• 4 months ago
Transcript
00:30In the era of information, those who control information have lost their support.
00:51Everyone can control only one of their secrets.
00:55Thanks to the modern way of life and a little bit of technological knowledge, it is easy to reveal their secrets.
01:02In fact, it is very easy to become an agent.
01:05You just need two hours and you can find the answers that James Bond is looking for.
01:12The power of science can also be found in someone's personal life.
01:18No computers reveal the secrets of the spies.
01:22The question is, why should you know someone's personal information when science shows that you have the ability to get into their mind?
01:32Some people believe that this can happen to their own people.
01:36While others think that this miracle is reality.
01:40Although the methods have changed, the spies continue their activity.
01:50These spies are us.
01:55The first place where every professional spy is controlled is here, in the Plerale Valley.
02:00It may sound naive, but it is the law of the jungle.
02:05The other place is the electronic money.
02:08In the Lohren shop in London, you can find what you are looking for.
02:12Private clients, government agencies and, perhaps, even the army,
02:17sell the money and cameras to the spies.
02:21The spy is a spy, but he is also a spy.
02:25He is a spy, but he is also a spy.
02:28He is a spy, but he is also a spy.
02:31In the Plerale Valley, the spy's capital is Austria.
02:34He sells the money and the cameras here.
02:41He can be transmitted through any situation.
02:46Here we have a fully-fledged computer, which can hear our conversation from a distance of seven meters.
02:53This is a multi-pronged device, connected to a very high-pitched microphone,
02:57in a radius of approximately 7 metres.
03:04This is a recording,
03:06which has a radio transmitter and a microphone,
03:09which can transmit a conversation
03:11within a range of 2 to 3 metres.
03:16If you search the secrets of the business,
03:18you will find a registered suitcase.
03:22You are at work with a light switch.
03:25The problem with such devices
03:27is that you have to be ready to activate
03:30or be ready to receive the transmission.
03:38But if your business is located in Seattle,
03:41while you are somewhere in New York,
03:43Paris or London,
03:45you should not miss their surveillance.
03:48A phone from anywhere in the world
03:50can activate the most sophisticated
03:52transmission in the world.
03:54If you find yourself in the line of business,
03:57you should not miss the phone,
03:59and you should also not miss
04:01what happens in another building.
04:04Searching with personal microphones is difficult.
04:07The challenge has become much more difficult.
04:19Businesses and companies have the time
04:21to use Jaco and Torino's analysis
04:23to find out the most important secrets of people.
04:26This analysis is designed to take
04:28the unknown people by surprise.
04:30It can take a part of the world unknowingly.
04:33A good alternative for analysis
04:35is the risk of failure.
04:37Jaco, which is a whole world,
04:39also deposits the most important
04:41unsolved mysteries,
04:43such as possible diseases or drugs
04:45that can be used.
04:47It can be used up to one centimeter per month.
04:50As well as the cases of drug addicts,
04:52they show the history of the drug
04:54used in people.
04:56At the moment,
04:57only a small amount is needed
04:59for a drug test.
05:06Nevertheless,
05:07technology develops day by day.
05:10It will not be long
05:12before only two drugs will be used.
05:18The process is very straightforward.
05:21Your colleague in the lab
05:23puts the monster in a capsule
05:25with some drugs.
05:30For a long time,
05:32until now,
05:33in an incessant flow.
05:47In a matter of meters,
05:49the monster releases the drugs it has.
05:52A machine known as a spectrometer
05:54of the chromatographic mass of the gas
05:57accurately identifies these drugs
05:59in the molecular field.
06:02Imagine when you know
06:04that your boss has taken a drug
06:06or that he has a problem
06:08that the company does not know about.
06:10Flow analysis can open these doors.
06:14The merit of the research
06:16is biochemical.
06:17Laboratories like this
06:19can make spy magazines.
06:22But how can a person
06:24who is in Levis survey?
06:26This is also easy.
06:28True spies have a silver spoon.
06:32During the war,
06:33the spy plane U-2
06:35was the silver spoon of the United States.
06:38It revealed the secret
06:40of the Cuban missiles in 1916.
06:42In 1990,
06:44the spy satellite
06:46gave information
06:47about the Iraqi fortifications.
06:49But if your budget for spying
06:51is limited,
06:52there are other alternatives.
06:55In the heart of California,
06:57they built a spy plane
06:59in Levis.
07:06It's called Pointer.
