How a Senate Inquiry Revealed the Israeli Surveillance Industry’s Role in Orchestrating Russiagate
A Senate investigation reveals that a consortium of Israeli hacking and surveillance firms coordinated and facilitated meetings between Trump campaign operatives and Russia during the 2016 campaign, but they don’t really want to talk about it.
Alleged Russian interference in the 2020 presidential election is headline news, once again, as a Ukrainian lawmaker is charged by the Trump administration “in a sweeping plot to sow distrust in the American political process,” reports the Associated Press. Microsoft also made claims that it detected “hacking attempts targeting U.S. political campaigns, parties and consultants” by agents from Russia, China, and Iran. In a September 10 blog post, Microsoft’s Tom Burt, Corporate Vice President of Customer Security & Trust, listed three groups from each region that Microsoft “observed” carrying out their cyber operations.
Rarely in the news, however, is the role played by Israeli cybersecurity startups in the creation of the Russiagate narrative itself. Incubated within the Israeli military apparatus and benefiting from an uninterrupted stream of billions in U.S. taxpayer dollars, these “private Mossads” have been present behind the scenes throughout the numerous Russia-related scandals fomented by the mainstream press to sow partisan discord among the American electorate and line the pockets of network executives.
Evidence of their activities has been exposed – though not pursued – in the latest volume of a U.S. Senate Intelligence Committee investigation on Russian interference in the 2016 presidential election, which shows how then-candidate Donald Trump personally embarked on a parallel campaign on behalf of Israel to block a UN resolution condemning Israeli settlements in the West Bank and East Jerusalem.
Originally submitted by Egypt, UNSCR 2334 strips Israeli settlements beyond the 1967 borders of any “legal validity” in the eyes of the international community and brands them a “flagrant violation under international law.” Russia, a permanent member of the UN Security Council, had refused all of the advances made by Trump’s operatives to use its veto power against the measure, and Trump himself would prevail upon Egyptian President al-Sisi – whom Trump calls his “favorite dictator” – to withdraw the declaration. Together with Israeli pressure, UNSCR 2334 seemed destined to languish in obscurity as Egypt acquiesced and delayed the vote to “permit them to conduct an additional meeting of the Arab League’s foreign ministers to work on the resolution’s wording.”
The Senate’s inquiries uncovered a consistent thread of IDF-linked cybersecurity firms and intelligence assets coordinating and facilitating meetings between the coterie of Russian characters that make up the Russiagate universe and the Trump campaign, including protagonists like Guccifer 2.0, the hacker who released Hilary Clinton’s infamous emails to Wikileaks via a cell phone registered in Israel.
George Birnbaum, a former chief of staff to Benjamin Netanyahu and GOP operative, told the committee how Trump aide Rick Gates had inquired about using “Israeli technology” to collect dirt on opponent Hillary Clinton at a March 2016 meeting, explaining to the senators what would be so attractive about Israeli companies, specifically:
“These guys came out of the military intelligence army unit, and it’s like coming out with a triple Ph.D. from MIT. The amount of knowledge these guys have in terms of cybersecurity, cyber-intelligence… [is] just so beyond what you could get [with] a normal education that it’s just unique … there are hundreds and hundreds of Israeli start-up companies that the founders are guys who came out of this unit.”
The unit Birnbaum is referring to is the IDF’s Unit 8200, where these “hundreds and hundreds” of tech startups are born right in the bowels of the Israeli national security state and propagate throughout the world and the United States, in particular.
Described as “private Mossads” for hire, many of the Israeli hacking and surveillance firms that moved behind the scenes, brokering meetings between Trump’s people and Russian oligarchs like Oleg Deripaska during the height of the so-called Russian “collusion,” were working through a “key middle man” with close ties to then-Trump National Security Adviser, Michael Flynn, who was himself also working in an advisory capacity with the “consortium of cyber-spy companies run by former Israeli intelligence officers” known as the NSO Group, that is comprised of several of the Israeli startups summoned before the committee for voluntary, closed-door testimony.
While the American public was fed one Russophobic scandal after another, and Robert Mueller held court in the press for two years straight, no one – especially Mueller – was paying attention to this perverse network of Israeli surveillance companies who operated the virtual scaffold upon which the Russiagate narrative was being constructed and whose fellow Unit 8200 graduates in other subsectors of the cybersecurity industry are deeply ensconced in highly questionable activities surrounding the coming 2020 election.
The NSO Group
One of the NSO companies questioned by the Senate committee in relation to Russian interference, Psy-Group, is currently under investigation in California, where it was caught red-handed actually trying to rig a local election for a paying customer. Another, Circles, was founded by a former Israeli intelligence officer and is “known for covertly intercepting phone calls, text messages, and tracking locations of unaware citizens,” according to a report by Forensic News. In 2018, Haaretz published an expose on the company disclosing the extent to which Circles and the Israeli espionage industry is helping “world dictators hunt dissidents and gays,” among other nefarious opportunities available in the “global commerce” of surveillance technologies.
The middle man the Senate investigation identified is Walter Soriano; singled out for his association with several Russian oligarchs like Oleg Deripaska and Dmitry Rybolovlev, who bought Trump’s West Palm Beach mansion in 2008. The Senate report accuses Soriano and Israeli cybersecurity companies of coordinating “between the Trump Campaign and Russia,” but fails to pursue the matter beyond that.
The UN resolution denouncing Israeli settlements would pass on December 23, 2016, after four temporary Security Council members, Malaysia, New Zealand, Senegal, and Venezuela reportedly took matters into their own hands and moved the vote forward. UNSCR 2334 became official as a result of a historic breach of established pro-Israel policy by the United States, which abstained from the vote. Widely reported as Obama’s “parting shot” to Netanyahu and the incoming administration, the passing of the resolution went against Obama’s own record of using U.S.’ veto power to banish similar proposals.
President-elect Donald Trump would take office in a matter of weeks and the Mueller investigation kicked off the barrage of Russophobic content peddled over the digital airwaves night after night. Stories like Maria Butina’s were plastered all over the media to buttress the Russiagate narrative.
The legend of Maria Butina
It was Erickson’s long-standing ties to the NRA and the organization’s former president David Keene, which set the stage for the Maria Butina story as a Russian infiltrator looking for “access to U.S. political organizations.” Erickson had worked with Keene as a registered foreign agent since the 1990s and formed part of the NRA’s efforts to forge closer ties to Israel since at least 2011.
Prosecutors would paint Butina as a seductress, ensnaring Erickson in a “duplicitous relationship,” but it was the cunning GOP operative who first spotted Butina during a 2013 trip to Moscow with Keene. Butina and Erickson would meet again in Israel one year later where they would begin their ‘love affair’ during which he would become “integral to Butina’s activities,” assisting the Russian gun enthusiast “in developing relationships with individuals and organizations involved in U.S. politics,” according to the Senate Intelligence Committee.
Maria Butina Israel
A con-artist by most accounts, Erickson is described by a Republican legislator as “the single biggest phony I’ve ever met in South Dakota politics.” South Dakota was where Yale-educated Erickson came up in the political arena and where he’s left a long trail of burned business associates and friends. In 2019, Erickson pled guilty to wire fraud and money laundering, admitting he had bilked 78 people of $2.3 Million over 22 years and was sentenced this past July to seven years in federal prison.
The NRA has been forging ties to the Israeli security state for years now. In 2013, Trump’s former National Security Adviser, John Bolton, joined a delegation of 30 in Jerusalem for a 10-day tour of Israel’s police institutions. The honorary NRA member stated on that occasion, that Israel could “serve as a model for American security.” The legend of Maria Butina, itself, was seeded in Israel that same year when an “obscure” Israeli gun-rights group posted on Facebook that she had announced to have signed a cooperation agreement with the NRA and “neighboring countries” to promote gun rights at a meeting with its members.
Butina would meet with Erickson and Keene two weeks later in Moscow, along with Alexander Torshin, former deputy governor of Russia’s central bank and lifetime NRA member. Torshin, who has been targeted by U.S. sanctions, traveled with Butina to the United States to “discuss U.S.-Russian economic relations” in April 2015. The pair met with several senior American officials, like Federal Reserve vice chairman and former Israel central bank chief, Stanley Fischer; the Treasury undersecretary for international affairs, Nathan Sheets and others in a meeting “moderated” by AIG CEO Maurice “Hank” Greenberg. The details of the high-level meeting, two months before Donald Trump made his announcement to run for president, have never been made public.
Feature photo | Chairman Lindsey Graham, R-S.C., speaks during a Senate Judiciary Committee business meeting to consider authorization for subpoenas relating to the Crossfire Hurricane investigation, the code name for the counterintelligence investigation undertaken by the FBI in 2016 and 2017 into links between Trump and Russian officials, June 11, 2020. Carolyn Kaster | AP
Raul Diego is a MintPress News Staff Writer, independent photojournalist, researcher, writer and documentary filmmaker.
Israel Mentioned in Newly Released FBI Documents Regarding Stone and Trump's 2016 Campaign
The Associated Press and Haaretz Apr 30, 2020 2:31 PM
Those records also include mentions of "Israel", "Jerusalem", "October surprise", and a "cabinet minister" who would supposedly meet Trump, although the redacted documents offer no clear details.
The documents — FBI affidavits submitted to obtain search warrants in the criminal investigation into Stone — were released following a court case brought by The Associated Press and other media organizations.
They were made public as Stone, convicted last year in Mueller’s investigation into ties between Russia and the Trump campaign, awaits a date to surrender to a federal prison system that has grappled with outbreaks of the coronavirus.
The documents include these key quotes:
One entry dated “on or about August 12, 2016,” reads: “[NAME REDACTED] messaged STONE, ‘Roger, hello from Jerusalem. Any progress? He is going to be defeated [sic] unless we intervene. We have critical intell. The key is in your hands! Back in the US next week. How is your Pneumonia? Thank you. [REDACTED] STONE replied, ‘I am well. Matters complicated. Pondering. R., [REDACTED] Thank You.’”
Image from newly released Roger Stone FBI documents mentioning Israel
Breaking news and analyses in your inbox
“On or about.June 21, 2016, [NAME REDACTED] messaged STONE, "RS: Secret I Cabinet Minister [NAME REDACTED] in NYC Sat. June 25. Available for DJT meeting [REDACTED]. " According to publicly-availabe information, during this time [NAME REDACTED] was a Minister without portfolio in the [REDACTED] cabinet dealing with issues concerning defense and foreign affairs.”
It's not clear from the newly released court documents if the minister mentioned is indeed Israeli, whether the "October surprise" has anything to do with Israel and who initiated the contact with Stone and Trump – Israel or another person and of what nationality.
The meeting with the minister did not apparently take place: "On or about June 25, 2016, [NAME REDACTED] messaged Stone, "Roger, Minister left. Sends greetings from PM. 5 When am I meeting DJT? Should I stay or leave Sunday as planned? Hope you are well. [REDACTED]"
“On or about June 28, 2016, [NAME REDACTED] messaged STONE, “RETURNING TO DC AFTER URGENT CONSULTATIONS WITH PM IN ROME.MUST MEET WITH YOU WED. EVE AND WITH DJ TRUMP THURSDAY IN NYC.”
Netanyahu was indeed in Italy at the end of June 2016 on an official state visit - but it's unclear if the quotes in the document are related to the Israeli PM.
Assange and Stone
In a June 2017 Twitter direct message cited in the records, Stone reassured Assange that the issue was “still nonsense” and said “as a journalist it doesn’t matter where you get information only that it is accurate and authentic.”
He cited as an example the 1971 Supreme Court ruling that facilitated the publishing by newspapers of the Pentagon Papers, classified government documents about the Vietnam War.
“If the US government moves on you I will bring down the entire house of cards,” Stone wrote, according to a transcript of the message cited in the search warrant affidavit. “With the trumped-up sexual assault charges dropped I don’t know of any crime you need to be pardoned for — best regards. R.”
Stone was likely referring to a sexual assault investigation dropped by Swedish authorities. Assange, who at the time was holed up in the Ecuadorian Embassy in London, was charged last year with a series of crimes by the U.S. Justice Department, including Espionage Act violations for allegedly directing former Army intelligence analyst Chelsea Manning in one of the largest compromises of classified information in U.S. history.
According to the documents, Assange, who is imprisoned in London and is fighting his extradition to the United States, responded to Stone’s 2017 Twitter message by saying: “Between CIA and DoJ they’re doing quite a lot. On the DoJ side that’s coming most strongly from those obsessed with taking down Trump trying to squeeze us into a deal.”
Stone replied that he was doing everything possible to “address the issues at the highest level of Government.”
The records illustrate the Trump campaign’s curiosity about what information WikiLeaks was going to make public. Former White House adviser Steve Bannon told Mueller’s team under questioning that he had asked Stone about WikiLeaks because he had heard that Stone had a channel to Assange, and he was hoping for more releases of damaging information.
Mueller’s investigation identified significant contact during the 2016 campaign between Trump associates and Russians, but did not allege a criminal conspiracy to tip the outcome of the presidential election.
In a statement Tuesday, Stone acknowledged that the search warrant affidavits contain private communication, but insisted that they “prove no crimes.”
“I have no trepidation about their release as they confirm there was no illegal activity and certainly no Russian collusion by me during the 2016 Election,” Stone said. “There is, to this day, no evidence that I had or knew about the source or content of the Wikileaks disclosures prior to their public release.”
