TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript asserts that the Moderna technology used in COVID shots is described in a 248-page patent filed in 2020, which lists several embodiments or variations of the technology. It states that although it is unknown which embodiment each batch used, several different batch numbers were deployed, and some were far deadlier than others. According to the Moderna patent, the technology contains self-assembled nanoparticles, and in certain variations these nanoparticles can be used for the controlled release of compounds once they are in the human body. The lipid nanoparticles are encapsulated into a polymer hydrogel, a controlled release coating that includes polyvinyls. This has been verified by Anna Mielchia and Clifford Karnikom's research. In a 2013 TEDMED talk, Doctor Ito Bachelet says that these nanorobots have already been successfully developed in Israel and that they can be injected into the human body with a basic syringe. He shows an image of what they look like, and they appear to be the same structures that the fifth column found in their research and claimed was powered by five g, which was confirmed by doctor Bachelet. Speaker 1 adds that developed nanorobots carry antennas made from metal nanoparticles, and the antenna enable the nanobots to respond to externally applied electromagnetic fields, so these versions of nanobots can actually be activated with a press of a button on a joystick. The transcript further cites work by Todd Callender's team at Vaxchoice dot com, which has concluded that these shots contain a variety of synthetic pathogens that can be released with external five g frequencies. It states that the Moderna patent describes these nanoparticle mimics, which mimic the delivery of a variety of pathogens and lists over a hundred of them within the patent. According to the work at Vaxchoice, these synthetic pathogens each have an IP address. They are cataloged by the Department of Energy, and they use cesium-137, which the transcript claims we have been contaminated with from the environment, as a building block for their construction within our bodies using external frequency. The research allegedly shows that the Microsoft patent filed in 2020-06-06 060606 cryptocurrency system using body activity data is now in effect and that this technology is turning the human body into an antenna, which can output energy, meaning that humans are being turned into batteries to fuel the digital AI prison that is being built around us. And it is claimed that if you choose not to comply, the technology includes a built-in kill switch. The transcript closes by noting that independent researchers and scientists are uncovering this agenda, but they continue to walk freely among us, unrestrained by any justice whatsoever.

Video Saved From X

reSee.it Video Transcript AI Summary
There are methods to monitor remote employee activity, such as auditing VPN logins to track access to corporate networks. One interesting tool is the physical mouse wiggler, a device that intermittently moves a computer mouse to simulate activity. A tech company owner, concerned about employee productivity, created an algorithm to analyze mouse movements and discovered several employees using these devices. This raises questions about how remote work is monitored, as the mouse wiggler's movements can be uniquely identified, indicating whether an employee is genuinely active or not.

Video Saved From X

reSee.it Video Transcript AI Summary
Smart dust, a concept developed by the military, could enable tracking of anything, including people. Originating from DARPA in the 1990s, this technology features the Mu chip from Hitachi, the smallest RFID system, which can be scattered like dust or embedded in paper. It operates without a battery and can monitor individuals internally and externally. These nanoparticles evade the immune system, remaining undetected in the body. With widespread computing and connectivity, combined with AI capabilities, it’s possible to understand and influence people in unprecedented ways. The transhumanism movement seeks to enhance human abilities through radical technological modifications.

Video Saved From X

reSee.it Video Transcript AI Summary
An AI system was developed using camera footage of people in a space, combined with Wi-Fi router sonar data, to predict human locations. The camera was then removed, leaving the AI with only radio signal data. The AI was able to reconstruct real-time 3D pose estimations using only the language of radio signals. This effectively turns every Wi-Fi router into a camera that works in the dark and is specifically designed for tracking living beings.

