TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
So I talked to the owner of this house right here in Pasadena. I talked to the owner. The owner does not have a smart meter on this house, on the front part of his house. There's no smart meter. No smart meter. So So the house did not burn. The back house is the part of the house that had the smart meter, and everything in the back of his house is burnt. No smart meter. Smart meter. No smart meter. Nothing. Nothing's burned. All the trees, but the house state is perfectly fine. But the back house is completely gone, and that's

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript discusses LED lights and a supposed IoT (Internet of Things) capability. It states that on 04/09/2019, Target confirmed they had provided Internet of Things lighting. IoT lighting means everything is connected and data can be collected from ongoing activities. The example given is that if you walk into Target with your phone, the lights will sync up to your phone to obtain data about what you’re purchasing and what you’re doing. The narration links this event to the period just before 2020, suggesting it occurred prior to the surge in shopping and alleged shortages that year. The speaker then asserts that these LED lights have microscopic cameras in them so they can watch people from every angle. The claim is that other stores, such as Whole Foods, are using similar technology in price tags that can scan and see who is buying items to collect data. The main takeaway presented is that if you bring LED lights into your home, the same type of technology claimed to be in these stores could be in the LED lights you bring into your house.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters in the context of a book, showing a plant and a smart meter, and notes that “that side's all cooked.” They claim that this illustrates what “they don’t tell people.” The speaker asserts that a smart meter catches fire and that a utility company denies homeowner damage claims, with insurance not covering fires. They reference “all these fires” and say there have been fires across the country linked to smart meters. They question how safety is tested, claiming that “this is a plastic dummy” and “that’s a phone” used to demonstrate safety, followed by the statement “And then what about plants exposed to Wi Fi? Look at this. No Wi Fi.” The speaker contrasts the apparent demonstration with alleged real-world risk to plants from wireless technology. The speaker adds a claim about the Navy, stating that it “knew 5,000 studies on the dangers of wireless technology.” They offer an example as “one good one” and connect Wi-Fi to thyroid issues, asserting “Thyroid issues, Wi Fi.”

Video Saved From X

reSee.it Video Transcript AI Summary
Smart utility meters are being installed on millions of homes, but some homeowners claim they are causing health issues. Carol Garcia, a homeowner in Rochester Hills, says she experiences symptoms like bloody noses, headaches, and insomnia since the meters were installed. She blames the meters, which use electromagnetic frequency to transmit energy usage data. Other Metro Detroiters have also reported similar symptoms. However, DTE, the energy company, insists that the meters are safe and secure, using low power radio transmissions. Garcia believes that the public is unaware of the potential health effects. A state representative has expressed concerns about the issue.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
Signal, a company, may be asked by the regulator Ofcom about the data they gather. Signal claims they don't collect data on people's messages. However, the concern is that the bill doesn't specify this and instead gives Ofcom the power to demand spyware downloads to check messages against a permissible database. This sets a precedent for authoritarian regimes and goes against the principles of a liberal democracy. It is seen as unprecedented and a negative shift in surveillance practices.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a growing social credit-like system controlled by algorithms. If a person’s family photos, online activities, purchases, associations, or friends diverge from what authorities expect, they can lose the ability to buy train tickets, board airplanes, obtain a passport, or be eligible for a job, including government work. These constraints are increasingly created, programmed, and decided by algorithms. These algorithms are fueled by data our devices produce constantly and invisibly. The records we generate are not just visible content but often unseen traces, such as location and activity footprints. The speaker emphasizes that our devices create records that we do not see, which aggregate into a comprehensive picture of individuals. Even when the content of communications isn’t visible, metadata reveals much. The government and other actors claim they do not need a warrant to collect metadata, yet it tells a complete story about a person’s life. Activity records are continually created, shared, collected, and intercepted by both companies and governments. As these records are sold and traded, the speaker argues that what is being sold is not merely information but people themselves. They claim that companies and governments are selling “us”—our future, our past, our history, and our identity. In doing so, they assert that these entities are eroding personal power and making individual stories work for them. Overall, the message is that everyday data—seemingly innocent day-to-day traces—are aggregated into powerful profiles. These profiles determine access to travel, work, and official status, and the data economy is framed as commodifying and leveraging individuals’ identities. The core assertion is that the modern data ecosystem constructs a pervasive power dynamic where people’s histories and identities are exploited to control and monetize them, while the actual content of private communications may be less visible than the broader metadata that shapes life opportunities.

Video Saved From X

reSee.it Video Transcript AI Summary
Solar panels are dangerous and should be removed because they turn houses into inverters. According to Dr. Milham's book, "Dirty Electricity," solar panels convert DC energy to AC, then back to DC, sending it to the power plant before it returns to the house. Health issues like leukemia are linked to power lines and solar panels. The claim is that solar panels, contrary to being sustainable, cause health problems over time. Additionally, smart meters, which ping 16,000 times per second with microwave radiation, exacerbate health issues when combined with solar panels.