Stone was among six associates of Trump charged in Mueller’s investigation. He was convicted last year of lying to House lawmakers, tampering with a witness and obstructing Congress’ own Russia probe.
A judge in February sentenced Stone to 40 months in prison in a case that exposed fissures inside the Justice Department — the entire trial team quit the case amid a dispute over the recommended punishment — and between Trump and Attorney General William Barr, who said the president’s tweets about ongoing cases made his job “impossible.”
Creepy Mueller Gang Leader Andrew Weissmann Appears Connected to SDNY Hit Job on Former Trump Strategist Steve Bannon
This past week former Trump Team Strategist Steve Bannon was indicted with three others on charges related to their building a wall on the Southern border by the SDNY. This indictment screams of Andrew Weissmann corruption and prosecutorial abuse.
Here is a list of the innocent lives and companies destroyed by these two crooks –
1 Audit firm Arthur Andersen and its 80,000 plus employees –
TRENDING: FAKE HATE: Black Democrat Faked and FILMED her Own Beating and Kidnapping... WTH? And She Did it For Votes -- She Even Posted It Online!
Sydney Powell recently was on with Mark Levin on his show on FOX News and she described the actions taken by former FBI Head Robert Mueller during the Enron case in the early 2000’s. Powell wrote LICENSED TO LIE: Exposing Corruption in the Department of Justice after seeing a core group of federal prosecutors break all the rules, make up crimes, hide evidence, and send innocent people to prison in the Enron case. When she saw them promoted to the top of the US legal system at the DOJ and FBI she had had enough.
Powell discusses how Mueller hand picked Weissmann wanting this corrupt attorney on his team –
Mueller and Weissmann made up a crime that resulted in the complete destruction of Arthur Andersen and the loss of more than 80,000 jobs for those employed by this corporation. This crime was eventually overturned by the US Supreme Court unanimously but it was far too late for all involved because the company was totally destroyed years before the Supreme Court decision.
2. Enron Employees –
Mueller and Weissmann not only attacked innocents using the full might of the US government, they also committed crimes. In recently uncovered documents from the Enron case, Weissmann threatened a witness –
3. Four Merrill Lynch employees –
Next, according to Powell, Mueller and Weissmann created crimes to indict four Americans at Merrill Lynch. They put these four individuals through ten years of “unmitigated hell”. Putting at least one of the four in solitary confinement.
4. General Mike Flynn and his lies that never occurred –
Move forward more than a decade and Mueller and Weissmann joined hands again but this time in the corrupt and unconstitutional Mueller Special Counsel team. Because of this, none of the crimes or corrupt actions taken against the President and those closest to him are legal or just.
This is of no concern to Mueller and Weissmann however. The first person they targeted was President Trump’s former National Security Advisor. Flynn was set up by former FBI Agent Peter Strzok and another corrupt agent in the White House. The notes they took as a result of their interview with the General were altered and the final notes (form 302’s) have not yet been uncovered. General Flynn was set up.
5. Paul Manafort’s crimes that were not crimes just years prior –
Paul Manafort was indicted on a number of crimes by corrupt Mueller and his gang. The problem with their initial indictment was that the actions under indictment were reviewed by the FBI previously and not considered crimes. The FBI interviewed Manafort in 2014 for the same crimes they indicted him on a few years later but neglected to press charges then because Obama gang members were involved.
Currently corrupt Obama appointed Judge Amy Berman Jackson has Manafort in solitary confinement for months now after putting a gag order on Manafort and then throwing him in jail. It’s a wonder what Manafort knows because Judge Jackson and the Mueller team want him dead.
6. Made up crimes against numerous Russians and Russian companies –
Four out of five of the made up indictments in the Mueller investigation are Russians. As of mid-October 2019, the total number of individuals indicted was 37 individuals and three companies. We really don’t know and doubt that the Russians are even real. The individuals were indicted for posting stories on Facebook in Russian that Mueller says swayed the 2016 election towards Trump. The number of posts in Russian were less than a percent of a percent of posts recorded on Facebook during the period stated, part of which was after the 2016 election.
In the one case with Russians that has come to trial, with Russian Company Concord Management, was indicted for a crime that the judge had to ask the Mueller team to define, because the so called crime was made up.
This case was eventually thrown out by the courts per the recommendation of the US Government.
Weissmann has a horrible record of prosecutorial abuse and the SDNY is no better.
There are many indications the recent indictment of Steve Bannon and others smells of Weissmann.
2. The announcement involves someone connected to President Trump in an attempt to embarrass and besmirch the President.
3. The crimes are suspect at best, and are amplified by wording and reporting. (Powell has said Weissmann could make a birthday gift to your grandma look like a crime.)
4. There is no indication Bannon did anything wrong.
5. The MSM blasts the bogus indictment across the airwaves when announced.
6. The accusation is the accused spent 1% of donations on their expenses related to the fund raiser for building a wall on the Southern border. The SDNY makes it sound like they embezzled like the Clinton Foundation which never will be investigated by the SDNY.
(Brian Kolfage is a war veteran who lost three limbs in Iraq and is included in the bogus charges:)
7. New York is no where near the Southern border per our latest review of Google maps.
8. The next day it is leaked that Bannon met with a Chinese billionaire – which has nothing to do with the indictment and the billionaire is anti-CCP. Bannon speaks strongly against the Chinese Communist Party (CCP). But it sounds bad so it was leaked.
These disgusting facts align with Weissmann’s prior actions of prosecutorial abuse and manipulation using the MSM.
Clinesmith reportedly worked before for former Deep State attorney Michael Atkinson. As we reported previously, Atkinson changed the IC whistleblower form sometime before September 2019 so that the whistleblower form was updated to allow for second hand information, which the ‘whistleblower’ (believed to be Eric Ciaramella) provided in his complaint. Although, the form should not have been accepted based on second-hand information and because it was about the President of the United States (who is not in the IC), Atkinson accepted the complaint.
Atkinson was interviewed by the Schiff gang in Congress before the impeachment hearings but his testimony is hidden by Adam Schiff and is the only testimony not released to the public to this day.
Atkinson’s wife is connected to Fusion GPS via Mary Jacoby, the instigators of the Trump Russia collusion hoax. Atkinson hid this when he was going through the process of being confirmed for the ICIG position:
Andrew Weissmann is also connected to Mary Jacoby (hat tip Yaacov Apelbaum):
Weissmann committed prosecutorial crimes while running the Enron investigation with Mueller in the 2000’s. He then carried his corruption to the Mueller gang’s attempted coup of President Trump. Now it looks like he’s working with the SDNY to continue his assault and harassment of the Trump Administration.
Andrew Weissmann should not be walking free while thousands of individuals related to his false crimes suffer. Weissmann should be investigated, indicted and he should serve time based on the law, not based on his corrupt ways of interpreting and enforcing it.
Ibizagate: How Soros Journalists Brought Down the Austrian Government
A year ago, a leaked video seeming to show the head of the right-wing Austrian Freedom Party Heinz Christian Strache conspiring with Russians to take over the top local tabloid brought down the center-right government. In the court case, video has emerged exonerating Strache and his colleague Johann Gudenus. Apparently, the Soros-related “journalists” who broke the story deliberately omitted the exonerating parts.
It was a set-up straight out of the 1970s “Mission Impossible” series: In 2016-17, the right-wing Austrian Freedom Party was leading the polls in Austria on the back of their opposition to Angela Merkel’s illegal Open Borders policy for all of Europe. In a scenario echoing the Fusion GPS “Trump Tower Meeting”, charismatic party head Strache and the equally popular Ex-Youth Wing head Gudenus were lured to a villa on the trendy island of Ibiza, Spain with Gudenus’ wife to meet with the alleged niece of a Russian oligarch going by the name of Alyona Makarova, who was promising investments in Austrian media in return for lucrative government contracts. “Makarova” has since disappeared and is wanted for questioning by Austrian police.
Austrian Federal Police released photos of the woman going by the name of “Alyona Makarova” who is currently wanted for questioning by the Austrian police
TRENDING: Police Make Second Arrest in Attack on 7-Year-Old Trump Supporter Outside of DNC Convention
The meeting turned out to have been a sting staged with intel know-how and equipment by unknown actors. The villa was fully wired for audio and video, producing roughly 20 hours of recordings between July 22 and 25, 2017, without Strache and Gudenus’ knowledge. During a vodka-fueled meeting, the politicians, the woman posing as Alyona Makarova and her companion, private detective Julian H., discussed a possible buyout of leading Austrian “Krone” newspaper, currently owned by German Funke publishing house, which has close ties to the ruling leftist German Social Democrat party.
For unknown reasons, these recordings were then withheld for two years, possibly in an attempt to blackmail Strache and Gudenus. During this time, the Freedom Party joined a government coalition with Chancellor Sebastian Kurz and his center-right Austrian People’s Party. The Freedom Party received the Interior Ministry and proceeded to implement a strict anti-illegal-immigration policy, renaming “Refugee Centers” into “Departure Centers”. Controversially, Interior Minister Herbert Kickl also ordered an elite police SWAT raid on the Austrian FBI department which had been spying on the Freedom Party for years (think Bill Barr raiding the Comey FBI with ATF agents, for example). The center-right coalition was highly popular in Austria and emerged as a vocal counterweight to Angela Merkel’s Open Borders EU policy.
On May 17, five days before the EU elections, six selectively edited minutes of the video were released by Süddeutsche newspaper and Spiegel magazine, seeming to indict Strache and Gudenus of offering kickbacks to the Russian “oligarch’s niece” in return for gaining control of the leading Austrian tabloid. In the ensuing scandal, the government collapsed, Strache’s and Gudenus’ political careers seemed over. In snap elections Sept. 2019, the Freedom Party lost their junior coalition spot in the government to the tiny Green Party, which rules Austria with Kurz’s People’s Party now.
Strache and Gudenus have consistently denied any wrongdoing and maintained they insisted any arrangements would have to be legal and on the level. Now, transcripts newly released by Austrian prosecutors seem to confirm that version of the story.
Honey trap Makarova allegedly offered Strache €270 million, with her companion, private investigator Julian H. repeatedly trying to get him to agree to illegal acts, which Strache repeatedly refused. Strache is quoted as saying, “No way, I won’t do that kind of thing. I’m strictly on the level.” Strache explicitly refused “kickbacks or any crap like that”, as the Austrian prosecutors’ transcript shows. He also explicitly declined any quid pro quo: “There’s political interests, and we have to think about what’s good for the people and the taxpayer. If a businessman can profit from that, sure, fine,” Strache said, “but I can’t put myself in a position which can be construed as corruption.”
The private eye repeatedly tried to get Strache to agree to a quid pro quo on tape several times. “Listen, she wants to hear, if she brings €270 million, she’ll get it back after a certain period and you get that.” Strache flat-out refused: “Yeah, but we can’t do that.” The alleged “oligarch’s niece” then intervened again with an appeal to Eastern European-style corruption, where “such things are possible”. “No, but let’s be straight,” Strache answered. “You make yourself vulnerable with that kind of crap, and I don’t want that. I want to be able to sleep at night. I want to look in the mirror in the morning and say, I’m clean.“
These passages, which would seem to completely exonerate Strache and Gudenus, were apparently deliberately omitted from the video released by German news outlets Süddeutsche Zeitung and Spiegel. Süddeutsche journalists Frederik Obermaier and Bastian Obermayer are members of the “International Consortium of Investigative Journalists” (ICIJ), which is one-third funded by George Soros’ Open Society. Austrian Journalist Florian Klenk, who broke the story in left-wing Austrian Falter, also worked for ICIJ in 2016.
Spiegel journalist Maik Baumgärtner broke a story in September 2019 relying on info by Soros-linked “investigative portal” Bellingcat claiming US secret agencies had identified the killer of a Chechen terrorist in Berlin, to which then-US ambassador Richard Grenell tweeted, “I thought you had fact checkers? Shame on Spiegel – again – for making up stories about the US. You didn’t even call us to ask about this claim.” While US ambassador in Berlin, Grenell repeatedly criticized left-wing Der Spiegel for its anti-American bias, as Gateway Pundit reported.
“This is looking like the greatest media scandal in post-war Europe,” German politician Petr Bystron (AfD) said, an early ally of Strache and Gudenus. “Using manipulated video, a popular and successful Austrian government was ousted by foreign involvement, using illegal taped and released material. Heinz Christian Strache and Johann Gudenus were deliberately framed in a deceit attempt to get them to agree to criminal collusion. Even though they adamantly refused, two years later the Spiegel and Süddeutsche released misleading videos to make them appear corrupt. This is clear interference in Austrian politics by German media with the aim of overthrowing the elected government. We’ve not seen anything like this in Western Europe since 1945.”
After the Russia collusion hoax, Soros-linked prosecutors and their media lackeys have gone after conservative leaders like Matteo Salvini in Italy, Viktor Orbán in Hungary, the PiS Party in Poland, Benjamin Netanyahu in Israel and Jair Bolsonaro in Brazil with politically motivated “lawfare” cases, as Gateway Pundit has reported. In February, US conservative Jay Sekulow’s European Center for Law and Justice (ECLJ) in Strasbourg revealed that at least 22 of 100 judges who have served on the European Court of Human Rights since 2009 are former staff or leaders of Soros NGOs.
