TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Charles (Speaker 0) and Mario (Speaker 1) discuss a wide range of intelligence topics, personal history, and contemporary covert operations, emphasizing experiences from the CIA and reflections on global security dynamics. Charles begins by outlining his background: growing up on a farm in Ohio, enlisting in the Navy as a law enforcement specialist at 17, studying East Asian languages and Mandarin, and eventually learning Persian. He joined the CIA in July 2001 as an operations officer, spending most of his career in the Middle East with stints in Europe and Asia, and leaving the CIA in 2019. Afterward, he worked at Tesla to set up an insider threat program and manage global information security investigations. He notes extensive experience with China, Russia, Israel, France, and South Korea, and emphasizes the prevalence of intellectual property theft and proprietary-systems concerns in the private sector, including the role of motivated individuals and cross-border actors seeking to commercialize advanced technology. The conversation turns to leadership targeting and decapitation concepts. Charles references how the Iraq War began with an attempted decapitation strike at Saddam, asking whether removing a center of gravity leadership could end a conflict decisively and whether that would be humane. He discusses Iran as a persistent factor across the region, arguing that Iran’s meddling contributed to problems in Iraq, Lebanon, Syria, and Yemen, and that without Iranian involvement, upheaval might be less intense, though turmoil remains possible. Mario expresses fascination with intelligence capabilities, particularly related to Iran, Lebanon, Hezbollah, and Maduro, and asks about Charles’s CIA background and roles. Charles explains that his work involved recruiting individuals with access to foreign governments to commit espionage and provide secret information—“human operations.” He emphasizes the dramatic realism of espionage as two people engaging in a life-changing conversation, rather than high-action TV tropes. They discuss border crossings and the reality of intelligence work. Charles notes that the hardest border crossings were often returning to the United States, when travel appearances didn’t match and documents or identities could be scrutinized. He stresses the difference between romanticized espionage and the real tension of crossing borders with non-legitimate materials, relying on confidence, charisma, and interaction under stress. On private-sector and national-security crossover, Charles highlights the complexity of cyber threats and corporate espionage. He describes a Tesla case involving a Russian criminal organization attempting to install malware, with FBI involvement and the arrest of a Russian national. He explains that in cyber threats, the distinction between government-sponsored and private actors is often blurred, with organized crime sometimes acting as proxies for larger state agendas. He notes that entrepreneurial actors seek to accelerate development by acquiring others’ material, not building entire systems from scratch. He also comments on the blurry boundary between nation-states and private actors in tech espionage and the difficulty of attributing responsibility. The Mossad’s capabilities are analyzed in depth. Charles argues Mossad excels by focusing on high-impact targets within a narrow geopolitical scope (Lebanon, Syria, Iran, Iraq) and by strong locational intelligence—understanding where leaders live, work, and their access points. He emphasizes Mossad’s willingness to act decisively, using surrogates and superior technology for surveillance. He mentions the head of Mossad and a quote from his book about ubiquitous surveillance through devices like phones and watches. He notes the “pager operation” against Hezbollah as a case study in supply-chain manipulation and the use of compromised intermediaries, and he cautions that modern operations involve cyber manipulation and near-constant information-flow considerations. Both discuss real-world operations, including the 2010 Dubai operation targeting a Hamas logistics figure, and general lessons about operational security, noting that some details cannot be disclosed publicly. They reflect on the “gentleman’s rules of the game,” acknowledging that lethal operations and leadership-targeting can be controversial and legally complex; they discuss how different regimes and leaders are perceived and targeted. The Maduro operation is revisited. Charles describes gathering information through satellites, drones (including covert, stealth, and micro-drones), and human intelligence; he stresses determining a target’s pattern of life, where a leader lives, sleeps, moves, whom they meet, and what they eat. He notes that insider sources and the right informants are critical, and he discusses the balance between opportunities created by regime instability and the risk of compromised sources. He emphasizes that in times of turmoil, there is opportunistic recruitment, as some individuals see few options other than cooperating with outside powers. Privacy is a recurring theme. Charles asserts that privacy is not dead but requires effort to protect. He compares privacy to fitness, arguing that modern technologies make it easy to be public, but steps can be taken to reduce attack surfaces, including privacy consulting, careful metadata handling, and secure, layered security (physical security and cyber measures). He uses anecdotes about Strava revealing location data and a submarine commander whose Strava activity was linked to his demise, illustrating how personal data can reveal sensitive information. Towards the end, Mario and Charles discuss strategic ambiguity and unpredictability in political leadership, including Trump’s posture and international signaling. They touch on the potential paths for Iran if regime change occurs, debating the likelihood and consequences of upheaval, the role of Western policy, and how regional dynamics might shift if the mullahs and IRGC structures are altered. The conversation ends with mutual appreciation for the complexity of global security issues and the rapid pace of geopolitical change.

