TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
In the clip, the participants discuss a chaotic, dangerous incident. Speaker 1 confronts Speaker 0 about a supposed leakage: “Release the cookie file. That's all you wanna know. Release it. Tell him about the n word. You said it today.” Speaker 1 and Speaker 2 push back on a racial slur, saying, “Common black people to nigger is bad. You can't say that,” and urge Speaker 0 not to use the term, insisting, “You can't call us niggers. We work hard for our,” as Speaker 0 is told to “just go.” The tension escalates as Speaker 0 expresses violent intent: “Yeah. I know the best course of action, but I wanna kill each and every one of these guys.” The group describes terrifying moments around their vehicle: “they were surrounding our car,” and “you hit that gas, you hit that other car. You couldn't see nothing because he's on top.” There is uncertainty about injuries: Speaker 0 asks, “Is he dead?” and Speaker 1 replies, “No. I don't know. Hopefully.” They note armed individuals nearby: “There’s armed people surrounding my car. And they’re armed. They all have pistols.” The dialogue reveals a confrontation in which weapons are present and self-defense is discussed. Speaker 2 says, “That was like … flashed on?,” and Speaker 0 notes the presence of armed people and a tense environment: “the ones with pistols, the open carrier.” The scene seems to involve threats, a possible arrest or detainment, and concern about safety. There is a mention of external pressure and harassment: someone comments on “Kodak Black sent me to press you for throwing ramen on Marquee,” followed by references to people at a house and the possibility of being towed. The participants discuss who did what and why, with Speaker 0 insisting on a separation from a situation, noting, “I wasn't nowhere near here. I had left,” and indicating prior interactions with others in the group. The group supports staying with a friend described as “the good guy,” while another person is described as “the motherfucker on the ground, the bad guy.” They attempt to verify safety and proximity to others, with statements like, “Tell me. Brother safe. He did everything.” They recount attempts to handle the situation and who was there during the incident, including a clarification that there were people around and an account of someone entering a car. Media handling and legal strategy are addressed toward the end: Speaker 0 reveals his livestream status and that his channel was banned, though Speaker 2 clarifies, “They didn't ban you.” Speaker 2 advises Speaker 0 to stay quiet and stay recorded: “Just do not say anyone, yes. Of course, I do. Look. Just hang tight. Record. Don't say anything. Don't answer questions.” They emphasize the importance of documentation and having a lawyer, with a concluding remark that, “It the good thing is listen. It's Christmas, and a lot of my lawyers don't celebrate Christmas. So you're gonna be good.”

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 advises that they don't know the exact situation but wants the person to be comfortable. They mention the involvement of federal people and their lack of knowledge about connections. They emphasize the importance of the person being nonchalant.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advocates downsizing all assets and resources, especially for public figures who are fighting a public battle and have a social media presence. The key goal is to maintain anonymity by moving wealth into Bitcoin so others cannot know you have it. Keeping funds on centralized exchanges or in a nameable account makes them visible and traceable, which the speaker warns against. The recommended strategy is to transfer wealth into Bitcoin and ensure it remains untraceable by using cold storage in an air-gapped, multisignature wallet. The idea is that once funds are in Bitcoin, they effectively disappear from scrutiny and cannot be proven to belong to you if properly secured. To implement this, one should convert assets into Bitcoin and transfer them to a cold storage setup that uses air-gapped security and multisig authorization. The speaker emphasizes the risk of losing access by keeping assets in traditional, monitored locations; specifically, if you leave Bitcoin on a centralized exchange, it can be seen and tied to you. Finally, the speaker notes a harsh consequence: if you conduct this process and then lose the private keys, you lose all the Bitcoin. In other words, the method hinges on secure, private control of keys, and the trade-off is the possibility of total loss if the keys are misplaced.

Video Saved From X

reSee.it Video Transcript AI Summary
We keep things hush-hush to avoid attention. Secrecy is crucial to prevent media and government interference. Revealing info could lead to chaos. The reason for the secrecy is to prevent losing everything. The government may intervene if details are leaked.

Video Saved From X

reSee.it Video Transcript AI Summary
We propose linking digital identities like France Identité or La Poste's digital identity to Facebook accounts. This would confirm that there is a real person behind the account and provide an encrypted code that only authorities can decipher in specific cases of illegal activity. The idea is to know who you are, even if you use a pseudonym and a cat photo on Facebook. Anonymity is not the goal; instead, we want to associate your account with a digital identity to ensure you are not anonymous in the end.

