Richard Clarke airs suspicions over Sept. 11 intel failures

Author Topic: Richard Clarke airs suspicions over Sept. 11 intel failures  (Read 18196 times)

0 Members and 1 Guest are viewing this topic.

Offline Eckhart Tolle

  • Member
  • *****
  • Posts: 2,510
Richard Clarke airs suspicions over Sept. 11 intel failures
« on: August 11, 2011, 11:07:58 PM »




Clarke airs suspicions over Sept. 11 intel failures

Posted at 04:28 PM ET, 08/11/2011

By Greg Miller

Often depicted as allies in the fight against al-Qaeda before the Sept. 11 attacks, Richard Clarke and George Tenet resurfaced this week with new recriminations over intelligence breakdowns and blame.

Clarke, who served in two administrations as a White House counter-terrorism adviser, started the squabble by saying he now suspects the CIA hid its knowledge that two of the Sept. 11 hijackers had entered the United States because the agency had tried – and failed – to recruit them as informants.

Clarke acknowledged his theory is not based on any evidence in a forthcoming documentary, according to a copy of the interview provided to the Post. But he says it is “the only conceivable reason that I’ve been able to come up with” to explain why the CIA failed to inform the FBI or the White House of the would-be hijackers presence.

Clarke goes on to say he believes “there was a high-level decision in the CIA ordering people not to share information,” all but pointing a finger at the CIA Director at the time, George J. Tenet.

Tenet, who has kept a low public profile since leaving the agency, posted a sharply worded statement on his Web site saying Clarke “was an able public servant” but that “his recently released comments about the run up to 9/11 are reckless and profoundly wrong.”

The statement was also attributed to two other senior CIA officials apparently named in the documentary: Cofer Black, who was the head of the counter-terrorism center; and Richard Blee, who served as chief of the agency’s Osama bin Laden unit.

The documentary, called “Who is Richard Blee?” and produced by FF4 Films, is timed to the 10th anniversary of the attacks. The Clarke interview is scheduled to appear for the first time Thursday night, on a PBS station in Colorado and on the Web site SecrecyKills.com. News of it was first reported in The Daily Beast.


READ MORE:
http://www.washingtonpost.com/blogs/checkpoint-washington/post/clarke-airs-suspicions-over-sept-11-intelligence-failures/2011/08/11/gIQAx33K9I_blog.html

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #1 on: August 11, 2011, 11:51:57 PM »
Jeddah, Visa Express & J. Michael Springmann
http://www.youtube.com/watch?v=iw6YHij-aCU
 
J. Michael Springmann - A 20-year veteran of the State Department's Foreign service, J. Michael Springmann served 18 months as the head of the visa section at the U.S. consulate in Jeddah, Saudi Arabia in 1988-89. During that time he repeatedly rejected visa applications from unqualified individuals only to have his decisions overturned by the head of the consulate. When he returned to Washington, he discovered that the Jeddah consulate was being used as a place for funnelling Afghan mujahedeen into the U.S. for training, facilitated by the CIA on behalf of their asset, Osama bin Laden. The Jeddah consulate would be the very office that issued 15 of the alleged 9/11 hijackers' visas to enter the United States. After numerous complaints up the chain of command, Springmann's contract with the State Department was not renewed.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #2 on: August 12, 2011, 12:04:05 AM »
If the planes were remote controlled, what was the point of the 19 hijackers?

If the planes were remote controlled through Ptech's e-Enterprise Architecture's backdoors, what was the point of the 19 hijackers?

I was debating someone about 9/11 and they brought up this good question.  The main purpose of the hijackers was a cover story to fool compartmentalized federal agents to follow a diversion (See as the "Phoenix Memo") and to fool the general public.

The irony was that whatever RAND/CSIS/Booz Allen Hamilton wargamer invented the 19 hijackers fable accidentally picked the wrong country... Saudi Arabia, instead of Iraq.

To keep up the confabulation, most neocon brainwashed fluoridated idiots who make up the lower ranks of the RMA-influenced organizations think all non-Israel middle eastern countries are one in the same thing.

The 9/11 commission report blamed al-Qaeda for causing the attacks, and al-Qaeda is international.  As Alex Jones accurately points out, al-Qadea is a globalist chess piece.  Sometimes they are the allies or "good guys" see as the Soviet-Afghan War and see as the 2011 NATO bombing of Libya; and sometimes they are the adversaries or "bad guys" See as 2001 Afghan Invasion, see as al-Qadea in Iraq, see as 1998 Kenyan Embassy bombings.

All "al-Qaeda" means, translated into English from Arabic is "The Database".  It's a list of CIA shills and contacts and their followers who carry out dirty deeds in exchange for gold, prostitutes, etc.

The Muslim religious fanaticism aspect is for the low-level operatives following orders of their CIA handlers.  The CIA handlers in turn get their marching orders from CAESAR III or a related temporal analysis program.  All of the data and parameters are imputed in by CSIS so that way they can carry out Zbiginew Brzezinski's desire to rule Eurasia.

BOTH al-Qaeda AND the Center for Strategic International Studies were founded by Zbignew Brezenski ON RECORD!!!  That ugly grotesque demon owns both sides of the "War on Terror" fight the same way that Don King owns both boxers in the ring for all you sports junkies out there.

I give MAJOR PROPS for Luke Rudowski confronting that demon because Zbiginew Brezenski is responsible for the 9/11 false flag inside job.  His modus operandi for carrying out the 9/11 false flag inside job is as plain as day in his books The Grand Chessboard, Global Domination or Global Leadership, and Between Two Ages.

Zbiginew Brzezinski, Henry Kissinger, and David Rockefeller are the MASTERMINDS behind 9/11 and there is a plethora of proof that these TRAITORS did this attack.  They need to be investigated, charged by a jury and sentenced to DEATH by lethal injection.  F**k Casey Anthony, the nation should be outraged that these assholes are still free and still planning future false flags to carry out their "New World Order" global totalitarian cybernetic dictatorship which will result in the mass genocide of billions of human beings.


At Least 7 of the 9/11 Hijackers are Still Alive

MANY 9-11 "HIJACKERS" ARE STILL ALIVE.

9/11 Hijackers ALIVE!

http://www.youtube.com/watch?v=f7ixuf236Dk

http://www.youtube.com/watch?v=x9kEwQud4Ek&feature=fvwrel

They need faces for us to fear and hate.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #3 on: August 12, 2011, 12:06:35 AM »
James Corbett
The Corbett Report
9/11 and Cyberterrorism:
Did the real “cyber 9/11″ happen on 9/11?

http://www.infowars.com/911-and-cyberterrorism-did-the-real-cyber-911-happen-on-911/
July 17, 2009

Government sources immediately began blaming North Korea for the recent cyberterror attacks on South Korea and the U.S., despite having no evidence to back up those claims. Now, an examination of the evidence by independent computer experts show that the attack seems to have been coordinated from the UK. The hysterical media coverage in the attack’s wake, however, echoing the government line that it was likely the work of North Korea, served to cement in the minds of many that this was an act of cyberwarfare.
   

McConnell: Back in 2003, Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack “equivalent to the attack on the World Trade Center” if a new institution were not created to oversee cyber security.
   

The idea that this surprisingly unsophisticated attack could have come from a well-organized, hostile state or terrorist group comes as a blessing in disguise to those groups, agencies and advisors who have been calling for greater and greater federal snooping powers in the name of stopping a “cyber 9/11″ from happening.

The “cyber 9/11″ meme stretches back almost to 9/11 itself. Back in 2003, Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack “equivalent to the attack on the World Trade Center” if a new institution were not created to oversee cyber security. Since then, report after report has continued to use the horror of 9/11 as a way of raising public hysteria over “cyber terrorism,” a subject more often associated with juvenile hackers and lone misfits than radical terrorist organizations.

The real reason behind the invocation of 9/11 in the context of “cyber terror” was revealed last year by Harvard law professor Lawrence Lessig. He told a technology conference that former counterterrorism czar Richard Clarke admits there is a cyber equivalent of the constitution-destroying Patriot Act ready to be rubber stamped into law; all it requires is a “cyber 9/11″ to make such legislation politically viable. In effect, the cyber security establishment—the advisors, agents and experts in the newly-minted multi-billion dollar cyber security industry—are waiting for a spectacular cyber terrorist attack to go ahead with plans for ‘identity management’ schemes like fingerprinting for internet access which would put an end to the free Internet as we have known it.

What the cyber security establishment does not want you to know is that the most incredible cyber terrorist story of all time began 15 years ago. And it centers on 9/11. The establishment is interested in suppressing this story because it demonstrates that the very investigative bodies that are clamoring for more power on the pretext of the “cyber terror” hysteria are the exact same bodies that failed to investigate the documentable links between government-designated terrorists and a software company with direct access to some of the most sensitive computer systems in the United States. FBI agents whose investigation into this story were suppressed have even said that these investigations could have prevented 9/11.

It is a story of international terror and terrorist financiers. It stretches from New England to Saudi Arabia and involves businessmen, politicians and terror networks. And it begins in the most unlikely of places: the offices of an enterprise architecture software firm in Quincy, Massachusetts.

Enterprise Architecture: The God’s-Eye View of Systems and Infrastructure

“Enterprise architecture software” refers to a computer program that allows someone to look at all of the data produced throughout an organization’s structure in real time. This effectively gives the program user a god’s-eye view of an enterprise, allowing for the mapping, visualization and analysis of all transactions, interactions, systems, processes and personnel in the entirety of a business or agency. This type of software could, for example, be used for robust business modeling, allowing for extremely detailed and accurate projections of how changes in an organization’s structure or processes would effect a business’ bottom line. What would happen if two departments were merged, for example, or if a business were to outsource one of its processes.

As this software began to mature in the 1990s, however, it went from a merely useful tool to something truly incredible. Sophisticated enterprise architecture software could, for example, examine all of the transactions taking place across a financial institution in real time and examine that data for possible money laundering operations or rogue traders. Such software could even have potentially detected and identified the  insider trading leading up to 9/11. Combined with rudimentary a.i. capabilities, such a program would not only be able to alert the appropriate personnel about such transactions, but even stop them as they are happening. If the software were sophisticated enough, it may even be able to identify the possibility of such transactions before they happen.

The utility of such software for organizations of all stripes should be obvious enough. It is unsurprising, then, that  numerous government agencies and powerful corporations were hungry for this software in the 1990s. A surprising number of them, including DARPA, the FBI, the Secret Service, the White House, the Navy, the Air Force, the FAA, NATO, IBM, Booz Allen Hamilton and Price Waterhouse Coopers (amongst many others) turned to a small New England-based software firm called Ptech.

Ptech: Not Your Average Software Firm

Ptech was founded in Quincy, Mass. in 1994 and by 1996 had secured a contract with DARPA to help transfer commercial software methodologies to the defense sector. In 1997, it gained security clearance to bid on sensitive military contracts and bid on work for a range of other government agencies. Within four years Ptech had built up a stable of clients that would make any third-party software vendor green with envy. From the inner sanctum of the White House to the headquarters of the FBI, from the basement of the FAA to the boardroom of IBM, some of the best-secured organizations in the world running on some of the most protected servers housing the most sensitive data welcomed Ptech into their midst. Ptech was given the keys to the cyber kingdom to build detailed pictures of these organizations, their weaknesses and vulnerabilities, and to show how these problems could be exploited by those of ill intent. For all of its incredible success, however, many of the firm’s top investors and employees were men with backgrounds that should have been raising red flags at all levels of the government.

The firm was founded on $20 million of startup money, $5 million of which was provided by Yassin al-Qadi, a wealthy and well-connected Saudi businessman who liked to brag about his acquaintance with Dick Cheney. He also had connections to various Muslim charities suspected of funding international terrorism. In the wake of 9/11 he was officially declared a Specially Designated Global Terrorist by the U.S. government and his assets were frozen. At the time, Ptech’s owners and senior management denied that al-Qadi had any involvement with the company other than his initial investment, but the FBI now maintains they were lying and that in fact al-Qadi continued investing millions of dollars in the company through various fronts and investment vehicles. Company insiders told FBI officials that they were flown to Saudi Arabia to meet Ptech’s investors in 1999 and that al-Qadi was introduced as one of the owners. It has also been reported that Hussein Ibrahim, Ptech’s chief scientist, was al-Qadi’s representative at Ptech and al-Qadi’s lawyers have admitted that al-Qadi’s representative may have continued to sit on Ptech’s board even after 9/11.

Ibrahim himself was a former president of BMI, a New Jersey-based real estate investment firm that was also one of the initial investors in Ptech and provided financing for Ptech’s founding loan. Ptech leased office space and computer equipment from BMI and BMI  shared office space in New Jersey with Kadi International, owned and operated by none other than Ptech’s sweetheart investor and Specially Designated Global Terrorist, Yassin al-Qadi. In 2003, counterterrorism czar  Richard Clarke said: “BMI held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support.”

Suheil Laheir was Ptech’s chief architect. When he wasn’t writing the software that would provide Ptech with detailed operational blueprints of the most sensitive agencies in the U.S. government, he was writing articles in praise of Islamic holy war. He was also fond of quoting Abdullah Azzam, Osama Bin Laden’s mentor and the head of Maktab al-Khidamat, which was the precursor to Al-Qaeda.

That such an unlikely cast of characters were given access to some of the most sensitive agencies in the U.S. federal government is startling enough. That they were operating software that allowed them to map, analyze and access every process and operation within these agencies for the purpose of finding systemic weak points is equally startling. Most disturbing of all, though, is the connection between Ptech and the very agencies that so remarkably failed in their duty to protect the American public on September 11, 2001.

Ptech on 9/11: The Basement of the FAA

For two years prior to 9/11, Ptech was working to identify potential problems or weaknesses in the FAA’s response plans to events like a terrorist hijacking of a plane over U.S. airspace. According to their own business plan for their contract with the FAA, Ptech was given access to every process and system in the FAA dealing with their crisis response protocols. This included examining key systems and infrastructure to analyze the FAA’s “network management, network security, configuration management, fault management, performance management, application administration, network management and user desk help operations.” In short, Ptech had free reign to examine every FAA system and process for dealing with the exact type of event that was to occur on 9/11. Even more incredible, researcher Indira Singh points out that Ptech was specifically analyzing the potential interoperability problems between the FAA, NORAD and the Pentagon in the event of an emergency over U.S. airspace.

Ptech also presumably had operational information about the systems that the FAA, NORAD and others employed during crisis response exercises like Vigilant Guardian, the NORAD exercise that was taking place on 9/11 and included simulations of hijacked jets being flown into New York and hijacked jets being flown into government buildings. This is significant because there is every indication that just such drills were confusing NORAD’s response to the real hijackings that were taking place that day. As researcher Michael Ruppert points out, a rogue agent with access to a Ptech backdoor into the FAA’s systems could have been deliberately inserting fake blips onto the FAA’s radars on 9/11. That scenario would explain the source of the phantom Flight 11 that the FAA reported to NORAD at 9:24 a.m. (well after Flight 11 had already hit the World Trade Center), a report whose source the 9/11 Commission claims they were unable to find.

In short, Ptech’s software was running on the critical systems responding to the attacks of 9/11 on 9/11 itself. The software was designed for the express purpose of giving its users a complete overview of all the data flowing through an organization in real time. The father of enterprise architecture himself, John Zachman, explained that with Ptech-type software installed on a sensitive server “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.”

Stifled Investigations

In the late 1990s, Robert Wright—an FBI special agent in the Chicago field office—was running an investigation into terrorist financing called Vulgar Betrayal. From the very start, the investigation was hampered by higher-ups; the investigation was not even allocated adequate computers to carry out its work. Through Wright’s foresight and perseverance, however, the investigation managed to score some victories, including seizing $1.4 million in U.S. funds that traced back to Yassin al-Qadi. Wright was pleased when a senior agent was assigned to help investigate “the founder and the financier of Ptech“, but the agent did no work and merely pushed papers during his entire time on the case.

Shortly after the 1998 African embassy bombings, Vulgar Betrayal began to uncover a money trail linking al-Qadi to the attack. According to Wright, when he proposed a criminal investigation into the links, his supervisor flew into a rage, saying “‘You will not open criminal investigations. I forbid any of you. You will not open criminal investigations against any of these intelligence subjects.” Wright was taken off the Vulgar Betrayal investigation one year later and the investigation itself was shut down the following year.

In the aftermath of 9/11, Indira Singh—a risk management conultant for JP Morgan—was looking for enterprise architecture software to implement the next generation of risk management at the financial juggernaut. Impressed by their client list, Singh invited Ptech to demonstrate their software. It wasn’t long before she began discovering the connections between Ptech and international terrorist financing. She worked exhaustively to document and uncover these links in an effort to persuade the FBI in Boston to open their own investigation into Ptech, but she was told by one agent that she was in a better position to investigate this than someone inside the FBI. Despite the persistent efforts of Singh and the testimony of company insiders, the FBI did not inform any of the agencies contracting with Ptech that there were concerns about the company or its software.

In late 2002, Operation Green Quest—a Customs Department-led multi-agency investigation into terrorist financing—raided Ptech’s offices due to its ties to al-Qadi and others. The very same day of the raid White House Press Secretary Ari Fleischer declared the company and its software safe. Mainstream news articles defending Ptech after the story broke, however, blithely admit that the company was informed of the raid weeks in advance, hoping perhaps that readers will not notice that his completely defeats the purpose of such a raid or calls into question its results. Eventually, Michael Chertoff led an effort to give the FBI total control over Greenquest, leading to Customs officials accusing him of sabotaging the investigation. No indictments were laid in the immediate aftermath of the Ptech raid against al-Qadi or anyone else related to the company. Chertoff went on to become the head of Homeland Security.

The 9/11 Commission Report, obviously, does not mention Ptech. Given the incredible information about this company and its links to Specially Designated Global Terrorist Yassin al-Qadi, this is perhaps surprising. This startling omission becomes more ominous however, when it is understood that the 9/11 Commission co-chair, Thomas Kean,  made $24 million dollars off a land deal with al-Qadi linked organization BMI.

For over a decade, investigations into Ptech, its employees and its investors have been stifled, suppressed or derailed by people in key positions. But all of that finally changed this week.

A Break in the Case

On Wednesday the Boston Field Office of the FBI unsealed a 2007 indictment of Oussama Ziade, Ptech’s former CEO, and Buford George Peterson, the former CFO and COO. The indictment charges that the pair knowingly lied to investigators about the extent of al-Qadi’s investments and ties with Ptech. Another unsealed indictment, this one from 2005, alleges Ziade attempted to engage in transactions involving al-Qadi’s property, a federal offence as al-Qadi was a Specially Designated Global Terrorist at the time. If the pair are convicted on the charges, they face 30 years in prison and a $1 million fine.

Whether this represents a significant breakthrough in the case and the beginning of the official unraveling of the Ptech story will likely depend on whether political pressure is brought to bear by an informed public who are concerned with this story. Given that the public has been whipped into cyber-hysteria over the North Korean figments of the government’s imagination, it will require the media to stop parroting the government’s talking points and begin informing the public about the very real, documentable links between terrorist financiers and the technological capability to override key emergency response systems on 9/11.

Two questions remain to be answered: Did the real “cyber 9/11″ happen on 9/11? And will the public care enough to demand the answer to that question? If the answer to either question is ‘yes,’ concerned readers are advised to download the mp3 file of Episode 045 of The Corbett Report podcast, “Ptech and the 9/11 software,” and begin distributing it to others to bring awareness to this incredible story.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #4 on: August 12, 2011, 12:08:40 AM »
Listen to this show....

Guns and Butter - July 20, 2005

Inteview with Indira Singh
"Ground Zero 911, Blueprint For Terror, Part Two"

http://www.kpfa.org/archive/id/16057

Part One is here...

Guns and Butter - April 27, 2005

Ground Zero 911:
Blueprint For Terror, Part One

http://www.kpfa.org/archive/id/14703


Part 2 of Indira Singh Interview of Pacifica (Ptech, 9-11, etc)
   Edited on Mon Jul-25-05 07:27 AM by oldlady
WARNING: I typed this from the audio online & I'm sure I've spelled all the names wrong. Please forgive me, I just heard this today, I'm sure I'll be reading more online & be really ashamed. At least I warned ya...

July 20th 2005
Inteview with Indira Singh
"Ground Zero 911, Blueprint For Terror, Part Two"

Indira Singh worked on Wall Street from 1975 Until June 28th, 2002 when she was summarily terminated due to her investigation into computer software company, Ptech. In Part One, She described her work as an emergency medical technician at ground zero, and began to describe her professional work for JPMorgan Chase and her first client meeting with software engineer, Ptech.

Bonnie Falkner: So, Indira, how did your meeting with Ptech, how did that go?

Indira Singh: Well, they came a little late, immediately there were some issues with regard to how the day would proceed, for instance they showed up without the agreed upon software in hand. The most important thing about it is that their chief scientist Dr. Hussein Ibraham came. He’s an Egyptian-American and he had a very good reputation in the field, very bright, someone you would like working with, very knowledgeable. But, they had showed up without the software. What I had done was isolated a workstation, took it off the net, after all we were testing whether the software would meet our criteria. And if I had said it did then that would be a big deal if it subsequently couldn’t, so we need to start with an out-of-the-box version of Ptech. They didn’t bring that and Dr. Ibraham said, “that’s not a problem we can develop a demo on his laptop.” And if you know anything about these things that’s like a no-no because at the end of the day he’s walking out the door and I don’t have anything – and he’s walking away with pretty much enough of how we’re thinking about doing operational risk… now, operational risk is about how to spot bad things that are going on in a financial institution – things like rogue-trading, money laundering, and so on and so forth. And it’s very subtle, our intellectual property, at least what JP Morgan was hiring me for, was to think innovatively, out of the box, in a next-generation how do you proactively design a blueprint to spot these things, and that’s pretty big. These, definitely, people are smart enough to get an “oh, they’re thinking of going down this road”, that’s a big deal, so I was risk averse and so I was aware enough not to expose our intellectual property, or that of the company I am consulting for, I am very protective of that. So, they showed up without the software and that was a huge enough red flag that I began paying attention to them. A couple of other things went on and within half an hour I just walked over to the same people who had recommended them and began calling and I said to one of them, “I have the Ptech people here”, and the reaction was not the reaction I would have ever expected. It was: what are they doing on site? And I said, well you recommended them. And they said, no, um, you should have come through a distributor, an American distributor, and I said, “uh uh, JP Morgan reserves the right to work directly with the company and besides which they are a preferred vendor of IBM, they’re a preferred vendor for program and that’s the way we work, we don’t work for small distributors. If we’re going to go with this software as the standard, we’re going to go right to the source and make the agreements there. So, I said, what is the problem? And basically this person said, “Don’t let them out of your sight”. And that’s when my stomach sank. See, you have to understand how all of a sudden I’m beginning to see these people in a different way. Because when they said: don’t let them out of your sight, I have a Middle Eastern company there and we’re taught not to discriminate and I, that was not something I was about to do and to prove that - they were there being evaluated. So, that is never going to be a bone of contention, although later people made that an issue. But, if I had a problem working with a Middle Eastern company they would have never been there in the first place, much less before Ground Zero closed. And I had no problem whatsoever having them up there. I liked the idea.

B.F.: What do you mean Ptech was a Middle Eastern company?

IS: Well, that’s what subsequently was revealed in the phone call – that their financier, their funders, their investors, were all Saudis. And I said, “so what?” and they said, one Saudi has been placed on the US Terror List, October 12, 2001. And I said, umm, it got very quiet, I said, you better have proof because having thrown that into my lap now, this is not something that I can ignore, I have to follow up on it. This is not something I can ignore, or pretend would go away, or have someone else handle. This is risk-management, at the highest levels of one of the largest banks in the world; it is my responsibility to deal with this. And I said, how can I get proof of this? And that’s when they started saying you need to talk to Jeff Goines, who was one of the only three people in Ptech who knew of this relationship. You see, it was that well hidden within Ptech, and so I subsequently called Jeff Goines and I said, well if this is true, did you not report this, particularly as a private company this relationship would have been privy only to those on the inside, I said, did you report it anywhere – that someone who has been placed on the US Terror List is key funder, angel investor, to a company whose software is utilized at the highest levels of almost every government and military and defense organization in this country, including the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the US Navy, the US Air Force, and, last but not least, the Federal Aviation Administration?

B.F.: Are you saying these were all Ptech clients?

IS: These were all Ptech clients and when I was evaluating them I was pretty impressed – why not Ptech? Exactly, they’re being used at the highest levels of all of these organizations. So, I was very excited about using them and having their software be able to be at the heart of what I wanted to develop. And I had no reason to believe that if they were in use everywhere of that caliber that I would have a problem. They were also used in Enron, perhaps, I should have thought twice about that, but, umm, they were in use at IBM, of course, and the top accounting firms, and even in the FBI. In Miter..

B.F.: What is Miter?

IS: Miter is a large company that does specialized technology for defense and intelligence. You would not expect to have an exposure with a company that was so well entrenched and embedded in these kinds of organizations.
B.F.: So, what about the meeting then, did they leave? What happened?

IS: No, because, umm, basically my position was until I had proof I could not react. That would have been very unprofessional of me and so I thought of a number of scenarios that could be going on. At that point I thought it might have been, you know, competitiveness out of control, distributors wanting the JP Morgan account, it could have been anything - however, the one thing and it was true that the chief investor, Sheik Yassan Khadi, was indeed placed on the US Terror List, because while I was talking to them, while they were still there, I checked out a website that had a list of everyone who’d been placed on the Terror List. The missing piece was of course proving that Sheik Yassan Khadi was indeed affiliated with Ptech, was an owner of Ptech, because it was a private company. You could say that anybody was an investor, whether a bad guy or good guy, was an investor. Proving it was another thing, so I let everything ride, but I kept and eye on things. And, in fact, we did have a presentation that went very, very well, because in no way, shape or form was I going to jeopardize that.

B.F.: So what happened next? Did you go on working with them, or did you start to investigate Ptech?

IS: Well, I continued multi-tasking. I was working with them, I placed a few phone calls, some people got back to me later that day, while they were still on premises, so I was able to separate the concerns, accomplish the task, evaluate the software anyway, start the phone calls to start getting more information, then my report would have been: this is the software, it’s used everywhere, it can do what we want it to do, however, we have this issue with the company, and present that to my superiors and let them decide.

B.F.: Then did you start investigating the company?

IS: Yes. What happened next was, um, I spoke with Jeff Goines and he told me that basically not only was Yassan Khadi was an investor but that a Yacob Mertza was on the board of directors and he had been the subject of Operation Green Quest, many of his Herndon, Virginia vehicles and companies,and financing companies, had been raided in March 2002. And, again, that Mertza was on the board of directors. As we spoke, other names started to come out, my head was pretty much spinning at this point, and I said “have you reported any of this to the FBI?” and the answer came back: yes, well I wrote a report to the FBI, and, umm, I said, “okay, the boss in FBI has been told, I need to speak with people there”, because it’s not just by group that’s evaluating them, it’s so many other groups – but I couldn’t believe that, if this was all true that Ptech was still being used by the Department of Defense. There’s something a little bizarre about all of this and really I was beginning to understand, unwillingly, that the world was, was not the way we thought of it.

B.F.: Now, this person that you were discussing this with, Jeff Goines…

IS: Goines. Yes.

B.F.: Was he an employee of Ptech?

