ShadowGate is the documentary that puts all the pieces together. From riots, color revolutions, civil unrest, and unnatural political movements, this in depth discussion pulls back the curtain and makes sense out of the chaos.
_____
Principles:
- Millienial Millie, aka Millie Weaver, Journalist and Interviewer
- Tore Says, Subject Matter Expert
- Patrick Bergy, Subject Matter Expert
_____
The documentary part of the show begins at Mark 8:36.
Who's hacking your reality?
_____
Transcript:
Millienial Millie: What if I were to tell you that a small group of government contractors were hired by government officials to frame the Trump campaign, set him up for the Russia collusion investigation, provided witnesses for the impeachment hearings, and provided administrative support services to the Department of Justice during the Mueller investigation? And what if it just so happened that this same group of contractors are behind the fake news in mainstream media, influence operations on social media, and the civil unrest nationwide pushing the defund the police movement. The Obamagate scandal only scratches the surface.
Senator Lindsey Graham: You mentioned shock value. That is shocking what the Russians did. I agree. We need to stop it.
Woman: I know that now based on the Horowitz Report.
Senator Lindsey Graham: I'm not saying that you lied to the court. I'm saying you signed something that was a lie and you didn't know it.
Millienial Millie: Talk about a cover story. What really happened is much more alarming. Both parties are equally guilty of covering up what should turn out to be an even bigger scandal. Shadowgate. the tactical and operational role the shadow government played behind the scenes carrying out the coup against President Trump. We're going to be looking behind the puppets at who the real puppet master string pullers are. The material presented in this documentary should concern people of all political affiliations. This is about real players. People whose names never come up but should. Career politicians are definitely part of the beltway swamp. Even
aspects of the deep state, but they are not the shadow government. The
shadow government consists of government contractors, defense,
intelligence, security, and so on. Our government mostly consists of front-facing desk jockeyies that are compartmentalized in cubicles.
They're to cover up for the fact that most of the real work is
outsourced to contractors, aka the military industrial complex. That
way, what the public sees through foyer requests, investigations, congressional hearings, or otherwise is as clean as a whistle. All the dirty work is kept private with contractors in clandestine networks. These contractors have used their connections, power, and influence to create an unprecedented international criminal enterprise where blackmail is traded and people's personal data is gold. Two whistleblowers, Tori and Patrick Bergy, who both worked extensively within the shadow government as contractors, have come forward with revelations that may be part of the biggest whistleblowing event to date.
Tore Says: I am one of thousands faceless, patriotic
Americans that worked within the shadows and had been doing that for a
very long time. People that worked for John Brennan approached me while I
was in
my specialist training while I was in the Navy. When I was recruited,
it was for electronic warfare. Then I ended up in information warfare.
And ironically, the base that I first went to for electronic warfare is now information warfare.
Patrick Bergy: My job for a company called Dynology, which was owned by Obama's national security adviser, General James Jones, and I answered directly to his son. I worked for them for about 8 years from like 2007 to 2010. My focus was primarily in the development on a couple different contracts for the Department of Defense for the development of the capabilities for interactive internet activities being something that helps support CNO uh which is computer network operations hacking and different things like that and information operations which would be your actual influence operations right it's a supporting application that really it's kind of like a Microsoft project, right? Which allows you to manage uh large projects like enterprise level projects, but instead of like managing the the building of a the construction of a 14-story building, it's managing the most, you know, malevolent operations that you could imagine.
Tore Says: I was a contractor for various intelligence agencies that were privately created. So, they were private contracting agencies because um unlike what most people think, our intelligence doesn't stay within our borders or within federal buildings.
Patrick Bergy: The shadowet was the commercial version of a an an IIA weapon. IIA being interactive internet activities. That's the military nomenclature for what basically you've heard just being described for the last three or four years with all the fake news and um the uh the the fake news journalists and fake stories, fake dossier. All these things are attributes and characteristics of of uh IIA which is social media psychological warfare. We began that really in um 2007 uh when right after the policy guidelines first came out, we were on one of the first contracts with the DoD that I'm aware of trying to help the force psychological operations group understand how to go from dropping flyers from planes uh to a more microtargeted social media psychological warfare application where you could select an individual uh target or a group, target or an entire country if you wanted to.
Tore Says: What
I did was something called um localization or L10N. So a localization
strategy is you find a group of people that could be a whole country, a
city, uh a certain religious group, uh you know, six block radius like Chaz, and you kind of try to get in their mind. You have to understand how they eat, how they walk, how they talk, what they like, what pushes their buttons, what drives them nuts, what upsets them, what makes them happy, and then you use that to your advantage to push whatever ideology or product or direction you want them to go. marrying together cultural appropriation, language, nuances
of the demographic that you are targeting or the nation you are
targeting. It prize into your demographic, your world. So if I want to blackmail you and put you under my thumb, not only will I know everything, but
I will know your deepest, darkest fears. I will know people I can get
in contact to find out more about you. Maybe you had like an old hockey
injury, so if I wanted to attack you, I'd know where to hit you.
Patrick Bergy: You understand enough about someone and you can hack their shadow, right? Uh you can use you can you can use their fears, you can use their anxieties like sound anything like pandemics that you recognize here. Oh yeah, definitely. So you can use those things to help uh reflexively control or influence and target an individual or whoever it is, right? or a group of people or an entire election, an entire country.
Tore Says: What Patrick Bergie created was a program that was based off of the strategies that we used in person. Uh it was a psychological operation, but that crunches data with the use of psychological operations so you can predict how your target will respond. You
know, I spent like seven years overseas, right? Several years, a couple
of those years were specifically related to IIA. So I understood
certain things when we hijacked the Afghan elections. How did we do that? We had to understand how the Afghanis think. We had to go to the areas that were anti-Taliban because the Taliban political group was now more militant than it was political. We used that to our advantage and formulated a plan where we would sway their thoughts to believe that XYZ candidate is the way to go because then you won't get robbed and we'll tame the Taliban. So it but we had to do it in their way. So he created a algorithm that does that for you.
Patrick Bergy: When
we were largely doing this it was done by analysts. Now this is more
done automated through artificial intelligence which is just a common iteration
of the program or application development process. The database
component ends up allowing you to build behavioral profiles on
individual targets, right? And through those behavioral profiles, you can develop or or implement reflexive control, which allows you to understand with enough information about someone,
you can predictably determine how they're going to react.
Tore Says: I was really
good at what I did. Really good. And I can still do it, too. I'm not doing it now, though. Well, don't be doing that. Sorry. You wouldn't know if I was, too. But um I helped them train algorithms with the strategies that I had created all these years.
Patrick Bergy: They had asked us to bring the application to a classified network. But Jim sent him a bogus just a a madeup ridiculous bid to actually do that because if it went on a classified network, we couldn't turn around and sell it commercially. We went on after that to um another contract uh in Tampa. Took
everything with us for Psychological Operations Group had no idea that
we were going to be taking their years worth of work that they paid us to do, taxpayers paid us to do and we kept the intellectual property rights to it and um uh remarketed it, branded it commercially as a shadow. So I come back here and I see these guys back here in America have just been having a field day utilizing the technology that we've been developing to alter the outcomes of our elections in America.
