TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Last week, the China Select Committee and I urged the FBI to update Congress on its investigation into TikTok's Chinese parent company, ByteDance. Forbes revealed that ByteDance gave Chinese government regulators access to sensitive TikTok data. This means that the Chinese government can spy on and influence Americans through the app. ByteDance's own investigators admitted to tracking American journalists and accessing their data. Public data analysis also suggests that TikTok allows anti-Semitic bias while censoring content sensitive to the Chinese Communist Party. The State Department reported that ByteDance kept a list of users likely blocked for supporting Uyghur Muslims. The FBI needs to share its findings on ByteDance and TikTok with Congress promptly. Time is running out.

Video Saved From X

reSee.it Video Transcript AI Summary
Big tech's handling of the Chinese Communist Party (CCP) is concerning. They have been deferential to the CCP, which was invested in promoting lockdowns similar to those in Wuhan. Facebook and other companies elevated lockdown hysteria and suppressed those questioning it. This is troubling because lockdowns were not the norm in public health guidance before COVID, and it was a new concept influenced by China's experience. The relationship between big tech and the CCP is problematic, especially in fields like entertainment and the American economy.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
The US intelligence community faces a challenge in countering Chinese espionage due to the large number of people involved. China is willing to deploy not only operatives from its main spy agency, MSS, but also ordinary citizens who are coerced through threats against their families in mainland China. This resembles the tactics of a mafia organization. Additionally, China has been reported to acquire land for military bases, a practice that should be prohibited.

Video Saved From X

reSee.it Video Transcript AI Summary
China's cyber program is the largest in the world, surpassing all major nations combined, and has stolen vast amounts of American personal and corporate data. Beyond cyber theft, a significant concern is the Chinese government's positioning within American civilian critical infrastructure, allowing them to potentially cause harm at their discretion. They have already embedded malware in essential systems, including water treatment plants, transportation networks, the energy sector, the electric grid, natural gas pipelines, and telecommunications. This threat poses a serious risk to national security.

Video Saved From X

reSee.it Video Transcript AI Summary
I used to work for the FBI's foreign counterintelligence unit and did surveillance on various intelligence groups. One interesting topic is the Wuhan virus, which I believe is a bioweapon developed by the Chinese military. Many countries, including the US and Russia, have bioweapons. The FBI confirmed it was a bioweapon within 48 hours and traced its origin using specialized equipment. China's goal is not to destroy the US but to colonize it gradually, starting with media and schools. They have been spying since the 1970s, attending trade and science shows, and now they are deeply involved in universities, gathering data for new weapons.

Video Saved From X

reSee.it Video Transcript AI Summary
I describe TikTok as CCP malware, and I believe it is accurate.

Video Saved From X

reSee.it Video Transcript AI Summary
Microsoft has a partnership with China's central propaganda department, which involves using their software to spy on users. Microsoft has been doing business in China for over 30 years and has sold the Chinese Communist Party (CCP) over a dozen AI products, supporting their high-tech industry. The CCP's long-term plan, called Made in China 2024, aims to surpass America in the high-tech industry, and Microsoft has played a significant role in helping them achieve this. Microsoft is also collaborating with CCP mouthpieces, the People's Daily and China Daily, further raising concerns about national security.

Video Saved From X

reSee.it Video Transcript AI Summary
China's hacking program, deemed the world's largest by the FBI, has resulted in the theft of more personal and business data from Americans than any other country. However, the Chinese Communist Party (CCP) has gone further by targeting American critical infrastructure. Intelligence and cybersecurity agencies have uncovered CCP's hacking activities, which aim to disable and destroy vital infrastructure in the event of a conflict, such as one concerning Taiwan. This cyber warfare strategy can be likened to placing bombs on American bridges, water treatment facilities, and power plants.

Video Saved From X

reSee.it Video Transcript AI Summary
TikTok poses a significant threat as it can access private data on your phone, including keystrokes. This means sensitive information like usernames and passwords for banking can be obtained. Unlike other social media platforms, TikTok goes beyond collecting data for advertising purposes. The Chinese Communist Party (CCP) has ulterior motives, aiming to harm the American people. In the event of a conflict, the data collected from American consumers will be used against them and their communities.

