TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
According to Speaker 1, the intelligence agencies hid the fact that Bin Laden was in Iran, not Afghanistan or Pakistan, to justify military action in the Middle East. This manipulation started under Clinton and continued under Bush Jr. Speaker 1 claims that intelligence agencies have tentacles around the world and don't answer to anyone, which is a problem for Trump. Speaker 1 alleges that they were targeted after questioning 9/11, resulting in an FBI raid on their daughter's house weeks before an election, which they believe was politically motivated to remove them from office. No charges were ever filed against the daughter, and boxes taken were returned unopened months later. Speaker 1 claims that the person who ran the campaign against them was managed by the staff director of Sandy Berger's company. Speaker 1 asserts that some individuals within intelligence agencies are making money from conflicts and vows to expose them.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Many drones, likely from communist China, are increasingly flying near our military bases. This uptick coincides with more incursions by Chinese nationals. It seems they are preparing for a potential attack on the U.S. from within our own borders. There's no need for an explicit warning from Beijing; the threat is evident. We are at risk of being targeted, yet we are not taking adequate measures to safeguard our bases or protect the American people.

Video Saved From X

reSee.it Video Transcript AI Summary
Jerry Nadler has described the raid of his office as outrageous and fascistic. However, the speaker claims Nadler's aides and staffers protested outside an immigration courthouse, then ran back to Nadler's office, a secure government building, when things escalated. The Federal Protective Service performed a wellness check after being notified protesters entered the building. The speaker asserts that Nadler's staff pushed back against DHS, claiming they needed a warrant, but the speaker states it's a public building, so no warrant was required. According to the speaker, one of Nadler's staffers, whose legal status is unknown, pushed a DHS officer, which the speaker claims is a crime. The speaker concludes that Nadler's office committed an insurrection and that no one is above the law.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The secret service has dismantled a telecommunications threat right here in the New York state tristate area. a covert network of devices capable of shutting down cell service right as the UN general assembly is underway. These devices federal agents say could have disabled cell towers and essentially shut down the cellular network in New York City. Inside several locations, agents found thousands of networked cellular devices. The system allowed anonymous encrypted communications between criminal and foreign actors and could have caused massive disruption to government and emergency communications. Some experts say this network could have sent as many as a million text messages a minute, potentially disrupting all kinds of issues here. The investigation actually began in the spring. No arrests have been announced.

Video Saved From X

reSee.it Video Transcript AI Summary
A new report alleges that the House and Senate are investigating whether foreign adversaries illegally funneled money into Democratic campaigns. Letters were sent to the Treasury Department, FBI, and the Director of National Intelligence, claiming China, Iran, Venezuela, and Russia funneled money through ActBlue. According to one speaker, 19 state attorneys general, Senator Ron Johnson, and House Administration Committee Chairman Brian Pfau are also investigating. Congressional officials are requesting Suspicious Activity Reports (SARs). Congress suspects foreign money is being routed to Democratic coffers. The speaker claims that obtaining SARs was key to substantiating the Hunter Biden story by tracing foreign funds. If Trump wins the election, the speaker predicts the Justice Department will launch a major criminal investigation in 2025.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker suggests that if certain agencies asked Twitter to suppress the laptop story by falsely labeling it as Russian disinformation, it implies the story is true. They claim this shows the Biden family is compromised by foreign interests, leading to an illegitimate administration. This implies the country is under foreign occupation.

Video Saved From X

reSee.it Video Transcript AI Summary
Two years ago today on 10/17/2023, I was sentenced to sixty days in prison for trespassing outside the capital on J sixth. The judge during my sentencing said that I misused my platform as a candidate for elected office. If you don't know, my name is Ryan Kelly. I was the leading gubernatorial candidate in the state of Michigan in 2022 when the FBI raided my house on 06/09/2022, and they arrested me on misdemeanor charges, nonviolent, never even went inside the Capitol Building, was the leading gubernatorial candidate, election interference. I was the best poised to beat Whitmer. But, anyway, that's the point of all of this right now. The judge said that I had a lot of folks that followed me. I had a lot of folks that supported me. And with that comes the responsibility of not peddling lies and falsehoods. And he was talking about the twenty twenty election because I said it was a fraudulent stolen election. He was talking about January 6 because I said that the January 6 that there was FBI agents there that were setting the whole thing up and involved in the crowd. And what did we find out here recently? Oh, I was right, but I was sentenced to sixty days in prison for that. One of the biggest things the judge brought up that he had a huge problem with the Facebook posts that I had. Right? Freedom of speech. Poof. Gone. Kings do that kind of stuff. They don't let their people talk freely. Is that right? And then on top of that, you know, lying and misleading all of my supporters when we come to now find out there was 274 agents that were in the crowd that day on January 6. You know, it's obvious that the Democrats are the tyrants, the kings, if you will. Right? I mean, look at what they did with Kamala in the primary. Right? I don't need to explain it to y'all. But, you know, here we are. The Trump administration is removing illegal immigrants from our country and doing good things for America. It was the Biden administration, the Democrats that targeted American citizens. Red, white, and blue. Let's go USA.

