reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
A journalist contacts Homeland Security to inquire about troubling systems. The speaker is directed to submit a report on assista.gov or dhs.gov. When asked why they can't answer questions, the speaker explains that the number is only for government agencies. The journalist expresses concern about Ericsson's involvement with ISIS and the lawsuit filed by veterans. The speaker suggests reporting the issue to pincident.gov or ic3.gov. The journalist asks about the interconnection of systems and the role of the FBI. The speaker advises reporting to local FBI offices and mentions the importance of reporting to IC3 for analytics. The journalist mentions the patent sharing agreement between Ericsson and Huawei. The speaker suggests reporting to IC3 for international matters. The journalist expresses fear and asks about CISA's role in cybersecurity incidents. The speaker explains that CISA mainly focuses on government agencies and suggests visiting cisco.gov for more information. The journalist questions the taxpayer's role in supporting agencies that protect corporations. The speaker acknowledges the concern and the call ends.

Video Saved From X

reSee.it Video Transcript AI Summary
A journalist contacts Homeland Security regarding Ericsson's involvement with ISIS. Homeland Security directs the journalist to report the issue to appropriate agencies and websites. The journalist questions the interconnectedness of emergency systems and cybersecurity. Homeland Security advises reporting to IC3 for analysis. The journalist expresses concern over media bias towards Ericsson. Homeland Security mentions a patent sharing agreement between Ericsson and Huawei. The journalist seeks clarity on CISA's role in individual cybersecurity. Homeland Security clarifies that CISA focuses on government agencies, not individuals. The journalist questions the taxpayer-funded support for corporations by government agencies. Homeland Security ends the call. Translation: A journalist contacts Homeland Security about Ericsson's ties to ISIS and is directed to report the issue to specific agencies. They discuss the interconnectedness of emergency systems and cybersecurity, media bias, and a patent sharing agreement between Ericsson and Huawei. The journalist questions CISA's role in individual cybersecurity and the taxpayer-funded support for corporations by government agencies. Homeland Security clarifies CISA's focus on government agencies, not individuals. The call ends.

Video Saved From X

reSee.it Video Transcript AI Summary
Ericsson, a foreign telecommunications company, has been involved in various controversial activities. They sponsored and bribed ISIS for over 17 years, leading to the deaths of American soldiers. Ericsson also controls the flow of information and data, including financial transactions and classified information, through their ownership of the portability cables. The company operates outside of US jurisdiction and has no oversight. The transfer of contracts from Neustar to Ericsson was overseen by Timothy Geithner and Hillary Clinton during the Obama administration. The Swedish British Crown took over the contract in 2013, making it difficult to hold Ericsson accountable. The Trump administration was unable to stop this due to ongoing investigations and the non-governmental nature of the contract.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker expresses concern about the lack of action from the US government in deterring organizations that are trying to influence elections and obtain coronavirus vaccine information. They criticize the Trump administration for favoring Putin and disregarding the intelligence community. The second speaker explains that the Russian unit responsible for hacking the DNC is different from the one attempting to hack vaccine information. They believe that every country is likely trying to gather vaccine development information, and while there are other concerning actions by the Russians, this particular hack is not a top concern. The conversation ends with gratitude towards the speakers.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker calls Homeland Security as a journalist seeking information about troubling systems. They are directed to submit an inquiry on the government website. The speaker expresses concern about Ericsson's involvement with ISIS and the lawsuit filed by veterans. They question why government officials are not taking action. Homeland Security provides resources to report the issue to the FBI and suggests contacting local news outlets. The conversation touches on the interconnection of systems and the role of different agencies. The speaker expresses frustration with the lack of support for individuals who experience cyberattacks. They discuss the patent sharing agreement between Ericsson and Huawei and mention reporting to the FBI. The speaker concludes by questioning the role of CISA and the taxpayer's support of agencies that protect corporations.

