TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a movie trailer co-produced by the Obamas about a potential cyberattack and its connection to a video published by the World Economic Forum. They suggest that this may be an example of predictive programming, where fictional stories and media are used to condition the public for future events. The speaker expresses concern that a cyberattack could be used as a pretext for increased control and monitoring of citizens. They also criticize the movie for including divisive elements, such as anti-white sentiment. The speaker concludes by promoting their social media presence.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker discusses the recent cyber attack on a critical infrastructure corridor in the United States. They explain that the attack targeted a bridge on the I-95 corridor, which connects the north and south of the country. The speaker emphasizes that this attack is not just about a river in Baltimore, but rather a strategic and well-planned attack on a vital supply chain. They highlight the impact of shutting down the bridge, including the disruption of the I-95 cargo and shipping corridor. The speaker also suggests that the attack is part of an undeclared war and criticizes the government's response. They urge people to be aware of the catastrophic consequences and not to dismiss the attack.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The World Economic Forum Partnership Against Cybercrime seeks a regulated internet and a digital ID tied to internet access. The goal is to eliminate online anonymity and privacy. The CTI League, a cybersecurity group, has access to critical US infrastructure, including hospitals, dams, and nuclear reactors. The group's main focus is protecting critical infrastructure, but its affiliation with foreign intelligence agencies raises concerns. The possibility of a false flag operation to blame Iran and justify military action is alarming. The CTI League's partnership with CISA, an agency under DHS, allows access to critical systems without proper vetting. The Israeli government's involvement in cybersecurity companies like Clear Sky and Cyber Reason further complicates the situation. The potential for a US cyber attack on Iran is a long-standing goal for Israeli intelligence.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack can be blamed on any nation state or group, as revealed by WikiLeaks before Julian Assange's arrest. The WEF partnership against cybercrime, which includes US intelligence and other agencies, has the ability to frame any actor in a hack. They aim to regulate the internet and tie everyone's access to a digital ID, allowing intelligence agencies to monitor online activities. To convince people of the need for this, a major disruptive event caused by anonymous hackers can be manufactured. Israeli and British intelligence, along with the US Secret Service, FBI, and Department of Justice, are involved, as well as major banks and tech companies. The group also seeks to merge banking, regulatory, and intelligence operations under the pretext of cybersecurity.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US Federal agencies, and major banks. The forum's Partnership Against Cybercrime seeks a regulated internet and a digital ID tied to internet access. The goal is to eliminate online anonymity and privacy. The CTI League, a cybersecurity group, has access to critical US infrastructure, including hospitals, dams, and nuclear reactors. The group's main founder is an Israeli intelligence operative. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League is also involved in censorship efforts.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential consequences if it were acknowledged that the US government funded research at the Wuhan Institute of Virology to engineer a virus that spread worldwide. They argue that the liability and political consequences would be enormous, leading to efforts to deny the truth. They also discuss the rise of populism and the use of social media to influence politics. The speaker criticizes the censorship and propaganda deployed by the US government and intelligence community. They argue that these actions are part of a broader agenda to control and suppress individual autonomy. The speaker expresses concerns about the push for globalism and central planning, which they believe will hinder innovation and destroy human culture. They also touch on the COVID-19 pandemic, the UN treaty on pandemics, and their thoughts on Donald Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum predicts a massive cyber attack before 2025 that will cause a collapse of the banking industry and infrastructure. The forum has been involved in simulations called Cyber Polygon, collaborating with Russian government, US federal agencies, and major banks. The forum seeks a regulated internet tied to a digital ID, allowing intelligence agencies to monitor online activity. The CTI League, a cybersecurity group, has access to critical US infrastructure and is affiliated with Israeli intelligence. The concern is that a false flag cyber attack could be used to blame Iran and justify military action. The CTI League's role in protecting critical infrastructure raises questions about foreign access to US systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a scenario where banks go offline, digital money disappears, and electromagnetic pulse bombs are used to attack major grids. They mention the possibility of a terrorist attack, Russian involvement, or a simulated alien invasion. The speaker believes it's important to talk about these potential threats, despite being labeled fearmongering. They argue that not discussing these possibilities would be irresponsible.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum plans a catastrophic grid outage to reset the US before the election, aiming to disconnect the public from the Internet and create chaos. The elite, including CrowdStrike and Microsoft, are behind this cyberattack. The elites are also targeting food and water supplies, pushing for a cashless society and control over what people can buy. The globalist agenda includes a digital prison, mandatory digital IDs, and CBDCs. The elites are experimenting with controlling humanity through crises like COVID and a water crisis. It's crucial to spread awareness and resist their totalitarian plans.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the possibility of a cyber pandemic and references the World Economic Forum's prediction about it. They mention the Forum's previous accurate prediction of the coronavirus pandemic and suggest that it may be worth paying attention to their future predictions. The speaker explains that the cyber pandemic would involve a bug sweeping through the Internet, similar to a computer virus, and the potential need to shut down the Internet and power grid to prevent its spread.