Video Saved From X

reSee.it Video Transcript AI Summary
These covert weapons leave no physical evidence, making it easy for adversaries to deny their use. The attacks are happening in Washington DC, with reports of similar weapons being used by Americans on Russians. This could be related to the CIA's efforts to conceal this technology.

Video Saved From X

reSee.it Video Transcript AI Summary
I've been frustrated about drones flying over New Jersey, including one that hovered over my farm. After writing a column on the issue, I learned that the intelligence community briefed the House Intelligence Committee about these drones, but no one had the courage to disclose this information publicly. Members of Congress know the origins of these drones but are silenced by fear of repercussions from the intelligence community. This raises serious concerns about our democracy. It seems we are increasingly living in a police state under Joe Biden.

Video Saved From X

reSee.it Video Transcript AI Summary
Last night, it was revealed that Tony Blinken played a significant role in orchestrating a plan involving 51 intelligence operatives. Their objective was to discredit a laptop that is widely known to be genuine. All evidence points to Blinken as the mastermind behind this scheme. It is crucial that he is questioned and held accountable for his actions.

Video Saved From X

reSee.it Video Transcript AI Summary
Several suspicious ships were not inspected by the Coast Guard, and there were mystery drone flights over a nuclear testing range in Nevada. FBI agents reported drones flying over their homes, indicating a lack of seriousness from the administration regarding these threats. Recent drone attacks, like the one on Prime Minister Netanyahu's residence, highlight the urgency. Base commanders should have the authority to defend their bases without needing permission from higher officials. Concerns about collateral damage are misplaced, as any damage would be the fault of the People's Republic of China, which has previously violated U.S. airspace with drones. It is suspected that these recent drone incidents are also linked to China, given their capabilities. Understanding these developments is crucial for the future of warfare.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 argues that there may come a time with an airborne deadly disease and that to deal with it effectively we must build an infrastructure globally to see, isolate, and respond quickly. He says investing in this infrastructure is a smart, long-term measure and not just insurance, especially in a globalized world where future outbreaks like a flu similar to the Spanish flu could arise in five to ten years. Speaker 2 contends that the CIA enjoys influencing a new president who has no background in intelligence or foreign policy. He claims the day after an election the CIA director offers a president-elect a PDB, a president’s daily brief, describing the “cool things” happening around the world, which allegedly pulls the president in. He asserts the CIA engineers the president’s reactions and questions and that this is a deliberate psychological profiling and manipulation technique used for decades to subvert foreign governments and one’s own government. Speaker 4 relates a story from February 2008 about a high-level asset who allegedly worked for several intelligence agencies, including the Saudi Intelligence Service and the CIA, and who was described as a non-U.S. citizen on a student visa, becoming president in 2008. He alleges the individual’s code name was Renegade and real name Barry Sartaro, claiming a cabal pursued a mission to destroy the United States from within one institution at a time, including defunding the military and ordering military actions that harmed allies and aided enemies. He claims the president’s office instructed commanders not to question orders, and asserts actions created ISIS-like outcomes by redirecting and abandoning equipment to enemies. Speaker 0 interjects with a narrative tying Bush and Obama together, describing a perceived connection through Barack Obama’s supposed adoption by Lolo Sotoro, with references to George H.W. Bush’s CIA tenure and oil-industry ties. He claims Obama’s grandmother operated CIA money channels to the Southwest Pacific, and asserts Obama attended a Hawaii high school with tuition figures and later became extremely wealthy, with Business Insider reporting 2017 net income and 2018 net worth figures for Obama, contrasting them with Trump’s earnings. Speaker 2 discusses Obama-era “kill list” meetings led by John Brennan, suggesting that Tuesday morning kill lists were used to authorize drone strikes or targeted killings, with weekly execution of these lists and a proliferation of drone missiles during Obama’s presidency. He notes uncertainty about whether subsequent presidents continued or revived the practice, but asserts it was a point of pride in the Obama administration. Speaker 5 and Speaker 2 conclude by reaffirming that Obama dropped more missiles from drones than anyone else.

