reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2013, mobile devices are now the primary focus, with smartphones constantly emitting signals to cell towers even when idle. These signals contain unique identifiers like IMEI and IMSI, allowing tracking of a user's movements. Companies store this data for unknown purposes, leading to privacy concerns and mass surveillance through bulk collection.

Video Saved From X

reSee.it Video Transcript AI Summary
Liberals are proposing a law where a minister can ban me from the Internet, my Internet service provider ban me from the Internet, and neither of us be able to say anything about it. Matt Strauss, who's a doctor and a physician and also a member of parliament, said that you need to be concerned about bill c eight. It allows Melanie Jolley to kick anyone off the Internet with no trial and no warrant. Worse off, you won't be able to say that you've even been kicked off. And this is the Emergencies Measures Act on steroids, only permanent and secret? "Watch this. Ministers order if there are reasonable grounds to believe that it is necessary to do so to secure the Canadian telecommunication system against any threat, including that of interference, manipulation, disruption, degradation, the minister may by order and after consultation with the minister of public safety, prohibit a telecommunications service provider from providing any service to any specified person, including telecommunications service provider." "The order may also include a provision prohibiting the disclosure of its existence or some or all of its contents by any person." "This is crazy." "The minister may require any person to provide to the minister or any person designated by the minister, meaning she's able to designate whoever the heck she wants, within any time and any subject to any conditions that the minister may specify." "Any information that the minister believes on reasonable grounds is relevant for the purpose of making, amending, or revoking an order under section 15." "This is insane." "This is a minister that will have the sole power to kick you off the Internet at their will, then ban you or anyone else from being able to speak on this." "If the conservatives did this, there would be an uproar all over the media, all over the world." "They would call them a dictatorship. They would call them communist. They would say this is Nazi like." "But the liberals are doing this, and now everyone's quiet." "Come people have to speak up." "I promise you, if this bill goes through, it's gonna be ugly for everyone." "And if I get kicked off, I'm going to break that ban." "I will talk about it. I will let the world know that a totalitarian state, a communist state of the Liberal Party is trying to silence its people at its discretion, not the police, but the government." "Ridiculous."

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 outlines concerns about Bill C-22, the Lawful Access Act of 2026, asserting that if it becomes law, the Government of Canada will be able to secretly order Apple to build in a capability into its infrastructure to allow Canadian law enforcement and national security authorities to track every iPhone, iPad, Apple Watch, AirPod, and AirTag in real time. This capability would enable authorities to require Apple to confirm whether it provides any services to a user, and to obtain device identifiers for all devices used with those services. The process could involve going to a justice of the peace and obtaining an order without any requirement that a crime has been or will be committed, effectively mandating Apple to hand over moment-by-moment locations for all user devices. The speaker further notes that with that secret order, Apple would be compelled to provide the moment-by-moment locations of all devices associated with a user, based on the digital ID tied to iPhone, iPad, Apple Watch, AirPod, Apple TV, and AirTag. In addition, the order would require Apple to maintain location history for a full year, enabling cops to access that historical data as well. The overarching concern highlighted is whether such expansive powers—secret orders, real-time tracking, access to device identifiers and services, and a year-long location history—are desirable for Canadian police and law enforcement. Speaker 0 interjects with a prompting remark, inviting the audience to consider the implications and framing the discussion as a best attempt to evaluate the issue. The dialogue centers on the potential reach of government surveillance powers under the proposed act, the mechanisms by which these powers could be exercised (secret orders and judiciary involvement), and the practical consequences of requiring a tech company to reveal comprehensive location data and device identifiers without demonstrating a crime or imminent wrongdoing. The core issue presented is whether granting law enforcement such pervasive, real-time, and historical access to users’ device data aligns with acceptable governance and privacy standards in Canada.

Video Saved From X

reSee.it Video Transcript AI Summary
To check if you're being tracked, dial *#62# on your phone. If you see any call forwarding options, you're being tracked. To disable this, dial ##002# on your phone. This erases all call forwardings. Like, share, and follow for more content like this. Translation: To check if you are being tracked, dial *#62# on your phone. If you see any call forwarding options, you are being tracked. To disable this, dial ##002# on your phone. This will erase all call forwardings. Like, share, and follow for more content like this.