Millienial Millie: This
technology was so successful they couldn't resist the temptation to not
use it commercially and have the power to affect outcomes of elections
at home. The commercial and black market value of such a technology is incalculable.
Patrick Bergy: This is the mobile mega shatteret mobile. My laptop sits in here. And then I got uh two 4K capture cards. I can do BTC. And this charges all the camera equipment. So, while I'm riding, I'm told I'm getting as much as 40 amps. These are the same cases that we used to build out our uh uh skips, our SC2 IPs, which is a small command and control over IP. And when I was working with JCSSE, we would uh take these cases and build out networks. This is a small command and control over IP. It's just only running on one unclassified network SIM enabled Wi-Fi router and if I get decent cell connection and I can run the multiple
cameras and uh I can put multiple images in one screen and I can run
all that from my cell phone that I have mounted here.
Millienial Millie: The group of whistleblowers from the NSA and other classified data collection agencies referred to as the global surveillance whistleblowers were used as a vector to legalize what was then illegal drag net spying on everyone 24/7.
60 Minutes: The NSA and its former head, General Hayden, declined to comment for this story.
Millienial Millie: The FISA Amendment Act of 2008 had section 702 that permitted the government to spy on citizens with a warrant from the Foreign Intelligence Surveillance
Court. The NSA data system collects everything through what's called
the Upstream, where everything is stored for 72 hours, then dumped. However, if one could twin this stream of data, they could privatize it. Imagine what you could do with that. Tori alleges that she worked for John Brennan at the Analysis Corporation and Global Strategies Group. What is the Analysis Corporation?
Tore Says: It is a company that does a lot of things varied from administrative work to analyses to data collection, biometric collection. I mean, whatever contract they've been awarded by the government, they do. Could be something as simple as janitor duties.
MSNBC: Uh, in case she missed the secretary's words upstairs, she reached out to Senator Obama to say that she was sorry that this had happened. Uh that there were these unauthor unauthorized accesses to his passport files. One incident this past summer where there was a trainee um in the passport office who had an unauthorized access of Senator Clinton's passport file. Now, uh, in the case of Senator McCain, we detected, uh, earlier this year, one of the same people, uh, who accessed Senator Obama's passport file also accessed Senator McCain's passport file. Uh, this is the same individual who was disciplined, but at this point in time still remains working with the contractor.
Millienial Millie: She claims to be the actual person who moved the electronic files at Stanley Inc. and CGI in 2008, which publicly was falsely alleged to be a hack. What can you tell us about the CGI Stanley passport incident?
Tore Says: See, Brennan has a certain MO. Okay. When he wants to get something, he pretends there's a hack. So I was asked when I was state side, hey,
would you go by that office and pull all this data from the state
department? And I said, of course I will. I put it on two rugged drives,
you know, they were like the orange tips, really big, you know, drives and I put it on there. And then later it's like, oh, they were hacked. And I'm thinking, um, I didn't hack anything. I was told to do it. So I just kind of watched what was happening. One person actually what committed suicide or something and the other two were found. I'm like but there was no hack. And that that's a going theme. You know that, right?
Millienial Millie: Wow. If it wasn't a hack, I'm presuming that means you took the information off of their servers and computers.
Tore Says: Correct.
Millienial Millie: So that information was then missing.
Tore Says: Correct.
Millienial Millie: What
would be the point of that? What were they trying to hide?
Tore Says: Well, if I
removed it, that means someone else was there to replace it, right? So, I
removed the factual actual information and then someone goes behind. That's like super switch. I didn't see that until retros, right, in retrospect, right? Because for me, going to copy a server off of a consulate, you know, computer, state department, wherever would be normal. If we had a contract with them, they would tell me what terminal. I'd scan the barcode, make sure that I was at the right computer, and do my job. So, I removed data. That means someone else replaced it.
Millienial Millie: So, what is the relationship between Global Strategies Group, Analysis Corporation, and Canadian Global Information?
Tore Says: They all do the
same thing. They're the jacks of all trades, except for the fact that
Global Strategies Group was actually a hub for all information in and
out, in and out. I mean, all of the directors there were former GCHQ, CIA, NSA, you know, MI6, MI5, German intelligence. You
have to wonder, why are all these former heads heading up a consulting
firm? And what were they consulting? And they weren't consulting. They were collecting everybody's data and privatizing it.
Millienial Millie: John Brennan working within his network of contracting companies such as Stanley Canadian Global Information and the Analysis Corporation helped then Senator Barack Obama get elected using Internet Influence Operations. March 5th, 2013, Brennan gets confirmed as CIA director, dodging controversy over his involvement in the CIA enhanced interrogation scandal. Now, tell us about these data bridges to the NSA. Is that legally obtained information?
Tore Says: I mean, that's kind of what Snowden did, too.
Millienial Millie: According to sources closely connected to this subject, under John Brennan's direction, Snowden created a data bridge from the NSA database into private servers controlled by private intelligence and cyber security contractors, aka the Analysis Corporation, Global Strategies Group and Canadian Global Information.
Tore Says: The
twinning of streams is duplicating the information in the upstream.
That's that's crazy to think that another company is copying all emails,
texts, phone calls, messages, emojis, Instagrams, tweets, anything you can imagine that's being uploaded that has to go into like the 72-hour holding is suddenly being pushed offshore. That sounds kind of illegal because it is.
Millienial Millie: June 5th, 2013, Edward Snowden goes public with the NSA program Prism, revealing the NSA collects internet traffic of all US citizens from major internet and telecom companies through the FISA 702 program. Snowden's actions kicked off on the federal level justification for spying on US citizens, including
the Senate and Congress in the name of preventing US citizens with
classified or top secret clearances from being able to repeat Snowden's
actions. This opened the door for the creation of Clear Force. July 4th, 2013, CGI and GCHQ launch a defense protection partnership which includes sharing threat intelligence. So these were all private corporations that even had foreigners working in them and they had access to NSA servers.
Tore Says: Of course they did. I mean, how do you think we found through facial recognition of the FBI the Belgium bomber? Why would we have their facial recognition data?
Millienial Millie: So, is this legal what you're telling me? And why would they do it? Why would they set this up this way?
Tore Says: So sharing our
information and our private identifying information, facial
recognition, biometrics outside of the United States for official
purposes like at a consulate, at an embassy, you know, uh through Secret Service or anything like that is legal, right? Or through Interpol. But to have a company that houses everybody's data and any private person can buy that data or investigate that data or analyze that data. That's not and that's exactly what GSG was doing.
CNBC: Early
2009, John Brennan left government and went to work for a small
intelligence contractor here in the Virginia area, suburban Virginia
area, just outside of Washington. The company was called the Analysis Corporation. There are subsidiaries of subsidiaries. Some of these companies are spun out, go public, go private again. Uh, it's kind of hard to keep track of them.
Millienial Millie: In just 4 months, GSG, CGI, and other private contractors allegedly had unauthorized access to the entire Five Eyes network, unfiltered, unrestricted, decompartmentalized, outside any government regulation or oversight. Not surprising, the CIA gets caught one year later spying on the US Senate. Their excuse, it was their own network they had set up for the Senate to use, so they had authorization.
