reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Vault 7 is the biggest intelligence leak ever, with less than 1% of the material published so far. It reveals that the CIA has created its own version of the NSA focused on hacking. They develop viruses and trojans to infiltrate people's devices and collect information for the CIA. This information can be used to falsely implicate someone in a crime. The CIA's budget has increased, giving them more power, and they now have their own drone fleet and hacker squad. Unlike the NSA, the CIA targets endpoints instead of intermediaries, bypassing encryption. If a phone is hacked, encryption becomes irrelevant as the information is gathered before or after encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is as important as addressing pandemics and nuclear war. Scientists, creators, and academics recognize the potential benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, effectively covering most of the Earth's land mass. Pine Gap analysts locate targets by tracking their communication signals, such as mobile phones, and relay the information to military centers in the US. The US government needs to address concerns about a high-powered microwave weapon that can harm a target's nervous system. Neural weapons, like SATAN, have been used for silent assassinations. Additionally, technology exists to read an individual's thoughts through radio frequency signals and the microwave auditory effect.

Video Saved From X

reSee.it Video Transcript AI Summary
A spy scandal involving the CIA selling spy software to foreign nations is linked to journalist Danny Caselaro's mysterious death. Caselaro was investigating a conspiracy involving surveillance software, Iran Contra, and more, which he called the "octopus." His death was ruled a suicide, but many believe he was murdered to keep the truth hidden. The case remains unsolved, raising questions about government corruption and espionage. The full story can be heard in our podcast.

Video Saved From X

reSee.it Video Transcript AI Summary
The summary approach: - Identify and condense the core claims: infiltration of a classified program, money flows, and international involvement. - Preserve the sequence of revelations: discovery, scope, consequences, and ongoing efforts. - Highlight unique, surprising elements: foreign funding, mood-modification aims, and the VPN manipulation allegations. - Exclude filler and repetitious material; avoid evaluative judgments. - Translate all claims into a concise English recap, retaining the original claims’ intent and phrasing where possible. - Keep within 420–526 words. In a rapid-fire investigation, RFK Jr.’s chemtrails task force allegedly used encrypted channels to infiltrate DARPA’s classified financial network and uncovered a global shadow war blueprint: powerful organizations funneling hundreds of millions into coordinated aerosol operations over American skies. Despite growing public outrage, the spraying hasn’t stopped; the investigators claim US taxpayers are unknowingly funding it, with millions flowing out daily. A foreign intelligence partner, officially an ally, is said to secretly bankroll what internal memos describe as psychological operations targeting US citizens. The report promises to expose the DARPA files officials “never wanted you to see.” The broadcast also asserts Israel has quietly bought up most of the world’s popular VPNs and recruited spies to run these companies, urging viewers to cancel subscriptions and promoting vp.net as the trustless alternative. Decades of top-level military authorization are alleged, with commanders issuing classified orders for aerosol dispersals over major population centers and then burying the evidence beneath compartmentalized clearance. If this is climate engineering gone awry, proponents claim, it’s better described as a hidden program connected to a broader budget and agenda than a mere accident. The video ties these claims to a broader evidentiary trail: a crowdsourced, live-updated database of spraying operations—geotagged videos and flight paths that map a national network of conspiratorial activity, logging every contrail, haze, and unmarked jet. Testimonies emphasize expert concern. A panel of scientists and academics calls for a solar engineering nonuse agreement, citing insufficient understanding of outcomes, a seventy-year weather-modification history that should foster humility, and the risk of unintended consequences. Federal cloud-seeding work dating back to the 1940s is cited, with EPA warnings about stratospheric ozone depletion, acid rain, and potential reduced crop yields, alongside questions about the necessity of such interventions given climate uncertainties. Critics note that questioning weather modification once labeled you a conspiracy theorist; now evidence supposedly shows decades of operation. A geoengineering company, Make Sunsets, is mentioned, with an FAQ claiming that failure to reflect sunlight could threaten millions of lives and many species. Bees are described as dying in record numbers, with peer-reviewed data alleging aluminum levels in bees up to 70 times higher than those linked to human brain diseases; aluminum is framed as a pollutant enter­ing ecosystems through spraying, with broad global contamination across the US, Canada, Australia, and the UK. A witness connected to the task force discusses infiltrating Doppler systems, correcting a financial network using legacy credentials, and discovering hidden ledgers and anonymous entities labeled atmospheric modulation research. The money trail reportedly flows through private foundations, corporate fronts, and foreign contractors, with billions fueling ongoing aircraft operation in the skies while the public remains unaware. Foreign money—specifically Israel—allegedly funds millions under “psychological spray operations” to modify population mood metrics. The account also portrays a broader information-war landscape where VPNs are framed as surveillance tools; Cape Technologies and its Israeli-intelligence-linked leadership allegedly own major VPN brands and watchdog sites, with connections to Pegasus and other surveillance tools. vp.net is pitched as a secure, American-owned, logless, zero-data VPN designed to resist surveillance, described as the only true protection against monitoring. The piece closes with appeals for subscriptions and support to keep exposing what it frames as elite crime.

