Author Topic: Napolitano Bombshell: "We track every single thing you do on the Internet"  (Read 14508 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Napolitano: Internet Monitoring Needed to Fight Homegrown Terrorism
http://www.foxnews.com/politics/2010/06/18/napolitano-internet-monitoring-needed-fight-homegrown-terrorism/
Published June 18, 2010 | Associated Press


WASHINGTON -- Fighting homegrown terrorism by monitoring Internet communications is a civil liberties trade-off the U.S. government must make to beef up national security, the nation's homeland security chief said Friday.

As terrorists increasingly recruit U.S. citizens [This is a lie, the CIA recruits American citizens. Terrorists do not recruit shit, anyone not an American who even sneazes "allah akbar" is tracked 24/7 (also illegally). And if they interact with any American citizen it is because the CIA wants that interaction to occur], the government needs to constantly balance Americans' civil rights and privacy with the need to keep people safe, said Homeland Security Secretary Janet Napolitano. [THIS IS EXACTLY THE HITLER, BUSH, MAO, STALIN DOCTRINE!]

But finding that balance has become more complex as homegrown terrorists have used the Internet to reach out to extremists abroad for inspiration and training [This is a lie of the highest degree. The top 100 sites used for so called recruiting are run out of Langley, 10 Downing Street, or Tel Aviv. Everybody knows this, is she trying to completely discredit herself?]. Those contacts have spurred a recent rash of U.S.-based terror plots and incidents. [Another lie, just because they initiated Project Northwoods which is so obvious with the Chistmas Underwear Intelligence Op and the Times Square Drill does not mean they can use their own false flag black ops to force us into burning the constitution]

"The First Amendment protects radical opinions, but we need the legal tools to do things like monitor the recruitment of terrorists via the Internet," Napolitano told a gathering of the American Constitution Society for Law and Policy. [Has she completely lost her f**king mind? What? What the hell do they have to do with each other? And why has terrorism grown while we have spent over $5 Trillion on exterminating over 1 million so called terrorists while raping another million, maiming many millions, and causing massive exoduses. And all this time causing PTSD and radiation in over a million soldiers, causing over 20,000 dead soldiers through the battlefield or by damaging their minds so much that they end up committing suicide. After all the world gave to this massive undertaking we are supposed to believe that so calld terrorism by random nuts increased? How is this even possible? Do you think maybe there is some other hidden agenda going on? http://video.google.com/videoplay?docid=-2502830637471895940]

Napolitano's comments suggest an effort by the Obama administration to reach out to its more liberal, Democratic constituencies to assuage fears that terrorist worries will lead to the erosion of civil rights.

The administration has faced a number of civil liberties and privacy challenges in recent months as it has tried to increase airport security by adding full-body scanners, or track suspected terrorists traveling into the United States from other countries.

"Her speech is sign of the maturing of the administration on this issue," said Stewart Baker, former undersecretary for policy with the Department of Homeland Security. "They now appreciate the risks and the trade-offs much more clearly than when they first arrived, and to their credit, they've adjusted their preconceptions."

Underscoring her comments are a number of recent terror attacks over the past year where legal U.S. residents such as Times Square bombing suspect Faisal Shahzad and accused Fort Hood, Texas, shooter Maj. Nidal Hasan, are believed to have been inspired by the Internet postings of violent Islamic extremists. [So the slave Napolitano was not enough for the banksters, Rothschild ordered AP to add that cherry of a comment. Hey Rothschild, we know that both Fort Hood and Times Square were protected patsies by the Terrorist Industrial Complex and that it is funded by Bilderberg and acts on behalf of Bilderberg. Bilderberg had the largest motive for the Fort Hood massacre and then ran the 24/7 psyops about so called Homegrown Terrorism and the evil Internet. Thanks for confirming this "kill the Internet" motive.]

And the fact that these are U.S. citizens or legal residents raises many legal and constitutional questions.

Napolitano said it is wrong to believe that if security is embraced, liberty is sacrificed.

She added, "We can significantly advance security without having a deleterious impact on individual rights in most instances. At the same time, there are situations where trade-offs are inevitable."

As an example, she noted the struggle to use full-body scanners at airports caused worries that they would invade people's privacy.

The scanners are useful in identifying explosives or other nonmetal weapons that ordinary metal-detectors might miss -- such as the explosives that authorities said were successfully brought on board the Detroit-bound airliner on Christmas Day by Nigerian Umar Farouk Abdulmutallab.
[THEY HAD THESE RAPE SCANNERS AT THE AIRPORT HE FLEW OUT OF! UNDERSECRETARY OF STATE KENNEDY EXPLAINED IN A LIVE PRESS CONFERENCE THAT HE WAS PUT ON THE PLANE EVEN THOUGH HE WAS NOT AUTHORIZED AND HAD NO PASSPORT BY A US INTELLIGENCE OFFICER!!!! THESE RAPE SCANNERS CANNOT STOP THE CIA FROM CONDUCTING FALSE FLAGS!!!]


He is accused of trying to detonate a bomb hidden in his underwear, but the explosives failed, and only burned Abdulmutallab.

U.S. officials, said Napolitano, have worked to institute a number of restrictions on the scanners' use in order to minimize that. The scans cannot be saved or stored on the machines by the operator, and Transportation Security Agency workers can't have phones or cameras that could capture the scan when near the machine. [These scanners are controlled by NRO, she has no power whatsoever on what they do. What a joke]
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Monitoring the internet will never stop their false flag terror attacks.

In actuality, she enhances the attacks with this insane monitoring.

If random American people expose the plans (which has occured over the last 3 attempts), she can shut down the whistleblowers to make surre they go forward.

They tried to do this with the underwear christmas bomber that the State Department admitted was working for a US intelligence agency.

The Mumbai attack was all orchestrated by US DEA.

Their false flags are being exposed and they need to stop the American people from exposing these plans, that is the purpose of their draconian and anti-constitutional actions.

They need to destroy the constitution in order to get their next Iran false flag done, that is why Napolitano is going completely batshit crazy like this.

Napolitano...it is illegal, on its face it is illegal.

It is the same as Bush saying he would torture again.

It is illegal and just shows 7 billion humans that the banksters own your ass (just like with the swine flu bullshit) and you do not give a crap about the American people or the oath you took of office.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Hey Napolitano...WTF is the Department of Homeland Security in the first place? Did you know it is a Nazi invention? If it actually had any legitimacy whatsoever, wouldn't it be concerned about the theft of $28 Trillion?

Alex Newman Reveals Fed Manipulation & Bernanke's Trillions on Alex Jones Tv 1/2
http://www.youtube.com/watch?v=53e_DFoZU1w

Alex Newman Reveals Fed Manipulation & Bernanke's Trillions on Alex Jones Tv 2/2
http://www.youtube.com/watch?v=VIpRUxknfDw



Alex Newman talks with Alex about his latest article, Fed Manipulations in the Crosshairs. "It turns out that under the guise of "stabilizing" the economy, the Federal Reserve banking cartel had set in motion a series of actions that would eventually transfer over $28 trillion (and counting) to the bankers at taxpayers' expense, all while decimating the investments of countless average Americans," writes Newman.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline larsonstdoc

  • Moderator
  • Member
  • *****
  • Posts: 28,341
She probably profiles all the Prison Planet Forum members at night for Rahm.

The government is insane.  If government workers  had any skills, they would work in the private sector.
I'M A DEPLORABLE KNUCKLEHEAD THAT SUPPORTS PRESIDENT TRUMP.  MAY GOD BLESS HIM AND KEEP HIM SAFE.

