reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Insufficient attention is given to the potential impact of a major cyberattack, which could cripple essential services and society as a whole. Compared to such an event, the COVID-19 crisis would seem minor.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers affiliated with China's People's Liberation Army have infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The targets include Texas's power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The Chinese cyber army's objective is to compromise critical infrastructure, either to hinder US power projection in Asia or to cause societal chaos. The report highlights the alarming possibility of a comprehensive cyberattack that could bring essential services to a halt. This threat surpasses the impact of the COVID-19 crisis and poses a significant concern for transportation, hospitals, and society as a whole.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, aiming to disrupt logistical systems and potentially weaponize the information collected. The Washington Post reveals that China's cyber army has targeted various sectors, including Texas's power grid, a Hawaiian water utility, a West Coast port, and an oil and gas pipeline. The Department of Homeland Security's Cybersecurity Agency warns that these attempts are part of China's strategy to disrupt or destroy critical infrastructure in the event of a conflict, either to hinder US power projection in Asia or to create societal chaos. Over the past year, hackers affiliated with the People's Liberation Army have breached the computer systems of around 24 critical entities.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the vulnerability of a digital society and the potential consequences of an EMP attack. They highlight the loss of communication, transportation, and essential services that would occur. They also mention the potential chaos and lack of preparedness among the population. The conversation touches on the possibility of war with Iran and the idea that unplugging the country could cause more damage than a missile attack. They emphasize the lack of readiness and unity within the country, suggesting that people may not come together to help each other in such a crisis.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the Texas power grid, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially causing chaos and affecting decision-making. The report states that over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
We are in an undeclared war, according to insiders. They claim the US is vulnerable to attacks due to arrogance and ignorance. The current situation is dire, with critical infrastructure being targeted. People need to be aware and not trust those downplaying the severity of the situation. The appointment of a terrorism expert to lead the FBI in Baltimore is seen as suspicious. This crisis is not a coincidence but a deliberate attack on America's stability.

Video Saved From X

reSee.it Video Transcript AI Summary
A comprehensive cyber attack could bring our society to a complete halt, affecting power supply, transportation, and hospital services. Compared to such an attack, the COVID-19 crisis would seem like a minor disturbance.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
Hackers linked to China's People's Liberation Army have reportedly infiltrated critical US services, including the independent power grid in Texas, a water utility in Hawaii, a West Coast port, and an oil and gas pipeline. The goal seems to be to disrupt or destroy these systems in the event of a conflict with the US, potentially preventing the US from projecting power in Asia or causing chaos within the country. Over the past year, hackers affiliated with the Chinese military have accessed the computer systems of around 24 critical services.

Video Saved From X

reSee.it Video Transcript AI Summary
Insufficient attention is given to the potential of a major cyberattack that could cripple our power supply, transportation, and hospital services, bringing our society to a complete halt. Such an attack would make the COVID-19 crisis seem minor in comparison.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that Chinese and Iranian cyber attacks on Butler County occur multiple times daily, aiming to disrupt systems. To prepare, rifles are in police vehicles, civilians are being trained by Texas A&M for disasters. The speaker stresses the need for public awareness and defense against ongoing attacks on critical infrastructure.

Video Saved From X

reSee.it Video Transcript AI Summary
Steve is questioned about downplaying a cyber attack on the I-94 corridor in Baltimore. The attack, affecting critical infrastructure, disrupts the supply chain for hazardous materials like fuels and chemicals. This strategic attack impacts the economy for 4 to 5 years.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack on a critical infrastructure corridor in Baltimore has caused the collapse of a bridge, shutting down the I-95 cargo and sea shipping corridor. The attack targeted load-bearing pylons on the bridge, resulting in catastrophic structural damage. The shutdown of the corridor will impact the transportation of hazardous materials, leading to increased prices and decreased access to food and critical infrastructure. Experts believe this is a well-planned attack by state or non-state actors, and it highlights the vulnerability of American infrastructure. The speaker emphasizes the need for people to understand the severity of the situation and not dismiss it as inconsequential. The attack is seen as part of a larger pattern of dismantling American defenses and preventing Donald Trump from returning to power.

Video Saved From X

reSee.it Video Transcript AI Summary
The CCP launched a terrorist attack on Baltimore's bridge using remote towing technology, impacting US traffic. They can target any vehicle with a signal receiver. US officials may have known but didn't report it. No official confirmation yet.

