TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers affiliated with China's People's Liberation Army have infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Chinese cyber army's objective is to compromise critical infrastructure, either to hinder US power projection in Asia or to cause societal chaos. The report highlights the alarming possibility of a comprehensive cyberattack that could bring essential services to a halt. This threat surpasses the impact of the COVID-19 crisis and poses a significant concern for transportation, hospitals, and society as a whole.

Video Saved From X

reSee.it Video Transcript AI Summary
Mister Miles Guo revealed that the Chinese Communist Party (CCP) has expanded its military presence in South America and small countries near Australia. The CCP used tactics like selling advanced and affordable drones to these countries, establishing drone bases, and using blackmail and bribery to gain influence. They also parked cargo ships near the Bahamas and Cuba, filled with military devices. The CCP built a massive underground embassy in the Bahamas and established military bases in these countries, including missile systems and satellite launch bases. Meanwhile, Speaker 1 expressed concerns about the Biden administration's China-focused policies, including the potential stacking of the Supreme Court, abandonment of energy independence, and China's influence on the White House.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: My first in person hint of something amiss came while I was flying for the US marines prior to Operation Desert Storm. In 1991, on my way to the Persian Gulf conflict, my squadron of 10 A-6E Intruder attack jets landed at Diego Garcia, a top secret US Navy base smack in the middle of the Indian Ocean. While The UK retained sovereignty of the tiny island, The United States controls the island's military base through a 1966 lease agreement and the majority of the personnel on the base are US Navy. I had already been briefed that no outside press was ever allowed at Diego. That immediately put my radar on high alert, wondering what I would find there. But after an uneventful landing, I was completely perplexed. There was nothing there, nothing I could see which of course only heightened my curiosity. Having read enough top secret intelligence briefs, I knew you didn't place a single runway airfield on a no press top secret status unless something at that location required a stringent security veil. The US naval support facility at Diego Garcia is a tiny airfield with a few hangars along the main runway, nothing more or at least that is the only visual I was presented with. While refueling my jet, was intrigued by a huge construction crane working nearby with its main cable going down deep into the ocean. I assumed it was being used to set concrete far down in the depths for future surface structures. I had no idea standing on a tarmac in 1991 only a few 100 feet below me was an active colossal spaceport for the German dark fleet and the American black navy. For those unfamiliar with military secret protocols, think deep black ops equals US black navy. The US black navy is an above top secret unit that supports ongoing space operations at the Diego deep underground military base, DUMB. The multi level deep underground military base was identified by whistleblower Tony Rodrigues as the same port his German space freighter, the Max von Low used as a hub for transporting materials to and from various planets in our solar system. The spaceport and Dummit Diego Garcia were also confirmed by a former black navy assassin during online interviews. The assassin's years working in the Dummit and spaceport at Diego corroborate in both time and description with Rodrigues' supply runs aboard the Max von Low at the Diego Complex. Tragically, Diego Garcia was also the final destination for Malaysian flight three seventy and its passengers and crew. This was confirmed not only by an SOS sent from the Diego Airfield by Philip Wood, a former IBM executive on the ill fated flight, but also verified by the navy assassin who witnessed the hasty disassembly of that jet on the tarmac at Diego Garcia. In addition, top secret National Reconnaissance Office NRO videos leaked online by a former navy lieutenant commander only days after the flight showed Malaysian three seven zero being tracked by two black ops US Reaper drones moments before its disappearance. To make this clear and simple for the non military reader, America's top intelligence services would not order the US air force to track a civilian Boeing seven seventy seven commercial jet with two ultra top secret surveillance platforms on its final flight unless they wanted someone or something on that jet. Period. On the flight were 20 American engineers of Chinese descent working for Freescale Corporation, a Texas based semiconductor firm. All had been coerced by the Chinese government to defect. Those employees carried American technology with them and were on their final leg to Beijing when the cabal struck. Assisted by America's top intelligence services, the cabal hijacked the flight ensuring that all the defectors, their American technology and the innocent passengers and crew were returned to the US Navy base at Diego Garcia in late two thousand fourteen when the MH three seventy cockpit voice transmissions had gone viral. I sat perplexed at home listening over and over. Being a former combat jet pilot, I was shocked that no investigators were calling out what was to me, a clear switch in the cockpit voice just after lift off. The deep Asian accent of copilot Hamid was suddenly no more, and the new voice that replaced it was undeniably American in accent and delivery and a man stuttered on the call sign of MH370 for the rest of the flight, yet nobody was noticing it. I knew then, without a doubt, the jet had been taken, that covert work had been completed and the post investigation was being controlled. To this day, you can listen to them online. Benjamin R Water's clearly American accented radio calls are first heard at 12:42 zero 5AM just after lift off and continue for the rest of the flight and those transmissions intrigued me for years until Ben was identified by tech experts investigating encrypted pings that somehow had never been decrypted. The hijacking and takeover of flight three seventy by a cabal hijacking crew began during initial taxi and culminated with both Asian pilots being executed only seconds after lift off by CIA operative and pilot Benjamin R Waters. The CIA ensured Ben's name was absent from the plane's manifest as well as absent from any early media coverage after the jet's disappearance. His name was only flagged after an international passenger audit cross referenced travel manifest with known personnel in US defense databases. According to the ticket logs, Ben booked his seat less than twelve hours before takeoff using an internal travel portal typically reserved for military contractors on discretionary assignments, then boarded using a fake Ukrainian passport. But the flaw in the cabal's plan came from their assumption that the satellite connected technology Ben wielded would be impossible to intercept. Ben's communications would remain encrypted. But fortunately for all of us, Ben's communications from the jet had now been identified and decrypted. Even when MH370 had no active WiFi and no satellite uplink accessible to passengers and the jet was presumed well beyond communication range, Ben's communications had pinged a nearby satellite and been recorded. Those burst style data packets sent up flags during the post disappearance investigation with tech experts across the globe. At first disregarded as satellite noise until experts realized, under scrutiny of the signal, that they were actual burst transmissions from an individual on the flight. The data transmissions attributed to Benjamin R Waters were unlike anything expected from a commercial aircraft in a total blackout, not formatted like casual data logs or cached GPS information. Instead, Ben's transmissions were a multi art file split into six fragments with each fragment encrypted. Ben was sending out bursts via satellite that cyber security experts identified as nested SHA-three hashing, a level of encryption consistent with military grade systems and all of this was discovered just as Ben's background check came through as a known CIA subcontractor and operative. Ben, it turns out, was interlinked. Think of technology embedded in the brain and then you're getting the picture. Ben was controlled by handlers via satellite link all the way from Virginia. His movements and communication had been deciphered and corroborated precisely in time and burst location with his American accented voice as the only person transmitting from the cockpit of mh three seventy once the flight became airborne.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Chinese military doctrine aims to induce societal panic in their adversary. The ransomware attack on Colonial Pipeline in May 2021 gave the Chinese government a taste of this. Now, imagine this on a larger scale: multiple disrupted pipelines, telecommunications failure, polluted water causing sickness, derailing trains, malfunctioning port control systems, and a disrupted air traffic control system. The Chinese government believes that this scenario would crush American will to defend Taiwan in a major conflict.

