TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The Pentagon hides billions of dollars, with no accountability or audits. We've never received a satisfactory explanation. To uncover the truth, someone will likely have to leak information online before being silenced—a scenario I've often predicted.

Video Saved From X

reSee.it Video Transcript AI Summary
We do not view this situation as a full security threat to the state. The actions of our office did not pose an insider threat to elections. In 2021, when Mesa County's voting system passwords leaked, we acknowledged that it was a serious breach of security protocols. However, that incident involved unauthorized access and occurred in a different context. Since then, our security measures have significantly improved, including 24/7 surveillance and enhanced access controls. The laws governing these protocols have also been strengthened. We have implemented multiple layers of security to prevent incidents like Mesa County from happening again, and that is not the case here.

Video Saved From X

reSee.it Video Transcript AI Summary
Data loss and deletion have occurred within the Department of Defense (DOD), resulting in the disappearance of historical records, police blotters, and other important information. The problem was first noticed in 2007 when a military member, who should have been flagged in the National Crime Information System (NCIC), was able to purchase firearms and commit a tragic crime. An investigation revealed a significant amount of missing law enforcement data throughout the DOD. It is uncertain if this loss is widespread and if historical records can be recovered. The significance of available paperwork has now increased due to the potential lack of official records. Internet sleuthing may provide more details on this deletion issue.

Video Saved From X

reSee.it Video Transcript AI Summary
As documents are declassified and released, more is being learned about who was directly involved and implicated in past wrongdoings. Some individuals loudly protested against these actions, and whistleblowers are coming forward with documentation of their protests and unwillingness to participate. As those who had a hand in these actions are identified, it will provide an opportunity to ensure that they, and others willing to weaponize intelligence to subvert the will of the American people, can no longer work in the intelligence community.

Video Saved From X

reSee.it Video Transcript AI Summary
Someone who snuck into that chat that was not a part of that was not an employee there. And they screenshotted what they saw and leaked it out on x. This is a chat group that was created and administered by the NSA, one of the premier intelligence collection entities that we have. It was obscene. It was talking about sex toys and sex tricks for people who had gone through, you know, some kind of transgender surgery. During the workday on an intelligence hosted work chat group. The supervisors said anybody who's involved with this is getting fired and getting their security clearance revoked. Imagine you're in any office and you're having these kinds of sexually explicit conversations in the workplace. This cannot be happening in the workplace, and it must not be happening in our premier intelligence agency that has people who have the highest clearances that that anyone can hold. This chat group had existed for over two years. Because of president Biden's DEI initiatives, they were essentially told, shut up. It's none of your business.

Video Saved From X

reSee.it Video Transcript AI Summary
We believe the leaks originated internally. The Aurora leak is under investigation, and we've identified a suspect. Regarding the California leak, Secretary Noem is partially correct; the information points towards the FBI. The Deputy Attorney General has launched a criminal investigation. The individual responsible will face job loss, pension forfeiture, and jail time. The DHS Inspector General is investigating the first leak, and a criminal investigation has been opened into the second. We're committed to holding those responsible criminally accountable. Leaking information jeopardizes officers' lives by potentially alerting criminals, leading to dangerous ambushes. This isn't a game; DHS and DOJ are working together to ensure swift justice.

Video Saved From X

reSee.it Video Transcript AI Summary
We believe the Aurora leak originated internally, and the individual responsible is under investigation. Regarding the California leak, some information points to the FBI. The Deputy Attorney General has launched a criminal investigation, promising job loss, pension forfeiture, and jail time for the culprit. The DHS Inspector General is also investigating the first leak. We can't share details due to the ongoing investigation, but a criminal investigation is underway. Leaking information endangers officers' lives by potentially alerting criminals, allowing them to prepare ambushes. This is unacceptable. The DHS and DOJ are working together to ensure criminal prosecution of those responsible.

Video Saved From X

reSee.it Video Transcript AI Summary
The Pentagon hides billions of dollars, with no accountability or audits. We need transparency. The only way to uncover the truth might be if someone leaks information online before mysteriously dying.

Video Saved From X

reSee.it Video Transcript AI Summary
Because you're in the same position in a way that Pete Hegstaff is in Yeah. Where people underneath you appear to be leaking even top secret information that you could go to jail for leaking. That's right. But they clearly have such an agenda, it's worth it to them. Yeah. that there is an investigation that's underway to try to figure out the source of this leak around that specific incident. it makes things much harder in constantly questioning and looking over your shoulder. These things being leaked, either by people who are just trying to show a reporter that they're important or chasing clout of some sort or the most dangerous of which is those who are trying to ultimately undermine the president's policies. Really, what is happening when they do that is they're undermining our democracy. the majority, the vast majority of the American people who chose this duly elected president, Donald Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asks for insights into the Pentagon, referencing reports of a "meltdown" and concerns about seriousness within the organization. The interviewee responds that people are bothered by a lack of seriousness, citing "signal gate" as an example of amateurish behavior. The interviewee states that the Pentagon claimed the information shared wasn't classified, but it was. The interviewee believes the real problem is that "they knew it was" and still wanted people to believe them. The interviewee emphasizes the seriousness of the Pentagon's mission to defend the nation, requiring all of America's capabilities. The interviewee states that the Pentagon is now locked in an argument about DEI.

