TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker describes digitally verified ID and its growth in China. In China, a traffic camera can catch you jaywalking, and the digital ID system has your blood, genetic code, and photograph, plus it can identify how you walk. So even without a visible face, you can be picked up by gate. It will convict you of jaywalking and take money out of your bank account with no intermediating judiciary at all and show a picture of you to the people in the neighborhood, so they know that you have jaywalked and reduce your social credit score. If your social credit score falls below a certain level, then you can't you can't buy drinks from a vending machine. You can't play video games. You can't go on a train. You can't get out of your fifteen minute city. All that's already in place in China. Do you think that that's that would be helpful or unhelpful? It would be I think it would bring in and has already in China. I think it'll bring in a totalitarian tyranny. So 100% complete that it would make George Orwell's 1984 look like a picnic.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: What about the public attitude held by millions of everyday Americans? All I've got on a computer is pictures of my family, CCTV cameras that are prevalent in a ton of American cities and overseas capitals. Those cameras are your friend if you're innocent and have nothing to hide. Speaker 1: Well, I'd say that's very much what the average Chinese citizen believed or perhaps even still to this day believes. But we see how these same technologies are being applied to create what they call the social credit system. If any of these family photos, if any of your activities online, if your purchases, if your associations, if your friends are in any way different from what the government or the powers that be of the moment would like them to be, you're no longer able to purchase train tickets. You're no longer able to board an airplane. You may not be able to get a passport. You may not be eligible for a job. You might not be able to work for the government. All of these things are increasingly being created and programmed and decided by algorithms, and those algorithms are fueled by precisely the innocent data that our devices are creating all of the time constantly, invisibly, quietly right now. Our devices are casting all of these records that we do not see being created, that in aggregate seem very innocent. Even if you can't see the content of these communications, the activity records, what the government calls metadata, which they argue they do not need a warrant to collect, tells the whole story. And these activity records are being created and shared and collected and intercepted constantly by companies and governments. And ultimately it means as they sell these, as they trade these, as they make their businesses on the backs of these records, what they are selling is not information, what they are selling is us. They're selling our future. They're selling our past. They are selling our history, our identity, and ultimately, they are stealing our power.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that for many years, dating back to the 1990s, looking at China today reveals what might be planned for the West tomorrow. In particular, China has millions of cameras in the cities equipped with facial recognition technology, enabling them to locate you in minutes wherever you are. This system operates alongside a social credit framework: people earn points for behaviors that align with the government’s preferences and lose points for actions that don’t. If you lose enough credits, you are excluded from mainstream society. The speaker notes that during the COVID-19 period, people who refused to get the jab or to wear masks were excluded from mainstream society, describing that as a pre-run or preview of where society could be headed. The argument is that, in China, losing enough credits means you cannot board trains or planes and you cannot function within mainstream society. The speaker contends that this social credit system is rapidly moving into the West, facilitated by digital identity, digital currency, and AI-driven control over many aspects of life. The transcript highlights examples of ongoing surveillance- and control-related measures in Western contexts, such as supermarkets that require a QR code for entry. It questions what happens to those who do not want to participate in such a system, asking what if someone doesn’t have a smartphone. It notes that in some cases, entry to places like supermarkets could be denied if you lack the required digital credentials. The speaker also points out that payments might be made with a fingerprint, indicating that this is part of a broader shift toward pervasive digital and biometric controls. Overall, the speaker presents a narrative in which China’s social credit and pervasive surveillance serve as a template for Western adoption, suggesting a future where digital IDs, digital currencies, AI governance, and biometric verification create a tightly controlled social order, with access to everyday activities and services contingent on compliance with the system.

