Author Topic: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman  (Read 51467 times)

0 Members and 1 Guest are viewing this topic.

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
Press Release- “Octopus Cold-Case File Stalled at DOJ”
« Reply #40 on: June 24, 2009, 11:28:30 am »

“Octopus Cold-Case File Stalled at DOJ”

For 28 years Rachel Begley has waited for the murderer(s) of her father, Ralph Boger, 42, Fred Alvarez, 32, vice-chairman of the Cabazon Indian Tribal Council, and Patricia Castro, 44, to be brought to justice. 

For three of those years, Begley actively investigated the execution-style triple slaying while gathering documents and secretly taping interviews with suspects and placing them on her website:

The executions took place on June 30, 1981 while Alvarez, Boger and Castro relaxed in the back patio of Alvarez’s rented home on Bob Hope Drive in Rancho Mirage, California.  The three victims each were shot with a single .38 caliber bullet to the head, according to an autopsy report. There were no visible signs of a struggle.  Their bodies were discovered on July 1 by former tribal chairman Joe Benitez and Cabazon member William Callaway. 

The two male victims, along with Benitez and Callaway, were scheduled to meet at 10 A.M. on July 1 with Steve Rios, an attorney in San Juan Capistrano, to initiate an investigation of Cabazon tribal affairs, according to the Indio Daily News dated 7-1-81.   

Victims Alvarez and Boger had previously divulged their findings to the Daily News, currently known as the Desert Sun, asserting to the reporter that they were marked for death, but their story never got published. 

The Indio Daily News did report the subsequent killings of Alvarez, Boger and Castro however.  Staff writer Paul Zalis wrote that Indio City Manager Phillip Hawes confirmed that William Cole, a Los Angeles-based attorney, had been hired to investigate possible links between the triple slayings and the Cabazon Casino. 

Cole said his office was coordinating efforts with the Riverside County Sheriff’s Department in investigating the murders.  He noted that “sheriff’s deputies had confiscated papers from the Alvarez home and he expected officials to turn those over to his office.” 

“Detective Gordon Hunter said the sheriff’s department was ‘investigating leads’ into the Alvarez slayings, but said he had no ‘knowledge’ of whether deputies had confiscated any of Alvarez’s papers,” wrote Zalis.

Alvarez’s mother, Phyllis, told the Indio Daily News that “she believed the murders were the result of a ‘Mafia contract.’  She also said her son was killed because he was trying to get the Cabazon Casino shut down.”

Rachel Begley was 13 years old when her father, Ralph Boger, and his friends were murdered.  She never gave up hope that the killers would be prosecuted, and consistently prodded local jurisdictions over a span of years to get the case re-opened.  Her efforts were rewarded when a Detective at the Riverside Sheriff’s department was assigned to the cold-case file in 2007.

Today, their respective findings resemble the stuff of spy novels, comprised of all the malevolent dynamics of clandestine government agents and organized crime figures involved in murder, money laundering and covert arms deals while exploiting Indian sovereignty (independent of most U.S. laws) at the Cabazon reservation.

The triple murders still remain officially unsolved and arrest warrants have been withheld by the Deputy Attorney General, California Department of Justice, despite the fact that multiple witnesses have been substantiated and one suspect has confessed his involvement and admitted he was a “hitman.”

The triple-homicide case was originally investigated by Deputy Attorney General Sanford Feldman and Special Agent Frank E. Brock respectively, both from the special investigations unit of the state Department of Justice, San Diego, California.  Decades later, the same DOJ office is again stalling while the window of opportunity for arrests of the perps is rapidly closing. 

Rachel Begley has withheld her story awaiting approval of arrest warrants from the DOJ.  But now it appears prosecution is not on the horizon, possibly due to the complexities and magnitude of the case.  If the warrants are not forthcoming, Begley is prepared to go public.  For over a year she has promised Emmy Award winning journalist Nathan Baca at KESQ-TV in Palm Desert exclusivity to the unpublished details of the story.  Baca is calling it “The Octopus Murders.”


On the tenth anniversary of the triple-murders, Barbara Clark, the aunt of Fred Alvarez, sent a 4-page letter to the Cabazon Nation in Indio.  The letter was dated June 28, 1991. 

Clark wrote that her nephew, Fred Alvarez, had visited with her in Truckee, California two weeks prior to his death.  While they ate breakfast she said Fred discussed things that were going on at the Cabazon reservation, such as “dealings with the Contras, plans for weapons sales, and mismanagement of the tribal business.” 

Fred told his aunt that he planned to meet with an attorney “to get everything documented.”  He added that “the management of the tribal business wanted him out of the way --- He knew they had placed a contract out on him, and he even knew who the hit man was.”  Clark didn’t ask the name of the hit man because she didn’t take Fred seriously at the time.

Clark, who is a Native American member of the Maidu Indian Nation/Pitt River in Northern California, wrote that a year after her nephew’s murder, a woman came to the delicatessen that she managed and mentioned that she was from Rancho Mirage.  Clark noted that her nephew had been murdered there.  As the conversation progressed, Clark said the woman told her, “Oh!  I knew that the big Indian was going to be killed two weeks before he was killed.”

The woman explained that her boyfriend’s sister had been dating a “high roller” in Palm Springs who talked about the upcoming murder of the “big Indian.”  Clark provided the information to the California Attorney General’s office, and was subsequently informed by investigators from the DOJ that the “high roller” was John Paul Nichols, Jr.

Clark said she flew to Riverside to testify before a Grand Jury, noting that it was about the same time that John Philip Nichols, Sr. was being charged with solicitation of murder of five other men.  Clark wrote that “the Grand Jury failed to act on the evidence at hand – she was told later by a reliable source that there were too many big names involved, and the case was to be dropped.  The case was then closed.”


The public background to the story begins with the Cabazon Band of Mission Indians, located 25 miles east of Palm Springs, California.  According to public historical data, on May 15, 1876, President Ulysses S. Grant issued an executive order which officially created the Cabazon Reservation, consisting of 2,400 acres over three parcels of desert (later reduced to 1,700 acres).

After more than a century in the desert, the tribal nation began blazing the path for Native American gaming in California.

According to a San Francisco Chronicle article entitled, “Tiny California Tribe’s Huge Clout,” dated September 4, 1991, in 1980 a rundown warehouse was transformed into the “Cabazon Indian Casino,” the first Indian card room in the nation.  Tommy Marson, described in congressional hearings as a known associate of the Gambino crime family, “lent the Cabazon tribal administrator, John Philip Nichols, $50,000 to start the casino, according to Nichols’ son, John Paul.  The manager of the casino was Rocco Zangari, a former bookie later indicted on racketeering charges.” 

Citing local ordinances forbidding gambling, Indio police staged a series of raids on the casino in 1981, but Cabazon lawyers fought back, winning a court injunction that not only prohibited local law enforcement from interfering with gambling activities on the reservation, but ultimately led to a Supreme Court ruling on February 25, 1987 that neither the State of California nor Riverside County could regulate the bingo and card game operations of the Cabazon Band of Mission Indians. This landmark case, known as the “Cabazon Decision,” made them the first tribe in California to establish non-regulated gaming and resulted in the creation of the Indian gaming industry.  The Cabazon tribe had established high-stakes bingo that same year, in 1987.

The National Indian Gaming Commission was subsequently established pursuant to the Indian Gaming Regulatory Act of 1988.    The purpose of NIGC is to “shield Indian tribes from organized crime and other corrupting influences; to ensure that Indian tribes are the primary beneficiaries of gaming revenue; and to assure that gaming is conducted fairly ---“

Today, there are fewer than 55 members of the Cabazon Band.    As owners and operators of Fantasy Springs Resort Casino in Indio, the Cabazon tribe oversees the 12-story, 250-room hotel, Vegas-style casino with nearly 2,000 slots, 40 table games, an off-track betting room, and virtual poker room as well as five restaurants. 

The darker, more obscure aspects of this success story bubbled to the surface in 1980 when Fred Alvarez, vice-chairman of the Cabazon Indian Tribal Council, wrote a letter to Ronald Reagan outlining criminal enterprises that he had uncovered at the reservation.  All copies of the letter disappeared after his murder, but a response, signed personally by Ronald Reagan, dated October 6, 1980 was subsequently found in which Reagan said he found Alvarez’s comments to be “very interesting.”

Authorities explain that the cash nature of Indian gaming made it an ideal business to launder money.  That same lack of accountability made it easy for an outside management company to skim the vast majority of an operation’s income.  “Someone will come in and manage the operation, when in fact the purpose is to skim the profits,” said one FBI supervisor. 

Reagan was elected president of the United States the following year, in November 1981, five months after the Alvarez, Boger, Castro triple homicide occurred.  With all resistance eliminated at the Cabazon reservation, it marked the beginning of government exploitation of the tiny band of Indians when “outside management” in the form of Cabazon tribal administrator John Philip Nichols formed a joint venture with Wackenhut International, a Florida-based security firm run by former FBI, CIA, NSA and military officials. 

Police reports indicate that Nichols previously did business in Saudi Arabia, South Africa, Panama, Nicaragua, Guatemala, Mexico, Chile, Brazil, the Netherlands, England, Canada, France, Spain, Japan, Korea and Taiwan.  In 1960 Nichols became the manager of a Coca-Cola bottling plant in Sao Paolo, Brazil, then he became a Pentecostal leader of the Chilean Pentecostal movement and attended several evangelical and gospel congresses in Bolivia.

