Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
476 views44 pages

Shadow Gate Transcript

The document discusses whistleblower revelations about a shadow government consisting of contractors that influence elections and public opinion through psychological operations and manipulation of social media and media narratives. The whistleblowers describe how they helped develop these techniques and influence foreign elections while working as contractors. They reveal that the same programs and capabilities have been used to influence outcomes in American elections.

Uploaded by

Sister Rosetta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
476 views44 pages

Shadow Gate Transcript

The document discusses whistleblower revelations about a shadow government consisting of contractors that influence elections and public opinion through psychological operations and manipulation of social media and media narratives. The whistleblowers describe how they helped develop these techniques and influence foreign elections while working as contractors. They reveal that the same programs and capabilities have been used to influence outcomes in American elections.

Uploaded by

Sister Rosetta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

TRANSCRIPT OF THE FILM,

SHADOW GATE
by Millie Weaver

MILLIE WEAVER: What if I were to tell you that a small group of government
contractors were hired by government officials to frame the Trump campaign, set
him up for the Russia Collusion investigation, provided witnesses for the
impeachment hearings and provided administrative support services to the
Department of Justice during the Mueller Investigation?

And what if it just so happened that this same group of contractors are behind
the Fake News in Mainstream Media, influence operations on social media and
the civil unrest nationwide, pushing the “defund the police” movement? The
Obamagate scandal only scratches the surface.

[VIDEO]

LINDSEY GRAHAM: You mentioned shock value, that it’s shocking what the
Russians did. I agree. We need to stop it.

SALLY YATES: I know that now, based on the Horowitz Report.

LINDSEY GRAHAM: I'm not saying that you lied to the court. I'm saying you
signed something that was a lie and you didn't know it.

MILLIE WEAVER: Talk about a cover story! What really happened is much more
alarming. Both parties are equally guilty of covering up what should turn out to
be an even bigger scandal.

Shadowgate: the tactical and operational role the Shadow Government played
behind the scenes, carrying out the coup against President Trump. We're going
to be looking behind the puppets, at who the real puppet-master string-pullers
are.
The material presented in this documentary should concern people of all political
affiliations. This is about real players; people whose names never come up but
should. Career politicians are definitely part of the Beltway Swamp, even aspects
of the Deep State - but they are not the Shadow Government.

The Shadow Government consists of government contractors, defense


intelligence, security and so on. Our government mostly consists of front-facing
desk jockeys that are compartmentalized in cubicles, there to cover up for the
fact that most of the real work is outsourced to contractors, aka the Military
Industrial Complex.

That way, what the public sees through FOIA requests, investigations,
congressional hearings or otherwise is as clean as a whistle. All the dirty work is
kept private with contractors in clandestine networks. These contractors have
used their connections, power and influence to create an unprecedented
international criminal enterprise, where blackmail is traded and people's personal
data is gold.

MILLIE WEAVER: Two whistleblowers, Tore and Patrick Bergy, who both worked
extensively within the Shadow Government as contractors have come forward
with revelations that may be part of the biggest whistleblowing event to date.

TORE: I'm one of thousands faceless, patriotic Americans that work within the
shadows and had been doing that for a very long time. People that worked for
John Brennan approached me while I was in my specialist training, while I was in
the Navy.

When I was recruited, it was for electronic warfare. Then, I ended up in


Information Warfare and ironically, the base that I first went to for electronic
warfare is now Information Warfare.

PATRICK BERGY: My job was for a company called Dynology, which was owned by
Obama's National Security Advisor, General James Jones and I answered directly
to his son. I worked for them for about eight years, from 2007 to 2010.
My focus was primarily in the development on a couple different contracts for the
Department of Defense for the development of the capabilities for “Interactive
Internet Activities”, being something that helps support CNO, which is Computer
Network Operations, hacking and different things like that and Information
Operations, which would be your actual Influence Operations.

It's a supporting application that’s really kind of like a Microsoft project, which
allows you to manage large projects, like enterprise-level projects, but instead
of managing the construction of a 14-story building, it's managing the most
malevolent operations that you could imagine.

TORE: I was a contractor for various intelligence agencies that were privately-
created, so they were private contracting agencies, because unlike what most
people think, our intelligence doesn't stay within our borders or within federal
buildings.

PATRICK BERGY: The Shadownet was the commercial version of an IIA weapon,
IIA being “Interactive Internet Activities”. That's the military nomenclature for
what basically, you've heard just being described for the last three or four years,
with all the Fake News and the Fake News journalists and fake stories, fake
dossier - all these things are attributes and characteristics of IIA, which is social
media psychological warfare.

We began that really in 2007, when right after the policy guidelines first came
out. We were one of the first contracts with the DOD that I'm aware of, trying to
help the 4th Psychological Operations Group understand how to go from
dropping flyers from planes to a more micro-targeted, social media,
psychological warfare application, where you could select an individual target or
a group target - or an entire country, if you wanted to.

TORE: What I did was something called localization or L-10N. So, a localization
strategy is, you find a group of people; that could be a whole country, a city, a
certain religious group, a six-block radius, like CHAZ and you try to get in their
mind.
You have to understand how they eat, how they walk, how they talk, what they
like, what pushes their buttons, what drives them nuts, what upsets them, what
makes them happy. And then you use that to your advantage to push whatever
ideology or product or direction you want them to go, marrying together cultural
appropriation, language, nuances of the demographic that you are targeting or
the nation you are targeting.

It pries into your demographic, your world, so if I want to blackmail you and put
you under my thumb, not only will I know everything, but I will know your
deepest, darkest fears; I will know people I can get in contact to find out more
about you.

Maybe you had an old hockey injury, so if I wanted to attack you, I'd know where
to hit you.

PATRICK BERGY: You understand enough about someone and you can hack their
shadow, you can use their fears, you can use their anxieties.

Sound anything like pandemics that you recognize, here?

MILLIE WEAVER: Oh yeah, definitely.

PATRICK BERGY: So, you can use those things to help reflexively control or
influence and target an individual or whoever it is, or a group of people or an
entire election, an entire country

TORE: What Patrick Bergy created was a program that was based off of the
strategies that we used in person. It was a psychological operation but that
crunches data with the use of psychological operations, so you can predict how
your target will respond.

PATRICK BERGY: I spent like seven years overseas; a couple of those years were
specifically related to IIA, so I understood certain things when.
TORE: We hijacked the Afghan elections. How did we do that? We had to
understand how the Afghanis think. We had to go to the areas that were anti-
Taliban, because the Taliban political group was now more militant than it was
political. We used that to our advantage and formulated a plan where we would
sway their thoughts to believe that “XYZ candidate” is the way to go, because
then, you won't get robbed and we’ll tame the Taliban - but we had to do it in
their way. So, he created the algorithm that does that for you

PATRICK BERGY: When we were largely doing this, it was done by analysts. Now,
this is more done, automated through Artificial Intelligence, which is just a
common iteration of the program or application development process.

The database component ends up allowing you to build behavioral profiles on


individual targets and through those behavioral profiles you can develop or
implement reflexive control, which allows you to understand - with enough
information about someone - you can predictably determine how they're going
to react.

TORE: I was really good at what I did, really good and I can still do it, too. I'm not
doing it now though

MILLIE WEAVER: Well, don't be doing that, Tore!

TORE: You wouldn't know if I was, too!

But I helped them train algorithms with the strategies that I had created, all these
years.

PATRICK BERGY: They had asked us to bring the application to a classified


network. But Jim sent him a bogus, just a made-up, ridiculous bid to actually do
that, because if it went on a classified network, we couldn't turn around and sell
it commercially. We went on, after that to another contract in Tampa, took
everything with us.
4th Psychological Operations Group had no idea that we were going to be taking
their years’ worth of work, that they paid us to do - the taxpayers paid us to do
- and we kept the intellectual property rights to it and remarketed it, branded it
commercially as the Shadow.
So, I come back here and I see these guys back here, in America have just been
having a field day utilizing the technology that we've been developing to alter the
outcomes of our elections in America.

