TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Governments are increasingly drunk on power, as evidenced by the UK's order for Apple to backdoor encrypted iCloud data, affecting 2 billion users globally. This stems from the UK's Online Safety Act, which threatens imprisonment for dissenting tweets. Apple was secretly ordered to allow access to worldwide data and faced criminal charges for revealing the order. The UK's actions are part of a broader, globally orchestrated censorship agenda, with the Digital Services Act in the EU granting governments power over online content. Leaked documents show UK intelligence coordinating with the Biden administration to censor online speech. It's a war on encryption and control, mirroring the Rockefeller lockstep document's vision of authoritarian governance.

Video Saved From X

reSee.it Video Transcript AI Summary
The Rockefeller document outlines how governments will gain totalitarian control through a virus, continuing authoritarian control even after the pandemic fades. In the UK, the government is imprisoning people for critical tweets and secretly ordered Apple to create a backdoor for encrypted iCloud data, affecting 2,000,000,000 users worldwide. Apple had to weaken encryption or withdraw services from the UK. The UK's actions are part of a broader globally orchestrated censorship agenda, criminalizing dissent and censoring free speech. The UK's Online Safety Bill criminalizes encrypted messaging, while the EU's Digital Services Act allows governments to shut down online content. Leaked documents show coordination between UK intelligence and the US to censor online speech.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: In February and March 2026, I'll be back on the road in Hull, Gateshead, Derby, and Colchester. 2026 is when they want to cross the line as fast as they can into an AI controlled humanity. We stand up now or we regret it forever. That's four dates. Speaker 0: I recorded an edition of a show for iconic.com called Legacy, relating the content of my books to today. A central concept is what I labeled in the 1990s as problem reaction solution, also known as a false flag. The idea is to create a situation—war, terrorist attack, banking collapse, or something similar—then present the version of the problem you want the public to believe to provoke outrage and urgency. Then you covertly create the problem, evoke a public reaction, and openly offer the solutions you’ve already prepared. Speaker 0: Nine-Eleven is given as a classic example: attack on New York and Washington, blame Arab terrorists, claim Osama bin Laden and the Taliban orchestrated it. The reaction is “do something,” followed by the invasions of Afghanistan and other Middle Eastern countries. In response to Bondi Beach, the point is made that representatives may not truly represent the people, and a global network I call the global cult drives dystopia through digital AI means, operating through governments, intelligence agencies, and militaries worldwide. Even leaders such as presidents or prime ministers may not serve their nations’ people but the global cult’s interests. Speaker 0: One center of this global cult’s operations is Israel, established in 1948 for that purpose. The claim is that leadership claiming to represent Jewish people operates for the global cult rather than Jewish communities, and may even sacrifice Jewish lives to advance its aims through problem reaction solution. The Gaza crisis since October 7 is described as the world’s large-scale trauma, with statements about the Israeli government’s psychopathy and a super psychopathology characterized by a complete lack of empathy and deletion of compassion. The question is whether such leaders can truly have compassion for fellow Jews if they are driven by a broader agenda. Speaker 0: Regarding October 7, the Gaza border fence is described as the world’s most defended border, with sensors so sensitive that even a small animal would be detected. Yet Hamas breached the fence in multiple places, and there were reports of a stand-down by the Israeli defense forces, allowing the cross-border assault and hostage-taking. The outcome, it’s claimed, was used by Netanyahu to justify mass slaughter and destruction in Gaza, with talk of plans to take over land and expel Palestinians. The narrative then shifts to global perception, with some Christian Zionists wavering in support due to Gaza atrocities, and Israel allegedly funding influence campaigns to restore its global image, including money to American politicians and media interests. Speaker 0: When a new attack—Bondi Beach in Australia—occurs, Netanyahu publicly notes a Jewish man disarmed one of the attackers (though a Muslim did so), before retracting. This is presented as part of a pattern: calls to crack down on anti-Semitism, equating anti-Semitism with criticism of Israel and Zionism. The claim is that the only beneficiary is those who use such events to justify censorship and control of information, while the victims, including Jewish people who died or were injured, gain nothing. Speaker 0: The discussion reiterates that mind-control techniques exist and could drive individuals to commit mass violence without full awareness, referencing mind-control concepts like Manchurian candidates. The speaker urges asking “who benefits?” and considering elements of problem reaction solution and false flags in analyzing events, recognizing that appearances of representation do not guarantee genuine representation. For readers interested in more, the speaker directs to their books and content.