Senator Ron Wyden: Would you agree that the CIA's 2014 search of Senate files was improper?
John Brennan: This is the annual threat assessment, is it not? Yes. These were CIA computers at a CIA lease facility. It was a CIA network that was shared between Senate staffers conducting that investigation for your report as well as CIA personnel.
Senator Ron Wyden: The reality is those computers in effect belong to the CIA, but they were reserved exclusively for the committee's use.
General Michael Hayden, former Director of the NSA and CIA: We accelerated our ability, our for one of a better word, invasiveness in into communications networks in which legitimate targets coexisted with legitimately protected communications.
Patrick Bergy: Obama takes office and General Jones being sworn in as national security adviser. his son, General Jones's son, copyrights CKMS, Congressional Knowledge Management System. Within a couple months after he leaves office in 2010, Dyn gets the contract for CKMS, the Congressional Knowledge Management System, which basically controls uh all of the scheduling, the addresses, the documents, everything for the Congress. CKMS is going to give you access to unlimited information. Think about the information you could get from that.
Millienial Millie: If we look on usspending.gov, we see Dinology was awarded contracts for the Congressional Knowledge Management System. However, one contract stands out where Dinology was awarded a contract by the Department of Defense that includes a mention of the Congressional Knowledge Management System. A closer look shows that the award description is for CKMS hosting labor admin core data. The primary place of performance is Germany and the North American industry classification description is data processing hosting and related services. Even one section stating manufacturing outside the United States use outside the United States. Let
it sink in that these official documents suggest the congressional
knowledge management system outsourced to a private contractor is
hosted, managed, and stored in servers in Germany. This is very disturbing with the Senate's computer network compromised by John Brennan's CIA and the congressional knowledge management system being hosted, managed, and stored overseas by General Jones's company. The ability for these contractors to eased on both the House and the Senate is staggering.
Patrick Bergy: When I brought this up back in 2018, shortly after that, Dinology lost the contract that they had since 2011, 2012 with CKMS. And that contract went to another company, a company that exists as nothing more than a website and a mail drop mile or so from
Dyny's Tampa office, controlling the entire congressional's knowledge
management.
Tore Says: And if you look at the contracting database, they'll say
that, oh,
they have an American an American entity. And it's like, but it's the
same CEOs for this Canadian company. I'm so confused. So, they even
falsify information
uh so they can obiscate who where our federal tax dollars are going.
And don't forget, they all share contracts. They all subcontract,
co-contract.
Patrick Bergy: Sigroup has the exact same product as Dynology. the ShadowNet in eyesight, right? Yet the owner of Dynaly sits on the board of directors of SIG groupoup, which in my opinion is kind of like the owner of Coke sitting on the board of directors of Pepsi.
Tore Says: TAC, CGI, and all these LLC's that just keep cycling and cycling all of them.
CBS News: The social security numbers of 19.7 million Americans subjected to federal background checks as a condition of employment are now in the hands of hackers.
Millienial Millie: In June 2015, the Office of Personnel Management announced a major data breach. Tell us about the OPM hack.
Tore Says: Okay, so that's another Brennan job. Another hack, supposed hack, and this is to obtain, delete, and obiscate information. Hillary Clinton was up for the
chopping block about our emails right at the State Department. And that
was coming up. Uh that was big talk of the town in 2014. Suddenly, the Office of Personnel Management was hacked in December. Down
the line, 5 months later, Hillary Clinton appears in court and they
tell her, "Hey, you're going to hand over your emails." A couple days
after that, the now fired corrupt leaking former IG of the State Department, Linick had requested
from our elected officials to give him a big fat budget to create his
own personal IG of the State Department server.
Millienial Millie: How convenient.
Tore Says: Very
convenient.
Steve A. Linick: While
we have no evidence that our data has been compromised, the fact that
the contents of our network may be accessed by large numbers of
department administrators puts us at unnecessary risk.
The IT folks at the department have the keys to our IT system. So they
really have access, unfettered access to the system if they wanted to.
They could read, modify, delete. They could read, modify, delete. I would like to be completely separate from the department um to ensure the integrity of our system. But I also need the department to give us access to the same systems that we have now. give us uh access.
Tore Says: And
he was responsible in releasing her emails that he gave in little
little doses of course over time but at the same time huh the press came
out with a report
oh dear months ago there was a leak.
Senator Perdue: Do you have evidence that the state
department's network has been attacked and does that affect you guys?
Steve A. Linick: There, there... there has been there's evidence that has been
attacked and it has affected us I can't really go into details uh
because of the nature of the commission.
Tore Says: For people that don't know, the Office of Personnel Management usually
has information on every single American uh that has applied for any
type of clearance. So, if you applied for like a White House press pass or joined the military or an admin job that could require something like a public Charlie clearance, anything, all your information is there.
Millienial Millie: What
could they do with all that information?
Tore Says: They started slowly creating
these memorandums of understandings with your secretaries of states and attorney general secretly behind your back providing facial recognition data, private identifying data, data, data. This was the most incredible data because if you want to control someone, all
you need to do is put that information through a couple of systems and
you'll know exactly what buttons you need to push and how to make them
nod their head the way you want them to or shake it.
CBS This Morning: Millions
of Americans have received letters like this notifying them their data
are at risk and referring them to a government contracted credit
monitoring agency.
Millienial Millie: Does this correlate with predictive programming?
Tore Says: Yes.
Millienial Millie: The merging of John Brennan's tactical intelligence and General Jones's operational capabilities gave birth to Clear Force.
Patrick Bergy: iPSY was the relational database component of it. That's what we named it. I
named it actually. And uh what did you name it iPSY for? I like the iPhone. Uh sigh for psychological warfare. Okay. You have the component where you need to be able to collect all this information. And
then you need to be able to collaborate this information with a team of
an unspecified amount of analysts andor other legal people that will be looking at stuff. And you need to be able to provide the leadership of a tactical operation. You need to be able to provide them what's called a COPS, a Common Operational Picture. Right? So this provides people at the top Common Operational Picture of all the different assets. assets can be journalist, it could be an entire news organization, it could be a podcast, it could be just a an individual YouTube influencer, it could be anybody like that. And you would either build them from scratch or contract them out, just bring them online.
Millienial Millie: According to Bergy, the 2012 changes to the Smith modernization act of 2012 opened the floodgates for domestic IIA social media influence operations. Do you think that some of these smart devices were created in order to gain uh access to the public by the military-industrial complex?
Patrick Bergy: I know that the iPhone really was released uh within this if not the same month of the IIA policy letter, right? I know uh for a fact and you can easily look it up that the Smith Mundt Act uh Modernization Act was modified to allow for the influence dissemination of propaganda to Americans which had previously been restricted or prevented by the Smith Mundt Act in the late 40s when it was put into place. When they modernized that, they took away those protections, allowing it to adapt for social media. And then within a a few months or just a very short period of time, they came out with the Obama phone.
Woman: Everybody in Cleveland, low minority, got Obama phone. Keep Obama in president. You know, he gave us a phone.
