reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers affiliated with China's People's Liberation Army have infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Chinese cyber army's objective is to compromise critical infrastructure, either to hinder US power projection in Asia or to cause societal chaos. The report highlights the alarming possibility of a comprehensive cyberattack that could bring essential services to a halt. This threat surpasses the impact of the COVID-19 crisis and poses a significant concern for transportation, hospitals, and society as a whole.

Video Saved From X

reSee.it Video Transcript AI Summary
Virginia has stopped using touchscreen computer voting due to vulnerability, and it's important to assess all voting machines for security. Researchers have shown that voting systems can be tampered with, even by hackers with limited resources. In 2018, electronic voting machines in Georgia and Texas deleted or switched votes. The biggest seller of voting machines violates cybersecurity principles by installing remote access software. These machines are easily hackable, and three companies control most of them. Many states have outdated and vulnerable machines. Over 40% of American voters use machines with serious security flaws. Aging systems rely on unsupported software and are susceptible to cyber attacks. The risk of foreign interference in elections is high. It is crucial to upgrade election systems and ensure integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The Washington Post reveals that China's cyber army has targeted various sectors, including Texas's power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency warns that these attempts are part of China's strategy to disrupt or destroy critical infrastructure in the event of a conflict, either to hinder US power projection in Asia or to create societal chaos. Over the past year, hackers affiliated with the People's Liberation Army have breached the computer systems of around 24 critical entities.

Video Saved From X

reSee.it Video Transcript AI Summary
Jen Easterly, director of the US Cybersecurity and Infrastructure Security Agency, asserts that foreign adversaries cannot change US election results. While it's difficult to claim anything is impossible, the built-in checks and balances make it highly unlikely. The resilience of the voting system, including oversight from both parties and the use of paper ballots for audits, enhances integrity. Despite concerns about misinformation, the US election infrastructure is robust and secure. Voting machines are not connected to the Internet, and state and local officials continuously work to improve security. The dedication of these officials ensures that the election process remains fair, accurate, and trustworthy, deserving our gratitude for their ongoing efforts.

Video Saved From X

reSee.it Video Transcript AI Summary
The FBI alerted our team about the possibility of a Russian propaganda dump similar to what happened in the 2016 election. They advised us to be on high alert.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's military have breached critical US services, aiming to disrupt systems like the Texas power grid. Targets include a Hawaii water utility, a West Coast port, and an oil pipeline. The goal is to weaken US power projection in Asia or create chaos to influence decision-making during a crisis. The People's Liberation Army has infiltrated around 24 computer systems in the past year.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
A large-scale cybersecurity exercise is scheduled for November 5th, coinciding with election day, as part of the 2024 Homeland Security Critical Infrastructure Conference in Atlanta on November 6-7. This information is sourced directly from the Homeland Security website, indicating that the exercise is officially planned and may have been intended to remain discreet.

Video Saved From X

reSee.it Video Transcript AI Summary
Virginia stopped using touchscreen voting machines due to vulnerabilities. Voting machines across the US are at risk of being hacked. In Georgia and Texas, votes were deleted or switched in 2018. The biggest voting machine seller violated cybersecurity practices. Many states have outdated, vulnerable machines. Hackers can easily breach voting machines, potentially altering election results. The lack of paper trails in some states raises concerns about election legitimacy. Aging systems rely on unsupported software, making them susceptible to cyber attacks. The vulnerability of voting machines poses a threat to the integrity of elections. Stalin emphasized the importance of who counts votes. It is crucial to secure the future of elections and upgrade outdated systems to prevent interference.

Video Saved From X

reSee.it Video Transcript AI Summary
We are in an undeclared war, according to insiders. They claim the US is vulnerable to attacks due to arrogance and ignorance. The current situation is dire, with critical infrastructure being targeted. People need to be aware and not trust those downplaying the severity of the situation. The appointment of a terrorism expert to lead the FBI in Baltimore is seen as suspicious. This crisis is not a coincidence but a deliberate attack on America's stability.