Video Saved From X

reSee.it Video Transcript AI Summary
140 Israeli individuals have been arrested and detained this year in an organized intelligence gathering operation aimed at infiltrating government agencies. Most of them have served in the Israeli military and possess intelligence expertise, working for companies like Amdocs specializing in wiretapping. The Israeli embassy denies any involvement in spying. Behind the scenes, there is pandemonium at the FBI, DEA, and INS, with supervisors and management collecting information under pressure from top levels. Administrative reviews are underway to investigate the situation and understand how this information came to light, considering the explosive and political nature of the story.

Video Saved From X

reSee.it Video Transcript AI Summary
The Promise computer program, created by Inslaw Corporation, became a source of controversy when the US Justice Department was accused of stealing it. The software was allegedly sold to Middle Eastern arms dealers with no customs inspections. Journalist Danny Casolaro, who investigated the scandal, was found dead, and his notes disappeared. Congressional hearings were held regarding the Justice Department's involvement in forcing Inslaw out of business. The Promise software was modified with a backdoor for government spying while working on Cabazon Indian sovereign land. According to reports, nearly 50 murders are connected to prevent leaks. Former Israeli intelligence agent Ari Ben Menashi is in hiding, fearing for his life, due to cover-ups. Mossad acquired Promise via Rafi Eitan, who disguised himself to obtain a copy. The Israelis deconstructed and rebuilt it with a trapdoor, with Michael Ricconisciutto modifying the program. Earl Bryan, a Reagan crony, allegedly facilitated the deal. Robert Maxwell then marketed Promise globally, enabling Mossad to monitor users. John Tower, a former US senator, allegedly helped Maxwell sell a doctored version to Sandia Laboratories, giving Israel access to Los Alamos. The FBI's investigation was reportedly blocked by high-level officials.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels possess Pegasus spyware, developed by the Israeli firm NSO Group, which can infiltrate phones without requiring users to click any links. This "no-click malware" can access data before encryption, including calls, texts, emails, location, and social media. It can also activate the phone's camera and microphone for surveillance and take screenshots, all while conserving battery life to remain undetected. NSO requires approval from the Israeli Ministry of Defense for each sale. Mexico has had this software since at least 2016. Initially, NSO claimed it helped capture El Chapo, but it was also used against journalists and those opposing government corruption. Cartels are now allegedly teaming up, armed with military-grade weapons and narco drones, viewing the U.S. government as a common enemy. They could use Pegasus for blackmail or to plant evidence on phones. Striking cartels inside Mexico is complicated because the cartels have infiltrated the Mexican government, and military officials admit uncertainty about winning the war on drugs.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is crucial, just like addressing pandemics and nuclear war. Scientists, creators, and academics recognize the immense benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, effectively covering most of the Earth's land mass. Pine Gap analysts locate targets by tracking their communication signals, such as mobile phones, and send the information to military centers in the US. The US government needs to address concerns about a high-powered microwave weapon that can harm a target's nervous system. Neural weapons, like SATAN, have been used for silent assassinations. Additionally, technology exists to read an individual's thoughts through radio frequency signals and the microwave auditory effect.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
The report centers on allegations that the CIA sold a computer program called Promise to foreign nations, including Australia, with a hidden backdoor to spy on them. Promise, developed by Inslaw, was designed to track vast amounts of information. Inslaw owner, Bill Hamilton, claims the US government pirated the software. Ari Ben Menashi, a former Israeli intelligence agent, alleges Israel knew about the backdoor, unlike Australia. Computer expert Michael Ricconisciutto claims he modified Promise for Australia at ASIO's request. A judge ruled the Justice Department illegally bankrupted Inslaw and ordered the government to pay $8 million. It's alleged the Reagan campaign made a deal with Iran to delay the release of American hostages until after the 1980 election, with the Promise software as a payoff. Former Attorney General Elliot Richardson, now representing Inslaw, calls for a full investigation. Journalist Danny Casolaro, investigating the Promise affair and the alleged Reagan-Iran deal, was found dead, with his death ruled a suicide. Ricconisciutto claims he was threatened by a Justice Department official to back off. A congressional inquiry is underway, but the Justice Department is accused of stonewalling the investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