IS: Yes he was, he’s one of the key people at Ptech. He held several important positions. He had traveled to Saudi Arabia and he had met with Yassan Khadi and he had met with most of the investors, he, his last position was Vice-President of Sales, which for a small company is pretty significant. He worked with Ptech helping build the company for five years. And he was the one that was based in Virginia, who was responsible for getting a lot of the government accounts, with, of course, Yusaama Zihadi, who was the President. Yusaama Zihadi is a Lebanese-American, who according to Jeff, got a citizenship under very questionable circumstances, which involves the INS. Now, this is all according to Jeff, so at some point later in the week I had decided to go down to Virginia and meet with not only Jeff, but a number of other Ptech and ex-Ptech employees, because this was beginning to sound like a Tom Clancy novel, and I needed proof, I told them I needed emails, I needed documents, I needed hard evidence. But, in the meantime, within a day or two, I had contacted my Rep at IBM, and I said I need to walk outside with you and talk to you about something. If you guys are thinking about getting seriously in bed with this company, I would suggest that you do some background investigation, so that your clients, like JP Morgan and myself, don’t end up in this situation. His name was Kyle Hiligoss. Kyle told me that he quote, unquote, wrote a book report and sent it to his legal department and he was told to just back off the whole, the whole thing, in fact he would, didn’t want to have anything to do with me as I continued investigating. Jeff did get the agents at the FBI, the boss in the FBI office, to call me back, and with Kyle listening in, so it wasn’t just me reporting on what Jeff had said, we spoke to the FBI agent who had picked up the information that Jeff had reported on Ptech, when Yassan Khadi was placed on the Terror List in October 2001. Now remember this is eight or nine months later. My question to him is: if you have an investigation that’s ongoing, that’s fine, and we don’t want to get involved with it, or impede it in any way. But in the meantime, this country’s infrastructure is seriously exposed, and I cannot, if any of this is true, cannot, and I need some evidence, something that you can give me that, to hang my hat on when I report this, that this is true, that this isn’t just someone making a terrorism report, you know, but that, that you know this is true. And basically, what he said was, “Indiri, your in a better position on the out, on the outside to get the proof that’s needed than I am. And I asked him to check with the supervisor, I said, do you understand how serious this is, to have a company with, with this alleged terrorism connection, at the highest levels of corporate America and the US infrastructure? And I said, if you don’t know, I need, we need to make you aware of this. He apparently went to his supervisor, and his supervisor said that the position wouldn’t change. Now, the Boston FBI office, you can check this out, was rated as one of the worst in terms of corruption, and I believe the Whitey Bolger incident, the connections between the FBI and the Mafia have been, how should I put it?, extremely well explored and the Boston FBI office, the ex-governor of Massachusetts, I believe, anyway, this mob character, Whitey Bolger’s brother was in a very high level political position in Massachusetts, in Boston, and in fact if people were to read Peter Lance’s book, “Coverup”, he explores it very well and backs up a lot of what I had found here, the interaction between organized crime and the FBI. So, when they said they weren’t going to proceed, I…

B.F.: and by ‘they’, you’re talking about the FBI?

IS: the FBI..I said, I need something to hang my hat on, and so he sent me a videotape. And the videotape, which I have here, the substance of the videotape was a news clip. It was a news clip of a CBS affiliate, based in Boston, called WBCTV, and their investigative reporting team, the “eye team”, which was led by investigative reporter Joe Bergantino, had investigated a number of Middle Eastern men who were sought after 9-11. They were affiliated with a Muslim Islamic Terrorism financing charities. He had created this clip to show the connection between the 9-11 terror attack and the financial vehicles that were supposedly used to fund it. And what he did was very interesting. He connected, the eye-team connected, CARE International, not the big CARE International, but something called CARE International that was based in Boston all the way back to Al Keefah, which is the financing vehicle at the center of the World Trade Center bombing in 1993, all the way back to something called Maktab al-qeedah-mad, which means “the office”, which was a financing vehicle that was set up by the CIA for the Pakistani ISI, back in the days when Osama bin Laden was America’s fair-haired boy, and was on our side fighting with the Muhajadeen, fighting the Soviet Union. So, the question to me was, my goodness, when I saw the videotape, what is Maktab al-qeedah-mad doing being run out of Ptech on 9-11, and the reason I say being run out of Ptech is that the faces in the videotape were the faces of core employees at Ptech. Now, remember, this is a small company. There were only one or two people who had access to the sourcecode in Ptech, and that is a very trusted position and he was one of them, his name was Sahail Lahair. The people who started CARE International, some of them were actually on an FBI Terror Watch List, prior to 9-11, in Boston.

B.F.: What do you mean by the source code?

IS: Well, all software products has, uh, some group or organization or person writes code that is then packaged up and, uh, for instance the word processor on your desk, or spreadsheet and so on and so forth, the browser, it’s all written in some sort of code. Those are the keys to it, and if you want to improve it, add any functionality, you would change the original code, and add new functionality and then repackage it and send it out there. So, whoever had access to source code of Ptech, that was where the value was – if you lost the source code, you essentially lost the product. For all intents and purposes, marketing point of view. So, only one or two people would have access to the source code. It would be like having the formula for Coca-Cola, basically.

B.F.: Now, let’s go over that a little bit again. You were talking about a CARE International and some other funding groups that have been, what, funding international terrorism?

IS: That’s correct.

B.F.: And also have been funded by, what, the CIA..

IS: Well, the original, the roots of the al-Keefah and CARE International, if you look at it were way back in the late 80s, around the time of Iran-Contra, for instance, Maktab al-qeedah’mad was set up so that monies could be passed to Osama bin Laden and the Mujahadeen when they were fighting the Soviet…now, I won’t go into a lot of detail, but it ended up that Osama bin Laden took that over and was running al-Quaeda through that. The connections to the Pakistani ISI still stood. The connections to the CIA still stood. Not in the way that was originally set up, but through a black, or a gray, operation. That had been later confirmed to me. By the end of the day when I was finished with certain parts of the investigation, it was clear to me that there was no way that Ptech could have done all of this without a lot of inside help. And that’s what I began focusing on, that it was a cut-out, that it was a front, was it a regular CIA front, was it a clandestine front, what was it? You know there are walls within the FBI, walls within the CIA, behind which these operations take place and who is behind those operations, you know, is a key question. Now, people might say, ahh, this is all conspiracy theory, but I would like to remind people that conspiracy is very much recognized by the United States Federal Code – and it’s called RICO-racketeering and influence, and it is very much recognized because there’s so much power in these organizations that they have rules in place, for instance the DCIA, the Director of the CIA, cannot, after his term of DCIA, subsequently run for Vice-President or President, which is what happened with George Herbert Walker Bush, that rule was bent for him. He went on from being the DCIA to running for Vice-President. That’s a no-no.

BF: Well, it sounds like you’re describing an inter-locking relationship then, between this software company, funded by Saudis, and funded by whomever, the United States government, US corporations, and then known groups, globally, that are accused of staging terrorist attacks.

IS: Yes.

BF: and it’s all of a piece.

IS: Yes, absolutely. There… And one of the things I want to say is, maybe those organizations don’t fully know who their masters are. And Ptech is the one thread, the one golden thread you pull on and all of this is unraveled, because it goes into the corporations, it goes into, umm, umm, these ah government entities, it goes into the terrorism financing entities that were, that none of which have been, oh by the way, taken to task. And, umm, there’re just so many questions about what does this all mean. And as we investigated, as I investigated further, we found that the, in the origins of Ptech were very interesting – where did this company come from, obviously is the first question. And, um, how did they get to be so powerful, who were the people, who were the organizations that brought them in, who knew, who gave them the power. Who, for instance, signed off Zihadi’s citizenship without doing background checks? Who said that they had a bad feeling doing that? Who gave them influential, ummm, I remember that Ptech’s competitors, US companies, were extremely annoyed at the fact that they could not get equal time, that all the plum contracts were going to a foreign-owned company. And I said, well, did you know they were foreign-owned, and if they’re foreign-owned they couldn’t get certain classified projects, and, and he said, Oh, Indira, everyone knew that, some of them, some of the competitors knew, that umm, that they were Saudi owned and that meant that they got favorable treatment on Capitol Hill. And I said, well, are you saying that they just got favored treatment or that there was something more going on? They wouldn’t answer. Their lawyers instructed them not to answer, so, they knew a lot of what was, what was going on.

BF: Who, who were you talking to?

IS: Well, in one particular case I was talking to one of their competitors, Popkins Software, and umm, you know I have no problem naming names, because I think that in the memory of 3000 US civilians who were, and world-wide civilians, who were murdered, we are going to wage wars and spill blood around the world, we oughta take a look at this, and just have the truth come out. Because, umm, the truth has not come out and, there’s been a lot of speculation, there’s been a lot of innuendo, but there hasn’t been hard proof and Ptech is the one situation where you can get hard proof. When we investigated Ptech, and the people behind it, where they came from, we found out that one of the founding members was a man by the name of Solomon Bahairi. He was one of the founding directors and he had put together a vehicle called BMI, which stands for Bai Tal Mal. Now BMI was identified as being involved with terror financing but this is just not going to be the Muslims hate America, that’s not what it is, there is something else going on here. They’re being used as a tool, just as the good people of the United States are being used, are being misled into, and being frightened and terrorized into ‘if we don’t wage these horrific wars, you know our way of life will be over’. Who benefits from that?

BF: What else did your investigation of Ptech turn up? Didn’t you meet with several employees or former employees of Ptech?

IS: Yes. This goes back to when all of this was being revealed to me, now this is the last week of May 2002. The last day, or June 1 or so, of 2002, lo and behold out of nowhere the Chicago FBI enters the picture. We have agent Robert Wright of the Chicago FBI, who’s giving congressional testimony, and, umm, he stands on the steps of the Capitol, bursts into tears, apologizes to the 9-11 families, the victims, that he didn’t do everything he could to prevent 9-11 from happening, that his investigations were repeatedly shut down. And I almost fell over, because he announced that his investigation was the investigation into Yassan Khadi, the same Sheikh Yassan Khadi who was the money man behind Ptech. And, umm, you could not ask for a more direct connection to 9-11 than that. I will even discount the fact that some ex-Ptech employees told me that, when I went to see them I presented all the Terror List faces, whatever, and they had indicated that they had seen some pass through Ptech, in fact, one or two had mentioned that they thought one of the hijackers had actually passed through Ptech. And I said, did you report this to the FBI? Can you tell me when? Can you get evidence of it? Can you get litigation-quality evidence, something that would stand up? Whatever you can get, give it to me, make copies, give it to the FBI, I still thought they were on our side.

BF: The FBI, you mean.

IS: The FBI. In fact, and this has to be made very clear, there are some extraordinarily real patriotic Americans and good people in the FBI, as has been said by, I believe, Agent Colleen Rowley, one of the FBI whistleblowers’ bosses, that there’s a wall in the FBI, and this has been validated to me by various attorneys in Houston, who are very close to the power bases, and are pretty ticked-off at what’s happening in this country and are speaking out, as are many CIA agents who are very concerned that it has gone too far, as are many NSA agents who are concerned that it’s gone too far, and FBI agents. So we have a lot of people who are speaking out, they’ve kept quiet too long; they’re afraid, they’re afraid of what’s happening to this country. And when I say the Third Reich, what is happening to this country, they say, and I will identify ‘they’ if pressed, they say, will make the Third Reich look like a tea party. I guess we have that many more billion people to control on this planet.

BF: And when you say, “they say”, are you referring to people that you’ve spoken with in the FBI?

IS: Absolutely. Within the FBI, within the CIA. One of the things that I didn’t want to have happen is when Ptech was finally raided in December 2002, something that took all of six months and a tremendous amount of agony to have happen, the White House, Ari Fleischer, spun it to fine sugar that day, he said, oh, there’s nothing wrong, nothing here, nothing to see here, everything’s fine. So, they did a token raid and that was basically it. But, everything that I have done since that time has been for one reason, and one reason only. That there may come a time, that people will find the trail to Ptech, and it won’t be hidden or buried, I’ve kept it alive. Whether they’ve renamed their company and moved on, I want to keep the names, the details, everything alive, no matter what I have to do, so that, should there come a time for justice and accounting, for 9-11 and for what’s happening in the world today, it makes it easier for other people to unravel the truth. So, I have gone to the mainstream press, I have gone to people on the left, on the left-left, on the right and on the right of right. And I’ve talked to them face-to-face and said, this is wrong. Whatever your political inclinations, this is wrong. This is criminal. This is murder. This is world-wide atrocity. And I have reached some very good people on the left and on the right, who are willing to speak about about Ptech. I’ve contacted the alternative press – the alternative press, very much like the blind men and the elephant, they touch a piece of Ptech, they understand it and they say, ‘well this fits my theory of how things went wrong’. I have no problem with that, because, the facts are the facts. If someone wants to spin it to fit their particular viewpoint, for instance From the Wilderness has said, that well, the software that’s in Ptech is very much like Promis, the Prosecutor’s Management Information System, that has a whole cargo cult behind it, that it has these legendary capabilities, well maybe back in the 80s and 90s it was legendary, but today you can do pretty amazing things with software, its not a big deal. But, anyway, From the Wilderness and Mike Ruppert, for instance, thesis was that Dick Cheney was running an alternate command and control center that day, confusing everyone. And, in fact, there were four war games, that were going on, on 9-11, and, umm, who knows why the fighters weren’t scrambled in time, who knows all this, in fact, the fighter to Pennsylvania was scrambled in time, because we have firsthand proof, you know, whistleblowers within the correct organizations, that that was shot down. You know, it’s just that “Let’s Roll” was a better story, perhaps a story that the American people could handle, but, no, I was told at Ground Zero that day, we heard them go over, and we knew they were shot down. We were told. It was just later that it, we’re told that the passengers brought it down. Well, if you’re running a country and you’re really under terrorist attack, that might be the way to go. Empower people by saying if this, that thing happens to you, get up and do something and have a story. I really don’t have such a big problem with that, but the fact of the matter is, that it was shot down.

B.F.: Oh, and that’s interesting. And you heard that on the day of September 11th?

I.S.: Yes, I did. And it was corroborated a couple of weeks ago, by people who were in a particular situation room.

B.F.: Did you want to say anything more about that?

I.S.: Well, it is possible that there was an alternative command and control system, that could you technically use Ptech software to do surveillance and intervention? Well, gosh, yes, that’s exactly what I was planning on using it for in one of the largest banks in the world. It’s not a problem. So, if someone wants to make it their thesis, I’ve no problem with that, however, I can’t say for sure that that was going on, because I don’t have direct, first hand knowledge of that. You know, no one has told me or offered me proof of that. But, could I state that it could happen? Absolutely, it could have happened. Was it necessary for it to have happened, in order for us to have a 9-11? I don’t know. I don’t think so. Maybe. Maybe not. That’s not my point. The towers came down, 3000 people were killed what I know, is the characters behind the funding of it, were totally in bed with characters in the United States. And not only just for 9-11, but going on throughout our nation’s history. And the big question is, why? What are they up to?

B.F.: Could you describe the relationship of Ptech with the FAA? Now, Ptech worked with the FAA for several years, didn’t they?

I.S.: Yes. They worked with the FAA, it was a joint project between Ptech and Miter, and they were looking at, huh, it’s interesting, they were looking at basically holes, in the FAA’s interoperability with responding with other agencies, law enforcement, in emergencies, such as a hijacking. So, they were looking for the escalating process, what people would do, how they would respond, in case of emergency, and find the holes, and make recommendations to fix it. Now, if anyone was in a position to understand where the holes were, Ptech was, and that is exactly the point. And if anybody was in a position to write software to take advantage of those holes, it would have been Ptech.

B.F.: Explain what interoperability is.

I.S.: Hmmm. Most people are familiar with E-bay. And you know that it’s a collaborative bidding situation. You bid for a particular item, a certain amount of time passes and the winning bid is selected according to certain rules. And once a winning bid is selected, then something else happens. Then something else happens, the thing is bought, and it’s taken down, off, off E-bay. Well, these are a sequence of steps, that occur, it’s a process. And, it’s a process that a lot of people are familiar with, so everything we do involves a process. Now, if E-bay had one huge, gigantic computer, these processes would take place on one computer. However, interoperability comes into play when you jump computer systems, or organizations. So, for instance, what if E-bay had to pass on some information to Pay Pal. Pay Pal is a separate operation, they have their own computers, so they have to come up with a way to handshake, to agree on when this happens on E-bay, so and so will happen on Pay Pal. That’s all interoperability, so it happens on a business process level, and it also happens on a system transaction level. Hey, you know, Pay Pal says, well you send me this in this format and I’ll expect it and then do this with it. That’s how interoperability operates on a technical level, on an information level, and on a business process level. Now, with the FAA, in particular, if something goes wrong and there is an emergency with a particular flight and the Department of Defense needs to be notified, well that’s a really major interoperability thing, a signal has to be sent in some way, shape or form, either mediated by a human in most cases, or automatically, or even if it’s mediated by a human something has to be initiated on a super-computer to start a whole other sequence of events, interventions, scrambling a jet, notification up and down stream with many other organizations, such as NORAD, such as other terminal radar areas, such as local law enforcement, such as, you name it. So, this all has to be blueprinted, mapped out, and that’s where enterprise architecture comes in. You need some kind of blueprint to keep all of this together. And that’s what Ptech was so good at.

B.F.: Now, was there a reference to Ptech having operated in the basement, out of the FAA?

I.S.: Yes. Now, typically, because the scope of such projects are so over-arching and wide-ranging, when you are doing an enterprise architecture project you pretty much have access to how anything in the organization is being done, where it’s being done, on what systems, what the information is, and you pretty much have carte blanche. And if it’s a major project that spans several years, the team that comes in has literally access to almost anything that they want, because you’re operating on a blueprint level, on a massive scale. So, yes, they were everywhere and I was told that they were in places that required clearances. I was told that they had log-on access to FAA flight control computers. I was told that they had passwords to many computers that you may not think that on the surface has anything to do with finding out holes in the system, but let’s say you’ve said, ‘okay, you’ve isolated a part of a process’, say a notification process, that was needed by a computer and you wanted to investigate it further, then you would typically get log-on access to that computer. And from that, back upstream, or downstream, so, who knows? You know, from my own experience, I could have access to almost anything I wanted to in JP Morgan Chase. I didn’t, for the reason, I, if anything went wrong, I didn’t want to have the access. But, if you were up to no good, as an enterprise architect, with such a mandate, you typically could have anything you wanted. Access to anything.

B.F.: What do you think of the claim, by the so-called 9-11 Independent Commission and the testimony before it, and the report that the intelligence agencies did not talk to each other, what did you think of their so-called report?

I.S.: Umm. Completely flawed. Governor Kane was the second choice for the head of the commission, I believe. Henry Kissinger was the first. Governor Kane had, oh by the way, done business deals with BMI, Solomon Bahiri, Ptech – none of which came out, which he should have volunteered and either recused himself as being head or have it out there in the open. There were three other members of the commission, who had similar kinds of relationships in the past. And, umm, they were all on the team, but, their findings were so flawed. They’re using an excuse, yes there are interoperability, communication issues in any organization, yes, there are, but in a case of an emergency it doesn’t get that boloxed up. Unless, of course, Ruppert is right and Cheney was running interference somewhere, or someone was running interference, or whoever. You know, we don’t know. But, umm, there were four war games, four simulations, going on the morning of 9-11. And I just want people to remember that the whole nature of what Miter, which also they develop software for intelligence, which includes the CIA, Miter and Ptech, would have, if they were going to test whether they had fixed these holes, would have probably run a simulation. I don’t know that they did, but it, that’s how we do things. But, there were four of them going on, so was there room for confusion? I don’t think these people were stupid, I think they were deliberately confused, if anything.

B.F.: Well, we know very well that there was a simulation of the very event taking place during the event. Right?

I.S.: Yes. Yes, there was. And I believe there’s proof that there was more than one. Just in case the first one didn’t confuse people enough. So, what does this say? I can be very objective about this and say, well the terrorists knew that there were war games scheduled for this day and they took advantage of it and called 9-11 a particular day. However, we do know that 9-11 had been selected prior. Okay, so then maybe the war games were set many weeks prior, before 9-11. And you can play this game over and over. Yes, it was the perfect day. And, yes you needed inside knowledge and yes, Ptech, in all its myriad associations would have had the inside knowledge, and yes Ptech was a CIA front, and yes Ptech was protected. So, was it an inside job? You don’t have to look at this indirectly, this direct, this requires direct investigation.

B.F.: Well, that is what I was going to ask you, about your investigation of Ptech. You have pretty much come up with evidence that of course Ptech was a CIA cut-out, or front, or whatever.

I.S.: That’s correct. I had this validated to me by ex…high level people, within, within…and in fact, during my investigation, when I was reaching out to the people that I had worked with, because remember I did do work for a small company called the Interoperability Clearing House, or the ICH, and they were DARPA funded, and they weren’t a DARPA company, they were DARPA funded. They got funding from many, many organizations, including Boeing and whatever, because they were providing a wonderful service - software, and we were seeking funding from Incutel, which was the IT-seeking arm of the CIA. Now, when, interestingly enough, when the funding decision was supposed to come through on September 12th, I am not saying that it would have come through, but after 9-11 there was no funding coming through on 9-12. So, subsequent to that I was picking up the pieces and still remaining in contact with that group and trying to form another group and company, while I was working at JP Morgan, after 9-11, while we were going through the environmental nightmares that we were going through, I was still trying to pick up the pieces of that life, to create a really good risk blueprint, to prevent the kinds of things like 9-11 from happening to us. And I was pretty ignorant about a lot of this kind of clandestine betrayals. What happened, I kept in touch with a lot of these people, and when Ptech fell into my lap I did reach out to them, I said, can you tell me if what I’m looking at is true, is real, how could it be real, and one of the people I reached out to did work for the CIA and he said he could not discuss front office operations. I never knew what he meant by that, but anyway, subsequent to that there were two or three points down the road that I had higher and higher level confirmation, that it was being utilized. Eventually, I came across a report, actually the FBI Twin Towers Investigative Report, that the FBI had commissioned a private investigator to do, on certain people and in there it was so clear. That, I mean even the presence of CARE International, whose roots were in Maktab al-qeedah-mad, that was glaring. And that they were all over every place in the US infrastructure, you do not get that without very high level help, and that’s what the vendors, the competitors of Ptech had said, every one knew. They were given carte blanch, open –

B.F.: And this was a separate company, in Washington, DC that you were doing some work with, prior to September 11th.

I.S.: Right.

B.F.: And it got some funding from DARPA.

I.S.: Right. Interestingly enough, I did not let people know that it was Ptech until maybe August 2002, this ICH, the DARPA funded group know. We had pretty much moved on and I, umm, I accidentally let slip in August 2002 to one of my colleagues there that the company, the name of the company that was being investigated was Ptech, and, umm, she was horrified because she said they’re everywhere, and I said, ‘yeah, fancy that. Wonder who put them there?’ They didn’t get there by accident. Ptech came about in 1993, actually, they were reformed in 1993, that’s when Yassam Khadi invested in them.

B.F.: What happened with the raid that the FBI staged on Ptech?

I.S.: Well, what happened was, when I took all of this information back to JP Morgan, after Agent Wright had appeared on the steps of the Capitol, then I went down to Virginia I got all the information together, I had the Ptech people actually write it out, so it wouldn’t be Indira says, it would be this is what they put together, and I had emails, documentation, photographs, photographs that flew around the world, was plastered all over network TV, that’s what I got from these people, and I had interviewed a bunch of very scared people: what is going on? The FBI knows about it and they’re doing nothing. What is going on? What do you think this tells you? And I didn’t want to go there without proof, I wasn’t going to go there. Really what I did, and a most powerful thing, I think anyone can do, is not just make an accusation, or get a little bit of proof, which can be hushed up and denied, but I took what I had to everyone. Before Ptech was ever raided, before it became public, I took it all the way up to the top of the FBI. I took it everywhere. And the reality of the situation is proven by the response I got there, more telling than the actual deed itself, there response to that is really what indicts them all.

B.F.: What was there response?

I.S.: Umm, shut up and go away or you will be killed. Basically.

B.F.: Now, you got that response from all different levels in government.

I.S.: I got that response from JP Morgan. I got that response from Ptech. I got that warning from people within the FBI. Mostly the FBI. See, when the boss in the FBI sent me that tape that Joe Bergantino had run the story on and I looked at the tape and it was all Ptech people, you know, basically, or all affiliated with Ptech, what they were looking for, I was really scared. And I contacted Joe Bergantio to tell him I’ve been threatened, people had been in my house, I’m a 9-11 survivor, I can’t back down on this, and that if anything happens to me, this story that you did, back in December, November 2001, did you know these people worked at Ptech? He said, we had some suspicion, we didn’t know. And I said, well let me tell you what Ptech does. When I went down there and I spoke to them in June 2002 they thought I had a flower pot growing out of my head. They didn’t believe me at all, I said, you’ve done the original story, you just don’t realize they’re connected to corporate America and the government in this way. So what they did, they initiated their own investigation. And their own investigation, they came back to me and said, we’re sorry for having doubted you. It’s not only as bad as you said, it’s much, much worse. And, umm, they said…

B.F.: This is the investigative reporter?

I.S.: Right. Their, their whole team. This is CBS, oh by the way, and a CBS affiliate. So, they had interviewed me and taped me, and umm, this is now August 2002, they had said, that umm, we’re going to run this story on the one year anniversary of 9-11 and I begged them, I was horrified, please do not. Do not delay, get it out now. And they said no, it’s not gonna play well in August, because everyone’s on vacation and I was, I was banging my head against the wall. I was in tears. And I said, they’re gonna shut this down. People are gonna talk, they’re gonna find out about it and they’re gonna shut you down. And sure enough they did. There were seven networks that had, that caught wind of this story and they shut down the investigation. Their excuse was that, hey, you know, yeah, Ptech is everywhere, we don’t want them to be all of a sudden. They said, you know what, we have to find out that if we do anything to them, what will they do with our infrastructure? Which was complete baloney, because they had known all along, and they were, even as I spoke out at that time, they were being evaluated for use in Homeland Security.

B.F.: You’re talking about Ptech?

I.S.: Ptech. Yes. So, so much for their, their trite little excuse about “oh, yeah, gosh, we let this one slip through for almost a year, you know, but now that we’re aware of it – See and that’s why, in my making other people aware of it, they were aware of it at the highest levels all along so, you can’t suddenly pull that and say, oh, well, they could impact national security if we suddenly raid them. They were being evaluated for use in Homeland Security. So, we knew it was a cover-up at that time, and umm, I was very concerned that they weren’t ever gonna raid Ptech. That no one would ever know, that this would never be made public. If I had spoken out about it, I could be sued, where is your proof? You’ve told the government, they’ve done nothing, you’ve told the FBI they’ve done nothing. I then embarked on my own campaign. I had written a report and I had a pretty good email list, people in DC, and I said you know what, I’m going to send this report exposing Ptech and their connections to terrorism to ten Chief Information Officers, Chief Technology Officers, a week, until Ptech is raided. And I began calling people. And I began sending things out. I began scheduling appointments and showing up, and instead of talking about enterprise architecture, talking about ‘what software do you use?’. And I watched more people’s face turn absolutely white, I watched people almost get physically ill. And I watched them circle the wagons and, and I’m talking about major chemical companies, major energy companies, and the CIO, one of the CIOs of the Department of Defense, whose Pentagon meeting I interrupted, to talk about Ptech. Yeah, the line went dead. But, within a week after that Ptech was raided. And Ari Fleischer said there’s nothing wrong with the company. And I watched my life go down the drain. But…

B.F.: So, what about Ptech now, I mean..

I.S.: They renamed, yeah they, I apologize, they’re still in use.

B.F.: Still going?

I.S.: Absolutely. But they’ve renamed themselves. They’re called GoAgile and they’re still going. Nothing, when we try to find out what the status of the investigation is we’ve been told alternatively that they’ve been cleared or that it, it’s still in limbo. Nothing definitive has been done. Solomon Bahari had been arrested. A minor slap on the wrist.

B.F.: And what kind of a response did you get from JP Morgan Chase, your employers at the time, when you went to them with what you had found out about Ptech?

I.S.: Well, they had told me that I should be killed for getting all this evidence. I was, I was intimidated. I wrote a letter to my boss saying that I had been intimidated. And the person who intimidated me, the third highest ranking person in the bank, a general auditor, had said this has gone all the way up to the top and they were very aware of it, and that they were going to explicitly deny Ptech being used at JP Morgan Chase. In fact, they would even explicitly deny the URL to the website, so that no one could even look into them, course, now, the name has changed, so we wonder what’s going on there. But, when he asked me where did you get this from and that from, I was basically thoroughly intimidated, they treated me as though I was the bad guy. That’s what happened. They treated me as though I was the bad guy for having dug up all of this stuff.

B.F.: And you were told by the Chief Auditor at JP Morgan Chase that the different individuals that you had gotten this information from should have been killed?

I.S.: Yeah. Yeah. And, umm…you have to remember that I, I pointed to down the street, I said, I lost people there. And he said, I lost people there too. I, look, look, this is about 9-11. I put it in a folder labeled 9-11. And, it got pretty ugly from that point on. Basically, he said that if he, he needed to be sure that I would never mention Ptech again. And, I said, umm, here’s, here’s a problem. I’m a senior consultant, I consult with a lot of people. You may deny Ptech business here, what happens to CitiBank, what happens to Goldman Sachs, what happens to the rest… he said, that’s not my problem. And I said, that’s why we have that hole in the ground up the street. It is everyone’s problem, and in fact, Director Mueller of the FBI said that preventing terrorism was everyone’s problem, so, you know, I’m just going along with an FBI directive to the general population. And, umm, and so, I had written a letter to Wilson Lowrey, who at that time was his right hand administrative person, who was an ex-CEO of IBM. Wilson Lowrey, Wilson Lowrey turned out to be the one who came down hard on Colleen Rowley for being a whistleblower. (laughs) So, guess what his politics were upon, on Ptech.