Video Saved From X

reSee.it Video Transcript AI Summary
Hundreds of intelligence community members work at social media companies. Mainstream news outlets confirmed my reporting on the laptop story. The censorship was due to the truth being a threat to power. The US government's influence on corporations undermines the first amendment. Our response will determine the future of a free press. Thank you. Translation: Many intelligence community members work at social media companies. News outlets confirmed my reporting on the laptop story. Censorship was due to the truth being a threat. The US government's influence on corporations undermines freedom of speech. Our response will determine the future of a free press. Thank you.

Video Saved From X

reSee.it Video Transcript AI Summary
There are darker secrets than BlackRock, like the Wallenberg family, who control around $800 billion in companies, including Ericsson. Telecom companies like Ericsson function as invading armies, seizing territory to control network areas, sometimes through bribery. Ericsson received over $113 million in U.S. government contracts since 2008, including an $8.3 billion contract from Verizon to build 5G infrastructure. When researching Ericsson, Google's search results seemed manipulated, only showing information directly from Ericsson. Looking at BlackRock's board, two members stood out: the CEO of Cisco and the former CEO of Ericsson, who is now the CEO of Verizon. Cisco and Ericsson are key companies in building the Internet. It's strange that 2 out of 14 board members of BlackRock represent companies that make and control the Internet. We need to start digging ourselves.

Video Saved From X

reSee.it Video Transcript AI Summary
They claim our society has been taken over, and they point to one person in the White House who supposedly stands in the way. They warn that every American will have to stand up, saying we read about it in history like Normandy, but now we are in it and must spread it. They insist we cannot surrender, and reference that the president wouldn’t surrender. They state it was an attack on the capital carried out by Antifa, but was enabled by McConnell, Schumer, Pelosi, and the mayor, saying they knew it was coming and that security was lacking as Antifa acted, with the media later picking it up. They accuse Fox of disgraceful coverage, claim Rupert Murdoch is driving that with his sons, and say they merged with the rest of the mainstream media. They describe the situation as serious and expanding, claiming we do not have four years and that time is against us, drawing a comparison to Hong Kong to emphasize urgency. They discuss information released about cyber warfare used in battleground states. They claim to have learned that James Comey, the former FBI director, sold the HAMR and SCORECARD, a top-secret program, to the Chinese. They describe HAMR as a top-secret program similar to an iPhone that gains access to voting networks, with an application like on an iPhone that can be installed to modulate voting results so they win by smaller margins. They say they received a call on Tuesday night at 11:30 about the ISI from Pakistan being in the voting machines in Georgia, and that they informed someone about it. They assert that the two candidates Loeffler and Purdue were ahead, but an hour later they were behind.

Video Saved From X

reSee.it Video Transcript AI Summary
Joshua's video highlights the Wallenberg family's control over vast companies, including Ericsson, a key player in telecom and 5G infrastructure. This is important because telecom companies are seizing territory in a race to control the internet. Ericsson has secured major contracts, including one with Verizon to build out 5G infrastructure. When I tried to research Ericsson on Google, I was met with only information coming directly from Ericsson's website, which made me switch to DuckDuckGo. Looking at BlackRock's board, it includes the CEO of Cisco and the former CEO of Ericsson, who is now the CEO of Verizon. This is striking considering Ericsson and Cisco's roles in building the internet and raises questions about the concentration of power within BlackRock's board. We need to dig into these connections to understand who truly controls the internet and what information we're being shown.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses their accidental discovery that the CIA has a heavy involvement in vaccine production. They mention various connections between different individuals and organizations, such as Pfizer, Resilience, Moderna, and In-Q-Tel. The speaker also highlights the funding received by Resilience from the government and other sources. They delve into the backgrounds of key figures involved, including Luciana Borio, Scott Gottlieb, and Bob Nelson. Connections to the intelligence community and banking industry are mentioned. The speaker concludes by expressing hope that these influential individuals can protect society from future pandemics. They briefly mention Illumina and the relationships between Francis Arnold, Scott Gottlieb, and Susan Desmond Hellman.

