explicitClick to confirm you are 18+

Shadowgate Documentary Transcript

ConnectALLtheDOTSAug 17, 2020, 3:37:52 AM
thumb_up2thumb_downmore_vert

Millie Weaver was arrested for releasing a documentary about how information warfare is conducted against U.S. citizens. The video has since been removed from it's original location on YouTube, but it can still be found posted on other channels. While I was watching it, I copied & pasted the transcript into a word file and dropped speakers names into it, along with some screen grabs of visuals. I added punctuation in some places and any clarifications or corrections to the transcript made by me are in full caps. It's a 'quick & dirty' version of what's in the video for anyone who wants to examine the contents of the film more closely.

NOTE: I do NOT endorse this film because it does NOT provide evidence for all of its allegations. For example they accuse "socialist democrats" of using information warfare to promote defunding the police without a shred of evidence. That seems as likely to be a state psyop to further polarize the left & right and marginalize the Black Lives Matter movement, not unlike what the FBI did with COINTELPRO.

Some of the allegations warrant further investigation. For example, the use of information warfare technology to create a biased jury pool is very disturbing, if true.

This transcript is VERY rough and I may have missed some changes of speakers.



SINGER

00:11

don't want to set the world on fire

00:16

[Music]

00:21

MILLIE

what if i were to tell you that a small

00:23

group of government contractors

00:26

were hired by government officials to

00:29

frame the trump campaign

00:31

set him up for the russia collusion

00:34

investigation

00:35

provided witnesses for the impeachment

00:37

hearings

00:38

and provided administrative support

00:41

services

00:42

to the department of justice during the

00:45

mueller investigation

00:47

and what if it just so happened that

00:49

this same group of contractors

00:52

are behind the fake news in mainstream

00:54

media

00:55

influence operations on social media and

00:59

the civil unrest nationwide pushing the

01:02

defund the police movement the obama

01:06

gate scandal

01:07

only scratches the surface

LINDSAY GRAHAM

you mentioned

01:09

shock value that

01:11

is shocking what the russians did i

01:13

agree we need to stop it

01:14

SALLY YATES

i know that now based on the horowitz

01:17

LINDSAY GRAHAM

i'm not saying that you lied to the

01:18

court i'm saying you signed something

01:20

that was a lie and you didn't know it

MILLIE

01:22

talk about a cover story what really

01:24

happened is

01:25

much more alarming. both parties are

01:29

equally guilty of covering up what

01:32

should

01:32

turn out to be an even bigger scandal

01:36

shadowgate :

the tactical and operational

01:39

role

01:40

the shadow government played behind the

01:42

scenes

01:43

carrying out the coup against president

01:46

trump we're going to be looking behind

01:48

the puppets

01:50

at who the real puppet master string

01:52

pullers are

01:54

the material presented in this

01:56

documentary

01:57

should concern people of all political

02:00

affiliations

02:01

this is about real players people whose

02:04

names

02:04

never come up but should. career

02:07

politicians are definitely part of the

02:10

beltway swamp

02:11

even aspects of the deep state but they

02:14

are not the shadow government .

02:16

the shadow government consists of

02:18

government contractors

02:20

Defense, intelligence, security and so on .

02:24

our government mostly consists of

02:26

front-facing

02:28

desk jockeys that are compartmentalized

02:30

in cubicles

02:32

they're to cover up for the fact that

02:34

most of the real work is

02:36

outsourced to contractors -aka

02:39

the military industrial complex- that way

02:42

what the public sees

02:44

through foia requests investigations

02:46

congressional hearings or otherwise

02:49

is as clean as a whistle. all the dirty

02:52

work

02:53

is kept private with contractors in

02:56

clandestine

02:57

Networks. these contractors have used

02:59

their connections

03:01

power and influence to create an

03:03

unprecedented international

03:06

criminal enterprise where blackmail is

03:09

traded

03:09

and people's personal data is gold .

03:14

two whistleblowers Tore (LINGUIST,

NAVY INTEL CONTRACTOR)

and patrick bergie (CYBER SECURITY,

ARMY PSYOP PROGRAM DEVELOPER)

03:18

who both worked extensively within the

03:21

shadow government

03:22

as contractors have come forward with

03:24

revelations

03:26

that may be part of the biggest

03:27

whistleblowing event

03:29

to date

TORE

i'm one of thousands (OF)

03:33

faceless patriotic americans that work

03:38

within the shadows and

03:39

had been doing that for a very long time

03:42

people that worked for john brennan

03:43

approached me while i was in

03:45

my specialist training while i was in

03:48

the navy .

03:49

when i was recruited it was for

03:51

electronic warfare

03:52

then i ended up in information warfare

03:55

and ironically

03:56

the base that i first went to for

03:58

electronic warfare

03:59

is now information warfare (IMAGE INFORMATION WARFARE TRAINING COMMAND CORRY STATION)

04:04

PATRICK

my job for a company called dynology

04:06

which was owned by

04:07

obama's national security advisor

04:09

general james jones and i answered

04:10

directly to his son (JIM JONES)

04:12

i worked for them for about eight years

04:14

from like 2007 to 2010

04:17

my focus was primarily in the

04:19

development on a couple different

04:20

contracts for the department of defense

04:22

for the development of the capabilities

04:27

for interactive internet activities

04:29

being something

04:30

that helps support cno which is computer

04:33

network operations ,

04:35

hacking and different things like that

04:37

and

04:39

information operations which would be

04:41

your actual influence operations right

04:43

it's a supporting application that

04:45

really it's kind of like a microsoft

04:48

project right which allows you to

04:51

manage uh large projects like enterprise

04:55

level projects

04:56

but instead of like managing the the

04:59

building of a

04:59

the construction of a 14-story building

05:03

it's managing the most you know

05:06

malevolent operations that you could

05:08

imagine .

05:09

TORE

i was a contractor for various

05:12

intelligence

05:13

agencies that were privately

05:17

created so they were private contracting

05:19

agencies (LOGOS: CGI & GLOBAL STRATEGIES GROUP)

05:21

because unlike what most people think

05:24

our intelligence doesn't stay within our

05:28

borders

05:29

or within federal buildings

05:32

the shadow net was the commercial

05:35

version

05:36

of a in an iia

05:39

weapon iia being interactive internet

05:42

activities

05:43

that's the military nomenclature for

05:46

what basically you've heard just being

05:47

described for the last three or four

05:49

years with

05:51

all the fake news and uh the

05:54

the the fake news journalists and fake

05:57

stories

05:58

fake dossier all these things are

06:02

attributes and characteristics of of IIA

06:06

which is social media psychological

06:08

warfare

06:09

we began that really in 2007

06:14

when right after the policy guidelines

06:17

first came out

06:18

we were on one of the first contracts

06:20

with a (the) dod that i'm aware of

06:22

trying to help the four psychological

06:25

operations group understand

06:27

how to go from dropping flyers from

06:30

planes to a more micro-targeted

06:34

social media psychological warfare

06:36

application where you could

06:37

select an individual uh target

06:40

or a group target or

06:43

an entire country if you wanted to.

TORE

what

06:45

i did was something called

06:48

localization or l-10n so a localization

06:51

strategy

06:52

is you find a group of people that could

06:55

be a whole country

06:57

a city a certain religious group

07:01

uh you know six block radius like chaz

07:05

and you kind of try to get in their mind

07:07

you have to understand

07:09

how they eat how they walk how they talk

07:12

what they like what pushes their buttons

07:14

what drives them nuts

07:16

what upsets them what makes them happy

07:19

and then you use that to your advantage

07:22

to push whatever ideology or product or

07:25

direction you want them to go marrying

07:27

together

07:28

cultural appropriation language nuances

07:32

of the demographic that you are

07:33

targeting or the nation you are

07:35

targeting

07:35

it prides into your demographic your

07:38

world

07:38

so if i want to blackmail you and put

07:40

you under my thumb not only will i know

07:42

everything but i will

07:44

know your deepest darkest fears i will

07:46

know people i can get in contact to find

07:48

out more about you

07:49

maybe you had like an old hockey injury

07:52

so if i wanted to attack you i'd know

07:53

where to hit

PATRICK

you

07:54

you understand enough about someone and

07:56

you can

07:58

hack their shadow right you can

08:02

use you can you can use their fears you

08:05

can use their

08:06

anxieties like sound anything like

08:10

pandemics that you recognize here

MILLIE WEAVER

oh

08:13

yeah definitely

PATRICK

08:13

so you can use those things to help

08:17

uh reflexively control or influence and

08:19

target an individual or

08:21

whoever it is right or a group of people

08:23

or an entire election an entire country

08:25

TORE

what patrick bergey created

08:27

was a program

08:31

that was based off of the strategies

08:33

that we used in person

08:36

it was a psychological operation

08:39

but that crunches data with the use of

08:42

psychological operations so you can

08:44

predict how

08:45

your target will respond

PATRICK

you know i

08:46

spent like seven years overseas right

08:48

several years a couple of those years

08:50

were specifically related to iia

08:53

so i understood certain things

TORE

when we

08:56

hijacked the afghan elections

08:59

how did we do that we had to understand

09:01

how the afghanis think

09:02

we had to go to the areas that were

09:04

anti-taliban because the taliban

09:06

political group was now more militant

09:09

than it was political

09:10

we used that to our advantage and

09:12

formulated a plan

09:13

where we would sway their thoughts to

09:16

believe that

09:17

xyz candidate is the way to go because

09:20

then you won't get robbed and will tame

09:22

the taliban

09:23

so it but we had to do it in their way

09:25

so he created the

09:26

algorithm that does that for you

PATRICK

when we

09:28

were largely doing this it was done by

09:30

analysts now this is more done

09:32

automated through artificial

09:33

intelligence

09:35

which is just a common iteration of the

09:39

program or application development

09:41

process the database component

09:43

ends up allowing you to build behavioral

09:45

profiles

09:46

on individual targets right and through

09:49

those

09:50

behavioral profiles you can develop or

09:53

or implement reflexive control which

09:56

allows you to understand with enough

09:58

information about someone

10:00

you can predictably determine how

10:02

they're going to react

TORE

i was really good

10:03

at what i did

10:06

really good and i can still do it too

10:08

i'm not doing it now though

10:10

MILLIE

well don't be doing that sorry

TORY: i didn't (YOU WOULDN’T)