Video Saved From X

reSee.it Video Transcript AI Summary
The Defense Department has revealed new details about an investigation into child pornography involving its workers and contractors, some of whom had top-level security clearance. These individuals were employed across various government agencies, including the National Security Agency and the Defense Advanced Research Projects Agency. While not all suspects have been arrested, some have been tried and sentenced, while others had their cases fall apart due to lack of evidence. The difficulty in prosecuting child pornography cases lies in proving who accessed the material and identifying the victims. The concern is that these individuals may be vulnerable to blackmail by foreign powers or terrorists seeking access to sensitive military information. The Pentagon is taking these cases seriously due to the potential national security implications. Another alarming issue is the failure to investigate or prosecute military employees and contractors who allegedly purchased child pornography. A list of 5,210 names from an internet sting operation conducted in 2006 was overlooked, and only now are these cases being revisited. The Pentagon's investigative branch, DCIS, identified 264 employees or contractors, including those with top security clearances, but only a small percentage were fully investigated and prosecuted. The lack of cooperation from the Pentagon and the failure to inform supervisors about these cases raise concerns about the seriousness with which the issue was initially treated. The existence of pedophilia and its connection to the deep state is a cause for alarm. There is evidence of deliberate attempts to infect local law enforcement officers with an interest in pedophile movies, including those involving bestiality and snuff films. The combination of military war dogs, pedophilia, and video cameras in Afghanistan has resulted in disturbing content. The public's awareness of the government's failure to protect children from pedophilia could lead to questioning the government's actions and policies. The fight against pedophilia is seen as a righteous endeavor that could bring about significant change if the American public becomes angry and demands accountability. The issue of pedophilia is also connected to a global crime network that surpasses the illegal arms and drug trades in terms of growth. The urgency to rescue children from this network is emphasized, and the lack of action from authorities is highlighted.

Video Saved From X

reSee.it Video Transcript AI Summary
The Pentagon is under investigation for its connection to the spread of child pornography known as Project Flicker. Around 5,000 individuals, including many affiliated with the Department of Defense (DOD), have been identified as having subscriptions to child porn sites. A bipartisan bill has been introduced in the House to address this issue and prevent the use of DOD networks for child pornography. The bill aims to crack down on the misuse of DOD computer systems and investigate and prosecute those involved. The prevalence of child pornography within the DOD is alarming, and it is a serious issue that needs to be addressed.

Video Saved From X

reSee.it Video Transcript AI Summary
The Pentagon is under investigation for links to child pornography, with Project Flickr identifying 51,000 individuals, including DOD affiliates, accessing such sites. A bipartisan bill aims to stop the use of DOD networks for child pornography. Despite security measures, individuals misuse DOD IP addresses and peer-to-peer sharing. The bill allows civilian law enforcement to investigate and prosecute offenders. The issue is alarming, especially since 80% of cases remain unprosecuted. The spread of child pornography within the military is a serious concern, highlighting the need for stricter enforcement and accountability.

Video Saved From X

reSee.it Video Transcript AI Summary
A new statute was proposed to make it a misdemeanor to knowingly take classified information from secure systems. Our investigation also looked into possible computer intrusions by nation states or hostile actors. It's important to note that Secretary Clinton used multiple servers and administrators during her time at the state department.

Video Saved From X

reSee.it Video Transcript AI Summary
I've identified leakers within the organization, and we're actively uncovering more. Let me be clear: these individuals will be terminated, and they will face serious repercussions. Leaking information to the press, especially when it jeopardizes operations, puts law enforcement lives at grave risk, potentially leaving families without their loved ones. We're employing every available tactic, including polygraphs, email analysis, and communication monitoring, to identify these individuals. It's astonishing how these bureaucrats, driven by their agendas to undermine our mission of ensuring American safety, will betray one another to protect themselves. Rest assured, I am fully committed to finding and removing these leakers to ensure the safety of our law enforcement officers and agents, and to enable us to continue our vital work.

Video Saved From X

reSee.it Video Transcript AI Summary
The Department of Homeland Security has identified two individuals who leaked information about operations, endangering law enforcement lives. The department intends to prosecute these individuals and hold them accountable. The department will continue efforts to keep America safe.