Video Saved From X

reSee.it Video Transcript AI Summary
New details have emerged about a major cyber hack attributed to Chinese government-affiliated hackers, who compromised multiple US communications companies. The FBI reports that these hackers accessed sensitive records, intercepted voice calls, and even infiltrated the Justice Department's wiretap system. Most intercepted communications involved government or political figures, raising concerns about the vulnerability of nearly all Americans' communications. Officials advise using encrypted messaging apps like Signal, WhatsApp, or iMessage for secure communication. The hacking group, known as Salt Typhoon, is linked to previous attacks on political campaigns. Understanding the risks of digital connectivity is crucial, as it can be exploited against us. China has denied these hacking claims and accused the US of spreading disinformation.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
Leaked audio reveals that ByteDance employees in China accessed American user data in 2021 after Project Texas began. This raises concerns because if ByteDance, which is subject to CCP control, can access American user data, they can potentially hand it over to the CCP, regardless of what TikTok claims.

Video Saved From X

reSee.it Video Transcript AI Summary
TikTok poses two major threats: surveillance and foreign influence. The first threat is evident, and now we see the second component emerging. This involves an influence campaign on Hamas in Israel, which is likely being observed by a Chinese Communist Party (CCP) official in Beijing. They will use this campaign to update their strategies for China and Taiwan. It is important to remember that TikTok is not only an intelligence platform for the CCP but will also face criminal charges globally.

Video Saved From X

reSee.it Video Transcript AI Summary
China has obtained the genomic sequence of every person in the US who has undergone gene typing. They are using this information to develop bioweapons that specifically target Caucasians. Chinese companies, such as BGI, dominate the genomic sequencing industry in the US. There is evidence suggesting that the COVID-19 virus originated from a lab in Wuhan, China, and was created through gene splicing and gain of function research. China has publicly discussed their interest in using advanced pathogenetic capabilities for warfare. The export of American genetic information to China is a significant concern, as it could be used to develop genetic weapons that target specific populations based on their genetic variations.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a US visit, an engineer working for Telegram was allegedly approached by cybersecurity agents attempting a secret hire. The agents were interested in Telegram's open-source libraries and tried persuading the engineer to integrate specific open-source tools that the speaker believes would function as backdoors, potentially enabling government surveillance of Telegram users. The speaker also recounts personal experiences of being met by FBI agents at US airports and visited at their residence. They believe the FBI's interest was in gathering details about Telegram and establishing a relationship to better control the platform. While acknowledging the agents were doing their job, the speaker suggests this level of scrutiny made the US a less-than-ideal environment for running a privacy-focused social media platform.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a visit to the US, an engineer working for Telegram was allegedly approached by cybersecurity officers or agents who attempted to secretly hire him. The speaker believes the US government wanted to hire the engineer, not necessarily to write code or break into Telegram directly, but to learn about open-source libraries integrated into the Telegram app. The speaker alleges they tried to persuade the engineer to integrate specific open-source tools into Telegram's code, which the speaker believes would function as backdoors. These backdoors, according to the speaker, would potentially allow the US government, or any government, to spy on Telegram users.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Microsoft has been accused of collaborating with CCP propaganda outlets to spread misinformation and anti-American rhetoric. This raises concerns about US companies working against their own country. The CCP reportedly gained access to Microsoft's Windows operating system source code in 2003, allowing them to carry out cyber attacks on US government agencies and private industries. Microsoft has been operating in China since 1992 and has provided the CCP with advanced technology like AI and cloud computing, potentially aiding their efforts to undermine America.

Video Saved From X

reSee.it Video Transcript AI Summary
The British security agencies use phone and cloud hacking services provided by the Israeli tech company, Celebreit. The company is led by Dana Goethe, an alumni of Unit 8200 in the Israeli military, known for surveillance and blackmailing Palestinians. Celebreit is staffed with former Israeli military and intelligence personnel. The concerning part is that Celebreit claims to remotely control all its devices, suggesting they have access to information obtained by the British security services.

Video Saved From X

reSee.it Video Transcript AI Summary
Chinese cyber warfare and espionage pose an existential threat to America. There are concerns about sleeper cells infiltrating critical infrastructure, including water systems, natural gas lines, and telecommunications.
View Full Interactive Feed