TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The former FBI director found a hidden room in the Hoover Building containing documents and computer hard drives that James Comey and others concealed. The room was locked, and access was restricted to prevent discovery. The speaker's team is currently investigating the contents of the room. The speaker says people want them to make arrests, but the speaker wants to run a methodical investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 and Speaker 1 discuss government disinformation offices and transparency concerns. - CISA’s office of mis, dis, and malinformation (MDM) operated as a DHS unit focused on domestic threat actors, with archive details at cisa.gov/mdm. The office existed for two years, from 2021 to 2023, before being shut down and renamed after the foundation published a series of reports. - The disinformation governance board was formed around April 2022. The CISOs countering foreign influence task force, originally aimed at stopping Russian influence and repurposed to “stop Trump in the twenty twenty election,” changed its name to the office of mis, dis, and malinformation and shifted focus from foreign influence to 80% domestic, 20% foreign, one month before the twenty twenty election. - Speaker 1 argues that the information environment problems are largely domestic, suggesting an 80/20 focus on foreign vs domestic issues should be flipped. - A June 2022 Holly Senate committee link is highlighted, leading to a 31-page PDF that, as of now, represents the sum total of internal documents related to the office of mis, dis, and malinformation. The speaker questions why there is more transparency about the DHS MIS office from a whistleblower three years ago than in ten months of current executive power. - The speaker calls for comprehensive publication of internal files: every email, text, and correspondence from DHS MIS personnel, to be placed in a WikiLeaks/JFK-style publicly accessible database for forensic reconstruction of DHS actions during those years, to name and shame responsible individuals and prevent repetition. - The video also references George Soros state department cables published by WikiLeaks (from 2010), noting extensive transparency about the Open Society Foundations’ relationship with the state department fifteen years ago, compared to today. The claim is that Open Society Foundations’ activities through the state department, USAID, and the CIA were weaponized to influence domestic politics while remaining secret, with zero disclosures to this day. - Speaker questions why cooperative agreements from USAID with Open Society Foundation, Omidyar Network, or Gates Foundation have never been made public, nor quarterly or annual milestone reports, network details, or the actual scope of funded activities. USAID grant descriptions on usaspending.gov are often opaque or misleading compared to the true activities funded. - The speaker urges transparency across DHS, USAID, the State Department, CIA, ODNI, and related entities, asking for open files and for accountability. They stress the need to open these records now to inform the public and prevent recurrence, especially as mid-term political considerations loom.

Video Saved From X

reSee.it Video Transcript AI Summary
I seek redemption and reconciliation, but that requires truth and accountability. Trust is lacking in those who misuse government power against individuals like Tulsi Gabbard and who have turned the Department of Homeland Security into a censorship tool, suppressing important discussions, including vaccine side effects. We need transparency similar to the Twitter files for agencies like the CIA, FBI, and DHS, which have hidden information for decades. It's been 50 years since the Church Committee hearings addressed CIA abuses, and we need a new set of hearings to investigate the issues that have arisen over the past decade.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advocates creating a twenty-four-seven declassification office in the White House that reports directly to the president and handles incoming from the United States of America. The office would pursue declassification of high-profile documents, stating a desire to obtain JFK files, the 9/11 files, and other materials. The speaker asserts that the deep state primarily uses an illegal application of the classification system to cover up its corruption. They reference the so-called “Lovebirds” texts from FBI and DOJ officials involved in the Russiagate investigation, specifically Peter Strzok and Lisa Page, who allegedly were having an extramarital affair while coordinating support for their stance against Trump. The speaker claims these texts expressed hatred for Trump and discussed creating an “insurance policy” to stop him. According to the speaker, after discovering these texts, the FBI and DOJ redacted them before congressional investigators and members overseeing those agencies for an extended period. The speaker emphasizes that this is one example among broader claims of improper behavior by the agencies. The speaker then notes a recent development: Strzok and Page received a $1,500,000 payout from the Department of Justice to settle a lawsuit over the improper disclosure of their personal text messages on FBI phones. The DOJ allegedly rewarded them, despite claims that they broke the law, violated the chain of command, and weaponized the justice system against a political target they despised. The speaker claims that the text messages were eventually declassified in full when the speaker became deputy director of national intelligence, allowing the world to read them. This, they say, demonstrates the best form of transparency. With this context, the speaker reiterates the rationale for the proposed 24/7 declassification office: to provide direct access to documents, files, and memos rather than regurgitated summaries. They argue that the deep state completed a full circle by rewarding those involved and that this office would enable America to receive the truth. The speaker frames the next step as obtaining the truth for the country, with the office serving as the mechanism to accomplish that objective.

