TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers affiliated with China's People's Liberation Army have infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Chinese cyber army's objective is to compromise critical infrastructure, either to hinder US power projection in Asia or to cause societal chaos. The report highlights the alarming possibility of a comprehensive cyberattack that could bring essential services to a halt. This threat surpasses the impact of the COVID-19 crisis and poses a significant concern for transportation, hospitals, and society as a whole.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The Washington Post reveals that China's cyber army has targeted various sectors, including Texas's power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency warns that these attempts are part of China's strategy to disrupt or destroy critical infrastructure in the event of a conflict, either to hinder US power projection in Asia or to create societal chaos. Over the past year, hackers affiliated with the People's Liberation Army have breached the computer systems of around 24 critical entities.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Michael Shellenberger's CTIL files reveal a trove of documents exposing the involvement of governments in censorship. The documents describe the activities of the Cyber Threat Intelligence League (CTIL), an anti-disinformation group that worked closely with the US Department of Homeland Security (DHS) and military contractors. The whistleblower's documents reveal the genesis of modern digital censorship programs, partnerships with intelligence agencies and civil society organizations, and the use of offensive techniques like sock puppet accounts. The documents also show that CTIL aimed to become part of the federal government and had connections with FBI and CISA employees. The documents provide a comprehensive picture of the birth of the censorship industrial complex.

Video Saved From X

reSee.it Video Transcript AI Summary
An Israeli intelligence-founded company, First Health Infrastructure, partnered with CISA to protect critical infrastructure in the US, including hospitals, dams, water systems, and nuclear reactors. This foreign entity's access to vital American systems raises concerns about national security and the extent of Israeli influence.

Video Saved From X

reSee.it Video Transcript AI Summary
An Israeli intelligence company called First Health Infrastructure partnered with CISA, an organization responsible for protecting critical infrastructure in the US. Originally focused on American hospitals, they have expanded their services to include dams, water systems, and nuclear reactors. This foreign intelligence-founded nonprofit now has access to these crucial systems in the United States. The deep connections between Israel and the US seem to play a role in allowing this partnership.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially causing chaos and affecting decision-making. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack can be blamed on any nation state or group, as revealed by WikiLeaks before Julian Assange's arrest. The WEF partnership against cybercrime, which includes US intelligence and other agencies, has the ability to frame any actor in a hack. They aim to regulate the internet and tie everyone's access to a digital ID, allowing intelligence agencies to monitor online activities. To convince people of the need for this, a major disruptive event caused by anonymous hackers can be manufactured. Israeli and British intelligence, along with the US Secret Service, FBI, and Department of Justice, are involved, as well as major banks and tech companies. The group also seeks to merge banking, regulatory, and intelligence operations under the pretext of cybersecurity.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US Federal agencies, and major banks. The forum's Partnership Against Cybercrime seeks a regulated internet and a digital ID tied to internet access. The goal is to eliminate online anonymity and privacy. The CTI League, a cybersecurity group, has access to critical US infrastructure, including hospitals, dams, and nuclear reactors. The group's main founder is an Israeli intelligence operative. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League is also involved in censorship efforts.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The forum seeks a regulated internet tied to a digital ID, allowing intelligence agencies to monitor online activity. The CTI League, a cybersecurity group, has access to critical US infrastructure and is affiliated with Israeli intelligence. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League's role in protecting critical infrastructure raises questions about foreign access to US systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
China's cyber army has been infiltrating critical US services as part of a broader effort to create chaos in logistical systems. The information obtained could be weaponized in the event of a conflict between the US and China in the Pacific. The Washington Post reports that targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency confirms that China is attempting to compromise critical infrastructure to disrupt or destroy it during a conflict. Hackers affiliated with China's People's Liberation Army have accessed the computer systems of around 24 critical entities in the past year.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity challenges are increasing. Three concerns for the future: 1) Expect nation states to target critical infrastructure like the recent attack on the Ukrainian power grid. 2) Data manipulation could lead to confusion and distrust in society. 3) Non-state actors may shift from using cyber tools for recruitment to destructive purposes, disrupting the status quo.

