reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
Neo cons like Lindsey Graham are salivating about what's happening in Iran, hoping for a regime change, and the ongoing protests over the weekend gave plenty of fuel to their fire. Let's talk about what's actually happening in Iran right now, because your timeline is being flooded with rage bait and all sorts of fake news clips, old clips. If you've been online the past few days, you've seen the clips that Iran is exploding, cities on fire, the people have risen up, The regime is finished. That's what you're hearing. A lot of that content is either mislabeled, it's years old, it's from a different country entirely, or it's edited to look like it's new, it's actually not. A lot of fact checkers have already tracked down where a lot of people are using older protest video from Iran. Sometimes the video is from totally other countries, but don't let facts get in the way, so it's crazy. This is the same thing, by the way, that happened in Venezuela two weeks ago. All these conservative influencers just keep sharing this stuff. A friend of the show Glenn Greenwald called them out, he's like, hey, just keep sharing all this fake news, like, do you keep putting this out there? So what is real? Well, according to our sources, Iran is going dark digitally on purpose. Other news organizations have reported a nationwide blackout when the Internet goes down or is being blocked. The information war gets turned up to eleven. Gotta fill that void. A lot of fake news, rage bait, and even satellite workarounds right now are getting squeezed. Reports today that Iran is not only shutting down normal Internet traffic, but also attempting to disrupt Starlink connections. We can tell you that Starlink service is being interfered with beyond just the normal basic GPS jamming. Our own sources are telling us that foreign partners are helping Iran with this blackout, China and Russia specifically, helping to jam communications. Satellite phones, satellite internet, and other links that are going out. You're hearing names like Starlink, Iridium, Inmarsat, Theory Theorya. So if those names pop up being blocked. What we can say again according to our own sources is that Iran is in an unusually sophisticated communications clamp down right now, and on purpose. To basically close down prying eyes, looking into their country, and information going out of their country. It's a two way street right now, being closed down. China is the key player in this, in this jamming equipment that's being used right now. We're also hearing reports of concerning health risks within the radius of this equipment, where it has been deployed.

Video Saved From X

reSee.it Video Transcript AI Summary
Over 500,000 square miles of the US lack cell service, leaving many areas unconnected. This means emergency texts, emotional messages, and precious memories go undelivered. But T-Mobile is changing that. We've partnered with Starlink to launch hundreds of satellites, creating a space-based network that automatically connects to your existing phone, regardless of your carrier. Connection matters, so we're offering free access to anyone. With T-Mobile Starlink, if you can see the sky, you're connected.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: You've heard me talk about the five g towers and how it's not for Internet at all. It's a microwave weapon developed by the military to be used on the citizens. Take a look at this video. Speaker 1: They started at 09:11 at night until 09:11 in the morning. You see the pulse going from the East to the West Coast. Alright. Boom. You see that? Those are NEXRAD stations. Each of those towers are 750 kilowatts, pumping out between 2.7 to 2.9 gigahertz in the microwave range. This is roughly the same frequency as your microwave oven. Speaker 0: Now there are tons and tons of whistleblowers coming out about this technology and how dangerous and damaging and deadly it is. This is not for Internet. You wanna know if it's true? Go right up to one of those damn towers and see how good your service is. It's still gonna suck. These things are not for Internet service or communications. It's a weapon. They are frying you with microwaves while you sleep. If you saw in the video, did you notice where it wasn't? Where they weren't microwaving the population while they slept? All the areas of the country that are the least populated. Is that by accident? Those microwaves just magically don't go to those certain areas of the country? No. There's no reason to do it there. There's very few people that live there compared to the populated areas of the country that have huge cities in them. That's where you notice they are microwaving you to death. Are you feeling sick? Are you feeling lethargic? You can't think straight. You're not sleeping well. You're having crazy dreams. All of this stuff is radiation poisoning. Look up the symptoms of radiation poisoning. You're gonna see they identically match a lot of your symptoms that you're having. Funny enough, it also matches a lot of the symptoms of COVID. Crazy how that works. So I'm telling you guys, you have got to understand what's happening. And they're talking about putting up four times the amount of towers in the next four years. Why would they need that? We can prove that it's not for Internet. It's not for cell phone service. So why? You need to start asking yourself, why are they putting these things up at an unprecedented rate and then lying to your face about what they're for? Reach out. Let's connect. Let's figure out the plan of how we stop this.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
To switch a phone from 5G to 4G, go to settings, then cellular data, and change the setting from 5G to LTE or 4G. According to the speaker, 5G is 300 times stronger than 4G and caused the 2020 pandemic. The speaker claims there are zero long-term studies of 5G. A senator questioned industry representatives about funding for 5G studies and was told there are no active industry-backed studies. The speaker suggests that people are the study and advises against using new technologies like AirPods and smartwatches. The speaker claims 5G is tested on plastic dummies and implies it is unsafe for humans.

