reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Chinese cyber threat is unmatched. Even if all FBI cyber agents and intel analysts solely focused on China, they would still be outnumbered by Chinese hackers by at least 51.

Video Saved From X

reSee.it Video Transcript AI Summary
The US intelligence community faces a challenge in countering Chinese espionage due to the large number of people involved. China is willing to deploy not only operatives from its main spy agency, MSS, but also ordinary citizens who are coerced through threats against their families in mainland China. This resembles the tactics of a mafia organization. Additionally, China has been reported to acquire land for military bases, a practice that should be prohibited.

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2018, China has been operating against an AI master plan, with Xi Jinping stating the winner of the AI race will achieve global domination. China is ahead in power generation and data, with over two million people working in data factories compared to approximately 100,000 in the US. They are on par in algorithms due to large-scale espionage. A Google engineer stole AI chip designs and started a company in China by copying code into Apple Notes. Stanford University is reportedly infiltrated by CCP operatives, and Chinese citizens, including students on CCP-sponsored scholarships, are allegedly required to report information back to China. China allegedly locked down DeepSeek researchers, preventing them from leaving the country or contacting foreigners. The US was deeply penetrated by Chinese intelligence, while US espionage capabilities in China are comparatively weaker. China is catching up on chips, with Huawei chips nearing NVIDIA's capabilities. China is also reportedly using AI to understand human psychology for information warfare. To combat this, the US needs its own information operations and must improve its AI efforts.

Video Saved From X

reSee.it Video Transcript AI Summary
Gates was asked to condemn Microsoft's Azure program for allegedly leaking sensitive classified information to the CCP. He was also asked if he is pro-CCP. The speaker referenced the Bill and Melinda Gates Foundation's financial connections to the CCP and its ownership of Microsoft shares. Gates was asked again to condemn Microsoft's government Azure program for leaking classified information from the US military. Gates did not respond.

Video Saved From X

reSee.it Video Transcript AI Summary
China's cyber program is the largest in the world, surpassing all major nations combined, and has stolen vast amounts of American personal and corporate data. Beyond cyber theft, a significant concern is the Chinese government's positioning within American civilian critical infrastructure, allowing them to potentially cause harm at their discretion. They have already embedded malware in essential systems, including water treatment plants, transportation networks, the energy sector, the electric grid, natural gas pipelines, and telecommunications. This threat poses a serious risk to national security.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on the kill chain concept and Palantir’s role within it. One speaker explains that the system you call the kill chain was created privately, while publicly lawyers frame it as something like “tech for the amelioration of unwanted blah blah blah.” The term kill chain sounds good to him, though not originally Palantir’s; it’s a general military sequence from identifying a target to taking a life. Palantir’s contract added their software and artificial intelligence to the kill chain, making it quicker, and, in his view, “better and more violent.” He notes that stepping back to examine the actual application of these technologies can be destabilizing. Another speaker discusses a personal trajectory: Juan didn’t leave Palantir entirely for ethical reasons, only taking another job, but his motivation to speak out against Palantir grew after observing the Israeli invasion of Gaza following the October 7 attacks. Palantir has contracts with the Israeli Defense Forces, with the exact nature intentionally opaque, yet evidence suggests Palantir’s AI tech was used for target selection in Gaza. The speaker Carp embraces controversy as part of marketing, stating Palantir is comfortable being unpopular. He adds that Palantir works with health insurance companies to build AI for denials management to protect revenue, raising the question of whether Palantir’s AI should decide what care is covered for individuals. A third speaker explains the technical approach: they use what legal scholars call predicate-based search to identify indicators of potential bad behavior in a person’s life. In essence, Palantir makes software that helps customers collect and analyze data and then act on the analysis. By 2013, a decade after founding, Palantir’s client list included the FBI, the CIA, the NSA, the Marines, the Air Force, Special Operations Command, and more. Palantir already had contracts with the IRS to analyze taxpayer data to guide auditors to easier audits, handling financial information for many. They also had multiple contracts with the Department of Health and Human Services, whose core responsibility is Medicare and Medicaid, controlling millions of Americans’ health records and access to health care. A final speaker warns that as we increasingly live in a simulated world, we move toward governance by algorithm, governed by those influencing these AI systems to advance profit- or control-seeking objectives.

