The Machines Are Watching You | And They Know Everything (Compilation)

YouTube · pQIVPoQ9NPM

Quick Read

Uncover the hidden world of government surveillance, mind control, and cyber warfare, from secret NSA listening posts to quantum computers poised to shatter global privacy.
The NSA operates a secret mass surveillance hub in NYC, codenamed Titan Point, collecting vast amounts of data with AT&T's 'extreme willingness' to cooperate.
Governments and militaries have developed and deployed technologies for mind control, weather modification, and cyber warfare, often in secret.
Quantum computers are on track to break all current encryption by 2029, threatening global financial systems, personal privacy, and national security, with intelligence agencies already preparing for a 'quantum dark' future.

Summary

This compilation episode exposes various forms of covert surveillance and manipulation, arguing that governments and powerful entities are constantly monitoring and influencing citizens. It details the NSA's secret listening post at 33 Thomas Street, the mysterious operations of number stations, the use of infrasound and ultrasound as weapons, and the history of subliminal messaging in advertising and warfare. The episode also explores the Stuxnet virus as a state-sponsored cyber weapon and warns of an impending 'quantum apocalypse' where all digital encryption could be broken, leading to a world without secrets and unprecedented control.
Understanding the pervasive nature of surveillance, the potential for mind control, and the escalating cyber arms race is critical for individuals to protect their privacy and for societies to demand transparency from powerful institutions. The looming threat of quantum computing breaking all existing encryption highlights an urgent need to re-evaluate digital security and the fundamental concept of secrecy in the modern world.

Takeaways

  • 33 Thomas Street in NYC, an AT&T building, is a confirmed NSA mass surveillance hub (Titan Point) used to tap phone calls, faxes, and internet data from at least 38 countries and potentially US citizens.
  • Number stations, shortwave radio transmitters broadcasting coded messages, are still active globally, primarily used for espionage and untraceable by design.
  • Infrasound (below 20 Hz) can induce fear, anxiety, and visual distortions in humans, while directed ultrasound can cause physical damage, with both having potential military applications (e.g., Havana Syndrome).
  • Subliminal messaging and psychological operations have been successfully used in advertising (popcorn sales, bacon for breakfast) and military campaigns (Desert Storm, Guatemala coup) to manipulate public opinion and behavior.
  • Stuxnet, a state-sponsored cyber weapon, physically destroyed Iranian nuclear centrifuges, marking a new era of offensive cyber warfare with real-world destructive capabilities.
  • Project Nitro Zeus is a US cyber contingency plan designed to disable Iran's critical infrastructure (air defenses, power grid, financial systems) in case of war, with code potentially already deployed.
  • HARP, a high-powered ionospheric heater in Alaska, is alleged to have capabilities for weather modification, earth-penetrating tomography, and influencing human brain waves, despite official denials.
  • Quantum computers, like Google's Project Willow, can break RSA 4096 encryption in minutes, threatening all existing digital security and prompting a race for 'post-quantum cryptography' and 'quantum dark operations'.

Insights

1NSA's Secret Surveillance Hub: Titan Point

The building at 33 Thomas Street in New York City, officially an AT&T telecommunications facility, is a top-secret NSA mass surveillance hub code-named 'Titan Point.' Leaked Snowden documents revealed its purpose: to intercept hundreds of millions of phone calls, faxes, and internet data daily, targeting foreign nationals, international organizations like the UN and World Bank, and potentially US citizens through programs like Blarney. AT&T demonstrated 'extreme willingness' to cooperate, providing access to billions of client emails and phone metadata.

The building is 500 ft tall with no windows, no lights, and no markings. Its code name is Titan Point. It targets communications of the UN, World Bank, IMF, and at least 38 countries. AT&T allowed NSA access to billions of client emails and phone call metadata. NSA operatives blend in with AT&T workers.

2Number Stations: Untraceable Espionage Communication

Number stations are shortwave radio transmitters used by intelligence agencies since WWI to send coded messages to spies globally. These transmissions, often featuring robotic voices or child melodies reciting numbers, are nearly impossible to trace to their recipients. The messages are encrypted using one-time pads, making them unbreakable without the physical key, which is destroyed after use. Despite digital advancements, number stations remain active due to their untraceable nature and resilience against cyber hacking.

