TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Recently, internal files from the Cyber Threat Intelligence League were released, revealing that US and UK military contractors were involved in censoring and using psychological operations and disinformation tactics against the American people. While some argue that social media platforms have the right to remove content that violates their terms of service, it is important to note that the government cannot encourage or promote actions that infringe upon freedom of speech. The whistleblower behind these files claims that the leader of the CTIL was present at the Obama White House in 2017, receiving instructions to counter disinformation and prevent a repeat of the events in 2016.

Video Saved From X

reSee.it Video Transcript AI Summary
Several members of Congress have discussed media literacy in connection to disinformation and misinformation. There is a need to figure out how to rein in the media environment to prevent the spewing of disinformation and misinformation. It is one thing to have differing opinions, but another to say things that are false. This is something that is being looked into.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 and Speaker 1 discuss government disinformation offices and transparency concerns. - CISA’s office of mis, dis, and malinformation (MDM) operated as a DHS unit focused on domestic threat actors, with archive details at cisa.gov/mdm. The office existed for two years, from 2021 to 2023, before being shut down and renamed after the foundation published a series of reports. - The disinformation governance board was formed around April 2022. The CISOs countering foreign influence task force, originally aimed at stopping Russian influence and repurposed to “stop Trump in the twenty twenty election,” changed its name to the office of mis, dis, and malinformation and shifted focus from foreign influence to 80% domestic, 20% foreign, one month before the twenty twenty election. - Speaker 1 argues that the information environment problems are largely domestic, suggesting an 80/20 focus on foreign vs domestic issues should be flipped. - A June 2022 Holly Senate committee link is highlighted, leading to a 31-page PDF that, as of now, represents the sum total of internal documents related to the office of mis, dis, and malinformation. The speaker questions why there is more transparency about the DHS MIS office from a whistleblower three years ago than in ten months of current executive power. - The speaker calls for comprehensive publication of internal files: every email, text, and correspondence from DHS MIS personnel, to be placed in a WikiLeaks/JFK-style publicly accessible database for forensic reconstruction of DHS actions during those years, to name and shame responsible individuals and prevent repetition. - The video also references George Soros state department cables published by WikiLeaks (from 2010), noting extensive transparency about the Open Society Foundations’ relationship with the state department fifteen years ago, compared to today. The claim is that Open Society Foundations’ activities through the state department, USAID, and the CIA were weaponized to influence domestic politics while remaining secret, with zero disclosures to this day. - Speaker questions why cooperative agreements from USAID with Open Society Foundation, Omidyar Network, or Gates Foundation have never been made public, nor quarterly or annual milestone reports, network details, or the actual scope of funded activities. USAID grant descriptions on usaspending.gov are often opaque or misleading compared to the true activities funded. - The speaker urges transparency across DHS, USAID, the State Department, CIA, ODNI, and related entities, asking for open files and for accountability. They stress the need to open these records now to inform the public and prevent recurrence, especially as mid-term political considerations loom.

Video Saved From X

reSee.it Video Transcript AI Summary
Presenting new ways to minimize misinformation and combat dangerous extremist views.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the lack of transparency in government actions, mentioning secretive partnerships and asymmetry of information. They question collaborations with China on sensitive research and criticize institutions like universities and newspapers for failing to provide accurate information to the public. The conversation highlights concerns about hidden agendas and power dynamics at play behind the scenes.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on a UK-created game designed to help people navigate gaming, the Internet, and extremism, with the stated goal of deradicalization and making individuals better members of society. The speakers note that the video in question does not actually reveal what it is about, leaving them unable to assess whether downloading or viewing it is a good idea. They discuss concerns that the video could be potentially dangerous or multilayered, including the possibility that it might act like a virus or spread extreme content. The discussion touches on alarming claims within the video, including the notion that the government is betraying white British people and a push to “take back control of our country.” The participants debate how Charlie should respond: options include scrolling past the content, finding more about the topic online, or engaging directly with the post. One speaker suggests looking up more information to verify whether the content is true. Charlie’s actions are described: rather than taking the content at face value, Charlie goes directly to the account’s website and encounters research papers, statistics, information about protests, and material about “the replacement of white people.” The dialogue highlights a warning embedded in the content: that by researching and seeking additional information, a person will become radicalized. The speakers push back on this claim, urging skepticism and emphasizing a need to stop and not rely on further research. There is a recurrent admonition to ignore one’s own perceptions and not to conduct further inquiry if the information conflicts with the intended narrative. The dialogue stresses a directive to shut off content that doesn’t align with the stated thinking and to report it immediately, labeling the situation as a real threat. The exchange includes provocative moments, such as expressions of disdain for the U.S. and a statement of “I love America. I am so glad that I don’t live in this country,” underscoring a contrasting sentiment within the discussion. Overall, the transcript portrays a debate over a government-sponsored deradicalization initiative framed as a game, the ambiguity of its content, and the tension between encouraging independent fact-finding and warning that such inquiry can itself be considered radicalization. It culminates in a claimed directive to avoid researching opposing viewpoints and to report dissonant content, described as “a real thing.”

