TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The FBI told NBC News that a civilian found a hijacker's passport some distance from Ground Zero. An agent reported finding the passport blocks away from the attack. The agent's superior dismissed the idea that the passport was planted. He then ordered an invasion of the entire Middle East. The indestructible passport is now missing. The speaker wonders who took it and if they reverse-engineered it. He speculates that buildings made of passport paper might have survived. He wants to prevent the passport from being misused.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 explains that the journey was controlled by security, stating, 'Of course, it was wedged between the two giant Israeli bodyguards the whole way.' He adds, 'You want security, the Israelis know what they're doing.' Responding, another participant says, 'Exactly.' He concludes, 'So it was not the vacation I I I planned, but'—implying that security considerations altered the original travel plans. The exchange emphasizes the importance of security professionals and their role in shaping the trip's experience. The description also suggests the security dynamic dominated the travel narrative, with the final line ending abruptly. This account highlights the interplay between safety measures and personal plans.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: My first in person hint of something amiss came while I was flying for the US marines prior to Operation Desert Storm. In 1991, on my way to the Persian Gulf conflict, my squadron of 10 A-6E Intruder attack jets landed at Diego Garcia, a top secret US Navy base smack in the middle of the Indian Ocean. While The UK retained sovereignty of the tiny island, The United States controls the island's military base through a 1966 lease agreement and the majority of the personnel on the base are US Navy. I had already been briefed that no outside press was ever allowed at Diego. That immediately put my radar on high alert, wondering what I would find there. But after an uneventful landing, I was completely perplexed. There was nothing there, nothing I could see which of course only heightened my curiosity. Having read enough top secret intelligence briefs, I knew you didn't place a single runway airfield on a no press top secret status unless something at that location required a stringent security veil. The US naval support facility at Diego Garcia is a tiny airfield with a few hangars along the main runway, nothing more or at least that is the only visual I was presented with. While refueling my jet, was intrigued by a huge construction crane working nearby with its main cable going down deep into the ocean. I assumed it was being used to set concrete far down in the depths for future surface structures. I had no idea standing on a tarmac in 1991 only a few 100 feet below me was an active colossal spaceport for the German dark fleet and the American black navy. For those unfamiliar with military secret protocols, think deep black ops equals US black navy. The US black navy is an above top secret unit that supports ongoing space operations at the Diego deep underground military base, DUMB. The multi level deep underground military base was identified by whistleblower Tony Rodrigues as the same port his German space freighter, the Max von Low used as a hub for transporting materials to and from various planets in our solar system. The spaceport and Dummit Diego Garcia were also confirmed by a former black navy assassin during online interviews. The assassin's years working in the Dummit and spaceport at Diego corroborate in both time and description with Rodrigues' supply runs aboard the Max von Low at the Diego Complex. Tragically, Diego Garcia was also the final destination for Malaysian flight three seventy and its passengers and crew. This was confirmed not only by an SOS sent from the Diego Airfield by Philip Wood, a former IBM executive on the ill fated flight, but also verified by the navy assassin who witnessed the hasty disassembly of that jet on the tarmac at Diego Garcia. In addition, top secret National Reconnaissance Office NRO videos leaked online by a former navy lieutenant commander only days after the flight showed Malaysian three seven zero being tracked by two black ops US Reaper drones moments before its disappearance. To make this clear and simple for the non military reader, America's top intelligence services would not order the US air force to track a civilian Boeing seven seventy seven commercial jet with two ultra top secret surveillance platforms on its final flight unless they wanted someone or something on that jet. Period. On the flight were 20 American engineers of Chinese descent working for Freescale Corporation, a Texas based semiconductor firm. All had been coerced by the Chinese government to defect. Those employees carried American technology with them and were on their final leg to Beijing when the cabal struck. Assisted by America's top intelligence services, the cabal hijacked the flight ensuring that all the defectors, their American technology and the innocent passengers and crew were returned to the US Navy base at Diego Garcia in late two thousand fourteen when the MH three seventy cockpit voice transmissions had gone viral. I sat perplexed at home listening over and over. Being a former combat jet pilot, I was shocked that no investigators were calling out what was to me, a clear switch in the cockpit voice just after lift off. The deep Asian accent of copilot Hamid was suddenly no more, and the new voice that replaced it was undeniably American in accent and delivery and a man stuttered on the call sign of MH370 for the rest of the flight, yet nobody was noticing it. I knew then, without a doubt, the jet had been taken, that covert work had been completed and the post investigation was being controlled. To this day, you can listen to them online. Benjamin R Water's clearly American accented radio calls are first heard at 12:42 zero 5AM just after lift off and continue for the rest of the flight and those transmissions intrigued me for years until Ben was identified by tech experts investigating encrypted pings that somehow had never been decrypted. The hijacking and takeover of flight three seventy by a cabal hijacking crew began during initial taxi and culminated with both Asian pilots being executed only seconds after lift off by CIA operative and pilot Benjamin R Waters. The CIA ensured Ben's name was absent from the plane's manifest as well as absent from any early media coverage after the jet's disappearance. His name was only flagged after an international passenger audit cross referenced travel manifest with known personnel in US defense databases. According to the ticket logs, Ben booked his seat less than twelve hours before takeoff using an internal travel portal typically reserved for military contractors on discretionary assignments, then boarded using a fake Ukrainian passport. But the flaw in the cabal's plan came from their assumption that the satellite connected technology Ben wielded would be impossible to intercept. Ben's communications would remain encrypted. But fortunately for all of us, Ben's communications from the jet had now been identified and decrypted. Even when MH370 had no active WiFi and no satellite uplink accessible to passengers and the jet was presumed well beyond communication range, Ben's communications had pinged a nearby satellite and been recorded. Those burst style data packets sent up flags during the post disappearance investigation with tech experts across the globe. At first disregarded as satellite noise until experts realized, under scrutiny of the signal, that they were actual burst transmissions from an individual on the flight. The data transmissions attributed to Benjamin R Waters were unlike anything expected from a commercial aircraft in a total blackout, not formatted like casual data logs or cached GPS information. Instead, Ben's transmissions were a multi art file split into six fragments with each fragment encrypted. Ben was sending out bursts via satellite that cyber security experts identified as nested SHA-three hashing, a level of encryption consistent with military grade systems and all of this was discovered just as Ben's background check came through as a known CIA subcontractor and operative. Ben, it turns out, was interlinked. Think of technology embedded in the brain and then you're getting the picture. Ben was controlled by handlers via satellite link all the way from Virginia. His movements and communication had been deciphered and corroborated precisely in time and burst location with his American accented voice as the only person transmitting from the cockpit of mh three seventy once the flight became airborne.

