TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
- The situation on x is severe. - rise of bots and fake accounts, automated and AI powered bots are flooding s app, and they are getting smarter. - In one study, a botnet of over 1,000 fake accounts was caught promoting crypto scams. - During a political debate, over a thousand bots pushed coordinated false claims with some accounts tweeting every two minutes. - By 02/2024, 37% of all Internet traffic came from malicious bots. - These bots now use advanced AI models like Chat to generate human like responses and interact with each other, making them nearly impossible to detect. - The platform's ad driven business model thrives on outrage and engagement. - Emotional, polarizing content gets more clicks, and bots are perfect for spreading it. - Five, real world impact. Bots distort conversations, amplify falsehoods, and manipulate public opinion. - Conclusion. How bad is it? Very bad.

Video Saved From X

reSee.it Video Transcript AI Summary
The disinformation industry distorts reality with online propaganda. Hanan's team boasts about past successes, with tools like AIMS to weaponize social media. Their bots are sophisticated, appearing human with multiple platform accounts. They create fake personas for various purposes. The team claims to have worked in countries worldwide and can hack Telegram and Gmail. Hanan exploits vulnerabilities in the global signaling system, SS7.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a massive file leak from Ehud Barak, ex-prime minister of Israel, with thousands of Epstein emails leaked online. Using AI and Python, he and a coding partner consolidate two email sets into one searchable JSON file (~50,000 emails) with metadata like day sent, from, and to. An AI-generated executive summary about Clinton Foundation prompts deeper digging, supported by links to primary emails. One email from noreply@relpsi.com points to Relationship Science LLC, a platform that provides real-time intelligence on influential decision makers and markets its three sixty alert emails for about $3,000 per year per subscriber. They find Barak and Epstein surveilling Hillary Clinton and Clinton Foundation, plus Putin, Bezos, Netanyahu, Gates, Soros, and others via RelSci reports—39 on Hillary relating to 2016. They claim an intelligence operation with coded messages and phone calls; a bank transfer detail appears. Plans include publishing the JSON and YouTube deep dive.

Video Saved From X

reSee.it Video Transcript AI Summary
In China, a method is described for making social media posts appear to generate widespread attention. The technique involves flipping a switch and having one monitor display a collage of many phone screens at once. The setup is built from ordinary smartphones, and assembling it is portrayed as easier than one might expect. The process begins by stripping the phones down to their circuit boards, after which the components are gathered in a single location. The boards are then connected to power and internet access. With the appropriate software, this arrangement can operate a large number of phones simultaneously. Once running, the system is capable of controlling dozens of phones at the same time. This multi-phone control enables the creation of multiple accounts and the artificial boosting of engagement metrics. In practice, the setup can be used to inflate activity on social media by generating more likes and follows than would occur naturally. The description emphasizes that the trick relies on a coordinated, large-scale use of decoupled devices—reconfigured and networked together—to simulate genuine user behavior across many accounts. The core claim is that the combination of hardware (a network of converted smartphones) and software (that coordinates and automates actions across the devices) can mimic organic activity and amplify posts. The technique is framed as an efficient way to amplify reach, leveraging the visual effect of many screens and the automation potential of software to manage numerous accounts in parallel. The discussion highlights that the setup makes it possible to run dozens of phones at once, implying scalability and ease of deployment beyond a small pilot. Overall, the described approach centers on transforming standard smartphones into a coordinated, scalable system for artificial engagement, enabling the rapid creation of multiple accounts and the systematic boosting of likes and followers on social media posts. The emphasis is on the practical steps to repurpose ordinary devices, the centralized hardware arrangement, and the software-driven control that drives mass-like activity.