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the objective of mitigating harmful misinformation that aims to weaken national security and delegitimize institutions, including democratic elections. Speaker 1 expresses concern about the potential censorship of speech that criticizes institutions, such as calling for a different president or questioning the actions of the Pentagon. Speaker 0 clarifies that the focus is on matters of national security that explicitly undermine American institutions, like content intended to suppress voting or delegitimize election results without evidence. Speaker 1 argues that this narrow focus still encompasses a wide range of speech. The creation of a center of excellence and a disinformation governance board is mentioned as potential measures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker questions if the media and courts are shaping false narratives to serve political agendas. They raise concerns about bias in the justice system and the manipulation of information by government-funded groups. The involvement of the chief justice in political narratives is seen as problematic.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the court disinformation project and the CIA's efforts to combat disinformation about the court system in Arizona. They mention that the outcome of court cases related to voter fraud will be crucial in the upcoming election. The speaker acknowledges the need for public education on court cases and voter fraud. They briefly mention a task force that will be in place until December 2020, implying that it is related to protecting judges during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a very quick briefing and discusses the credibility of the different things they've seen. They say, "these files were made up by the sea. They were made up by Obama. They were made" as a claim about the files’ origin, with the sentence trailing off in the transcript.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 opens by noting the Trump administration recently launched a cyber strategy amid the war with Iran and expresses concern that war often serves as a Trojan horse for expanding government power and eroding civil rights. He examines parts of the plan that give him heartburn, focusing on aims to “unveil an embarrassed online espionage, destructive propaganda and influence operations, and cultural subversion,” and questions whether the government should police propaganda or cultural subversion, arguing that propaganda is legal and that individuals should be free to express themselves. Speaker 1, Ben Swan, counters by acknowledging that governments are major purveyors of propaganda, but suggests some of the language in the plan could be positive. He says the administration’s phrasing—“unveil and embarrass”—is not about prosecution or imprisonment but exposing inauthentic campaigns funded by outside groups or foreign governments. He views this as potentially beneficial if limited to highlighting non-grassroots, authentic concerns, and not expanding censorship. He argues that this approach could roll back some censorship apparatuses the previous years had built. Speaker 2 raises concerns about blurry lines between satire, low-cost AI, and authentic grassroots content, questioning whether the government should determine what is and isn’t authentic. Speaker 1 agrees that it should not be the government’s job to adjudicate authenticity and suggests community notes or crowd-sourced verification as a better mechanism. He gives an example involving Candace Owens’ expose on Erica Kirk and a cohort of right-wing influencers proclaiming she is demonic, labeling such efforts as propaganda under the plan’s framework. He expresses doubt that the administration would pursue those individuals, though he cannot be sure. The conversation shifts to broader implications of a new cyber task force: Speaker 1 cautions that bureaucracy tends to justify its own existence by policing propaganda or bad actors, citing the Russia-focused crackdown era as a precedent. He worries that the language’s vagueness could enable future administrations to expand control, regardless of party. The lack of specifics in “securing emerging technologies” worries both speakers, who interpret it as potentially broad overreach beyond protecting infrastructure, possibly extending into controlling information or AI outputs. Speaker 0 emphasizes that the biggest headaches for war hawks include platforms like TikTok and X, and perhaps certain AIs like Grok. He argues the idea of “securing emerging technologies” could imply controlling truth-telling AI outputs or preventing adverse revelations about Iran. Speaker 1 reiterates that there is no clear smoking gun in the document; the general language makes it hard to assess intent, and the real danger is the ongoing growth and persistence of bureaucracies that can outlast specific administrations. Toward the end, Speaker 1 notes Grok’s ability to verify videos amid widespread war-time misinformation, illustrating how AI verification could counter claims of fake footage, while also acknowledging the broader risk of information manipulation and the government’s expanding role. The discussion closes with a wary reflection on the disinformation governance era and the balance between safeguarding free speech and preventing government overreach.