When Nichols was hired in 1978, he wrote himself a 10-year contract with the Cabazon tribe that gave him 50 percent of the profits of any business he brought to the reservation.  In the summer of 1980 and during the next three years, Nichols embarked on a series of international security and military ventures to provide security for Crown Prince Fahd’s Saudi Arabia palace, proposals to manufacture 120mm combustible cartridge cases on the reservation and in Latin America, along with 9mm machine pistols, laser-sighted assault weapons, sniper rifles and portable rocket systems.  At one point he even sought a contract to develop biological weapons on the reservation.

In January 1985, John Philip Nichols was arrested for hiring a man to solicit the murder of five people, but the murders were not carried out due to his arrest.  He was convicted of felony murder solicitation. (While serving 18 months in the California Institution for Men in Chino, John Philip Nichols’ son, John Paul Nichols, took over his position as acting administrator of the Cabazon tribe. In 1989, Mark Nichols inherited the position of administrator from his brother, John Paul Nichols). 

A Los Angeles Times article entitled, “Indian’s Aide Held in Alleged Slaying Plot,” dated January 19, 1985 reported that Indio Police Capt. Carl Kennedy was unable to connect the murder-for-hire proposal leading to Nichols’ arrest with the unsolved July, 1981 execution murders of Fred Alvarez, Ralph Boger, and Patricia Castro in Rancho Mirage.

“The killings were investigated without success by the Riverside County Sheriff’s office,” according to the Times, “but official interest in the murders was renewed last year when Jimmy Hughes, a 27-year-old ex-Army Ranger, told authorities that he had been the payoff man in the Alvarez case.”

“Hughes, security director of the Cabazon band’s casino and bingo operations for four years until early 1984, reported that he had been instructed in [John Philip] Nichols’ presence to take $25,000 to the mountain community of Idyllwild in the summer of 1981 and give the money to a man there as partial payment for the Alvarez killings.”

The Los Angeles Times further reported that the Riverside County sheriff’s office and the state Department of Justice initiated an investigation, but after months without announced results, [Jimmy] Hughes went public with his information in October 1984, then fled the country.

Indio Police Chief Curtis R. “Sam” Cross, who worked on the murder-solicitation case against John Philip Nichols, told the Press Enterprise in Riverside, California in March 1985 that he sent a letter to Rep. Jim Bates, D-San Diego, requesting a congressional investigation of the Cabazon Indians’ business ventures.

Nothing ever came of all the investigations in the 1980’s. 

Despite all the allegations set forth over the years, Senator John McCain, R-Ariz., vice chairman of the Senate Select Committee on Indian Affairs, refused to intercede in Cabazon affairs, noting, “ --- By solemn treaty with the Indian tribes, recently affirmed by President Bush, we must treat Native Americans as sovereign nations.”     

In 1991 a series of events, including the death of Washington D.C. investigative journalist Danny Casolaro on August 10th, brought the Cabazon-related triple homicide back into national scrutiny.  Casolaro had been preparing to visit Indio to investigate the Cabazon/Wackenhut connections to a cabal of spooks, arms dealers, drugs and organized crime figures which he dubbed “The Octopus.” 

A San Francisco Chronicle article entitled, “Tiny California Tribe’s Huge Clout,” dated September 4, 1991, best summarized the failure of the justice system at every level to unlock the mystery of Cabazon’s forbidden secrets.  Reporter Jonathan Littman mused:  “In all, federal and state agencies [have helped] to finance nearly $250 million worth of projects on the 1,700-acre reservation.  That is particularly impressive in light of the tribe’s size – the entire Cabazon population numbers no more than 30.

“To observers in and out of government, these undertakings pose an obvious question:  How did a tiny band of Indians, one of the smallest in the nation, give rise to a multimillion-dollar network whose influence reaches into all quarters of the U.S. government?

“The answer lies in a maze of politicians, military officers, organized-crime figures, intelligence agents, foreign officials ranging from Saudi sheiks to Nicaraguan Contras – and John Philip Nichols, a globe-trotting evangelical social worker with an uncanny ability to win federal grants, who once served 18 months in state prison for solicitation to commit murder.

“Although the full story of the Cabazon reservation is still unfolding, there are indications that this network reaches far beyond the borders of the tribe’s land.”

Perhaps this is what Rachel Begley is up against as she awaits news from the California Department of Justice whether arrest warrants will be forthcoming for the murderer(s) of her father.  The Detective at the Riverside Sheriff’s Department did his job, he solved the case.  It’s now up to the DOJ to bring justice to the victims and their families, as well as closure to the dozens of investigators who worked the case during the past 28 years.


Exposing the Octopus and my dad's

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: PROMIS-Riconosciuto-Tim Osman-Cabazon-Stormont Labs-Wackenhut
« Reply #41 on: July 15, 2009, 04:50:03 pm »

Ex-intellegence agent exposes the truth behind the Government Agencies


His book is the book the Israelis tried to stop, written by the man they said didn't exist - the book that George Bush and the CIA tried to sabotage.

For more than ten helter-skelter, hair-raising years, Ari Ben-Menashe was the golden-haired boy of Israel's deadly spy service.

After a year in a US jail on trumped-up charges, Ari Ben-Menashe is ready to tell his story.

Ari Ben-Menashe is a man without a home, a country, or many friends in the cut-throat world of international intelligence. In his recently released book entitled Profits of War, the sensational story of the world-wide arms conspiracy, Ben-Menashe details the unbelievable story of an international cabal of well-connected intelligence community and corporate arms dealers who, as the title of the book suggests, wage war to covertly gain power, influence and personal wealth. Ben-Menashe is the man responsible for leaking the information that eventually led to the Iran-contra investigations and the demise (or sacrifice) of Oliver North who, it turns out, was only a small player in a much much bigger game

.After serving in the external relations department of Israeli Military Intelligence and acting as personal national security advisor to Yitzhak Shamir (former President of Israel) for a total of twelve years, Ben-Menashe has written what must arguably rate as one of the most important political and intelligence exposes ever.

I met with Ari Ben-Menashe twice during 1991 to discuss various issues, including the theft by the US justice department of the most sophisticated data-collecting computer program ever developed, which is known as 'the Inslaw affair', and the subsequent modification and international sale of that program to various countries around the world, including Australia, by a CIA front-company and an Israeli Intelligence front-company owned and run by Robert Maxwell.

The Dossier Society

The computer program we are talking about is called Promis, and its use presents the biggest threat to individual rights by any computer technology in use today. Not only that, it has given US Intelligence agencies access to extremely sensitive information stored in the databases of possibly as many as eighty-eight countries around the globe.

Ben-Menashe devotes an entire chapter of his book detailing the joint American-Israeli initiative to sell Promis to intelligence and law-enforcement agencies world-wide, and gives several examples of how the program has been used to interfere with the political process of various countries and to keep track of citizens.

Since obtaining an illegal copy of the program over a decade ago, the Central Intelligence Agency has, in conjunction with Israeli Intelligence, embarked on a highly successful world-wide initiative to install "bugged" copies of the software in computer systems run by intelligence and law-enforcement agencies, (as well as other government organisations), to which they now covertly have unlimited access.

One of the earliest "leaks" regarding this covert computer double-dealing came out in an article entitled "Spy vs. Spy", (written by Zuhair Kashmeri for the Toronto Globe and Mail), which was published on Saturday 20 April 1991. Devoted entirely to the Promis initiative, the article quotes one of Kashmeri's Canadian Intelligence sources: "Some of our Allies, such as Australia, are furious after they found out from the revelations of the Inslaw Case that they were sucked into buying Promis". Kashmeri confirmed to one of my colleagues that he has had a twelve year relationship with the two intelligence sources who supplied the information for the article, and that they had always proved reliable in the past.

At the time I interviewed Ben-Menashe, it proved very hard to authenticate all his claims. Although Israeli Intelligence denied all knowledge of him for some time, I was informed by a helpful contact within the Australian Democrats that he had indeed worked there for them, and, was given copies of various personal references that supported the claim. After later interviewing Bill Hamilton, the Director of Inslaw Inc., the company that wrote the program, and other individuals familiar with the case, I felt quite confident that Ari Ben-Menashe knew exactly what he was talking about.

On 1 September 1992, an investigative committee of the US Congress released an investigative report on the Inslaw case, which outlines the controversial history of the Promis software. It took three years of investigation to complete the report, due in part to the withholding of evidence by government agencies connected with the theft, modification and distribution of the program, as well as the intimidation of important witnesses. In order to slow down and mislead the investigation there have been arrests, on false charges, of individuals informing the judicial committee, as well as the suspicious death (red murder) of journalist Danny Casolaro, who had been investigating the Inslaw Case and its links to the October Surprise, Iran-contra Affair, and BCCI bank collapse. Far from answering all the questions, the report concludes that a far more thorough and far-reaching investigation must be urgently undertaken.

This committee's report confirms many of |Ben-Menashe's claims. He was, in fact, one of the key sources of their information. I put the following questions to him when we met in 1991:

GK: What is Promis?

B-M: It is the most sophisticated computer database that has ever been developed in the world. Computers are very widely used by the intelligence community; it's the main source of information about people. You can essentially get anything about anybody you want to know.

GK: To what extent would it be used by the intelligence community to collect information about the civilian population?

B-M: It's quite widely used, al over the world, to collect information about dissidents, opposition leaders, and so on. What does it do? I'll give you an example which is very interesting. You have a computer, put this program on it, and connect this computer to the water company, to the electric company, to IATA (International Air Travel Association), to credit card companies, to the tax department, bank accounts, to anything you like to think... phone lines, where someone calls to, which is very important. Other than tapping him, now you can also have a written record of all the telephone numbers he or she dials. So if you want Mr. Joe Smith and everything he does, it's the only program that can bring all this data from everywhere...