Offline phosphene

  • Member
  • *****
  • Posts: 1,826
we have been spied on with supercomputers and satellites since the clinton administration, at least. 2 decades of spying on the slaves got em shakin in their boots.
"A strange game. The only winning move is not to play."--Joshua

Offline citizenx

  • Member
  • *****
  • Posts: 9,086
Hey Janet,

Track this!

Why don't you go out and catch some real criminals, like a big boy? ;)

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
She probably profiles all the Prison Planet Forum members at night for Rahm.

The government is insane.  If government workers  had any skills, they would work in the private sector.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline CheneysWorstNightmare

  • Member
  • *****
  • Posts: 2,105
  • F*CK THE NEW WORLD ORDER!
    • Youtube Profile
These Nazis know who we are.  After the next false flag, which they blame on Patriots, they will be declare Martial Law and open the FEMA camps.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Why isn't Homeland Security tracking this:

http://forum.prisonplanet.com/index.php?topic=125011.0

Sibel Edmonds Case: The Real Culprits Of 9/11
http://www.911blogger.com/node/11334
Submitted by Jon Gold on Thu, 09/13/2007 - 10:22am.
Source: opednews.com Luke Ryland 9/11/2007

Former FBI translator Sibel Edmonds has made a number of disturbing claims about the 911 attacks, but perhaps the most disconcerting is her oft-repeated statement that the US authorities have covered up an entire organizational layer within al-Qaeda. In the documentary, Kill The Messenger, Sibel says:

"They haven't mentioned anybody who actually is connected to Al Qaida, in mid or higher level."

Similarly, Sibel often says:
"And I would like to give an analogy - if you take the War on Drugs, imagine if they only went after street dealers and they refused to investigate the mid-level dealers or the drug lords. This is very similar."

As we approach another 911 anniversary, it's time we learnt:
1) Who are these mid and high-level al-Qaida operatives?
2) What role did they play in planning 911?
3) What operational support did they provide?
4) Why they are still roaming free today?
5) Why did the US authorities continually exclude key participants from the official narrative?

Sibel Edmonds is the most gagged woman in US history making it a little it difficult for us, the public, to have a detailed understanding of everything she knows about al-Qaida and the 911 attacks, but she has given interviews and written a number of great articles and letters which enable us to put some of the pieces together. Immediately after the release of the 911 Commission report, Sibel wrote an open letter to Thomas Kean and the Commission in which she chided the 911 Commission panel for ignoring important issues related to the attacks, and she also made public some of her closed-door testimony to the 911 Commission. For example, in that letter, Sibel identified specific warnings from April 2001 that:
"1) Osama bin Laden was planning a major terrorist attack in the United States targeting four or five major cities;
2) the attack was going to involve airplanes;
3) some of the individuals in charge of carrying out this attack were already in place in the United States;
4) the attack was going to be carried out soon, in a few months."

As we all know, this information was not included in the Commission report, and was barely mentioned in the US media even though it was confirmed in the Chicago Tribune and FBI Director Robert Mueller was surprised that he wasn't asked about it by the 911 Commission. In fact, according to Sibel,  "(A)fter 9/11 the agents and the translators were told to "keep quiet" regarding this issue." More importantly, for today's purposes, I want to focus on this statement from the same letter:

"The public has still not been told of the intentional obstruction of intelligence. The public has not been told that certain information, despite its relevance to terrorist activities, is not shared with counterterrorism units. This was true prior to 9/11, and it remains true today. If counterintelligence receives information about terrorism that implicates certain nations, semi-legit organizations or the politically powerful in this country, then that information is not shared with counterterrorism, regardless of the consequences. In certain cases, frustrated FBI agents have cited "direct pressure by the State Department." The Department of Justice Inspector General received detailed evidence regarding this issue. I provided your investigators with an account of this issue, the names of other witnesses willing to corroborate this, and the names of U.S. officials involved in these transactions and activities."

In order to understand this, we need to understand a little bit about how the FBI operates. 'Counterintelligence' (CI) is essentially a monitoring organization which routinely investigates various groups - such as embassies, and groups like AIPAC and the American Turkish Council (ATC) - which might be involved in criminal activity, or otherwise might be able to provide valuable information. If and when CI comes across evidence of criminality, they are supposed to forward that information and evidence to other divisions of the FBI which have the authority, and responsibility, to act on the information and arrest the guilty parties. Typically the cases will be forwarded to, for example, Public Corruption, or Narcotics, or in this case, Counter Terrorism (CT). As Sibel indicates, prior to 911, the State Department put pressure on people at FBI HQ to block the transfer of certain cases to the actionable divisions within the FBI. Outrageously, even immediately after 911, the State Department continued to refuse CI permission to pass significant information to Counter-terrorism that was directly relevant to the 911 attacks. In other words, while the Bush administration was rushing through the PATRIOT ACT, rounding up thousands of 'suspects' and gutting the Constitution, the State Department was protecting many of the key participants in the mass murder on 9/11 in order to protect 'sensitive diplomatic relations.'

Here's Sibel describing the cover-up:
"What occurred with the 911 related investigation - be it the FBI, or the Department of Defense, or the Department of State, or the CIA or the Pentagon - they choose to basically publicize the deal at the hijacker level - and completely went about covering up certain entities that they had DIRECT evidence, DOCUMENTED evidence of the support networks - be it the financial support networks, or communications, or obtaining visas - they have not touched those individuals. Those individuals are still roaming free! Today!"

And here's Sibel again, making the same point:
"I will give you an analogy, okay? Say if we decided to have a "war on drugs," but said in the beginning, "right, we're only going to go after the young black guys on the street level..." But we decided never to go after the middle levels, let alone the top levels... It's like this with the so-called war on terror. We go for the Attas and Hamdis – but never touch the guys on the top." Which people are Sibel talking about? Sibel is talking about three different, though often over-lapping, groups of:
a) Those who were directly involved in planning and/or facilitating the 911 attacks,
b) Those who knowingly, specifically, intentionally provided and facilitated 'indirect' support functions for the attacks
c) Those who support and finance al-Qaeda generally.

Let's begin at the highest level. In Sibel's "THE HIGHJACKING OF A NATION - Part 1" she quotes Senator Bob Graham's numerous statements that Saudi Arabia's support for some of the 911 hijackers has been hidden in the redacted 27 pages of the congressional inquiry's final report into 911. Sibel notes:
"What Graham is trying to establish in his book and previous public statements in this regard, and doing so under state imposed 'secrecy and classification', is that the classification and cover up of those 27 pages is not about protecting 'U.S. national security, methods of intelligence collection, or ongoing investigations,' but to protect certain U.S. allies. Meaning, our government put the interests of certain foreign nations and their U.S. beneficiaries far above its own people and their interests. While Saudi Arabia has been specifically pointed to by Graham, other countries involved have yet to be identified." (emphasis mine)

In various other interviews and articles, Sibel gives us some clues as to which 'other countries' she is pointing to. For example, in this 2006 interview, Sibel says, "We're not just talking about - as they say - Saudi Arabia and Egypt - but they have glossed over the involvement of certain entities within other countries - such as Turkey, Pakistan, Azerbaijan, Kyrgyzstan, Tajikistan - many Central Asian countries. They have absolutely covered up the involvement of certain entities - it's not necessarily only governmental - from these other countries - Central Asia - they call it "Sensitive Diplomatic Relations' - you know they are putting (military) bases there.

