TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
American students on US campuses are working for Israeli intelligence, reporting back on what they see and hear. They use fake social media accounts to gather information and receive instructions. This raises concerns about foreign operatives infiltrating universities. It's important for Americans to reflect on this situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The Washington Post reveals that China's cyber army has targeted various sectors, including Texas's power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency warns that these attempts are part of China's strategy to disrupt or destroy critical infrastructure in the event of a conflict, either to hinder US power projection in Asia or to create societal chaos. Over the past year, hackers affiliated with the People's Liberation Army have breached the computer systems of around 24 critical entities.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Washington Post's report suggests that China's cyber army aims to disrupt or destroy this infrastructure in the event of a conflict, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the People's Liberation Army have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss a view of a connected “control grid” and the role of financier networks in enabling wider geopolitical and technological infrastructures. They claim that Epstein was financing and networking across multiple parts of this system, with money allegedly laundered to support various components of what they describe as the control grid. They assert that in the digital control grid, including infrastructure and software such as Palantir or crypto and programmable money, Epstein was steadily financing and networking the entire infrastructure needed to operate in both Gaza and America. They further argue that the control exercised by New York Fed member banks—whether as depository for the government, managing the exchange stabilization fund, or handling money transfers into and out of the country—means that entities like Mossad in Israel cannot act independently without the cooperation of the New York Fed member banks and, therefore, the CIA. In their view, the infrastructure is governed by the “US empire,” implying that independent operations by Mossad are not possible without alignment with these American financial and intelligence institutions. Speaker 1 adds that Gaza appears to be increasingly like a beta rollout for technology and killing technology being developed by Silicon Valley. This framing ties the deployment of deadly technologies to a broader trajectory of innovation in Silicon Valley, as interpreted by the speakers.

Video Saved From X

reSee.it Video Transcript AI Summary
Authentix, an Israeli verification company with ties to controversial Israeli cyber firms, has a history of military surveillance. Its parent company, ICTS International, has been linked to security lapses at airports, including 9/11. Authentix uses facial recognition technology developed by Unit 8200 for espionage. Concerns arise over data security and ethical practices of these companies.

Video Saved From X

reSee.it Video Transcript AI Summary
An Israeli intelligence-founded company, First Health Infrastructure, partnered with CISA to protect critical infrastructure in the US, including hospitals, dams, water systems, and nuclear reactors. This foreign entity's access to vital American systems raises concerns about national security and the extent of Israeli influence.

Video Saved From X

reSee.it Video Transcript AI Summary
I discovered the CIA's involvement in vaccine production while researching Pfizer. Notably, the CEO of In-Q-Tel, the CIA's investment group, is on the board of Resilience, a biotech company that partnered with Moderna. Resilience has received significant government funding and has ties to various high-profile investors. Key figures like Bob Nelson and Luciana Borio, who have connections to the intelligence community and the FDA, are involved with Resilience. During Operation Warp Speed, Moderna collaborated with this newly formed company, which aims to innovate biomanufacturing and develop gene therapies and vaccines. The connections between these organizations and individuals raise questions about the intertwining of intelligence, big pharma, and government interests in public health initiatives.

Video Saved From X

reSee.it Video Transcript AI Summary
US investigators suspect that some of the approximately 60 Israelis detained in connection with the September 11th terrorism investigation were spying on Arabs in the country. There are concerns that these Israeli agents may have had information about the planned terrorist attacks that was not shared. A private communications company called Amdocs, which has contracts with major phone companies in America, is believed to have played a role in this. Amdocs generates records of phone calls made in the US, making it difficult to make a call without leaving a trace. The company has been investigated by the FBI multiple times but denies any security breaches.