10:12

know if i was too

10:13

but um i helped them

10:17

train algorithms with the strategies

10:20

that i had created

10:21

all these years

PATRICK

they had asked us to

10:23

bring the application

10:25

to a classified network but jim

10:28

sent him a bogus just a made made-up

10:31

ridiculous bid

10:32

to actually do that because if it went

10:35

on a classified network

10:36

we couldn't turn around and sell it

10:38

commercially we went on

10:39

after that to another contract

10:43

uh in tampa took everything with us for

10:46

psychological operations group had no

10:48

idea that we were going to be taking

10:50

their years worth of work that they paid

10:52

us to do

10:53

the taxpayers paid us to do and we kept

10:55

the intellectual property rights to it

10:57

and um uh remarketed it

11:01

branded it commercially as a shadow so

11:04

i come back here

and i see these guys

11:07

back here in america

11:09

have just been having a field day

11:11

utilizing the technology that we've been

11:13

developing

11:14

to alter the outcomes of our elections

11:17

in america

MILLIE

this technology was so

11:20

successful

11:21

they couldn't resist the temptation to

11:24

not use it commercially

11:26

and have the power to affect outcomes of

11:28

elections

11:29

at home the commercial and black market

11:32

value

11:32

of such a technology is incalculable

11:36

this is the mobile mega shatternet

11:39

mobile

11:41

my laptop sits in here and then i got

11:45

uh two 4k capture cards

11:48

i can do vtc and this

11:52

charges all the camera equipment

11:56

so while i'm riding i'm told i'm getting

11:59

as much as 40 amps

12:00

these are the same cases that we used

12:03

to build out our skips

12:07

our sc2ips which is a small command and

12:10

control over ip

12:13

and when i was working with jcse

12:16

we would take these cases and build out

12:19

networks

12:20

this is a small command and control over

12:22

ip

12:24

it's just only running on one

12:25

unclassified network sim enabled wi-fi

12:28

router

12:29

and if i get decent cell connection i

12:32

can run the multiple cameras

12:34

and i can put multiple images in one

12:37

screen

12:37

and i can run all that from my

12:40

cell phone that i have mounted here

12:44

MILLIE

the group of whistleblowers from the nsa

12:46

and other classified data collection

12:49

agencies referred to as the global

12:52

surveillance whistleblowers

12:54

were used as a vector to legalize what

12:56

was

12:57

then illegal dragnet spying on everyone

13:00

24 7.

NEWS READER

the nsa and its former head

13:04

general hayden declined to comment for

13:06

this story

13:07

the fisa amendment act of 2008 had

13:10

section 702 that permitted the

13:12

government to spy

13:14

on citizens with a warrant from the

13:16

foreign intelligence surveillance court

13:18

the nsa data system collects everything

13:22

through what's called the upstream where

13:24

everything is stored for 72 hours

13:27

then dumped however if one could twin

13:31

this stream of data they could privatize

13:33

it

13:34

imagine what you could do with that

TORE

13:37

alleges that she worked for john brennan

13:39

at the analysis corporation and global

13:42

strategies group

13:44

what is the analysis corporation

TORE

it is a

13:46

company that does a lot of

13:48

things varied from administrative work

13:51

to analyses

13:52

to data collection biometric collection

13:55

i mean whatever contract they've been

13:56

awarded by the government they do

13:58

it could be something as simple as

14:00

janitor duties

PRESS CONFERENCE

14:02

in case you missed the secretary's words

14:05

upstairs she reached out

14:06

to senator obama to say that she was

14:09

sorry that this had happened

14:11

that there were these unauthorized

14:13

accesses to his passport files one

14:15

incident

14:16

this past summer where there was a

14:19

trainee

14:21

in the passport office who had an

14:23

unauthorized access of senator clinton's

14:25

passport file now in the case of senator

14:28

mccain

14:30

we detected earlier this year

14:33

one of the same people

14:36

who accessed senator obama's passport

14:39

file

14:40

also accessed senator mccain's passport

14:44

file this is the same individual who was

14:47

disciplined but at this point in time

14:50

still remains working with

14:52

the contractor

MILLIE

she claims to be the

14:55

actual person who moved the electronic

14:57

files at stanley inc

14:59

and cgi in 2008 which

15:02

publicly was falsely alleged to be a

15:05

hack

15:06

what can you tell us about the cgi

15:08

stanley passport incident

15:10

TORE

see brennan has a certain mo okay when

15:13

he wants to get something

15:14

he pretends there's a hack so

15:18

i was asked when i was stateside

15:22

hey would you go buy that office and

15:24

pull all this data from the state

15:26

department

15:27

and i said of course i will i put it on

15:30

two rugged drives

15:31

you know they were like the orange tips

15:33

really big you know

15:35

drives and i put it on there and then

15:40

later it's like oh they were hacked and

15:42

i'm thinking

15:43

um i didn't hack anything i was told to

15:46

do it

15:47

so i just kind of watched what was

15:49

happening one person actually what

15:50

committed suicide or something

15:52

and the other two were found i'm like

15:54

but there was no hack

15:56

and that that's a going theme you know

15:57

that right

MILLIE

15:59

wow if it wasn't a hack i'm presuming

16:02

that means you took the information off

16:06

of their servers and computers

TORE

correct

16:09

MILLIE

so that information was then missing

16:11

TORE

correct

16:12

MILLIE

what would be the point of that

TORE

what

16:13

were they trying to hide well

16:15

if i removed it that means someone else

16:17

was there to replace it

16:20

right so i remove the factual actual

16:23

information

16:24

and then someone goes behind that's like

16:26

super switch

16:31

i didn't see that until retro right in

16:33

retrospect right because for me going to

16:36

copy a server off of a consulate

16:38

you know computer state department

16:41

wherever would be normal if we had a

16:44

contract

16:45

with them they would tell me what

16:47

terminal i'd scan the barcode

16:49

make sure that i was at the right

16:50

computer and do my job

16:53

so i removed data that means someone

16:55

else replaced it

MILLIE

16:57

so what is the relationship between

16:59

global strategies group

17:02

analysis corporation and canadian

17:05

global information

TORE

they all do the same

17:07

thing they're the jacks of all trade

17:10

except for the fact that global

17:11

strategies group

17:13

was actually a hub

17:16

for all information in and out in and

17:18

out i mean

17:20

all of the directors there were former

17:22

gchq

17:23

cia nsa you know

17:27

mi6 mi5 german intelligence

17:30

you have to wonder why are all these

17:32

former heads

17:33

heading up consulting from (FIRM)

17:37

and what were they consulting and they

17:39

weren't consulting they were collecting

17:41

everybody's data

17:42

and privatizing it

MILLIE

john brennan working

17:45

within his network of contracting

17:47

companies

17:48

such as Stanley, canadian global

17:50

information (CGI)