Please note that not only is the US establishing military bases in these countries, these countries are generally:
1) Major customers for US military hardware
2) US 'allies'
3) Anti-democracy, anti-freedom, police states
4) Major players in the heroin trade
5) Supporters of various terrorist activity

Sibel describes the US' hypocrisy (if that's the correct descriptor), particularly as it relates to Turkey, in The Highjacking of a Nation: Part 2: "Curiously enough, despite these highly publicized reports and acknowledgments of Turkey's role in these activities (Ed: nuclear black market, heroin trafficking, illegal arms sales), Turkey continues to receive billions of dollars of aid and assistance annually from the United States. With (Turkey's) highly placed co-conspirators and connections within the Pentagon, State Department and U.S. Congress, Turkey never has to fear potential sanctions or meaningful scrutiny; just like Saudi Arabia and Pakistan. The criminal Turkish networks continue their global criminal activities right under the nose of their protector, the United States, and neither the catastrophe falling upon the U.S. on September Eleven, nor their direct and indirect role and ties to this terrorist attack, diminish their role and participation in the shady worlds of narcotics, money laundering and illegal arms transfer.

The 'respectable' Turkish companies established and operate bases in Azerbaijan, Uzbekistan and other similar former Soviet states. Many of these front companies, disguised under construction and tourism entities, have received millions of dollars in grants from the U.S. government, allocated to them by the U.S. congress, to establish and operate criminal networks throughout the region; among their networking partners are Al Qaeda, the Taliban, and the Albanian Mafia. While the U.S. government painted Islamic charity organizations as the main financial source for Al Qaeda terrorists, it was hard at work trying to cover up the terrorists' main financial source: narcotics and illegal arms sales. Why?"  In summary, certain US allies protect a bunch of organizations which support al Qaeda and the Taliban. Despite this, these organizations, and their host countries, are protected by the US government under the guise of protecting 'sensitive diplomatic relations' and "protecting certain foreign business relations." When Sibel first began claiming publicly that the US was covering up the role of certain allies in 911, her claims sounded so outrageous that she was largely dismissed. In 2007 it has become accepted fact. For example, when Presidential hopeful Barack Obama states that Pakistan, a US ally, is protecting Osama bin Laden, there is no about about whether this is true or not, only what to do about it. Similarly, Senator Bob Graham says in his book: "It was as if the President's loyalty lay more with Saudi Arabia than with America's safety."

Some Specific Examples of Hiding the Culprits
In this section, I'll take a look at some examples of organizations and individuals that were believed by the FBI to have played roles in 911 but have escaped any accountability.

American Turkish Council (ATC)
The ATC is a mini-AIPAC - a lobbying group where Turkey's business and military leaders interface with America's finest; current politicians from both parties, CEOs from the Military Industrial Complex (MIC), and former high-level officials acting as lobbyists. The ATC was being monitored by FBI counterintelligence (as well as CIA counterintelligence (Brewster Jennings)) and much of the information that Sibel learned is believed to have come from the surveillance of the ATC. Sibel says that the ATC is essentially a front organization for various criminal activity - ranging from nuclear black market, heroin trafficking and illegal arms sales - and was being "monitored in a 9/11 investigation." Despite the ATC's role in all of this criminal activity, it is demonstrably untouchable and is alive and well today. In fact, Sibel goes as far as to say that the ATC is basically a representative arm of the U.S. government, lobbyists, foreign agents, and the MIC. It's not a surprise, therefore, that the ATC has some type of informal 'protected' status, and that the FBI can't act on any of the information uncovered in any of the counter-intelligence operations.

Melek Can Dickerson
Dickerson joined the FBI in October 2001 as a Turkish translator. She had previously worked at the ATC and two other organizations that were the targets of FBI counterintelligence. Almost immediately, Dickerson began engaging in various espionage activities including attempting to recruit Sibel and other translators into the espionage ring, intentionally covering up FBI evidence which implicated her friends at the ATC and elsewhere, stealing documents and leaking them to her friends, and falsifying "top-secret documents related to 9/11 detainees" in an attempt to falsely exonerate her guilty associates. Sibel's claims regarding Dickerson were investigated and validated by the FBI. Remarkably, Dickerson was allowed to keep her Top Secret clearance, and was allowed to continue translating Top Secret information regarding her friends and associates, including 911 investigations, for another 6 months until she fled the US.

Top Targets of 911 Investigation
Melek Can Dickerson and her husband, USAF Major Doug Dickerson, offered to introduce Sibel to some of their friends, including two Turkish guys who belonged to the ATC and worked out of the Turkish embassy in DC. According to Sibel, "These two people were the top targets of our investigation!" For one reason or other, these two (and maybe more) "top targets" of the 911 investigation were allowed to leave the US in mid-2002 without ever having even been interviewed. Prior to Robert Mueller's testimony at the 911 Commission, Sibel prepared a list of questions for the Commissioners to ask Mueller including: "Director Mueller, is it true that several top targets of FBI investigations, related to support networks of terrorist activities, were allowed to leave the United States, months after the 9-11 attacks, without ever being questioned? Why?" That question remains unanswered.

"Blueprints, pictures and building material for skyscrapers"
Another case that was apparently ignored by the US authorities was a mid-2001 wiretap that Sibel translated of a prisoner who had been arrested on narcotics charges. The FBI agents suspected that he might be involved in terrorism-related activity and wiretapped his phone calls from prison. In one phone call, this individual organized for blueprints, photos & details of the building material of the World Trade Center to be sent to (presumably) the authors of the 911 atacks who were hiding in a remote border location somewhere in the Middle East. The wiretap also "revealed illegal activities in obtaining visas from certain embassies in the Middle East through network contacts and bribery."

Immediately after 911, another wiretap captured this same individual congratulating an associate on the successful attack. Who was this individual? Who did he phone to deliver the blueprints? Was he a mastermind of 911? Was he acting on his own initiative? If not, at whose behest (and why was he doing from jail?)? Who was he congratulating? We don't know the answer to any of these questions. In fact, in July 2002, FBI Director Robert Mueller "maintained... that the 19 al-Qaida hijackers operated independently in the U.S. and were an isolated case" telling the joint congressional 911 inquiry:  "As far as we know, the (hijackers) contacted no known terrorist sympathizers in the United States," Mueller was effectively lying (although he may have technically given himself wiggle-room). As Sibel said, the US authorities "completely went about covering up certain entities that they had DIRECT evidence, DOCUMENTED evidence of the support networks - be it the financial support networks, or communications, or obtaining visas... They have absolutely covered up the involvement of certain entities - it's not necessarily only governmental - from these other countries" Of course, it's not just Mueller who knows what Sibel knows. I'll finish with two more quotes. The first is from an interview with Chris Deliso

Deliso: You think they [the government] know who they are, the top guys, and where?

Sibel: Oh yeah, they know.

Deliso: So why don't they get them?

Sibel: It's like I told you before – this would upset "certain foreign relations." But it would also expose certain of our elected officials, who have significant connections with high-level drugs- and weapons-smuggling – and thus with the criminal underground, even with the terrorists themselves.

And finally, in Kill The Messenger, Sibel says:
"I am not the only one who knows about this. Too many people know this! The fraudulent 9/11 Commissioners, every single one of them knows about my case and the details, and the names, and all the specifics. Several people within the U.S Congress do know. Everybody in the FBI, involved, they know! Everybody in Department of Justice, they know! My goal has been exposing the criminal activities: money laundering, narcotic activities, and nuclear black market, converging with terrorist activities. Put out the tapes, put out the wiretaps! Put out those documents! Put out the truth! The truth is going to hurt them, the truth is going to set me free!"

Everybody knows except us. It's time we knew.