Video Saved From X

reSee.it Video Transcript AI Summary
A vulnerability in Dominion Voting Systems was highlighted in a federal court case, raising concerns about election security. Experts found potential vulnerabilities in Georgia's Dominion system, with claims of critical vulnerabilities to hacking. The alleged vulnerability involves an encryption key being easily accessible, allowing total control over an election. A cybersecurity expert recreated the process, showing how election files could be decrypted. Despite the seriousness of the issue, Georgia officials deemed upgrading the system unrealistic until after the 2024 elections. The need for addressing vulnerabilities in election systems is emphasized for ensuring secure elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Alex Jones warns of potential cyber attacks leading up to the election, with implications for voter registration systems. He also discusses escalating tensions with Iran, Ukraine, and China, along with concerns about a new pandemic and potential assassination attempts on Trump. Jones urges viewers to share the information and emphasizes the importance of staying informed and taking action. Visit Infowars.com for more information.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
Insufficient attention is given to the potential of a major cyberattack that could cripple our power supply, transportation, and hospital services, bringing our society to a complete halt. Such an attack would make the COVID-19 crisis seem minor in comparison.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that Chinese and Iranian cyber attacks on Butler County occur multiple times daily, aiming to disrupt systems. To prepare, rifles are in police vehicles, civilians are being trained by Texas A&M for disasters. The speaker stresses the need for public awareness and defense against ongoing attacks on critical infrastructure.

Video Saved From X

reSee.it Video Transcript AI Summary
China has safe houses in every state in the United States, and there are people in the country who want to do harm. The president and vice president refuse to meet with sheriffs and police chiefs to discuss border issues and crime. The FBI director says there are more red flags now than before 9/11, indicating people who want to harm the US. The US is on the defense and needs an offense. The Russians and Iranians are attacking the computer systems in Butler County, Ohio, multiple times a day. The county is preparing civilians for emergencies and training them on what to do. The US is under attack and needs to be aware of the threats.

Video Saved From X

reSee.it Video Transcript AI Summary
Just returned from a national sheriff's training in DC. The President and FBI Director refuse to meet with sheriffs to discuss border issues and crime. FBI Director warns of increased threats from individuals in the country. Sheriffs visited Israel and learned the importance of local police in protecting communities. The US is vulnerable to attacks and needs to strengthen defenses. Federal government warns of potential cyber attacks on elections, urging local officials to prepare.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
China's cyber army has been infiltrating critical US services as part of a broader effort to create chaos in logistical systems. The information obtained could be weaponized in the event of a conflict between the US and China in the Pacific. The Washington Post reports that targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency confirms that China is attempting to compromise critical infrastructure to disrupt or destroy it during a conflict. Hackers affiliated with China's People's Liberation Army have accessed the computer systems of around 24 critical entities in the past year.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity challenges are increasing. Three concerns for the future: 1) Expect nation states to target critical infrastructure like the recent attack on the Ukrainian power grid. 2) Data manipulation could lead to confusion and distrust in society. 3) Non-state actors may shift from using cyber tools for recruitment to destructive purposes, disrupting the status quo.

Video Saved From X

reSee.it Video Transcript AI Summary
To hack a US presidential election, the speaker suggests a four-step plan. First, use pre-election polls to identify closely contested states. Second, target large counties or their service providers and compromise their election management system computers. Third, infect individual voting machines using the compromised system. This can be done easily by purchasing a government surplus machine on Ebay. Finally, manipulate the votes on the computer, knowing that most states discard the paper ballots without checking them.

Video Saved From X

reSee.it Video Transcript AI Summary
America's election infrastructure is more secure than ever, thanks to extensive work by state and local officials. Voters can trust that their votes will be counted accurately. Voting machines are not connected to the Internet, 97% of ballots are paper, and there are multiple safeguards in place, including cybersecurity measures and audits. However, foreign adversaries like Russia and China are spreading disinformation to undermine confidence in the system. As the election approaches, it's crucial for Americans to recognize the potential for increased disinformation. To navigate this, they should rely on information from trusted sources, specifically state and local election officials, who are the experts on election matters.

Video Saved From X

reSee.it Video Transcript AI Summary
FBI Director Christopher Wray issues a stark warning about the threat posed by China, specifically Chinese hackers targeting critical infrastructure and engaging in economic theft. He emphasizes the need for vigilance and investment in cybersecurity capabilities to counter China's vast hacking program. Wray highlights recent operations against Chinese state-sponsored hacking groups and urges collaboration with partners to defend against ongoing cyber threats.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the recent collapse of a bridge in Baltimore, emphasizing that it was a cyber attack on critical infrastructure. They explain that the attack targeted load-bearing pylons on the bridge, causing a significant portion to collapse. The speaker highlights the importance of the I-94 corridor and the impact the attack will have on the transportation of hazardous materials. They argue that this attack is part of a larger pattern of dismantling American defenses and call for people to be aware of the situation. The speaker concludes by stating that the upcoming election is crucial and that Donald Trump is seen as a life raft.
View Full Interactive Feed