GK: Globally?

B-M: Globally, yes, onto one screen! It's a very sophisticated program. I mean, this is the biggest infringement on privacy, on anybody, anything. Is there any privacy? I mean, the government agencies would be able to monitor anybody's activities as they wish. Very quickly, too. Once they have this information, who knows what they do with it.

GK: How quickly can Promis assimilate information and provide a dossier on a person?

B-M: If it's hooked up correctly, in a matter of seconds. It is a better information collection system than any other. I mean, I think it put the satellites out of business.

GK: Have you seen this in operation?

B-M: Oh yeah, You know, this program makes George Orwell's '1984' look like ... (nervous laugh). George Orwell was modest. What this program can do, the only one in the world that can do this, is first of all make sure when you're talking about "Harry Smith" it's the same "Harry Smith", because there could be ten "Harry Smith's. It would compare notes, check common denominators, and it would find Harry Smith. His water usage, his electric usage, how many times he has travelled abroad, what does he do with his credit cards, his car licence number, all sorts of stuff. Put it together, and there you go. You have everything you ant to know about this person. The first version was ready in 1979/80. In '81 he (Bill Hamilton) offers it to the Justice Department, because it's also good for law enforcement. He offers it, and then suddenly the National Security Agency has it. It's given to the Israeli's in 1982, and it's being marketed around the world, given to allies and to non-allies. The reason being, it was bugged as well. What you do is basically set it up for one government, and without letting that government know, have a phone tap on that computer and can pull out information for yourself also. They bugged their allies as well! I'll give you an example. The Americans sold it on our behalf (Israel) to some Arab countries. Jordanian Military Intelligence had it in '82 and they were collecting data on the Palestinians. The Palestinians were threatening the king (Hussein) as well. We were also sharing that information with them.

GK: Without their knowledge?

B-M: Of course, without their knowledge. Now, the two countries that marketed, the two security forces that marketed this program, one was Israel, and one was the United States. Israel did it through various computer companies owned by Robert Maxwell. The Americans on the other hand did it through a company called Hadron, based in the United States, owned by the owner of UPI (United Press International), a fellow by the name of Earl Brian. He used to be Reagan's Secretary of Welfare and Health in California, when Reagan was governor. Then he was working for the intelligence services. Basically his companies were 'attached' to the CIA. The CIA was marketing it for the National Security Agency . One of the Maxwell companies sold it to the GRU (Soviet Military Intelligence) and that was bugged. The West knew what was going on in that theatre faster than the Russians. Another example, South Africa. Great place. It was given to them without the bug. It was set up through a company called Degem, owned by Maxwell. This program tracked ANC (African National Congress) people, and what came out of the computer was handed to the Buthelezi people (Inkatha) and then you had 'black on black' violence.

GK: And meanwhile, was this being monitored by the US as well?

B-M: Yes. It's funny, you know, there was also a terminal in Pretoria that was used by the South African Military Intelligence, And the US Embassy and that place share a wall, so...

GK: How widespread is the use of Promis in other countries?

B-M: It's quite widespread. Most of the Western Allies have it; as we said, the South Africans have it, the Nicaraguans have it, even the Guatemalans. The ex - Eastern Bloc countries have it too. I believe that since 1990 most of them have checked it for bugs, but they still use it. MI5, MI6, the Russians.

GK: Who is using it in Australia?

B-M: ASIO (The Australian Security Intelligence Organisation).

GK: Do you know who installed Promis in Australia?

Yes I do. It was Hadron.

GK: Could the use of Promis be seen as a threat to the privacy of the general public?

B-M: Sure. That's what it's all about.

GK: So it couldn't be written off as something that's just there to monitor terrorist groups and so on?

B-M: Sure. That's what they say. But what is a terrorist? I mean, what is national security, what is all this? It's a matter of monitoring people who are getting in the way of the government keeping everybody in line. Once you have this technology and you know everything everybody else is doing, or whomever you want to follow... you can basically control people that way. You can put in disinformation, do all kinds of things, block bank transfers, you know, stop people doing things, or make sure they don't have money, or their money doesn't come through on time, and so on.

There's so much that can be done with this information. Simple things. You don't have to be very sophisticated. Cancel reservations, slow down bank transfers, put in a computer that a credit card is no good. Just imagine, all you have is your American Express card, and you're stuck somewhere around the world and the computer shows that your card is no good! Simple as that. And then when you complain three weeks later, :sorry, mistake". But in the meantime, for three weeks you were in trouble.

GK: I have been told that the National Crime Authority in Australia is setting up a database to monitor every single bank transaction over $5000. I suppose that system might be useful for this purpose as well?

B-M: It's the same database by the way. They just got a condensed version of Proms It's not called Promis, but once the program is out...

GK: How much of a connection is there between intelligence agencies and banks or other private organisations that hold extensive and sensitive computer records?

B-M: Well, I think what happens is that the intelligence agencies become the centre of all of it. You know, the banks monitor the money, other guys monitor stuff, but the intelligence agencies put it all together.

GK: So they have access to banking records?

B-M: Oh sure. They have access to everything. This is why a lot of countries love the idea of ID cards, because this way it makes things easier. Or they use a social security number or a tax file number. Initially the idea was to do it all through law enforcement and that kind of thing, but since it didn't work, because of parliament or congress or whatever, they just had to do it through the back door. It's the same thing, and again, it's governments and bureaucracies trying to control everybody's lives.

GK: When you look at all the intelligence-gathering capabilities, surveillance, eavesdropping, tracking, monitoring and so on, it seems that they are all evolving and interlocking more and more. Is it steamrollering out of control?

B-M: Yes, yes. I've always said this. It is getting out of control. I mean, suddenly you have everything being monitored. Everything.

GK: Do we need it? I mean, what are they going to do with all this information?

B-M: Who knows. But it's bureaucracy. Everybody loves it. Each bureaucrat, or each guy that runs some section of a listening agency wants his empire to grow, and it grows and goes out of control. Remember that intelligence bureaucracies are just like everything else, they get over-zealous. I sometimes wonder how the United States government... I mean, $600 million for a stealth bomber. One stealth bomber! With $600 million you could clean up Los Angeles and all its homeless. But you know, "security", "defence", "the communists are coming". But I guess the communists aren't coming any more. We need to find a new enemy. (Cynical)

GK: The question I get asked all the time is "How do they keep all this a secret?"

B-M: It's easy. Everybody protects his job. And I'll tell you another thing. Most of these guys in national security, what do they do? They either sit down listening all day, or running their computers, or re-listening to tapes. Some of these jobs are very menial. He comes home. His wife asks him something. "It's secret. I can't tell you". It's also a means of protection. It's easy. This guy starts talking publicly... He's gone. And there's another thing. Each person has a very small amount of knowledge, unless you get to a senior level, and once you get there you're part of the system. Each person has this very small thing he does. In twenty years, how many people have broken rank? Not that many who are sufficiently up there to know. But my question today is what is it all for?

GK: That's what we would like to know!

B-M: When you look back at it, it's a whole load of bullshit crap, bureaucrats keeping people in work, and keeping tabs on their opponents.

GK: But is all this surveillance capability so powerful now that it's impossible to resist unfair government practice?

B-M: It's hard to resist unfair government practices. It's very hard. I mean, how do you do it? You're fighting ghosts basically. But bureaucracies can be fought if you know how they operate. It's hard, but you can do it, you know, stay ahead.

GK: You're suggesting it's more bureaucracy out of control than some grand conspiracy, then?

B-M: Yep! That's what it is! I never ran into any "Super-commission". That's what it is. Friends with mutual interests protecting each others powerbases or their own power- bases That's how it goes. I don't see it as one grand conspiracy. It's just there's technology and bureaucrats, they want to do their job well, so the collection becomes larger and larger. More collection and more information

GK: What happens when interests collide then, say, on a national level?

B-M: Then you have a fight. That's what they call a "crisis"!

GK: Are we heading to a point where this is all too fragile, this reliance on technology and a "balance of terror"?

B-M: Would your life be any different if you were not monitored? Probably better. But the average person, what does he care? The way I see it, you go to work, you get your house, you give half of what you earn toward the house, at the age of 60 you own the house and live off your pension.

You stay in line, you get the house. I mean, this whole issue of mortgage is... make sure they get married at a certain age, You have two children, and that's how everybody's in line. You work all your life to pay your mortgage and if you don't work you lose your house. Perform or...

GK: In terms of gathering information on people, are there any moral criteria as far as the intelligence community or bureaucrats are concerned?

B-M: Moral criteria about what? If you're targeting somebody you're targeting somebody.

The National Safety Council Link

Another interesting connection may well lie in the cover-up of the activities of the National Safety Council of Australia, Victorian Division, and the activities and alleged "suicide" of its director, John Friedrich. In the 23 September 1991 issue of the American political newspaper Spotlight, the following passage appears: "Two weeks before Casolaro's death in early August, John Friedrich was found dead in Sale, Australia. He suffered a single bullet wound to the head and his death was termed a suicide. Friedrich was a close ally of Lt Col Oliver North and (Amiran) Nir. He had a lot of knowledge about the Iran-contra and Inslaw cases. Nir died in a plane crash in Mexico."

It is interesting to note that when the current affairs show Page One ran a story on John Friedrich and the NSCA scandal on 27 March 1989, they went out of their way to make it look like Friedrich had engineered the entire fraud perpetrated by the NSCA. They ended their report with an interview with Friedrich's replacement at the NSCA, asking "Is he (Friedrich) the sort of man who would contemplate suicide?" The reply: "I've tried to think that through in my mind, I believe that it would be possible, but I of course can't say if that's what happened. This was seventeen months before Friedrich's alleged suicide actually took place.