17:51

and the analysis corporation helped then

17:55

senator barack obama get elected

17:58

using internet influence operations

18:02

march 5th 2013 brennan gets confirmed as

18:05

cia director

18:07

dodging controversy over his involvement

18:09

in the cia

18:10

enhanced interrogation scandal now tell

18:13

us about these data bridges

18:16

to the nsa is that legally obtained

18:20

information

TORE

18:22

i mean that's kind of what snowden did

18:24

too

18:26

MILLIE

according to sources closely connected

18:28

to this subject

18:30

under john brennan's direction snowden

18:32

created

18:33

a data bridge from the nsa database

18:36

into private servers controlled by

18:39

private intelligence and

18:40

cyber security contractors aka

18:44

the analysis corporation, global

18:46

strategies group

18:47

and canadian global information

18:50

the twinning of streams is duplicating

18:52

the information in the upstream

18:54

that's that's crazy to think that

18:57

another company

18:58

is copying all emails texts phone calls

19:03

messages emojis instagrams tweets

19:07

anything you can imagine that's being

19:09

uploaded

19:10

that has to go into like the 72 hour

19:12

holding is suddenly being

19:14

pushed offshore that sounds kind of

19:16

illegal

19:17

because it is

MILLIE

june 5th 2013

19:21

edward snowden goes public with the nsa

19:24

program

19:25

prism revealing the nsa collects

19:28

internet traffic

19:29

of all u.s citizens from major internet

19:32

and telecom companies through the fisa

19:36

702 program snowden's actions kicked off

19:40

on the federal level justification for

19:42

spying on u.s citizens

19:45

including the senate and congress in the

19:47

name of preventing u.s citizens with

19:50

classified or top secret clearances

19:52

from being able to repeat snowden's

19:55

actions

19:56

this opened the door for the creation of

19:59

clear force

20:00

july 4th 2013 cgi

20:04

and gchq launch a defense protection

20:07

partnership

20:08

which includes sharing threat

20:11

intelligence

20:12

so these were all private corporations

20:14

that

20:15

even had foreigners working in them and

20:19

they had access to nsa

20:22

servers

TORE

of course they did i mean how do

20:24

you think we found

20:25

through facial recognition of the fbi

20:28

the belgium bomber why would we have

20:31

their

20:32

facial recognition data

MILLIE

20:36

so is this legal what you're telling me

20:39

and why would they do it why would they

20:41

set this up this way

TORE

20:42

so sharing our information and our

20:44

private identifying information

20:46

facial recognition biometrics outside of

20:48

the united states

20:50

for official purposes like at a

20:52

consulate and an embassy

20:54

you know through secret service or

20:56

anything like that

20:57

is legal right or through interpol but

21:00

to have a company

21:01

that houses everybody's data and

21:04

any private person can buy that data

21:08

or investigate that data or

21:11

analyze that data that's not, and that's

21:14

exactly what gsg was doing

21:16

NEWS READER

early 2009 john brennan left government

21:19

and went to work for a small

21:20

intelligence contractor here in the

21:22

virginia area suburban virginia area

21:24

just outside of washington

21:25

the company was called the analysis

21:26

corporation …there are subsidiaries of

21:28

subsidiaries some of these companies are

21:30

spun out go public go private again

21:32

it's kind of hard to keep track of them

21:34

MILLIE

in just four months

21:35

gsg cgi and other private contractors

21:39

allegedly had unauthorized access to the

21:43

entire five

21:44

eyes network unfiltered unrestricted

21:48

decompartmentalized outside any

21:51

government regulation

21:52

or oversight not surprising the cia gets

21:56

caught one year later spying on the u.s

21:59

senate their excuse it was their own

22:03

network they had set up for the senate

22:05

to use

22:07

so they had authorization

SEN. RON WYEN ON CSPAN

would you

22:10

agree

22:10

that the cia's 2014

22:14

search of senate files was improper

22:20

JOHN BRENNAN CIA DIRECTOR

this is the annual threat assessment is

22:22

it not yes these were

22:24

cia computers at a cia lease facility

22:27

it was a cia network that was shared

22:30

between

22:30

senate staffers conducting that

22:33

investigation for your report

22:35

as well as cia personnel

NEWS READER

the reality is

22:37

those

22:38

computers in effect belonged to the cia

22:41

but they were reserved exclusively

22:44

for the committee's use

GENERAL MICHAEL HAYDEN

FORMER DIRECTOR NSA 7 CIA

we accelerated

22:47

our ability our - for one (WANT0 of a better word -

22:51

invasiveness and into communications

22:54

networks

22:55

in which legitimate targets coexisted

22:58

with legitimately protected

22:59

communications

PATRICK

23:01

obama takes office and general jones is

23:04

being sworn in

23:05

as national security advisor his son

23:08

general jones's son

23:10

copyrights ckms congressional

23:13

knowledge management system within a

23:15

couple months after

23:17

he leaves office in 2010 dynology gets

23:20

contract for ckms the congressional

23:23

knowledge management system

23:25

which basically controls uh

23:28

all of the scheduling, the addresses,

23:31

the documents, everything for

23:34

the congress. ckms

23:38

is going to give you access to

23:41

unlimited information think about the

23:44

information you could get from that .

MILLIE

23:46

if we look on usspending.gov we see

23:49

dynology was awarded contracts for the

23:52

congressional

23:53

knowledge management system however

23:56

one contract stands out where dynology

23:59

was awarded a

24:00

contract by the department of defense

24:02

that includes a

24:04

mention of the congressional knowledge

24:06

management system

24:07

a closer look shows that the award

24:10

description

24:11

is for ckms hosting labor admin

24:15

core data the primary place of

24:17

performance

24:18

is germany and the north american

24:21

industry classification description is

24:24

data processing ,

24:26

hosting and related services

24:29

even one section stating manufacturing

24:32

outside the united states use

24:36

outside the united states let it sink in

24:39

that these official documents suggest

24:41

the congressional

24:42

knowledge management system outsourced

24:45

to a

24:46

private contractor is hosted managed

24:49

and stored in servers in germany

24:52

this is very disturbing with the

24:55

senate's computer network

24:57

compromised by john brennan cia and the

25:00

congressional

25:01

knowledge management system being hosted

25:04

managed and stored overseas

25:06

by general jones's company the ability

25:08

for these contractors to

25:10

eavesdrop on both the house and the

25:13

senate

25:14

is staggering

PATRICK

i brought this up

25:17

back in 2018 shortly after that

25:23

dynology lost the contract that they had

25:25

had since 2011

25:27

2012 with ckms

25:30

and that contract went to another

25:32

company a company that exists

25:33

as nothing more than a website and a

25:36

mail drop

25:37

mile or so from dynology's tampa office

25:40

controlling the entire congressional's

25:43

knowledge management

25:44

TORE

and if you look at the contracting

25:45

database they'll say that oh they have

25:48

an american

25:48

an american entity and it's like but

25:50

it's the same ceos for this canadian

25:52

company i'm so confused

25:54

so they even falsify information

25:58

uh so they can obfuscate who, where our

26:01

federal tax dollars are going and don't

26:03

forget

26:03

they all share contracts they all

26:05

subcontract

26:06

co-contract

PATRICK

psy group has the exact same

26:10

product

26:11

as dynology the shadow net

26:15

in eyesight right yet the owner of

26:18

dynology

26:19

sits on the board of directors side (PSY)

26:20

group which in my opinion is kind of

26:22

like

26:23

the owner of coke sitting on the board

26:26

of directors of pepsi

26:28

tac cgi and all these

26:31

llcs they just keep cycling and cycling

26:34

all of them

26:35

NEWSREADER

the social security numbers of 19.7

26:38

million americans

26:40

subjected to federal background checks

26:42

as a condition of employment

26:44

are now in the hands of hackers

MILLIE

in june

26:47

2015 the office of personnel management

26:51

announced a major data breach tell us

26:54

about the opm

26:55

hack

TORE

okay so that's another brennan job

26:59

another hack suppose(D) hack and this is to

27:02

obtain

27:03

delete and obfuscate information hillary

27:05

clinton

27:06

was up for the shopping block about her

27:08

emails right at the state department

27:09

and that was coming up that was big talk

27:12

of the town in 2014.

27:15

suddenly the office of personnel

27:16

management was hacked

27:18

in december down the line five months

27:22

later

27:23

hillary clinton appears in court and

27:26

they tell her hey you're gonna hand over

27:27

your emails

27:28

a couple days after that the now fired

27:31

corrupt leaking former ig of the state

27:34

department

27:35

linux (LINICK) had requested from

27:38

our elected officials to give him a big

27:41

fat budget

27:41

to create his own personal ig of the

27:44

state department server

27:46

MILLIE

how convenient

TORE very convenient

HON. STEVE A. LINICK

well we

27:48

have no evidence that our data has been

27:49

compromised

27:50

the fact that the contents of our

27:52

network may be accessed by large numbers

27:54

of department administrators

27:55

puts us at unnecessary risk … the i.t

27:58

folks at the department have the keys to

27:59

our i.t system

28:00

so they really have access unfettered

28:02

access to the system if they wanted to

28:04

they could read

28:05

modify delete ((SLOWMO) they could read modify

28:09

Delete)) i would like to be completely

28:12

separate from the department

28:14

to ensure the integrity of our system

28:16

but i also need the department

28:18

to give us access to the same systems

28:22

that we have now

28:22

(SLOWMO) give us access))

28:26

TORE

and he was responsible in releasing her

28:28

emails that he gave in little little

28:30

doses of course

28:31

over time but at the same time the press

28:34

came out with a report

28:36

oh dear months ago there was a leak

MR. PERDUE

FOREIGN RELATIONS SUBCOM.

do

28:38

you have evidence that the state

28:40

department's network has been attacked

28:42

and does that affect you guys

HON. STEVE A. LINICK

there

28:44

there

28:45

and there has been there's there's

28:47

evidence that has been attacked and it

28:48

has affected us

28:49

i can't really go into details uh

28:51

because of the nature of the information

28:52

TORO

for people that don't know the office of

28:54

personnel management usually has

28:55

information

28:56

on every single american uh that has

28:59

applied for any type of clearance

29:01

so if you applied for like a white house

29:03

press pass or join the military

29:05

or an admin job that could require

29:08

something like a

29:09

public charlie clearance anything all

29:11

your information is there

MILLIE

29:13

what could they do with all that

29:14

Information

TORE

they started

29:16

slowly creating these memorandums of

29:18

understandings with your

29:20

secretaries of states and attorney

29:22

general secretly behind your back

29:24

providing

29:25

facial recognition data private

29:27

identifying data data data

29:29

this was the most incredible data

29:31

because if you want to control someone

29:34

all you need to do is put that

29:36

information through a couple of systems

29:38

and you'll know exactly what buttons you

29:40

need to push

29:42

and how to make them nod their head the

29:44

way you want them to or shake it

CBS NEWSREADER

29:47

millions of americans have received

29:48

letters like this

29:50

notifying them their data are at risk

29:52

and referring them to a government

29:54

contracted credit moniTOREng agency

MILLIE

does

29:56

this

29:57

correlate with predictive programming

TORE

30:00

yes

30:00

MILLIE

PATRICK

the merging of john brennan's tactical

30:03

intelligence

30:04

and general jones's operational

30:06

capabilities

30:08

gave birth to clear force isi was

30:11

the relational database component of it

30:14

that's what we named it

30:15

i named it actually and uh

MILLIE what did you

30:18

name it isi (iPSY)for

30:20

i like the iphone uh psi for

30:23

psychological

30:24

warfare

MILLIE

okay

PATRICK

you have the component

30:26

where you need to be able to collect all

30:28

this information

30:29

and then you need to be able to

30:30

collaborate this information

30:32

with a team of an unspecified amount of

30:35

analysts

30:35

and or other legal people that will be

30:38

looking at stuff

30:39

and you need to be able to provide the

30:42

leadership

30:43

of a tactical operation you need to be

30:46

able to provide them what's called a

30:47

‘Cops’ a common operational picture

30:50

right so this provides

30:54

people at the top common operational

30:56

picture of all the different assets

30:58

assets can be journalists it could be an

31:01

entire

31:03

news organization it could be a podcast

31:06

it could be just a an individual youtube

31:09

influencer

31:10

it could be anybody like that and you

31:13

would either

31:14

build them from scratch or contract them

31:17

out

31:17

just bring them on line

MILLIE

according to

31:20

Bergy

31:21

the 2012 changes to the Smith month (-MUNDT)