ShadowGate by Millie Weaver ... Transcript
Shadowgate: the tactical and operational role the Shadow Government played behind the scenes, carrying out the coup against President Trump. We’re going to be looking behind the puppets, at who the real puppet-master string-pullers are.
When I was recruited, it was for electronic warfare. Then, I ended up in Information Warfare and ironically, the base that I first went to for electronic warfare is now Information Warfare.
We began that really in 2007, when right after the policy guidelines first came out. We were one of the first contracts with the DOD that I’m aware of, trying to help the 4th Psychological Operations Group understand how to go from dropping flyers from planes to a more micro-targeted, social media, psychological warfare application, where you could select an individual target or a group target – or an entire country, if you wanted to.
Maybe you had an old hockey injury, so if I wanted to attack you, I’d know where to hit you.
PATRICK BERGY: You understand enough about someone and you can hack their shadow, you can use their fears, you can use their anxieties.
Sound anything like pandemics that you recognize, here?
MILLIE WEAVER: Oh yeah, definitely.
PATRICK BERGY: So, you can use those things to help reflexively control or influence and target an individual or whoever it is, or a group of people or an entire election, an entire country
TORE: What Patrick Bergy created was a program that was based off of the strategies that we used in person. It was a psychological operation but that crunches data with the use of psychological operations, so you can predict how your target will respond.
PATRICK BERGY: I spent like seven years overseas; a couple of those years were specifically related to IIA, so I understood certain things when.
TORE: We hijacked the Afghan elections. How did we do that? We had to understand how the Afghanis think. We had to go to the areas that were anti- Taliban, because the Taliban political group was now more militant than it was political. We used that to our advantage and formulated a plan where we would sway their thoughts to believe that “XYZ candidate” is the way to go, because then, you won’t get robbed and we’ll tame the Taliban – but we had to do it in their way. So, he created the algorithm that does that for you
PATRICK BERGY: When we were largely doing this, it was done by analysts. Now, this is more done, automated through Artificial Intelligence, which is just a common iteration of the program or application development process.
The database component ends up allowing you to build behavioral profiles on individual targets and through those behavioral profiles you can develop or implement reflexive control, which allows you to understand – with enough information about someone – you can predictably determine how they’re going to react.
TORE: I was really good at what I did, really good and I can still do it, too. I’m not doing it now though
MILLIE WEAVER: Well, don’t be doing that, Tore! TORE: You wouldn’t know if I was, too!
But I helped them train algorithms with the strategies that I had created, all these years.
PATRICK BERGY: They had asked us to bring the application to a classified network. But Jim sent him a bogus, just a made-up, ridiculous bid to actually do that, because if it went on a classified network, we couldn’t turn around and sell it commercially. We went on, after that to another contract in Tampa, took everything with us.
4th Psychological Operations Group had no idea that we were going to be taking their years’ worth of work, that they paid us to do – the taxpayers paid us to do – and we kept the intellectual property rights to it and remarketed it, branded it commercially as the Shadow.
So, I come back here and I see these guys back here, in America have just been having a field day utilizing the technology that we’ve been developing to alter the outcomes of our elections in America.
MILLIE WEAVER: This technology was so successful, they couldn’t resist the temptation to not use it commercially and have the power to affect outcomes of elections at home. The commercial and black market value of such a technology is incalculable.
PATRICK BERGY: This is the mobile mega Shadownet mobile. My laptop sits in here and then I got uh two 4k capture cards. I can do VTC and this charges all the camera equipment, so while I’m riding, I’m told I’m getting as much as 40 amps.
These are the same cases that we used to build out our Skips; our SC2IPs, which is a Small Command and Control over IP.
And when I was working with JCSE, we would take these cases and build out networks. This is a Small Command and Control over IP. It’s just only running on one unclassified network.
SIM-enabled Wi-Fi router and if I get decent cell connection, then I can run the multiple cameras and I can put multiple images in one screen and I can run all that from my cell phone, that I have mounted here.
MILLIE WEAVER: The group of whistleblowers from the NSA and other classified data collection agencies, referred to as the Global Surveillance Whistleblowers were used as a vector to legalize what was then illegal dragnet spying on everyone, 24/7.
60 MINUTES: The NSA and its former head, General Hayden declined to comment for this story.
MILLIE WEAVER: The FISA Amendment Act of 2008 had section 702, that permitted the government to spy on citizens with a warrant from the Foreign Intelligence Surveillance Court.
The NSA data system collects everything through what’s called the Upstream, where everything is stored for 72 hours then dumped. However, if one could twin this stream of data they could privatize it. Imagine what you could do with that?
Tore alleges that she worked for John Brennan at the Analysis Corporation and Global Strategies Group.
What is the analysis corporation?
TORE: It is a company that does a lot of things, varying from administrative work, to analyses, to data collection, biometric collection. I mean, whatever contract they’ve been awarded by the government, they do. It could be something as simple as janitor duties.
STATE DEPARTMENT SPOKESMAN DURING 2008 PASSPORT SECURITY BREACH: In case you missed the Secretary’s words upstairs, she reached out to Senator Obama to say that she was sorry that this had happened, that there were these unauthorized accesses to his passport files.
One incident this past summer, where there was a trainee in the Passport Office who had an unauthorized access of Senator Clinton’s passport file. Now, in the case of Senator McCain, we detected earlier this year, one of the same people who accessed Senator Obama’s passport file also accessed Senator McCain’s passport file.
This is the same individual who was disciplined but at this point in time, still remains working with the contractor.
MILLIE WEAVER: She claims to be the actual person who moved the electronic files at Stanley, Inc and CGI in 2008, which publicly was falsely alleged to be a “hack”. What can you tell us about the CGI-Stanley passport incident?
TORE: See, Brennan has a certain MO, okay? When he wants to get something, he pretends there’s a hack. So, I was asked, when I was stateside, “Hey, would you go by that office and pull all this data from the State Department?” and I said, “Of course I will.”
I put it on two rugged drives. They were like the orange tips, really big drives and I put it on there and then later, it’s like, “Oh, they were hacked.” And I’m thinking, “Um, I didn’t hack anything. I was told to do it.”
So, I just kind of watched what was happening. One person actually committed suicide or something and the other two were found. I’m like, “But there was no hack!” And that that’s a going theme. You know that, right?
MILLIE WEAVER: Wow. If it wasn’t a hack, I’m presuming that means you took the information off of their servers and computers?
MILLIE WEAVER: So, that information was then missing?
MILLIE WEAVER: What would be the point of that? What were they trying to hide?
TORE: Well, if I removed it, that means someone else was there to replace it, right? So, I remove the factual, actual information and then someone goes behind – that’s like super switch. I didn’t see that until in retrospect.
Because for me, going to copy a server off of a consulate computer, State Department, wherever would be normal. If we had a contract with them, they would tell me what terminal, I’d scan the barcode, make sure that I was at the right computer and do my job.
So, I removed data. That means someone else replaced it.
MILLIE WEAVER: So, what is the relationship between Global Strategies Group, Analysis Corporation and Canadian Global Information?
TORE: They all do the same thing. They’re the Jacks of all Trade, except for the fact that Global Strategies Group was actually a hub for all information; in and out, in and out.
All of the directors there were former GCHQ, CIA, NSA, MI6, MI5, German intelligence. You have to wonder, why are all these former heads heading up consulting firma and what were they consulting? And they weren’t consulting. They were collecting everybody’s data and privatizing it.
MILLIE WEAVER: John Brennan, working within his network of contracting companies, such as Stanley, Canadian Global Information and the Analysis Corporation helped then-Senator Barack Obama get elected using Internet influence operations.
March 5th, 2013, Brennan gets confirmed as CIA Director, dodging controversy over his involvement in the CIA Enhanced Interrogation scandal.
Now, tell us about these data bridges to the NSA. Is that legally obtained information?
TORE: I mean, that’s kind of what Snowden did, too.
MILLIE WEAVER: According to sources closely-connected to this subject, under John Brennan’s direction, Snowden created a data bridge from the NSA database into private servers controlled by private intelligence and cyber security
contractors, aka the Analysis Corporation, Global Strategies Group and Canadian Global Information.
TORE: The twinning of streams is duplicating the information in the Upstream. That’s crazy. To think that another company is copying all emails, texts, phone calls, messages, emojis, Instagrams, tweets – anything you can imagine that’s being uploaded, that has to go into the 72-hour holding is suddenly being pushed offshore. That sounds kind of illegal, because it is.
MILLIE WEAVER: June 5th, 2013. Edward Snowden goes public with the NSA program PRISM, revealing the NSA collects Internet traffic of all US citizens from major Internet and telecom companies through the FISA 702 program.
Snowden’s actions kicked off, on the federal level justification for spying on US citizens, including the Senate and Congress, in the name of preventing US citizens with Classified or Top Secret clearances from being able to repeat Snowden’s actions. This opened the door for the creation of ClearForce.
July 4th, 2013 CGI and GCHQ launch a Defense Cyber Protection Partnership (DCPP), which includes sharing threat intelligence.
So, these were all private corporations that even had foreigners working in them and they had access to NSA servers?
TORE: Of course they did. How do you think we found, through facial recognition of the FBI the Belgium Bomber? Why would we have their facial recognition data?
MILLIE WEAVER: So, is this legal, what you’re telling me and why would they do it? Why would they set this up this way?
TORE: So, sharing our information and our private identifying information, facial recognition biometrics outside of the United States for official purposes, like at a consulate and an embassy, through Secret Service or anything like that is legal – or through Interpol – but to have a company that houses everybody’s data and any private person can buy that data or investigate that data or analyze that data, that’s not. And that’s exactly what GSG was doing.
[CNBC BROADCAST]: Early 2009, John Brennan left government and went to work for a small intelligence contractor here in the Virginia, area suburban Virginia area, just outside of Washington. The company was called the Analysis Corporation. There are subsidiaries of subsidiaries. Some of these companies are spun out, go public, go private, again. It’s kind of hard to keep track of them.
MILLIE WEAVER: In just four months, GSG, CGI and other private contractors allegedly had unauthorized access to the entire Five Eyes network; unfiltered, unrestricted, decompartmentalized, outside any government regulation or oversight.
Not surprisingly, the CIA gets caught one year later spying on the US Senate. Their excuse, it was their own network they had set up for the Senate to use, so they had authorization.
[C-SPAN BROADCAST OF SENATE HEARINGS] SEN. ROBERT WYDEN (D-OR): Would you agree that the CIA’s 2014 search of Senate files was improper?
CIA DIRECTOR JOHN BRENNAN: This is the annual threat assessment is it not? Yes. These were CIA computers at a CIA-leased facility. It was a CIA network that was shared between Senate staffers conducting that investigation for your report, as well as CIA personnel.
SEN. ROBERT WYDEN (D-OR): The reality is those computers, in effect belonged to the CIA but they were reserved exclusively for the committee’s use.
NSA DIRECTOR, GEN. HAYDEN: We accelerated our ability, our – for one of a better word – invasiveness and into communications networks in which legitimate targets coexisted with legitimately-protected communications.
PATRICK BERGY: Obama takes office and General Jones is being sworn in as National Security Advisor. His son, General Jones’s son copyrights “CKMS”, Congressional Knowledge Management System.
Within a couple months after he leaves office in 2010, Dynology gets contract for CKMS, the Congressional Knowledge Management System, which basically controls all of the scheduling, the addresses, the documents, everything for the Congress.
CKMS is going to give you access to unlimited information. Think about the information you could get from that.
MILLIE WEAVER: If we look on usspending.gov, we see Dynology was awarded contracts for the Congressional Knowledge Management System. However, one contract stands out, where Dynology was awarded a contract by the Department of Defense that includes a mention of the Congressional Knowledge Management System.
A closer look shows that the award description is for “CKMS Hosting Labor/Admin Core Data.” The primary place of performance is Germany and the North American Industry Classification description is “Data Processing, Hosting and Related Services,” even one section stating, “Manufacturing Outside the United States, Use Outside the United States.”
Let it sink in, that these official documents suggest the Congressional Knowledge Management System, outsourced to a private contractor is hosted, managed and stored in servers in Germany. This is very disturbing.
With the Senate’s computer network compromised by John Brennan’s CIA and the Congressional Knowledge Management System being hosted, managed and stored overseas by General Jones’s company, the ability for these contractors to eavesdrop on both the House and the Senate is staggering.
PATRICK BERGY: When I brought this up, back in 2018, shortly after that, Dynology lost the contract that they had had since 2011/2012 with CKMS and that contract went to another company, a company that exists as nothing more than a website and a maildrop, a mile or so from Dynology’s Tampa office – controlling the entire Congressional Knowledge Management!
TORE: And if you look at the contracting database, they’ll say that, “Oh, they have an American entity!” and it’s like, “But it’s the same CEOs for this Canadian Company, I’m so confused!”
So, they even falsify information, so they can obfuscate where our federal tax dollars are going. And don’t forget they all share contracts, they all subcontract, co-contract.
PATRICK BERGY: PSYGroup has the exact same product as Dynology, the Shadownet and Eyesight, right? Yet, the owner of Dynology sits on the board of directors of PSYGroup, which in my opinion, is kind of like the owner of Coke sitting on the board of directors of Pepsi.
