forensic images, they note that on November 5 an anonymous user logged onto the EMS remotely and performed actions with escalated privileges, making changes to the database during attempts to retabulate the election. They describe this as a major development, because it demonstrates that the machines were accessed remotely, and crucially, that the remote access was by an anonymous user who possessed elevated privileges within the system. They present this as a significant point for those who oppose forensic auditing or who are against non-forensic reviews. They also reference visible features on ballots, specifically the black boxes along the side of the ballot. The ballots reportedly contain 59 of these black boxes. In the forensic images, they indicate that certain blocks—numbers 15, 18, 28, 41, and 44—were intentionally modified. The described modifications concerned the height, width, and overall shape of these blocks, with the stated purpose of generating errors. Regarding the consequences of these modifications, the narrative claims that by altering these specific blocks, errors were created that led to rejections of Republican ballots. In other words, ballots cast for Donald Trump that were processed through the machine allegedly faced a higher likelihood of being rejected due to these block modifications. The asserted outcome is that such ballots were rejected at a rate of 20% more than ballots cast for Joe Biden.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received a text message from a concerned friend's wife, who sent screenshots of a disturbing website. The website contained graphic content and discussions about illegal activities involving children. The speaker decided to take action and found a vulnerability in the website's platform, allowing them to access and extract user data. They only downloaded publicly available information to avoid illegal content. The speaker shared some of the explicit text they encountered, which included discussions about child abuse and exploitation. The website had around 7,000 users who had to answer disturbing questions to gain access. The speaker also discovered that the website used a chat app called Telegram for further discussions. They successfully hacked the website without being detected.

Video Saved From X

reSee.it Video Transcript AI Summary
In the video, the speaker describes their observations during a ballot verification process. They noticed a yellow banner indicating "low confidence" on some ballots, but the signatures being compared were illegible and didn't match. The speaker asked about it, but was told not to worry as it was a new program being tested. Later, there was a server outage, but the lights were still on. When the computers came back up, a person who previously had a yellow banner now had a green one indicating "high confidence." The speaker observed conversations among the screeners and heard one person say they were now working on high confidence instead of low confidence.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reviewed server logs and identified "Brian." The speaker found forensics in a database. The speaker shows access and a deletion on the log from the database. The speaker claims Christy previously tweeted about letting Brian into the server. The speaker repeats "Here he is" multiple times. The speaker mentions a law proposal.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker mentions server logs and their own logs, and then reveals that someone named Christie is involved. They state that Christie is not the right driver for the medical situation and imply that it is being discussed online.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discovered strange documents in a database at work. One document praised Satan and was traced back to a Satanic book. The speaker found it suspicious that only higher-ranking employees could add documents to the database. They also found a document about depopulation, but couldn't determine if it supported or opposed it. The speaker then stumbled upon an address related to the Wuhan lab in China, which had the number 666. They verified this information on Google and took a screenshot. The speaker got in trouble for sharing the screenshot at work.

Video Saved From X

reSee.it Video Transcript AI Summary
On 2/11, 462 log entries were overwritten by a script. On 3rd March, 37,686 log entries were overwritten by the same script. On 12th, 330 log entries were overwritten. The EMS admin account is responsible for this. The challenge is that this occurred before an audit, which means the full context of the election is not available. The log file shows that someone purged all the results for the election, deleting all records and files. This happened right before the audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
On the left is the image before the Dominion employee arrived at the election management server, and on the right is the image after the employee left. The logs folder on the left is missing on the right, indicating that it disappeared after the employee left. Additionally, in the Inetpub log folder, there are multiple log files that contain evidence of connections to the web server. The number of log files is not mentioned.

Video Saved From X

reSee.it Video Transcript AI Summary
On various dates, an individual ran a script to search for blank passwords on the system. This script overwrote a significant number of log entries. The EMS admin account was responsible, but it's difficult to prove who specifically executed the script due to the lack of accountability in assigning usernames. Fortunately, historical data from MTech video feeds allowed us to identify individuals at the keyboards during those times. However, we won't disclose their names due to the potential scrutiny and impact on them.

Video Saved From X

reSee.it Video Transcript AI Summary
Here's the video everyone is talking about. We’re examining the server logs, and it turns out it’s Brian. We’ll look at a database that enhances our findings. Forensics play a crucial role here, especially with AT&T and the server. I’ll demonstrate the app access and the log deletion process. You all know the history behind this. This is another log we’re reviewing, likely related to daily activities, such as purchasing a truck.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses evidence of foreign interference in the election, showing how votes were manipulated and which computers were involved. The speakers highlight the importance of cybersecurity experts uncovering the attacks in real-time, preventing potential election manipulation. They express gratitude for the proof of interference and emphasize the significance of having this information. The speakers marvel at the detailed documentation and consider it a miracle to have such insight into the attacks.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker talks about checking the server logs and finding something interesting. They discovered a database in their extended logs, which they believe is related to forensics. They mention someone named Christy, who is an active member of the GMC community.

Shawn Ryan Show

Ryan Montgomery – Roblox & Minecraft: Hacker Exposes the Largest Online Video Games | SRS #255
Guests: Ryan Montgomery
reSee.it Podcast Summary
Shawn Ryan’s interview with Ryan Montgomery unfolds as a sprawling, deeply candid conversation about online predator networks, cybersecurity, and the personal toll of fighting child exploitation. Montgomery recounts his genesis in the field, from infiltrating dark websites to exposing predators, and describes how a viral clip on a pedophile ring vaulted him into a larger public mission that included collaboration with Project Veritas, law enforcement, and the Sentinel Foundation. The discussion moves through the high-stakes aftermath: FBI and other federal agencies’ scrutiny, the fragility of open-source operations, and the tension between journalistic exposure and official investigations. He details the creation of Pentester, a data-breach and privacy platform, and its evolution into a consumer-friendly service that flags compromised records, suggests mitigations, and now offers a text-based companion, Pentester SMS, to simplify use for non-technical users. The guests discuss the scope of online abuse, including the 764 “satanic” cult, and share vivid, troubling examples of extortion, self-harm encouragement, animal abuse, and child trafficking arcs discovered through OSINT and network surveillance. The dialogue is unflinchingly honest about the cost of this work: the emotional weight, the security risks, and the real-world impact on families. Montgomery emphasizes prevention over reaction, urging parents to monitor their children’s online worlds, be vigilant about platforms like Roblox and Minecraft, and demand accountability from platforms that profit from or tolerate predatory content. The pair also mine personal history—their shared commitment to faith, rocky upbringings, addiction, recovery, and the intimate bonds with family members who supported them through slavery to addiction and emancipation—toward a hopeful message: with the right tools, community, and courage, meaningful protection and redemption are possible. The episode is a relentless call to action for parents, educators, and policymakers to treat digital harm as seriously as physical danger and to foster resilient, privacy-conscious, and child-centered online environments. It closes on a note of gratitude for allies in law enforcement and the importance of mental health support for those who bear the heavy burden of safeguarding the vulnerable, with a practical takeaway: educate, equip, and engage to reduce harm.
View Full Interactive Feed