31:23

Modernization act of 2012

31:26

opened the floodgates for domestic iia

31:30

social media influence operations do you

31:33

think that

31:33

some of these smart devices were created

31:36

in order to gain access to the public

31:40

by the military-industrial complex

PATRICK

i

31:43

know that the iphone

31:44

really was released within this if not

31:47

the same month

31:48

of the iia policy letter right

31:52

i know uh for a fact and you can easily

31:56

look it up that the smith month (-MUNDT) act

31:58

uh modernization act was modified to

32:01

allow

32:02

for the influence dissemination of

32:06

propaganda to americans which had

32:09

previously been restricted or prevented

32:12

by the smith month (-MUNDT0 act in the late 40s

32:14

when it was put in place

32:15

when they modernized that they took away

32:18

those protections

32:20

allowing it to adapt for social media

32:23

and then within a

32:24

few months or just a very short period

32:26

of time

32:28

they came out with the obama phone

WOMAN ON TV

32:30

everybody in cleveland low minority got

32:32

obama's phone

32:33

people bumming president you know he

32:36

gave us a phone

32:37

NEWSREADERS

free cell phones to low income families

32:40

tracfone has just started a program here

32:42

in the volunteer state called

32:43

safe link wireless more than 800 000

32:46

families here in tennessee

32:48

qualify for these phones the company

32:49

says this program is about providing a

32:51

safe link for families

32:52

no matter what their level of income is

32:55

PATRICK

very short time after that

32:57

they added free unlimited data plans to

33:00

them

33:00

MILLIE

he also suggested that the contiguous

33:03

release of the obama phone

33:05

with an unlimited data plan played a

33:08

significant role

33:10

in fostering the ferguson riots using

33:13

iaa

33:14

[Applause] PROTESTR CLIP SAYING ‘BURN THE BITCH DOWN’

33:20

MILLIW

so why do you think they were targeting

33:21

them for collection

33:23

(What) purposes

PATRICK

is though the the think of

33:26

what you could do

33:27

Right, think of how easily you could

33:31

start a riot in cleveland if you had the

33:36

data oh my goodness

MILLIE

so you could gather

33:39

that information

33:40

and know how to psychologically target

33:43

them to get them upset

33:45

or you know do you think that they were

33:47

pushing information to them like

33:50

tailoring their viewpoint

33:53

on social media

PATRICK i would

and when i like

33:56

i said i i didn't really actually finish

33:58

this earlier but

33:59

i originally um in 2014 i recognized

34:04

uh black lives matter uh

34:07

movement during the michael brown riots

34:10

is being

34:11

influenced by iia the colleague of mine

34:15

in south korea

34:16

did a trace route on it trace routed the

34:20

source of the what i believe to have

34:22

been iia

34:24

to Ukraine. that's funny, right .

34:27

uh so because ukraine just always keeps

34:29

popping up

34:31

and whether or not it was actually the

34:33

shadow net itself

34:35

or it was a competitor like mcchrystal

34:38

right mcchrystal what they accused

34:41

mccrystal of having

34:42

is the exact same thing as what we built

34:44

before him

34:45

maybe it was a competitor. who knows it's

34:48

becoming

34:49

really a boutique market

MILLIE

do you think

34:51

that

34:52

many of these social media companies

34:54

like twitter facebook

34:55

that they were created with iaa

34:58

operations in mind

34:59

and it was never intended to be a free

35:02

speech

35:03

platform i mean what's your take on that

PATARICK

35:06

in

35:06

our shadownet flyer it has a screenshot

35:10

of

35:12

south american

35:15

social network site that was uh kind of

35:18

like the predecessor for myspace owned

35:20

by google

35:22

and i believe the name was irkut

35:25

and you can actually look on our flyer

35:27

and see a screenshot from that

35:29

which looks like an active engagement

35:31

from south america

35:32

now if you look up what happened to

35:35

irkut

35:36

what was really google's first attempt

35:38

pre

35:39

myspace you'll see that it was largely

35:41

shut down

35:42

and largely contributed to an

35:45

overwhelming use of fake personas

35:47

right what was one of the reasons that

35:49

they attributed to myspace shutting down

35:51

last year

35:52

rampant fake personas at the same time

35:55

i'm developing these flyers

35:58

for a company that doesn't have a sales

36:00

staff they only have a product

36:02

at the same time i'm doing that our

36:05

number one

36:06

partner for a company that doesn't have

36:08

a product

36:09

that is only sales people are

36:13

working john mccain's campaign .

36:17

VIDEO VOICEOVER

too risky

PATRICK

doing micro-targeted social

36:19

media for john mccain's campaign

JOHN MCCAIN’S VOICEOVER

(I’M )john

36:21

mccain

36:21

and i approve this message

MILLIE

you were

36:24

speaking on

36:26

news pundits and how many of the news

36:28

pundits are

36:29

ia assets and intelligence assets so

36:32

tell us more about that

PATRICK

mika brzezinski

36:36

her father is you know the father of

36:38

influence operations

36:40

and psychological warfare

NEWSREADER

a towering

36:42

figure in american foreign policy an

36:44

extended member of the nbc news family

36:47

as well zabig nav

36:48

brzezinski jimmy carter's national

36:50

security advisor

PATRICK

36:51

jillian turner fox news host was also

36:53

vice president

36:55

of jones group international doing an

36:57

interview

36:58

with her old boss and

37:01

my old boss now why would i assume that

37:03

they would be using anything other than

37:05

the shadow net because

37:07

the owner of the shatternet has so many

37:09

key assets why would he need to go to

37:11

anybody else right so they get their

37:13

talking points from the analysts that

37:14

are putting it together

37:16

but then they disseminate those talking

37:18

points through non-attribution

37:21

to their assets throughout these news

37:24

organizations

37:26

utilizing an application like the shadow

37:28

net

37:29

jillian turner has a direct connection

37:32

to atlantic council general jones was

37:34

the chairman of the board of the

37:36

atlantic council jgi

37:38

jones group international is an oil

37:40

lobby

37:41

atlanta council and brisma (BURISMA) has a

37:43

relationship brisbane is

37:44

an energy company obviously they have

37:47

these connections

37:48

MILLIE

this would explain why fox news focuses

37:50

mostly

37:51

on the biden ukraine scandal never

37:54

mentioning

37:55

jones's connections nor the atlantic

37:58

council

37:59

trump focusing on ukraine isn't just

38:01

about biden

38:03

it's about jones, hayden, brennan ,

38:06

Mcchrystal,

38:07

the state department, usaid, and

38:10

corrupt inspector generals. with

38:12

everything in place and after being in

38:14

control

38:15

of the office of the presidency for

38:17

decades

38:18

the military-industrial complex had

38:21

confidence they could take

38:22

trump out as a candidate or even

38:26

as president . has iia been used against

38:29

president trump

38:30

Absolutely. through the russian dossier

38:35

there are so many people former

38:37

colleagues of mine

38:39

uh directly connected to the shadownet

38:42

john mccain and lindsey graham one of

38:45

the last two people to have their hands

38:47

on the russian dossier before it was

38:48

handed off to buzzfeed

38:50

as part of the dissemination process

38:53

NEWSREADER

told the president

38:54

it was not john mccain i know because

38:57

john mccain showed me the dossier

PATRICK

it was

39:00

built it was a product it was used as a

39:02

weapon

39:03

as part of an influence operation it was

39:06

fake information

39:07

put into it to help

39:10

create chaos and to influence an

39:13

election

39:14

bottom line right but

39:16

[Music]

39:17

those people that were directly involved

39:19

with that were also directly

39:21

involved with the shadow net

MILLIE

so

39:25

you have knowledge of them using

39:27

military-grade

39:29

psychological warfare weapons

39:32

on the president of the united states

39:36

TORE

done by the closest people around him

39:38

too

PATRICK

as

39:40

trump's election unfolded and as

39:43

all of the russia collusion and all

39:45

these things started happening and

39:47

and becoming exposed revealed to me

39:51

it was to keep from exposing

39:54

the stuff they've been doing over here

39:56

which i believe

39:57

includes the maidan massacre in ukraine

MILLIE

40:00

where did the dossier come from

40:02

TORE

nelly orr testified it came from ukraine

40:06

where's all the money laundering and

40:09

crazy

40:10

iias we see going on ukraine

40:14

PATRICK

so manafort's being accused of social

40:17

media influence operations in ukraine in

40:19

2010

40:20

world courts charged him with that

40:23

TORE

ukraine was the epicenter of

40:25

everything like everything and that's

40:28

because

40:29

we had maimed that nation and made them

40:32

deal (KNEEL) to us barack hussein obama did it

40:35

you know we deployed troops national

40:37

guard of course

40:39

and what states are the ones that work

40:40

with ukraine it would be california and

40:42

new york

40:43

so we deployed troops there because you

40:45

know they weren't listening

40:47

it's like why would you want to stay

40:49

independent and hang out with the

40:51

russians when you can be with us the

40:52

americans and the europeans

40:54

and they were really upset that they

40:56

weren't willing to commit

40:58

to receive debt from the eu and ignore

41:01

russia

41:01

which they had been attached to for eons

41:05

so we went in there and destroyed them

41:07

that's how

41:08

hunter biden got his job that's how we

41:11

weaseled our

41:12

way in there we got a hold of corrupt

41:14

people we said we'll help you out with

41:16

your lawsuits

41:17

you get us in there. we wrote bills we

41:19

sent the money so we can

41:21

‘help them’ conduct elections

41:25

we did everything there

MILLIE

the obama aid

41:28

package in ukraine

41:29

which corresponds with joe biden's

41:31

billion dollar loan guarantee

41:33

scandal is the same aid package where

41:36

seidl (SCYTL) got a field office in kiev

41:39

to provide election training and

41:41

election management

41:43

for the ukrainian election commission

41:46

seidl is one of the most notoreous

41:48

outsourced companies for elections with

41:50

regular electronic voting machine

41:52

problems

41:53

who also tabulate our election results

41:56

in cloud services

41:58

in europe aka servers outside the united

42:01

states .