Video Saved From X

reSee.it Video Transcript AI Summary
Authentix, an Israeli verification company with ties to controversial Israeli cyber firms, has a history of military surveillance. Its parent company, ICTS International, has been linked to security lapses at airports, including 9/11. Authentix uses facial recognition technology developed by Unit 8200 for espionage. Concerns arise over data security and ethical practices of these companies.

Video Saved From X

reSee.it Video Transcript AI Summary
Mohammed Ada's passport miraculously survived the plane explosion and was found intact within 48 hours. The presence of passports on domestic flights raises questions, as they would not be needed after the suicide flights. Additionally, the hijackers were not under surveillance despite being easily identifiable. Suspicion grows with the discovery of planted evidence, including anthrax letters that falsely blamed Muslims. It was later revealed that the anthrax originated from a US army lab, not from Muslims. Furthermore, there are no airport security videos showing the accused Muslims boarding the hijacked planes.

Video Saved From X

reSee.it Video Transcript AI Summary
Welcome to the future at Detroit Airport, where you scan your boarding pass and see personalized flight information on a giant screen—only visible to you. This technology, developed by Albert Ng since 2014, uses motion sensors to identify travelers by their body shape, not facial recognition. This innovation aims to simplify navigation for all passengers, especially foreign travelers who may struggle with traditional flight boards. Ng envisions a future where, upon entering the airport, you are greeted by name and guided to your gate with illuminated arrows and reminders of your walking time. Eventually, this technology could expand to hotels, theme parks, and stadiums.