Video Saved From X

reSee.it Video Transcript AI Summary
- Speaker 0 and Speaker 1 discuss the possibility that a friend was murdered and suggest that both victims died suddenly from fast-moving cancer, a method they say the agency uses overseas to eliminate people. Speaker 1 admits he cannot prove this but notes the sudden deaths. - The conversation asserts that the US government has technology to infect people with fast-moving cancer and to perform cognitive and directed-energy warfare. Speaker 0 states the government has the technology to infect with fast-moving cancer and to do so absolutely. - In 1997, Speaker 1 describes a hearing on asymmetric threats where he chaired the research committee and focused on four threats: drones, cyberattacks, electromagnetic pulse (EMP), and cognitive warfare. He asserts that cognitive warfare is now being labeled by some as Havana syndrome and that directed-energy weapons are the underlying technology. - Speaker 2 recounts a recent homeland security hearing about foreign adversaries using direct weapons against US citizens, enabling incapacitation. He emphasizes the chilling nature of the briefing and criticizes current domestic leadership as foolish, corrupt, incompetent, and wicked. - Speaker 3 notes that up to 40% of the Air Force equipment budget in the 1990s was classified, making much of it “black.” He emphasizes that military and security research often precedes civilian medical science, and that servicemen were used in experiments without fully informed consent, referencing NK Ultra-era disclosures of thousands of service members used as subjects. - Speaker 4 discusses MKUltra, describing a Canadian experiment involving psychic driving with massive LSD doses, eye-tracking, and memory loss, funded by MKUltra and affecting civilians. He mentions Project Midnight Climax, where Johns were observed in brothels while subjected to LSD, and notes similar experiments by the British Royal Air Force and Army. The results of Midnight Climax are unknown, with no published after-action reports. - Speaker 3 adds that Secretary of Energy O’Leary stated under Clinton that over a half a million Americans had been used in human experiments over four decades without informed consent, including mind control, with no accountability. He argues that mind-control technology has advanced, and questions who should govern its use, given the lack of legal frameworks. - The discussion covers mind-effects research and the lack of treaties governing such technologies. They reference a European Parliament security and disarmament resolution (1999) addressing mind-effects and mind-control technology, and Russian Duma resolutions (2002) seeking similar safeguards. Zabigniew Brzezinski’s Between Two Ages is cited regarding electronically stroking the ionosphere to influence behavior over geographic areas, connecting it to HARP and other electromagnetic carriers capable of mass or individual influence. - Speaker 6 explains historical demonstrations of electronic mind control, starting with Jose Delgado’s remote manipulation of a charging bull using radio energy and electrodes, and notes later work showing noninvasive techniques to influence behavior using low-power magnetic fields. Speaker 7 reiterates Delgado’s animal studies and the potential for noninvasive methods to affect emotions and memory, with broader implications for humans. - Speaker 3 discusses the progression of research funded by DARPA and others toward higher-resolution control of brain activity, enabling controlled effects that override senses and create synthetic memories, raising questions about future justice and evidence. They describe European Parliament and NATO/US military interest in mind-control technologies and the absence of robust legal protections. - Speaker 9 presents advances in AI-enabled brain-reading and memory-altering devices, including mind-reading and emotion decoding, while Speaker 10 and Speaker 12 discuss privacy concerns, brain-data privacy laws (Colorado’s law adding brain data to privacy protections), and the availability of consumer devices that decode brainwaves. They warn that brain data can be misused by insurers, law enforcement, advertisers, and governments, with private companies often sharing data without clear disclosure. - The segment concludes with a note that devices can infer attention and thoughts, and that DARPA’s N3D program aims for noninvasive neuromodulation with implantable electrodes read/write capabilities. It references 1980s–1990s discussions of RF energy as a potential nonlethal mind-control technology, and a 1993 Johns Hopkins conference listing low-frequency weapons as attractive options.