Video Saved From X

reSee.it Video Transcript AI Summary
During my time at the CIA, I was responsible for briefing the press and circulating disinformation. Disinformation is not necessarily a lie, but rather a half truth. We would select influential journalists and provide them with information that we wanted to convey to the American public. We targeted respected journalists like Robert Chaplin, Kais Beach, Bud Merrick, Malcolm Brown, and Maynard Parker. I would cultivate their trust by sharing valid information and then slip in the data we wanted to spread, which may not have been true. We would also create an environment where journalists couldn't fact-check by briefing diplomats who would confirm our false information. Personally, I am opposed to these disinformation activities as they serve no useful purpose for the CIA.

Video Saved From X

reSee.it Video Transcript AI Summary
I used to work for the FBI's foreign counterintelligence unit and did surveillance on various intelligence groups. One interesting topic is the Wuhan virus, which I believe is a bioweapon developed by the Chinese military. Many countries, including the US and Russia, have bioweapons. The FBI confirmed it was a bioweapon within 48 hours and traced its origin using specialized equipment. China's goal is not to destroy the US but to colonize it gradually, starting with media and schools. They have been spying since the 1970s, attending trade and science shows, and now they are deeply involved in universities, gathering data for new weapons.

Video Saved From X

reSee.it Video Transcript AI Summary
I discovered the CIA's involvement in vaccine production while researching Pfizer. Notably, the CEO of In-Q-Tel, the CIA's investment group, is on the board of Resilience, a biotech company that partnered with Moderna. Resilience has received significant government funding and has ties to various high-profile investors. Key figures like Bob Nelson and Luciana Borio, who have connections to the intelligence community and the FDA, are involved with Resilience. During Operation Warp Speed, Moderna collaborated with this newly formed company, which aims to innovate biomanufacturing and develop gene therapies and vaccines. The connections between these organizations and individuals raise questions about the intertwining of intelligence, big pharma, and government interests in public health initiatives.

Video Saved From X

reSee.it Video Transcript AI Summary
I was concerned that planted stories meant for foreign audiences were being circulated and believed here at home. This would mean that the CIA could manipulate the news in the United States by channeling it through another country. We are looking into this very carefully. We do have people who submit pieces to American journals. I think that getting into the details of whether we have people paid by the CIA who are working for television networks should be handled in a closed session. By 1954, relationships with the CIA had been established at CBS. I was told about them and asked if I'd carry on with them. We will evaluate the information we have, and we will include any evidence of wrongdoing in our final report and make recommendations. Whether we name the news organizations in our final report remains to be decided.

