TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 gave the FBI a thumb drive containing 29 minutes of high-definition video showing two men attacking a building. As of this morning, neither man has been arrested. Speaker 0 states that despite going through over 725 indictments, none of their video or even a single still picture of either man has appeared on the Internet. The FBI is allegedly refusing to take Speaker 0's calls, return emails, or accept an offer to meet. Speaker 0 believes the FBI is hiding these men. Speaker 0 asks Speaker 1 to inquire about the identities of these men. Speaker 0 confirms that Ben Grundler has all this information and that they have been in contact for over a year.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims Windows includes a piece of malware called OneDrive that will spontaneously delete all files off your computer, not from OneDrive but from your local machine. They say, “OneDrive will spontaneously delete all of the files off of your computer,” and that “all of my photos and videos of my family, all of my work files, everything is gone.” - They assert there is no warning, no confirmation button, and no pop-up before this happens. It “will start doing it” during a Windows update that begins using OneDrive, with “no plain language warning to opt out.” - OneDrive allegedly quietly uploads everything on the computer to Microsoft servers, and users may notice only when OneDrive warns that it’s running out of space. The user then looks up how to stop it and “you will get onto your computer the next day to find everything is gone.” - After deletion, the desktop shows a single icon that says, “where are my files?” They say many people thought they had been hit by ransomware or a virus. - When the user tries to recover, they are forced to download all the files back to the machine, which can take a long time on slow or metered Internet connections. - If the user then deletes the files from the local computer and also from OneDrive, the files are deleted from the computer again with “no warning, with no pop up, without anything.” - The only way to delete the files off the machine without also deleting them from OneDrive is to follow a YouTube tutorial with detailed steps, because there is no intuitive way in the menus. They emphasize there is no plain English explanation like, “Hey, do you want us to take everything on your computer and put it on our computer instead?” - The speaker argues that many people assume cloud storage is a backup, but OneDrive “secretly transfers your machine to their machine so that their machine is the primary. Those files are the copy of the files.” When you work on the local machine, it is treated as temporary access to those files. This slows the machine because it writes and reads data to the cloud rather than the hard drive. - Practically, if anything happens to the file on OneDrive’s machine, it’s deleted everywhere because it’s now only on their machine, and you are only allowed to temporarily access it. The speaker notes this is “very intuitive” to accidentally delete everything, and questions how this was allowed to go out the door. - The concluding point: when OneDrive says it’s full and you delete things to free up space, it deletes them from your machine too, which the speaker finds unbelievable.

Video Saved From X

reSee.it Video Transcript AI Summary
The videos came from a large disk that contained empty folder files. We didn't try to open them because we were focused on something else. However, we later discovered that these files were from the camera inside the counting facilities at Gwinnett County. So now we have footage of what's happening inside. We just found them after all this time. The counting process is a separate aspect that we haven't explored yet.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 describes a man on the team who, after he was shot, runs toward the vehicles, stays outside the vehicles, and films a TikTok selfie video. They ask to identify this person, and it is confirmed to be the audio-visual (AV) team member who runs the cameras. This individual is said to have said, “Charlie just got shot,” and is the same person associated with the footage and the AV setup contracted to shoot the coverage. Speaker 0 clarifies that this person works for a company called VI, which provides contract AV/video personnel, and is not a security guy. He is the AV team member who runs the cameras. He also is described as the person who “took down the cameras” and there were questions about what happened to the footage, noting that this is a legitimate inquiry. Speaker 1 adds that after the event, someone goes to the camera behind Charlie, pulls the camera down, and it looks like they pull the SD card out; this footage is in the hands of the FBI and was not deleted or erased. The SD card was pulled by someone named Senga, and the footage ended up with the FBI. Speaker 0 reiterates that the AV person works for VI, the video contracting company, not as security. He expresses confusion about the phone usage and states that it’s not for him to understand that part; he observes that, in tragic events, people pull their phones out instead of running, and says that’s for the AV person to explain. He notes that the AV person does not work for them, but from what he has seen, this is the same person who took down the cameras, prompting legitimate questions about where that footage went. He confirms that the person was interviewed by the FBI, asked questions, and that all relevant material was turned over.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 accuses Speaker 1 of avoiding a major scandal and focusing on insignificant matters. Speaker 1 claims the scandal cannot be verified. Speaker 0 insists it can be verified, citing the discovery of the laptop. Speaker 0 states that the family on the laptop has gone into hiding for five days. Speaker 1 suggests the person is preparing for a debate. Speaker 0 doubts it would take five days to prepare.