Video Saved From X

reSee.it Video Transcript AI Summary
Use walkie talkie instead of calling. Note license plate number.

Video Saved From X

reSee.it Video Transcript AI Summary
Do not share misinformation on social media. Trust information from police and law enforcement. Check official websites and social media for updates. Police will share any credible information about risks or threats with the community. Trust the police for accurate information, not social media.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker briefly greets the audience and mentions that they are currently conducting an investigation. They ask if anyone else is present, specifically law enforcement. They request the credentials of the person they are speaking to and express their appreciation. The speaker concludes by saying that the person they are speaking to needs to improve their ability to hide.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asks for the person's name multiple times and tells them not to worry about being in the news. They mention being proud of the person and ask them to show their face. The speaker denies touching the person and tells them not to touch them either. They mention that the person is not allowed to post anything and then the transcript abruptly ends.

Video Saved From X

reSee.it Video Transcript AI Summary
Be cautious about discussing politics; it can lead to unwanted scrutiny. Avoid revealing personal information about friends’ identities or political beliefs. If someone brings up politics, deflect the conversation. Keep any assistance to immigrants private; do not discuss it openly. Prepare for potential authoritarianism by staying informed and ready. Firearms training may be necessary for self-defense, as the Second Amendment might remain intact. If political views are shared on social media, consider deleting those accounts to protect yourself from future repercussions. Prioritize safety and discretion in a potentially oppressive environment.

Video Saved From X

reSee.it Video Transcript AI Summary
We discussed the tension between being open and transparent while also protecting ourselves. We agreed to be open and transparent for everything that happened 90 days ago and before, as it's all gone. It's similar to how cryptocurrencies work, where there is no trail if you don't want it.

Video Saved From X

reSee.it Video Transcript AI Summary
I would openly say that you have no intent or have never thought about killing yourself, and you do not and have not ever engaged. But but the second part is even more important diligent because this is something I know for a fact that is used to demonize people that are dancing too close to the sun. You need to state publicly, you have not, never have or have no interest in any type of questionable sexual material. I'm telling you, like, there there's there's a degree of pressure that can be applied to people that will not stand down that most people just don't understand.

Video Saved From X

reSee.it Video Transcript AI Summary
Disguises can be used to maintain anonymity. Dyeing hair and wearing different clothes are options. Masks are useful for disguises. Creativity is also helpful. Keeping a change of clothes in a backpack is a good idea. For example, if wearing a white shirt, a blue sweatshirt can be put on if things get chaotic. Having such items readily available is beneficial.

Video Saved From X

reSee.it Video Transcript AI Summary
I want you to call me. I want to hear from you. And you have to keep it a secret. You're a very attractive person. Don't tell mom what I just said. Understand? Mhmm.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advises federal government employees to leak information to journalists from mainstream press outlets like ProPublica and Politico. They suggest using Signal to communicate and recommend saving emails and recording meetings. The speaker also suggests writing poorly to make the administration look bad. Whistleblower protections are discussed, and the speaker acknowledges the risk involved in their actions. They mention the possibility of finding another job and suggest passing on information to a colleague with a higher risk threshold. The importance of finding ethical journalists who will protect sources is emphasized.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 is contacted by the FBI but refuses to turn off the camera. They are asked about someone they met online but refuse to speak on camera. Speaker 0 declines an interview and ends the conversation.

