TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
I support Robert Kennedy Jr.'s call to restore the middle class and expose the power held by the matrix that has been built while we were unaware. The vast number of cell towers and satellites, many of which have been hacked, pose a threat as they can transmit directed energy weapons. It is crucial to be aware of this technology and learn how to protect ourselves. As a clinical scientist for 40 years, I have studied this at the cellular and molecular level. Directed energy weapons have been known since the 70s and 80s, but radiating people with microwave radiation at 2 gigahertz is a new development. This is equivalent to 4G technology and can be extremely harmful, like being placed in a microwave oven.

Video Saved From X

reSee.it Video Transcript AI Summary
John Warner, a security tester at Argonne National Laboratory, also spends his time hacking into real electronic voting machines. He explains that these machines are easily hackable due to their modular design. Roger Johnston, who leads Argonne's vulnerability assessment team, adds that the lack of security extends beyond the machines themselves. The warehouses where the machines are stored have weak security, and they are transported by low bid trucking companies with no background checks. This leaves ample opportunity for tampering. Johnston's team tested two machines and believes their demonstrated attacks could work on many others. The push for faster election results globally is increasing the demand for electronic voting machines, but if they are not secure, it could undermine the integrity of elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: My first in person hint of something amiss came while I was flying for the US marines prior to Operation Desert Storm. In 1991, on my way to the Persian Gulf conflict, my squadron of 10 A-6E Intruder attack jets landed at Diego Garcia, a top secret US Navy base smack in the middle of the Indian Ocean. While The UK retained sovereignty of the tiny island, The United States controls the island's military base through a 1966 lease agreement and the majority of the personnel on the base are US Navy. I had already been briefed that no outside press was ever allowed at Diego. That immediately put my radar on high alert, wondering what I would find there. But after an uneventful landing, I was completely perplexed. There was nothing there, nothing I could see which of course only heightened my curiosity. Having read enough top secret intelligence briefs, I knew you didn't place a single runway airfield on a no press top secret status unless something at that location required a stringent security veil. The US naval support facility at Diego Garcia is a tiny airfield with a few hangars along the main runway, nothing more or at least that is the only visual I was presented with. While refueling my jet, was intrigued by a huge construction crane working nearby with its main cable going down deep into the ocean. I assumed it was being used to set concrete far down in the depths for future surface structures. I had no idea standing on a tarmac in 1991 only a few 100 feet below me was an active colossal spaceport for the German dark fleet and the American black navy. For those unfamiliar with military secret protocols, think deep black ops equals US black navy. The US black navy is an above top secret unit that supports ongoing space operations at the Diego deep underground military base, DUMB. The multi level deep underground military base was identified by whistleblower Tony Rodrigues as the same port his German space freighter, the Max von Low used as a hub for transporting materials to and from various planets in our solar system. The spaceport and Dummit Diego Garcia were also confirmed by a former black navy assassin during online interviews. The assassin's years working in the Dummit and spaceport at Diego corroborate in both time and description with Rodrigues' supply runs aboard the Max von Low at the Diego Complex. Tragically, Diego Garcia was also the final destination for Malaysian flight three seventy and its passengers and crew. This was confirmed not only by an SOS sent from the Diego Airfield by Philip Wood, a former IBM executive on the ill fated flight, but also verified by the navy assassin who witnessed the hasty disassembly of that jet on the tarmac at Diego Garcia. In addition, top secret National Reconnaissance Office NRO videos leaked online by a former navy lieutenant commander only days after the flight showed Malaysian