TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, we can ensure the integrity of the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers affiliated with China's People's Liberation Army have infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Chinese cyber army's objective is to compromise critical infrastructure, either to hinder US power projection in Asia or to cause societal chaos. The report highlights the alarming possibility of a comprehensive cyberattack that could bring essential services to a halt. This threat surpasses the impact of the COVID-19 crisis and poses a significant concern for transportation, hospitals, and society as a whole.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker, a computer science professor, warns that the electronic voting systems used in the US are vulnerable to sabotage and cyber attacks that can change votes. Through their research, they have repeatedly hacked voting machines and found ways for attackers to manipulate them. They emphasize that these vulnerabilities are within reach for America's enemies. While some states have secure voting technology, others are alarmingly vulnerable, putting the entire nation at risk. The speaker debunks the belief that voting machines are secure because they are not connected to the internet, explaining that many machines have wireless modems for faster result uploading. They conclude that it is only a matter of time before these vulnerabilities are exploited.

Video Saved From X

reSee.it Video Transcript AI Summary
There are increasing cyberattacks on critical infrastructure, including police stations, ahead of the 2024 election. The FBI warns of red flags similar to pre-9/11. Foreign threats from Iran, China, and Russia aim to disrupt the election. The Biden administration advises local sheriffs to prepare for cyberattacks on election centers. The FBI director emphasizes the need for defense and offense against threats. Local election officials are urged to be ready for cyber attacks. Previous attacks on Butler County's electronic systems by Russia caused chaos. Military assistance may not be available during an attack.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker discusses the recent cyber attack on a critical infrastructure corridor in the United States. They explain that the attack targeted a bridge on the I-95 corridor, which connects the north and south of the country. The speaker emphasizes that this attack is not just about a river in Baltimore, but rather a strategic and well-planned attack on a vital supply chain. They highlight the impact of shutting down the bridge, including the disruption of the I-95 cargo and shipping corridor. The speaker also suggests that the attack is part of an undeclared war and criticizes the government's response. They urge people to be aware of the catastrophic consequences and not to dismiss the attack.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the vulnerability of a digital society and the potential consequences of an EMP attack. They highlight the loss of communication, transportation, and essential services that would occur. They also mention the potential chaos and lack of preparedness among the population. The conversation touches on the possibility of war with Iran and the idea that unplugging the country could cause more damage than a missile attack. They emphasize the lack of readiness and unity within the country, suggesting that people may not come together to help each other in such a crisis.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, it becomes more difficult for entities like Russia to interfere with the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
We are in an undeclared war, according to insiders. They claim the US is vulnerable to attacks due to arrogance and ignorance. The current situation is dire, with critical infrastructure being targeted. People need to be aware and not trust those downplaying the severity of the situation. The appointment of a terrorism expert to lead the FBI in Baltimore is seen as suspicious. This crisis is not a coincidence but a deliberate attack on America's stability.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses the vulnerabilities in election systems and the potential for manipulation by hackers. It mentions that voting machines, campaign networks, and registration databases are all at risk. The speaker explains that attackers can cause mischief without physically accessing the machines, such as by messing up voter files. It is noted that Russia was able to influence the election by breaching DNC computers and targeting election-related systems in multiple states. The speaker emphasizes that manipulating vote counts on every machine in America would be difficult, but flipping a few senate seats could still impact the US Congress. The video concludes by suggesting that nation states and criminals likely have knowledge of these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes it should be terrifying to all Americans that Trump had classified information for Americans and the codes, and was able to share it in his resort with anyone. The speaker states Trump needs to be stopped.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
Insufficient attention is given to the potential of a major cyberattack that could cripple our power supply, transportation, and hospital services, bringing our society to a complete halt. Such an attack would make the COVID-19 crisis seem minor in comparison.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that Chinese and Iranian cyber attacks on Butler County occur multiple times daily, aiming to disrupt systems. To prepare, rifles are in police vehicles, civilians are being trained by Texas A&M for disasters. The speaker stresses the need for public awareness and defense against ongoing attacks on critical infrastructure.

Video Saved From X

reSee.it Video Transcript AI Summary
Steve is questioned about downplaying a cyber attack on the I-94 corridor in Baltimore. The attack, affecting critical infrastructure, disrupts the supply chain for hazardous materials like fuels and chemicals. This strategic attack impacts the economy for 4 to 5 years.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack on a critical infrastructure corridor in Baltimore has caused the collapse of a bridge, shutting down the I-95 cargo and sea shipping corridor. The attack targeted load-bearing pylons on the bridge, resulting in catastrophic structural damage. The shutdown of the corridor will impact the transportation of hazardous materials, leading to increased prices and decreased access to food and critical infrastructure. Experts believe this is a well-planned attack by state or non-state actors, and it highlights the vulnerability of American infrastructure. The speaker emphasizes the need for people to understand the severity of the situation and not dismiss it as inconsequential. The attack is seen as part of a larger pattern of dismantling American defenses and preventing Donald Trump from returning to power.