Let Sibel Edmonds Speak: Call Waxman. Demand public open hearings:
DC phone: (202) 225-3976
LA phone: 323 651-1040
Capitol switchboard phone: 800-828-0498


~~~~~~~~~~~~~~~~~~~

BLOGGED BY Brad Friedman ON 10/29/2007 5:30AM  
http://www.bradblog.com/?p=5197



EXCLUSIVE: FBI Whistleblower Sibel Edmonds Will Now Tell All - and Face Charges if Necessary - to Any Major Television Network That Will Let Her
She's Prepared to Name Names, Including Those of Two 'Well-Known' Congress Members Involved in Criminal Corruption
The 'Most Gagged Person in U.S. History' Tells The BRAD BLOG She's Now Exhausted All Other Channels...

-- By Brad Friedman

Attention CBS 60 Minutes: we've got a huge scoop for you. If you want it.

Remember the exclusive story you aired on Sibel Edmonds, originally on October 27th, 2002, when she was not allowed to tell you everything that she heard while serving as an FBI translator after 9/11 because she was gagged by the rarely-invoked "States Secret Privilege"? Well, she's still gagged. In fact, as the ACLU first described her, she's "the most gagged person in the history of the United States of America."

But if you'll sit down and talk with her for an unedited interview, she has now told The BRAD BLOG during an exclusive interview, she will now tell you everything she knows.

Everything she hasn't been allowed to tell since 2002, about the criminal penetration of the FBI where she worked, and at the Departments of State and Defense; everything she heard concerning the corruption and illegal activities of several well-known members of Congress; everything she's aware of concerning information omitted and/or covered up in relation to 9/11. All of the information gleaned from her time listening to and translating wire-taps made prior to 9/11 at the FBI.

Here's a handy bullet-point list, as we ran it in March of 2006, for reference, of what she's now willing to tell you about.

"People say, 'why doesn't she just come forward and spill the beans?' I have gone all the way to the Supreme Court and was shut down, I went to Congress and now consider that shut down," she told The BRAD BLOG last week when we spoke with her for comments in relation to our story on former House Speaker Dennis Hastert's original attempt to move a resolution through the U.S. House in 2000 declaring the 1915 massacre of 1.5 million ethnic Armenians in Turkey as "genocide."

"Here's my promise to the American Public: If anyone of the major networks --- ABC, NBC, CBS, CNN, MSNBC, FOX --- promise to air the entire segment, without editing, I promise to tell them everything that I know," about everything mentioned above, she told us.

"I can tell the American public exactly what it is, and what it is that they are covering up," she continued. "I'm not compromising ongoing investigations," Edmonds explained, because "they've all been shut down since."


"She's Very Credible"

She has, in fact, spent years taking every reasonable step to see that the information she has goes through the proper channels. The Supreme Court refused to hear her whistleblower lawsuit, even in light of the Department of Justice forcing the removal of both her and her own attorneys from the courtroom when they made their arguments concerning why it was that she still had to remain gagged under the "States Secrets Privilege."

On the morning that the SCOTUS refused to hear her case, the facade cracked on the front of the building. In a ridiculously ironic metaphor which would have been rejected by any credible screen-writer, a chunk of marble --- just above an allegorical statue representing "Order" and just below the words "Equal Justice" --- came crashing to the ground.

She has met with, and told her story to, U.S. senators including Republican Charles Grassley and Democrat Patrick Leahy, both of the Senate Intelligence Committee, both who found her extremely credible. 60 Minutes producers may remember when Grassley told them, "Absolutely, she's credible...And the reason I feel she's very credible is because people within the FBI have corroborated a lot of her story."

In fact, the FBI itself has done so. Their Inspector General found her allegations, as described in the unclassified version of his report, to be "credible," "serious," and "warrant[ing] a thorough and careful review by the FBI."

As far back as 2002, Grassley and Leahy co-wrote letters on Edmonds' behalf to Attorney General John Ashcroft, FBI Director Robert Mueller, and DoJ Inspector General Glenn A. Fine, calling on all of them to take action in respect to the allegations she's made.

"Certain officials in this country are engaged in treason against the United States and its interests and its national security," she said during an interview an August 2005 interview on Democracy Now. That comment followed 60 Minutes' revelation years before alleging that Edmonds had information revealing that a "Turkish intelligence officer" she worked with at the FBI "had spies working for him inside the US State Department and at the Pentagon."

She's briefed many legislative offices --- as well as the 9/11 Commission --- in regard to her claims, and now, she says, she's even prepared to tell the media "the names of every single Congressional office who has received the names of the witnesses" to the crimes she's detailed.

When we spoke last week, Edmonds seemed to reserve most of her frustration for Congressman Henry Waxman's office. Waxman is the Democratic Chairman of the U.S. House Government Reform and Oversight Committee.

After briefing members of his security-cleared staff "inside the SCIF" --- a high-security room in the U.S. Capitol, specially created for discussion of highly sensitive information --- Edmonds says she was told on several occasions, prior to the 2006 Election, that her case would be one of the first heard in his committee, once he became Chairman.

"I even gave names of former and current FBI agents who were willing to go to Waxman's office and give more information on all of this," she said.

"Before the elections, I had a promise from Congressman Waxman's office." She claims they told her, before the election, "the only reason they couldn't hold hearings, was because the Republicans were blocking it."

"They said 'your case will be one of the first ones we will hold investigations on,'" she told us. Now, however, since the Democrats have become the majority in the House, Waxman's office is "going mum." They won't even respond to her calls.

The congressman's office did not respond to several requests for comment on this story.

Two Other "Well-Known" Congressmen

Aside from the allegations she's already made concerning Hastert, as we reported in some detail in early 2006, following up on a Vanity Fair exposé in 2005, Edmonds says there are at least "two other well-known" members of Congress that she's prepared to name as well.

"There are other Congressional people, whose names have not come out," she explained. "As [Waxman's office knows] I'll be able to give them file numbers and investigations, including investigations by the IRS. I will be giving details one by one, not just allegations."

"But," she added, "unfortunately nobody wants to have an investigation like that."

For the record, she told The BRAD BLOG, the other two "well-known members" are from the House, both Republican, and "one of them is recently no longer there."

So far, she says, "those names have not been public."

"Kafka-esque"

Since leaving the FBI, and in the wake of her years-long ordeal, which she frequently describes as "Kafka-esque," Edmonds has founded the National Security Whistleblowers Coalition.

In addition to the support she has received, at various times, from members of Congress, she's received a great deal of support from members of the national security whistleblower community and government watchdog organizations.

As we reported last Spring, Veteran FBI counterintelligence agent John Cole has said he's "talked to people who had read her file, who had read the investigative report, and they were telling me a totally different story" than that given publicly by FBI officials. "They were telling me that Sibel Edmonds was 100 percent accurate," he said, "management knew that she was correct."

Famed "Pentagon Papers" whistleblower Daniel Ellsberg has described Edmonds as "extremely credible." In a 2005 interview on KPFA, Ellsberg said, "FBI agents we've talked to have, in every respect that was raised, have confirmed her story - that she's a very credible witness."

More than 30 groups, from across the political spectrum --- including the Project on Government Oversight (POGO), Citizens for Responsibility and Ethics in Washington (CREW), the American Civil Liberties Union (ACLU), the September 11th Advocates, the Liberty Coalition, the Electronic Frontier Foundation (EFF), OMB Watch, Electronic Privacy Information Center (EPIC) and People for the American Way (PFAW) --- all signed a letter in March of this year calling on the House Oversight Committee to "hold public hearings into the case of FBI Whistleblower Sibel Edmonds, and the erroneous use of the State Secrets Privilege to shut down all court proceedings in her case."

That petition was sent almost precisely one year after The BRAD BLOG originally reported on a public petition to Congress, demanding they hold public hearings. More than 30,000 people, Edmonds says, have now signed that petition since it was first announced.

"Exhausted Every Channel"

In a speech given over the Summer in D.C. at the American Library Association (ALA, video here), Edmonds detailed the "Kafka-esque" nature of her unprecedented gag-order. Among the information still-regarded as "classified" under the States Secret Privelege: the fact that she was a translator for the FBI, where she was born, what languages she speaks, the date of her birth, the universities she attended, and the degrees she earned.

In fact, the interview that CBS's 60 Minutes aired with her in 2004, was later retroactively classified by the Department of Justice under the same "privilege"!

But enough is enough. She's now ready to tell all. To the public. But not (yet) to us. She will speak, however, to any broadcast network that would like to have her.

"I have exhausted every channel. If they want to, they can bring criminal charges against someone who divulges criminal activity, and see how far they're going to get."

But will any of the corporate mainstream networks take her up on the offer? It'd certainly be an explosive exclusive.

"I don't think any of the mainstream media are going to have the guts to do it," she dared them.

So whaddaya say 60 Minutes? We've given you scoops before that you ended up turning down --- and likely later regretted. Will you be smart enough to take this one?

"You put me on air live, or unedited. If I'm given the time, I will give the American people the exact reason of what I've been gagged from saying because of the States Secrets Privilege, and why it is that I'm the most gagged person in the history of the United States."

"My feeling is that none of them have the guts to do that," she dared them, before charging, "they are all manipulated."

"I keep using the word Kafkaesque..." she paused, during her speech at ALA, clearly showing her exasperation, "because...," she continued slowly, "...I really can't come up with a better word."



Sibel 'names names' (in pictures!)

Over at Sibel's website, she has published "Sibel Edmonds’ State Secrets Privilege Gallery" - twenty one photos of people.

Sibel doesn't say anything about the photos - or the people in the photos - but we can reasonably presume that they are the 21 guilty people in her case.

Sibel has broken the photos into three different groups.

The first group contains current and former Pentagon and State Department officials.

Richard Perle


Douglas Feith


Eric Edelman


Marc Grossman


Brent Scowcroft


Larry Franklin


The second group is current and former congressmen

Dennis Hastert - Ex-House Speaker (R-Il)


Roy Blount - ( R, Mo)


Dan Burton - (R - IN)


Tom Lantos - (D- CA)


?

Bob Livingston - ex-Speaker of the House (R-LA)


Stephen Solarz (D-CA)


The 3rd group includes people who all appear to work at think tanks - primarily WINEP, The Washington Institute for Near East Policy

Graham E. Fuller - RAND


David Makovsky - WINEP


Alan Makovsky - WINEP


?

?

 Yusuf Turani (President-in-exile, Turkistan)


Professor Sabri Sayari (Georgetown, WINEP)


Mehmet Eymur (Former Turkish Spy Chief MIT)


As you can see, there are a couple of 'Question Marks' instead of photos. I'm not sure why that is the case.


I'll have some more later, obviously.

http://letsibeledmondsspeak.blogspot.com/2008/01/sibel-names-names-in-pictures.html

