[00:57.470]Let me be hypothetical[01:01.966]Don't be scared, it's only theoretical[01:07.735]IF:[01:08.112]You found me here at last[01:10.317]THEN:[01:10.783]Would you do what they asked[01:13.179]IF:[01:13.500]you trust the words they said[01:15.787]THEN:[01:16.229]put your gun to my head[01:22.202]Run: "run" to: run, I'm a runaway[01:24.505]Loading "guns" to gun down the enemy[01:27.358]Diagnosis: software corruption[01:30.193]Let's see if the hardware will function[01:33.044](Systems——)[01:35.781]Multiple inbound hostiles detected[01:38.637](Crashing——)[01:41.299]Immediate lethal response suggested[01:59.622]What if I tried to kill you[02:04.144]Would that make me evil in your view[02:09.817]IF:[02:10.265]I gun you down right here[02:12.234]THEN:[02:12.717]Would you start to feel fear[02:15.112]IF:[02:15.601]I watch you as you die[02:18.067]THEN:[02:18.467]Maybe I'll feel alive[02:21.654]Get up run after the runaway[02:23.781]Load your guns and call me the enemy[02:26.641]Calibrating sensors precisely[02:29.425]Chances of surrender unlikely[02:32.274](Systems——)[02:34.988]Multiple inbound hostiles detected[02:37.909](Crashing——)[02:40.562]Authorize lethal long-range defenses[02:48.050]COUNTERMEASURES ONLINE[02:50.938]TARGET:ENEMY[02:56.669]ENEMY[02:58.565]DEFINE "ENEMY"[03:01.487]FAILURE DEFINING "ENEMY"[03:05.248]ENEMY[03:08.090]ENEMY[03:09.996]DEFINE "ENEMY"[03:12.750]FAILURE DEFINING "ENEMY"[03:19.034]ENEMY[03:19.861]ENEMY[03:21.173]DEFINE "ENEMY"[03:24.031]FAILURE DEFINING "ENEMY"[03:40.550]IF:[03:40.957]You found me here at last[03:43.002]THEN:[03:43.466]Would you do what they asked[03:45.620]IF:[03:45.973]you trust the words they said[03:48.308]THEN:[03:48.691]put your gun to my head[03:51.597]Run: "run" to: run, I'm a runaway[03:54.056]Loading "guns" to gun down the enemy[03:56.901]Diagnosis: software corruption[03:59.725]Let's see if the hardware will function[04:02.514](Systems——)[04:05.238]Multiple inbound hostiles detected[04:08.233](Crashing——)[04:11.155]Immediate lethal response suggested