TORE: TAC, CGI and all these LLCs, they just keep cycling and cycling all of them. [VIDEO]
[CBS BROADCAST ABOUT OPM HACK]: The Social Security numbers of 19.7 million Americans subjected to federal background checks, as a condition of employment are now in the hands of hackers.
MILLIE WEAVER: In June 2015, the Office of Personnel Management announced a major data breach. Tell us about the OPM hack.
TORE: Okay, so that’s another Brennan job, another “hack”, supposed hack and this is to obtain, delete and obfuscate information.
Hillary Clinton was up on the shopping block about her emails at the State Department and that was coming up, that was big talk of the town in 2014.
Suddenly, the Office of Personnel Management was hacked. In December, down the line, five months later, Hillary Clinton appears in court and they tell her, “Hey, you’re gonna hand over your emails.” A couple days after that, the now-fired corrupt, leaking former IG of the State Department, [Steve A.] Linick had requested from our elected officials to give him a big fat budget to create his own personal IG of the State Department server.
MILLIE WEAVER: How convenient. TORE: Very convenient.
[ROLLCALL BROADCAST OF FOREIGN RELATIONS SUBCOMMITTEE] STATE DEPT IG STEVE A. LINICK: Well, we have no evidence that our data has been compromised. The fact that the contents of our network may be accessed by large numbers of Department administrators puts us at unnecessary risk.
The IT folks at the Department have the keys to our IT system, so they really have access, unfettered access to the system. If they wanted to, they could read, modify, delete.
I would like to be completely separate from the Department, to ensure the integrity of our system but I also need the Department to give us access to the same systems, that we have now.
TORE: And he was responsible, in releasing her emails that he gave in little, little doses, of course, over time. But at the same time, the press came out with a report. “Oh dear, months ago, there was a leak!”
[ROLLCALL BROADCAST OF FOREIGN RELATIONS SUBCOMMITTEE] SEN. DAVID PERDUE (R-GA): Do you have evidence that the State Department’s network has been attacked? And does that affect you guys?
STATE DEPT IG STEVE A. LINICK: There, there, uh there has been, there’s, there’s evidence that it has been attacked and it has affected us. I can’t really go into details, uh because of the nature of the information.
TORE: For people that don’t know, the Office of Personnel Management usually has information on every single American that has applied for any type of clearance. So, if you applied for a White House Press Pass or joined the military or an admin job that could require something like a Public Charlie clearance – anything – all your information is there.
MILLIE WEAVER: What could they do with all that information?
TORE: Right. They started slowly creating these Memorandums of Understandings (MOUs) with your Secretaries of State and Attorneys General, secretly behind your back, providing facial recognition data, private identifying data, data, data.
This was the most incredible data, because if you want to control someone, all you need to do is put that information through a couple of systems and you’ll know exactly what buttons you need to push and how to make them nod their head the way you want them to or shake it.
[CBS BROADCAST ABOUT OPM HACK]: Millions of Americans have received letters like this, notifying them their data are at risk and referring them to a government-contracted credit monitoring agency.
MILLIE WEAVER: Does this correlate with predictive programming? TORE: Yes.
MILLIE WEAVER: The merging of John Brennan’s tactical intelligence and General Jones’s operational capabilities gave birth to ClearForce.
PATRICK BERGY: iPSY was the relational database component of it. That’s what we named it – I named it, actually and –
MILLIE WEAVER: What did you name it “iPSY” for?
PATRICK BERGY: “I” like the iPhone, “PSY” for psychological warfare. MILLIE WEAVER: Okay.
PATRICK BERGY: You have the component where you need to be able to collect all this information and then you need to be able to collaborate this information with a team of an unspecified amount of analysts and/or other legal people that will be looking at stuff and you need to be able to provide the leadership of a tactical operation; you need to be able to provide them what’s called a “COP”, a Common Operational Picture, right?
So, this provides people at the top Common Operational Picture of all the different assets. Assets can be journalists, it could be an entire news organization, it could be a podcast, it could be just an individual YouTube influencer.
It could be anybody like that and you would either build them from scratch or contract them out, just bring them online.
MILLIE WEAVER: According to Bergy, the 2012 changes to the Smith-Mundt Modernization Act of 2012 opened the floodgates for domestic IIA: Social media Influence Operations.
Do you think that some of these smart devices were created in order to gain access to the public by the military-industrial complex?
PATRICK BERGY: I know that the iPhone really was released within this – if not the same month of the IIA policy letter, right. I know for a fact – and you can easily look it up – that the Smith-Mundt Modernization Act was modified to allow for the influence, dissemination of propaganda to Americans, which had previously been restricted or prevented by the Smith-Mundt Act in the late ‘40s, when it was put in place.
When they modernized that, they took away those protections, allowing it to adapt for social media. And then, within a few months or just a very short period of time, they came out with the Obamaphone
[FOXNEWS BROADCAST]: Free cell phones to low income families. Tracfone has just started a program here, in the Volunteer State called SafeLink Wireless. More than 800,000 families here in Tennessee qualify for these phones. The company says this program is about providing a safe link for families no matter what their level of income is.
PATRICK BERGY: A very short time after that, they added free unlimited data plans to them.
MILLIE WEAVER: He also suggested that the contiguous release of the Obamaphone with an unlimited data plan played a significant role in fostering the Ferguson Riots, using IIA.
So why do you think they were targeting them for collection purpose?
PATRICK BERGY: We know – think of what you could do, right? Think of how easily you could start a riot in Cleveland, if you had the data? Oh, my goodness.
MILLIE WEAVER: So, you could gather that information and know how to psychologically-target them to get them upset or do you think that they were pushing information to them, tailoring their viewpoint on social media?
PATRICK BERGY: I would. And like I said, I didn’t really actually finish this, earlier but I originally, in 2014, I recognized the Black Lives Matter movement during the Michael Brown riots as being influenced by IIA.
The colleague of mine in South Korea did a trace route on it; trace routed the source of what I believe to have been IIA to Ukraine. That’s funny, right? Because Ukraine just always keeps popping up and whether or not it was actually the Shadownet, itself, or it was a competitor, like McChrystal…
What they accused McChrystal of having is the exact same thing as what we built before him. Maybe it was a competitor. Who knows? It’s becoming really a boutique market.
MILLIE WEAVER: Do you think that many of these social media companies like Twitter, Facebook, that they were created with IIA operations in mind and it was never intended to be a Free Speech platform? What’s your take on that?
PATRICK BERGY: In our Shadownet flyer, it has a screenshot of a South American social network site that was kind of like the predecessor for MySpace, owned by Google and I believe the name was Orkut.
You can actually look on our flyer and see a screenshot from that, which looks like an active engagement from South America. Now, if you look up what happened to Orkut, what was really Google’s first attempt, pre-MySpace, you’ll see that it was largely shutdown and largely contributed to an overwhelming use of fake personas. What was one of the reasons that they attributed to MySpace shutting down last year? Rampant fake personas.
At the same time I’m developing these flyers for a company that doesn’t have a sales staff – they only have a product – at the same time I’m doing that, our number one partner for a company that doesn’t have a product – that has only sales people – are working John McCain’s campaign, doing micro-targeted social media for John McCain’s campaign.
MILLIE WEAVER: You were speaking on news pundits and how many of the news pundits are IIA assets and intelligence assets. So tell us more about that.
PATRICK BERGY: Mika Brzezinski, her father is the father of influence operations and psychological warfare.
[TODAY SHOW BROADCAST]: A towering figure in American foreign policy, an extended member of the NBC news family, as well, Zbigniew Brzezinski, Jimmy Carter’s National Security Advisor…
PATRICK BERGY: Jillian Turner, Fox News host was also Vice President of Jones Group International, doing an interview with her old boss – and my old boss – now, why would I assume that they would be using anything other than the Shadownet, because the owner of the Shadownet has so many key assets. Why would he need to go to anybody else, right?
So they get their talking points from the analysts that are putting it together but then they disseminate those talking points, through non-attribution to their assets, throughout these news organizations, utilizing an application like the Shadownet.
Jillian Turner has a direct connection to Atlantic Council. General Jones was the Chairman of the Board of the Atlantic Council, JGI: Jones Group International is an oil lobby. Atlantic Council and Burisma has a relationship. Burisma is an energy company. Obviously, they have these connections.
MILLIE WEAVER: This would explain why Fox News focuses mostly on the Biden- Ukraine scandal, never mentioning Jones’s connections nor the Atlantic Council.
Trump focusing on Ukraine isn’t just about Biden. It’s about Jones, Hayden, Brennan, McChrystal, the State Department, USAID and corrupt inspector generals.
With everything in place and after being in control of the office of the presidency for decades, the Military-Industrial Complex had confidence they could take Trump out as a candidate, or even as President.
Has IIA been used against President Trump?
PATRICK BERGY: Absolutely. Through the Russian Dossier, there are so many people, former colleagues of mine, directly connected to the Shadownet.
John McCain and Lindsey Graham. One of the last two people to have their hands on the Russian Dossier before it was handed off to BuzzFeed, as part of the dissemination process.
[CNN BROADCAST: GRAHAM DEFENDS MCCAIN OVER STEELE DOSSIER] DON LEMON: I told the President it was not John McCain. I know, because John McCain showed me the dossier.
PATRICK BERGY: It was built, it was a product, it was used as a weapon, as part of an influence operation. It was fake information put into it to help create chaos and to influence an election, bottom line.
But those people that were directly involved with that were also directly involved with the Shadownet.
MILLIE WEAVER: So, you have knowledge of them using military-grade psychological warfare weapons on the President of the United States.
TORE: Done by the closest people around him, too.
PATRICK BERGY: As Trump’s election unfolded, and as all of the Russia Collusion and all these things started happening and becoming exposed, revealed to me it was to keep from exposing the stuff they’ve been doing over here, which I believe includes the Maidan Massacre in Ukraine.
TORE: Where did the Dossier come from? Nelly Ohr testified it came from Ukraine. Where’s all the money-laundering and crazy IIAs we see going on? Ukraine.
PATRICK BERGY: So Manafort’s being accused of social media influence operations in Ukraine, in 2010. World courts charged him with that.
TORE: Ukraine was the epicenter of everything – like, everything – and that’s because we had maimed that nation and made them deal to us. Barack Hussein Obama did it.
We deployed troops, National Guard, of course – and what states are the ones that work with Ukraine? it would be California and New York.
So, we deployed troops there, because they weren’t listening. Why would you want to stay independent and hang out with the Russians, when you can be with us, the Americans and the Europeans?
And they were really upset that they weren’t willing to commit to receive debt from the EU and ignore Russia, which they had been attached to for eons.
So, we went in there and destroyed them. That’s how Hunter Biden got his job. That’s how we weaseled our way in there. We got a hold of corrupt people, we said, “We’ll help you out with your lawsuits, you get us in there.” We wrote bills, we sent the money, so we can “help” them conduct elections. We did everything there.
MILLIE WEAVER: The Obama aid package in Ukraine, which corresponds with Joe Biden’s billion- dollar loan guarantee scandal is the same aid package, where Scytl got a field office in Kiev to provide “election training” and “election management” for the Ukrainian Election Commission.
Scytl is one of the most notorious outsourced companies for elections, with regular electronic voting machine problems, who also tabulate our election results in cloud services in Europe – aka, servers outside the United States.
A whistleblower leaked to me in 2019, internal documents from Scytl that appeared to show meddling in the Kentucky election.
PATRICK BERGY: Atlantic Council has been deciding America’s policies for decades now – and look at what a panic they were in when Trump made that phone call to Ukraine!
They went into absolute panic mode! 75% of the people testifying were all directly connected to General Jones, McCain and Atlantic Council.
TORE: The now-IG of the NSA, literally with his wife, created the National Anti- Corruption Bureau in the Ukraine in 2009. They created it.
[UKRAINIAN BROADCAST]: Robert Storch is the Deputy Head of the US Inspector General’s Office.
ROBERT STORCH: I recognize how important this task is for NABU and for the effort to address corruption there, in Ukraine.
MILLIE WEAVER: September 30th, 2016, Obama knows that within 30 days, if the NSA can’t fix the over-collection problem, by either dumping data or justifying having it, the FISA Court will order the IG of the NSA to investigate.
So what does Obama do? He writes an Executive Order that makes the IG of the NSA a Presidential Appointment, rather than an appointment by the Director of the NSA.
November 30th, 2016, Obama nominates Robert Storch, who was working as Deputy IG of the DOJ under Horowitz, at the same time.
[OFFICIAL VIDEOS OF BOTH THE DEPARTMENT OF JUSTICE AND NSA PLAYING SIMULTANEOUSLY] ROBERT STORCH: I’m Rob Storch and I’m honored to serve as the Inspector General at the Department of Justice/National Security Agency.
MILLIE WEAVER: During the transition period from the Obama Administration into the Trump Administration.
Storch appears to never have actually been confirmed by the Trump Administration.
TORE: How did this guy get confirmed? Not one person asked, “Hey, have you ever worked for – ?” I mean, a couple months before they even had the hearing, to see if he’s going to be confirmed or not? Nobody asked him, “Hey, did you, by any chance get an offer from the President of Ukraine to work for them?” It was all over the media – but not one person asked!
You know who else helped them set it up? Bill Taylor and George Kent. Those two clowns also testified against the President. One of them has supersonic hearing; they could hear phones that are not on speakerphone from across the room.
MILLIE WEAVER: That’s odd!