~~~~~~~~~~~~~~~~~~~~~~~~~~

http://www.mail-archive.com/[email protected]/msg02975.html

Mehmet Eymur (Former Turkish Spy Chief MIT)


Ex-Spy Spins Web of Collusion in Turkey's War Against Kurds

heikki sipilä
Sun, 20 Aug 2000 04:11:34 -0700

>From: Press Agency Ozgurluk <[EMAIL PROTECTED]>

>Subject: "[Ozgurluk.Org]" Ex-Spy Spins Web of Collusion in Turkey's War
>Against Kurds

>
>Saturday, August 19, 2000 |  Print this story
>
>Ex-Spy Spins Web of Collusion in Turkey's War Against Kurds
>
>By AMBERIN ZAMAN, Special to The Times
>
>
>ANKARA, Turkey--For years, Turkey's political establishment
>faced--and managed to fend off--assertions that it colluded with
>drug traffickers, hit men and gunrunners in its 15-year war against
>Kurdish separatists.
>  Since the separatists' defeat last year, however, the allegations
>have resurfaced from an unlikely and embarrassing source--a
>former chief of counterintelligence for Turkey's spy agency.
>Mehmet Eymur, who served in the National Intelligence Agency
>for three decades, is creating an uproar here with his popular
>5-month-old Web site, whose reports tarring dozens of officials
>are picked up daily by Turkey's newspapers and hastily denied by
>the accused.
>    From self-imposed exile in Washington, the former spy faces
>criminal charges at home for divulging state secrets.

> But there is little doubt that his painstakingly documented
>disclosures are bringing new pressure on the government to
>prosecute officials accused of collaborating with mobsters who
>trained Kurdish mercenaries to fight Kurdish rebels.
>Western governments have faulted successive Turkish
>administrations for laxity in fighting this country's flourishing drug
>trade. The State Department has reported that as much as 75% of
>the heroin seized in Europe last year "transited Turkey, was
>processed there or was seized in connection with Turkish criminal
>syndicates."
>   Turkey's prime minister, Bulent Ecevit, is credited with cracking
>down on drug lords. An alleged Kurdish heroin kingpin, Urfi
>Cetinkaya, was arrested in Istanbul this week.
>Yet politicians and security officials implicated in drug-related
>corruption scandals remain untouched. Several, including a man
>privately described by U.S. drug enforcement officials as a
>"well-known heroin chemist," were reelected to parliament last
>year.
>Eymur's decision to remove himself to Washington has invited
>speculation that he is being encouraged by the U.S. government.

>Some critics say he is trying to discredit Senkal Atasagun, the
>national intelligence chief who forced him into retirement two years
>ago.
>  "He is waging psychological war under the American flag
>against the Turkish army, in line with the CIA's directives," said
>Dogu Perincek, the leader of a small leftist party who is on the
>former spy's list of accused.

