Author Topic: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI  (Read 49636 times)

0 Members and 1 Guest are viewing this topic.

Offline ramallamamama

  • Member
  • *****
  • Posts: 1,110
  • Nobody's Slave

The Illuminati Agenda For
The Coming New Order

By A. True Ott, PhD, ND
Increasingly, it would seem that American society is spiraling into chaos. Financial malfeasance in Government and Big Business has placed millions of Americans into homeless shelters and unemployment lines. In many locales, the housing bubble has burst as values plummet. To many, the news of the "pending" Pandemic of Influenza is just another hinge on the doorway leading to helplessness and hopelessness.  
To most Americans, the financial malaise gripping this country is completely unrelated to the world's "Pandemic Flu" ­ but those who feel this way are simply naïve and un-informed. The truth is, the world's "Power Elite" have engineered both conditions as part of their computer-driven model for their ultimate centralization of power. Make no mistake, nothing concerning the economic meltdown and the lab-created flu pandemic is "natural" ­ it is completely and totally happening by DESIGN.
Helping them in their quest for unbridled world power and systematic genocide is a new generation of "SUPER-COMPUTERS" utilizing, (if you can wrap your mind around the concept), ARTIFICIAL INTELLIGENCE (A.I.) The Hollywood movie, "Eagle Eye" is based on science fact ­ it is not fiction in the least. The elitist's level of success in their venture, however, (just as "Eagle Eye" portrays) will depend on a few variables that these "master computers" cannot control nor conclusively predict ­ which is the FREE WILL, INTUITION AND INTELLIGENCE OF THE HUMAN MINDS THEY SEEK TO ENSLAVE. This is, after all, the essence of the Human Soul; when everything else is stripped away ­ this is the creation of God that a machine can never truly replicate.
Since President Dwight Eisenhower's final days as President, when he WARNED AMERICA about the dangerous "rise of the military-industrialist complex" a very dark and dangerous CANCER has grown and festered in the boardrooms of large multi-national corporations, spilling into the halls of governments-for-hire and which has now spread its slimy tentacles to encompass the entire world.  
In the pages of his amazing book, "Dr. Mary's Monkey", author and American hero Edward T. Haslam documents the origins of the "medical arm" of this insidious octopus of evil. He details the origin of a covert group so powerful, and so all-encompassing, that they literally were able to assassinate a sitting U.S. President and a world-famous surgeon and researcher named Dr. Mary Sherman, and escape the public's justice and scrutiny following the foul deeds.
This paper will focus and expand on this most heinous form of medical "malpractice" possible ­ CREATING DISEASE IN A LABORATORY, RELEASING IT VIA VACCINE NEEDLES and then CAPITALIZING AND PROFITING IMMENSELY FROM THE PRESCRIBED REMEDY!! Hopefully, this paper combined with my other writings will provide the fulcrum of force needed to help awaken a slumbering nation of free men and women into filing the ULTIMATE MALPRACTICE AND WRONGFUL DEATH LAWSUIT!
The brilliant and capable financial genius, Catherine Austin Fitts is likely the first economic "guru" to tie these two seemingly unconnected stories together. In a paper she authored on July 22, 2009, Fitts declared: "I believe one of the goals of the swine flu vaccine is depopulation. Perhaps it is the goal of a swine flu epidemic as well, whether bio-warfare or hype around a flu season."  
Fitts then goes on to make her case that the GATT and similar "globalist agenda" treaties are primarily nothing more than consolidations of global resources into the control of a select few. Implemented first during the "Poppy" Bush administration, this corrupt agenda has expanded globally every day since then.Fitts warned Bush in 1991 that such policies would ultimately result in a massive centralization of wealth and natural resources into the hands of an elite minority; as a result, the vast majority of the earth's population would of necessity need to be systematically stripped of food, water, and ultimately, of life itself. This is where the "engineered pandemic" enters the picture, according to Fitts.
Fitts explains that she developed a mathematical, (i.e logarithm) formula for this 'elitist model' ­ and it showed that the global policies adopted would only mean sustainability of all natural resources for a mere 500 million "elect' individuals. (Just as their monument of evil, the "Guidestones of Georgia" predict.) These residents of the "New Order" would enjoy a very high standard of living, and would want for nothing. The constricting and deflation of world currency (beginning with the American dollar) would of necessity, therefore, have to coincide with a concurrent "depopulation" agenda ­ in order for the ultimate "Utopian" agenda to be realized. (For the complete Fitts article, see
Here's a newsflash for you, Mr. David Rockefeller, Mr. Rothschild, and your self-proclaimed "guardians" of planet earth --- there's more than enough resources on planet earth for at least 8 billion people to live and survive very well!! That is, if everyone learns to share and learns to love one another in peace. Your world agenda over the last 6 decades has been one of selfishness, hate, and greed fomenting fear, lust, and pestilence. It is destined to fail. Freedom will indeed prevail. Your Satanic agenda will not succeed.
There is no doubt that we live in an increasingly high-tech world. We have incredible information at our fingertips through something called the internet. This is one reason, however, why many people fail to grasp the danger the world is in at the present time ­ the wealth portrayed by and through the convenience of "Cyber-Space" often creates a false sense of security ­ generating a false confidence that because of this increased wisdom born of technology, nothing could ever "go wrong". Billions of innocent people could never succumb and die from a simple "flu" virus, could they??
The stark reality is that with the advent of new "super-computers" the tools to create the ultimate "killer virus" have been utilized.
According to ex-LAPD drug enforcement officer, Mike Ruppert, this amazing computer software called PROMIS was: "Created in the 1970s by former National Security Agency (NSA) programmer and engineer Bill Hamilton, now President of Washington, D.C.'s Inslaw Corporation, PROMIS (Prosecutor's Management Information System) crossed a threshold in the evolution of computer programming. Working from either huge mainframe computer systems or smaller networks powered by the progenitors of today's PCs, PROMIS, from its first "test drive" a quarter century ago, was able to do one thing that no other program had ever been able to do. It was able to simultaneously read and integrate any number of different computer programs or data bases simultaneously, regardless of the language in which the original programs had been written or the operating system or platforms on which that data base was then currently installed."  
For purposes of our discussion, however, one needs to know and understand that "PROMIS" software has been modified and greatly expanded from its original 1972 prototype. We need to track and document the software's evolution which eventually allowed the MAPPING AND COMPLETE DETAILED SEQUENCING of DNA and RNA strands ­ the very CODE OF LIFE. Once this is understood, one can better understand exactly HOW scientists in top-secret U.S. Government labs were able to successfully resurrect the deadly killer virus of 1918, place it in human plasmid cells, and ultimately to a killer, time-released VACCINE.  
Keep in mind, this is not myth, it is not speculation, it is not science fiction. It is all fact and completely documented, even though you may not have heard about it in the mainstream news. The PROMIS software eventually evolved into very bio-chemistry-specific versions named "Daylight" and "Oracle8i".  
This PROMIS software evolution is best understood by reading THE LAST CIRCLE by Cheri Seymour, aka Carol Marshall ­ particularly the 15th chapter. This chapter reveals the contents of files provided to Seymour by PROMIS program-modifier Michael Riconosciuto documenting the history of Ft. Detrick's biological warfare development and the stated desire of our nation's top "National Institutes of Health" and CDC scientists to use new computer technologies to create sophisticated "Designer Viruses" for covert CIA use. He also documents the INFILTRATION of ISRAELI AGENTS into the labs of Ft. Detrick.  
Riconosciuto's "modifications" are so "sensitive to national security" that Riconosciuto was placed into forced detention in a high-security federal prison ­ not because any "crime" had been committed ­ but to keep him from being kidnapped by other competing "multi-national group's" interests.  
According to Riconosciuto's files, the NEW GENERATON of PROMIS software, today trademarked as DAYLIGHT and ORACLE8i are unbelievably complex, and have exhibited incredible ARTIFICIAL INTELLIGENCE capabilities as portrayed so well in the movie, "Eagle Eye".  
ORACLE8i not only has the ability to rapidly analyze gene clade sequencing in viruses and bacteria in mere minutes, it can build a model of a complex new viral structure just as quickly, and can calculate to the minutest detail its possible "drift" of mutations after its release. This software can not only predict the DEATH TOLL the virus would produce, but also the accurate final numbers of its genetic mutations over a given period of time. In short, this software can indeed control a complex GENOCIDE AGENDA in the form of an engineered, worldwide VIRAL PANDEMIC from beginning to end ­ Alpha to Omega. Evidence suggests that this agenda was indeed systematically set in motion in March of 2009.  
As powerful as this software system is, there are some limitations, however. The first limitation is that a SAMPLE killer virus needed to be provided first so that ALL PARAMETERS OF HOW AND WHY IT KILLED SO EFFICIENTLY COULD BE DETERMINED BY THE COMPUTER. This is what happened when Jeff Taubenberger's team successfully isolated a completely intact sample of 1918 killer virus from a frozen victim of the virus in Brevig Alaska in 1997. With this "sample" ­ the computer could do its trillions of complex analyses, all that Taubenberger and Terrence M. Tumpey needed to do was keep the CIA and the Israeli MOSSAD bosses informed of the ORACLE's final assessments and projections.  
As Michael Ruppert declares: "What would you do if you possessed software that could think, understand every language in the world, that provided peep holes into everyone else's computer "dressing rooms," that could insert data into computers without people's knowledge, that could fill in blanks beyond human reasoning and also predict what people would do - before they did it? You would probably use it wouldn't you?"  
In the area of WORLD DEPOPULATION and EUGENICS as prescribed by Hitler's financial backers in Wall Street and London ­ such a computer program would be indispensable. The evidence that this has in fact been accomplished, and the "viral genie" has indeed been released from the bottle, is simply overwhelming.
Let's examine this evidence.
Fellow researcher Don Nicoloff has helped immensely in assembling the paper trail of this Artificial Intelligence software called DAYLIGHT and ORACLE8i and in detailing how it is being used to create the ULTIMATE UTOPIA OF THE ILLUMINATED ONES on planet earth. Not surprisingly, since the world of the Global Elite is really quite small and inter-connected, other, seemingly unconnected world news stories find their way into this massive web of deception.
This trail leads us to a "Dr. Orly Taitz" and her husband, Yosef. As Nicoloff declares: "Taitz, a practicing dentist, attorney, and licensed real estate agent who lives in Southern California's posh, coastline community, Mission Viejo, has filed numerous lawsuits and legal motions on behalf of former U.S. Senate candidate Alan Keyes (and others) demanding proof of Barack Hussein Obama, Jr.'s (aka Barry Soetoro, et al) citizenship eligibility to serve as president of the United States. Taitz recently published 'proof' that she had standing to practice law before the U.S. Supreme Court and claims to have "met personally" with Chief Justice John Roberts."  
 Nicoloff then writes: "Yosef Taitz, the self-described "CEO" of Daylight Chemical Information Systems, Inc., a private software company located in Mission Viejo, CA, Santa Fe, NM, and Cambridge, England. DCIS, Inc. is intimately involved with Novartis Pharmaceuticals (United States, Switzerland, Germany, France, England), the patent holder of the bird/swine flu vaccination. The "DayCart" software produced by DCIS, Inc. integrates ongoing research and development by Novartis and others using proprietary Oracle 8i technologies."  
What Nicoloff fails to mention, however, is the fact that Novartis' patent specifically details that the viral pathogen which the patented vaccine is designed to protect against is a "reverse engineered" designer virus that could only have been created in the labs of Ft. Detrick utilizing ORACLE 8i equipped computers. This is EXACTLY what Michael Riconosciuto testified about years earlier concerning the Biological Warfare capabilities of ORACLE 8i software.
Make no mistake, utilizing their proprietary computer software, NOVARTIS created the very virus now endangering the world, then has manipulated the World Health Organization (which the original PROMIS Software helped to create along with the "World Bank") into issuing "PANDEMIC LEVEL 6" alerts, which in turn created an INSTANT GLOBAL MARKET FOR BILLIONS OF VACCINE DOSES. Clearly, Novartis' investment into ORACLE 8i software is set to pay off very handsomely indeed.  
According to the China-based MANUFACTURING ARM of Novartis' International, the Chemical Information Network or ChIN (anagram for "ChINa") we read the following world-wide press release:
DAYLIGHT CIS announces DayCart
Contact: Yosef Taitz DAYLIGHT Chemical Information Systems Tel: +1-949.367.9990 Fax: +1-949.367.0990 Email: [email protected]
DayCart(tm) introduced by DAYLIGHT
Mission Viejo, Calif. USA - July 14, 2000 -- DAYLIGHT Chemical Information Systems, Inc. (USA) today introduces a new addition to the array of DAYLIGHT software products; DayCart(tm), an application using the unique extensibility features of Oracle8i(tm) designed to fully integrate the molecular structures and reactions in an Oracle8i database server environment. As an integrated module DayCart does not require any call-outs or other operations outside of the Oracle server, in order to perform its functions. DayCart delivers the speed, capacity and performance of Daylight tools throughout the organization. Use of DayCart with the Oracle8i server, unlocks the access of existing Oracle* applications and tools (such as SQL, PL/SQL, Java, C, etc.) to the array of chemical information.
"DayCart was developed in close collaboration with Novartis' scientists and the architects of Oracle8i's extensibility framework. Thus, DayCart provides a practical and exceptionally efficient solution fully compliant with Oracle technology.
Today DayCart delivers an extensive range of chemical information capabilities, such as fast direct storage and retrieval of 2D and 3D, structures, reactions and mixtures. Operations provided include high performance searching of full structure, sub-structure, super-structure, similarity and other structural operations. Our utilization of Unique SMILES and its indexing, delivers unparalleled speed and flexibility in storing, novelty checking and searching operations," stated Yosef Taitz, Chief Executive Officer of DAYLIGHT.
"Utilizing the DayCart technology today, we deliver a corporate compound registration system handling archival, searching and retrieval of over 9 million compounds with lightning speed. A wide range of DayCart solutions are being produced, both by Daylight and by its development partners. We are providing a migration path for conversion and integration of existing data. Daylight chemical technology, tightly integrated with the Oracle8i database opens the door to groundbreaking 'informatics' solutions. This technology empowers users to bridge and expand the horizons of chemical information science, merge biological and chemical data, and provide solutions for data warehousing, compound acquisition, and more."
"The Oracle database is unique in its ability to singularly store, manage and secure relational data, files and unstructured data," said Jeremy Burton, senior vice president of iPlatform marketing, Oracle Corp. "By extending these data management capabilities, as DAYLIGHT Chemical Information Systems has with DayCart, technology continues to drive significant business and scientific advances. We are pleased to be a fundamental part of these advances."
"The Daylight Cartridge combines strong performance with interesting versatility through Daylight's typical toolkit approach. It enables Pharma R&D IT functions to adapt their systems flexibly to the new challenges in the business and scientific environments." Said Dr. Rene Ziegler the Head of Pharma Research Information Management at Novartis.
DAYLIGHT Chemical Information Systems, incorporated in 1987, is a privately held company headquartered in Mission Viejo, CA, with a research office in Santa Fe, NM and in Cambridge England. DAYLIGHT is a technology leader who provides high-performance chemical information processing tools (such as SMILES and Daylight ToolKit(tm)) for research chemists around the globe. Its software and tools are used by thousands of scientists at over 250 companies worldwide. For more information please e-mail to: [email protected] and visit DAYLIGHT's homepage at
There it is. This engineered pandemic is a heinous crime against humanity. I submit that this paper, combined with the others I have authored, fulfills the legal requirements of a criminal prosecution of suspected murderers. I have established motive (windfall profits), opportunity, and finally, the means and methods employed to commit this crime.
The only question remaining is:  
True Ott, PhD, ND

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
« Reply #1 on: August 10, 2009, 09:19:06 am »
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline ramallamamama

  • Member
  • *****
  • Posts: 1,110
  • Nobody's Slave
« Reply #2 on: August 10, 2009, 09:21:08 am »
I'm still wrapping my head around the Taitz family connections.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
« Reply #3 on: August 10, 2009, 09:52:22 am »
I'm still wrapping my head around the Taitz family connections.

This guy was one of the first to expose that the reason JFK, Jr. was executed by GWB was because Jr. was about to expose how GHWB was intimately involvedwith the assassination of his father. This guy has some blockbuster information. As far as Taitz, looks like they used a weaker sibling for some distraction prooaganda.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John Galt

  • Member
  • *****
  • Posts: 866
« Reply #4 on: August 10, 2009, 10:07:05 am »
This guy was one of the first to expose that the reason JFK, Jr. was executed by GWB was because Jr. was about to expose how GHWB was intimately involvedwith the assassination of his father.

Sane, are you saying Taitz was the first (or one of the first) to expose the reason/theory behind JFK Jr's death?

Fyi, here's a link to the documentary film "The Assassination Of JFK Junior - Murder By Manchurian Candidate" by John Hankey. The film points to GWB being the prime suspect:

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
« Reply #5 on: August 10, 2009, 10:25:22 am »
Sane, are you saying Taitz was the first (or one of the first) to expose the reason/theory behind JFK Jr's death?

Fyi, here's a link to the documentary film "The Assassination Of JFK Junior - Murder By Manchurian Candidate" by John Hankey. The film points to GWB being the prime suspect:

NO! I am saying she is small potatoes, a distraction to the true issue exposed by Berg over a year ago.

The guy who wrote the original article above:  A. True Ott, PhD, ND (Ex-Mormon I believe) is one of the first who exposed the JFK father/son assassinations and the Bush connections (So did the creator of the kick ass documentary you posted). Here is his article: .  Research his stuff, he is on the cutting edge of truth. I am glad he is exposing the PROMIS connection to pandemic false flag preparations. Same stuff Anti_Illuminati has been exposing for months now.

It is all coming together and many are waking up.

The left/right paradigm is exposed and the elite psychopaths are making plans for a huge Ptech/CAESER/PROMIS "Night of the long Knives". People better wake up soon (especially in the military, healthcare, and in cyberterror war drills) and expose the hell out of this!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John Galt

  • Member
  • *****
  • Posts: 866
« Reply #6 on: August 10, 2009, 10:29:53 am »
NO! I am saying she is small potatoes, a distraction to the true issue exposed by Berg over a year ago.

The guy who wrote the original article above:  A. True Ott, PhD, ND (Ex-Mormon I believe) is te guy who exposed the JFK/Bush connections (along with the kick ass documentary you posted). Here is his article: .  Research his stuff, he is on the cutting edge of truth. I am glad he is exposing the PROMIS connection to pandemic false flag preparations. Same stuff Anti_Illuminati has been exposing for months now.

It is all coming together and many are waking up.

The left/right paradigm is exposed and the elite psychopaths are making plans for a huge Ptech/CAESER/PROMIS "Night of the long Knives". People better wake up soon (especially in the military, healthcare, and in cyberterror war drills) and expose the hell out of this!

Cool, and thank you kindly for sharing the link to Hankey's 2007 article where he gives credit to True Ott for informing him on the JFK Jr. assassination.

And I agree, this latest True Ott article is amazing. I posted it earlier this morning here: I'm looking forward to Anti_Illuminati's take on it.


  • Guest
« Reply #7 on: August 10, 2009, 11:03:48 am »
This is the most devastating article I have EVER seen.

The guy who wrote this is an incredible genius, if he knows anything else he better dump all of his documentation and info out into the public domain immediately to make him safer.  Folks, I cannot even express to you what is going through my mind right now.  He has uncovered incredible info that I never knew about, namely 2 new iterations of PROMIS (Ptech).  This needs to be on the frontpage of all of AJ's sites immediately.

I will now add as much information as I can find pertaining to this, and some information which proves this entire thing to an absolute level of proof. Let the infowar begin!

Oracle aims to make databases self-managing

Posted:    11:23 30 Apr 2003
Topics:    Databases | IT Workforce

Oracle is enhancing its database and application software architecture to assist IT personnel in running ever larger systems with less effort.

Database staff using the Oracle Enterprise Manager product will be able to aggregate multiple databases and other Oracle-based systems in a single browser-based view, said Andrew Mendelsohn, senior vice-president, database and application server technologies, at Oracle.

"It's our goal to make the database self-managing and make it invisible," he said. That includes not just databases, but any Oracle-related aspect of the datacentre, such as the response times for transactions on a web page.

Currently, administrators are generally limited to managing the health of a single system at one time. To make configuration more automatic, Oracle plans to enhance its product range so Enterprise Manager can automatically take feeds from multiple database and application server products and centralise the information for presentation to administrators.

For instance, database managers could, from a single view, get information about all systems that are close to running out of storage space instead of manually running queries on individual databases, as they do now.

Eventually, the application will be able to store statistical performance information and make recommendations for best practice configuration, said Mendelsohn.

Oracle is also automating the process for users to access its online Metalink support site to download patches. When logging on, IT staff will automatically receive all the patches they need for each of their systems, depending on operating systems and other factors.

Mendelsohn said users will start to see these features with the next release of the Oracle Application Server this summer.

A couple of users said they are considering deploying the technology when it becomes available.

William Maguire, chief information officer at storage supplier Legato Systems, said the improvements could help his staff keep their database systems online and cut the total cost of ownership by letting him do more with fewer people. "It might increase the window of availability to the user and increase the productivity of the user," he said.

Legato is running Oracle8i to support its Oracle E-Business Suite 11i applications, and an Oracle9i database which it uses for analytical operations.

Oracle is ahead of competitors IBM and Microsoft in enabling the management of its database products, said Rich Niemiec, president of the International Oracle Users Group and chief executive officer of Oracle support and service provider TUSC.

TUSC is managing 700 Oracle databases remotely and Niemiec said the improvements planned by Oracle are something that could help his support staff. He added that he also likes the changes Oracle has made to its browser interface to make it pure HTML, enabling users to access Enterprise Manager without requiring any particular client.

Offline TheHouseMan

  • Member
  • *****
  • Posts: 3,837
« Reply #8 on: August 10, 2009, 11:12:40 am »
This is all fantasy. There is no technical detail whatsoever. I keep hearing these stories about systems that can control any computer or get any piece of information or understand any language, and it's just complete baloney.


  • Guest
« Reply #9 on: August 10, 2009, 11:37:55 am »
U.S. Cyber Challenge: Recruiting hackers and "nerds" for government operations

"Burn the hard drives with thermite, and install new ones without using enterprise architecture based on NWO companies/artificial intelligence/COBRA programming language/CORBA/e/Ptech/Horizons/Agile Software Methodology/Intelligile/GoAgile--then you might be doing something about "security".  Until then--SHUT THE F*CK UP WITH THE BULLSHIT."

Holy Shit! Chris Matthews accidently exposes the NWO birth certificate agenda

"Insert:  The only thing that can execute a disabling cyber attack is Ptech, aka CORBA/e (do a search for that term)."

Expersoft, Ptech, Object Management Group (OMG)

Ptech submits metalmodel as proposed OOAD standard -- Leading provider of visual modeling products responds to OMG request for proposals.

BOSTON--(BUSINESS WIRE)--Feb. 7, 1997--Ptech, a leader in enterprise-wide business process modeling and code generation tools, announced today that it recently submitted a proposed standard for object-oriented analysis and design Object-oriented analysis and design (OOAD) is a software engineering approach that models a system as a group of interacting objects. Each object represents some entity of interest in the system being modeled, and is characterised by its class, its state (data elements), and its . The document responds to the Object Analysis and Design RFP-1 of the Object Management Group in Framingham, Mass.

Ptech develops the software solution FrameWork, an object-oriented business process modeling and application development tool that lets business and technology professionals use a single graphical interface See GUI.  to capture business goals and design processes to support them. FrameWork 5.0 for Microsoft Windows See Windows.
(operating system) Microsoft Windows - Microsoft's proprietary window system and user interface software released in 1985 to run on top of MS-DOS. Widely criticised for being too slow (hence "Windoze", "Microsloth Windows") on the machines available then.  NT and 95 facilitates conceptualizing, modeling and implementing processes and information for maximum competitive advantage. The Ptech Abstract Code Generator See application generator and macro recorder.  (ACG ACG American College of Gastroenterology; angiocardiography; apexcardiogram.AcG accelerator globulin (coagulation factor V).

accelerator globulin (clotting factor V). ) lets customers generate up to 90 percent of application code directly from the models.

"Ptech is submitting a response to the OMG (1) See Object Management Group.

(2) "Oh my God!" See digispeak.
OMG - Object Management Group  request for proposals as a result of customer feedback highlighting a void in the marketplace," explained James Cerrato, vice president of technology deployment. "We are convinced that our approach will enrich the emerging OMG standard. Since most approaches in the marketplace focus on systems development, they often result in applications that do not reflect actual business needs. The Ptech approach, in contrast, is actually driven by business strategy."

"Ptech has always advocated a fully open approach, providing customers with all the underlying metamodels that define the Ptech methodology and cover the full life cycle from enterprise modeling through application implementation," added Oussama Ziade, chairman and CEO (1) (Chief Executive Officer) The highest individual in command of an organization. Typically the president of the company, the CEO reports to the Chairman of the Board. . "The Ptech metamodel is based on seventeen years of practical experience with customers and notable industry experts. Since the metamodel is easy to extend, users have continually expanded and refined it so that it reflects a degree of maturity, formality and integration unique in the marketplace. We are excited about submitting this Ptech metamodel to support the OMG in their standardization effort for object analysis and design."

The Ptech submission is one of a handful offered by industry leaders for consideration. It consists of an overview of the Ptech method, a description of the models supported and a glossary of terms. The body of the document addresses these topics:

-- Structural models

-- Architectural models

-- Behavioral models

-- Distributed processing The first term used to describe the distribution of multiple computers throughout an organization in contrast to a centralized system. It started with the first minicomputers. Today, distributed processing is called "distributed computing." See also client/server.  models

-- Usage models

-- Annotation models

The revised submission in April will also address the relationship between metamodel constructs defined in this submission and specifications in the Business Object Facility, the Meta Object Facility, the CORBA (Common Object Request Broker Architecture) A software-based interface from the Object Management Group (OMG) that allows software modules (objects) to communicate with each other no matter where they are located on a private network or the global  Interface Repository and CORBA Services.

For details about Ptech or FrameWork, call 617/577-7100 or visit . -0- Founded in 1994, Ptech Inc. is a privately held software company located in Boston, Massachusetts.

Ptech and the Ptech logo are trademarks of Ptech Inc.


Janet Fink, 617/577-7100 x360

[email protected][/quote]

Piercing The Darkness -- Anti Illuminati and I are starting an internet tv show

Appendix A. Short History of the OMG and its C4I DSIG
A.1 The Object Management Group

The Object Management Group (OMG) was formed to create a component-based software marketplace by hastening the introduction of standardized object software. The organization’s charter includes the establishment of industry guidelines and detailed object management specifications to provide a common framework for application development. Conformance to these specifications will make it possible to develop a heterogeneous computing environment across all major hardware platforms and operating systems. Implementations of OMG specifications can be found on over 50 operating systems across the world today. OMG’s series of specifications detail the necessary standard interfaces for Distributed Object Computing. Its widely popular Internet protocol IIOP (Internet Inter-ORB Protocol) is being used as the infrastructure for technology companies like Oracle, Sun, IBM and hundreds of others. These specifications are used worldwide to develop and deploy distributed applications for Manufacturing, Finance, Telecom, Electronic Commerce, Real-time systems, Health Care and more.

A.1.1   Brief History of the OMG

In April of 1989, urged by Hewlett-Packard, eleven companies met informally to discuss how to move forward industry-wide support for the object-oriented, drag-and-drop style of programming and system interaction.  These eleven companies quickly decided to form a consortium organization, initially to support HP’s NewWave desktop technology. In October of 1989, the new organization took two significant steps.  First, OMG’s initial professional, full-time, neutral staff were hired; Chris Stone, the initial Chairman and CEO, came from one of the founding organizations (Data General); and Richard Soley, the initial Vice President & Technical Director, came from a string of start-up companies (Symbolics, PictureTel, A.I. Architects).