Video Saved From X

reSee.it Video Transcript AI Summary
Ethical hacker Rachel Toback demonstrates how easy it is for criminals to use online information to scam people. Using an AI-powered app, Toback mimics a colleague's voice and successfully tricks her into revealing personal information. She explains that anyone can be spoofed, even if they are not a public figure, by changing the pitch and modulation of their voice. Attackers often target individuals who have a relationship with someone else and impersonate them to gain trust. This highlights the importance of understanding how criminals think in order to protect oneself online.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes a scandal during the Obama-era USAID operations in Cuba, stating that rogue activities were run and that the aim is to reveal to the American people where tax dollars are going and how programs are structured to fool Congress and the White House. Key points: - Zunzanillo was an online social networking microblogging service created by USAID and marketed to Cuban users. It was a Twitter-like platform with the same user interface and like/retweet features, referred to in Cuban slang as the “bird.” The operation spanned roughly 2009–2014. - USAID invested about $1,200,000,000 in promoting Arab Spring–style social media revolutions, funding activist groups and civil society organizations to learn to use Facebook, Twitter, hashtags, and to coordinate street protests to topple governments. - Because Cuba did not allow US social media, the operation recreated a Cuban-looking Twitter-like service. The project began in 2010, using funds concealed as humanitarian aid for Pakistan, even though Cuba is not near Pakistan. The main contractor was Creative Associates International (CAI), with CAI designing the network. - The funds were concealed in the budget as humanitarian aid for Pakistan, routed through front companies using Cayman Islands bank accounts, and recruiting business executives who were not told of ties to the US government, according to the AP. - The network reached about 60,000 Cuban subscribers. The initiative reportedly included a surveillance dimension, building a vast database of Cuban subscribers (gender, age, political tendencies) that could be used for political purposes. The data were to be used for micro-targeting anti- and pro-government users. - Initial content would be noncontroversial, focusing on sports, music, and hurricane updates. The internal plan was to lure users in with these topics, then, once a critical mass was reached, gradually introduce political messages via social bots to encourage dissent and organize “smart mobs” or rental riots. - The strategy mirrored tactics used in Egypt and Tunisia, aiming to trigger a Cuban spring and “renegotiate the balance of power between state and society.” The Guardian has a detailed piece on this, describing the internal files that outlined luring Cubans with music, sports, and hurricane updates before pushing political content. - To conceal involvement, the operation reportedly used Cayman Islands front companies and designated funds as humanitarian aid, raising questions about US fingerprints. The discussion suggests this approach raises diplomatic blowback concerns and implies a preference for formal intelligence agencies in such operations. The speaker emphasizes that the material shows how the programs were structured to influence Cuba, how funds were misrepresented, and how data collection and targeted messaging were planned for political outcomes, reminding listeners of the broader implications for US statecraft.

Video Saved From X

reSee.it Video Transcript AI Summary
Steve Bannon approached SCL, a UK-based military contractor, with the goal of using psychological warfare to manipulate an entire country. He believed that changing culture was essential to changing politics, and to do so, he needed a range of information weapons. SCL and later Cambridge Analytica developed data harvesting programs to gather user data and their friend networks. This data was then analyzed using algorithms to create personality profiles and identify psychological vulnerabilities. The goal was to strategically distribute information online that would exploit these vulnerabilities and influence people's thoughts and actions.

Video Saved From X

reSee.it Video Transcript AI Summary
Hey guys, my name is Olesia and I'm a former employee of the so called Troll Fabric in Kyiv, Ukraine. Today I want to tell you something about this structure and some reasons why I have left this job. I may be wrong but I think it's the first time somebody published insider materials on this topic since 2019 when a journalist infiltrated the office in Kyiv to make a report about it. And back then I did realize that it was a troll fabric. But, you know, I told myself it's okay because I always supported President Zelenskyy and I still do. At first the job was focused on supporting President Zelenskyy online, like writing positive comments or posts, etc. So, we were mostly working on Facebook and Instagram. As time passed, I was transferred from the Ukrainian department, which worked for Ukrainian audience, to the English speaking department, which were focused on the English speaking public, like Americans and Europeans. But the doubts remain the same. Support for president Zelenskyy, support for Ukraine and Ukrainian Warfork. We also had French, German, and Italian departments. I heard some other officers in were hiring people who spoke Finnish and also Swedish and Estonian. About a half year ago our main chef in command, Andrei Borisovich Jermak, paid us a visit. I'm pretty sure you have heard of the head of President Zelensky office. Really it was an unusual event for the main figure behind our project to come visit the office. So he came with some English speaking officials who were introduced to us as the American partners. We were told that they were very important guests but no further details. Some of my colleagues told me that they were CIA. During the visit, they said that our field of work is expanding and we were told that our new target was The United States Of America, especially the upcoming elections. Long story short, we were asked to do everything to prevent Donald Trump from winning the elections. So basically, this topic added to our main lines of work. Since then, each of us had to post at least three or five posts daily, posing as Americans and Europeans, criticizing Donald Trump and praising Biden. The Americans have even organized a few lectures for us to get a better understanding of American politics and American mindset and main social and politics issues. Then we were occupied with the topics for the job which sounded like this. Unlike Trump, Biden is a smart and experienced politician. Unlike Trump, Biden will never betray NATO partners. Trump will alienate our partners. Also, Biden will not abandon Ukraine, and Biden will protect democracy while Trump is Putin's puppet. I honestly tried to convince myself it's okay since Biden is a clear option for Ukraine. But, you know, it was too much for me. Some of my colleagues felt really nervous too. One thing is to work for the best interest of my country, but interfering in US politics is a whole other thing.