Pine Gap is described as one of the world’s most secretive military sites in Australia, likened to an Australian Area 51. The video asserts that the base is a joint US-Australia spy facility operated by the CIA, NSA, and NRO, with the official narrative limited to surveillance, drone operations, missile tracking, and signal intelligence. The presenter claims the construction narratives make no sense, noting Pine Gap is in a remote desert location yet supposedly contains miles of tunnels and multiple underground levels, similar to other sites like Derinkuayu in Turkey, and suggesting the underground complexes were repurposed for military use. They argue there are many multileveled underground complexes worldwide and imply a pattern of joint operations among countries. The video states there are no public images of what lies beneath Pine Gap, but multiple whistleblowers claim the real activity is underground. It references a CIA document indicating Russia built a building to hide an entrance into a mountain, and describes white domes as entrances to tunnels with locals reporting underground vibrations, low hums, and flashes of light from inside the hills. It connects this to the Araran (Australian Aboriginal) people and asserts they lived on the land before the military arrived, situating Pine Gap on sacred land tied to Aboriginal cosmology and law. The presenter interprets this as an old world pathway, possibly linked to ley lines or song lines, and suggests Pine Gap was built at that sacred site in 1966-1967 through a secret US-Australia agreement without public consultation or Indigenous input. The narrative invokes UNDRIP (2007), which states Indigenous peoples have the right to lands traditionally owned or used, and asserts that lands taken without consent should be returned. The presenter notes Australia initially voted against UNDRIP in 2007 and questions why, given the land was taken in 1966-67. They claim a CIA contractor with TRW’s “black vault” alleged the CIA orchestrated the removal of an Australian prime minister who threatened to close Pine Gap, and that the PM was dismissed before he could reveal CIA agents in Australia, including the first Pine Gap director described as a CIA agent. The episode links Pine Gap to the Five Eyes intelligence alliance (US, UK, Canada, Australia, New Zealand), describing Pine Gap as one of its most important locations. It cites Snowden to claim Five Eyes operates above national law, spying on citizens to bypass domestic privacy laws. The presenter questions whether Five Eyes is an overt domination rather than a true multilateral treaty, citing sites like RAF Menwith Hill in the UK as additional examples of centralized monitoring with limited oversight. They reference attempts by UK officials to obtain information about US activities at these sites being blocked, and reiterate that the US remains deeply involved in Pine Gap today, possibly more than ever. Additional observations include a 2009 power purchase agreement creating a dedicated high-voltage line to Pine Gap, implying extraordinary energy demands unaligned with publicly stated purposes. The video ends by suggesting the discovery of something massive at Pine Gap and hints at breaking a pattern to reveal long-standing hidden activities. The host invites ongoing discussion about whether underground worlds exist beneath Pine Gap and similar installations.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels possess Pegasus spyware, developed by the Israeli firm NSO Group, which can infiltrate phones without requiring users to click any links. This "no-click malware" can access calls, texts, emails, GPS data, and even activate a phone's camera and microphone for surveillance. NSO Group requires approval from the Israeli Ministry of Defense for each sale of Pegasus. The software was sold to Mexico as early as 2016, and was used to target journalists and those opposing cartels. Cartels are now allegedly teaming up, using military-grade weapons and narco drones, and the US government may be considered a common enemy. The cartels could potentially use Pegasus to blackmail individuals by planting evidence on their phones. Military officials are unsure how to win the war on drugs.