Video Saved From X

reSee.it Video Transcript AI Summary
An individual asked who in the Obama administration authorized foreign nationals' involvement in a government database, given Microsoft's contract stipulated foreign tech support. In 2016, the speaker inquired about the approval authority with Insight Global, raising concerns and requesting documentation, but received no information until 2020. In 2020, after being recruited by Insight Global as a principal software developer, the speaker claims to have discovered that Barack Obama authorized everything between 2014 and 2016. The speaker assumes Obama also approved similar agreements with companies like Amazon and Oracle, possibly during the final years of his administration.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript centers on Amjed Fassisi, a CIA contractor who works with Deloitte and, at times, within the CIA’s China Mission Center on cyber operations. He describes a career path that includes time at the CIA starting in 2008, a stint at the NSA for two years, then a return to the CIA in 2011, where he managed about 80 cybersecurity practitioners and later helped stand up a threat program inside the Office of the Director of National Intelligence. Fassisi asserts that he holds a high-level clearance (top secret/SCIs) and that his role involves cross-agency work across the enterprise, though he does not disclose specific details. Key, repeated claims attributed to Fassisi: - The higher-ups in the intelligence community, including CIA directors Gina Haspel and Mike Pompeo, and the upper echelons of their staffs, colluded to withhold information from sitting President Donald Trump. Fassisi states, “We kept information from him,” and later explains “the executive staff” (the director and subordinates) were involved. - Fassisi contends that the CIA and other agencies monitored Trump and his inner circle, using human sources and surveillance. He mentions that Trump could be targeted or spied on, including claims that he would “call Vladimir Putin and tell him” secrets, and that “the intelligence agencies thought that president Trump was a, quote, fucking dumbass and would disclose information.” - He asserts that information about Trump’s activities was intentionally withheld from him by the intelligence community, and that this withholding involved high-level officials who would not share details with the president. - Fassisi suggests that the intelligence community engaged in surveillance of Trump and his team using methods such as human intelligence rather than only wiretaps, and that the FBI, NSA, and other agencies were involved, with implications that FISA-related processes were used to monitor Trump. - He asserts distrust and lack of information-sharing among agencies, stating “the NSA and CIA don’t share information” and describing internal fragmentation and territoriality between agencies as a problem. - Fassisi alleges that there was a broader pattern of weaponizing the CIA and collaborating with foreign partners to influence or monitor Trump associates, referencing the broader narrative around Trump and Russia and implying ongoing monitoring of Trump’s activities post-presidency as well. - He makes broad allegations about Israel and other allies, asserting distrust and claiming Israel “steals intelligence” from the U.S.; he frames relations with allies as fraught and unreliable. - Fassisi describes the reporting by Michael Schellenberger and Matt Taibbi as validated by his claims, and positions the ongoing investigation as exposing corruption within the CIA, FBI, and Department of Justice, with a narrative that information was hidden from the public and from Trump. Supporting context around the interview: - The exchange includes tense moments where Fassisi is shown a CIA badge and discusses his role; the interviewer questions the plausibility and provenance of his claims, pressing for documentation or proof, while Fassisi provides limited responses about his clearance, division (China Mission Center), and contractor status. - The segment also includes editorial framing by the presenter, interjecting with external commentary and promotional content not directly related to Fassisi’s assertions. The interviewer promises follow-up coverage and frames Fassisi’s statements as part of a broader whistleblower narrative. - Throughout, the content repeatedly emphasizes claims of withheld information from Trump, surveillance of Trump and his associates, inter-agency distrust, and internal CIA culture, without providing verifiable documentation within the interview itself.

Video Saved From X

reSee.it Video Transcript AI Summary
To create a defensive program against bioterrorism, the speaker consulted with unconventional sources. These included former U.S. bioweapons experts from decades ago, international figures from countries like the U.K., and defectors from the Soviet Union. The speaker learned from these experts to inform the development of a multi-billion dollar program.

Video Saved From X

reSee.it Video Transcript AI Summary
After being elected governor, I was interviewed by 23 CIA members who wouldn't reveal their purpose. They refused to share their names or roles, which was unsettling. They questioned me about my election, and I was struck by the diverse group present, resembling everyday people. We need to engage with those in this field to understand their activities and who they are monitoring. It's important to uncover the extent of surveillance happening.

Video Saved From X

reSee.it Video Transcript AI Summary
I'm not with the CIA now, nor was I when I started out 25 years ago. I was with good people in the CIA when Donald Trump was elected to take the country back from globalists. Communist Chinese, the EU, Hollywood, and big banks run this country and broke its back. Forget the CIA. It's huge. Don't treat the CIA like it's mysterious or cool. Think of it like the post office. The CIA gets its talking points from me and other patriots, not the other way around. I run the CIA.