Video Saved From X

reSee.it Video Transcript AI Summary
Someone who snuck into that chat that was not a part of that was not an employee there. And they screenshotted what they saw and leaked it out on x. This is a chat group that was created and administered by the NSA, one of the premier intelligence collection entities that we have. It was obscene. It was talking about sex toys and sex tricks for people who had gone through, you know, some kind of transgender surgery. During the workday on an intelligence hosted work chat group. The supervisors said anybody who's involved with this is getting fired and getting their security clearance revoked. Imagine you're in any office and you're having these kinds of sexually explicit conversations in the workplace. This cannot be happening in the workplace, and it must not be happening in our premier intelligence agency that has people who have the highest clearances that that anyone can hold. This chat group had existed for over two years. Because of president Biden's DEI initiatives, they were essentially told, shut up. It's none of your business.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker mentions that they have shared information with the Department of Homeland Security (DHS) regarding their findings. They have a relationship with local DHS personnel and have provided them with a significant amount of data. The DHS conducted scans and determined vulnerabilities. However, the speaker notes that the Elections division of the Cybersecurity and Infrastructure Security Agency (CISA) did not participate in internal meetings or briefings on the presented material.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 asserts that there is a two-tier justice system weaponized to persecute people based on political beliefs, and that Director Wray has personally helped weaponize the FBI against conservatives. He references the Twitter files, Missouri v. Biden disclosures, the Durham investigation and report, and the exposure and collapse of the Russian collusion hoax. He asks Director Wray what he is prepared to do to reform federal law enforcement to earn back the trust of the American people, noting that he asked Mister Durham about this, and Durham said he did not think things can go too much further given that law enforcement, particularly the FBI or Department of Justice, runs a two-tiered system of justice. Speaker 0 responds by disagreeing with the other speaker’s characterization, saying the description of his bias against conservatives seems insane given his personal background. He explains that the approach to protecting the American people and upholding the Constitution starts with emphasizing to his staff to do the right thing in the right way, which means following the facts wherever they lead, no matter who likes it. He outlines several actions: enhanced procedures, safeguards, approvals, double checks and triple checks, record-keeping requirements, accountability policies, and funding for new functions like an Office of Internal Audit that didn’t exist before. He notes the installation of an entirely new leadership team from his predecessor and asserts that where he can take action, he will to hold people accountable by removing them from the chain of command. The exchange ends with an invitation to speak further, though the remark is truncated: “Gentlemen, ladies, time to speak to the….”

Video Saved From X

reSee.it Video Transcript AI Summary
An undercover video released by Project Veritas shows Travis Combs from the Department of Education describing how the agency hides information from Congress and the public. We communicate via Signal, an encrypted app, to keep things under wraps. If Congress knew what we were doing, they'd shut us down. It's like a sanctuary program where we're spending federal dollars inappropriately. I'm not supposed to be doing business on Signal, but everyone uses it. We're operating as a rogue sanctuary program for illegal immigrants, misusing federal tax dollars. Employees are evading oversight by hiding secrets on encrypted messaging apps. If you're a public employee, you're expected to comply with the administration.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2012, the speaker's property was raided by the government, resulting in the destruction of their belongings and the shooting of their dog. Angry about this, the speaker donated laptops with spyware to government secretaries. This allowed them to gain control over the entire government computer system. While monitoring the system, the speaker discovered that the Minister of National Defense was involved in drug trafficking and the Minister of Immigration was involved in human trafficking. The speaker concludes by stating that they don't want to be killed by these individuals.

Video Saved From X

reSee.it Video Transcript AI Summary
I work at the Treasury, reviewing investments into the US for national security risks. Recently, Doge gained access to the Treasury to cut waste, but I think we're an easy target. People I know have worked for the government for years and don't do much. Doge shouldn't have access to the Treasury due to national security risks. It's weird because no one knows what they want to do with the system or why they need access to random people's tax information. Giving people this kind of access creates vulnerabilities. They could misuse the information or give it to another country. Elon's actions feel like government-sanctioned harassment. Everyone in my office is worried about getting fired. Some people care more about money than the country.

