TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the National Security Act and the CIA Act passed in 1947 and 1949, which allowed for non-transparent funding of big projects. They mention the government losing control of technology after World War II and the presence of powerful black technology, including some from the Nazis. The speaker also talks about the creation of the CIA and its alleged crimes against citizens. They express concerns about the control of technology by corporations like Apple, Microsoft, and Tesla, and the monitoring of personal data. The video briefly mentions the existence of neural weapons and concludes by stating that these technologies are incompatible with life.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses the concept of mind control and its potential use by the CIA, Russians, and Chinese. It highlights the research of Dr. Michael Persinger, who believes that electromagnetic frequencies can be used to influence people's emotions and thoughts. The video also mentions a patent for a silent subliminal presentation system that claims to transmit information to the subconscious mind through audio frequencies. The speaker asks for viewers' opinions on whether they believe this technology is widespread and utilized in various forms of media. The transcript ends with a thank you to the viewers.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers discuss the concept of Satan and the use of neural weapons. They mention the birth of a biocommunications weapon called Temi in 1976, which originated from Nazi scientists in 1945. The CIA is accused of committing crimes against citizens worldwide and continuing the Nazi agenda of world domination through biofield modulation. The Russians also acquired this technology after World War 2. The speakers mention the weaponization of chatter bots and remote neural monitoring, which involves manipulating someone's neural network or EEG to control their emotions and actions. They explain the difference between EEG cloning and EEG heterodyning, which involve duplicating and manipulating someone's EEG for various purposes.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses controversial US patents related to directed energy weapons and mind control techniques. They mention patents from various years that involve manipulating brain states, emotions, and vital signs remotely. The speaker questions which government may be using these patents on its citizens.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript outlines major concerns about neuroscience and neuroweaponry, highlighting both technical advances and the risks they pose to privacy, security, and human autonomy. It begins with the potential to use nanoparticulate and aerosolizable nanomaterials as weapons that disrupt blood flow and neurological networks, and to deploy nanomaterials for implantable sensor arrays and real-time brain reading/writing without invasive surgery, as in DARPA’s N3D program (Next Generation Non-Invasive Neuromodulation). Advances in artificial intelligence are driving breakthroughs such as devices that can read minds and alter brain function to treat conditions like anxiety or Alzheimer's. This progress raises privacy concerns, leading to Colorado enacting a pioneering law that protects brain data as part of the state privacy act, analogous to fingerprints when used to identify people. The discussion notes that at-home devices, such as EarPods, can decode brainwave activity to determine whether someone is paying attention or their mind is wandering, and progress suggests it can already discriminate the types of attention (central tasks like programming vs. peripheral tasks like writing or online browsing). The narrative emphasizes that “the biggest question” is who has access to these technologies. It asserts that devices connected to AI can change, enhance, and even control thoughts, emotions, and memories. Brainwave patterns can be decrypted to convert thoughts to text, and patterns can reveal a person’s internal states. Lab-grade capabilities include reading brain activity from multiple regions and writing into the brain remotely, enabling high-resolution monitoring and intervention. The conversation underscores the sensitivity of brain data, with potential misuse by data insurers, law enforcement, and advertisers, and notes that private companies collecting brain data often do not disclose storage locations, retention periods, access controls, or security breach responses. A first-in-the-nation Privacy Act in Colorado is described as a foundational step, but more work remains. The discussion also covers the broader ecosystem: consumer devices, corporate investments by major tech companies (e.g., those that acquired brain-computer interface firms like Control Labs), and the emergence of ubiquitous monitoring through wearables and bossware in workplaces. There is concern about the ability to identify not just attention but specific tasks or intents, which raises questions about surveillance and control. Security and misuse are central themes. There are accounts of attempts to prime recognition signals (P300, N400) to reveal private