Number stations transmit coded messages to spies using shortwave radio since WWI. Examples include Lincolnshire Poacher (MI6), Swedish Rhapsody (Polish secret police), and Yosemite Sam (US government contractor). Messages are encrypted with one-time pads, making them unbreakable. Shortwave radio signals bounce off the ionosphere, allowing global reach without digital trails.

3Infrasound and Ultrasound as Weapons

Infrasound (below 20 Hz, inaudible) can profoundly affect humans, causing fear, anxiety, visual distortions (like Vic Tandy's 'ghost'), and even nausea or involuntary motor functions at high decibels. Frequencies around 7 Hz, the brain's median alpha rhythm, can cause panic, convulsions, and organ damage. Ultrasound (above human hearing) can damage cells through heating and cavitation. These sonic weapons have been developed by militaries, with 'Havana Syndrome' being a suspected modern application of directed sonic or microwave energy.

Vic Tandy's experience with a 19 Hz fan causing ghost sightings and fear. Tigers use 18 Hz roars to disorient prey. NASA tests at 160 dB caused nausea and hallucinations. Vladimir Gavreau developed infrasonic weapons that caused internal organs to 'mash into amorphous jelly.' Havana Syndrome symptoms (migraines, dizziness, memory lapses) are linked to sonic or microwave attacks.

4Subliminal Warfare and Mind Control

Subliminal messaging and psychological operations (PsyOps) have been effectively used to manipulate human behavior and public opinion. Early examples include flashing 'Eat more popcorn' messages in theaters, increasing sales by 58%. Edward Bernays, Freud's nephew, orchestrated campaigns like 'torches of freedom' for women smoking and 'bacon and eggs' for breakfast, fundamentally altering American culture. Militaries have weaponized these concepts, using sonic weapons like the 'squawk box' in Vietnam and, controversially, 'silent subliminal presentation systems' (Patent 5159703) in Desert Storm to induce hopelessness in Iraqi troops via radio broadcasts.

1957 movie theater experiment increased popcorn sales 58%. Edward Bernays' campaigns for cigarettes ('torches of freedom') and bacon and eggs. US military's 'squawk box' in Vietnam incapacitated Viet Cong. Patent 5159703 describes a 'silent subliminal presentation system' that transmits emotional triggers (e.g., hopelessness) via inaudible soundwaves layered on radio/TV, allegedly used in Desert Storm.

5Stuxnet and Nitro Zeus: The Dawn of Cyber Warfare

Stuxnet, discovered in 2010, was a highly sophisticated state-sponsored cyber weapon that physically destroyed over a thousand uranium centrifuges at Iran's Natanz nuclear facility. It exploited four 'zero-day' vulnerabilities, spread via USB drives to air-gapped networks, and subtly manipulated industrial control systems (PLCs) to cause equipment failure while reporting normal operations. This marked a new era of offensive cyber warfare capable of real-world physical damage. The US also developed 'Nitro Zeus,' an even more complex virus designed to disable Iran's entire critical infrastructure in case of war, with components potentially already deployed.

Stuxnet was 20x more sophisticated than other malware, 500KB in size, infected state-of-the-art systems silently, and used valid stolen digital certificates. It contained four zero-day exploits. It targeted Siemens PLCs controlling uranium centrifuges, causing them to tear apart. Over 1000 centrifuges were destroyed. Operation Olympic Games (US, Israel, UK) developed Stuxnet. Nitro Zeus (NZ) is a US cyber contingency plan for Iran, designed to disable air defenses, power grids, communications, and financial systems.

6The Quantum Apocalypse: End of Encryption and Privacy

Quantum computers are rapidly advancing, with Google's Project Willow demonstrating the ability to solve problems in minutes that would take traditional supercomputers billions of years. This capability threatens all current encryption methods, including RSA 4096, which protects banking, communications, and even cryptocurrencies like Bitcoin. The NSA predicts 'Y2Q' (the year quantum computers break encryption) by 2029, much sooner than anticipated. This 'quantum apocalypse' would expose all past and present encrypted data, leading to global financial collapse, widespread privacy breaches, and a fundamental shift towards analog security measures and 'quantum dark operations' by intelligence agencies.

