TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Charles (Speaker 0) and Mario (Speaker 1) discuss a wide range of intelligence topics, personal history, and contemporary covert operations, emphasizing experiences from the CIA and reflections on global security dynamics. Charles begins by outlining his background: growing up on a farm in Ohio, enlisting in the Navy as a law enforcement specialist at 17, studying East Asian languages and Mandarin, and eventually learning Persian. He joined the CIA in July 2001 as an operations officer, spending most of his career in the Middle East with stints in Europe and Asia, and leaving the CIA in 2019. Afterward, he worked at Tesla to set up an insider threat program and manage global information security investigations. He notes extensive experience with China, Russia, Israel, France, and South Korea, and emphasizes the prevalence of intellectual property theft and proprietary-systems concerns in the private sector, including the role of motivated individuals and cross-border actors seeking to commercialize advanced technology. The conversation turns to leadership targeting and decapitation concepts. Charles references how the Iraq War began with an attempted decapitation strike at Saddam, asking whether removing a center of gravity leadership could end a conflict decisively and whether that would be humane. He discusses Iran as a persistent factor across the region, arguing that Iran’s meddling contributed to problems in Iraq, Lebanon, Syria, and Yemen, and that without Iranian involvement, upheaval might be less intense, though turmoil remains possible. Mario expresses fascination with intelligence capabilities, particularly related to Iran, Lebanon, Hezbollah, and Maduro, and asks about Charles’s CIA background and roles. Charles explains that his work involved recruiting individuals with access to foreign governments to commit espionage and provide secret information—“human operations.” He emphasizes the dramatic realism of espionage as two people engaging in a life-changing conversation, rather than high-action TV tropes. They discuss border crossings and the reality of intelligence work. Charles notes that the hardest border crossings were often returning to the United States, when travel appearances didn’t match and documents or identities could be scrutinized. He stresses the difference between romanticized espionage and the real tension of crossing borders with non-legitimate materials, relying on confidence, charisma, and interaction under stress. On private-sector and national-security crossover, Charles highlights the complexity of cyber threats and corporate espionage. He describes a Tesla case involving a Russian criminal organization attempting to install malware, with FBI involvement and the arrest of a Russian national. He explains that in cyber threats, the distinction between government-sponsored and private actors is often blurred, with organized crime sometimes acting as proxies for larger state agendas. He notes that entrepreneurial actors seek to accelerate development by acquiring others’ material, not building entire systems from scratch. He also comments on the blurry boundary between nation-states and private actors in tech espionage and the difficulty of attributing responsibility. The Mossad’s capabilities are analyzed in depth. Charles argues Mossad excels by focusing on high-impact targets within a narrow geopolitical scope (Lebanon, Syria, Iran, Iraq) and by strong locational intelligence—understanding where leaders live, work, and their access points. He emphasizes Mossad’s willingness to act decisively, using surrogates and superior technology for surveillance. He mentions the head of Mossad and a quote from his book about ubiquitous surveillance through devices like phones and watches. He notes the “pager operation” against Hezbollah as a case study in supply-chain manipulation and the use of compromised intermediaries, and he cautions that modern operations involve cyber manipulation and near-constant information-flow considerations. Both discuss real-world operations, including the 2010 Dubai operation targeting a Hamas logistics figure, and general lessons about operational security, noting that some details cannot be disclosed publicly. They reflect on the “gentleman’s rules of the game,” acknowledging that lethal operations and leadership-targeting can be controversial and legally complex; they discuss how different regimes and leaders are perceived and targeted. The Maduro operation is revisited. Charles describes gathering information through satellites, drones (including covert, stealth, and micro-drones), and human intelligence; he stresses determining a target’s pattern of life, where a leader lives, sleeps, moves, whom they meet, and what they eat. He notes that insider sources and the right informants are critical, and he discusses the balance between opportunities created by regime instability and the risk of compromised sources. He emphasizes that in times of turmoil, there is opportunistic recruitment, as some individuals see few options other than cooperating with outside powers. Privacy is a recurring theme. Charles asserts that privacy is not dead but requires effort to protect. He compares privacy to fitness, arguing that modern technologies make it easy to be public, but steps can be taken to reduce attack surfaces, including privacy consulting, careful metadata handling, and secure, layered security (physical security and cyber measures). He uses anecdotes about Strava revealing location data and a submarine commander whose Strava activity was linked to his demise, illustrating how personal data can reveal sensitive information. Towards the end, Mario and Charles discuss strategic ambiguity and unpredictability in political leadership, including Trump’s posture and international signaling. They touch on the potential paths for Iran if regime change occurs, debating the likelihood and consequences of upheaval, the role of Western policy, and how regional dynamics might shift if the mullahs and IRGC structures are altered. The conversation ends with mutual appreciation for the complexity of global security issues and the rapid pace of geopolitical change.