Video Saved From X

reSee.it Video Transcript AI Summary
We flag problematic posts on Facebook in the surgeon general's office.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues Canada introduced a bill allowing the minister to 'kick any Canadian citizen off the Internet to cut off their phone line, to turn off their phone.' 'If there is reasonable grounds to believe that it is necessary to do so to secure the Canadian telecommunication system against any threat, the minister may prohibit a telecommunication service provider from providing any service to the specified person.' He warns 15.2 clause five makes the decision 'secret.' He says this signals 'Chinese Communist Party levels of government overreach.' He links the bill to the digital ID agenda and World Economic Forum's claim that digital identity is crucial for 'civic participation' and to UN 'Real ID' plans, noting Rand Paul tweets. He argues it could isolate people from paying bills, banking, or organizing politics, describing a potential 'digital gulag.' He advocates repeal in the US and hopes Canada defeats the agenda.

Video Saved From X

reSee.it Video Transcript AI Summary
Signal, a company, may be asked by the regulator Ofcom about the data they gather. Signal claims they don't collect data on people's messages. However, the concern is that the bill doesn't specify this and instead gives Ofcom the power to demand spyware downloads to check messages against a permissible database. This sets a precedent for authoritarian regimes and goes against the principles of a liberal democracy. It is seen as unprecedented and a negative shift in surveillance practices.

Video Saved From X

reSee.it Video Transcript AI Summary
Counselor Lisa Robinson argues that Bill C8 and Bill C9 are not protective measures but power grabs in disguise, aimed at expanding government control at the expense of Canadians’ freedoms. She claims Bill C8, titled the Cybersecurity Act, would allow the government to seize control of telecom networks, issue secret orders, and cut off access without notifying individuals. Under C8, the government could tell internet providers what to block, remove, or silence, justified by cybersecurity and national security, effectively giving the government power to “pull the plug on your voice.” Regarding Bill C9, she describes it as the hate propaganda and hate crime bill, asserting it would let the government decide what symbols are hateful and what speech is intimidating, with prosecutors able to pursue cases for “the wrong things.” She emphasizes that C9 removes the attorney general’s oversight, meaning prosecutors could pursue hate speech actions without a second opinion or accountability. She frames this as ideology with a badge and warns it would target speech rather than stop hate, undermining free expression. She stresses that combined, C8 and C9 erode digital independence and freedom of speech, enabling the government to determine what you may say and how you say it, and to shut you down if you dissent. She warns that such power could be abused over time and that history shows powers granted in this way tend to be used against ordinary people. She opposes the idea that protecting democracy requires censoring speech, arguing instead that democracy is defended by defending the right to offend, to question, and to challenge power. Her call to action is direct: contact MPs, flood inboxes, call offices, and tell them to vote no on C8 and C9. She warns that passing these bills would not only reduce privacy but strip the freedom to discuss them, turning Canada toward a “digital dictatorship run by bureaucrats and hate speech committees.” She concludes by urging Canadians to wake up, defend freedom now, and reject C8 and C9, presenting herself as the People’s Counselor who will “never whisper the truth to protect a lie.” She ends with a plea to follow, subscribe, and share the message, and a final exhortation to stand strong and say no to the bills.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
Cell phones are constantly sending data back to companies, even in the middle of the night. This information is used to create profiles on users and can be sold to other companies. Big tech companies like Facebook and Google are major offenders in this data collection. This poses a threat to privacy and security, as the data can be used for manipulation and control. It is crucial for Congress, state attorney generals, and the public to be educated about this issue and take action to regulate and prevent this invasion of privacy. Visit doctorjonesnaturals.com to support the broadcast and access quality products.

Video Saved From X

reSee.it Video Transcript AI Summary
Do you want T Mobile to track your work performance, financial situation, health, personal preferences, and movements? Do you trust them to share your data with researchers or to personalize ads using your app data? Would you like to help T Mobile improve their products by sharing your data? Many of you likely answered no to these questions. However, T Mobile has automatically enabled these settings on all accounts, and you must manually disable them if you do not wish to participate.