42:02

a whistleblower leaked to me in 2019

42:06

internal documents from seidl that

42:08

appeared to show

42:09

meddling in the kentucky election

42:12

PATRICK

atlantic council

42:13

has been deciding america's policies for

42:16

decades now

42:18

and look at what a panic they were in

42:20

when

42:21

trump made that phone call to ukraine

42:24

they went into absolute

42:25

panic mode 75 percent of the people

42:28

testifying

42:29

were all directly connected to general

42:32

jones

42:33

mccain and an atlantic council

42:36

TORE

the now ig of the nsa

42:39

literally with his wife created the

42:41

national anti-corruption bureau

42:44

in the ukraine in 2009

42:47

they created it

NEWSREADER

robert storch is

42:50

the deputy head of the u.s inspector

42:53

general's office

ROBERT STORCH

42:59

i recognize how important this task is

43:03

for naboo and for the effort to address

43:06

corruption

43:07

there in ukraine

MILLIE

september 30th 2016

43:11

obama knows that within 30 days if the

43:14

nsa

43:15

can't fix the over collection problem by

43:17

either

43:18

dumping data or justifying having it the

43:21

fisa court will order

43:23

the ig of the nsa to investigate

43:26

so what does obama do he writes an

43:29

executive order

43:30

that makes the ig of the nsa a

43:33

presidential

43:33

appointment rather than an appointment

43:36

by the director of the nsa

43:38

november 30th 2016 obama nominates

43:42

robert storch who was working as deputy

43:45

ig

43:46

of the doj under horowitz at the same

43:48

time

43:49

ROB STORCH

i'm rob storch and i'm honored to serve

43:52

as the inspector general at the national

43:54

security agency

MILLIE

during the transition

43:56

period

43:57

from the obama administration into the

44:00

trump administration

44:01

storch appears to never have actually

44:04

been confirmed

44:05

by the trump administration

TORE

how did this

44:08

guy get confirmed ?

44:11

not one person asked hey have you ever

44:13

worked for i mean a couple months before

44:15

they even had the hearing

44:16

to see if he's going to be confirmed or

44:18

not nobody asked him

44:20

hey did you by any chance get an offer

44:22

from the president of ukraine

44:24

to work for them? it was all over the

44:26

media but not one person asked

44:29

you know who else helped them set it up

44:30

bill taylor and george kent those two

44:32

clowns

44:33

also testified against the president one

44:35

of them has supersonic hearing

44:36

they could hear phones that are not on

44:38

speakerphone

44:40

from across the room so that's odd

MILLIE

44:43

according to TORE the alleged

44:46

impeachment whistleblower

44:47

was actually a wiretap hence supersonic

44:51

hearing capabilities

44:53

eric sieramella (SIC) was a decoy to hide the

44:56

fact that the president was being

44:58

wiretapped through a 702 data over

45:02

collection problem connected to the

45:04

sunset clause

45:06

collection problem that the nsa

45:08

inspector general robert storch

45:10

Oversaw

TORE

the question is what has been

45:13

the senate intelligence committee all

45:16

complacent

45:17

every single one of them because it's

45:19

their job to be our voice and ask those

45:21

questions

45:22

so i mean i guess they're in on it

MILLIE

so i

45:25

guess the question is

45:26

are they all just that inept or

45:30

is there something else going on. section

45:33

702

45:33

of the fisa amendment act of 2008

45:36

was created to stop illegal surveillance

45:39

through data collection .

45:41

it ends up being used as cover providing

45:44

the intelligence

45:45

agencies front-facing legal access to

45:49

unauthorized data while turning a blind

45:52

eye

45:53

to private contractors having backdoor

45:55

access

45:56

to all data.

TORE

i had access

46:01

through the administrative side platform

46:03

because i was one of the first

46:05

on it to be able to

46:09

see all communications between

46:13

people like adam Schiff, brennan,

46:16

feinstein's staffers

46:19

and general jones and many more that i

46:23

don't want to say because i haven't

46:24

publicized that yet

46:25

actually because there's foreign people

46:27

that i did see communications of

46:30

former gchq had hannigan

46:34

robert hannigan was part of the company

46:35

at gsg right so i gave most of this

46:38

information to

46:39

millie weaver and she put out a report

46:42

and

46:43

even though i had legal access to all

46:45

their communications

46:47

because i had my username and password

46:50

the minute she did that report

46:52

within just i believe almost

46:54

instantaneously

46:55

the website was taken down and my access

46:58

was revoked they changed it

46:59

well it wasn't revoked they just uphold

47:01

the whole server

47:03

it was done it was finished they made it

47:05

toast

47:06

i mean that's what they do but nothing

47:08

ever really dies really

47:10

because the way they use their servers

47:11

is by torrents so

47:14

all their information is hidden

47:15

somewhere across the planet

47:18

maybe we should look at some old

47:19

articles that i put out on hurricane

47:21

electric

47:22

to find those servers and those little

47:24

bits and

47:25

seed them correctly so i mean you'd be

47:29

able to seed it with something like a

47:31

keystone

47:32

keystone (IMAGE POSTITNOTE KEI STONE)

47:36

MILLIE

i want to ask you about john brennan and

47:39

the black male (BLACKMAIL)

47:41

so who all did he have

47:44

blackmail collected on any politicians

47:50

TORE

you mean that i've seen

MILLIE

yes

47:56

TORE - UMHMM

a lot of people yes

MILLIE

and politicians

48:01

TORE

yes

MILLIE

so would you say

48:05

there's any uh side more democrats or

48:08

more republican or is it kind of even

48:11

TORE

very even steven okay so

48:15

once this blackmail was collected on

48:18

politicians

48:20

what did they do with it

TORE

even pelosi

48:22

doesn't know that what they have on her

48:25

neither just blumenthal nobody

48:29

i can keep going down

MILLIE

but do they know

48:32

that these people have blackmail on them

48:34

only if they've butted heads okay so we

48:37

saw a budding (BUTTING) of heads

48:38

between murkowski was it and um

48:42

feinstein right that's a budding of

48:46

heads

48:47

that's where it's like hey we got this

48:50

you know where she put her up against

48:51

the wall

48:52

happens all the time

MILLIE

now you know how

48:55

our government has been compromised

48:57

24 7 surveillance mixed with blackmail

49:01

what's the significance of cambridge

49:03

analytica being attached to trump's

49:05

campaign

49:06

PATRICK

everything that i saw with

49:10

the description of like how the

49:12

cambridge analytica functioned

49:14

what they did their app the computer

49:16

applications

49:17

everything that i saw with that

49:23

i would describe as a you know just a

49:26

a later iteration of the shadow net

MILLIE

was

49:29

cambridge analytica to your knowledge in

49:31

iaa

49:31

operation

TORE

yes it was and i

49:35

believe that it was so blatant because

49:38

it was

49:38

piloted at the same time that the rnc

49:41

and the dnc were hacked

49:43

it was all formulated correctly

CLIP FROM THE GREAT HACK DOC

i have

49:45 MAN

said to you it's all coming out

49:47

and the question is how

BRITTANY KAISER

i didn't inspire

49:50

like hillary's emails and i have nothing

49:53

to do with russia so

MAN

yes

49:57

BRITTANY

the fact is

50:00

it looks like i did both if i wasn't me

50:04

i would say yes that's what it looks

50:05

Like.

50:08

i was part of the team running obama's

50:10

facebook

50:12

we invented the way social media is used

50:15

to communicate with voters

50:19

TORE

this is how they were going to do it you

50:21

know they were supposed to go in

50:22

they were supposed to sway him because

50:24

they were supposed to give up the

50:26

goods to match the russia hack

50:29

MILLIE

why would they be running an ia

50:31

operation

50:32

that would be helping trump win because

50:35

that doesn't make sense when we

50:36

know that general jones is a democrat

50:39

and many of these people

50:40

don't like trump so what gives

TORE

50:44

well because then we just make it look

50:46

like russia was running the cambridge

50:47

analytica program too

CLIP FROM DOCUMENTARY

50:49

BRITTANY

and it admits to it right here i am

50:52

headed to washington dc for my testimony

50:56

for

50:57

the mueller investigation i definitely

51:00

didn't think

51:01

that while we're sitting there counting

51:03

votes that

51:05

some of those votes were made by people

51:07

who had

51:10

seen fake news stories paid for

51:13

by russia on their facebook page

51:16

TORE

so not only did they hack the dnc and

51:20

the rnc

51:20

but nobody talks about that right

51:22

because we're only supposed to focus

51:24

that russia was hacking

51:25

just the dnc not the rnc we keep

51:27

forgetting about that

51:28

because it was just information brennan

51:30

was getting they wanted to get access to

51:32

servers that's the way it goes anyway

51:34

cambridge analytica at the same time

51:36

would be supposedly helping president

51:38

trump win

51:39

and the russia collusion hoax would have

51:42

stuck better

51:43

because behind all those llc's and the

51:46

glitz and glamour they would have had

51:48

some statue of vladimir putin in a tutu

51:51

waiting for you

BRITTANY

yeah i

51:54

[Music]

51:55

worked at cambridge analytica while they

51:58

had facebook data sets

52:00

went to russia one time while i worked

52:03

for cambridge i visited julian assange

52:05

while i worked for cambridge

52:07

pitched the trump campaign and wrote the

52:09

first contract

BRITTANY’S TESTIMONY

52:10

i have an email from one of our senior

52:13

data scientists

52:14

that said that we were actually using

52:17

facebook-like data in our model

52:18

the methodology was considered a weapon

52:22

um weapons great communications tactics

52:24

READING A TEXT

well done brett (BRIT)