Video Saved From X

reSee.it Video Transcript AI Summary
In the video, Speaker 0 explains that LED lights are being pushed aggressively, even given away for free, because they will connect everything in the Internet of Things. These LED lights can be connected to a cellphone, a tablet, all home appliances, the thermostat, cars, the garage, and more, allowing monitoring and data collection from these devices. They can also be used to turn off devices based on climate reasons and other factors, meaning you are connected up to the Internet of Things. What’s interesting, according to the speaker, is that these LED lights “ping a lot of microwave radiation,” which will be demonstrated in the next video. The speaker describes using a TriField EMF tester to check the radiation coming off the LED lights and shows results labeled as “off the charts.” The claim is that by bringing these lights into the home, microwave radiation is being pinged into the house. The speaker asserts that this microwave radiation can impact health, listing effects on the heart, brain, eyes, skin, and other organs. The LED lights’ capability to connect to the Internet of Things is highlighted again as part of this scenario. The video then notes a claim about a 2016 announcement from the AMA, stating that LED lights can increase the risk of cataracts and eye degeneration, implying long-term harm to eyesight while allegedly promoting environmental aims. In summary, the narrator claims: - LED lights are being pushed and given away because they enable the Internet of Things, connecting to smartphones, tablets, home appliances, thermostats, cars, and garages for monitoring and control. - These LEDs allegedly “ping a lot of microwave radiation,” detectable with an EMF tester, described as “off the charts.” - The radiation entering the home is claimed to impact health, including the heart, brain, eyes, skin, and other organs, in addition to enabling IoT connectivity. - The speaker cites a 2016 AMA statement asserting that LED lights can increase the risk of cataracts and eye degeneration.

Video Saved From X

reSee.it Video Transcript AI Summary
Today, we discuss the reasons to opt out of smart meters. In California, there are 13 million smart meters installed, raising concerns about their potential to cause wildfires. A PG&E meter reader mentioned that if smart meters catch fire, they can be remotely turned back on. Reports from Ontario highlight incidents where smart meters exploded near gas lines, leading to denied damage claims by utility companies. The Ontario Fire Marshal linked smart meters to multiple fires, suggesting a widespread issue. Notably, homes without smart meters in Los Angeles remained unharmed, while those with smart meters suffered extensive damage.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker describes receiving their first power bill under the new rules in which I pay for AI to plug in to our power grid. PSE and G did absolutely warn me that this would happen, but not that we’re funding AI. The bill more than doubled—from about $235 to $666.39—in Northern New Jersey, even though usage is on par with last year. They ask if the neighborhood tapped in or if the company allowed AI to tap in. As pissed as they are, they’re documenting the moment they become an extreme cheapskate. They reference a video of parents making kids pedal to power a TV and wonder if a bicycle setup could power their house. They’ve even checked whether wind turbines are legal in their neighborhood. "Just know every time you use AI, you're jacking up your own power bill."

Video Saved From X

reSee.it Video Transcript AI Summary
A retired mechanical engineer has secured his analog meter with a lock and chain and a notice reading, "Attention. Do not install smart meter," because he believes smart meters are dangerous. He claims smart meters emit high-frequency radio waves that penetrate the body and can cause health problems. He says these radio waves go through concrete walls. Because his bedroom is next to the meter, he is worried about his and his children's health. He also claims that smart meters catch fire due to very high voltage inside.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on fears of evolving toward a biometric surveillance state driven by predictive algorithms. Speaker 0 argues that the plan resembles a transition to mass surveillance on everybody, drawing on observations from a recent trip to China where some aspects were acceptable but others were not, and contrasts that with potential consequences in the speakers’ own country—specifically, “without the nice trains and without the free healthcare.” The core concern is the creation of a biometric surveillance framework that uses predictive analytics to monitor and control people. A key point raised is a new report that highlights contracts with Palantir, the data analytics company, which would “create data profiles of Americans to surveil and harass them.” This claim emphasizes the potential domestic use of technologies and methodologies that have been associated with counterterrorism efforts abroad. The discussion frames this as evidence that the United States could be adopting similar surveillance capabilities at home. Speaker 1 responds with a blend of agreement and critical tone, underscoring the perceived inevitability of this trajectory and hinting at the burdens of being right about such developments, including the intellectual burden of grappling with the math and ontology behind these systems. The exchange suggests that Palantir’s role is to “disrupt and make our the institutions we partner with the very best in the world” and to be prepared to “scare enemies and on occasion kill them.” This is presented as part of Palantir’s stated mission, with Speaker 1 affirming a sense of inevitability about the path forward. Speaker 0 further reframes the issue by stating that “the enemy is literally the American people,” expressing alarm at the idea that the same company tracking terrorists abroad would “now be tracking us at home.” They note posting on social media that this development should be very alarming, highlighting the notion that the entity responsible for foreign surveillance might be extending its reach domestically. Overall, the dialogue juxtaposes concerns about a domestic biometric surveillance state—enabled by predictive algorithms and proprietary data profiling by Palantir—with ethical and political anxieties about the implications for civil liberties, accountability, and the potential normalization of surveillance within the United States. The conversation dismisses no specific claims but emphasizes the perceived transformation of surveillance capabilities from foreign counterterrorism into internal population monitoring.