More importantly, as the year drew to a close the rapidly growing membership formally decided to become a consensus-based standardization organization, focussing on object technology as the appropriate solution to the enterprise application integration problem.  In addition, OMG centered its sights immediately on commercially available software, to ensure that the standards would not simply be “paper” specifications.

The initial target of the standardization program, based on the overall Object Management Architecture that was agreed in mid-1990, was the infrastructure for connecting applications, “at the application level,” across diversity at many levels: programming languages, operating systems, instruction set architecures, network topologies and network protcols.  This initial document, called the Common Object Request Broker Architecture (CORBA) standard, was first published in 1991 and remains a living specification, incorporating new “silver bullet” technologies as they rapidly become “legacy systems”.

From the start CORBA incorporated many key features, including TCP/IP (Internet) based interoperability, both synchronous and asynchronous operations, and both direct and queued communications.  Implementations of this key specification began to appear from vendors both large and small immediately.  From 1991 to 1995, the OMG (boasting by late 1995 some 400 member companies) focussed on higher-level infrastructure, such as transaction systems, security and authentication, persistent storage and event management.  In 1995, the second major version of CORBA was published, focussing on guaranteed interoperability between the many different CORBA implementations that had appeared by that date.
The next two years were difficult for OMG; while infrastructure work continued apace (especially to ensure full compliance with Internet standards and to incorporate the new Java environment), there was a growing interest in leveraging OMG’s existing infrastructure technology and applying it to standardization in many vertical markets (initially the medical systems, manufacturing, telecommunications and financial systems markets).  In 1997 OMG and its then 540 members went through several major changes.  To recognize the growing need for standards particular to vertical markets, OMG created a new technical program for “domain technology,” directing resources to solving interoperability needs in four initial domain areas (which have since grown to some 15 areas).

In addition, OMG added a major new piece of infrastructure technology, the Unified Modelling Language (UML), to its arsenal; the UML remains the world’s only modelling notation and metamodel standard.  Lastly, OMG went through management changes in 1997 when its first Chairman, Chris Stone, left the organization; the other founder, Richard Soley, became Chairman and CEO while Bill Hoffman (who built OMG’s conference subsidiary Object World into a successful worldwide multimillion-dollar show business from 1990-1996) became OMG’s President and COO.  Shortly thereafter Andrew Watson became OMG’s new Vice President and Technical Director.

As the century came to a close, domain technology areas proliferated (now including the initial four and pharmaceutical, transportation, space system, retail and many others), but the infrastructure work has not stagnated.  CORBA now features interoperability features for not only Java but Python and XML technologies, while the UML specification has spawned repository standards (the Meta-Object Facility or MOF) as well as data warehousing standards (the Common Warehouse Metamodel or CWM).  OMG shows no signs of slowing down; in the middle of the year 2000, there are some 100 standards processes being run simultaneously by OMG’s 800 members using OMG’s open, neutral consensus-making process.

A.1.2   The OMG Mission

The OMG was formed to create a component-based software marketplace by hastening the introduction of standardized object software.  The organization’s charter includes the establishment of industry guidelines and detailed object management specifications to provide a common framework for application development. Conformance to these specifications will make it possible to develop a heterogeneous computing environment across all major hardware platforms and operating systems. Implementations of OMG specifications can be found on many operating systems across the world today. OMG’s series of specifications detail the necessary standard interfaces for Distributed Object Computing.

Its widely popular Internet protocol IIOP (Internet Inter-ORB Protocol) is being used as the infrastructure for technology companies like Netscape, Oracle, Sun, IBM and hundreds of others. These specifications are used worldwide to develop and deploy distributed applications for vertical markets, including Manufacturing, Finance, Telecoms, Electronic Commerce, Realtime systems and Health Care.  The OMG defines object management as software development that models the real world through representation of “objects.” These objects are the encapsulation of the attributes, relationships and methods of software identifiable program components. A key benefit of an object-oriented system is its ability to expand in functionality by extending existing components and adding new objects to the system.  Object management results in faster application development, easier maintenance, enormous scalability and reusable software.

PROMIS/Ptech makes compartmentalization obsolete. Key to total tyranny & C2

PTECH announces framework for Windows; Newest version brings business modeling and code generation to Microsoft Windows NT and Windows 95
Business Wire,  August 20, 1996

SAN JOSE, Calif.--(BUSINESS WIRE)--Aug. 20, 1996--(Object World West)--Ptech Incorporated, a leader in providing software tools and solutions for business modeling and code generation, today announced the availability of FrameWork 4.0 for Microsoft Windows NT and Windows 95 for shipment by the end of the year. A tightly-integrated set of object-oriented, model-driven application development tools, FrameWork enables business and technology professionals to use a single graphical interface to design and model business processes and generate the applications and code to support them. Ptech also announced in a separate release today an addition to its portfolio of code generators, the Abstract Code Generator (ACG). The ACG, available this fall, enhances FrameWork's code generation capabilities by enabling users to apply templates supplied by Ptech or third parties or templates of their own design to produce code in any language.

With sales of Windows NT tripling during the last six months and sales of Windows 95 approaching 40 million units this month, more companies than ever are seeking robust applications that leverage the power and capability of Windows to improve competitiveness and productivity. FrameWork for Windows delivers the ability to conceptualize, model, and implement processes and information technology in new application development efforts for maximum competitive alignment.

"Continuous improvement of existing business processes through designing and implementing best practices is a top priority for corporate management, " said Oussama Ziade, president and founder of Ptech. "And for business and information technology executives whose companies compete in fast-moving markets, the pressure to do this in a timely fashion, with minimum disruption, is enormous."

"FrameWork meets the needs of both groups of executives," Ziade noted. "Its flexible KnowledgeBase captures both business processes and the rules and logic that drive them."

About FrameWork for Windows

Highly scaleable, FrameWork for Windows can be used to "reinvent" single departments or streamline an entire corporation, enabling companies to model their business processes in any order, one at a time, as the vision of their business evolves. At the heart of FrameWork is its KnowledgeBase, which captures and stores both business models and software design.

The KnowledgeBase contains all the details needed to translate business models into automated systems. As users create models of their businesses on screen, the KnowledgeBase captures the underlying semantics of the models, in real time, and ensures that models are logical and consistent. This means a significant reduction in the time required for application development.

FrameWork's graphical interface allows users to design models from a number of different views. FrameWork provides modeling capability that captures the architecture of the business solution (Activity Modeling), as well as the information structure (Object Modeling) and the dynamics of the business processes (Process Modeling). FrameWork lets users extend these basic modeling capabilities to create new ones, with new tools and even new methodologies. Users can extend models infinitely, for example to add the functions of new departments formed as a business grows into new markets.

While they are constructing models, users can navigate the KnowledgeBase with FrameWork's interactive forms and queries and instantly view any piece of information about their businesses. In addition, users can generate reports in leading document management and word processing products and reuse existing models to build new models. Best of all, users can continually enhance their business processes by making improvements to their models or additions to the model set.

Using FrameWork with the existing Ptech companion code generators, users can generate C++ header and source code, Fort" class definitions, or JAVA or CORBA IDL code directly from business models, with a click of the mouse. For object-oriented databases, the code generator produces database schema definitions and the database-specific application code to best support the application being built. More importantly, when original business goals or requirements change, users can reflect those changes by modifying their business models and then simply regenerating code from the modified designs AF without having to recode the application.

FrameWork In Use

Andersen Consulting formed the Rapid Object Application Development (ROAD) consortium to execute a DARPA Technology Reinvestment Project (TRP) on the use of20 object technology for rapid software development and delivery. Andersen Consulting and ROAD participants Raytheon, CoGenTex, and Expersoft chose Ptech as the provider of business modeling and object-oriented analysis and design software.

"We have found that FrameWork is the only medium in the marketplace that is flexible and adaptable enough to fit a customer's business process," said Colin Scott, Associate Partner at Andersen Consulting. "All other tools we examined, including Rational Rose, Paradigm Plus, Object Management Workbench, and SilverRun, require users to modify their processes to fit the tool."

Technical Requirements

FrameWork for Windows runs on Microsoft Windows NT versions 3.51 and higher and on Microsoft Windows 95. It requires a minimum of 16-24 MB of RAM, 60 MB of disk space, and a high-resolution color monitor. FrameWork is also available for Sun Solaris, DEC Digital UNIX, and Hewlett Packard HP-UX, and Ptech also provides consulting for business model design, as well as software service and support.

For more information about FrameWork for Windows, contact Ptech at 617-577-7100 or visit its site on the World Wide Web at http://www.ptechinc .com. -0-

Founded in 1994, Ptech Inc. is a privately-held software company located in Boston, MA. The company's integrated product, FrameWork, provides a complete, scaleable "concept-to-code" solution for business modeling and automation. With FrameWork, businesses can quickly respond and continually evolve in the ever-changing business world. Ptech and the Ptech logo are trademarks of Ptech Inc. All other products mentioned are trademarked by their respective manufacturers.

CONTACT: Kathryn Hughes OR Karl Scholz

Ptech Inc. Sterling Hager, Inc.

617) 577-7100 X 302 617/259-1400 X 335

[email protected] [email protected]

2AB (Domain)
3M (Contributing)
724 Solutions (Domain)
Aachen University of Technology, Informatik 4 (University)
ABB Automation Systems Power Utilities Division (Domain)
ABB Corporate Research (Auditing)
Abbott Laboratories (Influencing)
Aberdeen Group (Analyst)
Academic Medical Center (University)
ACORD (Domain)
Acta Technology (Influencing)
Actional (Contributing)
ADA Software (Analyst)
Adaptive Ltd. (Domain)
ADDC Infotech (Auditing)
Adiron, LLC (Platform)
AdNovum Informatik (Auditing)
Advanced Chemistry Development, Inc. (Domain)
Aerospace (Auditing)
Aetna Financial Services (Auditing)
AFC Europe (Auditing)
Affiniti (Domain)
Affymetrix, Inc. (Influencing)
Agilent Technologies (Influencing)
AIIM International (Domain)
Air Force Institute of Technology (University)
Air Force Research Laboratory (Government)
Air Traffic Software Architecture (Influencing)
Alberta Research Council (Auditing)
Alcatel (Contributing)
Algosaibi Information Systems (Influencing)
Allen Systems Group, Inc. (Auditing)
ALLTEL Information Services (Auditing)
Alpheus Solutions (Auditing)
Altair Aerospace Corporation (Influencing)
Amersham Pharmacia Biotech Plc. (Auditing)
ANZ Bank (Auditing)
Aonix (Influencing)
Appeal Software Solutions (Auditing)
Applied Biosystems (Influencing)
Architectionale, Inc. (Contributing)
ARTISAN Software Tools (Contributing)
AstraZeneca Pharmaceuticals (Influencing)
AT&T (Contributing)
Atos (Auditing)
Atraxis Group (Influencing)
AtWork Corporation (Auditing)
Aurora Information Systems (Influencing)
Austin Software Foundry (Influencing)
Avail (Influencing)
AXA (Auditing)
b-next AG (Auditing)
Baan Research & Development (Auditing)
BAE SYSTEMS, CNI Division (Domain)
BAE Systems-Mission Solutions (Auditing)
BAeSEMA (Auditing)
Bank of America (Influencing)
Barmenia Lebensversicherung (Auditing)
Barry & Associates (Analyst)
Battelle (University)
Bauer & Partner AG (Influencing)
BBN (Influencing)
BEA Systems (Contributing)
Blueprint Technologies (Influencing)
Bluestone Software (Contributing)
Boeing (Domain)
BoldSoft AB (Platform)
Borland Software Corporation (Contributing)
Bournemouth University (University)
Bouygues Telecom (Auditing)
British Telecom (Influencing)
Broadcom Eireann Research (Contributing)
BROKAT Informationssysteme (Contributing)
Brunel University (University)
Bulldog Group (Contributing)
Business Integration Group (BIG) (Platform)
Business Sematics Ltd. (Influencing)
Buzzeo, Inc. (Auditing)
Cacheon (Platform)
CADDETC (University)
Cadence Design Systems (Auditing)
Canon (Influencing)
Cape Clear Software Limited (Platform)
Care Data Systems (Domain)
Carnegie Mellon University (University)
Case Consult (India) Pvt. Ltd. (Auditing)
Castek Software Factory (Influencing)
CBOP (Platform)
CCC Information Services (Auditing)
CCSDS (Influencing)
CEDITI-UCL (University)
Cemax-Icon (Influencing)
Centre for Dev. of Telematics (Auditing)
Centre for Software Engineering-DCU (University)
Charles Schwab (Auditing)
Charles University (University)
Chemical Abstracts Service (Influencing)
Chicago Board Options Exchange (Influencing)
Choreology Ltd. (Contributing)
CIENA Corporation (Auditing)
CIGNA (Auditing)
Cisco Systems (Influencing)
Citigroup (Domain)
Clinsoft Corporation (Influencing)
CoCreate Software (Auditing)
Coexis Ltd. (Influencing)
Cognos Inc. (Platform)
Collaborative Electronic Notebook Systems Assoc. (Auditing)
Colorado State Univ, Dept of Computer Science (University)
ComIT Division of Spacebel (Influencing)
Commissariat a l'Energie Atomique-CEA/LETI (University)
Comnic (Auditing)
Compaq (Contributing)
ComponentSource (Domain)
Computational Physics, Inc. (Auditing)
Computer Associates (Contributing)
Computer Sciences Corporation/NASA Programs (Domain)
Concentus Technology Corporation (Platform)
Concept Five Technologies (Contributing)
Conceptual Systems and Software (Influencing)
Consignia (Government)
Construx Software (Auditing)
Consultancy & Projects Group (Influencing)
Consystant Design Technologies, Inc. (Influencing)
Control Data (Thailand) (Influencing)
Corporate Interactive COIN AG (Auditing)
Credit Suisse (Auditing)
Creon-Labcontrol AG (Domain)
Critical Path (Contributing)
CRS4 (University)
CSK (Auditing)
CTIT (University)
Cutter Information (Analyst)
CyberPlus (Platform)
Cyborg Systems (Domain)
D-Tec (Auditing)
DaimlerChrysler (Auditing)
Data Access (Platform)
Data Networks Corporation (Auditing)
Data Research Associates (Influencing)
Database Design Solutions, Inc. (Auditing)
Datamation Limited (Analyst)
Datasim Education BV (Auditing)
DBS Systems Corporation (Auditing)
De Montfort University (University)
Deere & Company (Domain)
Defense Information Systems Agency (Government)
Delta Software Technology GmbH (Auditing)
Department Automatica e Informatica (University)
Department of National Defence, Canada (Government)
DESAN Marktonderzoek BV (Influencing)
Destiny WebSolutions, Inc. (Influencing)
Det Norske Veritas (Influencing)
Deutsche Telekom AG (Influencing)
DHL Systems (Auditing)
Digital Convergence (Contributing)
DIIMA (University)
Dimension EDI (Contributing)
DMSO (Contributing)
DSTC (Contributing)
Dublin Institute of Technology (University)
Dynasty Technologies (Influencing)
E-Systems Falls Church Division (Auditing)
ECI Telecom, Inc. (Auditing)
EDB 4tel (Auditing)
EDS (Contributing)
EDSLAB/IDA (University)
EDUshare (Auditing)
EFACEC Sistemas de Electronica (Auditing)
EFFIX S.A. (Auditing)
Eidea Labs (Domain)
Eigner + Partner AG (Auditing)
Electronic Frontier Foundation (Domain)
Elektrotehnicki fakultet Banja Luka (University)
Elisa Communications, Research (Auditing)
Embarcadero Technologies (Auditing)
Enea Data (Platform)
ENOVIA Corporation (Domain)
ENST Bretagne (University)
Entegrity Solutions (Platform)
Entelos (Influencing)
Enterworks (Influencing)
Environment & Natural Resources (Auditing)
ENVOY (Influencing)
Epic Systems (Auditing)
EPRI (Auditing)
Erasmus University (University)
Eric Leach Marketing Ltd. (Analyst)
Ericsson (Contributing)
Esterel Technologies (Contributing)
Eternal Systems (Platform)
EURESCOM (University)
Eurocontrol (Government)
European Bioinformatics Institute (Domain)
European Space Operation Centre (ESOC) (Government)
Eurostep Group AB (Domain)
Evidian (Influencing)
Evoke Software (Influencing)
Express Scripts (Auditing)
Fachhochschule Solothurn (University)
Fachhochschule Wiesbaden (University)
Faculdade de Engenharia (University)
Faktum Softwareentwicklung (Auditing)
Federal University of Sao Paulo (University)
Fidelity Investments Systems Company (Auditing)
FileNet (Domain)
Finnish Defence Forces (Government)
First Data Card Services Group (Auditing)
Fiserv InformEnt (Auditing)
Floorboard Software (Influencing)
Florida International University (University)
Ford Motor Company (Domain)
Formula (Influencing)
Forschungszentrum Informatik (University)
Franz (Platform)
Fraunhofer IITB (University)
Fraunhofer IPK (University)
Fraunhofer ISST (University)
Fraunhofer-IPA (University)
FSTC (Influencing)
Fuentez Systems Concepts (Influencing)
Fuji Xerox (Auditing)
Fujitsu (Contributing)
Fundacion European Software Institute (University)
Gallium Software (Influencing)
Gazebo Software Solutions (Domain)
General Dynamics Advanced Technology Systems (Auditing)
General Dynamics Defense Systems (Auditing)
General Dynamics Information Systems (Influencing)
Genomica Corporation (Influencing)
Gentleware AG (Platform)
Georgia Tech Research Institute (University)
Gjensidige gruppen (Auditing)
GlaxoSmithKline plc (Influencing)
Global InfoTek (Auditing)
GMD Fokus (Contributing)
GMD-Forschungszentrum Informationstechnik (University)
GNOME Foundation (Platform)
GoAhead Software, Inc. (Contributing)
Government Communications Headquarters (GCHQ) (Government)
Graphic Communications Association (Influencing)
Hamburg University (University)
Harris (Domain)
Healthcare Distribution Management Association (Domain)
Hewlett-Packard (Contributing)
Highlander Engineering, Inc. (Contributing)
Himacs (Auditing)
HISCOM (Auditing)
Hitachi (Contributing)
HM&V Research Ltd (Domain)
Honeywell, FM&T (Auditing)
HTA Biel (University)
Humboldt-Universitaet (University)
Hurwitz Group (Analyst)
Hyperion Solutions (Contributing)
I-Logix (Contributing)
i2 Technologies (Auditing)
Iconixx (Influencing)
Ideal Objects (Auditing)
IIR (Analyst)
IKV++ GmbH (Auditing)
ILOG (Influencing)
IMI (Auditing)
Imola Informatica Srl (Influencing)
Imperial College (University)
IMRglobal (Influencing)
IMS MAXIMS plc (Auditing)
Incyte Genomics, Inc. (Influencing)
INESC (University)
Informate International N.V. (Auditing)
Informatica Corporation (Influencing)
Informatikstrategieorgan Bund (Auditing)
Information + Graphics Systems (Auditing)
Information Builders (Influencing)
Informix (Contributing)
Infosys Technologies Ltd. (Auditing)
Inovant, a Visa Solutions Company (Influencing)
INRIA (University)
Inst. for Problems of Informatics (University)
Institut fuer Informatik (University)
Institut fuer Technische Informatik (University)
Institut National des Telecommunications (University)
Institute for Defense Analyses (Auditing)
Integral Systems Inc. (Auditing)
Integri (Influencing)
Intelligent Solutions (Domain)
Intentia (Auditing)
Interactive Objects Software GmbH (Influencing)
International Accounting Standards Committee (Domain)
International Business Machines (Contributing)
International Data Corp. (Analyst)
Internet Component Management Group (Domain)
InterSystems Corporation (Auditing)
Intracom S.A. (Influencing)
IONA (Contributing)
IONIC Software (Auditing)
IQSOFT Intelligent Software (Influencing)
IRIS Incorporated Res. Institutions for Seismology (University)
IT Design (Influencing)
IT Software (Auditing)
iTeamSolutions, llc (Influencing)
iteratec (Auditing)
ITESM (University) (Influencing)
J Consortium (Contributing)
J.P. Morgan Chase & Company (Influencing)
Jaczone AB (Platform)
Janus (Auditing)
Japan Future Information Technology & Systems (Auditing)
JC Penney (Auditing)
Johns Hopkins University (University)
Kabira Technologies, Inc. (Contributing)
Kaiser Permanente (Auditing)
KAIST (University)
Keele University (University)
Keio University (University)
Kennedy Carter (Platform)
Kinetium (Platform)
Klasse Objecten (Influencing)
Klein+Stekl (Auditing)
Kongsberg Defence Systems (Auditing)
Kookmin University (University)
KPN Telecom (Influencing)
LAAS (University)
Laboratoire d`Informatique Fondamentale de Lille (University)
Lancaster University (University)
Lateral Software Technology (Influencing)
LBNL (University)
Learning Voyage (Auditing)
LEC (Auditing)
Liberty Mutual (Auditing)
Linguateq (Auditing)
Linkvest (Influencing)
Liquidlogic (Influencing)
Litton PRC (Auditing)
Lockheed Martin (Contributing)
LogOn Technology Transfer GmbH (Analyst)
Long Island University (University)
Longitude Systems, Inc. (Contributing)
Los Alamos National Laboratory (Domain)
Lucent Technologies (Contributing)
Lumos Technologies (Influencing)
Macquarie Bank (Auditing)
Managed Objects (Influencing)
Mannesmann Datenverarbeitung (Auditing)
Marconi plc (Auditing)
Marketshare (Analyst)
Marwin Consulting (Auditing)
MASP Consortium (Auditing)
Mass General Hospital (University)
Mathema Software (Auditing)
Mathet Consulting (Influencing)
MatrixOne (Domain)
Maurer & Treutner (Auditing)
MCI WorldCom (Platform)
MDL Information Systems (Influencing)
MedContrax (Domain)
Mediaflex, Inc. (Influencing)
MEGA International (Influencing)
MERANT (Platform)
Mercury Computer Systems (Contributing)
Meta Data Coalition (Platform)
Meta Integration Technology, Inc. (Domain)
Meta, Inc-USA (Influencing)
MetaMatrix, Inc. (Influencing)
Metaphase Technology Group/SDRC (Domain)
MetLife (Auditing)
METRIS GmbH (Influencing)
Microsoft (Auditing)
Millennium Pharmaceuticals (Domain)
Mindview spa (Influencing)
Mitel Corporation (Auditing)
MITRE (Contributing)
Mitsubishi Electric (Auditing)
Mitsubishi Space Software (Auditing)
Modus Operandi (Influencing) (Influencing)
Monash University (University)
Moscow State Engineering Physics Institute (University)
Motorola (Platform)
Mott MacDonald (Influencing)
MPI Software Technology (Platform)
MSC.Software Corporation (Domain)
Mspect, Inc. (Auditing)
Myongji University (University)
NASA Ames Research Center Aviation Safety Program (Government)
NASA John H. Glenn Research Center at Lewis Field (Domain)
National Council for Prescription Drug Programs (Influencing)
National Imagery and Mapping Agency (Government)
Nationwide Financial Services (Auditing)
Naval Reserve Information Systems Office (Government)
Naval Surface Warfare Center (Government)
NCB Network Consulting Bazzanella (Auditing)
NCC Group, Ltd. (Influencing)
NCR (Contributing)
NEC (Contributing)
Net Highlanders (Auditing)
netAccount AS (Domain)
NetGenics (Domain)
NetManage, Inc. (Auditing)
NetVendor Systems (Influencing)
Network Associates (Influencing)
Network Integration and Solutions (Auditing)
Neurealization, Inc. (Influencing)
New Era of Networks (Auditing)
New York Life Insurance (Auditing)
Nex2 (Influencing)
NHS Information Management Centre (Auditing)
Nihon Unisys (Contributing)
NIIIP (Contributing)
Nimble NV (Auditing)
Nippon Steel Solutions (Auditing)
Nippon System Gijutsu Co. (Influencing)
Nippon Telegraph and Telephone (Contributing)
NIST (Contributing)
Nokia (Contributing)
Norsk Regnesentral (University)
Nortel Networks (Domain)
Northeastern University/College of Computer Sci. (University)
Novell (Influencing)
NSA (Contributing)
NSDIPA (Influencing)
NTT Data Corporation (Auditing)
nVISIA (Influencing)
OASIS (Domain)
Object Computing, Inc. (OCI) (Influencing)
Object Oriented Concepts (Contributing)
Object Services and Consulting (Influencing)
Object-Oriented Pty., Ltd. (Influencing)
Objective Interface Systems (Contributing)
objective partner (Influencing)
Objective Technology Group (Auditing)
Objectivity (Contributing)
Objectools (Contributing)
ObjectSecurity Ltd. (Influencing)
ObjectSpace (Auditing)
ObjectWay (Influencing)
Office for the Secretary of Defense (OSD) (Government)
OGIS Research Institute Co. Ltd. (Influencing)
Oki Electric Industry (Influencing)
OMEX AG (Influencing)
OMSOFT Network Technologies (Auditing)
Open CASCADE (Domain)
Open GIS Consortium (Contributing)
Open Technologies Corp. (Influencing)
Open-IT (Platform)
Oracle (Contributing)
Orange PCS Limited (Influencing)
ORBISM (Platform)
Ordina TTI Technical Consulting (Auditing)
Orion Capital Companies (Auditing)
Orthogon (Domain)
OSM (Domain)
Parametric Technology (Auditing)
PatientKeeper, Inc. (Influencing)
PeaceHealth (Auditing)
Persistence Software (Contributing)
Petrotechnical Open Software Corp. (Contributing)
Pfizer (Domain)
Philip Morris USA (Auditing)
Philips Electronics (Influencing)
PIMB (Influencing)
Popkin Software and Systems, Inc. (Influencing)
PricewaterhouseCoopers (Auditing)
Primary Interface LLC (Auditing)
Primeur Group (Auditing)
Princeton Softech (Influencing)
PrismTech (Domain)
Proforma Corporation (Influencing)
Program Utvikling A/S (Auditing)
Project Technology (Platform)
Promia (Influencing)
ProRegio (Auditing)
ProSTEP (Influencing)
Prover Technology AB (Influencing)
Prudential (Auditing)
PSINet Consulting Solutions (Auditing)
PsyCor International (Domain)
Ptech (Platform)
Purabi Das School of Information Technology (University)
Q-Labs France (Platform)
QA (Influencing)
QuadRite, Inc. (Domain)
Questra Corporation (Influencing)
Qwest, Inc. (Auditing)
Rand Merchant Bank (Domain)
Rational Software (Contributing)
Raytheon (Domain)
Real Objects Limited (Influencing)
Real-Time Innovations (Influencing)
Red River College (University)
Research Collaboratory Structural Bioinformatics (University)
Reuters (Auditing)
Riverton Software (Influencing)
Rockwell (Domain)
ROCOZEN (Influencing)
Roesch Consulting (Influencing)
Rogue Wave Software (Platform)
Roke Manor Research (Auditing)
Rosetta Inpharmatics (Domain)
Royal Bank of Canada (Auditing)
RTSC (Auditing)
SAGA (Auditing)
SAIC (Auditing)
Salmon River Software (Auditing)
San Antonio College (University)
San Diego Supercomputer Center (University)
Sankhya Technologies (Platform)
SanPaoloImi-Dipartimento Organizzazione e Sistemi (Auditing)
SAP AG (Contributing)
Sapiens Technologies (Auditing)
SAS Institute (Influencing)
SCC Clinical Information Systems (Influencing)
Schlumberger Technologies (Influencing)
SCT (Auditing)
Secant Technologies (Contributing)
SED Systems (Auditing)
SeeBeyond Technology Corporation (Platform)
Segue Software (Auditing)
Sema Group Telecoms (Auditing)
Semaphore (Influencing)
Seoul National University (School of Elec. Engr.) (University)
Seybold (Analyst)
Shell Services International (Auditing)
Siemens AG (Contributing)
Sight Code, Inc. (Influencing)
Sigma Exallon Systems (Auditing)
SIGS Publications (Influencing)
Silicomp Ingenierie (Auditing)
Silverglobe, Inc. (Influencing)
SilverStream Software (Platform)
SIMC (Domain)
SINTEF (University)
SIZ (Auditing)
SKYVA International (Auditing)
SODALIA S.p.A. (Auditing)
Softeam (Contributing)
Softlab GmbH (Platform)
Software Box (Auditing)
Software Daten Service (Influencing)
software design & management (Platform)
Software Engineering Center SEC Oy (Auditing)
Software Engineering Research Ctr. (University)
Software Productivity Consortium (Influencing)
Softzone Engineering (Auditing)
SOL-TEC Soluzioni Tecnologiche srl (Auditing)
Solution42 IT Systems & Consulting (Auditing)
Sonata Software (Auditing)
Sonera (Auditing)
Southeast University (University)
Southwest Research Institute (University)
Southwestern Bell (Influencing)
Spoornet Information Systems (Auditing)
Sprint (Contributing)
SPSS (Auditing)
Standard Bank of S. Africa (Auditing)
Stanford Software International (Domain)
Startext (Auditing)
State Street Bank & Trust Company (Auditing)
STN ATLAS Elektronik GmbH Naval Division (Auditing)
Stockholm County Council (Auditing)
Storebrand (Auditing)
Stuart McIntosh (Domain)
Sun Microsystems (Contributing)
SUPSI-ICIMSI (University)
Swiss Federal Institute of Tech. (University)
Sybase (Influencing)
Sybase K.K. (Auditing)
Sycomore (Auditing)
Synapto Informatik (Auditing)
Synergy Research (Influencing)
Synomics (Domain)
Syracuse University (University)
Sysline (Influencing)
SYSNETICS (Auditing)
T-Mobil Deutsche Telekom Mobilnet GmbH (Auditing)
Talarian (Domain) (Contributing)
Tampere University of Technology (University)
[email protected] Software Technology (Influencing)
Technical Resource Connection (Influencing)
Technologic Arts (Influencing) Srl (Influencing)
Telcordia Technologies (Domain)
Telecom Italia (Influencing)
TeleDanmark (Auditing)
Telefonica I+D (Contributing)
Telelogic AB (Contributing)
Telematica Instituut (University)
Telenor Research and Development (Auditing)
Telia AB (Auditing)
Telstra (Auditing)
Teltec DCU (University)
The Advisory Board (Contributing)
The Boer Group (Influencing)
The Credit Store (Auditing)
The Electric Laboratory Company Limited (Influencing)
The Home Depot (Influencing)
The Open Group (Contributing)
The Orb Agency (Influencing)
The Standish Group (Analyst)
Thomson-CSF ISR (Auditing)
Thomson-CSF TTM (Auditing)
ThoughtWorks (Influencing)
TIBCO (Contributing)
TietoEnator Corporation (Auditing)
TimeSys (Contributing)
TINA Consortium (Domain)
TogetherSoft Corporation (Platform)
Tokyo International University (University)
Tokyo University (University)
Top GraphX (Auditing)
TopS Ltd. (Domain)
Toshiba (Influencing)
TransTOOLS (Influencing)
TRAX (Influencing)
Tri-Pacific Software (Contributing)
Trifolium (Influencing)
Trigon Technology Group (Auditing)
Trinity Health (Auditing)
Tripos (Domain)
Trustworks Systems (Auditing)
TRW (Influencing)
TTTech Computertechnik AG (Platform)
TUHH/Telematik (University)
UBS (Contributing)
Unify (Influencing)
Unigraphics Solutions (Domain)
Union Pacific Technologies (Auditing)
Union Switch & Signal (Influencing)
Unisys (Contributing)
Universidad del Cauca (University)
Universidad Politecnica de Madrid (University)
Universidade Estadual de Campinas (University)
University of Bologna (University)
University of Calgary (University)
University of California at S.B. (University)
University of California San Francisco (University)
University of California, Irvine (University)
University of Edinburgh/CES (University)
University of Erlangen-Nuernberg (University)
University of Extremadura Computer Science Dept. (University)
University of Florida (University)
University of Frankfurt (University)
University of Graz (University)
University of Helsinki (University)
University of Kent at Canterbury, Computing Lab (University)
University of Kuopio (University)
University of Magdeburg (University)
University of Michigan (University)
University of Mining & Metallurgy (University)
University of Munich (University)
University of Nantes (University)
University of Newcastle upon Tyne (University)
University of Oslo (University)
University of Rochester (University)
University of Sao Paulo (University)
University of Technology, Dresden (University)
University of Technology, Sydney (University)
University of the West of England (University) software AG (Influencing)
UPMC/Systems Integration Services (University)
US Postal Service (Government)
USAA (Auditing)
VALTECH (Auditing)
Vanaja Kollu Matte (Auditing)
Vayda & Herzum (Auditing)
Vectant, Inc. (Contributing)
Versata (Influencing)
Vertel Corporation (Contributing)
Veterans Health Administration IT Architecture (Domain)
Vignette (Auditing)
Visionest S.p.A. (Auditing)
Visionnaire (Influencing)
Vitria Technology (Contributing)
W3 Consortium (Contributing)
Wang Healthcare Information Systems (Influencing)
Washington University (University)
Weatherhead School of Management (University)
WebGain (Contributing)
Welch Allyn Protocol Inc. (Auditing)
Whitehead/MIT Center for Genome Research (University)
Wilshire Conferences (Auditing)
Workflow Management Coalition (Domain)
Xenotrope (Influencing)
XTRADYNE Technologies AG (Platform)
Yaletown Technology Group (Influencing)
Yokogawa Electric (Auditing)
Yomi Solution Ltd (Influencing)
Zentrum fuer Graphische Datenverarbeitung e.V. (University)
Zuehlke Engineering (Auditing)
Zurich Insurance Company (Influencing)