three seven zero being tracked by two black ops US Reaper drones moments before its disappearance. To make this clear and simple for the non military reader, America's top intelligence services would not order the US air force to track a civilian Boeing seven seventy seven commercial jet with two ultra top secret surveillance platforms on its final flight unless they wanted someone or something on that jet. Period. On the flight were 20 American engineers of Chinese descent working for Freescale Corporation, a Texas based semiconductor firm. All had been coerced by the Chinese government to defect. Those employees carried American technology with them and were on their final leg to Beijing when the cabal struck. Assisted by America's top intelligence services, the cabal hijacked the flight ensuring that all the defectors, their American technology and the innocent passengers and crew were returned to the US Navy base at Diego Garcia in late two thousand fourteen when the MH three seventy cockpit voice transmissions had gone viral. I sat perplexed at home listening over and over. Being a former combat jet pilot, I was shocked that no investigators were calling out what was to me, a clear switch in the cockpit voice just after lift off. The deep Asian accent of copilot Hamid was suddenly no more, and the new voice that replaced it was undeniably American in accent and delivery and a man stuttered on the call sign of MH370 for the rest of the flight, yet nobody was noticing it. I knew then, without a doubt, the jet had been taken, that covert work had been completed and the post investigation was being controlled. To this day, you can listen to them online. Benjamin R Water's clearly American accented radio calls are first heard at 12:42 zero 5AM just after lift off and continue for the rest of the flight and those transmissions intrigued me for years until Ben was identified by tech experts investigating encrypted pings that somehow had never been decrypted. The hijacking and takeover of flight three seventy by a cabal hijacking crew began during initial taxi and culminated with both Asian pilots being executed only seconds after lift off by CIA operative and pilot Benjamin R Waters. The CIA ensured Ben's name was absent from the plane's manifest as well as absent from any early media coverage after the jet's disappearance. His name was only flagged after an international passenger audit cross referenced travel manifest with known personnel in US defense databases. According to the ticket logs, Ben booked his seat less than twelve hours before takeoff using an internal travel portal typically reserved for military contractors on discretionary assignments, then boarded using a fake Ukrainian passport. But the flaw in the cabal's plan came from their assumption that the satellite connected technology Ben wielded would be impossible to intercept. Ben's communications would remain encrypted. But fortunately for all of us, Ben's communications from the jet had now been identified and decrypted. Even when MH370 had no active WiFi and no satellite uplink accessible to passengers and the jet was presumed well beyond communication range, Ben's communications had pinged a nearby satellite and been recorded. Those burst style data packets sent up flags during the post disappearance investigation with tech experts across the globe. At first disregarded as satellite noise until experts realized, under scrutiny of the signal, that they were actual burst transmissions from an individual on the flight. The data transmissions attributed to Benjamin R Waters were unlike anything expected from a commercial aircraft in a total blackout, not formatted like casual data logs or cached GPS information. Instead, Ben's transmissions were a multi art file split into six fragments with each fragment encrypted. Ben was sending out bursts via satellite that cyber security experts identified as nested SHA-three hashing, a level of encryption consistent with military grade systems and all of this was discovered just as Ben's background check came through as a known CIA subcontractor and operative. Ben, it turns out, was interlinked. Think of technology embedded in the brain and then you're getting the picture. Ben was controlled by handlers via satellite link all the way from Virginia. His movements and communication had been deciphered and corroborated precisely in time and burst location with his American accented voice as the only person transmitting from the cockpit of mh three seventy once the flight became airborne.