B.F.: As a senior consultant with JP Morgan Chase were you on a consulting contract

I.S.: Yes.

B.F.: or were you an employee…

I.S.: No. I was on a consulting contract. However, I had a ten year relationship with them. I was given tasks there that were not given to employees, to even trusted employees. I was given responsibilities way above and beyond a lot of other employees. I was given pretty much carte blanch to think out of the box and to do things, I was funded out of a strategic fund called A Lab Morgan, where they experimented with new ideas, so I had a lot of latitude and the people I reported to were on the board of directors and were very senior level. They trusted me, keeping their best interests at heart. And as, I think exactly, my behavior around Ptech was entirely predictable and in line with someone who a light for risk and integrity in business dealings. In fact, one of the colleagues said, ‘of all the people whose lap this would fall into, you’re about the only one with enough latitude to not look the other way.

B.F.: And so then what happened? Was your contract…

I.S.: I was fired.

B.F.: was your contract cancelled?
I.S. summarily terminated.

B.F.: You were? And when did that happen?

I.S.: June 28, 2002

B.F.: And you stayed on in New York City then through 2004?

I.S.: Right. I stayed on in the same apartment. I reached out to friends of mine in the FBI who I asked them what was going on they, I got pretty close with one of them, who understood who was on the counterterrorism team - the northeast, and was part of the A-team, so to speak, and he looked at what I was looking at, I passed a lot of my information through him, and I said, ‘am I crazy? Please tell me that I’m crazy. I’d rather be crazy, than this be true.’ And he said, nope, and it is worse than you think. So, he validated a lot of things. He could not break any rules, and I wouldn’t let him, because he was my friend, but he helped me see and interpret things. So, one of the most powerful things I could have done was to push this through the system and see how the system responded. And it’s the system’s response that indicts them, in the end. Just as the system’s response to the EPA, and the environmental disaster in lower Manhattan indicts them If this were a true terrorist attack, you would have been seeing pictures of our lungs all over national TV for years to come. Metaphorically, that sort of thing. You never saw what it was really like. So, basically, after I got thrown out of JP Morgan, my attitude was as soon as everyone knows, what Ptech really is and they understand that it was for real, all will be forgiven and I will be back in business. And, umm, that sure didn’t happen. And I’m not sure, even, at this stage whether I want to be involved with anything to do with corporate America or the government, because, look at what’s happening. I’m looking at the people that are being put in place, like Negroponte, Director of Intel, and I’m hearing the inside response to that. I know where he comes from and what his pedigree is politically, and one by one, we’re seeing the handwriting on the wall. And most people are looking for exit strategies, you might say leave the country, go to France, go to Canada, but there are no exit strategies for this. All of this stuff took money to fund. And it was funded through major financial crimes, money laundering and looting. Call it looting, looting of the S&Ls, looting of the banking system, and what, what we’re in the middle of now, which is the looting of Social Security. And this is all being done sys…the looting of HUD, it’s all being done systematically to keep the slush funds up for the game at play.

B.F.: Where do you think this is headed?

I.S.: Not any place good for people. And, it isn’t just going to be America, it’s going to be global.

B.F.: Well, Indira Singh, thank you very much.

I..S.: Thank you, Bonnie.



On a personal note...

Bless the heart of the Democratic Underground member who did this:
http://www.democraticunderground.com/discuss/duboard.php?az=show_topic&forum=103&topic_id=142316
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #5 on: August 12, 2011, 12:12:08 AM »
No one has really heard about this company (I did see a few posts with it, but nothing with direct attention having been brought to it--that ends today.)  This information is so f**king balls out that I cannot believe this isn't classified (it can be corroborated and verified with thousands of other sources also.)  I almost shit myself reading this. MULTIPLE FALSE FLAGS EXPOSED HERE, NEVER BEFORE SEEN INTEL.  This post opens and exposes so many cans of worms you will 100% freak out reading this.

Download this and hardcopy it, save to files/backup asap.

1st:  Corroborating proof which validates key associations to organizations in the below article:
http://www.raytheon.com/technology_today/archive/2004_Issue2.pdf

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.beachnet.com/~hoffman/ESYS.html

E-Systems


“In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.”

- President Diwight D. Eisenhower’s farewell address


E-Systems (now owned by Raytheon) - which boasts an impressive bevy of former high-ranking CIA, NSA and DoD personnel - is a major government contractor allegedly involved in some very dirty business.[1]

Some of the people on E-Systems’ personnel roster include former NSA Director (and CIA Deputy Director) Admiral Bobby Ray Inman, former CIA Deputy Director Peter Moreno (Director of the Agency’s Technical Services Division), and former CIA Director Admiral W. F. Raborn, who also sits on the board of Wackenhut - a large quasi-governmental security/intelligence firm loaded with former CIA and FBI people - also reportedly involved in some highly questionable covert activities.

E-Systems’ CEO from 1989 to 1993, E. Gene Keiffer, a former Marine, was described as a “prominent figure among intelligence community contractors.[2]

E-Systems has collaborated with the U.S. intelligence community, including the military and the CIA, since 1947. As their press release states:

“A leader in systems integration, E-Systems business areas include reconnaissance and surveillance systems; specialized aircraft modification; command, control, and communications; electronic imaging; and other information-based technologies....”[3]

E-Systems’ contracts include Air Force One - the Presidential jet, and the so-called nuclear Doomsday Plane. They also produce navigation equipment, air-traffic control systems, and electronic border security systems.

E-Systems has nine divisions, the largest being its Greenville plant. Sales were $1.99 billion dollars in 1991, and $2.1 billion in 1992.[4]

Yet E-Systems denies any involvement with the CIA. As Daniel Brandt of Public Information Research writes:

“E-Systems president John W. Dixon insists that “we have never done any business with the CIA,” even though other former top CIA officials are among the senior executives at E-Systems, and Dixon himself was a member of the Association of Former Intelligence Officers in 1983. Okay, we’ll assume that they work together out of love of country to prevent excessive corporate profiteering....”[5]

Contrary to Dixon’s claims, E-Systems purchased the CIA’s front company, Air Asia, in 1975 - a company that had been involved in countless covert operations in Southeast Asia (not to mention drug smuggling). The purchase “gave E-Systems the largest aircraft repair-and-maintenance facility in Southeast Asia and a vast network of CIA affiliations.”[6]


Fraud

As one of Raytheon’s press releases states:

We at Raytheon are proud of our reputation for excellence, a reputation based on our commitment to the highest ethical standards....[7]

One of E-System’s projects, in conjunction with the German government, was the Egrett spy plane. As a German news agency reports, E-Systems was under investigation for bribing several high-ranking German Defense Ministry officials for the $600 million dollar contract, including a former Air Force general. The prosecutor’s office in Bonn confirmed the allegations. U.S. Defense Secretary Dick Cheney (an alleged drug user and pedophile and friend of alleged drug user and pedophile George Bush) quickly fired off a letter to his German counterpart in an effort to push the project through.[8]

Nor did the Egrett escape its share of disaster. As former E-Systems engineer Winfred Richardson states under oath:

“Parts for the Egrett were sent back to us and an extremely large amount of defective parts were found. King Faud‘s and the President‘s planes were kited up and sent to San Antonio to be installed. The Egrett crashed with loss of life....”[9]

As Brett Lambert, a defense electronics industry analyst states: “E-Systems is able to pull the right strings in the Pentagon. Ninety-five percent of the nations’ defense companies wouldn’t be able to get the Secretary of Defense to write a letter to a foreign government to promote their program.”[10]

Interestingly, in February of 2000, the European Parliament issued a report accusing the U.S. of using the NSA’s Echelon world-wide eavesdropping posts for commercial spying to help American companies win lucrative contracts over European competitors. The NSA’s operations are supervised by the CIA.


Regarding the CIA, Richardson states: “One of the committees I was giving testimony to, informed me that every tentacle they went down of the CIA when they were investigating it - they ran into E-Systems.”[11]

This is highly significant, since President Reagan’s Executive Order 12333, which privatized many covert intelligence operations, placed them out of the scrutiny of Congress and nosy FOIA requesters. Not surprisingly, CIA Director Bill Casey, CIA Deputy Director for Operations Ted Shackley, and former CIA Director George Bush reportedly attended the December 5, 1980 meeting to draft E.O. 12333, which states:

“Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes....”

Shackley and Bush are alleged to have been deeply involved in decades worth of CIA drug smuggling (as well as other nefarious activities such as mass murder). Casey was the architect of the Contra guns-for-drugs operation.

Curiously, a Raytheon press releases states:

Raytheon Company places the highest value on People, Integrity, Commitment and Excellence....[12]

Many of E-Systems’ former employees don’t agree. As Richardson writes:

“I have government documents showing government investigators found approximately one hundred million dollars in rip-offs at E-Systems, and estimated the total rip-offs at 25 to 30 percent of all contracts, which is approximately three billion dollars a year.”

According to his civil suit against the company, they were, or are, involved in:

Witness intimidation, harassment and terminating whistleblowers. Impeding a criminal investigation of E-Systems and government personnel. Mischarging, defective parts and/or workmanship, record altering, witness harassment and intimidation by E-Systems personnel, Federal agents and Hunt County Sheriff’s Dept. and others unknown or unnamed, bribery of government officials (U.S. and foreign), espionage against the United States and treason committed by E-Systems officials, conspiracy to cover-up the RICO activities, conspiracy to defraud the U.S. Government. Record altering by E-Systems and government officials. Possibly murder and/or attempted murder.[13*]

Richardson would become a central figure in the burgeoning E-Systems scandal.

“The way I fell into what was going on, was I was a liaison planner with access to the whole field, the whole process,” says Richardson, “all the way from where they keep records, to where they’re doing the designs, scheduling the work, the contracts - everything. I had access to all of it - enough to where I had a working knowledge of what they were doing.”


Billy Wayne Rath, another E-Systems employee who worked with Richardson, states in his own affidavit:

“...it was well known that Mr. Richardson was a stickler for having things produced correctly and on time, and one remark he made a lot that if you signed something and it was wrong then you were guilty. This fit company standards also which he took seriously.”[14]

Rath was fired for whistle-blowing. The DoD and General Accounting Office (GAO) confirmed that Richardson was also terminated for blowing the whistle. According to a GAO investigator contacted by the author, “Winfred appears to have been entitled to whistleblower protection and he never got it.... there did appear to be fraud involved.... That there was dirt going on... I’m convinced.”


E-Systems would call Richardson a “disgruntled” former employee. A congressional source familiar with the case would call Richardson’s claims “credible.”[15]

One example of the harassment perpetrated against E-Systems employees who cooperated with Senate investigators was Terry Briggs. Briggs, a security guard and a nine-year E-Systems employee, was fired for removing his shoe while propping up an injured leg during a break.

“There’s no doubt in my mind that I was fired because I was talking to the investigators,” Mr. Briggs says. “Whenever they fire you for having your shoe off after nine years [of employment], what else could it be?”[16]

In 1990, E-Systems was charged by the Pentagon of defrauding the Army on military radio contracts. As a result of the settlement, the company agreed to set up an anonymous “hotline” for employees to report fraud and other ethics abuses. Yet a subsequent report by the Pentagon’s Defense Logistics Agency claims E-Systems violated their probation agreement by providing “inaccurate and incomplete” reports on internal ethics investigations.[17*]

Former E-Systems Assistant Director of Security John Lanting told The Dallas Morning News that the company distributed letters urging employees to report the names of people who had talked with federal investigators. The letters, distributed in 1992 and ‘93, were signed by Vice President and General Counsel James Crowley. Lanting believed the letters constituted “borderline” obstruction of justice.

 Michael Eberhardt, who became an E-Systems attorney after working as an investigator in a government probe of the company, said the company just wanted to help workers “learn more about the process,” and determine the allegations it was facing.[18]

Yet Richardson, Rath and Briggs would be only three of at least 15 cases of retaliation against E-Systems whistleblowers and witnesses.[19] As Richardson states: “... we’re talking about billions of dollars; we’re talking about four crashed airplanes and fifty to a hundred dead people.”[20]

That was in 1993.

Drug Smuggling

As previously mentioned, E-Systems portrays itself as a model of public integrity and community service. As their press release states:

“We creatively apply our expertise to enhance the communities where we live and work, addressing current needs and opening new doors of opportunity.”[21]

One of those doors of opportunity, reportedly, is drug smuggling. According to statements of former E-Systems employees and agents at the Northeast Texas Drug Interdiction Task Force, E-Systems developed sophisticated electronic systems to enable drug planes to cross the U.S. border without tripping NORAD Early Warning and other surveillance systems.

As Rath states: “The electronic holes used to avoid radar involves a ground proximity following system tied into the plane’s yoke and pedometer - sort of an autopilot that allows the plane to fly low and follow the ground’s contour. We put them on 24 aircraft - including the Combat Talon Two aircraft.”

Rath explains that they were ostensibly installed on planes as a result of the failures at Desert One - President Carter’s ill-fated 1980 hostage rescue attempt in Iran that resulted in the deaths of eight servicemen.


“This was all Joint Operations Command and Special Forces stuff,” says Rath.[22]

Another E-Systems employee named Rick (not his real name) who was terminated for blowing the whistle, is a former self-described CIA operative who flew for Air America in Southeast Asia and for Southern Air Transport in Central and South America - both well-known CIA drug courier lines.
  • He states that Oliver North was one of his bosses.


A pilot, mechanic and small arms and explosives expert, Rick worked for E-Systems from 1986-91 as an assembler and inspector, working on “classified” aircraft such as “Casper” and “The Ghost” - both C-47 gunships used in Central America. He eventually became disenchanted with the operations.

Describing how infrared systems are used to fly low and make drops, Rick states: “E-Systems is probably one of the biggest drug drops there is in this area,” and says that Hunt County is another. “The drops are made at E-Systems and Lake Tawakoni. We’re talking bale-of-hay-sized coke shipments.... The planes’ N-numbers are always repainted after coming in.”[23]

Billy Rath explains about the drops: “if an airplane crashes, or let’s say a drug airplane that was seized, and you want to assume a different tail number, you just paint a new tail number on it. It’s like assuming a new identity using a death certificate. The crashed plane doesn’t stay on the FAA computer that long. You simply wait for it to die on the computer then you resurrect the tail number....”


According to all three former employees, the drugs were flown by E-Systems using government planes on contracts let by Air Force Special Operations Command (AFSOC).
  • As Rath states in his affidavit:


“We had several NSA contracts, which were let under Air Force Special Ops contracts and orchestrated by Mr. Bobby Harris. One of these contracts was Flame Dancer, part of the Contra aircraft (C-47 Gunships delivered to South America, Sandinistas), and Team Casa aircraft that has slide in and slide out tail numbers. I also worked on North Sea, another of the black programs, which was tied to Desert TEA and Woodstock, which provided a large amount of electronic technology that borders on [whether] it should have been released or not to foreign nationals, possibly compromising our ability to defend ourselves with others having this knowledge....””


Team Casa were the C-47s used by Oliver North in his CIA/NSC illegal guns-for-drugs operation.
  • As Richardson says: “We turned them into gunships. They were sent down to Florida, they put the guns in them, then sent them down south. They were painted with wash-off paint.”


Tony Hughs, was the program manager who handled all the black world programs, according to Rath, using DET-2 money. Says Rath: “We were building Ollie North’s gunships.”

North testified before Congress that “Private Donors” paid for the planes and the modifications. This was little more than subterfuge. Private Donor was the code name for the Special Ops contracts!

“Buffalo and Montana were two planes that were used,” says Rath. “The points of contact at AFSOC were Sergeant Sprague and Colonel Manning Crump, commander of DET-2 (Air Force Detachment Two in Majorsfield, Texas).”

Sprague and Crump now work for E-Systems.

Kent Williamson, an attorney for the Northeast Texas Drug Interdiction Task Force gave sworn testimony in a court case about E-Systems’ drug-smuggling:

Q: How are you employed, Mr. Williamson?

A: I’m a prosecutor with the Northeast Area Drug Interdiction task force.

Q: Do you know who E-Systems is?

A: Yes.

Q: And who are they?

A: They’re probably the biggest supplier in Hunt Co.

Q: What type business do they have?

A: They do U.S. Government contracts on airplanes, I believe.

Q: And as part of their defense contracting, are they able to have planes fly in and out of the country, do you know?

A: I would assume that they would. I don’t know for sure

Q: Have you received any information from any source that there may be some type of illegal activity by any E-Systems pilots or any pilots flying for E-Systems - specifically, any information that would indicate that any of their pilots were using their planes to bring cocaine back into the United States?

A: Yes, I have.


Interestingly, FBI Deputy Director Oliver “Buck” Revell was transferred to the Dallas office as SAC around the same time as the drug-smuggling allegations broke - which began heating up with Senate hearings in June of 1991. (Revell was sent to Dallas in the summer of 1991.) Although Richardson alleges that Revell was sent there to keep a lid on the case, Revell vehemently denied any involvement with E-Systems.[24]

Yet at least one E-Systems whistleblower, Michele Cooper, had gone to Danny James, Revell’s subordinate at the FBI’s National Security Section with allegations of national security violations at E-Systems. For her honesty, James threatened to file charges on her - a standard FBI/DoJ tactic to silence whistleblowers. (See Chapter XX)

Other FBI agents who were contacted reportedly include Dan Birmingham, Jim Loun, David Malone, Max Higher, Kevin McQuery and Kenneth Pisano. According to Richardson, all were told about the drug drops as well as the fraud and harassment. Richardson claims to have seen FBI reports on drug dealers tied in with E-Systems and Hunt County going back to 1982. Some of those named at the meeting were so dangerous - allegedly involved in so many murders - that Richardson almost begged me not to mention their names.[25]

Although Buck Revell denied any involvement with E-Systems, Richardson alleges that Revell’s son works at E-Systems - bragging that his father got him the job. A check with E-Systems’ personnel office revealed a Michael A. Revell in their employment.[26]

As Richardson states: “I have tapes of a meeting I had here at my home with OSI (Air Force Office of Special Investigations) Agent Richard Bollinger, IGDCIS Special Agent Chris Hallien, FBI Special Agent Mark Briant and Hunt County Judge Dan Robertson. The meeting was to prove how much the FBI knew about the drug smuggling and the illegal technology sale to a foreign country and other RICO actions!

“Three police officers who agreed to testify about witnessing the drug drops by the government planes that were operated under the AFSOC lost their jobs and have been blacklisted. The DoJ tried to have it (the meeting) classified because of national security.”

Bob Weatherford, and Mike and Lori Lockridge, all East Tawakoni police officers, were the three who witnessed the drug drops. Weatherford said he saw the package being picked up by a Hunt County squad car, whereupon part of the drugs were given to a motorcycle gang. All three have since been forced to resign. Prior to their resignations, they were to attend a meeting at Richardson’s house along with agents Bollinger, Hallien, Briant and Judge Robertson. Although they didn’t show, Richardson feels the fact that they were to attend the meeting was leaked by Bryant.

As Hallien said at the meeting, two government investigators, Michael Eberhardt and Clardy (first name unknown) were leaking information to E-Systems. As Hallien says, “... if you want to call it a leak to E-Systems it is through Clardy....”[27]

Eberhardt would later become an E-Systems attorney.[28]

Weatherford would subsequently be chased while taking pictures of a suspected drug dealer’s home. When he radioed for back-up, it was refused. One of the dealers was related to Hunt County Sheriff Bobby Young. Young subsequently “jumped all over Bob Weatherford and refused to let him use his jail anymore and refused to let him use the radio because he was arresting the wrong people.” As Robertson said, “In this county it will get you in trouble real quick.”

Even Bryant admitted: “He (Young) has done a lot and gotten away with it.”[29]

After another meeting at Richardson’s home at which Bollinger, Hallien, Briant and Robertson met, they were followed by Hunt County Deputies.[30]

At the meeting Hallien told Richardson that E-Systems hired people to follow investigators who were looking into the company’s improprieties in Florida. As Hallien states: “... we know E-Systems followed around the investigators down in Florida. They’re doing it with you people now.... although they hired the people down there in Florida, in a sense they didn’t have to hire anybody, they had them right there in their pocket.”[31]

As for whistleblower Michele Cooper, both she and her son wound up dead.


The Harassment

Regarding the “highest value on People, Integrity, Commitment and Excellence” that Raytheon touts, their press release adds:
“Not only do these themes define our business practices, they define our Community Relations programs as well...”[32]

Indeed. All three whistleblowers I spoke to alleged extreme harassment, including surveillance, break-ins, death threats, murder and attempted murder by E-Systems and possibly the National Security Agency.

As Richardson states: “We have been broken into so many times my family feels it is commonplace. We were followed and harassed by the Hunt County Sheriffs Department which sent three squads of deputies to my daughter’s birthday party.

“It has also been confirmed that the DISC (Defense Industrial Security Command) agent at E-Systems is one of the Feds. He was following and harassing people.”
  • As Richardson’s lawsuit states:


“The Defendants’ legal staff and others used threats and intimidation to get employees to give false information to investigators, as well as instructing employees [in] what to say, and threatening to fire them if they deviated. This has been confirmed by investigators, but the AUSA’s (Assistant U.S. Attorneys) involved refused to do anything about it.”[33]

Richardson claims he suffered major harassment when E-Systems learned that he had tapes of Michele Cooper’s - who had personal knowledge of illegal covert operations at E-Systems.

“Louis Sams at E-Systems called Richard Bollinger at OSI and told him that I had Michele’s disks,” says Richardson. “Sams was the one who set up Senior Special Agent Chris Hallien at IGDCIS.”


That - and their belief that Richardson was taking pictures of E-Systems personnel changing tail numbers on drug planes - resulted in them placing a “wanted” poster with his and Sams’ pictures on it at the Hunt County Sheriff’s office. Both Sam’s and Richardson’s wives would be followed by unmarked Hunt County Sheriff’s cars.

“They put all the pictures of me up in the Sheriff’s Department and told all the deputies I was possibly a terrorist and to use extreme caution,” says Richardson. “It was an obvious attempt to have me legally murdered.[34]

“Well Chris Hallien came in and started investigating. Chris was probably the most honest person you’ll ever meet. He had gotten upset because of some of the stuff they had done to us and the way they were jacking with us. And one of the deputies told me that Bobby Young, former Sheriff, told him not to worry about Chris, because E-Systems is going to have him indicted.”

According to Rath, E-Systems attorney Nancy Hampton (then a paralegal) would ask FBI Agent Danny James to press extortion charges against Richardson. As Richardson’s lawsuit states:

“Defendants General Council sent AUSA Lynn Hastings a memo stating; “It appears Mr. Richardson went to Congress and the Washington press.” AUSA Hastings then called the defendant in to her office and threatened to file charges on me if I talked to any current or former E-Systems employees, congressional committees or the press....”[35]

“I called Bollinger, I called Hallien, I called the House and Senate Oversight Committees,” says Richardson, “and told all four of them what the deputy told me. They all laughed and said, ‘Hey, Hallien’s a 30-year agent. He’s got a blemish-free record - never anything.’

“Well they went in front of grand jury and got sealed indictments against him. Paul Coggins (U.S. Attorney for the Northern District of Texas - his wife was one of Clinton’s aides) called Chris personally when stuff started to happen and told him they declined to prosecute. [But] he had to retire, and they told him if he ever spoke to any of us, the indictments would be unsealed and he’d be put in jail and loose his retirement.”


As previously mentioned, another E-Systems employee who was threatened, harassed and terminated was Billy Rath. A 20 year employee, Rath worked as a machinist, assembler, and senior estimator. After Richardson blew the whistle, Rath became caught up in the drama. As Rath states: “I was a go-between between Rich and Nancy Hampton. Nancy knew that we were friends. We had worked together a long time, on a number of major programs....

“Well, I was pulled into office after office by her. Anytime I would have any conversations with Rich I would have to approach her. Automatically the tape recorder was turned on....”

Rath was told to stay in touch with Richardson and report back to Hampton verbally and in writing. The reports were supplied to Personnel Director Tom Coffee. As Rath states in his affidavit:

“These written reports had to be written favorable to the company, which meant I was to make Mr. Richardson sound as bad as possible which included altering the truth. It was this [or] I would lose my job.”


Richardson told Rath that he would only be satisfied when people were behind bars. When Hampton heard this, “she stated this was extortion and picked up the phone and called the FBI and informed them she wanted to file extortion charges against Mr. Richardson,” says Rath.[36]

The person she called was Special Agent Danny James, Buck Revell’s subordinate.

That was when Rath and his family began having real problems. His wife and children were run off the road on three different occasions - each time by brand new unlicensed sport utility vehicles.

“Anytime [Richardson] would come over to my house, my family would catch hell for it,” says Rath. “At first I didn’t put it together, But after the wife and kids kept getting run off road everytime he showed up - for the next two days after he showed up - I started putting two and two together. Especially when it’s new cars with no license tags - dealer’s cars.

“The second time, my wife was run plum off the road, almost through a fence. My kids were crying; my wife was hysterical.

“The next day I went into Nancy Hampton’s office and said, ‘Look, it’s funny - everytime Rich comes over to my house this happens.’ Well she whips the phone up and dials an in-house number:

“I’ve got Billy Rath here in my office and he is complaining about his wife and kids being run off the road on numerous occasions. Is it ours?” After the answer, she was still on the phone and looked at me and said “It’s not ours. Must be NSA.”[37*]

Shades of “Enemy of the State.”

“All the bombings, my wife getting run off the road - all occurred within two weeks of one another,” says Rath. “That tells me that whoever was sent in here was probably NSA, and they had a window [of time]. And it happened during union negotiations, during contract time....”

Rath believes at least some of the cars involved came from Greenville Ford - which had a contract with E-Systems.
  • The owner of Greenville Ford is Vernon Williams.


After Rath was terminated, Williams gave him a job. E-Systems apparently didn’t know Rath was working for Williams. As Rath states: “I was given a cubicle on the front of the floor. One day in walks [E-Systems Security Director] Bob Amick with a big canvas bag. He walks straight into Vernon William’s office.”

When Amick came out, the bag was empty.

“He was laundering money through the Ford dealership!” says Rath. “When he saw me - and buddy, you should have seen his face when he saw me - he turned as white as a sheet. And he was trying to hide that bag. It was funny as shit. He knew that I knew.”

Amick would also appear like clockwork whenever Rath stopped at the food service truck outside the E-Systems plant.

“Amick would always be there to strike up a conversation,” says Rath. “This began in 1993, around the same time Nancy Hampton began tasking me to keep tabs on Rich.... Everytime I’d go to that truck, that guy’d come out.”

Within months, the serious harassment began. One day Rath came to work to find his office ransacked. His boss, Allen Little, took him to meet George Parnell and Bill Davies - who answered to Bob Amick. They claim to have discovered pornography on his computer. Rath claims that no porn was on his computer.[38]

After E-Systems used sex to fire Rath, they used it to set him up. Says Rath: “AFLC, which is a division of the Air Force out here, they have their little party girls who go out in the vans whenever the Air Force boys come down. And one of those was thrown at me; I did not know she was tied to E-Systems.... It turned out her husband worked [there]....

“She lived with me for two weeks before I figured out what was going on,” says Rath, “and she kept pumping me for information. And everything was pertaining to E-Systems.... This was Allen and Sandy Nicholson....”


It was Nicholson who allegedly set Rath up on the pornography charges.

Yet the harassment didn’t stop. Rath was arrested on a warrant for assault with a deadly weapon - a charge filed by Sandy Nicholson. As Rath’s affidavit states:

“We separated the first week in December 1997. I thought everything was fine until approximately two weeks before Hunt County Deputies came to my house and arrested me. Mr. Nicholson called and informed me that he had helped them burn me once and was fixing to do it again. I didn’t know what he meant by that until I was arrested two weeks later....”[39]

During Rath’s court hearings, Judge Richard Beacum changed the court dates without notifying him, then had him picked up for missed appearances. That made Rath even more suspicious.

“I went to try to get a copy of [Beacum’s] campaign contributions, knowing he was tied with Raytheon Systems Political Action committee, and was denied access... (a violation of the Freedom of Information Act).”[40]

“He protects that because he doesn’t want us to know who is main contributor is,” says Rath. “We know; it’s E-Systems!

“Any of their henchmen who get in trouble, they run it through his court, and automatically they get slapped on the wrist.”