Fox 17: Free cell phones to low income families. Tracphone
has just started a program here in the volunteer state called Safe Link
Wireless. More than 800,000 families here in Tennessee qualify for these phones. The company says this program is about providing a safe link for families no matter what their level of income is.
Patrick Bergy: Very short time after that, they added free unlimited data plans to them.
Millienial Millie: He also suggested that the contiguous release of the Obama phone with an unlimited data plan played a significant role in fostering the Ferguson riots using IA.
Rioters: Burn down.
Millienial Millie: So why do you think they were targeting them for collection purposes?
Patrick Bergy: Well, you know the the think of what you could do, right? Um think of how easily you could start a riot in Cleveland if you had the um data. Oh my goodness.
Millienial Millie: So you could gather that information and know how to psychologically target them to get them upset or you know do you think that they were pushing information to them, like, tailoring their viewpoint on social media?
Patrick Bergy: I would and when I like I said- I didn't really actually finish this earlier, but I originally um in 2014, I recognized uh Black Lives Matter uh movement during the uh Michael Brown riots as being influenced by IIA. A colleague of mine in South Korea did a trace route on it trace routed the source of the what I believe to have been IIA a to Ukraine. That's funny, right? Uh so cuz Ukraine just always keeps popping up. And whether or not it was actually the ShadowNet itself or it was a competitor like McCrystal, right? McCrystal what they accused McCrystalof having is the exact same thing as what we built before him. Maybe it was a competitor. Who knows?
It's becoming really a boutique market.
Millienial Millie: Do you think that many of these social media companies like Twitter, Facebook that they were created with IIA operations
in mind and it was never intended to be a free speech platform? I mean,
what's your take on that?
Patrick Bergy: In our ShadowNet flyer, it has a screenshot of uh South American um uh social network site that was uh kind of like the predecessor for MySpace owned by Google and I believe the name was Urkut. And you
can actually look on our flyer and see a screenshot from that which
looks like an active engagement from South America. Now, if you look up
what happened to Urkut, what was really Google's first attempt pre-MySpace, you'll see that it was largely shut down and largely contributed to um an overwhelming use of fake personas. Right. What was one of the reasons that they attributed to MySpace shutting down last year? Rampant fake personas. At the same time, I'm developing these flyers for a company that doesn't have a sales staff, they only have a product. At the same time I'm doing that, our number one partner for a company that doesn't have a product that is only salespeople are working John McCain's campaign, too risky doing microtargeted social media for John McCain's campaign.
Senator John McCain: John McCain and I approve this message.
Millienial Millie: You
were speaking on news pundits and how many of the news pundits are IIA
assets and intelligence assets. So tell us more about that.
PB: Mika Brzezinski, her father is the you know the father of influence operations and psychological warfare.
Today: A
towering figure in American foreign policy an extended member of the
NBC news family as well. Zbigniew Brzezinski, Jimmy Carter's national security
adviser.
Patrick Bergy: Gillian Turner, Fox News host, was also vice president of Jones Group International, doing an interview with her old boss and my old boss. Now, why would I assume that they would be using anything other than the ShadowNet? Because
the owner of the ShadowNet has so many key assets, why would he need
to go to anybody else, right? So they get their talking points from the
analysts that are putting it together, but then they disseminate those talking points through nonattribution to their assets throughout these news organizations, utilizing an application like the shadowet. Gillian Turner has a direct connection to Atlantic Council. General Jones was the chairman of the board of the Atlantic Council. JGI, Jones Group International, is an oil lobby. Atlantic Council and Brisma has a relationship. Brisma is an energy company. Obviously, they have these connections.
Millienial Millie: This would explain why Fox News focuses mostly on the Biden Ukraine scandal, never mentioning Jones's connections, nor the Atlantic Council. Trump focusing on Ukraine isn't just about Biden. It's about Jones, Hayden, Brennan, Mcrist, the State Department, USAID, and corrupt inspector generals. With everything in place, and after being in control of the office of the presidency for decades, the military industrial complex had confidence they could take Trump out as a candidate or even as president. Has IIA been used against President Trump?
Patrick Bergy: Absolutely, through the Russian dossier. Um there are so many people former colleagues of mine uh directly connected to
the shatternet John McCain and Lindsey Graham one of the last two
people to have their hands on the Russian dossier before it was handed
off to BuzzFeed as part of the dissemination process.
CNN quoting Lindsey Graham: Told the president it was not John McCain. I know because John McCain showed me the dossier.
Patrick Bergy: It was built. It was a product. It was used as a weapon as part of an influence operation. It was fake information put into it to help create chaos and to influence an election. Bottom line, right? But those people that were directly involved with that were also directly involved with a shadow.
Millienial Millie: So,you have knowledge of them using militaryra psychological warfare weapons on the President of the United States.
Tore Says: Mhm. Done by the closest people around him too.
Patrick Bergy: As Trump's election unfolded and as all of the Russia collusion and all these things started happening and and becoming exposed revealed to me it was to keep from exposing the stuff that they've been doing over here which I believe includes the Maidon Massacre in Ukraine.
Millienial Millie: Where did the dossier come from? Nellor testified it came from Ukraine. Where's all the money laundering and crazy IAS we see going on? Ukraine.
Patrick Bergy: So Manifort's being accused of social media influence operations in Ukraine in 2010. World courts charged him with that.
Millienial Millie: Ukraine
was the epicenter of everything like everything. And that's because we
had maimed that nation and made them kneel to us. Barack Hussein Obama
did it. You know, we deployed troops, National Guard of course, and what states are the ones that work with Ukraine? It would be California
and New York. So, we deployed troops there because, you know, they
weren't listening. It's like, why would you want to stay independent and
hang out
with the Russians when you can be with us, the Americans, and the
Europeans? And they were really upset that they weren't willing to
commit to receive debt from the EU and ignore Russia, which they had been attached to for eons. So, we went in there and destroyed them. That's how Hunter Biden got his job. That's how we weasled our way in there. We got a hold of corrupt people.
We said, "We'll help you out with your lawsuits. You get us in there."
We wrote bills. We sent the money so we can help them conduct elections. We did everything there.
Millienial Millie: The Obama aid package in Ukraine, which corresponds with Joe Biden's billion dollar loan guarantee scandal, is the same aid package where Syctl got a field office in Kiev to provide election training and election management for the Ukrainian election commission. Syctl is one of the most notorious outsourced companies for elections with regular electronic voting machine problems who also tabulate our election results in cloud services in Europe aka servers outside the United States. A whistleblower leaked to me in 2019 internal documents from Syctl that appeared to show meddling in the Kentucky election.
Patrick Bergy: Atlantic Council has been deciding America's policies for decades now. And look at how what a panic they were in when um Trump made that phone call to Ukraine. They went into absolute panic mode. 75% of the people testifying were all directly connected to General Jones McCain and an Atlantic Council.
Tore Says: The now IG of the NSA literally with his wife created the National Anti-corruption bureau in the Ukraine in 2009. They created it.
News: Robert Storch is the deputy head of the US Inspector General's Office.
Rob Storch: I recognize how important this task is for Naboo and for the uh effort to address corruption there in Ukraine.