MILLIE WEAVER: This technology was so successful, they couldn't resist the
temptation to not use it commercially and have the power to affect outcomes of
elections at home. The commercial and black market value of such a technology
is incalculable.

PATRICK BERGY: This is the mobile mega Shadownet mobile. My laptop sits in
here and then I got uh two 4k capture cards. I can do VTC and this charges all
the camera equipment, so while I'm riding, I'm told I'm getting as much as 40
amps.

These are the same cases that we used to build out our Skips; our SC2IPs, which
is a Small Command and Control over IP.

And when I was working with JCSE, we would take these cases and build out
networks. This is a Small Command and Control over IP. It's just only running on
one unclassified network.

SIM-enabled Wi-Fi router and if I get decent cell connection, then I can run the
multiple cameras and I can put multiple images in one screen and I can run all
that from my cell phone, that I have mounted here.

MILLIE WEAVER: The group of whistleblowers from the NSA and other classified
data collection agencies, referred to as the Global Surveillance Whistleblowers
were used as a vector to legalize what was then illegal dragnet spying on
everyone, 24/7.

[VIDEO]
60 MINUTES: The NSA and its former head, General Hayden declined to
comment for this story.

MILLIE WEAVER: The FISA Amendment Act of 2008 had section 702, that
permitted the government to spy on citizens with a warrant from the Foreign
Intelligence Surveillance Court.

The NSA data system collects everything through what's called the Upstream,
where everything is stored for 72 hours then dumped. However, if one could twin
this stream of data they could privatize it. Imagine what you could do with that?

Tore alleges that she worked for John Brennan at the Analysis Corporation and
Global Strategies Group.

What is the analysis corporation?

TORE: It is a company that does a lot of things, varying from administrative work,
to analyses, to data collection, biometric collection. I mean, whatever contract
they've been awarded by the government, they do. It could be something as
simple as janitor duties.

[VIDEO]

STATE DEPARTMENT SPOKESMAN DURING 2008 PASSPORT SECURITY


BREACH: In case you missed the Secretary's words upstairs, she reached
out to Senator Obama to say that she was sorry that this had happened,
that there were these unauthorized accesses to his passport files.

One incident this past summer, where there was a trainee in the Passport
Office who had an unauthorized access of Senator Clinton's passport file.
Now, in the case of Senator McCain, we detected earlier this year, one of
the same people who accessed Senator Obama's passport file also accessed
Senator McCain's passport file.
This is the same individual who was disciplined but at this point in time,
still remains working with the contractor.

MILLIE WEAVER: She claims to be the actual person who moved the electronic files
at Stanley, Inc and CGI in 2008, which publicly was falsely alleged to be a “hack”.
What can you tell us about the CGI-Stanley passport incident?

TORE: See, Brennan has a certain MO, okay? When he wants to get something, he
pretends there's a hack. So, I was asked, when I was stateside, “Hey, would you
go by that office and pull all this data from the State Department?” and I said, “Of
course I will.”

I put it on two rugged drives. They were like the orange tips, really big drives and
I put it on there and then later, it's like, “Oh, they were hacked.” And I'm thinking,
“Um, I didn't hack anything. I was told to do it.”

So, I just kind of watched what was happening. One person actually committed
suicide or something and the other two were found. I'm like, “But there was no
hack!” And that that's a going theme. You know that, right?

MILLIE WEAVER: Wow. If it wasn't a hack, I'm presuming that means you took the
information off of their servers and computers?

TORE: Correct.

MILLIE WEAVER: So, that information was then missing?

TORE: Correct.

MILLIE WEAVER: What would be the point of that? What were they trying to hide?

TORE: Well, if I removed it, that means someone else was there to replace it,
right? So, I remove the factual, actual information and then someone goes behind
- that's like super switch. I didn't see that until in retrospect.
Because for me, going to copy a server off of a consulate computer, State
Department, wherever would be normal. If we had a contract with them, they
would tell me what terminal, I'd scan the barcode, make sure that I was at the
right computer and do my job.

So, I removed data. That means someone else replaced it.

MILLIE WEAVER: So, what is the relationship between Global Strategies Group,
Analysis Corporation and Canadian Global Information?

TORE: They all do the same thing. They're the Jacks of all Trade, except for the
fact that Global Strategies Group was actually a hub for all information; in and
out, in and out.

All of the directors there were former GCHQ, CIA, NSA, MI6, MI5, German
intelligence. You have to wonder, why are all these former heads heading up
consulting firma and what were they consulting? And they weren't consulting.
They were collecting everybody's data and privatizing it.

MILLIE WEAVER: John Brennan, working within his network of contracting


companies, such as Stanley, Canadian Global Information and the Analysis
Corporation helped then-Senator Barack Obama get elected using Internet
influence operations.

March 5th, 2013, Brennan gets confirmed as CIA Director, dodging controversy
over his involvement in the CIA Enhanced Interrogation scandal.

Now, tell us about these data bridges to the NSA. Is that legally obtained
information?

TORE: I mean, that's kind of what Snowden did, too.

MILLIE WEAVER: According to sources closely-connected to this subject, under


John Brennan's direction, Snowden created a data bridge from the NSA database
into private servers controlled by private intelligence and cyber security
contractors, aka the Analysis Corporation, Global Strategies Group and Canadian
Global Information.
TORE: The twinning of streams is duplicating the information in the Upstream.
That's crazy. To think that another company is copying all emails, texts, phone
calls, messages, emojis, Instagrams, tweets - anything you can imagine that's
being uploaded, that has to go into the 72-hour holding is suddenly being
pushed offshore. That sounds kind of illegal, because it is.

MILLIE WEAVER: June 5th, 2013. Edward Snowden goes public with the NSA
program PRISM, revealing the NSA collects Internet traffic of all US citizens from
major Internet and telecom companies through the FISA 702 program.

Snowden's actions kicked off, on the federal level justification for spying on US
citizens, including the Senate and Congress, in the name of preventing US
citizens with Classified or Top Secret clearances from being able to repeat
Snowden's actions. This opened the door for the creation of ClearForce.

July 4th, 2013 CGI and GCHQ launch a Defense Cyber Protection Partnership
(DCPP), which includes sharing threat intelligence.

So, these were all private corporations that even had foreigners working in them
and they had access to NSA servers?

TORE: Of course they did. How do you think we found, through facial recognition
of the FBI the Belgium Bomber? Why would we have their facial recognition data?

MILLIE WEAVER: So, is this legal, what you're telling me and why would they do
it? Why would they set this up this way?

TORE: So, sharing our information and our private identifying information, facial
recognition biometrics outside of the United States for official purposes, like at a
consulate and an embassy, through Secret Service or anything like that is legal -
or through Interpol - but to have a company that houses everybody's data and
any private person can buy that data or investigate that data or analyze that data,
that's not. And that's exactly what GSG was doing.
[VIDEO]
[CNBC BROADCAST]: Early 2009, John Brennan left government and went
to work for a small intelligence contractor here in the Virginia, area
suburban Virginia area, just outside of Washington. The company was
called the Analysis Corporation. There are subsidiaries of subsidiaries.
Some of these companies are spun out, go public, go private, again. It's
kind of hard to keep track of them.

MILLIE WEAVER: In just four months, GSG, CGI and other private contractors
allegedly had unauthorized access to the entire Five Eyes network; unfiltered,
unrestricted, decompartmentalized, outside any government regulation or
oversight.

Not surprisingly, the CIA gets caught one year later spying on the US Senate.
Their excuse, it was their own network they had set up for the Senate to use, so
they had authorization.

[VIDEO]

[C-SPAN BROADCAST OF SENATE HEARINGS] SEN. ROBERT WYDEN (D-OR):


Would you agree that the CIA's 2014 search of Senate files was improper?