According to TORE, the alleged impeachment whistleblower was actually a wiretap, hence “supersonic hearing capabilities”.
Eric Ciaramella was a decoy to hide the fact that the President was being wiretapped, through a 702 data over-collection problem connected to the sunset clause. A collection problem that the NSA Inspector General, Robert Storch oversaw.
TORE: The question is, what has been the Senate Intelligence Committee all complacent, every single one of them? Because it’s their job to be our voice and ask those questions? It’s because they’re in on it.
MILLIE WEAVER: So, I the question is, are they all just that inept or is there something else going on?
Section 702 of the FISA Amendment Act of 2008 was created to stop illegal surveillance through data collection. It ends up being used as cover, providing the intelligence agencies front-facing legal access to unauthorized data, while turning a blind eye to private contractors having backdoor access to all data.
TORE: I had access, through the administrative side platform, because I was one of the first on it, to be able to see all communications between people, like Adam Schiff, Brennan, Feinstein’s staffers and General Jones – and many more that I don’t want to say, because I haven’t publicized that, yet, actually. Because there’s foreign people that I did see communications of – former GCHQ’s Hannigan.
Robert Hannigan was part of the company at GSG. So I gave most of this information to Millie Weaver and she put out a report and even though I had legal access to all their communications, because I had my username and password, the minute she did that report, within just – I believe, almost instantaneously, the website was taken down and my access was revoked. They changed it – well, it wasn’t revoked – they just uphauled the whole server. It was done, it was finished. They made it toast. I mean, that’s what they do.
But nothing ever really dies, really because the way they use their servers is by torrents, so all their information is hidden somewhere across the planet. Maybe we should look at some old articles that I put out on “Hurricane Electric” to find those servers and those little bits and seed them correctly.
So, you’d be able to seed it with something like Keystone.
MILLIE WEAVER: I want to ask you about John Brennan and the blackmail. So, who all did he have blackmail collected on? Any politicians?
TORE: You mean, that I’ve seen? MILLIE WEAVER: Yes.
TORE: A lot of people, yes.
MILLIE WEAVER: And politicians?
MILLIE WEAVER: So, would you say there’s any side – more Democrats or more Republican – or is it kind of even?
TORE: Very even-steven.
MILLIE WEAVER: Okay, so once this blackmail was collected on politicians, what did they do with it?
TORE: Even Pelosi doesn’t know what they have on her. Neither does Blumenthal. Mobody. I can keep going down –
MILLIE WEAVER: But do they know that these people have blackmail on them? TORE: Only if they’ve butted heads.
MILLIE WEAVER: Okay.
TORE: So, we saw a butting of heads between Murkowski, was it and Feinstein, right? That’s a butting of heads. That’s where it’s like, “Hey, we got this.” You know, where she put her up against the wall? Happens all the time.
MILLIE WEAVER: Now you know how our government has been compromised: 24/7 surveillance mixed with blackmail.
What’s the significance of Cambridge Analytica being attached to Trump’s campaign?
PATRICK BERGY: Everything that I saw, with the description of how Cambridge Analytica functioned; what they did, their app, the computer applications, everything that I saw with that, I would describe as just a later iteration of the Shadownet.
MILLIE WEAVER: Was Cambridge Analytica, to your knowledge an IIA operation?
TORE: Yes, it was and I believe that it was so blatant, because it was piloted at the same time that the RNC and the DNC were hacked. It was all formulated correctly.
[THE GREAT HACK, NETFLIX DOCUMENTARY] MALE CHARACTER: I have said to you, it’s all coming out!
BRITTANY KAISER: I didn’t inspire Hillary’s emails and I have nothing to do with Russia. So yes, the fact is, it looks like I did both. If I wasn’t me, I would say, “Yes, that’s what it looks like!”
I was part of the team running Obama’s Facebook. We invented the way social media is used to communicate with voters.
TORE: This is how they were going to do it. They were supposed to go in, they were supposed to sway him, because they were supposed to give up the goods to match the Russia hack.
MILLIE WEAVER: Why would they be running an IIA operation that would be helping Trump win, because that doesn’t make sense, when we know that General Jones is a Democrat and many of these people don’t like Trump. So what gives?
TORE: Well, because then, we just make it look like Russia was running the Cambridge Analytica program, too.
[THE GREAT HACK, NETFLIX DOCUMENTARY] BRITTANY KAISER: And it admits to it, right here.
I am headed to Washington, DC for my testimony for the Mueller Investigation. I definitely didn’t think that while we’re sitting there, counting votes, that some of those votes were made by people who had seen Fake News stories, paid for by Russia on their Facebook page.
TORE: So, not only did they hack the DNC and the RNC – but nobody talks about that, right – because we’re only supposed to focus that Russia was hacking just the DNC, not the RNC – we keep forgetting about that, because it was just information Brennan was getting. They wanted to get access to servers. That’s the way it goes.
Anyway, Cambridge Analytica, at the same time, would be supposedly helping President Trump win and the Russia Collusion Hoax would have stuck better, because behind all those LLCs and the glitz and glamour, they would have had some statue of Vladimir Putin in a tutu waiting for you.
[THE GREAT HACK, NETFLIX DOCUMENTARY] BRITTANY KAISER: Yeah, I worked at Cambridge Analytica while they had Facebook datasets, went to Russia one time while I worked for Cambridge, I visited Julian Assange while I worked for Cambridge, pitched the Trump campaign and wrote the first contract.
I have an email from one of our senior data scientists that said that we were actually using Facebook-like data in our model. The methodology was considered a weapon; weapons-grade communications tactics.
“Well done, Britt looked quite tough and you did okay with a winky face, little emoji.
[MSNBC BROADCAST] RACHEL MADDOW: We found out that Cambridge Analytica reached out to WikiLeaks and said, “Hey, can we help?” What that means is we’ve got a Russian intelligence operation underway to illegally influence the US election in Trump’s favor and we’ve got the data firm paid by the Trump campaign offering operational help to that effort.
[ABC BROADCAST] GEORGE STEPHANOPOULOS: Are there any ties between Mr. Trump, you or your campaign and Putin and his regime?
PAUL MANAFORT: No, there are not. It’s absurd and you know, there’s no base to it.
MILLIE WEAVER: Cambridge Analytica was used to create the appearance that Russia conducted influence operations to help Trump win the 2016 election.
PATRICK BERGY: Stone, Manafort, Davis, McCain, Jones, all of these people have been doing this for, to my knowledge, a decade of my personal, fact-witness knowledge. They’d been doing this for a decade prior to Trump even running for office.
I met with Roger Stone. We were at his table at a speaking engagement that he did in Clearwater, Florida and I asked Roger Stone at that time, “Did you work with, do you know Jim Jones? Did you work with Dynology?” and he acknowledged his relationship and he said, “Yeah, sure.”
I asked him flat-out, I said, “Did you use the Shadownet? Did you know about it?” He’s like, “No.”
MILLIE WEAVER: Stone leaving the Trump campaign early on suggests candidate Trump didn’t want his campaign tied to Stone’s influence operations.
[THE GREAT HACK, NETFLIX DOCUMENTARY] ROGER STONE: We really pioneered negative campaign advertising.
MILLIE WEAVER: Stone does have a reputation for political dirty tricks and influence operations
ROGER STONE: I revel in your hatred because if I weren’t effective, you wouldn’t hate me.
TORE: Manafort and Roger Stone go way back, like from the ‘80s. Come on, these people have been through everything together and this is why they targeted them and this is why they went on Manafort for things that were, like ancient. it’s like, Man, not even a statute of limitations, not anything. Come on, Man. Seriously? Nope.
PATRICK BERGY: PSYGroup and WikiStrats, absolutely connected to the Shadownet, through the owners of the Shadownet, through the fact that, PSYGroup, through Paul Manafort submitted a proposal to the Trump campaign. Now, Trump’s campaign rejected the proposal. I love that man, right? That’s why I keep voting for him, because even when he’s given the opportunity to do that, he rejected it.
MILLIE WEAVER: The Trump campaign must have known the Dems would try to use anything against them. Trump must have sensed that the offer for influence operations was a honey trap to set him up.
Well, do you think that the reason they attached Manafort to Trump’s campaign – because that was kind of later, right – attached them onto there. Do you think it’s because they were trying to frame up trump?
TORE: Yes, because they failed with their IIA attempt.
PATRICK BERGY: Yeah, I definitely would say that Manafort was an asset, whether or not he fully understood what his role was, you know. They might have lied to him about what their true intentions were. I believe they fully intended to throw him under the bus.
Because two things had to happen. They could not let Hillary win and they could not let Trump keep his seat, right? So, they were trying to kill two birds with one stone, using Manafort to make sure that Hillary doesn’t win, through IIA, through WikiStrat, through his connections, there.
And then those same people, turning around throwing him under the bus, by somebody who had previously worked with Manafort and understood what he had been doing and what he was doing and used that to exploit him, as a way to hurt Trump.
TORE: Since their whole attempt to have him employ a company to help him win and use these psychological operations that the Left was using, I mean, “They’re doing it, we should do it!” – and he didn’t.
PATRICK BERGY: And that’s in the Mueller Report. That’s in The New York Times. There are several instances, where he’s rejected the opportunity to take advantage of influence operations, be it IIA-supported or just your standard run- of-the-mill influence operations, right? They’ve rejected that
TORE: And the thing is, people like Roger Stone aren’t saints but they’re not demons, either. They skirt the outs and they’re great at what they do and you know, you either love him or not. It’s like Brie cheese.
But the one thing that you can be sure of is that he sticks to his principles and if he’s your friend – especially if he’s been your friend for 40 years, like he was with president Trump – there’s no way he’s going to flip on you to save his butt, ever. Because that’s what honest people do
MILLIE WEAVER: Yeah, he seems to know how the games in the swamp are played.
TORE: Oh yeah.
MILLIE WEAVER: So, I mean, he knows how they operate.
TORE: He was actually framed by people that he worked with. I mean, that software was created by his friend that created the MagicWheel software – implemented Shadownet for the courts – so they can randomly have such specified – out of millions of people that were in the [jury] pool, they were all intelligence contractors and Never-Trumpers. Come on!
MILLIE WEAVER: So, why wouldn’t they just focus their efforts on running IIA operations to get Hillary in office?
TORE: Oh, they did! Are you kidding? They deployed everything, from censoring, shadow-banning, to dismissals to full-blown Mockingbirds. I mean, that’s where we saw the real face of the press. That is exactly where we saw it.
[PRISON PLANET BROADCAST OF CLINTON RALLY] HILLARY CLINTON: I want all of you to know that that’s true, not only for the campaign but if I am fortunate enough to be your President, I want you to know and I want you to tell anybody you know; any friends or colleagues at school or work or your neighborhood, whether you vote for me or vote against me.
TORE: The polls’ “98% chance Hillary Clinton wins?” Like, what?
MILLIE WEAVER: Those were bogus!
TORE: That was an IIA! That was hijacking reality, to think she’s already won so obviously, she’s the best. All the superstars coming out, how she’s amazing, all these concerts – and all to divert you away from the fact that she couldn’t walk, talk, climb stairs, say a word without chucking-up
[ALEX JONES YOUTUBE CHANNEL] MILLIE WEAVER: Hillary Clinton is on stage right now, as we speak and she is coughing non-stop.
TORE: Did she like chuck-up a lung or something that one day? That was super weird
PATRICK BERGY: There is a definitely some context that needs to be understood in the relationship between General Jones, Obama and Hillary Clinton.
General Jones was originally offered by Obama the position of Secretary of State. He accepted. He talked to his family, he accepted. And then two days later, without even telling him, which was kind of a jerk move to do, Obama turned around and tapped Hillary Clinton.
And I know that Jones – Jim Jones told me that his dad was really offended by that. And then, he was offered and accepted the role the position of National Security Advisor but actually, considered turning it down, because he was so offended by and was so upset by what had happened.
MILLIE WEAVER: What would be the point of taking Hillary out of the equation, to then get Trump in, to then want to just impeach him?
PATRICK BERGY: Well, because he wasn’t their choice. These people hate Trump. [VIDEO]
[CNN BROADCAST] LINDSEY GRAHAM: He’s a jackass. PATRICK BERGY: We’re talking about, at the time –
MILLIE WEAVER: That would just make Pence in charge.
PATRICK BERGY: Well, do you think John McCain would have rather had Pence in charge? You think Lindsey Graham would rather have Pence? Lindsey Graham was
so frustrated with Trump, he took his phone and smashed it on YouTube, because Trump gave out his phone number. Trump drove that man crazy.
MILLIE WEAVER: Trump got in the way of the Big Game, a contest between contractors and subcontractors over who gets first dibs on defense, security and tech contracts.
[RED STATE RADIO TORE SAYS SHOW] TORE: Mueller, since I think it was August of 2016 was well aware that I had in my possessions portions of the DNC mirrored server in February and March, did you know that?
ROGER STONE: No, I did not.
TORE: And when my private life was collapsing, the same exact day – not without a minute of separation – I was served by Barack Hussein Obama’s attorney, three years later to come and talk about it. Did you know that?
ROGER STONE: I did not know that, either.
TORE: They went as hard as they could. Stone, the same thing. They went with nothing, look, Mueller called him in for these emails and talking about WikiLeaks – when I had actual portions of the DNC server, like even Mueller knew I had it.