Video Saved From X

reSee.it Video Transcript AI Summary
Peter Thiel and Palantir CEO Alex Karp are both members of the Bilderberg Group and, more specifically, sit on the steering committee, the group that picks topics discussed at Bilderberg meetings. In the UK, there have been reports of people arrested for making social media posts, with police showing up at their doors. Palantir's software is used to find these people and monitor their social media platforms. This technology is referred to as targeting. Targeting can be used for various purposes, including enemy combatants on the battlefield. It is being used in Ukraine to target Russian installations, and it can also be used against individuals or small groups of people to target those who buck the narrative.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The World Economic Forum Partnership Against Cybercrime seeks a regulated internet and a digital ID tied to internet access. The goal is to eliminate online anonymity and privacy. The CTI League, a cybersecurity group, has access to critical US infrastructure, including hospitals, dams, and nuclear reactors. The group's main focus is protecting critical infrastructure, but its affiliation with foreign intelligence agencies raises concerns. The possibility of a false flag operation to blame Iran and justify military action is alarming. The CTI League's partnership with CISA, an agency under DHS, allows access to critical systems without proper vetting. The Israeli government's involvement in cybersecurity companies like Clear Sky and Cyber Reason further complicates the situation. The potential for a US cyber attack on Iran is a long-standing goal for Israeli intelligence.

Video Saved From X

reSee.it Video Transcript AI Summary
Every government in the world is controlled by a secret government that manipulates everything. The president, prime minister, and other leaders are just puppets. They control armies, nations, and all the money in the world. The Rothschilds and Rockefellers are part of this secret government, and anyone who made money quickly must be involved too. Even Facebook, YouTube, WhatsApp, Instagram, and Netflix were created for their manipulation. They designed World War I and II, control the Reserve, NASA, and the CIA. The Twin Towers attack was part of their agenda to go to Afghanistan. Israel was built by the Freemasons and Zionists, with the approval of the United Nations, which is actually a terror organization created by the new world order.

Video Saved From X

reSee.it Video Transcript AI Summary
Every government in the world is controlled by a secret government that runs everything. The president, prime minister, and other leaders are just puppets. They control armies, nations, and all the money in the world. The Rothschilds and the Rockefellers are the richest families and anyone who made money quickly must be part of this secret group. Facebook, YouTube, WhatsApp, Instagram, Netflix, and other big companies were created for their manipulation. They designed World War I and II, control the missile reserve, NASA, CIA, and were behind the assassination of JFK. The Twin Towers attack was part of their agenda to go to Afghanistan. Israel was built by Freemasons and Zionists, and the United Nations approved its declaration. All the founders of Israel are Freemasons.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US Federal agencies, and major banks. The forum's Partnership Against Cybercrime seeks a regulated internet and a digital ID tied to internet access. The goal is to eliminate online anonymity and privacy. The CTI League, a cybersecurity group, has access to critical US infrastructure, including hospitals, dams, and nuclear reactors. The group's main founder is an Israeli intelligence operative. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League is also involved in censorship efforts.

Video Saved From X

reSee.it Video Transcript AI Summary
Before the 2020 election, a group involving DHS, NATO, and the DNC planned a mass censorship campaign on social media to prevent disputing mail-in ballot legitimacy. They partnered with Stanford, University of Washington, Graphika, and the Atlantic Council, all linked to the Pentagon. Using threats and pressure, they forced tech companies to ban content questioning mail-in ballots. This was done to ensure public acceptance of a potential Biden victory due to mail-in ballots. The group aimed to control the narrative and prevent election crisis.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The forum seeks a regulated internet tied to a digital ID, allowing intelligence agencies to monitor online activity. The CTI League, a cybersecurity group, has access to critical US infrastructure and is affiliated with Israeli intelligence. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League's role in protecting critical infrastructure raises questions about foreign access to US systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum's biggest fear is people who refuse to comply and make their own decisions. They want to control your life and restrict your movement, behavior, and decisions through a digital process. They can easily do this with a click of a button.