Video Saved From X

reSee.it Video Transcript AI Summary
To reduce the risk of iPhone hacking, the speaker advises changing three settings. First, access the Wi-Fi settings, tap the "i" next to your network, and ensure "Private Wi-Fi Address" is set to rotating, not fixed. A fixed address makes the phone vulnerable. Second, in Wi-Fi settings, turn off "Ask to Join Networks." This prevents unauthorized access. Finally, in Settings under General, then AirPlay & Handoff, set "Automatically AirPlay to TVs" to "Never" (or "Ask"). Leaving it on automatic creates an open path for hackers, especially on public networks.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker urges rapid downsizing of wealth and assets, especially for anyone who will have a public presence or an active social media profile. The core instruction is to get wealth out of the traditional system and keep it on a minimal, flexible footing so a person can stay “light on your feet” as they fight this good fight. The emphasis is placed on anonymity and mobility: if you have public visibility and your assets are traceable, you are vulnerable. A central recommendation is to move wealth into Bitcoin and to do so in a way that makes it effectively invisible to others. The speaker asserts that once wealth is converted into Bitcoin, “it's in Bitcoin. Right? So nobody knows you have it. Nobody can fucking prove that you got it.” The concern is exposure through centralized avenues: “it's on a centralized exchange in an area where they can obviously see that it's in your name.” The implication is that public names and on-chain records can reveal ownership and make one a target. To protect anonymity, the speaker prescribes using cold storage, an air-gapped multisig wallet setup. The process involves transferring funds into a secure Bitcoin storage solution that is not connected to the internet or any easily traceable accounts. The description suggests creating a robust, private system that resists easy attribution or retrieval by others. The narrative uses a stark metaphor about risk and loss: you might “go on a boat ride and you fucking lose your private keys and it sucks. You lost all your Bitcoin. Oh, well.” This underscores the consequence of losing access credentials in a highly secure storage arrangement—the assets could be irretrievable. Overall, the message centers on two intertwined ideas: (1) reduce and compartmentalize wealth to maintain mobility and privacy, especially for public figures, and (2) use Bitcoin and advanced storage methods (cold storage, air-gapped multisig) to keep wealth hidden from prying eyes, with the acknowledgement that missteps (like losing private keys) result in total loss. The speaker repeats the imperative: “Gotta get your fucking wealth out of the system,” reinforcing the urgency of downscaling and re-holding wealth in a way that minimizes exposure.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Make one. Make one. You're wrong. Get out. Your microphone. Hey. What what can we do to help you? Hey. You guys no. That ain't gonna happen. Hey. How can we get you out of here safely? Hello, everyone.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitch Snow, a Fort Huachuca whistleblower, joined a Diligent Spaces edition on X after being invited by the host and via a “request” process. The hosts set ground rules: the focus would be Mitch’s experiences surrounding Fort Huachuca, not a forum for relitigating prior smears, and they invited Mitch to share only what he was comfortable with. The conversation would later open to other speakers for questions. Mitch’s cohost and others emphasized the breadth of questions from the audience and signaled that some topics might be deferred if he wasn’t ready. Mitch explained that his trip to Fort Huachuca was driven by his ongoing effort to obtain records related to his past military service, the events surrounding JTF Six, and the broader history of possible government involvement with drug-trafficking networks. He described a long-standing pattern of being targeted and silenced, with the aim of gathering records to support a custody dispute with his ex-wife and to protect his relationship with his son. He emphasized that the motive for going to Fort Huachuca included reinforcing prosecutorial records that would help his case and corroborating details about the “prosecutorial records” and the tunnel-related evidence that he had previously encountered. Key background Mitch shared included his early involvement with JTF Six in May 1990, where he served as a ground radar and REMBAS sensor operator. He described laying seismic and acoustic sensors to detect movement and to investigate the trafficking routes of cocaine entering through Douglas, Arizona, near the border between Fort Huachuca and Fort Bliss. He recounted that they discovered an underground tunnel used in trafficking, which involved money, guns, and a substantial quantity of cocaine. He characterized the tunnel as an elaborate structure, reportedly linked to a $11,400,000 project, nicknamed a “James Bond Tunnel,” with photos indicating Mexican-side involvement by U.S. members. He testified that a raid followed, the tunnel was shut down, and the cartel reportedly redesigned its distribution channels afterward, shifting smuggling to ports and submarines along the East Coast and other entry points. Mitch described his involvement in interrogations and depositions: he testified in an inquiry with Army CID and a federal prosecutor from Tucson, was later transported home on a plane from Fort Drum, and received a deposition. He explained that the tunnel raid produced a body of evidence beyond cocaine, including firearms and money, and that there were ongoing efforts to obtain prosecutorial records, some of which he intended to reinforce with firsthand documentation. In recounting his motive for returning to Fort Huachuca in September (the date spoken about is September 8/9, 2025 in the discussion), Mitch explained that his purpose was to reinforce archival records, to seek information about prosecutions connected to the tunnel case, and to obtain evidence for his custody case. He noted that this trip was part of a broader record-collection mission across multiple bases (Fort Lewis, Fort Bragg, Fort Huachuca, Fort Houston), often meeting resistance from the government in providing access to files. A central focus of the interview was Mitch’s observations at Fort Huachuca, particularly on his first day at the Candlewood Suites on base (the hotel that serves both base personnel and civilian guests under a private contract). Mitch stated that the Candlewood on base is the location where the civilian side of the base’s lodging is connected with base access, including the gate process that allows civilians who can prove acceptable reasons to enter. He emphasized that he was not barred from entry as a civilian; he could enter with proper identification and a vehicle. He noted that the Candlewood is the same building Mitch had pictorially identified in the past as barracks converted to a hotel, and he described the lobby scene, with a front desk and two enlisted personnel, and a private conversation occurring between a man he perceived as a potential ex-Special Forces contractor and a woman he described as sophisticated and “affluent-looking” with a “sheen.” Mitch intentionally did not name the individuals and described the woman as having a blonde ponytail and striking eyes. Mitch recalled that the couple left in a green GMC or similar vehicle after a private conversation in the hotel lobby. He observed the exchange between the woman and the man with the green watch, noting that the woman walked around the front of the vehicle to get into the passenger seat, with the man driving. He described noticing the couple in the lobby, speculating that the man could be a professional contractor or ex-Special Forces, and that the woman and man later drove away together. In the course of the first day, Mitch moved around the base, visiting the Candlewood, and trying to locate the CID (Criminal Investigation Division) building to request his records. He described getting various directions that sometimes proved incorrect, and he recounted speaking with a gate guard at the entrance to help him locate the right building. He described the interior of the building where he sought to speak to staff about records from the 1990s, including a reception area, a podium, and a pair of personnel at the front desk. He walked through a sequence of rooms, including a sign-in log, and noted a “gray-haired” captain who came to speak with him about his records. In the course of that initial visit, Mitch observed that a VIP party, including a congressman with a congressional pin and two other men with a dual-flag pin, exited the building. He provided a detailed description of the scene, including where the VIPs walked, how close he stood, and the expressions and posture of the men. Mitch identified one of the men exiting as Brian Harpole (whom he later connected to a televised event or interview), and he described the other two as military officers. He described the VIP’s entourage passing him in a doorway, within arm’s reach, with the congressman and others moving through a hallway. He noted the patches on their uniforms, including Ten Mountain Division insignia and airborne patches. After the VIP group left, a black GMC vehicle arrived and a man who had been at the Candlewood the night before joined the group, and they walked to the vehicle. Mitch described the presence of a park ranger, a detective, two captains, and a lieutenant colonel. He testified that a private conversation occurred near the front desk, and a group of officers and federal agents assembled outside as he waited near the front doors. Mitch stated that the group’s arrival and confrontation culminated in him being escorted outside and escorted off the base. He described a bomb-threat-like incident: the officers announced a need to check his vehicle for explosives, evacuated the building, and placed him in a car with Captain Neff to drive him to CID. Mitch said he was escorted to an interrogation room at CID, where he was questioned for several hours with various officers presenting records from county, VA, and other agencies. He described being asked if he could be helped, whether he posed harm to himself or others, and whether he could receive psychiatric counseling; a civilian counselor was brought in to interview him, and he noted the counselor appeared inexperienced and asked questions about medications, diagnoses, and emotions. Mitch reported that the post commander ordered him trespassed off the post for 24 hours, after which he could return for further discussion. He stated that he left the base and returned to Tucson, where his girlfriend Amy (noting that she had supported him) remained a linchpin in his efforts, coordinating his travel and documentation. He described returning to Tucson the next day, then flying to Salt Lake City before returning home. During the time away, his phone communications with Amy intensified; she was understandably distressed by the events, and she encouraged him to pursue answers. Mitch explained that, upon returning to civilian life, he and Amy confronted a press environment rife with allegations and the notion of “stolen valor.” He described receiving calls and emails from Candace Owens, who helped to validate his story and push for its public discussion. He recounted that Candace Owens scheduled interviews and invited him to discuss the case, revealing that his narrative had drawn significant attention from some quarters and intense attacks from others. He credited Candace Owens with validating the authenticity of his experiences, and he expressed appreciation for her willingness to put his story into a broader public arena, even as he cautioned that some individuals and organizations sought to discredit him. Mitch stressed that his overarching aim has been to obtain the records that would corroborate his narrative: the tunnel discovery, the JTF Six mission, the weaponry and materials seized, the agents involved, and the broader implications of the trafficking network. He asserted that the goal was to assemble concrete evidence, to hold those responsible to account, and to secure access to his records for a custody case and future court proceedings. The discussion included a strong emphasis on the persistence of harassment over decades, across administrations of different political parties (Clinton, Bush, Trump), and the complicating factor of private security contractors and other non-military personnel who have been present at bases. Mitch described a pattern of targeted harassment and a complex set of “shills” in public discourse who attempted to discredit him by attacking his past credentials, as well as the idea that the same sources or sponsorship accounts funded a coordinated effort to undermine him. Toward the end, Mitch acknowledged the support from his partner Amy, praising her resilience and courage. The host and panelists praised Amy for standing by Mitch through intense scrutiny and pressure. The group expressed gratitude for Mitch’s candor and the time he spent answering questions, emphasizing that the broader audience should carefully consider the authenticity of his experiences and the seriousness of his claims. They discussed potential next steps, including FOIA requests for the presence of named individuals at the base during the September dates, and the possibility of pursuing further documentation from the Candlewood hotel and other on-base records. As the space concluded, Mitch thanked the hosts and the audience, noting that he would remain available for future discussion and to provide further details if needed. The group closed with appreciation for the audience’s support and a commitment to continuing the dialogue, with Mitch’s story becoming a touchpoint for broader questions about records, transparency, and accountability in relation to Fort Huachuca, JTF Six history, and the alleged connections to trafficking networks and political elites. The hosts announced plans to publish a podcast version of the interview and to share the content more broadly, encouraging listeners to spread the message and stay engaged with the ongoing investigation. They ended with a note of gratitude to Amy and Mitch, and to the audience for participating in a conversation that sought to illuminate hard questions with as much factual detail as possible, while acknowledging that some details remained to be disclosed or explored in future discussions.