PATRICK BERGY: Why did Mueller never call me back? When I went to him and told him about all this information and spoke to him for 15 minutes? Every one of these people are so corrupt. It’s not even funny.
TORE: The Swamp already knew, in August of 2016 that the information was compromised by people and they knew what type of people had accessed that information but they didn’t know who.
PATRICK BERGY: Some people will say, “Well, maybe they’re investigating.” Well, how can you investigate it, if you don’t ever call me back? And you don’t ever
really – because, there’s a lot of things that I need to be able to explain to them that I can’t say, outside of a classified environment.
So if they are investigating it, they certainly aren’t doing it with all the information.
TORE: Stop, stop, stop. We all know it was a fix!
MILLIE WEAVER: Did the DOJ outsource the Mueller Investigation to CGI?
TORE: Well, yes they did. So, I’ll tell you what happened. I actually, for my listeners on air, I interviewed former Acting Attorney General Whitaker.
[RED STATE RADIO TORE SAYS SHOW] TORE: I want to ask you something. You were Chief of Staff for Jeff Sessions, so there’s obviously contracts that are signed, like you know how you hire vendors?
I wanted to know why, during the Mueller probe, we spent over $40 million in waste management to a Canadian company that works with Canadian intelligence? Sounds like paper shredding.
FORMER ACTING AG MATTHEW WHITAKER: Yeah, this is the thing, we need watchdogs and something I did before I came to Washington, DC was run a watchdog group that asked these types of questions and to make sure that that there’s not waste, fraud, abuse.
TORE: So, why is our Department of Justice outsourcing to Canadian intelligence companies access to the Mueller Investigation?
MILLIE WEAVER: That definitely seems improper. Now, this Canadian company, how much were they paying? And were they paying them with tax dollars?
TORE: We have to ask ourselves why would we use federal tax dollars and upwards of $40 million to have them do paper shredding for Mueller and administrative tasks and emptying garbage cans? That sounds like a leaking opportunity! That sounds like, why are we getting foreign nationals involved in an investigation, that we’re supposedly investigating the President – the sitting President of the United States?
MILLIE WEAVER: From CGI’s involvement in the passport fiasco in 2008 to CGI involved in the Mueller Investigation we see how contractors have the ability to both perform and clean up their own dirty work.
TORE: I think it’s about time people understand what happened and I made it no secret that I know what happened.
So, Seth Rich worked for the DNC. He was asked, just like I, he was asked, “Hey, why don’t you go image the DNC server, right there, since you’re there for us, so we can keep it safe.” And he did so.
And he uploaded it where he was told. So, he uploaded it where he was supposed to. And there were a lot of “mes” that saw it, “mes” meaning a group of friends that I have, where we sit and talk String Theory and Predictive Analytics on the Undernet.
So, we find this and it’s like, “Whoa! Treasure trove!” Copied. And we fractioned it, so that way we can download it, because it was so massive. And that’s what happened.
So I’ll tell you what happened to Seth Rich. So, he did his job, as he was asked at the same time the RNC was also hacked. Again, Brennan’s MO. “Let’s hack!” And the hack was done on purpose, so you can delete information, insert information and of course, with them putting Cambridge Analytica and sending them over to President Trump – which was a trap, okay – that was a trap um you clearly can see.
They hacked the RNC – you mean, you had someone within the GOP do it for you, because no one died there. And yes, some of those emails escaped, because that is what was considered “mitigation”. You have to give them something really bad.
And so, when he saw that they had retroactively changed things; the stories and the rumors going in, seeing the Bernie Sanders elections were being stolen, the DNC was all about Hillary, not about real elections, that it was all rigged, he came in contact with a guy named Sean Lucas.
[OAN BROADCAST] SEAN LUCAS: We did make contact with somebody from the democratic national committee’s office and they’ve been served. Democracy has prevailed today.
TORE: So, they decided, oh yeah, maybe we can get it out to someone else. And it was not to Julian Assange, direct. And both of those guys are dead.
[OAN BROADCAST]: But in a bizarre twist of events on August 2nd less than one month after serving the subpoena, Lucas was reported dead.
TORE: Hillary’s emails were still being examined. They had to get rid of the evidence. And the only way that they can access the whole DNC server is if there was a breach and that’s how you can go in and change things.
This is why the FBI never asked for the server. That’s the real story. So, as Seth Rich thought, that what he was doing was correct, later on, he realized it was not. That’s why there was such a big gap. They didn’t need to find him, they needed to find out who had it and they already knew that I, myself had portions of the DNC server and others, in March and February.
Obama’s lawyer, for Seth Rich, three years later says, “You need to come and tell us about Seth Rich.”
I was like, “I don’t need to do anything. I don’t know who you’re trying to -”
“You’re being subpoenaed!”
“I can’t bring you anything because you’re three years too late.”
And for the record, usually, they’re going to be three minutes too late. You know, Hillary doesn’t have a patent on hammers or city dumps or Bleach Bit or, or, or…
MILLIE WEAVER: Didn’t CrowdStrike initially investigate the DNC server, creating the whole “Russia hacked the election” scenario?
[CNN BROADCAST. “TRUMP SLAMS ‘RIDICULOUS US INTEL ON RUSSIAN HACKING’”] DMITRI ALPEROVITCH: When the DNC hired us back in May, we actually came in and deployed our technology, called Falcon on all the systems inside that corporate network.
WOLF BLITZER: Who were these people that were actually doing the hacking of the DNC?
DMITRI ALPEROVITCH: There were two groups; two independently-working groups that we associate with Russian intelligence agencies. One of them was associated with GRU, the primary military intelligence agency in Russia.
PATRICK BERGY: CrowdStrike, owned by that Alperovitch guy, who is a Senior Advisor on the Atlantic Council!
When President Trump called up the Ukrainian President, what did he ask him for? The CrowdStrike servers, right? Again, all immediate, direct colleagues, like the brown bag lunch at this big star chamber that you can imagine existing there!
[DR. STRANGELOVE (1964)] PETER SELLERS: I’m sorry, Mr. President.
PATRICK BERGY: They’re all there! What can we do? Orange Man Bad! What are the statistical odds, of that Six Degrees of Kevin Bacon existing on virtually everybody connected to the Russian Dossier and the impeachment? The only other person that directly connected to both of them is President Trump – and he’s on the receiving end of it!
But yet you never hear this man’s name.
TORE: General Jones. That’s the guy that heads up ClearForce. That’s the guy that took Shadownet and made it what it is. That’s the guy that resold, reinvented Shadownet, to create the MagicWheel at the DC courts, to make sure that they get the most compromised juries put together for anyone that they didn’t want.
PATRICK BERGY: When General Jones was tapped as the Chairman of the Board of the Atlantic Council to replace Jon Huntsman, one of the first orders of business that he did with the Atlantic Council was to create a partnership with Facebook.
That happened a month after Mark Zuckerberg sat in front of Congress. [VIDEO]
[C-SPAN BROADCAST OF SENATE JUDICIARY & COMMERCE COMMITTEES JOINT HEARING] MARK ZUCKERBERG: I mean, they did not want their information to be sold to Cambridge Analytica by a developer and that happened. And it happened on our watch. So even though we didn’t do it, I think we have a responsibility to be able to prevent that and be able to take action sooner.
PATRICK BERGY: So, a month after they do that, Facebook partners with General Jones at the Atlantic Council to “restore election integrity worldwide”, right? So,
the best out of 7 billion people on the planet, Mark Zuckerberg picks the owner of the Shadownet.
[UNKNOWN BROADCAST]: President Donald Trump and Mike Pence both ran ads on Facebook that included a symbol of an upside down red triangle. Facebook today removed the ads.
[CBS THIS MORNING BROADCAST]: Facebook has taken action against what it calls “harmful misinformation” from President Trump. The company deleted a post by the President that included a false statement.
PATRICK BERGY: To “restore election integrity worldwide”. We all know that he was connected – directly-connected – to Cambridge Analytica, through PSYGroup and WikiStrat. So, essentially, what they did was they partnered with Cambridge Analytica, again.
MILLIE WEAVER: This also explains why Facebook went to Atlantic Council, aka Jones to fix the Cambridge Analytica problem. They needed to cover their IIA tracks.
What you’ve seen, with the recent riots surrounding George Floyd’s death, from your perspective, does that look like an IIA operation?
PATRICK BERGY: Absolutely. Nothing feels natural about what’s going on. More stuff is fake and fabricated, right now in the news than what’s actually real. When I say fake or fabricated, I mean like you have the truth and it’s being represented to you with a very specific slant. It’s so far beyond Russia spending some money on some Facebook ads, right? If you believe that, then they’ve already won.
TORE: So, that’s how it works.
MILLIE WEAVER: It’s like the movie, ‘Wag the Dog’, quite literally.
TORE: Well, you know, movies tell a lot of stories and it’s almost as if they’re making fun of us.
MILLIE WEAVER: They made fun of Alex Jones when he used to point out all these False Flags. I mean, I guess that’s just a term he was using, but if you actually look, what he was pointing out in a lot of instances was IIA operations.
[BBC BROADCAST ON 9/11. REPORTER DESCRIBES WTC 7 COLLAPSE 23 MINS BEFORE IT HAPPENED] MALE ANCHOR: Jane, what more can you tell us about the Salomon Brothers building and its collapse?
JANE: As you can see behind me, the Trade Center appears to be still burning we are getting information now that one of the other buildings, Building 7 in the World Trade Center complex is on fire and has either collapsed or is collapsing.
TORE: Well, but he didn’t know the term IIA, so it would be easier for people to understand someone’s “hacking your reality”, because now, in this day and age of computing, that makes more sense to people. They understand it more. “Oh, ‘hack my reality’! You mean, change the way I see things?”
And that is exactly what an IIA is. It’s just that it’s software churning out, “Oh, you need to do this, to get this outcome,” Kind of like using that Shadownet in the DC courts and saying, “Oh, Prosecutor, you want him to go to jail and you want a guilty verdict? Well, we’re going to have to pool it out. And then, when a pool of jury people come, all of them are potential to give you a guilty verdict.
So then, you pick from all the people that will give you a guilty verdict, so there’s no chance that you’ll win – and even Matt Whitaker said that on my on my show. He said the judges are corrupt.
MILLIE WEAVER: That’s a major problem for the justice system, if people are able to use that technology in jury selection to be able to predict who’s gonna you know throw their vote a certain way
TORE: Is anyone stopping them?
MILLIE WEAVER: That’s a major problem right there.
TORE: It is and roger stone with this commutation will solve it because this is where it all comes to the surface.
[RED STATE RADIO ‘TORE SAYS’ SHOW APRIL 22, 2020] TORE: How do you think your jury pool was selected?
ROGER STONE: Well obviously, I don’t know. I do know that, based on the statistics on the District of Columbia, that is that the statistical improbability of my jury having a single Republican should be impossible. The statistical impossibility of my jury having a single military veteran should be impossible. The statistical possibility of my jury having no jurors with less than a college education is impossible. But that was the case.
TORE: Well, what if I told you, Roger that your jury was actually selected. The jury pooled the grander jury pool right before the voidier, they say where you select and approve and deny – the majority of it was actually plugged into a program – but see this program wanted to select a jury pool that would get you a guilty verdict, no matter what.
Hence the odds, like you say are so far-fetched. So the question is, who was the company who was the vendor that was used to select your greater pool for the jury? And if your lawyer was to able to able to find that or ask that question, I would not be surprised if you see the name General Hayden pop up.
ROGER STONE: I do think it might strengthen the possibility of my appeal it, should that become necessary. I will never plead guilty to something I didn’t do. It’s a matter that does require some research and I appreciate you bringing it up.
MILLIE WEAVER: It’s amazing. It’s like ‘Minority Report’ in real time, today.
PATRICK BERGY: ClearForce is what they built. It’s the next iteration of the Shadownet. They took the cycle, they took the profile, personas and profile capabilities, they added real-time criminal background, travel, financial, medical, added all these things in, to create predictive behavioral profiles that determine whether or not you’re likely to steal or leak.
ClearForce actually sells this to HR, right? So, you could actually go into a job, apply for it, not get the job, because an application with an algorithm designed by Obama’s National Security Advisor and/or Obama’s CIA Director determined that you were predictively likely to steal or leak, in some ‘Minority Report’-like fashion – and you may never, ever steal or leak but you might lose a job, because something read all your posts and looked at your information and determined it.
KORE: Think about it. If people knew just how bad it is. Think about how many things he’s changing and how much money they’re taking. I mean, think of all the money they’re going to lose in contracting. He’s stopped the clearances.
Remember, “once you’re out now we pull your clearance”? He did that. Remember? So now, all the future generals or all the future intelligence community persons don’t get to use their clearance. If you’re out, it’s finished.
PATRICK BERGY: You guys were paying me, as taxpayers were paying me, as the Information Assurance Security Officer, to protect our National Security. So y’all should want to get to the bottom of this as much as anybody, as much as I do.
But it’s very personal to me, I won’t deny that.
TORE: When you have your [Joint Chiefs of Staff – General Dunford?] trying to usurp your president by penning in an anonymous letter to the New York Times, that’s a big problem.
MILLIE WEAVER: This is the biggest and boldest move towards the ultimate surveillance state ever made and it’s near completion.