Could it be that Friedrich's "suicide" was actually a disappearance planned well in advance due to the heat that was being put on the NSCA by investigators, and the questions being raised by the public? Since when is suicide the expected behaviour of a failed businessman?

It seemed to me to be a very odd question to finish this report with, But it is worth noting that Channel 10, the television station that ran Page One, was owned by Christopher Skase at the time of the report, another of the well-connected and high-flying West- Australian businessmen who has since fallen from grace. In an article written by himself, Friedrich posed questions about how businessmen like Alan Bond and Christopher Skase became so wealthy, so fast. It's likely he knew exactly how and why.

As for the true nature of the NSCA's activities, Friedrich wrote, "If 'intelligence' means the world of covert government action, both Australian and overseas, then yes, we are involved in some intelligence work... I don't know how people can really believe that it was possible for one man to make happen all that existed at Sale and elsewhere. And if I was getting the nod from people above, why were they giving it? There are ten so-called joint United States-Australian government installations in Australia. The Americans want to have people around who can keep an Eye on these installations, who can respond, if necessary, to threats to those installations. The US has valuable and important facilities here. It likes to know they are safe. Much of my career is bound up in this fact. There was considerable interest in the NSCA Victoria Division, in a number of key areas of government and industry, including the Department of Defence, the Federal Police, some State Police forces, the Foreign Affairs Department, and the Attorney General's Department."

No doubt many of these government departments would have been ecstatic to get hold of a computer program with the surveillance capabilities of Promis. Perhaps Friedrich was the man who connected them to the people who were marketing it.
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Mike Philbin

  • Guest
Re: PROMIS-Riconosciuto-Tim Osman-Cabazon-Stormont Labs-Wackenhut
« Reply #42 on: July 16, 2009, 06:18:10 am »
Anti_Illuminati and others,

having just read the interviews Norman did with them, have you'all ever thought of bringing this whole issue out on WBAI RADIO. There's tonnes of documentation already.



  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #43 on: July 21, 2009, 03:11:25 pm »
More on (with an extremely damning document to soon follow directly from SAIC):

Dov Zakheim

Most people familiar with the 9/11 cover-up have a fair idea of some of the key players in the monumental 9/11 crime. Rabbi Dov Zakheim, one of the central figures in this vile operation, isn’t as well known because he’s one who has always lurked in the shadows. Zakheim is as powerfulas he is inconspicuous, and a man of many talents:

1.   *Graduate of the prestigious London School of Economics (PhD), and the University of Oxford (National Science Foundation Graduate
Fellow) *

2.   *Former CEO of Systems Planning Corporation, a highly specialized defense technology company that manufactures a one-of-a-kind remote-piloting system for aircraft, including commercial airliners *(see below)

3.   *Senior Fellow for Asian Studies of the Council on Foreign Relations (CFR) *

4.   *Member of the Task Force on Defense Reform (appointed by Secretary of Defense Cohen) *

5.   *Senior Advisor at the Center for International and Strategic Studies *

6.   *Former Under Secretary of Defense (appointed by George W. Bush)
7.   *Comptroller of the Pentagon {see [1] *below for performance

8.   *Pioneer and prime architect of /Project for the New American Century /(PNAC), the neo-con cabal that authored /Rearming America’s Defenses/ (RAD), the bible for American global
domination *[2]

9.   *Author of “/Flight Of The Lavi: Inside A US-Israeli Crisis/”
*(Brassey’s, 1996)

10.   *Long-time Bush associate, having served as a policy advisor to
the governor during the 2000 campaign *

11.   Columnist for /The Jerusalem Post /

12.   Editorial Board member of /Israel Affairs /

13.   *Ordained Rabbi *

14.   Citizen of the State of Israel /[How a citizen of Israel can serve as Comptroller of America’s central defense establishment is a question I shall leave to others for comment. While they ponder this perturbing oddity, perhaps they could also shed light on why every one of the following kingpins of the Bush administration are also Israeli citizens: Paul Wolfowitz, Richard Perle, Douglas Feith, Michael Chertoff, George Tenet, Elliot Abrams, Donald Kagan, Richard Haas, Kenneth Adelman, Edward Luttwak, Robert Satloff, David Frum, David Wurmser, Steve Goldsmith, and Marc Grossman.] /*/


[1] *”I know Dr. Zakheim has been trying to hire CPAs because the financial systems of the department are so snarled up that we can’t account for some /_$2.6 TRILLION_/ in transactions that exist...”* /-Secretary of Defense Donald H. Rumsfeld, during testimony before the House Appropriations Committee: Fiscal Year 2002 Defense Budget Request, as given by Secy. Rumsfeld, Chairman of the Joint Chiefs of Staff General Hugh Shelton, and Comptroller Dov Zakheim; on Monday, July 16, 2001./ [NB: Dr. Zakheim resigned as Pentagon Comptroller and Chief Financial Officer at the beginning of March when it was revealed that the he is unable to account for the disappearance of $2.6 trillion(it’s unlikely this will receive much coverage in the mainstream media).

Zakheim has since taken a lucrative position as a vice president of the mega-consultancy Booz, Allen, & Hamilton (one that also works closely with DARPA). Rabbi Zakheim is also Chief Executive Officer of SPC International Corporation (a subsidiary of the aforementioned remote-flight-control-technology firm), a company that specializes in “political, military, and economic consulting, and international sales and analysis”. In addition, Dr. Zakheim serves as Consultant to the Secretary of Defense and the Under Secretary of Defense for Policy. As the Rabbi’s record clearly shows, he has serious tenure in the US defense establishment: more than 30 years of holding assorted senior positions at the Pentagon.]

[2] Dov Zakheim is the co-author of that singularly sinister-and chillingly ominous-statement contained in Rearming America’s Defenses (RAD) re the plan for American global domination [through galvanizing American emotional support for full-scale war against oil-rich Arab states]: *”...**the process of transformation, even if it brings revolutionary change, is likely to be a long one, /absent some catastrophic and catalyzing event-like a new Pearl Harbor/”*. The PNAC document also expressly recommends the US should seize Iraq /even if Saddam Hussein were deposed through a military coup/. [So much for bringing “freedom and democracy” to the people of that country.]

*The good Rabbi’s involvement with PNAC, his previous directorship of a corporation that manufactures remote control flight systems, and his inability to document how the Pentagon has spent TRILLIONS of American taxpayers’ dollars suggests that real investigations into the crimes of 9/11 and the US invasion of Afghanistan and Iraq would put Mr. Zakheim near the top of the witness list for interrogation and potential prosecution.

Dr. Dov Zakheim was the former CEO of Systems Planning Corporation, a company that designs and manufactures extremely sophisticated control/guidance technology that enables an external operator to fly, and land, aircraft by remote control. One of the company’s principal products is the Command Transmitter System (CTS), a fully redundant, self-contained, solid-state platform capable of providing totally programmable remote flight control capability, including high-precision electronic navigation.

The company’s parallel product, the Flight Termination System (FTS), enables system-equipped aircraft to be safely landed on any suitable runway in the world-regardless of the availability of ground-based navigational or landing aids (VOR, ILS, MLS, etc.).

Such total independence in all flight regimes is achieved through a variety of ultra-sophisticated space-based technologies, including Mil-spec DGPS (Differential GPS, using extremely precise encrypted military “P” Code transmissions), and is accurate to within /one foot/ of the runway centerline during landing.

*The CTS/FTS remote-control system is capable of controlling up to 8 airborne vehicles-including airliners-simultaneously from ground-based or airborne (AWACS) positions.

*/[”Coincidence”: Operation Vigilant Guardian, one of five NORAD “war game exercises” underway on the morning of 9/11 and orchestrated by Dick Cheney, involved the simulated hijacking of commercial airliners. At one point during the exercises, while the four “real” hijacked aircraft were airborne, as many as TWENTY-TWO independent radar blips representing “hijacked” aircraft were simultaneously displayed on FAA radar screens along the Eastern seaboard. This, obviously, created total pandemonium. Air traffic controllers who had been advised beforehand by NORAD of the “simulated hijackings”, began frantically calling NORAD to determine which of the twenty-two targets were “real” and which were “exercise.”

All indications are that whatever it was that happened to the four real “hijacked” airliners occurred during this purposefully orchestrated melee while the order was given for the US Air Force to “stand down”.]/ The CTS/FTS system (subsequently improved, tested and implemented by Raytheon) allows specialist ground controllers to listen-in on cockpit conversations on the target aircraft, then take absolute control of its computerized flight control system by remote means and safely land the aircraft at any airport within range.

In other words, this technology was designed to empower “law enforcement agencies” to hijack hijackers. [NB: The ground station technology for CTS/FTS was developed by Raytheon under an Air Force contract for the Joint Precision Approach and Landings System (JPALS) program. A government-industry team accomplished the first precision approach/auto-land by a civil aircraft using this system on August 25, 2001 at Holloman AFB, NM. A FedEx Express 727-200 aircraft demonstrated hundred percent system proficiency by executing six full auto-lands using the JPALS ground station.]
In partnership with Raytheon, System Planning Corporation also supplies CTS/FTS technology to commercial airplane manufacturers for installation in airliners (Boeing: confirmed; Airbus: undetermined, but highly probable given the consortium’s connection to BAE, a US military contractor.)