Video Saved From X

reSee.it Video Transcript AI Summary
BlackRock is under investigation for investing $429 million into the Chinese military. The US government has initiated a full-scale investigation, but allegedly knew about BlackRock's business dealings prior to informing the public. Nine out of ten congresspeople trading BlackRock stock were reportedly selling it. Democratic Congressman Ro Khanna allegedly sold $130,000 worth of this stock months before the investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
Microsoft has a partnership with China's central propaganda department, which involves using their software to spy on users. Microsoft has been doing business in China for over 30 years and has sold the Chinese Communist Party (CCP) over a dozen AI products, supporting their high-tech industry. The CCP's long-term plan, called Made in China 2024, aims to surpass America in the high-tech industry, and Microsoft has played a significant role in helping them achieve this. Microsoft is also collaborating with CCP mouthpieces, the People's Daily and China Daily, further raising concerns about national security.

Video Saved From X

reSee.it Video Transcript AI Summary
China's hacking program, deemed the world's largest by the FBI, has resulted in the theft of more personal and business data from Americans than any other country. However, the Chinese Communist Party (CCP) has gone further by targeting American critical infrastructure. Intelligence and cybersecurity agencies have uncovered CCP's hacking activities, which aim to disable and destroy vital infrastructure in the event of a conflict, such as one concerning Taiwan. This cyber warfare strategy can be likened to placing bombs on American bridges, water treatment facilities, and power plants.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially causing chaos and affecting decision-making. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
The Defense Department and NASA will need to reassess their arrangements regarding rockets and the multibillion-dollar contracts with Elon Musk's companies. The U.S. government faces a critical decision: either unwind these contracts or separate Musk's companies from him. This situation poses significant national security concerns given the recent revelations about Musk.

Video Saved From X

reSee.it Video Transcript AI Summary
Many Western corporations are unaware of the true nature of the Chinese Communist Party (CCP) and its leader, Xi Jinping. Throughout history, no organization has survived when dealing with the CCP. Xi Jinping has transformed the party into his own, and it is no longer representative of communism. It is crucial for corporations to realize this for their long-term benefit. The New Federal State of China is a group that possesses internal intelligence about the CCP. They can provide valuable information and protection, not just for profit.

Video Saved From X

reSee.it Video Transcript AI Summary
The senator questions the speaker about their firm's client selection policy, specifically regarding their clients who are state-owned Chinese corporations. The speaker defends their rigorous selection process and claims to primarily work with multinational and private sector companies. However, the senator highlights that the firm has advised state-owned enterprises involved in activities contrary to US security interests. The speaker denies advising these specific companies but fails to provide satisfactory answers. The senator criticizes the firm for making substantial profits from both US enemies and the American taxpayer. The senator proposes a law to prohibit such activities and vows to push for a vote on it.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
The congresswoman states the CCP is not our friend and that Chinese companies must turn over information to the CCP. Michigan lawmakers approved nearly $800 million for the Goshen plant, a subsidiary of a CCP-owned company, to implant Chinese workers and technology near an intelligence program and military facility. The US has found Chinese technology is used to spy on Americans and steal proprietary information. The previous president of Ferris State intertwined with Goshen leaders and there was a soft agreement to house unvetted PRC nationals. Goshen also had conversations with the university to support building elements. China's national intelligence laws require PRC nationals to surveil, collect, and report. Stakeholders with Goshen signed NDAs, which is a red flag. National Security Intelligence Agencies convened state and local officials to warn against being duped by business deals with China. Transparency would reveal elite capture, influence operations, and corruption. The congresswoman is concerned about the plant's proximity to a military facility and Ferris State, combined with NDAs and secrecy.

Video Saved From X

reSee.it Video Transcript AI Summary
Syngenta, a Chinese state-owned agri-chemical company, must relinquish its 160 acres in Northeast Arkansas, primarily used for seed research. The parent company, Kim China, is listed by the Department of Defense as a Chinese military company, posing a significant threat to our state and agricultural technology. These corporations are known to funnel American research back to China, potentially compromising national security and endangering American farms. This situation represents a clear risk to both our farmers and our nation's safety.

Video Saved From X

reSee.it Video Transcript AI Summary
The military industrial complex used to consist of many companies, but it has consolidated to just five giant companies. These companies, like Raytheon and Northrop Grumman, often overcharge the Department of Defense for weapons and make excessive profits. For example, a missile that used to cost $25,000 now costs $400,000. Kathy, the director of Northrop Grumman, is also involved with a non-profit organization for empowering women, but the board is mostly run by men and includes CEOs from major corporations. Kathy herself earns around $20 million per year, including salary, bonuses, and stock awards. While I'm not claiming a conspiracy, it's clear that the military industrial complex is making a lot of money.

