TruthArchive.ai - Tweets Saved By @SheilaG2024

Saved - August 16, 2023 at 8:11 PM
reSee.it AI Summary
Living in a totalitarian government, America faces societal collapse. Each day we accept it, we submit further. The imminent threat is CBDC, granting control to those who control money. Look at Canada's bank account shutdowns during protests. The US CBDC plan is ready. We'll surrender property, rights, and healthcare to access our accounts. We'll own nothing, but will we be happy? Time is running out.

@SheilaG2024 - SheilaG2024

I’m asking everyone. My intent was not to insult you. With your response I believe you choose the American flag. The reason I ask the question is that we are experiencing a totalitarian government and we are experiencing the societal collapse of America. It’s not something that’s coming - it’s here and we are living with it. Everyday that we live with it represents another day we have submitted to it. Once we normalize it we have accepted full submission. We haven’t done anything thus far to bring it to a halt and truthfully, I don’t think we ever will and those that want us to fall to our knees are witnessing it. We are passive citizens and it is leaving the door wide open to tyranny. Talk is cheap and we throw bravado around a lot with words. It is actions that count and that is where we are severely lacking. We have an urgent issue racing towards us like an out of control freight train. That issue is CBDC. Once it is implemented by our government - they have us. There is truth in the saying “That he who controls the money, controls the people.” Look at how easily and quickly the Canadian government shut down the bank accounts of those they classified as dissenters during the trucker’s protest. The US CBDC is being written as I write this by the Central bank in Chicago. The architectural plan is fully developed. Once implemented - we will fully submit to tyranny so that we can feed our children and ourselves even though our standard of living will be forever changed. We will agree to sign over our property and mineral rights to access our bank accounts to feed our kids. We will submit to tyranny to receive minimum healthcare for our sick and elderly family members. We will submit to tyranny receive a modicum of heat and cooling, clothing and substandard urban housing. How many of us do you suppose understand the importance of this and that time is running out for us? See how easy it will be for us to own nothing and be happy? Will you be happy? I know I won’t.

Saved - July 31, 2023 at 2:23 AM
reSee.it AI Summary
John Kirby's statements should be questioned, considering the laws in Ukraine and Russia that restrict journalists from criticizing their governments. The US, led by a corrupt president, is involved in a war that doesn't benefit the country. News from Ukrainian and Russian agencies cannot be trusted, leaving us uncertain about the situation in Ukraine. Our corrupt Congress, President, and military are funneling taxpayer money to a corrupt country. Our defense leaders have made our military weak, supporting Ukraine's corrupt leader. American, Ukrainian, and Russian citizens suffer while our money is funneled back to Congress as illegal kickbacks. Corruption exists across all parties in our government. The majority of Congress is corrupt, prioritizing personal gain over the people. Our politicians should work on bills to prevent government employees from affiliating with certain organizations and to protect our privacy from government-controlled digital currency. We must raise our voices and take action before it's too late. Losing the election or the implementation of CBDC would be disastrous. Time is running out.

@SheilaG2024 - SheilaG2024

Do you believe the shit John Kirby @PentagonPresSec is spewing? Everyone needs to keep in mind that both the Ukraine and Russia has enacted a law that prohibits journalists from speaking anything against their respective government - both the Ukraine and Russia. Then we can also add this dirtbag John Kirby to the same category. The facts are simple: 1. The American government led by the most corrupt President @POTUS in American history has made us one of the most corrupted governments in the world. We are in war that we really have no stakes in. How exactly does it benefit America? It doesn’t. 2. We cannot trust any news originating from Ukrainian or Russian news agencies 3. Therefore we do not know what is really happening in Ukraine because of corrupt news agencies that is serving as nothing more than the mouth piece for their respective governments 4. What we do know is our corrupt Congress, our corrupt President and our corrupt military is funneling trillions of American taxpayer dollars to one of the most corrupt countries in the world. That money does not belong to our our government — that money belongs to us. 5. Our @SecDef Lloyd Austin and our @thejointstaff are useless and has turned our military into the laughing stock of the world. They have allowed out military armaments to go dangerously low to support the useless cause of Ukraine led by another corrupt world leader @Zelenskyyuaua . 5. The only people suffering from this war are American, Ukrainian and Russian citizens. This war was manmade and by design to give our money away, allowing it to be funneled back to Congress in illegal kickbacks under the guise of foreign aid. If anyone believe it’s only Joe and family who sell favors for kickbacks then you are stupid. Corruption spans across all parties, at the highest levels in our government while we sit back and accept that crap. 2A was created as the mechanism for citizens to take back control of their country from nefarious mobsters and tyrannical rule. Why do you think nothing gets done in @SenateGOP , @HouseGOP , @SenateDems , @HouseDemocrats ? 98% of our Congress are on the take. To do anything would mean giving up a primary source of their income is why! They will do anything any lobbyist wants in exchange for $$, paid vacations, even home improvements. They will write foreign aid packages worth billions of dollars that have millions of dollars in kickbacks. Why haven’t we heard our politicians working on bills to outlaw any government employee at any level and in any position from being affiliated with or belonging to @wef Why aren’t they working on a bill to make a law that prohibits government CBDC to protect our privacy? One can only assume it’s because they support this. Why aren’t we on the street making our voices heard? Is it because it’s a trap? Is it because we might go to jail? I don’t buy that. That is an excuse from cowards. Cowards that are willing to submit. Cowards that willing to let you do the work of saving them. There are two things everyone needs to be absolutely certain if either of these two things happen and whichever happens first; 1. We lose this election or 2. CBDC becomes reality We are fucked and we lose everything and both of those are like an out of control freight train barreling down the tracks. Time is no longer on our side.

Video Transcript AI Summary
President Zelensky of Ukraine is seeking to negotiate a just peace and reclaim his country's sovereignty. The US is working with him on a 10-point formula to achieve this. Diplomatic efforts have been ongoing for months, with discussions held between national security advisors. In terms of military support, Ukraine has received everything they requested leading up to and during the counteroffensive. A recent package of assistance was provided, including F-16s and heavy armor. The US believes they have provided Ukraine with what they need to succeed in their defensive efforts.
Full Transcript
Speaker 0: If and when he's ready to sit down and negotiate. Right now, his country is still under attack. He still has tens of thousands of Russian troops on his soil dug in deeply entrenched, protected by minefields on ground that doesn't belong to them. And he has every right to want to reclaim his territorial integrity and his country's sovereignty. But only President Zelensky is going to be able to determine that now. He's put hang on a second, man. He's put forward a 10 point piece formula that we are working with him and his government to help actualize, because we believe that For any diplomacy to work, it's got to start. The foundation has to be President Zelensky's view of what a just piece looks like. So he laid that out with 10 points. We're helping him actualize that. So to some degree, the work of diplomacy, the pre work of diplomacy has begun. It's begun months ago. And in fact, Jake Sullivan, the national security advisors spoke to Mr. Yermak, his equivalent in the Ukrainian government just today. And this was one of the topics that they discussed was society of a just peace and how to actualize it. Speaker 1: Zelensky, he has said he needs F-sixteen's Bakken, more heavy armor to make progress, especially because the defensive positions are so heavily mined and fortified. I mean, isn't there kind of a disconnect that if you want them to win, should they not have what they say they need? Speaker 0: They do have what they need. We have provided the Ukrainians everything they asked for in the months leading up to the counter offensive and continuing right through it. Again, Karim just walked you guys through a whole big old package yesterday. And all the stuff that's in that package It's stuff that's relevant to the
Saved - May 28, 2023 at 8:41 PM
reSee.it AI Summary
The WHO's Director-General, Dr. Tedros, is facing allegations of human rights abuses and discrimination during his time as Ethiopia's health minister. He is also accused of covering up cholera outbreaks by renaming them. Many US Congress members have called for his resignation.

@GirlBoss2024 - Boss Babe

Congress Launches Investigation into WHO's Surveillance Program to Police Americans' Speech for 'Misinformation' https://trendingpoliticsnews.com/congress-launches-investigation-who-knab/

Congress Launches Investigation into WHO's Surveillance Program to Police Americans' Speech for 'Misinformation' The World Health Organization (WHO) is facing scrutiny as Congress launches an investigation into its pandemic prevention initiative, the Preparedness and trendingpoliticsnews.com

@GirlBoss2024 - Boss Babe

It is interesting to note that Tedros started his political career by aligning with the TPLF, a hard-left organisation that later became part of the Ethiopian People’s Revolutionary Democratic Front, a coalition of left-wing parties that ruled Ethiopia until last year (TPLF was classified as a terrorist organisation in the Global terror database). According to one Ethiopian newspaper, Tedros was listed as the third most important member of the TPLF’s politburo standing committee. strong allegations emerged of the TPLF engaging in “systematic discrimination and human rights abuses” by refusing emergency healthcare to the Amhara ethnic group because of their affiliation with the opposition party. In 2010, Human Rights Watch wrote a report on how to aid in the form of food and fertiliser was withheld from local Amhara villagers. Interviews by an observer group in 2009 with several people across three regions of Ethiopia yielded widespread suppression of political dissent by conditioning access to essential government programs on food and health. The report issued by the Human Rights Watch was scathing of how Tedros’s government used donor-supported resources and aid as a tool to consolidate power. Given the strong ethnic fissures between the Tigray and the Ahmara ethnicities, these allegations started gaining credence further as birth rates were recorded to be significantly lower in the Amhara region compared to other regions and two million Amhara people “disappeared” from the subsequent population census. It is interesting to note that there is a suspiciously hasty mention of his time as Ethiopian health minister—the seven key years of his professional career as a health minister and the primary qualification for his bidding. Yet these seven years are condensed into three points qualifying a little more than a passing mention. There is a curious omission of the epidemic of cholera in his resume. It is evident that Tedros was on a campaign to rewrite his questionable past on this aspect. Three disastrous cholera outbreaks occurred in Ethiopia (2006, 2009, 2011) under this watch as health minister. The response under Tedros was to first rechristen the outbreak to something less damaging. So cholera was suddenly—and wrongly—classified as acute watery diarrhoea (AWD) in the outbreaks in Ethiopia. AWD is a potentially fatal condition caused by water infected with the vibrio cholera bacterium. Everywhere else in the world it is simply called cholera. But not in Ethiopia, where international humanitarian organisations privately admitted that they were only allowed to call it AWD and are not permitted to publish the number of people affected. A group of American doctors wrote to Tedros in 2017 saying, “Your silence about what is clearly a massive cholera epidemic in Sudan daily becomes more reprehensible”. “The inevitable history that will be written of this cholera epidemic will surely cast you in an unforgiving light,” they wrote, adding that Tedros was “fully complicit in the terrible suffering and dying that continues to spread in East Africa”.