Video Saved From X

reSee.it Video Transcript AI Summary
Eric Prince and Tucker Carlson discuss what they describe as pervasive, ongoing phone and device surveillance. They say that a study of devices—including Google Mobile Services on Android and iPhones—shows a spike in data leaving the phone around 3 AM, amounting to about 50 megabytes, effectively the phone “dialing home to the mother ship” and exporting “all of your goings on.” They describe “pillow talk” and other private interactions being transmitted, and claim that even apps like WhatsApp, which is marketed as end-to-end encrypted, ultimately have data that is “sliced and diced and analyzed and used to push … advertising” once it passes through servers. They argue that this surveillance is not limited to phones but extends to other devices in the home, including Amazon’s Alexa and automobiles, which they say now have trackers and can trigger a kill switch, with recording of audio and, in many cases, video. The speakers contend this situation represents a monopoly by a handful of big tech companies that can use the collected data to control markets, dominate, and vertically integrate the economy, potentially shutting down competitors. They connect this to broader concerns about political power, claiming that the data profiles built on individuals enable manipulation of public opinion, messaging, and even election outcomes. They reference banking data, noting that banks like Chase have announced selling customers’ purchasing histories to other companies, as part of what they call a broader data-driven power shift. The discussion expands to warnings about a “technological breakaway civilization” operating illegally and interfaced with private intelligence agencies to manipulate, censor, and steal elections. They argue that AI, capable of trillions of calculations per second, magnifies these risks and increases the ability to take control of civilization. They reference geopolitical events, such as China’s blockade of Taiwan, and claim that microchips sold internationally have kill switches that could disable critical military and infrastructure. They speculate about the capabilities of NSA, Chinese, Russian, or hacker groups to exploit this vulnerability, describing a world in which the infrastructure is exposed like Swiss cheese to criminals and governments. Throughout, the speakers criticize the idea that technology is neutral, asserting instead that it has been hijacked by corrupt governments and corporations. They contrast these concerns with Google’s founding motto “don’t be evil,” claiming it was contradicted by later documents showing CIA involvement and In-Q-Tel’s role, and they warn that a social-credit, cashless society rollout could be enforced by private devices rather than drones or troops. The segment emphasizes education of Congress, state attorneys general, and the public about these supposed threats. Note: Promotional product endorsements and sponsor requests in the transcript have been omitted from this summary.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartphones are constantly connected to cellular towers, even when the screen is off. They emit radio frequency emissions to communicate with the nearest tower, creating a record of the phone's presence. This data is stored and can be accessed by companies and governments for surveillance purposes. The problem is that users have no control or visibility over what their phones are doing at any given time. Hacking is a common method used to gain access to devices, allowing attackers to control and collect personal information. Companies like Google and Facebook also collect and store user data, which can be accessed by governments. The lack of transparency and control over data collection poses a threat to privacy and individual power. Trust in technology is limited.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the growing collaboration between government and corporations in restricting individual freedoms. They highlight China's extensive surveillance system and social credit system as examples of this control. The speaker warns that Western societies are heading in a similar direction due to technological advancements and the desire for security. They emphasize the dangers of digital identity, surveillance, and manipulation by both corporations and governments. The potential for a surveillance state and loss of personal autonomy is a significant concern.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that a Mussolini-quote about fascism being corporatism explains today’s emerging fascist state in America, describing a system where the government merges with corporate power. He notes a prior report on digital ID deployment by private companies with customer consent, claiming the government can collect and utilize data under legal immunity while avoiding a mandate on biometric ID. He asserts that, as during COVID, individuals can choose to consent or “leave the reservation” to fend for themselves. He introduces the idea that the social credit score is actively deployed in the US. Speaker 1 shares a personal experience about ordering food on Uber Eats and noticing an algorithm determining prices based on personal data, prompting reflection on how pricing works. Speaker 0 explains that Communist China’s social credit system, launched in 2014 to “build trust in society by punishing individual behavior,” allows banks to shut off money and restrict travel, enabling the government to condition behavior individually. He claims this is now being deployed in the United States as algorithmic pricing, using automated programs to dynamically set the price of goods and services in real time and on an individual basis. The algorithms rely on large amounts of data, including customer behavior, and can charge one individual more than another for the same product based on willingness to pay and personal data. He asserts that the social credit score is present across the US, and the New York Algorithmic Pricing Disclosure Act (launched 11/10/2025) compels private corporations to notify consumers that they are being charged based on personalized algorithmic pricing. The law defines personal data as any data that identifies or could be linked to a specific consumer or device, regardless of whether the data was voluntarily provided. He says this makes every aspect of life usable to determine pricing, calling the act the first of its kind and predicting expansion to all 50 states. He concludes that the social credit score is real in America and suggests a carbon tax is soon to follow. He also mentions an “AI run cryptocurrency economy” as the United States government’s and big banks’ chosen solution in response to debt and AI competition. Speaker 2 presents a scenario for 2027: special economic zones with zero red tape, with government intervention to accelerate progress. Speaker 3 adds that the promise of vast gains could attract governments to these zones despite protests from workers who would lose jobs and rely on universal basic income, suggesting trillions in new wealth as a compelling incentive. He notes the ongoing arms race with China and the ease with which forecasts could influence presidential decisions, especially when contrasted with regulatory delays. Speaker 0 closes with attribution to Greg Reese.