Video Saved From X

reSee.it Video Transcript AI Summary
- Speaker 0 and Speaker 1 discuss the possibility that a friend was murdered and suggest that both victims died suddenly from fast-moving cancer, a method they say the agency uses overseas to eliminate people. Speaker 1 admits he cannot prove this but notes the sudden deaths. - The conversation asserts that the US government has technology to infect people with fast-moving cancer and to perform cognitive and directed-energy warfare. Speaker 0 states the government has the technology to infect with fast-moving cancer and to do so absolutely. - In 1997, Speaker 1 describes a hearing on asymmetric threats where he chaired the research committee and focused on four threats: drones, cyberattacks, electromagnetic pulse (EMP), and cognitive warfare. He asserts that cognitive warfare is now being labeled by some as Havana syndrome and that directed-energy weapons are the underlying technology. - Speaker 2 recounts a recent homeland security hearing about foreign adversaries using direct weapons against US citizens, enabling incapacitation. He emphasizes the chilling nature of the briefing and criticizes current domestic leadership as foolish, corrupt, incompetent, and wicked. - Speaker 3 notes that up to 40% of the Air Force equipment budget in the 1990s was classified, making much of it “black.” He emphasizes that military and security research often precedes civilian medical science, and that servicemen were used in experiments without fully informed consent, referencing NK Ultra-era disclosures of thousands of service members used as subjects. - Speaker 4 discusses MKUltra, describing a Canadian experiment involving psychic driving with massive LSD doses, eye-tracking, and memory loss, funded by MKUltra and affecting civilians. He mentions Project Midnight Climax, where Johns were observed in brothels while subjected to LSD, and notes similar experiments by the British Royal Air Force and Army. The results of Midnight Climax are unknown, with no published after-action reports. - Speaker 3 adds that Secretary of Energy O’Leary stated under Clinton that over a half a million Americans had been used in human experiments over four decades without informed consent, including mind control, with no accountability. He argues that mind-control technology has advanced, and questions who should govern its use, given the lack of legal frameworks. - The discussion covers mind-effects research and the lack of treaties governing such technologies. They reference a European Parliament security and disarmament resolution (1999) addressing mind-effects and mind-control technology, and Russian Duma resolutions (2002) seeking similar safeguards. Zabigniew Brzezinski’s Between Two Ages is cited regarding electronically stroking the ionosphere to influence behavior over geographic areas, connecting it to HARP and other electromagnetic carriers capable of mass or individual influence. - Speaker 6 explains historical demonstrations of electronic mind control, starting with Jose Delgado’s remote manipulation of a charging bull using radio energy and electrodes, and notes later work showing noninvasive techniques to influence behavior using low-power magnetic fields. Speaker 7 reiterates Delgado’s animal studies and the potential for noninvasive methods to affect emotions and memory, with broader implications for humans. - Speaker 3 discusses the progression of research funded by DARPA and others toward higher-resolution control of brain activity, enabling controlled effects that override senses and create synthetic memories, raising questions about future justice and evidence. They describe European Parliament and NATO/US military interest in mind-control technologies and the absence of robust legal protections. - Speaker 9 presents advances in AI-enabled brain-reading and memory-altering devices, including mind-reading and emotion decoding, while Speaker 10 and Speaker 12 discuss privacy concerns, brain-data privacy laws (Colorado’s law adding brain data to privacy protections), and the availability of consumer devices that decode brainwaves. They warn that brain data can be misused by insurers, law enforcement, advertisers, and governments, with private companies often sharing data without clear disclosure. - The segment concludes with a note that devices can infer attention and thoughts, and that DARPA’s N3D program aims for noninvasive neuromodulation with implantable electrodes read/write capabilities. It references 1980s–1990s discussions of RF energy as a potential nonlethal mind-control technology, and a 1993 Johns Hopkins conference listing low-frequency weapons as attractive options.

Video Saved From X

reSee.it Video Transcript AI Summary
This video discusses the use of body area networks and biosensors in tracking and monitoring individuals. It highlights the use of near field communication and how the body acts as a node on the network. The speaker emphasizes that this technology has been in existence for 28 years and questions why people are not more aware of it. The video also touches on the potential implications of this technology, including its use in medical applications and the ability to control and manipulate the body. The speaker criticizes the lack of transparency and education surrounding these technologies.

Video Saved From X

reSee.it Video Transcript AI Summary
A collaboration focused on creating a brain robotic interface for soldiers. They developed a headset using HoloLens 2 and a Raspberry Pi AI decoder to translate brain signals into instructions. The technology can be used with various autonomous systems. Two demonstrations were conducted successfully. In the first, a soldier commanded a Vision 60 Ghost Robot to follow waypoints. In the second, a soldier acted as a section commander, giving directions to robots and team members during a simulated patrol clearance. The technology allows the soldier to control the robots, monitor their video feed, and be aware of the surroundings. The team is excited about the future possibilities and aims to develop more use cases to support the military.

