reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Israel uses a system called Lavender to decide who to kill, assigning scores to Palestinians and drone striking those above a certain threshold. Palantir creates these "murder lists" by scraping data from Facebook, satellite imagery, and other surveillance sources, compiling personal information to assign weighted scores and identify targets. Palantir, founded by individuals with ties to the Israeli government and the CIA, built this surveillance platform in Israel to target Palestinians. Palantir also maintains an "enemies list" of 1 to 2 million US citizens for the CIA and federal law enforcement, classifying them as potential political dissidents. This database uses surveillance and AI to identify Americans deemed threats to the government, including those with anti-government views or potential involvement in domestic extremism.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Vault 7 is the biggest intelligence leak ever, with less than 1% of the material published so far. It reveals that the CIA has created its own version of the NSA focused on hacking. They develop viruses and trojans to infiltrate people's devices and collect information for the CIA. This information can be used to falsely implicate someone in a crime. The CIA's budget has increased, giving them more power, and they now have their own drone fleet and hacker squad. Unlike the NSA, the CIA targets endpoints instead of intermediaries, bypassing encryption. If a phone is hacked, encryption becomes irrelevant as the information is gathered before or after encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1 outlines concerns about Bill C-22, the Lawful Access Act of 2026, asserting that if it becomes law, the Government of Canada will be able to secretly order Apple to build in a capability into its infrastructure to allow Canadian law enforcement and national security authorities to track every iPhone, iPad, Apple Watch, AirPod, and AirTag in real time. This capability would enable authorities to require Apple to confirm whether it provides any services to a user, and to obtain device identifiers for all devices used with those services. The process could involve going to a justice of the peace and obtaining an order without any requirement that a crime has been or will be committed, effectively mandating Apple to hand over moment-by-moment locations for all user devices. The speaker further notes that with that secret order, Apple would be compelled to provide the moment-by-moment locations of all devices associated with a user, based on the digital ID tied to iPhone, iPad, Apple Watch, AirPod, Apple TV, and AirTag. In addition, the order would require Apple to maintain location history for a full year, enabling cops to access that historical data as well. The overarching concern highlighted is whether such expansive powers—secret orders, real-time tracking, access to device identifiers and services, and a year-long location history—are desirable for Canadian police and law enforcement. Speaker 0 interjects with a prompting remark, inviting the audience to consider the implications and framing the discussion as a best attempt to evaluate the issue. The dialogue centers on the potential reach of government surveillance powers under the proposed act, the mechanisms by which these powers could be exercised (secret orders and judiciary involvement), and the practical consequences of requiring a tech company to reveal comprehensive location data and device identifiers without demonstrating a crime or imminent wrongdoing. The core issue presented is whether granting law enforcement such pervasive, real-time, and historical access to users’ device data aligns with acceptable governance and privacy standards in Canada.

Video Saved From X

reSee.it Video Transcript AI Summary
A founder's group at Peking University developed source code for typing Chinese characters, which was seized by the Chinese intelligence bureau. They inserted a backdoor into apps that allow Chinese typing, potentially compromising them for surveillance by the Chinese Communist Party and military. WeChat is just one of many apps that could be used for this purpose. While not everyone will be targeted, the CCP has the resources to monitor US cell phones, especially if they believe someone can be of assistance to them.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
ICE is using fake cell towers to turn your phone into a tracking device. It's a technology called Stingray. They put it in a vehicle and drive through a neighborhood broadcasting a signal stronger than a real cell tower. Your phone automatically connects to the strongest signal, so it connects to the fake one, and you never know what happened. Once you're connected, they can pinpoint your exact location in real time. Here's the most terrifying part: the Stingray doesn't just connect to the target's phone. It forces every phone in the area to connect to it. Your phone, your neighbor's phone, anyone just walking down the street, it scoops up data from hundreds of people to find one person. This isn't a theory. Forbes just uncovered a warrant showing ICE used one to track a person across a 30 block area in Utah, and they've spent millions on these cell site simulator vehicles. Your phone is constantly looking for a signal. You just have to hope it's a real one. ICE