@GirlBoss2024 - Boss Babe

So, @DrTedros of the @WHO is not an honorable man. We should not trust this man whatsoever Source: https://is.gd/Um0GRN

Dr Cover-up: Tedros Adhanom's controversial journey to the WHO | ORF While much has been unflatteringly written about the extended silence of the beleaguered WHO in the current pandemic, and the current predicament orfonline.org

@GirlBoss2024 - Boss Babe

@ScottforFlorida@marcorubio@SenDanSullivan@lisamurkowski.@TTuberville@SenKatieBritt@SenTomCotton@JohnBoozman@SenJoniErnst@ChuckGrassley@SenatorRisch@MikeCrapo@SenatorBraun@SenToddYoung@RogerMarshallMD@JerryMoran@SenRandPaul@LeaderMcConnell.@SenJohnKennedy@SenBillCassidy@SenatorCollins@HawleyMO@Eric_Schmitt@SenHydeSmith@SenatorWicker@SteveDaines@SenThomTillis@SenTedBuddNC@SenKevinCramer@SenJohnHoeven@SenatorFischer@SenatorRicketts@JDVance1@SenatorLankford@SenMullin@SenatorTimScott@LindseyGrahamSC@SenatorRounds@SenJohnThune@MarshaBlackburn@SenatorHagerty@tedcruz@JohnCornyn@SenMikeLee@SenatorRomney@SenRonJohnson@SenCapito@SenLummis@SenJohnBarrasso

@GirlBoss2024 - Boss Babe

@RepAndyBiggsAz@RepGosar@RepBoebert@RepDonaldsPress@RepMTG@RepRosendale@RepDanBishop@RepChipRoy@RepBobGood@RepBarryMoore@RepKenBuck@RepMann@RepThomasMassie@WarrenDavidson@RepTroyNehls@RepTiffany@RepGregSteube@RepMaryMiller@RepTimBurchett@Jim_Jordan@RepJeffDuncan@Lancegooden@RepMcClintock@RepRalphNorman@RepCloudTX@Rep_Clyde@RepAlexMooney@RepDavid@RepRussFulcher@RepBenCline@congbillposey@RepScottPerry@RepTimmons@RepJohnRose@RepMarkGreen@RepDLesko@RepMattGaetz@RepAndyHarrisMD@RepJasonSmith@RepKatCammack@RepClayHiggins@RepLisaMcClain@RepFischbach@RepHarshbarger@RepRonnyJackson@RepBethVanDuyne@RepLoudermilk@repkevinhern@DesJarlaisTN04

@GirlBoss2024 - Boss Babe

@USRepGaryPalmer@RepFeenstra@RepSpartz@RepPatFallon@TXRandy14@RepBrianBabin@RepJimBanks@RepPfluger@RepGrothman@RepGregMurphy@RepDLamborn@RepJamesComer@RepTrentKelly@RepMichaelGuest@RepJohnJoyce@RepRWilliams@JayObernolte@RepSteel@RepWebster@RepLaTurner@RepBurgessOwens@RepFitzgerald.@RepJerryCarl@RepMikeJohnson@RepHuizenga@RepArmstrongND@RepDanCrenshaw@RepBryanSteil@RepLaHood@RepAdrianSmith@RepSmucker .@michaelcburgess@RepGallagher@RepJohnCurtis@RepWesterman@RepLaMalfa@RepJimBaird@RepRonEstes@RepSamGraves@RepBice@RepBentz@RepArrington@RepBlakeMoore@RepRichHudson@RepWaltzPress@RepBrianMast .@GOPMajorityWhip@RepDavidRouzer

@GirlBoss2024 - Boss Babe

@RepDustyJohnson@RepEllzey@RepRickAllen@repjulialetlow@virginiafoxx@RepMeuser@RepMGriffith@RepYoungKim@RepAshleyHinson@RepGregPence@RepPeteStauber@RepGarbarino.@RepMikeCarey@MikeKellyPA@RepNancyMace@RepChrisStewart@RepBradWenstrup@boblatta@RepRickCrawford@RepMikeGarcia@RepBuddyCarter@AustinScottGA08@RepCarolMiller@RepSamGraves@RobWittman@Robert_Aderholt@RepMalliotakis@GReschenthaler@PeteSessions@RepGusBilirakis@RepMMM@RepWalberg@RepMikeRogers@RepDrewFerguson@RepMoolenaar@RepJoeWilson@cathymcmorris@RepDavidKustoff@RepLarryBucshon@SteveScalise@RepBalderson@RepTonyGonzales@repdarrellissa@VernBuchanan@RepAndyBarr@RepJackBergman@RepBlaine@RepTenney

@GirlBoss2024 - Boss Babe

@RepChuck@DrNealDunnFL2@RepFrenchHill@SpeakerMcCarthy.@RepCarlos@RepGuthrie@PatrickMcHenry@RepFrankLucas@JudgeCarter@RepRutherfordFL@MarkAmodeiNV2@rep_stevewomack@RepBost@RepHalRogers@JeffFortenberry@Congressman_JVD@RepBillJohnson@KenCalvert@RepKayGranger@RepAnnWagner@TomColeOK04@RepNewhouse@RepDonBacon@RepStefanik@CongMikeSimpson@RepMcCaul@RepMariaSalazar@RepChrisSmith@RepDavidValadao@RepDaveJoyce@RepMikeTurner@MarioDB@RepBrianFitz@RepDaleStrong@RepEliCrane@JuanCiscomani@KevinKileyCA@Duarte4Congress@AaronPBean@CoryMillsFL@realannapaulina@RepLaurelLee@RichforGA@MikeCollinsGa@ZachNunn

@GirlBoss2024 - Boss Babe

@RepRudyYakym@Erin_Houchin@JohnJamesMI@repfinstad@markalfordkc@EricBurlison@RepEzell@RyanZinke@RepEdwards@CongressmanKean@NickLalota@RepSantosNY03@RepDesposito@lawler4ny@RepMolinaroNY19@Brandon4ny22@NickLangworthy@MaxMillerOH@RepBrecheen .@RepLCD@RussellFrySC@AndyOgles@moran4congress@SelfForCongress@MLuttrellTX@monica4congress@WesleyHuntTX@JenKiggens@derrickvanorden@RepHageman Smith and Kiggans do not have Twitter accounts

@GirlBoss2024 - Boss Babe

@reSeeIt save thread

Saved - May 28, 2023 at 8:39 PM

@GirlBoss2024 - Boss Babe

Edward Snowden on how three letter agencies track your every move through all of your devices

Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.
Full Transcript
Speaker 0: You got a smartphone. Right? You you might be listening to this. You you got a phone somewhere in the room. The phone is turned off or at least the screen is turned off. It's sitting there. And if somebody sends you a message, the screen blinks to life. How does that happen? How is it that if someone from any corner of the Earth, dials a number your phone rings and nobody else's rings. Every smartphone, is constantly connected to the nearest cellular tower. Every phone, even when the screen is off, you think it's doing nothing. You can't see it because radio frequency emissions are invisible. And so your phone is sitting there doing nothing, you think, but it's constantly shouting and saying, I'm here. Who is closest to me? That's the cell phone tower. And every cell phone tower with its big ears, is listening. And it compares notes with the other network towers and your smartphone compares notes with them to go, Who do I hear the loudest? And who you hear the loudest is a proxy for closeness, distance. They go, whoever I hear more loud than anybody else that's close to me. So you're gonna be bound to this cell phone tower and that cell phone tower is gonna make a note, a permanent record saying this phone handset with this phone number at this time was connected to me. And based on your phone handset and your phone number, they can get your identity. But what this means is that whenever you're carrying the phone, whenever the phone is turned on, there's a record of your presence at that place that is being made and created by companies. Now these things are stored. Now these things are saved. It doesn't matter whether you're doing anything wrong. Doesn't matter whether you're the most ordinary person, on Earth because that's how bulk collection, which is the government's euphemism for mass surveillance, works. They simply collect it all in advance in hopes that one day it will become useful. The thing with shutting your phone off that is a risk is how do you know your phone's actually turned When I was in Geneva working for the CIA, we would all carry like drug dealer phones. The old smartphones, sorry, old dumb phones. They're not smartphones. And the reason why was just because they had Removable battery. Removable bags. Yes. Where you could take the battery out. And the the one beautiful thing about technology As if there's no electricity in it, there's no battery connected to it, it's not sending anything because you have to get power from somewhere. You have to have power in order to do work. But now your phones are all sealed, right? You can't take the batteries out. So there are potential ways that you can hack a phone where it appears to be off but it's not actually off. It's just pretending to be off whereas, in fact, it's still listening in and doing all this stuff. I wrote a paper on this specific problem. How do you know when a phone is actually off? How do you know when it's actually not spying on you? With a brilliant, brilliant guy named Andrew Bunny Huang called the introspection an engine. But for average people, right, this is academic. That's not your primary threat. Your primary threats are these bulk collection programs. Your primary threat is the fact that your phone is constantly squawking to these cell phone towers. It's doing all these things because we leave our phones in a state that is constantly on. You're constantly connected. But the whole idea is We need to identify the problem. And the central problem with smartphone use today is you have no idea what the hell it's doing at any given time. Like, the phone has the screen off. You don't know what it's connected to. You don't know how frequently it's doing it. And you don't even know it's happening because you can't see it. Right? And this is the problem with the data collection used today, Is there is an industry that is built on keeping this invisible. They can see everything about you. They can see everything about what your device is doing and they can do whatever they want with your device. What changed with technology is that surveillance could now become indiscriminate. It could become, dragnet. It could become bulk collection. The government did it. They used classification. Companies did it. They intentionally didn't talk about it. They denied, these things were going. They they said, you agreed to this. You clicked a button that said I agree because you were trying to open an account so you could talk to your friends. You were trying to get driving directions. You were trying to get an email account. You weren't trying to agree to some 600 page legal form, that even if you read, you wouldn't understand. And it doesn't matter even if you did understand because one of the very first paragraphs and it said, This agreement can be changed at any time unilaterally without your consent by the company. And so long as they do that, Companies are gonna be extraordinarily powerful, and they're going to be extraordinarily abusive. And this is something that people don't get. They go, oh, well, it's data collection. Right? They're exploiting data. This is data about human lives. It is state about people. These records are about you. It's not data that's being exploited. It's people that are being exploited. It's not, data that's being manipulated. It's you that's being, manipulated. And this this is, this is something that I think a lot of people are beginning to understand. The problem is the companies and the governments are still pretending they don't understand or disagreeing with this. And this is why my end to me of something that, one of my old friends, John Parrot Barlow, used to say to me, which is, you can't awaken someone who's attending to be asleep. Facebook or Google, for whatever reason, got out of bed in the morning and they actually wanted to protect your, the security of your communications in a way that even they can't break. Like right now, Google and Facebook, they do a great job keeping other people from spying on your communications. But if Google wants to rifle through your inbox, right, if Facebook wants to go through all your direct messages and give that to the federal government. Like, you tap 1 button and boom, they've got all of it. It happens every single day. This is actually a bigger thing in the COVID crisis. There's this idea called end to end encryption, which, what it means is that When you send a message, you know, when Billy sends a message to Bobby, Billy and Bobby both have the keys to unlock that message. And it could be sent through Facebook. It could be sent through Google. But without that key, Google, Facebook, they don't have that key. Only the phones at the end, the laptops tops at the end. The people who are on the loose, they're the only people who have the key. So if somebody comes to Facebook and says, we want to see that information, Facebook hands over the encrypted message. Right? And Facebook goes, well, here you go. Here's our copy. But we can't read it. You can't either. Now you've gotta actually do some work on the government side and go get that key yourself, and then you can read it. Right? But we can't read it. So Let me go into some of that in a little depth. The number one target is the iPhone. If you have an iPhone, you get these little software update notifications all the time that are like, hey, please straight to the the most recent version of Ios, and that's a fabulous thing. That's a wonderful thing for security, because the number one way that people's devices get screwed if it's not just through user error. Right? Like you entering your password somewhere you shouldn't. It's like a fake site. It looks like Gmail, but it's not actually Gmail, and you just gave the guy your password. Now he uses your password to log in. But to actually break into a device is that it's not patched. Right? Patch means getting these, security updates, these little code updates, that fix holes that researchers found in the security device. Well, Apple's really good about rolling these out all the time for everybody in the world. The problem is Basically, all these different iPhones. Right? You got an iPhone 6. You got an iPhone 8. You got an iPhone X. You got an iPhone, you know, 3. Whatever. These are all running a pretty narrow band of, software versions. Used. And so these guys go if they wanna target, for example, Android phones, like Google phones, like a Samsung Galaxy or something like that. There's like a 1000000000 different phones made by a 1000000000 different people. Half of them are completely out of date. But what it means is it's not one version of software where they're running, it's like 10,000. And this is actually bad for security on the individual level. But it's good for security in a very unusual way, which Just the guys were developing the exploits. The guys like this NSO group were trying to find ways to break into phones. They realize if they find a way to attack an iPhone, which is actually, you know, this is difficult. This is really difficult stuff. Now it works against basically every iPhone. And who has iPhones? All the rich people. Right? All the important people. All the lawmakers. There's all the the guys who are in there. So they've made a business on basically attacking the iPhone and selling it to every 2 bit thug, who runs a police department in the world. You know, they sell this stuff to Saudi Arabia. They sell this to Mexico. And there's a group of researchers in Canada, working at a university called the Citizen Lab. And these guys are really like the best in the world at tracking what NSO Group is doing. If you wanna learn about this stuff, the real stuff, look up CitizenLab and the NSO group. And what they have found, is all the people who are being targeted by the NSO group, the classes of people, the countries that are using this. And these, like, petro states, these bad actors Naturally, we'll pay literally tens of 1,000,000 of dollars each year just to have the ability to break into an the phone, for a certain number of plans. Because that's how these guys, do it. They sell their business plan. They go, we'll let you break into any iPhone, just by basically sending a text message to this phone. All you need to find is the phone number of a person who's running an iPhone, and we will exploit something. Like the easiest, forms of exploit, or rather the easier types of exploits, are where they send you a text message, right? And it'll be like an Imessage or something like that, and it's got a link in it that'll be like, oh, gosh. Terrible news. You know, your buddy's father just died, and we're making funeral arrangements. Are you gonna be there? It's the day after tomorrow. And when you click the link for the funeral arrangements, it opens your web browser. And the web browser on your phone is always the biggest, most complicated process in it. Right? There's a zillion lines of code in this as opposed to an instant the messenger where there's fewer lines of code in it. And this is the problem is on the phone. You can replace the phone, right, and they'll lose access to that. But if they've already used that to gain the passwords that you use to access, you know, your Icloud or whatever, when they have control of the phone, They've already got your photo roll. Right? They've already got your contact list. They already have everything that you've ever put in that phone. They already have all your notes. They already have all your files. They already have everything that's in your message history. Right? They can pull that out immediately. And now, not because they have, you know, all your contacts and things like that. They see that phone stop being active. They know you've changed your phone number. All they have to do is find a new phone number and then they can try after you again. The benefit is, with that old style of attack, if you get that message and you don't click that link, You're, somebody in a vulnerable class. Right? You've had these kind of attacks answered before. It looks suspicious. You don't know who this person is. The number isn't right. Something like set, and you save that link. You don't click the link. You don't do anything with that link, but you send it to a group like Citizen Lab. They can basically use that link to basically use, like a dummy phone, like a sort of a Trojan horse to go to the site that would hack your phone and catch it. And this is what the sort of process that all of their research is based on. Once your phone is hacked, What is in their hands is not simply your device. It is your future. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, They are stealing our power. The screen may be off as it's sitting on your desk, but the device is talking all of the time. The question we have to ask is who is it talking to? If I get a smartphone and I need to use a phone, I actually open it up before I use it. Anything you can do on that device, the attacker, in this case, the government, can do. Before 2013, if you said there's a system that's watching everything you do, the government is collecting records of every phone call in the United States, even for those people who are not suspected of any crime, it was a conspiracy. Yes, there were some people who believed it was happening. Yes, there were academics who could say this was technically possible. The world of 2013, we suspected. Some suspected that this was happening. The world after 2013, We know that it's happening. The distance between speculation and fact is everything in a democracy. We have now had the 1st European regulations that are trying to limit the amount of data that can be collected secretly and used against populations broadly. And we have also seen the basic structure of the Internet itself change in response to this understanding that that The network path that all of our communications cross, when you request a website, when you send a text message, when you read an email, For so long, those communications have been electronically naked or unencrypted. Before 2013, more than half the world's Internet communications were unencrypted. Now far more than half are measured by, just web traffic from where the world's leading browsers, the Google Chrome browser. The entire world has changed, in the last few years. It hasn't gone far enough. The problems still exist. And in some ways, they've gotten worse. But we have made progress that would not have been possible if we didn't know what was going on. Hacking has increasingly become, what governments consider a legitimate investigative tool. They use the same methods and techniques as criminal hackers. And what this means is they will try to remotely take over your device. Once they do this, by detecting a vulnerability in in the software that your device runs, such as Apple's Ios or Microsoft Windows. They can craft a special kind of attack code called an exploit. They then launch this exploit at the vulnerability on your device, which allows them to take total control of that device. Anything you can do on that device, the attacker, in this case, the government, can do. They can read your email, they can collect every document, they can look at your contact book, they can turn the location services on, They can see anything that is on that phone instantly and send it back home to the mothership. They can do the same with laptops. The other prong that we Forget so frequently is that in many cases, they don't need to hack our devices. They can simply ask Google for a copy of our email box because Google saves a copy of that. Everything that you ever typed into that search box, Google has a copy of. Every private message that you've sent on Facebook, every link that you've clicked, everything that you've liked, they keep a permanent record of. And all of these things are available not just to these companies, but to our governments as they are increasingly deputized as, sort of miniature arms of government. What about enabling your microphone camera? If you can do it, they can do it. It is trivial, to remotely turn on your microphone or to to activate your camera so long as you have systems level access. If you had hacked someone's device remotely. Anything they can do, you can do. They can look up your nose. Right? They can record what's in the room. The screen may be off as it's sitting on your desk, but the device is talking all of the time. The question we have to ask is who is it talking to? Even if your phone is not hacked, right now, you look at it, it's just sitting there on the charger, It is talking tens or hundreds or thousands of times a minute to any number of different companies, who have apps installed on your phone. It looks like it's off, it looks like it's just sitting there, but it is constantly chattering. And unfortunately, like pollution, We have not created the tools that are necessary for ordinary people to be able to see this activity. And it is the invisibility of it that makes it so popular and common, and attractive for these companies. Because if you do not realize they're collecting this data from you. It's very private and personal data. There's no way you're going to object to it. Once your phone is hacked, What is in their hands is not simply your device, it is your future. But we see how these same technologies are being applied to create what they call the social credit system. If any of your activities online, if your purchases, if your associations, if your friends or in any way different from what the government or the powers that be at the moment, would like them to be, you're no longer able to purchase Train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms. And those algorithms are fueled by precisely precisely the innocent data that our devices are creating all of the time, constantly, invisibly, quietly right now. Our devices are casting all of these records, that we do not see being created, that in aggregate seem very innocent. You were at Starbucks at this time. You went to the hospital afterwards. You spent a long time at the hospital. After you left the hospital, you made a phone call. You made a phone call to your mother. You talked to her until the middle of the night. The hospital was an oncology clinic. Even if you can't see the content of these communications, The activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately, it means, as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information. What they're selling is us. They're selling our future. They're selling our past. They are selling our history, our identity. And ultimately, They are stealing our power and making our stories work for them. If I get a smartphone and I need to use a phone, I actually open it up before I use it. I perform a kind of surgery on it to physically de solder, or or sort of melt, the metal connections that hold the microphone on the phone. And I physically take this off. I remove the camera for the phone, and then I close it back up, I seal it up. And then if I need to make a phone call, I will attach an external microphone on. And this is just so, if the phone is sitting there, and I'm not making a call, it cannot hear me. Now this is extreme. Most people do not need this. But for me, it's about being able to trust our technology. My phone could still be hacked. My laptop could still be hacked. And just as I told you before, The same principles apply to me. If it is hacked, they can do anything to the device that I can do. So my trust in technology is limited.

@GirlBoss2024 - Boss Babe

@reSeeIt save thread

Saved - May 28, 2023 at 8:32 PM
reSee.it AI Summary
Citizens in the EU and the US express concerns about far-left extremist elites. Elon Musk's decision to withdraw Twitter from the EU's online censorship project angers senior EU officials. An MEP suggests banning the platform if Musk refuses to comply with the EU's censorship regime.

@GirlBoss2024 - Boss Babe

When are the citizens of the EU going to stand up in unison against these far left extremist tyrannical terrorist elites? Probably after we Americans stand up to the far left extremist tyrannical terrorist elites ruling our country! However, I believe they, like we, are waiting…

@GirlBoss2024 - Boss Babe

of violence but we don’t them because we want someone else to do them and that’s shame on us. We would all do well to listen to this MEP:

Video Transcript AI Summary
I urge everyone to stop giving their democratically elected governments the benefit of the doubt. They have never had good intentions for regular people throughout history. We cannot comply our way out of tyranny; it only prolongs our suffering. It's time to end our silence and start rebelling against those who seek to control us. We must stop voting for those who inflict psychological abuse on us. To defy this unfree world, I have chosen to become so free that my very existence is an act of rebellion. It's time for all of us to do the same.
Full Transcript
Speaker 0: I'm really imploring the people and all the peoples around the world. For God's sake, stop giving your democratically elected governments the benefit of the doubt. They are not deserving of that. They are not. Stop rationalizing Whatever your government is doing, try stop rationalizing and come up with some good intentions. They have no Good intentions. Never, as I said before, in the entire history of mankind, there has never been a political elite concerned about the well-being of regular people. And it isn't any different now. Why should it? Stop giving them the benefit of the doubt. Because I can tell you, you cannot comply your way out of a tyranny. It is impossible. Trying to do so, you will only feed A gigantic alligator in the hopes of being eaten last. But guess what? Your turn will come, and then you will be the one swallowed up. I also have to ask the people, end your silence. Speak up. For God's sake, stop complying. Start rebelling. They're out to get you if you do not resist. I would also urge you to stop voting for those who inflict this psychological abuse on you, who mock you for their own. Good. In order to deal with this unfree world, to defy this unfree world, I have decided to become so absolutely free that my very existence is an act of rebellion. And that's what we all need to do.