52:26

looked quite tough and you did okay with

52:29

a winky face little emoji when

RACHEL MADDOW

we found

52:32

out

52:32

that cambridge analytica reached out to

52:34

wikileaks and said hey can we help

52:37

what that means is we've got a russian

52:40

intelligence operation underway to

52:42

illegally influence the u.s election in

52:45

trump's favor

52:46

and we've got the data firm paid by the

52:49

trump campaign

52:50

offering operational help to that effort

52:53

INTERVIE

INTERVIEWER

are there any ties between mr trump you

52:56

or your campaign

52:57

and putin and his regime

MANAFORT

no there are

53:00

not

53:00

it's absurd and you know there's no base

53:03

to it

53:03

MILLIE

cambridge analytica was used to create

53:06

the appearance

53:07

that russia conducted influence

53:09

operations

53:10

to help trump win the 2016 election

53:13

PATRICK

stone

53:14

manafort davis mccain jones all of these

53:18

people

53:19

have been doing this for to my knowledge

53:23

a decade of my personal fact witness

53:27

knowledge

53:28

they've been doing this for a decade

53:30

prior to trump even running for office

53:32

i met with roger stone we were at his

53:34

table

53:35

at a speaking engagement that he did in

53:37

clearwater florida

53:38

and i asked roger stone at that time

53:41

are you you know did you work with do

53:44

you know jim jones

53:45

did you work with dynology and he

53:47

acknowledged his

53:48

relationship and his yeah sure i did ask

53:52

i asked him flat out i said

53:55

did you use the shadow net he did you

53:58

know about it he's like

53:59

‘No’

MILLIE

stone leaving the trump campaign

54:02

early on

54:03

suggests candidate trump didn't want his

54:05

campaign tied to stone's influence

54:07

operations

54:09

ROGER STONE

we really pioneered negative campaign

54:11

advertising

MILLIE

54:13

stone does have a reputation for

54:15

political

54:16

dirty tricks and influence operations

54:19

ROGER STONE

i revel in your hatred because if i

54:22

weren't effective

54:23

you wouldn't hate me

TORE

manafort and roger

54:27

stone go way back

54:28

like from the 80s you know like come on

54:31

these people have been through

54:33

everything together

54:34

and you know this is why they targeted

54:38

them

54:39

and this is why they went on manafort

54:41

for things that were like ancient it's

54:42

like man no

54:43

not even a statute of limitation not

54:45

anything come on man seriously

54:48

nope

PATRICK

sci (PSY) group and wiki strats

54:50

absolutely connected to

54:52

the shadow net through the owners of the

54:55

shadow net through the fact that

54:57

the psy group through

55:00

paul manafort submitted a proposal

55:04

to trump campaign now trump's campaign

55:06

rejected the proposal

55:08

i love that man right that's why i keep

55:10

voting for him

55:11

because even when he's given the

55:13

opportunity

55:14

to do that he rejected it

MILLIE

the trump

55:17

campaign

55:18

must have known the dems would try to

55:20

use anything against them

55:22

trump must have sensed that the offer

55:24

for influence operations

55:25

was a honey trap to set him up. well do

55:28

you think that the reason they attached

55:31

manafort to trump's campaign because

55:33

that was kind of later

55:34

right attached them onto there do you

55:36

think it's because they were trying to

55:38

frame up trump ?

55:39

TORE

yes because they failed with their iia

55:41

attempt

55:42

PATRICK

yeah i definitely would say that

55:44

manafort was an asset

55:47

whether or not he fully understood what

55:51

his role was

55:52

you know he might they might have lied

55:54

to him about what is true

55:56

what their true intentions were i

55:58

believe they fully intended

56:00

to throw him under the bus because two

56:02

things had to happen

56:04

they could not let hillary win and they

56:07

could not

56:07

let trump keep his seat right

56:11

so they were trying to kill two birds

56:13

with one stone

56:14

using manafort to make sure that hillary

56:17

doesn't win

56:19

through iia through wikistrat through

56:22

his connections there

56:24

and then those same people turning

56:26

around

56:27

throwing him under the bus by somebody

56:29

who had previously worked with

56:31

manafort and understood what he had been

56:33

doing and what he was doing and used

56:35

that

56:36

to exploit him as a way to hurt trump

56:39

TORE

since their whole attempt to have him

56:43

employ a company to help him win and use

56:46

these psychological operations that the

56:47

left was using i mean they're doing it

56:49

we should do it

56:50

and he didn't and that's in the mueller

56:52

report that's in the new york times

56:55

there are several instances where he's

56:57

rejected

56:58

the opportunity to take advantage of

57:01

influence

57:02

of of influence operations be it iia

57:05

supported or just your standard

57:08

run-of-the-mill influence operations

57:10

right

57:11

they've rejected that

TORE

and the thing is

57:13

people like

57:14

roger stone aren't saints

57:18

but they're not demons either they skirt

57:20

the outs

57:22

and they're great at what they do and

57:24

you know you either love him or not it's

57:26

like brie cheese

57:27

but the one thing that you can be sure

57:29

of is that he sticks to his principles

57:31

and if he's your friend especially if

57:33

he's been your friend for 40 years

57:35

like he was with president trump there's

57:37

no way he's going to flip on you

57:39

to save his butt ever

57:42

because that's what honest people do

57:45

MILLIE

yeah he seems to know how the games and

57:47

the swamp are played

57:48

oh yeah so i mean he knows how they

57:50

operate

TORE

it (HE) was actually framed by people

57:52

that he work(ED) with i mean that software

57:55

was created you know by his friend

57:58

that created the magic wheel software

58:01

like implemented shadow net for the

58:02 courts so they can like

58:04

‘Randomly have such specified

58:08

you know out of millions of people that

58:10

were in the pool

58:11

they were all like intelligence

58:13

contractors and never trumpers come on

58:16

MILLIE

so why wouldn't they just focus their

58:18

efforts on running iaa operations to get

58:21

hillary in office

TORE

58:22

oh they did are you kidding they

58:25

deployed everything

58:26

from censoring shadow banning

58:29

to dismissals to full-blown mockingbirds

58:33

i mean that's where we saw the real

58:35

face of the press that is exactly where

58:37

we saw it

58:39

you know

HILLARY CLINTON

i want all of you to know that

58:42

that's true not only

58:44

for the campaign but if i am fortunate

58:47

enough to be

58:49

your president i want you to know and i

58:50

want you to tell

58:52

anybody you know any friends or

58:54

colleagues at school

58:55

or work or your neighborhood whether you

58:58

vote for me

58:59

or vote against me

59:05

TORE

the polls 98% chance hillary clinton wins

59:08

like

59:09

what

MILLIE

yeah

TORE i mean what

MILLIE

those were bogus

59:12

TORE

uh everything that was an iia that was

59:14

hijacking reality to think

59:16

she's already won so obviously she's the

59:18

best all the

59:20

superstars coming out how she's amazing

59:22

all these concerts

59:23

and all to divert you away from the fact

59:25

that she couldn't walk

59:26

talk climb stairs say a word without

59:29

checking (CHOKING)up

59:32

MILLIE AT CAMPAIGN EVENT

hillary clinton is on stage right now as

59:34

we speak

59:35

and she is coughing non-stop did she

59:38

like chuck up a lung or something that

59:39

one day(TIME)

MILLIE

yeah

TORE

that was super weird

59:42

PATRICK

there is a a definitely some context

59:46

that needs to be understood

59:47

in the relationship between general

59:49

Jones, obama

59:50

and hillary Clinton. general jones was

59:54

originally

59:54

offered by obama the position of

59:58

secretary of state. he accepted his fam

60:01

talked to his family he accepted and

60:03

then two days later without even telling

60:05

him

60:06

which was kind of a jerk move to do um

60:09

obama turned around and tapped hillary

60:11

clinton

60:12

and i know that jones jim jones

60:16

told me that his dad was really offended

60:18

by that

60:19

and then he was offered and accepted

60:22

the role the position of national

60:24

security advisor

60:25

but actually considered turning it down

60:27

because he was so offended by what it

60:29

was so upset by what had happened

60:31

MILLIE

what would be the point of

60:34

like making hillary out of the equation

60:37

to then get trump in to then

60:39

want to just impeach him

PATRICK

well because

60:43

he wasn't their choice these people hate

60:45

Trump

LINDSAY GRAHAM

he's a jackass

60:47

PATRICK

so we're talking about at the time you

60:49

know

MILLIE

that would just make

60:50

pence in charge

PATRICK

well which pence do you

60:53

think john mccain would have rather had

60:55

pence in charge

60:56

i think lindsey graham would rather have

60:58

pence ? lindsey graham was so frustrated

61:00

with trump

61:01

trump he took his phone and smashed it

61:04

on youtube

61:05

because trump gave out his phone number

61:07

trump drove that man

61:08

crazy

MILLIE

trump got in the way of the big

61:11

game

61:12

a contest between contractors and

61:14

subcontractors

61:16

over who gets first dibs on defense

61:19

security and tech contracts .

61:22

TORE INTERVIE WITH R. STONE

mueller since uh i think it was like

61:25

august of 2016

61:26

was well aware that i had in my

61:29

possessions

61:30

portions of the dnc mirrored server in

61:33

february and march did you know that ?

61:35

ROGER STONE

are you not (I DID NOT)

TORE

and when my private life was

61:39

collapsing the same exact day not

61:41

without a minute of separation

61:43

i was served by barack hussein obama's

61:46

attorney

61:47

three years later to come and talk about

61:50

it did you know that?

R.STONE

i did not know that

61:52

either

TORE

they went as hard as they could .