Video Saved From X

reSee.it Video Transcript AI Summary
Investigative journalist Whitney Webb discusses the recent cyberattack and its potential implications. She highlights the tabletop exercises conducted by US intelligence agencies and the focus on "killware" as the greatest cyber threat. Webb questions the attribution of cyberattacks and the lack of evidence provided by companies and agencies. She emphasizes the need for better evidence and warns of the potential for a false flag operation that could lead to martial law and a controlled election. Webb also mentions the involvement of Israeli intelligence and the push for a regulated internet and digital currency. She urges people to pay attention to these developments and be aware of the Orwellian solutions being proposed.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum plans a catastrophic grid outage to reset the US before the election, aiming to disconnect the public from the Internet and create chaos. The elite, including CrowdStrike and Microsoft, are behind this cyberattack. The elites are also targeting food and water supplies, pushing for a cashless society and control over what people can buy. The globalist agenda includes a digital prison, mandatory digital IDs, and CBDCs. The elites are experimenting with controlling humanity through crises like COVID and a water crisis. It's crucial to spread awareness and resist their totalitarian plans.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum fears people not complying with their orders. They see digital control as crucial to enforce mandates and control lives. It's not about specific issues like carbon emissions or vaccines, but about external control. A digital system could restrict movement, behavior, and decisions instantly. If they have that power, individuals are at their mercy.

Video Saved From X

reSee.it Video Transcript AI Summary
Governments worldwide are following a totalitarian control agenda outlined in the Rockefeller Foundation's "Lockstep" document. The UK government, in particular, is leading the charge, secretly ordering Apple to create a backdoor for encrypted iCloud data, affecting 2 billion users worldwide. This order, issued under the Investigatory Powers Act, is a global privacy nightmare. Apple faces a difficult choice: comply and weaken encryption globally, or withdraw services from the UK. This move ties into a broader censorship agenda, including the UK's Online Safety Bill and the EU's Digital Services Act, which criminalize dissent and censor free speech. Governments are using tech companies as enforcement arms, threatening citizens for online criticism, highlighting a war on encryption and control.

Video Saved From X

reSee.it Video Transcript AI Summary
The US financial and banking system is in a bad state, and there is a concern about a future cyber attack. The big banks and intelligence agencies want to avoid blame for any collapse. WikiLeaks revealed that intelligence agencies can place the fingerprints of any nation or group in a cyber attack, allowing them to conduct false flag operations. The WEF Partnership Against Cybercrime wants a regulated internet tied to a digital ID, giving intelligence agencies access to people's online activities. They aim to manufacture consent through fear and panic by creating a major disruption caused by anonymous hackers. Israeli, British, and US intelligence agencies, along with major banks and tech companies, are involved in this agenda. The group also seeks to fuse banking, regulatory, and intelligence operations under the pretext of cybersecurity.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Wikipedia is a propaganda operation, and one of its founders told me that the CIA or the American intel community is heavily involved in shaping the message, on Wikipedia. Did you come across evidence of that? Speaker 1: On the weaponization working group, as it's described by attorney general Bondi and the president's direction, intelligence community is one of the groups who was weaponized against the people, obviously. It's obvious. The question is, how are we gonna get to the bottom of it? Right? How are gonna get to the bottom of some of the weaponization of the government intelligence community against the citizens? And that's what I that's where I'm going now.

Video Saved From X

reSee.it Video Transcript AI Summary
We've found that the World Economic Forum is pushing a super globalist agenda, attempting to create a new world order that undermines the sovereignty of countries and our democracy. This organization, along with the UN, is controlled by the same ideas and oligarchs. They're creating leaders who will be elected by us, but these individuals are not employees of their people. They try to control people by salary and offers, ensuring they are politically correct. They aim to maintain a global rules-based order and compact dangerous extremist views on the internet to minimize the spread of misinformation and shape a great reset, believing nobody will be safe if not everybody is vaccinated. This involves a deep, systemic, and structural restructuring of our world.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker ties a series of events to a ritual pattern, referencing theProject for the New American Century and arguing that support for its plans overseas would require a new Pearl Harbor, a claim linked to warnings a year before 9/11. They cite the World Economic Forum and Bill Gates’ Event 2010 simulating a pandemic out of China “just six weeks before the footage started appearing of bodies dropping in Wuhan.” They assert that such patterns are intentional signals, and that massive cyber attack drills and Klaus Schwab’s expressed fears of a coming cyber pandemic were steps toward that direction. They note that in December Israel hosted a cyber pandemic drill, and “on Monday just twelve weeks later their government was attacked in what they say was the largest ever cyber attack on the country.” Given Israel’s “infamous hacking capabilities,” the speaker suggests it feels like a controlled vulnerability, a way to create a plausible escape while the detective won’t suspect involvement in the metaphorical murder. The speaker argues that chess pieces are being moved in both Russia and Ukraine to bring about a scenario where “the world we once knew is gone,” destroyed, and a “new world, a world of their design, will emerge.” They claim a future in which “you’ll own nothing, and you’ll be happy, happy in your complete submission.” They invoke a historical allegory, “Like Xerxes to Leonidas,” to describe the perceived power struggle behind these actions.