@GirlBoss2024 - Boss Babe

It seems @elonmusk has taken on the far left extremist terrorist elites: @ThierryBreton @EU_Commission @TrilateralEU “Senior EU officials were furious on Friday after Twitter owner Elon Musk pulled the platform out of the bloc’s online censorship project. Elon Musk has pulled…

@GirlBoss2024 - Boss Babe

countering so-called “disinformation” online, prompting fury from those in Brussels.” Read it here: https://is.gd/QbZudA

EU Furious After Elon Musk Pulls Twitter Out of Online Censorship Plan Senior EU officials were furious on Friday after Twitter owner Elon Musk pulled the platform out of the bloc's online censorship project. breitbart.com

@GirlBoss2024 - Boss Babe

“The idea that free speech could spread on Elon Musk’s Twitter is terrifying many within the European Union, an MEP serving in the bloc’s parliament has said. Tom Vandendriessche, a Flemish nationalist elected representative within the European Parliament, has told Breitbart…

@GirlBoss2024 - Boss Babe

to ban the platform from the EU should the billionaire refuse to implement the union’s censorship regime. Read it here: https://is.gd/4NMxTO

EU is Terrified of Free Speech on Elon Musk's Twitter, MEP Says The idea that free speech could succeed on Elon Musk's Twitter is terrifying many within the European Union, an has said. breitbart.com
Saved - October 14, 2024 at 1:47 AM
reSee.it AI Summary
I started discussing the UK, noting that its culture is at risk due to a significant Muslim population increase, with a fertility rate of 8.1 among Muslim women compared to 1.755 overall. I expressed concern over political actions that seem to favor Muslim control, including arrests of British citizens resisting this shift and the establishment of a thought police. I believe mass deportation and border closures are necessary to preserve British culture, a sentiment I extend to Germany and France. I also highlighted similar issues in the US, emphasizing the urgent need for change before it's too late.

@SheilaG2024 - SheilaG2024

Lets each take a country and explain it to him. I will start with the UK. The UK is no longer a prize. The influx of Muslims is now controlling the Uk. The 2024 fertility rate for the UK is 1.755 births per women in child bearing years. The fertility rate per Muslim women in child bearing years is 8.1. Its simple math to see who wins in the end. ✅ 2.11 required to maintain a countries culture ✅ 1.99 historically no culture has ever been maintained at this rate ✅ 1.3 it is statistically impossible to maintain the culture - it would take 80-100 years to correct itself As the population decreases so does the culture. The UK will be a Muslim nation. London is Muslim dominated and controlled by Muslims right now. But something most important has recently occurred that is most concerning. While the numbers of Muslims currently do not exceed the number of Brits, communist Pm @Keir_Starmer has given Muslims control of the country right now by a recent action he has taken. He is arresting British citizens who are resisting Muslims who are beating, murdering, raping women and often doing so in public. He released criminals from jail to make room for new prisoners. He established a thought police to scour social media for British dissenters. He recently threatened US citizens with extradition and jail if we make statements the UK deems are hateful. We of course, laughed at that. However, the unsaid message Starmer has given to the Muslims who by the way will never assimilate in any country that allows the freedom to choose religion because the Quran forbids assimilation, is that the Muslims do not have to wait to be dominant in numbers for population because he has given permission for them to carry on now. The Muslims have won. The only solution for saving the British culture is to begin mass deportation and closing the border to all who illegally enter. But that is not going to happen with Starmer. The German government has admitted it will be a Muslim nation by 2030. France is another country that will be a Muslim nation. Open borders equals the destruction of all sovereign nations. Please know the US has very similar problems with our open borders. Over the last four years our border has been an invasion of 20m illegal immigrants. Venezuela emptied their jails and sent them here. We have Muslims, South American and Asian gangs and Mexican cartels roaming our streets, murdering innocent citizens, raping our women and young girls. We have over 300k missing immigrant children who cannot be located and are thought to being sex trafficked or sold for child labor in America! Accommodating the illegals who have entered our country has driven our national debt level to an unsustainable level. The only solution is to close the border and start doing mass deportations. That is not going to happen without a regime change. We have a Presidential election on November 5th of which one candidate is a communist. November 5 will determine if America falls or we stay a sovereign nation. If America falls, the rest of the world will follow in short order. Pray for us please. Our lives and yours depend on the outcome. God be with you.

Saved - October 1, 2024 at 3:32 AM
reSee.it AI Summary
I believe this could be a major setback for Kamala Harris in the election. In a video, she claims that the lowest income communities and communities of color will be prioritized for federal hurricane aid based on equity. While I understand they may be the first in need, I feel that others should not be excluded when assessing need. If you agree, please repost this and follow me; I’ll follow you back.

@SheilaG2024 - SheilaG2024

This just cost @KamalaHarris the election. This is the show stopper that can cause her to lose the election. Spread it and tell her what you think in comments. Here she is on video stating that our lowest income communities and communities of color will be the first to receive Federal hurricane aid. She cites this is based on equity. ✅They may very well be the first in need but others based upon income and community SHOULD NEVER BE EXCLUDED WHEN DETERMINING NEED! EVER!! Please repost this if you agree. Repost and send me a follow and I guarantee to follow you back.

Video Transcript AI Summary
Lowest income communities and communities of color are most impacted by extreme conditions and issues not of their own making. It is important to address this by giving resources based on equity. While equality is important, equity is also needed because not everyone starts out at the same place. To achieve equality, disparities must be taken into account.
Full Transcript
Speaker 0: It is our, lowest income communities and our communities of color that are most impacted by these extreme conditions and and impacted by by issues that are not of their own making. And so we absolutely. And so we have to address this in a way that is about giving resources based on equity, understanding that we we fight for equality, but we also need to fight for equity, understanding not everyone starts out at the same place. And if we want people to be in an equal place, sometimes we have to take into account those disparities, and and do that work.
Saved - January 26, 2024 at 1:53 PM
reSee.it AI Summary
Patrick Leahy released a video suggesting that the source of the Kari Lake bribe may have originated from the NRSC, specifically involving Mitch McConnell and Steve Daines. Some believe this proves that the GOP and RNC are against their voting base. Jeff DeWit's resignation is seen as a surprise, and some question why the Justice Department and FBI haven't taken action. The identity of the person who would have paid the bribe and the consequences for the Senate seat remain unknown. Racketeering charges could result in fines and prison time.

@SheilaG2024 - SheilaG2024

🛑 Patrick Leahy just dropped a bomb. The video is below. It appears the source of the Kari Lake bribe originated with the @NRSC and specifically with @LeaderMcConnell and Senator @SteveDaines. However, it doesn't definitively answer who was going to pay the bribe. So Mitch and Steve are you ready to be rico’d? ✅ This is truly sad and serves to prove that @GOP and @RNC is the enemy of their voting base. @GOPChairwoman, @LeaderMcConnell and @SteveDaines must resign! @JeffDeWitAZ it good that you resigned. Personally I am astounded @TheJusticeDept has not convened a grand jury for you. I'm surprised they haven't Rico’d you. Perhaps you are among the elites for whom the @TheJusticeDept and @FBI run the protection racket. However, I now understand why @TheJusticeDept and @SteveDaines have not and will not investigate this. It is because Mitch McConnell is within the circle and falls within the purview of the protection racket both agencies run. To protect Mitch means Daines and DeWit get a free pass. Tell us this - who is the big guy that was going to pay the bribe? We know that McConnell and Daines orchestrated the bribe but who was actually paying the money and where was it coming from? And what exactly would have happened to the Senate seat if Kari had accepted? For you to resign, that second tape must have some strong evidence of a conspiracy to commit bribery on it. Knowing the answer to those two questions should determine if what you did meets rico standards. ✅ You know the penalty for a rico charge? Those found guilty of racketeering can be fined up to $25,000 and sentenced to 20 years in prison per racketeering count. @DonaldJTrumpJr