As Richardson adds about Judge Beacum:

“Judge Beacum was also the visiting judge when the pedophile that molested my daughter was captured after jumping probation and was wanted for over six years. Judge Beacum ruled [that] the pedophile had not broken any laws and turned the pedophile loose.”[41]

But the harassment against Rath continued. As Rath says: “I got fired on trumped up charges and I couldn’t make payments on my car. Well then they went and tried to make it a felony.... The local DA, Duncan Thomas, writes me a letter:

“You need to get in touch with my office immediately, The fact that you have not gotten in touch with the credit union at E-Systems could be a felony.”


As Rath states: “I thought I was building aircraft for my country, to protect my kids, the well-being of the United States of America.... I worked diligently, climbed up the company ladder, achieved a goal that I thought was reputable in the community. All of a sudden I found out that I was working for a company building what I thought were weapons of war, but was in fact making more drug addicts walk around the streets - to fund these operations.

“One wonders why in the great United States of America and all that we were promised, inalienable rights, etcetera - why a company like this is allowed to stay in business,” adds Rath. “The way they run things - it’s not right, it’s broken families up, it’s broken homes up. It’s caused a lot of people a bunch of money who really didn’t deserve it.”

The terrorism used against Rath’s family caused his 20-year marriage to end in divorce.

“I’ve had friends like Leo Salis that have been killed,” says Rath. “I’ve had friends who have had their houses bombed over what I’m talking about. There’s one guy there in Personnel who had his foot blown off.”

Both Rath and Richardson believe E-Systems Security Director Bob Amick was directly involved in the harassment and murder.

As previously stated, “Rick” was another E-Systems employee who was terminated - for blowing the whistle on falsifying records, working on aircraft that didn’t exist and manufacturing defective parts.

He was ultimately set up on explosive charges - allegedly an attempt to kill the man who fired him. As Rick states: “E-Systems will pretty much do what they have to do to get the attention off them.... You don’t fool with these guys. They’ll snap your neck in the middle of a crowd.”


As Richardson explains: “My brother was a retired Dallas cop. We were talking about this and I said, ‘Don’t you realize these people will kill you?’ He said, ‘Yes, I have reason to believe that they have the ability to,’ then he added, ‘You’re just being paranoid. They wouldn’t spend this kind of money to do this.’

“Well he and I were sitting there fishing, and a new pick-up pulls up. Two guys in suits get out and start opening up cases with electronic gear, and they start turning their antennas and playing with it. And he nudged me, and he wanted to know if it was them.

“On another trip down there with some friends, we get back, there’s a roll of Heavenly Soft toilet paper sitting on the truck. Now why would they spend the kind of money to basically jack with us?”

Richardson believes the message was, “Heavenly Soft toilet paper... ‘we’re going to wipe your ass.’ It’s just a way of jacking with you. I’ve had three heart-attacks and two bypass surgeries. They do not want me to relax, and going down there would be relaxing. They want to keep me tensed up. That way I could have another heart-attack and die.”


Harrassment Against the Author

Soon after my attorney, Mike Johnston, began talking to Richardson, he had his office broken into - at least twice. The first time they broke into his file storage locker, took off his lock, and replaced it with a high-tech looking lock. The building manager had never seen it before and had no idea where it came from.

The second time they left him a tape recording of a conversation between two unidentified men with his voice dubbed onto it. He believes the implication being that he had illegally recorded a phone conversation, and if he doesn’t back off, they’ll take him down for wire statute violations.

Several days before I was scheduled to meet with Richardson, I walked outside to find all my tires slashed. Richardson told me that two people connected with his case had their tires slashed in a similar manner.

Recently, Richardson’s radiator hose was removed from his pick-up.

Shortly after I appeared on a nationally syndicated radio show to discuss the harassment, Richardson’s e-mail box was jammed with thousands of messages - from homosexual news groups and others. He believes the messages were a form of harassment by computer hackers working for E-Systems and the NSA. Shortly thereafter, his computer went down with a virus.

When I sent Richardson copies of a U.S. Customs report on the “Finders” - a pedophile group tied into the CIA - Richardson got a message that displayed fireworks and said “Happy ‘99!” A virus then swept through his computer.

When I e-mailed a completed draft of this story to Billy Rath, he said it had been intercepted and rewritten to make it look “as though a 12 year-old had written it.” This had the effect of creating distrust between me and my source.

While Richardson and I were sitting in Rick’s frontyard, he received a call from a relative in foreign country - an intelligence operative. The caller said, “Rick, they know they’re there (meaning myself and Richardson). Watch your six.”

We had been there less than 15 minutes.

Regarding surveillance by satellite, Richardson says: “They’ve got a code - XR-7546 or whatever. They can pull it up and see exactly what you’re doing on the road. But you lock in on a unit, and that computer will track it.”

But wouldn’t other employees catch sight of illegal operations such as survielling citizens? Not according to Richardson. “It’s compartmentalized. They catch you snooping and you’re history. You focus on what you’re doing.”


The Murders

All three former E-Systems employees told me about approximately half-a-dozen murders connected to E-Systems.


As Richardson explains, if they really want to get to you they murder your family members.” Richardson was very close to his brother. He died of a “fast-acting cancer” in August of ‘96.


“E-Systems was trying to control people,” adds Rick, “and they did a damn good job.”

Mark Biggerstaff was Richardson’s daughter’s boyfriend. Biggerstaff was found hanged on the last day of school. It was the first time he had gotten to take his truck to school after turning sixteen. Documents obtained from the Greenville Police Department state that the perpetrators listened to his heart and took his pulse to make sure he was dead before calling for help.” The police claimed he accidentally hung himself.

Richardson himself has suffered several attempts on his life. As he writes:

“There was an attempt to blow me up back in ‘87 when I first went to the government.... The [Air Force] Colonel gave our names to the company as well as the information after promising to keep it in confidence.... He also stated to me in his most menacing voice that ‘I was messing with hundreds of millions of dollars and was in more danger than I had ever been in my life’(!) this was Col. Manning Crump, at the time Commander of Det-2 at E-Systems! Crump admitted under oath he had given my name and information to E-Systems! He later admitted under oath going to work for E-Systems before he retired....”

Richardson describes the story about the attempt to bomb his house: “Bob Amick called the guards together and told them he wanted to know what I was doing and where I was going and who I was seeing, where I lived, what kind of cars I drove, my license plate numbers - to gather together all of this information and bring it back to him.

“After he gets this information - I was driving an old red ‘72 pick-up - and I had some trouble with it so I took it over to my mother’s house and worked on it over there. And she just lived across the road from me - but she had big hedges that covered the yard so you couldn’t see where the truck was.

“Well my neighbor happened to have one also, and this was in ‘86 or ‘87. But even then, ‘72s were rare enough, for a street a block long to have two of them the same color was unusual.

“Well Bob Amick came down there; his car was seen in front of my house one night. He backs back down the street with his lights out and all this kind of stuff.

“Anyway the next day, the trailer house that had the red pick-up like mine... it blew up. The house blew up!”

Fortunately no one was hurt. Richardson explains that his house and his neighbor’s house were very close together.

“They were going by the truck,” says Richardson.

“When [Loneoak Police Chief] Larry Osborn heard about it, he called the FBI to investigate - to see if it was a bomb.... Well it’s several weeks before the FBI ever gets there. Then they tell Larry, ‘Oh, well it’s been so long now we wouldn’t be able to find anything.’

“They didn’t investigate!

“This is all a matter of record - Senate Oversight and House Oversight.
  • They came down and took witness statements, documents... they have the whole nine yards on all of this.”


A GAO investigation found rather minor cases of fraud. While a congressional investigation was opened on E-Systems, it never went anywhere.

“It was an open investigation until the Republicans gained the majority in the House and Senate,” says Richardson, “then they just shut it down.... The first thing the Republicans did before they were even sworn in was let all the committee members go and close all the investigations....

“This is an election year,” adds Richardson. “If they don’t get Prince George (George Bush, Jr.) and his court jesters in, they’re in deep shit.”


Interestingly, the Greenville Herald-Banner reported that one of the first places little George went on his presidential fund-raising trip was to E-Systems.


Little George would also be a regular guest on a plane from Barry Seal’s drug smuggling fleet.

As for Bob Amick: “Amick is still connected,” says Richardson, “through the NSA. He was in the Pentagon for years before he retired from the military. John Lanting was his assistant.

“Lanting eventually rolled over and talked. He’s now in hiding.” (See letter from Lanting to Amick in Appendix)

Interestingly, Amick’s name was listed on the attendee roster of the Seventh Annual Symposium and Exhibition on Special Operations and Low Intensity Conflict. The agenda featured topics such as joint warfare, effective application of psychological operations forces, and counter-terrorism, among others.[42]

As previously mentioned were at least 15 other E-Systems witnesses and whistleblowers.

Michele Cooper had briefed former NSA (and CIA) Director Admiral Bobby Ray Inman - then a civilian consultant to E-systems - on at least six black budget operations. Cooper allegedly knew about sales of systems overseas to Iraq (that allowed them to spy on enemy troop movements during their war with Iraq, which Richardson believes was subsequently used to spy on and target our own troops during Desert Storm) and the bribery of officials.

As previously mentioned, Cooper had gone to Danny James - “Buck” Revell’s subordinate - at the FBI’s National Security Section, with allegations of national security violations at E-Systems. James threatened to file charges on her.

Richardson had some of Cooper’s computer disks.

“These disks scared them so bad they brought a computer expert down to open them,” says Richardson, “but there was nothing on them.... Cooper was the one who blew the whistle on Bobby Ray Inman.”

Cooper and Richardson were subpoenaed to testify at Inman’s confirmation hearing for Secretary of Defense. Inman backed out before the hearings were held.

“He didn’t want to answer questions,” says Richardson.

Cooper’s son was killed in 1994. Police said the boy died from sniffing glue. Yet police found no glue when they searched his room.

Michele Cooper died four years later, of fast-acting cancer.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline RonPaulRocks

  • Member
  • *****
  • Posts: 1,643
  • Neocons Beware!
    • Calgary 9/11 Truth
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #6 on: August 12, 2011, 12:12:28 AM »
What does this all mean?  Is this an admission that the hijackers all were CIA?
Freedom is the right to tell people what they do not want to hear.  -- George Orwell

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #7 on: August 12, 2011, 12:13:36 AM »

Apr 14 2007, 06:40 AM
“Is this real-world or exercise?”: Cyber-PsyOps Warfare & 9/11

Part IV: Ptech, the OODA Loop and SAIC


    "By 8:56 a.m., it was evident that Flight 77 [which hit the Pentagon] was lost. The Federal Aviation Administration, already in contact with the Pentagon about the hijackings out of Boston, notified the North American Aerospace Defense Command, or NORAD, of American 77 at 9:24, 28 minutes later."

    "'We Have Some Planes,' Hijacker Told Controller", New York Times, 16 October 2001

****

    "I want to get though to the White House to reiterate that we need air cover."

    New York Mayor Rudolph Giuliani to Police Commissioner Bernard Kerik
    at the World Trade Center just after the second attack on the World Trade Center
    Time Magazine, 7 January 2002

****
Indira Singh describes the software she sought, the search for which brought her to PTECH:

“The job of this software was to think about all the information that represented what was going in the enterprise at any given time…. For example, it would, it would be a surveillance software that would look at trading patterns that indicated someone was up to no good and then do something about it, send a message somewhere, send a transaction information somewhere, perhaps shut their system down, perhaps shut another system down, perhaps start something up elsewhere… I asked all my colleagues who were industry gurus what would they recommend for this. My buddies recommended PTECH…. it has an artificial intelligence core…. “

“… the networks were going to run the Ptech story on the first year anniversary. However, the White House got wind of the investigation – I have proof of that – and shut the story down in late August.”

http://911citizenswatch.org/September-Hearings.pdf
Bob Ruppert: p. 90 ff Indira Singh: p. 126 ff

A transcript of a radio interview with Indira Singh Audio here

Mr.John Pike, GlobalSecurity.org:

    When you look at all of the different military security agencies that [Ptech has] as customers, it's very difficult to imagine how they would not be encountering sensitive information, classified information.

*****
“The company, once known as PTech (now GoAgile), has been contracted to provide sophisticated computer software to several government agencies, including the Army, the Air Force, Naval Air Command, Congress, the Department of Energy, the Department of Justice, Customs, the FAA, the IRS, NATO, the FBI, the Secret Service, and the White House.

Shortly after 9/11, the company’s primary investor, Yassin al-Qadi (al-Kadi), was identified by the US government as a specially designated global terrorist. Officials describe al-Qadi as one of Osama bin Laden’s "chief money launderers," and allege he transferred as much as $3 billion to al-Qaeda during the 1990s.

Al-Qadi is a wealthy Saudi with connections to banking, diamonds, chemicals, construction, transportation, and real estate. He once headed Muwafaq, an Islamic charity the US Treasury Department described as an “al Qaeda front that receives funding from wealthy Saudi businessmen.” Al-Qadi also maintained an unusually close relationship with notable US politicians. While attempting to defend Ptech, the American Arab Anti-Discrimination Committee of Massachusetts (ADCMA) revealed the fact that al-Qadi “was prominent in Washington circles and even showed President Jimmy Carter and Dick Cheney around during their visits to Saudi Arabia.”

Al-Qadi told an Arab newspaper in October of 2001 that he “spoke to [Dick Cheney] at length” and they “even became friends.” Similarly, while speaking with Computer World Magazine, Ptech cofounder Oussama Ziade said that al-Qadi “talked very highly of his relationship with [former President] Jimmy Carter and [Vice President] Dick Cheney."

Ptech, under al-Qadi’s ownership, supplied the US government with what is known as enterprise architecture. According to Glenn Watt of Backbone Security, "Enterprise architecture is really the design, the layout, the blueprint if you will for the computer networks and computer systems that are going to go into an organization." In regard to Ptech, he said, “The software they put on your system could be collecting every key stroke that you type while you are on the computer. It could be establishing a connection to the outside terrorist organization through all of your security measures." John Zachman, who is considered the “father” of enterprise architecture, said, "You would know where the access points are, you'd know how to get in, you would know where the weaknesses are, you'd know how to destroy it."

Former FBI counterterrorism analyst Matthew Levitt has said, “For someone like [al-Qadi] to be involved in a capacity in an organization, a company, that has access to classified information, that has access to government open or classified computer systems would be of grave concern.”

http://www.onlinejournal.com/artman/publish/article_570.shtml
Please read the entire article at the link above…

as well as this one:
http://www.frontpagemag.com/Articles/ReadArticle.asp?ID=17730

See also (and read in their entirety) the Cooperative Research notes on Ptech which note:

“Ptech will help build “the Military Information Architecture Framework, a software tool used by the Department of Defense to link data networks from various military computer systems and databases.”

*******

Mike Ruppert:

“Whoever plotted 9/11 definitely viewed the FAA as an enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful. To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House & Secret Service had the same software on their systems - likely a superior modified version capable of "surveillance and intervention" functions…. Enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the enterprise in real-time.” [Doesn’t that sound like having good situation awareness?]

Ptech Inc. Confidential Business Plan: Page 37 of 46 11/7/2001:

    “The FAA recognized the need for leveraging its IT investment, with a means of centralizing activities and introducing consistency and compatibility within the operating systems environment. A Ptech consulting team was organized to use activity modeling to identify key functions that could be examined for improvement in network management, network security, configuration management, fault management, performance management, application administration, network accounting management, and user help desk operations.”


Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Mitre knew the FAA's technological enterprise inside and out, including any simulation-and-testing (war game) technology operated by the FAA.

************

According to Ruppert:

    “ Ptech is Total Information Awareness . . .“Programs based on datamining are powerful analytical tools; finding meaningful patterns in an ocean of information is very useful. But when such a tool is driven by a high-caliber artificial intelligence core [P-tech], its power gets spooky. The datamining capability becomes a smart search tool of the AI [Artificial Intelligence] program, and the system begins to learn. . . . ’Neural Network’ programming is modeled on the computational techniques used by the human brain - an electrochemical computer that uses neurons instead of semiconductors; the firing or non-firing of neurons instead of ones and zeros. With neural networking, software has become much smarter than it had been . . .

    “ . . . Ptech's Framework can exploit the patterns it detects and extrapolate future probabilities. Then it can integrate itself with the computers from which it's getting the information and intervene in their functioning. The result is a tool for surveillance and intervention. The program can identify suspect streams of cash in a banking network and allow a bank officer to freeze the suspect assets. Of course, a user could direct the same program to prevent detection. It can discover salient anomalies in a person's movements through a city and either flag those anomalies for further scrutiny, or erase them from the record. And it can find errant flights in an air traffic map and initiate an intercept response. Or not.”


Read about the DOJ and FBI investigations of Ptech here.

Note also that Chertoff was minority counsel in the first Senate investigation related to the death of Vincent Foster and majority special counsel in the second such Senate investigation. See http://www.libertypost.org/cgi-bin/readart.cgi?ArtNum=81709 .


Neither Indira Singh, nor Ptech, warrant a mention
in the official 9/11 Commission report.

******************************

The OODA loop is used to create “the fog of war”.

According to Col John Boyd's observation-orientation-decision-action (OODA) loop theory, this kind of offensive effort can "enmesh [the] adversary in a world of uncertainty, doubt, mistrust, confusion, disorder, fear, panic, chaos . . . and/or fold [him] back inside himself so that he cannot cope with events/efforts as they unfold."

If someone truly understands how to create menace and uncertainty and mistrust, then how to exploit and magnify the presence of these disconcerting elements, the Loop can be vicious, a terribly destructive force, virtually unstoppable in causing panic and confusion and – Boyd’s phrase is best – “unraveling the competition”.

The most amazing aspect of the OODA Loop is that the losing side rarely understands what happened.”

    “Gingrich had been out of the House for nearly 3 years, but he was an ally of Rumsfeld and a member of his Defense Policy Board, an influential advisory group. Gingrich was also one of a number of military theorists in the nineteen-eighties who tried to imagine a new American military suited to a world beyond the Cold War. Their intellectual patron was the late Air Force Colonel John Boyd, whose cardinal tenet was a concept that he called the “OODA loop”. (From http://www.newyorker.com/fact/content/arti.../030630fa_fact3)

In addition to the use of the OODA loop in strategic management and operations with multiple war game scenarios, the OODA loop also has widely accepted application within computer programming circles, especially as it pertains to cybersecurity. Some examples:

    Wood, Bradley and Schudel, Gregg, Modeling Behavior of the Cyber Terrorist, (pre-publication draft presented at various 1999 DARPA Workshops). This paper identifies an adversary cycle that leads to such a “packet of death”. This cycle consist of an Adversary Orient, Observe, Decide and Act (OODA) loop consisting of intelligence gathering, preparation, and development, live network discovery, test-practice-replan, attack and damage assessment processes.

    “Information warfare, in its essence, is about…the way humans think and, more important, the way humans make decisions.” (Stein, 1996)

    ”Effective information operations entail some of the most extreme warfighter demands ever encountered. This is especially true for information operations, where the prospects include the fastest, most numerous, most anonymous, and most rapidly reconstitutable attackers in military history. The information operations mission must be accomplished in an environment (“cyberspace”) where “fog” is common and routine access can become pure “friction.” Moreover, the operations tempo is marked in milliseconds, and this makes information operations the warfighting effort most reflective of Col. John Boyd’s (1987) analysis in terms of adversaries’ OODA (Observe-Orient-Decide-Act) Loops.

    High performance information operations entail global situation awareness (SA), efficient threat identification, and effective attack assessment. To achieve these ends watch center staff must monitor, manage, and manipulate data streams and information artifacts large in number, high in complexity, and dynamic in the extreme.”

    From a paper published on March 23, 2000 entitled “CYBER WARRIOR: INFORMATION SUPERIORITY THROUGH ADVANCED MULTI-SENSORY COMMAND AND CONTROL TECHNOLOGIES” found here: http://www.hec.afrl.af.mil/Publications/n-101.pdf.

SAIC

SAIC has been involved in military simulation.

SAIC was one of four contractors selected to provide support for Phase I of the U.S. Air Force Distributed Mission Training Operations and Integration program. See http://www.saic.com/news/sept99/news09-15-99.html.

“SAIC has unique experience in information security, Internet-based video networks, video search and indexing. SAIC’s government services expertise, specifically its reputation in supplying security solutions for the DOD, NSA and FBI, provides Onstream Media and its customers with top-notch engineers and the highest DOD-level security infrastructure.”

In 1998-1999, SAIC was also involved in a study of functional system performance parameters and decomposition of air traffic control/air traffic management. See http://as.nasa.gov/aatt/rto/Br19.pdf (See especially page 15).

According to SourceWatch:

    “Christopher Ryan Henry, SAIC's corporate vice president for strategic assessment and development, previously worked at the the Pentagon as deputy undersecretary of defense for policy, serving with Under Secretary of Defense for Policy Douglas Feith." In 2006, they were dropped from an Iraq war psy-ops project.

According to Mark Lewellen-Biddle in his December 2003 article Voting Machines Gone Wild!,

    “… Diebold hired Scientific Applications International Corporation (SAIC) of San Diego, to assess the security of the company’s voting software.... Many SAIC officers are current or former government and military officials. Retired Army Gen. Wayne Downing, who until last summer served as chief counter-terrorism expert on the National Security Council, is a member of SAIC’s board. Also on the board is former CIA Director Bobby Ray Inman, who served as director of the National Security Agency, deputy director of the CIA and vice director of the Defense Intelligence Agency. During the first Bush administration and while on the board of SAIC, Inman was a member of the National Foreign Intelligence Board, an advisory group that reports to the president and to the director of Central Intelligence.

    Retired Adm. William Owens, a former vice chairman of the Joint Chiefs of Staff who sits on Defense Secretary Donald Rumsfeld’s Defense Policy Board, served as SAIC’s president and CEO and until recently was its vice chairman. He now is chairman of the board of VoteHere, which seeks to provide cryptography and computer software security for the electronic election industry. Robert Gates, ex-CIA director, former SAIC board member and a veteran of the Iran-Contra scandal, also is on the board of VoteHere.”

Non-Linear Dynamics of War

It was previously noted that war and the events of 9/11 were dynamic. There is an additional factor of such dynamism, that of non-linear dynamism. Dr. Linda Beckerman of SAIC wrote a paper in 1999 entitled 'The Non-Linear Dynamics of War". Interestingly, she references the OODA loop several times:

    The Boydian approach tracks extremely well with the nonlinear dynamics of war. He advocates that we "Operate inside adversary's observation-orientation-decision-action loops to enmesh adversary in a world of uncertainty, doubt, mistrust, confusion, disorder, fear, panic, chaos,..and/or fold adversary back inside himself so that he cannot cope with events/efforts as they unfold." He refers to the Strategic Game as "A game in which we must be able to diminish adversary's ability to communicate or interact with his environment while sustaining or improving ours".

    "Generate many non-cooperative centers of gravity, as well as disorient, disrupt, or overload those that adversary depends on, in order to magnify friction, shatter cohesion, produce paralysis, and bring about his collapse."

    … At the same time, we deny the adversary the same ability by disrupting his interactions to create non-cooperative centers....

    It is interesting to view Boyd's legacy to us in light of the role that new technology plays in our ability to wage war. It has become very vogue in some circles to invoke Boyd's OODA Loop as justification for new, superior technology to win "the information war". The idea is that we can be almost omniscient with regards to situational awareness, and become capable of replan and redirection at ever increasing speeds.

That article is hosted at a web site run by folks whose “methods closely follow the ideas of the late American strategist, Col John R. Boyd, USAF, particularly his concepts for dislocating competitors before engaging in decisive actions. We bring over 30 years of experience in this area, including several years working directly with Col. Boyd on applications of his strategy to business competition. Our services include training, consulting, and preparation of business plans and strategies. We also built and operate Defense and the National Interest which retains Col Boyd's original focus on military applications. This site specializes in the emerging "fourth generation" of warfare such as we experienced on September 11, 2001.”
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline RonPaulRocks

  • Member
  • *****
  • Posts: 1,643
  • Neocons Beware!
    • Calgary 9/11 Truth
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #8 on: August 12, 2011, 12:16:09 AM »
Dig boil it down please.

What does this all mean? in a paragraph in your own words.
Freedom is the right to tell people what they do not want to hear.  -- George Orwell

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #9 on: August 12, 2011, 12:20:50 AM »
What does this all mean?  Is this an admission that the hijackers all were CIA?

It means that the New World Order Psychopaths like Brzezinski, Kissinger, Rockefeller, Rothschild are up shit's creek without a paddle.

Expect more fake riots soon as they create a new version of Hitler's 'Enabling Act'...

http://www.historytimes.com/fresh-perspectives-in-history/20th-century-history/563-a-god-given-signal-the-reichstag-fire-1933
http://www.historyplace.com/worldwar2/timeline/enabling.htm
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #10 on: August 12, 2011, 12:26:05 AM »
Dig boil it down please.

What does this all mean? in a paragraph in your own words.

IT MEANS THAT RICHARD CLARKE, THE WHITE HOUSE ANTI-TERRORISM ADVISOR IS CALLING OUT GEORGE TENET, RICHARD BLEE, AND COFER BLACK AS F-ING TRAITOROUS PEICES OF CRAP!

IT MEANS THAT THE CIA CAN NO LONGER DENY THAT THEY RECRUITED THE 9/11 HIJACKERS FOR A RED TEAM FALSE FLAG ATTACK

IT MEANS THAT EVEN IF YOU DO NOT BELIEVE IN CONTROLLED DEMOLISHION OR PTECH, THE CIA WAS INSTRUMENTAL (ALONG WITH THE G7 BANKSTERS) IN THE PLANNING, EXECUTION, AND COVER UP REGARDING THE ATTACKS ON 9/11/2001!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #11 on: August 12, 2011, 12:30:38 AM »
Treasonous Statement from George Tenet, Cofer Black and Richard Blee
http://911truthnews.com/joint-statement-from-george-tenet-cofer-black-and-richard-blee/
August 11, 2011
Source: SecrecyKills.com



Richard Clarke was an able public servant who served his country well for many years. But his recently released comments about the run up to 9/11 are reckless and profoundly wrong.

Clarke starts with the presumption that important information on the travel of future hijackers to the United States was intentionally withheld from him in early 2000. It was not.

He wildly speculates that it must have been the CIA Director who could have ordered the information withheld. There was no such order. In fact, the record shows that the Director and other senior CIA officials were unaware of the information until after 9/11.

The handling of the information in question was exhaustively looked at by the 9/11 Commission, the Congressional Joint Inquiry, the CIA Inspector General and other groups.

The 9/11 Commission quite correctly concluded that “…no one informed higher levels of management in either the FBI or CIA about the case.”

In early 2000, a number of more junior personnel (including FBI agents on detail to CIA) did see travel information on individuals who later became hijackers but the significance of the data was not adequately recognized at the time.

Since 9/11 many systemic changes have been made to improve the watchlisting process and enhance information sharing within and across agencies.

Building on his false notion that information was intentionally withheld, Mr. Clarke went on to speculate–which he admits is based on nothing other than his imagination–that the CIA might have been trying to recruit these two future hijackers as agents. This, like much of what Mr. Clarke said in his interview, is utterly without foundation.

Many years after testifying himself at length before the 9/11 Commission and writing several books but making no mention of his wild theory, Mr. Clarke has suddenly invented baseless allegations which are belied by the record and unworthy of serious consideration.

We testified under oath about what we did, what we knew and what we didn’t know. We stand by that testimony.



Commentary on the above by Erik Larson:

Clarke finds it impossible to believe that Tenet and Black were in the dark about the efforts of Rich Blee and Tom Wilshire, w/ the help of some subordinates, to deliberately prevent the FBI from learning that Khalid Almihdhar had a US visa, and Nawaf Alhazmi and a “companion” had traveled to the US in Jan 2000. At the time, NSA and CIA had reason to believe these two were connected to Al Qaeda’s communications hub in Yemen; the 1998 US embassy bombings in Africa which had killed over 200; and a summit involving high-level Al Qaeda operatives that had just taken place in Kuala Lumpur, Malaysia.

However, as Kevin Fenton documents in his book Disconnecting the Dots, there is no public documentary evidence that Tenet and Black were made aware of the presence in the US of these two, prior to Aug 22, 2001, and they may, in fact, have been unaware – or at least, they may have indicated to Blee and Wilshire that they did not want any documentary record of their being informed.

“In early 2000, a number of more junior personnel (including FBI agents on detail to CIA) did see travel information on individuals who later became hijackers but the significance of the data was not adequately recognized at the time.”