Video Saved From X

reSee.it Video Transcript AI Summary
Smart devices and wireless networks are connecting everything from lights to cars, promising safety and convenience. However, there is a darker side to this technology. Our streets, mobile phones, and cities are spying on us, setting us up to be tracked and monitored. By surrendering our data, we are giving away the ability to control our behavior, leading to a social credit score. Central Bank digital currencies will further restrict our spending, and digital IDs will become mandatory, already being implemented in Australia, Canada, Scotland, and other countries. Without a digital ID, we will lose access to government services, travel, healthcare, and the internet. Australians are unknowingly heading towards a dystopian digital future.

Video Saved From X

reSee.it Video Transcript AI Summary
Your phone is not just a phone. It is the result of research that captures your attention, creating a power imbalance where you are unaware that you are being constantly monitored. They gather maximum information about you, surveilling you 24/7. In return, they know you so well that they can not only predict things about you but also manipulate your behavior. The internet of things will do the same.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker argues that AI excels at simulating anything that can be expressed mathematically, and since financial transactions can be expressed mathematically, AI can be used to monitor and influence financial behavior. The core concern is that with programmable money and close tracking of individuals, it becomes possible to turn money on and off and to use AI and surveillance systems to manage and control behavior. The speaker gives a provocative example: a question about what happens if authorities demand a transgender change for a child or threaten to turn off money, illustrating a system in which programmable money is integrated with surveillance and behavior-modification mechanisms. The proposed system would enable surveillance, tracking, and conditional access to money—financing incentives or penalties tied to behavior—and could be integrated with digital ID. The speaker argues that once programmable money is paired with digital identity, it amounts to complete control. This is framed as a problem because, on a global scale, there are divide-and-conquer tactics masking the underlying issue: a political struggle between the mega rich and everyone else. According to the speaker, the megacorporate or ultra-wealthy perspective would try to control the many when they are few, and programmable money is the tool to achieve that control. The claim is that for programmable money to function effectively, everyone must be on the grid, allowing the system to track and observe behavior and influence it, thereby exerting total control. The speaker emphasizes that this is not limited to wearables or an Internet of Bodies; it represents a coup d'etat and the end of human liberty in the West. Key points emphasized include: - AI’s strength in simulating mathematically expressible phenomena, including financial transactions. - Programmable money enabling on/off control of individuals’ finances when coupled with surveillance. - The potential for incentives and penalties to be tied to behavior through money. - The necessity of a digital ID to realize complete control. - The notion that such a system is tied to political and economic power dynamics between the mega rich and others. - The idea that universal inclusion on the grid is required for programmable money to work, leading to pervasive tracking and behavior influence. - The assertion that this would constitute a coup d'etat and threaten the end of human liberty in the West.

Video Saved From X

reSee.it Video Transcript AI Summary
A man was locked out of his smart home because his smart device detected audio it deemed racist. This incident highlights the power of smart devices and terms of service agreements, as they can restrict access to our homes. In Australia, a politician warns that smart cities equipped with face recognition, cameras, and license plate readers will enable constant tracking of individuals. Additionally, with the introduction of centralized bank digital currencies, our spending will require approval, potentially leading to exclusion from government services, healthcare, vacations, and the internet. This could result in a new form of societal exclusion resembling gulags.