data such as PINs without conscious processing. The possibility of hacking brain interfaces over Bluetooth is raised, along with debates about technologies that aim to write signals to the brain, potentially enabling manipulation or coercion. The potential for “Manchurian candidates” and covert manipulation is discussed, including examples of individuals who perceived voices or were influenced by harmful ideation. Finally, the transcript touches on geopolitical and ethical implications: rapid progress and heavy investment (notably by China) in neurotechnology, the risk that AI could be used to read thoughts and target individuals, and concerns about the broader aim of controlling narratives and people. There is acknowledgment of the difficulty in proving tampering with the brain and a warning about the dangerous, uncharted territory at the intersection of AI, neuroscience, and weaponization.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers discuss the concept of remote neural monitoring and psychotronic weaponry. They mention the creation of the CIA in 1947 and its involvement in crimes against citizens. The speakers also talk about the cataloguing and cloning of minds, with the Russians acquiring technology from Nazi scientists after World War 2. They mention the weaponization of chatter bots and the ability to manipulate someone's neural network or EEG remotely. This manipulation can control emotions, actions, and even clone thoughts or feelings.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion covers neuroscience as a potential weapon and the emerging technologies that enable reading from and writing to the brain. Key points include nanoparticulate aerosolizable nanomaterials that could disrupt blood flow or neural activity, and the use of nanomaterials to place electrodes in a head to create large arrays of implantable sensors and transmitters that can read from and write to the brain remotely, as in DARPA’s N3D program (next generation non-invasive neuromodulation). Advances in artificial intelligence are enabling medical breakthroughs once thought impossible, including devices that can read minds and alter brains to treat conditions like anxiety and Alzheimer's. These developments raise privacy concerns, leading Colorado to pass a first-of-its-kind law to protect private thoughts. Ear pods can pick up brainwave activity and indicate whether a person is paying attention or their mind is wandering, and there is debate about whether one can know what they are paying attention to. It is claimed that brain-reading technologies are accessible to the public and that technologies from companies like Elon Musk, Apple, Meta, and OpenAI can change, enhance, and control thoughts, emotions, and memories. Brain waves can be decoded to identify specific words or thoughts, and brain signals are described as encrypted, with AI able to identify frequencies for specific words. Data from brain activity is described as extremely sensitive, with concerns about data insurance discrimination, law enforcement interrogation, and advertiser manipulation, and with governments potentially altering thoughts, emotions, and memories as technology advances. Private companies collecting brain data are said to be largely unregulated about storage, access, duration, and breach responses, with two-thirds reportedly sharing or selling data with third parties. This context motivated Pazowski of the Neuro Rights Foundation to help pass Colorado’s privacy act inclusion of biological or brain data as identifiable information, akin to fingerprints. While medical facilities are regulated, private firms may not be, prompting calls for stronger privacy protections. There is evidence that devices have controlled or influenced the thoughts of mice in labs, and questions arise about whether at-home devices could influence human thoughts or attention. The discussion also notes the potential for brainwave-based attention monitoring in workplaces (early mentions of “bossware”) and the possibility that attention discrimination could extend to differentiating tasks like programming versus writing or browsing. There is skepticism about whether all passwords could be cracked by brain or quantum computing, and concerns about security risks: devices often communicate over Bluetooth, which is not highly secure, and some technologies attempt to write signals to the brain, raising fears about hacking. Experts emphasize the need to address these issues proactively given rapid progress and substantial investment, including a claim of one billion dollars per year spent by China on neurotech research for military purposes. The conversation touches on the potential use of AI voice in the head to reduce the ego and control individuals, and on cases where individuals report hearing voices or “demons” in their heads, linking to broader concerns about manipulation, “Manchurian candidates,” and covert weapons. Public figures discuss investigations, classified information, and the possibility that information about these weapons might be suppressed or tightly controlled, with ongoing debates about how to anticipate and counter these developments.