Modern encryption relies on two large prime numbers; factoring them takes billions of years for classical computers. Google's Project Willow solved a problem in 5 minutes that would take 'longer than the age of the universe.' Quantum computers use superposition to try all combinations simultaneously. NSA warns of Y2Q by 2029. Banks (JP Morgan) are building quantum-resistant physical vaults. Military trains for 'quantum dark operations' using analog methods. Intelligence agencies collected encrypted data since the Cold War, waiting for quantum decryption.

Lessons

  • Be critical of information and question official narratives, especially regarding government and corporate activities, as psychological operations and subliminal influence are historically proven tactics.
  • Review and understand the terms and conditions of digital services and devices, recognizing the extent of privacy surrendered for convenience, and consider alternatives for sensitive communications.
  • Support independent journalism and monitoring organizations that investigate classified projects and demand transparency from government agencies to ensure accountability and oversight of powerful technologies.
  • Consider diversifying assets beyond purely digital forms (e.g., physical assets like gold, silver, land) and developing 'analog' skills, in preparation for potential large-scale cyber disruptions or a 'quantum dark' future.
  • Advocate for international agreements and ethical guidelines for the development and deployment of cyber weapons, AI, and other dual-use technologies to prevent catastrophic global conflicts and ensure human safety.

Quotes

"

"When you trade liberty for security, you end up with neither."

Host (paraphrasing Ben Franklin)
"

"Number stations are exactly what you think they are. And that's all I'll say about it."

Anonymous Intelligence Agent (quoted by Host)
"

"The system was used throughout Operation Desert Storm. quite successfully."

President of Silent Sounds
"

"The quantum apocalypse isn't coming, it's already here. The NSA isn't trying to stop it. It's preparing for what comes after."

Host

Q&A

Recent Questions

Related Episodes

Trump FIRES Bondi, CIA's "MK Ultra" History, and "Two Weeks" Spin, with Kiriakou, Davis and Ahmari
The Megyn Kelly ShowApr 2, 2026

Trump FIRES Bondi, CIA's "MK Ultra" History, and "Two Weeks" Spin, with Kiriakou, Davis and Ahmari

"This episode dissects the political shake-ups in the Trump administration, the escalating Iran conflict, and a former CIA officer's revelations about the agency's covert operations, including the infamous MK Ultra program and pervasive Israeli influence on U.S. foreign policy."

Trump AdministrationPam BondiAttorney General+2
LIVE: Gabbard, Ratcliffe and Patel Testify on Worldwide Threats in Senate Intelligence Hearing
The Intersection with Michael PopokMar 18, 2026

LIVE: Gabbard, Ratcliffe and Patel Testify on Worldwide Threats in Senate Intelligence Hearing

"Intelligence Community leaders detail a complex global threat landscape, highlighting escalating missile and cyber capabilities from state actors, the impact of AI on warfare, and the controversial US military actions in Iran and their collateral effects."

National SecurityCyber WarfareArtificial Intelligence+2
Joe Rogan Experience #2496 - Julia Mossbridge
The Joe Rogan ExperienceMay 8, 2026

Joe Rogan Experience #2496 - Julia Mossbridge

"Cognitive neuroscientist Julia Mossbridge discusses her research into precognition, telepathy in non-speaking autistic individuals, and a radical re-evaluation of quantum computing, suggesting that our minds are deeply intertwined with the fabric of reality."

PrecognitionTelepathyQuantum Physics+2
Professor Jiang: World War 3 Has Already Begun, Let Me Explain!
The Diary Of A CEOMay 7, 2026

Professor Jiang: World War 3 Has Already Begun, Let Me Explain!

"Professor Jiang asserts that World War III has already begun, detailing a series of highly probable geopolitical predictions, including a US civil war, a national draft, and the collapse of the American empire within 5-10 years."

GeopoliticsWorld War IIIAmerican Empire+2