CIA DIRECTOR JOHN BRENNAN: This is the annual threat assessment is it


not? Yes. These were CIA computers at a CIA-leased facility. It was a CIA
network that was shared between Senate staffers conducting that
investigation for your report, as well as CIA personnel.

SEN. ROBERT WYDEN (D-OR): The reality is those computers, in effect


belonged to the CIA but they were reserved exclusively for the committee's
use.

NSA DIRECTOR, GEN. HAYDEN: We accelerated our ability, our - for one of
a better word - invasiveness and into communications networks in which
legitimate targets coexisted with legitimately-protected communications.
PATRICK BERGY: Obama takes office and General Jones is being sworn in as
National Security Advisor. His son, General Jones's son copyrights “CKMS”,
Congressional Knowledge Management System.

Within a couple months after he leaves office in 2010, Dynology gets contract for
CKMS, the Congressional Knowledge Management System, which basically
controls all of the scheduling, the addresses, the documents, everything for the
Congress.

CKMS is going to give you access to unlimited information. Think about the
information you could get from that.

MILLIE WEAVER: If we look on usspending.gov, we see Dynology was awarded


contracts for the Congressional Knowledge Management System. However, one
contract stands out, where Dynology was awarded a contract by the Department
of Defense that includes a mention of the Congressional Knowledge Management
System.

A closer look shows that the award description is for “CKMS Hosting Labor/Admin
Core Data.” The primary place of performance is Germany and the North
American Industry Classification description is “Data Processing, Hosting and
Related Services,” even one section stating, “Manufacturing Outside the United
States, Use Outside the United States.”

Let it sink in, that these official documents suggest the Congressional Knowledge
Management System, outsourced to a private contractor is hosted, managed and
stored in servers in Germany. This is very disturbing.

With the Senate's computer network compromised by John Brennan’s CIA and the
Congressional Knowledge Management System being hosted, managed and
stored overseas by General Jones's company, the ability for these contractors to
eavesdrop on both the House and the Senate is staggering.
PATRICK BERGY: When I brought this up, back in 2018, shortly after that,
Dynology lost the contract that they had had since 2011/2012 with CKMS and
that contract went to another company, a company that exists as nothing more
than a website and a maildrop, a mile or so from Dynology's Tampa office -
controlling the entire Congressional Knowledge Management!

TORE: And if you look at the contracting database, they'll say that, “Oh, they have
an American entity!” and it's like, “But it's the same CEOs for this Canadian
Company, I'm so confused!”

So, they even falsify information, so they can obfuscate where our federal tax
dollars are going. And don't forget they all share contracts, they all subcontract,
co-contract.

PATRICK BERGY: PSYGroup has the exact same product as Dynology, the
Shadownet and Eyesight, right? Yet, the owner of Dynology sits on the board of
directors of PSYGroup, which in my opinion, is kind of like the owner of Coke
sitting on the board of directors of Pepsi.

TORE: TAC, CGI and all these LLCs, they just keep cycling and cycling all of them.

[VIDEO]

[CBS BROADCAST ABOUT OPM HACK]: The Social Security numbers of 19.7
million Americans subjected to federal background checks, as a condition
of employment are now in the hands of hackers.

MILLIE WEAVER: In June 2015, the Office of Personnel Management announced a


major data breach. Tell us about the OPM hack.

TORE: Okay, so that's another Brennan job, another “hack”, supposed hack and
this is to obtain, delete and obfuscate information.

Hillary Clinton was up on the shopping block about her emails at the State
Department and that was coming up, that was big talk of the town in 2014.
Suddenly, the Office of Personnel Management was hacked. In December, down
the line, five months later, Hillary Clinton appears in court and they tell her, “Hey,
you're gonna hand over your emails.” A couple days after that, the now-fired
corrupt, leaking former IG of the State Department, [Steve A.] Linick had
requested from our elected officials to give him a big fat budget to create his
own personal IG of the State Department server.

MILLIE WEAVER: How convenient.

TORE: Very convenient.

[VIDEO]:

[ROLLCALL BROADCAST OF FOREIGN RELATIONS SUBCOMMITTEE] STATE


DEPT IG STEVE A. LINICK: Well, we have no evidence that our data has been
compromised. The fact that the contents of our network may be accessed
by large numbers of Department administrators puts us at unnecessary
risk.

The IT folks at the Department have the keys to our IT system, so they
really have access, unfettered access to the system. If they wanted to, they
could read, modify, delete.

I would like to be completely separate from the Department, to ensure the


integrity of our system but I also need the Department to give us access to
the same systems, that we have now.

TORE: And he was responsible, in releasing her emails that he gave in little, little
doses, of course, over time. But at the same time, the press came out with a
report. “Oh dear, months ago, there was a leak!”

[VIDEO]:
[ROLLCALL BROADCAST OF FOREIGN RELATIONS SUBCOMMITTEE] SEN.
DAVID PERDUE (R-GA): Do you have evidence that the State Department's
network has been attacked? And does that affect you guys?

STATE DEPT IG STEVE A. LINICK: There, there, uh there has been, there's,
there's evidence that it has been attacked and it has affected us. I can't
really go into details, uh because of the nature of the information.

TORE: For people that don't know, the Office of Personnel Management usually
has information on every single American that has applied for any type of
clearance. So, if you applied for a White House Press Pass or joined the military
or an admin job that could require something like a Public Charlie clearance –
anything - all your information is there.

MILLIE WEAVER: What could they do with all that information?

TORE: Right. They started slowly creating these Memorandums of


Understandings (MOUs) with your Secretaries of State and Attorneys General,
secretly behind your back, providing facial recognition data, private identifying
data, data, data.

This was the most incredible data, because if you want to control someone, all
you need to do is put that information through a couple of systems and you'll
know exactly what buttons you need to push and how to make them nod their
head the way you want them to or shake it.

[VIDEO]

[CBS BROADCAST ABOUT OPM HACK]: Millions of Americans have received


letters like this, notifying them their data are at risk and referring them to
a government-contracted credit monitoring agency.

MILLIE WEAVER: Does this correlate with predictive programming?

TORE: Yes.
MILLIE WEAVER: The merging of John Brennan's tactical intelligence and General
Jones's operational capabilities gave birth to ClearForce.

PATRICK BERGY: iPSY was the relational database component of it. That's what
we named it - I named it, actually and –

MILLIE WEAVER: What did you name it “iPSY” for?

PATRICK BERGY: “I” like the iPhone, “PSY” for psychological warfare.

MILLIE WEAVER: Okay.

PATRICK BERGY: You have the component where you need to be able to collect
all this information and then you need to be able to collaborate this information
with a team of an unspecified amount of analysts and/or other legal people that
will be looking at stuff and you need to be able to provide the leadership of a
tactical operation; you need to be able to provide them what's called a “COP”, a
Common Operational Picture, right?

So, this provides people at the top Common Operational Picture of all the
different assets. Assets can be journalists, it could be an entire news
organization, it could be a podcast, it could be just an individual YouTube
influencer.

It could be anybody like that and you would either build them from scratch or
contract them out, just bring them online.

MILLIE WEAVER: According to Bergy, the 2012 changes to the Smith-Mundt


Modernization Act of 2012 opened the floodgates for domestic IIA: Social media
Influence Operations.

Do you think that some of these smart devices were created in order to gain
access to the public by the military-industrial complex?
PATRICK BERGY: I know that the iPhone really was released within this - if not the
same month of the IIA policy letter, right. I know for a fact - and you can easily
look it up - that the Smith-Mundt Modernization Act was modified to allow for
the influence, dissemination of propaganda to Americans, which had previously
been restricted or prevented by the Smith-Mundt Act in the late ‘40s, when it was
put in place.