Video Saved From X

reSee.it Video Transcript AI Summary
- Speaker 0 and Speaker 1 discuss the possibility that a friend was murdered and suggest that both victims died suddenly from fast-moving cancer, a method they say the agency uses overseas to eliminate people. Speaker 1 admits he cannot prove this but notes the sudden deaths. - The conversation asserts that the US government has technology to infect people with fast-moving cancer and to perform cognitive and directed-energy warfare. Speaker 0 states the government has the technology to infect with fast-moving cancer and to do so absolutely. - In 1997, Speaker 1 describes a hearing on asymmetric threats where he chaired the research committee and focused on four threats: drones, cyberattacks, electromagnetic pulse (EMP), and cognitive warfare. He asserts that cognitive warfare is now being labeled by some as Havana syndrome and that directed-energy weapons are the underlying technology. - Speaker 2 recounts a recent homeland security hearing about foreign adversaries using direct weapons against US citizens, enabling incapacitation. He emphasizes the chilling nature of the briefing and criticizes current domestic leadership as foolish, corrupt, incompetent, and wicked. - Speaker 3 notes that up to 40% of the Air Force equipment budget in the 1990s was classified, making much of it “black.” He emphasizes that military and security research often precedes civilian medical science, and that servicemen were used in experiments without fully informed consent, referencing NK Ultra-era disclosures of thousands of service members used as subjects. - Speaker 4 discusses MKUltra, describing a Canadian experiment involving psychic driving with massive LSD doses, eye-tracking, and memory loss, funded by MKUltra and affecting civilians. He mentions Project Midnight Climax, where Johns were observed in brothels while subjected to LSD, and notes similar experiments by the British Royal Air Force and Army. The results of Midnight Climax are unknown, with no published after-action reports. - Speaker 3 adds that Secretary of Energy O’Leary stated under Clinton that over a half a million Americans had been used in human experiments over four decades without informed consent, including mind control, with no accountability. He argues that mind-control technology has advanced, and questions who should govern its use, given the lack of legal frameworks. - The discussion covers mind-effects research and the lack of treaties governing such technologies. They reference a European Parliament security and disarmament resolution (1999) addressing mind-effects and mind-control technology, and Russian Duma resolutions (2002) seeking similar safeguards. Zabigniew Brzezinski’s Between Two Ages is cited regarding electronically stroking the ionosphere to influence behavior over geographic areas, connecting it to HARP and other electromagnetic carriers capable of mass or individual influence. - Speaker 6 explains historical demonstrations of electronic mind control, starting with Jose Delgado’s remote manipulation of a charging bull using radio energy and electrodes, and notes later work showing noninvasive techniques to influence behavior using low-power magnetic fields. Speaker 7 reiterates Delgado’s animal studies and the potential for noninvasive methods to affect emotions and memory, with broader implications for humans. - Speaker 3 discusses the progression of research funded by DARPA and others toward higher-resolution control of brain activity, enabling controlled effects that override senses and create synthetic memories, raising questions about future justice and evidence. They describe European Parliament and NATO/US military interest in mind-control technologies and the absence of robust legal protections. - Speaker 9 presents advances in AI-enabled brain-reading and memory-altering devices, including mind-reading and emotion decoding, while Speaker 10 and Speaker 12 discuss privacy concerns, brain-data privacy laws (Colorado’s law adding brain data to privacy protections), and the availability of consumer devices that decode brainwaves. They warn that brain data can be misused by insurers, law enforcement, advertisers, and governments, with private companies often sharing data without clear disclosure. - The segment concludes with a note that devices can infer attention and thoughts, and that DARPA’s N3D program aims for noninvasive neuromodulation with implantable electrodes read/write capabilities. It references 1980s–1990s discussions of RF energy as a potential nonlethal mind-control technology, and a 1993 Johns Hopkins conference listing low-frequency weapons as attractive options.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the existence of a system that manipulates people through the use of secret electrical signals. They explain that the Department of Defense has a global information grid that monitors and controls human bodies through wireless body area networks. The speaker emphasizes that humans emit electromagnetic radiation and are part of the electromagnetic spectrum. They also mention the use of computer networks for electronic warfare and the routing of signals through human bodies. The speaker criticizes the lack of education on these topics and urges viewers to recognize the reality of these systems.

Video Saved From X

reSee.it Video Transcript AI Summary
There are four techniques and technologies that can transmit voices into someone's head, allowing for control through neuro linguistic programming. This is known as offensive information warfare. In the Gulf War, this method was used to convince the enemy to surrender by making them believe it was a spiritual entity speaking to them. Hyper game theory is another tactic used to manipulate people into irrational actions that may lead to their demise. Magnetically activated nanoparticles and sensors can control the brain by altering its patterns and pathways. Additionally, researchers at the University of California, Berkeley have developed a brain decoder device that can determine thoughts based on neural activity.