Video Saved From X

reSee.it Video Transcript AI Summary
This is Gabriel, not his real name or voice. In 2022, he and his team started developing the second phase of the operation, the booby trapped pagers. He found out that Hezbollah was buying pagers from this company in Taiwan called Gold Apollo. This is the pager that Hezbollah was using. So it's very sleek, it's very shiny, and it certainly can fit in a pocket. So what did you do to change this to make it into a bomb?

Video Saved From X

reSee.it Video Transcript AI Summary
Hezbollah was convinced to purchase the product without realizing it was from Israel. We utilize a complex network of foreign shell companies that obscure the origin of the goods. This allows us to manipulate the supply chain to our advantage. We create an elaborate facade, positioning ourselves as a global production company. We write the narrative, direct the actions, and play the leading roles. Essentially, we craft a fictional world where we control the story.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This was a long planned operation. We went in there, and this was timed when president Trump and Benjamin Netanyahu met at Mar A Lago on the December 28. That's when this was all done, and it was intentional thing. We crashed their economy. We debased their currency so that then they they crashed in the banks, took their dollars as I understand it for the intent purpose of crashing their making their their real worth nothing. And so that means people can't buy enough food. They can't pay their bills, all those kinds of things. That was our express intent and desire and operation. And he even said so that the people would rise up and protest. And then when they did, then we had according to Mike Pompeo, he said he said that the at least the Mossad was actually on the ground there. You may have seen, this this post he made. Happy New Year to every Iranian in the streets. Also, every Mossad agent walking beside them. He said on our next post that evening. So he's flat out saying it is. Apparently, Israeli press openly admitted the same thing. So you can imagine that possibly m I six, the CIA, I can't imagine that that Mossad would have been doing this by themselves, especially when you see Bessen talking about how our economic, coercion was at work there. I'm sure that we were also on the street. You know, you've seen that 40,000 Starlink satellite terminals were were discovered. So we had been sending in arms, weapons, ammunition, intel communications devices, etcetera, Mossad agents, probably CIMS six, all trying to stir this up.

Video Saved From X

reSee.it Video Transcript AI Summary
Israel's entire military plan was leaked, including highly confidential information about how they're going to fight, where they're going to fight, and where they're going to go. The leak was possibly from the defense department or somebody. Authorities have no idea who did it. The speaker suggests that whoever leaked the information is the enemy, possibly the enemy from within.

Video Saved From X

reSee.it Video Transcript AI Summary
We have an incredible array of possibilities of creating foreign companies that have no weight being traced back to Israel. Shell companies over shell companies who affect the supply chain to our favor. We create a pretend world. We are a global production company. We write the screenplay. We're the directors. We're the producers. We're the main actors. The world is our stage. This is Mossad's old office. Its motto from Proverbs twenty four six says in so many words, wage war through deception and trickery, kinda like the CIA smoke and mirrors, which is what this operation was all about.

Video Saved From X

reSee.it Video Transcript AI Summary
Hamas's cameraman reveals their tactics in the war in Gaza. Despite having uniforms, they deliberately fight in civilian clothes to exploit the IDF's efforts to avoid civilian casualties. This allows Hamas to label their combatants as civilian deaths caused by Israel. It's a despicable tactic used by terrorists to protect themselves at the expense of innocent civilians.

Video Saved From X

reSee.it Video Transcript AI Summary
Israel can create foreign companies that cannot be traced back to Israel. This involves shell companies layered over shell companies to manipulate the supply chain. They create a "pretend world" where they act as a global production company, writing the screenplay, directing, producing, and acting. According to the speaker, "the world is our stage."

Video Saved From X

reSee.it Video Transcript AI Summary
The US labels Hezbollah as a terrorist organization, but this term is often used by powerful nations to condemn violence they disagree with. The US supported Israel's invasions and occupation of Southern Lebanon, and Hezbollah played a key role in driving them out. This is why they are considered terrorists. The United States and Europe have the ability to manipulate the narrative, making it seem like Hamas's policies are the problem, rather than the more extreme policies of the US and Israel. It's important to note that in their case, actions speak louder than words.