Video Saved From X

reSee.it Video Transcript AI Summary
Mike Benz, a former State Department official and cybersecurity expert, discusses how the US government has weaponized its power to control media and censor citizens. He explains that the foreign policy establishment, including the State Department, CIA, and Pentagon, has historically used these tactics against foreign governments but has now turned them on the American people. Benz outlines the chronology of how the government established censorship centers within agencies like the Global Engagement Center and the Cybersecurity and Infrastructure Security Agency (CISA) to control social media and suppress populist political movements. He also raises questions about the government's role in COVID-19 censorship and the origins of the virus.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns about false flag attacks, stating that they are used to start conflicts and are based on lies. They mention rumors of Victoria Nuland planning a false flag attack on a Ukrainian nuclear power plant. The speaker is contacted by a filmmaker who discusses the use of false flags by the US government. They mention an incident where commandos were offered money to blow up a nuclear power plant but refused. The speaker also talks about a potential false flag being set up on the southern border and criticizes Greg Abbott for calling for a civil war. They warn against falling into traps and emphasize that the government is out of control.

Video Saved From X

reSee.it Video Transcript AI Summary
The US financial and banking system is in a bad state, and there is a concern about a future cyber attack. The big banks and intelligence agencies want to avoid blame for any collapse. WikiLeaks revealed that intelligence agencies can place the fingerprints of any nation or group in a cyber attack, allowing them to conduct false flag operations. The WEF Partnership Against Cybercrime wants a regulated internet tied to a digital ID, giving intelligence agencies access to people's online activities. They aim to manufacture consent through fear and panic by creating a major disruption caused by anonymous hackers. Israeli, British, and US intelligence agencies, along with major banks and tech companies, are involved in this agenda. The group also seeks to fuse banking, regulatory, and intelligence operations under the pretext of cybersecurity.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Wikipedia is a propaganda operation, and one of its founders told me that the CIA or the American intel community is heavily involved in shaping the message, on Wikipedia. Did you come across evidence of that? Speaker 1: On the weaponization working group, as it's described by attorney general Bondi and the president's direction, intelligence community is one of the groups who was weaponized against the people, obviously. It's obvious. The question is, how are we gonna get to the bottom of it? Right? How are gonna get to the bottom of some of the weaponization of the government intelligence community against the citizens? And that's what I that's where I'm going now.

Video Saved From X

reSee.it Video Transcript AI Summary
Investigative journalist Whitney Webb warns that a new international monetary system is being created, built solely on blockchain technology. This system aims to have total surveillance and control over every aspect of our lives. Webb highlights the plans of global elites like Emmanuel Macron and Klaus Schwab, who advocate for a "great reset" of capitalism. The new system will involve digital IDs and the tokenization of natural assets, allowing everything from forests to rivers to be owned and traded by the super rich. Webb suggests that a major crisis, similar to World War 2, will be used to implement this new financial governance system.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker ties a series of events to a ritual pattern, referencing theProject for the New American Century and arguing that support for its plans overseas would require a new Pearl Harbor, a claim linked to warnings a year before 9/11. They cite the World Economic Forum and Bill Gates’ Event 2010 simulating a pandemic out of China “just six weeks before the footage started appearing of bodies dropping in Wuhan.” They assert that such patterns are intentional signals, and that massive cyber attack drills and Klaus Schwab’s expressed fears of a coming cyber pandemic were steps toward that direction. They note that in December Israel hosted a cyber pandemic drill, and “on Monday just twelve weeks later their government was attacked in what they say was the largest ever cyber attack on the country.” Given Israel’s “infamous hacking capabilities,” the speaker suggests it feels like a controlled vulnerability, a way to create a plausible escape while the detective won’t suspect involvement in the metaphorical murder. The speaker argues that chess pieces are being moved in both Russia and Ukraine to bring about a scenario where “the world we once knew is gone,” destroyed, and a “new world, a world of their design, will emerge.” They claim a future in which “you’ll own nothing, and you’ll be happy, happy in your complete submission.” They invoke a historical allegory, “Like Xerxes to Leonidas,” to describe the perceived power struggle behind these actions.

Video Saved From X

reSee.it Video Transcript AI Summary
There is good journalism happening, especially from independent sources like Whitney Webb. She is knowledgeable about powerful people and how they have manipulated events throughout history. Focusing on "evil oligarchs" and "bloodlines" makes someone a target. It is believed she lives in another country. She has appeared on shows like Patrick Bet David and Jimmy Dore.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the topic of cyber warfare and highlights various incidents involving Iranian and Russian hackers. They mention a book written by Nicole Pearl Ross, a former New York Times reporter on cybercrime, which provides insights into the history and vulnerabilities of cyber warfare. The speaker emphasizes the potential consequences of cyber attacks on critical infrastructure, such as power grids, dams, and nuclear plants. They argue that the US is particularly vulnerable to such attacks and suggests that cyber warfare will play a significant role in future conflicts. The speaker encourages viewers to read the book for a deeper understanding of the subject.

