Q (or QAnon) is a counterinsurgency operation.

It is a response to the social media warfare that the military industrial complex has been waging against us for more than a decade.
Private contractors operating as intelligence agencies have been spying on Congress and we should assume that until these contractors are dismantled, all members of Congress are potentially compromised.
Data about members of Congress is collected and then used when needed. The member is blackmailed by whatever information the private contractor has.
Combine this leverage with the fact that these private intelligence contractors routinely create social media personas and control what the mainstream media says.
You have a situation where the media is frantically anti-Q, and members of Congress may be frantically anti-Q, because of the chokehold that the MIC (military industrial complex - interesting that the acronym is "microphone" - has over them).
The part about Q is my conclusion based on watching "What They Don't Want You To See," a documentary by @Millie__Weaver, who does not mention Q in the show.
It now makes total sense to me. The MIC has been exerting tremendous effort to keep us enthralled by their narrative. They are thus deploying all available assets to repress a voice that could break their hold over us.
Incredibly, the coup is being effected not by events on the ground, but by an army of fake bots, fueled by real people, attempting to create the PERCEPTION of events on the ground.
The perception of events on the ground is supposed to shape our opinion, and effect the overthrow of President Trump, who refused to use psychological operations against us. (Q is a psyop based on deprogramming the public.)
Obama had not yet been elected when the IIA (interactive internet activities) memo was released in 2007. It was then that Bergy set out to change the nature of psyops.

https://fas.org/sgp/othergov/dod/dod060807.pdf
Bergy: "We began that [IIA] really in 2007 when right after the policy guidelines first came up, we were on one of the first contracts with the DOD that I'm aware of,"
"trying to help the...Psychological Operations Group understand how to go from dropping flyers from planes to a more micro-targeted social media, psychological warfare application where you could select an individual target or a group target, an entire country if you want to."
"you find a group of people...and you kind of try to get in their mind...what drives them nuts, what upsets them, what makes them happy, and then you use that tier advantage to push whatever ideology or product or direction you want them to go"
(a bit tired - taking a break :-)
The thread continues. Patrick Bergy created a program that took psychological operations to the next level. Instead of relying on in-person assessment to manipulate foreign audiences, massive amount of data did the work of predictive market research.
This is all marketing. I used to be fascinated by psychological operations. And now I know why. The Army had tools that far superseded anything the normal civilian was using to attract the audience's interest.
The United States used psychological operations to literally change the outcome of an election in another country because it was in our strategic interest. That makes sense.

But the dangerous part was when that process BOTH became automated AND was used to subvert the election.
Automation meant that the time-consuming work of getting to know people did not have to happen - surveillance turned a human job inhumane.

The technology got into the wrong hands and was used without any ethical limitations.
Remember that what you and I are just discovering, has been known inside the Beltway for more than a decade.
More than a decade.
MORE THAN A DECADE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
ARE YOU ANGRY YET?
LISTENING TO ALL THIS BULL SHIT ON THE TV?
THEY HAD A DOD MEMO TELL THEM TO DO IT!
Looking at the memo, you would never know what was actually happening: There was a clear chain of command; contractors were only supposed to communicate using the Internet under strict government oversight.
https://fas.org/sgp/othergov/dod/dod060807.pdf
But it is clear that the ideal espoused in the memorandum was not followed in practice.

In addition, when the Smith-Mundt Act was "modernized" by Obama in 2012, it became allowable to use propaganda on the American people.

A toxic brew.
Bergy: "The database component ends up allowing you to build behavioral profiles on individual targets....with enough information about someone, you can predictably determine how they're gonna react."
Did we know that the military was compiling extensive data on people (surveillance through Facebook et al), using artificial intelligence to mash that up, and emerging with a profile of each person that could be used to "know" them without knowing them, and attack them?
Bergy explains that the company he worked for, Dynology, "kept the intellectual property rights to it...and...re-marketed it, branded it commercially as the ShadowNet."
Think about this in context: We the citizens are being attacked by a COMBINATION of

> social media-based data collection (surveillance)

> AI-based behavioral profiling

RESULTING IN

> effective environmental cues and triggers

AIMED AT

> behavioral manipulation.
What exactly was the ShadowNet of 2007?

Bergy called it: "targeted, covert, social media psychological warfare capabilities"

https://www.victimoftheswamp.com/2018/10/01/whatistheshadownet/
Bergy: "It was an incredibly capable information operations project management tool capable of the same covert, social media psychological warfare the FBI just indicted 13 Russian’s for."
Bergy can't tell us everything: "I won’t discuss any specific missions or the dissemination process as it relates to my time in Iraq, or after the ShadowNet program was massively expanded immediately after president Obama took office."
Bergy: "What I can discuss is what the ShadowNet was after Dynology, which was a small, family owned defense contracting company, owned by Obama’s Nat Sec Advisor, Gen. James Jones, did with the application & database when it was made commercially available 2 the public."
Bergy describes ShadowNet as "the playbook for everything you have seen democrat leadership create, from the Russian dossier, to the Ukrainian election influence operation on 2010 (educated guess, not proven) and even the circus you’ve witnessed during the Kavanaugh inquisition."
Shadownet: "an incredibly capable information operations project management tool"
an "application and database"
Database - a series of fields containing data

Application - crunch the data in the database on a massive scale by identifying people according to the label they inhabit (e.g. "influencers" "vegans" "forward thinkers" or anything else)

Project management-harness above 4 result
Bergy: "After losing the rebid for another year in Iraq, I returned to CENTCOM and continued to expand the program, taking the things we learned along the way and improved it. The company I worked for, Dynology, kept the intellectual property rights to the ShadowNet and iPsy."
Bergy: "think about everything you have witnessed with respect to Russian collusion, DNC email hacking/social engineering. Heck, for that matter, do you think the women showing up to attack Jeff Flake was an accident?"
"These kind of 'flash' events are exactly what the ShadowNet and iPsy was built to manage."
"From coordinating the person dropping the women off, access to the elevator, and likely multiple fake, anonymized personae used to disseminate the video taken from by-standers as quickly as possible, using the most current search engine optimization capabilities."
In the hands of private companies, the psychological operations technology could be used in an unfettered way.

Bergy is telling us here that real live people played roles in scripted situations which were then amplified by fake personalities online, tagged to maximize reach.
Funny that Bergy should mention Jeff Flake.

Here's women fakely confronting him before the Kavanaugh vote. (That too was an operation.)
Here is Flake insisting that Q is fake.
I think Flake is the fake.
https://twitter.com/JeffFlake/status/1294445424678277121?s=20
Let's end Part II of this study on the Millie Weaver video here.
@threader_app compile
You can follow @DrDannielle.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.