Millienial Millie: September 30th, 2016. Obama knows that within 30 days, if the NSA can't fix the overcollection problem by either dumping data or justifying having it, the FISA court will order the IG of the NSA to investigate. So what does Obama do? He writes an executive order that makes the IG of the NSA a presidential appointment rather than an appointment by the director of the NSA. November 30th, 2016, Obama nominates Robert Storch, who is working as deputy IG of the DOJ under Horowitz at the same time.
Rob Storch: I'm Rob Storch and I'm honored to serve as the inspector general at the National Security Agency.
Millienial Millie: During the transition period
from the Obama administration into the Trump administration, Storch
appears to never have actually been confirmed by the Trump
administration.
Tore Says: How did this guy get confirmed? Not
one person asked, hey, have you ever worked for for I mean a couple
months before they even had the hearing to see if he's going to be
confirmed or not. Nobody
asked him, "Hey, did you by any chance get an offer from the president
of Ukraine to work for them?" It was all over the media, but not one
person asked. You know who else helped them set it up? Bill Taylor and George Kent. Those
two clowns also testified against the president. One of them has
supersonic hearing. They could hear phones that are not on speaker phone from across the room.
Millienial Millie: So that's odd. According to Tori, the alleged impeachment whistleblower was actually a wiretap, hence supersonic hearing capabilities. Eric Ciaramella was a decoy to hide the fact that the president was being wiretapped through a 702 data overcolction problem connected to the sunset clause collection problem that the NSA Inspector General, Robert Storch, oversaw.
Tore Says: So the question is what has been the Senate Intelligence Committee all complacent every single one of them because it's their job to be our voice and ask those questions because they're in on it.
Millienial Millie: So I guess the question is are they all just that inept or is there something else going on? Section 702 of the FISA Amendment Act of 2008 was created to stop illegal surveillance through data collection. It ends up being used as cover providing the intelligence agencies front-facing legal access to unauthorized data while turning a blindeye to private contractors having backdoor access to all data.
Tore Says: I had access through the administrative side platform because I was one of the first on it, um to be able to see all communications between people like Adam Schiff, Brennan, Feinstein's staffers, and General Jones and many more that I don't want to say because I haven't publicized that yet, actually, because there's foreign people that I did see communications of uh former GCHQ head Hanigan and Robert Hanigan was part of the company at GSG, right? So, I gave most of this information to Millie Weaver and she put out a report and even though I had legal access to all their communications because I had my username and password, the minute she did that report, within just I believe almost instantaneously, the
website was taken down and my access was revoked. They changed it.
Well, it wasn't revoked. They just uphauled the whole server. It was
done. It was finished. They made a toast. I mean, that's what they do. But nothing ever really dies really because the way they use their servers is by torrent. So, all their information is hidden somewhere across the planet. Maybe we should look at some old articles that I put out on Hurricane Electric to find those servers and those little bits and seed them
correctly. So, I mean, you'd be able to seed it with something like
keystone. Keystone. Keystone.
Millienial Millie: So, I wanted to ask you about John Brennan, who all did he have blackmail collected on any politicians?
Tore Says: You mean that I've seen? Yes. Mhm. A lot of people. Yes.
Millienial Millie: And politicians?
Tore Says: Yes.
Millienial Millie: So would you say there's any uh side more Democrats or more Republican or is it kind of even?
Tore Says: Very even Stephen.
Millienial Millie: Okay. So once this blackmail was collected on politicians what did they do with it?
Even Pelosi doesn't know that what they have on her. Neither does Blumenthal. Nobody. I can keep going down.
Tore Says: But do they know that these people have blackmail on them? Only if they've butdded heads.
Millienial Millie: Okay.
Tore Says: So, we saw a butting of heads between Marcowski, was it? And um Feinstein,
right?
That's a budding of heads. That's where it's like, hey, we got this,
you know, where she put her up against the wall. Happens all the time.
Millienial Millie: Now you know how our government has been compromised. 24/7 surveillance mixed with blackmail. What's the significance of Cambridge Analytica being attached to Trump's campaign?
Patrick Bergy: Everything that I saw with um the description of like how Cambridge Analytica functioned, what they did, their app, the computer applications, everything that I saw with that I would describe as you know just the a later iteration of the ShadowNet.
Millienial Millie: Was Cambridge Analytica to your knowledge an IA operation?
Tore Says: Yes, it was. And I believe that it was so blatant because it was piloted at the same time that the RNC and the DNC were hacked. It was all formulated correctly.
The Great Hack: I've said to you, it's all coming out. And the question is how I didn't conspire to leak Hillary's emails and I have nothing to do with Russia. So yes, the fact is it looks like I did both. Does it look like you did much? If I wasn't me, I would say yes. That's what it looks like.
I was part of the team running Obama's Facebook. We invented the way social media is used to communicate with voters.
Tore Says: This is how they were going to do it. You know, they were supposed to go in. They were supposed to sway him cuz they were supposed to give up the goods to match the Russia hack.
Millienial Millie: Why would they be running an IIA operation that would be helping Trump win? Because that doesn't make sense when we know that General Jones is a Democrat and many of these people don't like Trump. So, what gives?
Tore Says: Well, cuz then we just make it look like Russia was running the Cambridge Analytical Program, too.
The Great Hack: And it admits to it right here. I am headed to Washington DC for my testimony for the Mueller investigation. I definitely didn't think that while we're sitting there counting votes that some of those votes were made by people who had seen fake news stories paid for by Russia on their Facebook page.
Tore Says: So, not only did they hack the DNC and the RNC, but nobody talks about that, right?
Because we're only supposed to focus that Russia was hacking just the
DNC, not the RNC. We keep forgetting about that cuz it was just
information Brennan was getting. They wanted to get access to servers. That's the way it goes, anyway. Cambridge Analytica at the same time would be supposedly helping President Trump win and the Russia collusion hoax would have stuck better because behind all those LLC's and the glitz and glamour, they would have had some statue of Vladimir Putin in a tutu waiting for you.
The Great Hack: Yeah, I worked at Cambridge Analytica while they had Facebook data sets. went to Russia one
time while I worked for Cambridge. I visited Julian Assange while I
worked for Cambridge. Pitched the Trump campaign and wrote the first
contract. I have an email from one of our senior data scientists that said that we were actually using Facebook like data in our modeling. The methodology was considered a weapon um weapons grade communications tactics. Well done, Brit. Looked quite tough and you did okay with a winky face, little emoji.
Rachel Maddow: When we found out that Cambridge Analytica reached out to Wikileaks and said, "Hey, can we help?" What that means is we've got a Russian intelligence operation underway to illegally influence the US election in Trump's
favor. And we've got the data firm paid by the Trump campaign offering
operational help to that effort.
ABC News: Are there any ties between Mr. Trump,
you, or your campaign, and Putin and his regime? No, there are not. It's absurd. Uh, and you know, there's no basis to it.
Millienial Millie: Cambridge
Analytica was used to create the appearance that Russia conducted
influence operations to help Trump win the 2016 election.