>In a telephone interview, Eymur vigorously denied the charges,
>saying he's seeking only "to help Turkish justice" while remaining
>outside the country and "waiting for Turkey to become a
>full-fledged democracy."
>    "If there was even one Turkish official [whom I could rely on], if
>he could send me his phone number, I would gladly shut down my
>Web site and call him," Eymur stated recently on the site,
>http://www.atin.org, which has had nearly 1 million visitors since its
>March 8 launch.
> Among other incriminating evidence, the site carries transcripts
>of the alleged confessions of a Kurdish rebel-turned-informer
>named Mahmut Yildrim, who has been linked to the slayings of
>several prominent Kurdish intellectuals and drug dealers. Yildrim,
>whose intelligence agency code name was "Green," was promptly
>freed after telling police interrogators of his connections with top
>Turkish officials, the site alleges.
>In its battle against the separatists, the Turkish state is widely
>accused of having enlisted many such characters, who, under
>state protection, killed Kurdish drug dealers and muscled in on
>their trade. Eymur has claimed that "Green," whose whereabouts
>remain a mystery, shared drug profits with "various police chiefs
>and [members of] the gendarmerie. This is not a secret."
>   Turkish officials have consistently blamed the drug trade on
>rebels of the outlawed separatist Kurdistan Workers Party, whose
>leader, Abdullah Ocalan, was captured, tried for treason and
>sentenced to death last year as the insurgency collapsed.
>But intriguing evidence of ties between government officials and
>Turkish criminals, including drug dealers, emerged in November
>1996 after a car crash in the small town of Susurluk. A police chief
>and a convicted heroin smuggler were among the dead. Sedat
>Bucak, a Kurdish lawmaker, survived the crash and claimed to
>have lost his memory.
>A parliamentary investigation into why this unlikely trio was
>traveling in the same car came to nothing, and critics of the
>government suspect a cover-up. Bucak has been reelected to
>parliament.
>  "Unfortunately," Eymur said, "in Turkey, one scandal ends only
>to be followed by another."
>
>--
>Press Agency Ozgurluk
>In Support of the Peoples Liberation Struggle in Turkey and Kurdistan
>http://www.ozgurluk.org
>
>

~~~~~~~~~~~~~~~~~~~~

More on Mehmet Eymur (Former Turkish Spy Chief MIT)


http://rastibini.blogspot.com/2007/01/jitem-and-hrant-dink.html

Yet more, from TNA: [story in the link is now gone]


    Hanefi Avci, who was then the police intelligence department acting head and now is Edirne police chief, best described the Susurluk connections. In his testimony at the parliamentary commission probing the Susurluk scandal, he claimed that there was an "illegal" organization established within the state to fight terrorism. He also said this organization then became a gang, which was established within the MIT, the police and Gendarmerie Intelligence (JITEM). Mehmet Agar, Korkut Eken, Ibrahim Sahin from the police, Mehmet Eymur, Duran Firat and Kasif Binbasi from the MIT and Lt. Col. Veli Kucuk from JITEM were in this organization and involved in numerous illegal actions under the leadership of Ahmet Cem Ersever, who was later killed by Kemal Uzuner (a.k.a Cubuklu), a driver working at JITEM, said Avci.



[Note: Mehmet Eymur is the bastard who was in charge of MIT's "counter-terrorism" department. He's been in "exile" in the US for some time, apparently after having some kind of trouble with the really big bastards behind the Deep State. Word on the street now is that he's been given some kind of reprieve, and that he's assisting Mehmet Agar in his campaign. Why is the United States protecting mass murderers like Mehmet Eymur? Inquiring minds want to know.]

----------------

The blogger who wrote the above just updated his blog for the first time since April of 27th about the Sibel Edmonds story. It can be found here:
http://rastibini.blogspot.com/2008/01/man-who-gave-pakistan-bomb.html
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Damascus

  • Guest
Told you so.  ;D

Offline CheneysWorstNightmare

  • Member
  • *****
  • Posts: 2,105
  • F*CK THE NEW WORLD ORDER!
    • Youtube Profile
I wanna marry Sibel Edmunds!!!!

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Pentagon revives Rumsfeld-era domestic spying unit
http://rawstory.com/rs/2010/0619/pentagon-revives-domestic-spying-unit/
By Daniel Tencer
Saturday, June 19th, 2010 -- 7:13 pm



The Pentagon's spy unit has quietly begun to rebuild a database for tracking potential terrorist threats that was shut down after it emerged that it had been collecting information on American anti-war activists.

The Defense Intelligence Agency filed notice this week that it plans to create a new section called Foreign Intelligence and Counterintelligence Operation Records, whose purpose will be to "document intelligence, counterintelligence, counterterrorism and counternarcotic operations relating to the protection of national security."

But while the unit's name refers to "foreign intelligence," civil liberties advocates and the Pentagon's own description of the program suggest that Americans will likely be included in the new database.

FICOR replaces a program called Talon, which the DIA created in 2002 under then-Defense Secretary Donald Rumsfeld as part of the counterterrorism efforts following the 9/11 attacks. It was disbanded in 2007 after it emerged that Talon had retained information on anti-war protesters, including Quakers, even after it was determined they posed no threat to national security.

DIA spokesman Donald Black told Newsweek that the new database would not include the more controversial elements of the old Talon program. But Jeff Stein at the Washington Post reports that the new program will evidently inherit the old Talon database.

"Why the new depository would want such records while its parent agency no longer has a law enforcement function could not be learned," Stein reports. "Nor could it be learned whether the repository will include intelligence reports on protest groups gathered by its predecessor."

The Pentagon's notice states that the database will collect "identifying information such as name, Social Security Number (SSN), address, citizenship documentation, biometric data, passport number, vehicle identification number and vehicle/vessel license data." As only US residents have Social Security Numbers, it appears the program is being designed at least partly to contain domestic information.

Newsweek cites two unnamed US officials as suggesting that the new program essentially echoes the old one. When CIFA, the DIA division running Talon, was disbanded in 2008, "many of its personnel and some of its functions were transferred" to the new DIA unit running the new database program. The new program will be housed "in the same office space that CIFA once occupied, in a complex near suburban Washington’s Reagan National Airport."

Mike German, a former FBI agent now working with the ACLU, says "Americans should be just as concerned" about the new database as the previous one under the Bush administration.

"It’s a little hard to tell what this is exactly, but we do know that DIA took over 'offensive counterintelligence' for the DoD once CIFA was abandoned," he told the Post's Stein. "It therefore makes sense that this new DIA database would be collecting the same types of information that CIFA collected improperly."
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
The Secrecy Court of Last Resort
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB276/index.htm
New Declassification Releases by the Interagency Security Classification Appeals Panel (ISCAP)

National Security Archive Electronic Briefing Book No. 276

Posted - June 5, 2009

For more information contact:
William Burr - 202/994-7032
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

H0llyw00d

  • Guest
The Secrecy Court of Last Resort
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB276/index.htm
New Declassification Releases by the Interagency Security Classification Appeals Panel (ISCAP)

National Security Archive Electronic Briefing Book No. 276

Posted - June 5, 2009

For more information contact:
William Burr - 202/994-7032

niccccce....awesome web site....thanx!

Offline TheHouseMan

  • Member
  • *****
  • Posts: 3,837
I have news for Mrs. Napolitano:

Anyone can create a TrueCrypt encrypted folder, insert a text file with terrorist plots, and email to fellow jihadists via email.

Using the most powerful supercomputer, it would take longer than the lifetime of the universe to crack a 64 character password.

In other words, they have no chance.

Only way to stop terrorism is controlling every natural resource on the planet, thus preventing people from purchasing explosive materials.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
I have news for Mrs. Napolitano:

Anyone can create a TrueCrypt encrypted folder, insert a text file with terrorist plots, and email to fellow jihadists via email.

Using the most powerful supercomputer, it would take longer than the lifetime of the universe to crack a 64 character password.

In other words, they have no chance.

Only way to stop terrorism is controlling every natural resource on the planet, thus preventing people from purchasing explosive materials.

That will never stop terrorism! Terrorism is a tactic...mostly used by the state against its own people. By giving the state control over every natural resource we are just guaranteeing even more terrorism.

Look how much control the state has right now compared to 9/11.

Look how much more power terrorism has over us because of it.

This is the plan.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Napolitano Advocates Government Surveillance of Internet to Fight Homegrown Terrorism