It is false that “the significance of the data was not adequately recognized at the time.” It is clear that Alec Station Deputy Chief Wilshire was aware of the significance of the data, because at the time it was learned that Almihdhar had a US visa, he instructed his subordinate, “Michelle”, to tell FBI detailee Doug Miller, who had recognized the significance of the data and was preparing to inform the FBI in a cable, that he was not to pass the info on to the FBI.

Shortly after that, Michelle sent a cable to several CIA stations informing them the info had been passed to the FBI, though it had not. The normal procedure when CIA passes info to the FBI is that there is not only a record that it was done, there is a record that CIA checked to confirm receipt; this documentation doesn’t exist, and CIA does not claim it does.

A CIA detailee to FBI, James, briefed two FBI agents, who were not CIA liaisons, about the Kuala Lumpur meeting – but failed to brief them on the only info that would be of particular interest to the FBI; that Almihdhar had a US visa. When another CIA officer was about to tell another FBI agent about these events, James briefed that FBI agent himself, and told the CIA officer he didn’t need to brief him. James was clear in his report about what he did and did not say.

It is unclear who may have read CIA Bangkok station’s March cable at the time re: Alhazmi and companion (Almihdhar) had traveled to the US, but the DOJ IG report notes a CIA cable in response that it had been read “with interest.” Wilshire did read this in May 2001, during the beginning of the period when reports were mounting of an impending Al Qaeda attack, and did not pass the info to the FBI, or do anything else with it apparently, even though his own emails in July, which Blee almost certainly received, make clear he believed Almihdhar would be connected to the upcoming attack.

Clarke surmises the reason this info was deliberately withheld was to protect an illegal CIA operation to infiltrate Al Qaeda in the US. Tenet, Black and Blee flatly deny this, and they may be right; Kevin’s documentation and analysis shows that the more probable explanation is that Blee and/or Wilshire were deliberate preventing the FBI from discovering and disrupting the 9/11 plot so that it could go forward. Even after the CIA began to pass on some info to the FBI in August 2001, Wilshire withheld other info and took steps to undermine FBI investigations.

“Clarke starts with the presumption that important information on the travel of future hijackers to the United States was intentionally withheld from him in early 2000. It was not.”

Even if this is true, why was this info not shared w/ him after Aug 22, 2001 when Tenet, Black and the FBI were officially made aware of it?

This Tenet-Black-Blee statement is very carefully worded, but does not get to the heart of the issues, and does not get any of these people off the hook for their pre-9/11 ‘failures’ and their obfuscations during the subsequent inquiries. They need to testify in public, under oath, with questions posed by an investigative body that is not compromised and riddled with conflicts of interest, the way the others were, especially the 9/11 Commission.

TRANSLATION OF THE STATEMENT BY TENET, BLACK, BLEE...

Hello, I am a treasonous piece of crap...just read the statement that I wrote if you do not believe me...
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #12 on: August 12, 2011, 12:38:56 AM »
Cofer Black Promotes a Cyber 9-11
(Reuters) - Different wars for different times. Cofer Black, a former top CIA counterterrorism official, said on Wednesday he sees parallels between the terrorism threat that emerged before the September 11 attacks a decade ago and the emerging cyber threat now.

http://www.reuters.com/article/2011/08/03/us-usa-security-cyber-idUSTRE7727AJ20110803
From the movie "A Few Good Men" concerning the American Soldier

Assisting Lawyer: Why do you like them so much?

Demi Moore's Character: Because they stand on a wall and they say "Nothing is going to happen to you tonight. Not on my watch."


Just so we know who is a protector of liberty and who is a soldier of Bilderberg...on 9/11/2001, Mitt Romney's National Security Advisor was on the wall and he was either f**king sleeping or he was a key part of the operation! I do not say this to sensationalize the issue. I say this because the facts are very damaging...FOR TWO YEARS HE HEADED THE OPERATION TO SURVEIL ALL OF BIN LADEN'S ASSOCIATES 24/7. HE HAD FULL AUTHORITY TO BUILD BASES SURROUNDING ALL OF BIN LADEN'S BASES. HE WAS THE OVERWATCH FOR THE ENTIRE REGION AND NOW WE KNOW FROM SIBEL EDMONDS THAT THE CIA KNEW ABOUT THE KAMIKAZE PILOTS MONTHS BEFORE 9/11/2001. YOU CANNOT MAKE THIS SHIT UP!


Cofer Black
http://en.wikipedia.org/wiki/Cofer_Black

-From 2005 until 2008, Black was Vice Chairman of Blackwater USA, a US-based private security firm which is the State Department's biggest security contractor.
-Black is currently the chairman of the privately owned intelligence gathering company Total Intelligence Solutions, which is a subsidiary of Blackwater Worldwide.
-On April 26, 2007 Black was chosen by Mitt Romney, a Republican candidate in the 2008 United States presidential election, to head his counter-terrorism policy advisory group.

Director of the CIA's Counterterrorist Center, 1999-2002

In June 1999 CIA chief George Tenet named Cofer Black director of the CIA's Counterterrorist Center (CTC).[4] In this capacity, Black served as the CIA Director's Special Assistant for Counterterrorism as well as the National Intelligence Officer for Counterterrorism.[5] Black's promotion was a part of Tenet's grand "Plan" for dealing with al-Qaeda. Black was the operational chief in charge of this effort. Tenet also put "Richard", one of his own assistants, in charge of the CTC's bin Laden tracking unit.

Black still headed the CTC at the time of the attacks of September 11, 2001.

Al-Qaeda strategy, 1999–2001

In December 1998 CIA chief Tenet "declared war" on Osama bin Laden.[6] Early in 1999 Tenet "ordered the CTC to begin a 'baseline' review of the CIA's operational strategy against bin Laden". In the spring he "demanded 'a new, comprehensive plan of attack' against bin Laden and his allies".

The CTC had produced a "comprehensive plan of attack" against bin Laden and "previewed the new strategy to senior CIA management by the end of July 1999. By mid-September, it had been briefed to CIA operational level personnel, and to [the] NSA, the FBI, and other partners." The strategy "was called simply, 'the Plan'."

... [Cofer] Black and his new [sic] bin Laden unit wanted to "project" into Afghanistan, to "penetrate" bin Laden's sanctuaries. They described their plan as military officers might. They sought to surround Afghanistan with secure covert bases for CIA operations — as many bases as they could arrange. Then they would mount operations from each of the platforms, trying to move inside Afghanistan and as close to bin Laden as they could to recruit agents and to attempt capture operations. ... Black wanted recruitments, and he wanted to develop commando or paramilitary strike teams made up of officers and men who could "blend" into the region's Muslim populations.

Black also arranged for a CIA team, headed by "Richard", who was in charge of the CTC's Bin Laden unit, to visit Northern-Alliance leader Ahmed Shah Massoud, to discuss operations against bin Laden. The mission was codenamed "JAWBREAKER-5", the fifth in a series of such missions since autumn 1997. The team went in late October 1999, and stayed for seven days. "The Bin Laden unit was satisfied that its reporting on Bin Ladin would now have a second source." Contemplated operations would be coordinated with the CIA's other prospective efforts against al-Qaeda.

Once Cofer Black had finalized his operational plan .... [Charles] Allen [then associate deputy director of central intelligence for collection] created a dedicated al-Qa'ida cell with officers from across the intelligence community. This cell met daily, brought focus to penetrating the Afghan sanctuary, and ensured that collection initiatives were synchronized with operational plans. Allen met with [Tenet] on a weekly basis to review initiatives under way. His efforts were enabling operations and pursuing longer-range, innovative initiatives around the world against al-Qa'ida. ...

It is not clear what relation this "Qaeda cell", which appeared to duplicate the function of the Bin Laden unit, had to the unit.

Parallel with these developments, in November–December 1999 Mohamed Atta, Marwan al-Shehhi, Ziad Jarrah, and Nawaf al-Hazmi visited Afghanistan, where they were selected for the "planes operation" that was to become known as 9/11.[7] Working with a Malaysian security unit, the CIA watched al-Hazmi and his companion Khalid al-Mihdhar as they attended a Qaeda conference in Kuala Lumpur in January 2000 (later determined to be where decisions about the "planes operation" were made).

"We surveil them. We surveil the guy they're there to meet," Black recalled. "not close enough to hear what they're saying, but we're covering, taking pictures, watching their behavior. They're acting kind of spooky. They're not using the phone in the apartment. They're going around, walking in circles, just like junior spies. Going up to phone booths, making a lot of calls. It's like, 'Who are these dudes?'"[8]

According to an internal CIA report on the performance of the agency prior to the 9/11 attacks, Cofer Black was criticized for not passing on information to the FBI that al-Hazmi and al-Mihdhar had subsequently entered the United States.[9][10] In addition, the 9/11 Commission found that while Black testified before Congress’s Joint Inquiry into 9/11 that the FBI had access to information on the two hijackers, the 9/11 Commission found no such evidence of this.[11]

The CIA increasingly concentrated its diminished resources on counter-terrorism, so that resources for this particular activity increased sharply. At least some of the Plan's more modest aspirations were translated into action. Intelligence collection efforts on bin Laden and al-Qaeda increased significantly from 1999. "By 9/11", said Tenet, "a map would show that these collection programs and human [reporting] networks were in place in such numbers as to nearly cover Afghanistan."[12]

During the summer of 2001, Tenet, Black, and one of Black's top assistants, "Rich B" (i.e. "Richard"), were active in advertising the dangers of al-Qaeda to the new Bush administration. At a meeting with National Security Adviser Condoleezza Rice and others on July 10, "Rich" predicted a "spectacular" terrorist attack against US interests "in the coming weeks or months" ... "Multiple and simultaneous attacks are possible". After the meeting, "Rich and Cofer congratulated each other", feeling that at last the CIA had gotten the full attention of the administration. At an internal CIA update in late July, "Rich" dramatically predicted, "They're coming here!" (i.e. the USA).[13]

One of the ways in which CIA/CTC surveiled Osama bin Laden in his Afghan base was with the Predator reconnaissance drone. A joint CIA-USAF program of flights in autumn 2000 (dubbed "Afghan Eyes") produced probable sightings of the Qaeda leader. Black became a "vocal advocate" of arming the aircraft with missiles to kill bin Laden and other Qaeda leaders in targeted killings. During the new Bush administration in 2001, Black and "Richard" continued to press for Predators armed with adapted Hellfire anti-tank missiles. Legal and technical issues delayed the program. Black urged Tenet to promote the matter at the long-awaited Cabinet-level Principals Committee meeting on terrorism of September 4, 2001. The CIA chief duly did so. The CIA was authorized to "deploy the system with weapons-capable aircraft". [See Bin Laden Issue Station.]

September 11, 2001

The CTC obtained passenger lists from "the planes that had been turned into weapons that morning". "[A] CTC analyst raced over to the printing plant" (where most CIA staff had been evacuated) and pointed out the names Khalid al-Mihdhar and Nawaf al-Hazmi, who they had "been looking for for the last few weeks". This was the first "absolute proof" that the attacks were a Qaeda plot.[15] (The CTC had first come across the names in connection with potential terrorist activity in the winter of 1999-2000 [see above].)
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #13 on: August 12, 2011, 12:40:55 AM »
One should not mention PTech without mentioning INSLAW PROMIS ...

http://www.wired.com/wired/archive/1.01/inslaw_pr.html

The INSLAW Octopus

Software piracy, conspiracy, cover-up, stonewalling, covert action: Just another decade at the Department of Justice

By Richard L. Fricker

The House Judiciary Committee lists these crimes as among the possible violations perpetrated by "high-level Justice officials and private individuals":

>> Conspiracy to commit an offense >> Fraud >> Wire fraud >> Obstruction of proceedings before departments, agencies and committees >> Tampering with a witness >> Retaliation against a witness >> Perjury >> Interference with commerce by threats or violence >> Racketeer Influenced and Corrupt Organizations (RICO) violations >> Transportation of stolen goods, securities, moneys >> Receiving stolen goods

...

The Background

Imagine you are in charge of the legal arm of the most powerful government on the face of the globe, but your internal information systems are mired in the archaic technology of the 1960s. There's a Department of Justice database, a CIA database, an Attorney's General database, an IRS database, and so on, but none of them can share information. That makes tracking multiple offenders pretty darn difficult, and building cases against them a long and bureaucratic task.

Along comes a computer program that can integrate all these databases, and it turns out its development was originally funded by the government under a Law Enforcement Assistance Administration grant in the 1970s. That means the software is public domain ... free!
...
But a retired CIA official whose job it was to investigate the Inslaw allegations internally told WIRED that the DOJ gave PROMIS to the CIA. "Well," the retired official told WIRED, "the congressional committees were after us to look into allegations that somehow the agency had been culpable of what would have been, in essence, taking advantage of, like stealing, the technology [PROMIS]. We looked into it and there was enough to it, the agency had been involved."
...
But the CIA was not the only place where illegal versions of PROMIS cropped up. Canadian documents (held by the House Judiciary Committee and obtained by WIRED) place PROMIS in the hands of various Canadian government agencies. These documents include two letters to Inslaw from Canadian agencies requesting detailed user manuals -- even though Inslaw has never sold PROMIS to Canada. Canadian officials now claim the letters were in error.

And, of course, the software was transferred to Rafael Etian's anti- terrorism unit in Israel. The DOJ claims it was the LEAA version, but former Israeli spy Ben Menashe and others claim it was the 32-bit version. According to Ben Menashe, other government departments within Israel also saw PROMIS, and this time the pitchman was Dr. Earl Brian. In a 1991 affidavit related to the bankruptcy proceedings, Ben Menashe claimed: "I attended a meeting at my Department's headquarters in Tel Aviv in 1987 during which Dr. Earl W. Brian of the United States made a presentation intended to facilitate the use of the PROMIS computer software."

Asked why Israeli intelligence would have been so interested in Inslaw and PROMIS, Ben Menashe said, "PROMIS was a very big thing for us guys, a very, very big thing ... it was probably the most important issue of the '80s because it just changed the whole intelligence outlook. The whole form of intelligence collection changed. This whole thing changed it." PROMIS, Ben Menashe said, was perfect for tracking Palestinians and other political dissidents.


Bill Hamilton, Inslaw & PROMIS

http://www.altacocker.com/other_items/promis-2-ptech.htm

PTECH, 9/11, and USA-SAUDI TERROR
PART II
PROMIS Connections to Cheney Control of
9/11 Attacks Confirmed
The FAA & Ptech
Debriefed by Secret Service - looking for a PROMIS
Muslim Brotherhood, Christian Cultists, and Nazis
by

Michael Kane

© Copyright 2005, From The Wilderness Publications, www.fromthewilderness.com. All Rights Reserved. May be reprinted, distributed or posted on an Internet web site for non-profit purposes only.

"I believe that Dick Cheney also had the ability using evolutions of the PROMIS software, to penetrate and override any other radar computer or communications system in the government."

- Mike Ruppert, in "Summation: Ladies and Gentlemen of the Jury," from Crossing The Rubicon, p.592

[At the heart of our story is a program (we'll call it Ptech, after the company that produced it) that combines artificial intelligence, datamining, and "interoperability," the capacity for one program to read, operate, and modify the source codes of other programs. The computational power of the Ptech evolution of PROMIS represents a daunting new surveillance-and-intervention capability in the hands of the same elites who planned 9/11, prosecute the subsequent resource wars, and are presiding over what may become a full economic and military disaster for the resource-consuming citizens of America and the world. Since the "War On Terror" and the coming dollar/fossil fuel collapse will necessitate new levels of domestic repression, this is just the capability those elites require. Ptech is the functional equivalent of Total Information Awareness.

The human side of Ptech is where the thievery and murder come in: among the financiers and programmers of Ptech are apparent members of an international network of organized criminals involved in decades of narcotraffic, gunrunning, money laundering, and terrorism. Their personal and professional connections reach up into the highest levels of the American government, and their activities are still underway.

The issue of Saudi complicity in the attacks of 9/11 has played out into two different views. The first is the idea that the Saudis were solely responsible. This has been pumped up by Fox News and largely accepted as gospel in certain parts of the mainstream media. The second view is that the Saudis were set up to take the fall for having pulled off 9/11, covering up U.S. complicity. Neither view is correct, and both depend on a mistaken view of that country as a monolithic, homogeneous actor on the world stage. The opposite is true.

At the top of Arabian society is the giant royal House of Saud, descendants of Abdul Aziz Ibn Saud, a charismatic warlord who used religious and marital alliances to consolidate his military conquests and, eventually, found a modern state on the Arabian Peninsula in 1932. Ibn Saud's success was partially dependent on his powerful religious allies, the inheritors of a doctrinaire form of Islam founded by the cleric Mohammed bin Abdul Wahhab (1702 - 1793). That coalition became increasingly unstable with the massive influx of oil wealth that began shortly after the first Arabian discoveries by SoCal (now Chevron) and Texaco, also in the 1930's.

Like virtually all Islamic states, Saudi Arabia has been the target of ongoing efforts by American intelligence aimed at suppressing any stirrings of incipient secular leftism. This is opposed, we believe, to what may be convenient and clandestine support for "al-Qaeda" terrorists (i.e. fundamentalists), acting as US proxies, who might destabilize the kingdom in advance of the US carving off only those regions with oil reserves. Socially polarized oil wealth, the ever-changing Arab-Israeli conflict, and American geopolitical maneuvering configure a daunting matrix of hidden forces that can't be fully understood or managed - not least because the intelligence elements are often double or triple agents with inscrutable loyalties.

The Ptech story is of intense interest for its implications about US government guilt in 9/11. As Ralph Schoenman, Michel Chossudovsky, Paul Thompson and others have argued, "al Qaeda" is not only traceable to CIA activity in Pakistan and Afghanistan during the Soviet period, it is also a current tool of American imperial ambitions. That directly contradicts the official story, in which al Qaeda is the foreign devil incarnate, a militant hate group formed straight from the soil of Saudi ideology - with no economic grievances, no interests in common with anyone in the non-Muslim world, and above all, no connections to the United States through funding, personnel, armaments, drug trafficking, visa assistance, or communications. It certainly is a militant hate group, but the rank and file may be totally unaware of real connections between their own leaders and the people they oppose with their very lives. These disturbing links would be just as agonizing - and just as unthinkable - for American citizens as they would be for a militant Islamist teenager in a ski mask jumping hurdles at some secret training camp.

Beneficiaries of the Ptech-connected MAK charities, the young men in Hezbollah and Hamas are fighting in land disputes, not heady ideological quests. They are also bitter, bereaved, murderous bigots with all the psychic rigidity and hysteria found in fundamentalists from Oklahoma to Hebron to Jeddah. Their hatred of the American national security state is surely absolute, but they are also beneficiaries of the Pentagon's need for an Enemy. That means that they can expect the United States to provide covert help of some kind at crucial points in the game. And the most despicable element in the American side of that process is the Bush-Cheney junta itself, which used its own assets inside the terrorist network associated with Osama bin Laden to murder three thousand civilians in New York, Washington, and Pennsylvania as a pretext for unending warfare. This was done for reasons of state. But it was also done for personal gratifications including vast sums of money, permanent blackmail over those involved, and a heroin-like rush of criminally insane individual power. Sophisticated or naïve, cynical or grandiose and idealistic, each person involved betrayed humanity. And the apparatus that permitted this remains in place - as do most of the personnel.

The solution to the Ptech problem is not just to get all that creepy software the hell off the computers. The bigger solution is transparency and disclosure, de-militarization and political internationalism; localization of production and exchange; and a more equitable distribution of resources and opportunity. As Stan Goff has explained in these pages, the word opportunity does not necessarily refer to competition for purchasing power and domination. It means the opportunity to grow Haitian rice in Haiti and sell it in Haiti, without having to contend with the export dumping of American corporate agribusiness. It means the chance to maintain a tribal existence in an Afghanistan that is neither the proving ground for a US-Soviet proxy war nor the playground of American-funded drug lords. And though all ideals are warped by the rigors of practice, this was the point of President Kennedy's de-escalation in Laos, his Alliance for Progress in Latin America, and his refusal to invade Cuba:

What kind of peace do I mean? What kind of peace do we seek? Not a Pax Americana enforced on the world by American weapons of war. Not the peace of the grave or the security of the slave. I am talking about genuine peace, the kind of peace that makes life on earth worth living, the kind that enables men and nations to grow and to hope and to build a better life for their children--not merely peace for Americans but peace for all men and women--not merely peace in our time but peace for all time.

Now let's get back to the business of sticking up for people who were murdered on 9/11 and in its aftermath, and to diminishing the present danger. - JAH].

January 27, 2005, PST 0900 (FTW) - Ptech - the software company whose major investors and directors are strongly linked to the Muslim Brotherhood - produced software that derived from PROMIS, had an artificial intelligence core, and was installed on virtually every computer system of the U.S. government and its military agencies on September 11, 2001.

This included the White House, Treasury Department (Secret Service), Air Force, FAA, CIA, FBI, both houses of Congress, Navy, Department of Energy, IRS, Booz Allen Hamilton, IBM, Enron and more.

Whoever plotted 9/11 definitely viewed the FAA as an enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful. To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House & Secret Service had the same software on their systems - likely a superior modified version capable of "surveillance and intervention" functions.

Ptech is enterprise architecture software, which Indira planned on customizing to use as "risk architecture" software.

Enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the enterprise in real-time. In the case of Ptech software installed on Whitehouse, Secret Service, Air Force and FAA systems, the enterprise included all of the data produced by those agencies in real-time.

Maybe this is why Ari Fleischer stated the Whitehouse didn't view Ptech as a threat; quite to the contrary.1 The Ptech software was a vital asset needed for the White House to execute the 9/11 plot, and may still be in place for possible use against professionals in government and military positions trying to do their jobs in the future.

The FAA & Ptech
In the 9/11 Commission report a "phantom flight 11" was added to the official version of what happened that day. A tape was played at the final commission hearing on June 17, 2004, of a woman from the FAA telling NORAD that flight 11 was still airborne at 9:24 am, long after it had actually struck the WTC. Originally this was reported to be the time when the FAA notified NORAD that flight 77 was off course and headed to the Pentagon.

This information was used by the commission to claim NORAD had never been informed that flight 77 was headed towards Washington D.C., leaving the FAA holding the bag for the penetration of the most heavily guarded airspace in the world. The commission's report states they were "unable to identify the source of this mistaken FAA information."

It has been clearly documented that "false blips," or radar injects, were placed on FAA radar screens on the morning of 9/11 as part of the Air Force war games that morning.2 "Phantom flight 11" fits the description of a "false blip." If it was, in fact, a radar inject, that would explain why the 9/11 commission was unable to locate the source of the "mistaken FAA information." The 9/11 war games are classified and specific information regarding such details is not publicly available. We do know by the time "phantom flight 11" appeared on FAA screens - 9:24 am - the war games had reportedly been called off.3

So what was it doing there?

FTW's position is that "phantom flight 11" was injected onto FAA radar screens by "the maestro"4 using Ptech software to override FAA systems. Let's examine the feasibility of such a scenario.

Ptech had been working on the data blueprint of the FAA's entire network for 2 years prior to 9/11. Their confidential business plan lays out just how much access they had to the FAA's data systems.

Ptech Inc. Confidential Business Plan: Page 37 of 46 11/7/2001

The FAA recognized the need for leveraging its IT investment, with a means of centralizing activities and introducing consistency and compatibility within the operating systems environment. A Ptech consulting team was organized to use activity modeling to identify key functions that could be examined for improvement in network management, network security, configuration management, fault management, performance management, application administration, network accounting management, and user help desk operations.5

What the above tells us is that Ptech had access to the entire informational barn door of the FAA's data systems. In an amazing exchange published in part 1 of this series, FTW editor Jamey Hecht was able to confirm a central thesis of Crossing the Rubicon while interviewing Wall St. Whistleblower Indira Singh. Indira is an IT professional who started First Boston's first Information Technology group in 1975 and had worked on Wall St. until 2002. She's been an IT consultant for Banker's Trust, the U.N., JP Morgan, and American Express. In 1988 she started TibetNet - a derivative of DARPA's Internet, the service you are likely reading this report on at the moment. The exchange was as follows:

Jamey Hecht: You said at the 9/11 Citizens' Commission hearings, you mentioned - its on page 139 of transcript - that Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Indira Singh: Yes, I have a good diagram for that…

Jamey Hecht: And that relationship had been going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that the Secret Service is among the government entities that had a contract with Ptech. Mike Ruppert's thesis in Crossing the Rubicon, as you know, is that the software that was running information between FAA & NORAD was superseded by a parallel subsuming version of itself that was being run by the Secret Service on state of the art parallel equipment in the PEOC with a nucleus of Secret Service personnel around Cheney.

…In your view, might it have been the case that Cheney was using Ptech to surveil the function of the people who wanted to do their jobs on the day of 9/11 in FAA & NORAD, and then intervene to turn off the legitimate response?

Indira Singh: Is it possible from a software standpoint? Absolutely it's possible. Did he (Cheney) have such a capability? I don't know. But that's the ideal risk scenario - to have an over-arching view of what's going on in data. That's exactly what I wanted for JP Morgan.

You know what's ironic about this; I wanted to take my operational risk blueprint which is for an operational event going wrong and I wanted to make it generic for extreme event risk to surveil across intelligence networks. What you're describing is something that I said, 'boy if we had this in place maybe 9/11 wouldn't have happened.' When I was going down to In-Q-Tel and getting these guys excited about creating an extreme event risk blueprint to do this, I'm thinking of doing exactly what you're saying Cheney might have already had! [emphasis added]

-- end of transcript

Ptech was working with Mitre Corp. in the FAA and, according to Indira, Ptech was the Alpha dog in that relationship. Mitre has provided simulation & testing technologies for the Navy.6 They provide multiple FAA technologies and boast in their annual reports that their two biggest clients are DOD & FAA. Mitre knew the FAA's technological enterprise inside and out, including any simulation-and-testing (war game) technology operated by the FAA.

This was the perfect marriage to ensure that the capacity to covertly intervene in FAA operations on 9/11 existed - in the middle of simulated war games.It is also the perfect marriage to ensure that the command and control of these capabilities was readily available to Dick Cheney via Secret Service Ptech software in the Presidential Emergency Operations Center, the bunker to which Cheney was "rushed" by the Secret Service. As already pointed out in part 1 of this series, Ptech does what Total Information Awareness (TIA, the DARPA program to monitor all electronic transactions in real-time) is supposed to do. (There are an undetermined number of other software programs in the hands of an undetermined number of corporations also capable of this. Again, enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the "enterprise" in real-time.

In the case of Ptech software, installed on White House, Secret Service, Air Force and FAA systems (as well as most American military agencies), the enterprise included all of the real-time data of the above mentioned agencies. Indira has confirmed Ptech software could have been set up to allow Dick Cheney to surveil and intervene on FAA radar screens.

As documented by former Bush counter-terrorism advisor Richard Clarke in his book, Against All Enemies, on 9/11 the Secret Service had the capability of seeing FAA radar screens in real time; and as documented by Mike Ruppert in Crossing the Rubicon, Secret Service has the authority to take supreme command over any and all American agencies - including the Air Force.

9/11 is a prime example of what Indira Singh calls "extreme event risk." In the months prior to the attack, she was working on a program capable of providing data in real time to prevent these types of events from happening. She had pitched this very idea just one week before 9/11 at In-Q-Tel Headquarters (CIA) in Virginia, giving a final presentation for an ICH (Interoperability Clearinghouse) project code named "Blue Prophet." Indira explained to CIA why she was supporting ICH in this project.

She told the In-Q-Tel team, "The intelligence and other agencies need this now." One of the men with CIA looked at Indira with what she describes as the "blackest, coldest look anyone has ever given her."

They weren't interested in Blue Prophet's software for interoperability or risk, but rather the data it would produce because the data would point in the right directions. That data was very predictive, producing quality real-time intelligence. This is one week before 9/11. If In-Q-Tel already had this capability, it's no wonder they would be wary of someone like Indira - the woman from New York in Risk Management who resided a few minutes' walk from the Twin Towers.

Debriefed by Secret Service - looking for a PROMIS
It was Indira Singh whose investigative research into Ptech laid the groundwork for this series. One of the first reporters Indira contacted was Joe Bergantino, a 20-year veteran investigative reporter for a CBS affiliate in Boston.

"There are some great people in mainstream media," says Indira, and according to her, Joe is one of them. Joe told her that Ptech's CEO Oussama Ziade had stated, "If it wasn't for that woman in New York, none of this (the Joint Terrorism Task Force (JTTF) raid) would be happening". Neither Joe nor Indira liked the way that sounded.