Video Saved From X

reSee.it Video Transcript AI Summary
Sensitive information regarding call records in the United States, including details of who is calling whom and when, has been found to be accessible to foreign entities, particularly in Israel. Amdocs, a company that generates call records, has been identified as a potential source of this breach. While Amdocs claims its data is secure, concerns have been raised about the possibility of it falling into the wrong hands, such as organized crime. The NSA has held classified conferences to warn the FBI and CIA about the potential risks associated with Amdocs records. Previous incidents, like a 1997 drug trafficking case in Los Angeles, have demonstrated the compromising nature of such breaches.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially causing chaos and affecting decision-making. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
American students on US college campuses are working for Israeli intelligence, sending information back. They use fake Facebook accounts to monitor SJP groups. This raises concerns about foreign operatives infiltrating universities. Americans should reflect on the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
I worked as a travel nurse at a hospital specializing in organ transplants. I learned that many Israeli citizens come to the US for healthcare if they can't get the treatment they need in Israel. They receive organs from US donors. I suspect some Israelis may be getting preferential treatment on the transplant waitlist.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The World Economic Forum Partnership Against Cybercrime seeks a regulated internet and a digital ID tied to internet access. The goal is to eliminate online anonymity and privacy. The CTI League, a cybersecurity group, has access to critical US infrastructure, including hospitals, dams, and nuclear reactors. The group's main focus is protecting critical infrastructure, but its affiliation with foreign intelligence agencies raises concerns. The possibility of a false flag operation to blame Iran and justify military action is alarming. The CTI League's partnership with CISA, an agency under DHS, allows access to critical systems without proper vetting. The Israeli government's involvement in cybersecurity companies like Clear Sky and Cyber Reason further complicates the situation. The potential for a US cyber attack on Iran is a long-standing goal for Israeli intelligence.

Video Saved From X

reSee.it Video Transcript AI Summary
Britain's ties to Israel are deep, with Israeli companies controlling key UK functions like intelligence and police services. Israeli influence extends to companies like Cellebrite and NICE Systems used by British police and the Foreign Office. The UK Israel Tech Hub, funded by British taxpayers, facilitates Israeli tech companies' takeover of public sector contracts. Larry Ellison's Oracle stores UK data, while Israeli businessman Patrick Drahi's stake in British Telecom raises national security concerns. The trilateral security state of the US, Israel, and Britain compromises British sovereignty. Pushback is needed, with alternative media platforms like Double Down News playing a crucial role. Support for such platforms is essential.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The forum seeks a regulated internet tied to a digital ID, allowing intelligence agencies to monitor online activity. The CTI League, a cybersecurity group, has access to critical US infrastructure and is affiliated with Israeli intelligence. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League's role in protecting critical infrastructure raises questions about foreign access to US systems.

Video Saved From X

reSee.it Video Transcript AI Summary
China's cyber army has been infiltrating critical US services as part of a broader effort to create chaos in logistical systems. The information obtained could be weaponized in the event of a conflict between the US and China in the Pacific. The Washington Post reports that targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency confirms that China is attempting to compromise critical infrastructure to disrupt or destroy it during a conflict. Hackers affiliated with China's People's Liberation Army have accessed the computer systems of around 24 critical entities in the past year.

Video Saved From X

reSee.it Video Transcript AI Summary
The US unconditionally supports Israel with weapons, money, and diplomatic backing, unlike any other country relationship. This support is not solely strategic but driven by the powerful Israel lobby influencing US foreign policy to benefit Israel. The lobby's success in ensuring unwavering US support for Israel is remarkable.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the extensive reach of the CIA, stating that it has infiltrated various institutions and surveils American citizens. They explain that the CIA uses a branch called In-Q-Tel to form partnerships with corporations, offering them funding in exchange for creating specific technologies. By signing agreements with the CIA, these corporations give the agency control over their operations. The speaker highlights that the CIA has gained control over many Silicon Valley companies, including Google, which received funding from the agency.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The British security agencies use phone and cloud hacking services provided by the Israeli tech company, Celebreit. The company is led by Dana Goethe, an alumni of Unit 8200 in the Israeli military, known for surveillance and blackmailing Palestinians. Celebreit is staffed with former Israeli military and intelligence personnel. The concerning part is that Celebreit claims to remotely control all its devices, suggesting they have access to information obtained by the British security services.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, either to prevent American power projection in Asia or to cause chaos within the US. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
On October 7th, Israel experienced a major intelligence failure, which the speaker attributes to the destruction of the Israeli cybersecurity industry. The speaker claims that the Biden administration, along with Israeli politicians Ehud Barak, Benny Gantz, and Yair Lapid, worked together to favor a company called Paragon and snuff out its competitors. This resulted in a significant intelligence blind spot for Israel. The speaker also discusses protests in Israel against judicial reform and the perceived snobbery of the Supreme Court. The speaker suggests that these events are connected and criticizes the actions of the Biden administration.