It has been reported that DARPA’s codename for the CTS/FTS system was “Home Run”. Former German Secretary of Defense Andreas Von Buelow may have alluded to foreknowledge of Home Run technology in an interview he gave the German daily “Tagesspiegel” on January 13th, 2002:

“There is also the theory of one British flight engineer: according to this, the steering of the planes was perhaps taken out of the pilots’ hands, from outside. The Americans had developed a method in the 1970s, whereby they could rescue hijacked planes by intervening into the computer piloting [automatic pilot system]. This theory says this technique was abused in this case [9/11]...”

Upon deeper scrutiny this may not appear quite so much a “theory” as might first seem. It’s been reported that the German national carrier Lufthansa, seriously concerned that one of its own aircraft might be “rescued” by the Americans without its authority, had every one of its Home Run-equipped Boeing aircraft stripped of the American flight control computers.

It’s reasonable to presume that Herr Von Buelow-the Secretary of Defense and Minister of Science and Technology at the time-would have known all about this mammoth but secretive task (how very clever-and discreet-of Von Buelow to “drop” the information into the middle of an interview about the 9/11 attacks). Lufthansa aircraft (and possibly others) are now effectively impervious to Home Run take-overs, but that is more than can be said for the American aircraft fleet.

In order to make Home Run truly effective, it had to be completely integrated with all onboard systems, and this could only be accomplished with a new aircraft design, several of which were on the drawing boards at that time. Under cover of extreme secrecy, the multinationals and DARPA went ahead on this basis and built “back doors” into the new computerized flight control systems.

There were two very obvious hard requirements at this stage: 1) a primary control channel for use in taking over the flight control system and flying the aircraft back to an airfield of choice, and 2) a covert audio channel for monitoring flight deck conversations. Once the primary channel was activated, all aircraft functions came under direct ground (or AWACS) control, permanently removing the hijackers and pilots from the control loop.

It needs mention that this was not a system designed to “undermine” the authority of the flight crews, but rather, implemented as a “doomsday” device in the event the hijackers began to shoot passengers or crew members, possibly including the pilots. Based on the reasonable assumption that hijackers only carry a limited number of rounds of ammunition, and many modern airliners carry in excess of 300 passengers, Home Run was envisaged as a system that could be used to fly all the survivors to a friendly airport for a safe landing.

*System Activation
Activating the primary Home Run channel is reportedly fairly straightforward. A transponder, as many readers know, is a combined radio transmitter and receiver which operates automatically-in the case of 9/11, relaying data between the four aircraft and air traffic controllers on the ground. The transmitted signals represent a unique “identity” for each aircraft, essential in crowded airspace to avoid midair collisions-and equally essential for Home Run controllers trying to lock onto the correct aircraft.

Once the correct target aircraft is located by radar, the Home Run  duplex data bus “piggy backs” the transponder channel and assumes direct control from the ground. *This could explain why NONE of the four aircraft sent the special “I have been hijacked” transponder code (7500), despite multiple activation points for this distress transmission on all four aircraft-and despite being flown by combat-hardened ex-fighter pilots.
Because the transponder frequency had already been piggy-backed by Home Run, transmission of the special hijack code was rendered impossible. This was the first hard proof that the target aircraft had been hijacked electronically from the ground, rather than by Arab patsies toting box-cutters.

The Home Run listening device on the flight deck utilizes the cockpit microphones that normally feed the Cockpit Voice Recorder (CVR), one of two black boxes armored to withstand heavy impact and thereby later provide investigators significant clues to why the aircraft crashed.
However, once plugged into Home Run, the CVRs are bypassed, and voice transmissions are no longer recorded on the 30 minute continuous-loop recording tape.

If Home Run is active for more than thirty minutes, there will therefore be no audible data on the Cockpit Voice Recorders. Crash investigators are said to have recovered the CVRs from the Pentagon and Pittsburg aircraft, and publicly confirmed that both are completely blank. The only possible reason for this is data capture by Home Run, providing the final hard proof that the attack aircraft were hijacked electronically from the ground, rather than by “Arab terrorists”.

It is not being suggested that remote circumvention and take-over of the four airliners’ controls is definitely what happened on 9/11. But if this scenario seems improbable, one must necessarily consider the probability of four airliners being taken over simultaneously, casually flown around a large swath of the country for almost two hours under the vigilant eye of NORAD, and then used as missiles-all without a single fighter being scrambled to intercept any of them.

Since this is what actually happened, we have no choice but to consider other “implausible” scenarios. And since the official scenario is itself an unsubstantiated-and truly farfetched-“conspiracy theory,” other competing scenarios should also receive serious attention.

The public’s reluctance to question official doctrine on this matter is a symptom of the societal role for which most of us have been bred and trained: to be ever-faithful hounds, tails thumping the floor as we contentedly slurp the hand of class authority. Such credulity also becomes inevitable when the alternative is so unbearable: if someone in Bush’s position is capable of lying to us about something as huge, as gut-wrenchingly horrible as 9/11, then everything we believe about this country-about the nature of civilization itself-might just be childish nonsense.

Most people simply don’t have the guts to go there. Given a desperate enough need to sustain the childish belief in government-as-benevolent-father, a person will adapt that belief to any circumstance. The behavioral end result can resemble courage; indeed, we are taught to regard it as the DEFINITION of courage. Actually, it’s one of cowardice’s darkest moments. Even a casual examination of Nazi Germany, where this phenomenon was rampant, will drive this point home.

It’s almost funny, the way people readily see the threat of technological circumvention presented by Diebold’s electronic voting machines, yet when the subject switches to Systems Planning Corporation’s Flight Termination System, which is every bit as real, and to the exactly parallel possibilities it represents vis-a-vis 9/11, they suddenly retreat into profound and combative denial. It’s as if a threshold has been crossed into a realm of possibilities too vile to entertain, so they simply don’t. Never mind that this country’s operatives have been traveling the world, perpetrating similar horrors, for all of the past century.

Rather than acknowledge the possibility of a unifying pattern, Joe Sixpack would much rather ‘shoot the messenger.’ Every so often, such people establish a new high-water mark for cowardice and facultative stupidity, and the present is definitely one of those times. After all, the official 9/11 scenario they cling to with such desperate faith comes from only one source: the Western “intelligence community”-the most brazen, systematic, resourceful, and interlocked association of habitual liars this world has ever seen.

As should have been made clear by any number of intelligence scandals over the years, the credibility of this bunch goes past zero into the negative: pending airtight proof, anything they say should be reflexively deemed a lie. You may remember that the FBI also provided the identities of “the 19 hijackers” within hours-information that soon also became quite suspect, especially considering there was NOT ONE Arab name on any of the flight manifests (miraculously, they even found paper passports that had survived fireballs, Arabic flight manuals conveniently left in the trunks of cars, etc., etc.)

At least seven of the hijackers are still alive in the Middle East-a pretty good alibi, wouldn’t you say? Several of these ex-suspects had their passports or other IDs stolen from them over the years, and it’s entirely possible that all 19 hijackers had stolen identities, meaning they could have come from anywhere-or been absent altogether. Our media were pretty slack about acknowledging this at the time, and since then have dropped this ball entirely. What’s really amazing is that not one mainstream journalist has asked how these 19 alleged hijackers boarded their aircraft when their names were not on any of the passenger manifests.


  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #44 on: July 21, 2009, 04:17:46 pm »
In order to make Home Run truly effective, it had to be completely integrated with all onboard systems, and this could only be accomplished with a new aircraft design, several of which were on the drawing boards at that time. Under cover of extreme secrecy, the multinationals and DARPA went ahead on this basis and built “back doors” into the new computerized flight control systems.
INSERT:  Ok, as far as DARPA, I have no documentation directly proving their involvement in the engineering of the NAS specifically, however, below is a document proving "one of the multi-nationals" involvement, that of none other than SAIC, who, by the way, is one of the preeminent global police state defense contractor companies pushing a plethora of completely insane, unconstitutional, total evisceration of inalienable rights, high technology tyranny worldwide.
There were two very obvious hard requirements at this stage: 1) a primary control channel for use in taking over the flight control system and flying the aircraft back to an airfield of choice, and 2) a covert audio channel for monitoring flight deck conversations. Once the primary channel was activated, all aircraft functions came under direct ground (or AWACS) control, permanently removing the hijackers and pilots from the control loop.
INSERT:  Or eliminating the need for the hijackers to have even been on the plane AT ALL.
It needs mention that this was not a system designed to “undermine” the authority of the flight crews, but rather, implemented as a “doomsday” device in the event the hijackers began to shoot passengers or crew members, possibly including the pilots. Based on the reasonable assumption that hijackers only carry a limited number of rounds of ammunition, and many modern airliners carry in excess of 300 passengers, Home Run was envisaged as a system that could be used to fly all the survivors to a friendly airport for a safe landing.

INSERT:  The above bolded and italicized part both myself and Lordssyndicate have proven to be inaccurate.  Ptech was installed by Felix Rausch for the express purpose of stripping all C2 from non-New World Order criminals.  The entire NAS was specifically engineered to be able to crash planes (carry out false flag terror) with any airlines in the world to push the globalists agenda further, at will, whenever they needed a "terror attack" involving airlines.  Take a look at this document, and add any of your own research that anything revealed here may lead you to.

Note  Also See:  
Cheney, The OODA Loop, SAIC, Ptech Cyber-PsyOps Warfare & 9/11

Below document images extracted from official document (download this so you can zoom in with far better clarity than I can magnify to in order to read small, illegible print in some diagrams):


  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #45 on: July 21, 2009, 04:27:05 pm »


  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #46 on: July 21, 2009, 04:31:59 pm »

Offline Initiated

  • Member
  • ****
  • Posts: 458
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #47 on: August 06, 2009, 08:47:02 pm »
I am currently looking for a good quality version of the complete 911 Citizens Watch Inquiry which took place, I believe, on Sept. 9, 2004 that has the whole Indira Singh statement including the complete Q&A afterwards.