Video Saved From X

reSee.it Video Transcript AI Summary
Spy agencies can be a profitable business for companies, as Edward Snowden's former employer reportedly made over $1 billion serving defense agencies. Silicon Valley giants, including Google, Apple, Yahoo, Facebook, and Microsoft, are pressuring President Obama to curb government surveillance programs that collect personal information from the internet. These companies, usually competitors, have united to limit the damage caused by the NSA's snooping on web users. The revelations have led to foreign companies reconsidering buying goods from US companies, causing economic fallout. Julian Assange of WikiLeaks also commented on how American companies are suffering due to the NSA's actions, turning the US into a coercive archipelago where businesses may secretly be agents of the NSA.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 discusses The New York Times piece about Trump tapping Palantir to compile data on Americans, noting mixed reactions online and outlining the background. In March, President Trump signed an executive order calling for the federal government to share data across agencies, raising questions about a potential master list of personal information and untold surveillance power. Behind the scenes, officials have quietly placed technological building blocks to enable the plan, with Palantir—the data analysis and technology firm—playing a central role. Palantir is described as more than a data firm. The Trump administration has expanded Palantir’s work across the federal government in recent months. The company has received more than 113,000,000 in federal government spending since Trump took office, including new contracts with the Department of Homeland Security and the Pentagon, plus existing contracts. A separate note mentions a $795,000,000 Department of Defense contract awarded last week that has not yet been spent. Representatives of Palantir are said to be in discussions with at least two other agencies—the Social Security Administration and the Internal Revenue Service—about buying its technology, according to six government officials and Palantir employees. A key Palantir product, Foundry, is used in at least four federal agencies, including DHS and the HHS, widely adopted to organize and analyze data and to pave the way for merging information from different agencies. This is linked to the ability to create detailed portraits of Americans based on government data. Government officials say the administration has sought access to hundreds of data points on citizens and others through government databases, including bank account numbers, student debt amounts, medical claims, and disability status. Critics say such data access could be used to advance political agendas, policing immigrants, and punishing critics; privacy advocates, student unions, and labor rights organizations have filed lawsuits to block data access. A notable point in the piece is that Palantir’s selection as a chief vendor was driven by Elon Musk’s Department of Government Efficiency, with at least three Doge members formerly at Palantir and two others who had worked at Peter Thiel-funded companies. Some current and former Palantir employees have expressed unease, with 13 former employees signing a letter urging Palantir to stop its endeavors with President Trump, including Linda Shah, a Palantir engineer who left last year, who said the concern was not the technology but how the administration planned to use it. The article also notes Palantir’s main products: Foundry and Gotham, the latter described as helping organize and draw conclusions from data and tailored for security and defense purposes. Gotham is interpreted by some as precrime software. Palantir was founded with initial funding from the CIA’s venture capital arm, In-Q-Tel, and Peter Thiel’s Founders Fund, and In-Q-Tel also funded Founders Fund. Speaker 1 interjects with a quote from Palantir’s Alex Karp claiming Palantir built PG to stop the rise of the far right in Europe and to distribute the COVID vaccine with Foundry, and to create a “digital kill chain.” Speaker 0 questions the desirability of a technology that compiles banking data, social security information, online presence, and other personal data for precrime analysis across government, especially under an administration associated with claims of stopping a far-right rise. The discussion continues with concerns about the potential weaponization of data and the implications for speech, political ideology, and dissent.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript surveys Palantir’s rise as a powerful data analytics company intertwined with government and military aims, emphasizing how fear, surveillance, and control have shaped its growth and public image. It frames Palantir as aiming to become “the ultimate military contractor and the ultimate arbiter of all of our data,” with its software described as enabling governments and major institutions to collect, analyze, and act on vast datasets, including in war zones. Key points include: - Palantir’s positioning and clients: The company claims it can revolutionize government systems with AI-powered data analysis and has been hired by the Department of Defense, the FBI, local police, the IRS, and other entities, including non-government customers like Wendy’s. Its business model is described as transforming “information those organizations collect, collect even more information, and use that data to draw conclusions.” - The kill chain concept and AI: Palantir’s tech is linked to the “kill chain,” a military term for the series of decisions leading to targeting and potentially taking life. Palantir’s contract adds AI to this chain, making it “quicker and better and safer and more violent.” - Founding story and rhetoric: Palantir traces its origins to a PayPal-connected network (the “PayPal mafia”) and to Alex Karp, who studied neoclassical social theory, with the company named after Tolkien’s Palantir. Middle-earth imagery is used to juxtapose potential good versus dangerous power. - Data, surveillance, and ontology: The software is described as capable of reconfiguring an organization’s ontology—what systems matter, what information matters, how processes are structured, and what biases are introduced. - Inside views and ethics: A former Palantir employee, Juan, explains his departure and later criticisms after observing the Israeli invasion of Gaza; Palantir’s involvement with the Israeli Defense Forces is noted, though contract details are opaque. The claim is that Palantir’s AI may have been used for target selection. - Revenue and focus on government: In 2024 Palantir earned nearly $2.9 billion, with 55% from government sources, most of it American. Palantir’s CTO Sham Sankar is cited with a Defense Reformation rhetoric that aligns with the Defense Innovation Board’s push to fund emerging tech, suggesting a fusion of defense spending and Palantir’s growth. - Domination and market strategy: Palantir is depicted as striving to be the “US government’s central operating system,” with Doge (an internal effort) aimed at unifying data across agencies like the IRS and Health and Human Services, potentially giving one contractor broad access to Americans’ data and health records. - Corporate culture and risk: The company is described as comfortable being unpopular, with leaders like Peter Thiel investing heavily and having a role in politics; Karp emphasizes civil liberties in terms of lawful use of government data and its potential misapplication. - Ethical tension and viewpoint: The piece notes that Palantir’s reach could enable governance by algorithm and automated decision-making, potentially reshaping personal lives, battlefields, and governance. The founders’ ownership structure preserves control through class voting shares. - Final reflections: The speakers argue that criticizing the system is fraught because watching and fear can silence dissent, and warn against replacing a broken system with an even more broken one, urging vigilance over who wields powerful data and AI.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Microsoft has been accused of collaborating with CCP propaganda outlets to spread misinformation and anti-American rhetoric. This raises concerns about US companies working against their own country. The CCP reportedly gained access to Microsoft's Windows operating system source code in 2003, allowing them to carry out cyber attacks on US government agencies and private industries. Microsoft has been operating in China since 1992 and has provided the CCP with advanced technology like AI and cloud computing, potentially aiding their efforts to undermine America.