Video Saved From X

reSee.it Video Transcript AI Summary
There has been a media blackout on Pentagon files leaked recently, considered the biggest since Snowden. Fox News refused to cover it, citing sensitive Ukraine blueprints. John Kirby, Biden's spokesperson, urged media not to report on the leak, calling it a blueprint for war.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2021, your office stated that the public disclosure of BIOS passwords in Mesa County was a serious breach of voting system security. Given that your office has now leaked passwords, does this also represent a serious breach? No, the situations are distinct. Tina Peters was convicted for her involvement in a larger security breach in Mesa County, which included unauthorized access and stolen passwords. Since then, our security measures have improved significantly, including 24/7 cameras and stricter access protocols. The laws have also been strengthened to prevent similar incidents. The context of the current situation differs from what occurred in Mesa County. You noted that the phrase about passwords alone being a serious breach was from your office's press release.

Video Saved From X

reSee.it Video Transcript AI Summary
The investigation centers on Thomas Escato, a current Secret Service agent on the vice president JD Vance’s security detail, who was exposed by undercover journalists from O’Keefe Media Group. The reporters met Escato via Tinder in October 2025 and documented that he was a holdover from the Biden administration, originally tasked with protecting Kamala Harris and Doug Emhoff. He is described as involved in protecting the vice president’s transportation, residence surveillance, and even Vance’s wife and children. Key revelations include Escato sharing highly sensitive, real-time and historical security information with an undercover journalist who posed as a stranger. He discussed protective formations, shift-change times, and exact travel plans, including the routes and times for the vice president’s convoy, as well as the specific vehicles involved. He sent photos with location metadata revealing convoy locations from various international and domestic contexts, including Joint Base Andrews, Munich, King Khalid International Airport, JFK, and Abu Dhabi, among others. Metadata and photos indicated where the vice president’s convoy had been and the routes used, sometimes with dates months prior to disclosure. Escato provided ongoing updates on the vice president’s movements, including the time and place of the vice president’s flights, which plane would be used, and the journalist’s implication in following the movements. He sent a selfie from inside a venue associated with the vice president, and even images from inside the Naval Observatory, where the vice president’s residence is located. He also described the journalist’s ability to “follow” the vice president’s movements and the security details surrounding transport and protection. The exchange included intimate details about the vice president’s family logistics, such as transportation of Vance’s wife and mentions of the residence and school arrangements for his children, with a recurring theme of the idea that “we call them everywhere” and that “there’s a 24/7” aspect to the protection. Escato claimed knowledge of future travel plans, including a four- to five-day stay in Ohio and a one-night visit to Florida, and he described the existence of a “cover subpoena” related to counter-surveillance duties. Escato also disclosed personal political opinions: he voted for Biden, dislikes Trump, and opposes Vance’s immigration policies, including ICE-related concerns. He described his citizenship status (citizen since 2018) and stated his tenure as a Secret Service agent as five years. He asserted it is his First Amendment right to express opinions, while acknowledging the potential implications of his disclosures, noting that he “sign paperwork” and that if he doesn’t disclose information, “I never do. Otherwise, I get in trouble.” The reporting emphasizes that such behavior inside the Secret Service is troubling, especially given prior security lapses in 2024 that led to the head of the Secret Service resigning after an incident in Butler, Pennsylvania. The piece concludes by asserting the importance of protecting the vice president’s security, hoping the story prompts reforms and accountability, and inviting readers to share tips with O’Keefe Media Group.

Video Saved From X

reSee.it Video Transcript AI Summary
The Defense Department has revealed new details about an investigation into child pornography involving its workers and contractors, some of whom had top-level security clearance. These individuals were employed in various government agencies, including the National Security Agency and the Defense Advanced Research Projects Agency. While not all suspects have been arrested, some have been tried and sentenced, while others had their cases fall apart due to lack of evidence. The difficulty in prosecuting child pornography cases lies in proving who was responsible for the illegal content and identifying the victims. The concern is that these individuals may be vulnerable to blackmail by foreign powers or terrorists seeking access to sensitive military information. The Pentagon is taking these cases seriously, as they pose a potential threat to national security. Additionally, an investigation revealed that hundreds of military employees and contractors may have engaged in child pornography, with only a fraction of them being investigated or prosecuted. This raises concerns about the lack of action taken by the Pentagon and the potential for blackmail and security breaches. The issue of pedophilia is a serious one, and there is evidence of an attempt to infect law enforcement officers with an interest in pedophile movies. The combination of military war dogs, pedophilia, and video cameras is particularly disturbing, and evidence suggests that such movies may have originated from the American occupation of Afghanistan. The exposure of the deep state's involvement in pedophilia is seen as a way to bring about significant change, as it would lead to questioning the government's ability to protect children and potentially result in the closure of military bases overseas. The scale of child disappearances worldwide is alarming, with over 8 million children disappearing each year. The global child trafficking network is growing rapidly and surpassing the illegal arms and drug trades. The urgency to rescue these children is emphasized, as there is little intervention from authorities in many areas. This dangerous and emotionally taxing work requires individuals to be dedicated and fearless in their pursuit of justice.