Joe contacted Senator Grassley's office. A Secret Service agent, Charlie Bopp, was reassigned to Grassley's office, and put in charge of the Ptech file. An initial meeting was scheduled with Indira in January 2003.

Indira showed up with what she called, "A major Ground Zero attitude." She was supposed to be on the 106th floor of the WTC on 9/11 but instead responded as a civilian EMT that morning. This was very personal for her. Charlie understood and nevertheless made the arrangements for a debriefing at the Secret Service's National Threat Assessment Center (NTAC) in April 2003.

During the debriefing Indira was asked by a member of the Secret Service, "Is Ptech PROMIS?"

"I already knew what had happened to Danny Casolaro, and they were asking me if I had copies of Ptech," Indira told FTW.

Danny Casolaro was the investigative journalist mysteriously "suicided" in a West Virginia hotel room while investigating the theft of PROMIS software. Casolaro's investigation had uncovered a shadowy network he called "the Octopus" that seemed to have its hands in everything from drug trafficking and money laundering, all the way up to political assassinations and coups d'etat. When Casolaro's body was discovered, his arms were violently slashed and all the documents he traveled with were missing. He had told friends and relatives if anything happened to him they shouldn't believe it was by accident.

Being asked such a loaded question, she responded with her Ground Zero attitude saying:

"You have a copy of the software, why don't you tell me? This is not about the software guys, ok - was it a PROMIS? It was a place you could hide a PROMIS, a place you can drop a PROMIS."

Indira told FTW, "I was going to use Ptech software for risk surveillance at JP Morgan - Duh!"

By the very nature of risk surveillance, it is necessary to use PROMIS progeny based on artificial intelligence to achieve the capabilities we are describing. Charlie Bopp and those present for Indira's debriefing knew this, but they wanted to talk about the software and not the people behind the software. That is extremely significant. In part 1 of this series we've shown how the major people behind Ptech link to the Muslim Brotherhood, elements of the Saudi Royal Family, as well as Dick Cheney and the powerful American 'Christian' cult known as "The Fellowship," or, "The Family."

Indira wanted to name names, but Charlie wouldn't let her. "We can't investigate the people behind Ptech," said Charlie. "Just trust me, let's focus on the software." They gave no reasoning for this, they just said, "we can't."

"Well if you can't talk about the people behind this, it's a waste of time because with software like that you can't find trapdoors now. This is live stuff!" Singh told FTW. "You can't prove an intelligent agent [a small software component that reaches out to claim or insert information from another system - Ed.] went out and sent information somewhere. It's like proving you ate a piece of cake when you were 10 years old, unless you have video of it, it's not going to happen. It's that ephemeral." [emphasis added]

In other words, PROMIS-based activity leaves no footprints.

This means trapdoors are no longer necessary, or at least, no longer detectable. If Indira is correct, there would have been no "fingerprints" left of any kind showing just what Ptech software was used for on 9/11 and who used it.

"These guys debriefing me were from Military Intel, so they were trying to find out what I knew," says Singh. According to her, August of 2002 (the month before the story on Ptech was shut down by the White House, and three months before Ptech was raided) was a significant month. There were supposedly leaks of some kind coming out of the Persian Gulf. She was asked if Ptech software could have been the source of those leaks.

Singh responded, "Well if Military Intel are using Ptech in the Gulf, obviously! YES!"

During one of the initial meetings Indira threw a hat on the table from FDNY Engine 4, Ladder 15 and said, "I want you to put this on your desk, so any time you think of playing some political games you remember there were real people down there."

Indira Singh was done playing games.

Muslim Brotherhood, Christian Cultists, and Nazis
In part 1 of this series we documented the extensive ties from the Muslim Brotherhood running through Ptech. The Brotherhood was founded by Hassan Al-Banna and expanded with the help of Mahmoud Abu Saud of the House of Saud.7

This extensive network runs through various shell organizations and charities with interlocking boards, such as the New Jersey based real estate investment company BMI, CARE International, and the Northern Virginia based SAAR network - named after al Sulaiman Abdul Al-Aziz al-Rajhi, a scion of one of Saudi Arabia's richest families. Heading the SAAR network (renamed Safa) is Yakub Mirza, who also sits on the board of Ptech. It is of interest to note that claims against Al-Rajhi Banking & Investment Corp. for funding and supporting terrorism were recently dismissed by U.S. District Judge Richard Casey.

One of the central funding mechanisms in this nexus is the Al Taqwa Bank of Switzerland - now Nada Management - which the Department of Treasury says funds Al Qaeda.

Hitler supporter Albert Friedrich Armand Huber (aka Ahmed Huber) and Youseff Nada sit on the board of Al Taqwa. Nada reportedly helped the Grand Mufti escape from Nazi Germany when the Third Reich was teetering on the brink of collapse, and Ahmed Huber knew the Grand Mufti quite well; so well in fact, it was the Mufti who convinced Huber to convert to (the Brotherhood's form of) Islam.

Huber has spoken publicly of a "New Right" marriage of Nazi ideology and Islamist fascism. He has both a picture of Adolph Hitler and Osama bin Laden in his Swiss home.

Al Taqwa is a "hawala," a bank conducting transactions leaving no paper trail through a "good faith" global network that transfers funds - no questions asked.8 Bank Al Taqwa is located in the Bahamas; the parent company, Nada Management, is based in Lugarno, Switzerland, and is linked to the Royal Family of Liechtenstein.

Al Taqwa has done business with Asat Trust. The now deceased Prince Emanuel von und zu Liechtenstein became a board member of Asat Trust in May 1970 and stayed until November 1990, when he was replaced by Martin Wachter, the trust's current director.9

Asat Trust is on the American and U.N. terror list. According to the American Jewish Daily Forward, copies of business registration documents on file with authorities in Liechtenstein show that Asat Trust has been intimately involved with the Al Taqwa network during the last 30 years, registering changes in company names, personnel and financial structure.10

Most frightening of all is that this network seems to have links back to the powerful American Christian cult known as "The Fellowship," or "The Family." This organization is tied to American 'Christian' men of high political power including John Ashcroft, Dick Cheney, George W. Bush, multiple Congressional members and prominent business leaders. Some "Family" members have stated they would love to have Osama bin Laden as a guest speaker because of the covenant he has with his followers. Doug Coe, the Family's leader who was praised by George H.W. Bush at the 1990 National Prayer Breakfast for his "quiet diplomacy," openly admires Hitler's "covenant."11

Yassin Al Qadi - the Saudi terrorist financier who funded Ptech and BMI - claimed to have met Dick Cheney in Jeddah before he became Vice President and the two "still share cordial relations." When Cheney's office was asked to comment on this, spokeswoman Jennifer Miller Wise stated the Vice President gave her no reason to believe he had met with Al Qadi before he assumed office.12

That is a non-answer; "no reason to believe" he met Al Qadi leaves no reason to believe he didn't. Regardless, there are more transparent connections between elements of Saudi and American elites.

In November of 2001, Halliburton was awarded a $140 million contract to develop an oil field in Saudi Arabia by the kingdom's state-owned petroleum firm, Saudi Aramco, and a Halliburton subsidiary, Kellogg Brown & Root, along with two Japanese firms, hired by the Saudis to build a $40 million ethylene plant.13

Dick Cheney is, of course, the former CEO of Haliburton.

As recently as 1991 ARAMCO had Khalid bin Mahfouz sitting on its Supreme Council or board of directors. Mahfouz, Saudi Arabia's former owner of the nation's largest bank, has been reported in several places to be Osama bin Laden's brother in law. However, he has denied this and brought intense legal pressure to bear demanding retractions of that allegation.14 He also denies any involvement in financing terror organizations.

One journalist who was sued by bin Mahfouz, Dr. Rachel Ehrenfeld, is counter suing in New York Federal Court. She is the only one of some 30 authors not to retract claims that Mahfouz has financed Al Qaeda operations as published in her book, Funding Evil: How Terrorism is Financed and How to Stop it.

Khalid bin Mahfouz has major partnership investments with the multi-billion dollar BinLadin Group of companies and is a former director of BCCI, the infamous criminal drug-money laundering bank which performed a number of very useful services for the CIA before its 1991 collapse under criminal investigation by the legal apparatus of multiple countries.15

George Herbert Walker Bush, George W. Bush and Dick Cheney all have extensive ties to the Saudi Royal family and Saudi elites, who in turn have questionable ties to terrorist financiers such as Yassin al-Qadi. It is therefore not unreasonable for Dick Cheney to have met al-Qadi while in Jeddah while CEO of Haliburton.

This is the reality of the world we live in; where a covert international power structure supercedes the interests of nation states, and the misnomer of "national security" is used to keep this network's secrets hidden from the prying eyes of authentic journalists and the public at large.
 
1 On the very day the FBI raids Ptech, Ari Fleischer - president Bush's press secretary - gives Ptech a "clean bill of health" by stating: "The material has been reviewed by the appropriate government agencies, and they have detected absolutely nothing in their reports to the White House that would lead to any concern about any of the products purchased from (Ptech)."
http://www.whitehouse.gov/news/releases/2002/12/20021206-4.html.

2 See Crossing the Rubicon, chapters 19 & 20.

3 See footnote #1 from Part 1 of this series.

4 "The Maestro" is the term used by Major Don Arias of NORAD to describe the individual who was in charge of coordinating the 9/11 war games. FTW's research has concluded the 9/11 maestro was either Dick Cheney, or both Cheney and General Ralph "Ed" Eberhart. See Crossing the Rubicon for full documentation.

5 Copy of page 37 of Ptech's Business Plan from 11/17/2001, provided by Indira Singh via email.

6 http://www.stormingmedia.us/07/0720/A072083.html.

7 http://www.washingtonpost.com/ac2/wp-dyn/A12823-2004Sep10?language=printer.

8 "A Banking System Built for Terrorism," by Meenakshi Ganguly, Time, 10/05/01: http://www.time.com/time/world/printout/0,8816,178227,00.html.

"Shareholders in the Bank of Terror?" by Lucy Komisar, Salon, 11/09/01
http://archive.salon.com/tech/feature/2002/03/15/al_taqwa/print.html.

9 "Terror Fund Trail Leads to Alpine Kingdom," by Marc Perelman, Forward
http://www.forward.com/issues/2003/03.10.17/news4.terror.html.

10 Ibid.

11 Coe listed other men who had changed the world through the strength of the "covenants" they had forged with their "brothers": "Look at Hitler," he said. "Lenin, Ho Chi Minh, Bin Laden." The Family, of course, possessed a weapon those leaders lacked: the "total Jesus" of a brotherhood in Christ.

"In a document entitled "Our Common Agreement as a Core Group," members of the Family are instructed to form a "core group," or a "cell," which is defined as "a publicly invisible but privately identifiable group of companions." A document called "Thoughts on a Core Group" explains that "Communists use cells as their basic structure. The mafia operates like this, and the basic unit of the Marine Corps is the four man squad. Hitler, Lenin, and many others understood the power of a small core of people." From "Jesus Plus Nothing," by Jeffrey Sharlet, Harper's, March 2003 http://www.harpers.org/JesusPlusNothing.html?pg=1.

12 "Software company tries to survive terror investigation," by Justin Pope, Associated Press, 01/03/03
http://www.boston.com/news/daily/03/ptech.htm.

13 "Bush Advisors Cashed in on Saudi Gravy Train," by Jonathan Wells, Jack Meyers and Maggie Mulvihill, Common Dreams, 12/11/01
http://www.commondreams.org/headlines01/1211-05.htm.

14 "COUP D'ETAT," by Michael Ruppert, FTW, 6/8/04 http://www.fromthewilderness.com/free/ww3/060804_coup_detat.html.

15 Ibid
 

Debriefed by Secret Service - looking for a PROMIS

It was Indira Singh whose investigative research into Ptech laid the groundwork for this series. One of the first reporters Indira contacted was Joe Bergantino, a 20-year veteran investigative reporter for a CBS affiliate in Boston.

"There are some great people in mainstream media," says Indira, and according to her, Joe is one of them. Joe told her that Ptech's CEO Oussama Ziade had stated, "If it wasn't for that woman in New York, none of this (the Joint Terrorism Task Force (JTTF) raid) would be happening". Neither Joe nor Indira liked the way that sounded.

Joe contacted Senator Grassley's office. A Secret Service agent, Charlie Bopp, was reassigned to Grassley's office, and put in charge of the Ptech file. An initial meeting was scheduled with Indira in January 2003.

Indira showed up with what she called, "A major Ground Zero attitude." She was supposed to be on the 106th floor of the WTC on 9/11 but instead responded as a civilian EMT that morning. This was very personal for her. Charlie understood and nevertheless made the arrangements for a debriefing at the Secret Service's National Threat Assessment Center (NTAC) in April 2003.

During the debriefing Indira was asked by a member of the Secret Service, "Is Ptech PROMIS?"

"I already knew what had happened to Danny Casolaro, and they were asking me if I had copies of Ptech," Indira told FTW.

Danny Casolaro was the investigative journalist mysteriously "suicided" in a West Virginia hotel room while investigating the theft of PROMIS software. Casolaro's investigation had uncovered a shadowy network he called "the Octopus" that seemed to have its hands in everything from drug trafficking and money laundering, all the way up to political assassinations and coups d'etat. When Casolaro's body was discovered, his arms were violently slashed and all the documents he traveled with were missing. He had told friends and relatives if anything happened to him they shouldn't believe it was by accident.

Being asked such a loaded question, she responded with her Ground Zero attitude saying:

"You have a copy of the software, why don't you tell me? This is not about the software guys, ok - was it a PROMIS? It was a place you could hide a PROMIS, a place you can drop a PROMIS."

Indira told FTW, "I was going to use Ptech software for risk surveillance at JP Morgan - Duh!"

By the very nature of risk surveillance, it is necessary to use PROMIS progeny based on artificial intelligence to achieve the capabilities we are describing. Charlie Bopp and those present for Indira's debriefing knew this, but they wanted to talk about the software and not the people behind the software. That is extremely significant. In part 1 of this series we've shown how the major people behind Ptech link to the Muslim Brotherhood, elements of the Saudi Royal Family, as well as Dick Cheney and the powerful American 'Christian' cult known as "The Fellowship," or, "The Family."

Indira wanted to name names, but Charlie wouldn't let her. "We can't investigate the people behind Ptech," said Charlie. "Just trust me, let's focus on the software." They gave no reasoning for this, they just said, "we can't."

"Well if you can't talk about the people behind this, it's a waste of time because with software like that you can't find trapdoors now. This is live stuff!" Singh told FTW. "You can't prove an intelligent agent [a small software component that reaches out to claim or insert information from another system - Ed.] went out and sent information somewhere. It's like proving you ate a piece of cake when you were 10 years old, unless you have video of it, it's not going to happen. It's that ephemeral." [emphasis added]

In other words, PROMIS-based activity leaves no footprints.

This means trapdoors are no longer necessary, or at least, no longer detectable. If Indira is correct, there would have been no "fingerprints" left of any kind showing just what Ptech software was used for on 9/11 and who used it.

"These guys debriefing me were from Military Intel, so they were trying to find out what I knew," says Singh. According to her, August of 2002 (the month before the story on Ptech was shut down by the White House, and three months before Ptech was raided) was a significant month. There were supposedly leaks of some kind coming out of the Persian Gulf. She was asked if Ptech software could have been the source of those leaks.

Singh responded, "Well if Military Intel are using Ptech in the Gulf, obviously! YES!"

During one of the initial meetings Indira threw a hat on the table from FDNY Engine 4, Ladder 15 and said, "I want you to put this on your desk, so any time you think of playing some political games you remember there were real people down there."

Indira Singh was done playing games.

Muslim Brotherhood, Christian Cultists, and Nazis
In part 1 of this series we documented the extensive ties from the Muslim Brotherhood running through Ptech. The Brotherhood was founded by Hassan Al-Banna and expanded with the help of Mahmoud Abu Saud of the House of Saud.7

This extensive network runs through various shell organizations and charities with interlocking boards, such as the New Jersey based real estate investment company BMI, CARE International, and the Northern Virginia based SAAR network - named after al Sulaiman Abdul Al-Aziz al-Rajhi, a scion of one of Saudi Arabia's richest families. Heading the SAAR network (renamed Safa) is Yakub Mirza, who also sits on the board of Ptech. It is of interest to note that claims against Al-Rajhi Banking & Investment Corp. for funding and supporting terrorism were recently dismissed by U.S. District Judge Richard Casey.

One of the central funding mechanisms in this nexus is the Al Taqwa Bank of Switzerland - now Nada Management - which the Department of Treasury says funds Al Qaeda.

Hitler supporter Albert Friedrich Armand Huber (aka Ahmed Huber) and Youseff Nada sit on the board of Al Taqwa. Nada reportedly helped the Grand Mufti escape from Nazi Germany when the Third Reich was teetering on the brink of collapse, and Ahmed Huber knew the Grand Mufti quite well; so well in fact, it was the Mufti who convinced Huber to convert to (the Brotherhood's form of) Islam.

Huber has spoken publicly of a "New Right" marriage of Nazi ideology and Islamist fascism. He has both a picture of Adolph Hitler and Osama bin Laden in his Swiss home.

Al Taqwa is a "hawala," a bank conducting transactions leaving no paper trail through a "good faith" global network that transfers funds - no questions asked.8 Bank Al Taqwa is located in the Bahamas; the parent company, Nada Management, is based in Lugarno, Switzerland, and is linked to the Royal Family of Liechtenstein.

Al Taqwa has done business with Asat Trust. The now deceased Prince Emanuel von und zu Liechtenstein became a board member of Asat Trust in May 1970 and stayed until November 1990, when he was replaced by Martin Wachter, the trust's current director.9

Asat Trust is on the American and U.N. terror list. According to the American Jewish Daily Forward, copies of business registration documents on file with authorities in Liechtenstein show that Asat Trust has been intimately involved with the Al Taqwa network during the last 30 years, registering changes in company names, personnel and financial structure.10

Most frightening of all is that this network seems to have links back to the powerful American Christian cult known as "The Fellowship," or "The Family." This organization is tied to American 'Christian' men of high political power including John Ashcroft, Dick Cheney, George W. Bush, multiple Congressional members and prominent business leaders. Some "Family" members have stated they would love to have Osama bin Laden as a guest speaker because of the covenant he has with his followers. Doug Coe, the Family's leader who was praised by George H.W. Bush at the 1990 National Prayer Breakfast for his "quiet diplomacy," openly admires Hitler's "covenant."11

Yassin Al Qadi - the Saudi terrorist financier who funded Ptech and BMI - claimed to have met Dick Cheney in Jeddah before he became Vice President and the two "still share cordial relations." When Cheney's office was asked to comment on this, spokeswoman Jennifer Miller Wise stated the Vice President gave her no reason to believe he had met with Al Qadi before he assumed office.12

That is a non-answer; "no reason to believe" he met Al Qadi leaves no reason to believe he didn't. Regardless, there are more transparent connections between elements of Saudi and American elites.

In November of 2001, Halliburton was awarded a $140 million contract to develop an oil field in Saudi Arabia by the kingdom's state-owned petroleum firm, Saudi Aramco, and a Halliburton subsidiary, Kellogg Brown & Root, along with two Japanese firms, hired by the Saudis to build a $40 million ethylene plant.13

Dick Cheney is, of course, the former CEO of Haliburton.

As recently as 1991 ARAMCO had Khalid bin Mahfouz sitting on its Supreme Council or board of directors. Mahfouz, Saudi Arabia's former owner of the nation's largest bank, has been reported in several places to be Osama bin Laden's brother in law. However, he has denied this and brought intense legal pressure to bear demanding retractions of that allegation.14 He also denies any involvement in financing terror organizations.

One journalist who was sued by bin Mahfouz, Dr. Rachel Ehrenfeld, is counter suing in New York Federal Court. She is the only one of some 30 authors not to retract claims that Mahfouz has financed Al Qaeda operations as published in her book, Funding Evil: How Terrorism is Financed and How to Stop it.

Khalid bin Mahfouz has major partnership investments with the multi-billion dollar BinLadin Group of companies and is a former director of BCCI, the infamous criminal drug-money laundering bank which performed a number of very useful services for the CIA before its 1991 collapse under criminal investigation by the legal apparatus of multiple countries.15

George Herbert Walker Bush, George W. Bush and Dick Cheney all have extensive ties to the Saudi Royal family and Saudi elites, who in turn have questionable ties to terrorist financiers such as Yassin al-Qadi. It is therefore not unreasonable for Dick Cheney to have met al-Qadi while in Jeddah while CEO of Haliburton.

This is the reality of the world we live in; where a covert international power structure supercedes the interests of nation states, and the misnomer of "national security" is used to keep this network's secrets hidden from the prying eyes of authentic journalists and the public at large.
 
1 On the very day the FBI raids Ptech, Ari Fleischer - president Bush's press secretary - gives Ptech a "clean bill of health" by stating: "The material has been reviewed by the appropriate government agencies, and they have detected absolutely nothing in their reports to the White House that would lead to any concern about any of the products purchased from (Ptech)."
http://www.whitehouse.gov/news/rele...20021206-4.html.

2 See Crossing the Rubicon, chapters 19 & 20.

3 See footnote #1 from Part 1 of this series.

4 "The Maestro" is the term used by Major Don Arias of NORAD to describe the individual who was in charge of coordinating the 9/11 war games. FTW's research has concluded the 9/11 maestro was either Dick Cheney, or both Cheney and General Ralph "Ed" Eberhart. See Crossing the Rubicon for full documentation.

5 Copy of page 37 of Ptech's Business Plan from 11/17/2001, provided by Indira Singh via email.

6 http://www.stormingmedia.us/07/0720/A072083.html.

7 http://www.washingtonpost.com/ac2/w...anguage=printer.

8 "A Banking System Built for Terrorism," by Meenakshi Ganguly, Time, 10/05/01: http://www.time.com/time/world/prin...,178227,00.html.

"Shareholders in the Bank of Terror?" by Lucy Komisar, Salon, 11/09/01
http://archive.salon.com/tech/featu...aqwa/print.html.

9 "Terror Fund Trail Leads to Alpine Kingdom," by Marc Perelman, Forward
http://www.forward.com/issues/2003/...ws4.terror.html.

10 Ibid.

11 Coe listed other men who had changed the world through the strength of the "covenants" they had forged with their "brothers": "Look at Hitler," he said. "Lenin, Ho Chi Minh, Bin Laden." The Family, of course, possessed a weapon those leaders lacked: the "total Jesus" of a brotherhood in Christ.

"In a document entitled "Our Common Agreement as a Core Group," members of the Family are instructed to form a "core group," or a "cell," which is defined as "a publicly invisible but privately identifiable group of companions." A document called "Thoughts on a Core Group" explains that "Communists use cells as their basic structure. The mafia operates like this, and the basic unit of the Marine Corps is the four man squad. Hitler, Lenin, and many others understood the power of a small core of people." From "Jesus Plus Nothing," by Jeffrey Sharlet, Harper's, March 2003 http://www.harpers.org/JesusPlusNothing.html?pg=1.

12 "Software company tries to survive terror investigation," by Justin Pope, Associated Press, 01/03/03
http://www.boston.com/news/daily/03/ptech.htm.

13 "Bush Advisors Cashed in on Saudi Gravy Train," by Jonathan Wells, Jack Meyers and Maggie Mulvihill, Common Dreams, 12/11/01
http://www.commondreams.org/headlines01/1211-05.htm.

14 "COUP D'ETAT," by Michael Ruppert, FTW, 6/8/04 http://www.fromthewilderness.com/fr...coup_detat.html.

15 Ibid.


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #14 on: August 12, 2011, 03:05:12 AM »
Sibel Edmonds posted redacted/omitted 9/11 testimony
FBI was told the attack was a CIA operation months before it happened!

http://www.boilingfrogspost.com/2011/02/01/the-fbi-%E2%80%9Ckamikaze-pilots%E2%80%9D-case/

The FBI “Kamikaze Pilots” Case

Tuesday, 1. February 2011

In a public statement issued on Monday, January 31, members of the 9/11 Family Steering Committee demanded a prompt response from the former Chairman and the Executive Director of the 9/11 Commission regarding Former FBI Language Specialist Behrooz Sarshar’s censored testimony to the Commission. The former commissioners failed to respond to this request.

In February 2004 Behrooz Sarshar provided the 9/11 Commission’s investigators with specific documents and names of the related witnesses, including the full name and contact information of the key “FBI Asset/Informant” in an FBI case titled ‘Kamikaze Pilots.’ However, the commission chose not to contact or interview any of these witnesses, including FBI Director Robert Mueller. The Commission’s final report did not mention a single word of this documented testimony, and their recently released memorandum omitted the entire interview with no explanation provided.

The following information was provided by Mr. Sarshar to several Congressional offices and investigators, including staff of the Senate Judiciary Committee and the Committee’s leading Democrat at the time, Senator Patrick Leahy, and the Justice Department’s Inspector General Office.  I was present during at least four meetings where the briefings were recorded and documented. While working at the Bureau I was briefed on this case by not only Mr. Sarshar but another firsthand witness, and I saw the actual 302 forms filed with the unit’s squad supervisor (FBI language specialists get to keep a copy of their reports/forms). Further, I personally briefed the 9/11 commission investigators on the details of this particular case, which is confirmed by the commission’s memorandum.

I have only deleted sensitive personal information related to the FBI informant-Asset, and as you’ll see every single deleted item (by me-indicated as S.E.) has been indicated in bold-italics. Other than that, the information below is exactly what was recounted by Mr. Sarshar on four occasions:

FBI File Name: “Kamikaze Pilots”

In the early 90s the Bureau hired an Iranian man as an informant, placed him on its payroll at approximately fifteen hundred dollars per month, and used him and his information in several criminal, counterintelligence and counterterrorism operations and investigations. Over time this informant, a man in his (Informant’s Age Information Deleted by S.E.), proved to be extremely reliable, and his information was found to be trustworthy.

This man had been the head of SAVAK, Iran’s main Intelligence agency, counterintelligence unit during the Shah’s regime. His area of operations involved the East and Southeastern region of Iran, and the countries under him were Afghanistan, Pakistan and India. He also managed the unit’s intelligence gathering operations in Sistan and Baluchistan, two semi-independent regions on the border with Afghanistan. Unlike U.S. agencies, the intelligence agency in Iran conducted most, if not all, of its surveillance and information gathering operations via human intelligence and sources. The man, the informant, was very good at what he did; he had established a large number of sources and informants scattered in the strategically most important areas within these countries.

Immediately after the Islamic Revolution, he planned his escape out of the country. All former SAVAK and military intelligence had been placed on the black list of the new regime, and death warrants had been issued for them. He successfully escaped Iran, and then spent several years in (Names of the informant’s previous residences/countries deleted by S.E.) where he tried to obtain a U.S. visa and come to the states, where many of his relatives and friends had already settled. In the late (date of Informant’s US entry deleted by S.E.) he succeeded and moved to the United States.

His reputation and his fame of having a wealth of resources for information all over the world had somehow reached the FBI by the early 1990s – around 1991-1992. Via a middleman, the Bureau was able to contact the man and persuade him to become an informant. He was placed on the payroll and began providing the Bureau with extremely useful and reliable information. The Bureau was so pleased with his performance that it began using him both as an informant and as an asset. On a regular basis, almost monthly, agents from the FBI HQ and WFO would meet with him at … and …and … (Meeting locations Deleted by S.E.) to obtain information and intelligence on various on-going operations and investigations.

Since the informant didn’t speak English very well, was by no means considered fluent, often if not always, the agents took an interpreter, a translator, with them to these regular monthly meetings. This is where Amin and I came into the picture. For these sessions the agents would have either Amin or me accompany them. By sheer coincidence, I happened to recognize the man during the first meeting from a gathering I frequented. I knew where he lived, and I had his phone number.

Around the end of April, 2001, I was asked to accompany two special agents from the FBI-WFO, Tony and John, to a meeting arranged with this informant; we hooked up with him somewhere near the (Meeting Location Deleted by S.E.). The agents and I were working on a particular criminal investigation that was going to court in (Possible sensitive date deleted by S.E.), and the informant’s information played an extremely important role in building the case.

We met the informant in this park-like area and spent nearly an hour discussing the case, asking detailed questions, and of course, with me translating the communication which went back and forth. Once we were finished with the session and ready to head back to the WFO, the informant urged us to stay for a few minutes and listen to something very important and alarming he had recently received from his sources. We looked at one another and sat down on the bench; we were all ears.