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
« Reply #10 on: August 10, 2009, 11:43:49 am »
This is all fantasy. There is no technical detail whatsoever. I keep hearing these stories about systems that can control any computer or get any piece of information or understand any language, and it's just complete baloney.

This is not fantasy, this has been the plan for over 50 years. Why are you spreading disinformation when over 1,000 government declassified documents expose this reality? Not to mention the tens of thousands of classified documents that we are fighting to get released?

Again what gives? Do you work for Booz Allen Hamilton or something?  Why are you actively trying to censor the truth? Seems really weird.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline jofortruth

  • Member
  • *****
  • Posts: 21,787
Don't believe me. Look it up yourself!


  • Guest
« Reply #12 on: August 10, 2009, 11:49:05 am »
Internet2 is about enabling AI weapons for genocide, Full Spectrum Dominance

Middleware typically is based on one of two primary software standards: CORBA, short for Common Object Request Broker Architecture, and DDS, which is short for Data Distribution Service. “Essentially these are two ways of reaching similar but fundamentally different ways of integration between applications,” explains PrismTech’s Jennis. Both standards, he says, provide “write once, run anywhere” software capability.

Essentially middleware enables systems designers to decouple their software applications because middleware handles the semantics of how software tasks will be achieved. “Middleware lets people concentrate on their applications,” Hunt says. “Systems are amazingly complex these days.”

Net-Centric-Enterprise Architecture | CACI NCC| C2-Agility NCOIC Osterholz

A generation of integration “broker” architectures evolved that negotiated point-to-point connections, advertised limited network routing (Routing Information Protocol – RIP), and a new appreciation for Application Programming Interface (API) standards. The enabling middleware for these solutions included Object Request Brokers (ORB), Common Object Request Broker Architecture (CORBA) and standards for Interface Definition Language (IDL) software running on top of the operation systems.11

By the late 1990’s, the Object Management Group (OMG), formed a partnership of industry organizations to define a “Model Driven Architecture” (MDA). This identified the best-known specifications at the time for data exchange including CORBA, XML and SOAP.  

Benefits and effectiveness of these standards and an evolving application language (Ada 95) were published 12 and eventually incorporated with the Defense Intelligence Agency’s (DIA) Modernized Integrated Database (MIDB) program in 1998.  A series of commercial solutions offered by Oracle – relational database structure, and IONA product, “Orbix-ORB” (and now, SOA – ESB products) collaborated with DoD to enable this initiative. Eventually this initiative included the Central Imagery Office’s (CIO) Common Imagery Interoperability Facility (CIIF) as the primary imagery service used for the MIDB program. These models demonstrated effective use of distributed object management tools to produce a capability for seamless data access using CORBA, API and Ada 95.13 Many integration solutions still incorporate “legacy” enabler technology proven years ago. The ability to “wrap” older software applications allow them to appear as distributed objects. If these are Windows based, then using a Component Object Model (COM) is effective. However, if the enterprise has a decidedly heterogeneous (UNIX, NT, mainframe, etc.) platform, then CORBA is a productive distributed object standard to use.

A recent program for automated enterprise capability, Global Combat Support System – Air Force (GCSS-AF), incorporated several essential open commercial standards in their Integration Framework; CORBA, Java 2 Enterprise Edition (J2EE) and J2EE – Enterprise Java Bean (EJB).14 Similarly, the need to support common data transfer methods is fundamental to continue providing interoperability with some legacy components through use of Message Oriented Middleware (MOM) and CORBA. Data Sharing / Message Patterns  Successfully integrating messages and data across a wide community demands standards of data modeling and reference models. In the process of separating data from source systems a common mechanism to reconciling data definitions across sources essentially means an agreement on understanding.

Using existing metadata and data tagging models, it is possible to develop and share a common understanding of a single data element.  When applied universally, this approach can lead to “Smart Data“.15 A metadata repository can serve as the single reference point for maintaining rules about data services and data service requests and responses. This makes an NCC framework highly adaptive and responsive to changing environments.

Military Information Architecture Accelerator/C4ISR-AFCEA-Ptech-ILOG-GIG-NCOIC

ILOG Server     

ILOG Server is a C++ library designed to speed creation of visualization servers by aiding development of distribution and synchronization software. ILOG Server provides:

    * Modeling interface with Rational Rose and other third-party CASE vendors
    * Built-in CORBA-compliant distribution mechanism to exploit CORBA architectures
    * Sophisticated real-time synchronization mechanism to ensure consistent display across multiple operator interfaces

Offline jofortruth

  • Member
  • *****
  • Posts: 21,787
« Reply #13 on: August 10, 2009, 11:55:56 am »
U.S. Cyber Challenge: Recruiting hackers and "nerds" for government operations

Common Threat, Collective Response: Protecting Against Terrorist Attacks in a Networked World

Some Interesting Excerpts from her speech (Full Transcript above)

So therefore, more than just hardware, we need new thinking. When we add a prominent former computer hacker to our Homeland Security Advisory Council, as I just did, it helps us understand our own weaknesses that could be exploited by our adversaries.
Don't believe me. Look it up yourself!


  • Guest
« Reply #14 on: August 10, 2009, 12:05:32 pm »

Object-Oriented Language: CORBA


    * Object Database Management Group (ODMG)
    * CocoBase : Java 3-tier enterprise middleware for database access (Thought)
    * CORBA and Databases: Do you really need both? (Sean Baker)
    * CORBA Masterminds Object Management (Warren Keuffel, DBMS Mar 1997)
    * EBI work on Biological Databases using CORBA (EBI)
    * Databroker: The Future of Database Access with CORBA and JDBC (I-Kinetics)
    * Integrating Objects with RDBMs (GemStone)
    * Facts about Objects and Databases (Barry & Associates)
    * Future of Database Access with Netscape ONE, CORBA and JDBC (B. Cottman)
    * If not CocoBase, how about ODMG? (Thought Inc)
    * InterORB's One Step (InterORB Communications) (JavaIDL/JDBC/ODBC middleware)
    * Network Computing Architecture (Oracle)
    * ODB/CORBA Integration (Vahe Amirbekian)
    * OPM Data Management Tools for CORBA Compliant Environments (Anthony Kosky et al.)
    * Oracle8i JServer (Oracle)
    * Secant Extreme Persistent Object Service White Papers (Secant)
    * Universal Data Access for CORBA and Java (I-Kinetics)
    * Universal Database Access to the Enterprise (Thought Inc)
    * Other page : Object-Oriented Databases and Repositories

Pakistan Computer Emergency Response Team

The Security Standard

CA-2003-05 Multiple Vulnerabilities in Oracle Servers


    CERT Advisory CA-2003-05 Multiple Vulnerabilities in Oracle Servers

    Original release date: February 19, 2003
    Last revised: --
    Source: CERT/CC

    A complete revision history can be found at the end of this file.

    Systems Affected

    * Systems running Oracle9i Database (Release 1 and 2)
    * Systems running Oracle8i Database v 8.1.7
    * Systems running Oracle8 Database v 8.0.6
    * Systems running Oracle9i Application Server (Release 9.0.2 and 9.0.3)


    Multiple vulnerabilities exist in Oracle software that may lead to
    execution of arbitrary code; the ability to read, modify, or delete
    information stored in underlying Oracle databases; or denial of
    service. All of these vulnerabilites were discovered by Next
    Generation Security Software Ltd.

    I. Description

    Multiple vulnerabilities exist in Oracle9i Application Server,
    Oracle9i Database, and Oracle8i Database. The majority of these
    vulnerabilities are buffer overflows.

    Oracle has published Security Alerts describing these vulnerabilities.
    If you use Oracle products listed in the "Systems Affected" section of
    this document, we strongly encourage you to review the following
    Oracle Security Alerts and apply patches as appropriate:

    * Buffer Overflow in DIRECTORY parameter of Oracle9i Database Server

    * Buffer Overflow in TZ_OFFSET function of Oracle9i Database Server

    * Buffer Overflow in TO_TIMESTAMP_TZ function of Oracle9i Database Server

    * Buffer Overflow in ORACLE.EXE binary of Oracle9i Database Server

    * Two Vulnerabilities in Oracle9i Application Server

    NGSSoftware Insight Security Research Advisories describing these
    issues are listed below:

    * Oracle9i Application Server Format String Vulnerability

    * Oracle TO_TIMESTAMP_TZ Remote System Buffer Overrun

    * ORACLE bfilename function buffer overflow vulnerability

    * Oracle TZ_OFFSET Remote System Buffer Overrun

    * Oracle unauthenticated remote system compromise

    The CERT/CC has published vulnerability notes for each of these issues
    as well. The vulnerability in Oracle's mod_dav module (VU#849993) has
    been as assigned CVE ID CAN-2002-0842.

    II. Impact

    Depending on the vulnerability being exploited, an attacker may be
    able to execute arbitrary code; read, modify, or delete information
    stored in underlying Oracle databases; or cause a denial of service.
    The vulnerabilities in "ORACLE.EXE" (VU#953746) and the WebDAV modules
    (VU#849993, VU#511194) may be exploited prior to authentication.

    III. Solution

    Apply a patch

    Solutions for specific vulnerabilities can be found in the above
    referenced Oracle Security Alerts, NGSSoftware Insight Security
    Research Advisories, and individual CERT/CC Vulnerability Notes.

    Mitigation Strategies

    Until a patch can be applied, the CERT/CC recommends that vulnerable

    * disable unnecessary Oracle services
    * run Oracle services with the least privilege
    * restrict network access to Oracle services

    Appendix A. Vendor Information

    This appendix contains information provided by vendors. When vendors
    report new information, this section is updated and the changes are
    noted in the revision history. If a vendor is not listed below, we
    have not received their comments.

    Oracle Corporation

    Please see the following Oracle Security Alerts:


    Appendix B. References


    The CERT/CC acknowledges both Next Generation Security Software Ltd.
    and Oracle for providing information upon which this document is

    Feedback can be directed to the author: Ian A. Finlay.

    This document is available from:

    CERT/CC Contact Information

    Email: [email protected]
    Phone: +1 412-268-7090 (24-hour hotline)
    Fax: +1 412-268-6989
    Postal address:
    CERT Coordination Center
    Software Engineering Institute
    Carnegie Mellon University
    Pittsburgh PA 15213-3890

    CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
    EDT(GMT-4) Monday through Friday; they are on call for emergencies
    during other hours, on U.S. holidays, and on weekends.

    Using encryption

    We strongly urge you to encrypt sensitive information sent by email.
    Our public PGP key is available from

    If you prefer to use DES, please call the CERT hotline for more

    Getting security information

    CERT publications and other security information are available from
    our web site

    To subscribe to the CERT mailing list for advisories and bulletins,
    send email to [email protected]. Please include in the body of your

    subscribe cert-advisory

    * "CERT" and "CERT Coordination Center" are registered in the U.S.
    Patent and Trademark Office.

    Any material furnished by Carnegie Mellon University and the Software
    Engineering Institute is furnished on an "as is" basis. Carnegie
    Mellon University makes no warranties of any kind, either expressed or
    implied as to any matter including, but not limited to, warranty of
    fitness for a particular purpose or merchantability, exclusivity or
    results obtained from use of the material. Carnegie Mellon University
    does not make any warranty of any kind with respect to freedom from
    patent, trademark, or copyright infringement.

    Conditions for use, disclaimers, and sponsorship information

    Copyright 2003 Carnegie Mellon University.

    Revision History
    February 19, 2003: Initial release

    Version: PGP 6.5.8

    -----END PGP SIGNATURE-----

All rights reserved. Copyright© PakCERT 2000-2008

Oracle has made a significant strategic commitment to Java and is providing client side programmatic interfaces, namely JDBC driver and SQLJ, as well as a Java VM that is tightly integrated with Oracle8i server. Oracle8I Java and Unicode support enable the development and deployment of multilingual Java applications worldwide.

In this paper, we give an overview of the Java components and database configurations required for multilingual Java application deployment. Oracle JDBC and SQLJ products provide globalization support across all tiers. In the Oracle8i server tier this also includes the Java stored procedures and distributed Java components running on the Java VM. We also demonstrate through a comprehensive example how to develop and deploy multilingual Java applications in an Oracle8i environment. Oracle8i transparently supports Java globalization, fully leveraging existing Java expertise, infrastructure and code.

Oracle8i Enterprise JavaBeans and CORBA Developer's Guide

Release 2 (8.1.6)

Developing CORBA Applications

This chapter describes how to develop CORBA applications for Oracle8i. CORBA is a powerful distributed application development architecture. Although it is a powerful tool, you can still start to develop useful applications quickly, using Oracle8i CORBA. The emphasis in this chapter is practical, not conceptual. The first few sections of this chapter present the conceptual basis for CORBA application development.

This chapter is based on examples, showing you how to use Oracle8i CORBA by developing examples--from the simple to the slightly more complex. You can expand these examples into full-fledged applications for your enterprise.

This chapter covers the following topics:

    * Terminology

    * About CORBA

    * A First CORBA Application

    * Locating Objects

    * Activating ORBs and Server Objects

    * Using SQLJ

    * Migrating from JDK 1.1 to Java 2

    * CORBA Callbacks

    * Using the CORBA Tie Mechanism

    * Interoperability with non-Oracle ORBs

    * Debugging Techniques

    * For More Information


This section defines some of the basic terms used in this chapter. See also Appendix D, "Abbreviations and Acronyms" for a list of common acronyms used in Java and distributed object computing.

A client is an object, an application, or an applet that makes a request of a server object. Remember that a client need not be a Java application running on a workstation or a network computer, nor an applet downloaded by a web browser. A server object can be a client of another server object. "Client" refers to a role in a requestor/server relationship, not to a physical location or a type of computer system.

In distributed object computing, marshalling refers to the process by which the ORB passes requests and data between clients and server objects.
object adapter

Each CORBA ORB implements an object adapter (OA), which is the interface between the ORB and the message-passing objects. CORBA 2.0 specifies that a basic object adapter (BOA) must exist, but most of the details of its interface are left up to individual CORBA vendors. Future CORBA standards will require a vendor-neutral portable object adapter (POA). Oracle intends to support a POA in a future release.

A request is a method invocation. Other names sometimes used in its stead are method call and message.
server object

A CORBA server object is a Java object activated by the server, typically on a first request from a client.

A session always means a database session. Although it is conceptually the same kind of session as that established when a tool such as SQL*Plus connects to Oracle, there are differences in the CORBA case, as follows:

    * You establish the database session using the IIOP protocol; you establish a SQL*Plus session using the Net8 TTC protocol.

    * A Java virtual machine (JVM) that runs in the database server controls an IIOP session.


      To use CORBA with Oracle8i, you must configure the database so that the listener can recognize incoming IIOP requests, in addition to TTC requests. DBAs and system administrators should see the "Configuring CORBA and EJB in JServer" for information on setting up the database and the listener to accept incoming IIOP requests. 

See Chapter 4, "Connections and Security", for more information about sessions.

This section provides a short introduction to CORBA, and should give you some idea of how you typically use CORBA in the Oracle8i server environment. Providing a complete introduction to CORBA is beyond the scope of this Guide. See the references in "For More Information" for suggested further reading. This first section gives a very high-level overview of CORBA itself.

CORBA stands for Common Object Request Broker Architecture. What is common about CORBA is that it integrates ideas from several of the original proposers. CORBA did not just follow the lead of a single large corporation, and it is very deliberately vendor neutral. The CORBA architecture specifies a software component, a broker, that mediates and directs requests to objects that are distributed across a network (or several networks), which might have been written in a different language from that of the requestor, and which might be (and in fact, usually are) running on a completely different hardware architecture from that of the requestor.

You can begin to get an idea of the tremendous advantages of CORBA from the preceding paragraph. CORBA enables your application to tie together components from various sources. Also, and unlike a typical client/server application, a CORBA application is not inherently synchronous. It is not necessarily typical that a CORBA requestor (a client) invokes a method on a server component and waits for a result. Using asynchronous method invocations, event interfaces and callbacks from server object to the client ORB, you can construct elaborate applications that link together many interacting objects and that access one or many data sources and other resources under transactional control. CORBA enables you to go beyond the bounds of the traditional client/server application in many imaginative ways.
CORBA Features

CORBA achieves its flexibility in several ways:

    * It specifies an interface description language (IDL) that allows you to specify the interfaces to objects. IDL object interfaces describe, among other things:

          o The data that the object makes public.

          o The operations that the object can respond to, including the complete signature of the operation. CORBA operations map to Java methods, and the IDL operation parameter types map to Java datatypes.

          o Exceptions that the object can throw. IDL exceptions also map to Java exceptions, and the mapping is very direct.

            CORBA provides bindings for many languages, including both non-object languages such as COBOL and C, and object-oriented languages such as Smalltalk and Java.
    * All CORBA implementations provide an object request broker (ORB), that handles the routing of object requests in a way that is largely transparent to the application developer. For example, requests (method invocations) on remote objects that appear in the client code look just like local method invocations. The remote call functionality, including marshalling of parameter and return data, is performed for the programmer by the ORB.

    * CORBA specifies a network protocol, the Internet Inter-ORB Protocol (IIOP), that provides for transmission of ORB requests and data over a widely-available transport protocol: TCP/IP, the Internet standard.

    * A set of fully-specified services eases the burden of application development by making it unnecessary for the developer to constantly reinvent the wheel. Among these services are:

          o Naming. One or more services that let you resolve names that are bound to CORBA server objects.

          o Transactions. Services that let you manage transaction control of data resources in a flexible and portable way.

          o Events.

      CORBA specifies over 12 services. Most of these are not yet implemented by CORBA ORB vendors.

The remainder of this section introduces some of the essential building blocks of an Oracle8i JServer CORBA application. These include:

    * the ORB--how to talk to remote objects

    * IDL--how to write a portable interface

    * the naming service (and JNDI)--how to locate a persistent object

    * object adapters--how to register a transient object


      The Java code examples in this chapter are available on line. You can study the complete examples (see Appendix A, "Example Code: CORBA"), compile and run them, and then modify them for your own use. All examples are installed in the $ORACLE_HOME/javavm/demo/ file. 

About the ORB

The object request broker, or ORB, is the fundamental part of a CORBA implementation. The ORB makes it possible for a client to send messages to a server, and the server to return values to the client. The ORB handles all communication between a client and a server object.

The JServer ORB is based on code from Inprise's VisiBroker 3.4 for Java. The ORB that executes on the server side has been slightly modified from the VisiBroker code, to accommodate the different Oracle8i object location and activation model. The client-side ORB has been changed very little.

In some CORBA implementations, the application programmer and the server object developer must be aware of the details of how the ORB is activated on the client and the server, and they must include code in their objects to start up the ORBs and activate objects. The Oracle8i ORB, on the other hand, makes these details largely transparent to the application developer. As you will see from the Java code examples later in this chapter and in Appendix A, only in certain circumstances does the developer need to control the ORB directly. These occur, for example, when coding callback mechanisms, or when there is a need to register transient objects with the basic object adapter.
The Interface Definition Language (IDL)

One of the key factors in the success of CORBA is language independence. CORBA objects written in one language can send requests to objects implemented in a different language. Objects implemented in an object-oriented language such as Java or Smalltalk can talk to objects written in C or COBOL, and the converse .

Language independence is achieved through the use of a specification meta-language that defines the interfaces that an object (or a piece of legacy code wrappered to look like an object) presents to the outside world. As in any object-oriented system, a CORBA object can have its own private data and its own private methods. The specification of the public data and methods is the interface that the object presents to the outside world.

IDL is the language that CORBA uses to specify its objects. You do not write procedural code in IDL--its only use is to specify data, methods, and exceptions.

Each CORBA vendor supplies a compiler that translates IDL specifications into language code. Oracle8i JServer uses the idl2java compiler from Inprise (see "Miscellaneous Tools"). The idl2java compiler translates your IDL interface specifications into Java classes, which are compiled by the Java compiler into byte codes to be loaded into the Oracle8i database for execution.


  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #15 on: August 10, 2009, 01:57:39 pm »

IBM Smells Blood in Database Fight


By Mark D. Uehling

Sept. 9, 2002 | Database die-hards may not be trash-talking professional wrestlers, but they're close.

"We can perform better getting access to Oracle data than Oracle can," says Bill Wong, director of DB2 for Linux and life sciences at IBM Corp. "We have never lost to IBM at a large client since the life sciences started," replies Vijay Pillai, Oracle Corp.'s principal product manager for life science server technology.

One of the most vexing questions for research-oriented customers is sorting out which database is best in this proteomic age. IBM and Oracle have been butting heads in databases for years. What's new is that, despite being an unofficial standard in the pharmaceutical industry, Oracle now seems vulnerable in the life sciences. Consultants who work with both companies say IBM has informatic and human capital specific to the life sciences that could eventually force Oracle to play a less prominent role.

"IBM has basically caught Oracle in market share," says Herb Edelstein, president of Two Crows Corp., a database consulting firm with major life science clients. "The whole database business has shifted from being a system sale, governed by IT folks, to an end user sale, governed by the consumers of the data. The techniques that work so well for building a data warehouse of market and product information don't necessarily translate to a genomics or proteomics database."

IBM on the Move

Edelstein praises DiscoveryLink, IBM middleware that allows users to query heterogeneous databases all over the world. There are now more than a dozen software wrappers that allow information in a variety of files or formats -- whether BLAST, SQL Server, Oracle, Informix, Excel spreadsheets, Sybase, Documentum or flat files -- to be searched via a single DiscoveryLink query. Says Edelstein: "What DiscoveryLink is trying to do is solve a business problem that is very difficult and that no company concerned with building drugs can or should be solving for themselves."

Such comments puzzle Oracle's Pillai. For him, DiscoveryLink is old wine in new bottles. "I thought a few years ago [DiscoveryLink] was going to be a big threat," Pillai says. "Then I looked under the covers." What he found, he says, was more or less Relational Connect, a paleolithic database migration package from IBM that is roughly comparable to Oracle's Gateway software. "If you want to query four databases around the world and make it look transparent, Oracle has that capability today," says Pillai.