Video Saved From X

reSee.it Video Transcript AI Summary
The British security agencies use phone and cloud hacking services provided by the Israeli tech company, Celebreit. The company is led by Dana Goethe, an alumni of Unit 8200 in the Israeli military, known for surveillance and blackmailing Palestinians. Celebreit is staffed with former Israeli military and intelligence personnel. The concerning part is that Celebreit claims to remotely control all its devices, suggesting they have access to information obtained by the British security services.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum's history is not as it seems. Klaus Schwab, the founder, had a team of influential Americans, including Henry Kissinger, working behind the scenes. These individuals were part of the Council on Foreign Relations and had ties to the CIA. They played a significant role in shaping the organization and its goals. Schwab's connections with these powerful figures helped him establish the World Economic Forum and push for global domination. The forum aimed to unite Europe and America and eventually create a new world order. Schwab's vision aligns with the predictions made by Herman Kahn in the 1960s. However, this technocratic movement faces opposition from those who value national identity and freedom.

Unlimited Hangout

The Pre-Planned Chaos of the 2020 Election with Charlie Robinson
Guests: Charlie Robinson
reSee.it Podcast Summary
Whitney Webb and Charlie Robinson discuss predictions of chaos around the 2020 U.S. presidential election and how intelligence-linked simulations anticipated turmoil long before the coronavirus crisis, with outcomes ranging from a constitutional crisis to martial law. They point to simulations produced by networks tied to former Bush or Obama officials, neocon think tanks like PNAC, and allied groups. They argue these drills are not mere “war games” but part of a toolkit that maps possible futures, and note a pattern of simulations preceding major events such as 9/11, the anthrax attacks, London’s bombings, and the coronavirus crisis. Two organizations created around March are highlighted: the Transition Integrity Project and the National Task Force on Election Crises. The Transition Integrity Project’s cofounder Rosa Brooks is described as an Obama-era DOD and Hillary Clinton State Department adviser, previously special counsel to the president of George Soros’ Open Society Foundations, and affiliated with the New America Think Tank, funded by Eric Schmidt, the Gates Foundation, Pierre Omidyar, Jeff Skoll, Reid Hoffman, and Craig Newmark. The other cofounder, Nils Gilman, is vice president of programs for the Berggruen Institute, which envisions a transnational network addressing AI and gene editing. Membership overlaps exist across both groups, including Michael Chertoff, Max Boot, David Fromm, Bill Crystal, John Podesta, Robert Gates, and Larry Wilkerson, with Wilkerson being a prominent public figure in both efforts. The groups’ membership is not fully public, but various reports note their overlap and the presence of PNAC-linked figures. The groups reportedly gamed four election scenarios: ambiguous results, a Biden victory, a Trump victory, and a narrow Biden win. A particularly striking hypothetical under a clear Trump win describes the Biden campaign encouraging Cascadia—California, Oregon, and Washington—to secede unless Republicans agreed to reforms such as granting statehood to Washington, D.C., and Puerto Rico; dividing California into five states; mandating Supreme Court retirements at 70; and eliminating the Electoral College. The scenario then envisions Congress awarding the presidency to Biden, with Pence and Republicans resisting, leading to a constitutional crisis in which the military’s role remains unclear. The discussion emphasizes that the people behind these simulations—like PNAC alumni—“are not Nostradamus” but seek to shape outcomes by prefiguring them. The conversation also covers how some involved openly support Biden, and how the campaigns leverage narratives of democracy threats. Hillary Clinton’s recent remarks about not conceding are juxtaposed with the TIP projections. They discuss campaign energy differentials, the debate dynamics, and the perception that Biden’s team seeks stability and predictability, while Trump’s unpredictability complicates control. They examine cyber and foreign interference narratives. Cybereason, an Israeli-founded cybersecurity firm with Unit 8200 ties, has major investors such as Lockheed Martin and Microsoft-linked entities; its founder served in Israeli intelligence. Cybereason’s work, and broader CTI League efforts, are cited as manifesting the external dimension of election security narratives. The discussion critiques media and political elites who promote foreign-interference threats while overlapping with pro-Israel intelligence circles. They argue these dynamics intersect with broader agendas, including AI governance and the World Economic Forum’s Great Reset, suggesting a convergence of technocratic power, media narratives, and political operatives aimed at managing or engineering political outcomes. They close by signaling ongoing reporting on these themes, highlighting the need to recognize the pattern of simulations, prepositioning, and narratives intended to normalize drastic interventions around elections, including potential continuity-of-government scenarios.
View Full Interactive Feed