Video Saved From X

reSee.it Video Transcript AI Summary
Pine Gap, a secretive US-Australia joint spy base in central Australia, is purportedly used for surveillance, drone operations, missile tracking, and signal intelligence. However, the construction suggests a vast, multileveled underground complex, possibly repurposed old world structures. Locals report underground vibrations, hums, and lights. The base is built on land sacred to the Araran people, tied to aboriginal cosmology and songlines, without their consent, violating the UN Declaration on Rights of Indigenous Peoples (UNDRIP). A CIA contractor claimed the CIA orchestrated the removal of an Australian prime minister who threatened to close Pine Gap. Pine Gap is operated by the NSA, CIA, and NRO, with Australians restricted from certain areas. The Five Eyes network (US, UK, Canada, Australia, New Zealand) uses Pine Gap for global surveillance, potentially circumventing domestic laws. Similar patterns exist at Menwith Hill in the UK and other sites, suggesting a US-led effort to control old world sites and technology. The high power consumption at Pine Gap indicates activities beyond its stated purpose.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 and Speaker 1 discuss the ongoing investigations into the Epstein-Israel connection. Speaker 1 explains that Robsat has been examining Epstein’s ties to the Israeli government, Israeli security services, and Israeli private firms connected to the security sector, which are heavily involved in tech surveillance. Epstein is described as a very critical node in this network. The recent email dump is noted as chaotic and not fully accessible, with about 3,000,000 documents released, roughly half of what the DOJ reportedly has. There is mention of another roughly 3,000,000 files that remain unseen, and that lawmakers like Ro Khanna and Thomas Massey have raised this issue. The currently released material may only be the tip of the iceberg, and fuller analysis awaits chronological organization to understand the conversations in context. Speaker 1 notes that prior reporting relied on very limited Epstein files and involuntary releases from hacked material—such as an intrusion into Ehud Barak’s inbox—which revealed Epstein’s extensive, far-reaching involvement with figures and institutions in Israel’s political and security establishment. Epstein’s role is described as a resource and a critical node used for connections, money, political leverage, and global influence, rather than simply being a Mossad agent. The forthcoming documents are expected to enable more stories about Israel’s global influence through Epstein, including in Africa, Central Asia, Europe, North America, and Russia. Speaker 0 asks about the significance of Epstein informing Ehud Barak, especially in light of Palantir’s actions, and why Barak would need this information if Palantir would proceed independently. Speaker 1 responds by noting that Ehud Barak was leaving public service and, like many former politicians, sought to leverage access gained in office to generate private wealth while pursuing ongoing political aims. Epstein was assisting Barak in developing him as a tech security mogul. Barak apparently did not know Palantir well at that time, illustrating Epstein’s role in shaping and linking these tech surveillance interests. Speaker 1 adds that Palantir was reportedly attempting to hire Israel’s UN ambassador, Ron Prosor, indicating a very intimate relationship between the Israeli political/security establishment and Palantir, which also has ties to the American intelligence community. Epstein’s interest in surveillance technology aligned with his broader access to intelligence networks and financial resources to influence the technological landscape. The transcript ends with Speaker 0 interjecting a promotional advertisement for gold and silver (which should be omitted from the summary per instructions).

