jhMITgunship Profile Banner
Jesse Hamel Profile
Jesse Hamel

@jhMITgunship

Followers
1K
Following
3K
Statuses
1K

Stealth Mode Founder || Techstars ‘24 || MIT Sandbox ‘24-‘25 || Former AC-130 Gunship Aviator 🇺🇸

Florida, USA
Joined October 2024
Don't wanna be here? Send us removal request.
@jhMITgunship
Jesse Hamel
4 months
Time for a true name account, and to A/B test LinkedIn vs X for myself
3
1
53
@jhMITgunship
Jesse Hamel
3 days
@MarioNawfal Yep @elonmusk , we do. We need 100000x more. This is the age of drones and robotics for national security and almost every market. Energy, Ag, public safety, mobility—
0
0
2
@jhMITgunship
Jesse Hamel
3 days
@ChuckCallesto Long overdue
0
0
0
@jhMITgunship
Jesse Hamel
3 days
@usairforce YEEESSSS 🦾🇺🇸
0
0
0
@jhMITgunship
Jesse Hamel
3 days
YEEEEESSSSSSSS 🦾
@usairforce
U.S. Air Force
3 days
Sir, airpower anytime, anywhere.
0
0
2
@jhMITgunship
Jesse Hamel
4 days
@pmarca Accurate. Nor are they incentivized properly to do so. This needs to change.
0
0
1
@jhMITgunship
Jesse Hamel
5 days
@harleyf Accurate
0
0
1
@jhMITgunship
Jesse Hamel
6 days
@MarioNawfal Yeeeesssss
0
0
1
@jhMITgunship
Jesse Hamel
6 days
Our startup conviction #1 —this is the decade of intelligent robotics. They will be involved in virtually every area of human activity by 2035.
@waitbutwhy
Tim Urban
6 days
Humanoid robots and drones will both be absolutely everywhere 10-20 years from now. Delivery drones flying overhead, robot janitors, baristas, grocery store employees guiding you to the right aisle, and (eventually) housekeepers—will all seem as normal as smartphones do today.
0
0
3
@jhMITgunship
Jesse Hamel
6 days
0
0
1
@jhMITgunship
Jesse Hamel
8 days
@garrytan @bobmcgrewai Already happening — National security space is sparking the decade of robotics, which starts now.
0
0
1
@jhMITgunship
Jesse Hamel
8 days
CCP 🇨🇳 is collecting data and maintains remote control over medical devices — CCP 🇨🇳 drones are doing the same thing.
@Byron_Wan
Byron Wan
9 days
🚨 The US Cybersecurity & Infrastructure Security Agency (CISA) is warning that 🇨🇳 Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device. Contec is a China-based company that specializes in healthcare technology, offering a range of medical devices including patient monitoring systems, diagnostic equipment, and laboratory instruments. When CISA tested three Contec CMS8000 firmware packages, the researchers discovered anomalous network traffic to a hard-coded external IP address, which is not associated with the company but rather a 🇨🇳 university. This led to the discovery of a backdoor in the company's firmware that would quietly download and execute files on the device, allowing for remote execution and the complete takeover of the patient monitors. It was also discovered that the device would quietly send patient data to the same hard-coded address when devices were started. None of this activity was logged, causing the malicious activity to be conducted secretly without alerting administrators of the devices. The IP address is also hard-coded in software for other medical equipment, including a pregnancy patient monitor from another 🇨🇳 healthcare manufacturer. An FDA advisory about the backdoor also confirmed that it was also found in 🇨🇳 Epsimed MN-120 patient monitors, which are re-labeled Contec CMS8000 devices. “… the use of symbolic links could provide a primitive to overwrite files anywhere on the device filesystem. When executed, this function offers a formidable primitive allowing for a third-party operating at the hard-coded IP address to potentially take full control of the device remotely." CISA believes this is a backdoor planted in the device's firmware after reviewing the firmware code. Further lending to this being a backdoor by design, CISA found that the devices also began sending patient data to the remote IP address when the devices started. The transmitted data includes the doctor's name, patient ID, patient's name, patient's date of birth, and other information.  After contacting Contec about the backdoor, CISA was sent multiple firmware images that were supposed to have mitigated the backdoor. However, each one continued to contain the malicious code, with the company simply disabling the 'eth0' network adapter to mitigate the backdoor. However, this mitigation does not help as the script specifically enables it using the ifconfig eth0 up command before mounting the remote NFS share or sending patient data. Currently, there is no available patch for devices that removes the backdoor, and CISA recommends that all healthcare organizations disconnect these devices from the network if possible. Furthermore, CISA recommends organizations check their 🇨🇳 Contec CMS8000 patient monitors for any signs of tampering, such as displaying information different from a patient's physical state.