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels possess Pegasus spyware, developed by the Israeli firm NSO Group, which can infiltrate phones without requiring users to click any links. This "no-click malware" can access data before encryption, including calls, texts, emails, location, and social media. It can also activate the phone's camera and microphone for surveillance and take screenshots, all while conserving battery life to remain undetected. NSO requires approval from the Israeli Ministry of Defense for each sale. Mexico has had this software since at least 2016. Initially, NSO claimed it helped capture El Chapo, but it was also used against journalists and those opposing government corruption. Cartels are now allegedly teaming up, armed with military-grade weapons and narco drones, viewing the U.S. government as a common enemy. They could use Pegasus for blackmail or to plant evidence on phones. Striking cartels inside Mexico is complicated because the cartels have infiltrated the Mexican government, and military officials admit uncertainty about winning the war on drugs.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker received two messages from Apple stating their iPhone was targeted by a mercenary spyware attack. Initially skeptical, the speaker confirmed the messages' authenticity. Apple's message indicated the attack was likely due to the speaker's identity and activities, emphasizing the rarity and sophistication of such attacks, citing Pegasus as an example, and describing them as some of the most advanced digital threats. While uncertain if spyware was installed or who is responsible, the speaker believes the attack is an attempt at intimidation and silencing, possibly by a government, organization, or secret service. The speaker asserts they will not be intimidated or silenced.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that 99% of phones worldwide are being tracked by governments through push notifications. The US government allegedly has a gag order on the two largest phone companies to keep this information hidden. Senator Ron Wyden states that foreign governments have reached out to Google and Apple for push notification data. These notifications, which appear on the screen, are sent from the app to a cloud server and then to the phone. The governments are requesting this data from Google and Apple, potentially including text information, metadata, and location details. The speaker suggests that the lack of coverage on this issue may be due to the influence of advertising and algorithms controlled by Apple and Google.