Video Saved From X

reSee.it Video Transcript AI Summary
To check if you're being tracked, dial *#62# on your phone. If you see any call forwarding options, you're being tracked. To disable this, dial ##002# on your phone. This erases all call forwardings. Like, share, and follow for more content like this. Translation: To check if you are being tracked, dial *#62# on your phone. If you see any call forwarding options, you are being tracked. To disable this, dial ##002# on your phone. This will erase all call forwardings. Like, share, and follow for more content like this.

Video Saved From X

reSee.it Video Transcript AI Summary
The secret service has dismantled a telecommunications threat right here in the New York state tristate area. a covert network of devices capable of shutting down cell service right as the UN general assembly is underway. These devices federal agents say could have disabled cell towers and essentially shut down the cellular network in New York City. Inside several locations, agents found thousands of networked cellular devices. The system allowed anonymous encrypted communications between criminal and foreign actors and could have caused massive disruption to government and emergency communications. Some experts say this network could have sent as many as a million text messages a minute, potentially disrupting all kinds of issues here. The investigation actually began in the spring. No arrests have been announced.

Video Saved From X

reSee.it Video Transcript AI Summary
ICE is using fake cell towers to turn your phone into a tracking device. It's a technology called Stingray. They put it in a vehicle and drive through a neighborhood broadcasting a signal stronger than a real cell tower. Your phone automatically connects to the strongest signal, so it connects to the fake one, and you never know what happened. Once you're connected, they can pinpoint your exact location in real time. Here's the most terrifying part: the Stingray doesn't just connect to the target's phone. It forces every phone in the area to connect to it. Your phone, your neighbor's phone, anyone just walking down the street, it scoops up data from hundreds of people to find one person. This isn't a theory. Forbes just uncovered a warrant showing ICE used one to track a person across a 30 block area in Utah, and they've spent millions on these cell site simulator vehicles. Your phone is constantly looking for a signal. You just have to hope it's a real one. ICE

Video Saved From X

reSee.it Video Transcript AI Summary
Beamforming replaces universal, multi-directional broadcasting with a focused data stream to a specific user, reducing interference and increasing efficiency. In cellular networks, antennas that broadcast in every direction create crossing signals that can interfere with one another. Beamforming acts like a traffic signaling system for cellular signals, enabling base stations to direct a precise stream of data to a particular user. This precision helps prevent interference and allows stations to handle more data streams simultaneously. The process works as follows. In a dense environment with many buildings, a user’s signal is reflected off structures and overlaps with signals from other users in the area. A massive MIMO base station receives all of these signals and tracks their timing and direction of arrival. It then uses signal processing algorithms to triangulate the exact origins of the signals and to determine the best transmission path back through the air to each phone. Sometimes the system even bounces individual packets of data in different directions off buildings or other objects to keep signals from interfering with one another. By dynamically routing signals in this way, the result is a coherent data stream sent only to the intended recipient. This approach enhances efficiency and capacity, allowing the network to serve more users and manage more data traffic effectively. Overall, beamforming with massive MIMO enables targeted transmission, reduced cross-talk, and smarter use of the radio environment. By perceiving the signals’ directions and reflections, the base station can optimize routes for each user, delivering a clean, focused connection rather than a broad, noisy broadcast.

Video Saved From X

reSee.it Video Transcript AI Summary
We partnered with Starlink to launch hundreds of satellites, creating a unique space-based network. It automatically connects to your existing phone, regardless of your carrier. Because connectivity is crucial, we're offering a free trial to everyone. You’ll be amazed at how well it works, even in the most unexpected locations. T-Mobile Starlink: If you can see the sky, you're connected.

Video Saved From X

reSee.it Video Transcript AI Summary
5G towers are not for internet; they are a microwave weapon developed by the military to be used on citizens. NEXRAD stations, pumping out between 2.7 to 2.9 gigahertz in the microwave range, operate from 9 PM to 9 AM, pulsing from the east to west coast. These towers output 750 kilowatts, roughly the same frequency as a microwave oven. Whistleblowers claim this technology is dangerous and deadly. The towers aren't for internet service, as service near them is poor. Populated areas are being microwaved while people sleep, while less populated areas are spared. Symptoms like sickness, lethargy, inability to think straight, poor sleep, and crazy dreams are signs of radiation poisoning, matching COVID symptoms. The plan is to quadruple the number of towers in the next four years, despite proof they aren't for internet or cell service.