Video Saved From X

reSee.it Video Transcript AI Summary
Daniel, while doing metrics review, noticed indicators of compromise, including a 200-300% increase in data being moved out of the NLRB system, specifically 10 gigabytes worth of data from an internal record-keeping device containing private information about union organizers and privileged business data. The White House stated this was part of an effort to eliminate waste, fraud, and abuse. However, within fifteen minutes of Doge engineers creating accounts, someone from Russia allegedly tried to log in with the credentials. There are also claims that data is being exfiltrated using Starlink, potentially funneling information directly into Russia. Internal databases throughout the government, including those at the Department of Treasury, Energy, and Defense, have reportedly been opened to the internet. Logs and records of what the Doge team accessed are missing specifically after the data spike incident, including whether they accessed information related to cases about Elon Musk, whose companies have faced complaints at the NLRB.

Video Saved From X

reSee.it Video Transcript AI Summary
- The speaker claims that John Ratcliffe, the CIA, and Mossad are all the same, asserting that CIA and Mossad were involved with the assassination of Charlie Kirk and questioning where Steve Bannon stands on that issue. The speaker lambasts Ratcliffe as a “gosh damn fraud” and accuses intelligence agencies of destroying the country, urging removal, arrest, and charging of these figures. - The speaker recounts past involvement with Steve Bannon’s network, saying they used to be on frequently to discuss border and child trafficking topics, but after shifting to child trafficking, Bannon became unavailable. The speaker asks viewers to comment on whether they should appear on Bannon’s show again when a new documentary on child trafficking is released in November, and claims to have sent many texts to Bannon’s daughter, suggesting a sense of personal outreach that went unanswered. - A request is made for Bannon to show up on the speaker’s channel, with the speaker implying a personal connection and asking viewers to indicate if they think the speaker should appear on Bannon’s show as the new documentary drops. - The speaker urges viewers to watch their video and claims that Ratcliffe is a “gosh damn fraud” and a traitor, arguing that the two-tier justice system exists because intelligence agencies are “destroying our gosh damn country.” - Speaker 1 adds, supporting a broader conspiracy narrative: Witkoff is briefed three times a day by the CIA, and they lie to him. The speaker asserts this is not a marginal intelligence mistake but a deliberate pattern. - The discussion moves to the Israeli-Palestinian conflict, with claims that Hamas “doesn’t wanna do the deal” and that this comes from the Mossad and Netanyahu. There are calls for Ratcliffe to resign or for a congressional hearing on national television to reveal what Ratcliffe told negotiators. - The speaker references the beginning of a twelve-day war and says what Ratcliffe told the president about it was a lie, supported by a claim from the Times of Israel that cabinet minutes show Netanyahu’s cabinet was two years away from any emergency, not two days or two weeks. The speaker contends there was an emergency to kill negotiators so Witkoff could not meet in Muscat, Oman, on a Sunday, alleging that Mossad controls the CIA. - The closing remark credits Tulsi Gabbard and claims she was targeted or run out of the city, reinforcing the theme of institutional control by Mossad over American intelligence agencies.

Video Saved From X

reSee.it Video Transcript AI Summary
"This is absolute proof of what we knew all along and what the president has denied, namely that we were attacked." "This is a very serious attack against The United States by a hostile foreign power, an attack against our election process, our our entire governing process." "That it we know that the attack is continuing and that our intelligence agencies tell us that it's going to certainly continue through the next election." "the president and the republicans in in the house for that matter refuse refuse to do anything about, protecting us from an attack." "Imagine if FDR, had denied that the Japanese attacked us at Pearl Harbor and and didn't react." "That's the equivalent." "They didn't kill anyone, but they're destroying our our country."

Video Saved From X

reSee.it Video Transcript AI Summary
A classified DHS raid on Democrat Representative Jerry Nadler's office uncovered military-grade encrypted drone hardware, remote global trigger modules, schematics used in Ukraine's drone strikes against Russian planes, and confidential access keys to a shadow ops network. According to the speaker, a sitting US Congressman possessed global war tech. Hard drives and payment ledgers revealed this was not an isolated incident, but a military-to-foreign handoff, a war machine operated from within the Democrat Party. The drone systems were coded for international activation and linked through VPN and encryption layers. The speaker claims this is treason, not incompetence or partisanship, and that Trump was cracking into their weapons cache. A US Congressman had the keys to untraceable drone hardware designed to kill without fingerprints. The speaker urges listeners to question who else has this tech, how deep the treason runs, who had privy to this knowledge, and what mission Nadler was helping arm. The speaker asserts this is Congress running a back channel war room with hardware meant for US enemies.