Video Saved From X

reSee.it Video Transcript AI Summary
Investigative journalist Whitney Webb discusses the recent cyberattack and its potential implications. She highlights the tabletop exercises conducted by US intelligence agencies and the focus on "killware" as the greatest cyber threat. Webb questions the attribution of cyberattacks and the lack of evidence provided by companies and agencies. She emphasizes the need for better evidence and warns of the potential for a false flag operation that could lead to martial law and a controlled election. Webb also mentions the involvement of Israeli intelligence and the push for a regulated internet and digital currency. She urges people to pay attention to these developments and be aware of the Orwellian solutions being proposed.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum plans a catastrophic grid outage to reset the US before the election, aiming to disconnect the public from the Internet and create chaos. The elite, including CrowdStrike and Microsoft, are behind this cyberattack. The elites are also targeting food and water supplies, pushing for a cashless society and control over what people can buy. The globalist agenda includes a digital prison, mandatory digital IDs, and CBDCs. The elites are experimenting with controlling humanity through crises like COVID and a water crisis. It's crucial to spread awareness and resist their totalitarian plans.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the possibility of a cyber pandemic and references the World Economic Forum's prediction about it. They mention the Forum's previous accurate prediction of the coronavirus pandemic and suggest that it may be worth paying attention to their future predictions. The speaker explains that the cyber pandemic would involve a bug sweeping through the Internet, similar to a computer virus, and the potential need to shut down the Internet and power grid to prevent its spread.

Video Saved From X

reSee.it Video Transcript AI Summary
Amanda meets someone who warns her about the patterns governing the world and the impending danger. They discuss the infiltration of critical US services by hackers affiliated with China's People's Liberation Army. The goal seems to be to create chaos in logistical systems and collect information that could be weaponized in a conflict. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and oil and gas pipelines. The Chinese cyber army aims to disrupt or destroy critical infrastructure to prevent US power projection into Asia and cause societal chaos.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
The US financial and banking system is in a bad state, and there is a concern about a future cyber attack. The big banks and intelligence agencies want to avoid blame for any collapse. WikiLeaks revealed that intelligence agencies can place the fingerprints of any nation or group in a cyber attack, allowing them to conduct false flag operations. The WEF Partnership Against Cybercrime wants a regulated internet tied to a digital ID, giving intelligence agencies access to people's online activities. They aim to manufacture consent through fear and panic by creating a major disruption caused by anonymous hackers. Israeli, British, and US intelligence agencies, along with major banks and tech companies, are involved in this agenda. The group also seeks to fuse banking, regulatory, and intelligence operations under the pretext of cybersecurity.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker ties a series of events to a ritual pattern, referencing theProject for the New American Century and arguing that support for its plans overseas would require a new Pearl Harbor, a claim linked to warnings a year before 9/11. They cite the World Economic Forum and Bill Gates’ Event 2010 simulating a pandemic out of China “just six weeks before the footage started appearing of bodies dropping in Wuhan.” They assert that such patterns are intentional signals, and that massive cyber attack drills and Klaus Schwab’s expressed fears of a coming cyber pandemic were steps toward that direction. They note that in December Israel hosted a cyber pandemic drill, and “on Monday just twelve weeks later their government was attacked in what they say was the largest ever cyber attack on the country.” Given Israel’s “infamous hacking capabilities,” the speaker suggests it feels like a controlled vulnerability, a way to create a plausible escape while the detective won’t suspect involvement in the metaphorical murder. The speaker argues that chess pieces are being moved in both Russia and Ukraine to bring about a scenario where “the world we once knew is gone,” destroyed, and a “new world, a world of their design, will emerge.” They claim a future in which “you’ll own nothing, and you’ll be happy, happy in your complete submission.” They invoke a historical allegory, “Like Xerxes to Leonidas,” to describe the perceived power struggle behind these actions.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the topic of cyber warfare and highlights various incidents involving Iranian and Russian hackers. They mention a book written by Nicole Pearl Ross, a former New York Times reporter on cybercrime, which provides insights into the history and vulnerabilities of cyber warfare. The speaker emphasizes the potential consequences of cyber attacks on critical infrastructure, such as power grids, dams, and nuclear plants. They argue that the US is particularly vulnerable to such attacks and suggests that cyber warfare will play a significant role in future conflicts. The speaker encourages viewers to read the book for a deeper understanding of the subject.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum's history is not as it seems. Klaus Schwab, the founder, had a team of influential Americans, including Henry Kissinger, working behind the scenes. These individuals were part of the Council on Foreign Relations and had ties to the CIA. They played a significant role in shaping the organization and its goals. Schwab's connections with these powerful figures helped him establish the World Economic Forum and push for global domination. The forum aimed to unite Europe and America and eventually create a new world order. Schwab's vision aligns with the predictions made by Herman Kahn in the 1960s. However, this technocratic movement faces opposition from those who value national identity and freedom.