Video Saved From X

reSee.it Video Transcript AI Summary
Vault 7 is the biggest intelligence leak ever, with less than 1% of the material published so far. It reveals that the CIA has created its own version of the NSA focused on hacking. They develop viruses and trojans to infiltrate people's devices and collect information for the CIA. This information can be used to falsely implicate someone in a crime. The CIA's budget has increased, giving them more power, and they now have their own drone fleet and hacker squad. Unlike the NSA, the CIA targets endpoints instead of intermediaries, bypassing encryption. If a phone is hacked, encryption becomes irrelevant as the information is gathered before or after encryption.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is as important as addressing pandemics and nuclear war. Scientists, creators, and academics recognize the potential benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, effectively covering most of the Earth's land mass. Pine Gap analysts locate targets by tracking their communication signals, such as mobile phones, and relay the information to military centers in the US. The US government needs to address concerns about a high-powered microwave weapon that can harm a target's nervous system. Neural weapons, like SATAN, have been used for silent assassinations. Additionally, technology exists to read an individual's thoughts through radio frequency signals and the microwave auditory effect.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion covers neuroscience as a potential weapon and the emerging technologies that enable reading from and writing to the brain. Key points include nanoparticulate aerosolizable nanomaterials that could disrupt blood flow or neural activity, and the use of nanomaterials to place electrodes in a head to create large arrays of implantable sensors and transmitters that can read from and write to the brain remotely, as in DARPA’s N3D program (next generation non-invasive neuromodulation). Advances in artificial intelligence are enabling medical breakthroughs once thought impossible, including devices that can read minds and alter brains to treat conditions like anxiety and Alzheimer's. These developments raise privacy concerns, leading Colorado to pass a first-of-its-kind law to protect private thoughts. Ear pods can pick up brainwave activity and indicate whether a person is paying attention or their mind is wandering, and there is debate about whether one can know what they are paying attention to. It is claimed that brain-reading technologies are accessible to the public and that technologies from companies like Elon Musk, Apple, Meta, and OpenAI can change, enhance, and control thoughts, emotions, and memories. Brain waves can be decoded to identify specific words or thoughts, and brain signals are described as encrypted, with AI able to identify frequencies for specific words. Data from brain activity is described as extremely sensitive, with concerns about data insurance discrimination, law enforcement interrogation, and advertiser manipulation, and with governments potentially altering thoughts, emotions, and memories as technology advances. Private companies collecting brain data are said to be largely unregulated about storage, access, duration, and breach responses, with two-thirds reportedly sharing or selling data with third parties. This context motivated Pazowski of the Neuro Rights Foundation to help pass Colorado’s privacy act inclusion of biological or brain data as identifiable information, akin to fingerprints. While medical facilities are regulated, private firms may not be, prompting calls for stronger privacy protections. There is evidence that devices have controlled or influenced the thoughts of mice in labs, and questions arise about whether at-home devices could influence human thoughts or attention. The discussion also notes the potential for brainwave-based attention monitoring in workplaces (early mentions of “bossware”) and the possibility that attention discrimination could extend to differentiating tasks like programming versus writing or browsing. There is skepticism about whether all passwords could be cracked by brain or quantum computing, and concerns about security risks: devices often communicate over Bluetooth, which is not highly secure, and some technologies attempt to write signals to the brain, raising fears about hacking. Experts emphasize the need to address these issues proactively given rapid progress and substantial investment, including a claim of one billion dollars per year spent by China on neurotech research for military purposes. The conversation touches on the potential use of AI voice in the head to reduce the ego and control individuals, and on cases where individuals report hearing voices or “demons” in their heads, linking to broader concerns about manipulation, “Manchurian candidates,” and covert weapons. Public figures discuss investigations, classified information, and the possibility that information about these weapons might be suppressed or tightly controlled, with ongoing debates about how to anticipate and counter these developments.