Video Saved From X

reSee.it Video Transcript AI Summary
I have a a an external hard drive. I'll show it to you now. This is called the vault. This is the vault. This has shit on everyone you have ever heard of. Video, pictures, emails, audio, text messages, phone calls, anything you'd ever really want to know about every public figure I have ever encountered. Most of the conversations I've had with people when I've been in a single party consent state, recorded, archived. I have shit on everyone. And I'm now in a position in my career where I'm perfectly happy to start dropping it all. So I have a lot of crap on Richard Spencer, and and everybody else. And what maybe there is a reason to sign up for Telegram after all. So so watch this space.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers discuss how the voting system can be easily manipulated using a USB drive. They explain that election officials are unaware of the potential misuse of USB drives in voting machines. The speakers demonstrate how a USB drive can be used to run a backdoor utility and manipulate the election results. They show that the screen does not display any indication of this manipulation. By inserting a specific USB drive, they are able to fix the flipped election results. The speakers emphasize the simplicity and affordability of USB drives, highlighting the vulnerability of the voting system.

Video Saved From X

reSee.it Video Transcript AI Summary
We analyzed 4 deaths, one of which had corrupt data. We were able to retrieve all the data from that disk through forensic methods. We are confident that we have all the data from those 4 deaths, but the 2 hours of missing footage is still not found.

Video Saved From X

reSee.it Video Transcript AI Summary
Clark County Technical employees independently found votes appearing and disappearing at night. They were only allowed a visual inspection of a USB drive, not a forensic examination.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that if videos existed of someone committing felonies on an island, the public would have seen them. They assert that there are tens of thousands of videos of Jeffrey Epstein with children or child pornography and hundreds of victims. They state that no victim will ever get released due to the volume of evidence. The speaker concludes that the FBI is diligently processing this evidence.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker contacts the state police computer crimes unit in Maine regarding a case involving child pornography. They mention that the police are aware of the group involved but cannot force the individual to provide information. The speaker also mentions that they have the passcode to the suspect's phone and that the suspect admitted to having child pornography on it. The speaker discusses the possibility of receiving a video but states that they cannot accept anything. The transcript ends with the speaker mentioning that they are following instructions.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims to have personally witnessed a man inserting USB drives into voting machines on over 24 occasions, which they reported to a deputy sheriff and the clerk of elections. They were told that leaving USBs in voting machines is normal, but later learned this was not the case. The speaker alleges that 47 USB cards are now missing. They demanded that vote counts be updated live, and when they were, the count showed 50,000 votes, which they claim were for Vice President Biden. The speaker says they asked multiple law enforcement agencies to examine the computers for forensic evidence, but this was not done. The speaker further claims that chain of custody logs, records, and yellow sheets are gone, and that poll workers were invited to recreate the logs. They state there are 100,000 to 120,000 ballots in question and that there is no remedy for this regarding the presidential election. They do not believe anyone could certify the vote in good conscience.

Video Saved From X

reSee.it Video Transcript AI Summary
In the exchange, concerns are raised about mail-in ballots in Allegheny and Philadelphia counties and how they were counted. Speaker 0 notes that ballots were counted without observers, citing 682,770 ballots observed and asking about the 1,823,148 mailed-out ballots, contrasted with a final count showing 2,589,242 mail-in ballots. The core question is: what explains the roughly 700,000 mail-in ballots that “appeared from nowhere”? Speaker 1 responds that their cyber team uses white-hat hacking techniques to gather publicly available information from the secretary of state’s website, which has been updated as late as 11:16 this morning with provisional and mail-in ballots, though those numbers continue to change. He adds that the 2,500,000 figure is no longer on the website, and it has “just been taken off.” There is no annotation explaining why. Speaker 2 then describes an on-the-ground observation: a deputy sheriff, a senior law enforcement officer, was seen not being observed and walking in with baggies, with USBs being inserted into machines. The witness claims to have personally witnessed this 24 times, with additional witnesses including Democrat poll watchers. They were told by an attorney that every election leaves a couple of USB cards in the voting machines to be brought back by the warehouse manager, but this account is contradicted by law enforcement and other officials. The witness states that 47 USB cards are missing and “they’re nowhere to be found,” and that 32 to 30 cards uploaded were not present in the live vote update. The witness demanded timely live upload of vote results, which showed 50,000 votes; they assert those votes were for Vice President Biden, though they note that identifying who those votes were for should not matter to a computer scientist. Speaker 1 emphasizes that forensic evidence from the computers was not obtained: the procedure would involve turning off the computer, imaging the drive with BitLocker, under law enforcement observation, which would take about an hour for five machines. This forensic imaging was never performed, despite objections three weeks earlier. They later learned that virtually all chain-of-custody logs, yellow sheets, and forensic records in Delaware County were gone; a signing party attempted to recreate the logs with poll workers but was unsuccessful in recovering them all. The discussion concludes with a claim that there are 100,000 to 120,000 ballots, both mail-in and USB, in question, and that there is no remedy or “cure” within the local charter for certifying a presidential vote, leaving the speaker asserting that nobody could certify the vote in good conscience.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that more than 3,000,000 pages, including more than 2,000 videos and 180,000 images, were produced, totaling approximately three and a half million pages in compliance with the act. The 2,000 videos and 180,000 images are not all videos and images taken by Mr. Epstein or someone around him; they include large quantities of commercial pornography and images seized from Epstein's devices, but which he did not take or that someone around him did not take. Some of the videos and some of the images do appear to be taken by Mr. Epstein or by others around him. The department’s document identification and review protocols consisted of multiple layers of review and quality control designed to ensure compliance under the act and protect victims. In addition to the department’s review protocols, the United States Attorney’s Office for the Southern District of New York employed an additional review protocol to ensure compliance with a court order requiring United States Attorney Jay Clayton to certify that with respect to certain materials, a large quantity of the materials, a rigorous process was undertaken to protect victims against any clearly unwarranted invasion of their personal privacy. The department’s collection effort resulted in more than 6,000,000 pages being identified as potentially responsive, including department and FBI emails, interview summaries, images, videos, and various other materials collected and generated during the investigations and prosecutions that the act covered. They erred on the side of overcollecting materials from various sources to best ensure maximum transparency and compliance, which necessarily means that the number of responsive pages is significantly smaller than the total number of pages initially collected. That is why they mentioned releasing more than 3,000,000 pages today and not the 6,000,000 pages that were collected. They address what they didn’t produce. The categories of documents withheld include those permitted under the act to be withheld: files that contain personally identifiable information of victims or victims’ personal and medical files, and similar files, the disclosure of which would constitute a clearly unwarranted invasion of personal privacy. Any depiction of CSAM or child pornography was obviously excluded. Anything that would jeopardize an active federal investigation. And finally, anything that depicts or contains images of death, physical abuse, or injury, also not produced. Although the act allows for withholding for items necessary to keep secrets in the interest of national security or foreign policy,