61:54

stone ,the same thing. they went with

61:56

Nothing. like look ,mueller called him in

61:59

right for these emails and talking about

62:01

wikileaks

62:03

when i had actual portions of the dancer (DNC SERVER)

62:06

like even mueller knew i had it

PATRICK

why did

62:09

mueller never call me back

62:11

when i went to him and told him about

62:12

all this information and spoke to HIM

62:14

15 minutes. every one of these people are

62:16

so corrupt

62:17

it's not even funny

TORE

the swamp already

62:19

knew in august of 2016

62:22

that the information was compromised by

62:24

people

62:26

and they knew what type of people had

62:28

accessed that information

62:30

but they didn't know who

PATRICK

some people

62:32

will say well maybe they're

62:33

investigating and

62:34

how can you investigate it if you don't

62:36

ever call me back

62:38

and you don't ever really because

62:39

there's a lot of things that i need to

62:41

be able to explain to them that i can't

62:43

say

62:43

outside of a classified environment so

62:46

they're not even if they are

62:47

investigating it they certainly aren't

62:49

doing it with all the information

62:51

TORE

stop stop stop

62:55

we all know it was a fix

MILLIE

did the doj

62:58

outsource the mueller investigation to

63:01

cgi ?

63:03

TORE

well yes they did so i'll tell you what

63:05

happened so i actually

63:07

uh for my listeners on air i interviewed

63:10

former attorney

63:11

acting attorney general Whitaker.

i want

63:13

to ask you something you were chief of

63:14

staff for um

63:16

jeff sessions so there's obviously

63:18

contracts that are signed like you know

63:20

how you hire vendors

63:21

i wanted to know why during the mueller

63:23

probe

63:24

we spent over 40 million dollars in

63:27

waste management

63:29

to a canadian company that works with

63:32

canadian intelligence

63:34

yeah sounds like paper shredding on that

63:36

so that's

MATT WHITAKER yeah yeah

63:37

that's it all there's there's you know

63:39

this is the thing we we need

63:41

watchdogs and something i did before i

63:43

came to washington dc was run

63:44

a watchdog group that asked these types

63:47

of questions and to make sure that

63:49

that like you know kind of there's not

63:51

um

63:52

you know waste broad (FRAUD) abuse

TORE

so why is our

63:54

department of justice

63:56

outsourcing to canadian intelligence

63:59

companies

64:00

access to the mueller investigation ?

MILLIE

that

64:03

definitely seems improper

64:04

now this canadian company

64:08

how much were they paying and were they

64:09

paying them with tax dollars ?

TORE

64:11

we have to ask ourselves why would we

64:14

use

64:14

federal tax dollars and upwards of 40

64:17

million

64:19

to have them do paper shredding for

64:20

mueller and administrative tasks and

64:24

emptying garbage cans that sounds like a

64:27

leaking opportunity .

64:28

that sounds like why are we getting

64:30

foreign nationals involved in an

64:32

investigation

64:33

that we're supposedly investigating the

64:35

president the sitting president of the

64:37

united states

64:38

MILLIE

from cgi's involvement in the passport

64:40

fiasco in 2008

64:42

to cgi involved in the mueller

64:44

investigation

64:46

we see how contractors have the ability

64:48

to both perform

64:50

and clean up their own dirty work

TORE

i

64:52

think it's about time people understand

64:54

what happened and i made it no secret

64:57

that i know what happened

65:00

so seth rich worked for the dnc

65:03

he was asked just like i he was asked

65:07

hey why don't you go image the dnc

65:09

server right there since you're there

65:11

for us

65:11

so we can keep it safe and he did so

65:15

and he uploaded it where he was told so

65:17

he uploaded it where he was supposed to

65:20

and there were a lot of me's that saw it

65:22

bees (ME’S) meaning

65:23

group of friends that i have where we

65:25

sit and talk string theory and

65:26

predictive analytics

65:28

on the internet (UNDERNET) so we find this and it's

65:33

like

65:33

whoa treasure trove copied

65:36

and we fractioned it so that way we can

65:39

download it because it was

65:40

so massive and

65:44

that's what happened so i'll tell you

65:45

what happened to seth ridge (RICH)

65:47

so he did his job as he was asked at the

65:50

same time the rnc was also hacked

65:53

again brennan mo. let's hack and the hack

65:56

was done on purpose so you can

65:58

delete information insert information

66:00

and of course

66:01

with them putting cambridge analytica

66:04

and sending them over to

66:05

president trump which was a trap okay

66:08

that was a trap

66:10

um you clearly can see it

66:13

they hacked the rnc you mean you had

66:16

someone within the gop do it for you

66:19

because no one died there and yes some

66:22

of those emails escaped

66:24

because that is what was considered

66:26

mitigation

66:27

you have to give them something really

66:29

bad and so when he saw that they had

66:31

retroactively changed things the stories

66:34

and the rumors going in

66:35

seeing the bernie sanders elections were

66:37

being stolen

66:39

the dnc was all about hillary not about

66:41

real elections

66:43

that it was all rigged he came in

66:46

contact with a guy named sean lucas

SHAWN LUCAS

but

66:48

we did make contact with somebody from

66:50

the democratic national committee's

66:51

office

66:52

and they've been served. democracy has

66:55

prevailed today

66:56

TORE

so they decided oh yeah maybe we can get

66:59

it out to someone else

67:01

and it was not to julian assange direct

67:05

and both of those guys are dead

NEWSREADER

but in a

67:08

bizarre twist of events

67:09

on august 2nd less than one month after

67:12

serving the subpoena

67:13

lucas was reported dead

TORE

hillary's emails

67:16

were still being examined

67:18

they had to get rid of the evidence and

67:20

the only way that they can access the

67:22

whole dnc server

67:23

is if there was a breach and that's how

67:26

you can go in

67:27

and change things this is why the fbi

67:29

never asked for the server

67:31

that's the real story so as seth rich

67:33

thought

67:34

that what he was doing was correct

67:37

later on he realized it was not. that's

67:39

why there was such a big gap they didn't

67:41

need to

67:41

find him. they needed to find out who

67:45

had it and they already knew that i

67:48

myself had portions of the dnc

67:50

server and others in

67:53

march and February. obama's lawyer

67:56

for seth rich three years later says you

67:58

need to come and tell us about seth rich

68:00

i was like i don't need to do anything

68:02

i don't know who you're trying to you're

68:04

being subpoenaed i can't bring you

68:06

anything because you're three years too

68:07

late

68:08

and for the record usually they're going

68:11

to be three minutes too late

68:12

you know hillary doesn't have a patent

68:14

on hammers

68:17

or city dumps or bleach bit or

68:20

or you know

MILLIE

didn't crowdstrike initially

68:24

investigate the dnc server

68:27

creating the whole russia hacked the

68:29

election

68:30

scenario

DMITRI ALPEROVITCH

when the dnc hired us back in

68:33

may

68:34

we actually came in deployed our

68:35

technology called falcon on all the

68:37

systems inside that corporate network

68:38

WOLF BLITZER

(WHO) were these

68:39

people that were actually doing the

68:40

hacking of the dnc

DMITRI

there were two groups

68:42

two independently working group that we

68:44

associate with russian intelligence

68:45

agencies

68:46

one of them was associated with gru the

68:48

primary military intelligence agency in

68:50

russia (X WITH BUZZER OVER END OF CLIP)

PATRICK

68:51

crowdstrike owned by that alprovich guy

68:56

who is a senior advisor on the atlanta

68:58

council

68:59

when president trump called up the

69:01

ukrainian president

69:03

what did he ask him for the the the

69:05

crowd strike

69:06

servers right again all

69:10

immediate direct colleagues like the

69:12

brown bag

69:13

lunch at this big you know

69:16

star chamber that you can imagine

69:19

existing there

69:21

DR STRANGELOVE CLIP

i'm sorry mr president

PATRICK

they're all there

69:24

yeah just like

69:24

what can we do orange man bad what is

69:28

just statistical odds of that six

69:30

degrees of kevin bacon existing

69:32

on virtually everybody connected to the

69:34

russian dossier and the impeachment

69:37

the only other person that directly

69:39

connected to both of them is president

69:41

trump and he's on the receiving end of

69:43

it

69:44

but yet you never hear this man's name

69:47

MILLIE

general

69:48

jones that's the guy that heads up clear

69:50

for us that's the guy that

69:51

took shadow net and made it what it is

69:53

that's the guy that

69:55

resold reinvented shadow knit to create

69:58

the magic wheel at the dc courts to make

69:59

sure that they get the most compromised

70:02

juries you know put together for anyone

70:05

that they didn't want

70:06

PATRICK

when general jones was tapped as

70:10

the chairman of the board of atlanta

70:13

council

70:14

by to replace huntsman jon huntsman

70:17

one of the first orders of business that

70:21

uh he did with the atlantic council

70:24

was to create a partnership with

70:27

facebook right that happened

70:31

a month after mark zuckerberg sat in

70:34

front of congress

70:35

ZUCKERBERG

yes i mean they they did not want their

70:37

information to be

70:39

sold to cambridge analytica by a

70:41

developer and

70:42

and that happened and it happened on our

70:45

watch

70:46

so even though we didn't do it i think

70:48

we have a responsibility to be able to

70:50

prevent that and be able to take action

70:51

sooner

70:52

PATRICK

so as a month after

70:55

they do that facebook partners

70:59

with general jones at the atlanta

71:01

council

71:02

to restore election integrity worldwide

71:06

right so the best out of seven billion

71:10

people on the planet

71:11

mark zuckerberg picks the owner of the

71:13

shadow net ?

MILLIE?

71:14

president donald trump and mike pence

71:17

both ran

71:18

ads on facebook that uh

71:21

included a symbol of an upside down red

71:24

triangle

71:25

facebook today removed the ads

NEWSREADER

facebook

71:28

has taken action against what it calls

71:30

harmful misinformation from president

71:32

trump the company deleted a post by the

71:34

president that included a false

71:36

statement

71:37

PATRICK

to restore election integrity worldwide

71:40

we all know that he was connected

71:43

directly connected to cambridge

71:44

analytica through scigroup

71:45

and wikistrat so essentially what they

71:48

did was they partnered with cambridge

71:50

analytica again

71:51

MILLIE

this also explains why facebook went to

71:54

atlantic council

71:55

aka jones to fix the cambridge analytica

72:00

problem they needed to cover their iia

72:03

tracks .

what you've seen with the recent

72:06

riots surrounding george floyd's death

72:09

from your perspective does that look

72:11

like an iaa

72:13

Operation?