Unlimited Hangout

The Pre-Planned Chaos of the 2020 Election with Charlie Robinson
Guests: Charlie Robinson
reSee.it Podcast Summary
Whitney Webb and Charlie Robinson discuss predictions of chaos around the 2020 U.S. presidential election and how intelligence-linked simulations anticipated turmoil long before the coronavirus crisis, with outcomes ranging from a constitutional crisis to martial law. They point to simulations produced by networks tied to former Bush or Obama officials, neocon think tanks like PNAC, and allied groups. They argue these drills are not mere “war games” but part of a toolkit that maps possible futures, and note a pattern of simulations preceding major events such as 9/11, the anthrax attacks, London’s bombings, and the coronavirus crisis. Two organizations created around March are highlighted: the Transition Integrity Project and the National Task Force on Election Crises. The Transition Integrity Project’s cofounder Rosa Brooks is described as an Obama-era DOD and Hillary Clinton State Department adviser, previously special counsel to the president of George Soros’ Open Society Foundations, and affiliated with the New America Think Tank, funded by Eric Schmidt, the Gates Foundation, Pierre Omidyar, Jeff Skoll, Reid Hoffman, and Craig Newmark. The other cofounder, Nils Gilman, is vice president of programs for the Berggruen Institute, which envisions a transnational network addressing AI and gene editing. Membership overlaps exist across both groups, including Michael Chertoff, Max Boot, David Fromm, Bill Crystal, John Podesta, Robert Gates, and Larry Wilkerson, with Wilkerson being a prominent public figure in both efforts. The groups’ membership is not fully public, but various reports note their overlap and the presence of PNAC-linked figures. The groups reportedly gamed four election scenarios: ambiguous results, a Biden victory, a Trump victory, and a narrow Biden win. A particularly striking hypothetical under a clear Trump win describes the Biden campaign encouraging Cascadia—California, Oregon, and Washington—to secede unless Republicans agreed to reforms such as granting statehood to Washington, D.C., and Puerto Rico; dividing California into five states; mandating Supreme Court retirements at 70; and eliminating the Electoral College. The scenario then envisions Congress awarding the presidency to Biden, with Pence and Republicans resisting, leading to a constitutional crisis in which the military’s role remains unclear. The discussion emphasizes that the people behind these simulations—like PNAC alumni—“are not Nostradamus” but seek to shape outcomes by prefiguring them. The conversation also covers how some involved openly support Biden, and how the campaigns leverage narratives of democracy threats. Hillary Clinton’s recent remarks about not conceding are juxtaposed with the TIP projections. They discuss campaign energy differentials, the debate dynamics, and the perception that Biden’s team seeks stability and predictability, while Trump’s unpredictability complicates control. They examine cyber and foreign interference narratives. Cybereason, an Israeli-founded cybersecurity firm with Unit 8200 ties, has major investors such as Lockheed Martin and Microsoft-linked entities; its founder served in Israeli intelligence. Cybereason’s work, and broader CTI League efforts, are cited as manifesting the external dimension of election security narratives. The discussion critiques media and political elites who promote foreign-interference threats while overlapping with pro-Israel intelligence circles. They argue these dynamics intersect with broader agendas, including AI governance and the World Economic Forum’s Great Reset, suggesting a convergence of technocratic power, media narratives, and political operatives aimed at managing or engineering political outcomes. They close by signaling ongoing reporting on these themes, highlighting the need to recognize the pattern of simulations, prepositioning, and narratives intended to normalize drastic interventions around elections, including potential continuity-of-government scenarios.
View Full Interactive Feed