As the man who managed the Celera Genomics account at Oracle for three years, Pillai is intimately familiar with some of the most monumental scientific databases ever created. He says most researchers don't need to manipulate such mammoth files on a regular basis, or query multiple uniquely structured databases at the same time -- a "federated" database approach. "If I am trying to do a cross-species analysis, trying to find where each gene is expressed or not expressed in each of those species, those kinds of things cannot be done using a federated environment," Pillai says.

A 'Consolidated' Environment?

But at a June meeting in Cambridge, Mass., sponsored by the Whitehead Institute Center for Genome Research and Hewlett-Packard Co., Pillai had a different emphasis. He was skeptical of the trend toward proliferating databases. "We see more and more databases. Every drug has its own database," Pillai says. "It may be good from a license standpoint, but it's not good for your environment. You have to use [the database] the way it was supposed to be used. There may be problems with performance. We are trying to move our customers to a more consolidated environment."

Pillai declined to elaborate, but IBM is delighted to interpret. IBM contends some Oracle customers are aghast that the company is recommending they move all of their data into one Oracle database. When slow performance is an issue, some are apparently told to manually partition large Oracle databases into smaller, more easily queried subcomponents. "The way that Oracle is telling customers to do it is unacceptable," says IBM's Wong. "We're not going to insist that you put everything together into one database."

When it comes to using multiple databases, Structural Bioinformatics Inc. is a case study. CEO Ed Maggio is developing drugs, but he can rattle off a variety of company databases licensed to biotech and pharmaceutical rivals. All are gargantuan repositories of computer-generated and experimentally verified structural data about proteins. His company maintains its data on both DB2 and Oracle 8 platforms. IBM has invested in his company, but he speaks highly of both companies.

Still, Maggio believes IBM has an edge. "There is no way you can require literally thousands of users to adhere to a single standard for storing information and retrieving it," he says. "What IBM has recognized is that people are going to generate and store data, and they're going to do it in a variety of ways. What's really important is the ability to integrate the use of this data. That's where the power resides. It isn't going to happen by forcing people to basically homogenize their database."

The aversion to proprietary formats is shared at the Biomolecular Interaction Network Database (BIND). That massive, public proteomics database is run by Chris Hogue, senior scientist at Toronto's Samuel Lunenfeld Research Institute. BIND is at the frontier of current databases: It will have 30 or 40GB online by year's end, primarily of protein-protein interactions and small molecule structures, all exported in XML or ASM.1 formats.

Hogue says he could have built the BIND database using DB2 or Oracle. When in 2000 he made the decision to use DB2, it looked like Oracle would scale to 8 Linux boxes. Hogue was planning to use more than 100. "There's a huge difference in performance," he says. "We went with DB2 because it would cluster on all 108 machines on my system. DB2 has always been cluster-enabled. Oracle is kind of a retrofit."

The Oracle Standard

Which is not to say Oracle customers are unhappy. Bob Bradish is senior database administrator at AstraZeneca Group. He has big genomic databases on Oracle, and they're running fine, thanks. Oracle is his company's official standard. "We are to use Oracle for any new or existing application unless that application or product we're purchasing requires a very specific database that cannot run on Oracle," Bradish says.

AstraZeneca does support DB2, but any meaningful migration away from Oracle is almost unthinkable. "Once you get a database in, even a small database, it is very difficult to shift to another database, especially when you have an application that is running fine," says Bradish. "You can't get your user groups to buy in and pay for a conversion."

So the question is not whether Oracle databases will be ripped out. It's whether Oracle will continue to be the star at the center of the bioinformatic universe or whether it will have to share more of the glory. What scientists demand could be key. If researchers insist on Oracle-friendly analytical software tools from companies like MDL Information Systems Inc., Tripos Inc., Accelrys Inc., and Daylight Chemical Information Systems Inc., even small biotech firms will choose Oracle and feel in sync with Big Pharma peers. If scientists must access multiple databases routinely, however, DB2 could continue to expand its market share at Oracle's expense.

Either way, IBM may spot key developments first. Database users and consultants often cite IBM's life science staff, heavily sprinkled with Ph.D.s, as a reason to feel more comfortable with DB2 in the years ahead. That talent could allow IBM to be more closely attuned to what scientists require. "My impression is that IBM has made a larger and more organized investment in life sciences, and that Oracle is revving up," notes Richard Winter, president of Winter Corp., a specialist in jumbo-sized databases. "It's an important question to ask: Who has more focus on the market, and who is investing more resources in anticipating needs?"

Sidebar: Life Left in Those Other Databases

Oracle and IBM are not the only game in life sciences databases. Glaxo Wellcome and Wyeth use Sybase, for example, to manage marketing and sales tasks. MySQL has a certain following as well. As a graduate student, in a day, Harvard University's Chris Dagdigian loaded Swissprot into a MySQL database, which is in use today at Harvard's Bauer Center for Genomic Research.

Indeed, the demands of very large databases --especially with mushrooming genomic data -- mean there is room for new ideas in the field. "There is an opportunity for someone to do something different here," says Mike Swenson, a life sciences analyst at IDC.

At the Winter Corp., consultant Richard Winter notes that there is another company that bears watching, even if its life science strategy has yet to be articulated formally. "Microsoft is a huge factor in the database space," he says. "But at this point it is mostly mid- to low-end applications that are implemented on SQL Server. They have been strengthening SQL Server. They're investing at a substantial pace. I believe there are soon will be announcements from HP or other players for very large, robust platforms for SQL Server. It will give Oracle and IBM a run for their money in the mid range."

One win for Microsoft is an Israeli company Rosetta Genomics, which does genomics data analysis. Using off-the-shelf- dual processor Dell Servers and SQL Server, Rosetta plans to build a 10 terabyte database within a year.


  • Guest

What is ChemBank?

ChemBank is a public, web-based informatics environment created by the Broad Institute's Chemical Biology Program and funded in large part by the National Cancer Institute's Initiative for Chemical Genetics (ICG). This knowledge environment includes freely available data derived from small molecules and small-molecule screens, and resources for studying the data so that biological and medical insights can be gained. ChemBank is intended to guide chemists synthesizing novel compounds or libraries, to assist biologists searching for small molecules that perturb specific biological pathways, and to catalyze the process by which drug hunters discover new and effective medicines.

ChemBank stores an increasingly varied set of cell measurements derived from, among other biological objects, cell lines treated with small molecules. Analysis tools are available and are being developed that allow the relationships between cell states, cell measurements and small molecules to be determined. Currently, ChemBank stores information on hundreds of thousands of small molecules and hundreds of biomedically relevant assays that have been performed at the ICG in collaborations involving biomedical researchers worldwide. These scientists have agreed to perform their experiments in an open data-sharing environment.

The goals of ChemBank are to provide life scientists unfettered access to biomedically relevant data and tools heretofore available almost exclusively in the private sector. We intend for ChemBank to be a planning and discovery tool for chemists, biologists, and drug hunters anywhere, with the only necessities being a computer, access to the Internet, and a desire to extract knowledge from public experiments whose greatest value is likely to reside in their collective sum.

Chemical Biology Program

The Chemical Biology Program comprises researchers in our community with interests in human biology and disease. These researchers study and alter the physiology of cells and organisms with small molecules. Small molecules are used in living systems to convey dynamic information (as distinct from heritable information), e.g., hormones and neurotransmitters, and they are used in medicine, e.g., antibiotics and cholesterol-lowering statins, for the treatment of human disorders. Chemical biology is the science of small molecules in the context of living systems, and so it connects to the study of memory and cognition, sensing and signaling, and the understanding and modulation of cell circuitry with the goal of treating disease. The Chemical Biology Program collaborates with many facets of genome biology at the Broad Institute. A central tenet at the Broad is that integrating chemical biology and genome biology will shine a bright light on human biology and provide powerful new means to create novel therapeutics to treat human disorders that would be impossible to uncover otherwise.

The Program's major scientific aspirations fall within several project areas, which include:

Regenerative medicine

Many diseases of cellular deficiency, Parkinson's Disease (dopaminergic neurons) and type-1 diabetes (pancreatic beta cells) for example, lack effective therapies. By screening primary human cells and tissues, such as pancreatic islets from organ donors, the Chemical Biology Program is exploring the possibility that small molecules can be discovered that induce the reprogramming of cells in vivo and thereby regenerate the cells and tissues deficient in disease. These studies are supported in part by the NIDDK and the Juvenile Diabetes Research Foundation (JDRF).

Cancer therapeutics

Human cancers have specific molecular dependencies ("oncogene addiction"). Some tumors are populated by tumor-initiating cells ("cancer stem cells"). Metastasis of tumor cells appears to be dependent on signals from the tumor's (non-cancerous) microenvironment. The Chemical Biology Program is exploring means to discover small molecules that modulate cancer dependencies, cancer stem cells, and the tumor microenvironment in order to achieve tumor debulking and to prevent the occurrence of tumor relapse and metastasis, respectively. These studies are supported in part by the NCI's Initiative for Chemical Genetics and the Starr Cancer Consortium.


Chromatin marks define chromatin states and chromatin states have been found to correlate with cell states. The Chemical Biology Program is discovering small molecules that target chromatin-modifying enzymes and thereby alter chromatin marks. This approach aims to achieve an alteration of cell states by targeting the epigenome and thus aims to explore the role of epigenetic therapy in the future. These studies are supported in part by the NIGMS and the HHMI.

Computational chemical biology

Powerful data-analysis methods and tools are needed to realize the full potential of small molecules in biology and medicine. These methods include calculating similarities and differences between small-molecule structures and recognizing patterns of small-molecule activity in biological assays. In collaboration with the Chemical Biology Platform, the Chemical Biology Program is developing the public small-molecule structure and screening database and analysis environment ChemBank. These studies are supported in part by the NCI's Initiative for Chemical Genetics.

Diversity-oriented synthesis

In collaboration with the Chemical Biology Platform, the Chemical Biology Program is identifying the principles that underlie diversity-oriented synthesis (DOS) and piloting new DOS pathways. Diversity synthesis is used to achieve a complete synthesis of an optimal small-molecule screening collection; the features that define this collection are discussed in the chemistry activities of the Chemical Biology Platform. These studies are supported in part by the NIGMS's Center of Excellence in Chemical Methodology and Library Development (CMLD).

Initiative for Chemical Genetics

The National Cancer Institute's Initiative for Chemical Genetics (ICG) was established in 2002 in order to discover and develop small-molecule probes to impact cancer research and treatment, and to build an academic community around this mission through outreach and data sharing. The ICG works with the cancer community nationwide to define innovative and impacting projects and provides the necessary capabilities in screening, chemistry, and informatics. Examples include small-molecule discovery efforts aimed at targeting the: 1) processes upon which tumors are dependent, 2) tumor-initiating cells ("cancer stem cells") that populate tumors, and 3) elements of the tumor microenvironment that promote metastasis. Small-molecule structures and screening data derived from the ICG and tools to analyze these data are available through the public database ChemBank.

The ICG is a program of the National Cancer Institute's Office of Chemical Genomics (OCG). Dr. Daniela Gerhard is the Director of OCG and serves as the Program Manager for the ICG. The ICG is contracted through Science Applications International Corporation (SAIC).

Offline ramallamamama

  • Member
  • *****
  • Posts: 1,110
  • Nobody's Slave
Good work, AI and Sane. They are so friggin busted.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Good work, AI and Sane. They are so friggin busted.

This is all preperation for the next false flag when the left/right paradigm completely crumbles. Anyone fighting to wake people up about the left/right facade needs to also know about this planned false flag.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately


  • Guest
 :o  How did I never hear of GWB being connected to Jr's death!    :o  :-[

I always thought something wasn't right about that accident.

I predict it will be a late night for me!  :-[


  • Guest

Excerpt 1st pages of above PDF (must see document)

Who is this mass murder eugenics company Daylight as referenced in the OP? (btw look into the names to see if you can find connections to higher level NWO psychopaths).  See the link for additional embedded info/diagrams, etc.

About Daylight

Daylight provides enterprise-level cheminformatics software technologies to life science companies. Our superior chemistry, high performance, and open architecture have earned Daylight a reputation for delivering the state-of-the-art in chemical information processing since 1987.

Daylight Chemical Information Systems, Inc. is a privately held company with corporate offices in Aliso Viejo, CA and research offices in Santa Fe, NM and Cambridge, England.

Leadership Team

    * Yosef Taitz, President and CEO
      Corporate Office; Aliso Viejo, CA

    * David Weininger, PhD, Board Member
      US Research Office

    * John J Delany, PhD, Chief Technical Officer
      US Research Office

    * Terence Brunck, PhD, Sr. Vice-President Research & Development
      US Research Office

    * Paul Ferraiolo, Vice-President Content Integration
      US Research Office
Products Overview

Daylight provides cheminformatics toolkits, applications, web services, and database systems that are infinitely customizable to accommodate the needs of a wide variety of specialized scientific applications. Specific tools can be used to add new capabilities to an existing environment, or combined to build a comprehensive chemical information system. Our software offers an open architecture to allow it to seamlessly integrate new components and methods with products from other leading life science software vendors. Our goal is to provide our customers with the tools to easily assemble a chemical information infrastructure to their own set of requirements, thereby achieving efficiency and competitive advantage.

Database Systems
DayCart® is a fully integrated set of tools that extends Oracle® clients and servers with chemical intelligence and ability.

THOR-Merlin is a database system designed to store and retrieve chemical information in a efficient, rational, and convenient manner.

Daylight's chemistry applications can be run independently as command line applications, or can be integrated into DayCart®.

    * Properties Package
    * Clustering Package
    * PCModels
    * Printing Package
    * Conversion Package

Web Services
Daylight Web Services deliver network access to a series of chemistry-oriented programs based upon many of the Daylight application and toolkit features.

Daylight toolkits provide an object-oriented programming library used to deliver cheminformatics capabilities to in-house applications.

    * Daylight Toolkit Package
    * THOR-Merlin Toolkit

Daylight Wrappers eliminate the need to to be a C-programmer in order to access the chemical information processing functionality of Daylight software. These threadsafe wrappers allow programmers to use object-oriented languages like Java and C++ to easily interface with the Daylight Toolkit Package library.

Daylight distributes selected database content in SMILESTM format.

    * ACD
    * MedChem
    * WDI

Since 1987, Daylight researchers and users have been leaders in the development of cheminformatics. Our archive of user group presentations, white papers, tutorials, and other materials is a record of the many contributions and advancements Daylight has made in this field.

    * Chemical Information Systems - General introduction to and history of cheminformatics

    * SMILESTM - General introduction to the language

    * Daylight Theory Manual (pdf) - Covering general information on representing molecules and an in-depth discussion of SMILESTM, SMARTS®, SMIRKS®, fingerprints, THOR database concepts, and Merlin analysis

    * Tutorials - Series of tutorials designed as an introduction to all three chemical languages, database exploration and Daylight toolkit programming

    * Case Studies - Descriptions of DayCart® integration and use

    * Meeting Archives - Presentations and notes from MUG, EuroMUG, and Summer School meetings

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #21 on: August 10, 2009, 03:53:50 pm »
Sane, are you saying Taitz was the first (or one of the first) to expose the reason/theory behind JFK Jr's death?

Fyi, here's a link to the documentary film "The Assassination Of JFK Junior - Murder By Manchurian Candidate" by John Hankey. The film points to GWB being the prime suspect:

That was an incredible documentary -thanks for the link. I was bought into the 'irresponsible rich kid' legend... hadn't thought about it until this video. Amazing.. makes me sad to think that we might have had him for president instead of W.  Well, it's all sad.. way back to his father. Was that when we were officially hijacked? The banks were there before; but maybe that was the 'straw' that made the shadow government's place, and gave us all the subsequent "f**king stupid" puppets.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40


  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #22 on: August 10, 2009, 04:08:35 pm »
Hey guys,

Is there a more effective way to download these compilations, rather than copy posting everything?  

I don't think it is too late yet to put a icon in here for a one click icon.(if there is such a thing)  So we can seed this stuff.   This needs to be disseminated immediately!!

Add on:  
Is Lawyer Orly Taitz a strawman?

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #23 on: August 10, 2009, 04:15:20 pm »
Hey guys,

Is there a more effective way to download these compilations, rather than copy posting everything?  

I don't think it is too late yet to put a icon in here for a one click icon.(if there is such a thing)  So we can seed this stuff.   This needs to be disseminated immediately!!

Add on:  
Is Lawyer Orly Taitz a strawman?

There are compilation torrents for downloading. check with AI on that. The induction series is a minimum requirement. Taits is assisting the NWO distraction campaign whether she knows it or not, but also helping people to wake up how insane their misinfo tactics are.  RIght now because the elite are so mistrusted, anything they do shines more light on how fricking psychopathic they are. Sun Tzu...use their weapons against them. As far as birth issue (which has nothing to do with this thread, please post future references to her elsewhere), trust Berg (who was on the AJ show a few times) and pp forum member Protean. thanks
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately


  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #24 on: August 10, 2009, 07:22:06 pm »
The National Cancer Institute mentioned above is another bio-weapons laboratory front.  According to Michael Riconosciuto himself, in 1971 under Nixon, A LARGE PART OF THE ARMY'S BIOLOGICAL WARFARE UNIT WAS TRANSFERRED to the NCI!

H1N1 will be spread by forced vaccines to target groups just like AIDS was

That with the post by rammalla (sp) regarding True Ott. and Dr Taitz HAARP and AI Ptech.  I have said it before we are reaching critical mass.

On Sane's post, Same Shit Different Decade!

Flyer targeting a specific demographic:

Did the experimental hepatitis B vaccine cause AIDS in the 1980s?


"August 11, 1991

It has occurred to me, sitting here over the past five minutes, thinking how to begin this letter, because there are so many varies, yet relevant, avenues to explore.  So, perhaps it will be best to begin with my own preoccupations... concerns which drive to the heart of democratic principles presumably engendered within our Democratic Republic.

Our great Democratic Republic is under assault by incredible forces of power mongering elitists, driven by coalitions of extreme personal wealth and various institutions.

My own personal pre-occupation of certain 'institutionalisms' has been following the unbelievable course of  "AIDS" it germinated from mere rumors and whisperings within select communities most devastated; as conscious appeals were made to those persons most disenfranchised, who unwittingly gave themselves over to freely participate in a noble cause so that, ostensibly, a vaccine for Hepatitis-B could be developed.

For them, for those persons who so generously gave of their trust, that noble cause was to become their own hellish nightmare of duplicity, deceit, lies and ongoing cover-ups.

In 1978 [and] 1979, in New York and New Jersey, government sponsored campaigns began to enlist those persons, only young males, from gay communities to donate their blood.  They were told that their blood was needed so that a vaccine against Hepatitis-B could be developed.

Only highly sexually active young males, those who admitted to having many sexual partners, were chosen to participate....which seems medically inappropriate at best given that those who have many sexual partners will tend to have had more sexually (and other) transmitted diseases (statistically inferred).  From the very initial stages of those Hepatitis-B vaccine trials there were tainted and very poor medical parameters/procedures/guidelines.

In 1978 [and] 1979, in New York and New Jersey, immediately medical doctors began to tabulate many deaths; so many deaths of such young men who otherwise would be in the prime years of physical health.  Finally those doctors began to hear from one another, and they knew that they were witnessing the 'outbreak' of an unprecedented epidemic in young men.  In fact some medical doctors were already then calling `pandemic' in its apparent scope and immediacy.

Several years later, as those Hepatitis-B vaccine trials moved on to other cities, on to San Francisco and Los Angeles, targeting those areas which had hard-won political inroads into the mainstream, so likewise moved the most curious and highly suspect epidemiology.  Most contagious diseases, no matter the manner of transmission, do not move so neatly, jumping `cross country' and targeting young males aged 20 to 40.

In San Francisco and Los Angeles there were even companies which would pay fairly substantial sums of money to those gay males to sell their blood (upwards to $50 per visit).... but those ADVERTISED appeals were to be only seen in gay oriented community papers....those ads were NEVER to be seen in mainstream newspapers soliciting heterosexually active donors.

Even after medical doctors had tabulated and confirmed that deaths of young gay males in New York and New Jersey, notably after 1978, early in 1979, which medically inferred that a horrendous "outbreak" of some sort had started, the NEW YORK TIMES did not deem that newsworthy for over TWO YEARS!  Now, the revisionists constantly print that the CDC identified "AIDS" (resulting from some weird virus).  In 1981-- which infers that "AIDS" began in 1981, but which totally avoids medical doctors diagnosing the epidemic in 1979 and 1979 from data available in New York and New Jersey.

Time and time again you will read in the newspapers various articles which point to the CDC revelation of 1981.  This has been intentionally done to obscure the obvious medical relevance of the beginnings of those Hepatitis-B vaccine trials and the state of "AIDS" and various issues of diseases (here is the United States), which was 1978 and 1979.

This information is not idle speculation, it can be confirmed from a host of varies sources, notably the magnum opus, the book aptly titled "AIDS AND THE DOCTORS OF DEATH" by Dr. Alan Cantwell, MC, who practices at Long Beach Memorial Hospital, underscores the awesome relevancy of those Hepatitis-B vaccine trials.  "AIDS" and various issues of diseases, starting in New York and New Jersey in 1978 and 1979.

The very title, "AIDS AND THE DOCTORS OF DEATH" is a direct indictment, an incredibly powerful accusation against the medical community at large, a scoring attack against the AMA [American Medical Association] which has allowed itself to get in bed with politicos who have extraordinary vicious,  hidden agendas which are being implemented right and left all over the fact of America today.

The extent of "AIDS" as poor science, or as intentionally lacking of proper scientific procedures, has been so massive as to implicate "AIDS" "science" to the extraordinary scientific delusions of Lysenkoism (the debunked theory of genetic transmission of applied characteristics).  If not as massive as Lysenkoism, certainly it is just as POLITICALLY engendered, and perhaps even more ominous in that it has sustained such support without virtue of any real identifiable theory.

The theories of "AIDS" origination are fairly obviously POLITICALLY motivated.  At the beginning, the accusatory nature of academicians of science was extraordinary as they constantly sought to identify a sexual preference as the immediate cause of "AIDS".  That is, that somehow "AIDS" had resulted from over sexual activity of those homosexually active.  Drugs and booze and all sorts of other abuses were being focused upon.

Then "AIDS" was theorized as being caused by mutant microbes intent in the African greenback monkey; which provided a nifty obscuring of various relevant information which directly implicates species cross-over from cattle.  Nevertheless, origins from deepest, darkest Africa got constant media play for many years -- radio, TV, magazines, newspapers, special printings, etc.

A most telling mark of "AIDS" is still being well hidden, variously obscured, because it threatens to topple all of the non-sense, non science that "AIDS" has become as a result of POLITICAL machinations.  That most telling mark has been the species cross-over from cattle and sheep, as CRYPTOPORIDIOSIS.  Prior to "AIDS" inoculations and various issues of diseases, crypotosporidiosis was a very rare cattle affliction which causes relentless diarrhea.

Subsequent to those Hepatitis-B vaccine trials, which were only tried on young gay males, cryptosporidiosis was being diagnosed in those same young gay males, and their sexual partners.  Cryptosporidiosis, which causes relentless diarrhea, is the result of cryptosporidium microbes.  Very few authors will even publicly discuss the awesome medical ramifications of cryptosporidiosis!

Randy Shilts did attempt to bring that information to the public, but for various reasons he chooses NOT to mention that cryptosporidiosis was being diagnosed in 1978 and 1979 in New York and New Jersey; so perhaps for "preservation" Shilts chooses to obscure that data by telling the public, at least, that the only way to have proper diagnoses of cryptosporidium was to have the ARMY take care of it.  Read the book, "AND THE BAND PLAYED ON" and you will see the clues he provides, anyway, and how he strangely words things about cattle.

There is no known cure for cryptosporidiosis, neither for cattle, nor now in humans.  How did cryptosporidiosis make the species cross-over (if that is the case), and certainly don't you think that requires scientific investigation, as most proper scientific endeavors deal with first things first?  Only within the past eighteen months have there been very small articles willing to discuss cryptosporidiosis----but NO articles tell ANYTHING truly relevant, though there are several planted articles which will seek to obscure its relevancy and dire implications.

Dr. Strecker, MD, micro-biologist, practices in Los Angeles [and] met Dr. Cantwell in San Diego for the first time through a mutual friend, and discussed with a small group the bio-warfare implications of "AIDS" as it morphologically relates to bovine leukemia virus COMBINED with visna virus (of sheep).  Dr. Strecker finally convinced an incredulous and refuting Dr. Cantwell to investigate his findings....and finally Cantwell, who had previously written about "AIDS" was convinced that yes, "AIDS" was terribly related to cover-ups dealing with bio-warfare research.

Dr. Cantwell was stunned to find that the more he investigated, the more he realized how horrendous are the "AIDS" implications.  Among many other authors referenced, he underscores the relevancy of  "A HIGHER FORM OF KILLING" by Jeremy Paxman [and Robert Morris].

"A HIGHER FORM OF KILLING", (1982), by Jeremy Paxman and Robert Harris, discusses the horrible realities of chemical and biological warfare.

"During the 1960's, the Army's biological warfare program was largely geared to DNA and "gene splicing" research.  In the late 60's [President] Nixon renounced germ warfare, except for "medical defensive warfare."  This "defensive" research continues to the present time, and primarily centers around vaccine development and the genetic engineering of infectious agents capable of infecting large masses of people.  "Under order from R. Nixon in 1971, A LARGE PART OF THE ARMY'S BIOLOGICAL WARFARE UNIT WAS TRANSFERRED TO THE NATIONAL CANCER INSTITUTE (NCI)."

This letter, by necessity, presumes that much of the information is partly known......... that is, it would take too much detailing of so MANY vital facts, tangentially or directly related, to underscore the following implications, because an over-view is difficult to convey, especially when that covers so many various books, magazines, newspaper articles, etc. etc., et al; but there will be an attempt to list several other books which have direct/indirect correlations.

The very contrivance of AIDS is related to subtle psychological conditioning, mass psychology (English speaking peoples).  AIDS is not merely a little constructed acronym; as the verbal communication of "AIDS" has subtle psychological dissonance, subtle, but the effects can be profound.

George Orwell spoke of the necessity for sophisticates to be careful in allowing government to manipulate language, especially quickly changing the meaning of words or phrases, as the political ramifications can be extremely powerful.  He felt modern society needed to be especially vigilant in dealing with the political realities of New speak.  Likewise, similar sentiments were expressed by Wittgenstein, a cutting edge philosopher/linguist, who stated that all words have emotional counterparts.

Read George Orwell's "1984" and "ANIMAL FARM"..... the political realities of Big Brother (computer records of banking/telephone/electronic snoops/monitoring of phone conversations are beyond belief....even the recent BCCI bank scandal has briefly mentioned this re: political interest of bank records), and the much un-appreciated scope of "AIDS".

"AIDS" as a contrived acronym has little to do with medical science --- it was politically designed to create subtle psychological dissonance.  Read the definition of the first word of "AIDS"--ACQUIRED, and think about what is states.  ACQUIRE: 1. to get or gain by one's own efforts of actions, 2. to get possession of: get as one's own.  When medically speaking of a disease, generally the term CONTRACTED is used, which implies a lessening, not a gain, and also generally implies convolution.  ACQUIRED implies some sort of conscious volitional act, as recipient.

Prior to the artificial construct of AIDS, as an acronym, 'aids' and 'aides' had a totally different welcome appreciation as most beneficial, or benign, as one would hear those words  One does not hear 'aids' and 'aides' in quite the same emotional response now that AIDS was contrived.  Mass psychology of language is the essential thought of Orwell's New speak: but few can really appreciate the subtleties.

Possibly you saw the movie on TV, "Endangered Species" (which had a different title in movie theaters several years ago).  Well, that movie tried to tell people things....but apparently no one cared to investigate things about those thousands of cattle mutilations, subsequent development of a bio-warfare germ, subsequent efforts to publicly test the deadly microbe by approaching those who are already greatly oppressed (so that they won't be missed once things really get rolling).  Also a TV mini-series, "Favored Son" tried to discuss the political realities of (bio-warfare) poisons made so obscure that no-one will guess that political enemies will be eliminated, because how will a deadly virus be traced.