Video Saved From X

reSee.it Video Transcript AI Summary
I worked as a meter reader for PG and E for nine and a half years before being fired for speaking out about issues with smart meters. PG and E is aware that their systems can catch fire when remotely turned back on after a customer pays their bill, yet they are covering this up. When I joined, the metering budget was $70 million for about 1,000 meter readers, but PG and E and the Public Utility Commission mislead customers about the system's cost, claiming it to be $2.2 billion or even $10 billion. Additionally, PG and E shouldn't charge extra for meter reading since it's already done at a lower cost. Notably, meter readers are the only ones conducting surveys for the gas department. Thank you.

Video Saved From X

reSee.it Video Transcript AI Summary
Solar panels are outdated technology and dangerous, and should be removed. According to the book "Dirty Electricity" by Dr. Milham, solar panels turn a house into an inverter. Direct current (DC) energy is converted to alternating current (AC), then back to DC, sent to the power plant, and returned to the house, effectively making the house the power plant. Leukemia and blood issues from dirty electricity are linked to power lines and solar panels. Solar panels are not sustainable and cause health issues. Smart meters, which ping 16,000 times per second with microwave radiation, exacerbate the health problems when combined with solar panels.

Video Saved From X

reSee.it Video Transcript AI Summary
Court documents reveal that the International Brotherhood of Electrical Workers took a utility to court regarding smart meter fires. Itron, the company involved, has reported an increase in fires and returned meters, particularly due to design flaws like thinner blades that create loose connections and arcing, leading to high temperatures and fires. Despite these issues, utilities continue to use these meters for data collection. Whistleblowers have noted a history of problems with digital meters since their introduction in the early 2000s, with numerous meters returning to shops. Additionally, there are efforts to keep the public unaware of the dangers associated with these meters, as evidenced by hidden documents showing burned meters and arcing conditions.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
California plants ban plants due to wildfires. 'the government shut off the water when the fire was happening,' and 'they wanna ban plants.' They claim 'smart meters were catching on fire every time there's a fire,' and that 'the insurance companies even know,' adding that 'if your house catches on fire from a smart meter, the insurance companies actually will not cover you.' The speaker cites lawsuits claiming 'faulty PG and E smart meters started their house fire,' and says the meter 'pulses 14,000 to 190,000 times per day,' a claim PG and E admitted in court. They reference a 2019 document 'how insurance companies know this' and contend 'smart meters actually jack up your electric bill by two to three times the price.' They advocate 'analog meter instead of a smart meter' and note California considers per mile road charge as gas tax revenue is expected to decline.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock your digital identity, which will be a tool of control for upcoming agendas. Speaker 1 notes that elements of this control are already with us, citing Alexa as an example. Speaker 0 contends you are never alone in your home, because all devices and smart appliances are connected on a wireless network, many with cameras and microphones, monitoring everything all the time. Smart appliances communicate with the smart meter, sending real-time usage data. If a Ring camera is in the home, a mesh network is formed and all devices are being tracked within the home, including location and usage, with data going to Amazon’s servers. Speaker 1 adds that when you leave your home, modern vehicles are connected to the Internet and tracked continually. On the streets, smart LED poles and smart LED lights form a wireless network that track your vehicle. They claim data is collected 24/7 continuously on every human being within these wireless networks. Speaker 0 asserts this is not good for health due to electromagnetic radiation. Speaker 0 further states that in the long term the plan is to lock up humanity in smart cities, a super set of a fifteen minute city. Speaker 1 says they’ve sold smart cities to state and local governments and countries as about sustainability and the city’s good, but claims the language from the UN and WEF and their white papers is inverted. The monitoring is described as about limiting mobility and no car ownership. Surveillance via LED grid is described as why smart lighting is death. Water management is about water rationing; noise pollution about speed surveillance; traffic monitoring about limiting mobility; energy conservation about rationing heat, electricity, and gasoline. Speaker 0 explains geofencing as an invisible fence around you where you cannot go beyond a certain point, related to face recognition, digital identity, and access control. Speaker 1 mentions that smart contracts can enable Softbrick to turn off your digital currency beyond a certain point from your house. The world is described as turned into a digital panopticon. Speaker 0 concludes that this means you can be monitored, analyzed, managed, and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker introduces antennasearch.com to find cell phone towers near homes and suggests switching cell phones to LTE instead of 5G to boycott a system that is allegedly poisoning people. The speaker claims safety tests are inadequate and that the rapid rollout of 5G since 2020 is causing radio wave sickness, which was allegedly removed from medical books in the 1920s. Symptoms of radio wave sickness purportedly include fevers, chills, shortness of breath, fatigue, headaches, loss of smell, insomnia, pain in the chest, dizziness, muscle pain, hypertension, strokes, and thyroid issues. The speaker states that cell phone tower companies are immune to lawsuits and references a 1971 US Navy document that supposedly acknowledged the damages of this technology. The speaker eliminated WiFi, Bluetooth, and smart meters and now uses a wired internet connection.
View Full Interactive Feed