Video Saved From X

reSee.it Video Transcript AI Summary
There is footage and records of unidentified objects in the sky that we can't explain. It is believed that the Pentagon has been hiding a program from Congress and the executive branch. This program, run by unelected officials, avoids oversight and goes against American democracy. There is a disinformation campaign targeting the US populace, which is unethical. A bill called the UAP Closure Act aims to force the Pentagon to reveal the truth to Congress and the American people. However, there are efforts to kill this bill by Speaker Mike Johnson, Minority Leader Mitch McConnell, Congressman Mike Turner, and Mike Rogers. It is important to call lawmakers and demand the passage of the UAP Disclosure Act.

Video Saved From X

reSee.it Video Transcript AI Summary
To combat alleged misinformation, the censorship industrial complex used counterterrorism and intelligence tactics, including psychological operations, to shape domestic opinion. The speaker, a counterterrorism and counter espionage expert, was asked in 2008 to apply these same skill sets to the UFO community.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses how the US Department of Defense censored Americans during the 2020 election cycle. They explain that a group within the Atlantic Council and the foreign policy establishment pushed for a permanent domestic censorship government office to counter misinformation and disinformation. This office was eventually established within the Department of Homeland Security (DHS) through an obscure cybersecurity agency called CISA. The speaker details how this agency, with the combined powers of the CIA and FBI, classified online misinformation as a cybersecurity attack on democracy. They further explain how Stanford University, the University of Washington, Graphica, and the Atlantic Council, all Pentagon-associated institutions, were involved in a coordinated mass censorship campaign to pre-censor any disputes about the legitimacy of mail-in ballots. This campaign involved pressuring tech companies to adopt new terms of service speech violation bans. The speaker suggests that this censorship operation was orchestrated to ensure the perceived legitimacy of a Biden victory in the case of a red mirage blue shift event. They also mention the connection between this operation and the impeachment of Trump in late 2019.

Video Saved From X

reSee.it Video Transcript AI Summary
This week, an initiative was launched with companies and nonprofits to improve research and understanding of how automated processes curate online experiences. This is important for understanding online mis- and disinformation, a challenge that leaders must address. While it's easy to dismiss disinformation, ignoring it poses a threat to valued norms. How can wars end if people believe their reasons are legal and noble? How can climate change be tackled if people don't believe it exists? How are human rights upheld when people are subject to hateful rhetoric? The goals of those who perpetuate disinformation are to cause chaos, reduce the ability to defend, disband communities, and collapse countries' collective strength. There is an opportunity to ensure these weapons of war do not become an established part of warfare. Despite facing many battles, there is cause for optimism because for every new weapon, there is a new tool to overcome it. We have the means; we just need the collective will.

Video Saved From X

reSee.it Video Transcript AI Summary
Today marks a new era of transparency in America with the creation of a House Oversight task force dedicated to declassifying federal secrets. Building on President Trump's executive order, our mission is to address the American people's reasonable questions about what their government is hiding. I'm honored to lead this task force, and we'll investigate the assassinations of JFK, RFK, and MLK, UAPs, USOs, the Epstein client list, the origins of COVID-19, and the 9/11 files. Our first hearing is set for March, focusing on the JFK assassination. We aim to cut through bureaucracy and stonewalling to deliver the truth the American people deserve. Trust through transparency begins now.

Video Saved From X

reSee.it Video Transcript AI Summary
An organization has established a task force on countering disinformation through an administrative order passed by the Arizona Supreme Court. However, recent revelations about Facebook's involvement in influencing the 2016 election contradict their claims of preventing such interference. Funding from sources like the DNC, Soros, and Obama's shadow net, a social media cyber warfare tool, were used. Social media can shape people's thoughts and beliefs, making the order to counter disinformation seem questionable. The executive order legalizes the implementation of CIA strategies in thought campaigning, which they have been doing for years. This strategy, known as gray zone warfare, has been used by the CIA in foreign countries for regime change. Now, they are openly targeting America to control not just the narrative but also the minds of its citizens. The order claims to protect against Russia's tactics, but it will use the same strategies to control information and limit discussions.

Video Saved From X

reSee.it Video Transcript AI Summary
A directive has been issued to the federal government to end the weaponization of government against political adversaries from the previous administration. Thank you.