If you think that is more "Hollywood" sci-fi stuff then you haven't read AIDS AND THE DOCTORS OF DEATH, and A HIGHER FORM OF KILLING.  The facts will astound.

In September 1976, in OUI magazine, THE MUTILATION MYSTERY, by Ed Sanders, discusses, "during the past three years more than 1500 cattle in 22 states have been killed and mutilated, their blood drained and selected organs removed with surgical precision.  Suspects range from satanic cultists to government researchers."  The article places the hammer squarely on the head of secret government operatives, using Satanists as covers, using government vehicles which could be inspected by any local police jurisdiction because those huge vans had government seals (of NSA?, CIA?, NAVAL INTELLIGENCE?, ARMY?,  AF?) implying TOP SECURITY.  The article discusses a vast amount re: various microbes, clostridium sordeli: mutated virus by chemicals, radiation, ultraviolet light, other agents, "talk.... that the mucous membranes of a cow's eye possess properties similar to the mucous membrane of a particular race."  Besides Satanists, other covers used UFOs as the source of cattle mutilations.  UFOs, Druid Space Brothers, thirsty for cow blood is quite a story to swallow.  All sorts of misleading information, as in, official policies of disinformation, as one thinks of the CIA, or NSA.

Presently, the military is designing a computer which will be capable of monitoring tens of thousands of phone calls in the U.S. (per hour?), and so it would seem people should ask themselves where will those systems be used, and just who will be the potential enemies here in the United States?

It seems that is this new computer age, it will be possible to monitor and record those conversations deemed "worthy", so that a near instantaneous reading can be had on the nation's pulse at nearly any given moment, to identify trends, derive statistical data in various locales on the nation, derive national opinion moods, and, of course, among others, potentially identify dissenters/dissidents.

Some may be familiar with the phrase, The Big Lie, which efficacy was espoused in Hitler's MEIN KAMPF.  Nearly everything that the public has heard on the socio-political level of "AIDS" has aspects of The Big Lie.  After collating the information provided by Drs. Cantwell and Strecker in AIDS AND THE DOCTORS OF DEATH, A HIGH FORM OF KILLING, THE MUTILATION MYSTERY, and various other books/sources, the only reasonable conclusion is that "AIDS" was created in the U.S. bio-warfare labs, that it was introduced to select groups (who have had very little voice in participatory democracy), that "AIDS" is being used as a political weapon to silence dissidents, that "AIDS" has been introduced to third world countries (probably through small pox inoculations per a report by Pierce Wright on the staid LONDON TIMES, as noted by Rappoport in the U.S., and that news is being killed by our medias), that "AIDS" represents many things on many different levels and has been used in many foreign countries for POPULATION CONTROL, that "AIDS" is being used to control sexual mores in this country.

"AIDS" incorporates the most vile form of power mongering; it was not created in a vacuum.  It is representative of an on-going pervasive ideology of various institutions in this country which are elitist, racist and will stop at nothing to implement a NATIONAL SECURITY STATE.

We do not have any semblance to correct balance of power.  The Executive, along with all the cowboys, have been slowly tampering with the JUDICIAL at various levels.  The Judicial is not fairly dealing with cases being presented by the Christic Institute --- refusing to hear motions which will un-ravel all the sordid things involving drugs for armaments, drug moneys floating the banking system which is already bankrupt and is already an enormous Ponzi scheme duping all of us; BCCI [is] just another one of the grand schemes used to launder wealth and power by our CIA.  CIA involvement on international drug networks, written in THE POLITICS OF HEROIN IS SOUTH EAST ASIA; THE CRIMES OF PATRIOTS, a true tale of dope, dirty money, and the CIA by Jonathan Kwitny; THE UNDERGROUND EMPIRE by James Mills discusses where crimes and government embrace, especially in drug  cults/empires (banks, etc. etc.).

Perhaps you listened to the Iran/Contra hearings: whenever a discussion was to occur re: drugs-for-armaments, the microphones went dead, and private hearings were held, because the American public was deemed too sensitive to know the truth.

Many are now publicly stating, from judges to professionals to everyday citizens, that we are presently marching down the road to a NATIONAL SECURITY STATE.  There are signs all around.  Our government has allowed, has promoted nefarious associations, all in the name of Business/Internation- alism, on-going for many years, especially noteworthy within the music industry promoting drugs.  THE POLITICS OF HEROIN IN SOUTH EAST ASIA written so long ago --- and lately some of that is being made public by Col. Bo Gritz (re: The Golden Triangle).

What NATIONAL SECURITY STATE?  Now searches are being allowed on all public transportation, and identification is also being requested.  Various road blocks are being tried in various parts of the country, SUBTLY, to CONDITION people to accepting police looking for this or that, looking for drugs, looking for drunk drivers.  Now in Paramount, CA, (Los Angeles Times, August 9, 1991, Roadblocks To Curb Gangs Will Be Set Up In Paramount, California), the police, er, ah, SHERIFF'S DEPARTMENT state that this will allow them greater monitoring of gangs, and besides they will publicly publish where they will be, and allow motorists the option to turn-off so that they don't need to encounter the deputies.  Is that crazy?  So what is actually taking place?  A precedent, and a conditioning, so that common citizens will get conditioned to accepting roadblocks, questions of identity, and on public transportation, searches, etc.  Why would gangs accept going through roadblocks?  How will that possibly control them?  In other cities the roadblocks are stationary devices, so that motorists cannon have complete access to public roads.

The roadblocks are merely a minor impediment for assuring that gang members will ensure a siege mentality, because they most certainly will find other avenues upon which to impact their reigns of terror, and drive-by shootings, and neighborhood (political) upheaval.  The gangs will merely come to play the game of avoiding roadblocks; but, meanwhile, a siege mentality will ensure that they really are in control, as other common law abiding citizens will need to negotiate the roadblocks.  Meanwhile, the egos of gangs members are fed, and the conditioning is made every more ripe for instituting a NATIONAL SECURITY STATE.

As gangs are so often associated with criminal activity of car thefts, burglaries, robberies, DRUG DEALING, extortion, common thievery, vandalism, graffiti vandalism, political up-upheaval and social unrest, disturbance of the peace, fear mongering and intimidation against common law abiding citizens, and DRIVE-BY SHOOTINGS (which often times claim the lives of innocents, young and old), my thinking is that a more rational course of action which could be much more effective in terms of dissuading gang membership (immediately), is to enforce provisions for control under the RICO Act.

Those known and so identified as gang members (by photos and fingerprints) would be required to have their personal vehicles identified by LARGE VISIBLE NUMBERS on door panels (painted) and large easily readable signs front and read, and if their vehicles are ever seen without those numbers on display the police could automatically charge them with criminal activity and confiscate their vehicles.

In other words, place the onus of responsibility for their criminal gang associations/activity upon them, and make them responsible for ALWAYS having their numbers prominently displayed on their vehicles.  Similar programs have worked against stemming drunk driver's irresponsibility by having them so identified.

Should the gang members refuse to have his CALLING NUMBERS placed on his vehicle, then his only option would be for him to have his vehicle confiscated under provisions/enforcement of the RICO Act.  The various advantages to having those vehicles identified by community neighborhoods, and the police, are obvious.

Perhaps you may be familiar with the so-called Guardian Angels --- who were thrown out of New York, as the Chief of Police did not welcome their presence in that city.  Recently we saw the Guardian Angels passing out flyers, collecting donations in Beverly Hills, California, --- collecting right on the street, as the signal had somehow malfunctioned during heavy traffic on a Friday night.  The police made no effort to remove them.  The Guardian Angels have also been seen marching two by two late at night in many city residential communities.  Some will observe that the Guardian Angels serve another general purpose of conditioning people to uniformed presence day and night, even apart from the posse comitatus atmosphere created by citizen law enforcement or citizen vigilantes (not the same thing as neighborhood watch groups, necessarily).

Thinking people have observed at the dramatic statement ushered in with Bush's New World Order, which started off with such a big bang, and that probably a mere 100,000 civilians, men and women and children as brown skinned people of Iraq won't be around to help us all appreciate its legacy.  But, then, what with no need of our military to discuss enemy body counts, we have seemingly taken the enemy with few casualties (on both sides, except for the civilians).  How remarkable!

Some, do, however, find just a little critical value in reminding the world of the ventures of Pax Romana, and how might Pax Americana be seen?  Perhaps Eisenhower summed it best in his parting speech to the United States as he dramatically emphasized the dangers of encouraging an economy, a people's becoming dependent upon the ever growing military industrial complex.

The United Nations has expressed its own concern about bombing a post industrial nation back into the worst lot of third world nations; not to mention the devastating ecological imbalance posed by hundreds of oil wells darkening the skies.

Why the rush for Bush to declare his New World Order, which thus far does not appear kinder and gentler to the Iraqis, at least, nor bode well for finding other means to resolving global conflicts?  Are there hidden agendas?

As more people consider the realities of "AIDS", the political tool of "AIDS" since its inception, design, implementation, and consider the global consequences in-so-far as appreciating what geopolitics has in store, and eventually familiarize themselves with the process of collating information from varied sources, reading those books/articles which are especially critical and informative about bio-warfare, then they can begin to successfully challenge all of the Big Lies surrounding "AIDS" and various issues of diseases.  It is no simple task.

Most Americans are in a complete state of disregard or willful ignorance regarding all of the many corruptions slowly eroding the great principles of our Democratic Republic... and most especially they refuse to see that balance of power has been totally corrupted from wealthy elitists.

"AIDS" was not created in a is a direct result of elitism, secretive abuses of power, racism, vicious ideologues (similar in scope to Jesse Helms, William Dannemeyer, and a host of others, who take every opportunity to beat their Bible on everyone), educated elitists, technocrats (only doing their jobs), "medicine" without ethics being controlled by pharmaceuticals, all sorts of sordid corruption, the vastness is beyond belief.  "AIDS" touches so many different for instance, curious weird alliances between a faction of militarists into and using Satanists and drug cultists.

Re-read the article, THE MUTILATION MYSTERY by Ed Sanders, OUI Magazine (September 1976), and then read the book, THE ULTIMATE EVIL by Maury Terry (exposing some of the weird connections to drug cultists and Satanists who are being apparently used as political tools by right wing militarists, obliquely inferred).

If one considers that a bio-warfare weapon has been created in "AIDS" and that Dr. Cantwell's book AIDS AND THE DOCTORS OF DEATH is taken to heart, and appreciates the significance of those "experiments" of those Hepatitis-B vaccine trials, and realizes that the government KNEW those "experiments" were directly causing cancer deaths and spreading cancer death by virus poisons concocted, then after the DENIAL is overcome, one must ask how has this been so long ignored, and how has this information been kept from the American public.

If one considers "merely" the enormous implications of how and why cryptosporidiosis has been kept under wraps, one can begin to appreciate the enormous power of our government to mislead when "necessary".

The WALL STREET JOURNAL, November 24, 1990, THE DEADLY CLOUD OVER SVERDLOVSK, which was provided by our CIA as source, discusses the horrendous "accident" of some sort of biological cloud, which primarily affected and killed many men of healthy, young ages.  Read the article very carefully, and also read the rather incredible "Analysis" of the adjacent article, Review and Outlook, and ask yourselves if they had no one to inquire one word as to the strangeness of our very own "AIDS" here is the good ole' U.S. of A.

The WALL STREET JOURNAL's November 28, 1990 article, THE DEADLY CLOUD OVER SVERDLOVSK as provided so kindly by our very own CIA intelligence gathering, should make freedom thinkers ever more provoked to know the sordid truths surrounding "AIDS" and various issues of diseases: especially so given that the adjoining article's perplexing "analysis" in the Review and Outlook.  Scientific fraud?  The intentionally misled readers will not see one word raised about "AIDS", nor, of course, any public mention of CRYPTOSPORIDIOSIS diagnosed here in the United States in so many of those afflicted with "AIDS" and dying directly from the complications created by relentless diarrhea (attributed to scientific ARMY analysis of the cryptosporidium microbe!)

The truth about "AIDS" and various issues of diseases will not be presented with the INSTITUTIONALISM of main-stream those medias receive much of their direct financial backing from their advertising sponsors (private well connected business concerns), and various government programs/alliances.

If you, the reader, have had none of this material before, you will be facing a probable personal DENIAL of this material because it can be over-whelming at first consideration, especially if you have little prior knowledge to the extent of INSTITUTIONALISMS (which may participate in cover ups that may threaten to challenge their authority, or undermine their sacrosanct territory).

Ignorance will not prove to be bliss when the NATIONAL SECURITY STATE comes marching down the road.  In fact, there are many who are now publicly stating Americans must be vigilant in exercising their freedoms of free speech and free press, individually seeking to read all the books available, questioning their local congressmen and senators, challenging the secret parallel government which is trying at so many levels to topple our Democratic Republic's balance of power mechanisms.

You have recently heard after recent window of war, that a New World Order is sought, thought no definition seemed forthcoming, now was any presented.  So, now we have the definition of the New World Order which was defined in Germany.

ROADBLOCKS TO CURB GANGS TO BE SET UP IN PARAMOUNT!  Crime: checkpoints will be similar to ones that target drunk drivers.  Civil Rights groups worry about abuses ... as printed in the Los Angeles Times, Friday, August 9, 1991.... with very similar follow-up, martinets thinking hitting adjacent communities, e.g. ----  Long Beach, etc.  How will a NATIONAL SECURITY STATE try to condition people?

Why are ex-CIA officials now worried about on-going investigations of Iran-Contra/Cocaine Connections?  Read Ex-CIA Officials To Help Fund The Defense Of Iran-Contra Figures by David Johnston in the New York Times.  Will Noriega ever get his say in a court of law?  Why has cocaine/armaments become international business of quiet command?  What nefarious activities are engendered by these sordid associations of our very own intelligence community, which apparently has no accountability to United States citizens?  Why has the CIA been allowed to create spy networks here in the United States against United States citizens?

The Orange County Register article dated August 14, 1991 entitled FEDERAL PROBE URGED IN DEATH OF CONSPIRACY INVESTIGATOR: Report due today on man who studied scandals in Bush, Reagan administrations, by John Farrell of the Boston Globe.  [Investigative Reporter Joseph "Danny" Casolaro examined] other sordid relationships of: BCCI (to Noriega, CIA);  the October Surprise discussing Iran withholding hostage release for favored status for Bush/Reagan preventing Carter from bringing hostages home;  the Justice Department trickery in the INSLAW case (INSLAW designed software is designed to keep track of law enforcement cases but is also being used to keep tabs on POLITICAL DISSIDENTS here in the United States!); the Justice Department, CIA, NSA, in various collusion; all sorts of banking and financial scandals, whereby the same people are commonly associated (as Milken with so many, Keating, et al).  The death of Danny Casolaro has apparently awakened some to the gravity this nation faces in dealing with drug dealers, et al, under quiet command well connected.

People have been showing up mysteriously dying since our own coup here in the United States....just read all of the weird deaths associated with the JFK assassination, and the many books which attempt to shed real light on this on-going political assassination problem in the United States.  Read the recent book CROSSFIRE (Ruby knew he was going to be injected with poison cancer while in jail.  Ruby was well connected with underworld and government intelligence operatives and local Dallas police).

But what are a few deaths, a dozen here, ten dozen there?  No one takes the time to research any of it anyway.  Now we have had for over ten years a real NAZI genocide with "AIDS", but no one really cares.  Ten thousand, or twenty thousand, or fifty thousand, mostly young males who were homosexually active, and have been subjected through clever campaigns of NAZI-TYPE GENOCIDE, but still no one is caring to listen.

Read: AIDS AND THE DOCTORS OF DEATH, by Dr. Alan Cantwell, MC, and realize that "AIDS" is not merely directed against political dissidents, or those perceived to be dissidents, e.g. homosexually active men, not is "AIDS" hysteria merely being shipped up by crazy fundamentalists who beat their bibles on every pulpit and person passing by (as they are most assuredly used by radical political elements hell bent on subverting Democratic Principles), because, unfortunately, too many will see those things as disconnected, unrelated matters, when in fact those seemingly unrelated events are being used to cloud an even greater objective.

"AIDS" exists on so many levels.... POLITICAL, social, religious, perhaps even environmental has been a concern of internationalists who would seek to design such a biological poison.

What sort of "AIDS" and various issues of diseases may we be discussing within the social medical-militaristic (bio-warfare) over-view of what it properly takes to really see "AIDS" microbes in the scope of man-made worldwide devastation of various eco-systems: forests polluted, rain forests being destroyed daily without replacement, protective ozone layers being depleted and shot full of holes (which will hence create conditions causing proliferation of skin melanomas, unprecedented), irradiation of foods (ostensibly for good purposes, but which causes severe subtle effects of foods), polluted cisterns and underground water sources and streams/rivers/lakes/oceans, and all major cities with airborne pollutants depleting life sustaining oxygen, all major food production going to agri-business international for BUSINESS and political trusts, third world nations seeking industrialization and placing greater demands upon already strained eco-systems.... all of that and much more so that human life can be nourished and sustained.

English political economist, Thomas Malthus (1766-1834) theory that the growing population of the world tends to increase faster than the food supply, and that, unless birth is controlled, poverty and war must serve as a "natural" restriction of the increase.  Of course, even the ancients (predating Malthus) knew about poisons, used politically, and biological plagues occurring naturally (though not understanding the 'biology' of the plague)....and so even if poverty and war may not be 'natural', nevertheless the political presumption would be given and promoted.  So that, even though Malthus never saw the advances in agricultural production via powerful machinery, and advances in irrigation systems, and advances in animal husbandry (genetics), crops made resistant by genetics, chemical insecticides (questionable), he would certainly appreciate the political climates which would seek to justify newer sophisticated forms of killing, via biological poisons fashioned to appear as an ageless plague, quite natural in appearing to be natures (or even God's!) way of controlling population growth.

OVER-POPULATION may just be one of the primary objectives in the creation of bio-warfare poisons which will selectively engage various third world nations.  Take to heart the report written by Pierce Wright in the staid London Times, which was reported here in the United States, in only select "underground papers" (e.g. The Los Angeles Weekly) by Jon Rappoport, though vastly suppressed in our main stream medias here.  Wright writes rightly so that the spread of "AIDS" directly correlates with the injection of small-pox vaccinations by the tens of thousands in those third world countries...and should we accept the staid London Times, we can begin to appreciate the awesome significance of "AIDS" as a created bio-warfare mechanism which has been promoted and unleashed by chains of powerful institutions in the United States well connected internationally, with an international organization WHO (World Heath Organization) which sponsored those small-pox vaccinations.

Read the book, A HIGHER FORM OF KILLING by Jeremy Paxman, and collate that book with the awesome information provided in Cantwell's magnum opus, AIDS AND THE DOCTOR'S OF DEATH.  Dr. Alan Cantwell is a highly credential medical doctor, having published many papers on various medical problems.  He struggled with himself trying to refute evidence presented by Dr. Strecker, though in his heat of hearts he knew the epidemiology appeared absurdly un-natural: that is, the epidemiology itself suggested human intentional intervention (via inoculations).

Probably few readers of this small essay have ever even encountered the term CRYPTOSPORIDIOSIS (which was being medically diagnosed in human males in 1978 [and] 1979, in New York and New Jersey).  Cryptosporidiosis, you may recall, causes relentless diarrhea, which will naturally deplete the body's immune system because of total malnourishment, which will make the body a ready host for various cancers and immunologic disorders.  Without nourishment the body's defenses are gone.  If vital nutrients can never be digested and assimilated how can the immune system ever thwart inoculations of cancers/"AIDS".

Prior to "AIDS" inoculations and various issues of diseases, cryptosporidiosis was a very rare cattle (sheep?) affliction with NO KNOWN CURE.  There is no known cure now for humans who suffer the ravages of relentless diarrhea, weight loss, starvation, from the cryptosporidium microbe (which Shilts suggests needs to be identified by the ARMY).

Political assassinations have been around since human being untied for power.  Just think how neat a political tool if a biological killing agent could be placed, somehow, is a dissenters blood stream, or perhaps, even in or on their food.  Better yet, how absolutely NATURAL for a devastating plague to sweep across the world without a gun even being raised at the enemies' head.

"AIDS" has gone from the individual, to the thousands and tens of thousands in this country, and now it heads off to third world nations to devastate them by the millions as articles suggest.

FORTY MILLION "AIDS" CASES ARE PREDICTED BY 2000, Arizona Republic, Friday, May 3, 1991, as new presented by the World Health Organization, the United Nation's agency stating "an explosion in cases in Africa and other developing areas prompted it to drastically increase its estimate of those who could be infected by the human immunodeficiency virus".

In the New York Native, August 19, 1991, ONE OF GALLO'S VICTIMS SPEAKS OUT, Dr. John Beldekas Reveals A New, Potentially Explosive Chapter In the History of "AIDS" Research, by Neenyah Ostrom.  The article discusses at length Dr. Beldekas' concerns re: Dr. Gallo's attempts to undermine J.B.'s and Dr. Jane Teas' research that "AIDS" may actually be caused by a large DNA virus called African Swine Fever Virus.  They had gone to Florida and found a bunch of feral pigs that the Haitians had brought from Haiti.  So, perhaps there is a greater connection to farm animals being used as a source of poison culturing?  That information certainly correlates with the OUI Magazine article of September, 1976, THE MUTILATION MYSTERY by Ed Sanders, and how might farm animals have been used as research vectors to test and carry bio-warfare poisons.

Dr. Beldekas stops just short of publicly accusing Dr. Gallo of stealing their research, by Gallo's renaming of the virus; but certainly Gallo has already been implicated in some mighty strange goings-on per lengthy exposes in the Chicago Tribune and elsewhere.  Beldekas also believes that something real dirty is going on, because he believes that mycoplasma are also being tested in the HIV tests.  "I'm convinced that this is real dirty, and that the mycoplasma may, in fact, be playing a major role ---- a big, big role.  I'm not discounting swine fever.  I'm just trying to tell you that the HIV system for Western blots is a very dirty system."  Certainly the Teas/Beldekas inquiry can be correlated with the findings of Strecker's research implicating cattle/sheep and find out if someone in the government intentionally left the barn door wide open so that infected cattle/sheep/pigs could act properly as living processors for bio-warfare research.  Why the necessity for on-going government cover ups as to what CRYPTOSPORIDIOSIS may reveal as a cattle residue from bio-warfare experiments around the country.

Beldekas also sees that pharmaceuticals are using deadly drugs as agents to further governments' vested interests -- as per his anger re: the POISON AZT, which has been pushed down the throats of un-suspecting patients, because un-knowingly they accepted AZT as a poison for the liver.  [Source:] THIRTEEN STAR PRODUCTIONS, (213) 306-4088,  for cassette tapes, especially public forums, discussions led by Craig Huelett (sp?).

Roy Tuckman (sp?) of "Roy of Hollywood" KPFK FAME [90.7 FM] has for years discussed things about the advancing New World Order.  [The] "Shades of AIDS" series is especially noteworthy with talks by Dr. Strecker who convinced Dr. Alan Cantwell, MD, to write his magnum opus, AIDS AND THE DOCTORS OF DEATH, and Tuckman's incredible broadcasts which,  for years,  have addressed various social ills of militarism and medical deceit and power mongering INSTITUTIONALISMS AND "AIDS" BIO-WARE and incredible discoveries suppressed (e.g. Dr. Royal Raymond Rife and his Rife Microscope: discoveries of Wilhelm Reich suppressed: discoveries of various cancer therapies, especially noteworthy in in Gaston Naessens' discovery similar to Rife's, as reported by Christopher Bird, author of THE PERSECUTION AND TRIAL OF GASTON NAESSENS, c. 1991, discussing true story of efforts to suppress an alternative treatment for cancer, "AIDS", and other immunologically based diseases, MS, etc., and how the Canadian government tried to suppress NAESSENS' research, similar to the United States persecution of Dr. Rife, MD, and Wilhelm Reich, etc. etc. etc.), and government suppression of vital discoveries in "free energy" of Depalmas (sp?) n-machine.  Roy Tuckman is another freedom fighter for truth and justice.

WORLD WATCHER'S founded by MAE BRUSSELL (recently died from cancer?).  She gave many broadcasts regarding her vast research collating information from thousands of articles (similar to the process used by intelligence agencies which COLLATE all sorts of varied sources of information worldwide), as MAE BRUSSELL valiantly attempted to get people to KNOW the stream of events of history by analysis gained from COLLATING so many sources as she warned people to be aware that an advancing elitist technocracy was gaining a foothold worldwide which was being led by people aligning themselves with INSTITUTIONALISMS (OF AN ESPECIALLY INTERNATIONAL SCOPE) which has no true allegiance to American/United States Democratic principles.  Mae Brussell constantly warned Americans to be vigilant in recognizing power mongering, especially those who USE religion or government to usurp the balance of power.

We have seen in this country how elitists have been usurping the balance of power of our great Democratic Republic.  How is it that a supposed parallel secretive government has been able to advance its own hidden agendas using off-the-shelf, non government authorized clandestine enterprises which are solely at the direction or behest of International Intelligence Networks?

During the sixties and seventies thousands of cattle were found mutilated, entirely drained of blood.... yet somehow our very own intelligence networks could not seem to unravel the mystery, nor even provide a credible clue to what might be happening: although they did somehow manage to convey to the press that apparently all of the cattle mutilations were the result of demonic organized Satanists performing animal sacrifices in the dead of night, or even a few cattle mutilations were the result of Druid Space Brothers come down to participate in ancient atavistic yearnings to perform ritual slaughter on bovines.  We can be so thankful that our Druid Space Brothers did not decide to use a little more intelligent creature upon which to satisfy their blood lusting, as they might have chosen primates, or maybe dolphins as "AIDS" for blood sacrifices seeking atonements to appease their gods (similarly to the thoughts of Dannemeyer and Jesse Helms who know how God thinks to handle those engaged in sexual sins, which are so in-tune with fundamentalists, too, don't you know).

Of course, Congressman Dornan knows also how God thinks to handle those set in their sinful ways, too, as he is often times seen on Trinity Broadcasting Network, TBN, as seen there on Channel 40 in Southern California, and now seen nationwide, and worldwide, even going to Russia along with Robert Schuller (who recently, unfortunately, bumped his head): but Dornan will make a good bookend for Bennie Hinn's preachments on how over sexed black bucks in South Africa, having no other recourse to satisfy their primitive lusts, sought out relief from the poor little African greenback monkeys to engage in bestiality, as you simply must have missed the comedy presented on TBN not so long ago (1990).  Then perhaps it is thought that the purveyors of lies, who can work very deftly with the creation of The Big Lie (as noted by Hitler's Mein Kampf) are merely silly looking people who don't know what they are up to as they are able to buy TV station after TV station across the face of the United States and place antennas in El Salvador, Nicaragua, St. Thomas Island, over to Israel, France --- so many different countries so that they can tell people the truth about "AIDS" being different countries so that they can tell people the truth about "AIDS" being divine retribution from God to know God's blood thirst for atonements for sexual sins.

If you think that is far fetched, then you simply have not seen all the non-sense being broadcast from TBN, especially the things about Satanists who present themselves on national TV to tell the world that they have engages in ritual human sacrifice, but now they are saved by the blood of the Lamb, so apparently they need not go before any Legal Jurisprudence, as God has already served them salvation if not justice, and they need not be understood as murderers who are in need of further questioning by the police or courts of the land.  Do you perceive just a wee bit of mockery against wholesome Christianity: or perhaps, avoiding questions of good ethical/moral religious pronouncements, do you not perceive just a small bit of mockery against our judicial system?  Do you not perceive just a small bit of mockery against our judicial system?  Self professed killers of other humans are allowed public exoneration by merely saying that they were under the sway of Satanic powers: and no mention is every made of their victims names either!  How nice!