Video Saved From X

reSee.it Video Transcript AI Summary
On February 2025, Pam Bondi, on her first day as attorney general, disbands the Foreign Influence Task Force, the DOJ office responsible for enforcing FARA (Foreign Agents Registration Act). The change explicitly limits DOJ prosecutors from criminally charging individuals involved in public relations work and policy advocacy on behalf of foreign businesses and nonprofits. This move is described as an incapacitation of the enforcement mechanism, effectively giving a green light to foreign influence operatives and enabling the Knesset’s 2018 plan to skirt FARA to proceed with minimal risk of prosecution. The memo cited (attributed to Pam Bondi) is noted as containing this and other points, with Gen X Girl highlighted as having noticed this aspect. The memo directs shifting resources in the National Security Division to address more pressing priorities and to end risks of further weaponization and abuses of prosecutorial discretion. As a result, the foreign influence task force is to be disbanded. Recourse to criminal charges under FARA and 18 U.S.C. 951 is to be limited to instances of alleged conduct similar to traditional espionage by foreign government actors. The counterintelligence and export control section, including the FARA unit, is to focus on civil enforcement, regulatory initiatives, and public guidance. The implication is that there would be no more FARA enforcement unless it resembles espionage activity. The discussion then shifts to Havas Media Group, described as part of a complex web of companies and subsidiaries involving shell companies and LLCs that funnel money from the top down, primarily from Israel, to social media influencers, propaganda campaigns, and digital campaigns. This network is framed as enabling plausible deniability for the Israeli government. With the FARA enforcement landscape opened up by Bondi’s changes, the argument is that rather than the Israeli government paying directly for influence campaigns, it would pay through intermediaries—NGOs, nonprofits, foundations, LLCs—around the world, which would then target Americans with propaganda. The broader context notes a surrounding environment in which new organizations have proliferated, money has flowed more freely, and influencers have received compensation and embarked on trips with talking points. Additional related points include mentions of Israel’s concerns about FARA rules and how campaigns might be structured to avoid registration, and a claim that there was a prior focus on how to skirt FARA regulations. The narrative concludes by tying Bondi’s actions to a surge in new organizations, money, and influencer activity following the disbanding of the foreign influence enforcement framework.

Video Saved From X

reSee.it Video Transcript AI Summary
- Speaker 0: Since Israel began strikes on Gaza after Hamas’ surprise attack on October 7, it has targeted residential buildings. The UN says nearly 200,000 structures have been destroyed or damaged. With so many fleeing attacks, Palestinians packed into makeshift shelters, many of them UN run schools, but they were not safe. More than 1,000 schools have been bombed, and Israel has destroyed most of Gaza's hospitals, including Al Shifa, where more than 400 Palestinians were killed in a raid in March 2024. - Speaker 1: We make the best weapons in the world, and we’ve got a lot of them. And we’ve given a lot to Israel, frankly. And I mean, Bibi would call me so many times, can you get me this weapon, that weapon, that weapon. Some of them I never heard of, baby, and I made them. But we’d get them here, wouldn’t we? And they are the best. They are the best. And you but you used them well. It also takes people that know how to use them, and you obviously used them very well. But so many that Israel became strong and powerful, which ultimately led to peace. That’s what led to peace. So as we celebrate today, let us remember how this nightmare of depravity and death all began. - Speaker 2: In 1948, when the land of Palestine was officially stolen and given to a group of rabid Zionists who murdered over 10,000 Palestinians. This crime against humanity was decided as early as 1917 with the Balfour Declaration, the British Crown, and Lord Rothschild of the Rothschild banking dynasty, otherwise known as the Bank of England, who when it’s all said and done, will have control over hundreds of billions of dollars worth of Palestinian oil and gas reserves. As Michael Roverero famously said, all wars are bankers’ wars. According to Benjamin Franklin, the primary catalyst for the American Revolution was the Bank of England’s Currency Act. After the revolution, a value based economy with no interest being paid to any central bank was created. But it didn’t last long. The first bank of the United States was chartered in 1791 and favored foreign stockholders over Americans. The charter ended in January 1811 followed by the war of eighteen twelve and the establishment of the second bank of the United States in 1816, which gave more power to the Bank of England. Andrew Jackson successfully killed the bank’s renewal and shortly after became the first US president targeted for assassination when Richard Lawrence drew pistols on him outside The US capital, but misfired. Laws were passed in the early eighteen sixties for the US government to issue its own currency in a value based economy as opposed to the debt based system imposed by central banks. According to an 1864 edition of the London Times, this would have made America the wealthiest nation of the world. The article warned that if a government creates its own money, it will be without debt. It will become prosperous without precedent in the history of the world and therefore must be destroyed. In 1865, president Lincoln was assassinated, and the economy was quickly phased back to the central bank’s debt enslavement model. In 1913, the tyrannical Federal Reserve Bank and federal income tax was born. The two world wars brought Germany under the heel of the central banking cartel. Western banking institutions financed the Bolshevik revolution. In 2000, Iraq stopped selling its oil and Federal Reserve notes. In 2003, Iraq was illegally invaded by The United States and dollar based oil sales were reinstated. In Libya, Muammar Gaddafi’s gold dinar currency was making the nation rich. In 2011, The US invaded and reverted Libya’s oil sales to dollars. The Bank for International Settlements recently proposed efforts under the guise of anti money laundering that would provide scores to tokens and digital wallets including stablecoins. Digital ID, social credit scores, and a carbon tax is what the bankers are up to now. And everything else is a distraction. Today’s war is mostly psychological, and it’s being waged upon you. Greg Reese reporting. The Reiss report is now fully funded by my Substack subscribers. Subscribe today and support my work at gregreiss.substack.com.