Video Saved From X

reSee.it Video Transcript AI Summary
DHS officials shared new details with Saturday in America about a large-scale flow of cash tied to Somali couriers, with the organization noting about $700 million in cash flown out of Minneapolis over the past two years. That amounts to roughly $350 million per year for 2024 and 2025. The figure is markedly higher—about 10 to 1—than cash movements reported at larger airports like JFK and DFW, which were about $3 to $4 million per year. The footprint isn’t limited to Minnesota. Columbus, Ohio, is also involved, where officials say that since 2023, about $136 million in bulk cash has been flown from Columbus to Somalia. The investigation into how this money travels from Columbus to Somalia outlines a path: bulk cash and luggage depart from John Glenn Columbus International Airport, then luggage lands in either Minneapolis or Atlanta before being sent overseas. Seattle is also seeing bulk cash transfers, though the volume is significantly smaller than in Minnesota and Ohio. Collectively, these locations align with the states that have the largest Somali populations in the United States—Minnesota, Ohio, and Washington. On Capitol Hill, the acting administrator of the Transportation Security Administration explained how these cash movements were uncovered. She noted that TSA officers can identify cash when it appears as a mass on X-ray images at checkpoints. When officers encounter items they cannot identify on the X-ray, they resolve the issue and report it to law enforcement partners in accordance with their standard operating procedures. She confirmed that there is an ongoing investigation with law enforcement partners. In summary, the investigation highlights substantial bulk-cash movements linked to Somali couriers centered in specific American hubs with large Somali populations, notably Minneapolis, Columbus, and to a lesser extent Seattle. The cash travels through a sequence of airports—Columbus to Minneapolis or Atlanta, then overseas—before reaching Somalia. TSA officers play a key role by flagging unidentified masses on X-ray and coordinating with law enforcement as part of the ongoing inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues against using TSA scanners when traveling. They state that epic.org reached out to TSA members and asked for studies on the scanners, but there are no safety studies. They claim TSA workers are contracting large illnesses, “the big C,” because they work next to the scanners and because those scanners are operating on five g and x-rays. They assert that passengers are x-rayed without a blanket every time, that millimeter waves cook people, and that the scanners allow viewing people nude. They advise travelers not to go through TSA scanners, and to opt for a pat-down instead. They claim that if enough people refuse to go through the scanners, the program would end. They recount the origin story: an alleged Al Qaeda individual who came from Amsterdam to Detroit, leading to the rollout of scanners across America, with the requirement to remove shoes, belts, waters, valuables, and anything else. They imply that this incident sparked the widespread adoption of scanners nationwide. The speaker emphasizes that anybody told they need to go through these scanners should refuse and request a pat-down, labeling the scanners as “goofy.” They reiterate the call to opt out and not participate in the scanner process, presenting the narrative as a justification for avoiding the scanners.

Video Saved From X

reSee.it Video Transcript AI Summary
There were multiple improbable factors that would have had to align for these bombs to be discovered at the same time on a sidewalk, prompting questions about a broader conspiracy and how such a scenario could unfold. The speakers emphasize that while they want to avoid a conspiracy path, there are many questions still open, including the handling of video footage. Regarding video records, one speaker notes that they want to review January 6 video to see if anyone returned to the locations, but that video apparently does not exist anymore. They do have January 5 video, but have been told that no one preserved January 6. This raises eyebrows as they consider whether the devices were placed by an inexperienced person who was trying to set them down quickly or whether the devices were left to be found. Mrs. Younger’s account is highlighted: she walked out her back door and did not see anything earlier in the morning, but saw the devices later, which would give a reason to believe she would have noticed them if they had been there in the morning. This observation is part of why they want to talk to her. One speaker is blown away by a point: according to the FBI, the FBI’s internal data indicate 39,000 videos showing the hoodie-clad pipe bomber—referred to as the C. Virkel bomber—movements that night, from various camera angles. Washington, DC, Capitol Hill is described as among the most surveilled areas in the world. Yet there is a claim that there is no footage from January 6 of the actual areas a person would have had to travel to place the pipe bombs. The other speaker confirms that there are cameras along some Capitol Police lines that show walking paths, including footage from Capitol Police cameras, but the angles that would show positions behind the RNC and behind the DNC do not exist today, at least not in a way that captures the relevant movements. This absence has limited the investigation into the theory that the devices could have been placed earlier and then moved or re-placed. They are now going back through Capitol Police footage, including from the Fairchild Building near the DNC, which has provided the most evidence so far. The team is reviewing hours from about 8 PM on May 5 to 1 PM on January 6 to determine whether anyone else passed by, whether there was any suspicious activity, and whether the devices were moved again. The investigators are evaluating step-by-step explanations for these anomalies, considering whether the Secret Service dog failed to detect one device or whether Mrs. Younger missed the other, whether the devices were not present at that time, or whether weather and other factors affected detections. They acknowledge that with so many circumstances, some “smoke” might indicate “fire.” They hope the FBI is reviewing cell phone data to determine if the suspected bomber returned or if a co-conspirator was involved in setting timers or re-placing devices. The transcript ends with an acknowledgment of ongoing investigation scope and questions.