Can anyone help with an accurate torrent file as the torrents out there are very incomplete and the Google video is cut and very grainy. Thank you.

If you have other videos, audios and actual text that I am unaware of, I would welcome that with open arms as well. has yielded nothing of use thus far when she mentions her full statements are posted on a certain website that no longer exists. Cheers!
"Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives."  ~ James Madison


  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #48 on: August 11, 2009, 12:55:42 am »
I am currently looking for a good quality version of the complete 911 Citizens Watch Inquiry which took place, I believe, on Sept. 9, 2004 that has the whole Indira Singh statement including the complete Q&A afterwards.

Can anyone help with an accurate torrent file as the torrents out there are very incomplete and the Google video is cut and very grainy. Thank you.

If you have other videos, audios and actual text that I am unaware of, I would welcome that with open arms as well. has yielded nothing of use thus far when she mentions her full statements are posted on a certain website that no longer exists. Cheers!

PM me and I will hook you up with some higher quality vids.

Clyde Stormont
United States

Dr. Clyde Stormont was the founder and a noted authority on horse blood typing. His research created the foundation for blood typing research, and he developed a method for establishing parentage verification that guarantees the integrity of horse breed studbooks. Inducted December 1990.

As a geneticist, Dr. Clyde Stormont worked to identify the genetic markers in the blood of animals which allow the verification of parentage, and is known as the founder of horse blood typing. Dr. Stormont was also the primary developer of equine blood typing. His research revolutionized the identification of racehorses and was adopted by The Jockey Club in the late 1970s, guaranteeing the integrity of the studbooks and protecting breeders, owners and the sporting public. Shortly thereafter, other breed associations adopted blood typing programs to ensure the integrity of their registries.

Dr. Stormont was born in 1916 in Viola, Wisconsin. He earned a B.S. degree in zoology in 1938 and a Ph.D. degree in genetics at the University of Wisconsin in 1947. (His doctoral work on blood groups in cattle was a research landmark.) He was an assistant professor at the University of Wisconsin and a Fulbright-Hayes Fellow in New Zealand before joining the faculty at the newly-formed School of Veterinary Medicine at the University of California, Davis, in 1950. Between that time and his retirement in 1982, Dr. Stormont conducted genetic research on several species in addition to horses. He established and was both chairman and director of Stormont Laboratories, Inc., Woodland, California.

In addition to his work on parentage verification blood typing, Dr. Stormont and his colleagues pinpointed the blood group markings responsible for hemolytic disease in newborn foals, and they devised a reliable test to identify mares at risk of producing such foals.

Dr. Stormont won many awards for his work, including the Louis Pasteur Medallion from the Pasteur Institute in Paris for his contributions to knowledge of animal blood groups, a Scripps Fellowship from the Zoological Society of San Diego, and the Director’s Award from the Arabian Horse Registry of America for “valuable contribution to the horse industry through the development of equine blood typing.” Dr. Stormont’s many professional affiliations included: American Association for the Advancement of Science, American Association of Immunologists, American Society of Human Genetics, American Bison Association, Genetics Society of America, Society for Experimental Biology and Medicine, and the U.S. Animal Health Association.

Dulce, New Mexico. What's the Deal?
This file is what I have ripped off, for Fair Use, from wherever I could find writings about the doings in Dulce, New Mexico.

This is what information is available on-line about Dulce Facility, what is believed to be true. It starts off and the reading begins with specifics about the on-going conduct of war- profiteering (called "defense contracting") in the military- industrial complex itself.

Further, there is no more recent information than Bill Cooper's, "Behold a Pale Horse." Nothing further has been released into the public domain; however, this multi-manuscript goes deeper than even Bill Cooper's went, speaking of multi-dimensional inter- space wars.

ACCOUNT NUMBER ONE -- where we pick up the story

"The Washington man is MICHAEL RICONOSCIUTO who is now waiting for a trial in a Washington jail on conspiracy to sell drugs charges, charges which Riconosciuto claims are manufactured. Indeed, the charge made against Riconosciuto were made one week after Riconosciuto authored and signed an affidavit describing his role in modifying the pirated [PROMIS] software.

(Note: It is interesting what connections we can find here. Michael Riconosciuto was a Wackenhut-CIA employee who told researcher Michael Lindemann that he had attempted to get a whole helicopter full of documents and evidence detailing illegal biogenetic activities and non-Congressionally sanctioned projects involving 'illegal Aliens' out of the Nevada Test Site. The chopper was blown out of the sky, killing all five personnel on board. Michael's father happened to be Marshall Riconosciuto, a fascist and a supporter of Adolph Hitler who was a very close friend of Fred L. Crisman. Crisman was involved in the Maurey Island 'UFO' sighting incident in 1947 near Tacoma, Washington, which researcher Anthony Kimory believes involved the test-flight of hybrid CIA - PROJECT PAPERCLIP - NAZI aerial disks.

There are several sources which claim that by the early 1940's the Nazi's had succeeded in test-flying wingless lenticular craft powered by rotary devices, rocket power, and DONUT CONFIGURATION jet turbine engines -- rather than cylindrical -- with the cabin stabilized by gyro, the compressors rotating in one direction and the expansion chambers and vectored exhausts rotating in the opposite direction.

In fact, the movie, "THE BATTLE OF THE BULGE" correctly implies that this, one of the largest military battles during World War II between American and German forces, was an attempt by the Germans to buy time and prolong the war just a little while longer, for within a few more months the Germans would have been mass-producing jet fighters, bombers and other super-weapons that would have been invincible to turbo-prop fleets of the Allies.

With the Allied invasion of Germany just before mass-production began, many of the prototypes and plans of the Nazi military machine were captured. However most of the most sophisticated prototypes, plans and even scientists mysteriously turned up missing following the war.

We will reserve further discussion on this subject until later in this volume. After the war had ended several of the Nazi scientists who WERE captured -- and who had helped to develop the revolutionary aircraft -- were recruited by the CIA as a result of a secret deal that had been made between Allen Dulles, a member of the Bavarian Illuminati; and Nazi S.S. General Reinhard Gehlen, a member of the Bavarian Thule Society.

The deep connections between the Bavarian Illuminati which sponsored the CIA and the Bavarian Thule society which sponsored the Nazis allowed for the upper covert-ops levels of the CIA to be manned by nothing less than the core of the Nazi S.S. itself, with the help of fascist sympathizers and fifth column double-agents working within American intelligence, although some leading Nazis were 'sacrificed' to the Nuremberg trials to appease the Allies and establish the illusion that Europe had been de-Nazified.

Fred L. Crisman incidentally was a 'witness' to the Maurey Island event and had helped two Army G-2 agents acquire 'slag samples' which fell from one of the six DONUT-SHAPED ships observed. On their way to deliver the samples to Wright-Patterson AFB in Ohio, their plane crashed and both G-2 agents were killed. Some people at the time insisted that the plane had been sabotaged. Two of the reporters who investigated the incident lost their lives, and Kenneth Arnold who investigated the incident after being commissioned by AMAZING STORIES editor Ray Palmer claimed that his conversations with a high Air Force official concerning the subject were electronically monitored.

Also, strange government agents in dark suits were seen in the area. Shortly after his investigation Kenneth Arnold, during an air-search for a crashed plane over Mt. Rainier, saw 9 crescent-shaped discs which he called 'flying saucers'. The news media publicized the incident and the term stuck and became a media catch word ever since. Also around this same time -- 1947 -- Arnold escaped a near-fatal crash when his airplane mysteriously lost power.

The connections do not end here. Fred L. Crisman was a close friend to Clay Shaw, whom Louisiana District Attorney James Garrison -- see the movie 'JFK' -- accused of being the CIA-Mafia go-between in the John F. Kennedy murder. Garrison arrested Shaw in an effort to charge him and the CIA with the JFK assassination; however only a few days before the hearing Garrison's star witness David Ferry was killed and Garrison's remaining evidence was not enough to bring about a conviction.

Fred Crisman was the first man Clay Shaw called when he heard that Garrison intended to implicate him. Garrison also believed that Clay Shaw himself was involved with PROJECT PAPERCLIP, the secret operation to bring Nazi war criminals into the United States by the hundreds -- some say thousands -- and give them immunity and new identities in such institutions as U.S. Intelligence, the Military-Industrial complex, Space agencies, and various Rockefeller-connected oil cartels such as ARCO, STANDARD [EXXON], ZAPATA [owned by Geo H W Bush], etc., corporations that were supported by Bavarian-based secret-society lodges, corpora- tions actually selling oil to the Nazi's during World War II and had helped keep the Nazi "war machine" operating.

According to Garrison, Crisman worked as a middle-man between the fascist policy makers and the lower echelons of the Military- Industrial Complex. "Oh what a tangled web..." These American mega- bankers and traitors to freedom had supported the Nazis in an effort to initiate a Bavarian-backed "New World Order" under cover of the "Third Reich".

Read the book, NONE DARE CALL IT CONSPIRACY, by the late Gary Allen for more on the Rockefeller connection, and also the various works by Dr. Antony Sutton. (--Branton)

"The affidavit also claimed that he [Michael Riconosciuto], had been contacted by phone and threatened by PETER VIDENIEKS -- a Justice Department employee and Customs official who Riconosciuto alleged had intelligence ties -- as to the possible consequences of his going public with certain information.

"According to Riconosciuto, Videnieks was a frequent visitor to the Cabazon Indian reservation near Palm Springs and visited with tribal manager, John P. Nichols. Nichols was in essence Riconosciuto's boss in a number of enterprises conducted on reservation land and the PROMIS modification was just one of these projects.