Video Saved From X

reSee.it Video Transcript AI Summary
This phone is not a nostalgia product, but a gadget for hacking, independence, and anonymity. It is compact and lightweight, weighing only three ounces.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the breadth and invasiveness of data that can be accessed from a person’s phone, highlighting how such information can be retrieved and used in investigations. They enumerate the various types of data that can be obtained: call logs, chats, cookies, device notifications, emails, instant messages, and passwords. They note that deleted conversations on encrypted apps like WhatsApp and Signal can also be accessible, as well as Millie’s deleted web browsing history. The speakers emphasize that contact information for everyone the person has spoken to, and the locations of all their calls, can be seen. They point out that information about other people’s phone numbers can be accessed, and they ask whether those people’s messages to the person can be seen, with the answer being yes. The police can obtain information about people the person has contacted, not only in relation to any arrest that might have occurred but also concerning individuals who may have contacted the person securely (for example, through Signal) about work. The speakers express that the most worrying aspect is that this kind of data access can happen at the time of arrest, even when charges are never brought, and that it can also apply to witnesses and victims. They argue that there appears to be little clarity about deletion, implying that the police can effectively do what they want when they obtain someone’s phone, which they describe as a scary amount of information. Despite the fear, they also acknowledge that this data is extremely useful for the police in investigations. A central concern raised is the current lack of a required warrant to obtain any of this information. They argue that there should be a degree of checks and balances to determine whether it is proportionate to access such data in a given case, stating that in some cases it may not be necessary to access a person’s phone. Overall, the discussion highlights a tension between the usefulness of comprehensive digital data for investigative purposes and the potential for overreach or abuse in the absence of warrants or robust safeguards.

Video Saved From X

reSee.it Video Transcript AI Summary
The 5G system is seen as a dangerous weapon by some, being used by governments as a form of mass destruction in civilian areas. The industry is aware of this and even celebrates it. The goal behind this weapon is to reduce the population and maintain control over society. It is crucial for people to use the internet to share life-saving information and combat this threat.

Video Saved From X

reSee.it Video Transcript AI Summary
So today, we're gonna hit on an important website called antennasearch.com. And what you do is you go in and you look up how many cell phone towers and antennas have been installed near your home while you weren't paying attention. This is the whole fast tracking of 2020. and if you own a cell phone, you should switch it to LTE, not five g. That's how you boycott this system, which is trying to poison us. In 2020, you had four g, and then all of a sudden in 2021, you had five g, and then now in 2025, you have five g all over the place. And people are coming down with radio wave sickness. Fevers, chills, shortness of breath, fatigue, headaches, loss of smell, insomnia, pain in the chest, dizziness, muscle pain, hypertension, strokes, and messing with your thyroid. What's more wild is the cell phone tower companies. You can't sue them.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript centers on claims that the United States used directed energy weapons during the kidnapping raid in Caracas to capture Nicolás Maduro on January 3, 2026, with Redacted independently confirming the news from multiple sources. The host asserts that this technology is not new and that the U.S. has used it on previous, unreported occasions. The operation, termed “Absolute Resolve” and part of a broader Caribbean campaign, allegedly involved roughly 150 aircraft conducting strikes around Caracas before Delta Force and CIA operatives seized Maduro and Celia Flores and flew them out. Reuters is cited as framing the raid as a strategic message to China and Russia, noting that air defenses supplied by those countries were reportedly disabled in the opening moments. A circulating Venezuelan security guard’s transcript, which is also retweeted by White House press spokesperson Carolyn Leavitt, is highlighted as aligning with what modern electronic warfare and directed energy weapons can do. The guard describes a scenario where all radar systems shut down without explanation, followed by a large drone presence over positions. He recounts a moment when something was launched that produced “a very intense sound wave,” after which his unit experienced severe physiological effects: people bleeding from the nose, vomiting blood, and an inability to move or stand. He describes eyes going blind first and bodies collapsing, with the head feeling like it would explode. The host clarifies what is meant by directed energy, distinguishing electronic warfare (attacking the spectrum, jamming, spoofing, overload, or cutting networks) from kinetic actions. The Economic Times is cited as describing something called the “Wraith” as an electronic warfare umbrella used in the Maduro capture to create a digital blackout that paralyzed security infrastructure. There is some confusion around the name because CX2 markets a product called Wraith as an autonomous airborne EW platform that locates high-value emitters such as jammers and radars, with a promotional video illustrating its jamming capabilities. A third component discussed is sonic or acoustic weapons. The listener is shown a concept of active denial technology described by the Pentagon as a focused beam of radio frequency millimeter waves that penetrate only about one sixty-fourth of an inch into the skin, causing an intolerable heating sensation that compels movement; stepping out of the beam ends the sensation. The host references a Fox News segment in which Peter Ducey tested the system, illustrating crowd-control and perimetry uses. The conversation then elaborates that directed energy weapons are a real arms category used by major powers for years, with China and Russia possessing their own systems. The host mentions that initial testing of these weapons reportedly occurred in Afghanistan, with subsequent use in Syria during the Obama era, and asserts that the U.S. has employed such weapons for years, including during the Maduro operation. The discussion includes warnings against overestimating unilateral U.S. dominance in this arena, noting that both China and Russia have developed and deployed directed energy capabilities and that the technologies are broader and older than some public narratives suggest. The segment also touches on ongoing geopolitical dynamics involving Iran and global security concerns related to these weapons.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
5G towers are not for internet or phone service but are part of Project Blue Beam and are microwave weapons designed to harm people. The term "conspiracy theory" is used to discredit truth-tellers. Cell phone repair shops are discovering that phones do not have 5G chips, despite companies charging more for 5G service. One repair technician states that there is no 5G in Canadian phones or support from Canadian carriers; it is a marketing scam. The technician believes the government is using 5G towers for other purposes. People should wake up to the lies about 5G and understand the true purpose of the towers.