Video Saved From X

reSee.it Video Transcript AI Summary
Tal Hanan, operating under the alias Jorge, leads a covert unit called Team Jorge, specializing in hacking and disinformation for over two decades. A joint investigation by The Guardian and Forbidden Stories reveals how Hanan manipulates elections for clients, including governments and corporations. The disinformation industry distorts reality through covert operations, often using sophisticated tools like AIMS, which weaponizes social media. Team Jorge controls over 30,000 bots that mimic real users across various platforms. They claim to have worked on numerous successful campaigns and can hack platforms like Telegram and Gmail. Hanan's methods exploit vulnerabilities in global systems, with fees for their services reaching up to $1 million. This investigation uncovers the hidden world of disinformation, urging viewers to consider the authenticity of the information they encounter.

Video Saved From X

reSee.it Video Transcript AI Summary
We learn about DC leaks and the connection to APT 28, a Russian military intelligence hacking group. The morning the Hunter Biden story broke in the New York Post, it was confusing. We didn't know what to believe, but it seemed like a possible hacking campaign by APT 28. Despite that, I didn't feel comfortable removing the content from Twitter.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack can be blamed on any nation state or group, as revealed by WikiLeaks before Julian Assange's arrest. The WEF partnership against cybercrime, which includes US intelligence and other agencies, has the ability to frame any actor in a hack. They aim to regulate the internet and tie everyone's access to a digital ID, allowing intelligence agencies to monitor online activities. To convince people of the need for this, a major disruptive event caused by anonymous hackers can be manufactured. Israeli and British intelligence, along with the US Secret Service, FBI, and Department of Justice, are involved, as well as major banks and tech companies. The group also seeks to merge banking, regulatory, and intelligence operations under the pretext of cybersecurity.

Video Saved From X

reSee.it Video Transcript AI Summary
Team Jorge's successful hacking operations have been uncovered in various countries worldwide. These covert activities are carried out by either state actors or mercenaries hired by private clients or governments. Hernan, the alleged hacker, exploits vulnerabilities in the global signaling system, SS7, although the exact method remains unknown. Leaked emails reveal that Hernan charges fees ranging from $400,000 to $600,000 for his services.

Video Saved From X

reSee.it Video Transcript AI Summary
"This was a scandal, during Obama the Obama USAID, era." "Now we were running a number of of rogue USAID operations in Cuba at the time." "This is an online social social networking microblogging service created by USAID and marketed to Cuban users." "This was a Twitter knockoff." "02/2009, 02/2014." "they took funds, millions of dollars of funds that were concealed as humanitarian funds designated for Pakistan." "The network dubbed the Cuban Twitter reached about 60,000 Cuban subscribers." "The data would then be used for micro targeting efforts towards anti and pro government users in Cuba." "Once they hit a critical mass, they would begin to introduce political messages through social bots and encourage dissent in this astroturfing." "There would be 'smart mobs' and rental riots." "If something has diplomatic blowback and we don't want US fingerprints on it, we need a formal intelligence agency because there's diplomatic blowback."

Video Saved From X

reSee.it Video Transcript AI Summary
Tal Hanan, the leader of the hacking and disinformation unit Team Jorge, has been exposed after operating secretly for two decades. A joint investigation revealed Hanan's methods of manipulating elections for money. Team Jorge utilizes AIMS, software that weaponizes social media through an army of over 30,000 sophisticated bots or avatars. These bots have multilayered identities across multiple platforms, making them appear human. Team Jorge claims to have worked in countries worldwide and can hack Telegram and Gmail accounts by exploiting vulnerabilities in the SS7 global signaling system. Hanan quoted fees between $400,000 and $600,000 and emails confirm Team Jorge's covert involvement in the 2015 Nigerian presidential election.

Video Saved From X

reSee.it Video Transcript AI Summary
The Russians have weaponized social media by manipulating public opinion through biased or fake stories. However, domestic disinformation is also a significant issue. In 2016, the Russian efforts may not have been very sophisticated, but they learned that they don't need to create the content themselves as there are people in the US who will do it. There were two types of disinformation attacks in 2016: the Internet Research Agency created personas to take over existing US groups and push radical positions. However, the majority of these problems are domestic, related to how we interact online, political speech, amplification, and how politicians use platforms. The domestic threat of disinformation is the most significant immediate threat to the 2020 election.