When they modernized that, they took away those protections, allowing it to
adapt for social media. And then, within a few months or just a very short period
of time, they came out with the Obamaphone

[VIDEO]

[FOXNEWS BROADCAST]: Free cell phones to low income families. Tracfone


has just started a program here, in the Volunteer State called SafeLink
Wireless. More than 800,000 families here in Tennessee qualify for these
phones. The company says this program is about providing a safe link for
families no matter what their level of income is.

PATRICK BERGY: A very short time after that, they added free unlimited data plans
to them.

MILLIE WEAVER: He also suggested that the contiguous release of the


Obamaphone with an unlimited data plan played a significant role in fostering
the Ferguson Riots, using IIA.

So why do you think they were targeting them for collection purpose?

PATRICK BERGY: We know - think of what you could do, right? Think of how easily
you could start a riot in Cleveland, if you had the data? Oh, my goodness.

MILLIE WEAVER: So, you could gather that information and know how to
psychologically-target them to get them upset or do you think that they were
pushing information to them, tailoring their viewpoint on social media?
PATRICK BERGY: I would. And like I said, I didn't really actually finish this, earlier
but I originally, in 2014, I recognized the Black Lives Matter movement during
the Michael Brown riots as being influenced by IIA.

The colleague of mine in South Korea did a trace route on it; trace routed the
source of what I believe to have been IIA to Ukraine. That's funny, right? Because
Ukraine just always keeps popping up and whether or not it was actually the
Shadownet, itself, or it was a competitor, like McChrystal…

What they accused McChrystal of having is the exact same thing as what we built
before him. Maybe it was a competitor. Who knows? It's becoming really a
boutique market.

MILLIE WEAVER: Do you think that many of these social media companies like
Twitter, Facebook, that they were created with IIA operations in mind and it was
never intended to be a Free Speech platform? What's your take on that?

PATRICK BERGY: In our Shadownet flyer, it has a screenshot of a South American


social network site that was kind of like the predecessor for MySpace, owned by
Google and I believe the name was Orkut.

You can actually look on our flyer and see a screenshot from that, which looks
like an active engagement from South America. Now, if you look up what
happened to Orkut, what was really Google's first attempt, pre-MySpace, you'll
see that it was largely shutdown and largely contributed to an overwhelming use
of fake personas. What was one of the reasons that they attributed to MySpace
shutting down last year? Rampant fake personas.

At the same time I'm developing these flyers for a company that doesn't have a
sales staff - they only have a product - at the same time I'm doing that, our
number one partner for a company that doesn't have a product - that has only
sales people - are working John McCain's campaign, doing micro-targeted social
media for John McCain's campaign.
MILLIE WEAVER: You were speaking on news pundits and how many of the news
pundits are IIA assets and intelligence assets. So tell us more about that.

PATRICK BERGY: Mika Brzezinski, her father is the father of influence operations
and psychological warfare.

[VIDEO]

[TODAY SHOW BROADCAST]: A towering figure in American foreign policy,


an extended member of the NBC news family, as well, Zbigniew Brzezinski,
Jimmy Carter's National Security Advisor…

PATRICK BERGY: Jillian Turner, Fox News host was also Vice President of Jones
Group International, doing an interview with her old boss - and my old boss –
now, why would I assume that they would be using anything other than the
Shadownet, because the owner of the Shadownet has so many key assets. Why
would he need to go to anybody else, right?

So they get their talking points from the analysts that are putting it together but
then they disseminate those talking points, through non-attribution to their
assets, throughout these news organizations, utilizing an application like the
Shadownet.

Jillian Turner has a direct connection to Atlantic Council. General Jones was the
Chairman of the Board of the Atlantic Council, JGI: Jones Group International is
an oil lobby. Atlantic Council and Burisma has a relationship. Burisma is an energy
company. Obviously, they have these connections.

MILLIE WEAVER: This would explain why Fox News focuses mostly on the Biden-
Ukraine scandal, never mentioning Jones's connections nor the Atlantic Council.

Trump focusing on Ukraine isn't just about Biden. It's about Jones, Hayden,
Brennan, McChrystal, the State Department, USAID and corrupt inspector
generals.
With everything in place and after being in control of the office of the presidency
for decades, the Military-Industrial Complex had confidence they could take
Trump out as a candidate, or even as President.

Has IIA been used against President Trump?

PATRICK BERGY: Absolutely. Through the Russian Dossier, there are so many
people, former colleagues of mine, directly connected to the Shadownet.

John McCain and Lindsey Graham. One of the last two people to have their hands
on the Russian Dossier before it was handed off to BuzzFeed, as part of the
dissemination process.

[VIDEO]

[CNN BROADCAST: GRAHAM DEFENDS MCCAIN OVER STEELE DOSSIER] DON


LEMON: I told the President it was not John McCain. I know, because John
McCain showed me the dossier.

PATRICK BERGY: It was built, it was a product, it was used as a weapon, as part
of an influence operation. It was fake information put into it to help create chaos
and to influence an election, bottom line.

But those people that were directly involved with that were also directly involved
with the Shadownet.

MILLIE WEAVER: So, you have knowledge of them using military-grade


psychological warfare weapons on the President of the United States.

TORE: Done by the closest people around him, too.

PATRICK BERGY: As Trump's election unfolded, and as all of the Russia Collusion
and all these things started happening and becoming exposed, revealed to me it
was to keep from exposing the stuff they've been doing over here, which I believe
includes the Maidan Massacre in Ukraine.
TORE: Where did the Dossier come from? Nelly Ohr testified it came from Ukraine.
Where's all the money-laundering and crazy IIAs we see going on? Ukraine.

PATRICK BERGY: So Manafort's being accused of social media influence


operations in Ukraine, in 2010. World courts charged him with that.

TORE: Ukraine was the epicenter of everything – like, everything - and that's
because we had maimed that nation and made them deal to us. Barack Hussein
Obama did it.

We deployed troops, National Guard, of course - and what states are the ones
that work with Ukraine? it would be California and New York.

So, we deployed troops there, because they weren't listening. Why would you
want to stay independent and hang out with the Russians, when you can be with
us, the Americans and the Europeans?

And they were really upset that they weren't willing to commit to receive debt
from the EU and ignore Russia, which they had been attached to for eons.

So, we went in there and destroyed them. That's how Hunter Biden got his job.
That's how we weaseled our way in there. We got a hold of corrupt people, we
said, “We'll help you out with your lawsuits, you get us in there.” We wrote bills,
we sent the money, so we can “help” them conduct elections. We did everything
there.

MILLIE WEAVER: The Obama aid package in Ukraine, which corresponds with Joe
Biden's billion- dollar loan guarantee scandal is the same aid package, where
Scytl got a field office in Kiev to provide “election training” and “election
management” for the Ukrainian Election Commission.

Scytl is one of the most notorious outsourced companies for elections, with
regular electronic voting machine problems, who also tabulate our election
results in cloud services in Europe – aka, servers outside the United States.
A whistleblower leaked to me in 2019, internal documents from Scytl that
appeared to show meddling in the Kentucky election.

PATRICK BERGY: Atlantic Council has been deciding America's policies for
decades now - and look at what a panic they were in when Trump made that
phone call to Ukraine!

They went into absolute panic mode! 75% of the people testifying were all directly
connected to General Jones, McCain and Atlantic Council.

TORE: The now-IG of the NSA, literally with his wife, created the National Anti-
Corruption Bureau in the Ukraine in 2009. They created it.

[VIDEO]

[UKRAINIAN BROADCAST]: Robert Storch is the Deputy Head of the US


Inspector General's Office.

ROBERT STORCH: I recognize how important this task is for NABU and for
the effort to address corruption there, in Ukraine.

MILLIE WEAVER: September 30th, 2016, Obama knows that within 30 days, if the
NSA can't fix the over-collection problem, by either dumping data or justifying
having it, the FISA Court will order the IG of the NSA to investigate.