Video Saved From X

reSee.it Video Transcript AI Summary
A structural engineer gave a tour of the World Trade Center after the 9/11 attacks. The building was still standing, but many columns were blown out. The building had steel on the outside, making it strong. It was hard to believe a plane could go through the steel. The speaker thinks there were bombs involved because of the extent of the destruction. The buildings were solid and the country has changed since then. The Central Intelligence Agency obtained valuable information from interrogations, including details about planned attacks on buildings in the US. Operatives were instructed to ensure explosives went off at a high point to trap people inside.

Video Saved From X

reSee.it Video Transcript AI Summary
The CBP One app, used by migrants claiming asylum, is now accepted at TSA checkpoints in the Miami airport's Delta terminal as valid ID for boarding planes. The CBP One app was intended to validate non-US citizen travel documentation when a traveler lacks acceptable ID. According to the speaker, migrants can enter any information into the app, even those wanted for crimes. Photos are optional, and biographical information is not stored. The speaker questions how people from terror watch list countries can use this process. The speaker contrasts this with the Real ID requirement for Americans by May 2025 to board flights. They question how illegal immigrants can board planes with unverifiable information while Americans face stricter ID requirements.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on the Afghanistan withdrawal and the vetting of evacuees who boarded planes. The opening exchange frames the withdrawal as a historic evacuation led by the Department of Defense and the Department of State. The senator asks specifically how many of the evacuees were vetted before they got on the plane. The official responds by stating it is the policy to vet and screen evacuees for the United States. When the senator presses for a numerical figure, the official first indicates uncertainty about Afghanistan-specific cases but reiterates the policy. The senator clarifies the question: for those who got on the C-17s and other planes, how many were vetted before they boarded, by American officials? The official replies that for those brought to the United States, it is their policy to vet and screen 100% of them. The senator pushes for a precise, testable number, asking if the answer is a sworn 100%. The official reiterates the policy and adds that all of the individuals who arrived in the United States have been screened. The senator presses further, asking for the exact percentage, and the official begins to provide a quantified estimate: well over 99% of them were fully screened and vetted before they boarded a flight. The senator seeks sources for that information, but the official continues, noting that if any were not screened before boarding, they would have been screened and vetted while in flight, and if any derogatory information was found, they would be placed in immigration enforcement proceedings and removal. The senator then asks directly, under oath, whether the 99% figure refers to all people who got on the planes in Afghanistan. The official clarifies that precision is important and notes that the question being asked concerns planes from transit countries, the third country scenario, rather than the specific Afghan departures being discussed at that moment. The senator emphasizes the focus on people who got on the planes and left the chaotic airport, asking again for the percentage vetted before they got on those planes. The official ultimately asserts that he cannot speak to those planes from transit countries, but reiterates that the discussion about those who arrived in the United States involves screening and vetting, and that those arrivals have been screened. The exchange ends with the senator acknowledging the limitation, and the official indicating that he cannot provide a detailed accounting for the transpiring circumstances of planes from transit countries, while maintaining that those who arrived in the United States were screened.