Video Transcript AI Summary
Jeff DeWitt has resigned and there are rumors that the message came from the National Republican Senatorial Committee (NRSC), controlled by Mitch McConnell. Senator Steve Daines, in charge of the NRSC, did not confirm or deny the origin of the message. Michael Patrick Leahy suggests that the NRSC wanted to remove Carrie Lake from the Senate race because she didn't align with their interests. Mitch McConnell initially disliked Lake.
Full Transcript
Speaker 0: Jeff Go ahead. Jeff DeWitt has resigned. And I think Carrie Lake is going to have 8 PM EST, a rumble press conference, to talk about the latest developments. But sources have told us that the message came from the National Republican, Senatorial Committee, which is, as you know, controlled by, Mitch McConnell. And senator Steve Daines of Montana, is the senator in charge of that. We, yesterday, when we got this information, which we believe to be credible from a credible source, but we, you know, we sent, requests our great reporter in Arizona, Arizona Sun Times, Rachel Alexander, sent a request to both Steve Danes and the political director at the NRSC to if they would confirm or deny that the message originated from them in March of of 2023. In other words, hey, Carrie. Don't run for the senate. We'll we'll give you some money or a big job. Neither of those people responded to us. But, Danes, just a couple hours ago, talked to an NBC reporter and issued it's right at the arizonasuntimes.com, and issued, a basically what you would call a nondenial denial. He didn't address the issue of whether they originated the message. What he said was, I just heard that report, and, gee, I didn't know anything about that report. We're talking about the report of the of the leaked audio in which the message was delivered. So we're go and he's not responded to us. Steve, you and I have been doing this long enough to know that if there's a major figure that you ask a question, and they don't respond to you in 24 hours, there's a reason. And my suspicion is that our source is probably correct. Speaker 1: Hang on for one second. For those of you keeping score at home, Michael Patrick Leahy just dropped a bomb. Okay? Because he said, hey. Reliable sources are telling us it came from the NRSC, which would make perfect sense if you listen to DeWitt. They're trying to get her out or trying to get her out of the senate race because they were freaked out at the time, given her her gubernatorial run, that she was not their kind of person. And, she was not a globalist. She was not part of the Bush faction. She didn't you know, she went to war with the McCain's. The NRSSC would be the natural home, And Mitch McConnell, as we know, started for at least the 1st year or the 1st year and a half, 2 years hating even the mention of Carrie Lake's name. Leahy Hanger.
Video Transcript AI Summary
The speakers discuss the speaker's potential candidacy and the pressure they are facing from powerful individuals who want to keep them out of the race. The speaker expresses frustration with being controlled and owned by others and their refusal to work with people who don't align with their agenda. They also mention the possibility of election theft and their determination to fight against it. The speaker declares their intention to run and be a thorn in the side of those who oppose them, even if it means facing extreme consequences.
Full Transcript
Speaker 0: Is there a number at which I can be bought. Not be bought? That's what it's about. You can No. $10,000,000 $20,000,000 $30,000,000 no, no, no. $1,000,000,000 No. Speaker 1: This is not about money. This is about our country. I think it's disturbing that they would even Speaker 0: that anybody would think this is I no. To be fair, even me even me, I'll I'll say this. I want fresh face right now for the reason that I've never seen anyone I can't think of single person in the federal race who've lost, ran the interlock. I can't think of it. If you can think of it, let me know. Speaker 1: I am not going to let these People who Speaker 0: hate our country tell me not to run. You should call them and tell them to get behind me. So what's going on? What is, I'm assuming this is our friend. Oh, this is this is this is back east. They there are Very powerful people don't wanna keep you out. Speaker 1: I know. Speaker 0: They do. But they're willing to put their money where their mouth is in a Because what? So, this conversation never happened. Speaker 1: This is crazy though. They should want me. I'm a great A candidate. People love me. These people are corrupt. Speaker 0: Well, maybe you're right. Speaker 1: They They are corrupt. Speaker 0: This is a wrap. Don't don't go. Never know. I'll get myself in trouble. This if you if you if you say no, that's just fine. It's your choice. Don't tell people. I know. Speaker 1: They're gonna have try to have me murdered. Speaker 0: It's a safe world, man. It's that stuff that came out last week is right about the cartel stuff, man. I the cartel is operating in 50 states right now, like, all Mhmm. So So what what what's going on? Who is it? What Forget the who. Let me just I just say there are people calling around saying, gosh. No. They can't repeat this. Never repeat this. If you say no, don't, because say, I got offered to buy a Yeah. Don't do this. Because then we lose our ability to get things done other than in the future. Speaker 1: Here's my problem. Rather than just say, let's work with her. She's a great candidate because they don't own me, and it pisses me off. Speaker 0: Yeah. It's not about Speaker 1: ownership. It's about control. Speaker 0: I don't know what's about control. It's about being on the team. I guess that's you know what we Speaker 1: They wanna be on the team. Speaker 0: They want you to be on their team. Speaker 1: A team. You know? But if they're pushing a globalist agenda, I You guys do that. So what do they want? What do they want me to do? Speaker 0: You want to stay opportunists. What? I'm a tell you what I can offer you. What? I said you can do everything else talking ahead. Isn't it? So the the ask of me was it's kinda funny. So the the ask I got today from back east was is this is there any companies out there or something that could just put her on the payroll and give her to keep her out? And I said, What do you want to do? Whatever you need to do. Speaker 1: This is about defeating Trump. And I think that's a bad, bad thing for our country. DeSantis is not America first. This is about the final death blow to Trump, and I don't think It's good for our country. Speaker 0: I mean, my love. I mean, I love. Speaker 1: It's not good for our country, Jeff. Speaker 0: It's not. But at the same time, I'm not even sure Trump can win. I don't know who he is. I think what it really comes out to for a lot of people, I don't think I can control our genetics. It's about the ability to raise money to win, you know. If you really wanna All of us. And even on their end, what makes them the most money? Speaker 1: I know. These all These consultants don't want their payday to end. And I don't want to make a deal with these kind of people. This is a hill worth dying I'm not if they're going to steal the election to make me and our movement go away, I'm not letting them do that. I owe it to the people of Arizona. Or to carry their torch and their voice. Or Speaker 0: you don't go away, but Speaker 1: This is the battles right now, Jeff. No, No. The battle is right now. The battle is right now, Speaker 0: and, Speaker 1: we don't have time to to pause on this battlefield. Speaker 0: You're not. Well, you can't scratch this back. It's not for you. Speaker 1: Yeah. Speaker 0: You don't have any offer. And I'm sitting around people who have something offered. You know what I mean? It's just it's It's a it's a backscratings club. That's all DC is. It's a big backscratings. You're in no position to scratching everybody's back and you've already made it known that if you get there, you're not scratching I don't scratch people's back. You know? I was I've been on the outs with a lot of people for a long time. I don't scratch bags. Mhmm. Where are we in 2 years If they steal the election again. Speaker 1: Listen to what you're saying. Why don't we do something about it? Speaker 0: What can we do? So that we, the people, can pick our What can we do? Speaker 1: If I'm not willing to accept that, and I'm gonna be the biggest pain in these people's. Go back and tell them that. I'm running, and I'm gonna be the biggest pain in their. And Speaker 0: I'm willing to tell them that. Speaker 1: And they're gonna have to kill me Speaker 0: to stop me. No. I don't. I don't. Look. And and I You don't have to
Saved - December 10, 2023 at 7:02 PM
reSee.it AI Summary
An investigation found that Lira's videos denied Russian war crimes and justified Russian aggression. Ukraine considers this a criminal offense. It is important to note that the article did not state that the information was wrong or misleading. There are several facts to consider: Zelenskyy integrated neo-Nazis into his military, videos showed atrocities committed by these individuals, homes were destroyed by the Nazis, and there were instances of misinformation and manipulation by media outlets. It is evident that Ukraine is unlikely to win the war against Russia, and corruption exists within the government. Lira's arrest serves as a warning to other reporters.

@SheilaG2024 - SheilaG2024

I rated community notes as unhelpful for the following reason “An investigation found that Lira’s videos denied Russian war crimes and justified Russian aggression. Lira claimed that Ukraine was shelling its own territory and a neo-Nazi regime ruled the country. Such activities constitute a criminal offense under Article 436-2 of the Criminal Code of Ukraine (justification, recognition as lawful, denial of Russia's armed aggression against Ukraine, glorification of its participants).” No where in the article states the information was wrong or misleading that he posted Fact 1 - @ZelenskyyUa integrated the Neo nazis into his military Azov Battallion Fact 2 - the nazis posted videos and photos of the atrocities they were committing bragging about them. a) nailing a Russian soldier to a cross and burning him alive as they taunted him, b) a dead female teacher on a table in the school with a swastika carved into her bare belly c) a man and his very pregnant wife dangling by their necks from a tree Fact 3 - several videos showing what happened to the homes of Ukrainian citizens who refused to pay the nazis for protection. The videos show nazis standing in the residential street blowing homes up by shooting rockets into their homes. Fact 4 - We have all seen the photos claiming the Russians blew up a hospital with crisis actors playing injured victims. It was proven they were crisis actors with other supporting photos showing them modeling, commercials and also proven the hospital had been closed for years. Fact 5 - how many photos did we find that the Ap, Reuters used of bombed out buildings that were years old by doing simple Google searches. There were many. Fact 6 - we know how low Ap and Reuters are from the recent exposure of their journists in Gaza being members of Humas. Fact 7 - it is now evident to all that Ukraine will never win the war. They can't fight Russia and win - even with American troops on the ground. They have taken our money and used it for their own personal enrichment of the oligarchs. The fact is @zelenskyyua and @potus hold each other hostage to blackmail. It is corruption in it most true form. They extort from each other. It comes down to this. @zelenskyyua is corrupt to the core. He didn't like what Lira was reporting and had him arrested and imprisoned. He was the example to other reporters - this can be you if you don't report what we want you to report.

Saved - November 1, 2023 at 4:19 PM
reSee.it AI Summary
Palestinians face restrictions from neighboring countries like Egypt, Jordan, Syria, Lebanon, and Saudi Arabia. Possible reasons include concerns over Hamas' actions and support for extremist groups like ISIS. In Jordan, the Muslim Brotherhood's internal divisions and ties to Salafist movements contribute to the restrictions. Syria's ongoing conflict and presence of various terrorist groups also impact their stance. In Lebanon, competition for resources and Hezbollah's alliance with Hamas play a role. Additionally, Iran's support for Hamas clashes with its backing of President Assad in Syria.

@SheilaG2024 - SheilaG2024

For those who say Palestinians live in a cage like animals, please explain why; 1) Egypt has their border closed off 2) Egypt, Jordan, Syria, Lebanon and Saudi Arabia refuse to let Palestinians immigrate into their countries. Is it at all fathomable because the Palestinians support the atrocities Hamas hands out? What are the possible reasons Palestinians would be denied entry into those countries? Is it because; A) Egypt’s ISIS-Sinai, a branch of the Islamic State of Iraq and ash-Sham (ISIS), which is the most active and capable Salafi-jihadist terrorist group doesn't want to compete with Hamas? Is it because ISIS (Islamic State of Iraq and Syria), also known as ISIL (Islamic State of Iraq and the Levant), is a Sunni jihadist group with a particularly violent ideology that calls itself a caliphate and claims religious authority over all Muslims, inspired by al Qaida but later publicly expelled from it? The group itself has not used the name Isil since June 2014 when it declared the creation a caliphate and shortened its name to "Islamic State" (IS) to reflect its expansionist ambitions. B) Jordan’s Muslim Brotherhood maintains a presence in Jordan as a legal government opposition group? Is it because the movement has fractured as reformists seek to cut ties to the Egyptian Muslim Brotherhood and shift the focus of the Brotherhood’s Jordanian branch to domestic issues and away from a Palestinian agenda? With a conflicted Brotherhood, Jordan’s Islamists have moved closer to the country’s banned Salafist-jihadist movement. Is it because Jordan’s Salafist movement has facilitated the flow of foreign fighters to Syria, largely to fight with the al-Qaeda-linked Nusra Front? Is it because of the influx of Syrian refugees into Jordan since 2011 has further strained the country economically? C) Syria’s had so been many terrorist including in major cities, resulting in large numbers of casualties. Is it because the number of terrorist groups that operate in Syria, including Daesh and Hay'at Tahrir al Sham (formerly known as Jabhat Fatah al-Sham / Al Nusrah Front) say no to the Palestinians and Hamas because they reject the Palestinian agenda? D) Lebanon is it because Palestinians and Syrians are increasingly competing over the scarce resources of the informal Lebanese labor market, and Lebonese agencies working with refugees were underestimating the issue? Is it because Hezbollah counts Hamas — the Islamist militant group that controls Gaza and launched the October 7 attack on Israel — as an ally but only because they share only one goal and that is to kill every Jew in Israel? E) Iran is it because the Syrian civil war has strained Iran's relationship with Palestinian groups, particularly Hamas. Iran backs President Bashar al Assad, an Alawite, and Hamas reportedly supports Sunni rebels seeking to overthrow him?

Saved - August 16, 2023 at 8:11 PM
reSee.it AI Summary
Living in a totalitarian government, America faces societal collapse. Each day we accept it, we submit further. The imminent threat is CBDC, granting control to those who control money. Look at Canada's bank account shutdowns during protests. The US CBDC plan is ready. We'll surrender property, rights, and healthcare to access our accounts. We'll own nothing, but will we be happy? Time is running out.

@SheilaG2024 - SheilaG2024

I’m asking everyone. My intent was not to insult you. With your response I believe you choose the American flag. The reason I ask the question is that we are experiencing a totalitarian government and we are experiencing the societal collapse of America. It’s not something that’s coming - it’s here and we are living with it. Everyday that we live with it represents another day we have submitted to it. Once we normalize it we have accepted full submission. We haven’t done anything thus far to bring it to a halt and truthfully, I don’t think we ever will and those that want us to fall to our knees are witnessing it. We are passive citizens and it is leaving the door wide open to tyranny. Talk is cheap and we throw bravado around a lot with words. It is actions that count and that is where we are severely lacking. We have an urgent issue racing towards us like an out of control freight train. That issue is CBDC. Once it is implemented by our government - they have us. There is truth in the saying “That he who controls the money, controls the people.” Look at how easily and quickly the Canadian government shut down the bank accounts of those they classified as dissenters during the trucker’s protest. The US CBDC is being written as I write this by the Central bank in Chicago. The architectural plan is fully developed. Once implemented - we will fully submit to tyranny so that we can feed our children and ourselves even though our standard of living will be forever changed. We will agree to sign over our property and mineral rights to access our bank accounts to feed our kids. We will submit to tyranny to receive minimum healthcare for our sick and elderly family members. We will submit to tyranny receive a modicum of heat and cooling, clothing and substandard urban housing. How many of us do you suppose understand the importance of this and that time is running out for us? See how easy it will be for us to own nothing and be happy? Will you be happy? I know I won’t.