So what does Obama do? He writes an Executive Order that makes the IG of the
NSA a Presidential Appointment, rather than an appointment by the Director of
the NSA.

November 30th, 2016, Obama nominates Robert Storch, who was working as
Deputy IG of the DOJ under Horowitz, at the same time.

[VIDEO]
[OFFICIAL VIDEOS OF BOTH THE DEPARTMENT OF JUSTICE AND NSA
PLAYING SIMULTANEOUSLY] ROBERT STORCH: I'm Rob Storch and I'm
honored to serve as the Inspector General at the Department of
Justice/National Security Agency.

MILLIE WEAVER: During the transition period from the Obama Administration into
the Trump Administration.

Storch appears to never have actually been confirmed by the Trump


Administration.

TORE: How did this guy get confirmed? Not one person asked, “Hey, have you
ever worked for - ?” I mean, a couple months before they even had the hearing,
to see if he's going to be confirmed or not? Nobody asked him, “Hey, did you, by
any chance get an offer from the President of Ukraine to work for them?” It was
all over the media - but not one person asked!

You know who else helped them set it up? Bill Taylor and George Kent. Those two
clowns also testified against the President. One of them has supersonic hearing;
they could hear phones that are not on speakerphone from across the room.

MILLIE WEAVER: That's odd!

According to TORE, the alleged impeachment whistleblower was actually a


wiretap, hence “supersonic hearing capabilities”.

Eric Ciaramella was a decoy to hide the fact that the President was being
wiretapped, through a 702 data over-collection problem connected to the sunset
clause. A collection problem that the NSA Inspector General, Robert Storch
oversaw.

TORE: The question is, what has been the Senate Intelligence Committee all
complacent, every single one of them? Because it's their job to be our voice and
ask those questions? It’s because they’re in on it.
MILLIE WEAVER: So, I the question is, are they all just that inept or is there
something else going on?

Section 702 of the FISA Amendment Act of 2008 was created to stop illegal
surveillance through data collection. It ends up being used as cover, providing
the intelligence agencies front-facing legal access to unauthorized data, while
turning a blind eye to private contractors having backdoor access to all data.

TORE: I had access, through the administrative side platform, because I was one
of the first on it, to be able to see all communications between people, like Adam
Schiff, Brennan, Feinstein's staffers and General Jones - and many more that I
don't want to say, because I haven't publicized that, yet, actually. Because there's
foreign people that I did see communications of - former GCHQ’s Hannigan.

Robert Hannigan was part of the company at GSG. So I gave most of this
information to Millie Weaver and she put out a report and even though I had legal
access to all their communications, because I had my username and password,
the minute she did that report, within just - I believe, almost instantaneously, the
website was taken down and my access was revoked. They changed it – well, it
wasn't revoked - they just uphauled the whole server. It was done, it was finished.
They made it toast. I mean, that's what they do.

But nothing ever really dies, really because the way they use their servers is by
torrents, so all their information is hidden somewhere across the planet. Maybe
we should look at some old articles that I put out on “Hurricane Electric” to find
those servers and those little bits and seed them correctly.

So, you'd be able to seed it with something like Keystone.

MILLIE WEAVER: I want to ask you about John Brennan and the blackmail. So, who
all did he have blackmail collected on? Any politicians?

TORE: You mean, that I've seen?

MILLIE WEAVER: Yes.


TORE: A lot of people, yes.

MILLIE WEAVER: And politicians?

TORE: Yes.

MILLIE WEAVER: So, would you say there's any side - more Democrats or more
Republican - or is it kind of even?

TORE: Very even-steven.

MILLIE WEAVER: Okay, so once this blackmail was collected on politicians, what
did they do with it?

TORE: Even Pelosi doesn't know what they have on her. Neither does Blumenthal.
Mobody. I can keep going down –

MILLIE WEAVER: But do they know that these people have blackmail on them?

TORE: Only if they've butted heads.

MILLIE WEAVER: Okay.

TORE: So, we saw a butting of heads between Murkowski, was it and Feinstein,
right? That's a butting of heads. That's where it's like, “Hey, we got this.” You
know, where she put her up against the wall? Happens all the time.

MILLIE WEAVER: Now you know how our government has been compromised:
24/7 surveillance mixed with blackmail.

What's the significance of Cambridge Analytica being attached to Trump's


campaign?
PATRICK BERGY: Everything that I saw, with the description of how Cambridge
Analytica functioned; what they did, their app, the computer applications,
everything that I saw with that, I would describe as just a later iteration of the
Shadownet.

MILLIE WEAVER: Was Cambridge Analytica, to your knowledge an IIA operation?

TORE: Yes, it was and I believe that it was so blatant, because it was piloted at
the same time that the RNC and the DNC were hacked. It was all formulated
correctly.

[VIDEO]

[THE GREAT HACK, NETFLIX DOCUMENTARY] MALE CHARACTER: I have said


to you, it's all coming out!

BRITTANY KAISER: I didn't inspire Hillary's emails and I have nothing to do


with Russia. So yes, the fact is, it looks like I did both. If I wasn't me, I would
say, “Yes, that's what it looks like!”

I was part of the team running Obama's Facebook. We invented the way
social media is used to communicate with voters.

TORE: This is how they were going to do it. They were supposed to go in, they
were supposed to sway him, because they were supposed to give up the goods
to match the Russia hack.

MILLIE WEAVER: Why would they be running an IIA operation that would be
helping Trump win, because that doesn't make sense, when we know that General
Jones is a Democrat and many of these people don't like Trump. So what gives?

TORE: Well, because then, we just make it look like Russia was running the
Cambridge Analytica program, too.

[VIDEO]
[THE GREAT HACK, NETFLIX DOCUMENTARY] BRITTANY KAISER: And it
admits to it, right here.

I am headed to Washington, DC for my testimony for the Mueller


Investigation. I definitely didn't think that while we're sitting there,
counting votes, that some of those votes were made by people who had
seen Fake News stories, paid for by Russia on their Facebook page.

TORE: So, not only did they hack the DNC and the RNC - but nobody talks about
that, right - because we're only supposed to focus that Russia was hacking just
the DNC, not the RNC - we keep forgetting about that, because it was just
information Brennan was getting. They wanted to get access to servers. That's
the way it goes.

Anyway, Cambridge Analytica, at the same time, would be supposedly helping


President Trump win and the Russia Collusion Hoax would have stuck better,
because behind all those LLCs and the glitz and glamour, they would have had
some statue of Vladimir Putin in a tutu waiting for you.

[VIDEO]

[THE GREAT HACK, NETFLIX DOCUMENTARY] BRITTANY KAISER: Yeah, I


worked at Cambridge Analytica while they had Facebook datasets, went to
Russia one time while I worked for Cambridge, I visited Julian Assange
while I worked for Cambridge, pitched the Trump campaign and wrote the
first contract.

I have an email from one of our senior data scientists that said that we
were actually using Facebook-like data in our model. The methodology
was considered a weapon; weapons-grade communications tactics.

“Well done, Britt looked quite tough and you did okay with a winky face,
little emoji.
[VIDEO]

[MSNBC BROADCAST] RACHEL MADDOW: We found out that Cambridge


Analytica reached out to WikiLeaks and said, “Hey, can we help?” What that
means is we've got a Russian intelligence operation underway to illegally
influence the US election in Trump's favor and we've got the data firm paid
by the Trump campaign offering operational help to that effort.

[VIDEO]

[ABC BROADCAST] GEORGE STEPHANOPOULOS: Are there any ties between


Mr. Trump, you or your campaign and Putin and his regime?

PAUL MANAFORT: No, there are not. It's absurd and you know, there's no
base to it.

MILLIE WEAVER: Cambridge Analytica was used to create the appearance that
Russia conducted influence operations to help Trump win the 2016 election.