Video Saved From X

reSee.it Video Transcript AI Summary
The architects of the great reset are planning a new move called cyber warfare, following the pandemic vaccine rollout. This could lead to a scenario where phones are dead, bank accounts are empty, and basic utilities like water are unavailable. The US government is suspected of embedding malware into critical infrastructure, including power grids and factories. Various agencies have issued warnings about cyber attacks, with Russia being a potential threat. The seriousness of these attacks is evident from incidents like the colonial pipeline shutdown. The potential consequences are dire, but not widely publicized. It is crucial to be prepared for such an event.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a scenario where banks go offline, digital money disappears, and electromagnetic pulse bombs are used to attack major grids. They mention the possibility of a terrorist attack, Russian involvement, or a simulated alien invasion. The speaker believes it's important to talk about these potential threats, despite being labeled fearmongering. They argue that not discussing these possibilities would be irresponsible.

Video Saved From X

reSee.it Video Transcript AI Summary
Investigative journalist Whitney Webb discusses the recent cyberattack and its potential implications. She highlights the tabletop exercises conducted by US intelligence agencies and the focus on "killware" as the greatest cyber threat. Webb questions the attribution of cyberattacks and the lack of evidence provided by companies and agencies. She emphasizes the need for better evidence and warns of the potential for a false flag operation that could lead to martial law and a controlled election. Webb also mentions the involvement of Israeli intelligence and the push for a regulated internet and digital currency. She urges people to pay attention to these developments and be aware of the Orwellian solutions being proposed.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the possibility of a cyber pandemic and references the World Economic Forum's prediction about it. They mention the Forum's previous accurate prediction of the coronavirus pandemic and suggest that it may be worth paying attention to their future predictions. The speaker explains that the cyber pandemic would involve a bug sweeping through the Internet, similar to a computer virus, and the potential need to shut down the Internet and power grid to prevent its spread.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Five major threats make the grid extremely vulnerable: cyber, hackers, physical threats, solar EMP, and man-made EMP. The concern is that when they hear the risk analysis, officials may hear it but won’t take action. Speaker 1: There are 18 critical infrastructures in the United States (food, water, transportation, communications, etc.). All 17 of the others depend on electricity. Speaker 2: If our grid goes down, you can't cook, you can't heat anything, you can't run medical supplies, you can't talk on your phone, you can't take money out of a bank, and we turn into total chaos. Speaker 3: If this happens, the system stops. Stops. Speaker 2: If a transformer is taken down, we have to order it from Germany or China. It's going to take a year. Speaker 1: Up till recently, there were no comprehensive protective solutions available. Speaker 4: We know what the solutions are. They're not expensive. They're not difficult to employ. We just need the political will to do it and the follow through on the part of the electric utilities to get it done. Speaker 3: The White House is protected from an EMP. The congress and the CIA and the NSA, all of the areas that need to function at the government are protected. So why can't we be protected? Speaker 1: Around some of these facilities, you don't have much more than a chain link fence to keep people out. That seems absurd to me. Speaker 5: I think it is absurd when we now know that attack on as few as nine grid substations could bring down all three major interconnections for The United States grid. Speaker 3: If the power goes out, you get the generator. And if that goes out, you get another one. There's never been a plan for what happens after that. Speaker 1: Director of the National Security Agency, Admiral Rogers, came out and said, it's not a matter of if, it's a matter of when.

Video Saved From X

reSee.it Video Transcript AI Summary
A comprehensive cyber attack could halt power, transportation, and hospital services, crippling society. In comparison, the COVID-19 crisis would be seen as a small disservice relative to such a major cyber attack.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the recent collapse of a bridge in Baltimore, emphasizing that it was a cyber attack on critical infrastructure. They explain that the attack targeted load-bearing pylons on the bridge, causing a significant portion to collapse. The speaker highlights the importance of the I-94 corridor and the impact the attack will have on the transportation of hazardous materials. They argue that this attack is part of a larger pattern of dismantling American defenses and call for people to be aware of the situation. The speaker concludes by stating that the upcoming election is crucial and that Donald Trump is seen as a life raft.