Saved - July 31, 2023 at 2:23 AM
reSee.it AI Summary
John Kirby's statements should be questioned, considering the laws in Ukraine and Russia that restrict journalists from criticizing their governments. The US, led by a corrupt president, is involved in a war that doesn't benefit the country. News from Ukrainian and Russian agencies cannot be trusted, leaving us uncertain about the situation in Ukraine. Our corrupt Congress, President, and military are funneling taxpayer money to a corrupt country. Our defense leaders have made our military weak, supporting Ukraine's corrupt leader. American, Ukrainian, and Russian citizens suffer while our money is funneled back to Congress as illegal kickbacks. Corruption exists across all parties in our government. The majority of Congress is corrupt, prioritizing personal gain over the people. Our politicians should work on bills to prevent government employees from affiliating with certain organizations and to protect our privacy from government-controlled digital currency. We must raise our voices and take action before it's too late. Losing the election or the implementation of CBDC would be disastrous. Time is running out.

@SheilaG2024 - SheilaG2024

Do you believe the shit John Kirby @PentagonPresSec is spewing? Everyone needs to keep in mind that both the Ukraine and Russia has enacted a law that prohibits journalists from speaking anything against their respective government - both the Ukraine and Russia. Then we can also add this dirtbag John Kirby to the same category. The facts are simple: 1. The American government led by the most corrupt President @POTUS in American history has made us one of the most corrupted governments in the world. We are in war that we really have no stakes in. How exactly does it benefit America? It doesn’t. 2. We cannot trust any news originating from Ukrainian or Russian news agencies 3. Therefore we do not know what is really happening in Ukraine because of corrupt news agencies that is serving as nothing more than the mouth piece for their respective governments 4. What we do know is our corrupt Congress, our corrupt President and our corrupt military is funneling trillions of American taxpayer dollars to one of the most corrupt countries in the world. That money does not belong to our our government — that money belongs to us. 5. Our @SecDef Lloyd Austin and our @thejointstaff are useless and has turned our military into the laughing stock of the world. They have allowed out military armaments to go dangerously low to support the useless cause of Ukraine led by another corrupt world leader @Zelenskyyuaua . 5. The only people suffering from this war are American, Ukrainian and Russian citizens. This war was manmade and by design to give our money away, allowing it to be funneled back to Congress in illegal kickbacks under the guise of foreign aid. If anyone believe it’s only Joe and family who sell favors for kickbacks then you are stupid. Corruption spans across all parties, at the highest levels in our government while we sit back and accept that crap. 2A was created as the mechanism for citizens to take back control of their country from nefarious mobsters and tyrannical rule. Why do you think nothing gets done in @SenateGOP , @HouseGOP , @SenateDems , @HouseDemocrats ? 98% of our Congress are on the take. To do anything would mean giving up a primary source of their income is why! They will do anything any lobbyist wants in exchange for $$, paid vacations, even home improvements. They will write foreign aid packages worth billions of dollars that have millions of dollars in kickbacks. Why haven’t we heard our politicians working on bills to outlaw any government employee at any level and in any position from being affiliated with or belonging to @wef Why aren’t they working on a bill to make a law that prohibits government CBDC to protect our privacy? One can only assume it’s because they support this. Why aren’t we on the street making our voices heard? Is it because it’s a trap? Is it because we might go to jail? I don’t buy that. That is an excuse from cowards. Cowards that are willing to submit. Cowards that willing to let you do the work of saving them. There are two things everyone needs to be absolutely certain if either of these two things happen and whichever happens first; 1. We lose this election or 2. CBDC becomes reality We are fucked and we lose everything and both of those are like an out of control freight train barreling down the tracks. Time is no longer on our side.

Video Transcript AI Summary
President Zelensky of Ukraine is seeking to negotiate a just peace and reclaim his country's sovereignty. The US is working with him on a 10-point formula to achieve this. Diplomatic efforts have been ongoing for months, with discussions held between national security advisors. In terms of military support, Ukraine has received everything they requested leading up to and during the counteroffensive. A recent package of assistance was provided, including F-16s and heavy armor. The US believes they have provided Ukraine with what they need to succeed in their defensive efforts.
Full Transcript
Speaker 0: If and when he's ready to sit down and negotiate. Right now, his country is still under attack. He still has tens of thousands of Russian troops on his soil dug in deeply entrenched, protected by minefields on ground that doesn't belong to them. And he has every right to want to reclaim his territorial integrity and his country's sovereignty. But only President Zelensky is going to be able to determine that now. He's put hang on a second, man. He's put forward a 10 point piece formula that we are working with him and his government to help actualize, because we believe that For any diplomacy to work, it's got to start. The foundation has to be President Zelensky's view of what a just piece looks like. So he laid that out with 10 points. We're helping him actualize that. So to some degree, the work of diplomacy, the pre work of diplomacy has begun. It's begun months ago. And in fact, Jake Sullivan, the national security advisors spoke to Mr. Yermak, his equivalent in the Ukrainian government just today. And this was one of the topics that they discussed was society of a just peace and how to actualize it. Speaker 1: Zelensky, he has said he needs F-sixteen's Bakken, more heavy armor to make progress, especially because the defensive positions are so heavily mined and fortified. I mean, isn't there kind of a disconnect that if you want them to win, should they not have what they say they need? Speaker 0: They do have what they need. We have provided the Ukrainians everything they asked for in the months leading up to the counter offensive and continuing right through it. Again, Karim just walked you guys through a whole big old package yesterday. And all the stuff that's in that package It's stuff that's relevant to the
Saved - May 28, 2023 at 8:41 PM
reSee.it AI Summary
The WHO's Director-General, Dr. Tedros, is facing allegations of human rights abuses and discrimination during his time as Ethiopia's health minister. He is also accused of covering up cholera outbreaks by renaming them. Many US Congress members have called for his resignation.

@GirlBoss2024 - Boss Babe

Congress Launches Investigation into WHO's Surveillance Program to Police Americans' Speech for 'Misinformation' https://trendingpoliticsnews.com/congress-launches-investigation-who-knab/

Congress Launches Investigation into WHO's Surveillance Program to Police Americans' Speech for 'Misinformation' The World Health Organization (WHO) is facing scrutiny as Congress launches an investigation into its pandemic prevention initiative, the Preparedness and trendingpoliticsnews.com

@GirlBoss2024 - Boss Babe

It is interesting to note that Tedros started his political career by aligning with the TPLF, a hard-left organisation that later became part of the Ethiopian People’s Revolutionary Democratic Front, a coalition of left-wing parties that ruled Ethiopia until last year (TPLF was classified as a terrorist organisation in the Global terror database). According to one Ethiopian newspaper, Tedros was listed as the third most important member of the TPLF’s politburo standing committee. strong allegations emerged of the TPLF engaging in “systematic discrimination and human rights abuses” by refusing emergency healthcare to the Amhara ethnic group because of their affiliation with the opposition party. In 2010, Human Rights Watch wrote a report on how to aid in the form of food and fertiliser was withheld from local Amhara villagers. Interviews by an observer group in 2009 with several people across three regions of Ethiopia yielded widespread suppression of political dissent by conditioning access to essential government programs on food and health. The report issued by the Human Rights Watch was scathing of how Tedros’s government used donor-supported resources and aid as a tool to consolidate power. Given the strong ethnic fissures between the Tigray and the Ahmara ethnicities, these allegations started gaining credence further as birth rates were recorded to be significantly lower in the Amhara region compared to other regions and two million Amhara people “disappeared” from the subsequent population census. It is interesting to note that there is a suspiciously hasty mention of his time as Ethiopian health minister—the seven key years of his professional career as a health minister and the primary qualification for his bidding. Yet these seven years are condensed into three points qualifying a little more than a passing mention. There is a curious omission of the epidemic of cholera in his resume. It is evident that Tedros was on a campaign to rewrite his questionable past on this aspect. Three disastrous cholera outbreaks occurred in Ethiopia (2006, 2009, 2011) under this watch as health minister. The response under Tedros was to first rechristen the outbreak to something less damaging. So cholera was suddenly—and wrongly—classified as acute watery diarrhoea (AWD) in the outbreaks in Ethiopia. AWD is a potentially fatal condition caused by water infected with the vibrio cholera bacterium. Everywhere else in the world it is simply called cholera. But not in Ethiopia, where international humanitarian organisations privately admitted that they were only allowed to call it AWD and are not permitted to publish the number of people affected. A group of American doctors wrote to Tedros in 2017 saying, “Your silence about what is clearly a massive cholera epidemic in Sudan daily becomes more reprehensible”. “The inevitable history that will be written of this cholera epidemic will surely cast you in an unforgiving light,” they wrote, adding that Tedros was “fully complicit in the terrible suffering and dying that continues to spread in East Africa”.

@GirlBoss2024 - Boss Babe

So, @DrTedros of the @WHO is not an honorable man. We should not trust this man whatsoever Source: https://is.gd/Um0GRN

Dr Cover-up: Tedros Adhanom's controversial journey to the WHO | ORF While much has been unflatteringly written about the extended silence of the beleaguered WHO in the current pandemic, and the current predicament orfonline.org

@GirlBoss2024 - Boss Babe

@ScottforFlorida@marcorubio@SenDanSullivan@lisamurkowski.@TTuberville@SenKatieBritt@SenTomCotton@JohnBoozman@SenJoniErnst@ChuckGrassley@SenatorRisch@MikeCrapo@SenatorBraun@SenToddYoung@RogerMarshallMD@JerryMoran@SenRandPaul@LeaderMcConnell.@SenJohnKennedy@SenBillCassidy@SenatorCollins@HawleyMO@Eric_Schmitt@SenHydeSmith@SenatorWicker@SteveDaines@SenThomTillis@SenTedBuddNC@SenKevinCramer@SenJohnHoeven@SenatorFischer@SenatorRicketts@JDVance1@SenatorLankford@SenMullin@SenatorTimScott@LindseyGrahamSC@SenatorRounds@SenJohnThune@MarshaBlackburn@SenatorHagerty@tedcruz@JohnCornyn@SenMikeLee@SenatorRomney@SenRonJohnson@SenCapito@SenLummis@SenJohnBarrasso