PATRICK BERGY: Stone, Manafort, Davis, McCain, Jones, all of these people have
been doing this for, to my knowledge, a decade of my personal, fact-witness
knowledge. They'd been doing this for a decade prior to Trump even running for
office.

I met with Roger Stone. We were at his table at a speaking engagement that he
did in Clearwater, Florida and I asked Roger Stone at that time, “Did you work
with, do you know Jim Jones? Did you work with Dynology?” and he acknowledged
his relationship and he said, “Yeah, sure.”

I asked him flat-out, I said, “Did you use the Shadownet? Did you know about it?”
He's like, “No.”

MILLIE WEAVER: Stone leaving the Trump campaign early on suggests candidate
Trump didn't want his campaign tied to Stone's influence operations.
[VIDEO]

[THE GREAT HACK, NETFLIX DOCUMENTARY] ROGER STONE: We really


pioneered negative campaign advertising.

MILLIE WEAVER: Stone does have a reputation for political dirty tricks and
influence operations

ROGER STONE: I revel in your hatred because if I weren't effective, you


wouldn't hate me.

TORE: Manafort and Roger Stone go way back, like from the ‘80s. Come on, these
people have been through everything together and this is why they targeted them
and this is why they went on Manafort for things that were, like ancient. it's like,
Man, not even a statute of limitations, not anything. Come on, Man. Seriously?
Nope.

PATRICK BERGY: PSYGroup and WikiStrats, absolutely connected to the


Shadownet, through the owners of the Shadownet, through the fact that,
PSYGroup, through Paul Manafort submitted a proposal to the Trump campaign.
Now, Trump's campaign rejected the proposal. I love that man, right? That's why
I keep voting for him, because even when he's given the opportunity to do that,
he rejected it.

MILLIE WEAVER: The Trump campaign must have known the Dems would try to
use anything against them. Trump must have sensed that the offer for influence
operations was a honey trap to set him up.

Well, do you think that the reason they attached Manafort to Trump's campaign
- because that was kind of later, right - attached them onto there. Do you think
it's because they were trying to frame up trump?

TORE: Yes, because they failed with their IIA attempt.


PATRICK BERGY: Yeah, I definitely would say that Manafort was an asset, whether
or not he fully understood what his role was, you know. They might have lied to
him about what their true intentions were. I believe they fully intended to throw
him under the bus.

Because two things had to happen. They could not let Hillary win and they could
not let Trump keep his seat, right? So, they were trying to kill two birds with one
stone, using Manafort to make sure that Hillary doesn't win, through IIA, through
WikiStrat, through his connections, there.

And then those same people, turning around throwing him under the bus, by
somebody who had previously worked with Manafort and understood what he
had been doing and what he was doing and used that to exploit him, as a way to
hurt Trump.

TORE: Since their whole attempt to have him employ a company to help him win
and use these psychological operations that the Left was using, I mean, “They're
doing it, we should do it!” - and he didn't.

PATRICK BERGY: And that's in the Mueller Report. That's in The New York Times.
There are several instances, where he's rejected the opportunity to take
advantage of influence operations, be it IIA-supported or just your standard run-
of-the-mill influence operations, right? They've rejected that

TORE: And the thing is, people like Roger Stone aren't saints but they're not
demons, either. They skirt the outs and they're great at what they do and you
know, you either love him or not. It's like Brie cheese.

But the one thing that you can be sure of is that he sticks to his principles and if
he's your friend - especially if he's been your friend for 40 years, like he was with
president Trump - there's no way he's going to flip on you to save his butt, ever.
Because that's what honest people do

MILLIE WEAVER: Yeah, he seems to know how the games in the swamp are played.
TORE: Oh yeah.

MILLIE WEAVER: So, I mean, he knows how they operate.

TORE: He was actually framed by people that he worked with. I mean, that
software was created by his friend that created the MagicWheel software -
implemented Shadownet for the courts - so they can randomly have such
specified - out of millions of people that were in the [jury] pool, they were all
intelligence contractors and Never-Trumpers. Come on!

MILLIE WEAVER: So, why wouldn't they just focus their efforts on running IIA
operations to get Hillary in office?

TORE: Oh, they did! Are you kidding? They deployed everything, from censoring,
shadow-banning, to dismissals to full-blown Mockingbirds. I mean, that's where
we saw the real face of the press. That is exactly where we saw it.

[VIDEO]

[PRISON PLANET BROADCAST OF CLINTON RALLY] HILLARY CLINTON: I


want all of you to know that that's true, not only for the campaign but if I
am fortunate enough to be your President, I want you to know and I want
you to tell anybody you know; any friends or colleagues at school or work
or your neighborhood, whether you vote for me or vote against me.

TORE: The polls’ “98% chance Hillary Clinton wins?” Like, what?

MILLIE WEAVER: Those were bogus!

TORE: That was an IIA! That was hijacking reality, to think she's already won so
obviously, she's the best. All the superstars coming out, how she's amazing, all
these concerts - and all to divert you away from the fact that she couldn't walk,
talk, climb stairs, say a word without chucking-up

[VIDEO]
[ALEX JONES YOUTUBE CHANNEL] MILLIE WEAVER: Hillary Clinton is on
stage right now, as we speak and she is coughing non-stop.

TORE: Did she like chuck-up a lung or something that one day? That was super
weird

PATRICK BERGY: There is a definitely some context that needs to be understood


in the relationship between General Jones, Obama and Hillary Clinton.

General Jones was originally offered by Obama the position of Secretary of State.
He accepted. He talked to his family, he accepted. And then two days later,
without even telling him, which was kind of a jerk move to do, Obama turned
around and tapped Hillary Clinton.

And I know that Jones - Jim Jones told me that his dad was really offended by
that. And then, he was offered and accepted the role the position of National
Security Advisor but actually, considered turning it down, because he was so
offended by and was so upset by what had happened.

MILLIE WEAVER: What would be the point of taking Hillary out of the equation, to
then get Trump in, to then want to just impeach him?

PATRICK BERGY: Well, because he wasn't their choice. These people hate Trump.

[VIDEO]

[CNN BROADCAST] LINDSEY GRAHAM: He's a jackass.

PATRICK BERGY: We're talking about, at the time –

MILLIE WEAVER: That would just make Pence in charge.

PATRICK BERGY: Well, do you think John McCain would have rather had Pence in
charge? You think Lindsey Graham would rather have Pence? Lindsey Graham was
so frustrated with Trump, he took his phone and smashed it on YouTube, because
Trump gave out his phone number. Trump drove that man crazy.

MILLIE WEAVER: Trump got in the way of the Big Game, a contest between
contractors and subcontractors over who gets first dibs on defense, security and
tech contracts.

[AUDIO]

[RED STATE RADIO TORE SAYS SHOW] TORE: Mueller, since I think it was
August of 2016 was well aware that I had in my possessions portions of
the DNC mirrored server in February and March, did you know that?

ROGER STONE: No, I did not.

TORE: And when my private life was collapsing, the same exact day - not
without a minute of separation - I was served by Barack Hussein Obama's
attorney, three years later to come and talk about it. Did you know that?

ROGER STONE: I did not know that, either.

TORE: They went as hard as they could. Stone, the same thing. They went with
nothing, look, Mueller called him in for these emails and talking about WikiLeaks
- when I had actual portions of the DNC server, like even Mueller knew I had it.

PATRICK BERGY: Why did Mueller never call me back? When I went to him and told
him about all this information and spoke to him for 15 minutes? Every one of
these people are so corrupt. It's not even funny.

TORE: The Swamp already knew, in August of 2016 that the information was
compromised by people and they knew what type of people had accessed that
information but they didn't know who.

PATRICK BERGY: Some people will say, “Well, maybe they're investigating.” Well,
how can you investigate it, if you don't ever call me back? And you don't ever
really – because, there's a lot of things that I need to be able to explain to them
that I can't say, outside of a classified environment.

So if they are investigating it, they certainly aren't doing it with all the
information.