Video Saved From X

reSee.it Video Transcript AI Summary
The UK government could potentially restrict access to Twitter if the platform continues to spread misinformation and pose a danger to citizens. This has been done in other countries with apps like TikTok. Additionally, Twitter could face being banned from the App Store for violating policies, which would greatly impact their business.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters as more than just electricity meters, asserting they function as personal surveillance devices. They claim smart meters sense when devices are turned on or off, measure watt usage (even for small devices like an electric toothbrush), and transmit that data wirelessly through neighbors’ meters to the power company. The data allegedly records electric consumption every minute, stored forever on computers the public cannot access, revealing when someone is home, asleep, on vacation, hosting visitors, using lamps or tools, running a business from home, or bootlegging energy off the grid. The speaker asserts this creates a vivid profile of private living patterns and indicates at-home presence on the night of a murder. The speaker contends this is not electrical metering but personal surveillance—a warrantless search daily. They claim personal life information travels from the meter to the power company, to the government, police, and insurance companies, and to anyone who partners with the power company to access it. The speaker further asserts that even without a direct data-sharing agreement, information can be intercepted via the wireless signal from the meter, because smart meters are radio transmitters. They identify a one-watt radio station licensed by the FCC as the transmitter sending all electrical life details to a data center. Examples are given of authorities in Ohio, Texas, and British Columbia using smart meter data to pinpoint marijuana grow houses, enforce business licenses, and punish private home activities, implying surveillance beyond what residents accept. The claim is made that the power company can sell personal life data to anyone, and that unusual power usage patterns can be used as probable cause to raid a home for growing marijuana or running a computer server without a license. The speaker describes this level of surveillance as “about as big brother as it gets,” with utility workers going door-to-door to install meters. They express a personal opinion that smart meters should be removed from homes, arguing that power companies cannot claim the right to install surveillance devices on residences. They equate smart meters with wiretapping and note wiretapping is illegal in all U.S. states and federal territories. The speaker asserts that allowing a smart meter is tantamount to walking around with a constant webcam on one’s head and accuses the industry of relying on implied consent—the idea that permission is granted if the utility can change the meter, even if residents don’t understand the scope of what’s happening. As a practical step, the speaker advises telling utilities not to change the meter, noting that older meters were billed successfully. They claim to have sent a certified letter denying installation of a smart meter and mention a copy of their letter is available in the video’s description for viewers to adapt. They state post office certified mail is used to obtain a receipt. The speaker concludes that if the meters are installed on every house in America, it would cease to be America.

Video Saved From X

reSee.it Video Transcript AI Summary
The RCMP has expanded surveillance capabilities in the last 5 years, adopting technologies that raise privacy concerns. Covert software infiltrates devices, accessing communications and activating cameras/microphones. Cell site simulators collect data from nearby devices, raising concerns about tracking innocent individuals. The speaker claims the RCMP is unwilling to target organized crime and protects corrupt politicians, and that these actions demonstrate unfairness and injustice towards Canadians. The speaker suggests these surveillance tools encourage self-censorship because the RCMP can infiltrate devices and monitor citizens. Surveillance in totalitarian regimes aims to control populations by creating constant observation, driving obedience.

Video Saved From X

reSee.it Video Transcript AI Summary
We have developed brand safety and content moderation tools after acquisitions. Our new policy, "freedom of speech, not reach," addresses hate speech. Illegal or against the law content results in zero tolerance and removal. However, if something lawful but awful is posted, it gets labeled, de-amplified, and demonetized. This ensures brand safety by avoiding association with such content. It's worth noting that when a post is labeled and cannot be shared, users themselves take it down 30% of the time.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
The UK is attempting to demand that everyone download spyware that checks messages against a database of permissible content, setting a dangerous precedent for authoritarian regimes. Encryption either protects everyone, or it allows access to malicious actors, including governments and hackers. While child abuse is concerning, there are existing law enforcement tools and underfunded child welfare services that should be prioritized. It's important to ask how platforms enforce their terms of service against illegal use, but we are not an enforcement agency. We are a technology platform working to provide private communication. We need to check large tech companies on changing the norms for human communication to be completely surveilled. We're trying to keep the default of privacy that has existed for hundreds of thousands of years.