The informant said:

‘Listen, I was recently contacted by two extremely reliable and long-term sources-neither one Iranian; one in Afghanistan; the other in Pakistan’s border region with Afghanistan. In the past, these guys had provided me with inside information and intelligence that was extremely hard to come by, considering the tightly-based networks and groups they were able to enter and penetrate. They notified me that an active mujahideen group led by Bin Laden had issued an order to attack certain targets in the United States, and were planning the attack as we spoke.’

Now the informant had our full attention; the agents seemed very alarmed, since their main unit of operation was under the WFO Counterterrorism division. They asked the guy to stop, asked him to repeat that again, and ordered me to take verbatim notes as I translated. They too took notes.

The informant continued:

‘According to my guys, Bin Laden’s group is planning a massive terrorist attack in the United States. The order has been issued. They are targeting major cities, big metropolitan cities; they think four or five cities; New York City, Chicago, Washington DC, and San Francisco; possibly Los Angeles or Las Vegas. They will use airplanes to carry out the attacks. They said that some of the individuals involved in carrying this out are already in the United States. They are here in the U.S.; living among us, and I believe some in US government already know about all of this (I assumed he meant the CIA or the White House).’

Tony, one of the agents asked ‘did they say when? Did they give any specific dates? Did they say how they were going to use airplanes; bombs or high jacking?’

The informant paused for a second:

‘No specific dates; not any that they were aware of. However, they said the general timeframe was characterized as ‘very soon.’ They think within the next two or three months.’ He then added: ‘As far as how they are going to use the planes to attack; your guess is as good as mine. My bet, it will be bombs; planting bombs inside these planes, maybe the cargo, then have them blown up over the populated cities.’

The agents nodded and took extensive notes. I took my notes in Farsi; I usually did that, and later after returning to the office, sat down and translated them verbatim. We stood up and were ready to leave, when the informant urged us to report this immediately and act on it:

‘If I were you guys, I’d take this extremely seriously. If I had the same position I had in SAVAK, I’d put all my men on this around the clock. I can vouch for my sources; their reliability. Make sure you put this in the hands of the top guys in Counterterrorism.’

The agents nodded and thanked him for the information. We drove back in silence. After we parked the car, while walking to the elevators, the agents were discussing the best person, the top person; they should submit this warning to. They decided on Special Agent in Charge (SAC) Thomas Frields, who was in charge of the WFO Counterterrorism division and who used to lead the division that dealt with Iran’s Hostage Crisis in 1980s. I reminded them that although the informant was Iranian, his sources were not; and that they were in Pakistan and Afghanistan; not in Iran; Bin Laden was not Iranian but a Saudi. They acknowledged that, but made the point that Frields was in charge of the Counterterrorism unit in the WFO.

Once we got to the office, I went straight to my cubicle and began translating the entire conversation verbatim and typing it into a formal report. The agents went to their section and filled out the necessary 302 forms. These forms, the 302s, are forms used by agents to report information gathered from the Bureau’s assets and or informants. The agents, Tony and John, filled out two sets of 302 forms; one for the ongoing criminal case and the informants’ information related to that; the other, on the warning, with the initial code name ‘Kamikaze Pilots,’ as information related to Counterterrorism operations.

The agents called me up on my extension and asked me to escort them inside the language unit. I walked them over to my desk, where we sat, compared notes, and finalized and coordinated our report. They had me make several copies of the translation report for them to be submitted with their report. I took it upon myself to make a set of copies of their 302 forms for my own file; my own record. At the end of the day, around five o’clock, they submitted the 302 forms and my translation report. They submitted the warning report to SAC Frields; with a note, a yellow stick-up, on the top saying ‘VERY URGENT: Kamikaze Pilots’

Neither of us heard back from Frields or the Counterterrorism division. No one asked for any follow-ups or additional information. Two months went by. Around the end of June 2001, I accompanied the two agents to another meeting with the Iranian Informant. This time we met in (Location Details Deleted by S.E.).

After going over the target criminal investigation; now only …(Specific Date Deleted by S.E.), as we were ready to turn around and leave, he stopped us:

‘What did you do with the information I gave you two months ago? Did you report it to your bosses?’

The agents nodded. One of them said: ‘Yes; we sent it up. We submitted it to the top guy.’

The informant was animated now,

‘Well; are they going to do something about it? Because, three days ago I heard back from one of those two sources; in Pakistan. He swore the attack was on its way; any time now; a month or two max.’


Tony said: ‘I know; I hear what you are saying, man; but doing something about this won’t be up to us. Plus, we don’t have enough information to take any action here. We don’t know when, how, or exactly where. The only thing we have is: Mujahideen, Kamikaze Pilots, Bin Laden, five cities, and airplanes. That ain’t enough.’

The informant reasoned:

‘I’ve been thinking about this; trying to make more sense out of it myself. The source mumbled something about tall buildings. Maybe they will blow up the plane over some tall buildings; I don’t know. Maybe the FBI can get more specifics from the Pakistanis; ISI. Have they tried? After all they are your guys, and they already know all about this.’

The agents were getting exasperated and impatient, ‘We’ve got to go; we have a lot of work back there. We have done all we could. We reported it to the guy in charge; now, it is up to them.’

As we turned around and walked away, the informant yelled in Farsi:

‘Why don’t you discuss it with the CIA? They know.
Tell the White House. Don’t let ‘them’ sit on this until it is too late…’

I asked Tony, ‘Maybe sharing this with other agencies is not a bad idea. What do you think?’

He rolled his eyes ‘not up to us Behrooz. As far as the White House goes, the HQ guys will include it in their briefings; I’m sure they’ve already done so. Frields is obligated to submit what he got, everything he gets under Counterterrorism, to the HQ guys in charge of Whitehouse National Security Briefings. He always does. So, the White House and other agencies have already heard about this. Let’s drop this man; will ya?’

That was the last time we ever discussed this case before the 9/11 attacks took place. The only other person I told this to and showed the 302 forms and the translation report, before September 11, was Amin here. Then, on that Tuesday morning on September 11 everything came back to me and hit me on the head like several tons of bricks.

That morning, we heard the news, and all of us ran out to the next unit to watch the CNN footage on the TV screens installed out there. As soon as I saw the planes hitting those buildings I said to myself: ‘Oh my God, oh dear God; we were warned about this; we were told about this; very specifically’ I almost fainted; I kept hearing the informant’s words; I kept hearing his last warnings begging us to do something fast. And we had done NOTHING. Now it was already way too late. I felt nauseous; I felt sick.

A few minutes later I saw one of the two agents; I started making my way into the crowd gathered in front of the TV screens, hundreds of people, and walked toward the agent. He spotted me before I got to him; we locked eyes; knowing eyes. He felt what I was feeling; he knew what I knew; he thought what I was thinking; we were responsible for this. Someone in the FBI would be hung for this.

When I got close to him I asked ‘what are we going to do? What should we do next?’ He shook his head and whispered: ‘I don’t know. I cannot even think straight right now. I don’t know Behrooz. We f**ked this up; the Bureau f**ked our country. Why?! Oh God; we let this happen.’ With that said he ran out of the room. I went back to check my drawer and make sure that I still had everything: the 302 forms, from both meetings, my translation reports; both of them. They were all there.

A few days later, when I got together with both agents and Amin to go over an assignment, I brought up the topic. They avoided eye contact with me. I asked the agents what they were going to do; if they’d already done something. At first they were evasive. Then, after I insisted, one of them, Tony, said: ‘Listen; Frields called us into his office and gave us an order; an absolute order.’ I asked them what the order was. He said ‘we never got any warnings. Those conversations never existed; it never happened; period. He said this is very sensitive…and that no one should ever mention a word about this case; period.’
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #15 on: August 12, 2011, 03:09:35 AM »
Tarpley: "The 9/11 Patsy Terrorists would have trouble making it through a day"

PATSIES

http://www.american-buddha.com/911.syntheticterrormade3.htm

“I’m just a patsy.” Lee Harvey Oswald, November 1963

Speaking of Guy Fawkes and his confreres, Father Gerard comments that “many intelligent men took for granted that in some way or other the actual conspirators were but the dupes and instruments of more crafty men than themselves, and in their mad enterprise played the game of ministers of State.” (Gerard 43) In this sense, Guy Fawkes may represent the archetype of the category of person known in modern intelligence parlance as the patsy.

The real authorship of state sponsored terrorism is to be successfully concealed, then a collection of scapegoats is the first ingredient required. These may be defined as the patsies, or alternatively as fall-guys, scapegoats, useful idiots, or dupes. It is necessary that they be of low mental ability and great gullibility, since their mission is to be part of false-flag groups which pretend to be working for a cause, such as the restoration of the caliphate, while in reality they are under the control of a private network inside the US government. It is vital for the terrorist controllers that the patsies not realize that this or that comrade in arms is actually a double agent, a provocateur working for the parallel CIA or some other complicit agency, or which more will be said later. The best candidates for the patsy role are psychotics, psychopaths, or sociopaths. They may be fanatics bursting with criminal energy and criminal intent, or they may be pathetic ideologues and naifs. Frequently they are also misfits, bunglers, and generally maladroit in what they undertake.

According to research sponsored in 1999 by the Library of Congress, in a 1972 study “psychologist B.J. Berkowitz described six psychological types who would be most likely to threaten or try to use WMD: paranoids, paranoid schizophrenics, borderline mental defectives, schizophrenic types, passive-aggressive personality types, and sociopath personalities. He considered sociopaths the most likely actually to use WMD. Nuclear terrorism expert Jessica Stern disagreed. She believed that "Schizophrenics and sociopaths, for example, may want to commit acts of mass destruction, but they are less likely than others to succeed." She pointed out that large-scale dissemination of chemical, biological, or radiological agents requires a group effort, but that "Schizophrenics, in particular, often have difficulty functioning in groups ...." (Hudson)

Page 66

Because the patsies are usually such low-grade subjects, they require comprehensive support of many types. They may need help in renting an apartment or in finding a cover job. They always seem to be getting in trouble with the police, and then it is necessary to see that they get out on bail as quickly as possible. If they are lonely, they may need specially trained sex operatives to comfort them or even to marry them (the KGB and the Stasi called their sex troops “The Swallows”). Above all they require constant financial assistance to be able to travel around the world, as they so frequently seem to be able to do despite the fact that they are most often without any visible means of support. The most important things about patsies are that they are almost always physically, mentally and technically unable to carry out the crimes of which they are accused. This is a matter of insufficient ability and capability, and not of the lack of criminal intent, which is often abundant.

Patsies can then be used in many combinations. They can be merged together in false flag terror operations. These organizations will assume a distinct ideological or religious coloration and will advertise it, and that will become the key to the process of creating or reinforcing the enemy image desired by the terrorist controllers after the terrorist action has been successfully carried out. That coloration or affiliation will constitute the false flag, and it will be assiduously prepared. Here some of the members may be witting; these are the double agents and police informers. Other components are not witting, at least about the most important things. What patsies can accomplish by themselves is often supplemented by the actions of doubles, double agents, and informers, who do things for them when they can not show up. Sometimes patsies are sent to make contact with other groups, a process known as sheep-dipping. If a terrorist controller wants to implicate the Podunk Democratic Party in terrorism, then he sends a patsy to sign up with them and attend their meetings before the terrorist act is carried out. That gives the police a good reason to raid the Podunk Democratic Party headquarters.

Thus, in 1992 and 1993, the New York City FBI informant and agent provocateur Emad Salem repeatedly tried to implicate the Sudanese UN Mission in his own "Islamic terror cell" World Trade Center bomb plot conspiracy. Here we see how a false flag terror cell sheep-dips its dupes into contact with a target, which then becomes the object of police investigation, and possibly later of military attack.

In January 2002, the Supreme Court of Germany had to call off all proceedings in the ongoing constitutional trial concerning the Schroeder government’s attempt to ban the extreme right-wing or reputedly neo-Nazi National Democratic Party of Germany because it turned out that the government's chief witness, a member of the national NPD party executive, had worked as an informant for the German Constitutional Protection Agency (Verfassungsschutz, comparable to the FBI), for many years. The Court ruled that the trial could not go forward until this issue was clarified.

Osama Bin Laden, the rich misfit, has often been described in terms which seem to suit him for this category. A CIA agent named Beardman has asserted that Osama Bin Laden, during the entire time that he was organizing his mujaheddin fighters to do battle with the Soviets in Afghanistan, never realized that the operation was being financed and directed

Page 67

by the CIA. The CIA's Beardman confirmed, in this regard, that Osama Bin Laden was not aware of the role he was playing on behalf of Washington. In the words of Bin Laden (quoted by Beardman): "neither I, nor my brothers saw evidence of American help." Bin Laden thus may also qualify as a clueless dupe.

The patsies ultimately have three vital functions. The first is that they have to be noticed. They must attract lots and lots of attention. They may issue raving statements on videotape, or doubles can be used to issue these statements for them if they are not up to it. They need to get into fights with passersby, as Mohammed Atta is said to have done concerning a parking space at the airport in Maine early in the morning on September 11. Even if they are presumed dead they must remain prominent, as in the case of Atta’s passport, which is alleged by the FBI to have survived the fiery collapse of the World Trade Center towers to be found undamaged and unsinged on a nearby street. Even when presumed dead they must be eloquent about themselves and their activities, as they accused 9/11 hijackers when they left behind a copy of the Koran, airline schedules, terrorist literature and videotapes, and Atta’s crudely forged last will and testament in a car and in luggage.

Despite the need to be noticed as much as possible, the patsies have to stay out of jail. If they are all in jail, the planned terror action cannot take place. This is not because the patsies are needed to carry it out, but rather because they must be on hand in order to be blamed for it, whether they are on the scene or far away. If the patsies are in jail, they cannot be scapegoated. Therefore a lawyer and bail money must be provided, or a complicit judge told to release the defendant. Immigration authorities and Customs must be told to look the other way. To keep the patsies out of jail so they can serve their vital purpose is the job of the moles, as will soon be shown.

Finally, if all else goes well, it is the destiny of the patsies to take the blame for the terror action once it has happened. At this point the moles in the government apparatus, who had earlier been the patsies’ greatest friends and protectors, become their most implacable enemies. The patsies must be hunted down and, preferably, liquidated on the spot, as the British Special Air Services anti-terrorist force always prefers to do, with a maximum of firepower. Their faces and stories will be demonized as the latest manifestation of absolute evil. The nationality, philosophy, or religion which the media portray them as representing will become the target of raving vilification, arrest, economic sanctions, cruise missile retaliation, and armed invasion, as the case may be.

A pathetic case in point is Richard Reid, the shoe bomber of December 2001. Shortly after Reid was arrested for having attempted to blow up the transatlantic airliner in which he was traveling with the help of explosives planted in the soles of his shoes, sources in the Washington DC mosque said that they had acquired the following profile of Reid from Dr. Abdul Haqq Baker of Brixton mosque in London. According to Baker and others from Brixton, Richard Reid could only be described as mentally deficient. "He was not someone who would be medically classified as mentally retarded," the source reported, "but he was definitely slow." He could not have hatched any kind of terror attack on his own, and could not have even put the shoe bombs on his own feet without

Page 68

help, the source had been told by officials of the Brixton Mosque. Yet, according to news accounts, Reid spent time in Iran three or four years before his terror attempt, and traveled to Tel Aviv from Heathrow Airport near London in the summer of 2001. He was thoroughly frisked before being allowed on to the El Al flight, and was forced to sit next to a sky marshal at the back of the plane. Israeli officials claimed to know nothing about what Reid was doing in Israel. From Israel, Reid went to Egypt, and then to Turkey, before returning to London Heathrow. Reid had been sleeping on the floor at the Brixton Mosque, had no visible means of support, etc. Reid's father, who was also a convert to Islam, and encouraged his son to do the same, told the American press that his son must have been brainwashed by radical Islamists to get him to undertake the suicide attack. (New York Times and Washington Post, December 29, 2001)

Another case may well be that of Jose Padilla, the man who was arrested at Chicago’s O’Hare airport, and who has been designated as an enemy combatant by Attorney General Ashcroft and held incommunicado without charges or a lawyer for months. Although he may only be a walk-on in Ashcroft’s larger spectacle, what kind of an Islamic fighter was Padilla supposed to be? According to Maureen Dowd, this “plotter was a Chicago street punk named Jose Padilla, a hothead with a long criminal record who was thrown in jail in Florida for shooting at a motorist in a road-rage incident. The mind games of fear begin with Abu Zubaydah, the U.S. captive, one of Osama bin Laden's top lieutenants, who fingered Padilla.” (New York Times, June 12, 2002)

The most famous patsy is of course Lee Harvey Oswald, the archetype of the embittered, lonely misfit and drifter. But he was a misfit with a difference, one who was able to move from the Marine Corps to émigré status in the USSR, then back to Texas and New Orleans as an activist for the Fair Play for Cuba Committee. Oswald was someone who seemed to go out of his way to be abrasive and to attract attention. He handed out leaflets for the Fair Play for Cuba Committee and got involved in altercations with anti-Castro Cubans. He appeared in a radio debate, and was interviewed on television. He took a surprise trip to Mexico City to visit the Soviet Embassy there. He did everything possible to get noticed. Indeed, he got noticed so much that at various time there may have been two or even three Oswald doubles running around, something that would have required the resources of a major intelligence organization like the CIA or the FBI. But Oswald was also unable to manage the petty details of his own everyday life without the assistance of others, notably of the European aristocrat Georges de Morenschildt, a patrician who had George H.W. Bush’s name and phone number in his address book. Oswald was most likely an FBI informant, working for Special Agent Guy Bannister in New Orleans. But this did not protect him from being fingered as the assassin, nor did it save him from being silenced by Jack Ruby before he could ever testify in his own defense. The problem with Oswald, as with so many patsies, is that he was neither physically nor technically capable of carrying out the crime which has been ascribed to him: using his antiquated Italian 1917 Mannlicher-Carcano rifle with its crude little telescopic sight, it is clear that Oswald could never have fired with sufficient speed and accuracy the four or five shots (at minimum) that were actually heard on Dealey Plaza that day, and which are necessary to account for the number of wounds suffered by President Kennedy and Governor Connally, plus other shots that missed their target. This

Page 69

question of physical impossibility is often the most obvious weak point of the official explanations of terrorist actions. In the Kennedy assassination, it was expressly to address the problem of the physical impossibility of Oswald’s having acted as a lone assassin that Arlen Spector, part of the staff of the Warren Commission, invented his magic bullet theory. Spector asserted that the same slug had caused seven wounds: an entry wound in Kennedy’s back, an exit wound at the base of his throat, then an entry wound in Connally’s back, an exit wound in Connally’s chest, an entry wound in Connally’s wrist, and exit wound from the other side of Connally’s wrist, and finally an entry wound in Connally’s leg. At the end of all this, the bullet was supposedly found in virtually pristine condition lying in a stretcher at Parkland Hospital after Kennedy had died. Even after these incredible contortions, requiring that the same bullet change course in mid-air at least twice, the problem of physical impossibility had not been solved, since there were still four or five shots on the audio tape which had recorded the sounds of the assassination through the open microphone of a Dallas police officer’s radio. It was this insuperable problem which led the House Assassinations Committee of 1978 to rule that Kennedy’s death was the result of a probable conspiracy, and not simply of the actions of a deranged lone assassin.

As Sanguinetti sums up, “the outrages that are accomplished directly by the intelligence agencies and secret services of the State are not usually claimed by anybody, but are each time imputed or attributed to some convenient ‘culprit,’ like Pinelli or Valpreda. Experience has proved that this is the weakest point of such terrorism, and that which determines the extreme fragility of it in the political usage that certain forces want to make of it. It is starting from the results of the same experience that the strategists of secret services of the State seek, from this point on, to lend a greater credibility, or at least a lesser inverisimilitude to their own work …by claiming them directly through such-and-such initials of a ghostly group….” (Sanguinetti 2)

THE PATSY MILIEU

You give yourself for an agent provocateur. The proper business of an agent provocateur is to provoke. Joseph Conrad, The Secret Agent (1907).

The patsies inhabit a scene of their own, a place on the outskirts of society where terrorists, naïve or romantic dupes, provocateurs, sting operatives, double agents, Dopplegänger and informers congregate. There was something of this nature among southern European fascist extremists in Madrid, Athens, and Rome during the 1960s and 1970s; the denizens of this milieu played their parts in the “black terrorism” of those years. There was a parallel milieu of anarchists, Maoists, left communists, Trotskyists, and anarchosyndicalists in many cities of Europe during that same time frame. In the 1980s and 1990s, a patsy milieu developed among right-wing militia activists and paramilitaries in the great plains and upper Midwest of America. During the 1970s, 1980s, and 1990s, a patsy milieu has grown up not just in the Middle East, Afghanistan,

Page 70

Pakistan, and Indonesia, but also in western Europe and the United States. In fact, the classic patsy milieu of the 1990s was in London.

The patsy milieu has been skillfully evoked by Joseph Conrad in his fascinating novel, The Secret Agent (1907). Here we have the agent provocateur Verloc meeting with his confreres of the International Red Committee; Verloc is in the pay of the Russian Embassy, among others, and attempts to organize a bombing of the prime meridian at Greenwich Observatory. The Russian Embassy wants the attentat in order to motivate the international Milan conference to crack down on nihilists, revolutionaries, and bomb- throwers all over Europe. A movie which accurately depicts the world of patsies, moles, and expert professionals is The Package, written by John Bishop, starring Gene Hackman and Tommy Lee Jones. During the Gorbachev era, a group of US and Soviet generals opposed to disarmament decide to sabotage an upcoming treaty by assassinating Gorbachev during a visit to Chicago. Tommy Lee Jones is the expert professional who operates in complete anonymity – he is smuggled into the US under a fake identity. There is also a pathetic patsy, recruited by one of the mole generals from a military prison and sent to Chicago to attract attention as a neo-Nazi.


Red Team activity is any set of activities that deal with an unannounced assessment of security and readiness by an unfamiliar (to the target) team of operators with no awareness or support from the assessed target. The function of individuals engaged in this activity is to provide a unique understanding from a threat actor's point of view in a less contrived circumstance than through exercises, role playing, or announced assessments. Red Team activities may involve interactions that trigger active controls and countermeasures in effect within a given operational environment.

In wargaming, the opposing force or OPFOR in a simulated military conflict may be referred to as a red team and may also engage in Red Team activity, which is used to reveal weaknesses in military readiness. The key theme being that the aggressor is composed of various threat actors, equipment and techniques that are obscured from the defender's complete knowledge.

Some of the benefits of Red Team activities are that it challenges preconceived notions by demonstration; they also serve to elucidate the true problem state that planners are attempting to mitigate. Additionally, a more accurate understanding can be gained about how sensitive information is externalized, as well as highlight exploitable patterns and instances of undue bias with regard to controls and planning.

United States Army

In the US Army, Red Teaming is defined as: “structured, iterative process executed by trained, educated and practiced team members that provides commanders an independent capability to continuously challenge plans, operations, concepts, organizations and capabilities in the context of the operational environment and from our partners’ and adversaries’ perspectives.” (TRADOC News Service, July 13, 2005) [1]

The Army Red Team Leaders Course is conducted by the University of Foreign Military and Cultural Studies (UFMCS) at Fort Leavenworth. The target students are graduates of the U.S. Army CGSC or equivalent intermediate and senior level school (Major through Colonel, and Chief Warrant Officer 3/4/5 with MEL IV qualification or equivalent).

The Red Team Leader’s Course (RTLC) is graduate-level education of 720 Academic Hours (18 weeks) designed to effectively anticipate change, reduce uncertainty, and improve operational decisions. The typical academic day is 8 hours and the typical reading load is 250 pages per night.

The University of Foreign Military and Cultural Studies was formed as an outgrowth of recommendations from the Army Chief of Staff's Actionable Intelligence Task Force. UFMCS, as an element of the TRADOC (DCSINT) Intelligence Support Activity, or TRISA, located at Fort Leavenworth, KS, is an Army directed education, research and training initiative for Army organizations and other joint and government agencies designed to provide a Red Teaming capability.

A UFMCS-trained Red Team is educated to look at problems from the perspectives of the adversary and our multinational partners, with the goal of identifying alternative strategies. The Red Team provides commanders with critical decision-making expertise during planning and operations. The team’s responsibilities are broad – from challenging planning assumptions to conducting independent analysis to examining courses of action to identifying vulnerabilities.

Red Team Leaders are expert in:

Analyzing complex systems and problems from different perspectives to aid in decision making using models of theory.
An analysis of the concepts, theories, insights, tools and methodologies of cultural and military anthropology to predict other’s perceptions of our strengths and vulnerabilities.
Applying critical and creative thinking in the context of the operational environment to fully explore alternatives to plans, operations, concepts, organizations, and capabilities.
Applying advanced analytical skills and techniques at tactical level through strategic level and develop products supporting command decision making and operational execution.

U.S. Joint Forces Commands' Joint Enabling Capabilities Command

Two operational positions associated with red teaming exist at the United States Joint Forces Command formerly called Blue Red Planners within the Standing Joint Force Headquarters (SJFHQs). These two positions, now called Red Team Leaders (RTLs) are designed to provide the Joint Task Force Plans and Operations Groups with insight into the adversary’s political and military objectives and potential course of action (COA) in response to real or perceived Blue action. RTLs are the leads of a RT Cell composed of operationally oriented experts that analyze Blue conditions-driven COA from an adversary-based perspective. The RT Cell also anticipates potential adversary responses to counter Blue COA and end-state objectives. The RT also identifies critical Blue vulnerabilities and potential operational miscues. The RT cell also assists in war gaming, COA development early in the Joint Operations Planning Process (JOPP). RTLs, in collaboration with the Combatant Commander's staff and Centers of Excellence, provide in-depth knowledge of the local political landscape, of the adversary’s history, military doctrine, training, political and military alliances and partnerships, and strategic and operational objectives. The RTLs will postulate the adversary’s desired end-state, and also, postulate what the adversary may surmise Blue’s desired end-state or objectives to be. Finally, the RTLs help identify, validate, and/or re-scope potential critical nodes identified through systems developed understanding of the operational environment.

United States Government

Red Teaming is normally associated with assessing vulnerabilities and limitations of systems or structures. Various watchdog agencies such as the Government Accountability Office and the National Nuclear Security Administration employ red teaming, sometimes with dramatic findings.

In exercises and war games, Red Teaming refers to the work performed to provide an adversarial perspective, especially when this perspective includes plausible tactics, techniques, and procedures (TTP) as well as realistic policy and doctrine.

Important cases

The FAA has been implementing Red Teams since the Pan Am Flight 103 over Lockerbie, Scotland. Red Teams conduct tests at about 100 US airports annually. Tests were on hiatus after September 11, 2001 and resumed in 2003.[1]

The FAA use of red teaming revealed severe weaknesses in security at Logan International Airport in Boston, where two of the four hijacked 9/11 flights originated. Some former FAA investigators who participated on these teams feel that the FAA deliberately ignored the results of the tests and that this resulted in part in the 9/11 terrorist attack on the US.

Other examples include:

Billy Mitchell - a passionate early advocate of air power - demonstrated the obsolescence of battleships in bombings against the captured World War I German battleship Ostfriesland and the U.S. pre-dreadnought battleship Alabama.

Rear Admiral Harry E. Yarnell demonstrated in 1932 the effectiveness of an attack on Pearl Harbor almost exactly showing how the tactics of the Japanese would destroy the fleet in harbor nine years later. Although the umpires ruled the exercise a total success, the umpire's report on the overall exercises makes no mention of the stunning effectiveness of the simulated attack. Their conclusion to what became known as Fleet Problem XIII was surprisingly quite the opposite:

"It is doubtful if air attacks can be launched against Oahu in the face of strong defensive aviation without subjecting the attacking carriers to the danger of material damage and consequent great losses in the attack air force." [2]

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #16 on: August 12, 2011, 03:18:11 AM »
Hillary Clinton will announced that veteran diplomat Marc Grossman replaced Richard Holbrooke, who died in December, as Special Envoy to Pakistan and Afghanistan.

http://swampland.blogs.time.com/2011/02/15/grossman-afpak-and-scooter-libby/



“We Can’t Afford to Let Them Spill the Beans”
Sibel Edmonds on Marc Grossman
http://www.informationclearinghouse.info/article19225.htm
By Gary Leupp 29/01/08

"Dissident Voice " -- -- I am not one to easily embrace conspiracy theories, and in particular have found the idea that 9-11 was somehow an inside job too incredible for serious consideration. On the other hand, there are some very fishy aspects to some officials’ behavior pertaining to the attacks. Justin Raimondo has made a very good case for the fact that Mossad agents posing as “Israeli art students” were tracking al-Qaeda operatives in the U.S. before 9/11.