Video Saved From X

reSee.it Video Transcript AI Summary
Good morning. John McAfee here. Let’s talk about privacy. If you think encrypted systems like ProtonMail or Signal offer you privacy, you’re mistaken. Encryption was designed to prevent man-in-the-middle attacks, but that’s no longer the issue. Your smartphone is the primary surveillance tool for governments worldwide. Malware can easily be installed just by visiting certain websites, allowing attackers to monitor your inputs and outputs, rendering encryption ineffective. I use Gmail because it requires a subpoena for information, giving their lawyers 30 days to review it. That’s enough time for me to change my email frequently. Wake up—privacy is a myth, and encryption is outdated technology being falsely marketed as safe. Thank you for listening.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Nature is vital to our existence, offering essential resources and a home for wildlife. From the air we breathe to the food we eat, our ecosystems are essential to life on Earth. But as we embrace modern conveniences, such as wireless technology, we're introducing massive amounts of electromagnetic radiation into our environment. How does this invisible toxin affect the natural world we depend on? Let's explore. Wireless radiation, also known as radio frequency or RF radiation, is emitted by devices like cell phones, Wi Fi routers, and cell towers. It's all around us, helping us stay connected and communicate seamlessly. Both humans and animals rely on the Earth's natural electromagnetic field. The rapid expansion of wireless network technologies, like five g and the Internet of Things network, introduce new foreign electromagnetic signals, disrupting nature's delicate balance. The increasing presence of wireless radiation in our environment raises concerns about its impact on wildlife. Birds, bees, and other creatures rely heavily on natural electromagnetic fields for navigation and communication. What happens when these fields are disrupted? Studies show that birds experience disorientation due to interference with their magnetic navigation systems. This can lead to migratory disruptions and other behavior changes. Bees, crucial pollinators in our ecosystem, are also affected. Research indicates that exposure to wireless radiation decreases the colony strength and egg laying rates of bees. And it's not just animals and insects, plants too are affected by wireless radiation. Studies show that wireless radiation exposure damages trees, shortens plant lifespans, and contributes to rapid species decline. The underwater Internet of Things network, also known as the smart ocean, is a growing network of underwater devices and technologies that collect and transmit data beneath the ocean's surface. The wireless signals emitted by the underwater IOT network are completely audible to marine life and will become an inescapable torture chamber for ocean habitants such as dolphins and other marine mammals that use sonar and sound waves to navigate, communicate, feed, and reproduce. Wireless networks have significantly increased the radio frequency or RF environment on Earth by at least 10 to the eighteenth times. Additionally, five g deployment and other new internet services will require tens of thousands of additional satellites to be launched into Earth's atmosphere, which has already been shown to produce bright lights in the night sky and may produce, as of yet unknown, environmental consequences. Wireless radiation is a part of our modern world, and its convenience is undeniable. However, understanding and mitigating its environmental impact is essential for the health of our planet. Together, we can ensure that our technological progress does not come at the cost of our natural world. CHD's electromagnetic radiation and wireless team is fighting back against involuntary radiation exposure from wireless tech and the privacy invasion that comes with it.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
Wi-Fi, an electromagnetic radiation, can be used to carry data and recognize silhouettes behind walls. Software can track people through wireless signals, identifying individuals by skeletal shape and measuring breathing/heart rate. AI can reconstruct images of people in a room using only Wi-Fi signals, turning routers into cameras that track living beings. Social media posts claim Hitachi's SmartDust chip can track people via GPS if consumed, but searches reveal the chip is an RFID chip without GPS capability and is not meant to be injected or absorbed into the human body. These chips can be used in securities, identification, preventing counterfeiting, and displacing ingredients. Amazon Sidewalk is a shared network using technologies like LoRa to maintain device connectivity even amidst disruptions. It allows remote control of devices and can be used to locate lost items, detect motion, track packages, sense air quality/water leaks, and monitor security. Amazon is opening Sidewalk to developers.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker demonstrated how they were able to boot up the Electionware system on a non-conforming laptop, highlighting violations of security protocols. They revealed that default passwords for election machines are easily accessible online, posing a significant security risk. The speaker emphasized the urgent need for updating security measures and changing passwords to enhance election security. They also pointed out the lack of antivirus protection on crucial election machines, putting counties at risk. The speaker concluded by stressing the importance of immediate action to address these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker was surprised to learn about Gwen Towers from Alexa. Gwen Towers, or the Ground Wave Emergency Network, are used to protect US communications during a high altitude nuclear explosion. They operate on low radio waves and are a backup when regular radio is disrupted.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is crucial, just like addressing pandemics and nuclear war. Scientists, creators, and academics recognize the immense benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, effectively covering most of the Earth's land mass. Pine Gap analysts locate targets by tracking their communication signals, such as mobile phones, and send the information to military centers in the US. The US government needs to address concerns about a high-powered microwave weapon that can harm a target's nervous system. Neural weapons, like SATAN, have been used for silent assassinations. Additionally, technology exists to read an individual's thoughts through radio frequency signals and the microwave auditory effect.