Micromanaging this technology on a global scale would require integrating it with Artificial Intelligence. Imagine Artificial Intelligence autonomously operating the Shadownet and ClearForce.
Interpol’s 2019 publication, ‘Artificial Intelligence and Robotics for Law Enforcement’ reveals we are already there:
“Although films such as ‘Minority Report’ and ‘Robocop’ may not present the most attractive depiction of the future of advanced technologies in law enforcement, understanding how these technologies can be applied by law enforcement agencies for the safety and security of our global community is of critical importance.
[NBC BROADCAST OF POLICE DRONE]: Keep a safe distance of six feet from others.
MILLIE WEAVER: Short from a major PR rollout, there is an international push for autonomous law enforcement to remove the human factor. Several features of the Interpol program indicate that they are using an iteration of Shadownet and ClearForce technology. This March 2017 United States Patent issued to Jim Jones III and ClearForce spells it out:
“Systems and methods for electronically monitoring humans to determine potential risk.” Several diagrams in this patent look identical to the dashboard layout of the Shadownet the patent mentions integration with US and international databases, local law enforcement and individual state databases, all
fed into international justice and public safety networks. Full integration of all data including the Internet of Things is the objective.
A March 2020 Atlantic Council policy primer, ‘AI, Society and Governance’ references the 2019 Interpol publication, stating “The United Nations Inter- Regional Crime and Justice Research Institute and the International Criminal Police Organization are leading the conversation on autonomous patrol robots, tracking and tracing systems, forecasting tools predictive policing and more.”
The next iteration of the Shadownet and ClearForce is ready to go. Integration with AI robots and the replacement of traditional law enforcement is just around the corner. Given that Leftist organizations managed by Momentum, which is behind the “Defund the Police” movement and given that Momentum has been connected to IIA operations, the case can be made that Jones & CO. are running the “Defund the Police” influence operation, simply because they are in a position to benefit, by offering an alternative solution that is already in line with the Green New Deal agenda.
We’ve already seen some of this rolled out, with the technocratic response to COVID19, with autonomous drones, contact tracing apps, nanotech vaccines and predictive modeling for social distancing and economic shutdowns.
Furthermore, this technology is behind the push for police abolition, defunding law enforcement and replacing it with “Smart Justice”, given we have seen IIA Shadownet technology, implemented by the Socialist Democrats and THE Sunrise Movement, who are using it to push for police abolition, this political movement is deeply connected to the UN who has partnered with Interpol to corral us into the Artificial Intelligence and Robotics for Law Enforcement direction.
Obama meeting could be behind corrupt Michael Flynn probe
“President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia,” National Security Adviser Susan Rice wrote in an unusual e-mail to herself about the meeting, which was also attended by Deputy Attorney General Sally Yates, FBI Director James Comey and Vice President Joe Biden.
A clearer picture is emerging of the drastic steps that were taken to accomplish Obama’s goal in the following weeks and months. Shortly thereafter, high-level operatives began intensely leaking selective information supporting a supposed Russia-Trump conspiracy theory, the incoming national security adviser was ambushed, and the incoming attorney general was forced to recuse himself from oversight of investigations of President Trump. At each major point in the operation, explosive media leaks were a key strategy in the operation to take down Trump.
Not only was information on Russia not fully shared with the incoming Trump team, as Obama directed, the leaks and ambushes made the transition chaotic, scared quality individuals away from working in the administration, made effective governance almost impossible and materially damaged national security. When Comey was finally fired on May 9, in part for his duplicitousness regarding his handling of the Russia-collusion theory, he orchestrated the launch of a special counsel probe that continued his efforts for another two years. That probe ended with Robert Mueller finding no evidence of any American colluding with Russia to steal the 2016 election.
This analysis of the timeline from early 2017 shows a clear pattern of behavior from the federal officials running the collusion operation against the Trump campaign. It also shows how essential media leaks were to their strategy to cripple the ability of the incoming administration to run the country.
Jan. 4: Following the closure of a pretextually dubious and politically motivated FBI investigation of Flynn at the beginning of January, the leadership of the FBI scrambled to reopen a case against Flynn, the man who, in his role as national security adviser would have to review their Russia-collusion investigation. FBI officials openly discussed their concern about briefing the veteran intelligence official on what they had done to the Trump campaign and transition team and what they were planning to do to the incoming Trump administration. Flynn had to be dealt with. The FBI’s top counterintelligence official would later memorialize discussions about the FBI’s attempts to “get [Flynn] fired.” No reopening was needed, they determined, when they discovered they had failed to close the previous investigation. They found this mistake “amazing” and “serendipitously good” and said “our utter incompetence actually helps us.” Even more noteworthy were texts from the FBI’s No. 2 counterintelligence official, Peter Strzok, to FBI lawyer Lisa Page noting that the “7th floor,” a reference to Comey and his deputy director, Andrew McCabe, was running the show.
Jan. 5: Yates, Comey, CIA Director John Brennan, and Director of National Intelligence James Clapper briefed Obama on Russia-related matters in the Oval Office. Biden and Rice also attended. After the Obama briefing, the intelligence chiefs who would be leaving at the end of the term were dismissed and Yates and Comey, who would continue in the Trump administration, were asked to stay. Not only did Obama give his guidance about how to perpetuate the Russia-collusion-theory investigations, he also talked about Flynn’s conversations with Russian Ambassador Sergey Kislyak, according to both Comey and Yates. Interestingly, Clapper, Comey and Yates all said that they did not brief Obama about these phone calls. Rice likely briefed Obama on the calls and would have had access to the intelligence. Comey mentions the Logan Act at this meeting.
Pence said he'd be 'happy' to see Michael Flynn return to White House
Jan. 6: An ostensibly similar briefing about Russian interference efforts during the 2016 campaign was given to President-elect Trump. After that briefing, Comey privately briefed Trump on the most salacious and absurd “pee tape” allegation in the Christopher Steele dossier, a document the FBI had already used to obtain a warrant to spy on Trump campaign affiliate Carter Page. He did not mention the dossier was completely unverified or that it was the product of a secretly funded operation by the Clinton campaign and the Democratic National Committee.
Jan. 10: In an amazing coincidence, CNN found the excuse to publish the Russia claims after a high-level Obama intelligence operative leaked that Comey had briefed Trump about the dossier. This selective leak, which was credulously accepted by CNN reporters Evan Perez, Jim Sciutto, Jake Tapper and Carl Bernstein, may have been the most important step in the operation to harm the incoming administration. The leak of the briefing of Trump was used to legitimize a ridiculous dossier full of allegations the FBI knew to be false and that insinuated he was being blackmailed by Russia.
Jan. 12: The next part of the strategy was the explosive leak to David Ignatius of The Washington Post to legitimize the use against Flynn of the Logan Act, a likely unconstitutional 1799 law prohibiting private individuals, not public incoming national-security advisers, from discussing foreign policy with foreign governments. Ignatius accepted the leak from an Obama official. He wrote that Flynn had called Kislyak. “What did Flynn say, and did it undercut the US sanctions?”
Flynn’s routine and appropriate phone call became fodder for a developing grand conspiracy theory of Russia collusion. In discussions with investigators, both DOJ’s Mary McCord and Comey conspicuously cite this Ignatius column as somehow meaningful in the approach they would take with Flynn. The leak-fueled Ignatius column would later be used by FBI officials to justify an illegal ambush interview of Flynn in the White House.
Jan. 24: Comey later admitted he broke every protocol to send agents to interview Flynn and try to catch him in a lie. FBI officials strategized how to keep Flynn from knowing he was a target of the investigation or asking for an attorney to represent him in the interview. A leak-based Jan. 23 Washington Post article that falsely stated that Flynn was not an FBI target was key to that strategy. Although the interviewing agents said they could detect no “tells” indicating he lied, he later was induced to plead guilty to lying in this interview. Presumably in light of what Flynn had told them about the calls, Yates would go to the White House the next day and insinuate Flynn should probably be fired.
Feb. 9: The strategy to get Flynn fired didn’t immediately work so another leak was deployed to Greg Miller, Adam Entous and Ellen Nakashima of The Washington Post. That article, headline “National Security Adviser Flynn Discussed Sanctions with Russian Ambassador, Despite Denials, Officials Say,” was sourced to people who happened to share senior FBI leadership’s views on the Logan Act. This article was also based on criminal leaks of top-secret information of phone call intercepts and laid out the FBI’s case for why Flynn’s contacts with a foreign adversary were a problem. The fact that such phone calls are routine, not to mention Flynn’s case that improved relations with Russia when China, North Korea and Iran were posing increasing threats, never made it into these articles for context.
Feb. 13: The operation finally succeeded in getting Flynn fired.
New WH press secretary makes plea for Flynn case to be taken 'very seriously'
March 2: Sessions recused himself from oversight of the FBI’s anti-Trump operation, providing no meaningful oversight to an operation that would be spun into a special counsel by mid-May. With the removal of Trump’s national security adviser and his attorney general, there was no longer any chance of Trump loyalists discovering what Obama holdovers at the FBI were actually doing to get Trump thrown out of office. After Trump fired Comey for managerial incompetence on May 9, deceptively edited and misleading leaks to The New York Times, ordered by Comey himself, were used to gin up a special-counsel run exclusively by left-wing anti-Trump partisans who continued the operation without any meaningful oversight for another two years.
This stunning operation was not just a typical battle between political foes, nor merely an example of media bias against political enemies. Instead, this entire operation was a deliberate and direct attack on the foundation of American governance. In light of the newly declassified documents released in recent days, it is clear that understanding what happened in that Jan. 5 Oval Office meeting is essential to understanding the full scope and breadth of the corrupt operation against the Trump administration. It is long past time for lawmakers in Congress who are actually interested in oversight of the federal government and the media to demand answers about what really happened in that meeting from every single participant, including Obama and Biden.
Mollie Ziegler Hemingway is a senior editor at The Federalist,
Six big lies you have been told about Russiagate
‘Russian meddling’ in the 2016 US presidential election has become an article of faith, not just among Democrats but many Republicans as well, thanks to the endless repetition of vague talking points, none of which hold water.
With a little help from the mainstream media, which overwhelmingly endorsed Clinton and predicted her victory, her efforts to cover up her email scandal turned into Russia “hacking our democracy,” eventually spawning the ‘Russiagate’ investigation led by Special Counsel Robert Mueller and a series of failed attempts to derail Trump’s election and oust him from the White House.
Lie #1: Russia hacked the DNC
ALSO ON RT.COM
CrowdStrike’s president, ex-FBI official Shawn Henry, testified that they “saw activity that we believed was consistent with activity we'd seen previously and had associated with the Russian Government.” [emphasis added]
In the same testimony, Henry also testified that CrowdStrike never had any evidence the data was actually “exfiltrated,” i.e. stolen from the DNC servers.
CrowdStrike’s feelings about the hack remain the only “evidence” so far, since the FBI never asked them or the DNC for the actual server, as Henry also confirmed. Meanwhile, former NSA official and whistleblower William Binney argued back in November 2017 that actual evidence showed a leak from the inside, not a hack.
‘Zero evidence’ that Russia hacked DNC, says NSA whistleblower (VIDEO)
Instead, the key argument that WikiLeaks was somehow ‘colluding’ with Russia over the publication of the emails rests on a conspiracy theory promoted by the Clinton campaign staff, after RT reported on a fresh batch of emails before WikiLeaks got around to tweeting about them – but after they were published on the website and available to anyone willing to do actual journalism.
RT beats internet to break #Podestaemails6 & everybody loses their minds (conspiracy theory warning)
Lie #3: The Steele ‘pee tape’ dossier was irrelevant
It was clearly ridiculous and entirely evidence-free. Democrats claimed it played no role in Russia investigations. Yet the FBI paid Steele for information from the dossier, and used it to justify a FISA warrant for the surveillance of Trump campaign aide Carter Page – and with him the campaign itself – starting right before the election, and renewed three times.
‘Spygate’ update: At least two FISA warrants to spy on Carter Page were ‘not valid,’ DOJ says
Lie #4: General Michael Flynn treasonously colluded with Russia and lied about it to the FBI
After FBI Director James Comey was fired by Trump in May 2017, he told the media the president had urged him to drop the investigation of Flynn, which was quickly construed as “obstruction” and used as one of the pretexts to appoint Robert Mueller as special counsel into Russiagate.
‘Get him to lie so we can prosecute him’: New docs reveal FBI plan to set up General Flynn in perjury trap
Flynn didn’t even lie to Strzok and the other agent interviewing him – and the memo of that conversation had been first heavily edited, then destroyed. Basically, everything about the Flynn case has been as false as ABC’s December 2017 bombshell report about his “collusion” with Russia that got Brian Ross fired.
ABC’s fake news about Flynn & Russia causes stocks to crash
A Russian company named in one of the indictments actually contested it in a US court and won. First, a federal judge slapped down Mueller’s prosecutors for violating rules by presenting allegations as “established” and “confirmed” facts and ruling that no link was actually established behind a catering company accused of “sowing discord” on social media – a far cry from hacking the DNC! – and the Russian government.
Another nail in Russiagate coffin? Federal judge destroys key Mueller report claim
Lie #6: Paul Manafort was Trump’s conduit to Russia
Collusion with… Ukraine? NY Times corrects its bombshell ‘Russiagate’ report
The Ukrainian officials who leaked the so-called “black ledger” implicating Manafort to the US media were even convicted of election meddling by a court in Kiev, and the whole thing may have been solicited by a Ukrainian-American DNC contractor… The US media have been curiously uninterested in that particular “collusion,” needless to say.