Video Saved From X

reSee.it Video Transcript AI Summary
Pine Gap, a base in Australia, collects digital data from various sources using satellites. It can locate targets by tracking their communications and send the information to military centers in the US. The base's true purpose was hidden from the public, who were told it was a space research facility. The secrecy was to keep Australians unaware of the intelligence and military secrets being gathered on their soil. The US saw Australia as a little odd and needed to protect them from perceived threats like the Soviet Union and China. The cover story of a space project was used to maintain secrecy.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is crucial, just like addressing pandemics and nuclear war. Scientists, creators, and academics recognize the immense benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, essentially monitoring most of the Earth's land mass. Pine Gap analysts locate targets by tracking their communication signals, such as mobile phones, and send the information to military centers and drone pilots. There are concerns about a high-powered microwave weapon that can harm an enemy without leaving evidence. The US government needs to address these concerns. Neural weapons, like SATAN, have been used for silent assassinations, and there are claims of technology that can read thoughts by tuning into an individual's DNA frequency.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is crucial, comparable to addressing pandemics and nuclear war. Scientists, creators, and academics recognize the immense benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, ensuring extensive coverage of Earth's land mass. Pine Gap analysts locate targets by tracking communication signals, such as mobile phones, and relay the information to military centers and drone pilots. A high-powered microwave system weapon can harm enemies over time without leaving evidence. Neural weapons, like SATAN, have been used for silent assassinations. Additionally, technology can be used to read individuals' thoughts by tuning into their DNA's resident frequency.

Video Saved From X

reSee.it Video Transcript AI Summary
Pine Gap is described as a US-run spy base located in Australia, potentially sitting atop “old world technology,” with this being just the beginning of a broader pattern. In Yorkshire, United Kingdom, the Royal Air Force Menwith Hill is claimed to be the largest electronic monitoring station in the world, operated under the Five Eyes alliance. The speaker asserts the Five Eyes is a US infiltration of Canada, New Zealand, the UK, and Australia, and characterizes it as a one-sided agreement that dictates terms to the other countries. Menwith Hill is said to be constructed between 1956 and 1959 as a 605-acre site with 37 giant radar domes, on British soil but run by the NSA, with an on-site commanding officer American and staffing primarily by US personnel and contractors. The Five Eyes is presented as a means for the USA to infiltrate these countries, and the speaker suggests broadening inquiry to other agreements like Nine Eyes, Fourteen Eyes, NATO, Echelon, and SOFA agreements, which allegedly define the legal status of foreign military forces stationed abroad. The narrative links joint CIA intelligence centers, fusion centers, and biometric data exchanges to extending access to millions of foreign citizens’ DNA, fingerprints, and facial recognition to a single country. The speaker emphasizes that understanding these alliances reveals key players and patterns, comparing it to decoding a game. The episodes are described as sequential for a reason, revealing a progression. UK officials’ attempts to access Menwith Hill are said to have been denied, and Edward Snowden is cited as confirming Menwith Hill as a central data interception and processing facility for global signals intelligence, including phone calls, emails, and Internet traffic from UK citizens. The discussion then focuses on power usage, noting that Menwith Hill’s subterranean operations are referenced by former intelligence personnel as involving underground components and high electricity usage—“enough electricity to power an entire small city,” with 1.7-megawatt backups and 30 MVA capacity—implying the presence of old world technology beneath the ground beyond what is publicly acknowledged. The 37 radars consume power, but not to justify such consumption, leading to the claim that something powerful lies underground. Fort Meade, the NSA headquarters in Fort Meade, Maryland, is described as the United States’ primary agency within the Five Eyes, with the official mission to analyze foreign electronic communications, secure classified US government communications from cyber threats, cryptography and code breaking, provide intelligence to the military, identify terrorist networks, and share with allies. Yet the speaker questions why Fort Meade would require 60–70 MW of electricity, equating that to powering 50,000 homes, and notes public records showing a 100 MW-scale power demand for the site, suggesting underground or hidden infrastructure. Allegations include black rooms, high-security vaults inaccessible even to high clearance personnel, and the possibility of underground facilities. The discussion references a 2016 Baltimore Gas and Electric substation and transmission line built to serve Fort Meade, implying sustained or growing loads, and notes that in 2006 NSA operations maxed out the Baltimore area power grid—claims that fuel speculation of underground or old world technology beneath Fort Meade. The speaker ties these observations to a broader theory of old world technology found beneath sites like Pine Gap, Menwith Hill, and Fort Meade, potentially powering underground cities or facilities. Additional topics include a May 2025 assertion by a former assistant secretary of housing about a $21 trillion secret underground network, the RAND Corporation’s 1998–2015 references to underground and undersea facilities, and a suggestion that trillions in missing or unaudited funds may be connected to these hidden networks. The RAND reference is used to imply a broader, interconnected system, with the speaker signaling a plan to explore further, including references to 6,200-foot tunnels under Central California and a claim of a Japan tunnel documented in RAND materials but not maintained on mainstream maps. The overall synthesis points toward a belief in hidden underground infrastructures connected to the Five Eyes and global power networks, with a promise to continue exploring these connections in subsequent episodes.