Video Saved From X

reSee.it Video Transcript AI Summary
Age verification is a normalisation of identification, the introduction of digital surveillance, and the end of privacy. It is described as giving the state and corporations excessive powers and creating more KYC honeypots. The speaker says we should fight that because it will start creeping into any centralised large social media website.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 explains that these groups have invested heavily to find excuses to push digital ID, urging voluntary adoption. They argue digital ID is the cornerstone of the entire UN Agenda 2030; without it, programmable, surveillable money and many online designs won’t work, and they frame it as something people must comply with, even though it’s pitched as voluntary. They compare digital ID to vaccine passports, suggesting that to change the direction of the world, people must plan to live in a way that avoids compliance with digital ID, just as one might navigate around vaccine mandates. In the United States, conservatives are portrayed as being pitched digital ID as a solution to illegal migration and voter fraud, while claims are made that biometric digital ideas are presented as essential to solving cybercrime, hacking, cyberbullying, and other societal ills. The speaker contends that digital ID underpins social credit and other Orwellian designs that are part of the agenda. A key theme is that the push relies on convenience: opting in is convenient, having money on a phone and a life centered on a smartphone is convenient, and voting every four years is convenient but framed within a system of “two lesser evils.” The speaker argues this convenience is a carrot used to enslave people, while resisting adoption is inconvenient and requires changing one’s life to be more resilient and sustainable for families and communities. They call for reconnecting with neighbors, meeting in person, and reducing online dependence to build real human connections and solutions. The speaker notes that during COVID, lockdowns contributed to isolation and pushed people toward virtual-only connections controlled by those who own the infrastructure, software, and platforms. The claim is that the power to set up digital ID resides with those investing in it, and people should reclaim power by actions in neighborhoods and families and by saying no to digital ID and the surveillance state. There is concern that digital ID enables not only real-time surveillance but predictive capabilities about future behavior, with intelligence agencies pursuing predictive policing (precrime) and extending similar predictions to health care to prevent the next pandemic, potentially eliminating the need for pandemics to be declared to justify emergency use authorizations or mandates in communities. The overall message is to opt out of digital ID, recognizing that this is the world some are trying to create, and that opting out is possible.

Video Saved From X

reSee.it Video Transcript AI Summary
Stories, even if fictional, are the engine of history because they enable large-scale collaboration. Science, as an institution, is not about truth but about power. Those who own the data own the future. We are reaching a point where biological knowledge and computing power enable the systematic hacking of millions of people. To hack people means to know them better than they know themselves. Total surveillance regimes are emerging, such as in Xinjiang and the occupied territories. It's amazing how few soldiers are needed to control millions of people if you have the data.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker argues that five years ago the WEF claimed we would own nothing by 2030, tied to the UN Agenda 2030, with digital ID as a key component. They question how ownership has shifted toward non-ownership in that period. They point to homeownership: ownership in homes has remained flat over the last five years while rent has skyrocketed, with a claimed increase of 5,600,000.0. As a result, homeownership is expected to decline, and younger generations, particularly Gen Z, are described as priced out and the largest generation ever to be renting. The speaker claims many goods and services are moving to subscription models. They note that vehicles are adopting subscription features from brands like Toyota, Mercedes, and BMW, and that farming equipment from John Deere can be shut down if a subscription service is not maintained, with mechanics needed to fix issues tied to that service. Printer ink subscriptions are cited with HP, asserting that canceling the ink subscription would cause the printer to stop functioning. They argue that media, movies, and music have moved to streaming services, and ownership is eroded because items are stored in cloud rather than in the user’s possession. CDs and DVDs are gone, and gaming systems can be shut down if the user’s behavior is not acceptable. Software previously owned, such as Adobe Creative Suite, Quicken, and Microsoft Office, is now offered on a subscription basis, so users no longer own the software but pay to use it regularly. Ebooks are also hosted on Kindle, with a specific claim that in 2009 Amazon removed George Orwell’s books from some users’ digital libraries. The speaker asserts that such controls illustrate how digital content can be removed. They argue that digital ID would enable even broader control, allowing authorities to shut users down or deny access to services. The speaker emphasizes that incremental steps are leading toward owning nothing and paying regularly for access to services that were once purchased outright. They claim social media platforms can suspend users for things they disapprove of, reinforcing the potential reach of this agenda. The overall conclusion presented is that this is the direction of Agenda 2030 and how ownership is being eroded.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker explains that hacking millions of people only requires access to their data, allowing others to know individuals better than they know themselves. This poses a threat to democracy and free markets, as it enables manipulation and prediction of people's actions. Total surveillance regimes, like those seen in Xinjiang and the occupied territories of Israel, are emerging, where a small number of soldiers can control millions of people with the help of data.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 and Speaker 1 discuss the UK government’s rollout of a national digital ID, presenting it as imminent and not merely a future possibility. Speaker 0 states that the government is rolling out a national digital ID in the UK and asserts it is happening now, not something to consider for someday. Speaker 1 reinforces the opposition to digital ID, urging a rejection of it. Speaker 0 reports that they are outside BBC Broadcasting House for a digital ID protest, framing the event as a mobilization against the rollout. Speaker 1 warns that saying yes to digital ID could lead to an inability to say no to the government ever again, not just to the current government but to future ones unknown. Speaker 0 recalls assurances that national ID cards were dead and not representative of Britain, noting that the modern version is not a plastic card but a “live connection.” Speaker 1 calls on people to raise their heads out of complacency, asserting that humans are not data and emphasizing that the issue concerns everyone’s freedom. Speaker 0 contends that what is happening is an attempt to funnel humanity into being a number, implying a loss of individuality. Speaker 1 describes a future where the ability to earn, move, buy, or speak is not a right but a permission, and permissions can be switched off, framing this as a consequence of Digital ID. Speaker 0 summarizes the topic as Digital ID: how it started, how it is being sold, and what life looks like behind a biometric paper.