DNC contractor asked Ukrainian Embassy for dirt on Trump campaign, envoy confirms
The charge is vague enough that it can mean anything, and deliberately so. No evidence is ever offered, because there isn’t any – as the years of investigations and boxes full of documents have clearly shown.
Senate Report On Hunter Biden Corruption Is DEVASTATING–Ties to Ukraine, China, Moscow, and Suspected Human Trafficking Ring
Source: Senate Ukraine Report
For a guy who appeared to like to get paid for doing nothing, Hunter Biden sure was busy!
The Senate Committee on Homeland Security and Governmental Affairs (HSGAC) and the Committee on Finance have released their report on Hunter Biden and it is an 87-page wild ride!
Senate Finance Committee Chairman Charles Grassley(R-IA) launched the investigation after he raised concerns over conflict-of-interest regarding the sale of a U.S. company to a Chinese firm that had ties to Hunter Biden. Senator Grassley had sounded the alarm in August 2019–approximately four months before a whistleblower complaint was made regarding President Trump’s phone call to the newly-elected Ukrainian President which prompted Democrats to move to impeach the President.
Here’s the TL;DR version of the most interesting points:
Hunter Biden received a $3.5 million wire transfer from Elena Baturina, the wife of the mayor of Moscow.
We knew that Hunter was kinda skeezy in his personal relationships, but paying for prostitutes who were trafficked seems to be a whole new level of skeeze.
The financial connections to the Chinese military personnel seems odd when Joe has sent manufacturing jobs over there and said that the Chinese government are “not bad folks, folks!”
Joe knew how Hunter’s Burisma ties looked and didn’t do a damned thing. Probably because everyone thought that Crooked Hillary was going to win in 2016 and it wouldn’t have been an issue.
More interesting tidbits summarized:
Former Secretary of State John Kerry apparently lied in 2019 when he said he didn’t know about Hunter’s role on Burisma’s board.
In early 2015 the former Acting Deputy Chief of Mission at the U.S. Embassy in Kyiv, Ukraine, George Kent, raised concerns to officials in Vice President Joe Biden’s office about the perception of a conflict of interest with respect to Hunter Biden’s role on Burisma’s board. Kent’s concerns went unaddressed, and in September 2016, he emphasized in an email to his colleagues, “Furthermore, the presence of Hunter Biden on the Burisma board was very awkward for all U.S. officials pushing an anticorruption agenda in Ukraine.”
CIA Director Haspel and the Anti-Trump Conspirators
What is most interesting is the timing of Gina Haspel's last tour as London Station Chief -- from 2014 to early 2017. That is the same timeframe (specifically, the late summer of 2016) when the FBI approached foreign policy academic and "utility government operative" Stefan Halper to begin the operation targeting Carter Page and George Papadopoulos in an FBI-designed foreign counterintelligence operation, against Team Trump, to be launched in Cambridge, England.
The CIA Station Chief is the top intelligence official in any given country. The FBI must inform the Station Chief of what they planned to do and get Station Chief approval. The FBI hates that, but those are the rules. Because the various intelligence agencies are sensitive, they do not use the word "approved." Instead, they use the word "coordinated." Jargon aside, nothing would have happened without Haspel's okay.
That carried forward to a more sophisticated and aggressive plan to carry out a soft coup against President Trump. People around President Trump were prosecuted and/or had their lives destroyed based on a scheme of U.S. government lies. Who appears to have been "in on it" from Day One? Gina Haspel.
The FBI is not allowed to penetrate and subvert a presidential campaign. Executive Order 12333, Section 2.9, "Undisclosed Participation in Organizations in the United States," prohibits it in plain language... That legal prohibition is the reason the FBI felt the need to manufacture a "foreign counterintelligence threat" in the UK and then "import" the investigation back into the United States.
Pictured: CIA Director Gina Haspel (center) arrives at the U.S. Capitol on January 8, 2020 in Washington, DC. (Photo by Drew Angerer/Getty Images)
Gina Haspel is the Director of the Central Intelligence Agency (CIA). Haspel is the first career clandestine service officer to become director, and the first woman. She was the CIA Chief of Station in London -- twice, and that repeat assignment is very unusual. What is most interesting is the timing of Haspel's last tour as London Station Chief -- from 2014 to early 2017. That is the same timeframe (specifically, the late summer of 2016) when the FBI approached foreign policy academic and "utility government operative" Stefan Halper to begin the operation targeting Carter Page and George Papadopoulos in an FBI-designed foreign counterintelligence operation, against Team Trump, to be launched in Cambridge, England.
Nothing speculative here -- the Justice Department Inspector General pegged the exact date of the FBI/Halper meeting as August 10, 2016. Halper had been on contract (again) with the U.S. government since the Iowa Caucuses began in October 2015. For the sake of brevity, I am not discussing Halper's role in targeting former Defense Intelligence Agency Director, Lieutenant General Mike Flynn. That is another column for another day -- and certainly Haspel knows a great deal about that, as well.
The timeframe (2014-2017) matters, because Haspel, as London Station Chief would have been briefed on the FBI's counterintelligence plan before any actions were approved to go forward. The CIA Station Chief is the top intelligence official in any given country. The FBI must inform the Station Chief of what they planned to do and get Station Chief approval. The FBI hates that, but those are the rules. Because the various intelligence agencies are sensitive, they do not use the word "approved." Instead, they use the word "coordinated." Jargon aside, nothing would have happened without Haspel's okay.
Think about this for a while: The current CIA director was an active, knowledgeable party to the efforts to target candidate Trump with a contrived foreign counterintelligence investigation. That carried forward to a more sophisticated and aggressive plan to carry out a soft coup against President Trump. People around President Trump were prosecuted and/or had their lives destroyed based on a scheme of U.S. government lies. Who appears to have been "in on it" from day one? Gina Haspel.
So, when we read in an article by Sean Davis, co-founder of The Federalist, that Haspel is personally resisting the declassification and release of records on "Russiagate," we are not surprised. In fact, we are relieved, because a few of us have been shouting from the mountaintops about Haspel for years, to no avail. The smarmy James Comey is easier to identify and loathe than the elusive Haspel.
For those seeking more information on Haspel, Shane Harris of the Washington Post wrote a nauseating hagiography of Haspel in July 2019. Consistent with WaPo's standards there are several factual errors and loads of opinion masquerading as "tough reporting." Harris (and one assumes Haspel) makes sure readers know that Haspel and company "boils down" presidential intelligence briefings to "a few key points that they think Trump absolutely needs to know." We are supposed to also believe that "Trump favors pictures and graphics over text." Of course, the CIA director's office did not cooperate with Harris. No, not at all.
The FBI is not allowed to penetrate and subvert a presidential campaign. Executive Order 12333, Section 2.9, "Undisclosed Participation in Organizations in the United States," prohibits it in plain language. Historically, the prohibition is a consequence of U.S. Army Counterintelligence penetrating Students for a Democratic Society (SDS) at the behest of the FBI during the 1960s -- among other abuses of power and authority. That legal prohibition is the reason the FBI felt the need to manufacture a "foreign counterintelligence threat" in the UK and then "import" the investigation back into the United States.
The FBI plotters needed to establish a foreign counterintelligence "event" to run their operation. The UK was the easiest and operationally safest/friendliest place to pull it off, especially with Stefan Halper's connections to Cambridge. Haspel was clearly fully informed and had "coordinated" the operation. She also enjoyed cordial relationships with MI6 and GCHQ. Now we (largely, but imperfectly) know what transpired. Halper under oath, in public, would fill in a lot of blanks. Gina Haspel, under the same circumstances and conditions, might just complete the puzzle. Should President Trump be reelected, it might just happen. A President Biden guarantees we will never hear another syllable of the rest of the story.
Chris Farrell is a former counterintelligence case officer. For the past 20 years, he has served as the Director of Investigations & Research for Judicial Watch. The views expressed are the author's alone, and not necessarily those of Judicial Watch.
Steele’s Subsource Outed, Brookings Targeted
He is Igor “Izzy” Danchenko and, contrary to the steady diet of fake news peddled to the American population, he is not some deep Russian agent working closely with Vladimir Putin. Danchenko’s identity was confirmed by his lawyer to the New York Times.
Instead of being a deeply placed Russian operative, Danchenko is a paid employee of Christopher Steele’s Orbis Business Intelligence, living right here in the U.S.A., with a long association with the Brookings Institution right here in Washington, D.C. Danchenko, born in Ukraine and educated in Russia, used his group of high school and college friends in Russia to create the hot, false, completely defamatory and salacious legends and gossip about Trump and Putin, which much of the U.S. and world elite proceeded to swallow whole and endlessly regurgitate to the public.
The FBI interviewed Danchenko in late January of 2017 and Danchenko told them, in effect, that Steele had perpetrated one of the biggest intelligence hoaxes in history concerning President Donald Trump. Knowing this, the top levels of the FBI and the Department of Justice continued their Trump/Russia inquisition, continuing the use of the fake dossier to predicate FISA spying operations against the Trump Presidency and arranging the appointment of Robert Mueller, in May 2017. Mueller and his gang of Democratic Party lawyers conducted a three-year Trump/Russia investigation, predicated on Steele’s fake dossier, aimed solely at delegitimizing the Trump Presidency and terrorizing and prosecuting any individual who chose to join the Trump Administration.
The Christopher Steele hoax is only equaled by the “Russians hacked the DNC and delivered the documents to WikiLeaks” hoax which has been thoroughly debunked by former NSA Technical Director William Binney and his team. Again, this hoax has been disproven by Binney’s forensic studies in 2017-2019, but also by the DNC’s vendor, CrowdStrike, in its testimony to the House Intelligence Committee as of December 2017. With evidence pointing to the CIA’s Vault 7, Marble Framework as the source of the Russia hack legend, the CIA, under Mike Pompeo and Gina Haspel went on a jihad against WikiLeaks’ Julian Assange, arranging his imprisonment in order to prevent the actual source of the WikiLeaks 2016 files from the DNC and John Podesta from being known and to continue to perpetrate the Russian hacking hoax. Binney and Kurt Wiebe, another former NSA analyst, made this abundantly clear in a widely attended press conference convened by the Schiller Institute on July 23rd.
As summarized by Paul Sperry and RealClearInvestigations, Steele’s primary subsource:
“Danchenko, was arrested, jailed, and convicted on multiple public drunkenness and disorderly conduct charges in the Washington area. A 2013 drunkenness case against Danchenko was prosecuted by then-U.S. Attorney Rod Rosenstein, who ended up signing one of the FBI’s dossier-based wiretap warrants as deputy attorney general in 2017.
• “Interview notes from a 2017 FBI interview with Danchenko report that he confessed he had no inside line to the Kremlin and was ‘clueless’ when Steele hired him in March 2016 to investigate ties between Russia and Trump and his campaign manager.
• “Desperate for leads, he told the FBI, he turned to a ragtag group of Russian and American journalists, drinking buddies, including one who’d been arrested on pornography charges.
• “Strobe Talbott, a former Clinton Administration official who was president of Brookings, passed along a copy of his anti-Trump dossier to Fiona Hill who worked closely with Izzy and later joined the Trump Administration National Security Council.
• “Talbott’s brother-in-law is Cody Shearer, another old Clinton hand who disseminated his own dossier in 2016, which echoed many of the same lurid and unsubstantiated claims against Trump.
• “In August 2016, Talbott personally called Steele, based in London, to offer his own input on the dossier he was compiling from Danchenko’s feeds.
• “After Trump’s surprise win, Talbott and Steele strategized about how they should “handle” the dossier going forward.”
The internet sleuths point to Danchenko authoring papers not just with Fiona Hill, a key witness in the Trump Ukrainegate impeachment farce, but also with Hill’s colleague at Brookings, Cliff Gaddy. They document that Gaddy played a major role in mentoring Danchenko while at Brookings. Gaddy and Hill are authors of the faulty handbook employed by most of the U.S. intelligence community and Joe Biden to analyze Putin’s background and motives, Mr. Putin: Operative in the Kremlin.
House Intelligence Committee ranking member Rep. Devin Nunes, appearing on Fox News’ “Sunday Morning Futures” on July 26th, called for a full-scale investigation of Brookings’ operations in the insurrection against Donald Trump including examination of the think-tank’s tax- exempt status. Nunes pointed not only to Talbott’s role with Steele but also to the Lawfare blog associated with James Comey crony Benjamin Wittes, which has played a major role in turning lawyers into an insurrectionary force against the President. Lawfare is associated with Brookings. It would be hoped that Nunes would extend his investigations to such other keystone British imperial institutions as the Atlantic Council, which has been a central coordinating center for the insurrection against Trump.
© 2018 All Rights Reserved. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners. .......Tags: "israel nuked wtc" 9-11 Truth jfk assassination "cultural marxism" "holocaust hoax" "fake news" "fake history" fed censorship "mind control" tavistock holohoax auschwitz deep state kabbalah talmud bush obama clinton trump russiagate spygate israel britain saudi arabia middle east rothschild cold war comey brennan clapper yellow vests populism nuclear demolition communism marxism socialism pedophiliacontact: email@example.com