Should the previous paragraph has grabbed your attention, then perhaps you will begin to appreciate the aggravation that same sex lovers have endured for years, for a decade, as they have seen friends and loved ones dying from the ravages of relentless diarrhea due to medically diagnosed cryptosporidiosis (which prior to "AIDS" and various issues of diseases was only known as a rare cattle affliction), and seeing those people wasting away (as you hear and think about those un-named Africans wasting away from similar disease), and before their eyes the people dissipate to skeletal remains, living but not quite dead, and they try to tune in for a little solace and find the rabid hate mongering of TBN and other fundamentalists filled with vile hatred spreading vicious lies, promoting  the POLITICAL REALITIES of the BIG LIES of "AIDS".  Would you think that a little anger is justified, even if the antics of ACT-UP seem out of context with their attack against the Catholic Church, which makes for great info-tainment, but not addressing the power of the fundamentalists as their hate filled broadcasts as seen on TBN for many years.  Perhaps ACT-UP  will one day begin to publicly should CRYPTOSPORIDIOSIS, and "AIDS" biowarfare.

When the founder of ACT-UP, Kramer, discusses "AIDS" as genocide he is not exposing political diatribe, he is talking GENOCIDE  as in BIOWARFARE!  After you have read Dr. Cantwell's magnum opus AIDS AND THE DOCTORS OF DEATH, then you will begin to appreciate the magnitude of the BIG LIE of "AIDS" and all the ugly vicious politics surrounding "AIDS" and various issues of diseases.

"AIDS" exists on so very many different levels: that is, there are probably several powerful motivations "reasonings" for developing "AIDS".  There, in the United States, has been seen the powerful POLITICAL hidden agenda to impose moral strictures on sexual activity, most especially those engaging in affectional homosexuality.  It is not chance by which "AIDS"  and various issues of diseases can to be found FIRST AND FOREMOST in primarily homosexually active communities in the major cities of the United States, first starting in New York and New Jersey in 1978 and 1979, finally jumping 'cross country'  to San Francisco and then to Los Angeles, then San Diego, where large politically active communities of same sex lovers reside.  These communities were targeted to participate in the Hepatitis-B vaccine trials -- read Dr. Cantwell's magnum opus AIDS AND THE DOCTORS OF DEATH  before you try to refute.

Those communities were targeted by well conceived programs to enlist ONLY highly sexually active gay young men between the ages of twenty to forty.  You NEVER saw ads in mainstream newspapers asking for participants from those heterosexually involved with many sex partners, but the gay rags were full of ads, later even offering to pay upwards of $50 per visit to donate blood so that, ostensibly, vaccines for Hepatitis-B could be developed/maintained.

Many medical doctors themselves refused to take the vaccine for hepatitis-b, because they began to see a disproportionate number of gays who had succumbed to the ravages of "AIDS" after submitting to participate in the Hepatitis-B vaccine trials.

Now, this is interesting, you now see that several dentists have recently spread "AIDS", unknowingly unwittingly, to their patients, which is very distressing.  A new medical agenda will need to be addressed as to which medical doctors/practitioners should be allowed to continue their practices after they have tested positive for a virus (which may not even be a true test, for "AIDS" susceptibility contraction, per Dr. Peter Deusberg, et al).  Are hidden mycoplasmas the real factor, or primary co-factor for development of "AIDS" immune system dysfunction (per Dr. Lo's Army research: per other's research)?

Several dentists in Los Angeles, too, have recently died from complications of "AIDS" cancers/immune system dysfunction.  Will there patients be traced by proper medical authorities???  And will that be made public???

Perhaps now that the very medical community which should have originally challenged all the BIG LIES of "AIDS", after seeing their livelihoods being stripped from them, will begin to coalesce and address the relevancy of CRYPTOSPORIDIOSIS, and things curiously/secretively addressed by Shilts' book AND THE BAND PLAYED ON (re: cows and stuff and cryptosporidiosis! and the ARMY!), and the research of Dr. Lo and Dr. Peter Deusberg and Dr. Strecker and his likewise courageous friend,  Dr. Alan Cantwell, MD.

Don't you think it is high time to question yourselves as to why you have never heard of any of the facts about cryptosporidiosis and probably bio-warfare mechanisms of  "AIDS" and various issues of diseases on most of the mainstream medias?  What is the AMA hiding about cryptosporidiosis, and things it knows about the Hepatitis-B vaccine inoculations and subsequent deaths of young gay men?  What intelligence communities have participated in "AIDS" bio-warfare research?

Are there groups of "Satanist" renegades being used by the intelligence communities to spread "AIDS" by "infecting" certain sources which would contaminate?   Could "AIDS" be used as some sort of political poison?  If the word "Satanist" holds little or no meaning, then substitute evil-doers, people who are hell bent on creating disorder, and read THE ULTIMATE EVIL by Maury Terry who seems to think that there are reasons that Satanists are being used nationwide to spread something quite rotten.  Drugs and cultists and political power mongers may be more allied than we know.

Was the murder of Pope John Paul I led by internationalists seeking to gain control of the Vatican (bank), as the incredible research of David A. Yallop uncovers nefarious associations with: Marcinkus: Sindona: secretive Masonic P-2 propaganda due:  illicit movements of powerful hallucinogens and anti-depressants and drugs internationally: Cardinal Cody and Marcinkus friendship: Banco Ambrosiano and the Vatican Bank and connections to Panamanian holding companies (and possible ties to US invasion of Panama): CIA involvements: mafia connections: Continental Bank of Illinois in Chicago: all sorts of banking scandals and murders.

The Internationalist scope of drugs under quiet command is simply quite awesome... just take a drive to any major or minor inner city now-a-days and you will see for yourselves what sort of New World Order is in the making, has been planned for many, many years.  The drugs are a way to keep the many disenfranchised quite and docile: or, if not that, then habitually "active" in keeping their habits.  Even at West Hollywood street fairs, and elsewhere, so much emphasis placed on the cacophonic discordant agitating sounds of the rockers and druggies.  After great agitation, somehow provide the sources of habitual responses to soothe the jangling nerves.  Quite Pavlovian in establishing habitual responses.  The Internationalist scope of drugs has been in the making for many years, especially advancing during the 60's with the Beetles, et al to follow them.

A recent Los Angeles Times article stated that the police in West Hollywood had apparently "given up" on arresting drug dealers largely seen on a street corner which we saw many times, and knew that to be true for over one year prior to the media's discovery.  But maybe the local police are getting wise and hip to the "game" of Internationalist drug ventures headed up by top military honchos here and there and everywhere you can see the signs.  But, curiously, when the Iran/Contra hearings were made public, the microphones went silent each time public mention of DRUGS was made mention by Ollie and Company, and NATIONAL SECURITY was righteously invoked.

All the young people must be given something to do, especially those MINORITIES  who are actually quite the opposite and really a majority in most major inner cities.  Should anyone, most anyone, who really tries to uplift the youth of minority, should they appear the least bit political, they will inevitably encounter the "games" of the Internationalists who will publish things in local papers, or somehow seek to ridicule those who might offer hope.  Those people will find themselves the target of various peculiar circumstances.  The Internationalists mean BUSINESS when it comes to their control of DRUG turf, too."

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #25 on: August 10, 2009, 07:31:28 pm »
This is hard for me to say (because there is so much going on), but this is one of the most important threads on this forum at the moment!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #26 on: August 10, 2009, 07:57:34 pm »
The history of bioweapons research in the United States is a history of illicit--and illegal--human experiments.

From the Cold War to the War on Terror, successive American administrations have turned a blind eye on dubious research rightly characterized as having "a little of the Buchenwald touch."

While the phrase may have come from the files of the Atomic Energy Commission as Pulitzer prize-winning journalist Eileen Welsome revealed in her 1999 book, The Plutonium Files, an investigation into secret American medical experiments at the dawn of the nuclear age, it is as relevant today as the United States pours billions of dollars into work on some of the most dangerous pathogens known to exist in nature.

That Cold War securocrats were more than a little concerned with a comparison to unethical Nazi experiments is hardly surprising. After all, with the defeat of the Axis powers came the triumphalist myth-making that America had fought a "good war" and had liberated humanity from the scourge of fascist barbarism.

Never mind that many of America's leading corporations, from General Motors to IBM and from Standard Oil to Chase National Bank, were sympathizers and active collaborators with the Third Reich prior to and even during World War II, as documented by investigative journalists Charles Higham in Trading With The Enemy, and Edwin Black in IBM and the Holocaust. Like much else in American history, these were dirty little secrets best left alone.

Soon enough however, these erstwhile democrats would come to view themselves as mandarins of a new, expanding American Empire for whom everything was permitted. In this context, the recruitment of top German and Japanese scientists who had conducted grisly "medical" experiments whilst waging biological war against China and the Soviet Union would be free of any moralizing or political wavering.

As the Cold War grew hotter and hotter, America's political leadership viewed "former" Nazis and the architects of Japan's Imperial project not as war criminals but allies in a new undertaking: the global roll-back of socialism and the destruction of the Soviet Union by any means necessary.

This tradition is alive and well in 21st century America. With the September 11, 2001 terrorist attacks and subsequent anthrax mailings as a pretext for an aggressive militarist posture, the national security state is ramping-up research for the production of genetically-modified organisms for deployment as new, frightening weapons of war.

According to congressional testimony by Dr. Alan M. Pearson, Director of the Biological and Chemical Weapons Control Program at the Washington D.C.-based Center for Arms Control and Non-Proliferation, with very little in the way of effective oversight or accountability, tens of billions of dollars "have been appropriated for bioweapons-related research and development activities." Pearson reveals that approximately $1.7 billion "has been appropriated for the construction on new high containment facilities for bioweapons-related research."

By high containment facilities I mean facilities that are designed for work with agents that may cause serious or potentially lethal disease through exposure to aerosols (called Biosafety Level 3 or BSL-3 facilities) and facilities that are designed for work with agents that pose a "high individual risk of life-threatening disease, which may be transmitted via the aerosol route and for which there is no available vaccine or therapy" (called Biosafety Level 4 or BSL-4 facilities).

Prior to 2002, there were three significant BSL-4 facilities in the United States. Today twelve are in operation, under construction, or in the planning stage. When completed, there will be in excess of 150,000 square feet of BSL-4 laboratory space (as much space as three football fields). The number of BSL-3 labs is also clearly growing, but ascertaining the amount of growth is difficult in the absence of accurate baseline information. There are at least 600 such facilities in the US. (Alan M. Pearson, Testimony, "Germs, Viruses, and Secrets: The Silent Proliferation of Bio-Laboratories in the United States," House Energy and Commerce Committee, Subcommittee on Oversight and Investigations, October 2007)

Chillingly, one consequence of this metastatic growth "is that the very labs designed to protect against bioweapons may become a source for them." As the 2001 anthrax attacks amply demonstrated, the threat posed by a biological weapons' incident may be closer to home than any of us care to think. Pearson writes, "Nor should we ignore the possibility that a US biologist may become disgruntled or turn rogue while working in one of these labs."

According to Edward Hammond, the Director of the now-defunct Sunshine Project, while "biological arms control is currently in ... its worst crisis since the signing of the Bioweapons Convention (BWC) in 1972," the American Bioweapons-Industrial Complex has "embarked on the exploitation of biotechnology for weapons development." Indeed, Hammond relates that active programs utilizing genetic engineering techniques have "been employed in offensive biowarfare programs in order to make biowarfare agents more effective."

But increases in state subsidies for such work have generated new risks to the public. A recent Government Accountability Office (GAO) report faulted the Centers for Disease Control and Prevention (CDC) for lax security at three of the nation's five BSL-4 labs currently in operation that "handle the world's most dangerous agents and toxins that cause incurable and deadly diseases." Agents such as Ebola, Marburg and smallpox are routinely studied at these facilities. And yet, as GAO auditors found,

Select agent regulations do not mandate that specific perimeter security controls be present at BSL-4 labs, resulting in a significant difference in perimeter security between the nation's five labs. According to the regulations, each lab must implement a security plan that is sufficient to safeguard select agents against unauthorized access, theft, loss, or release. However, there are no specific perimeter security controls that must be in place at every BSL-4 lab. While three labs had all or nearly all of the key security controls we assessed, our September 2008 report demonstrated that two labs had a significant lack of these controls. (Government Accountability Office, Biosafety Laboratories: BSL-4 Laboratories Improved Perimeter Security Despite Limited Action by CDC, GAO-09-851, July 2009)

As Global Security Newswire revealed in June, a "recently completed inventory at a major U.S. Army biodefense facility found nearly 10,000 more vials of potentially lethal pathogens than were known to be stored at the site."

The 9,220 samples--which included the bacterial agents that cause plague, anthrax and tularemia; Venezuelan, Eastern and Western equine encephalitis viruses; Rift valley fever virus; Junin virus; Ebola virus; and botulinum neurotoxins--were found during a four-month inventory at the U.S. Army Medical Research Institute of Infectious Diseases at Fort Detrick, Md., according to Col. Mark Kortepeter, the center's deputy commander. (Martin Matishak, "Thousands of Uncounted Disease Samples Found at Army Biodefense Lab," Global Security Newswire, June 18, 2009)

The GSN report states that while "half of the newfound material was destroyed after being recorded," inventory control officer Sam Edwin told reporters that "the other half was deemed worthy for further scientific use, cataloged, and stored in the center's containment freezers."

More pertinently, what happens when the state itself turns "rogue" and under cover of national security and the endless "war on terror" creates the "acute risk" in the form of out-of-control laboratories "designed to protect against bioweapons" that instead, have "become a source for them"?

Bioweapons and National Security: A Chronology

Source Notes: This chronology has drawn from dozens of books, articles and declassified government documents in its preparation. Notable in this regard is Michael Christopher Carroll's Lab 257: The Disturbing Story of the Government's Secret Germ Laboratory; Linda Hunt, Secret Agenda; Bob Coen and Eric Nadler, Dead Silence: Fear and Terror on the Anthrax Trail; the National Security Archive's documentary history of U.S. Biological Warfare programs and The Sunshine Project.

* August 1945: Operation Paperclip, an Office of Strategic Services (OSS) program to import top Nazi scientists into the United States. Linda Hunt relates in her book, Secret Agenda, that Reich Health Leader (Reichsgesundheitsführer) Dr. Kurt Blome, was saved from the gallows due to American intervention. Blome admitted he had worked on Nazi bacteriological warfare projects and had experimented on concentration camp prisoners with bubonic plague and sarin gas at Auschwitz. After his acquittal at the 1947 Nuremberg Doctors' Trial, Blome was recruited by the U.S. Army Chemical Corps and advised the Pentagon on biological warfare. Walter Paul Emil Schreiber, a Wehrmacht general who assigned doctors to experiment on concentration camp prisoners and disbursed state funds for such experiments was another Paperclip recruit; in 1951, Schreiber went to work for the U.S. Air Force School of Medicine. Hubertus Strughold, the so-called "father of space medicine" discussed--and carried out--experiments on Dachau inmates who were tortured and killed; Strughold worked for the U.S. Air Force. Erich Traub, a rabid Nazi and the former chief of Heinrich Himmler's Insel Riems, the Nazi state's secret biological warfare research facility defects to the United States. Traub was brought to the U.S. by Paperclip operatives and worked at the Naval Medical Research Institute and gave "operational advice" to the CIA and the biowarriors at Ft. Detrick.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #27 on: August 10, 2009, 07:58:12 pm »
* September 1945: General Shiro Ishii's Unit 731, a secret research group that organized Japan's chemical and biological warfare programs is granted "amnesty" by Supreme Allied Commander in the Pacific, General Douglas MacArthur in exchange for providing America with their voluminous files on biological warfare. All mention of Unit 731 is expunged from the record of The Tokyo War Crimes Tribunal. During the war, Unit 731 conducted grisly experiments, including the vivisection of live prisoners, and carried out germ attacks on Chinese civilians and prisoners of war. According to researcher Sheldon H. Harris in Factories of Death: Japanese Biological Warfare 1932-45 and the American Cover-Up, Unit 731 scientists performed tests on prisoners with plague, cholera, smallpox, botulism and other infectious diseases. Their work led to the development of what was called a defoliation bacilli bomb and a flea bomb used by the Imperial Army to spread bubonic plague across unoccupied areas of China. The deployment of these lethal munitions provided the Imperial Army with the ability to launch devastating biological attacks, infecting agriculture, reservoirs, wells and populated areas with anthrax, plague-infected fleas, typhoid, dysentery and cholera. Rather than being prosecuted as war criminals, Unit 731 alumni became top bioweapons researchers. Ishii himself became an adviser at USAMRIID at Ft. Detrick.

1950: A U.S. Navy ship equipped with spray devices supplied by Ft. Detrick, sprayed serratia marcescens across the San Francisco Bay Area while the ship plied Bay waters. Supposedly a non-pathogenic microorganism, twelve mostly elderly victims die.

* Early 1950s: Army biological weapons research begins at the Plum Island Animal Disease Center (PIADC). Vials of anthrax are transferred from Ft. Detrick to Plum Island. This information is contained in a now declassified report, "Biological Warfare Operations," Research and Development Annual Technical Progress Report, Department of the Army, 1951.

* 1951: Racist experiments are carried out. U.S. Army researchers deliberately expose African-Americans to the fungus Aspergillus fumigatus to discern whether they are more susceptible to infections caused by such organisms than white Europeans. Also in 1951, black workers at the Norfolk Supply Center in Virginia were exposed to crates contaminated with A. fumigatus spores.

* 1952: According to 1977 hearings by the Senate Select Committee on Intelligence and the Subcommittee on Health and Scientific Research into Project MKULTRA, we discover the following: "Under an agreement reached with the Army in 1952, the Special Operations Division (SOD) at Fort Detrick was to assist CIA in developing, testing, and maintaining biological agents and delivery systems. By this agreement, CIA acquired the knowledge, skill, and facilities of the Army to develop biological weapons suited for CIA use."

* 1953: Frank Olson, a chemist with the Army's top secret Special Operations Division at Ft. Detrick was involved with biological weapons research and was tasked to the CIA for work on MKULTRA. In 1953, as Deputy Acting Head of Special Operations for the CIA, Olson is a close associate of psychiatrist William Sargant who was investigating the use of psychoactive drugs as an interrogation tool at Britain's Biological Warfare Centre at Porton Down. After being dosed with LSD without his knowledge by Dr. Sidney Gottlieb, the Agency's liaison to Ft. Detrick, Olson undergoes a severe psychological crisis. The scientist begins questioning the ethics of designing biological organisms as weapons of war. This does not sit well with his Agency and Army superiors. On November 24, 1953, Olson and a CIA minder, Robert Lashbrook, check into New York's Staler Hotel. He never checked out. According to Lashbrook, Olson had thrown himself through the closed shade and window, plunging 170 feet to his death. But because of his knowledge of CIA "terminal experiments" and other horrors conducted under MKULTRA, the Olson family believes the researcher was murdered. When Olson's son Eric has his father's body exhumed in 1994, the forensic scientist in charge of the examination determines that Olson had suffered blunt force trauma to the head prior to his fall through the window; the evidence is called "rankly and starkly suggestive of homicide." Norman G. Cournoyer, one of Olson's closet friends at Ft. Detrick also believes the scientist was murdered. When asked by the Baltimore Sun in 2004 why Olson was killed, Cournoyer said, "To shut him up. ... He wasn't sure we should be in germ warfare, at the end."

* 1955: Following a CIA biowarfare test in Tampa Bay, Florida, the area experiences a sharp rise in cases of Whooping Cough, including 12 deaths. The Agency had released bacteria it had obtained from the U.S. Army's Chemical and Biological Warfare Center at the Dugway Proving Grounds.

* 1956-1958: More racist experiments. The U.S. Army conducted live field tests on poor African-American communities in Savannah, Georgia and Avon Park, Florida. Mosquitoes were released into neighborhoods at ground level by "researchers" or by helicopter; residents were swarmed by the pest; many developed unknown illnesses and some even died. After the tests, Army personnel posing as health workers photographed and tested the victims, then disappeared. While specific details of the experiments remain classified, it has been theorized that a strain of Yellow Fever was used to test its efficacy as a bioweapon.

* 1962: A declassified CIA document obtained by the National Security Archive relates the following: "In November 1962 Mr. [redacted] advised Mr. Lyman Kirkpatrick that he had, at one time, been directed by Mr. Richard Bissell to assume responsibility for a project involving the assassination of Patrice Lumumba, then Premier, Republic of Congo. According to Mr. [redacted] poison was to have been the vehicle as he made reference to having been instructed to see Dr. Sidney Gottlieb in order to procure the appropriate vehicle." Gottlieb was the chief scientific adviser for the CIA's MKULTRA program.

* June 1966: The U.S. Army's Special Operations Division dispenses Bacillus subtilis var niger throughout the New York City subway system. More than a million people were exposed when Army operatives dropped light bulbs filled with the bacteria onto ventilation grates.

* December, 1967: The New York Times reports, "Fatal Virus Found in Wild Ducks on L.I." A virus never seen before in the Western hemisphere, began with ducks in Long Island at a site opposite Plum Island; the virus devastates the area's duck industry and by 1975 has spread across the entire continent.

* 1971: The U.S. Department of Agriculture proclaims that "Plum Island is considered the safest in the world on virus diseases." USDA's proof? "There has never been a disease outbreak among the susceptible animals maintained outside the laboratory since it was established."

* 1975: PIADC begins feeding live viruses to "hard ticks," including the Lone Star tick (never seen outside Texas prior to 1975). The Lone Star tick is a carrier of the Borelia burgdorferi (Bb) bacteria, the causal agent of Lyme Disease. The first cases of the illness are reported in Connecticut, directly across from the facility. Current epidemiological data conclusively demonstrate that the epicenter of all U.S. Lyme Disease cases is Plum Island. It is theorized that deer bitten by infected ticks swam across the narrow waterway separating the island from the mainland.

* September 1978: A PIADC news release relays the following: "Foot and Mouth Disease has been diagnosed in cattle in a pre-experimental animal holding facility at the Plum Island Animal Disease Center." A documented outbreak has occurred.

* 1979: An internal investigation of the FMD incident reveals massive, widespread failures in the containment systems at PIADC. A USDA Committee report recommends that "Lab 101 not be considered as a safe facility in which to do work on exotic disease agents until corrective action is accomplished."

* 1979: Despite containment failures and poor practices, USAMRIID undertakes the investigation of the deadly Zagazig 501 strain of Rift Valley Fever at PIADC. Producing symptoms similar to aerosolized hemorrhagic fevers such as Marburg and Ebola virus, the Army inoculates sheep that should have been destroyed as a result of the FMD outbreak with an experimental Rift Valley Fever vaccine. The experiments are conducted outdoors, in violation of the lab's primary directive prohibiting such work. During a 1977 Rift Valley outbreak in Egypt, some 200,000 people are infected and 700 others die excruciating deaths. A survey of blood serum taken before 1977 proved that the virus was not present in Egypt prior to the epidemic. By 2000, rampant outbreaks of the disease have occurred in Saudi Arabia and Yemen with the virus poised to unfurl its tentacles into Europe.

* 1982: A Federal review begun after the FMD outbreak concludes: "We believe there is a potentially dangerous situation and that without an immediate massive effort to correct deficiencies, a severe accident could result... [L]ack of preventive maintenance, [and] pressures by management to expedite programs have resulted in compromising safety."

* 1983: Six PIADC workers test positive for African Swine Fever virus. The workers are not notified of the test results which are conducted clandestinely during routine annual physical exams.

* 1991: USDA privatizes PIADC. A New Jersey firm, Burns & Roe Services Corporation low bids other competitors and is awarded the contract. In cost-cutting moves, the contractor scales back on safety and security measures in place for decades.

* June 1991: An underground cable supplying Lab 257 shorts out but is not replaced since there is no money left in the budget.

* August 1991: Hurricane Bob, a category 3 storm similar to Hurricane Katrina, slams into Plum Island, knocking down overhead power lines that connect Lab 257. The underground cable which was Lab 257's primary power source has not been repaired. Freezers containing virus samples defrost, air seals on lab doors are breached and animal holding room vents fail. PIADC's "fail safe" mechanism of "air dampers" to seal off the facility also fail. Melted virus samples mix with infected animal waste on lab floors as swarms of mosquitoes fill the facility.

* September 1991: The USDA denies that any system failures occurred during the hurricane. Whistleblowing workers in Lab 257 at the time of the blackout are fired in further cost-cutting moves and several subsequently develop mysterious undiagnosed diseases.

* 1992: The Occupational Safety and Health Administration (OSHA) and the Environmental Protection Agency (EPA) cite PIADC with hundreds of safety violations. When OSHA returned five years later, none of the violations have been corrected and discover 124 new violations.

* July 1992: Although USDA officially denies that PIADC conducts biological warfare research, fourteen officials from the Joint Chiefs of Staff and the Pentagon visit Plum Island. Internal documents reveal that that the visit was "to meet with [Plum Island] staff regarding biological warfare." According to Carroll, "the visitors were part of the Arms Control and Disarmament Agency reviewing the dual-use capabilities of the facility."

* Spring 1995: Lab 257 is closed. Although scheduled to be fully decontaminated and demolished in 1996 Carroll reports: "Lab 257 still stands today, rotting from weathered decay, harboring who knows what deep within."

* August 1999: The first four human cases of West Vile virus, a mosquito-borne pathogen never diagnosed in North America are diagnosed on Long Island. Horse farms within a five-mile radius of one another, directly opposite Plum Island, report horses dying following violent seizures. An investigation reveals that 25% of the horses in this small, localized area test positive for West Nile. The outbreak begins in August 1999 when birds, including half the exotic bird species in the Bronx Zoo begin dying mysteriously. The virus has an affinity for birds and the vector is soon identified as the mosquito. In 1999, the disease was confined to the New York City area, however by 2002, the Centers for Disease Control reports all but 6 of the lower 48 states reported West Nile virus in birds, mosquitos, animals or human populations. CDC estimates that some 200,000 people are infected nationally. During the initial outbreak in 1999, veterinary pathologist Tracey McNamara suspected a casual relationship between the bird die-offs and the human cases; CDC rebuffs her concerns. Through her persistent efforts, it is determined that the virus was indeed West Nile, a pathogen that had never been seen in North America. The CDC announces that West Nile virus was in the nation's blood supply when transplant patients who had no prior exposure to the pathogen develop the disease. The USDA's response? Deny, deny, deny? However, Jim House, a former PIADC scientist, believes that West Nile samples existed prior to 1999 on Plum Island. He told Carroll, "There were samples there, and it wasn't answered clearly to the public. They didn't honestly tell how many samples they had and that's when people started to get upset. When Carroll filed a Freedom of Information Act request for a catalog of germs held in the Plum Island virus library, he was turned down on grounds of "national security."

* September 1999: The New York Times reports that due to "the growing threat of biological terrorism" against America's food supply, USDA "is seeking money to turn the Plum Island Animal Disease Center ... into a top security laboratory where some of the most dangerous diseases known to man or beast can be studied."

* 1999: A Cold War-era document is declassified proving that in the early 1950s USAMRIID shipped twelve vials of weaponized anthrax (enough to kill one million people) to PIADC. In 1993 Newsday revealed that previously unclassified documents demonstrated Pentagon plans to disrupt the Soviet economy by spreading diseases to kill pigs, cattle and horses.

* 1999: Plans to "upgrade" PIADC by building a BSL-4 lab are killed when Congress pulls funding after a public outcry.

* September 2001: After the anthrax attacks, despite USDA denials that anthrax was ever present on the island, FBI investigators include the following questions in their polygraph examination of scientists under investigation: "Have you ever been to Plum Island?" "Do you know anyone who works at Plum Island?" "What do they do there?"

* December 2002: The New York Times reports "a three-hour power failure at the Plum Island Animal Disease Center last weekend renewed concerns about the safety of the high-security government laboratory." According to the Times, "the loss of power and failure of all three backup generators raised fears for the first time that the containment of infectious pathogens could have been seriously compromised at the laboratory."