Video Saved From X

reSee.it Video Transcript AI Summary
The RCMP has expanded surveillance capabilities in the last 5 years, adopting technologies raising privacy concerns. Covert software infiltrates devices, accessing communications and activating cameras/microphones. Cell site simulators collect data from devices, potentially tracking innocent individuals. The speaker suggests the RCMP's actions indicate a willingness to protect corrupt politicians and a tendency towards unfair practices, leading to self-censorship among Canadians. The speaker claims that the RCMP's surveillance capabilities can cause people to curb what they are saying. The speaker equates these surveillance tactics to those used in totalitarian regimes to drive obedience within the population.

Video Saved From X

reSee.it Video Transcript AI Summary
The Communications Security Establishment or CSEC has insisted it targets only foreign communication. But now it's been revealed it's also sweeping up the personal information of thousands of Canadians and storing it for up to thirty years. Canada's conservative government is giving sweeping new powers to this country's spy agency. It's also providing police new tools to track and detain those who would commit terrorist acts. Prime minister Stephen Harper says the new bill tabled today is necessary to protect Canadians. The report frames these changes as a necessary expansion of national security powers. The new measures are presented as essential for protecting citizens within a broadened security framework.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
Hon. member for Kitchener South Kessler criticized Bill C-8, saying: 'fifteen point one and fifteen point two give the minister the unprecedented, incredible power to kick any Canadian citizen off the Internet to cut off their phone line, to turn off their cell phone.' He argued the minister can act on 'any threat' rather than 'extreme threats,' and warned of digital suppression. He cited '15.2 clause five' as enabling a secret decision and warned of a 'digital gulag' with 'no warrant, no trial, no automatic judicial review.' He noted: 'An order made under subsection one or two may include a provision prohibiting the disclosure of its existence or some or all of its contents by any person.' Civil society groups warned that 'Bill c 26 grants the government sweeping new powers ... intrude on the private lives of Canadians' and urged committee fixes. He urged Conservatives to repair the bill.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked cell phones of visitors to Jeffrey Epstein's island, exposing their data online. Near Intelligence, linked to US defense contractors, meticulously monitored visitors' movements over 3 years. The data revealed locations in the US and other countries. Near Intelligence sources data from advertising exchanges, selling it for targeted ads and possibly to the military. This highlights the potential for mass surveillance through ad tech. While smartphone users can be tracked, steps like using trusted apps, disabling location services, and using VPNs can help protect privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
We have developed brand safety and content moderation tools after acquisitions. Our new policy, "freedom of speech, not reach," addresses hate speech. Illegal or against the law content results in zero tolerance. However, if something lawful but awful is posted, it gets labeled, de-amplified, and demonetized. This ensures brand safety. Once a post is labeled and cannot be shared, users often remove it themselves, as seen in 30% of cases.

Video Saved From X

reSee.it Video Transcript AI Summary
Canada will be a police state by Christmas if parliament passes bills c two, c eight, and c nine in their current form. C two is the Strong Borders Act. It should be called the Strong Surveillance Act. It empowers Canada Post to open letter mail without a warrant, it criminalizes the use of cash in amounts greater than 10,000, and it empowers a vast army of government officials, not just police, to conduct warrantless searches of the computers and cell phones of Canadians. It is a massive invasion of privacy. It's extremely dangerous. There have been warnings that the Online Harms Act, which prior to the last election was known as bill c 63, might be reintroduced. If brought back and passed into law, you're gonna see the Canadian Human Rights Commission with massive new powers to prosecute Canadians over offensive noncriminal speech with penalties up to $50,000. You're gonna see a digital safety commission with a vast army of bureaucrats to enforce federal regulations that are passed in respect of of the Internet and Internet contents. And you're gonna see Canadians punished preemptively based because their neighbor fears that they might commit a hate speech crime in future, the Online Harms Act would authorize judges to place Canadians under house arrest, wear an ankle bracelet in respect to curfew, etcetera. Giving the federal government giving federal cabinet ministers power to kick Canadians off the Internet is not necessary for protecting public safety or defending our national security. Our freedoms are fragile. It's imperative that every Canadian contact their member of parliament, whether your MP is liberal, conservative, NDP, block, or green, does not matter. Contact your member of parliament and tell him or her to vote against bills c two, c eight, c nine, and tell them to not bring back the online harms act.
View Full Interactive Feed