Video Saved From X

reSee.it Video Transcript AI Summary
Earlier this week, a potential vulnerability was detected in DoD computer systems. Some tech companies were found to be using cheap Chinese labor to assist with DoD cloud services, which is considered unacceptable. Effective immediately, China will no longer have any involvement in DoD cloud services. A two-week review will be initiated to ensure this issue isn't occurring elsewhere across the DoD. The department will continue to monitor and counter all threats to military infrastructure and online networks. The speaker thanked those who raised the issue and is initiating the review with a signed memo.

Video Saved From X

reSee.it Video Transcript AI Summary
In late 2015, my boss, Peter Daskin, approached me and asked if we should work with the CIA. Having worked in national security before, I wasn't surprised. I suggested it wouldn't hurt to talk to them, as there could be financial benefits. Peter mentioned their interest in the places, people, and data we were working with, particularly in China. After that conversation, he confirmed the relationship with the CIA over the next two months. It's not uncommon for programs like this to gather intelligence on foreign laboratories.

American Alchemy

“A US President Was Briefed on UFOs!” (Ft. Eric Davis)
Guests: Eric Davis
reSee.it Podcast Summary
The witness opens with a blunt stance on testimony: 'The only way I'll testify, actually the reality is, is in a classified setting.' He recounts harassment of Dave Grusch after whistleblower actions, including threats, a leak of his PTSD episode, and HIPAA violations used to attack his character, noting pro bono legal support through the UAP Disclosure Fund. He says he briefed the Senate Select Committee on Intelligence staff and the Senate Armed Services Committee staff in classified settings (2019, 2022) and that follow‑ups were not arranged; he also notes that Dave Grusch 'found everything' by building on Hal Puthoff’s material, with Grusch identifying '40 witnesses,' two of whom are in the same building, though most remain unnamed. He describes ASAP and AATIP connections to the NRO liaison to the UAPTF, and explains that SKIFF environments and contractor networks house a lot of unique information not publicly discussed. He references four legacy firms, multi‑agency WINPAC, and the broader ecosystem of contractors, government customers, and compartmentalization that sustains these programs.
View Full Interactive Feed