Video Saved From X

reSee.it Video Transcript AI Summary
A journalist contacts Homeland Security to inquire about troubling systems. The representative directs the journalist to submit a report on assista.gov or dhs.gov. The journalist expresses concern about Ericsson's involvement with ISIS and the lawsuit filed by veterans. The representative suggests reporting the issue to pincident.gov and ic3.gov. The journalist asks about the interconnection of emergency systems and the role of the FBI. The representative advises reporting to local FBI offices and mentions the importance of reporting to IC3 for analytics. The journalist mentions the patent sharing agreement between Ericsson and Huawei. The representative suggests reporting to IC3 for international matters. The journalist expresses fear and asks about CISA's role in cybersecurity incidents. The representative clarifies that CISA focuses on government agencies and suggests visiting cisco.gov for more information. The journalist questions the taxpayer's role in supporting agencies that protect corporations. The representative acknowledges the concern. The call ends.

Video Saved From X

reSee.it Video Transcript AI Summary
A journalist contacts Homeland Security to inquire about troubling systems. The speaker is directed to submit an inquiry or report on the official government websites. When asked why they can't answer questions, the speaker explains that the number is only for government agencies. The journalist expresses concern about Ericsson's involvement with ISIS and the lawsuit filed by veterans. The speaker suggests reporting the issue to pincident.gov and Ic3.gov, which is handled by the FBI. The journalist asks about the interconnection of emergency systems and the role of NCSWIC. The speaker clarifies that they handle cybersecurity issues for government agencies, while local jurisdictions report incidents to the FBI. The journalist questions the effectiveness of reporting and mentions the patent sharing agreement between Ericsson and Huawei. The speaker advises contacting the local FBI for further details. The journalist expresses fear and asks about CISA's role in protecting individuals. The speaker explains that CISA primarily focuses on government agencies and corporations, not individual cases. The journalist comments on taxpayers funding agencies to protect corporations and third parties. The conversation ends abruptly.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker expresses gratitude to Dr. Jen and discusses the involvement of various companies, including Ericsson, Google, Amazon, Verizon, AT&T, and Telkordia Technologies, in a complex situation related to spying and cybersecurity. They highlight the significance of Georgia and the expiration of Pfizer's contract, as well as the connection between the Obama administration, Joe Biden, and the ordering of the spying. The speaker also mentions Dimitri Alperovitch's background in cybersecurity and the importance of the truth. They touch on the Georgia case, fraudulent votes, and the control exerted by Ericsson in the telecommunications industry. The speaker emphasizes the need to take action and regain power.