Video Saved From X

reSee.it Video Transcript AI Summary
A new statute was proposed to make it a misdemeanor to knowingly take classified information from secure systems. Our investigation also looked into possible computer intrusions by nation states or hostile actors. It's important to note that Secretary Clinton used multiple servers and administrators during her time at the state department.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Five major threats make the grid extremely vulnerable: cyber, hackers, physical threats, solar EMP, and man-made EMP. The concern is that when they hear the risk analysis, officials may hear it but won’t take action. Speaker 1: There are 18 critical infrastructures in the United States (food, water, transportation, communications, etc.). All 17 of the others depend on electricity. Speaker 2: If our grid goes down, you can't cook, you can't heat anything, you can't run medical supplies, you can't talk on your phone, you can't take money out of a bank, and we turn into total chaos. Speaker 3: If this happens, the system stops. Stops. Speaker 2: If a transformer is taken down, we have to order it from Germany or China. It's going to take a year. Speaker 1: Up till recently, there were no comprehensive protective solutions available. Speaker 4: We know what the solutions are. They're not expensive. They're not difficult to employ. We just need the political will to do it and the follow through on the part of the electric utilities to get it done. Speaker 3: The White House is protected from an EMP. The congress and the CIA and the NSA, all of the areas that need to function at the government are protected. So why can't we be protected? Speaker 1: Around some of these facilities, you don't have much more than a chain link fence to keep people out. That seems absurd to me. Speaker 5: I think it is absurd when we now know that attack on as few as nine grid substations could bring down all three major interconnections for The United States grid. Speaker 3: If the power goes out, you get the generator. And if that goes out, you get another one. There's never been a plan for what happens after that. Speaker 1: Director of the National Security Agency, Admiral Rogers, came out and said, it's not a matter of if, it's a matter of when.

Video Saved From X

reSee.it Video Transcript AI Summary
Our technology teams discovered a concerning issue with connected devices at a polling location. Despite the devices not supposed to have Wi-Fi, they were found to be communicating in real time, both receiving and sending data. This should never happen, and we have documented the incident. We cannot disclose the location, but we have confirmed it in multiple places. There are three types of machines involved: a scanner, a ballot marking device, and a polling pad. The communication is happening through the polling pad, which is used for checking everything. This access could potentially allow someone to manipulate and modify the data being exchanged in the system.

Video Saved From X

reSee.it Video Transcript AI Summary
If you remove the battery from your phone, I can still listen to you. In the past, even with the battery out, I could eavesdrop. We used to do undetectable things. This capability is in all equipment and chips, which we mostly get from China.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is crucial, just like addressing pandemics and nuclear war. Scientists, creators, and academics recognize the immense benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, essentially monitoring most of the Earth's land mass. Pine Gap analysts locate targets by tracking their communication signals, such as mobile phones, and send the information to military centers and drone pilots. There are concerns about a high-powered microwave weapon that can harm an enemy without leaving evidence. The US government needs to address these concerns. Neural weapons, like SATAN, have been used for silent assassinations, and there are claims of technology that can read thoughts by tuning into an individual's DNA frequency.

Video Saved From X

reSee.it Video Transcript AI Summary
Let me tell you about how your phone works because it's related to how they log into your body. This has been going on for a long time, using radio frequency to interact with our biofields, which make up 80% of our immune system. They're hacking into our cells, changing them for transhumanism and life extension. Since 2005, coders have been working with biosensors for cybersecurity in digital IDs, using the human body for signals. They told us energy work and auras weren't real, but they're using our neurons for AI, pulling them out of our bodies and storing them in chipsets. Your body is now a wide body area network, accessible via web portals, where they perturbate cell structure. This leads to psionic abilities, but they'll try to take them away by logging into you with Geomancer, electrocuting the air molecules around your head, and hitting you with a terahertz bullet.