TORE: Stop, stop, stop. We all know it was a fix!

MILLIE WEAVER: Did the DOJ outsource the Mueller Investigation to CGI?

TORE: Well, yes they did. So, I'll tell you what happened. I actually, for my listeners
on air, I interviewed former Acting Attorney General Whitaker.

[AUDIO]

[RED STATE RADIO TORE SAYS SHOW] TORE: I want to ask you something.
You were Chief of Staff for Jeff Sessions, so there's obviously contracts that
are signed, like you know how you hire vendors?

I wanted to know why, during the Mueller probe, we spent over $40 million
in waste management to a Canadian company that works with Canadian
intelligence? Sounds like paper shredding.

FORMER ACTING AG MATTHEW WHITAKER: Yeah, this is the thing, we need


watchdogs and something I did before I came to Washington, DC was run
a watchdog group that asked these types of questions and to make sure
that that there's not waste, fraud, abuse.

TORE: So, why is our Department of Justice outsourcing to Canadian


intelligence companies access to the Mueller Investigation?

MILLIE WEAVER: That definitely seems improper. Now, this Canadian


company, how much were they paying? And were they paying them with
tax dollars?
TORE: We have to ask ourselves why would we use federal tax dollars and
upwards of $40 million to have them do paper shredding for Mueller and
administrative tasks and emptying garbage cans? That sounds like a
leaking opportunity! That sounds like, why are we getting foreign nationals
involved in an investigation, that we're supposedly investigating the
President - the sitting President of the United States?

MILLIE WEAVER: From CGI's involvement in the passport fiasco in 2008 to


CGI involved in the Mueller Investigation we see how contractors have the
ability to both perform and clean up their own dirty work.

TORE: I think it's about time people understand what happened and I made
it no secret that I know what happened.

So, Seth Rich worked for the DNC. He was asked, just like I, he was asked,
“Hey, why don't you go image the DNC server, right there, since you're
there for us, so we can keep it safe.” And he did so.

And he uploaded it where he was told. So, he uploaded it where he was


supposed to. And there were a lot of “mes” that saw it, “mes” meaning a
group of friends that I have, where we sit and talk String Theory and
Predictive Analytics on the Undernet.

So, we find this and it's like, “Whoa! Treasure trove!” Copied. And we
fractioned it, so that way we can download it, because it was so massive.
And that's what happened.

So I'll tell you what happened to Seth Rich. So, he did his job, as he was
asked at the same time the RNC was also hacked. Again, Brennan’s MO.
“Let's hack!” And the hack was done on purpose, so you can delete
information, insert information and of course, with them putting
Cambridge Analytica and sending them over to President Trump - which
was a trap, okay - that was a trap um you clearly can see.
They hacked the RNC - you mean, you had someone within the GOP do it
for you, because no one died there. And yes, some of those emails escaped,
because that is what was considered “mitigation”. You have to give them
something really bad.

And so, when he saw that they had retroactively changed things; the stories
and the rumors going in, seeing the Bernie Sanders elections were being
stolen, the DNC was all about Hillary, not about real elections, that it was
all rigged, he came in contact with a guy named Sean Lucas.

[VIDEO]

[OAN BROADCAST] SEAN LUCAS: We did make contact with


somebody from the democratic national committee's office and
they've been served. Democracy has prevailed today.

TORE: So, they decided, oh yeah, maybe we can get it out to someone else. And
it was not to Julian Assange, direct. And both of those guys are dead.

[VIDEO]

[OAN BROADCAST]: But in a bizarre twist of events on August 2nd less than
one month after serving the subpoena, Lucas was reported dead.

TORE: Hillary's emails were still being examined. They had to get rid of the
evidence. And the only way that they can access the whole DNC server is if there
was a breach and that's how you can go in and change things.

This is why the FBI never asked for the server. That's the real story. So, as Seth
Rich thought, that what he was doing was correct, later on, he realized it was not.
That's why there was such a big gap. They didn't need to find him, they needed
to find out who had it and they already knew that I, myself had portions of the
DNC server and others, in March and February.
Obama's lawyer, for Seth Rich, three years later says, “You need to come and tell
us about Seth Rich.”

I was like, “I don't need to do anything. I don't know who you're trying to -”

“You're being subpoenaed!”

“I can't bring you anything because you're three years too late.”

And for the record, usually, they're going to be three minutes too late. You know,
Hillary doesn't have a patent on hammers or city dumps or Bleach Bit or, or, or…

MILLIE WEAVER: Didn't CrowdStrike initially investigate the DNC server, creating
the whole “Russia hacked the election” scenario?

[VIDEO]

[CNN BROADCAST. “TRUMP SLAMS ‘RIDICULOUS US INTEL ON RUSSIAN


HACKING’”] DMITRI ALPEROVITCH: When the DNC hired us back in May, we
actually came in and deployed our technology, called Falcon on all the
systems inside that corporate network.

WOLF BLITZER: Who were these people that were actually doing the hacking
of the DNC?

DMITRI ALPEROVITCH: There were two groups; two independently-working


groups that we associate with Russian intelligence agencies. One of them
was associated with GRU, the primary military intelligence agency in Russia.

PATRICK BERGY: CrowdStrike, owned by that Alperovitch guy, who is a Senior


Advisor on the Atlantic Council!

When President Trump called up the Ukrainian President, what did he ask him
for? The CrowdStrike servers, right? Again, all immediate, direct colleagues, like
the brown bag lunch at this big star chamber that you can imagine existing there!
[VIDEO]

[DR. STRANGELOVE (1964)] PETER SELLERS: I'm sorry, Mr. President.

PATRICK BERGY: They're all there! What can we do? Orange Man Bad! What are
the statistical odds, of that Six Degrees of Kevin Bacon existing on virtually
everybody connected to the Russian Dossier and the impeachment? The only
other person that directly connected to both of them is President Trump - and
he's on the receiving end of it!

But yet you never hear this man's name.

TORE: General Jones. That's the guy that heads up ClearForce. That's the guy that
took Shadownet and made it what it is. That's the guy that resold, reinvented
Shadownet, to create the MagicWheel at the DC courts, to make sure that they
get the most compromised juries put together for anyone that they didn't want.

PATRICK BERGY: When General Jones was tapped as the Chairman of the Board of
the Atlantic Council to replace Jon Huntsman, one of the first orders of business
that he did with the Atlantic Council was to create a partnership with Facebook.

That happened a month after Mark Zuckerberg sat in front of Congress.

[VIDEO]

[C-SPAN BROADCAST OF SENATE JUDICIARY & COMMERCE COMMITTEES


JOINT HEARING] MARK ZUCKERBERG: I mean, they did not want their
information to be sold to Cambridge Analytica by a developer and that
happened. And it happened on our watch. So even though we didn't do it,
I think we have a responsibility to be able to prevent that and be able to
take action sooner.

PATRICK BERGY: So, a month after they do that, Facebook partners with General
Jones at the Atlantic Council to “restore election integrity worldwide”, right? So,
the best out of 7 billion people on the planet, Mark Zuckerberg picks the owner
of the Shadownet.

[VIDEO]

[UNKNOWN BROADCAST]: President Donald Trump and Mike Pence both


ran ads on Facebook that included a symbol of an upside down red triangle.
Facebook today removed the ads.

[CBS THIS MORNING BROADCAST]: Facebook has taken action against what
it calls “harmful misinformation” from President Trump. The company
deleted a post by the President that included a false statement.

PATRICK BERGY: To “restore election integrity worldwide”. We all know that he


was connected – directly-connected - to Cambridge Analytica, through PSYGroup
and WikiStrat. So, essentially, what they did was they partnered with Cambridge
Analytica, again.

MILLIE WEAVER: This also explains why Facebook went to Atlantic Council, aka
Jones to fix the Cambridge Analytica problem. They needed to cover their IIA
tracks.