Video Saved From X

reSee.it Video Transcript AI Summary
A cyber attack on a critical infrastructure corridor in Baltimore has caused a bridge to collapse, shutting down the I-95 cargo route and the shipping corridor. The attack targeted load-bearing pylons on the bridge, causing significant structural damage. The speaker emphasizes that this is not just a river but a crucial supply chain for the United States, carrying hazardous materials and fuel. The attack is believed to be a state-sponsored cyber attack, rerouting a ship in the middle of the night. The speaker warns that this is part of a larger pattern of America's defenses being systematically dismantled, and urges people to recognize the gravity of the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 begins by noting a new escalation in the war: after the president's Easter-weekend speech, the United States struck a massive bridge in Tehran, described as part of Tehran’s pride because it would cut about an hour from Iranians’ commutes. Trump posts, “the biggest bridge in Iran comes tumbling down, never to be used again,” and says, “Make a deal before it’s too late.” He warns that nothing is left of what could still become a great country. Speaker 1 responds with skepticism about the administration, mocking the idea of “the Nord Stream pipeline” being blown up as a lie by the prior administration. Speaker 0 notes that Trump boasted about the bridge strike on Truth Social and questions the strategic value of targeting civilian infrastructure, comparing it to striking the Golden Gate Bridge and asking whether that would be labeled a war crime. Iranian retaliation follows: a strike at the center of Tehran (clarified as Tel Aviv in error in the transcript) with a ballistic missile, causing a neighborhood to burn, as shown on Fox News and circulating on social media. Reports also emerge that an Amazon data center was struck in Bahrain, Oracle in the UAE, and that Iran had claimed it would strike Microsoft, Google, Amazon and other large American companies. The United States is not protecting them. Speaker 2 engages Colonel Daniel Davis, host of The Deep Dive with Dan Davis, to assess the latest moves alongside the president’s speech. Speaker 2 argues that the president’s remarks about “bomb you back into the stone age” indicate punishing the civilian population, not just military targets, which could unite Iranians against the United States and Israel. The bridge strike appears to align with that stance, making a regional outcome that contradicts any stated aims. He calls it nearly a war crime, since civilian infrastructure has no military utility in this context. He suggests the action undermines any potential peace path and could prompt stronger resistance within Iran. He warns that, politically, Trump could face war-crimes scrutiny, especially under a Democratic-controlled House, and that it damages the United States’ reputation by appearing to disregard the rule of law and morality. Speaker 1 asks whether such tactics are ever effective, noting a lack of evidence that inflicting civilian suffering yields political concession. Speaker 0 and Speaker 2 reference historical examples (Nazis, British during the Battle of Britain, Hiroshima-era considerations) to suggest such tactics have not succeeded in breaking civilian resolve, arguing this approach would harden Iranian resistance. Speaker 2 cites broader historical or regional patterns: torture or collective punishment has failed against Germans, Japanese, Palestinians in Gaza, Hezbollah in Lebanon, and Iran in the Iran-Iraq War. He contends the appeal of using such power is seductive but dangerous, likening it to “war porn.” He notes that the number of Iranian fatalities floated by Trump has fluctuated (3,000, 10,000, 30,000, then 45,000), describing them as not credible, yet the administration seems unconcerned with accuracy. Speaker 3 adds that the rhetoric justifies escalating violence with humanitarian consequences, including potential energy-system disruption. Speaker 0 asks about the discrepancy between Trump’s claim of decimating Iran and subsequent attacks on multiple targets in the Gulf and the firepower Iran still holds, including underground facilities and missile capabilities. Speaker 2 explains that Iran can absorb punishment and still strike back, suggesting that the Strait of Hormuz cannot be opened by force and that escalation could involve considerations of a larger false-flag scenario. He mentions a warning about a potential nine-eleven-level attack and potential media complicity, implying fears of a false-flag operation blamed on Iran. Speaker 0 notes the possibility of Israeli involvement undermining negotiations and cites JD Vance’s planned meeting with Iranian Foreign Minister Kamal Kharazi, noting Kharazi’s injury and his wife’s death, implying an assassination attempt. Speaker 2 critiques U.S. reliance on allies, arguing that Israel’s actions threaten U.S. interests and that the White House should constrain Israel. He asserts there is no military solution to the conflict, warns of long-term costs to the United States and its European and Asian relations, and predicts economic consequences if the conflict continues. Speaker 1 remarks that Iranian leaders’ letter to the American people shows civilian intent not to surrender, while Speaker 0 and Speaker 2 emphasize the risk of ongoing conflict, with Colonel Davis concluding that there is no feasible open-strand resolution. The discussion ends with thanks to Colonel Davis for his analysis.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the topic of cyber warfare and highlights various incidents involving Iranian and Russian hackers. They mention a book written by Nicole Pearl Ross, a former New York Times reporter on cybercrime, which provides insights into the history and vulnerabilities of cyber warfare. The speaker emphasizes the potential consequences of cyber attacks on critical infrastructure, such as power grids, dams, and nuclear plants. They argue that the US is particularly vulnerable to such attacks and suggests that cyber warfare will play a significant role in future conflicts. The speaker encourages viewers to read the book for a deeper understanding of the subject.
View Full Interactive Feed