Video Saved From X

reSee.it Video Transcript AI Summary
Foreign adversaries are allegedly using direct energy weapons to incapacitate US citizens, as in the "Havana syndrome" cases. Neuroscience is being weaponized with aerosolizable nanomaterials that disrupt neurological activity, and DARPA's N3D program aims to create implantable electrodes for remote brain reading and writing. Experiments with radio frequencies on animal brains have been ongoing for decades. A captured Russian "LIDA machine" used flickering lights, sound, and electromagnetic oscillations to induce trance-like states in prisoners. Jose Delgado implanted circuits in animal brains in the 1960s, using RF to control behavior. By the mid-80s, he found that modulating the right frequency with low energy could alter behavior without implants. JF Gordon MacDonald proposed electronically stroking the ionosphere to affect behavior over large areas. Military documents from the early 1980s discuss mind control possibilities via RF energy. A 1982 Air Force report stated RF can disrupt normal behavior, and a 1987 report called for more research on RF as a nonlethal weapon. Remote brain monitoring and alteration have been possible for over 50 years, referencing a 1976 patent for an apparatus using electromagnetic energy to scan and affect brainwaves remotely. A 1994 US Air Force document discusses using pulsed electromagnetic energy to control emotions, produce sleep, transmit suggestions, and interfere with memory, even duplicating experiences in another individual. It's suggested that negative psychological states could be broadcast to populations.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the concept of novel neuro weapons, which have gained momentum due to increased understanding of the brain and the development of tools to access and affect it. These weapons can be used to target individuals covertly, affecting their brain functions and behavior. The speaker gives an example of lacing someone's drink with a low dose drug or toxin during a meeting, which can either incapacitate them or change their mindset. This can have ripple effects, such as influencing the behavior of the person's followers or fracturing trust within a population. The speaker also mentions the use of high morbidity neurobugs to cause psychological and physical symptoms in a targeted population. Additionally, the speaker discusses the potential use of nano particulate matter and controllable robotic units as undetectable and difficult to attribute weapons.

Video Saved From X

reSee.it Video Transcript AI Summary
Mind control and manipulation of humans is a reality. A video shows a rat being made to move against its will, demonstrating the technology's capabilities. This was two years ago, indicating that the technology was already advanced at that time. The RAND Corporation boasts about their ability to coerce and manipulate people to do things they wouldn't normally do. Psychotronic weapons and controlling people's minds are considered more powerful than nuclear bombs. Doctor Robert Duncan, who developed AI software for brainwave monitoring, revealed that every human's brainwaves are recorded and monitored via satellite. If someone uses more than 10% of their brain, they become a target. Despite sounding like science fiction, these claims are supported by evidence.

Video Saved From X

reSee.it Video Transcript AI Summary
This video discusses various technologies and methods used for mind control and manipulation. It mentions the ability to read and influence thoughts through brainwave analysis and remote neural monitoring. The speakers also discuss the use of voice-to-skull technology, forced speech, and the manipulation of thoughts and feelings. They highlight the importance of awareness and the need to educate psychiatrists about these technologies. The video also mentions the work of Dr. Rowney Kilde, who researched the effects of electromagnetic fields on the human body and was allegedly murdered for her findings. The speakers suggest that these technologies are part of a larger agenda for control by the New World Order and intelligence agencies.