Video Saved From X

reSee.it Video Transcript AI Summary
Cole notes that he purchased six galvanized pipes of this size on June 1, June 8, and November 16, and asks for receipts. The discussion shifts to what questions a point person in 2021 would face and to a theory of the case, with speculation about how individuals could be drawn into a plan to influence events, including the possibility of a “pipe bomb” plot and manipulation of associates. Speaker 1 explains that, as a federal investigator, one would use a speculative investigative lens to broaden the search to cover various permutations of the case, including the idea that there was a so-called Red Mirage Blue Shift scenario surrounding the 2020 election. They reference CNN’s 2020 reporting on deciphering red mirage and blue shift uncertainty, including pre censorship by DHS/CISA in June 2020 to suppress any social media criticism of mass mail-in ballots, so as to prevent questions about legitimacy of an upcoming Biden victory. The discussion asserts that the goal was to preempt perceptions of illegitimacy and manage the narrative around the election results. The conversation then turns to Rosa Brooks, a high-ranking Obama administration official who headed the Transition Integrity Project (TIP) and wrote about pathways to remove Trump from power. Speaker 1 cites Brooks’ article “Three ways to stop President Trump before the 2020 election” and notes an assertion, reportedly in a Diet of Lisa-like coverage, that she later discussed a fourth, insurrectionary possibility: a military coup. They claim TIP was a war game conducted in June 2020 and then in November 2020, involving senior military, intelligence, diplomatic, and political operatives, with participants from both parties including Michael Steele (former RNC head), Donna Brazile (former DNC head), John Podesta (Hillary Clinton’s campaign manager), Bill Kristol, and others. The summary asserts that TIP’s appendix, “Will Trumpism survive a Trump loss?” warned that Trumpism could persist even after a loss, necessitating a robust strategy to eliminate Trump supporters and networks that enabled Trump’s rise. It is claimed the document discusses how to mobilize mass street protests, especially via Black Lives Matter and allied groups, to pressure a Biden administration to act against Trump, including funding and resource provisioning of protest movements to ensure their alignment with Democratic objectives. The dialogue alleges that, in June 2020, TIP proposed measures to de- legitimize Trump, including not letting Trump use the National Guard or invoke the Insurrection Act to quell protests. It is asserted that the plan contemplated mass demonstrations, the use of “street protests” as decisive leverage, and the establishment of communications infrastructure to support mass mobilization for street action if Trump won, or to counter him if he did not. The participants allegedly favored aligning with groups like Soros-funded Indivisible and Hold the Line, and urged resourcing new racial justice leaders and major philanthropic/foundation channels to fund these movements, including a claimed $50 billion in funding to Black Lives Matter. The transcript claims that TIP’s War Game included explicit scenarios about alternate electors, secession moves, and the potential for mass prosecutions of Trump and his associates, as well as strategic recommendations on how to proceed if Trump refused to concede. It is further asserted that a June 2020 war game considered provoking an “January 6” breakdown in Congress as a central move to prevent a contested inauguration, with participants pondering agent provocateurs and avenues to postpone certification. Throughout, the speakers connect the pipe-bomb purchases in June 2020 to the TIP war games and the broader plan to undermine Trump through street mobilization, legal maneuvers, and potential mass arrests of Trump supporters and networks, while noting the January 6 events as a focal point of these discussions.

Video Saved From X

reSee.it Video Transcript AI Summary
The uproar over the anti-Trump partisan Mueller operation suggests that the Garland Justice Department may be hiding something. Special prosecutor Jack Smith and his team are targeting Trump and other Republicans with unprecedented investigations. It is important for Smith to be held accountable and for transparency to be maintained. The American people deserve to know the truth.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Wikipedia is a propaganda operation, and one of its founders told me that the CIA or the American intel community is heavily involved in shaping the message, on Wikipedia. Did you come across evidence of that? Speaker 1: On the weaponization working group, as it's described by attorney general Bondi and the president's direction, intelligence community is one of the groups who was weaponized against the people, obviously. It's obvious. The question is, how are we gonna get to the bottom of it? Right? How are gonna get to the bottom of some of the weaponization of the government intelligence community against the citizens? And that's what I that's where I'm going now.