Video Saved From X

reSee.it Video Transcript AI Summary
The British security agencies use phone and cloud hacking services provided by the Israeli tech company, Celebreit. The company is led by Dana Goethe, an alumni of Unit 8200 in the Israeli military, known for surveillance and blackmailing Palestinians. Celebreit is staffed with former Israeli military and intelligence personnel. The concerning part is that Celebreit claims to remotely control all its devices, suggesting they have access to information obtained by the British security services.

Johnny Harris

Why We Shouldn't Underestimate This Spy Network
reSee.it Podcast Summary
Johnny Harris discusses a disguised building in New Jersey that serves as an AT&T landing station for undersea cables connecting the world. The U.S. government, with AT&T's help, spies on these cables, processing data at a facility called Pinecone. Leaked documents reveal numerous hidden surveillance sites across the country. The history of undersea cables dates back to 1858, evolving into a vast network that transfers immense data. The NSA, formed post-World War II, expanded surveillance efforts, especially after 9/11 with the USA Patriot Act. Recent revelations show the U.S. and China competing for control over global cable networks, highlighting rising geopolitical tensions.

The Why Files

The Dark Alliance: CIA and DARPA's Hidden War on Citizens (COMPILATION)
reSee.it Podcast Summary
The episode compiles an expansive narrative about DARPA, the CIA, and their lasting influence on technology, warfighting, surveillance, and secrecy. It traces the origins of DARPA from ARPA in the context of Cold War competition, highlighting a pattern of dual-use innovations—from computing, networking, GPS, and microprocessors to advanced sensors and AI—that later permeate civilian life. The hosts describe how DARPA’s science and defense projects often outpace public awareness, while also noting cases where breakthroughs were repurposed for civilian benefit, juxtaposed with allegations of overreach and ethical concerns. A central thread follows the murky relationship between intelligence agencies and private industry, including the Highlands Forum and MDDS, which allegedly funneled private and classified funding into data-centered research, sometimes through fronts and secrecy shrouded in plausible deniability. The narrative expands to cover the evolution of the internet, the weaponization of information, and the idea that much modern technology owes its existence to government-sponsored programs, even as commercial success obscures the secrecy that surrounds them. The episode also documents episodes in which oversight failed or was circumvented, such as debates about the Pentagon’s advanced weapons, exoskeletons for soldiers, AI-enabled warfare, and the controversial concept of zero-point energy and free-energy devices. Alongside the geopolitical arc, the hosts present a critical examination of the medical establishment, the AMA, and pharmaceutical profit motives, recounting stories of alternative therapies, regulatory capture, and the suppression of controversial but historically documented experiments. The long-form compilation culminates with a consideration of covert operations and deception that shaped historical events, from Operation Mincemeat to Gladio, MKUltra, COINTELPRO, and media influence through Mockingbird. Throughout, the tone remains focused on presenting sourced information and widely reported claims, balancing reverence for scientific progress with caution about secrecy and power, and inviting listeners to reflect on how governments, corporations, and media interests intersect in shaping public knowledge and policy.

The Why Files

The Government has Secret Listening Posts in Every Major City
reSee.it Podcast Summary
New York City's 33 Thomas Street, a 500-foot tall, windowless brutalist building, is officially an AT&T telecommunications hub but is actually a top-secret NSA surveillance site known as Titan Point. Built during the Cold War to withstand nuclear blasts, it serves as a core location for mass surveillance, tapping into global communications, including those of foreign leaders and organizations. Leaked documents reveal AT&T's extreme cooperation with the NSA, allowing access to vast amounts of data, raising concerns about privacy and government overreach.
View Full Interactive Feed