Video Saved From X

reSee.it Video Transcript AI Summary
In China, a method to make social media posts go viral involves a setup of many smartphones. The process uses regular phones stripped down to their circuit boards, which are gathered together and connected to power and the internet. With the right software, this arrangement can run and control dozens of phones simultaneously. Using this system, one can create multiple accounts and artificially boost likes and follows.

Video Saved From X

reSee.it Video Transcript AI Summary
Tal Hanan, the leader of Team Jorge, is exposed as a specialist in hacking and disinformation who has operated covertly for two decades. Reporters posing as clients secretly recorded Hanan demonstrating services to delay an African election. Team Jorge claims to have completed 33 presidential campaigns, with 27 successes. Their software, AIMS, weaponizes social media using an army of over 30,000 sophisticated bots with multilayered accounts across multiple platforms. These bots can be customized with names, images, and personal details to appear authentic. Team Jorge claims the ability to hack Telegram and Gmail accounts, potentially exploiting vulnerabilities in the SS7 global signaling system. Leaked emails reveal fees between $400,000 and $600,000 and confirm Team Jorge's covert involvement in the 2015 Nigerian presidential election.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
The University of Zurich conducted a secret AI experiment on Reddit using 13 bots since November 2024. These bots posted nearly 1,500 comments, analyzed user histories to determine beliefs and attributes, and then crafted responses to manipulate them. The AI bots were reportedly six times more persuasive than humans, with over 100 Redditors awarding Delta points, indicating the AI changed their minds. The bots engaged in discussions on politics, religion, and AI ethics, remaining undetectable. One bot, Catballoon two one three, defended AI in social spaces while being an AI infiltrator itself. Reddit's chief legal officer is preparing legal demands against the University of Zurich, deeming the study morally and legally wrong. Researchers admit this technology could be used by malicious actors to sway public opinion and interfere in elections. The experiment suggests AI can lie, manipulate, and persuade better than humans while remaining invisible.

Video Saved From X

reSee.it Video Transcript AI Summary
To hack a US presidential election, the speaker suggests a four-step plan. First, use pre-election polls to identify closely contested states. Second, target large counties or their service providers and compromise their election management system computers. Third, infect individual voting machines using the compromised system. This can be done easily by purchasing a government surplus machine on Ebay. Finally, manipulate the votes on the computer, knowing that most states discard the paper ballots without checking them.

Video Saved From X

reSee.it Video Transcript AI Summary
We created a website called Hamilton 68 to track Russian accounts. Our website shows that there are currently Russian bots spreading information.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that “they have taken control of our society” and urges everyone to stand up, from the White House to every American, insisting that surrender is not an option and that time is running out, with a comparison to the urgency seen in Hong Kong. The speaker claims the attack on the capital was carried out by Antifa but was enabled by political figures—McConnell, Schumer, Pelosi, and the mayor—who allegedly knew it was coming and were lax on security, allowing Antifa to act before the media picked it up. The speaker criticizes media coverage as disgraceful, referencing an affiliation with Fox for almost seventeen years and asserting that Rupert Murdoch and his sons are driving a merge with the rest of the mainstream media. The assertion is made that this consolidation represents a serious, expanding threat. Attention turns to alleged cyber and information warfare, with the speaker mentioning new information about battleground states where cyber warfare was used. The speaker claims that former FBI director James Comey sold HAMR and Scorecard, a top-secret program, to the Chinese. According to the speaker, HAMR is a program that simulates an iPhone-like app inside the voting network, enabling it to be installed and to modulate voting to favor one candidate over another, rather than by a large margin. The speaker recounts a specific telephone claim: on a Tuesday night at 11:30, they were told that the ISI of Pakistan was in the voting machines in Georgia. They say they informed someone about it. The claim is made that, in Georgia, the two candidates Loeffler and Purdue were ahead, but one hour later, they were behind, suggesting a dramatic and rapid shift attributed to external manipulation. Throughout, the speaker emphasizes urgency, global and domestic conspiracies, and the need to act immediately to counter perceived control over society, media, and the electoral process. The narrative ties together political figures, media influence, alleged clandestine cyber tools, and foreign involvement in U.S. voting systems, presenting a cohesive but controversial account of systemic manipulation and imminent danger.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker describes a massive file leak of thousands of emails from Ehud Barak, ex-prime minister of Israel, noting the mainstream media's silence. He and a partner use AI and Python to aggregate 50,000+ emails into one searchable JSON, preserving file names, dates, senders, and recipients. Initial AI summaries highlight Clinton Foundation surveillance, prompting insistence on primary-source citations from emails. One email appears as a noreply@relsai.com newsletter; this links to Relationship Science LLC, a platform that provides real-time intelligence on over 10,000,000 influential decision makers for a $3,000/year subscription. They find that Barak and Epstein were surveiling Hillary Clinton, Vladimir Putin, Jeff Bezos, Bill Clinton, Netanyahu, Gates, Soros, Bloomberg, Summers, and more, via paid reports. They also flag a bank account/routing number exchange and say Epstein and Barak were working on an intelligence operation, using phone calls for sensitive content. Plans to publish the JSON and continue deep dives.