Video Saved From X

reSee.it Video Transcript AI Summary
Hakim Anwar, CEO and founder of Above Phone, joins Clayton to discuss pervasive surveillance and how to protect personal privacy in 2025–2026. The conversation covers why traditional devices and services—especially iPhones, Samsung/Android phones, and their app ecosystems—are highly surveilled, the role of Amazon Web Services in monitoring traffic, and how messaging apps on these devices are tracked. They frame the problem as a loss of personal privacy and a move toward centralized infrastructure that can be controlled or cut off by large tech platforms. Hakim explains the origin of Above Phone. He started as a software engineer, was already aware of surveillance concerns, and became involved in freedom-based social networks. He pivoted toward open-source technology (Linux, degoogled phones, open-source software) and, five years ago, helped establish Above Phone to create usable privacy-centric devices that are actually functional for daily life. The goal is to be more usable and more private than big tech. The product philosophy emphasizes usable privacy. Above Phone builds on open-source operating systems like GrapheneOS, modeling them off Android but severing ties with Google and other big tech. Hakim notes that typical Samsung/Google Android devices have “god mode” access by Google (and to some extent Samsung), and emphasizes that Above Phone devices are designed to have zero connections to big tech by default, while still enabling users to run necessary apps. Users can choose to install Google services if needed, but in a limited, privacy-conscious way—these services act like normal apps on the device rather than the centralized, all-encompassing control found on stock devices. The phones can be used with existing cell service, and data transfer from iPhone or Android is supported, with live, in-person setup assistance. Setup and operation details: - You can switch to the Above Phone by moving your number with the SIM card (five-minute process), or use the Above Phone in parallel while migrating. - The Above Phone supports both physical SIMs and eSIMs; the data SIM service is eSIM-based. - A private, in-person support team helps with data transfer and setup. - The device can run a sandboxed second profile for Google services, isolating them from personal data. This sandbox can hold essential apps (e.g., WhatsApp) while the primary profile remains private. If needed, Google services can be used in a fully isolated manner, or work apps can be run entirely without Google involvement. Open-source equivalents are provided for many common apps (navigation, messaging, etc.). Privacy mechanics and surveillance: - Hakim explains that big tech devices continually “phone home,” with independent studies showing frequent data transmission to Google and Apple. Enhanced visual search on iPhone, enabled by default, scans photos for landmarks and can link to private indexes, illustrating how centralized platforms can harvest data even without explicit user consent. - Above Phone disconnects from Google’s update stream and ships with zero Google services by default; updates come from open-source developers, not from Google/Apple. Users can still opt to install Google services, but these are constrained and do not have the same “god mode” permissions as on stock devices. - The device supports a private, end-to-end encrypted messaging protocol based on XMPP (Jabber), which is decentralized and can run on a self-hosted or community-driven network. WhatsApp, he notes, is still built on XMPP. The Above Book Linux laptop is highlighted as a privacy-oriented alternative to mainstream Windows/Mac ecosystems. Linux is presented as cooperative, transparent, and less profit-driven. The Above Book ships with an easy-to-use Linux variant designed to avoid terminal use, includes a privacy-focused web browser (Ungoogled Chromium), and offers open-source software replacements (office apps, photo editing, etc.) that store data locally. The laptop supports local AI with Mike Adams’ Brighteon AI integration via LM Studio, enabling private, offline AI capabilities on the device. The company positions Linux and Above Book as enabling local work, with offline AI and offline maps via OpenStreetMap-like tooling. Hakim closes with a forward-looking stance on digital ID and the “surveillance grid” being advanced through regulatory acts into 2027–2030. He frames the investment in Above Phone and Above Book as a preparation for a world where privacy must be actively preserved, and encourages viewers to explore abovephone.com/redacted and abovephone.com for more information and products. David and Clayton engage on skepticism, marketing, and the broader implications of privacy-centric technologies, reinforcing the idea that the goal is practical privacy and education rather than ideology.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels possess Pegasus spyware, developed by the Israeli firm NSO Group, which can infiltrate phones without requiring users to click any links. This "no-click malware" can access calls, texts, emails, GPS data, and even activate a phone's camera and microphone for surveillance. NSO Group requires approval from the Israeli Ministry of Defense for each sale of Pegasus. The software was sold to Mexico as early as 2016, and was used to target journalists and those opposing cartels. Cartels are now allegedly teaming up, using military-grade weapons and narco drones, and the US government may be considered a common enemy. The cartels could potentially use Pegasus to blackmail individuals by planting evidence on their phones. Military officials are unsure how to win the war on drugs.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker, Near Intelligence, with ties to US Defense Contractors, tracked cell phones of visitors to Jeffrey Epstein's island over a three-year period. We found that Near Intelligence left this data exposed online. The maps generated show visitors' movements, potentially leading back to their homes and workplaces. The data reveals visitors came from over 166 locations in the US and abroad. Near Intelligence sources data from advertising exchanges. Before a targeted ad appears, your phone sends data, including location, to ad exchanges. Near Intelligence siphons this data, repackages, analyzes, and sells it. Despite its intended use for advertising, Near Intelligence has provided this data to the US military. Anyone with a phone can be tracked. To protect your privacy, use trusted apps, turn off location services, use ad blockers, and use VPNs that filter out advertising technology.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
A data broker tracked cell phones of visitors to Jeffrey Epstein's island, exposing their data online. Near Intelligence, linked to US defense contractors, meticulously monitored visitors' movements over 3 years. The data revealed locations in the US and other countries. Near Intelligence sources data from advertising exchanges, selling it for targeted ads and possibly to the military. This highlights the potential for mass surveillance through ad tech. While smartphone users can be tracked, steps like using trusted apps, disabling location services, and using VPNs can help protect privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
"preparations are underway for a coordinated cyber and communications assault, one that could cripple America's power grid, banking systems, and digital lifelines overnight." "The question isn't if it happens, it's who is orchestrating it?" "The Israeli controlled media point the finger at China, the digital fingerprints lead somewhere far closer to home, Israel's global cyber network." "Before we dive in, did you know that Israel has quietly bought up most of the world's popular VPNs?" "And they've recruited spooks to run these companies." "Last week, the secret surface quietly uncovered a plot in New York to unleash a major cyberattack and cripples America's communications and power grid." "One Tel Aviv based company with a long history of distributing malware has quietly bought up nearly all the biggest VPNs on the planet."

Video Saved From X

reSee.it Video Transcript AI Summary
The British security agencies use phone and cloud hacking services provided by the Israeli tech company, Celebreit. The company is led by Dana Goethe, an alumni of Unit 8200 in the Israeli military, known for surveillance and blackmailing Palestinians. Celebreit is staffed with former Israeli military and intelligence personnel. The concerning part is that Celebreit claims to remotely control all its devices, suggesting they have access to information obtained by the British security services.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.
View Full Interactive Feed