Video Saved From X

reSee.it Video Transcript AI Summary
There were multiple improbable factors that would have had to align for these bombs to be discovered at the same time on a sidewalk, prompting questions about a broader conspiracy and how such a scenario could unfold. The speakers emphasize that while they want to avoid a conspiracy path, there are many questions still open, including the handling of video footage. Regarding video records, one speaker notes that they want to review January 6 video to see if anyone returned to the locations, but that video apparently does not exist anymore. They do have January 5 video, but have been told that no one preserved January 6. This raises eyebrows as they consider whether the devices were placed by an inexperienced person who was trying to set them down quickly or whether the devices were left to be found. Mrs. Younger’s account is highlighted: she walked out her back door and did not see anything earlier in the morning, but saw the devices later, which would give a reason to believe she would have noticed them if they had been there in the morning. This observation is part of why they want to talk to her. One speaker is blown away by a point: according to the FBI, the FBI’s internal data indicate 39,000 videos showing the hoodie-clad pipe bomber—referred to as the C. Virkel bomber—movements that night, from various camera angles. Washington, DC, Capitol Hill is described as among the most surveilled areas in the world. Yet there is a claim that there is no footage from January 6 of the actual areas a person would have had to travel to place the pipe bombs. The other speaker confirms that there are cameras along some Capitol Police lines that show walking paths, including footage from Capitol Police cameras, but the angles that would show positions behind the RNC and behind the DNC do not exist today, at least not in a way that captures the relevant movements. This absence has limited the investigation into the theory that the devices could have been placed earlier and then moved or re-placed. They are now going back through Capitol Police footage, including from the Fairchild Building near the DNC, which has provided the most evidence so far. The team is reviewing hours from about 8 PM on May 5 to 1 PM on January 6 to determine whether anyone else passed by, whether there was any suspicious activity, and whether the devices were moved again. The investigators are evaluating step-by-step explanations for these anomalies, considering whether the Secret Service dog failed to detect one device or whether Mrs. Younger missed the other, whether the devices were not present at that time, or whether weather and other factors affected detections. They acknowledge that with so many circumstances, some “smoke” might indicate “fire.” They hope the FBI is reviewing cell phone data to determine if the suspected bomber returned or if a co-conspirator was involved in setting timers or re-placing devices. The transcript ends with an acknowledgment of ongoing investigation scope and questions.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 explains that, on Spotify or Apple, the situation is that he’s in his room with no bullets in it, but he’s practicing firing a weapon. He notes that there are multiple videos like this in the person’s online history, which the speaker possesses. The speaker reiterates that the online history shows similar content, ending with the fragment “His online history shows,” indicating there is more content that is not provided in the transcript.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The time game is over. Justice with General Flynn. They criticize the Department of Just Us and recall a past moment when they would have been brought into the DOJ in handcuffs. Speaker 1: Delivers a stream of violent, braggadocious lyrics about weapons, killings, and dominance, including references to shooting, trafficking, and threatening rivals. The content emphasizes keeping enemies in check, physical violence, and material wealth, with repeated lines about not losing sleep over killers, firing weapons, and "run it up" for money and power. Speaker 2: Argues that many people gaining sudden large followings on Twitter or talking about topics like low taxes or transgender pronouns may be pedophiles, suggesting conservative media uses people with criminal pasts as influencers. States that such individuals say things to align with a broader agenda and mentions Israel in the context of a broader critique of conservative priorities. Concludes with a tip to contact Charlie Cook for those seeking a "second act" in public life. Speaker 3: Kyle Clifton discusses an after-party associated with TPUSA’s America Fest in Phoenix on December 19, called the Grand Young Party. The party reportedly featured girls dancing half-naked on stage, girls locked in cages, underage drinking, stripper poles, sex on the dance floor, and mentions “strange ritual Zionist extremism.” He notes promo footage from Florida and Phoenix, blurred faces of attendees, and