Tweet media one
0
0
2
@jhMITgunship
Jesse Hamel
9 days
@jordanjhamel lol—classic
0
0
0
@jhMITgunship
Jesse Hamel
11 days
@SantsPliego This is awesome
0
0
1
@jhMITgunship
Jesse Hamel
11 days
Air monitoring now — Physical security in 2025 is three dimensional. And malicious / unauthorized drones that still be PAR 107 registered. We need to catch up quick on this
@528vibes
💭 think tank
11 days
🧃…..but the FAA said it’s allowed!
Tweet media one
0
2
4
@jhMITgunship
Jesse Hamel
11 days
Pretty obvious to anyone paying attention that something like this was happening
@nexta_tv
NEXTA
11 days
❗️DeepSeek Hijacked ChatGPT OpenAI claims to have evidence that the Chinese trained their model on American work. In simple terms: DeepSeek took OpenAI o1 and forced it to teach its model to be smart. Because of this, DeepSeek often calls itself ChatGPT and quotes OpenAI rules. Waiting for an official response.
Tweet media one
0
0
2
@jhMITgunship
Jesse Hamel
11 days
@TheAKGuy Nope
0
0
0
@jhMITgunship
Jesse Hamel
12 days
💯— there’s obviously more to this. Combined with the removal of geo-fencing from DJI software days before the inauguration. Doesn’t explain the multiple sightings of drones coming of the Atlantic or around the nuke sites. Btw—what would stop the CCP 🇨🇳from filing FAA PAR 107 flights?
1
0
5
@jhMITgunship
Jesse Hamel
12 days
0
0
0
@jhMITgunship
Jesse Hamel
12 days
“Many such cases..” CCP 🇨🇳 doesn’t play fair, and uses our own systems against us
@boneGPT
bone
16 days
Sam Altman doesn't deserve $500b of compute. He's the reason we lost to the Chinese. It's all ego for him. Suchir. Annie. Ilya. Mira. Jan. Evan. Daniel. Logan. Leopold. Karpathy. Deepseek didn't do this on their own. They stole the tech while actively delaying American research. Check out Helen Toner, former board member. She doesn't know shit about shit, she has zero technical ability. Her claim to fame? Trying to destroy OpenAI from the inside. How did she get on the board? She was groomed in Beijing to be a perfect DEI hire, an expert in national security and AI. What did she do at OpenAI? Tried to completely stop American AI development under the guise of effective altruism. Her idea? Stop all AI dev until politicians can figure out regulations. Any American knows that getting politicians involved is the stupidest thing you can do. That was her point. Get it bogged down in congress. What did Sam Altman do? Nothing. He took forever to fire her. He drove his fancy car around fighting with his employees like a dog. He went on a world tour to raise money from the sheikhs. He schemed with the NSA and federal government to engineer regulatory capture. All this negotiating and inside baseball and hemming and hawing will look like hubris in retrospect. Did he ever stop hiring people trained in China? No. Half the staff went to school in China. They think it's a joke if you suggest anything is awry. While Sam and Roon shitpost and gloat about their lead, their Chinese H1B engineers betrayed them. OpenAI squandered the American lead in AI, they gave it away. It was willful neglect. How many H1Bs are at OpenAI today? How many Chinese? Deepseek cost less than Sam Altman's Koenigsegg to train. Sam fell prey to the same woke thinking that said it's racist to blame China for COVID. He didn't take the threat seriously. He spent his time maligning Trump, harassing employees, blackballing whistleblowers, cavorting with billionaires for funds, scheming to save his own ass. Meanwhile the Chinese built.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
1
@jhMITgunship
Jesse Hamel
12 days
RT @boneGPT: Sam Altman doesn't deserve $500b of compute. He's the reason we lost to the Chinese. It's all ego for him. Suchir. Annie. Il…
0
802
0