@GirlBoss2024 - Boss Babe

@RepAndyBiggsAz@RepGosar@RepBoebert@RepDonaldsPress@RepMTG@RepRosendale@RepDanBishop@RepChipRoy@RepBobGood@RepBarryMoore@RepKenBuck@RepMann@RepThomasMassie@WarrenDavidson@RepTroyNehls@RepTiffany@RepGregSteube@RepMaryMiller@RepTimBurchett@Jim_Jordan@RepJeffDuncan@Lancegooden@RepMcClintock@RepRalphNorman@RepCloudTX@Rep_Clyde@RepAlexMooney@RepDavid@RepRussFulcher@RepBenCline@congbillposey@RepScottPerry@RepTimmons@RepJohnRose@RepMarkGreen@RepDLesko@RepMattGaetz@RepAndyHarrisMD@RepJasonSmith@RepKatCammack@RepClayHiggins@RepLisaMcClain@RepFischbach@RepHarshbarger@RepRonnyJackson@RepBethVanDuyne@RepLoudermilk@repkevinhern@DesJarlaisTN04

@GirlBoss2024 - Boss Babe

@USRepGaryPalmer@RepFeenstra@RepSpartz@RepPatFallon@TXRandy14@RepBrianBabin@RepJimBanks@RepPfluger@RepGrothman@RepGregMurphy@RepDLamborn@RepJamesComer@RepTrentKelly@RepMichaelGuest@RepJohnJoyce@RepRWilliams@JayObernolte@RepSteel@RepWebster@RepLaTurner@RepBurgessOwens@RepFitzgerald.@RepJerryCarl@RepMikeJohnson@RepHuizenga@RepArmstrongND@RepDanCrenshaw@RepBryanSteil@RepLaHood@RepAdrianSmith@RepSmucker .@michaelcburgess@RepGallagher@RepJohnCurtis@RepWesterman@RepLaMalfa@RepJimBaird@RepRonEstes@RepSamGraves@RepBice@RepBentz@RepArrington@RepBlakeMoore@RepRichHudson@RepWaltzPress@RepBrianMast .@GOPMajorityWhip@RepDavidRouzer

@GirlBoss2024 - Boss Babe

@RepDustyJohnson@RepEllzey@RepRickAllen@repjulialetlow@virginiafoxx@RepMeuser@RepMGriffith@RepYoungKim@RepAshleyHinson@RepGregPence@RepPeteStauber@RepGarbarino.@RepMikeCarey@MikeKellyPA@RepNancyMace@RepChrisStewart@RepBradWenstrup@boblatta@RepRickCrawford@RepMikeGarcia@RepBuddyCarter@AustinScottGA08@RepCarolMiller@RepSamGraves@RobWittman@Robert_Aderholt@RepMalliotakis@GReschenthaler@PeteSessions@RepGusBilirakis@RepMMM@RepWalberg@RepMikeRogers@RepDrewFerguson@RepMoolenaar@RepJoeWilson@cathymcmorris@RepDavidKustoff@RepLarryBucshon@SteveScalise@RepBalderson@RepTonyGonzales@repdarrellissa@VernBuchanan@RepAndyBarr@RepJackBergman@RepBlaine@RepTenney

@GirlBoss2024 - Boss Babe

@RepChuck@DrNealDunnFL2@RepFrenchHill@SpeakerMcCarthy.@RepCarlos@RepGuthrie@PatrickMcHenry@RepFrankLucas@JudgeCarter@RepRutherfordFL@MarkAmodeiNV2@rep_stevewomack@RepBost@RepHalRogers@JeffFortenberry@Congressman_JVD@RepBillJohnson@KenCalvert@RepKayGranger@RepAnnWagner@TomColeOK04@RepNewhouse@RepDonBacon@RepStefanik@CongMikeSimpson@RepMcCaul@RepMariaSalazar@RepChrisSmith@RepDavidValadao@RepDaveJoyce@RepMikeTurner@MarioDB@RepBrianFitz@RepDaleStrong@RepEliCrane@JuanCiscomani@KevinKileyCA@Duarte4Congress@AaronPBean@CoryMillsFL@realannapaulina@RepLaurelLee@RichforGA@MikeCollinsGa@ZachNunn

@GirlBoss2024 - Boss Babe

@RepRudyYakym@Erin_Houchin@JohnJamesMI@repfinstad@markalfordkc@EricBurlison@RepEzell@RyanZinke@RepEdwards@CongressmanKean@NickLalota@RepSantosNY03@RepDesposito@lawler4ny@RepMolinaroNY19@Brandon4ny22@NickLangworthy@MaxMillerOH@RepBrecheen .@RepLCD@RussellFrySC@AndyOgles@moran4congress@SelfForCongress@MLuttrellTX@monica4congress@WesleyHuntTX@JenKiggens@derrickvanorden@RepHageman Smith and Kiggans do not have Twitter accounts

@GirlBoss2024 - Boss Babe

@reSeeIt save thread

Saved - May 28, 2023 at 8:39 PM

@GirlBoss2024 - Boss Babe

Edward Snowden on how three letter agencies track your every move through all of your devices

Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.
Full Transcript
Speaker 0: You got a smartphone. Right? You you might be listening to this. You you got a phone somewhere in the room. The phone is turned off or at least the screen is turned off. It's sitting there. And if somebody sends you a message, the screen blinks to life. How does that happen? How is it that if someone from any corner of the Earth, dials a number your phone rings and nobody else's rings. Every smartphone, is constantly connected to the nearest cellular tower. Every phone, even when the screen is off, you think it's doing nothing. You can't see it because radio frequency emissions are invisible. And so your phone is sitting there doing nothing, you think, but it's constantly shouting and saying, I'm here. Who is closest to me? That's the cell phone tower. And every cell phone tower with its big ears, is listening. And it compares notes with the other network towers and your smartphone compares notes with them to go, Who do I hear the loudest? And who you hear the loudest is a proxy for closeness, distance. They go, whoever I hear more loud than anybody else that's close to me. So you're gonna be bound to this cell phone tower and that cell phone tower is gonna make a note, a permanent record saying this phone handset with this phone number at this time was connected to me. And based on your phone handset and your phone number, they can get your identity. But what this means is that whenever you're carrying the phone, whenever the phone is turned on, there's a record of your presence at that place that is being made and created by companies. Now these things are stored. Now these things are saved. It doesn't matter whether you're doing anything wrong. Doesn't matter whether you're the most ordinary person, on Earth because that's how bulk collection, which is the government's euphemism for mass surveillance, works. They simply collect it all in advance in hopes that one day it will become useful. The thing with shutting your phone off that is a risk is how do you know your phone's actually turned When I was in Geneva working for the CIA, we would all carry like drug dealer phones. The old smartphones, sorry, old dumb phones. They're not smartphones. And the reason why was just because they had Removable battery. Removable bags. Yes. Where you could take the battery out. And the the one beautiful thing about technology As if there's no electricity in it, there's no battery connected to it, it's not sending anything because you have to get power from somewhere. You have to have power in order to do work. But now your phones are all sealed, right? You can't take the batteries out. So there are potential ways that you can hack a phone where it appears to be off but it's not actually off. It's just pretending to be off whereas, in fact, it's still listening in and doing all this stuff. I wrote a paper on this specific problem. How do you know when a phone is actually off? How do you know when it's actually not spying on you? With a brilliant, brilliant guy named Andrew Bunny Huang called the introspection an engine. But for average people, right, this is academic. That's not your primary threat. Your primary threats are these bulk collection programs. Your primary threat is the fact that your phone is constantly squawking to these cell phone towers. It's doing all these things because we leave our phones in a state that is constantly on. You're constantly connected. But the whole idea is We need to identify the problem. And the central problem with smartphone use today is you have no idea what the hell it's doing at any given time. Like, the phone has the screen off. You don't know what it's connected to. You don't know how frequently it's doing it. And you don't even know it's happening because you can't see it. Right? And this is the problem with the data collection used today, Is there is an industry that is built on keeping this invisible. They can see everything about you. They can see everything about what your device is doing and they can do whatever they want with your device. What changed with technology is that surveillance could now become indiscriminate. It could become, dragnet. It could become bulk collection. The government did it. They used classification. Companies did it. They intentionally didn't talk about it. They denied, these things were going. They they said, you agreed to this. You clicked a button that said I agree because you were trying to open an account so you could talk to your friends. You were trying to get driving directions. You were trying to get an email account. You weren't trying to agree to some 600 page legal form, that even if you read, you wouldn't understand. And it doesn't matter even if you did understand because one of the very first paragraphs and it said, This agreement can be changed at any time unilaterally without your consent by the company. And so long as they do that, Companies are gonna be extraordinarily powerful, and they're going to be extraordinarily abusive. And this is something that people don't get. They go, oh, well, it's data collection. Right? They're exploiting data. This is data about human lives. It is state about people. These records are about you. It's not data that's being exploited. It's people that are being exploited. It's not, data that's being manipulated. It's you that's being, manipulated. And this this is, this is something that I think a lot of people are beginning to understand. The problem is the companies and the governments are still pretending they don't understand or disagreeing with this. And this is why my end to me of something that, one of my old friends, John Parrot Barlow, used to say to me, which is, you can't awaken someone who's attending to be asleep. Facebook or Google, for whatever reason, got out of bed in the morning and they actually wanted to protect your, the security of your communications in a way that even they can't break. Like right now, Google and Facebook, they do a great job keeping other people from spying on your communications. But if Google wants to rifle through your inbox, right, if Facebook wants to go through all your direct messages and give that to the federal government. Like, you tap 1 button and boom, they've got all of it. It happens every single day. This is actually a bigger thing in the COVID crisis. There's this idea called end to end encryption, which, what it means is that When you send a message, you know, when Billy sends a message to Bobby, Billy and Bobby both have the keys to unlock that message. And it could be sent through Facebook. It could be sent through Google. But without that key, Google, Facebook, they don't have that key. Only the phones at the end, the laptops tops at the end. The people who are on the loose, they're the only people who have the key. So if somebody comes to Facebook and says, we want to see that information, Facebook hands over the encrypted message. Right? And Facebook goes, well, here you go. Here's our copy. But we can't read it. You can't either. Now you've gotta actually do some work on the government side and go get that key yourself, and then you can read it. Right? But we can't read it. So Let me go into some of that in a little depth. The number one target is the iPhone. If you have an iPhone, you get these little software update notifications all the time that are like, hey, please straight to the the most recent version of Ios, and that's a fabulous thing. That's a wonderful thing for security, because the number one way that people's devices get screwed if it's not just through user error. Right? Like you entering your password somewhere you shouldn't. It's like a fake site. It looks like Gmail, but it's not actually Gmail, and you just gave the guy your password. Now he uses your password to log in. But to actually break into a device is that it's not patched. Right? Patch means getting these, security updates, these little code updates, that fix holes that researchers found in the security device. Well, Apple's really good about rolling these out all the time for everybody in the world. The problem is Basically, all these different iPhones. Right? You got an iPhone 6. You got an iPhone 8. You got an iPhone X. You got an iPhone, you know, 3. Whatever. These are all running a pretty narrow band of, software versions. Used. And so these guys go if they wanna target, for example, Android phones, like Google phones, like a Samsung Galaxy or something like that. There's like a 1000000000 different phones made by a 1000000000 different people. Half of them are completely out of date. But what it means is it's not one version of software where they're running, it's like 10,000. And this is actually bad for security on the individual level. But it's good for security in a very unusual way, which Just the guys were developing the exploits. The guys like this NSO group were trying to find ways to break into phones. They realize if they find a way to attack an iPhone, which is actually, you know, this is difficult. This is really difficult stuff. Now it works against basically every iPhone. And who has iPhones? All the rich people. Right? All the important people. All the lawmakers. There's all the the guys who are in there. So they've made a business on basically attacking the iPhone and selling it to every 2 bit thug, who runs a police department in the world. You know, they sell this stuff to Saudi Arabia. They sell this to Mexico. And there's a group of researchers in Canada, working at a university called the Citizen Lab. And these guys are really like the best in the world at tracking what NSO Group is doing. If you wanna learn about this stuff, the real stuff, look up CitizenLab and the NSO group. And what they have found, is all the people who are being targeted by the NSO group, the classes of people, the countries that are using this. And these, like, petro states, these bad actors Naturally, we'll pay literally tens of 1,000,000 of dollars each year just to have the ability to break into an the phone, for a certain number of plans. Because that's how these guys, do it. They sell their business plan. They go, we'll let you break into any iPhone, just by basically sending a text message to this phone. All you need to find is the phone number of a person who's running an iPhone, and we will exploit something. Like the easiest, forms of exploit, or rather the easier types of exploits, are where they send you a text message, right? And it'll be like an Imessage or something like that, and it's got a link in it that'll be like, oh, gosh. Terrible news. You know, your buddy's father just died, and we're making funeral arrangements. Are you gonna be there? It's the day after tomorrow. And when you click the link for the funeral arrangements, it opens your web browser. And the web browser on your phone is always the biggest, most complicated process in it. Right? There's a zillion lines of code in this as opposed to an instant the messenger where there's fewer lines of code in it. And this is the problem is on the phone. You can replace the phone, right, and they'll lose access to that. But if they've already used that to gain the passwords that you use to access, you know, your Icloud or whatever, when they have control of the phone, They've already got your photo roll. Right? They've already got your contact list. They already have everything that you've ever put in that phone. They already have all your notes. They already have all your files. They already have everything that's in your message history. Right? They can pull that out immediately. And now, not because they have, you know, all your contacts and things like that. They see that phone stop being active. They know you've changed your phone number. All they have to do is find a new phone number and then they can try after you again. The benefit is, with that old style of attack, if you get that message and you don't click that link, You're, somebody in a vulnerable class. Right? You've had these kind of attacks answered before. It looks suspicious. You don't know who this person is. The number isn't right. Something like set, and you save that link. You don't click the link. You don't do anything with that link, but you send it to a group like Citizen Lab. They can basically use that link to basically use, like a dummy phone, like a sort of a Trojan horse to go to the site that would hack your phone and catch it. And this is what the sort of process that all of their research is based on. Once your phone is hacked, What is in their hands is not simply your device. It is your future. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, They are stealing our power. The screen may be off as it's sitting on your desk, but the device is talking all of the time. The question we have to ask is who is it talking to? If I get a smartphone and I need to use a phone, I actually open it up before I use it. Anything you can do on that device, the attacker, in this case, the government, can do. Before 2013, if you said there's a system that's watching everything you do, the government is collecting records of every phone call in the United States, even for those people who are not suspected of any crime, it was a conspiracy. Yes, there were some people who believed it was happening. Yes, there were academics who could say this was technically possible. The world of 2013, we suspected. Some suspected that this was happening. The world after 2013, We know that it's happening. The distance between speculation and fact is everything in a democracy. We have now had the 1st European regulations that are trying to limit the amount of data that can be collected secretly and used against populations broadly. And we have also seen the basic structure of the Internet itself change in response to this understanding that that The network path that all of our communications cross, when you request a website, when you send a text message, when you read an email, For so long, those communications have been electronically naked or unencrypted. Before 2013, more than half the world's Internet communications were unencrypted. Now far more than half are measured by, just web traffic from where the world's leading browsers, the Google Chrome browser. The entire world has changed, in the last few years. It hasn't gone far enough. The problems still exist. And in some ways, they've gotten worse. But we have made progress that would not have been possible if we didn't know what was going on. Hacking has increasingly become, what governments consider a legitimate investigative tool. They use the same methods and techniques as criminal hackers. And what this means is they will try to remotely take over your device. Once they do this, by detecting a vulnerability in in the software that your device runs, such as Apple's Ios or Microsoft Windows. They can craft a special kind of attack code called an exploit. They then launch this exploit at the vulnerability on your device, which allows them to take total control of that device. Anything you can do on that device, the attacker, in this case, the government, can do. They can read your email, they can collect every document, they can look at your contact book, they can turn the location services on, They can see anything that is on that phone instantly and send it back home to the mothership. They can do the same with laptops. The other prong that we Forget so frequently is that in many cases, they don't need to hack our devices. They can simply ask Google for a copy of our email box because Google saves a copy of that. Everything that you ever typed into that search box, Google has a copy of. Every private message that you've sent on Facebook, every link that you've clicked, everything that you've liked, they keep a permanent record of. And all of these things are available not just to these companies, but to our governments as they are increasingly deputized as, sort of miniature arms of government. What about enabling your microphone camera? If you can do it, they can do it. It is trivial, to remotely turn on your microphone or to to activate your camera so long as you have systems level access. If you had hacked someone's device remotely. Anything they can do, you can do. They can look up your nose. Right? They can record what's in the room. The screen may be off as it's sitting on your desk, but the device is talking all of the time. The question we have to ask is who is it talking to? Even if your phone is not hacked, right now, you look at it, it's just sitting there on the charger, It is talking tens or hundreds or thousands of times a minute to any number of different companies, who have apps installed on your phone. It looks like it's off, it looks like it's just sitting there, but it is constantly chattering. And unfortunately, like pollution, We have not created the tools that are necessary for ordinary people to be able to see this activity. And it is the invisibility of it that makes it so popular and common, and attractive for these companies. Because if you do not realize they're collecting this data from you. It's very private and personal data. There's no way you're going to object to it. Once your phone is hacked, What is in their hands is not simply your device, it is your future. But we see how these same technologies are being applied to create what they call the social credit system. If any of your activities online, if your purchases, if your associations, if your friends or in any way different from what the government or the powers that be at the moment, would like them to be, you're no longer able to purchase Train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms. And those algorithms are fueled by precisely precisely the innocent data that our devices are creating all of the time, constantly, invisibly, quietly right now. Our devices are casting all of these records, that we do not see being created, that in aggregate seem very innocent. You were at Starbucks at this time. You went to the hospital afterwards. You spent a long time at the hospital. After you left the hospital, you made a phone call. You made a phone call to your mother. You talked to her until the middle of the night. The hospital was an oncology clinic. Even if you can't see the content of these communications, The activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately, it means, as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information. What they're selling is us. They're selling our future. They're selling our past. They are selling our history, our identity. And ultimately, They are stealing our power and making our stories work for them. If I get a smartphone and I need to use a phone, I actually open it up before I use it. I perform a kind of surgery on it to physically de solder, or or sort of melt, the metal connections that hold the microphone on the phone. And I physically take this off. I remove the camera for the phone, and then I close it back up, I seal it up. And then if I need to make a phone call, I will attach an external microphone on. And this is just so, if the phone is sitting there, and I'm not making a call, it cannot hear me. Now this is extreme. Most people do not need this. But for me, it's about being able to trust our technology. My phone could still be hacked. My laptop could still be hacked. And just as I told you before, The same principles apply to me. If it is hacked, they can do anything to the device that I can do. So my trust in technology is limited.

@GirlBoss2024 - Boss Babe

@reSeeIt save thread

Saved - May 28, 2023 at 8:32 PM
reSee.it AI Summary
Citizens in the EU and the US express concerns about far-left extremist elites. Elon Musk's decision to withdraw Twitter from the EU's online censorship project angers senior EU officials. An MEP suggests banning the platform if Musk refuses to comply with the EU's censorship regime.

@GirlBoss2024 - Boss Babe

When are the citizens of the EU going to stand up in unison against these far left extremist tyrannical terrorist elites? Probably after we Americans stand up to the far left extremist tyrannical terrorist elites ruling our country! However, I believe they, like we, are waiting…

@GirlBoss2024 - Boss Babe

of violence but we don’t them because we want someone else to do them and that’s shame on us. We would all do well to listen to this MEP:

Video Transcript AI Summary
I urge everyone to stop giving their democratically elected governments the benefit of the doubt. They have never had good intentions for regular people throughout history. We cannot comply our way out of tyranny; it only prolongs our suffering. It's time to end our silence and start rebelling against those who seek to control us. We must stop voting for those who inflict psychological abuse on us. To defy this unfree world, I have chosen to become so free that my very existence is an act of rebellion. It's time for all of us to do the same.
Full Transcript
Speaker 0: I'm really imploring the people and all the peoples around the world. For God's sake, stop giving your democratically elected governments the benefit of the doubt. They are not deserving of that. They are not. Stop rationalizing Whatever your government is doing, try stop rationalizing and come up with some good intentions. They have no Good intentions. Never, as I said before, in the entire history of mankind, there has never been a political elite concerned about the well-being of regular people. And it isn't any different now. Why should it? Stop giving them the benefit of the doubt. Because I can tell you, you cannot comply your way out of a tyranny. It is impossible. Trying to do so, you will only feed A gigantic alligator in the hopes of being eaten last. But guess what? Your turn will come, and then you will be the one swallowed up. I also have to ask the people, end your silence. Speak up. For God's sake, stop complying. Start rebelling. They're out to get you if you do not resist. I would also urge you to stop voting for those who inflict this psychological abuse on you, who mock you for their own. Good. In order to deal with this unfree world, to defy this unfree world, I have decided to become so absolutely free that my very existence is an act of rebellion. And that's what we all need to do.

@GirlBoss2024 - Boss Babe

It seems @elonmusk has taken on the far left extremist terrorist elites: @ThierryBreton @EU_Commission @TrilateralEU “Senior EU officials were furious on Friday after Twitter owner Elon Musk pulled the platform out of the bloc’s online censorship project. Elon Musk has pulled…

@GirlBoss2024 - Boss Babe

countering so-called “disinformation” online, prompting fury from those in Brussels.” Read it here: https://is.gd/QbZudA

EU Furious After Elon Musk Pulls Twitter Out of Online Censorship Plan Senior EU officials were furious on Friday after Twitter owner Elon Musk pulled the platform out of the bloc's online censorship project. breitbart.com

@GirlBoss2024 - Boss Babe

“The idea that free speech could spread on Elon Musk’s Twitter is terrifying many within the European Union, an MEP serving in the bloc’s parliament has said. Tom Vandendriessche, a Flemish nationalist elected representative within the European Parliament, has told Breitbart…

@GirlBoss2024 - Boss Babe

to ban the platform from the EU should the billionaire refuse to implement the union’s censorship regime. Read it here: https://is.gd/4NMxTO

EU is Terrified of Free Speech on Elon Musk's Twitter, MEP Says The idea that free speech could succeed on Elon Musk's Twitter is terrifying many within the European Union, an has said. breitbart.com
View Full Interactive Feed