According to Riconosciuto in an interview with T.C. conducted from jail, the PROMIS software was modified to install a backdoor access for use by American intelligence services. The software was then sold to 88 different countries as a sort of 'Trojan horse' package enabling us to access their intelligence systems. According to Riconosciuto these countries included Iraq and Libya.

"Correspondence between Nichols and other companies, if authentic, indicates that Riconosciuto's claims of his expertise in the area of electronics and armaments appear to be true. Marshall Riconoscuito, Michael's father, is a reputed former business partner of Richard Nixon.

"According to Riconosciuto, the fuzzy status of reservation land as 'sovereign' allowed elements of the CIA and organized crime to conduct business uniquely.

"Among the projects worked on during this time were joint projects with WACKENHUT, a company loaded with former CIA and NSA personnel and business ventures with the Saudi Arabian royal family and other unusual projects.

"A joint venture with Southern California Edison will soon be generating power for bio-mass drawn from local waste outlets. Biological warfare projects were investigated with Stormont Labs looking into the creation of 'pathogenic viruses' and enhanced fuel-air explosive weapons [were] created and tested in league with Meridian Arms at the NEVADA TESTING RANGE which matched the explosive power of nuclear devices.

"These enhanced weapons gained their power from polarizing the molecules in the gas cloud by modification of the electric field, a technology developed from exploring Thomas Townsend Brown's suppressed work, a knowledge which Riconosciuto claims he gained from working at LEAR in Reno, Nevada.

"Riconosciuto is said to have worked on the enhanced fuel-air explosive weapons with Gerald Bull of Space Research Corporation. Bull, now deceased, later became an arms advisor to Saddam Hussein. It is said that HUSSEIN POSSESSES THE FAE TECHNOLOGY.

"In July, Anson Ng, a reporter for the Financial Times of London was shot and killed in Guatemala. He had reportedly been trying to interview an American there named Jimmy Hughes, a one-time director of security for the Cabazon Indian Reservation secret projects.

"In April, a Philadelphia attorney named Dennis Eisman was found dead, killed by a single bullet in his chest. According to a former federal official who worked with Eisman, the attorney was found dead in the parking lot where he had been due to meet with a woman who had crucial evidence to share substantiating Riconosciuto's claims. Both Eisman's and Ng's deaths were declared suicides by authorities.

"Fred Alvarez, a Cabazon tribal leader who was in vocal opposi- tion to the developments on the reservation, was found shot to death WITH two friends in 1981. Their murder remains unsolved.

"The leader of the House, Thomas Foley, announced last month that a formal inquiry will be initiated into the Inslaw case. Foley appointed Senator Terry Sanford as co-chairman of the joint congressional panel. Prior to his election, Senator Sanford was the attorney REPRESENTING Earl Brian in his 1985 takeover bid for United Press International and was instrumental in appointing Earl Brian, a medical doctor, to the board of Duke Medical School, of which Sanford is President.

"However, despite repeated requests from journalists to produce photographs showing Riconosciuto together with Brian, and requests to produce his passport showing his alleged trip to Iran, he has not yet done so. Also,Riconosciuto failed to be able to describe Peter Videnieks to CNN's Moneyline program, claiming a medical condition prevented him from remembering clearly. This led one former intelligence operative to speculate that we may be witness- ng a very sophisticated intelligence operation being played out in public.

"ormer F.B.I. Special Agent Ted Gunderson speaks FOR Riconosciuto's credibility. Gunderson, who lives in Manhattan Beach, has worked with Riconosciuto for many years in his capacity as private investigator. Together, according to Gunderson, they were respon- ible for thwarting a terrorist operation during the Los Angeles Olympics. According to Gunderson, Riconosciuto was well known in certain circles as a genius in almost all sciences.

"The so-called drug operation broken up in Washington State was an electro-hydrodynamic mining operation, claimed Gunderson, using Townsend Brown technology. A videotape viewed by this journalist revealed metallic powders and apparent processes unrelated to drug manufacture. Indeed, a government analysis of soil samples revealed the absence of drug contamination, but a high concentration of barium. Barium is often found in high voltage related work.

"Unsubstantiated information from an intelligence source claims that the current situation is THE VISIBLE EFFECT OF A WAR CURRENTLY GOING ON IN THE INTELLIGENCE COMMUNITY between a group centered in the CIA called AQUARIUS [around a powerful center known as MJ-12] and a group known as COM-12 centered around Naval Intelligence. COM-12 is reputedly trying to sustain a rearguard action to sustain and preserve constitutional government and is deliberately LEAKING INFORMATION damaging to the former group."

In the same publication, same issue, there appeared a follow-up article just following the one given above. Written by Thomas Zed, the article, titled, "WACKENHUT'S CONNECTION WITH THE BLACK PROJECT WORLD" stated: "The Wackenhut company has a very close connection to the world of BLACK BUDGET PROJECTS. Besides being connected with the Cabazon venture mentioned in this issue it is also responsible, according to jailed computer consultant Michael Riconosciuto, FOR THE SECRET PROJECTS BEING UNDERTAKEN IN DULCE, NEW MEXICO, where the JICARILLA INDIAN RESERVATION IS BEING SIMILARLY USED.

"After sending two of my colleagues there recently AND RECEIVING CONFIRMATION THAT THERE WAS A TOP SECRET MILITARY TYPE INSTALLATION, I decided to call the newspaper office and make an educated bluff. I identified myself as a freelance reporter from Los Angeles -- and told the newspaper that I was doing a story on the Cabazon reserva- tion biological warfare projects that had been undertaken there on behalf of the CIA. I told her that I had heard that there were similar things being done in Dulce and would like to know what was going on.

"The official I spoke to BECAME FRIGHTENED and said, 'I can't talk to you about that! It would be very unprofessional of me to talk to you about that. You'll have to speak to the President of the tribe.' She then hung up. "I have yet to call back and ask the President of the tribe, but will report on that in the next issue.

"Wackenhut is also responsible for security of a lot of UNDERGROUND FACILITIES in California and Nevada, including the notorious S-4 or AREA 51 in Nevada where Townsend Brown flying disk technology [written about in a T.C. recent issue] has been flying and developing for decades.

"A recent helicopter crash at the area, where two pilots and three security guards from Wackenhut flying in a Messerschmit BO-105 helicopter were killed was not at all accidental, claimed Riconosciuto, who said that the individuals aboard the helicopter were traveling with sensitive documents. Groups are now investigating Riconosciuto's claims..."


  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #49 on: August 11, 2009, 01:27:16 am »

The REAL genius of Mike Riconosciuto

Michael has been spearheading some amazing technology which opens up an entire new area for energy resources, as well as communication technology which will propel the computer industry far beyond where it is now. The following article offers a glimpse into this fascinating new area of research.


Electrostatic Cooling-Science Fact or Fiction?

In an attempt to describe my technical work in the context of my criminal case I have met with a lot of criticism. At times the criticism has turned to outright ridicule. I have been accused of everything from making wild claims to not knowing my physics.

My work in heat transfer has many significant uses in military, industrial, and communications applications. A point that I had made to the science editor of DerSpeigel Magazine during a interview was that the F-111 plane built by General Dynamics was in service because of technology that I was attempting to describe as part of the basis for some of my work. The science editor and his researchers claimed that they had never heard of any of these concepts, and could not locate the references that I claimed existed.

Finally, in September of 1998 I received a partial copy of the DESIGN NEWS article on the wing pin cooling and the POPULAR SCIENCE article on electrostatic cooling that review the heat transfer technology that I had been attempting to describe. What is significant in these articles is that: <1> the electrical power used to cool the wing pin is an extremely low amount. So much so that there appears to be a SECOND LAW violation. <2> the determination that an "electric wind" is responsible for the instantaneous electrostatic cooling fails to account for the speed and the amount of the observed heat flow in the wing pin welding process and other demonstrations. <3> the article on the wing pin understates the importance of the electrostatic cooling process in the production of the F-111 wing pins. The early versions of the F-111 were grounded because of a series of crashes attributed to the structural failure of conventional methods using clamp cooling bars and periodic shutdowns to cool the pins during the welding process.

General Dynamics had explored every possible manufacturing technique for fabricating the wing pins in an effort to save the F-111 project. In desperation, as a last resort, General Dynamics allowed the electrostatic cooling to be demonstrated on a actual wing pin. General Dynamic scientists, engineers, and executives were astounded by the structural tests on the sample wing pin. <4> the POPULAR SCIENCE article does not go into any detail on the capability of the electrostatic cooling process to thermally stabilize high power laser components.

The PS article only makes a vague reference to "infrared optics". Neither of these articles make any mention of the capability of electrostatic cooling to control heat in *all* types of explosives, or the control of heat in electrical power fuses. Electrostatic cooling has enabled a whole new class of tactical explosive systems and high energy electric power systems.

The claims made for electrostatic cooling appear to be lifted from the pages of a science fiction story. I am using the F-111 project as a concrete, real world example of the capabilities of electrostatic cooling since the project would have more than likely been scrapped had it not been for the application of electrostatic cooling to the wing pin welding process.

Similar dramatic successes have been realized in the MIRACL, COIL, TEXS, and ETC weapons programs. None of these programs could be a workable reality without the application of proprietary electrostatic cooling techniques. The practical application of the underlying thermodynamic concepts of electrostatic cooling to ergodicity and entropyy in high performance data communications systems has only recently become apparent to the computer industry.

The thermodynamic concepts behind electrostatic cooling have a impact on the "transport properties" of the message entropy of data signals over large networks.