http://www.infowars.com/napolitano-advocates-government-surveillance-of-internet-to-fight-homegrown-terrorism/
Kurt Nimmo
Infowars.com
June 20, 2010

The underwear and propane and firecracker would-be bombers and a string of dim-witted patsies set-up by the FBI were cited by Homeland Security Secretary Janet Napolitano as an excuse to increase government surveillance of the internet. “Fighting homegrown terrorism by monitoring Internet communications is a civil liberties trade-off the U.S. government must make to beef up national security,” the Associated Press reported on Friday.   

Napolitano cited documented government patsies as an excuse to increase government surveillance of the internet.    

“The First Amendment protects radical opinions, but we need the legal tools to do things like monitor the recruitment of terrorists via the Internet,” Napolitano told a gathering of the American Constitution Society for Law and Policy. “We can significantly advance security without having a deleterious impact on individual rights in most instances. At the same time, there are situations where trade-offs are inevitable.”

Stewart Baker, former undersecretary for policy with the Department of Homeland Security, claims the Obama administration has shed its “liberal” skin and takes a more “mature” view of the Constitution and the Bill of Rights. “They now appreciate the risks and the trade-offs much more clearly than when they first arrived, and to their credit, they’ve adjusted their preconceptions,” said Baker.

Napolitano defended the use of airport naked body scanners and claimed she has worked to institute a number of restrictions on the scanners’ use in order mollify the public. The Associated Press reports scans taken by the machines cannot be saved or stored by the operator.

In February Gale D. Rossides of the TSA wrote a letter to Rep. Bennie G. Thompson, Chairman of the Committee on Homeland Security, admitting images are routinely saved by the machines.

Also in February Indian film star Shahrukh Khan had an image of himself produced by a scanner circulated at Heathrow airport in London. Airport workers asked Khan to autograph the printout.

Last year it was revealed that the Department of Homeland Security considers constitutionalists, Second Amendment advocates, returning veterans, and members of militia groups to be potential domestic terrorists. Napolitano’s speech was an admission that the government is monitoring patriot groups and individuals.

The government has spied on Americans involved in entirely legal political activity and activism for decades. In the mid-1970s the Church Committee revealed the surveillance, infiltration, and subversion of political groups under the FBI’s COINTELPRO. The CIA was also actively involved in monitoring political groups.

Although the FBI claims it shut down COINTELPRO in the 1970s, there is ample evidence the program still exists.

In 2006, Mark Klein, a retired AT&T communications technician, said the company routes all internet traffic to the National Security Agency. “This potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens,” Klein said at the time.

The NSA has used its Echelon program to intercept radio, satellite, microwave, cellular or fiber-optic, including internet, communication for years. The NSA has intercepted telegrams and mail since the early 1950s. Under Project SHAMROCK all telegraphic data entering into or exiting from the United States was intercepted by the NSA with the avid participation of Western Union and its associates RCA and ITT.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Anti_Illuminati

  • Guest
Janet Napolitano is a puppet for John J. Hamre and the Network Centric Operations Industry Consortium and the AFCEA.

The NCOIC comprises 28 TERRORIST defense contractor companies who are rolling out an artificial intelligence, Ptech Knowledge Engine based, C2 terrorist extortion enslavement global grid.

Just think, if everyone was awake, we could have all of these people arrested in no time.  These people are pure Nazi's and are not subject to due process of law (there is no court of law that could safely indict them or have hearings for them anywhere on Earth).  They are no different than foreign invaders on U.S. soil, PERIOD.

Found this a bit interesting what we are getting ready to have built here in Utah. The local newspapers article called it a Spy center, as it will be built and operated by the N.S.A. employing 100 to 200 people when operational. One can only speculate as to it's capabilities when it is up and operational.

Home of Sen. Orrin Hatch, the longest serving member of the Senate Intelligence Committee. Mr. Hatch comments: "As you may already know, the Data Center at Camp Williams will support the Comprehensive National Cybersecurity Initiative (CNCI), which is aimed at securing the United States information infrastructure. Camp Williams was chosen after a thorough competitive analysis of 38 sites".

The facility is called officially "CNIC Data Center".  The released Data Center  mission description is as follows.
  The Data Center Mission located at Camp Williams, Utah will add important capabilities to the (IC) Intelligence Community so that the intelligence agencies can exercise their lawful authorities, subject to the appropriate oversight, to protect national security networks, provide technical assistance to the Department of Homeland Security, provide intelligence and warning regarding cybersecurity threats, and to otherwise carry out their proper tasks under the CNIC to meet cybersecurity objectives.
  The National Security Agency (NSA) has been designated as the Executive Agent for the Office of the Director of National Intelligence (ODNI) for the construction. maintenance, and operation of the Intelligence Community's (IC) CNCI Data Center.

Data Center will:

: Facility will sit on 200 acres
:100,000 sq ft of computer space
:65MW total Technical Power

http://www.deseretnews.com/article/705314456/Psst-Big-spy-center-is-coming-to-Utah.html
http://www.deseretnews.com/article/705358104/National-Security-Agency-data-center-at-Camp-Williams-drawing-huge-interest-in-Utah.html?linkTrack=rss-14
http://www.dni.gov/speeches/20091023_speech.pdf

Anti_Illuminati

  • Guest
http://www.wired.com/threatlevel/2008/01/feds-must-exami/



NSA Must Examine All Internet Traffic to Prevent Cyber Nine-Eleven, Top Spy Says
By Ryan Singel   January 15, 2008  |  9:55 am


Read More http://www.wired.com/threatlevel/2008/01/feds-must-exami/#ixzz0rUmRfZgY

The nation’s top spy, Michael McConnell, thinks the threat of cyberarmageddon! is so great that the U.S. government should have unfettered and warrantless access to U.S. citizens’ Google search histories, private e-mails and file transfers, in order to spot the cyberterrorists in our midst.

That’s according to a sprawling 18-page story on the Director of
National Intelligence by Lawrence Wright in the January 21 edition of the New Yorker. (The story is not online).

In the piece, McConnell returns, in flamboyant style, to his exaggerating ways, hyping threats and statistics to further his bureaucratic aims. For example, McConnell regurgitates the hoary myth that computer crime costs America $100 billion a year. THREAT LEVEL traced down the source of that fake-factoid in September to a former privacy officer for the state of Colorado.

Presumably using unsupported stats like that, in May 2007 McConnell convinced President Bush that a massive cyber-attack on a single U.S. bank would be worse for the economy than than the deadly terrorist attacks of September 11, the article reports. In response, the NSA developed a mind-boggling, but still incomplete, plan to eavesdrop on the internet in order to protect it.

In order for cyberspace to be policed, Internet activity will have to be closely monitored. Ed Giorgio, who is working with McConnell on the plan, said that would mean giving the government the authority to examine the content of any e-mail, file transfer, or Web search. "Google has records that could help in a cyber-investigation," he said. Giorgio warned me, "We have a saying in this business: ‘Privacy and security are a zero-sum game.’"

It says something ominous about McConnell’s priorities if he believes a DDOS attack on Bank of America, or even a computer intrusion that wiped out its database (and magically purged its backup tapes), would be worse than an attack that killed 3,000 Americans.

Still, it’s hardly a surprising plan — given that McConnell was one of the main backers of the Clipper Chip, the government’s failed, early 1990’s proposal to put a backdoor in every encryption product.

McConnell also makes an astounding assertion that the secretive Foreign Intelligence Surveillance Court recently crippled the NSA’s overseas signals intelligence collection with a string of soft-on-terror rulings.

McConnell said that federal judges had recently decided, in a series of secret rulings, that any telephone transmission or e-mail that incidentally flowed into U.S. computer systems was potentially subject to judicial oversight. According to McConnell the capacity of the NSA to monitor foreign-based communications had consequently been reduced by seventy per cent.

In other words, McConnell claims the NSA couldn’t intercept a terrorist’s e-mail by tapping a fiber optic cable in Pakistan, if there was a chance the message would pass through a U.S. router or end up in a Hotmail account.

I’m no rich man, but I’ll bet any reader $1,000 that, when and if those rulings are ever released, we’ll see they say no such thing. Send me an e-mail to take me up this bet. U.S. government officials are welcome to participate.