PATRICK

Absolutely. nothing feels

72:16

natural about what's going on

72:18

more stuff is fake and fabricated right

72:21

now

72:22

in the news than what's actually real .

72:25

when i say faker fabricated i i mean

72:28

like

72:29

okay you have the truth and it's being

72:32

represented to you

72:34

with a very specific slant

72:38

it's so far beyond you know a couple

72:42

you know russia making a couple spending

72:45

some money on some facebook ads

72:47

right if you believe that then they've

72:50

already won .

72:51

MILLIE

so that's how it works it's like the

72:53

movie wag the dog quite literally

72:55

TORE

well you know movies tell a lot of

72:57

stories and um

72:59

it's almost it's almost as if they're

73:02

making fun of us

73:04

MILLIE

they made fun of alex jones when he used

73:06

to point

73:07

out all these false flags i mean i guess

73:10

that's just a term he

73:11

was using but if you actually look what

73:14

he

73:14

was pointing out in a lot of instances

73:16

was iia operations

9/11 NEWS CLIPS

73:19

jane what more can you tell us about the

73:21

salomon brothers building and it's

73:23

collapsing and it's collapsing and it's

73:24

collapsed

73:25

as you can see behind me the trade

73:27

center

73:28

appears to be still burning we are

73:30

getting information now that one of the

73:31

other buildings building

73:33

seven in the world trade center complex

73:35

is on fire and

73:37

has either collapsed or is collapsing

73:40

TORE

well but he didn't know the term iia so

73:43

it would be

73:44

easier for people to understand

73:45

someone's hacking your reality because

73:47

now in this day and age of computing

73:49

that makes more sense to people they

73:50

understand it more oh

73:52

hack my reality you mean change the way

73:54

i see things and that is exactly what an

73:57

iia

73:57

is it's just that it's software churning

74:00

out oh you need to do

74:01

this to get this outcome kind of like

74:04

using that shadow net in the dc chords (COURTS)

74:07

and saying oh prosecutor you want him to

74:09

go to jail and you want a guilty ver (DICT)

74:11

well we're going to have to pull (POOL) it out

74:13

and then when a pool of jury people come

74:15

all of them are potential to give you a

74:17

guilty verdict

74:18

so then you pick from all the people

74:20

that will give you a guilty purpose (VERDICT)

74:23

so there's no chance that you'll win and

74:24

even matt whitaker said that on my

74:26

on my show he said the judges are

74:28

corrupt

MILLIE

that's a major

74:30

problem for the justice system if people

74:33

are able to use that technology

74:35

in jury selection to be able to predict

74:38

who's gonna you know throw their vote a

74:40

certain way

74:42

TORE

is anyone stopping them that's a major

74:46

problem right there it is and roger

74:47

stone with this commutation

74:49

will solve it because this is where it

74:52

all comes to the surface

74:53

TORE INTERVIEW

how do you think your jury pool was

74:56

selected ?

ROGER STONE

74:58

well obviously i don't know i do know

75:00

that based on the

75:02

statistics on the district of columbia

75:04

that is that the statistical

75:06

improbability

75:07

of my jury having a single republican

75:10

should be impossible

75:11

the statistical impossibility of my jury

75:14

having a single military veteran

75:16

should be impossible the statistical

75:18

possibility of my jury

75:20

having no jurors with less than a

75:22

college education

75:24

is impossible uh but that was the case

75:28

TORE

well what if i told you roger that your

75:30

jury

75:31

was uh actually selected the jury pulled

75:33

the grander jury pool

75:35

right before the voidier (VOIR DIRE) they say where

75:38

you kind of select and approve and deny

75:39

right

75:40

the the majority of it was actually

75:43

plugged into a program but see this

75:46

program wanted to select

75:48

a jury pool that would get you a guilty

75:51

verdict no matter what. hence

75:54

the odds like you say are so far-fetched

75:57

so the question is

75:58

who was the company who was the vendor

76:01

that was used

76:03

to select your greater pool

76:06

for the jury and if your you know

76:10

lawyer was to able to able to find that

76:12

or

76:13

ask that question i would not be

76:15

surprised if you see the name general

76:17

hayden hop (POP) up

76:18

ROGER STONE

i do think it might strengthen my uh

76:21

the possibility of my appeal it should

76:23

that become

76:24

necessary i will never plead guilty to

76:27

something i didn't do

76:29

it's a matter that does require some

76:32

research and i appreciate you bringing

76:33

it up

76:34

MILLIE

it's amazing it's like minority report

76:37

in real time

PATRICK

76:38

today clear forces kind of like

76:41

what they built the it's it's the next

76:44

iteration of the shadow net

76:46

they took the cycle they took the

76:49

profile

76:50

uh personas and profile capabilities

76:53

they

76:53

added real-time criminal background

76:56

travel

76:57

financial medical added all these things

77:01

in to create

77:02

predictive behavioral profiles that

77:04

determine whether or not you're likely

77:06

to steal or leak

77:08

clear force actually sells this to hr

77:11

right

77:12

so you could actually go into a job

77:14

apply for it

77:15

not get a job because an application

77:19

with an algorithm designed by obama's

77:21

national security advisor

77:22

and or obama's cia director

77:26

determined that you were predictively

77:27

likely to steal or leak in some ‘minority

77:29

report -

77:30

Like’ fashion and you may never

77:33

ever steal or leak but you might lose a

77:35

job because

77:37

something read all your posts and looked

77:39

at your information and determined it

TORE

77:41

think about it if people knew just how

77:45

bad it is

77:46

think about how many things he's

77:48

changing and how much money they're

77:49

taking i mean think of all the money

77:50

they're going to lose in contracting

77:52

he's stopped the clearances remember

77:54

once you're out now we pull your

77:55

clearance he did that remember

77:57

so now all the future generals or all

78:00

the future

78:01

intelligence community persons don't get

78:03

to use their clearance .if you’re out iTs

78:04

finished

78:05

PATRICK

you guys were paying me as taxpayers

78:07

were paying me

78:09

as the information insurance security

78:10

officer to

78:12

protect our national security so y'all

78:15

should want

78:16

to get to the bottom of this as much as

78:18

anybody as much as i do

78:20

but it's very personal to me i won't

78:21

deny that

TORE

when you have your (BLEEPED)trying to

78:26

serp (USURP?)your president by penning in an

78:28

anonymous letter to end

78:29

new york times that's a big problem

MILLIE

this

78:32

is the biggest

78:34

and boldest move towards the ultimate

78:36

surveillance state

78:37

ever made and it's near completion

78:40

micromanaging this technology on a

78:43

global scale would require

78:44

integrating it with artificial

78:46

intelligence imagine

78:48

artificial intelligence autonomously

78:50

operating the shadow net

78:52

and clear force. interpol's 2019

78:54

publication

78:55

artificial intelligence and robotics for

78:57

law enforcement

78:58

reveals we are already there. quote :

79:01

“although films such as minority report

79:03

and robocop may not present the most

79:05

attractive depiction of the future of

79:07

advanced technologies in law enforcement

79:10

understanding how these technologies can

79:12

be applied by law enforcement agencies

79:14

for the safety and security of our

79:16

global community

79:17

is of critical importance”

CLIP OF DRONE keep a safe

79:20

distance of six feet from others

MILLIE

79:22

short from a major pr rollout there is

79:25

an international push for autonomous law

79:27

enforcement to remove the human factor

79:30

several features of the interpol program

79:33

indicate that they are using an

79:34

iteration of shadow net and clear force

79:37

technology

79:38

this march 2017 united states patent

79:41

issued to jim jones iii and clear force

79:44

spells it out quote “systems and methods

79:47

for electronically moniTOREng humans

79:50

to determine potential risk” several

79:53

diagrams in this patent look identical

79:55

to the dashboard

79:56

layout of the shadow net the patent

79:58

mentions integration with u.s

80:01

and international databases local law

80:03

enforcement

80:04

and individual state databases all fed

80:08

into international justice and public

80:10

safety networks

80:12

full integration of all data including

80:14

the internet of things

80:16

is the objective a march 2020 atlantic

80:19

council policy primer

80:21

“ai society and governance” references the

80:24

2019

80:25

interpol publication stating quote “the

80:28

united nations

80:29

inter-regional crime and justice

80:31

research institute and the

80:33

international criminal police

80:34

organization are leading the

80:36

conversation on

80:37

autonomous patrol robots tracking and

80:40

tracing systems ,

80:41

forecasting tools, predictive policing

80:44

and more”

80:45

the next iteration of the shadow net and

80:47

clear force is ready to go

80:49

integration with ai robots and the

80:52

replacement of traditional

80:54

law enforcement is just around the

80:56

corner given that leftist organizations

80:59

managed by momentum which is behind the

81:02

defund the police movement and given

81:04

that momentum has been connected to

81:06

iia operations the case can be made that

81:09

jones and coe are running the defund the

81:12

police influence operation

81:14

simply because they are in a position to

81:16

benefit by offering an alternative

81:19

solution that is already in line with

81:21

the green new deal agenda

81:23

we've already seen some of this rolled

81:25

out with the technocratic response to

81:28

covid19 with autonomous drones contact

81:31

tracing apps

81:32

nanotech vaccines and predictive

81:34

modeling for social distancing and

81:36

economic shutdowns furthermore this

81:39

technology is behind the push for police

81:42 abolition

81:43

defunding law enforcement and replacing

81:45

it with smart justice

81:47

given we have seen iia shadow net

81:49

technology

81:50

implemented by the socialist democrats

81:52

and sunrise movement who are using it to

81:55

push for police abolition

81:57

this political movement is deeply

81:59

connected to the un

82:01

who has partnered with interpol to

82:03

corral us

82:04

into the artificial intelligence and

82:06

robotics for law enforcement

82:08

direction