Video Saved From X

reSee.it Video Transcript AI Summary
For secure cell phone usage, follow these tips: If you need to contact someone in Europe, set your phone to German language and use only German apps, sending voice messages instead of typing. Avoid Chinese language and apps, regardless of the phone you use. In the UK, buy a phone there and communicate in English, again using voice messages instead of typing. Avoid connecting to WiFi and keep each phone in a separate location with different language settings. To ensure safety, periodically switch to new phones and discard the old ones.

Video Saved From X

reSee.it Video Transcript AI Summary
Hey Nick, can you come here? Let's talk privately, away from everyone. What do you do here during the day? Just hang out with friends? What are your hobbies? You play video games, huh? What kind of games? Wrestling? Who's your favorite wrestler? We're here because of your online posts. Facebook and TikTok blocked you, right? Unfortunately, you're coming with us. I know you don't want to go, but we have to take you to see a doctor. You can't keep doing what you were doing. I'm sorry, but it's necessary. Please, promise me you won't do it again. I want to believe you.

Video Saved From X

reSee.it Video Transcript AI Summary
Signal is recommended for secure communications. For organizing, relationship-building with press and officials, and sharing information, Blue Sky is suggested as an alternative to Twitter and Facebook, which are not trusted due to their ownership. Blue Sky is considered more independent and less likely to be taken over by harmful elements. Signal is preferred for private communications, while Blue Sky is better for coordinating between groups.

Video Saved From X

reSee.it Video Transcript AI Summary
Avoid sharing misinformation on social media. Trust information from police and law enforcement. Check official websites and social media for updates. Police will share credible information about any risks or threats to the community. Rely on law enforcement for accurate information, not social media.

Modern Wisdom

The Case Against Condoms & Fake Friendship - Rick Glassman (4K)
Guests: Rick Glassman
reSee.it Podcast Summary
Rick Glassman and the host dive into a freewheeling exploration of personal boundaries, communication, and the messy realities of modern relationships. The conversation threads through how people read signals, set boundaries, and negotiate comfort in both romantic and platonic contexts. They riff on comfort as a guiding principle for dating and friendships, comparing condom use as a metaphor for safety and presence in intimate moments to the more general need for spaces where honesty and boundaries can be stated openly. The two repeatedly emphasize the value of asking questions, checking in on another person’s feelings, and foregrounding safety and consent in a way that avoids coercion or overreach. A core strand is the tension between self-acceptance and growth: accepting one’s own limits while remaining curious about how to improve communication, and recognizing that self-work can both enhance connection and risk alienating others if done in a heavy-handed way. The guests unpack how misreads, stalled plans, and evolving boundaries shape dating trajectories, friendships, and even professional dynamics in media work. Throughout, there are personal anecdotes about misread cues, the fear of vulnerability, the art of delivering difficult feedback, and the practice of preemptively sharing context to avoid misunderstandings. The discussion also touches practical strategies, from using a concise “one-page introduction” to describe faults or preferences, to creating environments (like a living room podcast set) that lower defensiveness. The speakers reflect on how frequency and rhythm—presentness, pacing, and co-regulation—affect connection, and they debate the right degree of honesty versus tact in social exchange. The dialogue travels through humor, miscommunication, and the paradox of wanting to be seen while wanting others to see you accurately, ending on a note about inclusive, authentic conversation as a route to deeper relationships.
View Full Interactive Feed