Video Saved From X

reSee.it Video Transcript AI Summary
In the Darien Gap in Panama, Chinese migrants are seen arriving by piragua boats and using Alipay to pay for supplies at a store with Chinese signs. Despite claims of poverty, migrants all have smartphones. The involvement of the CCP is suspected in aiding this invasion, with an increase in Chinese migrants entering the US. Starlink is used for Wi-Fi in the jungle. The presence of new Alipay posters suggests ongoing support. Elon Musk is called out for facilitating Chinese invaders' access to technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's military have breached critical US services, aiming to disrupt systems like the Texas power grid. Targets include a Hawaii water utility, a West Coast port, and an oil pipeline. The goal is to weaken US power projection in Asia or create chaos to influence decision-making during a crisis. The People's Liberation Army has infiltrated around 24 computer systems in the past year.

Video Saved From X

reSee.it Video Transcript AI Summary
A founder's group at Peking University developed source code for typing Chinese characters, which was seized by the Chinese intelligence bureau. They inserted a backdoor into apps that allow Chinese typing, potentially compromising them for surveillance by the Chinese Communist Party and military. WeChat is just one of many apps that could be used for this purpose. While not everyone will be targeted, the CCP has the resources to monitor US cell phones, especially if they believe someone can be of assistance to them.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
China's hacking program, deemed the world's largest by the FBI, has resulted in the theft of more personal and business data from Americans than any other country. However, the Chinese Communist Party (CCP) has gone further by targeting American critical infrastructure. Intelligence and cybersecurity agencies have uncovered CCP's hacking activities, which aim to disable and destroy vital infrastructure in the event of a conflict, such as one concerning Taiwan. This cyber warfare strategy can be likened to placing bombs on American bridges, water treatment facilities, and power plants.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially causing chaos and affecting decision-making. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
These covert weapons leave no physical evidence, making it easy for adversaries to deny their use. The attacks are happening in Washington DC, with reports of similar weapons being used by Americans on Russians. This could be related to the CIA's efforts to conceal this technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
New details have emerged about a major cyber hack attributed to Chinese government-affiliated hackers, who compromised multiple US communications companies. The FBI reports that these hackers accessed sensitive records, intercepted voice calls, and even infiltrated the Justice Department's wiretap system. Most intercepted communications involved government or political figures, raising concerns about the vulnerability of nearly all Americans' communications. Officials advise using encrypted messaging apps like Signal, WhatsApp, or iMessage for secure communication. The hacking group, known as Salt Typhoon, is linked to previous attacks on political campaigns. Understanding the risks of digital connectivity is crucial, as it can be exploited against us. China has denied these hacking claims and accused the US of spreading disinformation.