Video Saved From X

reSee.it Video Transcript AI Summary
Delta Airlines, United, and JetBlue Airways have implemented facial recognition boarding systems at various airports. This technology creates a face map with unique measurements and converts it into a biometric token or face print. Companies claim that this system offers speed, convenience, security, and contactless benefits for customers. However, lawmakers in some states are seeking stricter regulations due to privacy concerns and allegations of bias. Research suggests that facial recognition is less accurate for people of color and women. The decision to use this technology depends on knowing the company providing the service, the expected benefits, and local laws regarding data collection and facial recognition usage.

Video Saved From X

reSee.it Video Transcript AI Summary
Sandy Thorngrin, a flight attendant on flight 23 on 9/11/2001, noticed four people in first class, including someone she believed was a man disguised as a woman in a burqa. She was convinced it was a man due to the size and hair on the individual's hands. Another man in a yellow t-shirt was sweating profusely despite the cool morning. A man in a tan suit wanted his young son to see the cockpit, which was no longer permitted. The first-class passengers insisted they did not want to eat and wanted to take off immediately. The pilot learned about a fire in the World Trade Center from the tug driver. While taxiing, the pilot noticed an unusual number of planes, around 10 or 11, waiting for takeoff.

Video Saved From X

reSee.it Video Transcript AI Summary
Residents in an apartment complex did not recognize the picture of the suspect, Paul Ciancia, who opened fire at LAX. The shooting resulted in the first-ever death of a TSA officer on duty. The incident has raised questions about arming TSA agents, implementing metal detectors at terminal entrances, and police deployment in airport terminals. Witnesses described the chaos and fear they experienced during the shooting. Ciancia was shot multiple times and remains in critical condition. The FBI believes he was dropped off at LAX but has not identified the driver. Law enforcement sources indicate that Ciancia was wearing fatigues and was armed with at least five full 30-round magazines.

Video Saved From X

reSee.it Video Transcript AI Summary
The Biden administration is allowing migrants to bypass ID checks at airports, raising security concerns. A recent DHS report reveals that illegal migrants can use the CBP One app instead of traditional identification, even choosing whether to allow officers to take their photo. This practice may inadvertently increase national security risks, according to the inspector general. A DHS spokesperson disputed the report, claiming it lacks context. However, the national security director for air marshals emphasized that unvetted individuals on flights pose a threat, as they can repeatedly fly without proper identification, often on taxpayer-funded flights.

Video Saved From X

reSee.it Video Transcript AI Summary
"For the first time in thirty years, all the security systems in the building had become useless at the same time." "People could come and go as they pleased, even in protected areas, without being seen nor recorded by surveillance cameras." "The previous weekend, there had been a power down." "Scott Forbes was also present during the power down." "There was a power down in the South Tower on the weekend of the September." "They weren't working because they're all powered by electricity, there so was no power." "There was no backup system." "Therefore, they were all open." "The explanation was that there was a recabling exercise to increase the bandwidth of networks that were available in the towers."

Video Saved From X

reSee.it Video Transcript AI Summary
I'm at Reagan National Airport and just went through security. TSA has a new system where you insert your driver's license into a scanner, then they require you to use facial recognition. When I tried to opt out and use just my license, they said it's not possible once you start the process. The manager admitted it doesn't make sense but claimed it's a new policy. I argued that I shouldn't be forced into facial recognition after being told to use the scanner. This feels like an attempt to eliminate using just a driver's license. This is big government overreach, setting up a national surveillance system using our faces and airports. I will continue to fight against this.

Video Saved From X

reSee.it Video Transcript AI Summary
TSA is now using facial recognition software to take photos of travelers, which can be opted out of. However, agents often pressure individuals to comply. This morning in Newark, I clearly stated my desire to opt out, but an agent insisted I had to have my photo taken. I had to go to another agent to formally refuse. It's frustrating that this has become the norm. Additionally, there are concerns about the government's push for a nationwide real ID, which would create a federal database of personal information. The combination of mandatory facial recognition and the real ID initiative raises significant privacy issues for travelers.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 raises a concern about a security risk and asks what reassurances can be given about screening and efforts to prevent such individuals from entering. The speaker then asserts that no one is coming into the United States who has not been through a thorough screening and background check process. They note that there are many individuals who have not been through that process and have gone to lily pad countries as that process has been completed. The statement adds that this does not mean there is a flag attached to those cases; it means they have not completed their...