Video Saved From X

reSee.it Video Transcript AI Summary
A global production company creates a pretend world where they write the screenplay, direct, produce, and act as the main actors. The world is their stage. This is Mossad's old office. Its motto, derived from Proverbs twenty four six, advises waging war through deception and trickery.

Video Saved From X

reSee.it Video Transcript AI Summary
Israel fights wars quickly due to international pressures that force conflicts to end within weeks. According to Speaker 1, decisive victories must be achieved rapidly because the "clock is ticking." Speaker 1 clarifies that the conflict isn't between Israel and Hezbollah, but between Israel and Iran. Speaker 1 asserts that Hezbollah is essentially a forward unit of the Iranian army. They claim Hezbollah was trained by the Iranian army on Iranian soil, using Iranian weapons and tactics, and that their long-range weapons are controlled by Iranian officers. Therefore, discussions about Hezbollah are really about understanding Iran's objectives.

Video Saved From X

reSee.it Video Transcript AI Summary
I believe the Ukrainian military is selling NATO weapons on the black market to groups like Mexican drug cartels, the Taliban, and Hamas, which is incredibly destabilizing. This isn't just suspicion; I know someone who bought some of these weapons. Ukraine is corrupt, and it's not far-fetched to think they'd sell weapons, especially facing defeat. I know this is true, even though I can't reveal my source. I'm telling you, the Ukrainian military has sold huge amounts of American and NATO-supplied weapon systems around the world, and they're being purchased by governments and armed groups. This will be documented, and I got this information directly from someone who purchased quite a few of those weapons in another country and knows a lot about this.

Video Saved From X

reSee.it Video Transcript AI Summary
Jews are accused of using deceptive tactics to achieve their political goals. They allegedly manipulate situations by creating false narratives and dialectics. Instead of openly advocating for war or the genocide of Palestinians, they manufacture fake terrorist attacks and portray themselves as victims. This supposedly prompts the United States to fight their wars. The speaker claims that Jews tricked Americans with events like 9/11 and manipulated the situation to their advantage.

Video Saved From X

reSee.it Video Transcript AI Summary
Americans, be aware. There is a potential war with Arabs and the Muslim world looming. However, it is important to note that the blame for any terrible event should not be solely placed on Muslims. The Israeli Mossad, known for their cunning and ruthlessness, could potentially carry out attacks on Americans, making it appear as if Arabs were responsible. This is referred to as a false flag, and it is not just a conspiracy theory. In fact, a US army report, released the day before 9/11, warned about Israel's capabilities. Feel free to criticize me, but these are the facts presented by the US army.

Video Saved From X

reSee.it Video Transcript AI Summary
Americans are being misled into a war with the Muslim world, blaming them for attacks actually carried out by the Israeli Mossad. This was warned in a US army report the day before 9/11, revealing Israel's capabilities. It's a false flag operation, not a conspiracy theory. Wake up to the truth.