Unlimited Hangout

The Pre-Planned Chaos of the 2020 Election with Charlie Robinson
Guests: Charlie Robinson
reSee.it Podcast Summary
Whitney Webb and Charlie Robinson discuss predictions of chaos around the 2020 U.S. presidential election and how intelligence-linked simulations anticipated turmoil long before the coronavirus crisis, with outcomes ranging from a constitutional crisis to martial law. They point to simulations produced by networks tied to former Bush or Obama officials, neocon think tanks like PNAC, and allied groups. They argue these drills are not mere “war games” but part of a toolkit that maps possible futures, and note a pattern of simulations preceding major events such as 9/11, the anthrax attacks, London’s bombings, and the coronavirus crisis. Two organizations created around March are highlighted: the Transition Integrity Project and the National Task Force on Election Crises. The Transition Integrity Project’s cofounder Rosa Brooks is described as an Obama-era DOD and Hillary Clinton State Department adviser, previously special counsel to the president of George Soros’ Open Society Foundations, and affiliated with the New America Think Tank, funded by Eric Schmidt, the Gates Foundation, Pierre Omidyar, Jeff Skoll, Reid Hoffman, and Craig Newmark. The other cofounder, Nils Gilman, is vice president of programs for the Berggruen Institute, which envisions a transnational network addressing AI and gene editing. Membership overlaps exist across both groups, including Michael Chertoff, Max Boot, David Fromm, Bill Crystal, John Podesta, Robert Gates, and Larry Wilkerson, with Wilkerson being a prominent public figure in both efforts. The groups’ membership is not fully public, but various reports note their overlap and the presence of PNAC-linked figures. The groups reportedly gamed four election scenarios: ambiguous results, a Biden victory, a Trump victory, and a narrow Biden win. A particularly striking hypothetical under a clear Trump win describes the Biden campaign encouraging Cascadia—California, Oregon, and Washington—to secede unless Republicans agreed to reforms such as granting statehood to Washington, D.C., and Puerto Rico; dividing California into five states; mandating Supreme Court retirements at 70; and eliminating the Electoral College. The scenario then envisions Congress awarding the presidency to Biden, with Pence and Republicans resisting, leading to a constitutional crisis in which the military’s role remains unclear. The discussion emphasizes that the people behind these simulations—like PNAC alumni—“are not Nostradamus” but seek to shape outcomes by prefiguring them. The conversation also covers how some involved openly support Biden, and how the campaigns leverage narratives of democracy threats. Hillary Clinton’s recent remarks about not conceding are juxtaposed with the TIP projections. They discuss campaign energy differentials, the debate dynamics, and the perception that Biden’s team seeks stability and predictability, while Trump’s unpredictability complicates control. They examine cyber and foreign interference narratives. Cybereason, an Israeli-founded cybersecurity firm with Unit 8200 ties, has major investors such as Lockheed Martin and Microsoft-linked entities; its founder served in Israeli intelligence. Cybereason’s work, and broader CTI League efforts, are cited as manifesting the external dimension of election security narratives. The discussion critiques media and political elites who promote foreign-interference threats while overlapping with pro-Israel intelligence circles. They argue these dynamics intersect with broader agendas, including AI governance and the World Economic Forum’s Great Reset, suggesting a convergence of technocratic power, media narratives, and political operatives aimed at managing or engineering political outcomes. They close by signaling ongoing reporting on these themes, highlighting the need to recognize the pattern of simulations, prepositioning, and narratives intended to normalize drastic interventions around elections, including potential continuity-of-government scenarios.
View Full Interactive Feed