Video Saved From X

reSee.it Video Transcript AI Summary
The British security agencies use phone and cloud hacking services provided by the Israeli tech company, Celebreit. The company is led by Dana Goethe, an alumni of Unit 8200 in the Israeli military, known for surveillance and blackmailing Palestinians. Celebreit is staffed with former Israeli military and intelligence personnel. The concerning part is that Celebreit claims to remotely control all its devices, suggesting they have access to information obtained by the British security services.

Unlimited Hangout

The Pre-Planned Chaos of the 2020 Election with Charlie Robinson
Guests: Charlie Robinson
reSee.it Podcast Summary
Whitney Webb and Charlie Robinson discuss predictions of chaos around the 2020 U.S. presidential election and how intelligence-linked simulations anticipated turmoil long before the coronavirus crisis, with outcomes ranging from a constitutional crisis to martial law. They point to simulations produced by networks tied to former Bush or Obama officials, neocon think tanks like PNAC, and allied groups. They argue these drills are not mere “war games” but part of a toolkit that maps possible futures, and note a pattern of simulations preceding major events such as 9/11, the anthrax attacks, London’s bombings, and the coronavirus crisis. Two organizations created around March are highlighted: the Transition Integrity Project and the National Task Force on Election Crises. The Transition Integrity Project’s cofounder Rosa Brooks is described as an Obama-era DOD and Hillary Clinton State Department adviser, previously special counsel to the president of George Soros’ Open Society Foundations, and affiliated with the New America Think Tank, funded by Eric Schmidt, the Gates Foundation, Pierre Omidyar, Jeff Skoll, Reid Hoffman, and Craig Newmark. The other cofounder, Nils Gilman, is vice president of programs for the Berggruen Institute, which envisions a transnational network addressing AI and gene editing. Membership overlaps exist across both groups, including Michael Chertoff, Max Boot, David Fromm, Bill Crystal, John Podesta, Robert Gates, and Larry Wilkerson, with Wilkerson being a prominent public figure in both efforts. The groups’ membership is not fully public, but various reports note their overlap and the presence of PNAC-linked figures. The groups reportedly gamed four election scenarios: ambiguous results, a Biden victory, a Trump victory, and a narrow Biden win. A particularly striking hypothetical under a clear Trump win describes the Biden campaign encouraging Cascadia—California, Oregon, and Washington—to secede unless Republicans agreed to reforms such as granting statehood to Washington, D.C., and Puerto Rico; dividing California into five states; mandating Supreme Court retirements at 70; and eliminating the Electoral College. The scenario then envisions Congress awarding the presidency to Biden, with Pence and Republicans resisting, leading to a constitutional crisis in which the military’s role remains unclear. The discussion emphasizes that the people behind these simulations—like PNAC alumni—“are not Nostradamus” but seek to shape outcomes by prefiguring them. The conversation also covers how some involved openly support Biden, and how the campaigns leverage narratives of democracy threats. Hillary Clinton’s recent remarks about not conceding are juxtaposed with the TIP projections. They discuss campaign energy differentials, the debate dynamics, and the perception that Biden’s team seeks stability and predictability, while Trump’s unpredictability complicates control. They examine cyber and foreign interference narratives. Cybereason, an Israeli-founded cybersecurity firm with Unit 8200 ties, has major investors such as Lockheed Martin and Microsoft-linked entities; its founder served in Israeli intelligence. Cybereason’s work, and broader CTI League efforts, are cited as manifesting the external dimension of election security narratives. The discussion critiques media and political elites who promote foreign-interference threats while overlapping with pro-Israel intelligence circles. They argue these dynamics intersect with broader agendas, including AI governance and the World Economic Forum’s Great Reset, suggesting a convergence of technocratic power, media narratives, and political operatives aimed at managing or engineering political outcomes. They close by signaling ongoing reporting on these themes, highlighting the need to recognize the pattern of simulations, prepositioning, and narratives intended to normalize drastic interventions around elections, including potential continuity-of-government scenarios.
View Full Interactive Feed