reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, we can ensure the integrity of the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers affiliated with China's People's Liberation Army have infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Chinese cyber army's objective is to compromise critical infrastructure, either to hinder US power projection in Asia or to cause societal chaos. The report highlights the alarming possibility of a comprehensive cyberattack that could bring essential services to a halt. This threat surpasses the impact of the COVID-19 crisis and poses a significant concern for transportation, hospitals, and society as a whole.

Video Saved From X

reSee.it Video Transcript AI Summary
America is facing serious challenges, including threats from enemies and the risk of nuclear annihilation. The speaker believes that America's weakness has allowed global elitists to corrupt the government and harm its citizens. They mention issues like violent crime, inflation, and a declining economy, blaming Joe Biden for these problems. However, the speaker also believes that one man and one movement can turn things around. They advocate for putting the middle class first, standing up to globalists and corrupt individuals, and restoring American pride and the American dream. The goal is to make America great again.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker, a computer science professor, warns that the electronic voting systems used in the US are vulnerable to sabotage and cyber attacks that can change votes. Through their research, they have repeatedly hacked voting machines and found ways for attackers to manipulate them. They emphasize that these vulnerabilities are within reach for America's enemies. While some states have secure voting technology, others are alarmingly vulnerable, putting the entire nation at risk. The speaker debunks the belief that voting machines are secure because they are not connected to the internet, explaining that many machines have wireless modems for faster result uploading. They conclude that it is only a matter of time before these vulnerabilities are exploited.

Video Saved From X

reSee.it Video Transcript AI Summary
There are increasing cyberattacks on critical infrastructure, including police stations, ahead of the 2024 election. The FBI warns of red flags similar to pre-9/11. Foreign threats from Iran, China, and Russia aim to disrupt the election. The Biden administration advises local sheriffs to prepare for cyberattacks on election centers. The FBI director emphasizes the need for defense and offense against threats. Local election officials are urged to be ready for cyber attacks. Previous attacks on Butler County's electronic systems by Russia caused chaos. Military assistance may not be available during an attack.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker discusses the recent cyber attack on a critical infrastructure corridor in the United States. They explain that the attack targeted a bridge on the I-95 corridor, which connects the north and south of the country. The speaker emphasizes that this attack is not just about a river in Baltimore, but rather a strategic and well-planned attack on a vital supply chain. They highlight the impact of shutting down the bridge, including the disruption of the I-95 cargo and shipping corridor. The speaker also suggests that the attack is part of an undeclared war and criticizes the government's response. They urge people to be aware of the catastrophic consequences and not to dismiss the attack.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the vulnerability of a digital society and the potential consequences of an EMP attack. They highlight the loss of communication, transportation, and essential services that would occur. They also mention the potential chaos and lack of preparedness among the population. The conversation touches on the possibility of war with Iran and the idea that unplugging the country could cause more damage than a missile attack. They emphasize the lack of readiness and unity within the country, suggesting that people may not come together to help each other in such a crisis.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, it becomes more difficult for entities like Russia to interfere with the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
We are in an undeclared war, according to insiders. They claim the US is vulnerable to attacks due to arrogance and ignorance. The current situation is dire, with critical infrastructure being targeted. People need to be aware and not trust those downplaying the severity of the situation. The appointment of a terrorism expert to lead the FBI in Baltimore is seen as suspicious. This crisis is not a coincidence but a deliberate attack on America's stability.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses the vulnerabilities in election systems and the potential for manipulation by hackers. It mentions that voting machines, campaign networks, and registration databases are all at risk. The speaker explains that attackers can cause mischief without physically accessing the machines, such as by messing up voter files. It is noted that Russia was able to influence the election by breaching DNC computers and targeting election-related systems in multiple states. The speaker emphasizes that manipulating vote counts on every machine in America would be difficult, but flipping a few senate seats could still impact the US Congress. The video concludes by suggesting that nation states and criminals likely have knowledge of these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes it should be terrifying to all Americans that Trump had classified information for Americans and the codes, and was able to share it in his resort with anyone. The speaker states Trump needs to be stopped.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
Insufficient attention is given to the potential of a major cyberattack that could cripple our power supply, transportation, and hospital services, bringing our society to a complete halt. Such an attack would make the COVID-19 crisis seem minor in comparison.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that Chinese and Iranian cyber attacks on Butler County occur multiple times daily, aiming to disrupt systems. To prepare, rifles are in police vehicles, civilians are being trained by Texas A&M for disasters. The speaker stresses the need for public awareness and defense against ongoing attacks on critical infrastructure.