Over 120 Israelis were detained after 9/11, some failing polygraph tests when asked about their involvement in intelligence gathering. But they were not held or charged with any illegal activity but rather deported. As former FBI translator and whistleblower Sibel Edmonds has revealed, there was a curious failure of the government before 9/11 to act upon intelligence pertaining to an al-Qaeda attack. Most importantly Edmonds, defying the gag order that former Attorney General Ashcroft imposed on her in 2002, is implicating Marc Grossman, formerly the number three man in the State Department, in efforts to provide US nuclear secrets to Pakistan and Israel. She suggests this was done through Turkish and Pakistani contacts, including the former head of Pakistan’s ISI who funneled funds to Mohamed Atta! Now there’s a conspiracy for you.

Edmonds claims that during her time at the FBI (September 20, 2001 to March 22, 2002) she discovered that intelligence material had been deliberately allowed to accumulate without translation; that inept translators were retained and promoted; and that evidence for traffic in nuclear materials was ignored. More shockingly, she charges that Grossman arranged for Turkish and Israeli Ph.D. students to acquire security clearances to Los Alamos and other nuclear facilities; and that nuclear secrets they acquired were transmitted to Pakistan and to Abdul Qadeer Khan, the “father of the Islamic bomb,” who in turn was selling nuclear technology to Libya and other nations.

She links Grossman to the former Pakistani military intelligence chief Mahmoud Ahmad, a patron of the Taliban, who reportedly arranged for a payment of $100,000 to 9/11 ringleader Atta via Pakistani terrorist Saeed Sheikh before the attacks. She suggests that he warned Pakistani and Turkish contacts against dealings with the Brewster Jennings Corp., the CIA front company that Valerie Plame was involved in as part of an effort to infiltrate a nuclear smuggling ring. All very heady stuff, published this month in The Times of London (and largely ignored by the U.S. media).

She does not identify Grossman by name in the Times article, but she has in the past, and former CIA officer Philip Giraldi does so in an extremely interesting article in the American Conservative. From that and many other sources, I come up with the timeline that appears below.

But first, some background on Grossman. A graduate of UC Santa Barbara and the London School of Economics, he was a career Foreign Service officer from 1976 when he began to serve at the US embassy in Pakistan. He continued in that post to 1983, when he became the Deputy Director of the Private Office of Lord Carrington, the Secretary General of NATO. From 1989 to 1992 he was Deputy Chief of Mission at the US Embassy in Turkey, and from 1994 to 1997, US Ambassador to Turkey. As ambassador he strongly supported massive arms deals between the US and Ankara.

Thereafter he was Assistant Secretary of State for European Affairs, responsible for over 4,000 State Department employees posted in 50 sites abroad with a program budget of $1.2 billion to 2000. In 1999 he played a leading role in orchestrating NATO’s 50th anniversary Summit in Washington, and helped direct US participation in NATO’s military campaign in Kosovo that same year. As Under Secretary of State for Political Affairs from the beginning of George W. Bush’s administration to January 2005, he played a bit role in the Plame Affair, informing “Scooter” Libby of Plame’s CIA affiliation.

Grossman is close to the American Turkish Council (ATC) founded in 1994 as a sister organization to the American Israel Political Action Committee (AIPAC). Its founders include neoconservatives involved in the Israel-Turkey relationship, including Richard Perle and Douglas Feith, as well as Henry Kissinger, Brent Snowcroft and former congressman Stephen Solarz. (Perle and Feith had earlier been registered lobbyists for Turkey through Feith’s company, International Advisors Inc. Perle was at one point making $600,000 per year from such activity). Edmonds says this is “an association in name and in charter only; the reality is that it and other affiliated associations are the US government, lobbyists, foreign agents, and Military Industrial Complex.” (M. Christine Vick of Grossman’s Cohen Group serves on the Board of Advisors.) Grossman is also close to the American Turkish Association (ATA), and regularly speaks at its events.

Both ATA and ATC have been targets of FBI investigations because of their suspected ties with drug smuggling, but Edmonds claims she heard wiretaps connecting ATC with other illegal activities, some related to 9/11. The CIA has investigated it in connection with the smuggling of nuclear secrets and material. Valerie Plame and the CIA front group Brewster Jennings were monitoring it when Bush administration officials leaked her identity in July 2003. Edmonds, Giraldi, and researchers Christopher Deliso and Luke Ryland accuse him of suspiciously enriching himself while in government service. Nevertheless he was awarded the Foreign Service’s highest rank when President Bush appointed him to the rank of Career Ambassador in 2004, and received Secretary of State’s Distinguished Service Award the following year.

A dual Israeli-American national, Grossman has promoted the neocon agenda of forcing “regime change” in the Middle East. “[T]he time has come now,” he declared on the eve of the Iraq invasion, “to make a stand against this kind of connection between weapons of mass destruction and terrorism. And we think Iraq is a place to make that stand first . . . the great threat today is the nexus between weapons of mass destruction and terrorism.” But he has not been as conspicuous a war advocate as Wolfowitz, Perle, Feith, Libby, Bolton, and some others. (Perle and Feith, one should note, were also deeply involved in lobbying activities on behalf of Turkey as well as Israel in the late 1980s and early 1990s. Edelman was ambassador to Turkey 2003-05 where, chagrined by the Turkish failure to enthusiastically support the US occupation of Iraq, he deeply offended his hosts.) Grossman seems less an ideologue driven to make the world safer for Israel than a corrupt, amoral, self-aggrandizing opportunist. Anyway, here is an incomplete chronology of his alleged wrongdoing, along with other relevant details.

2001

As newly appointed Under Secretary of State for Political Affairs, Grossman assists Turkish, Israeli and other moles — mainly Ph.D. students — godfathering visa and arranging for security clearances to work in sensitive research facilities, including the Los Alamos nuclear laboratory in New Mexico. FBI taps his phone 2001-2, finds he is receiving bribes (one for $15,000). Edmonds states: “I heard at least three transactions like this over a period of 2 years. There are almost certainly more.”

Between August and September: Grossman warns his Turkish associates seeking to acquire nuclear secrets that Brewster Jennings (for whom CIA agent Valerie Plame works) is a CIA front.

Sept. 4: Gen. Mahmoud Ahmad, the chief of Pakistan ’s intelligence service (ISI) arrives in US, meets with Grossman and other U.S. officials.

Sept. 10: Report by Amir Mateen in Pakistani newspaper Dawn ( Karachi ): “[Ahmad] also held long parleys with unspecified officials at the White House and the Pentagon. But the most important meeting was with Mark Grossman, US Under Secretary of State for Political Affairs. US sources would not furnish any details beyond saying that the two discussed ‘matters of mutual interests.’”

Sept. 11: Gen. Ahmad is having breakfast in Washington with Congressman Porter Goss (R-Fla.) and Senator Bob Graham (D) when attacks occur.

(Goss had had 10 years in clandestine operations in CIA and later — September 22, 2003-May 5, 2006 — heads the organization. Graham and Goss later are the co-chairs of the joint House-Senate investigation that proclaimed there was “no smoking gun” as far as President George W. Bush having any advance knowledge of September 11.)

Immediately after the 9/11 attacks, FBI arrests people suspected of being involved with the attacks — including four Turkish and Pakistani associates of key targets of FBI’s counterintelligence operations. Sibel heard the targets tell Grossman: “We need to get them out of the U.S. because we can’t afford for them to spill the beans.” Grossman facilitates their release from jail and suspects immediately leave US without further investigation or interrogation.

Sept. 12-13: Meetings between Ahmad and Deputy Secretary of State Richard Armitage. Armitage threatens to bomb Pakistan “back to the Stone Age” unless it cooperates in US attack on Afghanistan. Ahmad also meets Secretary of State Colin Powell. Agreement on Pakistan’s collaboration is secured.

Sept. 20: Sibel Edmonds, a 32-year-old Turkish-American, hired as a translator by the FBI.

According to Edmonds, she overheard an agent on a 2000 wiretap discussing with Saudi businessmen in Detroit “nuclear information that had been stolen from an air force base in Alabama,” and stating: “We have a package and we’re going to sell it for $250,000.” She also claims she listened to recordings of a high official (Grossman) receiving bribes from Turkish officials.

Early October: Indian intelligence reports that Gen. Ahmad had in summer of 2001 ordered Saeed Sheikh (convicted of the kidnapping and killing of Wall Street Journal reporter Daniel Pearl) to wire US$100,000 from Dubai to one of hijacker Mohamed Atta’s two bank accounts in Florida. FBI confirms story, reported on ABC news.

Oct. 7: US-led Coalition begins air strikes against Taliban.

Oct. 8: Gen. Ahmad, Taliban supporter and an opponent of the U.S. invasion of Afghanistan, forced to retire from his post as director-general of ISI.

Late Oct.: Pakistani government arrests three Pakistani nuclear scientists, all with close ties to Khan, for their suspected connections with the Taliban.

2002

Early March: Edmonds sends faxes to Senators Chuck Grassley and Patrick Leahy on the Judiciary Committee, is called in for polygraph test; Department of Justice inspector general’s report states “she was not deceptive in her answers.”

March: Grossman keynote speaker at ATC conference.

March 22: Edmunds fired, allegedly for shoddy work, security breaches.

Oct. 27: Edmonds appears on CBS’ 60 Minutes program.

Dec: Grossman visits Turkey, approves $3 billion US aid to Turkey for the Iraq Cooperation deal.

2003

March 3: In interview for Dutch television, Grossman says, “[T]he time has come now to make a stand against this kind of connection between weapons of mass destruction and terrorism. And we think Iraq is a place to make that stand first . . . the great threat today is the nexus between weapons of mass destruction and terrorism.”

May 29: Vice President Cheney’s chief of staff “Scooter” Libby asks Grossman for information about news report about the secret envoy sent by the CIA to Africa in 2002. Grossman requests a classified memo from Carl Ford, the director of the State Department’s intelligence bureau, and later orally briefs Libby on its contents.

Mid-June: Powell and his deputy secretary Richard Armitage may have received a copy of the Grossman memo.

June 10: Grossman asks the Bureau of Intelligence and Research (INR) for a briefing on the Niger uranium issue, and specifically the State Department’s opposition to the continuing White House view that Iraq had tried to buy yellow cake. The resulting memo is dated the same day, and drawn from notes on the February 19 meeting at the CIA on the Wilson mission and other sources. Memo is classified “Top Secret,” and contains in one paragraph, separately marked “(S/NF)” for “Secret/No dissemination to foreign governments or intelligence agencies,” two sentences describing in passing Valerie “Wilson’s” identity as a CIA operative and her role in the inception of the Wilson trip to Niger. This June 10 memo reportedly does not use her maiden name Plame.

June 17-July 9: Senate Judiciary Committee holds unclassified hearings on Edmunds’ allegations.

June 19: letter from Senior Republican Senator, Charles Grassley, and Senior Democratic Senator Patrick Leahy to Inspector General Glenn A. Fine concerning Edmonds’ allegations.

July 14: Robert Novak reveals Plame’s CIA identity.

July 22: Edmonds files suit against the Department of Justice, the FBI, and several high-level officials, alleging that she was wrongfully terminated from the FBI in retaliation for reporting criminal activities committed by government employees.

Aug. 13: letter from two senators to Attorney General Ashcroft concerning Sibel Edmonds’ allegations.

Aug. 15: 600 victims of the 9/11 attacks file suit (Burnett v. Al Baraka Investment & Dev. Corp.), request from Edmonds deposition providing evidence for US government foreknowledge of 9-11 attacks.

Sept. 22: Goss made CIA Director (resigns May 5, 2006).

Oct. 18, 2002: Attorney General John Ashcroft invokes the State Secrets Privilege (requested not by Justice Department but by State department) in order to prevent disclosure of the nature of Edmonds’ work on the grounds that it would endanger national security, and asked that her wrongful termination suit be dismissed, in effect placing Edmonds under a gag order.

Congressman Henry Waxman (D-Ca.) expresses outrage at gag order, promises that a Democratic majority in Congress would conduct hearings. (This has not been done.)

Oct. 28: Letter from two senators to FBI Director Robert Mueller concerning Sibel Edmonds’ allegations.

Dec. 11, 2003, Attorney General Ashcroft again invoking the State Secrets Privilege, files a motion calling for Edmonds’ deposition in Burnett v. Al Baraka case be suppressed and for the entire case to be dismissed. The judge, seeking more information, orders government to produce any unclassified material relating to the case. In response, Ashcroft submits further statements to justify the use of the State Secrets Privilege.

Dec: Grossman back in Turkey to approve Turkey ’s eligibility to participate in tenders for Iraq’s reconstruction.

2004

Grossman achieves Foreign Service’s highest rank when President Bush appoints him to rank of Career Ambassador.

Patrick Leahy calls for investigation; Sen. Orrin Hatch, Republican Chairman of the Senate, blocks it.

May 13: Ashcroft retroactively classifies all material that had been provided to Senate Judiciary Committee in 2000 relating to Edmond’s lawsuit, as well as the senators’ letters that had already been posted on-line by the Project on Government Oversight (POGO).

June 23: POGO files lawsuit against Justice Department for classifying material it had published; Justice Department fails to get the case dismissed.

July 6: Edmonds suit dismissed on state secrets grounds.

July: Edmonds files appeal. On same day, Inspector General releases unclassified summary of a highly classified report on an investigation that had concluded “that many of her allegations were supported, that the FBI did not take them seriously enough, and that her allegations were, in fact, the most significant factor in the FBI’s decision to terminate her services. . . Rather than investigate Edmonds’ allegations vigorously and thoroughly, the FBI concluded that she was a disruption and terminated her contract.”

August: Edmonds founds the National Security Whistleblowers Coalition (NSWBC) to address US security weaknesses.

December: Grossman the key speaker at an ATC Conference held at the Omni Shoreham Hotel.

2005

Grossman receives Secretary of State’s Distinguished Service Award.

January: Grossman quits his government job. Eric Edelman, another former ambassador to Turkey, takes job of Under Secretary of Defence for Policy.

January: Pakistani nuclear engineer A.Q. Khan confesses to having been involved in a clandestine international network of nuclear weapons technology proliferation from Pakistan to Libya, Iran and North Korea.

Feb. 5: Pakistani President General Pervez Musharraf announces he has pardoned Khan. US response is mild.

March: Grossman made vice-chairman of Cohen Group.

Feb. 18: Justice Department under new attorney general backs away from claim that documents posted by POGO were classified.

April 21: In the hours before the hearing of her appeal, three judges issued a ruling that barred all reporters and the public from the courtroom. During the proceedings, Edmonds was not allowed into the courtroom for the hearing.

May 6: Edmonds’ case dismissed, no reason provided, no opinion cited.

May 14: In open letter, Edmonds states the governments wants to silence her to “protect certain diplomatic relations” and to “protect certain U.S. foreign business relations.” Says the “foreign relations” mentioned in the gag order “are not in the interest of, or of benefit to, the majority of Americans, but instead serve and protect a small minority.”

June 20: Edmonds writes: “(In) April 2001, a long-term FBI informant/asset who had been providing the bureau with information since 1990, provided two FBI agents and a translator with specific information regarding a terrorist attack being planned by Osama Bin Laden. For almost four years since September 11, officials refused to admit to having specific information regarding the terrorists’ plans to attack the United States. The Phoenix Memo, received months prior to the 9/11 attacks, specifically warned FBI HQ of pilot training and their possible link to terrorist activities against the US. Four months prior to the terrorist attacks the Iranian asset provided the FBI with specific information regarding the ‘use of airplanes’, ‘major US cities as targets’, and ‘Osama Bin Laden issuing the order.’ Coleen Rowley likewise reported that specific information had been provided to FBI HQ.”

July 20: Unidentified as a “retired state department official” Grossman tells AP that a classified State Department memo disputed the legitimacy of administration claims that Iraq sought to acquire uranium from Niger, also contained a few lines about Plame Wilson’s CIA employment, marked as secret.

August 5: The American Civil Liberties Union (ACLU) petitioned for the Supreme Court of the United States to review the lower courts’ application of the State Secret Privilege in both lawsuits. The ACLU claims that the courts conflated the State Secrets Privilege and the Totten rule.

Sept. 28: Washington Post cites unnamed former administration source (Grossman) as stating that the outing of Plame was “Clearly . . . meant purely and simply for revenge.”

Oct. 28: In Patrick Fitzgerald’s indictment of I. Lewis “Scooter” Libby, Grossman is the Under Secretary of State mentioned as giving information about Plame to Libby.

November: Grossman attends lavish Turkish Ottoman Dinner Gala, receives award from Turkish lobby group, the Assembly of American Turkish Association (ATAA) in Chicago.

Nov. 28: the Supreme Court declined to review the decisions made in the Edmonds case.

2006

March: Grossman the key speaker at the ATC annual conference.

June: Grossman key speaker at MERIA Conference, discussing Turkey’s importance to US and Israel.

Sept. 2006: a documentary about Sibel Edmonds’ case called Kill The Messenger (”Une Femme � Abattre”) premiers in France. (watch film here)

2007

January 24: Grossman first to testify in Libby trial. Says he informed Libby of Plame’s involvement “in about 30 seconds of conversation” in June 2003.

November: Grossman subpoenaed by defense in AIPAC trial.

Nov. 26: Grossman, now Vice Chairman of the consulting firm the Cohen Group, attends a major Security Conference in Riga, Latvia.

2008

January: Edmonds posts, without comment, photos of current and former officials and Turkish associates on website: Richard Perle, Eric Edelman, Marc Grossman, Brent Snowcroft, Larry Franklin, Ex-House Speaker Dennis Hastert, Roy Blunt (R-Mo), Dan Burton (R-Ind.), Tom Lantos (D-Ca.), Bob Livingston (ex-House Speaker, R-La.), Stephen Solarz (D-NY), Graham Fulle (RAND), David Makovsky (WINEP), Martin Markovsky (WINEP), Yusuf Turani (president in exile of Turkmenistan), Prof. Sabri Sayari (Columbia University, WINEP), Mehmet Eymur (former head of Turkish counter-terrorism).

Jan. 6: The Times of London carries story, “For sale: West’s deadly nuclear secrets.” States that a high official “was aiding foreign operatives against US interests by passing them highly classified information, not only from the State Department but also from the Pentagon, in exchange for money, position and political objectives.” Claims that the FBI was also gathering evidence against senior Pentagon officials — including household names — who were aiding foreign agents.

“If you made public all the information that the FBI have on this case, you will see very high-level people going through criminal trials.”

Jan. 22: White House issues statement declaring its intention to approve sale of nuclear secrets to Turkey; Joshua Frank writes on January 25, “It appears the White House has been spooked by Edmonds and hopes to absolve the US officials allegedly involved in the illegal sale of nuclear technology to private Turkish ‘entities’.” Frank identifies Grossman as one of these officials.

* * * * *

Edmonds is tirelessly and fearlessly campaigning for Congressman Waxman, now chair of the House Oversight and Government Reform Committee, to hold hearings. She says that FBI agents and even former Turkish intelligence officials are willing and able to validate her charges. But the congressman hesitates, perhaps fearing the storm of indignation that explosive evidence will produce in a country sick of its politicians, the lying neocons, and the war. Should they discover that, while disseminating disinformation about foreign nukes in order to fearmonger and build support for aggressive war, some of these officials were actually peddling nuclear secrets — committing treason while receiving honors for their patriotic service — the response could be explosive.

The Office of Special Plans under Abram Shulsky and Douglas Feith cherry-picked the intelligence vetted through the New York Times to terrify people into supporting an attack on Iraq. Democratic leaders have in the past urged an investigation of that spooky office, but furnished the opportunity since November 2006, they have declined to hold hearings. The Italian parliament conducted a study of the Niger uranium hoax, fingering neocon Michael Ledeen as a key suspect in forging documents designed to provide a casus belli before the Iran attack. Congress does nothing to follow up. In effect they are saying that the administration has a right to lie to the people. The presidential pardon granted Libby is a clear statement that it’s okay to punish whistleblowers like Joseph Wilson. The Supreme Court refuses to hear Edmonds’ appeal. It seems that all three branches of government compete to coddle the most unscrupulous and lawless officials, while marginalizing or punishing honest citizens who expose the rot.

The publication of the National Intelligence Estimate undercutting the administration’s case for attacking Iran indicates that there are in the US intelligence community persons alarmed by the administration’s lies and efforts to justify more aggression based on lies. It enrages the neocons who, with Norman Podhoretz in the lead, have been praying for Bush to bomb Iran. The arrest and conviction of Feith subordinate Larry Franklin shows that within the FBI there are forces disturbed at the close connections between the neocons, Israeli intelligence, and the Israel lobby and are willing to take action against lawbreaking. But Feith and Perle have both been investigated before, Perle for discussing classified information with Israeli Embassy staff in an FBI-monitored phone call in Washington in 1970. But the cases dropped for apparent political reasons. Perhaps the Grossman story will gain some traction. Maybe it will prove egregious enough that the tide will turn. Maybe Bush’s last year of office will see the neocons’ thorough exposure, humiliation and defeat.

Or maybe Waxman, Rep. Conyers and others in positions to honestly confront this most mendacious of administrations will continue to dither, feeding the assumption of the most vicious, cynical and corrupt that they are indeed above the law. And earning the contempt of those naive enough to expect serious congressional oversight of a rogue regime.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline shipgeek

  • Member
  • *****
  • Posts: 2,046
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #17 on: August 12, 2011, 04:31:55 AM »
9/11 was an inside job.
E MARE LIBERTAS

Offline bigron

  • Member
  • *****
  • Posts: 22,124
  • RON PAUL FOR PRESIDENT 2012
Re: Richard Clarke airs suspicions over Sept. 11 intel failures
« Reply #18 on: August 12, 2011, 09:50:30 AM »
Weekend Edition
August 12 - 14, 2011
http://counterpunch.com/gould08122011.html


Psychological Warfare


9/11 and the American Mind


By ELIZABETH GOULD and PAUL FITZGERALD


9/11. The number still rings in the mind as if chosen to act as a Pavlovian trigger: Outrage, anger, paranoia, retribution. A shadowy band of religious zealots fly not one, but two commercial airliners into the heart of America’s financial community while others deal a deadly blow to the Pentagon. It was a Hollywood movie, an act of war rivaling Pearl Harbor. Why did it happen? Who would do this to Americans, to America? How could a band of ragged terrorists plotting from a cave in faraway Afghanistan have accomplished such a complex task given the size and pervasiveness of the largest and most expensive military/intelligence apparatus in the history of the world? And even more curiously, why would Islamic radicals give the ideology-driven neoconservative administration of George W. Bush exactly the pretext they needed to launch a bloody invasion and further occupation of the Middle East?

According to the official narrative, 9/11 was an attack on everything American and in so doing changed everything about America. Like Kafkaesque characters who’d suddenly found themselves on the other side of a Cold War “Iron Curtain” mirror, Americans would now have to “watch what they say and watch what they do,” open up to questioning or face jail when prodded by squinty-eyed border guards and forsake any hope of privacy or dignity in a new world of electronic spies and full body scans. Former National Security Advisor, Admiral John Poindexter’s Total Information Awareness program would be enacted and a preexisting “Patriot Act” would be signed into law to clamp down on dissent and real or imagined domestic terrorism.

Some careful observers like Anthony Lewis of the New York Times had already noticed the bizarre coup-like changes coming over Washington in the months leading up to the attack as the George W. Bush administration inaugurated radical shifts in domestic and foreign policy that seemed un-American and alien to anything that had gone before. But those concerns would soon be forgotten in the race for revenge.

9/11 would ultimately give President George W. Bush and his neoconservative advisors all the public approval they needed to transform America and invade Afghanistan and Iraq to cleanse the world of evil in an endless “war on terror.” In the end it would turn America’s reputation for racial and religious tolerance, military invincibility and economic dominance on its head.

Looking back on the carnage of the last ten years it’s easy to see how the psychology of 9/11 changed America. What’s not easy to see is how a long standing campaign of covert psychological warfare built up since the early days of World War II had made the slow destruction of American democracy and the ascension of rule by secrecy inevitable, long before the planes ever left the runway on 9/11.

“If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.” -Dr. Joseph Goebbels

As chief propagandist for the Nazi Party, Joseph Goebbels system of black propaganda not only helped Hitler’s rise to power but kept him there by utilizing near-hypnotic powers over the German people even after the consequences of his disastrous failures had become obvious.

To counter Goebbels’ propaganda theatre emanating from Nazi party headquarters at Munich’s Braunes Haus (Brown House), an organization named Freedom House was founded in New York City in 1941. Fronted by American celebrities and public luminaries such as Eleanor Roosevelt, the brains behind the outfit was Leo Cherne, the psychological warfare specialist/co-founder of the Research Institute of America (RIA), which would much later be labeled the “CIA for businessmen.”    

If anyone was a match for Goebbels mastery of the black arts of psychological warfare it was Cherne. In 1938 Cherne had published a guide to industrial mobilization in Adjusting Your Business to War, prophetically forecasting the outbreak of war in Europe in 1939 and on September 1st of that year completed a 3000-page report titled, Industrial Mobilization Plans for World War II, the very day that German troops crossed into Poland.

That same year Cherne asked a young protégé named William J. Casey, the future director of the CIA, “How do you take a country like ours, stuck in depression, and convert it into an arsenal?” Their combined answer was the loose-leaf book called The War Coordinator. Cherne and Casey’s psychological warfare campaign would establish a narrative that didn’t just embrace freedom as its major theme, in their minds their ideas would actually become Freedom and through the use of propaganda would grow and harden over the decades into an impenetrable shield-like narrative of American triumphalism.

Cherne’s prophecies on war and business attained a near mystical quality and over the decades following World War II he would attract the most powerful and influential figures in American business and politics to his causes. A listing of Freedom House trustees on its 50th anniversary in 1991 includes people as diverse as Kenneth L. Adelman, Andrew Young, Zbigniew Brzezinski, Jeane J. Kirkpatrick, Albert Shanker, Donald Rumsfeld and James Woolsey. It has since become an exclusive neoconservative bastion.

Freedom House’s narrative is no less than the narrative of the American century where, “It has fought on the side of freedom and against aggressors in struggles that can be evoked by simple words and phrases: the Marshall Plan, the Truman Doctrine, NATO, Hungarian Freedom Fighters, the Berlin Wall, the Prague Spring…” and of course Afghanistan.

We experienced Freedom House’s simple words and phrases and their dark influence on the major media in the spring of 1983 in a televised Nightline program following a trip to Afghanistan with Harvard Negotiation Project Director, Roger Fisher. We had brought Fisher to Afghanistan to explore the possibilities of a Soviet withdrawal of forces and discovered the Soviets were desperate to get out. But instead of expanding on Fisher’s efforts to get the Soviets out of Afghanistan, host Ted Koppel undermined the very premise of the discussion by introducing a political officer of the Jamaat-i Islami, which Koppel described as “an anti-communist resistance group based in Pakistan. He is here in the United States under the auspices of two American organizations, concerned with democracy in Afghanistan, the Afghan Relief Committee and Freedom House.”

Had Koppel and Freedom House really been concerned about democracy in Afghanistan, their choice of the Jamaat-i Islami could not be viewed as anything but the darkest of black propaganda, an outright lie.

Originally founded by the Pakistani theologian Abul Ala Maudidi in 1941, the goal of the Jamaat-i Islami was more than just that of gaining political representation for radical Islamists. The Jamaat was to be an all-embracing, extremist Islamic Society, crafted through the strictest interpretation of Islamic law, as a replacement for a modern western-style democracy.

Through the help of the mainstream media during the 1980s the psychological war promoted by Freedom House and Ronald Reagan’s C.I.A. director William J. Casey held the Soviets in Afghanistan for an additional six years, destabilized Central Asia, encouraged the growth of the largest heroin operation in history and enabled the rise of the very Islamic extremists that allegedly planned and carried off the attacks on 9/11.

Ten years after 9/11 Afghanistan remains the center of a growing Islamic insurgency and the longest war in American history. The success of America’s seventy year old psychological warfare campaign, where the lie became the truth and the truth became the enemy of the state, has now so disorientated America’s institutional thinking that we have reached the moment when the state can no longer shield the American people from the consequences of that lie.

Follow us as we go deeper into the creation of the Afghan narrative and the broader implications of the side effects of psychological warfare on the American people in our next piece, “Building the Afghan Narrative with Black Propaganda, The Process is Revealed.”

Paul Fitzgerald and Elizabeth Gould are the authors of Invisible History: Afghanistan's Untold Story and Crossing Zero The AfPak War at the Turning Point of American Empire, both published in the Open Media Series by City Lights Books, www.citylights.com.

 

http://counterpunch.com/gould08122011.html