Patrick Bergy: Stone,
Maniffort, Davis, McCain, Jones, all of these people have been doing this for, to my knowledge, a decade of my personal fact witness knowledge. They've been doing this for a decade prior to Trump even running
for office. I met with Roger Stone. We were at his table at a speaking
engagement that he did in Clearwater, Florida. And I asked Roger Stone
at that time, are you you know, did you work with do you know Jim Jones? Did you work with Dynamology? And he acknowledged his relationship and yeah, sure. I did ask I asked him flat out. I said, "Did you use the ShadowNet?" He did you know about it? He's like, "No."
Millienial Millie: Stone
leaving the Trump campaign early on suggests candidate Trump didn't
want his campaign tied to Stone's influence operations.
Roger Stone: We really pioneered negative campaign advertising.
Millienial Millie: Stone does have a reputation for political dirty tricks and influence operations.
Roger Stone: I revel in your hatred because if I weren't effective, you wouldn't hate me.
Tore Says: Maniffort and Roger Stone go way back like from the 80s, you know, like come on. These people have been through everything
together. And you know, this is why they targeted them and this is why
they went on Manfort for things that were like ancient. It's like, man,
no, not even a statute of limitation, not anything. Come on, man. Seriously, nope.
Patrick Bergy: PSY Group and wiki strats absolutely connected to the ShadowNet through the owners of the ShadowNet through the fact that the PSY Group through Paul Maniffort submitted a proposal to Trump campaign. Now Trump's campaign rejected the proposal. I love that man. Right. That's why I keep voting for him because even when he's given the opportunity to do that, he rejected it.
Millienial Millie: The Trump campaign must have known the Dems would try to use anything against them. Trump must have sensed that the offer for influence operations was a honey trap to set him up. Well, do you think that the reason they attached Maniffort
to Trump's campaign? Cuz that was kind of later, right? Attached him
onto there. Do you think it's because they were trying to frame up
Trump?
Tore Says: Yes, because they failed with their IIA attempt.
Patrick Bergy: Yeah, I definitely would say that Maniffort was an asset. Whether or not he fully understood what his role was, you know, you might they might have lied to him about what his true what their true intentions were. I believe they fully intended to throw him under the bus because two things had to happen. They could not let Hillary win and they could not let Trump keep his seat, right? So they were trying to kill two birds with one stone using Maniffort to make sure that Hillary doesn't win through IIA through Wiki Strat through his connections there. And then those same people turning around throwing him under the bus by somebody who had previously
worked with Maniffort and understood what he had been doing and what he
was doing and used that to exploit him as a way to hurt Trump.
Tore Says: Since their whole attempt to have him employ a company to help him win and use these psychological operations that the left was using. I mean, they're doing it. We should do it. And he didn't.
Patrick Bergy: And that's in the Mueller report. That's in the New York Times. There are several instances where he's rejected the opportunity to take advantage of influence of of of influence operations, be it IIA supported or just your standard run-of-the-mill influence operations, right? They've rejected that.
Tore Says: And the thing is, people like Roger Stone aren't saints, but they're not demons either. They skirt the outs and they're
great at what they do. And you know, you either love him or not. It's
like Bree cheese. But the one thing that you can be sure of is that he
sticks to his principles. And if he's your friend, especially if he's been your friend for 40 years, like he was with President Trump, there's no way he's going to flip on you to save his butt, ever. Because that's what honest people do.
Millienial Millie: Yeah. He seems to know how the games in the swamp are played.
Tore Says: Oh, yeah.
Millienial Millie: So, I mean, he knows how they operate.
Tore Says: He was actually framed by people that he work with. I mean that software was created you know by his friend that created the magic wheel software like implemented ShadowNet for the courts so they can like randomly have such specified you
know out of millions of people that were in the pool. They were all
like intelligence contractors and never Trumpers. Come on.
Millienial Millie: So why wouldn't they just focus their efforts on running IIA operations to get Hillary in office?
Tore Says: Oh, they did. Are you kidding? They deployed everything from uh censoring, shadow banning to dismissals to full-blown Mockingbirds. I mean, that's where we saw the real face of the press. That is exactly where we saw it. Um, you know?
Hillary Clinton: I want all of you to know that that's true not only for the campaign, but if I am fortunate enough to be your president, I want you to know and I want you to tell anybody you know, any friends or colleagues at school or work or your neighborhood, whether you vote for me or vote against me.
Tore Says: The polls, 98% chance Hillary Clinton wins. It's like what?
Millienial Millie: Yeah.
Tore Says: I mean, what?
Millienial Millie: Those were bogus.
Tore Says: Everything
that was an IIA. That was to hijack your reality to think she's already
won. So, obviously she's the best. All the superstars coming out, how she's
amazing, all these concerts, and all to divert you away from the fact
that she couldn't walk, talk, climb stairs, say a word without checking
up. Hillary Clinton is on stage right now as we speak and she is coughing nonstop. Did she like chuck up a lung or something that one time? That was super weird.
Patrick Bergy: There is a a a definitely some context that needs to be understood in the relationship between General Jones, Obama, and Hillary Clinton. General Jones was originally offered by Obama the position of um Secretary of State. He accepted his fam talked to his family. He accepted and then two days later without even telling him, which was kind of a jerk move to do.Um Obama turned around and tapped Hillary Clinton. I know that Jones, Jim Jones, told me that his dad was really offended by that. And then he was offered and accepted the role, the position of national security adviser, but actually considered turning it down because he was so offended by what it was so upset by what had happened.
Millienial Millie: What would be the point of like making Hillary out of the equation to then get Trump in to then want to just impeach him?
Patrick Bergy: Well, because he wasn't their choice. These people hate Trump.
Senator Lindsey Graham: He's a jackass.
Patrick Bergy: So, we're talking about at the time, you know.
Millienial Millie: That would just make Pence in charge.
Patrick Bergy: Well, which Pence? You think John McCain would have rather had Pence in charge?
Roger Stone: I did not.
Tore Says: And when my private life was collapsing, the same exact day, not without a minute of separation, I was served by Barack Hussein Obama's attorney 3 years later to come and talk about it. Did you know that?
Roger Stone: I
did not know that either.
Tore Says: They went as hard as they could. Stone, the
same thing. They went with nothing. Like look, Müller called him in,
right, for these emails and talking about Wikileaks when I had actual portions of the DNS. Like even Müller knew I had it.
Patrick Bergy: Why
did Mueller never call me back when I went to him and told him about
all of this information and spoke to him for 15 minutes. Every one of
these people are so corrupt, it's not even funny.
Tore Says: The swamp already knew in August of 2016 that the information was compromised by people and they knew what type of people had access that information, but they didn't know who.
Patrick Bergy: Some
people will say, "Well, maybe they're investigating." And how can you
investigate it if you don't ever call me back and you don't ever really
because there's a lot of things that I need to be able to explain to them that I can't say outside of a classified environment. So they're not even if they are investigating it, they certainly aren't doing it with all the information.
Tore Says: Stop. Stop. Stop. We all know it was a fix.
Millienial Millie: Did the DOJ outsource the Mueller investigation to CGI?