Video Saved From X

reSee.it Video Transcript AI Summary
Taking on the intelligence community is incredibly risky. They have numerous ways to retaliate. Even a shrewd businessman would be foolish to antagonize them. I've heard they're extremely angry about how they've been treated and spoken about. I don't know exactly what they might do if provoked, but it's a dangerous game to play.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recalls applying to CIA and facing criticism, including from Putin, like, oh, you're from a CIA family. Well, yeah, obviously, my father worked in conjunction with CIA. I mean, that's what that is. And I tried to join the CIA, but I'm not being false about it. Native talent. And he's attacking my dad as the CIA is dad to the CIA or whatever. And I'm like, well, that's no. Untrue. Then my father dies, and I learn, actually, yeah, you know, did was involved in that world. I was completely shocked by it. So no one has to believe me, but that's just a fact. Right.

Video Saved From X

reSee.it Video Transcript AI Summary
We are reporting from the heart of the campus that sparked a global student movement for Palestine. We’re seeing right now, Chris, we’re trapped in a dorm room. There are 10 white PDs barricading the doors, and we’re not allowed to leave. What started off as a protest against genocide at an elite Ivy League university was met with a military-style operation to suppress it. We need to find a way to get some spare medication. So when Columbia University sent the NYPD on the campus, they were willing to deploy violent militarized police to maintain their active investment in genocide. This is not about students expressing ideas. It is about a change in tactics that presents a concern and a normalization and mainstreaming of rhetoric. And I’m not just talking about language. I’m now talking about tactics, and that’s what shifted our response yesterday. But a normalization and mainstreaming of rhetoric associated with terrorism has now become pretty common on college campuses. Right? You see people wearing headbands associated with foreign terrorist organizations. This happened in October when you had a viral TikTok reissuing Osama bin Laden’s 2002 letter to America. So that’s a larger concern. It’s separate from what happened yesterday, but they’re related. Speaker 3 asks what was found: basically, NYPD changed the way it did business after the attacks of September Eleventh. It not only changed the way it did business, it created a very deep connection with the CIA. They started to build these intelligence programs that infiltrated Muslim communities in ways that, if the federal government did it, would totally go against rules designed to protect civil liberties. And they did it with an unusual partnership with the CIA. A very senior CIA officer was dispatched by CIA Director George Tenet to be his personal representative to the NYPD and help create these intelligence gathering programs, directing and supervising the intelligence gathering, and that relationship continues today. Speaker 3 notes: Recently, the CIA sent one of its most senior undercover officers to work out of 1 Police Plaza in New York as a covert officer. So we’re talking about former CIA agents now working within the New York Police Department. Well, they’re current CIA; they’re on CIA payroll. They’re on the CIA payroll, working with the NYPD, traveling abroad, and using intelligence in conjunction with the NYPD. Speaker 2 describes one element: there is a program called the demographics program. Officers described it as mapping the human terrain of the city. They placed undercover officers, ethnic officers inside Middle Eastern neighborhoods to blend in and look for things that are suspicious. That could be something as simple as who’s looking at radical books in a bookstore or who’s watching Al Jazeera and perhaps applauds at a report about an IED in Iraq, and that could be enough to get you into a report at the NYPD. They also have informants called mosque crawlers who go to the mosque as the eyes and ears for the NYPD. The FBI places informants in mosques with a criterion of specific information related to criminal activity, while the NYPD reportedly does not have that bar and says they follow leads; but those involved with the mosque crawler program say they’re there as eyes and ears.

Video Saved From X

reSee.it Video Transcript AI Summary
I was the CIA's chief of disguise, like James Bond's Q. We created bugs, secret writing, microdots, and more. A memorable moment was briefing President George H.W. Bush at the White House while wearing a lifelike mask. He was amazed when I revealed it. The disguise was so convincing, he couldn't tell it was a mask. I could walk around as someone else with it.

Video Saved From X

reSee.it Video Transcript AI Summary
I'm not with the CIA now, and I wasn't 25 years ago when I started out. I was with good people in the CIA when Donald Trump was elected, working to take the country back from globalist control. We're under the control of the communist Chinese, the EU, Hollywood, and the big banks, who are running and breaking this country. Forget the CIA, it's too big to understand. Think of it like the post office. The CIA gets its talking points from me and other patriots, not the other way around. I run the CIA.

Video Saved From X

reSee.it Video Transcript AI Summary
General Shiroishi knew whoever controlled disease could control the world. The material shared links the CIA to involvement of this lab and to expanding this program for the last eighty years.