Video Saved From X

reSee.it Video Transcript AI Summary
President Trump's DHS conducted a classified raid on Jerry Nadler's office and found military-grade encrypted drone hardware, remote global trigger modules, schematics used in Ukraine's drone strikes, and confidential access keys to a shadow ops network. A sitting US Congressman possessed global war tech. DHS agents also found hard drives and payment ledgers, indicating a military-to-foreign handoff, a war machine operated from within the Democrat Party. The drone systems were coded for international activation and linked through VPN and encryption layers. A US Congressman had the keys to untraceable drone hardware designed to kill without fingerprints. The speaker claims that if DHS had not moved, this would not have been discovered. The speaker urges every American to ask who else has this tech, how deep this treason runs, who had privy to this knowledge, and what mission Nadler was helping arm. The speaker asserts this is Congress running a back channel war room with hardware meant for US enemies.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discovered strange documents in a database at work. One document praised Satan and was traced back to a Satanic book. The speaker found it suspicious that only higher-ranking employees could add documents to the database. They also found a document about depopulation, but couldn't determine if it supported or opposed it. The speaker then stumbled upon an address related to the Wuhan lab in China, which had the number 666. They verified this information on Google and took a screenshot. The speaker got in trouble for sharing the screenshot at work.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses alleged infiltration of the US government by individuals with ties to Iran. They mention Maher Ptahr, head of intelligence programs in the White House, who is accused of prioritizing intelligence collection efforts away from important areas such as the southern border and terrorism. They also mention Robert Malley, Biden's envoy to Iran, whose security clearance was suspended by the FBI. The speaker claims that Malley installed an Iranian national, Arianne Tabatabay, in a position at the Department of Defense. They argue that these individuals are distracting from protecting American priorities and call for an investigation into the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker shares their experience of being targeted by the government after their property was raided and their dog was shot. In response, they donated laptops with spyware to government secretaries, gaining control over the entire government computer system. While monitoring the system, they discovered that the minister of national defense was involved in drug trafficking and the minister of immigration was involved in human trafficking. The speaker acknowledges the risk of sharing this information and suggests that it is better to remain unaware.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: We have a problem with the CIA and FBI in Washington. Speaker 1: What's your plan to start over and fix them? Speaker 0: They've gotten out of control, with weaponization and other issues. The people need to bring about change. We were making progress, but more needs to be done.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims to have found documents related to Jim Comey that were not where they should have been. The speaker says these documents are unflattering to Comey. The speaker asserts that Comey disgraced the FBI numerous times with his role in crossfire hurricane and other abominations. The speaker finds it stunning that Comey continues to attack their leadership when they are cleaning up the mess Comey created and continue to find things from his era.

Video Saved From X

reSee.it Video Transcript AI Summary
I've identified leakers within the organization, and we're actively uncovering more. Let me be clear: these individuals will be terminated, and they will face serious repercussions. Leaking information to the press, especially when it jeopardizes operations, puts law enforcement lives at grave risk, potentially leaving families without their loved ones. We're employing every available tactic, including polygraphs, email analysis, and communication monitoring, to identify these individuals. It's astonishing how these bureaucrats, driven by their agendas to undermine our mission of ensuring American safety, will betray one another to protect themselves. Rest assured, I am fully committed to finding and removing these leakers to ensure the safety of our law enforcement officers and agents, and to enable us to continue our vital work.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker explains that the government wanted to arrest them after raiding their property and causing damage. In response, the speaker donated laptops with spyware to government secretaries, gaining control over the entire government computer system. They were searching for evidence of being set up but instead discovered that the minister of national defense was involved in drug trafficking and the minister of immigration was involved in human trafficking. The speaker acknowledges the danger of sharing this information and suggests that it is best to keep it undisclosed.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on how politicization of intelligence has manifested in different eras, comparing past and present administrations. Speaker 0 asks whether the politicized weapons claims about Iraq and the CIA’s statements in the 1990s can be compared to today’s politicization of intelligence under John Ratcliffe and Tulsi Gabbard as head of DNI, arguing it is much worse now because of the mediocrity of those in control of key agencies. Speaker 1 counters by recalling the 1980s, noting that there was significant politicization of the Soviet threat to justify Reagan’s defense buildup, and adds that this is why he testified against Robert Gates in 1991. He asserts that politicization is bad, and insists that the current situation is worse than in the past. Speaker 1 explains: “It’s Because I look at the people who are ahead of these groups. Come on. Let’s be serious.” He targets the leadership of the director of national intelligence, the FBI, the Department of Homeland Security, and the CIA, saying, “Have you ever seen a cabinet in The United States of such mediocrity, of such venality?” He emphasizes his background, stating, “I haven’t,” and that nothing compares to what is going on now, warning that “a lot of damage is being done to The United States and to the constitution of The United States and to the importance of separation of powers and the importance of rule of law and the importance of checks and balances. This is very serious stuff.” Speaker 0 attempts to steer toward historical figures like Robert Maxwell, but Speaker 1 dismisses that concern as off point, insisting he is making a point about Israel. The exchange then shifts to U.S. support for Israel, with Speaker 1 asserting that “Israel gets what it wants from The United States. It gets it from democratic presidents and from republican presidents.” He also criticizes Barack Obama for signing what he calls “that ten year $40,000,000,000 arms aid agreement,” arguing that Obama “never should have signed” it “because they treated Obama so shabbily in the first place.”