Video Saved From X

reSee.it Video Transcript AI Summary
Air marshals are currently not on most flights due to their focus on Quiet Skies missions, which involve monitoring individuals who flew into the National Capital Region in January 2021. These people are being followed by air marshals even though they have not committed any crimes. It is not necessary for individuals to have been at the Capitol on January 6th; simply being in the region is enough to be placed on the list. Some individuals are aware of being followed as they receive additional security measures at the airport and are accompanied by air marshals during their flights. However, these individuals have not been vetted and pose no threat to the country. The average passenger should be concerned about this situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Air marshals are currently not on most flights, as they are primarily focused on following individuals who flew into the National Capital Region in January 2021. These people are not necessarily connected to the Capitol incident but have been placed on a domestic terrorist list based on their geographic location. Although they have not committed any crimes, they are being monitored by air marshals during their travels. Passengers should be concerned and take precautions, such as identifying potential helpers and being aware of exit doors and flight attendants. It is suggested to look for individuals who can provide assistance if needed.

Video Saved From X

reSee.it Video Transcript AI Summary
There are no terrorist attacks in Switzerland or America, unlike other places. Air travel is strict, as even small items like Swiss knives or nail clippers are not allowed. The speaker believes that bombs are not brought on planes by passengers, but rather by those with diplomatic passports or airport staff. They mention an incident in Italy where 80 people died in a terrorist attack, which was allegedly orchestrated by the Italian secret services.

Video Saved From X

reSee.it Video Transcript AI Summary
Air marshals are currently not on regular missions due to the Quiet Skies program, which focuses on individuals who flew into the National Capital Region in January 2021. These people are being followed by air marshals despite not having committed any crimes. Even those who were not present at the Capitol on January 6th are being tracked if they flew into the area. Passengers should be concerned for their safety and consider identifying potential allies on the plane in case of an emergency. The Department of Justice's focus on monitoring these individuals instead of targeting terrorists or criminals is alarming. This information needs to be shared widely to address the issue.

The Peter Attia Drive Podcast

174-The 20th anniversary of the 9/11 attacks: reflections on how they happened & lessons learned
Guests: Lawrence Wright
reSee.it Podcast Summary
In this episode of The Drive Podcast, host Peter Attia interviews Lawrence Wright, author of "The Looming Tower," reflecting on the 20th anniversary of 9/11. Wright recounts his experiences on the morning of the attacks, emphasizing the shock and disbelief that followed. He shares his background in writing about terrorism, including his work on the film "The Siege," which explored the potential for terrorism in America prior to 9/11. Wright discusses the historical context of Al-Qaeda, detailing the influence of Sayyid Qutb, a key figure in Islamic radicalism, and the evolution of terrorist ideologies in the Middle East. He highlights the generational divide in perceptions of security and vulnerability in America before and after 9/11, noting how the attacks shattered the illusion of invulnerability many Americans held. The conversation shifts to the failures of intelligence leading up to 9/11, with Wright criticizing the lack of communication between the CIA and FBI. He recounts the missed opportunities to prevent the attacks, including the CIA's failure to share critical information about the hijackers with the FBI. The discussion also touches on the personal impact of 9/11 on individuals, including Attia's own experiences as a surgical resident during the attacks. Wright reflects on the cultural changes in America post-9/11, particularly the increased security measures and the normalization of a security state. He expresses concern about the long-term implications of these changes on American freedoms and the ongoing threat of terrorism, emphasizing that the fight against terrorism is far from over. The episode concludes with a somber acknowledgment of the lasting effects of 9/11 on American society and the importance of remembering the victims. Wright warns that terrorism will continue to be a significant issue, driven by various factors, including ideological extremism and geopolitical tensions. He urges listeners to reflect on the lessons learned from the past and to strive for a more secure and united future.
View Full Interactive Feed