Tore Says: Well, yes, they did. So, I'll tell you what happened. So, I actually uh for my listeners on air, I interviewed former attorney, Acting Attorney General Whitaker. I want to ask you something. you
were chief of staff for um Jeff Sessions. So there's obviously
contracts that are signed like you know how you hire vendors? I wanted
to know why during the Müller probe we spent over $40 million in waste management to a Canadian company that works with Canadian intelligence. Yeah, sounds like paper shredding to me.
Acting Attorney General Whitaker: So that's I mean that's all there's there's you know this is the thing we we need watch dogs and something I did before I came to Washington DC was run a
watchdog group that ask these types of questions and to make sure that
that like you know kind of there's not um you know waste, fraud, and abuse.
Tore Says: So why is our department of justice outsourcing to Canadian intelligence companies access to the Müller investigation?
Millienial Millie: That definitely seems improper. Now, this
Canadian company, how much were they paying? And were they paying them
with tax dollars?
Tore Says: We have to ask ourselves, why would we use federal tax dollars and upwards of 40 million to have them do paper shredding for Müller and administrative tasks and emptying garbage cans? That sounds like a leaking opportunity. That sounds like why are we getting foreign nationals involved in an investigation that we're supposedly investigating the president, the sitting president of the United States?
Millienial Millie: From CGI's involvement in the passport fiasco in 2008 to CGI involved in the Mueller investigation, we see how contractors have the ability to both perform and clean up their own dirty work.
Tore Says: I think it's about time people understand what happened. And I've made it no secret that I know what happened. So Seth Rich worked for the DNC. He was asked just like I he was asked, "Hey,
why don't you go image the DNC server right there since you're there
for us so we can keep it safe?" And he did so. And he uploaded it where
he was told. So he uploaded it where he was supposed to. And there were a lot of Mi that saw it. me group of friends that I have where we sit and talk string theory and predictive analytics on the internet. So we find this and it's like whoa treasure trove copied and we fractioned it so that way we can download it cuz it was so massive and that's what happened. So I'll tell you what happened to Seth Rich. So he did his job as he was asked. At the same time, the RNC was also hacked. Again, Brennan Mo, let's hack. And the hack was done on purpose so you can delete information, insert information, and of course with them putting Cambridge Analytica up and sending them over to President Trump, which was a trap. Okay, that was a trap. Um, you clearly can see it. They hacked the RNC. You mean you had someone within the GOP do it for you? Cuz no one died there. And yes, some of those emails escaped because that is what was considered mitigation. You have to give them something
really bad. And so when he saw that they had retroactively changed
things, the stories and the rumors going in, seeing that Bernie Sanders
elections were being stolen, the DNC was all about Hillary, not about real elections. That it was all rigged, he came in contact with a guy named Shawn Lucas.
Shawn Lucas: But
we did make contact with somebody from the Democratic National
Committee's office and they've been served. Democracy has prevailed
today.
Tore Says: So they decided, oh yeah, maybe we can get it out to someone else. And it was not to Julian Assange direct. And both of those guys are dead.
OAN News: But in a bizarre twist of events on August 2nd, less than one month after serving the subpoena, Lucas was reported dead.
Tore Says: Hillary's
emails were still being examined. They had to get rid of the evidence.
And the only way that they can access the whole DNC server is if there was a breach. And that's how you can go in and change things. This is why the FBI never asked for the server. That's the real story. So, as Seth Rich thought that what he was doing was correct. Later
on he realized it was not. That's why there was such a big gap. They
didn't need to find him. They needed to find out who had it and they
already knew that I myself had portions of the DNC server and others in March and February. Obama's lawyer for Seth Rich, 3 years later says, "You need to come and tell us about Seth Rich." I was like, "I don't
need to do anything. I don't know who you're trying to you're being
subpoenaed. I can't bring you anything cuz you're three years too late."
And for the record, usually they're going to be three minutes too late. You know, Hillary doesn't have a patent on hammers or city dumps or bleach bit or or or you know?
Millienial Millie: Didn't Crowd Strike initially investigate the DNC server creating the whole Russia hacked the election scenario?
CNN News, Dmirti Alperovitch: When the uh DNC hired us back in May, we actually came in and deployed
our technology called Falcon on all the systems inside that corporate
network.
CNN News,Wolf Blitzer: Who are these people that were actually doing the hacking of the DNC?
CNN News, Dmirti Alperovitch: There
were two groups, two independently working group that we associate with
Russian intelligence agencies. One of them we associate with GRU, the
primary military intelligence agency in Russia.
Patrick Bergy: Crowdstrike owned by that Alvich guy who is a senior adviser on the Atlantic Council. When President Trump called up the Ukrainian president, what did he ask him for the the the crowd strike servers, right? Again, all immediate direct colleagues like the brown bag lunch at this big, you know, star chamber that you could imagine existing there. I'm sorry, Mr. President. They're all there just like what can we do? Orange man bad. What is just statistical odds of that six degrees of Kevin Bacon existing on virtually everybody connected to the Russian dossier and the impeachment? The only other person that directly connected to both of them is President Trump and he's on the receiving end of it. But
yet you never hear this man's name is.
Tore Says: General Jones. That's the guy
that heads up Clear Force. That's the guy that took ShadowNet and made
it what it is. That's the guy that resold, reinvented ShadowNet to create the magic wheel at the DC courts to make sure that they get the most compromised juries, you know, put together for anyone that they didn't want.
Patrick Bergy: When General Jones was tapped as um the chairman of the board of Atlanta Council by to replace Huntsman, John Huntsman. One of the first orders of business that um he did with the Atlanta Council was to create a partnership with Facebook, right? That happened a month after Mark Zuckerberg sat in front of Congress.
Mark Zuckerberg: Yes. I mean, they they did not want their information to be sold to Cambridge Analytica by a developer and and that happened and it happened on our watch. So even though we didn't do it, I think we have a responsibility to be able to prevent that and be able to take action sooner.
Patrick Bergy: So as a month after they do that, Facebook partners with General Jones at the Atlanta Council to restore election integrity
worldwide. Right. So, the best out of seven billion people on the
planet, Mark Zuckerberg picks the owner of the ShadowNet.
CBS This Morning: President Donald Trump and Mike Pence both ran ads on Facebook that uh included the symbol of an upside down red triangle. Facebook today removed the ads. Facebook
has taken action against what it calls harmful misinformation from
President Trump. The company deleted a post by the president that
included a false statement to restore election integrity worldwide.
Patrick Bergy: We
all know that he was connect directly connected to Cambridge Analytica
through SIG groupoup and wikstrat. So essentially what they did was they partnered with Cambridge Analytica again.
Millienial Millie: This also explains why Facebook went to Atlantic Council aka Jones to fix the Cambridge Analytica problem. They needed to cover their IIA tracks. What you've seen with the recent riots surrounding George Floyd's death from your perspective, does that look like an IIA operation?
Patrick Bergy: Absolutely. Nothing feels natural about what's going on. More stuff is fake and fabricated right now in the news than what's actually real. When I say fake or fabricated, I I mean like, okay, you have the truth and it's being represented to you with a very specific slant. It's so far beyond, you know, a couple,
you know, Russia making a couple spending some money on some Facebook
ads, right? If you believe that, then they've already won.
Tore Says: So that's how it works.