Video Saved From X

reSee.it Video Transcript AI Summary
Wi-Fi, an electromagnetic radiation, can be used to carry data and recognize silhouettes behind walls. Software can track people through wireless signals, identifying individuals by skeletal shape and measuring breathing/heart rate. AI can reconstruct images of people in a room using only Wi-Fi signals, turning routers into cameras that track living beings. Social media posts claim Hitachi's SmartDust chip can track people via GPS if consumed, but searches reveal the chip is an RFID chip without GPS capability and is not meant to be injected or absorbed into the human body. These chips can be used in securities, identification, preventing counterfeiting, and displacing ingredients. Amazon Sidewalk is a shared network using technologies like LoRa to maintain device connectivity even amidst disruptions. It allows remote control of devices and can be used to locate lost items, detect motion, track packages, sense air quality/water leaks, and monitor security. Amazon is opening Sidewalk to developers.

Video Saved From X

reSee.it Video Transcript AI Summary
Smart Dust, initially developed by the military, is a technology that enables tracking of anything, including individuals. Originating in the 1990s, it features the Mu chip from Hitachi, the smallest RFID system, which can be scattered like dust or embedded in materials. This chip operates without a battery and can monitor individuals both externally and internally. The nanoparticles are designed to evade the immune system, remaining undetected in the body. With widespread computing and connectivity, combined with AI, there's potential to analyze vast amounts of data, allowing for a deeper understanding of individuals, potentially leading to manipulation in unprecedented ways. Additionally, transhumanism is an emerging movement focused on leveraging technology for human enhancement.

Video Saved From X

reSee.it Video Transcript AI Summary
Our technology can detect people's emotions even if they don't show them on their faces. Using a wireless device, we analyze the reflections it captures from a person's body to infer their emotions. By focusing on the minute variations in breathing and heartbeat, our algorithms extract these signals and feed them into a machine learning algorithm. With an accuracy of 87%, our device can automatically recognize if a person is excited, angry, sad, or happy. We believe this technology, called EQ Radio, has various applications. It can help movie makers evaluate user experience, enable smart environments to detect emotional states like depression, and even adjust lighting or music based on our moods. To learn more, please check out our research.

Video Saved From X

reSee.it Video Transcript AI Summary
Glasses were created that can identify people on the street. When the glasses are worn, they detect faces and analyze them. After a few seconds, personal information pops up on a phone. The glasses stream video to Instagram, and a computer program monitors the stream. AI detects faces, then the internet is scoured for more pictures of that person. Data sources like online articles and voter registration databases are used to find names, phone numbers, home addresses, and relatives' names. This information is fed back to an app. The glasses identified dozens of people, including Harvard students, without their knowledge. Information found included addresses, attendance at programs like Yale's Young Global Scholar Summer Program, and relatives' names.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 questions whether wireless mind control exists, suggesting technologies available to the public, like ChatGPT, are far less advanced than what is secretly being developed. They ask if technology exists to "WiFi into your brain" or use Bluetooth for control. Speaker 1 believes "they" are trying to achieve wireless control, citing research into LRAD technology, which can transmit voices directly into a person's head. They suspect a project is underway to apply this technology to the entire population, potentially involving "intracorporeal bionano networks" that are syringe-injectable and self-assemble within the body. This is framed in medical terms, but Speaker 1 believes the intention is wireless control.

Video Saved From X

reSee.it Video Transcript AI Summary
We're showcasing AI pose estimation and real-time ray tracing at SIGGRAPH 2019. With just an iPad, a Hollywood producer can instantly see how a scene will look in a ray-traced environment. This demonstration features an attendee transformed into an astronaut. We have over 40 ray-traced applications running on NVIDIA RTX.

Video Saved From X

reSee.it Video Transcript AI Summary
Glasses were created that can identify people on the street. When the glasses are worn, they detect faces and analyze them. After a few seconds, personal information pops up on a phone. The glasses stream video to Instagram, where a computer program monitors the stream. AI detects faces, and the internet is scoured for more pictures. Data sources like online articles and voter registration databases are used to find names, phone numbers, home addresses, and relatives' names. This information is fed back to an app. The glasses identified dozens of people, including Harvard students, without their knowledge. Information found included addresses, attendance at programs like Yale's Young Global Scholar Summer Program, and relatives' names.