* June 2003: President George W. Bush transfers control of PIADC to the Department of Homeland Security. The airspace over the island is unrestricted and the gates leading to Lab 101 remain open and unguarded.

* May 2004: In a sign that work on Plum Island is being shifted to "other sites," including those run by private contractors, DHS announces an $18 million grant to study Rift Valley fever, avian influenza and brucellosis.

* August 2004: DHS confirmed that an FMD outbreak "had spread briefly" in "two previously undisclosed incidents earlier this summer," The New York Times reports. A DHS spokesperson said the virus remained "within the laboratory's sealed biocontainment area" and that there "had be no risk" to human or animals. An investigation into the cause "was continuing."

* 2004: At the Medical University of Ohio, a researcher is infected with Valley Fever at the center's BSL-3 facility; Valley Fever is a biological weapons agent.

* February 2005: University of Iowa researchers conduct unauthorized genetic engineering experiments with the select agent Tularemia (rabbit fever). The Sunshine Project reports that researchers mixed genes from Tularemia species and introduced antibiotic resistant characteristics into the samples.

* March 2005: When a containment facility fails, workers at the University of North Carolina at Chapel Hill are exposed to tuberculosis when the BSL-3 "fail-safe" systems malfunction; a blower pushes contaminated air out of the work cabinet, infecting the workroom. The facility had been inspected one month prior to the accident by U.S. Army.

* Summer 2005: At the same Ohio facility a serious accident occurs when workers are infected with an aerosol of Valley Fever.

* October-November 2005: Dozens of samples thought to be harmless are received by the University of California at Berkeley. In fact, they are samples of Rocky Mountain Spotted Fever, a BSL-3 bioweapons agent due to its transmission as an aerosol. The samples are handled without adequate safety precautions; however, the community is never notified of the incident.

* August 2005: The whistleblowing watchdog group Tri-Valley Cares obtains documents in May 2009 proving that the Lawrence Livermore National Laboratory had conducted "restricted experiments" with "select biological agents" at the facility. In 2005, LLNL "inadvertently" released anthrax at the lab in another incident that lab officials attempted to cover-up; five individuals were infected with the deadly pathogen.

* April 2006: Three Texas A&M "biodefense" researchers are infected with Q Fever, a biological weapons agent. Rather than reporting the incident to the CDC as required by law, Texas A&M officials cover-up the accident.

* August 2006: DHS announces that PIADC is "not on the rebuilding list" and a new site to study infectious diseases is being considered.

* January 2009: DHS announces that the new National Bio and Agro-Defense Facility will be built in Manhattan, Kansas.

* July 2009: Government Accountability Office investigators charge that DHS relied on "a rushed, flawed study" to locate the $700 million research facility for highly infectious pathogens "in a tornado-prone section of Kansas." Among other concerns, the GAO cites DHS's "flawed and outdated methodology" in its criticism. Those concerns are: "the ability of DHS and the federal government in general to safely operate a biosafety facility such as the proposed NBAF; the potential for a pathogenic release through accidents, natural phenomena, and terrorist actions; our May 2008 testimony that concluded that DHS had not conducted or commissioned a study to determine whether FMD research could be conducted safely on the U.S. mainland; natural phenomena such as tornadoes, earthquakes, and hurricanes that could cause catastrophic damage to the NBAF and result in the release of a pathogen; the possibility that an infected mosquito vector could escape, allowing a pathogen such as Rift Valley Fever virus to become permanently established in the United States; the economic effects of a release or a perceived release on the local, state, and national livestock industry."

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, his articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press and the whistleblowing website Wikileaks. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press.

Tom Burghardt is a frequent contributor to Global Research.  Global Research Articles by Tom Burghardt
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline ramallamamama

  • Member
  • *****
  • Posts: 1,110
  • Nobody's Slave
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #28 on: August 10, 2009, 08:08:06 pm »
This is hard for me to say (because there is so much going on), but this is one of the most important threads on this forum at the moment!
It boggles the mind how much ALL of it ties in.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #29 on: August 10, 2009, 08:30:10 pm »
Head's up guys...

A separate investigation yielding the same F-ing results:

DAM IS BURSTING OPEN WITH TRUTH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline ramallamamama

  • Member
  • *****
  • Posts: 1,110
  • Nobody's Slave
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #30 on: August 10, 2009, 08:38:52 pm »
EMP attack in 10 9 8 7 6 5 4 3...

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #31 on: August 10, 2009, 09:00:41 pm »
EMP attack in 10 9 8 7 6 5 4 3...

bwaaaaaaaaaahahaha, shit we need some damn comic relief, I mean WTF? If this is the info we are getting, what the hell is going on behind closed doors?
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline ramallamamama

  • Member
  • *****
  • Posts: 1,110
  • Nobody's Slave
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #32 on: August 10, 2009, 09:42:08 pm »
Comic relief? Dude, I'm locked and loaded.

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #33 on: August 10, 2009, 11:54:25 pm »
I finally got a chance to read all of that since I've been gone most of the day (went to see GI JOE) and all I have to say is HOLY SHIT!!! I wanna write something about it but I don't want to leave any of that information out by paraphrasing since there is so much to say about it, but that evidence is so scary it creeps the shit outta me! However it needs to get spread around! I'll figure something out, but it will probably have to be done tomorrow since I am exhausted and need some rest before I take on this mammoth of a story!

I knew PTech was bad bad juju but damn! This is way beyond what I was thinking...and that list of businesses around the world that use PTech software is just mind-boggling! So this virus(swine flu) was created and engineered by a variation of PTech called Oracle8i to be a catastrophic pandemic of biblical proportions!? That's just so insane!!! Its one of those things that is just hard to wrap your head around! I mean PTech essentially is running the entire damn world right now and 99% of the population doesn't even realize what it is or does or can do! HELL IT IS DETERMINING HOW TO KILL US AND WHO AND HOW MANY WILL DIE!!?
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin


  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #34 on: August 11, 2009, 12:14:42 am »

Are We All Ticking Time-Bombs?

Biowarfare * Mycoplasma * 9/11 Anthrax Connection
Iona Miller, August 12, 2008

“And take upon's the mystery of things,
As if we were God's spies.” (King Lear)

"Armis Bella Non Venenis Geri"
-(War is waged with weapons, not with poisons)
-- Ancient Roman condemnation of well poisoning.

"Governments are instituted to lie to the greatest number of people
the greater amount of the time." – Machiavelli

"Every human cause has now the romantic charm of a ‘lost cause’, and the irrelevance of proposed human ends is only equaled by the likelihood of the annihilation of human beings."
– Marshall McLuhan, The Interior Landscape, p.186, 1946-7

This Germ’s for You

The trigger has already been pulled on the smoking gun of biowarfare and we were all in the crosshairs. In the 1950s-70s, pathogenic mycoplasma were covertly released in top-secret “mock” attacks. Dr Maurice Hilleman, chief virologist for the pharmaceutical company Merck Sharp & Dohme, stated that this disease agent is now carried by everybody in North America and possibly most people throughout the world. (Scott, 2001) Is this what they mean by “better living through chemistry?”

Testing open air dispersal on the domestic front contaminated virtually everyone and set time bombs ticking in many. The neurodegenerative and systemic-degenerative diseases are contagious but only manifest as active diseases if the recipient is genetically pre-disposed, has a compromised immune system, or a triggering trauma.

A Washington DC Microbiologist links Gulf War Syndrome (GWS) to the anthrax story, which led to the suspicious death of “mad scientist,” hypno-patsy Dr. Bruce Ivins. Mycoplasma contaminated anthrax vaccines were used in the Gulf Wars, giving rise to GWS. Mycoplasmas are normally benign but have been bioengineered into “new” diseases that are reaching epidemic proportions.

Similar to bacteria, mycoplasma are a group of small microorganisms without cell walls, between cells and viruses. They can invade and burrow very deep into the cell causing chromic infections. Normal mycoplasma infections produce relatively benign diseases limited to particular tissue sites or organs, but GWS strains are very pathogenic, colonize a variety of organs and tissues, and are very difficult to treat.

According to Dr Shyh-Ching Lo, senior researcher at The Armed Forces Institute of Pathology and one of America’s top mycoplasma researchers, infectious mycoplasmas are implicated in AIDS, cancer, chronic fatigue syndrome, GWS, Crohn’s colitis, Type I diabetes, multiple sclerosis, Parkinson’s disease, Wegener’s disease and collagen-vascular diseases such as rheumatoid arthritis and Alzheimer’s. (Scott) Lyme Disease and West Nile Virus were also weaponized when the military explored mosquitos as a delivery vector. Ironically, our biodefense program has created the very threat it was meant to thwart.

“Anthrax vaccine production continues; Michigan Biologics Remains Open,” UPI 2/16/98 2:40 PM State Health Director James Haveman says the (Lansing-based) state- owned Michigan Biologic Products Institute will continue making the vaccine being given to U.S. active and reserve military personnel under a recent Pentagon directive. The mycoplasma story is associated with Michigan State in Lansing, Michigan. Tavistock is associated with Michigan University in Ann Arbor.

There are 400 bioweapon labs across the U.S. 113 of them refuse to publicly disclose their research. When it comes to Germ Warfare, we have met the enemy and unfortunately, it is us. Medical warfare also includes non-military methods exploiting existing civilian infrastructure to control and/or reduce target populations. As the adage goes, “It is never the same after a war.”

Bio-Terror has Already Affected Us All

A Washington-based microbiologist, who wishes to remain Deep Throat anonymous for health reasons, claims there are many unresolved issues surrounding anthrax and anthrax vaccines. He links experimental military use to covert creation of toxic mycoplasmas and Gulf War Syndrome spread through contaminated anthrax vaccine. But who would knowingly do such a thing and why? They’ve done it before and they’ll do it again.

Could it be the same forces behind the August 2008 “apparent suicide” of hypno-patsy, Army research scientist Dr. Bruce E. Ivins? The Fort Detrick microbiologist worked on a biodefense vaccine for anthrax but wound up accused as the “mad scientist” behind the Anthrax Mailings of 2001 that proved fatal for five victims. Now dead, his innocence until proven guilty is forever moot.

Going Postal

Ironically, Ivins had been used as an expert during the FBI investigation but he buckled under pressure from the federal government after he was committed to a facility for treatment of his depression. Who knows what went on there in the name of “treatment?” Was Ivins a “mad scientist” or another mind-bent Manchurian Candidate secretly programmed for self-destruction by psy-ops – a fall guy?

“Dr. Ivins, growing ever more distressed and evidently ever less balanced, committed suicide (with Tylenol) on the day his lawyer was meeting with the FBI about a possible plea bargain that could have left him in jail for life, but would have taken the death penalty off the table.” (Engelhardt)

Richard. Spertzel, head of the biological-weapons section of Unscom from 1994-99, was a member of the Iraq Survey Group. He told the Wall Street Journal, he is strongly suspicious of Ivins’ presumed guilt. He knows from lab protocols, Ivins simply couldn’t produce it alone and didn’t have the equipment. (Madsen) A lone scientist is as unlikely as a “lone gunman.”

Other watchdogs think Ivins’ accusation too convenient for the lame-duck Bush Administration since it officially closes the case to further investigation. It has been suggested the perpetrator is the government itself. As usual, the policy is one of denial. But, why else did the FBI drag its feet?


“Congress originally passed the Patriot Act during an anthrax attack on the offices of the Senate Democratic Majority Leader and the Chairman of the Senate Judiciary Committee. Although the anthrax used in the attack was traced to a strain maintained by the U.S. Army Medical Research Institute for Infectious Diseases (USAMRIID) at Ft. Detrick, Maryland, the perpetrators were never found.”

“…The original Fort Detrick anthrax development program… 'Officially’ ended in 1972 when President Nixon signed, along with the Soviet Union and United Kingdom, the Biological Weapons Convention. Nixon had actually ordered the Pentagon to stop producing biological weapons in 1969. It now seems likely that the U.S. military and intelligence community failed to follow Nixon's orders and, in fact, have consistently violated a lawful treaty signed by the United States.”

“The BBC reported that Battelle Memorial Institute (a favorite Pentagon and CIA contractor and for whom Alibek served as biological warfare program manager in 1998) conducted a secret biological warfare test in the Nevada desert using genetically-modified anthrax…right before the terrorist attacks. The BBC reported that Patrick's paper on sending anthrax through the mail was also part of the classified contractor work on the deadly bacterial agent. ” (Madsen, 2008)

Microbiology: Hazardous to Your Health

What is scarier – a foreign bioterrorist attack or our own rogue scientist who has lost control? How about a rogue government hijacked from its citizenry base and the Constitution? We’ve met the enemy and it’s us. Even if we are just guilty of complacency, that is no excuse for criminal activities carried on in the name of our military and state security.

Guilty or innocent himself, Ivins’ mysterious death refocuses public attention on the long notorious history of biowarfare (BW) and the engineering of chemical and biological lethal agents (CBW). Biological agents, though banned, are a seductive weapon of mass destruction because they are easily deployed in bombs and aerosols. There has been clandestine research, development and testing of some very scary pathogens. We were all the unwitting guinea pigs.

Systemic Mycoplasma Infections are found in patients with: Gulf War Syndrome, Chronic Fatigue Syndrome, Myalgic Encephalomyelitis, Fibromyalgia, Lyme Disease, Rheumatoid Arthritis, Systemic Lupus Erythematosus, Scleroderma, Sjogren's Syndrome, Amyotrophic Lateral Sclerosis, Multiple Sclerosis, Cystic Fibrosis, Asthma, Respiratory Distress Syndrome, Pneumonia, Bronchitis, Inflammatory Bowel Disease, Sarcoidosis, Wegener's Disease, Kikuchi's Disease, Leukemia, Alzheimer's Disease, Autism, Infertility, Stevens-Johnson Syndrome, and Acquired Immune Deficiency Syndrome, Hypercoagulation, Heart Disease, Stroke and Cancer.

Many doctors don’t know about this mycoplasma disease agent because it was developed by the US military in biological warfare experimentation and it was not made public. This pathogen was patented by the United States military and Dr Shyh-Ching Lo. "Pathogenic Mycoplasma", US Patent No. 5,242,820, issued September 7, 1993. Dr Lo is listed as the Inventor" and the American Registry of Pathology, Washington, DC, is listed as the "Assignee".

These are diseases that have existed for thousands of years, but they have been weaponised—which means they’ve been made more contagious and more effective. And they are spreading. this disease agent causes many illnesses including AIDS, cancer, chronic fatigue syndrome, Crohn’s colitis, Type I diabetes, multiple sclerosis, Parkinson’s disease, Wegener’s disease and collagen-vascular diseases such as rheumatoid arthritis and Alzheimer’s . (Scott, 2001)

What would account for an unlikely epidemic of self-destructive microbiologists and computer experts? Being a microbiologist has become a dangerous occupation as over 100 of these scientists and their IT counterparts have died mysteriously over the last few years. What better way to find out who knows too much than cracking their research databases? Could it be their clandestine research has lifted the toxic curtain that veils an agenda of mass human extermination – the ecologically mandated “Die Off” of 4 billion “useless eaters?”


Broken PROMIS: Tentacles of Cryptocracy

In Intelligence they eat their own. The sinister webwork is littered with stolen and broken promises. This germy story is linked to “The Octopus” (intelligence and black ops for profit) conspiracy and the PROMIS software scandal of the 1980s as described by eccentric scientific genius Michael James Roconosciuto, (pronounced Riconoshooto), weapons systems designer and computer software expert.

He’s been accused of being a publicity-seeking pathological liar and a disinformation agent, but the intervening years have proved him right more often than not. He has one foot in the drug underground and the other in hi tech intelligence. Still, even after he went to prison, he continued making uncanny predictions.

MJR was involved in a variety of sensitive intelligence projects besides PROMIS, from selling shoulder-fired missiles to Osama bin Laden during “Charlie Wilson’s War,” to hi-tech top-down computer programming operations, microwave transmissions, digital cash dispersal, cryptoanalytic attack, to germ warfare, and alleged drug dealing. It wouldn’t be far off to say he operated like a gangster. That is to say, this wise-guy knows the score when it comes to both state-sponsored and organized transnational crime

He even predicted 9/11 by hijacking but was ignored. According to Riconosciuto, if properly investigated, the events of 911 may not have occurred. On February 5, 2001, Riconosciuto wrote a certified letter to his attorney, Don Bailey, that he had contact with someone in an Islamic group called the "Base" (AI Qaeda), and that said group was currently in preparation for an attack in the United States, but would not divulge specific details unless the U.S. Government granted immunity from prosecution to his sources. In this letter, Riconosciuto also stated that he had an inside source who could furnish information concerning the handling of false IDs and passports for the group. (Ted Gundersson,

PROMIS was a people-tracking software system sold to intelligence organizations and government drug agencies worldwide. The global dispersion of PROMIS to 88 countries was part of a U.S. plot to spy on other spy agencies. Riconosciuto is one of the architects of the PROMIS backdoor. The original backdoor was a signal using a specialized chip that broadcast the contents of the existing database to monitoring vans or collection satellites using digital spread spectrum data compression whenever the software was run.

The SIGINT was embedded as ordinary computer “noise,” actually encrypted stream cipher. A stream cipher applies a time- varying transformation to individual digits or bits of data. "Time-varying" means the same sequence of plaintext data bits seen at two different points in time will be encrypted to a different sequence of ciphertext data bits. The most famous stream cipher is the Verdam cipher, or “one-time pad.” It requires independent, uniform distribution of the keys, which are used only once and then discarded.

PROMIS was eventually even sold for $2 million to the Russians by infamous traitor Robert Hanssen, who worked for FBI. The Russians passed it on to bin Laden, allowing him to monitor U.S. efforts to track him down, federal law enforcement officials said, according to the Washington Post.

October 26, 2001. Brit Hume. The software program is called Promis. Sources tell Fox that U.S. law enforcement and intelligence agencies have used and constantly modified Promis software to manage caseloads, track and store classified information, and keep it secure for decades.

But the concern is that bin Laden or Al Qaeda could get on-line and use it to monitor the worldwide criminal investigation and hide themselves, to monitor the worldwide financial investigation and hide their money, or monitor government operations of the governments that use the software.

As a senior agent in the FBI's counterterrorism bureau, sources say Hanssen was tasked with helping allies like Germany and England with the installation and use of their versions of the PROMIS program. Numerous countries now, however, are tightening their cyber security, including Germany, Great Britain and Canada has actually investigated potential tampering with its Promis programs. Israel has used it on and off for years, too.

In an interview with this author (Miller) shortly before he went to prison, MJR personally recounted the tangled story of the many tentacles of the metacontrol system, “The Octopus.” His story got weirder than The Matrix but he was perfectly lucid, easily recounting names, dates and particulars, seemingly eager to spread his story in a futile gesture to protect himself from what he perceived correctly as immanent danger. His well-placed “partners” had turned on him. This explained why he had arrived in Southern Oregon “on the lamb” in a Winnebago with a gun turret and a phalanx of body guards.

Michael Riconoscuito was a computer expert for the Central Intelligence Agency, he was their Einstein. There was nothing he couldn't do with a computer, for good or for bad. But he had many secrets and he began to see the ruthlessness of his colleagues. Michael Riconoscuito decided to testify about massive corruption in the U.S. Justice Department and the intelligence agency. He agreed to provide his insider knowledge to the U.S. House Judiciary Committee investigating the Inslaw affair.


Roconosciuto subsequently told his story in print but the details and analysis remain the same. This is the dangerous story that got investigative journalist Danny Casolaro killed in 1991 (another “apparent suicide”), best summarized in The Final Circle, by Carol Marshall (1996), who used MJR’s secret files to connect the dots. This is the story that turned MJR’s handlers against him and “poisoned the well,” sending him to prison where he’s been denied adequate medical care.

Casolaro was trying to prove that the alleged theft of the Inslaw computer program, PROMIS, was related to the October Surprise scandal, the Iran-Contra affair and the collapse of BCCI (Bank of Credit and Commerce International). It’s no surprise Casolaro dubbed former child prodigy “Magic Mike,” now CIA rogue, “Danger Man.”

Shockingly, Riconosciuto claimed that he and Earl Brian had traveled to Iran in 1980 and paid $40 million to Iranian officials to persuade them NOT to release the hostages before the first presidential election won in 1980 by Ronald Reagan with Bush 41 as his V.P. He also claimed to be connected to satanic cults, small arms trafficking, the covert use of Indian reservations nationwide, bio-mass burning plants, "Trojan horses" installed in computers, the Nixon/Reagan/Bush mafia, money laundering through the national HUD agency, the CIA/mafia bust out of savings and loans, sexual slaves used to compromise power mongers, Vietnam drug money laundered to CIA banks, fuel explosives, [and] chemical and biological warfare weapons.

What brought journalist Casolaro to Riconosciuto was an affidavit where MJR claimed that when he worked on the Wackenhut-Cabazon project, he was given a copy of the Inslaw software by Dr. Earl Brian for modification. Riconosciuto also swore that Peter Videnieks, a Justice Department official associated with the Inslaw contract, had visited the Wackenhut-Cabazon project with Earl Brian. Other sources acknowledge that Riconosciuto and Brian were indeed involved in a joint venture between the Cabazon Indians and the Wackenhut Corporation.

Earl Brian ran Hadron, a front company founded in the 80s for questionable activity including germ warfare. Nearly every hospital in the world buys their products. Hadron, with Dr. Earl Brian as director, also provided engineering and computer consulting services. Brian was convicted in the 1980s on fraud charges.

Both Hadron and Dr. Brian were linked with the theft of enhanced PROMIS software from its owner, the Inslaw Corporation. PROMIS was a highly sophisticated computer program capable of integrating a wide variety of databases, now reportedly mated with artificial intelligence. PROMIS was modified for intelligence with a back door that allows for surreptitious retrieval of stored data from adversaries.

Bio Rad made the most hazardous medical, biological and nuclear chemicals in the world. BioRad’s Earl Brian started InfoTech, then Hadron to protect the parent company from lawsuits. MJR claims they had the capacity to bioengineer DNA based, genetically targeted pathogens – ethnic bioweapons. In fact, he claimed to engineer them himself with gene-splicing.

Riconosciuto would make additional claims about Bio-Rad corporation, a medical supplier which had gradually taken over Hercules, California. They were also, Riconosciuto would say, covertly engaged in bio-warfare research—producing some of the deadliest toxins known to man. The focus of Bio-Rad's research was said to be bio-active elements that could be tailored to attack those with certain types of DNA. Weapons could thus be produced that were specifically designed to wipe out specific races or genetic classes of human beings. (Alternatively, particular DNA types could be immunized against a deadly biological agent; the agent could then be released, and everyone else would die.) (Grabbe)

Sound inplausible? Benjamin Fulford made the claim in 2007 that SARS is just such a genetically-selective bioweapon, designed to racially target Asians, specifically Chinese. Likewise, biologist Mae-Wan Ho finds a natural source for SARS implausible. She details the fingerprints of genetic engineering in its biological code which has very unusual features. The spike protein feature alone is enough to trigger serious autoimmune responses, and you can't vaccinate people against their own genes.

An Israeli doctor claims that, "In my 'heart of hearts' I believe that SARS is genetically engineered to target Chinese (Oriental) genetic materials. You may already know that Israel has been working on such a thing, specific to Arab genetic material. Knowing the military-industrial-medical cartel like I do, I would not be surprised if this isn't a 'test market' for something more sinister regarding other populations. What leads me to suspect that genetics are involved is that China is now trying to impose the death penalty on anyone who has contracted SARS. This lets me know that it is much more sinister than an ugly flu strain."

Another doctor, Dr. Robert Lee concludes, "I believe it is likely that SARS coronavirus will disproportionately infect those of Asian, African, and Hispanic extraction and less likely those of Northern European extraction." Meanwhile, the Chinese are prepared to terminate those who break quarantine.

AIDS, considered genetically-engineered by many, created a holocaust amongs gays. It moved on to create a genocidal factor throughout Africa. The agenda again is one of depopulation, the old rubric of culling the surplus population.

It is possible that when MJR was judged "mentally unstable" and fantasy-prone in the 1970s that the psychologists simply lacked the intelligence knowledge base to determine his veracity. He had already peeked behind the curtains. When hi tech emerges from the shadows, it often appears magical for a time. What shrink 20 years ago would have bought into cloaks of invisibility, but now we have stealth.

Airing Dirty Laundry

Hadron tried unsuccessfully to buy Inslaw and its PROMIS (Prosecutor's Management Information System) software in 1983. In 1982 the firm signed a three year contract for $10 million with the U.S. Department of Justice for a case-management computer program that enabled the U.S. attorneys to keep track of information on cases, witnesses and defendants, and to manage their caseloads more effectively. It could be used not only for cracking business, national or international computer systems, but also be modified to track money laundering, even CIA money laundering.

With Riconoscuito's credentials acclaimed by Congress and the Grand Jury, he further stated that he facilitated the laundering of CIA funds via his expertise in manipulating electronic data transmission equipment. This included the transfer of funds which were involved in the October Surprise payment to the Ayatollah Khomeini's regime in Iran. He said he was also responsible for the manner in which [the CIA] caused the interdiction of funds from the sale of Red Chinese gold and the manner in which large sums of CIA funds were secreted and knowledge of where those funds are located.

By 1985, Inslaw was forced into bankruptcy in a DoJ investigation. When Inslaw refused to sell to Hadron, DOJ tried to bankrupt and liquidate Inslaw forcing the rock bottom sale of its assets, including PROMIS, perhaps to Hadron. The software was a reward for Earl Brian's role in arranging the so-called 'October Surprise' gambit. After Earl Brian sold PROMIS around the world, he returned his interests to genetic research, biological technology.

Wackenhut, a “private FBI” with black budget connections, is also linked to the Inslaw scandal. MJR said, “The purpose of the PROMIS software modification that I made in 1983 and 1984 was to support a plan for the implementation of PROMIS in law enforcement and intelligence agencies worldwide. Earl W. Brian was spearheading the plan for this worldwide use of the PROMIS computer software.”

Michael Riconosciuto was director of research for the Wackenhut/Cabazon joint venture in the early '80s. In a March 1991 affidavit for the Inslaw case, Riconosciuto claimed that "in connection with [Riconosciuto's] work for Wackenhut," he modified the stolen Promis software for foreign sales. "Earl W. Brian made [the software program] available to me through Wackenhut after acquiring it from Peter Videnieks, who was then a Department of Justice contracting official with responsibility for the Promis software." Videnieks, a former Customs Service official under Commissioner Chasen, served in the Justice Department from 1981 through 1990.

Not Wacko, Just a Wacken-Spy

In his affidavit, Riconosciuto said Videnieks had threatened to retaliate against Riconosciuto if he cooperated with a House Judiciary Committee probe of the Inslaw case. Seven days after filing the affidavit (which was not, technically, part of the committee investigation), Riconosciuto was arrested on drug-selling charges.

One week after giving an affidavit to Inslaw regarding the PROMIS software in 1991, Riconosciuto was arrested on trumped-up drug charges. The Assistant U.S. Attorney prosecuting the case attempted to cover up Riconosciuto's intelligence background by claiming to the jury he was "delusional." A TV station came and pointed a camera out at the desert at Cabazon and said, "Riconosciuto says he modified the PROMIS software here." Of course Riconosciuto didn't modify the software out between the cacti and yucca. Sand isn't good for computers. He did the modifications in offices in nearby Indio, California. The AUSA told reporters Riconosciuto had been diagnosed with a mental condition, the implication being "he's making all this stuff up". Yes, there had been a mental evaluation of Riconosciuto. I have a copy of the report. The diagnosis? Here it is: NO MENTAL DISORDER. The Department of Justice consistently and maliciously lied to the jury, just as had been threatened by Justice Department official Peter Viednicks if Riconosciuto cooperated with the congressional investigation of PROMIS. (Grabbe)

On the Warpath

This scandal was closely tied to shady dealings by Wackenhut (second largest privte security firm in the US) to develop biological warfare viruses on the Cabazon Indian reservation in Indio, California. According to Spy Magazine, by 1966, “Wackenhut could confidently state that it had secret files on 4 million Americans.”