Unlimited Hangout

AI and the War on Agriculture with Christian Westbrook
Guests: Christian Westbrook
reSee.it Podcast Summary
Whitney Webb and Christian Westbrook discuss accelerating warnings of a damaging cyber attack and the World Economic Forum’s role in shaping the narrative and solutions. The WEF, Klaus Schwab, and partners in finance have produced reports suggesting a future cyber attack will target supply chains and third‑party critical services, with at least one nation-state involved and ransomware as the likely trigger. The attack, they claim, would start small and crescendo into a global catastrophe. Even without a cyber attack, global supply chains are degrading, with prices rising across food and electronics. Westbrook emphasizes that food supply disruptions since the COVID era are not a single shock but a cascade of failures. Videos of farmers dumping food captured a broader pattern: restaurants and schools closed, forcing changes in distribution channels, plus force majeure, container shortages, and the Suez Canal blockage driving up shipping costs. A crisis in grains is unfolding as USDA reporting climbs down from prior overstatements of ending stocks, while the US exports grains at record levels, especially to China. South America’s poor harvest compounds demand pressures, signaling historic price levels for corn and soybeans. The discussion links decades of policy—“get big or get out” under Nixon and Earl Butts—to today’s consolidated farming, subsidy systems, and dependence on global processing and trade, including Peruvian onions and US-grown foods shipped abroad for processing. The conversation then maps a spectrum of proposed “solutions”: AI-powered farming, CRISPR-modified seeds, and lab-grown meats, with the AG1 initiative and seed-vaults aimed at cataloging life and deploying GMO seeds worldwide. They note crackdowns on animal farming and possible surveillance-enabled food systems, including blockchain traceability, smart dust, and smart sewers. Harari’s “digital dictatorships” idea and climate-tracing initiatives are cited as elements of a broader control agenda. Westbrook offers resilience: grow food, save seeds, build local economies, and diversify supplies through aquaponics, beekeeping, tools, and community bartering. He urges regenerative agriculture and education to counter centralized control. Follow iceagefarmer.com and Telegram at t.me/icehfarmer for updates.

Unlimited Hangout

The Debate Debacle and 2020’s “Darkest Winter”
Guests: Robbie Martin
reSee.it Podcast Summary
Whitney Webb and Robbie Martin emphasize a set of recent events and ongoing narratives they view as underreported but consequential, including a major hospital-network hack across four states that coincided with nine 11 call center outages, and a broader push they describe as setting the stage for a “darkest winter” in the 2020s with claims that post–COVID-19 crisis bioterror could follow. They flag a convergence of the national security state, Silicon Valley power brokers, and biotech industry as driving these developments. They recap the first US presidential debate as a “total shit show,” a shouted, interruptive exchange with little substantive policy to analyze, remarking on the gap between media judgments about who “won” and the overall impression of both candidates as immature in the exchange. They note the moderator Chris Wallace’s role and the absence of audience feedback, suggesting Trump’s reliance on audience energy was disrupted; they also discuss the prospect of Kamala Harris entering the race and how donor circles and foreign-policy commentary have framed her as a potentially pivotal figure, especially given Silicon Valley support and the broader push for increased surveillance and digital-platform dominance. The conversation then pivots to the broader ecosystem behind these dynamics, highlighting how figures like Peter Thiel and Eric Schmidt dominate a fusion of the national security state and Silicon Valley, with Palantir and Emergent BioSolutions at the center of biosecurity and vaccine development. They discuss Emergent’s involvement in producing COVID-19 vaccine candidates and the company’s safety history, including anthrax vaccine production, and a leadership shift at Emergent’s facility that raises questions about quality control. They connect Kadlik, who chairs BARDA and oversees the strategic stockpile, to broader patterns of public–private collaboration that have intensified since 9/11, including DARPA-linked relationships, funding flows, and the militarization of health security. A prominent thread is the emergence of a bioterror narrative that intertwines domestic extremism with foreign-state actors. They scrutinize a spate of articles and reports—from Politico’s worldwide threat assessments to the Jerusalem Post and other outlets—that describe a supposed alliance between white supremacists and Iran or Al Qaeda, and they insist the framing relies on cherry-picked sources, think-tank pedigrees, and a long lineage of “Dark Winter”-era precursors. They point to Ryson letters, hoax anthrax letters, and a pattern of sensational reports ahead of elections to shape public perception and policy. They argue these narratives are coordinated with warnings of engineered pathogens and heightened surveillance, including calls for travel bans and contact tracing, which they see as tools to expand state power over civil liberties. They close by underscoring the intersection of Microsoft, DHS, and the national-security apparatus, arguing that the ongoing push toward surveillance-driven governance—through artificial intelligence, predictive health, and militarized vaccine deployment—signals a trend toward a domestic security state that could outpace public accountability. They warn that the climate of fear makes it easier to sell expansive control measures, and stress the importance of remaining vigilant about how these forces shape policy regardless of who wins elections.

Unlimited Hangout

The Pre-Planned Chaos of the 2020 Election with Charlie Robinson
Guests: Charlie Robinson
reSee.it Podcast Summary
Whitney Webb and Charlie Robinson discuss predictions of chaos around the 2020 U.S. presidential election and how intelligence-linked simulations anticipated turmoil long before the coronavirus crisis, with outcomes ranging from a constitutional crisis to martial law. They point to simulations produced by networks tied to former Bush or Obama officials, neocon think tanks like PNAC, and allied groups. They argue these drills are not mere “war games” but part of a toolkit that maps possible futures, and note a pattern of simulations preceding major events such as 9/11, the anthrax attacks, London’s bombings, and the coronavirus crisis. Two organizations created around March are highlighted: the Transition Integrity Project and the National Task Force on Election Crises. The Transition Integrity Project’s cofounder Rosa Brooks is described as an Obama-era DOD and Hillary Clinton State Department adviser, previously special counsel to the president of George Soros’ Open Society Foundations, and affiliated with the New America Think Tank, funded by Eric Schmidt, the Gates Foundation, Pierre Omidyar, Jeff Skoll, Reid Hoffman, and Craig Newmark. The other cofounder, Nils Gilman, is vice president of programs for the Berggruen Institute, which envisions a transnational network addressing AI and gene editing. Membership overlaps exist across both groups, including Michael Chertoff, Max Boot, David Fromm, Bill Crystal, John Podesta, Robert Gates, and Larry Wilkerson, with Wilkerson being a prominent public figure in both efforts. The groups’ membership is not fully public, but various reports note their overlap and the presence of PNAC-linked figures. The groups reportedly gamed four election scenarios: ambiguous results, a Biden victory, a Trump victory, and a narrow Biden win. A particularly striking hypothetical under a clear Trump win describes the Biden campaign encouraging Cascadia—California, Oregon, and Washington—to secede unless Republicans agreed to reforms such as granting statehood to Washington, D.C., and Puerto Rico; dividing California into five states; mandating Supreme Court retirements at 70; and eliminating the Electoral College. The scenario then envisions Congress awarding the presidency to Biden, with Pence and Republicans resisting, leading to a constitutional crisis in which the military’s role remains unclear. The discussion emphasizes that the people behind these simulations—like PNAC alumni—“are not Nostradamus” but seek to shape outcomes by prefiguring them. The conversation also covers how some involved openly support Biden, and how the campaigns leverage narratives of democracy threats. Hillary Clinton’s recent remarks about not conceding are juxtaposed with the TIP projections. They discuss campaign energy differentials, the debate dynamics, and the perception that Biden’s team seeks stability and predictability, while Trump’s unpredictability complicates control. They examine cyber and foreign interference narratives. Cybereason, an Israeli-founded cybersecurity firm with Unit 8200 ties, has major investors such as Lockheed Martin and Microsoft-linked entities; its founder served in Israeli intelligence. Cybereason’s work, and broader CTI League efforts, are cited as manifesting the external dimension of election security narratives. The discussion critiques media and political elites who promote foreign-interference threats while overlapping with pro-Israel intelligence circles. They argue these dynamics intersect with broader agendas, including AI governance and the World Economic Forum’s Great Reset, suggesting a convergence of technocratic power, media narratives, and political operatives aimed at managing or engineering political outcomes. They close by signaling ongoing reporting on these themes, highlighting the need to recognize the pattern of simulations, prepositioning, and narratives intended to normalize drastic interventions around elections, including potential continuity-of-government scenarios.

Johnny Harris

Why Hacking is the Future of War
reSee.it Podcast Summary
On November 10, 2008, Barack Obama learned about Project Olympic Games, a secret cyber weapon developed by the U.S. and Israel to sabotage Iran's nuclear facilities. This weapon, known as Stuxnet, was a computer file that manipulated centrifuges without detection, showcasing a new era of cyber warfare. Unlike traditional attacks, cyber weapons can disrupt nations quietly and effectively. Following Stuxnet, cyber attacks escalated, with incidents like the 2015 blackout in Ukraine and the 2017 NotPetya attack causing massive economic damage. The rise of cyber warfare has blurred the lines of conflict, making it difficult to respond to attacks that appear as mere hacking incidents, thus changing global power dynamics.
View Full Interactive Feed