Video Saved From X

reSee.it Video Transcript AI Summary
This transcript centers on the emergence of neuroscience and neurotechnology as potential weapons and the privacy, security, and ethical implications that accompany them. Key points include: - The novelty and viability of neuroscience as a weapon: nanoparticulate aerosolizable nanomaterials could be breathed in to disrupt blood flow and neurological network activity, usable as enclosed weapons or broad disruption tools. Nanomaterials could also enable electrodes to be inserted into a head to create vast arrays of viable sensors and transmitters. DARPA’s N3D program (next generation non-invasive neuromodulation) aims to create implantable electrodes that read from and write into the brain remotely in real time, without surgical brain insertion. - Advances in AI and neuroscience: artificial intelligence is enabling medical breakthroughs, including devices that can read minds and alter brains to treat conditions like anxiety or Alzheimer's. - Privacy concerns and protective legislation: as brain data becomes more accessible, privacy protections are seen as essential. Colorado passed a first-in-the-nation law adding biological or brain data to the state privacy act, akin to fingerprints if used to identify people. However, a study by the Neuro Rights Foundation found that two thirds of private brain-data–collecting companies are sharing or selling data with third parties, and most do not disclose storage location, retention periods, access, or breach protocols. - Widespread readiness and access to brain-decoding tech: devices on the Internet can decode brainwaves to varying degrees, and tech from companies like Elon Musk, Apple, Meta, and OpenAI could change, enhance, and control thoughts, emotions, and memories. Lab-grade systems can decode brain activity to turn thought into text; brainwaves are described as encrypted signals readable by AI. - At-home attention monitoring devices: EarPods and other wearables can detect whether a person is paying attention or their mind is wandering, and can discriminate between types of attention (central tasks like programming, peripheral tasks like writing, or unrelated tasks like browsing). When combined with software and surveillance tech, the precision increases. - Ethical and societal risk considerations: this technology raises concerns about data insurance discrimination, law-enforcement interrogation, and advertising manipulation. Government access could extend to altering thoughts, emotions, and memories as the technology advances. Privacy protections are described as a no-brainer by Pazowski of the Neuro Rights Foundation, who emphasizes that brain data represents “everything that we are,” including thoughts, emotions, memories, and intentions. - Real-world and speculative applications and threats: debates about whether devices can truly control thoughts; references to brain-reading in mice; concerns about bi-directional interfaces, remote writing signals to the brain, and potential co-optation by malicious actors. There are mentions of preconscious recognition signals (P300, N400) used in interrogations to identify recognition of a potential co-conspirator or weapon, potentially without conscious processing. - Surveillance versus autonomy and safety: discussions about bossware and ubiquitous monitoring in workplaces, plus the possibility that such monitoring could extend to controlling attention or even thoughts. - Security, hacking, and potential misuse: Bluetooth-enabled headsets, write-capable technologies like transcranial magnetic stimulation (TMS), and the risk of systems being hacked, underscoring the need to anticipate and mitigate misuse. - Global and political dimensions: comments on rapid progress (faster than expected), substantial military investment by China in neurotech, and concerns that AI integration with neuroweaponry could create new, uncharted information warfare. - Narratives of secrecy and manipulation: debates about why information is publicly released or withheld, the potential for misinformation, and the idea that these technologies could be used to “read our thoughts” and weaponize them, with implications for targeting, torture, and control of the narrative.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the National Security Act and the CIA Act passed in 1947 and 1949, which allowed for non-transparent funding of big projects. They mention the government losing control of technology after World War II and the presence of powerful black technology, including some from the Nazis. The speaker also talks about the creation of the CIA and its alleged crimes against citizens. They express concerns about the control of technology by corporations like Apple, Microsoft, and Tesla, and the monitoring of personal data. The video briefly mentions the existence of neural weapons and concludes by stating that the system Tammy and Satan are incompatible with life.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the National Security Act and the CIA Act passed in 1947 and 1949, which allowed for non-transparent funding of big projects. They mention the government losing control of technology after World War II and the presence of powerful black technology, including some from the Nazis. The speaker also talks about the creation of the CIA and its alleged crimes against citizens. They express concerns about the control of technology by corporations like Apple, Microsoft, and Tesla, and the monitoring of personal data. The video briefly mentions the existence of neural weapons and concludes by stating that the system Tammy and Satan are incompatible with life.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 questions whether wireless mind control exists, suggesting technologies available to the public, like ChatGPT, are far less advanced than what is secretly being developed. They ask if technology exists to "WiFi into your brain" or use Bluetooth for control. Speaker 1 believes "they" are trying to achieve wireless control, citing research into LRAD technology, which can transmit voices directly into a person's head. They suspect a project is underway to apply this technology to the entire population, potentially involving "intracorporeal bionano networks" that are syringe-injectable and self-assemble within the body. This is framed in medical terms, but Speaker 1 believes the intention is wireless control.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker talks about the criticism they receive online for sharing conspiracy theories. They mention reading patents and provide examples such as a patent from 2000 about manipulating the central nervous system and a patent from 2013 that controls brain state through electromagnetic patterns. They also mention a patent from 2014 that induces desired brain states through music files and a patent from 2002 that remotely transmits sound into targeted consciousness. The speaker highlights that the United States Air Force is the original assignee of one of these patents and questions whether the government would use such patents on its people.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker talks about how people often get called conspiracy theorists when they share things online. They mention reading US patents and provide examples of patents related to directed energy weapons, brain manipulation, and remote transmission of sound. The speaker highlights that one of the patents is assigned to the United States Air Force. They question whether the US government would use these patents on its own citizens.