Video Saved From X

reSee.it Video Transcript AI Summary
I heard rumors about the Psilonix team attempting to interface human brains with certain technologies. I wasn't involved in those experiments, but I picked up some hearsay during my time at ATIP. It makes sense considering the government's interest in individuals like Chris Bledsoe; if they could summon such people at will, it would provide a significant advantage. I've had strange experiences in my life that leave me questioning whether they were mere coincidences or something more orchestrated. It's certainly within the realm of possibility.

Video Saved From X

reSee.it Video Transcript AI Summary
I'm not with the CIA now, nor was I when I started out 25 years ago. When Donald Trump was elected, I aligned myself with the good elements of the CIA to reclaim the country from globalist control. Communist China, the EU, Hollywood, and big banks are running and ruining this country. Forget any preconceived notions about the CIA. The CIA gets its talking points from patriots like me, not the other way around. I run the CIA.

Video Saved From X

reSee.it Video Transcript AI Summary
I had a successful career in the FBI, overseeing operations in Southern California with a large team and budget. However, I believe that the organization has been infiltrated by the Illuminati Movement, along with other agencies like the NSA and CIA. I will provide more information on this later.

Video Saved From X

reSee.it Video Transcript AI Summary
I had access to a large amount of mailing records, victim records, internet protocol records, and emails. I used this information to track down criminals in Russia. I reached out to the Russian Embassy in Washington and asked for the Russian FSB Liaison Officer. After a few conversations, they introduced me to Sergei Mikhailov, the Deputy Head of the Information Security Center for the Russian FSB. It was an interesting experience.

Video Saved From X

reSee.it Video Transcript AI Summary
Yes. I I watched Mossad take over the Pentagon in 02/2002. The Pentagon was infiltrated by Mossad. They did not need any identification to get through the river entrance to the building. They went upstairs to Douglas Fife, the undersecretary of defenses for policy, the third most powerful man in the defense department. Occasionally, they went to the second most powerful man, Paul Wolfowitz, the deputy secretary of defense, and they had run of the Pentagon. Donald Rumsfeld, the secretary of defense, said to my boss one time, hell, I don't run my building. Mossad does.

Video Saved From X

reSee.it Video Transcript AI Summary
The Wuhan Institute of Virology is believed by some, including the speakers, to be a bioweapons lab with Chinese Communist Party officials. The speakers suggest that the US government may have been collecting intelligence on the lab through a scientist named Peter Daszak, who had a relationship with the CIA. They propose that the US government traded advanced biotech for access to the lab. The second speaker agrees with this theory and mentions that he received leaked documents related to the lab. The Department of Defense is also mentioned.

Video Saved From X

reSee.it Video Transcript AI Summary
Forget the CIA. It's huge, like the post office, not some cool, mysterious entity. The CIA gets its talking points from me and other patriots. I'm not saying you're with the CIA, and when I started 25 years ago, I was with the good elements of the CIA when Donald Trump was elected to take the country back from the globalists. We're under globalist control: the communist Chinese, the EU, Hollywood, the big banks—they run this country and broke its back. I run the CIA.

Video Saved From X

reSee.it Video Transcript AI Summary
In late 2015, my boss, Peter Daskin, approached me and asked if we should work with the CIA. Having worked in national security before, I wasn't surprised. I suggested it wouldn't hurt to talk to them, as there could be financial benefits. Peter mentioned their interest in the places, people, and data we were working with, particularly in China. After that conversation, he confirmed the relationship with the CIA over the next two months. It's not uncommon for programs like this to gather intelligence on foreign laboratories.

Coldfusion

Google’s Hidden CIA Connection - The Full Story
reSee.it Podcast Summary
This video explores the connection between Google and the CIA. Google co-founder Sergey Brin reported to U.S. intelligence during Google's inception, with CIA funding involved in early projects like Google Earth. The CIA, formed post-World War II, engaged in controversial activities, including mind control experiments and failed assassination attempts. Google Federal, established in 2006, aimed to serve federal contracts, employing many former intelligence staff. The relationship deepened with Google's collaboration with the NSA during a cyberattack in 2010. As tech giants increasingly intertwine with government intelligence, concerns about privacy and corporate influence grow.
View Full Interactive Feed