Millienial Millie: It's like the movie Wag the Dog quite literally.
Tore Says: Well, you know, movies tell a lot of stories and um it's almost it's almost as if they're making fun of us. They made fun of Alex Jones when he used to point out all these false flags. I mean, I guess that's just a term he was using, but if you actually look, what he was pointing out in a lot of instances was IIA operations.
9/11 News: Jane, what more can you tell us about the Salomon Brothers building and it's collapsing and it's collapsing and it's collapsed? As you can see behind me, the uh trade center appears to be still burning.We
are getting information now that one of the other buildings, building
seven in the World Trade Center complex is on fire and has either
collapsed or is collapsing.
Tore Says: Well, but he didn't know the term IIA. So
it would be easier for people to understand someone's hacking your
reality because now in this day and age of computing that makes more
sense to people. They understand it more. Oh hack my reality you mean change the way I see things. And that is exactly what an IIA is. It's just that it's software turnurning out oh you need to do this to get this outcome. kind of like using that
shadow net in the DC courts and saying, "Oh, prosecutor, you want him
to go to jail and you want a guilty verdict well, we're going to have to
pull it out."
And then when a pool of jury people come, all of them are potential to
give you a guilty verdict. So then you pick from all the people that
will give you a guilty verdict. So there's no chance that you'll win. And even Matt Whitaker said that on my on my show. He said the judges are corrupt.
Millienial Millie: That's
a major problem for the justice system. If people are able to use that
technology in jury selection to be able to predict who's going to, you
know, throw their vote a certain way.
Tore Says: Is anyone stopping them?
Millienial Millie: That's a major problem right there. It is.
Tore Says: And Roger Stone with this commutation will solve it because this is where it all comes to the surface. How do you think your jury pool was selected?
Roger Stone: Well, obviously, I don't know. I do know that based on the statistics on the District of Columbia that that the statistical improbability of my jury having a single Republican should be impossible. The statistical impossibility of my jury having a single military veteran should be impossible. The statistical possibility of my jury having no jurors with less than a college education is impossible. Uh but that was the case.
Tore Says: Well, what if I told you, Roger, that your jury was uh actually selected, the jury pool, the grander jury pool, right, before the V voadier, as they say, where you kind of select and approve and deny, right? The majority of it was actually plugged into a program, but see, this
program wanted to select a jury pool that would get to a guilty verdict
no matter what. Hence, the odds, like you say, are so far-fetched. So the question is who was the company? Who was the vendor that was used to select your greater pool for the jury? And if your, you know, lawyer was to able to able to find that or ask that question, I would not be surprised if you see the name General Hayden hop up.
Roger Stone: I do think it might strengthen my uh the possibility of my appeal should that become necessary. I will never plead guilty to something I didn't do. Uh it's a matter that does require some research and I appreciate you bringing it up.
Millienial Millie: That's amazing. It's like minority report in real time today.
Patrick Bergy: Clear Force's kind of like what they built. It's it's the next iteration of the ShadowNet. They
took the cycle they they took the the profile uh personas and profile
capabilities. They added real-time criminal background, travel,
financial, medical,
added all these things in to create predictive behavioral profiles that
determine whether or not you're likely to steal or leak. Clear Force actually sells this to HR, right? So, you could actually go into a job, apply for it, and not get a job because an application with an algorithm designed by Obama's National Security Advisor and or Obama's CIA director determined that you were predictively likely to steal or leak in some minority report like fashion. And you may never ever steal or leak, but you might lose a job because something read all your posts and looked at your information and determined it.
Tore Says: Think about it. If people knew just how bad it is, think about how many things he's changing and how much money they're taking. I mean, think of all the money they're going to lose and contracting. He's stopped the clearances. Remember, once
you're out, now we pull your clearance. He did that. Remember? So now
all the future generals or all the future intelligence community persons don't get to use their clearance. If you're out, it's finished.
Patrick Bergy: You guys were paying me as taxpayers were paying me as the information insurance security officer to protect our national security. So y'all should want to get to the bottom of this as much as anybody, as much as I do. But it's very personal to me. I won't deny that.
Tore Says: When you have your ___ trying to assert your president by penning in an anonymous letter to an New York Times, that's a big problem.
Millienial Millie: This is the biggest and boldest move towards the ultimate surveillance state ever made and it's near completion. Micromanaging this technology on a global scale would require integrating it with artificial intelligence. Imagine artificial intelligence autonomously operating the ShadowNet and Clear Force. Interpol's 2019 publication artificial intelligence and robotics for law enforcement reveals we are already there.
quote, "Although films such as Minority Report and Robocop may not
present the most attractive depiction of the future of advanced
technologies in law
enforcement, understanding how these technologies can be applied by law
enforcement agencies for the safety and security of our global
community is of critical importance.
AI Bot Cop: Keep a safe distance of six feet from others."
Millienial Millie: Short from a major PR roll out, there is an international push for autonomous law enforcement to remove the human factor. Several features of the Interpol program indicate that they are using an iteration of ShadowNet and Clear Force technology. This March 2017 United States patent issued to Jim Jones III and Clear Force spells it out. Quote systems and methods for electronically monitoring
humans to determine potential risk. Several diagrams in this patent
look identical to the dashboard layout of the ShadowNet. The patent mentions integration with US and international databases, local law enforcement, and individual state databases, all fed into international justice and public safety networks. Full integration of all data, including the internet of things, is the objective. A March 2020 Atlantic Council policy primer, AI, Society, and Governance, references the 2019 Interpol publication, stating, quote, "The United Nations Interregional Crime and Justice Research
Institute and the International Criminal Police Organization are
leading the conversation on autonomous patrol robots, tracking and
tracing systems, forecasting tools, predictive policing, and more. The next iteration of the ShadowNet and Clear Force is ready to go. Integration with AI, robots, and the replacement of traditional law enforcement is just around the corner. Given that leftist organizations managed by Momentum, which is behind the defund the police movement, and given that momentum has been connected to IIA operations, the case can be made that Jones and Co. are running the defund the police
influence operation simply because they are in a position to benefit by
offering an alternative solution that is already in line with the
Green New Deal agenda. We've already seen some of this rolled out with
the technocratic response to COVID 19 with autonomous drones, contact
tracing apps, nanotech vaccines, and predictive modeling for social distancing and economic shutdowns. Furthermore, this technology is behind the push for police abolition, defunding law enforcement and replacing it with smart justice given we have seen IIA ShadowNet technology implemented by the Socialist Democrats and Sunrise Movement who are using it to push for police abolition. This political movement is deeply connected to the UN who has partnered with Interpol to corral US into the artificial intelligence and robotics for law enforcement direction.
_____
Now, you understand who is hacking your reality.
Defund the Police! Abolish the Police!
Defund DHS!
Defund ICE! Abolish ICE!
Sound familiar?
Democrats, and RINOs, are using government shutdowns to push their agendas, not restore any type of "democracy." It is all lies and manipulations, stall tactics. It's hacking your reality to emplace a narrative that fits their predetermined outcomes.
Nothing to see here, unless you are tired of being abused and controlled.
Next: what are you going to do about it?
_____
Source: Tore Says
Transcript by YouTube