Video Saved From X

reSee.it Video Transcript AI Summary
President Trump's DHS conducted a classified raid on Jerry Nadler's office and found military-grade encrypted drone hardware, remote global trigger modules, schematics used in Ukraine's drone strikes, and confidential access keys to a shadow ops network. A sitting US Congressman possessed global war tech. DHS agents also found hard drives and payment ledgers, indicating a military-to-foreign handoff, a war machine operated from within the Democrat Party. The drone systems were coded for international activation and linked through VPN and encryption layers. A US Congressman had the keys to untraceable drone hardware designed to kill without fingerprints. The speaker claims that if DHS had not moved, this would not have been discovered. The speaker urges every American to ask who else has this tech, how deep this treason runs, who had privy to this knowledge, and what mission Nadler was helping arm. The speaker asserts this is Congress running a back channel war room with hardware meant for US enemies.

Video Saved From X

reSee.it Video Transcript AI Summary
If Ukraine assisted in the assassination of Donald Trump, even at a low level, serious consequences should follow. Ryan Routh, who communicated with a Ukrainian number, had connections to Ukraine, fought there, and recruited for them. Someone in the Ukrainian military tried to use an RPG to attack the president. Unraveling the Ukraine assassination plot against Trump will implicate too many Republican senators and members of Congress. Many members of Congress use anonymous LLCs and Shell Corps in the Cayman Islands to receive undisclosed payments, often in crypto, which is why they are pro-war. Elements of the deep state working with Ukrainian elements tried to take out the president.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 claims that Pelosi is trying to remove the chairman of the joint chiefs of staff through the 25th Amendment or impeachment. The reason for this is because Pelosi's laptop was allegedly taken by a group of special forces mixed with Antifa during the recent events. Speaker 0 believes that this group has sensitive data and there is someone who will expose it, leading to a major change. They mention an executive order from 2018 that allows the President to declare an emergency if foreigners are involved in US elections, suggesting that COVID-19 was a deliberate biological attack.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses foreign interference in elections and questions why the president is not pursuing this avenue. They mention evidence of votes being sent overseas and foreign actors meddling in elections. The speaker then explains how voter rolls are kept in foreign nations, such as Pakistan, and how fake ballots are attributed to registered voters who have not yet voted. They reveal that 171,000 blank fake ballots were dropped into the system and attributed to different people, ultimately benefiting the Democratic candidates. The speaker concludes by stating that there are other aspects of foreign involvement in elections.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims there was a joint CIA-Mossad operation that began on December 28 during Volodymyr Zelensky’s meeting with Donald Trump, and twenty-four hours before Trump sat down with Benjamin Netanyahu. The intelligence agencies allegedly devised a plan to crash the Iranian currency to ignite protests against the government. The speaker asserts that this was not organic, citing George Soros as having done something similar to the UK a few years earlier, implying that the intelligence community with the backing of the US Treasury could do it to Iran as well. It is claimed that the Western narrative portrayed the protests as spontaneous and rooted in opposition to the regime, while the speaker asserts that prepositioned Starlink terminals, arranged through Elon Musk, were used to support the protests. These terminals, the speaker says, did not appear spontaneously; they were purchased through the intelligence community and distributed through intelligence networks to individuals inside Iran, including Kurds, the Mujahideen al Khal, Baluchis, Azeris, and others, who were opposed to the government. These actors allegedly received weapons, ammunition, and money, and coordinated attacks that continued until about late last Thursday or early Friday morning Iran time. According to the speaker, Russia’s electronic warfare helped disrupt the protests by tracking down and disrupting the Internet and shutting down the Starlink system, which eliminated the protesters’ ability to organize and coordinate. Iranian security services then moved in and began taking down protesters. The speaker asserts that all of this was planned to coincide with certain events, and implies that if the disruption had not occurred last Friday, it would have culminated on Tuesday with a US military strike believed to have brought about a collapse of the government, with stories that the MOLAs (mullahs) were going to flee to Moscow. The disruption, the speaker says, prevented the strike, and Trump reportedly called off the attack. The speaker concludes that the United States intends to strike Iran, and that the attack is expected to take place later in February or March.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that USAID and the CIA helped orchestrate Trump's impeachment. According to the speaker, the House of Representatives impeached President Trump in December 2019 based on a memo written by a CIA analyst held over from the Obama administration. The memo relied heavily on a report by the Organized Crime and Corruption Reporting Project (OCCRP), an organization initially funded by USAID. The speaker alleges that USAID was involved in regime change abroad and, like censorship tools used abroad, helped create a predicate for Trump's impeachment. The speaker suggests this is one of many revelations to come.
View Full Interactive Feed