Video Saved From X

reSee.it Video Transcript AI Summary
Anything you've ever said or done in the vicinity of your phone's camera or microphone, everything you've ever put into your phone, emails, text messages, Snapchat, Twitter, whatever, You search queries on Google, every embarrassing health search, every embarrassing text conversation with the significant other, every nude photograph people may not have taken, any search. They know where you are at all times. They know where you go and when. They know what you buy. They have access to your bank account. AI will literally know everything about you. They can create fake platforms that look real or rather fake people. And imagine if they were talking to you and they passed the Turing test, you know it's AI. It's like total, like, rape of everybody by the system forever. It's not good.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes a view that the last mission of the Freemasons to achieve their world vision is creating AI, and that this will occur at thirty three degrees north of the equator—in Jerusalem. He claims this is the end game, with the Freemasons aiming to create a world government in Jerusalem, and identifies the center of this world government as Solomon's Temple, Silicon Valley, and AI. He asserts that currently AI like ChatGPT “doesn’t really do anything,” producing only cool images and helping students cheat, and notes that if you don’t go to school you might not see much value in using ChatGPT or paying for it. He contrasts this with the global investment in data centers, noting that “everyone’s putting money into AI,” but questions how to make money from AI if the goal is using it directly, suggesting that creating an AI surveillance state would be more financially sensible. Speaker 0 then explains what a surveillance state is, citing China as an example with digital ID and digital currency, where “everything you buy, everything you do will be tracked.” He says this allows the creation of a profile on individuals that reveals who they are, how they behave, and what they think, and that the government can manipulate thinking and behavior. He ties this to a religious frame by stating that such a surveillance state is “the mark of the beast.” He concludes by identifying Package three d k as a global AI surveillance system.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 describes smart meters as more than just electricity meters, asserting they function as personal surveillance devices. They claim smart meters sense when devices are turned on or off, measure watt usage (even for small devices like an electric toothbrush), and transmit that data wirelessly through neighbors’ meters to the power company. The data allegedly records electric consumption every minute, stored forever on computers the public cannot access, revealing when someone is home, asleep, on vacation, hosting visitors, using lamps or tools, running a business from home, or bootlegging energy off the grid. The speaker asserts this creates a vivid profile of private living patterns and indicates at-home presence on the night of a murder. The speaker contends this is not electrical metering but personal surveillance—a warrantless search daily. They claim personal life information travels from the meter to the power company, to the government, police, and insurance companies, and to anyone who partners with the power company to access it. The speaker further asserts that even without a direct data-sharing agreement, information can be intercepted via the wireless signal from the meter, because smart meters are radio transmitters. They identify a one-watt radio station licensed by the FCC as the transmitter sending all electrical life details to a data center. Examples are given of authorities in Ohio, Texas, and British Columbia using smart meter data to pinpoint marijuana grow houses, enforce business licenses, and punish private home activities, implying surveillance beyond what residents accept. The claim is made that the power company can sell personal life data to anyone, and that unusual power usage patterns can be used as probable cause to raid a home for growing marijuana or running a computer server without a license. The speaker describes this level of surveillance as “about as big brother as it gets,” with utility workers going door-to-door to install meters. They express a personal opinion that smart meters should be removed from homes, arguing that power companies cannot claim the right to install surveillance devices on residences. They equate smart meters with wiretapping and note wiretapping is illegal in all U.S. states and federal territories. The speaker asserts that allowing a smart meter is tantamount to walking around with a constant webcam on one’s head and accuses the industry of relying on implied consent—the idea that permission is granted if the utility can change the meter, even if residents don’t understand the scope of what’s happening. As a practical step, the speaker advises telling utilities not to change the meter, noting that older meters were billed successfully. They claim to have sent a certified letter denying installation of a smart meter and mention a copy of their letter is available in the video’s description for viewers to adapt. They state post office certified mail is used to obtain a receipt. The speaker concludes that if the meters are installed on every house in America, it would cease to be America.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock your digital identity, which will be a tool of control for upcoming agendas. Speaker 1 notes that elements of this control are already with us, citing Alexa as an example. Speaker 0 contends you are never alone in your home, because all devices and smart appliances are connected on a wireless network, many with cameras and microphones, monitoring everything all the time. Smart appliances communicate with the smart meter, sending real-time usage data. If a Ring camera is in the home, a mesh network is formed and all devices are being tracked within the home, including location and usage, with data going to Amazon’s servers. Speaker 1 adds that when you leave your home, modern vehicles are connected to the Internet and tracked continually. On the streets, smart LED poles and smart LED lights form a wireless network that track your vehicle. They claim data is collected 24/7 continuously on every human being within these wireless networks. Speaker 0 asserts this is not good for health due to electromagnetic radiation. Speaker 0 further states that in the long term the plan is to lock up humanity in smart cities, a super set of a fifteen minute city. Speaker 1 says they’ve sold smart cities to state and local governments and countries as about sustainability and the city’s good, but claims the language from the UN and WEF and their white papers is inverted. The monitoring is described as about limiting mobility and no car ownership. Surveillance via LED grid is described as why smart lighting is death. Water management is about water rationing; noise pollution about speed surveillance; traffic monitoring about limiting mobility; energy conservation about rationing heat, electricity, and gasoline. Speaker 0 explains geofencing as an invisible fence around you where you cannot go beyond a certain point, related to face recognition, digital identity, and access control. Speaker 1 mentions that smart contracts can enable Softbrick to turn off your digital currency beyond a certain point from your house. The world is described as turned into a digital panopticon. Speaker 0 concludes that this means you can be monitored, analyzed, managed, and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
They have complete access to your device and can manipulate it as they please. Although you technically own the device because you paid for it, corporations and governments are gaining more control over it. We are living in a world where we bear the burden of work, taxes, and expenses, yet our ownership diminishes. The previous generation is acutely aware of this reality.