Video Saved From X

reSee.it Video Transcript AI Summary
Clayton discusses with Kevin Ship, a former CIA officer and author of Twilight of the Shadow Government, how false flags allegedly unfold and why they persist in public discourse. Key points: - False flags are planned for months in advance. Kevin suggests that covert operations typically identify a single boogeyman to avoid implying a broader conspiracy, arguing that a lone perpetrator allows authorities to claim “we got him” and deny wider conspiracy. - The pattern cited includes one individual who previously showed no criminal tendencies, who then commits a violent act, followed by quick attribution to a designated boogeyman, with the implication that the operation is over and left without further inquiry. - Specific incidents discussed include the Bondi Beach attack in Australia, with references to Mossad’s involvement and claims that Iran is behind the attack to push for war with Iran. The exchange questions the Australian government’s role and the relevance of Mossad’s presence in investigating the incident. - The conversation links these operations to broader intelligence ecosystem dynamics, noting a close collaboration and “frenemies” relationship between the CIA and Mossad. They describe Mossad as having a pervasive role in Middle East intelligence and describe a history of interactions where Mossad and the CIA share high-level information and sometimes operate in tandem, though at times Mossad may target the CIA as well. - The discussion points to prior examples of disinformation, such as the 9/11 events, where perceptions of evidence (e.g., a passport found near the World Trade Center) are presented as straightforward proof, while being described as an example of ineffective or misused disinformation to shape public belief. - In addressing media influence, Kevin references the CIA’s media liaison office and programs designed to influence how news is presented in the United States. He contends that “Mockingbird”-like media consolidation and complicit outlets help propagate these narratives, especially to audiences that rely primarily on television news. - The conversation notes a perceived pattern of actors or individuals appearing at multiple, unrelated events (e.g., a person claiming responsibility or being present at various incidents) as part of the alleged orchestration of false flag narratives. - They discuss the effectiveness of false flags: despite growing scrutiny and critical reporting, they argue that false flags continue to influence public perception, aided by psychological studies within intelligence communities and the reliance of many viewers on mainstream media for information. - Kevin reiterates his belief that the shadow government—particularly the CIA’s control of elected government and media propaganda programs—remains powerful, with ongoing operations designed to manipulate thinking and push narratives that serve certain geopolitical aims. He emphasizes that false flags are a recurring tactic and predict more of them in the future. - The conversation closes with Kevin urging readers to consider his book Twilight of the Shadow Government and to engage with his perspective on the CIA’s influence over media, politics, and public belief.

Video Saved From X

reSee.it Video Transcript AI Summary
We convinced Hezbollah to buy from us by ensuring they had no idea they were buying from Israel. We have an incredible ability to create foreign companies that can't be traced back to Israel, using shell companies stacked upon shell companies to control the supply chain in our favor. We essentially create a fictional world. We act as a global production company, crafting the screenplay, directing, producing, and playing the leading roles. The world is our stage.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 reports that while attention was on US aircraft carriers, China quietly broke the air blockade in Asia over the past forty-eight hours. The claim is that 16 Chinese Y-20 military cargo planes took off, then vanished from radar, turning their transponders off and flying completely dark. Their destination is stated as Iran. According to multiple intel sources cited in the transcript, what these planes carried was not food or humanitarian aid but advanced electronic warfare systems. The systems are described as the kind built to blind US carrier-based F-35 jets. The assertion is that China may have provided Iran with technology to jam American aircraft right in the middle of the Persian Gulf standoff. The sequence is summarized as: 16 aircraft, zero radio signals, and a full airborne supply chain delivered under America’s nose. The transcript emphasizes the supposed significance of this development, suggesting that if true, the balance of power over the Middle East could have shifted without widespread notice. The final framing centers on the potential implications: the real question posed is what action the United States will take next, given the alleged delivery of electronic warfare capability to Iran and the covert nature of the operation. The account stresses that this development allegedly occurred while global attention was focused on US aircraft carriers, implying it represents a strategic surprise with potentially far-reaching consequences for regional and global security dynamics.

Video Saved From X

reSee.it Video Transcript AI Summary
"How did you convince Hezbollah to buy this? Well, obviously they didn't know that they were buying it from Israel. Who did they buy it from? Or think they were buying it from? We have an incredible array of possibilities of creating foreign companies that have no weight being traced back to Israel. Shell companies over shell companies who affect the supply chain to our favor. We create a pretend world. We are a global production company. We write the screenplay. We're the directors. We're the producers. We're the main actors. The world is our stage."

Video Saved From X

reSee.it Video Transcript AI Summary
Americans, beware of being drawn into a war with Arabs by the Israeli Mossad, who can stage attacks to blame Muslims. This is known as a false flag, as detailed in a US army report released the day before 9/11. The report warned about Israel's tactics.

Video Saved From X

reSee.it Video Transcript AI Summary
Israel uses shell companies to sell products to Hezbollah without them knowing the origin. These companies are untraceable to Israel. Israel creates foreign companies stacked upon each other to control the supply chain. They construct a "pretend world" where they write the screenplay, direct, produce, and act, treating the world as their stage.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
A global production company creates a pretend world where they write the screenplay, direct, produce, and act as the main actors. The world is their stage. This is Mossad's old office. Its motto, taken from Proverbs twenty four six, is to wage war through deception and trickery.
View Full Interactive Feed