07:09It was a spy plane
07:11that was used
07:12to spy on the U.S. military.
07:14It was a spy plane
07:16that was used
07:18to spy on the U.S. military.
07:20It was a spy plane
07:22called Pointer.
07:33The U.S. military
07:34used it to gather information
07:36from the military
07:38and to broadcast
07:39video of troops and weapons.
07:42It was a spy plane
07:44that was used
07:45to spy on the U.S. military.
07:47It was a spy plane
07:49that was used
07:51to spy on the U.S. military.
07:53It was a spy plane
07:55that was used
07:57to spy on the U.S. military.
08:02At that time,
08:03this airplane
08:04was very big
08:05when compared
08:06to the size
08:07of the spy airplanes.
08:11Okay, getting ready to launch.
08:14You all trimmed up?
08:15Yeah.
08:41Okay.
08:42Okay.
08:43Okay.
08:44Okay.
08:45Okay.
08:46Okay.
08:47Okay.
08:48Okay.
08:49Okay.
08:50Okay.
08:51Okay.
08:52Okay.
08:53Okay.
08:54Okay.
08:55Okay.
08:56Okay.
08:57Okay.
08:58Okay.
08:59Okay.
09:00Okay.
09:01Okay.
09:02Okay.
09:03Okay.
09:04Okay.
09:05Okay.
09:06Okay.
09:07Okay.
09:08Okay.
09:09Okay.
09:10Okay.
09:11Okay.
09:12Okay.
09:13Okay.
09:14Okay.
09:15Okay.
09:16Okay.
09:17Okay.
09:18Okay.
09:19Okay.
09:20Okay.
09:21Okay.
09:22Okay.
09:23Okay.
09:24Okay.
09:25Okay.
09:26Okay.
09:27Okay.
09:28Okay.
09:29Okay.
09:30Okay.
09:31Okay.
09:32Okay.
09:33Okay.
09:34Okay.
09:35Okay.
09:36Okay.
09:37Okay.
09:38Okay.
09:39Okay.
09:40Okay.
09:41Okay.
09:42Okay.
09:43Okay.
09:44Okay.
09:45Okay.
09:46Okay.
09:47Okay.
09:48Okay.
09:49Okay.
09:50Okay.
09:51Okay.
09:52Okay.
09:53Okay.
09:54Okay.
09:55Okay.
09:56Okay.
09:57Okay.
09:58Okay.
09:59Okay.
10:00Okay.
10:01Okay.
10:02Okay.
10:03Okay.
10:04Okay.
10:05Okay.
10:06Okay.
10:07Okay.
10:08Okay.
10:09Okay.
10:10Okay.
10:11Okay.
10:12Okay.
10:13Okay.
10:14Okay.
10:15Okay.
10:16Okay.
10:17Okay.
10:18Okay.
10:19Okay.
10:20Okay.
10:21Okay.
10:22Okay.
10:23Okay.
10:24Okay.
10:25Okay.
10:26Okay.
10:27Okay.
10:28Okay.
10:29Okay.
10:30Okay.
10:31Okay.
10:32Okay.
10:33Okay.
10:34Okay.
10:35Okay.
10:36Okay.
10:37Okay.
10:38Okay.
10:39Okay.
10:40Okay.
10:41Okay.
10:42Okay.
10:43Okay.
10:44Okay.
10:45Okay.
10:46Okay.
10:47Okay.
10:48Okay.
10:49Okay.
10:50Okay.
10:51Okay.
10:52Okay.
10:53Okay.
10:54Okay.
10:55Okay.
10:56Okay.
10:57Okay.
10:58Okay.
10:59Okay.
11:00Okay.
11:01Okay.
11:02Okay.
11:03Okay.
11:04Okay.
11:05Okay.
11:06Okay.
11:07Okay.
11:08Okay.
11:09Okay.
11:10Okay.
11:11Okay.
11:12Okay.
11:13Okay.
11:14Okay.
11:15Okay.
11:16Okay.
11:17Okay.
11:18Okay.
11:19Okay.
11:20Okay.
11:21Okay.
11:22Okay.
11:23Okay.
11:24Okay.
11:25Okay.
11:26Okay.
11:27Okay.
11:28Okay.
11:29Okay.
11:30Okay.
11:31Okay.
11:32Okay.
11:33Okay.
11:34Okay.
11:35Okay.
11:36Okay.
11:37Okay.
11:38Okay.
11:39Okay.