Video Saved From X

reSee.it Video Transcript AI Summary
In APAC, the speaker witnessed a horrifying incident involving Tibetan youths recording pro Beijing protesters. The protesters snatched their phones and threw them into the river, then proceeded to beat them up. This highlights the Chinese government's lack of fear in carrying out such actions on American soil, knowing that the perpetrators are unlikely to face consequences due to law enforcement's limitations.

Video Saved From X

reSee.it Video Transcript AI Summary
An Intel source mentioned that a Chinese satellite, visible to the naked eye, went down. Reports indicated it burned up, but this source claimed it was taken down by the US government. This satellite was reportedly a command and control unit for drones. The implication was that the Chinese government was signaling its intentions regarding Taiwan and possibly other actions, suggesting that the US could not intervene.

Video Saved From X

reSee.it Video Transcript AI Summary
The yacht Lady May lost control in 2017 due to remote towing technology used by the CCP. This technology can easily cut off power locally, causing loss of control. The MH 370 incident involved murder to silence witnesses using aircraft remote towing technology. If the CCP can remotely tow MH 370, it can do so with any aircraft. The United States now understands that the whistleblower movement holds crucial CCP secrets and intelligence. Translation (if needed): The yacht Lady May lost control in 2017 due to remote towing technology used by the CCP. This technology can easily cut off power locally, causing loss of control. The MH 370 incident involved murder to silence witnesses using aircraft remote towing technology. If the CCP can remotely tow MH 370, it can do so with any aircraft. The United States now understands that the whistleblower movement holds crucial CCP secrets and intelligence.

Video Saved From X

reSee.it Video Transcript AI Summary
The CCP launched a terrorist attack on Baltimore's bridge using remote towing technology, impacting US traffic. They can target any vehicle with a signal receiver. US officials may have known but didn't report it. No official confirmation yet.

Video Saved From X

reSee.it Video Transcript AI Summary
The yacht Lady May lost control in 2017 due to CCP's remote towing technology. This technology can easily make you lose control by cutting off power locally. The MH 370 incident involved murder to silence witnesses using aircraft remote towing technology. If CCP can control MH 370 remotely, they can control any aircraft. The United States now understands that the whistleblower movement holds crucial CCP secrets and intelligence. Translation: The yacht Lady May lost control in 2017 due to CCP's remote towing technology. This technology can easily make you lose control by cutting off power locally. The MH 370 incident involved murder to silence witnesses using aircraft remote towing technology. If CCP can control MH 370 remotely, they can control any aircraft. The United States now understands that the whistleblower movement holds crucial CCP secrets and intelligence.

Video Saved From X

reSee.it Video Transcript AI Summary
Amanda meets someone who warns her about the patterns governing the world and the impending danger. They discuss the infiltration of critical US services by hackers affiliated with China's People's Liberation Army. The goal seems to be to create chaos in logistical systems and collect information that could be weaponized in a conflict. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and oil and gas pipelines. The Chinese cyber army aims to disrupt or destroy critical infrastructure to prevent US power projection into Asia and cause societal chaos.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, either to prevent American power projection in Asia or to cause chaos within the US. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Off the coast of California, there are five gigantic shipping container ships with turbo fans aimed at the jet stream. By manipulating the jet stream, they can bring cold weather to the northeast and great lakes, or warm up California and Arizona. This manipulation can cause tornadoes in Texas, Oklahoma, and Tennessee, and eventually lead to hurricanes in the Gulf, Florida, and Haiti. However, sinking these ships is not an option due to their protected status as private corporations. Ultimately, it will be up to the people to take action and decide when enough is enough.
View Full Interactive Feed