Video Saved From X

reSee.it Video Transcript AI Summary
There are many small devices that claim to block EMFs without affecting cell signals, but as an electromagnetic engineer, I am skeptical. If such a device existed, the military would use it widely, and I would be aware of it.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss alleged military and Department of Defense documentation in which cell towers are not described as cell phone towers but as directed energy weapons (DEWs). They claim that documents exist that refer to a phone as a DEW and to a router as a DEW, and that such classifications demonstrate a framework in which devices operate as directed energy delivery systems. They state that control over people is achieved through frequencies, with emphasis on extremely low frequencies, heart frequencies, and a range of radio spectrum bands from megahertz up through gigahertz and higher (three, four, five, six, seven, eight, nine, ten gigahertz, microwave frequencies, and radio frequencies). The speakers assert that these frequencies can be used to influence or manipulate individuals, implying a mechanism of influence or control via electromagnetic signals. The conversation also touches on music as a vector for such control, noting that there is “the opposite of that too, like the good music with the esophageal tones,” which suggests contributors believe music can be used in conjunction with frequency technology for manipulation. They claim that there are devices or methods involving frequencies embedded in music that can affect listeners. A recurring theme is the notion that certain metals in the body are needed, described as “a lot of metals in your body,” because metals are used as transducers and receivers for these directed energy systems. The speakers imply that the human body itself can be part of a transduction network, enabling reception and transmission of electromagnetic signals. They maintain that people are exposed to EMFs and frequency devices as part of this broader mechanism. The speakers indicate they have access to, and would be willing to share, DOD and related documents with listeners who want to examine the information themselves, reinforcing their point that these claims are grounded in verifiable materials. Overall, the transcript presents a narrative that: (1) military and defense documents reframe common infrastructure (cell towers, phones, routers) as DEWs; (2) control or influence is purportedly achieved through a continuum of frequencies across a wide spectrum, including heart-related frequencies; (3) music and esophageal tones are mentioned as vectors or modulators; (4) bodily metals are described as necessary components for transduction; and (5) there is an invitation to review the cited documents to verify these assertions.

Video Saved From X

reSee.it Video Transcript AI Summary
Whistleblowers, including a FEMA insider, claim that tests have been conducted in other countries where devices cannot be opted out or turned off to avoid the signals. Even Faraday cages, which block microwave signals, were ineffective. This suggests that a wide range of signals is being transmitted, including those from 2G and 5G phones, reaching various devices simultaneously. The concern lies in the effects of these frequencies and the reason behind their simultaneous transmission everywhere. The test will continue for a few hours, leaving us uncertain about the consequences if they hadn't informed us.
View Full Interactive Feed