Video Saved From X

reSee.it Video Transcript AI Summary
The CCP launched a terrorist attack on Baltimore's bridge using remote towing technology, impacting US traffic. They can target any vehicle with a signal receiver. US officials may have known but didn't report it. No official confirmation yet.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a scenario where banks go offline, digital money disappears, and electromagnetic pulse bombs are used to attack major grids. They mention the possibility of a terrorist attack, Russian involvement, or a simulated alien invasion. The speaker believes it's important to talk about these potential threats, despite being labeled fearmongering. They argue that not discussing these possibilities would be irresponsible.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the possibility of a cyber pandemic and references the World Economic Forum's prediction about it. They mention the Forum's previous accurate prediction of the coronavirus pandemic and suggest that it may be worth paying attention to their future predictions. The speaker explains that the cyber pandemic would involve a bug sweeping through the Internet, similar to a computer virus, and the potential need to shut down the Internet and power grid to prevent its spread.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Five major threats make the grid extremely vulnerable: cyber, hackers, physical threats, solar EMP, and man-made EMP. The concern is that when they hear the risk analysis, officials may hear it but won’t take action. Speaker 1: There are 18 critical infrastructures in the United States (food, water, transportation, communications, etc.). All 17 of the others depend on electricity. Speaker 2: If our grid goes down, you can't cook, you can't heat anything, you can't run medical supplies, you can't talk on your phone, you can't take money out of a bank, and we turn into total chaos. Speaker 3: If this happens, the system stops. Stops. Speaker 2: If a transformer is taken down, we have to order it from Germany or China. It's going to take a year. Speaker 1: Up till recently, there were no comprehensive protective solutions available. Speaker 4: We know what the solutions are. They're not expensive. They're not difficult to employ. We just need the political will to do it and the follow through on the part of the electric utilities to get it done. Speaker 3: The White House is protected from an EMP. The congress and the CIA and the NSA, all of the areas that need to function at the government are protected. So why can't we be protected? Speaker 1: Around some of these facilities, you don't have much more than a chain link fence to keep people out. That seems absurd to me. Speaker 5: I think it is absurd when we now know that attack on as few as nine grid substations could bring down all three major interconnections for The United States grid. Speaker 3: If the power goes out, you get the generator. And if that goes out, you get another one. There's never been a plan for what happens after that. Speaker 1: Director of the National Security Agency, Admiral Rogers, came out and said, it's not a matter of if, it's a matter of when.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker presents evidence of the Trump campaign and family's willingness to collude with Russia to influence American elections. They criticize Republicans in Congress for enabling this assault on democracy. The speaker calls for Speaker Ryan to allow a vote on an independent commission to investigate the Trump campaign's involvement and prevent future interference. The focus is not only on past events but also on preventing similar incidents in the future.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack on a critical infrastructure corridor in Baltimore has caused a bridge to collapse, shutting down the I-95 cargo route and the shipping corridor. The attack targeted load-bearing pylons on the bridge, causing significant structural damage. The speaker emphasizes that this is not just a river but a crucial supply chain for the United States, carrying hazardous materials and fuel. The attack is believed to be a state-sponsored cyber attack, rerouting a ship in the middle of the night. The speaker warns that this is part of a larger pattern of America's defenses being systematically dismantled, and urges people to recognize the gravity of the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Foreign adversaries are using direct energy weapons on US citizens, known as Savannah Syndrome. A classified briefing revealed the severity of the situation, leaving the speaker, a former Navy SEAL, shaken. The speaker emphasizes the importance of the upcoming election due to leadership failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the topic of cyber warfare and highlights various incidents involving Iranian and Russian hackers. They mention a book written by Nicole Pearl Ross, a former New York Times reporter on cybercrime, which provides insights into the history and vulnerabilities of cyber warfare. The speaker emphasizes the potential consequences of cyber attacks on critical infrastructure, such as power grids, dams, and nuclear plants. They argue that the US is particularly vulnerable to such attacks and suggests that cyber warfare will play a significant role in future conflicts. The speaker encourages viewers to read the book for a deeper understanding of the subject.
View Full Interactive Feed