What you've seen, with the recent riots surrounding George Floyd's death, from
your perspective, does that look like an IIA operation?

PATRICK BERGY: Absolutely. Nothing feels natural about what's going on. More
stuff is fake and fabricated, right now in the news than what's actually real. When
I say fake or fabricated, I mean like you have the truth and it's being represented
to you with a very specific slant. It's so far beyond Russia spending some money
on some Facebook ads, right? If you believe that, then they've already won.

TORE: So, that's how it works.

MILLIE WEAVER: It's like the movie, ‘Wag the Dog’, quite literally.
TORE: Well, you know, movies tell a lot of stories and it's almost as if they're
making fun of us.

MILLIE WEAVER: They made fun of Alex Jones when he used to point out all these
False Flags. I mean, I guess that's just a term he was using, but if you actually
look, what he was pointing out in a lot of instances was IIA operations.

[VIDEO]

[BBC BROADCAST ON 9/11. REPORTER DESCRIBES WTC 7 COLLAPSE 23


MINS BEFORE IT HAPPENED] MALE ANCHOR: Jane, what more can you tell
us about the Salomon Brothers building and its collapse?

JANE: As you can see behind me, the Trade Center appears to be still
burning we are getting information now that one of the other buildings,
Building 7 in the World Trade Center complex is on fire and has either
collapsed or is collapsing.

TORE: Well, but he didn't know the term IIA, so it would be easier for people to
understand someone's “hacking your reality”, because now, in this day and age
of computing, that makes more sense to people. They understand it more. “Oh,
‘hack my reality’! You mean, change the way I see things?”

And that is exactly what an IIA is. It's just that it's software churning out, “Oh,
you need to do this, to get this outcome,” Kind of like using that Shadownet in
the DC courts and saying, “Oh, Prosecutor, you want him to go to jail and you
want a guilty verdict? Well, we're going to have to pool it out. And then, when a
pool of jury people come, all of them are potential to give you a guilty verdict.

So then, you pick from all the people that will give you a guilty verdict, so there's
no chance that you'll win - and even Matt Whitaker said that on my on my show.
He said the judges are corrupt.
MILLIE WEAVER: That's a major problem for the justice system, if people are able
to use that technology in jury selection to be able to predict who's gonna you
know throw their vote a certain way

TORE: Is anyone stopping them?

MILLIE WEAVER: That's a major problem right there.

TORE: It is and roger stone with this commutation will solve it because this is
where it all comes to the surface.

[AUDIO]

[RED STATE RADIO ‘TORE SAYS’ SHOW APRIL 22, 2020] TORE: How do you
think your jury pool was selected?

ROGER STONE: Well obviously, I don't know. I do know that, based on the
statistics on the District of Columbia, that is that the statistical
improbability of my jury having a single Republican should be impossible.
The statistical impossibility of my jury having a single military veteran
should be impossible. The statistical possibility of my jury having no jurors
with less than a college education is impossible. But that was the case.

TORE: Well, what if I told you, Roger that your jury was actually selected.
The jury pooled the grander jury pool right before the voidier, they say
where you select and approve and deny - the majority of it was actually
plugged into a program - but see this program wanted to select a jury pool
that would get you a guilty verdict, no matter what.

Hence the odds, like you say are so far-fetched. So the question is, who
was the company who was the vendor that was used to select your greater
pool for the jury? And if your lawyer was to able to able to find that or ask
that question, I would not be surprised if you see the name General Hayden
pop up.
ROGER STONE: I do think it might strengthen the possibility of my appeal
it, should that become necessary. I will never plead guilty to something I
didn't do. It's a matter that does require some research and I appreciate
you bringing it up.

MILLIE WEAVER: It's amazing. It's like ‘Minority Report’ in real time, today.

PATRICK BERGY: ClearForce is what they built. It's the next iteration of the
Shadownet. They took the cycle, they took the profile, personas and profile
capabilities, they added real-time criminal background, travel, financial, medical,
added all these things in, to create predictive behavioral profiles that determine
whether or not you're likely to steal or leak.

ClearForce actually sells this to HR, right? So, you could actually go into a job,
apply for it, not get the job, because an application with an algorithm designed
by Obama's National Security Advisor and/or Obama's CIA Director determined
that you were predictively likely to steal or leak, in some ‘Minority Report’-like
fashion - and you may never, ever steal or leak but you might lose a job, because
something read all your posts and looked at your information and determined it.

KORE: Think about it. If people knew just how bad it is. Think about how many
things he's changing and how much money they're taking. I mean, think of all the
money they're going to lose in contracting. He's stopped the clearances.

Remember, “once you're out now we pull your clearance”? He did that.
Remember? So now, all the future generals or all the future intelligence
community persons don't get to use their clearance. If you’re out, it’s finished.

PATRICK BERGY: You guys were paying me, as taxpayers were paying me, as the
Information Assurance Security Officer, to protect our National Security. So y'all
should want to get to the bottom of this as much as anybody, as much as I do.

But it's very personal to me, I won't deny that.


TORE: When you have your [Joint Chiefs of Staff – General Dunford?] trying to
usurp your president by penning in an anonymous letter to the New York Times,
that's a big problem.

MILLIE WEAVER: This is the biggest and boldest move towards the ultimate
surveillance state ever made and it's near completion.

Micromanaging this technology on a global scale would require integrating it with


Artificial Intelligence. Imagine Artificial Intelligence autonomously operating the
Shadownet and ClearForce.

Interpol's 2019 publication, ‘Artificial Intelligence and Robotics for Law


Enforcement’ reveals we are already there:

“Although films such as ‘Minority Report’ and ‘Robocop’ may not present the
most attractive depiction of the future of advanced technologies in law
enforcement, understanding how these technologies can be applied by law
enforcement agencies for the safety and security of our global community is of
critical importance.

[VIDEO]

[NBC BROADCAST OF POLICE DRONE]: Keep a safe distance of six feet from
others.

MILLIE WEAVER: Short from a major PR rollout, there is an international push for
autonomous law enforcement to remove the human factor. Several features of
the Interpol program indicate that they are using an iteration of Shadownet and
ClearForce technology. This March 2017 United States Patent issued to Jim Jones
III and ClearForce spells it out:

“Systems and methods for electronically monitoring humans to determine


potential risk.” Several diagrams in this patent look identical to the dashboard
layout of the Shadownet the patent mentions integration with US and
international databases, local law enforcement and individual state databases, all
fed into international justice and public safety networks. Full integration of all
data including the Internet of Things is the objective.

A March 2020 Atlantic Council policy primer, ‘AI, Society and Governance’
references the 2019 Interpol publication, stating “The United Nations Inter-
Regional Crime and Justice Research Institute and the International Criminal
Police Organization are leading the conversation on autonomous patrol robots,
tracking and tracing systems, forecasting tools predictive policing and more.”

The next iteration of the Shadownet and ClearForce is ready to go. Integration
with AI robots and the replacement of traditional law enforcement is just around
the corner. Given that Leftist organizations managed by Momentum, which is
behind the “Defund the Police” movement and given that Momentum has been
connected to IIA operations, the case can be made that Jones & CO. are running
the “Defund the Police” influence operation, simply because they are in a position
to benefit, by offering an alternative solution that is already in line with the Green
New Deal agenda.

We've already seen some of this rolled out, with the technocratic response to
COVID19, with autonomous drones, contact tracing apps, nanotech vaccines and
predictive modeling for social distancing and economic shutdowns.

Furthermore, this technology is behind the push for police abolition, defunding
law enforcement and replacing it with “Smart Justice”, given we have seen IIA
Shadownet technology, implemented by the Socialist Democrats and THE Sunrise
Movement, who are using it to push for police abolition, this political movement
is deeply connected to the UN who has partnered with Interpol to corral us into
the Artificial Intelligence and Robotics for Law Enforcement direction.

You might also like