11:40Okay.
11:41Okay.
11:42Okay.
11:43Okay.
11:44Okay.
11:45Okay.
11:46Okay.
11:47Okay.
11:48Okay.
11:49Okay.
11:50Okay.
11:51Okay.
11:52Okay.
11:53Okay.
11:54Okay.
11:55Okay.
11:56Okay.
11:57Okay.
11:58Okay.
11:59Okay.
12:00Okay.
12:01Okay.
12:02Okay.
12:03Okay.
12:04Okay.
12:05Okay.
12:06Okay.
12:07Okay.
12:08Okay.
12:09Okay.
12:10Okay.
12:11Okay.
12:12Okay.
12:13Okay.
12:14Okay.
12:15Okay.
12:16Okay.
12:17Okay.
12:18Okay.
12:19Okay.
12:20Okay.
12:21Okay.
12:22Okay.
12:23Okay.
12:24Okay.
12:25Okay.
12:26Okay.
12:27Okay.
12:28Okay.
12:29Okay.
12:30Okay.
12:31Okay.
12:32Okay.
12:33Okay.
12:34Okay.
12:35Okay.
12:36Okay.
12:37Okay.
12:38The computer can be placed in a suspicious object.
12:42With it, it can control a large number of cameras connected to the Internet.
12:47Video conference cameras can be used to monitor houses and walls.
12:52Personal computers can also detect sound.
12:57The next meeting is going to take place in London.
13:00Peak.
13:01We are looking for a requested material.
13:03Peak.
13:04Combine a number of devices with hardware and network lines,
13:08and one day the computers will create the biggest part of the spyware.
13:13Okay.
13:18For the Americans and their allies, this day has come,
13:21because there is a computer network that is spying.
13:26Finding the necessary information in massive electronic communication
13:30is like looking for a piece of information in a piece of communication.
13:35However, not everything is possible for the spy.
13:43In Blenheim, New Zealand, something is happening all over the world.
13:47It is being exposed by the author of this book.
13:52Phone calls, faxes, e-mails, telexes, all kinds of communication
13:56have been created by this system.
13:59But it is not clear why.
14:02In Blenheim, New Zealand, something is happening all over the world.
14:06One of the secret stations of the espionage system, ESCALON.
14:10ESCALON is a computer network and a source of information in the whole world.
14:15These sources of information are spying in communication satellites
14:19that have our written or spoken words.
14:23Other stations hear on the radio or cable.
14:26United States and its allies are receiving economic, military and political information
14:31while hearing communications that contain specific words or addresses.
14:40Out of all the millions of communications that they capture every day in the system,
14:44computers do the biggest part of the work.
14:46Computers read every single message that comes out of these stations.
14:50Every message that has a word or an address that interests them,
14:53they send it off to ESCALON.
14:55They send hundreds of thousands a day that they pull out of that.
15:00Before ESCALON, the spies have spent years analyzing what this computer does every day.
15:06Today, computers work very fast, too.
15:14I followed the ESCALON to the New Zealand secret station,
15:18and there weren't people there.
15:20I saw how they work in computer networks sent by the United States.
15:27Everything they do is secret.
15:29Everything we say is heard by someone.
15:31We are spies.
15:33We are always on the lookout.
15:35In the use of people's secrets to control them,
15:38why don't they control us directly?
15:43Spying can be the last technique of espionage.
15:50ESCALON
15:54Even though people can use another person's memories and thoughts,
15:59science calls for a way to infiltrate people's minds,
16:02to do what they say.
16:10In a therapeutic context,
16:12Dr. Mark George uses magnetic stimulation to treat depression.
16:17This is a thorough demonstration,
16:19It looks very promising that we can use this for stimulating the upper cortex to influence people in pathological situations like depression or even in the control of the brain.
16:33Or even we can help people to be more intelligent or to be more mature.
16:39The technology is used initially to explore the controlled vision of the brain.
16:43More and more doctors are using the magnetic stimulation of the brain to stimulate the development of the humor of depressive patients.
16:51How can we define a specific idea in the human body?
16:54What we are doing is we are either heightening the activity in the brain and our brain has mechanisms to regulate the movement of the body just as we regulate our brain.
17:06We are enhancing the use and understanding of the regulatory systems and we are beginning to use this to understand an idea or a spiritual idea in one way or another.
17:15We can't really plant an idea or a mood into someone's head.