And, “Wackenhut has been involved with the CIA, ex-analyst says, on a quid pro quo basis.” They subcontracted black ops projects. “Wackenhut has been used by the CIA and other intelligence agencies for years…When they {the CIA} need cover, Wackenhut is there to provide it for them.” CIA director William Casey had once been Wackenhut’s lawyer. Is it surprising then that CIA used Wackenhut to conduct operations it was forbidden to undertake and wants to hide from Congress?

Wackenhut Corporation services included guards and electronic security for banks, office buildings, apartments, industrial complexes, even underground bases. In order to develop vaccines, which sounds innocuous enough, the virus must first be created. Biological warfare viruses have to be highly sophisticated to be used in military applications.

In 1981, Berckmans, the CIA agent turned Wackenhut vice president, joined with other senior Wackenhut executives to form the company's Special Projects Division. It was this division that linked up with ex-CIA man John Philip Nichols, who had taken over the Cabazon Indian reservation in California, as we described in a previous article {"Badlands;" April 1992}, in pursuit of a scheme to manufacture explosives, poison gas and biological weapons—and then, by virtue of the tribe's status as a sovereign nation, to export the weapons to the Contras. (Spy Magazine)

The darker side of Wackenhut's ambitious enterprise, is its direct involvement in illegal and black projects. In the early 1980s, Dr. John Nichols, the Cabazon tribal administrator, by obtaining a Department of Defense secret facility clearance for reservation to conduct various research projects, approached Wackenhut with a detailed joint-venture proposal to manufacture 120mm combustible cartridge cases, 9mm machine guns, laser-sighted assault weapons, sniper rifles, as well as portable rocket-launchers to be built on the Cabazon Reservation, and in Latin America. Details to develop biological weapons were among these proposals.

The reservation was a favorite visiting spot for Saudi sheiks, mob leaders, politicians, military officers, and foreign intelligence people. Two important visitors were Dr. Earl Brian, a businessman with long CIA ties and Peter Videnieks, a Customs lawyer on loan to Justice who Michael said managed the Department a software system. Brian was said to have had many transactions through BCCI and banks in Switzerland and the Cayman Islands. According to both Mike and Bob Nichols, Videnieks was involved with them and Dr. Earl Brian in Hadron Corporation, which tried to buy Inslaw, producer of PROMIS software. Hadron also manufactured lasers. Nicaraguan Contra leaders visited it because weapons were being manufactured there for their use. (Michael Riconosciuto: The Math/Science Wizard Who Said too much, Part 4, by Sherman De Brosse)

Any type of biological research on an Indian reservation is not subject to scrutiny by the federal government because Indian reservations are sovereign nations. Wackenhut Corporation attempted to sell "biological warfare viruses" and vaccine kits to the U.S. government to be used against “small countries bordering Albania or large countries bordering the Soviet Union.”

William C. Patrick, III developed the process by which anthrax spores could be concentrated at the level of one trillion spores per gram. Patrick has worked with Kanatjan Alibekov, known as "Ken Alibek" since he defected to the US in 1992. Remember, Alibek served as manager for a CIA biological warfare program in 1998. In Russia, Alibek was the No. 2 expert in the FSU's biowarfare program, under Vladimir Pasechnik.

Ken Alibek became President of Hadron Advanced Biosystems, a subsidiary of Alexandria, Va.-based Hadron, Inc., specializing in “the development of technical solutions for the intelligence community.” It received millions in funding for medical biodefense research in the field of non-specific immunity from the Defense Advanced Research Projects Agency, the US Army Medical Research and Materiel Command, and the NIH.

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 19,181
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #35 on: August 11, 2009, 01:11:59 am »
The IBM DB2 - Oracle's connection's are very deep - Corba - Mainframe's to micro's and RACF. The need to backdoor "Enterprise" architecture into every database on the planet
Ellison reflects on Oracle history - The CEO's first deal with the CIA
At Oracle OpenWorld in San Francisco, CEO Larry Ellison shares his insights into the company's 30-year history, including its contract with the CIA to build the first commercial relational database.

Oracle CEO Larry Ellison and Pfizer Honored
for Contributions to Aging Research

Filling the Gap in Funding of the Nation's Scientists

NEW YORK, November 15, 2004 — Larry Ellison, CEO of Oracle Corporation will be honored tonight along with leaders in the corporate and scientific community for their commitment to the field of aging research at an awards dinner hosted by the American Federation for Aging Research (AFAR). The dinner to be held at New York City's Essex House, will raise money to fund the nation's young scientists who are conducting research into age-related diseases.

Larry Ellison, through the creation of The Ellison Medical Foundation, has given more than $100 million toward aging research often supplanting federal funding which is in shorter supply and greater demand. The Ellison Medical Foundation supports many of the scientists with cutting edge and innovative ideas, the ones taking risks on which major discoveries are based. The Ellison Medical Foundation has partnered with AFAR to encourage and further the careers of post-
doctoral fellows in the fundamental mechanisms of aging. Nearly $1 million has been committed by the Foundation and the program continues.

"Mr. Ellison's generosity has made the Foundation the largest source of funding for aging research outside the NIH," said Richard Sprott, Ph.D., executive director of The Ellison Medical Foundation. "The partnership with AFAR to fund the development of highly talented young investigators is a very important part of the Foundation's overall approach to improving our understanding of the biology of aging," he added.

Name (Connections) Board Relationships Title Age
Lawrence Ellison   38 Relationships Co-Founder, Chief Executive Officer and Director 65
Safra Catz   53 Relationships Co-President and Director 47
Charles Phillips Jr.  51 Relationships Co-President and Director --

Other Board Members on Board of Directors*
Name (Connections) Board Relationships Primary Company Age
Jeff Henley   24 Relationships InTouch Technologies, Inc. 64
Jeffrey Berg   118 Relationships International Creative Management, Inc. 61 
Donald Lucas Sr.  128 Relationships BulldogIT Corporation 78
H. Raymond Bingham Ph.D.  75 Relationships WaLaSystems, Inc. 63
Michael Boskin Ph.D.  41 Relationships Exxon Mobil Corp. 62
Hector Garcia-Molina Ph.D.  26 Relationships Diamondhead Ventures 55
Naomi Seligman   40 Relationships Cassius Advisors 70
George Conrades   122 Relationships Akamai Technologies Inc. 71
Bruce Chizen   26 Relationships Permira Advisers Ltd. 53

Lawrence J. Ellison       Co-Founder, Chief Executive Officer and Director
Lowell J. Milken Milken Family Foundation Board Affiliations Knowledge Universe
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Mike Philbin

  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #36 on: August 11, 2009, 01:27:58 am »

methinks you've got your next IMMEDIATELY IMPORTANT infowars article -- there's nothing like this out in the world, people are still under the impression that their government will protect them from a eugenics agenda - they don't realise it's gone CORPORATE a long while back. Is there new legislation that allows something like a genetic/cancer/biowar false flag operation of this global scale?

How soon can you get such an article submitted, guys?



  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #37 on: August 11, 2009, 02:05:19 am »


UML - The Unified Modeling Language (UML) for object-oriented analysis and design became an OMG Adopted Technology in 1997 through the united efforts of Rational Software, Microsoft, Hewlett-Packard, Oracle, Sterling Software, MCI Systemhouse, Unisys, ICON Computing, IntelliCorp, i-Logix , IBM, ObjecTime, Platinum Technology, Ptech, Taskon, Reich Technologies, and Softeam corporations.
Check out this resume (excerpt):

Christian Gruber's Resume - Agile Software, Management Consulting

Christian Edward Gruber     +1 (289) 221-9839
Stouffville, ON (Toronto area)    [email protected]
Canada    [email protected]

Architect and Senior Developer


I am a software and enterprise architect with more than ten years of consulting experience, thirteen years of software development experience and a solid history in Object-Oriented Analysis and Design, primarily in areas of Enterprise Application Architecture and Enterprise Integration. Adding over a decade of team leadership and project management, I bring a balance of technical, project mManagement, and business analysis perspectives to my clients.

I have participated in full project lifecycle on four e-commerce and enterprise systems, and played the role of Architect on several others. I have provided clients with architectural critique on behalf of both Sun and Oracle. I have lead teams of varying sizes in Fortune 1000 companies.

In addition to a solid consulting background, I have experience with a wide variety of Enterprise Software plaforms and technologies. I have been involved with Java for as long as Java has existed and have an intimate familiarity with Object-Oriented project life-cycles, iterative processes, including agile and traditional methodologies. I am a key technical contributor on two open source projects, Wotonomy and SQLElements


My global clients have included: A top-tier financial-services firm based in Virginia (Financial), Solution Architects (Consulting), Saskatchewan Community Health and Epidemiology (Government and Health Care), Ford Motor Company UK (Manufacturing), TOTALGAZ -TotalFinaElf (Energy), Rational (High-Tech), Unisys (High-Tech), Sun Microsystems (High-Tech), Wasteco (Energy) TCI Cablesystems (Telecomm), and J.C. Decaux (Advertising), Adhesion Technologies (Financial), Helzberg Diamonds (Resource), iStark (Manufacturing), (E-Commerce), and Infotriever (E-Commerce).


Oracle Consulting Services - Unisys, Rational, and PTech (Jul 1998 - Sep 1998)
Unisys Universal Repository Integration
Lead Developer and Integration Architect

    * Technical Architect: Working with Unisys, Rational, and PTech staff, was architect of a common information exchange architecture based on XML Meta Object Framework for passing object-oriented elements between UREP and external engineering tools
    * Senior Developer: Prototyped Rational integration with UREP (C++/Visual Basic for Applications)
    * Management Consultant: Provided technical assessments to negotiations with Rational regarding UREP Integration
    * Technical Architect: Provided initial level-of-effort assessments for PTech Framework integration


  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #38 on: August 11, 2009, 02:16:39 am »

Dr. Matthew Pocock

BioJava -- Java Technology Powers Toolkit for Deciphering Genomic Codes

By Steven Meloan, June 2004

"To me, bioinformatics has an inherent 'cool factor' because it challenges our approaches to analytics, pushes the envelope on performance, and offers a compelling example for a web services-based industry."

- James Gosling

The 2003 completion of the Human Genome Project marked a true milestone in the history of the human race--a 13-year, global enterprise to map the entirety of our genetic blueprint. But the real work of this reverse engineering of our genetic makeup has only just begun. The next step is one of meaningfully interpreting this massive volume of data--a task that amounts to deciphering a text of three billion characters, in a language that's only passably understood even by molecular biologists. Such analyses present bioinformatics developers with computational tasks on scales, and at levels of complexity, rarely seen before.

Using the scalable, cross-platform, network-aware power of Java technology, researchers at Great Britain's famed Sanger Institute for genetic study have spawned BioJava--an open-source project dedicated to providing genomic researchers with a Java technology-based developer's toolkit. BioJava offers bioinformatics developers over 1200 classes and interfaces for manipulating genomic sequences, file parsing, CORBA interoperability, and more. The facility is already being used at major research and pharmaceutical centers, and in over 85 countries around the world.
Market on the Move

In this era following the completion of the Human Genome Project, bioinformatics is clearly a field whose time has come. In an earlier time, genetics was a field of research whose major discoveries were typically made at the lab bench. But many, if not a majority, of such discoveries are now being made in silicon. With the sheer volume of data and analysis, spanning multi-national pharmaceutical companies and academic collaborative networks, the work simply could not be done without computers. It's not at all uncommon for larger research labs to be generating several hundred Gbytes (or more) of new data, per day.

BioJava was spawned in the mid-90s as a result of the computational needs of Matthew Pocock and Thomas Down, two Ph.D. students at the Sanger Institute in Cambridge, England. As a major sequencing center of the Human Genome Project, Sanger attracts many of the best and the brightest from around the globe. "At the time we arrived," says Pocock, "the Sanger Centre was just getting into sequencing the Human Genome, and it was a very exciting time. The whole world passed through the door. Anybody who was anybody was there at some point during the weekly lab meetings."

Pocock arrived at Sanger with C++ and Perl coding experience already under his belt, but soon found the languages lacking for his tasks. "With Perl, I just couldn't get the performance I needed," says Pocock. "When you're working with Genomic data sets, you're often dealing with Gigabytes of data. And Perl didn't handle that very well. C++ could handle that amount of data, but the language really didn't help you to write portable, robust code."
Enter Java Technology

Pocock began meeting regularly with other developers at Sanger, exchanging bioinformatics coding techniques and design patterns. Then, a year or two into his PhD program, word got out that the Java 2 platform had been ported to the various platforms being used at the center. "At that time, we had Sun Solaris nodes, Pentium Pro boxes running Red Hat Linux, and DEC Alpha systems running OSF1," he says.

As a result of the diverse systems being used at the Sanger Center, cross-platform compatibility was of the utmost importance. "Once we had a Java virtual machine1 (JVM) for all of our various platforms, I could develop and run Java applications at my desktop, but also have them run on our large compute clusters. And not only was the code portable, the Java language kept me from making terrible coding mistakes."

In the same way that genomic data tends to be shared and networked, so does genomic software development. And this made the cross-platform compatibility of Pocock's Java applications all the more valuable to colleagues. "If anyone wrote a piece of software, there were typically ten people who immediately wanted to use it," he reports. "But you have no control over what hardware they may be using."

Once Pocock became office-mates with Thomas Down, the two began sharing software and development tips. "We'd regularly find that we'd both written parsers for the same types of files, or had created object models for the same types of data. After a while, it all got a bit silly." So they joined forces, sharing code, and creating a CVS repository for the code. "That's when the BioJava project was really born," says Pocock.

The first set of classes was officially released in the Fall of 2000. "Just in time to catch the new wave of students arriving at University," says Pocock. "We had about 100 classes at that point."

From its inception, BioJava was designed by interface, but providing working implementations so that developers could extend or replace behavior and implementations.
Culture of Collaboration

While BioJava was originally hosted out of a hardware box in someone's bedroom, the facility is now hosted and maintained under the auspices of the Open Bionformatics Foundation, which also hosts such companion bioinformatics facilities as BioPerl, BioSQL, and BioPython.

The OBF handles the member facilities' modest requirements of hardware ownership, domain name management, and funding for conferences and workshops. While the foundation does not participate directly in the development or structure of the facilities, the members of the foundation are drawn from the member projects, so there is a clear commonality of direction and purpose. "Once a year or so, we all meet up on a sort of coding/hackathon vacation," notes Pocock, "to make sure all the different projects interoperate, as best as possible."

The collaborative and shared nature of genomic research all but cried out for BioJava and the OBF's open source model. BioJava is distributed under an LGPL (GNU Lesser General Public License). The LGPL allows developers to modify the code and fix bugs, and to use the facility as a library foundation upon which to build both free software and commercial packages.

DNA and RNA      

DNA and RNA provide the genetic "code" for all living things. Unlike the binary code of computers, DNA has a basic alphabet of four nucleotides: A (Adenine), G (Guanine), C (Cytosine), and T (Thymine).

While the computer byte contains eight bits, the logical unit of DNA is the "triplet code." Each group of three nucleotides (say, C-T-A) codes for a particular amino acid, the building blocks of all proteins. These triplet codes (or "codons") instruct the step-by-step addition of amino acids, until, finally, a completed protein chain emerges.

Every attempt has been made to keep BioJava usable in almost any environment. "A major constraint is that it has to be possible for anyone to download it and use it, and compile it from scratch if they want to," says Pocock. "So we couldn't tie it into any one IDE. I personally use InteliJ, but other people use Emacs, Eclipse, NetBeans, and more. Meanwhile, we use the standard javac compiler, Apache ANT for the build, and JUnit for testing. And we also use that for regression testing. Every night, we build the entire project and run all the tests."
Growth Curve

BioJava has grown tremendously since its beginnings. The most recent site statistics show 1,264 public classes and interfaces, with over 200,000 lines of code, and over 14 people regularly contributing to the code. "The total number of classes sounds a bit scary when you count it," explains Pocock, "but there are really only about 15 interfaces. And pretty much everything you ever write is to those 15 interfaces. So there's a frightening amount of complexity that you never see, and are happy not to see!"

Both Pocock and Down keep an active hand in maintaining and enhancing the BioJava code, but it is a truly collaborative open source effort. "Someone like myself, or Thomas, or Mark Schreiber, who is now a major contributor to the site, would approve anything that touched the core object model. And we would also discuss that on the mailing list or the IRC. But the project is actually quite modular. There are two people who are involved with the sequence-searching algorithm code. And they would be in charge of making sure that anything committed to that was safe and sane. In the current era, there is no one person who knows the entire library, or who has responsibility for it."

The most recent monthly site statistics (for April of 2004) show a hit rate of over 170,000, with greater than 400 downloads of the BioJava package, comprising a total of over 130,000 files. At peak times, the site receives over 10,000 hits an hour.
Agent of Change

The cross-platform compatibility of BioJava has definitely served it well, particularly in an industry where vendor hardware can change at the stroke of a politician's pen, or at the dictate of a biotech corporate merger. "We're currently running on Wintel boxes," says Pocock, "on three or four flavors of Linux, on Sun Sparc, and on Mac OS X-based Xserve arrays--pretty much anywhere that can run a Java 1.2 JVM."

   Bioinformatics Facts         

    * There are currently over 1400 biotech companies in the U.S., with total revenues of $28.5 billion.
    * 1000 genomes have been studied at some level of detail (including mammals, plants, insects, viruses, and bacteria).
    * The region of the Human Genome coding for proteins comprises less than 2% of the total. The remainder performs currently unknown functions.
    * GenBank, a public database of DNA, RNA, and protein sequences, is doubling in size every six months.
    * Larger genomic research facilities generate upwards of several hundred Gbytes of data per day.
    * The pharmaceutical industry is the most profitable sector of the Fortune 500

And while cross-platform compatibility is a key requirement for the BioJava facility, of nearly equal importance are such features of Java technology as ease of development, scalability, and compatibility with legacy applications and systems.

"Scalability is a huge one for us," says Pocock. "You can have genetic sequences that are seven or eight characters long, or that are 3 Gbytes long. And ideally, you want the same API to manipulate them both."

The bioinformatics realm is clearly still somewhat in "wild west" mode, prone to disparate and home-brewed formats and facilities. So BioJava has to be flexible enough to accommodate this rapidly changing industry. "In bioinformatics, I can sit in my office, write a program that turns out to be useful, give it to a friend, and before I know it, it's being used by 20,000 people. And suddenly, people around the world are writing programs that consume a data format that I made up in my room at home."

In addition to more newly-created home-brewed formats, developers in the genomics realm must also contend with internationally-recognized genomic data banks, as well as formats created by other major software facilities being used in the industry.

In terms of genetic databanks, there are a handful of major entities. "There are three historical ones," reports Pocock, "EMBL, which is the European databank, Genbank, which is the American version, and DDBJ, which is the Japanese version. Then, for storing protein sequences, which is important in the growing field of proteomics, there's Swiss-Prot."

In addition to established data banks, there is also a plethora of genetic analysis facilities, often with their own proprietary formats. "You have Fasta, which just stores the sequences raw," says Pocock, "and then Blast, SSearch, T-Coffee--and every one can have a different file format."

BioJava has to seamlessly handle all of these disparate data types and data formats. "We try to make the memory representation format-agnostic, so that it doesn't matter how you read or write the sequence while you're manipulating it. You have the same sequence in memory, but can then dump it out into multiple formats. You have to enable people to drop-in their own particular formats without having to get into the guts of BioJava."

And in a realm driven by both massive data storage facilities and globally networked systems, and interfacing with disparate systems and facilities, features of the Java platform such as JDBC, JNDI, RMI, and CORBA interoperability also play a vital role. "We have huge data sets," says Pocock, "and it's not practical to load all of that into memory at any one instant. So we use JDBC a lot."

Figure 1. Microbase, a genomic comparison facility using BioJava, FastObjects (a commercial object database), JDO, JDBC, Web Services, Swing/AWT, and more. The facility is comparing two bacterial genomes. The stronger the similarity between the two genomes, the stronger the color of red. Click to enlarge.

For Pocock, even computational throughput can sometimes be best facilitated by using the Java language. "When you're processing entire genomes, you can never have enough computing power," he admits. "But with the Java language, because you have the flexibility of using objects by API, by interface, and to delegate and shuttle things around, you can take a generic algorithm that's optimized to the particular problem such that it often runs faster than a comparable C program. If you're doing a raw compute problem, then Java won't go faster than C. But if it's a problem of complexity, Java can often, particularly with the HotSpot compiler, perform quite well."
Getting Started

While the BioJava facility is large and offers great flexibility and features, it also offers extensive documentation and help content. The site's "Getting Started" section details the location of the downloadable binary files, CLASSPATH setup, how to obtain the modifiable source code, and how to compile and run the provided demo programs. There is also a tutorial area, and extensive JavaDoc content. Finally, thanks to Mark Schreiber, a Principal Scientist for the Novartis Institute for Tropical Diseases in Singapore, there is the "BioJava In Anger" area on the site, an extensive, generously documented "How To" section.

BioJava In Anger offers a cookbook, "How Do I...?" approach to using BioJava, which was precipitated by Schreiber's own early experiences with the facility, and by frequently asked question on the mailing list. "BioJava can be hard to understand at first," says Schreiber, "particularly for novice programmers. The API is huge, so it's a bit hard to find a starting point to begin learning, and to figure out how to instantiate some of the objects. Also, it uses many advanced concepts--like interface-based design, singleton objects, and objects with private and protected constructors."

Schreiber recognized that a great majority of users might have relatively simple tasks they'd like to perform. "BioJava is enormously flexible, and you can do some pretty complex things with it," he says. "But 95% of users will, at least initially, want to do fairly standard tasks."

He began putting up generously-documented solutions to common tasks using BioJava. And the content has proven so popular, it's now been translated into other languages. "The most incredible thing for me is that it's now been translated into French, Japanese, and Chinese," he enthuses.

Schreiber's only regret is being unable to always find the time to add desired new content. "I'm very appreciative of any contributions that other people make," he says. "I'd also like to start developing advanced pages for the site, to demonstrate some of the more complex things you can do with the API."
Out For a Spin

It doesn't require a geneticist to take BioJava out for a test drive. Both Genbank and EMBL offer publicly accessible databases of genomic data. Using these, and examples from BioJava In Anger, it's relatively straightforward to put together sample BioJava-powered applications.

To review, DNA has a basic alphabet of four nucleotides: A (Adenine), G (Guanine), C (Cytosine), and T (Thymine). While the computer byte contains eight digital bits, the logical unit of DNA is the "triplet code." Each group of three nucleotide bases (say, C-T-A) codes for a particular amino acid, the building blocks of all protein. These triplet codes (or "codons") instruct the methodical, step-by-step addition of amino acids, until, finally, a completed protein chain emerges.

In the cell, DNA is first "transcribed" into RNA, and this complementary RNA is then "translated" into protein (through the step-by-step addition of amino acids coded for by the RNA). In the transcription of DNA, each nucleotide (A, G, C, and T) codes for a complement in the resultant RNA: A->U(Uracil), G->C, C->G, and T->A). It's a bit like translating a number from octal to hex. The same information is contained in both, it's just a matter of different storage systems.

Below is an example from BioJava In Anger to transcribe a DNA sequence to RNA, and to then translate that sequence to a protein.

 *NOTE: if you try to create a 'triplet view' on a SymbolList or
 *Sequence whose length is not evenly divisible by three an
 *IllegalArgumentException will be thrown. See 'how to get a
 *subsequence' for a description of how to get a portion of a
 *Sequence for translation.
public class Translate {
  public static void main(String[] args) {
    try {
      //create a DNA SymbolList
      SymbolList symL = DNATools.createDNA("atggccattgaatga");
      //transcribe to RNA
      symL = RNATools.transcribe(symL);
      //prove that it worked
      //translate to protein
      symL = RNATools.translate(symL);
      //prove that it worked
    * this will occur if you try to transcribe a non DNA sequence, or translate
    * a sequence that isn't an RNA sequence.
    catch (IllegalAlphabetException ex) {
     * this will occur if non IUB characters are used to create the DNA SymbolList
    catch (IllegalSymbolException ex) {
     * this will occur if you try to translate a SymbolList using a length that is not  
     * evenly divisible by three.
     * To resolve this issue make a sub-list of only the part you wish to translate.
    catch (IllegalArgumentException ex) {

Career Opportunities

The exploding field of bioinformatics offers Java developers an array of exciting new career opportunities. While a majority of current developers have come to the field from the biology world, picking up coding expertise along the way, the reverse path is also a very real possibility. "I would say that the industry is currently about 2/3 biologists who got into bioinformatics, and 1/3 computer people," says Pocock. "You don't need to be an expert in biology to be a bioinformatics person, but you need to know the basic processes that go on in the cell. If you're an individual who's already an experienced developer, I'd recommend reading the first few chapters of a couple of genetics textbooks, and then writing some code."
Looking Forward

BioJava 1.3 is the current official release of the facility, built upon the Java 1.2 platform. In late 2004 or early 2005, BioJava 2 is slated for release, with new features built upon the Java 1.5 platform.

Pocock see the generics support of the Java 1.5 platform as a particularly big plus for their upcoming release. "It allows us to re-use much more utility code, such as from the Collections framework, without the current type safety issues," he says. "For example, using generics when processing a sequence file, we can return an Iterator over Sequence Object, whereas in earlier Java platform releases, we would have had to return an Iterator over Object. About a quarter of the bugs in the last year were due to these types of type-safety issues. The other big feature that Java 1.5 offers us is source code annotations, which allow a developer to tag source code (such as a class or method) with extra annotations."
Business Opportunities

While BioJava is an open source toolkit, there are already ample business opportunities in and around the facility. In addition to his academic duties -- teaching a Bioinformatics course at The School of Computer Science, University of Newcastle upon Tyne -- Pocock offers training sessions in the use of BioJava. And in partnership with Down and several other colleagues, he has formed Symference, a company providing customized life-science computing solutions to biotech companies. In addition to working with BioJava, Symference offers a companion Java technology based facility called Taverna, which is a web services oriented workflow management tool. Taverna unifies biological discovery on one platform, integrating disparate computing resources.

Meanwhile, Chris Dagdigian (who was instrumental in forming the Open Bioinformatics Foundation and is on its board of directors), has partnered with several colleagues to form BioTeam, a consulting collective dedicated to delivering vendor-neutral informatics solutions to the life sciences industry. The team offers everything from needs assessment, to application optimization, to infrastructure design, to platform installation and tuning.
Just the Beginning

And the bioinformatics field is really just getting started. Less than 2% of the Human Genome codes for protein. The rest, like the dark matter of cosmology, is a relative unknown, seemingly comprised of various regulatory and "epigenetic" regions of information. Then there's the burgeoning field of proteomics (the study of protein structure and function), which may eventually dwarf genomics in terms of data and computational analysis needs. And more recently, bioinformatics has even entered into the realm of "in-silico" computational simulations of living systems--beginning at the cellular level, then, theoretically, on up to the organ level, and eventually to the level of entire organisms. Such simulations offer the promise of predictive models, where the effects of a potential new drug can be tested computationally, prior to any actual animal or human testing.

In short, the more we learn in bioinformatics, the more we discover there is to learn! The computational tasks, and developer opportunities, are virtually endless.

Mike Philbin

  • Guest
Re: DAYLIGHT/ORACLE8i(Ptech) used to rev-engineer 1918 virus-"H1N1" ICG/NCI
« Reply #39 on: August 11, 2009, 03:22:17 am »
one thing that strikes me is, this sort of research is generally developed on a need-to-know basis, under strict levels of access ....

so, if EVERYBODY's working on it, it's a) not that serious a threat nor is its intention to be used as a weapon or b) it won't matter who knows, it's intended for everybody.