Video Saved From X

reSee.it Video Transcript AI Summary
- The show discusses a claimed secret Israeli drone base near Russia, allegedly located in Georgia, close to the border with Russia, Turkey, Armenia, and Azerbaijan. - Victor Hugo Vac a Junior (Victor) states that the base was first reported by Jeffrey Silverman, who alleged the Georgian Ministry of Defense runs the base inside a UNESCO World Heritage site. Silverman reportedly gave the news on Victor’s show after being advised by diplomats not to print it. - The base, according to the guests, is used to launch drone strikes, including an alleged attack on the Baku Airport and a strike near a school, with implication that Israel is using the base to facilitate operations against Azerbaijan and potentially elsewhere. - The discussion links these events to broader claims of Israel attempting to provoke Iran and to involve Georgia in a widening conflict, described as part of a “spiritual war.” - Victor argues that there are false flag attempts by Israel to blame Iran, and suggests the base has existed since before the 2008 Georgian-Russian war; he notes that Israelis previously supplied Russia with missiles via Georgia and claims Israel betrayed Georgia in that era. - He asserts that diplomats tried to suppress the story to avoid Georgia being drawn into conflict, and asks whether the Georgian military of defense is now under Israeli influence, analogizing to concerns about U.S. control of its own military. - Victor elaborates on regional dynamics, mentioning an area called Lagokehi near Azerbaijan with an old abandoned airstrip, implying drone operations can be launched from there. He maintains Jeffrey Silverman’s report that Georgia could be dragged into the conflict. - He broadens the narrative to include claims about Israeli influence within the United States and European politics, and suggests a broader conspiracy involving “the Khazarian mafia,” money laundering in Ajara (Ajada), and large cash transfers brought by Israeli visitors. He claims that Israelis are moving into this Orthodox Christian country and influencing politicians. - Victor recounts personal history, including experiences in the U.S. Navy as a midshipman in the class of 1993, allegations of sexual assault witnessed, and his decision to leave after being offered a deal to deny what he saw. He says he started a video diary and a podcast to discuss “pedophiles” and a court system he claims enabled them; he also mentions an alleged link between Jeffrey Epstein and a court decision involving judge Donald W. Heffield. - He references being harassed and threatened after refusing roles in PPE and vaccine distribution with ties to the Huiping Wang army, and states he reported this to U.S. agencies. He positions himself as a primary witness in a terrorist case involving Huiping Wang. - The conversation turns to Turkey and Iran, and whether the Georgia-based base could be used to attack Azerbaijan or Turkey. Victor mentions Lagokehi as a region enabling two-kilometer proximity to Azerbaijan, supporting the claim that drones could be launched from there. - The speakers reiterate that the base is under Georgian defense, but question if it is under Israeli control, and suggest the broader aim is to trigger World War III and rebuild the temple. They express belief that the drone base and related actions illustrate a larger plan to weaken the United States and reshape regional power. - The hosts close by thanking Victor for his work and noting ongoing coverage, with an emphasis on the need for audience support to continue reporting what they describe as truth against controlled opposition.

Video Saved From X

reSee.it Video Transcript AI Summary
Heading to the border, I ask if you know about Osiris and 5G. The Pentagon directive on real weaponry is crucial. Energy workers must teach shielding to prevent heart tissue explosions from apps. Osiris relates to cybersecurity and surveillance by companies like Boeing and Raytheon. DARPA and others control information and surveillance. Chipping humans and testing noninvasive technology is happening. Augmented reality is advancing rapidly.