Video Saved From X

reSee.it Video Transcript AI Summary
Earlier this week, a potential vulnerability was detected in DoD computer systems. Some tech companies were found to be using cheap Chinese labor to assist with DoD cloud services, which is considered unacceptable. Effective immediately, China will no longer have any involvement in DoD cloud services. A two-week review will be initiated to ensure this issue isn't occurring elsewhere across the DoD. The department will continue to monitor and counter all threats to military infrastructure and online networks. The speaker thanked those who raised the issue and is initiating the review with a signed memo.

Video Saved From X

reSee.it Video Transcript AI Summary
Remember Edward, the fired intern? He's 19 now and works for the president's top campaign donor. Now he's a "senior advisor" at the State Department with access to all IT and data management for the entire diplomatic operation globally. A US official told the Washington Post "this is dangerous". Giving a 19-year-old with a history of leaking sensitive information access to all centralized data at the US State Department just seems off. This is the latest in a string of national security concerns. Elon Musk's JV team also has access to the payment system at the Treasury Department that controls all US government payments, including secret payments to foreign assets run by US intelligence and payments to US businesses abroad with secret contracts with the CIA. Speaking of the CIA, their entire workforce has been told to resign.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a pentagon that hides a billion dollars without any accountability, and it has never passed an audit. To uncover the truth, it seems that someone may need to leak information from these labs online, potentially facing dire consequences afterward.

Weaponized

Chris Sharp Exposes AARO Before Trump's Big Decision
reSee.it Podcast Summary
The episode centers on Chris Sharp, a journalist whose reporting in Liberation Times and related outlets has drawn attention to the inner workings of UAP investigations and the people who shape them. The hosts recount Sharp’s approach to interviewing Tim Phillips, a former Arrow official, highlighting how Sharp sought to push for clarity on how extraordinary cases are selected, analyzed, and labeled, and whether safeguards exist to prevent overclaiming or misinterpretation. The conversation delves into the day-to-day mechanics of data intake, vetting, and deconfliction procedures, including how analysts distinguish potential anomalies from prosaic phenomena and how those judgments are escalated up the chain. The interview reveals tensions between transparency ambitions and institutional caution, with Phillips described as both cooperative and guarded, occasionally sounding scripted as he discusses policies, personnel, and the limits of what can be publicly disclosed without compromising classified work. The discussion also probes broader questions about responsibility and accountability: whether Arrow’s mission includes sharing findings with the public, how non-human or extraterrestrial interpretations are framed, and what constitutes credible evidence in a field long debated by officials, journalists, and witnesses. The episode captures a moment in which a prominent public figure associated with UAP work asserts that some encounters show genuine, advanced capabilities beyond known human technologies, while simultaneously resisting definitive labels about origin. The speakers reflect on the implications of this stance for media coverage, whistleblower trust, and future disclosures, noting the potential for shifts in how agencies communicate, or fail to communicate, with the public, and what that could mean for policy, national security, and scientific inquiry. The overall tone underscores a landscape of cautious optimism tempered by skepticism, recognizing that progress may be incremental and contested even as new statements surface about possible breakthroughs and the need for transparency in a highly sensitive area.

Weaponized

UFO Lessons from Lacatski - The Doctor of Disclosure
reSee.it Podcast Summary
The episode centers on a high-profile former DIA official who helped design and run the largest U.S. government UFO investigation to date, and the hosts discuss how his disclosures have evolved from guarded briefings to more explicit statements about non-human intelligence and technology. The conversation covers the implications of his security clearances, including a specific level associated with nuclear and energy-related work, and why that detail matters for understanding potential weaponization and oversight. Across the discussion, the hosts and their guest argue that the information flow has shifted from clandestine channels to controlled disclosure, with the guest choosing to publish in books and participate in interviews as a strategic way to structure what can be revealed while maintaining national security. They examine the tension between accountability and secrecy, noting how scrutiny from Congress and public curiosity has grown as more officials and researchers speak publicly about sensitive programs and the existence of advanced craft. The dialogue also delves into how media coverage, online commentary, and interviews influence public perception, highlighting the role of counterintelligence practices in preventing leaks while allowing certain disclosures to proceed through vetted channels. Throughout, the speakers emphasize a broader pattern: significant admissions—such as confirming the existence of a non-human craft and the pursuit of reverse engineering—are framed as incremental steps toward a formal, safeguarded disclosure rather than a bombshell reveal. They reflect on the cultural impact of these developments and the potential consequences for national security, policy, and future congressional engagement, while acknowledging mixed reactions to the guest’s credibility and the evolving narrative around these programs.
View Full Interactive Feed