Video Saved From X

reSee.it Video Transcript AI Summary
Steve is questioned about downplaying a cyber attack on the I-94 corridor in Baltimore. The attack, affecting critical infrastructure, disrupts the supply chain for hazardous materials like fuels and chemicals. This strategic attack impacts the economy for 4 to 5 years.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack on a critical infrastructure corridor in Baltimore has caused the collapse of a bridge, shutting down the I-95 cargo and sea shipping corridor. The attack targeted load-bearing pylons on the bridge, resulting in catastrophic structural damage. The shutdown of the corridor will impact the transportation of hazardous materials, leading to increased prices and decreased access to food and critical infrastructure. Experts believe this is a well-planned attack by state or non-state actors, and it highlights the vulnerability of American infrastructure. The speaker emphasizes the need for people to understand the severity of the situation and not dismiss it as inconsequential. The attack is seen as part of a larger pattern of dismantling American defenses and preventing Donald Trump from returning to power.

Video Saved From X

reSee.it Video Transcript AI Summary
The CCP launched a terrorist attack on Baltimore's bridge using remote towing technology, impacting US traffic. They can target any vehicle with a signal receiver. US officials may have known but didn't report it. No official confirmation yet.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a scenario where banks go offline, digital money disappears, and electromagnetic pulse bombs are used to attack major grids. They mention the possibility of a terrorist attack, Russian involvement, or a simulated alien invasion. The speaker believes it's important to talk about these potential threats, despite being labeled fearmongering. They argue that not discussing these possibilities would be irresponsible.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the possibility of a cyber pandemic and references the World Economic Forum's prediction about it. They mention the Forum's previous accurate prediction of the coronavirus pandemic and suggest that it may be worth paying attention to their future predictions. The speaker explains that the cyber pandemic would involve a bug sweeping through the Internet, similar to a computer virus, and the potential need to shut down the Internet and power grid to prevent its spread.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack on a critical infrastructure corridor in Baltimore has caused a bridge to collapse, shutting down the I-95 cargo route and the shipping corridor. The attack targeted load-bearing pylons on the bridge, causing significant structural damage. The speaker emphasizes that this is not just a river but a crucial supply chain for the United States, carrying hazardous materials and fuel. The attack is believed to be a state-sponsored cyber attack, rerouting a ship in the middle of the night. The speaker warns that this is part of a larger pattern of America's defenses being systematically dismantled, and urges people to recognize the gravity of the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 begins by noting a new escalation in the war: after the president's Easter-weekend speech, the United States struck a massive bridge in Tehran, described as part of Tehran’s pride because it would cut about an hour from Iranians’ commutes. Trump posts, “the biggest bridge in Iran comes tumbling down, never to be used again,” and says, “Make a deal before it’s too late.” He warns that nothing is left of what could still become a great country. Speaker 1 responds with skepticism about the administration, mocking the idea of “the Nord Stream pipeline” being blown up as a lie by the prior administration. Speaker 0 notes that Trump boasted about the bridge strike on Truth Social and questions the strategic value of targeting civilian infrastructure, comparing it to striking the Golden Gate Bridge and asking whether that would be labeled a war crime. Iranian retaliation follows: a strike at the center of Tehran (clarified as Tel Aviv in error in the transcript) with a ballistic missile, causing a neighborhood to burn, as shown on Fox News and circulating on social media. Reports also emerge that an Amazon data center was struck in Bahrain, Oracle in the UAE, and that Iran had claimed it would strike Microsoft, Google, Amazon and other large American companies. The United States is not protecting them. Speaker 