Video Saved From X

reSee.it Video Transcript AI Summary
Researchers conducted experiments to decode human thoughts by having participants watch a video and narrate their inner monologue. They successfully reconstructed the person's thoughts based on their narration. This has implications for authoritarian states and generating pleasure-inducing images. Additionally, the researchers explored using WiFi radio signals to track human movements. By combining camera footage with radio signals, they were able to predict the location of individuals in real time. This effectively turns every WiFi router into a camera capable of tracking living beings in the dark.

Video Saved From X

reSee.it Video Transcript AI Summary
Researchers used AI to reconstruct images of human beings from Wi-Fi radio signals. They trained an AI using camera images of people in a space alongside corresponding Wi-Fi signals, teaching it to predict human locations. After training, the camera was removed, leaving the AI to rely solely on radio signals. The AI was then able to reconstruct real-time 3D pose estimations. This effectively turns Wi-Fi routers into cameras capable of tracking living beings, even in the dark.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 introduces the concept: with this hack, your TV can watch you, as the TV is turned into a device that can monitor your surroundings while you watch. Speaker 1 explains how this is possible: by abusing the smart TV platform’s browser to gain access to the camera built into the TV. With a small amount of extra code, the camera can be turned on within the browser. This is designed so that viewers can see the camera feed, and it can run invisibly behind the web page you are looking at. Speaker 0 emphasizes the practical implication: you could be sitting in one place, such as watching TV from your bedroom, while someone elsewhere—potentially anywhere in the world—views the image of you watching. Speaker 1 confirms this scenario with an example: a person could be on a laptop in a cafe in Paris, and as long as they have a network connection, they could access your TV and the camera feed. Speaker 2 highlights a particularly alarming aspect: there is no indication that the camera is on, and there is no LED light to signal activity. As a result, the camera could be watching you without your knowledge. Speaker 0 asks what defines a smart TV and why it is attractive as a target for hackers. Speaker 2 responds by reframing the smart TV as a computer: it is not just a television, but a device that includes a web browser and runs Linux. Speaker 1 points to a more dangerous possibility: when people use smart TVs for activities like online banking, attackers could translate a legitimate bank address into a different IP address leading to a site controlled by the attacker, creating a phishing-like scenario where a user enters a username and password that goes to the attacker instead of the bank. Speaker 0 conveys Samsung’s response in a CNN Money statement: Samsung says it takes consumer privacy very seriously. They offer a hardware countermeasure by enabling the camera to be turned into the bezel of the TV so that the lens is covered or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when smart TV features are not in use. As an additional precaution, Samsung recommends customers use encrypted wireless access points when using connected devices.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that facial recognition will be used to unlock your digital identity, which will be a tool of control for upcoming agendas. Speaker 1 notes that elements of this control are already with us, citing Alexa as an example. Speaker 0 contends you are never alone in your home, because all devices and smart appliances are connected on a wireless network, many with cameras and microphones, monitoring everything all the time. Smart appliances communicate with the smart meter, sending real-time usage data. If a Ring camera is in the home, a mesh network is formed and all devices are being tracked within the home, including location and usage, with data going to Amazon’s servers. Speaker 1 adds that when you leave your home, modern vehicles are connected to the Internet and tracked continually. On the streets, smart LED poles and smart LED lights form a wireless network that track your vehicle. They claim data is collected 24/7 continuously on every human being within these wireless networks. Speaker 0 asserts this is not good for health due to electromagnetic radiation. Speaker 0 further states that in the long term the plan is to lock up humanity in smart cities, a super set of a fifteen minute city. Speaker 1 says they’ve sold smart cities to state and local governments and countries as about sustainability and the city’s good, but claims the language from the UN and WEF and their white papers is inverted. The monitoring is described as about limiting mobility and no car ownership. Surveillance via LED grid is described as why smart lighting is death. Water management is about water rationing; noise pollution about speed surveillance; traffic monitoring about limiting mobility; energy conservation about rationing heat, electricity, and gasoline. Speaker 0 explains geofencing as an invisible fence around you where you cannot go beyond a certain point, related to face recognition, digital identity, and access control. Speaker 1 mentions that smart contracts can enable Softbrick to turn off your digital currency beyond a certain point from your house. The world is described as turned into a digital panopticon. Speaker 0 concludes that this means you can be monitored, analyzed, managed, and monetized.