Video Saved From X

reSee.it Video Transcript AI Summary
The caller, Michael Khoury, reports a federal violation involving the Swedish telecommunications company Ericsson. He claims that Ericsson has admitted to funding and sponsoring ISIS for over 17 years. Michael believes that Ericsson's control over critical infrastructure, including the 911 system, is causing issues with emergency services. He has written a report on the matter and plans to speak before Congress. Michael also mentions that Ericsson has been sued for aiding in the killing of American soldiers. He provides details about Ericsson's subsidiary, Iconnective, and their contract with the FCC. Michael expresses concerns about the compromised security and urges action to address the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
When dialing 911, your call is routed through iConnective, a subsidiary of Ericsson. An investigation revealed that Ericsson sought permission from ISIS to operate in their territories and engaged in corrupt practices in Iraq, leading to a $1 billion settlement with the U.S. Justice Department. Despite acknowledging their misconduct, Ericsson faced minimal accountability for executives involved. The investigation raised concerns about national security, especially given Ericsson’s control over critical telecommunications infrastructure. The lack of oversight allows potential vulnerabilities, as evidenced by past emergency failures. Current lawsuits involve families of veterans who died due to these failures, highlighting the urgent need for accountability and reform in telecommunications governance. The interconnectedness of these issues underscores the risks posed by foreign control over essential services.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2009, Ericsson faced criticism for selling telecom equipment to oppressive governments like Sudan, Syria, and Iran. These regimes used the technology to monitor and control their citizens. In 2011, Hillary Clinton's state department started adding goods and services to a list for expanded sanctions on Iran and other state sponsors of terrorism. Around the same time, Bill Clinton gave a speech sponsored by Ericsson, earning him $750,000. In 2012, the Obama administration imposed sanctions on telecom sales to Iran and Syria, but Ericsson's work in Iran was not covered. The speaker believes that a Trump administration will put an end to government corruption.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asks for insight on three topics: Rodney Jaffe, Neustar, and the Ericsson report. They mention the allegations made by Dennis Montgomery about Fort Detrick and Fort Washington spying on Americans using surveillance systems initially created for foreign surveillance. The speaker discusses the weaponization of government subcommittee and the consequences of examining ourselves, such as the creation of the FISA court. They emphasize the need for strict controls and accountability in government actions. The speaker mentions the Dennis Montgomery case and the government's capability to do various things. They urge critical thinking and caution against emotional reactions to information. The speaker concludes by stating that the federal government is out of control.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a visit to the US, an engineer working for Telegram was allegedly approached by cybersecurity officers or agents who attempted to secretly hire him. The speaker believes the US government wanted to hire the engineer, not necessarily to write code or break into Telegram directly, but to learn about open-source libraries integrated into the Telegram app. The speaker alleges they tried to persuade the engineer to integrate specific open-source tools into Telegram's code, which the speaker believes would function as backdoors. These backdoors, according to the speaker, would potentially allow the US government, or any government, to spy on Telegram users.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that “they have taken control of our society” and urges everyone to stand up, from the White House to every American, insisting that surrender is not an option and that time is running out, with a comparison to the urgency seen in Hong Kong. The speaker claims the attack on the capital was carried out by Antifa but was enabled by political figures—McConnell, Schumer, Pelosi, and the mayor—who allegedly knew it was coming and were lax on security, allowing Antifa to act before the media picked it up. The speaker criticizes media coverage as disgraceful, referencing an affiliation with Fox for almost seventeen years and asserting that Rupert Murdoch and his sons are driving a merge with the rest of the mainstream media. The assertion is made that this consolidation represents a serious, expanding threat. Attention turns to alleged cyber and information warfare, with the speaker mentioning new information about battleground states where cyber warfare was used. The speaker claims that former FBI director James Comey sold HAMR and Scorecard, a top-secret program, to the Chinese. According to the speaker, HAMR is a program that simulates an iPhone-like app inside the voting network, enabling it to be installed and to modulate voting to favor one candidate over another, rather than by a large margin. The speaker recounts a specific telephone claim: on a Tuesday night at 11:30, they were told that the ISI of Pakistan was in the voting machines in Georgia. They say they informed someone about it. The claim is made that, in Georgia, the two candidates Loeffler and Purdue were ahead, but one hour later, they were behind, suggesting a dramatic and rapid shift attributed to external manipulation. Throughout, the speaker emphasizes urgency, global and domestic conspiracies, and the need to act immediately to counter perceived control over society, media, and the electoral process. The narrative ties together political figures, media influence, alleged clandestine cyber tools, and foreign involvement in U.S. voting systems, presenting a cohesive but controversial account of systemic manipulation and imminent danger.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker expresses concern about the control of society and the need to stand up against it. They claim that the attack on the Capitol was done by Antifa and enabled by McConnell, Schumer, Pelosi, and the Mayor. The speaker criticizes the media, particularly Fox, for their actions. They mention the merging of Fox with mainstream media. The speaker emphasizes the seriousness of the situation and the lack of time to address it. They mention cyber warfare in battleground states and allege that the former FBI Director sold a top-secret program to China. The speaker describes this program as infiltrating voting networks and manipulating the voting process. They also mention the presence of the ISI from Pakistan in Georgia's voting machines.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2009, Ericsson faced pressure for selling telecom equipment to oppressive governments. They sponsored a speech by Bill Clinton, paying him $750,000. In 2012, the Obama administration imposed sanctions on telecom sales to Iran and Syria, but Ericsson's work in Iran was not covered. The speaker, Laura Logan, discusses her experience as a journalist and the power held by those who control the infrastructure of data. She introduces Michael Curry, who uncovered corruption in the mortgage industry and later discovered the Ericsson report. The report reveals how NuStar and Ericsson control the portability centers that handle data and phone calls, including financial transactions, for numerous countries. The report also highlights the connection between NuStar and the CIA.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.
View Full Interactive Feed