17:19It would be possible to not only read the emotional system, but also to use it in the emotional system.
17:30It would be possible to not only read the emotional system, but also to use it in the emotional system to block certain regions of the brain.
17:39So, now and then we don't have the opportunity to take a picture of the brain and determine if someone is depressed or hyperactive.
17:46But that's not far away, I don't think.
17:50At the end of the war, both sides are trying to perfect the control of the brain or the techniques of brain stimulation.
17:56Is it possible that the magnetic therapy of the brain and the stimulation of the heart of the brain can be used to control people's emotions or their memories?
18:08Well, it's a powerful new tool that, just like nuclear reactions, can be used to produce energy or misuse.
18:18With the ability to go in and misuse certain areas of the brain, for instance, you can use it in therapy or you can potentially misuse the information in the brain.
18:27So, just like any tool that our society has, it's really up to us as a society to use it.
18:32So, just like any tool that our society has, it's really up to us as a society to make sure that it's used properly.
19:03Well, basically, I've been on the Internet and this is an interesting issue.
19:10An interesting issue is an article from 1990 that discusses the fact that many major superpowers in the industrialized countries are researching electromagnetic technology for anti-personnel uses.
19:28And the technology is highly classified.
19:38Many of the victims that I network with describe hearing voices and microwave elements where they have headaches,
19:47typically sleep disturbances, sunburns, even though it's at night, just microwave effects.
19:57Other radio stations know that they are targeting the human body.
20:00But how can they find out about sounds in the human body?
20:09In Chicago, a research authority on microwaves shows how these sounds work.
20:17I'm hearing a micropulse, which has a kind of vibration with tonal waves.
20:27With a tonal quality to it.
20:32Professor James Lynn will show that these sounds are not acceptable, but not justified.
20:37The energy impulses of the microwaves produce and emit sound.
20:43The energy of the microwaves triggers the sounds of the human brain,
20:46and their discovery triggers a type of sound that is part of the mechanism of the human brain.
20:53Professor Lynn, I can't say it's abnormal, but it's possible that the brain is sending signals to an agent.
21:01The brain is an electrical organ. It is susceptible to electrical signals.
21:07Since the microwave is electrical, one could send information in the form of microwaves,
21:14and the microwave signal says that it could be perceived by the brain.
21:23It will take time before we can control someone's thoughts,
21:26but we can indicate or show secret signals at a distance.
21:31In an environment with a high risk of infection,
21:33the spy can control someone from a brand that he can use to do his job.
21:48But why should we stop this individual?
21:50If the goal is to protect the environment,
21:52is it possible that a computer can control it?
21:56The answer to this question is a terrible truth.
22:03Before the Second World War,
22:05scientists manipulated public opinion with a new type of information, propaganda.
22:15By controlling people's opinions,
22:17the Ministry of Information, in those days,
22:19forced millions of people to fight and fight for their country.
22:37Even today, the government tries to provide information with its own purpose
22:41to control people's opinions.
22:43But they also asked for more direct means.
22:50Steve Bratcher was part of the American secret services.
22:59The history of mind control has not been kept too well as secret.
23:03The discovery of Macaulay was first published in the New York Times.
23:07The discovery of Macaulay was first published in the New York Times.
23:10The discovery of Macaulay was first published in the New York Times.
23:13An experiment about mind control was exposed
23:15by the Allen Institute in Canada.
23:24This mind control program is not limited to electronic means of controlling people,
23:28but also to the use of experimental drugs.
23:32Steve Bratcher thinks that these means still work today.
23:40They use these people to manipulate people for political and political purposes.
23:45They want to break their limits.
23:47They want people to think and act in a political way.
23:50There is no guarantee that they will have all the population.
23:53Only their strategic group can manipulate the others to create the belief.
24:04If the control of the mind will be successful on a massive scale,
24:07it will go beyond the limits of the secrets.
24:10Why are you spying on a population that is growing up?
24:14Can this happen?
24:17As we know, it has not happened.
24:20We don't know what will happen.
24:22Will it be secrets or a tool for knowing?
24:25The science is always more and more spying.
24:30Let's talk about spying.
24:33Spying is the secret that you have hidden in the darkness with a flash of light.
24:37Whether from the air or through the network of information.
24:41The secret of your secret is always more technological and more efficient.
24:49One day, even in the minds of people, you will be able to hide in the darkness.
24:56The spies are there.
24:58The spies are there.
25:28The spies are there.

Recommended