Video Saved From X

reSee.it Video Transcript AI Summary
Sabrina Wallace, a former network engineer, discusses a 2013 college textbook on human interaction and emerging technologies, specifically lethal autonomous weapon systems. She claims that Skynet, a system from the movie Terminator 2, is deployed and autonomous since 2012, updated in 2017, and was signed off on by the current secretary of defense on January 25, 2023. According to Pentagon directive 3,009, there are no positive outcomes as a design criterion, only unintended engagement and loss of control. The speaker highlights the importance of trust in AI systems, referencing NIST's 2021 study on trust in AI. The Navy and Marine Corps are developing unmanned systems, including the MQ-25 Stingray and advanced targeting systems like Atlas. Wallace criticizes the misinterpretation of directive 5240.01, stating it doesn't authorize the military to raid homes and seize guns. She claims the real threat lies in Pentagon directive 3,009, which targets human bodies using body area networks and bioelectromagnetic algorithms. These systems, part of network centric warfare, use biosensors to monitor individuals and are connected to a government-secured cloud. She asserts that electronic and electromagnetic warfare, not physical force, is the current warfare doctrine, utilizing technologies like voice to skull and anomalous health incidents.

Video Saved From X

reSee.it Video Transcript AI Summary
I follow Pavlov's teachings. In 1945, a biocommunications weapon was brought by Nazi scientists. The CIA, established in 1947, continued the Nazi agenda using biofield modulation. The USSR tried to prevent an arms race in electromagnetic weapons but was rejected. They retaliated by microwaving the US Embassy, potentially using embassy staff as guinea pigs. The Department of Defense's ARPA conducted experiments on monkeys using concentrated microwave frequencies. In 1976, Tammy and Satan systems were created. Remote neural monitoring and psychotronic weaponry are terms used to describe the interaction with the human nervous system. Hunger and psychological responses were exploited to induce neurosis, similar to torture.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the National Security Act and the CIA Act passed in 1947 and 1949, which allowed for non-transparent funding of big projects. They mention the government losing control of technology after World War II and the presence of powerful black technology, including some from the Nazis. The speaker also talks about the creation of the CIA and its alleged crimes against citizens. They express concerns about the control of technology by corporations like Apple, Microsoft, and Tesla, and the monitoring of personal data. The video briefly mentions the existence of neural weapons and concludes by stating that these technologies are incompatible with life.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses how the National Security Act and the CIA Act allowed for non-transparent funding of big projects. They mention the government losing control of technology after World War II and the influence of black technology, including some brought over from the Nazis. The speaker also talks about the creation of the CIA and their alleged crimes against citizens. They express concerns about the power of companies like Apple, Microsoft, and Tesla, stating that everything done online is monitored and recorded. The video briefly mentions the use of neural weapons and concludes by stating that the system Tammy and Satan are incompatible with life.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the National Security Act and the CIA Act passed in 1947 and 1949, which allowed for non-transparent funding of big projects. They mention the government losing control of technology after World War II and the presence of powerful black technology, including some from the Nazis. The speaker also talks about the creation of the CIA and its alleged crimes against citizens. They express concerns about the control of technology by corporations like Apple, Microsoft, and Tesla, and the monitoring of personal data. The video briefly mentions the existence of neural weapons and concludes by stating that these technologies are incompatible with life.
View Full Interactive Feed