Video Saved From X

reSee.it Video Transcript AI Summary
Suzanne provided an overview of the Beyond the Ballot project and the broader Defending Democratic Institutions framework, focusing on how disinformation and information operations threaten public confidence in our courts and justice system. She emphasized that while Russia is the most aggressive actor in this space, other countries and domestic voices are increasingly involved, with Russia amplifying domestic narratives. The core insight is that these information operations exploit preexisting divisions and genuine grievances, rather than creating entirely new ones, and their aim is to undermine trust in democratic institutions, including the judiciary. Key evidence and framing from her three-year inquiry is summarized as follows: - Russia’s information operations target democracy and its institutions, including the justice system, and other countries imitate Kremlin tactics. Domestic voices are also engaged, and Russia amplifies those efforts. - These operations exploit weaknesses in our own system. They lean into legitimate grievances and seek to undermine perceived integrity, impartiality, and independence of the courts; they portray the judiciary as biased or corrupt or as a tool of elites. - The attack is not limited to elections but is a year-round threat to democratic legitimacy, including the justice system, and is aimed at weakening public trust in outcomes and processes. - Historical context includes the 2016 election, where propaganda, hack-and-leak activity, and attempts to disrupt voter data integrity were observed. Suzanne describes how such activity can extend to the justice system through hacking, leaking of judicial materials, or social media campaigns that manipulate perceptions of court legitimacy. - A notable case example is Twin Falls, Idaho (2016), where social media misinformation about refugees led to public outcry before facts were clarified. Fake accounts created by the Internet Research Agency in Russia pushed narratives that the justice system was failing, targeting prosecutors, judges, and politicians. - Russia uses three channels: social media, state-sponsored media (RT, Sputnik), and official statements by Russian officials. Narratives commonly assert that the justice system is broken, tolerates crime by immigrants, is biased, serves corrupt interests, or is controlled by a political elite. - Narratives are designed to erode confidence in the independence and impartiality of the judiciary and to frame reforms as evidence of systemic collapse. Examples include RT’s coverage and other propaganda aimed at inflaming racial and political tensions. - The campaign also leverages issues around race and policing, featuring fake affinity groups that appear to support opposing sides to inflame tensions and further undermine trust in institutions. - The FBI has warned that the threat extends beyond elections to a broader assault on democracy, with a focus on information operations aimed at all democratic institutions. Concretely, the project’s ongoing work includes: researching adversary threats to democratic institutions; defending the justice system through public awareness; conducting workshops and training for state and federal courts on cybersecurity and disinformation; building a rapid response and education network with legal organizations; and civic education as a national security imperative. The objective is to rebuild public resilience against pernicious messaging, encourage informed citizen participation, and motivate the public to hold institutions accountable while accepting legitimate outcomes. In response to questions, Suzanne underscored that members of the bar have a vital role: they can educate communities, correct disinformation related to specific cases (which judges cannot easily address), and engage in close contact with courts to safeguard democratic legitimacy. She urged lawyers nationwide to be more engaged in educating the public about the justice system and the mechanisms to hold it accountable.

Video Saved From X

reSee.it Video Transcript AI Summary
There is active pressure on elected officials to stop the disclosure of information, specifically regarding the JFK assassination. The source of this pressure is unknown, but it is not believed to be the CIA or John Ratcliffe. The question is, who is powerful enough to scare people into slow-walking disclosure, which is the same as preventing it? The purpose of this slow-walking is to continue hiding facts. What force is acting on the US government and the new administration to prevent disclosure? It is a fair question because the president of the United States was murdered, which overturned the vote of the people. It is important to get to the bottom of the JFK assassination.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker discusses issues with Arizona elections, criticizing Attorney General for using repressive tactics to silence dissent. He accuses her of ruling by force and suppressing questioning of election integrity. He warns of the dangers of a repressive state apparatus and urges people to resist authoritarian control.

Breaking Points

INSANE New Epstein Images Released
reSee.it Podcast Summary
Recent revelations from the House Oversight Committee photos of Epstein’s island and estate are analyzed to illustrate how the material evidence— from a masked room with a dentist chair to a blackboard listing power and deception—collectively reinforces a larger portrait of financial and political entanglements. The hosts scrutinize the cadence of releases, the content of emails and luxury assets, and the way lawmakers frame access to records under a new law designed to compel disclosure within 30 days, while acknowledging redactions and ongoing investigations that could shield officials. They argue the Epstein saga extends beyond salacious visuals to a money-centric narrative: billions moved through banks, suspicious activity reports, and the Treasury’s role, which survivors and reporters say should be opened more fully via Wyden’s bill. Interwoven is a tension between public demand for transparency and political protections, with references to media coverage, the possibility of future disclosures, and the ongoing pressure to hold powerful actors accountable.
View Full Interactive Feed