2 engages Colonel Daniel Davis, host of The Deep Dive with Dan Davis, to assess the latest moves alongside the president’s speech. Speaker 2 argues that the president’s remarks about “bomb you back into the stone age” indicate punishing the civilian population, not just military targets, which could unite Iranians against the United States and Israel. The bridge strike appears to align with that stance, making a regional outcome that contradicts any stated aims. He calls it nearly a war crime, since civilian infrastructure has no military utility in this context. He suggests the action undermines any potential peace path and could prompt stronger resistance within Iran. He warns that, politically, Trump could face war-crimes scrutiny, especially under a Democratic-controlled House, and that it damages the United States’ reputation by appearing to disregard the rule of law and morality. Speaker 1 asks whether such tactics are ever effective, noting a lack of evidence that inflicting civilian suffering yields political concession. Speaker 0 and Speaker 2 reference historical examples (Nazis, British during the Battle of Britain, Hiroshima-era considerations) to suggest such tactics have not succeeded in breaking civilian resolve, arguing this approach would harden Iranian resistance. Speaker 2 cites broader historical or regional patterns: torture or collective punishment has failed against Germans, Japanese, Palestinians in Gaza, Hezbollah in Lebanon, and Iran in the Iran-Iraq War. He contends the appeal of using such power is seductive but dangerous, likening it to “war porn.” He notes that the number of Iranian fatalities floated by Trump has fluctuated (3,000, 10,000, 30,000, then 45,000), describing them as not credible, yet the administration seems unconcerned with accuracy. Speaker 3 adds that the rhetoric justifies escalating violence with humanitarian consequences, including potential energy-system disruption. Speaker 0 asks about the discrepancy between Trump’s claim of decimating Iran and subsequent attacks on multiple targets in the Gulf and the firepower Iran still holds, including underground facilities and missile capabilities. Speaker 2 explains that Iran can absorb punishment and still strike back, suggesting that the Strait of Hormuz cannot be opened by force and that escalation could involve considerations of a larger false-flag scenario. He mentions a warning about a potential nine-eleven-level attack and potential media complicity, implying fears of a false-flag operation blamed on Iran. Speaker 0 notes the possibility of Israeli involvement undermining negotiations and cites JD Vance’s planned meeting with Iranian Foreign Minister Kamal Kharazi, noting Kharazi’s injury and his wife’s death, implying an assassination attempt. Speaker 2 critiques U.S. reliance on allies, arguing that Israel’s actions threaten U.S. interests and that the White House should constrain Israel. He asserts there is no military solution to the conflict, warns of long-term costs to the United States and its European and Asian relations, and predicts economic consequences if the conflict continues. Speaker 1 remarks that Iranian leaders’ letter to the American people shows civilian intent not to surrender, while Speaker 0 and Speaker 2 emphasize the risk of ongoing conflict, with Colonel Davis concluding that there is no feasible open-strand resolution. The discussion ends with thanks to Colonel Davis for his analysis.

Video Saved From X

reSee.it Video Transcript AI Summary
Foreign adversaries are using direct energy weapons on US citizens, known as Savannah Syndrome. A classified briefing revealed the severity of the situation, leaving the speaker, a former Navy SEAL, shaken. The speaker emphasizes the importance of the upcoming election due to leadership failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the topic of cyber warfare and highlights various incidents involving Iranian and Russian hackers. They mention a book written by Nicole Pearl Ross, a former New York Times reporter on cybercrime, which provides insights into the history and vulnerabilities of cyber warfare. The speaker emphasizes the potential consequences of cyber attacks on critical infrastructure, such as power grids, dams, and nuclear plants. They argue that the US is particularly vulnerable to such attacks and suggests that cyber warfare will play a significant role in future conflicts. The speaker encourages viewers to read the book for a deeper understanding of the subject.
View Full Interactive Feed