that age did not matter if the attendee knew the organizer, Joe Bazrawi. Background is provided on Maverick events as the organizers. He reports a security guard tackled an 18-year-old patron, causing injuries; police encouraged filing a report for assault. Parents of other female patrons are considering lawsuits for supplying minors with alcohol. The event was advertised as a TPUSA America Fest after party, hosted by TPUSA ambassador/employee Joe Bazrawi, whose travel and lodging were paid for by TPUSA. He claims TPUSA was aware of and encouraged the party, and that Bazrawi maintains a private dossier on conservatives who oppose his party or beliefs to blacklist them from TPUSA events. Bazrawi allegedly attends other events to photograph attendees for his dossier and share with TPUSA executives. Attendees allegedly included Matt Gaetz, with rumors that James O’Keefe and Madison Cawthorn were present; photos are mentioned. Questions are raised about TPUSA’s responsibility for hosting unsanctioned events with high-profile guests and potential legal consequences or PR damage. The after-party reportedly had about 30–40 attendees leave early; refunds were issued to some in response to public comments, while others did not receive refunds. Some attendees were admitted as late as 1:45 AM; the event ended at 2 AM. Ticketing was disorganized, with staff not knowing who attended. Local Antifa chapters reportedly planned to submit stories to CNN to harm Matt Gaetz’s career. The speaker expresses concern about the conservatism movement’s image and the potential implications for Gaetz and Cawthorn. Speaker 4: The Vault claims to possess extensive material—video, pictures, emails, audio, text messages, phone calls—on everyone and to be willing to drop it all. The speaker has “a lot of crap on Richard Spencer and everybody else” and suggests signing up for Telegram to access this material. Speaker 5–6: Expressions of fear or alarm from the audience, with a call to “Dale” and a plea for help or relief, indicating tension or distress in the room.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reviewed server logs and identified "Brian." The speaker found forensics in a database. The speaker shows access and a deletion on the log from the database. The speaker claims Christy previously tweeted about letting Brian into the server. The speaker repeats "Here he is" multiple times. The speaker mentions a law proposal.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 asks, “Who created this book?” Speaker 0 explains that it’s there because he’s also his computer, but it “just gives it power of failure.” He then references Eastern countries in Europe and finding girls there, saying he knew that because he went with his wife. He states they used to have a computer so powerful, and they used to have a waterfront vehicle to call the computer, because they downloaded pictures that fast.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker confirms that all the Epstein files are missing. They state the FBI is reviewing tens of thousands of videos of Epstein with children or child porn, involving hundreds of victims. The speaker claims no victim's video will ever be released due to the volume of material. The FBI is described as diligently reviewing the videos. The speaker then states they haven't seen that statement.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 suggests that if video evidence existed of someone committing felonies on an island, it would be public knowledge. Speaker 1 claims there are tens of thousands of videos of Epstein with children or child pornography, involving hundreds of victims. They state that no victim information will be released due to the sheer volume of material, which the FBI is currently processing.

Video Saved From X

reSee.it Video Transcript AI Summary
The Epstein files' release date is unknown. The files contain tens of thousands of videos. The videos allegedly involve little kids. Authorities must review all the videos.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that Pam Bondi claimed to have ten thousand hours of video. The speaker had dinner with the Vice President who told them that the video was commercial pornography. According to the Vice President, the videos do not show any powerful person in a compromising position, which is the party line. The speaker questions why Pam Bondi would call it evidence if that is the case.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers demonstrate how a USB drive can be used to manipulate voting systems. They explain that election officials may not be aware of the potential misuse of USB drives. The speaker inserts the USB drive into the voting system, running a backdoor utility that is preinstalled. They show that the screen does not display any indication of the manipulation. By executing commands, they change the election results back to the original numbers. The speakers emphasize the simplicity and accessibility of this method, as USB drives are widely known and inexpensive.
View Full Interactive Feed