Video Saved From X

reSee.it Video Transcript AI Summary
Mitigating the risk of AI extinction is crucial, comparable to addressing pandemics and nuclear war. Scientists, creators, and academics recognize the immense benefits and dangers of AI. Pine Gap and Men With Hill Base are satellite bases that collect vast amounts of digital data from various sources. Pine Gap focuses on the north and west, while Men With Hill Base covers the south and east, ensuring extensive coverage of Earth's land mass. Pine Gap analysts locate targets by tracking communication signals, such as mobile phones, and relay the information to military centers and drone pilots. A high-powered microwave system weapon can harm enemies over time without leaving evidence. Neural weapons, like SATAN, have been used for silent assassinations. Additionally, technology can be used to read individuals' thoughts by tuning into their DNA's resident frequency.

Video Saved From X

reSee.it Video Transcript AI Summary
You might wonder how a signal reaches only me when I'm next to someone else. Think about when your phone rings at a table – do the phones of those around you also ring? That's how. The body is targeted using bioelectromagnetic algorithms. These algorithms measure the body's bioelectricity, perturbing the human biofield with biological signals. These bioelectromagnetic algorithms are incorporated into machine learning classifiers. The machine learning reads what's happening under your skin and reports it to a database, your digital twin. The Department of Defense has been developing this for fifty years. These biosensor systems are very robust and part of our network-centric warfare doctrine.

Video Saved From X

reSee.it Video Transcript AI Summary
Since 2005, kill box technologies have been targeting you within a perimeter using geofences, geocaching, drop locations, and electronic warfare databases. Terahertz bullets can stop your heart, or other harmful actions because you connected everything to the cloud, created algorithms, instilled fear of aliens, anticipation for Jesus, and feigned ignorance about 5G while standardizing and fully deploying it with the BioCyber interface. After enduring this for three years, I will no longer tolerate your lies about deployment.

American Alchemy

“A US President Was Briefed on UFOs!” (Ft. Eric Davis)
Guests: Eric Davis
reSee.it Podcast Summary
The witness opens with a blunt stance on testimony: 'The only way I'll testify, actually the reality is, is in a classified setting.' He recounts harassment of Dave Grusch after whistleblower actions, including threats, a leak of his PTSD episode, and HIPAA violations used to attack his character, noting pro bono legal support through the UAP Disclosure Fund. He says he briefed the Senate Select Committee on Intelligence staff and the Senate Armed Services Committee staff in classified settings (2019, 2022) and that follow‑ups were not arranged; he also notes that Dave Grusch 'found everything' by building on Hal Puthoff’s material, with Grusch identifying '40 witnesses,' two of whom are in the same building, though most remain unnamed. He describes ASAP and AATIP connections to the NRO liaison to the UAPTF, and explains that SKIFF environments and contractor networks house a lot of unique information not publicly discussed. He references four legacy firms, multi‑agency WINPAC, and the broader ecosystem of contractors, government customers, and compartmentalization that sustains these programs.

a16z Podcast

a16z Podcast | Securing Infrastructure and Enterprise Services
Guests: Frederic Kerrest, Brad Peterson, Dominic Shine
reSee.it Podcast Summary
In this a16z podcast episode, Okta CEO Frederic Kerrest, News Corp CIO Dominic Shine, and NASDAQ CIO Brad Peterson discuss securing infrastructure across mobile and IoT. Shine emphasizes the need for journalists to access systems anytime, anywhere, while remaining vigilant against potential cyber threats, especially during politically sensitive times. Peterson highlights the transformative potential of blockchain for exchanges, advocating for a shift towards distributed record-keeping to enhance efficiency and reduce costs. Both executives stress the importance of balancing innovation with security, particularly as organizations expand their mobile capabilities. They acknowledge recent security breaches as wake-up calls, urging collaboration with partners to mitigate risks. The conversation also touches on the evolving landscape of financial services, emphasizing the need for robust security measures and the importance of monitoring vendor security standards. Overall, the discussion underscores the critical intersection of technology, security, and operational efficiency in today's digital landscape.
View Full Interactive Feed