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a US visit, an engineer working for Telegram was allegedly approached by cybersecurity agents attempting a secret hire. The agents were interested in Telegram's open-source libraries and tried persuading the engineer to integrate specific open-source tools that the speaker believes would function as backdoors, potentially enabling government surveillance of Telegram users. The speaker also recounts personal experiences of being met by FBI agents at US airports and visited at their residence. They believe the FBI's interest was in gathering details about Telegram and establishing a relationship to better control the platform. While acknowledging the agents were doing their job, the speaker suggests this level of scrutiny made the US a less-than-ideal environment for running a privacy-focused social media platform.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a visit to the US, an engineer working for Telegram was allegedly approached by cybersecurity officers or agents who attempted to secretly hire him. The speaker believes the US government wanted to hire the engineer, not necessarily to write code or break into Telegram directly, but to learn about open-source libraries integrated into the Telegram app. The speaker alleges they tried to persuade the engineer to integrate specific open-source tools into Telegram's code, which the speaker believes would function as backdoors. These backdoors, according to the speaker, would potentially allow the US government, or any government, to spy on Telegram users.

Video Saved From X

reSee.it Video Transcript AI Summary
If we were seen as a sanctuary program, especially one using federal dollars, we'd face a lot of problems. To avoid scrutiny, we strategically omit status inquiries from our federal statutes by subtly influencing bill language in congress. Now, with the new efficiency team's surveillance, communication has moved offline to encrypted apps like Signal, even though we're not supposed to conduct business there. They've installed software to track keystrokes and monitor our calls. If I end up on leave, I'm headed to the beach, taxpayer money well spent! Many in administrative roles are already leaving since we can't do much anyway. If I'm in Mexico, don't worry about it.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses internal resistance to RFK Jr.’s policies and the idea that “deep staters” have been entrenched in government. They mention being forwarded an anecdote from a “good career employee.” They point to the FDA, noting that when Marty Makary came in, he had only about 10 political appointees he could choose. Jay Bhattacharya at the NIH allegedly had one political appointee. The speaker claims that every government employee is a “deep stater” who has been there a long time and that an email from a good employee circulates a CIA manual called How to Be a Bad Bureaucrat and Subvert an Institution from Within. The email supposedly asserts that 90% of employees at HHS, which has 70,000 employees, are talking in lunchrooms about the manual and telling each other that their job is to save America and save science from the agenda of President Trump and RFK Jr. The speaker asserts this reflects how people think across major departments and asks how to get rid of them, suggesting firing them as a solution, and mentions SIOP in this context. The CDC is presented as a case study of failure, described as a public health disaster in its COVID-19 response. The speaker alleges that the CDC’s guidance on school lockdowns copied directly from a teacher union document with which they were aligned, reproducing paragraphs from the teacher’s union advocating for two years of school shutdowns. It is claimed that the CDC also said that cloth masks were fine. The speaker says the CDC led the response and that the NIH funded the entire pandemic, including gain-of-function research, asserting that this constitutes “the creation of the pandemic.” In contrast, RFK Jr. is said to have fired three employees, and this action is described as national news. The overall narrative emphasizes a view of pervasive internal opposition within federal agencies, a controversial and sweeping critique of the CDC, NIH, and HHS responses to the pandemic, and a framing of RFK Jr.’s personnel decisions as transformative and newsworthy.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 shows notes the attorney general brought to the hearing, captured by a photographer in the room. The notes include a list of Democratic congresswomen and their search history. The photo indicates that searches performed by members of Congress at a DOJ facility—where they sit at a computer to search unredacted files—are being tracked and read by the Department of Justice and the attorney general. Speaker 1 responds that this represents a surveillance of Congress by the Trump administration and calls it totally improper, though not surprising given their misconduct in various areas. He notes that when he visited the facility, they log in under each person’s name, implying an attempt to make something of the situation. He states that members who visited shared the information they found, and emphasizes that it is not a pretty picture. He adds that lawmakers were required under the law to remove redactions unless necessary to protect the privacy of victim survivors. In his view, the redactions were used to protect offenders and coconspirators, with their names blacked out. He contends that information about the survivors was actually revealed, which he says was very wrong and contrary to the law. He also suggests that many survivors feel the exposure was deliberate, intended to intimidate them and silence them, though he says he does not know if that is true. The statement ends with “The other thing that's inter” before the transcript cuts off.
View Full Interactive Feed