Video Saved From X

reSee.it Video Transcript AI Summary
The World Economic Forum's biggest fear is that people will not comply and will fight for freedom by making individual decisions. Digital control is key to enforcing mandates and controlling lives. The speaker claims that issues like carbon emissions and experimental injections are secondary to the desire to control people from the outside in. A digital process that restricts movement, behavior, and decisions with the click of a button would mean the end of individual autonomy.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that the control grid arrived in America via Apple, stating they worked for Apple for seventeen years and still hold stock, so they find no joy in revealing this. They claim there are no good guys here and argue that we need to shut it down while we can. They state that Apple just rolled out digital ID integration and acknowledge it sounds convenient, but warn that every convenience has a price. According to them, once identity goes digital, it becomes programmable, and once programmable, it becomes controllable. They contend that individuals are handing over their entire identity wrapped in a product, a file that can easily be deleted. If one does not comply, access is lost; if opinions are not liked, accounts are frozen. They claim that stepping out of line results in travel restrictions, bank transfer blocks, and loss of benefits. They insist this is not speculation and that it is already live. Examples are offered to illustrate the claim: Thailand has programmable digital currency; Europe introduced biometric wallets; Canada froze accounts during protests; China is described as having started the pilot and now in full production mode with a live social credit system. They assert that China is secretly building the infrastructure at a global level right now, not through laws or force, but through updates and convenience. They claim that in Vietnam, 86,000,000 bank accounts were deleted because people wouldn’t agree to a digital ID. Concerning the European Union, they state that by 2027, large cash payments will be outlawed, forcing people onto digital rails that can be controlled. They describe this as just the on ramp, arguing that freedom becomes conditional when identity is controlled by a corporation or a government that can revoke it with a keystroke. They describe the arrival of dystopia as occurring not with tanks or force, but with app updates or convenience. They conclude by urging listeners to pay attention and push back while they still can. The message ends with an appeal to “Let’s go,” emphasizing urgency to resist the rollout of digital identity and programmable control embedded in convenient updates and services.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed