Millie Weaver was arrested for releasing a documentary about how information warfare is conducted against U.S. citizens. The video has since been removed from it's original location on YouTube, but it can still be found posted on other channels. While I was watching it, I copied & pasted the transcript into a word file and dropped speakers names into it, along with some screen grabs of visuals. I added punctuation in some places and any clarifications or corrections to the transcript made by me are in full caps. It's a 'quick & dirty' version of what's in the video for anyone who wants to examine the contents of the film more closely.
NOTE: I do NOT endorse this film because it does NOT provide evidence for all of its allegations. For example they accuse "socialist democrats" of using information warfare to promote defunding the police without a shred of evidence. That seems as likely to be a state psyop to further polarize the left & right and marginalize the Black Lives Matter movement, not unlike what the FBI did with COINTELPRO.
Some of the allegations warrant further investigation. For example, the use of information warfare technology to create a biased jury pool is very disturbing, if true.
This transcript is VERY rough and I may have missed some changes of speakers.
SINGER
00:11
don't want to set the world on fire
00:16
[Music]
00:21
MILLIE
what if i were to tell you that a small
00:23
group of government contractors
00:26
were hired by government officials to
00:29
frame the trump campaign
00:31
set him up for the russia collusion
00:34
investigation
00:35
provided witnesses for the impeachment
00:37
hearings
00:38
and provided administrative support
00:41
services
00:42
to the department of justice during the
00:45
mueller investigation
00:47
and what if it just so happened that
00:49
this same group of contractors
00:52
are behind the fake news in mainstream
00:54
media
00:55
influence operations on social media and
00:59
the civil unrest nationwide pushing the
01:02
defund the police movement the obama
01:06
gate scandal
01:07
only scratches the surface
LINDSAY GRAHAM
you mentioned
01:09
shock value that
01:11
is shocking what the russians did i
01:13
agree we need to stop it
01:14
SALLY YATES
i know that now based on the horowitz
01:17
LINDSAY GRAHAM
i'm not saying that you lied to the
01:18
court i'm saying you signed something
01:20
that was a lie and you didn't know it
MILLIE
01:22
talk about a cover story what really
01:24
happened is
01:25
much more alarming. both parties are
01:29
equally guilty of covering up what
01:32
should
01:32
turn out to be an even bigger scandal
01:36
shadowgate :
the tactical and operational
01:39
role
01:40
the shadow government played behind the
01:42
scenes
01:43
carrying out the coup against president
01:46
trump we're going to be looking behind
01:48
the puppets
01:50
at who the real puppet master string
01:52
pullers are
01:54
the material presented in this
01:56
documentary
01:57
should concern people of all political
02:00
affiliations
02:01
this is about real players people whose
02:04
names
02:04
never come up but should. career
02:07
politicians are definitely part of the
02:10
beltway swamp
02:11
even aspects of the deep state but they
02:14
are not the shadow government .
02:16
the shadow government consists of
02:18
government contractors
02:20
Defense, intelligence, security and so on .
02:24
our government mostly consists of
02:26
front-facing
02:28
desk jockeys that are compartmentalized
02:30
in cubicles
02:32
they're to cover up for the fact that
02:34
most of the real work is
02:36
outsourced to contractors -aka
02:39
the military industrial complex- that way
02:42
what the public sees
02:44
through foia requests investigations
02:46
congressional hearings or otherwise
02:49
is as clean as a whistle. all the dirty
02:52
work
02:53
is kept private with contractors in
02:56
clandestine
02:57
Networks. these contractors have used
02:59
their connections
03:01
power and influence to create an
03:03
unprecedented international
03:06
criminal enterprise where blackmail is
03:09
traded
03:09
and people's personal data is gold .
03:14
two whistleblowers Tore (LINGUIST,
NAVY INTEL CONTRACTOR)
and patrick bergie (CYBER SECURITY,
ARMY PSYOP PROGRAM DEVELOPER)
03:18
who both worked extensively within the
03:21
shadow government
03:22
as contractors have come forward with
03:24
revelations
03:26
that may be part of the biggest
03:27
whistleblowing event
03:29
to date
TORE
i'm one of thousands (OF)
03:33
faceless patriotic americans that work
03:38
within the shadows and
03:39
had been doing that for a very long time
03:42
people that worked for john brennan
03:43
approached me while i was in
03:45
my specialist training while i was in
03:48
the navy .
03:49
when i was recruited it was for
03:51
electronic warfare
03:52
then i ended up in information warfare
03:55
and ironically
03:56
the base that i first went to for
03:58
electronic warfare
03:59
is now information warfare (IMAGE INFORMATION WARFARE TRAINING COMMAND CORRY STATION)
04:04
PATRICK
my job for a company called dynology
04:06
which was owned by
04:07
obama's national security advisor
04:09
general james jones and i answered
04:10
directly to his son (JIM JONES)
04:12
i worked for them for about eight years
04:14
from like 2007 to 2010
04:17
my focus was primarily in the
04:19
development on a couple different
04:20
contracts for the department of defense
04:22
for the development of the capabilities
04:27
for interactive internet activities
04:29
being something
04:30
that helps support cno which is computer
04:33
network operations ,
04:35
hacking and different things like that
04:37
and
04:39
information operations which would be
04:41
your actual influence operations right
04:43
it's a supporting application that
04:45
really it's kind of like a microsoft
04:48
project right which allows you to
04:51
manage uh large projects like enterprise
04:55
level projects
04:56
but instead of like managing the the
04:59
building of a
04:59
the construction of a 14-story building
05:03
it's managing the most you know
05:06
malevolent operations that you could
05:08
imagine .
05:09
TORE
i was a contractor for various
05:12
intelligence
05:13
agencies that were privately
05:17
created so they were private contracting
05:19
agencies (LOGOS: CGI & GLOBAL STRATEGIES GROUP)
05:21
because unlike what most people think
05:24
our intelligence doesn't stay within our
05:28
borders
05:29
or within federal buildings
05:32
the shadow net was the commercial
05:35
version
05:36
of a in an iia
05:39
weapon iia being interactive internet
05:42
activities
05:43
that's the military nomenclature for
05:46
what basically you've heard just being
05:47
described for the last three or four
05:49
years with
05:51
all the fake news and uh the
05:54
the the fake news journalists and fake
05:57
stories
05:58
fake dossier all these things are
06:02
attributes and characteristics of of IIA
06:06
which is social media psychological
06:08
warfare
06:09
we began that really in 2007
06:14
when right after the policy guidelines
06:17
first came out
06:18
we were on one of the first contracts
06:20
with a (the) dod that i'm aware of
06:22
trying to help the four psychological
06:25
operations group understand
06:27
how to go from dropping flyers from
06:30
planes to a more micro-targeted
06:34
social media psychological warfare
06:36
application where you could
06:37
select an individual uh target
06:40
or a group target or
06:43
an entire country if you wanted to.
TORE
what
06:45
i did was something called
06:48
localization or l-10n so a localization
06:51
strategy
06:52
is you find a group of people that could
06:55
be a whole country
06:57
a city a certain religious group
07:01
uh you know six block radius like chaz
07:05
and you kind of try to get in their mind
07:07
you have to understand
07:09
how they eat how they walk how they talk
07:12
what they like what pushes their buttons
07:14
what drives them nuts
07:16
what upsets them what makes them happy
07:19
and then you use that to your advantage
07:22
to push whatever ideology or product or
07:25
direction you want them to go marrying
07:27
together
07:28
cultural appropriation language nuances
07:32
of the demographic that you are
07:33
targeting or the nation you are
07:35
targeting
07:35
it prides into your demographic your
07:38
world
07:38
so if i want to blackmail you and put
07:40
you under my thumb not only will i know
07:42
everything but i will
07:44
know your deepest darkest fears i will
07:46
know people i can get in contact to find
07:48
out more about you
07:49
maybe you had like an old hockey injury
07:52
so if i wanted to attack you i'd know
07:53
where to hit
PATRICK
you
07:54
you understand enough about someone and
07:56
you can
07:58
hack their shadow right you can
08:02
use you can you can use their fears you
08:05
can use their
08:06
anxieties like sound anything like
08:10
pandemics that you recognize here
MILLIE WEAVER
oh
08:13
yeah definitely
PATRICK
08:13
so you can use those things to help
08:17
uh reflexively control or influence and
08:19
target an individual or
08:21
whoever it is right or a group of people
08:23
or an entire election an entire country
08:25
TORE
what patrick bergey created
08:27
was a program
08:31
that was based off of the strategies
08:33
that we used in person
08:36
it was a psychological operation
08:39
but that crunches data with the use of
08:42
psychological operations so you can
08:44
predict how
08:45
your target will respond
PATRICK
you know i
08:46
spent like seven years overseas right
08:48
several years a couple of those years
08:50
were specifically related to iia
08:53
so i understood certain things
TORE
when we
08:56
hijacked the afghan elections
08:59
how did we do that we had to understand
09:01
how the afghanis think
09:02
we had to go to the areas that were
09:04
anti-taliban because the taliban
09:06
political group was now more militant
09:09
than it was political
09:10
we used that to our advantage and
09:12
formulated a plan
09:13
where we would sway their thoughts to
09:16
believe that
09:17
xyz candidate is the way to go because
09:20
then you won't get robbed and will tame
09:22
the taliban
09:23
so it but we had to do it in their way
09:25
so he created the
09:26
algorithm that does that for you
PATRICK
when we
09:28
were largely doing this it was done by
09:30
analysts now this is more done
09:32
automated through artificial
09:33
intelligence
09:35
which is just a common iteration of the
09:39
program or application development
09:41
process the database component
09:43
ends up allowing you to build behavioral
09:45
profiles
09:46
on individual targets right and through
09:49
those
09:50
behavioral profiles you can develop or
09:53
or implement reflexive control which
09:56
allows you to understand with enough
09:58
information about someone
10:00
you can predictably determine how
10:02
they're going to react
TORE
i was really good
10:03
at what i did
10:06
really good and i can still do it too
10:08
i'm not doing it now though
10:10
MILLIE
well don't be doing that sorry
TORY: i didn't (YOU WOULDN’T)
10:12
know if i was too
10:13
but um i helped them
10:17
train algorithms with the strategies
10:20
that i had created
10:21
all these years
PATRICK
they had asked us to
10:23
bring the application
10:25
to a classified network but jim
10:28
sent him a bogus just a made made-up
10:31
ridiculous bid
10:32
to actually do that because if it went
10:35
on a classified network
10:36
we couldn't turn around and sell it
10:38
commercially we went on
10:39
after that to another contract
10:43
uh in tampa took everything with us for
10:46
psychological operations group had no
10:48
idea that we were going to be taking
10:50
their years worth of work that they paid
10:52
us to do
10:53
the taxpayers paid us to do and we kept
10:55
the intellectual property rights to it
10:57
and um uh remarketed it
11:01
branded it commercially as a shadow so
11:04
i come back here
and i see these guys
11:07
back here in america
11:09
have just been having a field day
11:11
utilizing the technology that we've been
11:13
developing
11:14
to alter the outcomes of our elections
11:17
in america
MILLIE
this technology was so
11:20
successful
11:21
they couldn't resist the temptation to
11:24
not use it commercially
11:26
and have the power to affect outcomes of
11:28
elections
11:29
at home the commercial and black market
11:32
value
11:32
of such a technology is incalculable
11:36
this is the mobile mega shatternet
11:39
mobile
11:41
my laptop sits in here and then i got
11:45
uh two 4k capture cards
11:48
i can do vtc and this
11:52
charges all the camera equipment
11:56
so while i'm riding i'm told i'm getting
11:59
as much as 40 amps
12:00
these are the same cases that we used
12:03
to build out our skips
12:07
our sc2ips which is a small command and
12:10
control over ip
12:13
and when i was working with jcse
12:16
we would take these cases and build out
12:19
networks
12:20
this is a small command and control over
12:22
ip
12:24
it's just only running on one
12:25
unclassified network sim enabled wi-fi
12:28
router
12:29
and if i get decent cell connection i
12:32
can run the multiple cameras
12:34
and i can put multiple images in one
12:37
screen
12:37
and i can run all that from my
12:40
cell phone that i have mounted here
12:44
MILLIE
the group of whistleblowers from the nsa
12:46
and other classified data collection
12:49
agencies referred to as the global
12:52
surveillance whistleblowers
12:54
were used as a vector to legalize what
12:56
was
12:57
then illegal dragnet spying on everyone
13:00
24 7.
NEWS READER
the nsa and its former head
13:04
general hayden declined to comment for
13:06
this story
13:07
the fisa amendment act of 2008 had
13:10
section 702 that permitted the
13:12
government to spy
13:14
on citizens with a warrant from the
13:16
foreign intelligence surveillance court
13:18
the nsa data system collects everything
13:22
through what's called the upstream where
13:24
everything is stored for 72 hours
13:27
then dumped however if one could twin
13:31
this stream of data they could privatize
13:33
it
13:34
imagine what you could do with that
TORE
13:37
alleges that she worked for john brennan
13:39
at the analysis corporation and global
13:42
strategies group
13:44
what is the analysis corporation
TORE
it is a
13:46
company that does a lot of
13:48
things varied from administrative work
13:51
to analyses
13:52
to data collection biometric collection
13:55
i mean whatever contract they've been
13:56
awarded by the government they do
13:58
it could be something as simple as
14:00
janitor duties
PRESS CONFERENCE
14:02
in case you missed the secretary's words
14:05
upstairs she reached out
14:06
to senator obama to say that she was
14:09
sorry that this had happened
14:11
that there were these unauthorized
14:13
accesses to his passport files one
14:15
incident
14:16
this past summer where there was a
14:19
trainee
14:21
in the passport office who had an
14:23
unauthorized access of senator clinton's
14:25
passport file now in the case of senator
14:28
mccain
14:30
we detected earlier this year
14:33
one of the same people
14:36
who accessed senator obama's passport
14:39
file
14:40
also accessed senator mccain's passport
14:44
file this is the same individual who was
14:47
disciplined but at this point in time
14:50
still remains working with
14:52
the contractor
MILLIE
she claims to be the
14:55
actual person who moved the electronic
14:57
files at stanley inc
14:59
and cgi in 2008 which
15:02
publicly was falsely alleged to be a
15:05
hack
15:06
what can you tell us about the cgi
15:08
stanley passport incident
15:10
TORE
see brennan has a certain mo okay when
15:13
he wants to get something
15:14
he pretends there's a hack so
15:18
i was asked when i was stateside
15:22
hey would you go buy that office and
15:24
pull all this data from the state
15:26
department
15:27
and i said of course i will i put it on
15:30
two rugged drives
15:31
you know they were like the orange tips
15:33
really big you know
15:35
drives and i put it on there and then
15:40
later it's like oh they were hacked and
15:42
i'm thinking
15:43
um i didn't hack anything i was told to
15:46
do it
15:47
so i just kind of watched what was
15:49
happening one person actually what
15:50
committed suicide or something
15:52
and the other two were found i'm like
15:54
but there was no hack
15:56
and that that's a going theme you know
15:57
that right
MILLIE
15:59
wow if it wasn't a hack i'm presuming
16:02
that means you took the information off
16:06
of their servers and computers
TORE
correct
16:09
MILLIE
so that information was then missing
16:11
TORE
correct
16:12
MILLIE
what would be the point of that
TORE
what
16:13
were they trying to hide well
16:15
if i removed it that means someone else
16:17
was there to replace it
16:20
right so i remove the factual actual
16:23
information
16:24
and then someone goes behind that's like
16:26
super switch
16:31
i didn't see that until retro right in
16:33
retrospect right because for me going to
16:36
copy a server off of a consulate
16:38
you know computer state department
16:41
wherever would be normal if we had a
16:44
contract
16:45
with them they would tell me what
16:47
terminal i'd scan the barcode
16:49
make sure that i was at the right
16:50
computer and do my job
16:53
so i removed data that means someone
16:55
else replaced it
MILLIE
16:57
so what is the relationship between
16:59
global strategies group
17:02
analysis corporation and canadian
17:05
global information
TORE
they all do the same
17:07
thing they're the jacks of all trade
17:10
except for the fact that global
17:11
strategies group
17:13
was actually a hub
17:16
for all information in and out in and
17:18
out i mean
17:20
all of the directors there were former
17:22
gchq
17:23
cia nsa you know
17:27
mi6 mi5 german intelligence
17:30
you have to wonder why are all these
17:32
former heads
17:33
heading up consulting from (FIRM)
17:37
and what were they consulting and they
17:39
weren't consulting they were collecting
17:41
everybody's data
17:42
and privatizing it
MILLIE
john brennan working
17:45
within his network of contracting
17:47
companies
17:48
such as Stanley, canadian global
17:50
information (CGI)
17:51
and the analysis corporation helped then
17:55
senator barack obama get elected
17:58
using internet influence operations
18:02
march 5th 2013 brennan gets confirmed as
18:05
cia director
18:07
dodging controversy over his involvement
18:09
in the cia
18:10
enhanced interrogation scandal now tell
18:13
us about these data bridges
18:16
to the nsa is that legally obtained
18:20
information
TORE
18:22
i mean that's kind of what snowden did
18:24
too
18:26
MILLIE
according to sources closely connected
18:28
to this subject
18:30
under john brennan's direction snowden
18:32
created
18:33
a data bridge from the nsa database
18:36
into private servers controlled by
18:39
private intelligence and
18:40
cyber security contractors aka
18:44
the analysis corporation, global
18:46
strategies group
18:47
and canadian global information
18:50
the twinning of streams is duplicating
18:52
the information in the upstream
18:54
that's that's crazy to think that
18:57
another company
18:58
is copying all emails texts phone calls
19:03
messages emojis instagrams tweets
19:07
anything you can imagine that's being
19:09
uploaded
19:10
that has to go into like the 72 hour
19:12
holding is suddenly being
19:14
pushed offshore that sounds kind of
19:16
illegal
19:17
because it is
MILLIE
june 5th 2013
19:21
edward snowden goes public with the nsa
19:24
program
19:25
prism revealing the nsa collects
19:28
internet traffic
19:29
of all u.s citizens from major internet
19:32
and telecom companies through the fisa
19:36
702 program snowden's actions kicked off
19:40
on the federal level justification for
19:42
spying on u.s citizens
19:45
including the senate and congress in the
19:47
name of preventing u.s citizens with
19:50
classified or top secret clearances
19:52
from being able to repeat snowden's
19:55
actions
19:56
this opened the door for the creation of
19:59
clear force
20:00
july 4th 2013 cgi
20:04
and gchq launch a defense protection
20:07
partnership
20:08
which includes sharing threat
20:11
intelligence
20:12
so these were all private corporations
20:14
that
20:15
even had foreigners working in them and
20:19
they had access to nsa
20:22
servers
TORE
of course they did i mean how do
20:24
you think we found
20:25
through facial recognition of the fbi
20:28
the belgium bomber why would we have
20:31
their
20:32
facial recognition data
MILLIE
20:36
so is this legal what you're telling me
20:39
and why would they do it why would they
20:41
set this up this way
TORE
20:42
so sharing our information and our
20:44
private identifying information
20:46
facial recognition biometrics outside of
20:48
the united states
20:50
for official purposes like at a
20:52
consulate and an embassy
20:54
you know through secret service or
20:56
anything like that
20:57
is legal right or through interpol but
21:00
to have a company
21:01
that houses everybody's data and
21:04
any private person can buy that data
21:08
or investigate that data or
21:11
analyze that data that's not, and that's
21:14
exactly what gsg was doing
21:16
NEWS READER
early 2009 john brennan left government
21:19
and went to work for a small
21:20
intelligence contractor here in the
21:22
virginia area suburban virginia area
21:24
just outside of washington
21:25
the company was called the analysis
21:26
corporation …there are subsidiaries of
21:28
subsidiaries some of these companies are
21:30
spun out go public go private again
21:32
it's kind of hard to keep track of them
21:34
MILLIE
in just four months
21:35
gsg cgi and other private contractors
21:39
allegedly had unauthorized access to the
21:43
entire five
21:44
eyes network unfiltered unrestricted
21:48
decompartmentalized outside any
21:51
government regulation
21:52
or oversight not surprising the cia gets
21:56
caught one year later spying on the u.s
21:59
senate their excuse it was their own
22:03
network they had set up for the senate
22:05
to use
22:07
so they had authorization
SEN. RON WYEN ON CSPAN
would you
22:10
agree
22:10
that the cia's 2014
22:14
search of senate files was improper
22:20
JOHN BRENNAN CIA DIRECTOR
this is the annual threat assessment is
22:22
it not yes these were
22:24
cia computers at a cia lease facility
22:27
it was a cia network that was shared
22:30
between
22:30
senate staffers conducting that
22:33
investigation for your report
22:35
as well as cia personnel
NEWS READER
the reality is
22:37
those
22:38
computers in effect belonged to the cia
22:41
but they were reserved exclusively
22:44
for the committee's use
GENERAL MICHAEL HAYDEN
FORMER DIRECTOR NSA 7 CIA
we accelerated
22:47
our ability our - for one (WANT0 of a better word -
22:51
invasiveness and into communications
22:54
networks
22:55
in which legitimate targets coexisted
22:58
with legitimately protected
22:59
communications
PATRICK
23:01
obama takes office and general jones is
23:04
being sworn in
23:05
as national security advisor his son
23:08
general jones's son
23:10
copyrights ckms congressional
23:13
knowledge management system within a
23:15
couple months after
23:17
he leaves office in 2010 dynology gets
23:20
contract for ckms the congressional
23:23
knowledge management system
23:25
which basically controls uh
23:28
all of the scheduling, the addresses,
23:31
the documents, everything for
23:34
the congress. ckms
23:38
is going to give you access to
23:41
unlimited information think about the
23:44
information you could get from that .
MILLIE
23:46
if we look on usspending.gov we see
23:49
dynology was awarded contracts for the
23:52
congressional
23:53
knowledge management system however
23:56
one contract stands out where dynology
23:59
was awarded a
24:00
contract by the department of defense
24:02
that includes a
24:04
mention of the congressional knowledge
24:06
management system
24:07
a closer look shows that the award
24:10
description
24:11
is for ckms hosting labor admin
24:15
core data the primary place of
24:17
performance
24:18
is germany and the north american
24:21
industry classification description is
24:24
data processing ,
24:26
hosting and related services
24:29
even one section stating manufacturing
24:32
outside the united states use
24:36
outside the united states let it sink in
24:39
that these official documents suggest
24:41
the congressional
24:42
knowledge management system outsourced
24:45
to a
24:46
private contractor is hosted managed
24:49
and stored in servers in germany
24:52
this is very disturbing with the
24:55
senate's computer network
24:57
compromised by john brennan cia and the
25:00
congressional
25:01
knowledge management system being hosted
25:04
managed and stored overseas
25:06
by general jones's company the ability
25:08
for these contractors to
25:10
eavesdrop on both the house and the
25:13
senate
25:14
is staggering
PATRICK
i brought this up
25:17
back in 2018 shortly after that
25:23
dynology lost the contract that they had
25:25
had since 2011
25:27
2012 with ckms
25:30
and that contract went to another
25:32
company a company that exists
25:33
as nothing more than a website and a
25:36
mail drop
25:37
mile or so from dynology's tampa office
25:40
controlling the entire congressional's
25:43
knowledge management
25:44
TORE
and if you look at the contracting
25:45
database they'll say that oh they have
25:48
an american
25:48
an american entity and it's like but
25:50
it's the same ceos for this canadian
25:52
company i'm so confused
25:54
so they even falsify information
25:58
uh so they can obfuscate who, where our
26:01
federal tax dollars are going and don't
26:03
forget
26:03
they all share contracts they all
26:05
subcontract
26:06
co-contract
PATRICK
psy group has the exact same
26:10
product
26:11
as dynology the shadow net
26:15
in eyesight right yet the owner of
26:18
dynology
26:19
sits on the board of directors side (PSY)
26:20
group which in my opinion is kind of
26:22
like
26:23
the owner of coke sitting on the board
26:26
of directors of pepsi
26:28
tac cgi and all these
26:31
llcs they just keep cycling and cycling
26:34
all of them
26:35
NEWSREADER
the social security numbers of 19.7
26:38
million americans
26:40
subjected to federal background checks
26:42
as a condition of employment
26:44
are now in the hands of hackers
MILLIE
in june
26:47
2015 the office of personnel management
26:51
announced a major data breach tell us
26:54
about the opm
26:55
hack
TORE
okay so that's another brennan job
26:59
another hack suppose(D) hack and this is to
27:02
obtain
27:03
delete and obfuscate information hillary
27:05
clinton
27:06
was up for the shopping block about her
27:08
emails right at the state department
27:09
and that was coming up that was big talk
27:12
of the town in 2014.
27:15
suddenly the office of personnel
27:16
management was hacked
27:18
in december down the line five months
27:22
later
27:23
hillary clinton appears in court and
27:26
they tell her hey you're gonna hand over
27:27
your emails
27:28
a couple days after that the now fired
27:31
corrupt leaking former ig of the state
27:34
department
27:35
linux (LINICK) had requested from
27:38
our elected officials to give him a big
27:41
fat budget
27:41
to create his own personal ig of the
27:44
state department server
27:46
MILLIE
how convenient
TORE very convenient
HON. STEVE A. LINICK
well we
27:48
have no evidence that our data has been
27:49
compromised
27:50
the fact that the contents of our
27:52
network may be accessed by large numbers
27:54
of department administrators
27:55
puts us at unnecessary risk … the i.t
27:58
folks at the department have the keys to
27:59
our i.t system
28:00
so they really have access unfettered
28:02
access to the system if they wanted to
28:04
they could read
28:05
modify delete ((SLOWMO) they could read modify
28:09
Delete)) i would like to be completely
28:12
separate from the department
28:14
to ensure the integrity of our system
28:16
but i also need the department
28:18
to give us access to the same systems
28:22
that we have now
28:22
(SLOWMO) give us access))
28:26
TORE
and he was responsible in releasing her
28:28
emails that he gave in little little
28:30
doses of course
28:31
over time but at the same time the press
28:34
came out with a report
28:36
oh dear months ago there was a leak
MR. PERDUE
FOREIGN RELATIONS SUBCOM.
do
28:38
you have evidence that the state
28:40
department's network has been attacked
28:42
and does that affect you guys
HON. STEVE A. LINICK
there
28:44
there
28:45
and there has been there's there's
28:47
evidence that has been attacked and it
28:48
has affected us
28:49
i can't really go into details uh
28:51
because of the nature of the information
28:52
TORO
for people that don't know the office of
28:54
personnel management usually has
28:55
information
28:56
on every single american uh that has
28:59
applied for any type of clearance
29:01
so if you applied for like a white house
29:03
press pass or join the military
29:05
or an admin job that could require
29:08
something like a
29:09
public charlie clearance anything all
29:11
your information is there
MILLIE
29:13
what could they do with all that
29:14
Information
TORE
they started
29:16
slowly creating these memorandums of
29:18
understandings with your
29:20
secretaries of states and attorney
29:22
general secretly behind your back
29:24
providing
29:25
facial recognition data private
29:27
identifying data data data
29:29
this was the most incredible data
29:31
because if you want to control someone
29:34
all you need to do is put that
29:36
information through a couple of systems
29:38
and you'll know exactly what buttons you
29:40
need to push
29:42
and how to make them nod their head the
29:44
way you want them to or shake it
CBS NEWSREADER
29:47
millions of americans have received
29:48
letters like this
29:50
notifying them their data are at risk
29:52
and referring them to a government
29:54
contracted credit moniTOREng agency
MILLIE
does
29:56
this
29:57
correlate with predictive programming
TORE
30:00
yes
30:00
MILLIE
PATRICK
the merging of john brennan's tactical
30:03
intelligence
30:04
and general jones's operational
30:06
capabilities
30:08
gave birth to clear force isi was
30:11
the relational database component of it
30:14
that's what we named it
30:15
i named it actually and uh
MILLIE what did you
30:18
name it isi (iPSY)for
30:20
i like the iphone uh psi for
30:23
psychological
30:24
warfare
MILLIE
okay
PATRICK
you have the component
30:26
where you need to be able to collect all
30:28
this information
30:29
and then you need to be able to
30:30
collaborate this information
30:32
with a team of an unspecified amount of
30:35
analysts
30:35
and or other legal people that will be
30:38
looking at stuff
30:39
and you need to be able to provide the
30:42
leadership
30:43
of a tactical operation you need to be
30:46
able to provide them what's called a
30:47
‘Cops’ a common operational picture
30:50
right so this provides
30:54
people at the top common operational
30:56
picture of all the different assets
30:58
assets can be journalists it could be an
31:01
entire
31:03
news organization it could be a podcast
31:06
it could be just a an individual youtube
31:09
influencer
31:10
it could be anybody like that and you
31:13
would either
31:14
build them from scratch or contract them
31:17
out
31:17
just bring them on line
MILLIE
according to
31:20
Bergy
31:21
the 2012 changes to the Smith month (-MUNDT)
31:23
Modernization act of 2012
31:26
opened the floodgates for domestic iia
31:30
social media influence operations do you
31:33
think that
31:33
some of these smart devices were created
31:36
in order to gain access to the public
31:40
by the military-industrial complex
PATRICK
i
31:43
know that the iphone
31:44
really was released within this if not
31:47
the same month
31:48
of the iia policy letter right
31:52
i know uh for a fact and you can easily
31:56
look it up that the smith month (-MUNDT) act
31:58
uh modernization act was modified to
32:01
allow
32:02
for the influence dissemination of
32:06
propaganda to americans which had
32:09
previously been restricted or prevented
32:12
by the smith month (-MUNDT0 act in the late 40s
32:14
when it was put in place
32:15
when they modernized that they took away
32:18
those protections
32:20
allowing it to adapt for social media
32:23
and then within a
32:24
few months or just a very short period
32:26
of time
32:28
they came out with the obama phone
WOMAN ON TV
32:30
everybody in cleveland low minority got
32:32
obama's phone
32:33
people bumming president you know he
32:36
gave us a phone
32:37
NEWSREADERS
free cell phones to low income families
32:40
tracfone has just started a program here
32:42
in the volunteer state called
32:43
safe link wireless more than 800 000
32:46
families here in tennessee
32:48
qualify for these phones the company
32:49
says this program is about providing a
32:51
safe link for families
32:52
no matter what their level of income is
32:55
PATRICK
very short time after that
32:57
they added free unlimited data plans to
33:00
them
33:00
MILLIE
he also suggested that the contiguous
33:03
release of the obama phone
33:05
with an unlimited data plan played a
33:08
significant role
33:10
in fostering the ferguson riots using
33:13
iaa
33:14
[Applause] PROTESTR CLIP SAYING ‘BURN THE BITCH DOWN’
33:20
MILLIW
so why do you think they were targeting
33:21
them for collection
33:23
(What) purposes
PATRICK
is though the the think of
33:26
what you could do
33:27
Right, think of how easily you could
33:31
start a riot in cleveland if you had the
33:36
data oh my goodness
MILLIE
so you could gather
33:39
that information
33:40
and know how to psychologically target
33:43
them to get them upset
33:45
or you know do you think that they were
33:47
pushing information to them like
33:50
tailoring their viewpoint
33:53
on social media
PATRICK i would
and when i like
33:56
i said i i didn't really actually finish
33:58
this earlier but
33:59
i originally um in 2014 i recognized
34:04
uh black lives matter uh
34:07
movement during the michael brown riots
34:10
is being
34:11
influenced by iia the colleague of mine
34:15
in south korea
34:16
did a trace route on it trace routed the
34:20
source of the what i believe to have
34:22
been iia
34:24
to Ukraine. that's funny, right .
34:27
uh so because ukraine just always keeps
34:29
popping up
34:31
and whether or not it was actually the
34:33
shadow net itself
34:35
or it was a competitor like mcchrystal
34:38
right mcchrystal what they accused
34:41
mccrystal of having
34:42
is the exact same thing as what we built
34:44
before him
34:45
maybe it was a competitor. who knows it's
34:48
becoming
34:49
really a boutique market
MILLIE
do you think
34:51
that
34:52
many of these social media companies
34:54
like twitter facebook
34:55
that they were created with iaa
34:58
operations in mind
34:59
and it was never intended to be a free
35:02
speech
35:03
platform i mean what's your take on that
PATARICK
35:06
in
35:06
our shadownet flyer it has a screenshot
35:10
of
35:12
south american
35:15
social network site that was uh kind of
35:18
like the predecessor for myspace owned
35:20
by google
35:22
and i believe the name was irkut
35:25
and you can actually look on our flyer
35:27
and see a screenshot from that
35:29
which looks like an active engagement
35:31
from south america
35:32
now if you look up what happened to
35:35
irkut
35:36
what was really google's first attempt
35:38
pre
35:39
myspace you'll see that it was largely
35:41
shut down
35:42
and largely contributed to an
35:45
overwhelming use of fake personas
35:47
right what was one of the reasons that
35:49
they attributed to myspace shutting down
35:51
last year
35:52
rampant fake personas at the same time
35:55
i'm developing these flyers
35:58
for a company that doesn't have a sales
36:00
staff they only have a product
36:02
at the same time i'm doing that our
36:05
number one
36:06
partner for a company that doesn't have
36:08
a product
36:09
that is only sales people are
36:13
working john mccain's campaign .
36:17
VIDEO VOICEOVER
too risky
PATRICK
doing micro-targeted social
36:19
media for john mccain's campaign
JOHN MCCAIN’S VOICEOVER
(I’M )john
36:21
mccain
36:21
and i approve this message
MILLIE
you were
36:24
speaking on
36:26
news pundits and how many of the news
36:28
pundits are
36:29
ia assets and intelligence assets so
36:32
tell us more about that
PATRICK
mika brzezinski
36:36
her father is you know the father of
36:38
influence operations
36:40
and psychological warfare
NEWSREADER
a towering
36:42
figure in american foreign policy an
36:44
extended member of the nbc news family
36:47
as well zabig nav
36:48
brzezinski jimmy carter's national
36:50
security advisor
PATRICK
36:51
jillian turner fox news host was also
36:53
vice president
36:55
of jones group international doing an
36:57
interview
36:58
with her old boss and
37:01
my old boss now why would i assume that
37:03
they would be using anything other than
37:05
the shadow net because
37:07
the owner of the shatternet has so many
37:09
key assets why would he need to go to
37:11
anybody else right so they get their
37:13
talking points from the analysts that
37:14
are putting it together
37:16
but then they disseminate those talking
37:18
points through non-attribution
37:21
to their assets throughout these news
37:24
organizations
37:26
utilizing an application like the shadow
37:28
net
37:29
jillian turner has a direct connection
37:32
to atlantic council general jones was
37:34
the chairman of the board of the
37:36
atlantic council jgi
37:38
jones group international is an oil
37:40
lobby
37:41
atlanta council and brisma (BURISMA) has a
37:43
relationship brisbane is
37:44
an energy company obviously they have
37:47
these connections
37:48
MILLIE
this would explain why fox news focuses
37:50
mostly
37:51
on the biden ukraine scandal never
37:54
mentioning
37:55
jones's connections nor the atlantic
37:58
council
37:59
trump focusing on ukraine isn't just
38:01
about biden
38:03
it's about jones, hayden, brennan ,
38:06
Mcchrystal,
38:07
the state department, usaid, and
38:10
corrupt inspector generals. with
38:12
everything in place and after being in
38:14
control
38:15
of the office of the presidency for
38:17
decades
38:18
the military-industrial complex had
38:21
confidence they could take
38:22
trump out as a candidate or even
38:26
as president . has iia been used against
38:29
president trump
38:30
Absolutely. through the russian dossier
38:35
there are so many people former
38:37
colleagues of mine
38:39
uh directly connected to the shadownet
38:42
john mccain and lindsey graham one of
38:45
the last two people to have their hands
38:47
on the russian dossier before it was
38:48
handed off to buzzfeed
38:50
as part of the dissemination process
38:53
NEWSREADER
told the president
38:54
it was not john mccain i know because
38:57
john mccain showed me the dossier
PATRICK
it was
39:00
built it was a product it was used as a
39:02
weapon
39:03
as part of an influence operation it was
39:06
fake information
39:07
put into it to help
39:10
create chaos and to influence an
39:13
election
39:14
bottom line right but
39:16
[Music]
39:17
those people that were directly involved
39:19
with that were also directly
39:21
involved with the shadow net
MILLIE
so
39:25
you have knowledge of them using
39:27
military-grade
39:29
psychological warfare weapons
39:32
on the president of the united states
39:36
TORE
done by the closest people around him
39:38
too
PATRICK
as
39:40
trump's election unfolded and as
39:43
all of the russia collusion and all
39:45
these things started happening and
39:47
and becoming exposed revealed to me
39:51
it was to keep from exposing
39:54
the stuff they've been doing over here
39:56
which i believe
39:57
includes the maidan massacre in ukraine
MILLIE
40:00
where did the dossier come from
40:02
TORE
nelly orr testified it came from ukraine
40:06
where's all the money laundering and
40:09
crazy
40:10
iias we see going on ukraine
40:14
PATRICK
so manafort's being accused of social
40:17
media influence operations in ukraine in
40:19
2010
40:20
world courts charged him with that
40:23
TORE
ukraine was the epicenter of
40:25
everything like everything and that's
40:28
because
40:29
we had maimed that nation and made them
40:32
deal (KNEEL) to us barack hussein obama did it
40:35
you know we deployed troops national
40:37
guard of course
40:39
and what states are the ones that work
40:40
with ukraine it would be california and
40:42
new york
40:43
so we deployed troops there because you
40:45
know they weren't listening
40:47
it's like why would you want to stay
40:49
independent and hang out with the
40:51
russians when you can be with us the
40:52
americans and the europeans
40:54
and they were really upset that they
40:56
weren't willing to commit
40:58
to receive debt from the eu and ignore
41:01
russia
41:01
which they had been attached to for eons
41:05
so we went in there and destroyed them
41:07
that's how
41:08
hunter biden got his job that's how we
41:11
weaseled our
41:12
way in there we got a hold of corrupt
41:14
people we said we'll help you out with
41:16
your lawsuits
41:17
you get us in there. we wrote bills we
41:19
sent the money so we can
41:21
‘help them’ conduct elections
41:25
we did everything there
MILLIE
the obama aid
41:28
package in ukraine
41:29
which corresponds with joe biden's
41:31
billion dollar loan guarantee
41:33
scandal is the same aid package where
41:36
seidl (SCYTL) got a field office in kiev
41:39
to provide election training and
41:41
election management
41:43
for the ukrainian election commission
41:46
seidl is one of the most notoreous
41:48
outsourced companies for elections with
41:50
regular electronic voting machine
41:52
problems
41:53
who also tabulate our election results
41:56
in cloud services
41:58
in europe aka servers outside the united
42:01
states .
42:02
a whistleblower leaked to me in 2019
42:06
internal documents from seidl that
42:08
appeared to show
42:09
meddling in the kentucky election
42:12
PATRICK
atlantic council
42:13
has been deciding america's policies for
42:16
decades now
42:18
and look at what a panic they were in
42:20
when
42:21
trump made that phone call to ukraine
42:24
they went into absolute
42:25
panic mode 75 percent of the people
42:28
testifying
42:29
were all directly connected to general
42:32
jones
42:33
mccain and an atlantic council
42:36
TORE
the now ig of the nsa
42:39
literally with his wife created the
42:41
national anti-corruption bureau
42:44
in the ukraine in 2009
42:47
they created it
NEWSREADER
robert storch is
42:50
the deputy head of the u.s inspector
42:53
general's office
ROBERT STORCH
42:59
i recognize how important this task is
43:03
for naboo and for the effort to address
43:06
corruption
43:07
there in ukraine
MILLIE
september 30th 2016
43:11
obama knows that within 30 days if the
43:14
nsa
43:15
can't fix the over collection problem by
43:17
either
43:18
dumping data or justifying having it the
43:21
fisa court will order
43:23
the ig of the nsa to investigate
43:26
so what does obama do he writes an
43:29
executive order
43:30
that makes the ig of the nsa a
43:33
presidential
43:33
appointment rather than an appointment
43:36
by the director of the nsa
43:38
november 30th 2016 obama nominates
43:42
robert storch who was working as deputy
43:45
ig
43:46
of the doj under horowitz at the same
43:48
time
43:49
ROB STORCH
i'm rob storch and i'm honored to serve
43:52
as the inspector general at the national
43:54
security agency
MILLIE
during the transition
43:56
period
43:57
from the obama administration into the
44:00
trump administration
44:01
storch appears to never have actually
44:04
been confirmed
44:05
by the trump administration
TORE
how did this
44:08
guy get confirmed ?
44:11
not one person asked hey have you ever
44:13
worked for i mean a couple months before
44:15
they even had the hearing
44:16
to see if he's going to be confirmed or
44:18
not nobody asked him
44:20
hey did you by any chance get an offer
44:22
from the president of ukraine
44:24
to work for them? it was all over the
44:26
media but not one person asked
44:29
you know who else helped them set it up
44:30
bill taylor and george kent those two
44:32
clowns
44:33
also testified against the president one
44:35
of them has supersonic hearing
44:36
they could hear phones that are not on
44:38
speakerphone
44:40
from across the room so that's odd
MILLIE
44:43
according to TORE the alleged
44:46
impeachment whistleblower
44:47
was actually a wiretap hence supersonic
44:51
hearing capabilities
44:53
eric sieramella (SIC) was a decoy to hide the
44:56
fact that the president was being
44:58
wiretapped through a 702 data over
45:02
collection problem connected to the
45:04
sunset clause
45:06
collection problem that the nsa
45:08
inspector general robert storch
45:10
Oversaw
TORE
the question is what has been
45:13
the senate intelligence committee all
45:16
complacent
45:17
every single one of them because it's
45:19
their job to be our voice and ask those
45:21
questions
45:22
so i mean i guess they're in on it
MILLIE
so i
45:25
guess the question is
45:26
are they all just that inept or
45:30
is there something else going on. section
45:33
702
45:33
of the fisa amendment act of 2008
45:36
was created to stop illegal surveillance
45:39
through data collection .
45:41
it ends up being used as cover providing
45:44
the intelligence
45:45
agencies front-facing legal access to
45:49
unauthorized data while turning a blind
45:52
eye
45:53
to private contractors having backdoor
45:55
access
45:56
to all data.
TORE
i had access
46:01
through the administrative side platform
46:03
because i was one of the first
46:05
on it to be able to
46:09
see all communications between
46:13
people like adam Schiff, brennan,
46:16
feinstein's staffers
46:19
and general jones and many more that i
46:23
don't want to say because i haven't
46:24
publicized that yet
46:25
actually because there's foreign people
46:27
that i did see communications of
46:30
former gchq had hannigan
46:34
robert hannigan was part of the company
46:35
at gsg right so i gave most of this
46:38
information to
46:39
millie weaver and she put out a report
46:42
and
46:43
even though i had legal access to all
46:45
their communications
46:47
because i had my username and password
46:50
the minute she did that report
46:52
within just i believe almost
46:54
instantaneously
46:55
the website was taken down and my access
46:58
was revoked they changed it
46:59
well it wasn't revoked they just uphold
47:01
the whole server
47:03
it was done it was finished they made it
47:05
toast
47:06
i mean that's what they do but nothing
47:08
ever really dies really
47:10
because the way they use their servers
47:11
is by torrents so
47:14
all their information is hidden
47:15
somewhere across the planet
47:18
maybe we should look at some old
47:19
articles that i put out on hurricane
47:21
electric
47:22
to find those servers and those little
47:24
bits and
47:25
seed them correctly so i mean you'd be
47:29
able to seed it with something like a
47:31
keystone
47:32
keystone (IMAGE POSTITNOTE KEI STONE)
47:36
MILLIE
i want to ask you about john brennan and
47:39
the black male (BLACKMAIL)
47:41
so who all did he have
47:44
blackmail collected on any politicians
47:50
TORE
you mean that i've seen
MILLIE
yes
47:56
TORE - UMHMM
a lot of people yes
MILLIE
and politicians
48:01
TORE
yes
MILLIE
so would you say
48:05
there's any uh side more democrats or
48:08
more republican or is it kind of even
48:11
TORE
very even steven okay so
48:15
once this blackmail was collected on
48:18
politicians
48:20
what did they do with it
TORE
even pelosi
48:22
doesn't know that what they have on her
48:25
neither just blumenthal nobody
48:29
i can keep going down
MILLIE
but do they know
48:32
that these people have blackmail on them
48:34
only if they've butted heads okay so we
48:37
saw a budding (BUTTING) of heads
48:38
between murkowski was it and um
48:42
feinstein right that's a budding of
48:46
heads
48:47
that's where it's like hey we got this
48:50
you know where she put her up against
48:51
the wall
48:52
happens all the time
MILLIE
now you know how
48:55
our government has been compromised
48:57
24 7 surveillance mixed with blackmail
49:01
what's the significance of cambridge
49:03
analytica being attached to trump's
49:05
campaign
49:06
PATRICK
everything that i saw with
49:10
the description of like how the
49:12
cambridge analytica functioned
49:14
what they did their app the computer
49:16
applications
49:17
everything that i saw with that
49:23
i would describe as a you know just a
49:26
a later iteration of the shadow net
MILLIE
was
49:29
cambridge analytica to your knowledge in
49:31
iaa
49:31
operation
TORE
yes it was and i
49:35
believe that it was so blatant because
49:38
it was
49:38
piloted at the same time that the rnc
49:41
and the dnc were hacked
49:43
it was all formulated correctly
CLIP FROM THE GREAT HACK DOC
i have
49:45 MAN
said to you it's all coming out
49:47
and the question is how
BRITTANY KAISER
i didn't inspire
49:50
like hillary's emails and i have nothing
49:53
to do with russia so
MAN
yes
49:57
BRITTANY
the fact is
50:00
it looks like i did both if i wasn't me
50:04
i would say yes that's what it looks
50:05
Like.
50:08
i was part of the team running obama's
50:10
50:12
we invented the way social media is used
50:15
to communicate with voters
50:19
TORE
this is how they were going to do it you
50:21
know they were supposed to go in
50:22
they were supposed to sway him because
50:24
they were supposed to give up the
50:26
goods to match the russia hack
50:29
MILLIE
why would they be running an ia
50:31
operation
50:32
that would be helping trump win because
50:35
that doesn't make sense when we
50:36
know that general jones is a democrat
50:39
and many of these people
50:40
don't like trump so what gives
TORE
50:44
well because then we just make it look
50:46
like russia was running the cambridge
50:47
analytica program too
CLIP FROM DOCUMENTARY
50:49
BRITTANY
and it admits to it right here i am
50:52
headed to washington dc for my testimony
50:56
for
50:57
the mueller investigation i definitely
51:00
didn't think
51:01
that while we're sitting there counting
51:03
votes that
51:05
some of those votes were made by people
51:07
who had
51:10
seen fake news stories paid for
51:13
by russia on their facebook page
51:16
TORE
so not only did they hack the dnc and
51:20
the rnc
51:20
but nobody talks about that right
51:22
because we're only supposed to focus
51:24
that russia was hacking
51:25
just the dnc not the rnc we keep
51:27
forgetting about that
51:28
because it was just information brennan
51:30
was getting they wanted to get access to
51:32
servers that's the way it goes anyway
51:34
cambridge analytica at the same time
51:36
would be supposedly helping president
51:38
trump win
51:39
and the russia collusion hoax would have
51:42
stuck better
51:43
because behind all those llc's and the
51:46
glitz and glamour they would have had
51:48
some statue of vladimir putin in a tutu
51:51
waiting for you
BRITTANY
yeah i
51:54
[Music]
51:55
worked at cambridge analytica while they
51:58
had facebook data sets
52:00
went to russia one time while i worked
52:03
for cambridge i visited julian assange
52:05
while i worked for cambridge
52:07
pitched the trump campaign and wrote the
52:09
first contract
BRITTANY’S TESTIMONY
52:10
i have an email from one of our senior
52:13
data scientists
52:14
that said that we were actually using
52:17
facebook-like data in our model
52:18
the methodology was considered a weapon
52:22
um weapons great communications tactics
52:24
READING A TEXT
well done brett (BRIT)
52:26
looked quite tough and you did okay with
52:29
a winky face little emoji when
RACHEL MADDOW
we found
52:32
out
52:32
that cambridge analytica reached out to
52:34
wikileaks and said hey can we help
52:37
what that means is we've got a russian
52:40
intelligence operation underway to
52:42
illegally influence the u.s election in
52:45
trump's favor
52:46
and we've got the data firm paid by the
52:49
trump campaign
52:50
offering operational help to that effort
52:53
INTERVIE
INTERVIEWER
are there any ties between mr trump you
52:56
or your campaign
52:57
and putin and his regime
MANAFORT
no there are
53:00
not
53:00
it's absurd and you know there's no base
53:03
to it
53:03
MILLIE
cambridge analytica was used to create
53:06
the appearance
53:07
that russia conducted influence
53:09
operations
53:10
to help trump win the 2016 election
53:13
PATRICK
stone
53:14
manafort davis mccain jones all of these
53:18
people
53:19
have been doing this for to my knowledge
53:23
a decade of my personal fact witness
53:27
knowledge
53:28
they've been doing this for a decade
53:30
prior to trump even running for office
53:32
i met with roger stone we were at his
53:34
table
53:35
at a speaking engagement that he did in
53:37
clearwater florida
53:38
and i asked roger stone at that time
53:41
are you you know did you work with do
53:44
you know jim jones
53:45
did you work with dynology and he
53:47
acknowledged his
53:48
relationship and his yeah sure i did ask
53:52
i asked him flat out i said
53:55
did you use the shadow net he did you
53:58
know about it he's like
53:59
‘No’
MILLIE
stone leaving the trump campaign
54:02
early on
54:03
suggests candidate trump didn't want his
54:05
campaign tied to stone's influence
54:07
operations
54:09
ROGER STONE
we really pioneered negative campaign
54:11
advertising
MILLIE
54:13
stone does have a reputation for
54:15
political
54:16
dirty tricks and influence operations
54:19
ROGER STONE
i revel in your hatred because if i
54:22
weren't effective
54:23
you wouldn't hate me
TORE
manafort and roger
54:27
stone go way back
54:28
like from the 80s you know like come on
54:31
these people have been through
54:33
everything together
54:34
and you know this is why they targeted
54:38
them
54:39
and this is why they went on manafort
54:41
for things that were like ancient it's
54:42
like man no
54:43
not even a statute of limitation not
54:45
anything come on man seriously
54:48
nope
PATRICK
sci (PSY) group and wiki strats
54:50
absolutely connected to
54:52
the shadow net through the owners of the
54:55
shadow net through the fact that
54:57
the psy group through
55:00
paul manafort submitted a proposal
55:04
to trump campaign now trump's campaign
55:06
rejected the proposal
55:08
i love that man right that's why i keep
55:10
voting for him
55:11
because even when he's given the
55:13
opportunity
55:14
to do that he rejected it
MILLIE
the trump
55:17
campaign
55:18
must have known the dems would try to
55:20
use anything against them
55:22
trump must have sensed that the offer
55:24
for influence operations
55:25
was a honey trap to set him up. well do
55:28
you think that the reason they attached
55:31
manafort to trump's campaign because
55:33
that was kind of later
55:34
right attached them onto there do you
55:36
think it's because they were trying to
55:38
frame up trump ?
55:39
TORE
yes because they failed with their iia
55:41
attempt
55:42
PATRICK
yeah i definitely would say that
55:44
manafort was an asset
55:47
whether or not he fully understood what
55:51
his role was
55:52
you know he might they might have lied
55:54
to him about what is true
55:56
what their true intentions were i
55:58
believe they fully intended
56:00
to throw him under the bus because two
56:02
things had to happen
56:04
they could not let hillary win and they
56:07
could not
56:07
let trump keep his seat right
56:11
so they were trying to kill two birds
56:13
with one stone
56:14
using manafort to make sure that hillary
56:17
doesn't win
56:19
through iia through wikistrat through
56:22
his connections there
56:24
and then those same people turning
56:26
around
56:27
throwing him under the bus by somebody
56:29
who had previously worked with
56:31
manafort and understood what he had been
56:33
doing and what he was doing and used
56:35
that
56:36
to exploit him as a way to hurt trump
56:39
TORE
since their whole attempt to have him
56:43
employ a company to help him win and use
56:46
these psychological operations that the
56:47
left was using i mean they're doing it
56:49
we should do it
56:50
and he didn't and that's in the mueller
56:52
report that's in the new york times
56:55
there are several instances where he's
56:57
rejected
56:58
the opportunity to take advantage of
57:01
influence
57:02
of of influence operations be it iia
57:05
supported or just your standard
57:08
run-of-the-mill influence operations
57:10
right
57:11
they've rejected that
TORE
and the thing is
57:13
people like
57:14
roger stone aren't saints
57:18
but they're not demons either they skirt
57:20
the outs
57:22
and they're great at what they do and
57:24
you know you either love him or not it's
57:26
like brie cheese
57:27
but the one thing that you can be sure
57:29
of is that he sticks to his principles
57:31
and if he's your friend especially if
57:33
he's been your friend for 40 years
57:35
like he was with president trump there's
57:37
no way he's going to flip on you
57:39
to save his butt ever
57:42
because that's what honest people do
57:45
MILLIE
yeah he seems to know how the games and
57:47
the swamp are played
57:48
oh yeah so i mean he knows how they
57:50
operate
TORE
it (HE) was actually framed by people
57:52
that he work(ED) with i mean that software
57:55
was created you know by his friend
57:58
that created the magic wheel software
58:01
like implemented shadow net for the
58:02 courts so they can like
58:04
‘Randomly have such specified
58:08
you know out of millions of people that
58:10
were in the pool
58:11
they were all like intelligence
58:13
contractors and never trumpers come on
58:16
MILLIE
so why wouldn't they just focus their
58:18
efforts on running iaa operations to get
58:21
hillary in office
TORE
58:22
oh they did are you kidding they
58:25
deployed everything
58:26
from censoring shadow banning
58:29
to dismissals to full-blown mockingbirds
58:33
i mean that's where we saw the real
58:35
face of the press that is exactly where
58:37
we saw it
58:39
you know
HILLARY CLINTON
i want all of you to know that
58:42
that's true not only
58:44
for the campaign but if i am fortunate
58:47
enough to be
58:49
your president i want you to know and i
58:50
want you to tell
58:52
anybody you know any friends or
58:54
colleagues at school
58:55
or work or your neighborhood whether you
58:58
vote for me
58:59
or vote against me
59:05
TORE
the polls 98% chance hillary clinton wins
59:08
like
59:09
what
MILLIE
yeah
TORE i mean what
MILLIE
those were bogus
59:12
TORE
uh everything that was an iia that was
59:14
hijacking reality to think
59:16
she's already won so obviously she's the
59:18
best all the
59:20
superstars coming out how she's amazing
59:22
all these concerts
59:23
and all to divert you away from the fact
59:25
that she couldn't walk
59:26
talk climb stairs say a word without
59:29
checking (CHOKING)up
59:32
MILLIE AT CAMPAIGN EVENT
hillary clinton is on stage right now as
59:34
we speak
59:35
and she is coughing non-stop did she
59:38
like chuck up a lung or something that
59:39
one day(TIME)
MILLIE
yeah
TORE
that was super weird
59:42
PATRICK
there is a a definitely some context
59:46
that needs to be understood
59:47
in the relationship between general
59:49
Jones, obama
59:50
and hillary Clinton. general jones was
59:54
originally
59:54
offered by obama the position of
59:58
secretary of state. he accepted his fam
60:01
talked to his family he accepted and
60:03
then two days later without even telling
60:05
him
60:06
which was kind of a jerk move to do um
60:09
obama turned around and tapped hillary
60:11
clinton
60:12
and i know that jones jim jones
60:16
told me that his dad was really offended
60:18
by that
60:19
and then he was offered and accepted
60:22
the role the position of national
60:24
security advisor
60:25
but actually considered turning it down
60:27
because he was so offended by what it
60:29
was so upset by what had happened
60:31
MILLIE
what would be the point of
60:34
like making hillary out of the equation
60:37
to then get trump in to then
60:39
want to just impeach him
PATRICK
well because
60:43
he wasn't their choice these people hate
60:45
Trump
LINDSAY GRAHAM
he's a jackass
60:47
PATRICK
so we're talking about at the time you
60:49
know
MILLIE
that would just make
60:50
pence in charge
PATRICK
well which pence do you
60:53
think john mccain would have rather had
60:55
pence in charge
60:56
i think lindsey graham would rather have
60:58
pence ? lindsey graham was so frustrated
61:00
with trump
61:01
trump he took his phone and smashed it
61:04
on youtube
61:05
because trump gave out his phone number
61:07
trump drove that man
61:08
crazy
MILLIE
trump got in the way of the big
61:11
game
61:12
a contest between contractors and
61:14
subcontractors
61:16
over who gets first dibs on defense
61:19
security and tech contracts .
61:22
TORE INTERVIE WITH R. STONE
mueller since uh i think it was like
61:25
august of 2016
61:26
was well aware that i had in my
61:29
possessions
61:30
portions of the dnc mirrored server in
61:33
february and march did you know that ?
61:35
ROGER STONE
are you not (I DID NOT)
TORE
and when my private life was
61:39
collapsing the same exact day not
61:41
without a minute of separation
61:43
i was served by barack hussein obama's
61:46
attorney
61:47
three years later to come and talk about
61:50
it did you know that?
R.STONE
i did not know that
61:52
either
TORE
they went as hard as they could .
61:54
stone ,the same thing. they went with
61:56
Nothing. like look ,mueller called him in
61:59
right for these emails and talking about
62:01
wikileaks
62:03
when i had actual portions of the dancer (DNC SERVER)
62:06
like even mueller knew i had it
PATRICK
why did
62:09
mueller never call me back
62:11
when i went to him and told him about
62:12
all this information and spoke to HIM
62:14
15 minutes. every one of these people are
62:16
so corrupt
62:17
it's not even funny
TORE
the swamp already
62:19
knew in august of 2016
62:22
that the information was compromised by
62:24
people
62:26
and they knew what type of people had
62:28
accessed that information
62:30
but they didn't know who
PATRICK
some people
62:32
will say well maybe they're
62:33
investigating and
62:34
how can you investigate it if you don't
62:36
ever call me back
62:38
and you don't ever really because
62:39
there's a lot of things that i need to
62:41
be able to explain to them that i can't
62:43
say
62:43
outside of a classified environment so
62:46
they're not even if they are
62:47
investigating it they certainly aren't
62:49
doing it with all the information
62:51
TORE
stop stop stop
62:55
we all know it was a fix
MILLIE
did the doj
62:58
outsource the mueller investigation to
63:01
cgi ?
63:03
TORE
well yes they did so i'll tell you what
63:05
happened so i actually
63:07
uh for my listeners on air i interviewed
63:10
former attorney
63:11
acting attorney general Whitaker.
i want
63:13
to ask you something you were chief of
63:14
staff for um
63:16
jeff sessions so there's obviously
63:18
contracts that are signed like you know
63:20
how you hire vendors
63:21
i wanted to know why during the mueller
63:23
probe
63:24
we spent over 40 million dollars in
63:27
waste management
63:29
to a canadian company that works with
63:32
canadian intelligence
63:34
yeah sounds like paper shredding on that
63:36
so that's
MATT WHITAKER yeah yeah
63:37
that's it all there's there's you know
63:39
this is the thing we we need
63:41
watchdogs and something i did before i
63:43
came to washington dc was run
63:44
a watchdog group that asked these types
63:47
of questions and to make sure that
63:49
that like you know kind of there's not
63:51
um
63:52
you know waste broad (FRAUD) abuse
TORE
so why is our
63:54
department of justice
63:56
outsourcing to canadian intelligence
63:59
companies
64:00
access to the mueller investigation ?
MILLIE
that
64:03
definitely seems improper
64:04
now this canadian company
64:08
how much were they paying and were they
64:09
paying them with tax dollars ?
TORE
64:11
we have to ask ourselves why would we
64:14
use
64:14
federal tax dollars and upwards of 40
64:17
million
64:19
to have them do paper shredding for
64:20
mueller and administrative tasks and
64:24
emptying garbage cans that sounds like a
64:27
leaking opportunity .
64:28
that sounds like why are we getting
64:30
foreign nationals involved in an
64:32
investigation
64:33
that we're supposedly investigating the
64:35
president the sitting president of the
64:37
united states
64:38
MILLIE
from cgi's involvement in the passport
64:40
fiasco in 2008
64:42
to cgi involved in the mueller
64:44
investigation
64:46
we see how contractors have the ability
64:48
to both perform
64:50
and clean up their own dirty work
TORE
i
64:52
think it's about time people understand
64:54
what happened and i made it no secret
64:57
that i know what happened
65:00
so seth rich worked for the dnc
65:03
he was asked just like i he was asked
65:07
hey why don't you go image the dnc
65:09
server right there since you're there
65:11
for us
65:11
so we can keep it safe and he did so
65:15
and he uploaded it where he was told so
65:17
he uploaded it where he was supposed to
65:20
and there were a lot of me's that saw it
65:22
bees (ME’S) meaning
65:23
group of friends that i have where we
65:25
sit and talk string theory and
65:26
predictive analytics
65:28
on the internet (UNDERNET) so we find this and it's
65:33
like
65:33
whoa treasure trove copied
65:36
and we fractioned it so that way we can
65:39
download it because it was
65:40
so massive and
65:44
that's what happened so i'll tell you
65:45
what happened to seth ridge (RICH)
65:47
so he did his job as he was asked at the
65:50
same time the rnc was also hacked
65:53
again brennan mo. let's hack and the hack
65:56
was done on purpose so you can
65:58
delete information insert information
66:00
and of course
66:01
with them putting cambridge analytica
66:04
and sending them over to
66:05
president trump which was a trap okay
66:08
that was a trap
66:10
um you clearly can see it
66:13
they hacked the rnc you mean you had
66:16
someone within the gop do it for you
66:19
because no one died there and yes some
66:22
of those emails escaped
66:24
because that is what was considered
66:26
mitigation
66:27
you have to give them something really
66:29
bad and so when he saw that they had
66:31
retroactively changed things the stories
66:34
and the rumors going in
66:35
seeing the bernie sanders elections were
66:37
being stolen
66:39
the dnc was all about hillary not about
66:41
real elections
66:43
that it was all rigged he came in
66:46
contact with a guy named sean lucas
SHAWN LUCAS
but
66:48
we did make contact with somebody from
66:50
the democratic national committee's
66:51
office
66:52
and they've been served. democracy has
66:55
prevailed today
66:56
TORE
so they decided oh yeah maybe we can get
66:59
it out to someone else
67:01
and it was not to julian assange direct
67:05
and both of those guys are dead
NEWSREADER
but in a
67:08
bizarre twist of events
67:09
on august 2nd less than one month after
67:12
serving the subpoena
67:13
lucas was reported dead
TORE
hillary's emails
67:16
were still being examined
67:18
they had to get rid of the evidence and
67:20
the only way that they can access the
67:22
whole dnc server
67:23
is if there was a breach and that's how
67:26
you can go in
67:27
and change things this is why the fbi
67:29
never asked for the server
67:31
that's the real story so as seth rich
67:33
thought
67:34
that what he was doing was correct
67:37
later on he realized it was not. that's
67:39
why there was such a big gap they didn't
67:41
need to
67:41
find him. they needed to find out who
67:45
had it and they already knew that i
67:48
myself had portions of the dnc
67:50
server and others in
67:53
march and February. obama's lawyer
67:56
for seth rich three years later says you
67:58
need to come and tell us about seth rich
68:00
i was like i don't need to do anything
68:02
i don't know who you're trying to you're
68:04
being subpoenaed i can't bring you
68:06
anything because you're three years too
68:07
late
68:08
and for the record usually they're going
68:11
to be three minutes too late
68:12
you know hillary doesn't have a patent
68:14
on hammers
68:17
or city dumps or bleach bit or
68:20
or you know
MILLIE
didn't crowdstrike initially
68:24
investigate the dnc server
68:27
creating the whole russia hacked the
68:29
election
68:30
scenario
DMITRI ALPEROVITCH
when the dnc hired us back in
68:33
may
68:34
we actually came in deployed our
68:35
technology called falcon on all the
68:37
systems inside that corporate network
68:38
WOLF BLITZER
(WHO) were these
68:39
people that were actually doing the
68:40
hacking of the dnc
DMITRI
there were two groups
68:42
two independently working group that we
68:44
associate with russian intelligence
68:45
agencies
68:46
one of them was associated with gru the
68:48
primary military intelligence agency in
68:50
russia (X WITH BUZZER OVER END OF CLIP)
PATRICK
68:51
crowdstrike owned by that alprovich guy
68:56
who is a senior advisor on the atlanta
68:58
council
68:59
when president trump called up the
69:01
ukrainian president
69:03
what did he ask him for the the the
69:05
crowd strike
69:06
servers right again all
69:10
immediate direct colleagues like the
69:12
brown bag
69:13
lunch at this big you know
69:16
star chamber that you can imagine
69:19
existing there
69:21
DR STRANGELOVE CLIP
i'm sorry mr president
PATRICK
they're all there
69:24
yeah just like
69:24
what can we do orange man bad what is
69:28
just statistical odds of that six
69:30
degrees of kevin bacon existing
69:32
on virtually everybody connected to the
69:34
russian dossier and the impeachment
69:37
the only other person that directly
69:39
connected to both of them is president
69:41
trump and he's on the receiving end of
69:43
it
69:44
but yet you never hear this man's name
69:47
MILLIE
general
69:48
jones that's the guy that heads up clear
69:50
for us that's the guy that
69:51
took shadow net and made it what it is
69:53
that's the guy that
69:55
resold reinvented shadow knit to create
69:58
the magic wheel at the dc courts to make
69:59
sure that they get the most compromised
70:02
juries you know put together for anyone
70:05
that they didn't want
70:06
PATRICK
when general jones was tapped as
70:10
the chairman of the board of atlanta
70:13
council
70:14
by to replace huntsman jon huntsman
70:17
one of the first orders of business that
70:21
uh he did with the atlantic council
70:24
was to create a partnership with
70:27
facebook right that happened
70:31
a month after mark zuckerberg sat in
70:34
front of congress
70:35
ZUCKERBERG
yes i mean they they did not want their
70:37
information to be
70:39
sold to cambridge analytica by a
70:41
developer and
70:42
and that happened and it happened on our
70:45
watch
70:46
so even though we didn't do it i think
70:48
we have a responsibility to be able to
70:50
prevent that and be able to take action
70:51
sooner
70:52
PATRICK
so as a month after
70:55
they do that facebook partners
70:59
with general jones at the atlanta
71:01
council
71:02
to restore election integrity worldwide
71:06
right so the best out of seven billion
71:10
people on the planet
71:11
mark zuckerberg picks the owner of the
71:13
shadow net ?
MILLIE?
71:14
president donald trump and mike pence
71:17
both ran
71:18
ads on facebook that uh
71:21
included a symbol of an upside down red
71:24
triangle
71:25
facebook today removed the ads
NEWSREADER
71:28
has taken action against what it calls
71:30
harmful misinformation from president
71:32
trump the company deleted a post by the
71:34
president that included a false
71:36
statement
71:37
PATRICK
to restore election integrity worldwide
71:40
we all know that he was connected
71:43
directly connected to cambridge
71:44
analytica through scigroup
71:45
and wikistrat so essentially what they
71:48
did was they partnered with cambridge
71:50
analytica again
71:51
MILLIE
this also explains why facebook went to
71:54
atlantic council
71:55
aka jones to fix the cambridge analytica
72:00
problem they needed to cover their iia
72:03
tracks .
what you've seen with the recent
72:06
riots surrounding george floyd's death
72:09
from your perspective does that look
72:11
like an iaa
72:13
Operation?
PATRICK
Absolutely. nothing feels
72:16
natural about what's going on
72:18
more stuff is fake and fabricated right
72:21
now
72:22
in the news than what's actually real .
72:25
when i say faker fabricated i i mean
72:28
like
72:29
okay you have the truth and it's being
72:32
represented to you
72:34
with a very specific slant
72:38
it's so far beyond you know a couple
72:42
you know russia making a couple spending
72:45
some money on some facebook ads
72:47
right if you believe that then they've
72:50
already won .
72:51
MILLIE
so that's how it works it's like the
72:53
movie wag the dog quite literally
72:55
TORE
well you know movies tell a lot of
72:57
stories and um
72:59
it's almost it's almost as if they're
73:02
making fun of us
73:04
MILLIE
they made fun of alex jones when he used
73:06
to point
73:07
out all these false flags i mean i guess
73:10
that's just a term he
73:11
was using but if you actually look what
73:14
he
73:14
was pointing out in a lot of instances
73:16
was iia operations
9/11 NEWS CLIPS
73:19
jane what more can you tell us about the
73:21
salomon brothers building and it's
73:23
collapsing and it's collapsing and it's
73:24
collapsed
73:25
as you can see behind me the trade
73:27
center
73:28
appears to be still burning we are
73:30
getting information now that one of the
73:31
other buildings building
73:33
seven in the world trade center complex
73:35
is on fire and
73:37
has either collapsed or is collapsing
73:40
TORE
well but he didn't know the term iia so
73:43
it would be
73:44
easier for people to understand
73:45
someone's hacking your reality because
73:47
now in this day and age of computing
73:49
that makes more sense to people they
73:50
understand it more oh
73:52
hack my reality you mean change the way
73:54
i see things and that is exactly what an
73:57
iia
73:57
is it's just that it's software churning
74:00
out oh you need to do
74:01
this to get this outcome kind of like
74:04
using that shadow net in the dc chords (COURTS)
74:07
and saying oh prosecutor you want him to
74:09
go to jail and you want a guilty ver (DICT)
74:11
well we're going to have to pull (POOL) it out
74:13
and then when a pool of jury people come
74:15
all of them are potential to give you a
74:17
guilty verdict
74:18
so then you pick from all the people
74:20
that will give you a guilty purpose (VERDICT)
74:23
so there's no chance that you'll win and
74:24
even matt whitaker said that on my
74:26
on my show he said the judges are
74:28
corrupt
MILLIE
that's a major
74:30
problem for the justice system if people
74:33
are able to use that technology
74:35
in jury selection to be able to predict
74:38
who's gonna you know throw their vote a
74:40
certain way
74:42
TORE
is anyone stopping them that's a major
74:46
problem right there it is and roger
74:47
stone with this commutation
74:49
will solve it because this is where it
74:52
all comes to the surface
74:53
TORE INTERVIEW
how do you think your jury pool was
74:56
selected ?
ROGER STONE
74:58
well obviously i don't know i do know
75:00
that based on the
75:02
statistics on the district of columbia
75:04
that is that the statistical
75:06
improbability
75:07
of my jury having a single republican
75:10
should be impossible
75:11
the statistical impossibility of my jury
75:14
having a single military veteran
75:16
should be impossible the statistical
75:18
possibility of my jury
75:20
having no jurors with less than a
75:22
college education
75:24
is impossible uh but that was the case
75:28
TORE
well what if i told you roger that your
75:30
jury
75:31
was uh actually selected the jury pulled
75:33
the grander jury pool
75:35
right before the voidier (VOIR DIRE) they say where
75:38
you kind of select and approve and deny
75:39
right
75:40
the the majority of it was actually
75:43
plugged into a program but see this
75:46
program wanted to select
75:48
a jury pool that would get you a guilty
75:51
verdict no matter what. hence
75:54
the odds like you say are so far-fetched
75:57
so the question is
75:58
who was the company who was the vendor
76:01
that was used
76:03
to select your greater pool
76:06
for the jury and if your you know
76:10
lawyer was to able to able to find that
76:12
or
76:13
ask that question i would not be
76:15
surprised if you see the name general
76:17
hayden hop (POP) up
76:18
ROGER STONE
i do think it might strengthen my uh
76:21
the possibility of my appeal it should
76:23
that become
76:24
necessary i will never plead guilty to
76:27
something i didn't do
76:29
it's a matter that does require some
76:32
research and i appreciate you bringing
76:33
it up
76:34
MILLIE
it's amazing it's like minority report
76:37
in real time
PATRICK
76:38
today clear forces kind of like
76:41
what they built the it's it's the next
76:44
iteration of the shadow net
76:46
they took the cycle they took the
76:49
profile
76:50
uh personas and profile capabilities
76:53
they
76:53
added real-time criminal background
76:56
travel
76:57
financial medical added all these things
77:01
in to create
77:02
predictive behavioral profiles that
77:04
determine whether or not you're likely
77:06
to steal or leak
77:08
clear force actually sells this to hr
77:11
right
77:12
so you could actually go into a job
77:14
apply for it
77:15
not get a job because an application
77:19
with an algorithm designed by obama's
77:21
national security advisor
77:22
and or obama's cia director
77:26
determined that you were predictively
77:27
likely to steal or leak in some ‘minority
77:29
report -
77:30
Like’ fashion and you may never
77:33
ever steal or leak but you might lose a
77:35
job because
77:37
something read all your posts and looked
77:39
at your information and determined it
TORE
77:41
think about it if people knew just how
77:45
bad it is
77:46
think about how many things he's
77:48
changing and how much money they're
77:49
taking i mean think of all the money
77:50
they're going to lose in contracting
77:52
he's stopped the clearances remember
77:54
once you're out now we pull your
77:55
clearance he did that remember
77:57
so now all the future generals or all
78:00
the future
78:01
intelligence community persons don't get
78:03
to use their clearance .if you’re out iTs
78:04
finished
78:05
PATRICK
you guys were paying me as taxpayers
78:07
were paying me
78:09
as the information insurance security
78:10
officer to
78:12
protect our national security so y'all
78:15
should want
78:16
to get to the bottom of this as much as
78:18
anybody as much as i do
78:20
but it's very personal to me i won't
78:21
deny that
TORE
when you have your (BLEEPED)trying to
78:26
serp (USURP?)your president by penning in an
78:28
anonymous letter to end
78:29
new york times that's a big problem
MILLIE
this
78:32
is the biggest
78:34
and boldest move towards the ultimate
78:36
surveillance state
78:37
ever made and it's near completion
78:40
micromanaging this technology on a
78:43
global scale would require
78:44
integrating it with artificial
78:46
intelligence imagine
78:48
artificial intelligence autonomously
78:50
operating the shadow net
78:52
and clear force. interpol's 2019
78:54
publication
78:55
artificial intelligence and robotics for
78:57
law enforcement
78:58
reveals we are already there. quote :
79:01
“although films such as minority report
79:03
and robocop may not present the most
79:05
attractive depiction of the future of
79:07
advanced technologies in law enforcement
79:10
understanding how these technologies can
79:12
be applied by law enforcement agencies
79:14
for the safety and security of our
79:16
global community
79:17
is of critical importance”
CLIP OF DRONE keep a safe
79:20
distance of six feet from others
MILLIE
79:22
short from a major pr rollout there is
79:25
an international push for autonomous law
79:27
enforcement to remove the human factor
79:30
several features of the interpol program
79:33
indicate that they are using an
79:34
iteration of shadow net and clear force
79:37
technology
79:38
this march 2017 united states patent
79:41
issued to jim jones iii and clear force
79:44
spells it out quote “systems and methods
79:47
for electronically moniTOREng humans
79:50
to determine potential risk” several
79:53
diagrams in this patent look identical
79:55
to the dashboard
79:56
layout of the shadow net the patent
79:58
mentions integration with u.s
80:01
and international databases local law
80:03
enforcement
80:04
and individual state databases all fed
80:08
into international justice and public
80:10
safety networks
80:12
full integration of all data including
80:14
the internet of things
80:16
is the objective a march 2020 atlantic
80:19
council policy primer
80:21
“ai society and governance” references the
80:24
2019
80:25
interpol publication stating quote “the
80:28
united nations
80:29
inter-regional crime and justice
80:31
research institute and the
80:33
international criminal police
80:34
organization are leading the
80:36
conversation on
80:37
autonomous patrol robots tracking and
80:40
tracing systems ,
80:41
forecasting tools, predictive policing
80:44
and more”
80:45
the next iteration of the shadow net and
80:47
clear force is ready to go
80:49
integration with ai robots and the
80:52
replacement of traditional
80:54
law enforcement is just around the
80:56
corner given that leftist organizations
80:59
managed by momentum which is behind the
81:02
defund the police movement and given
81:04
that momentum has been connected to
81:06
iia operations the case can be made that
81:09
jones and coe are running the defund the
81:12
police influence operation
81:14
simply because they are in a position to
81:16
benefit by offering an alternative
81:19
solution that is already in line with
81:21
the green new deal agenda
81:23
we've already seen some of this rolled
81:25
out with the technocratic response to
81:28
covid19 with autonomous drones contact
81:31
tracing apps
81:32
nanotech vaccines and predictive
81:34
modeling for social distancing and
81:36
economic shutdowns furthermore this
81:39
technology is behind the push for police
81:42 abolition
81:43
defunding law enforcement and replacing
81:45
it with smart justice
81:47
given we have seen iia shadow net
81:49
technology
81:50
implemented by the socialist democrats
81:52
and sunrise movement who are using it to
81:55
push for police abolition
81:57
this political movement is deeply
81:59
connected to the un
82:01
who has partnered with interpol to
82:03
corral us
82:04
into the artificial intelligence and
82:06
robotics for law enforcement
82:08
direction