The analysis and understanding of the electrostatic cooling effect was accomplished by starting with a series of obvious experimental measurements in order to lead to the complex mathematical physics principles that were anything but obvious.

The initial analysis of the numbers for the operation of the wing pin welding process (less the 20 watts power to the electrostatic probes) would lead one to suspect a violation of the second law of thermodynamics is being claimed here. The control of such a large amount of thermal energy in and around the weld zone and throughout the bulk of the wing pin, with less than 20 watts of electrical power, is a very fantastic claim.

However, it is no less fantastic than the postulated explanation given by Dr.Kibler, the senior scientist for General Dynamics, attributing this phemenonal rate of heat transfer to a "electric wind".

Some experiments were conducted using a SCHLIEREN optical system and an infrared thermograph. A Schlieren optical system is capable of detecting regions or streaks in a transparent medium that have density and a refractive index differing from that of the bulk of the surrounding medium. This enables pressure and/or temperature gradients to be detected by photographing a beam of light propagating transversely through the medium. The Schlieren optical system displayed the thermal boundary layer present at the surface of the heated wing pin.

The Infrared thermograph displayed the overall thermal profile of the wing pin during the entire welding process. Application of the low power electrostatic field was clearly seen to instantaneously break up the thermal boundary layer that was present over the heated wing pin surface area.

The wing pin could be made to attain a new thermal equilibrium anywhere in a temperature range of a few degrees lower than initial conditions to over 500 degrees F lower, just outside the weld zone throughout the surrounding area. This new equilibrium was attained in a matter of mere seconds throughout the entire bulk of the wing pin.

The application of external chill bars and/or a "electric wind" is a surface phenomenon. Careful experimental analysis of the boundary layer thermal transfer effect confirmed that heat transfer was indeed substantially enhanced when the electrostatic field disrupted the boundary layer. The boundary layer was found to act as an effective thermal impedance to both radiative and convective thermal transfer from the surface of the wing pin.

The disruption of the thermal boundary layer by the electrostatic field yielded approximately a 4:1 increase in the rate of thermal transfer from the surface of the wing pin. I conducted an experiment on a batch of wing pins welded with chill bars. In this series of experiments I applied a film of electronic grade heat transfer compound to the wing pin surface/chill bar interface. This had the effect of inhibiting the thermal impedance presented by the thermal boundary layer.

The results in this series of experiments were nearly a 4:1 increase in total thermal transfer from the surface of the wing pin to the chill bars during the welding process. This comparable to the rate increase in surface heat flow found when the wing pins were welded in the presence of the electrostatic field, but without the bulk cooling effect and nearly instantaneous thermal re-equilibration properties of electrostatic cooling.

There was a major DOD/DARPA interest in the capability to a-thermalize the materials in high power laser optical components. This is the reason that most of my proof of principle research was conducted with laser grade optical materials <mirrors, quarter wave plates, laser rods, lenses, Brewster window materials, etc.>.

One of the first thoughts that struck me when experimenting with the wing pin welding process was that the bulk thermal transport effects appeared to violate JOULE'S law of heat flow. This prompted me to obtain a large slab of IR-TRAN-2 laser glass. For experimental purposes I had numerous thermocouples imbedded throughout the bulk of the glass slab. I placed this slab of glass on the surface of a laboratory type hot plate. The heating top of this hot plate was only one inch thick.

I had it drilled out to place numerous thermocouples throughout it's bulk. I also took the heating coil element from a kitchen type hot plate and mounted it in a custom case. This case had provisions for the use of both contact thermocouples and a view port on the underside for the thermograph. Both of the hot plates were powered through a isolation transformer, and the temperature regulated by a variac.

A series of experiments were conducted with different electrode configurations and grounding arrangements. It was determined experimentally that by "appropriate modulation" of the high voltage field that the electrostatic heat transfer effect could be enhanced by several orders of magnitude. The voltage and current inputs to the hot plate and the voltage and current supplied to the electrostatic cooling probes were monitored during all the experiments.

The uniformity of the bulk cooling effect was immediately confirmed by repeated experimental demonstrations.

Measurements of radiated and convected heat flow away from the glass slab did not come anywhere near accounting for the BTU loss required for the temperature drop of the slab. The total heat dissipation actually measured in the experimental set-ups could not be immediately reconciled with the SECOND LAW of thermodynamics, JOULE'S LAW and FOURIER'S theorems on heat flow, and the CONSERVATION laws of physics.

Additional theoretical work had to be performed.

Retired Admiral, Al Renkin, and myself demonstrated this heat transfer phenomenon to scientists from the various national laboratories. As amazed as they were, none of the scientists or engineers could accurately characterize the underlying physics of the experimentally observed phenomenon in our demonstrations. At this point the ONR (Office of Naval Research) proposed that the experimental set-up be changed.

Oscar Blomgren Jr. had succeeded in cooling spots on the filament of a long display case type lightbulb. I was asked if it were possible to cool the entire length of the filament simultaneously, to the same degree as the sections <spots> of the filament had been. The answer was yes.

Then ONR wanted to see the numbers on probe energy versus the electrical energy input and thermal and convective heat flow around the filament.

Vacuum and inert gas backfilled lightbulbs were used for this set of experiments. The experimental results were immediately classified and all hell broke out around our project. I suddenly had immense resources in money and personnel made available to our project through DARPA, ONR, and USAF PRAM PROJECT OFFICE.

This R&D continued for 3 years until it was disrupted by the murder of Paul Morasca. When I realized that Paul Morasca was terminated by the US Government, I folded up the project at Hercules, Cabazon, and Sonoma Engineering.

The research data and equipment from the entire project went into storage. I have effectively been on the run since I shelved the project in 1984.

My work on this project started with a heat transfer phenomenon that had been accidentaly discovered by Oscar Blomgren Jr. I succeeded in completely reconciling the observed experimental results with the apparent violations of the laws of physics. The work that I completed can be summarized as mathematical modeling and numerical simulation with application of the BOUNDARY VALUE PROBLEMS OF THERMODYNAMICS based on second order partial differential equations derived from elliptic functions. The mathematical principles and physical laws that cover this work are as follows: <1> the laws of thermodynamics. <2> the boundary value problems <1st-the DIRICHLET problem, 2nd-the NEUMANN problem, 3rd- ROBIN'S problem. <3> the equations of mathematical physics <the equations of LAPLACE, POISSON,and the wave equation>. <4> Maxwell's relations in thermodynamics <not to be confused with Maxwell's electromagnetic equations>.

The Maxwell relations in thermodynamics are based on Maxwell's cross-partial derivatives and lead to the HELM HOLTZ function and the GIBBS function.

My work succeeded in clarifying the physics of the observed heat transfer effects demonstrated by the use of electrostatic cooling. The discoveries that I made have been classified and improperly expropriated by agencies of the US government.

Michael James Riconosciuto

Below is the first page and the last page of a Non-Disclosure agreement signed by a representative of the US air Force. The agreement is for the "legal rights" to several of the technologies that Mike single-handedly conceived. Mike Riconosciuto is performing the type of work that book authors such as David Brin have written on -regarding the government and secret codes.

This subject deals with the illegal expropriations of Secret Technologies and government research into this subject. MAJOR mathematics and physics problems were explored and solved and a brilliant new theorem was discovered. Mike and his associates are still trying to publish this theorem in it's entirety however there are several "patent issues" at stake, and certain US government employees are trying to prevent this technology from "getting out" (being made public) or (de-classified by FORCE)


  • Guest
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #50 on: August 11, 2009, 01:29:19 am »

INSLAW: Affidavit of Ari Ben-Menashe
by Ari Ben-Menashe



IN RE:                        )
                              )    Case No. 85-00070
INSLAW, INC.,                 )    (Chapter 11)
Debtor.                       )
____________________________  )
INSLAW, INC.,                 )
Plaintiff,                    )
v.                            )
                              )    Adversary Proceeding
UNITED STATES OF AMERICA,     )    No. 86-0069
and the UNITED STATES         )
              Defendants,     )
____________________________  )


                    )    ss:

I, ARI BEN-MENASHE, being duly sworn, do hereby state as follows:

1. Between August 1977 and September 1987, I was employed by the Israel Defense Forces (IDF)/Military Intelligence External Relations Department.

2. In my above capacity, I had contacts with the Office of the Israeli Prime Minister's Anti-Terrorism Advisor.

3. In 1982, the Israeli Prime Minister's Anti-Terrorism Advisor was Mr. Rafael Eitan.


4. In a meeting that took place in December 1982 in Mr. Eitan's office in the Kirya in Tel Aviv, Israel, Mr. Eitan told me that he had received earlier that year in the United States, from Mr. Earl W. Brian and Mr. Robert McFarlane, PROMIS computer software for the limited use of the IDF's Signals Intelligence Unit for intelligence purposes only. Mr. Eitan stated on this occasion, and on earlier occasions as well, that he had special relationships with both Mr. Brian and Mr. McFarlane.

5. This meeting took place in the context of a visit by a foreign dignitary. During a break in the meeting, Mr. Eitan took me aside and gave me the above facts to relate to my superiors so that Mr. Eitan's office could take credit for the introduction of the PROMIS computer software into IDF's Signals Intelligence Unit.

6. I hereby certify that the facts set forth in this Affidavit are true and correct to the best of my knowledge.


Signed: Ari Ben-Menashe

Signed and sworn to before me this 21st day of March, 1991.
Melissa J. Corbett
Notary Public
My Commission Expires: June 14th, 1994

Offline giark65

  • Member
  • ***
  • Posts: 169
Re: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« Reply #51 on: September 25, 2011, 06:18:13 pm »