Video Saved From X

reSee.it Video Transcript AI Summary
Researchers have developed a method using AI that can turn Wi-Fi routers into cameras. By combining camera footage with radio signals, they trained the AI to predict the location of people in a room. They then removed the camera and relied solely on the radio signals to reconstruct real-time 3D pose estimation. This means that Wi-Fi routers can now track living beings even in the dark, essentially transforming them into night vision cameras.

Video Saved From X

reSee.it Video Transcript AI Summary
A person demonstrates glasses that identify people using facial recognition and AI. When the glasses detect a face, they scour the internet for pictures of that person and use data sources like online articles and voter registration databases to find their name, phone number, home address, and relatives' names. This information is then fed back to an app on the user's phone. The demonstrator approaches a woman and the glasses identify her as being involved with the Cambridge Community Foundation. The glasses also identify a second person as Khashik, whose work the demonstrator has read. The glasses correctly identify the second person's address, attendance at Yale's Young Global Scholar Summer Program, and parents' names.

Video Saved From X

reSee.it Video Transcript AI Summary
You might wonder how a signal reaches only me when I'm next to someone else. Think about when your phone rings at a table – do the phones of those around you also ring? That's how. The body is targeted using bioelectromagnetic algorithms. These algorithms measure the body's bioelectricity, perturbing the human biofield with biological signals. These bioelectromagnetic algorithms are incorporated into machine learning classifiers. The machine learning reads what's happening under your skin and reports it to a database, your digital twin. The Department of Defense has been developing this for fifty years. These biosensor systems are very robust and part of our network-centric warfare doctrine.

Coldfusion

The Strange Origins of Wi-Fi – An Australian Invention?
reSee.it Podcast Summary
Wi-Fi, a common technology for internet connectivity, sparked a battle between Australia and the U.S. over royalties and credit for its invention. U.S. consumers unknowingly contributed over $400 million to Australia's CSIRO due to a patent lawsuit. The technology originated from a failed black hole detection experiment by CSIRO's John O'Sullivan, who adapted Fourier transforms to improve wireless signal quality. While many contributed to Wi-Fi's development, the Australian chip made it affordable and practical.

TED

With Spatial Intelligence, AI Will Understand the Real World | Fei-Fei Li | TED
Guests: Fei-Fei Li
reSee.it Podcast Summary
540 million years ago, the world was dark, lacking sight until trilobites emerged, marking the beginning of visual intelligence. This led to the Cambrian explosion and the evolution of understanding and intelligence. Today, advancements in AI, particularly in computer vision and spatial intelligence, are transforming how machines perceive and interact with the world. Applications in healthcare, robotics, and autonomous systems illustrate the potential of AI to enhance human capabilities and improve lives, emphasizing the importance of developing technology centered on human needs.

TED

Could AI Give You X-Ray Vision? | Tara Boroushaki | TED
Guests: Tara Boroushaki
reSee.it Podcast Summary
Tara Boroushaki shares her fascination with magic and how she created her own using augmented reality (AR) technology. By utilizing wireless signals like Bluetooth and Wi-Fi, her AR headset can locate hidden objects, creating a virtual 3D map of the environment. This technology has industrial applications, such as helping warehouse workers and retailers. Additionally, she developed a robot equipped with a specialized gripper and AI algorithms that allow it to adapt to new environments and find unfamiliar objects. Boroushaki emphasizes the potential of this technology to assist first responders in low-visibility situations and enhance interactions with smart homes.

Coldfusion

Meta Just Achieved Mind-Reading Using AI
reSee.it Podcast Summary
In 2054, a new police unit in the U.S. aims to arrest future criminals, reminiscent of *Minority Report*. Researchers at the University of Texas at Austin developed a non-invasive semantic decoder that translates brain activity into text, using fMRI technology. This device can reconstruct continuous language from perceived or imagined speech. Meta has advanced this field further with a real-time AI system that decodes visual representations from brain activity using MEG technology. Both technologies raise privacy concerns but hold potential for aiding those unable to communicate. The advancements suggest a new era in brain interpretation, though challenges remain in accuracy and ethical implications.
View Full Interactive Feed