TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked visitors to Jeffrey Epstein's island using cell phone data, revealing their movements from various locations to the island. The data showed visitors' origins in multiple US cities and other countries. Near Intelligence sources its data from advertising exchanges, which can be used for mass surveillance. While this data raises privacy concerns, individuals can protect themselves by using trusted apps, turning off location services, using ad blockers, or employing VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: You've heard me talk about the five g towers and how it's not for Internet at all. It's a microwave weapon developed by the military to be used on the citizens. Take a look at this video. Speaker 1: They started at 09:11 at night until 09:11 in the morning. You see the pulse going from the East to the West Coast. Alright. Boom. You see that? Those are NEXRAD stations. Each of those towers are 750 kilowatts, pumping out between 2.7 to 2.9 gigahertz in the microwave range. This is roughly the same frequency as your microwave oven. Speaker 0: Now there are tons and tons of whistleblowers coming out about this technology and how dangerous and damaging and deadly it is. This is not for Internet. You wanna know if it's true? Go right up to one of those damn towers and see how good your service is. It's still gonna suck. These things are not for Internet service or communications. It's a weapon. They are frying you with microwaves while you sleep. If you saw in the video, did you notice where it wasn't? Where they weren't microwaving the population while they slept? All the areas of the country that are the least populated. Is that by accident? Those microwaves just magically don't go to those certain areas of the country? No. There's no reason to do it there. There's very few people that live there compared to the populated areas of the country that have huge cities in them. That's where you notice they are microwaving you to death. Are you feeling sick? Are you feeling lethargic? You can't think straight. You're not sleeping well. You're having crazy dreams. All of this stuff is radiation poisoning. Look up the symptoms of radiation poisoning. You're gonna see they identically match a lot of your symptoms that you're having. Funny enough, it also matches a lot of the symptoms of COVID. Crazy how that works. So I'm telling you guys, you have got to understand what's happening. And they're talking about putting up four times the amount of towers in the next four years. Why would they need that? We can prove that it's not for Internet. It's not for cell phone service. So why? You need to start asking yourself, why are they putting these things up at an unprecedented rate and then lying to your face about what they're for? Reach out. Let's connect. Let's figure out the plan of how we stop this.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
A founder's group at Peking University developed source code for typing Chinese characters, which was seized by the Chinese intelligence bureau. They inserted a backdoor into apps that allow Chinese typing, potentially compromising them for surveillance by the Chinese Communist Party and military. WeChat is just one of many apps that could be used for this purpose. While not everyone will be targeted, the CCP has the resources to monitor US cell phones, especially if they believe someone can be of assistance to them.

Video Saved From X

reSee.it Video Transcript AI Summary
To check if you're being tracked, dial *#62# on your phone. If you see any call forwarding options, you're being tracked. To disable this, dial ##002# on your phone. This erases all call forwardings. Like, share, and follow for more content like this. Translation: To check if you are being tracked, dial *#62# on your phone. If you see any call forwarding options, you are being tracked. To disable this, dial ##002# on your phone. This will erase all call forwardings. Like, share, and follow for more content like this.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
5G towers are not for internet; they are a microwave weapon developed by the military to be used on citizens. NEXRAD stations, pumping out between 2.7 to 2.9 gigahertz in the microwave range, operate from 9 PM to 9 AM, pulsing from the east to west coast. These towers output 750 kilowatts, roughly the same frequency as a microwave oven. Whistleblowers claim this technology is dangerous and deadly. The towers aren't for internet service, as service near them is poor. Populated areas are being microwaved while people sleep, while less populated areas are spared. Symptoms like sickness, lethargy, inability to think straight, poor sleep, and crazy dreams are signs of radiation poisoning, matching COVID symptoms. The plan is to quadruple the number of towers in the next four years, despite proof they aren't for internet or cell service.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels possess Pegasus spyware, developed by the Israeli firm NSO Group, which can infiltrate phones without requiring users to click any links. This "no-click malware" can access data before encryption, including calls, texts, emails, location, and social media. It can also activate the phone's camera and microphone for surveillance and take screenshots, all while conserving battery life to remain undetected. NSO requires approval from the Israeli Ministry of Defense for each sale. Mexico has had this software since at least 2016. Initially, NSO claimed it helped capture El Chapo, but it was also used against journalists and those opposing government corruption. Cartels are now allegedly teaming up, armed with military-grade weapons and narco drones, viewing the U.S. government as a common enemy. They could use Pegasus for blackmail or to plant evidence on phones. Striking cartels inside Mexico is complicated because the cartels have infiltrated the Mexican government, and military officials admit uncertainty about winning the war on drugs.

Video Saved From X

reSee.it Video Transcript AI Summary
Hey everyone, this is a quick tutorial on how to use the ICE tip line linked in my bio. It's an interactive map where you can report and view ICE sightings. For example, if you're in Los Angeles, you can zoom in, click on a pin to see the details, like time, location, and any available comments. You don't need to log in, and you can also leave comments to verify sightings. To add a new sighting, hit the plus or edit button, type in the address, and upload pictures or videos directly from your phone or from a link. Include details like the number of agents, whether they were in a vehicle or on foot, if they were armed, what they were doing, and the business they were at. The pin colors don't have any meaning right now. Share this with your family and loved ones to keep each other safe! I'm working on improvements and assembling a team to help maintain the data. If you're interested in volunteering, let me know. I'm grateful for the community's support in keeping each other safe.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that 99% of phones worldwide are being tracked by governments through push notifications. The US government allegedly has a gag order on the two largest phone companies to keep this information hidden. Senator Ron Wyden states that foreign governments have reached out to Google and Apple for push notification data. These notifications, which appear on the screen, are sent from the app to a cloud server and then to the phone. The governments are requesting this data from Google and Apple, potentially including text information, metadata, and location details. The speaker suggests that the lack of coverage on this issue may be due to the influence of advertising and algorithms controlled by Apple and Google.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
So today, we're gonna hit on an important website called antennasearch.com. And what you do is you go in and you look up how many cell phone towers and antennas have been installed near your home while you weren't paying attention. This is the whole fast tracking of 2020. and if you own a cell phone, you should switch it to LTE, not five g. That's how you boycott this system, which is trying to poison us. In 2020, you had four g, and then all of a sudden in 2021, you had five g, and then now in 2025, you have five g all over the place. And people are coming down with radio wave sickness. Fevers, chills, shortness of breath, fatigue, headaches, loss of smell, insomnia, pain in the chest, dizziness, muscle pain, hypertension, strokes, and messing with your thyroid. What's more wild is the cell phone tower companies. You can't sue them.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker rents a car for repairs and asserts, 'These new cars are cell phone towers. That's what that is right there. See that?' and, 'you can't turn them off.' They suggest buying an old car to avoid being blasted with radio frequencies the entire time checked out, like a cell phone tower while you're driving around. 'So when they ask where all the chat GPT information is coming from, guess what? Here you go.' They mention 'GSR speed assist app.' 'This tracks your speed so that Google gets your information the entire time,' and claim, 'Google knows and they can get send you a ticket.' Finally, 'In the newer cars, you're not allowed to turn this LTE off. You can turn off Bluetooth and Wi Fi, but you can't turn off your car being a cell phone.'

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked cell phones of visitors to Jeffrey Epstein's island, exposing their data online. Near Intelligence, linked to US defense contractors, meticulously monitored visitors' movements over 3 years. The data revealed locations in the US and other countries. Near Intelligence sources data from advertising exchanges, selling it for targeted ads and possibly to the military. This highlights the potential for mass surveillance through ad tech. While smartphone users can be tracked, steps like using trusted apps, disabling location services, and using VPNs can help protect privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
This is a quick tutorial on how to use the ICE tip line that's linked in my bio. It's an interactive map, so you can zoom in to an area, like Los Angeles, and click on a pin to see recent ICE sightings. These are anonymous posts with details like location and what they were doing. You can also leave comments to verify sightings. To submit a tip, hit the plus or edit button. You can type in an address, upload pictures or videos, and add details like how many agents there were, if they were in a vehicle or on foot, whether they were armed, and what business they were entering. The pin colors don't mean anything right now. Share this with your family and loved ones to keep each other safe. I'm working on improvements and assembling a team to help with data maintenance and archiving. Thanks for all the love and for being part of a community that looks out for each other.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.
View Full Interactive Feed