The FISA law that created the Foreign Intelligence Surveillance Court only applies to intercepts that physically happen within the borders of the United States. The NSA has always been free to intercept foreign communications overseas — the mission for which they were created and funded — even if the call passes through a U.S. switch.

So in the case of the now debunked Iraqi kidnappers anecdote that leads off the New Yorker story, the NSA would only have needed to get a court order if its Iraqi targets initiated communications that flowed through U.S. servers or switches and the NSA decided to tap them physically at a United States internet or telecom facility, by burglarizing it, digging up its cables or getting the company to cooperate. (As for why that happens and how common it is, check my story: NSA’s Lucky Break: How the U.S. Became the Switchboard to the World.)

Simply put, the FISA law is intended to prevent the NSA from operating inside the United States.

In any event, that restriction collapsed this summer with the fear-induced, strong-armed passage of the so-called Protect America Act. That law radically re-architected the nation’s surveillance apparatus.
Now the NSA can turn Gmail’s servers and AT&T’s switches into de facto arms of the surveillance industrial complex without any court oversight.

And though the law ostensibly sunsets in February, any orders in effect at that time will have power for another 12 months. Moreover, Senate Majority Leader Harry Reid (D-Nevada) is reportedly planning to discard legislative attempts to rein in these new powers and will instead simply push to extend the current scheme another 12 months.

In short, McConnell’s politically convenient exaggerations have already worked well for him in winning domestic spying powers, despite their flimsiness under any real scrutiny.

That track record bodes ill for anyone concerned about his new plans to push for sweeping and unnecessary powers to put the NSA in the wires of the internet in order to prevent a computer attacks.

The Wall Street Journal’s intelligence guru Siobhan Gorman’s take is here. Gorman wrote a groundbreaking story on the cyberspace initiative last September while at The Baltimore Sun.

UPDATE: Ex-spook Michael Tanji guest-posting over at Danger Room writes:

It’s bad enough that the Director of National Intelligence is trotting out a bogus threat so the government can snoop on all Internet traffic.  What’s worse is that this kind of mass surveillance is a pretty lame way to catch the honest-to-God bad guys.

Of more interest to observers of intelligence activities is the issue of quality vs. quantity and the slow creep towards doom that these efforts foretell. The fact that we are essentially attempting to gill-net bad guys is a fairly strong indicator that the intelligence community has yet to come up with an effective strategy against information-age threats.

[...] Its not a question of listening in to you whispering sweet nothings into the ear to your significant other, it is simply a case of – as the late Sam Kinison joked – going where the food is. That our intelligence agencies can intercept adversary communications is largely a given, they just want to do it from the convenience of the homeland, not some remote switch in the darkest hinterlands.

(Photo: AP/ Cook)



Read More http://www.wired.com/threatlevel/2008/01/feds-must-exami/#ixzz0rUmbXKjz
_________________________________
Cyberwar Doomsayer Lands $34 Million in Government Cyberwar Contracts
By Ryan Singel   April 13, 2010  |  6:04 pm

Read More http://webmonkey.wired.com/threatlevel/2010/04/booz-allen/#ixzz0rUmmg9io



Last month, the former Director of National Intelligence Michael McConnell boldly took to the Senate floor and the Washington Post’s editorial page to declare “The United States is fighting a cyber-war today, and we are losing.”

Thankfully for the American people, his company — the giant defense contractor Booz Allen Hamilton — has now landed the contract to build the Pentagon’s cyberwar control center. For a measly $14.4 million in taxpayer money, the outfit will help build a new cyberwar bunker for the U.S. Cyber Command.

Read More http://webmonkey.wired.com/threatlevel/2010/04/booz-allen/#ixzz0rUmxlFpw



Additionally, Booz Allen Hamilton won another contract for $20 million to “foster collaboration among telecommunications researchers, University of Maryland faculty members and other academic institutions to improve secure networking and telecommunications and boost information assurance,” Washington Technology reports. While that might sound like a lot of money to set up a mailing list and a wiki, please don’t be cynical. Undoubtedly, McConnell’s crack team of consultants are providing the researchers with around-the-clock bodyguards and state-of-the-art bullet-proof monitors.

Meanwhile, we urge U.S. netizens to refrain from un-patriotic musings that McConnell intentionally uses fear and exaggerated rhetoric to land these kinds of contracts for his company and instead, be vigilant and keep their eyes out for signs of Chinese hackers (one telltale sign is a “Made in China” label on the bottom of your laptop).

Otherwise you might soon find yourself facing a Red Screen of Death (RSOD), making you just one more casualty in this tragic cyberwar we Americans are all bravely enduring as one nation united.

Photo: USAF



Read More http://webmonkey.wired.com/threatlevel/2010/04/booz-allen/#ixzz0rUn8lKi8

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Janet Napolitano is a puppet for John J. Hamre and the Network Centric Operations Industry Consortium and the AFCEA.

The NCOIC comprises 28 TERRORIST defense contractor companies who are rolling out an artificial intelligence, Ptech Knowledge Engine based, C2 terrorist extortion enslavement global grid.

Just think, if everyone was awake, we could have all of these people arrested in no time.  These people are pure Nazi's and are not subject to due process of law (there is no court of law that could safely indict them or have hearings for them anywhere on Earth).  They are no different than foreign invaders on U.S. soil, PERIOD.


Kissinger/Brzezinski [CSIS], 4-star Generals [NCOIC] taking over Internet

http://forum.prisonplanet.com/index.php?topic=91406.0

READ ALL OF IT ASAP!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Anti_Illuminati

  • Guest
http://www.historycommons.org/context.jsp?item=a70maincore#a70maincore

1980s or Before: Database of Potential Enemies Established as Part of Continuity of Government Plan  
As a part of the plan to ensure Continuity of Government (COG) in the event of a Soviet nuclear strike or other emergency, the US government begins to maintain a database of people it considers unfriendly. A senior government official who has served with high-level security clearances in five administrations will say it is “a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources say that the database is sometimes referred to by the code name Main Core, and one says it was set up with help from the Defense Intelligence Agency.

Alleged Link to PROMIS - The database will be said to be linked to a system known as PROMIS, the Prosecutor’s Management Information System, over which the US government conducts a long-lasting series of disputes with the private company Inslaw. The exact connection between Main Core and PROMIS is uncertain, but one option is that code from PROMIS is used to create Main Core. PROMIS is most noted for its ability to combine data from different databases, and an intelligence expert briefed by high-level contacts in the Department of Homeland Security will say that Main Core “is less a mega-database than a way to search numerous other agency databases at the same time.”
Definition of National Emergency - It is unclear what kind of national emergency could trigger such detention. Executive orders issued over the next three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Defense Department documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to US military invasion abroad” could be a trigger.

How Does It Work? - A former military operative regularly briefed by members of the intelligence community will be told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations using “social network analysis” and artificial intelligence modeling tools. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he will say. “Main Core is the table of contents for all the illegal information that the US government has [compiled] on specific targets.”

Origin of Data - In 2008, sources will reportedly tell Radar magazine that a “host of publicly disclosed programs… now supply data to Main Core,” in particular the NSA’s domestic surveillance programs initiated after 9/11. [RADAR, 5/2008]
Entity Tags: Defense Intelligence Agency, Inslaw, Inc.

Timeline Tags: Civil Liberties, Inslaw and PROMIS
__________________________________________
Betreff: [IPCUSA] Fwd:
PROMIS fosters and guards secret weapons research.
Von:   Biophilos
Datum:   Sun, 31 Oct 2004 10:04:48 -0500
An:   [email protected]
http://www.buergerwelle.de/pdf/promis_fosters_and_guards_secret_weapons_research.html
From:   “Reflection” bernert


PROMIS software was modified to allegedly include the back door “eavesdropping” capability but also enhanced with one form of AI and subsequently applied to examining development of new weapons systems including “ethnospecific” biowarfare agents capable of attacking specific races, and individuals who might threaten the security of such research.  PROMIS has been transformed into the ultimate government spyware!


Promis
by Michael C. Ruppert

[The following story appeared in the September, 2000 Special Edition of From The Wilderness for paid subscribers only. Read it now, free, for the first time ever on the web. © Copyright 2000, 2001. All rights reserved.  Michael C. Ruppert and From The Wilderness Publications. See Homepage for Reprint Policy]

“U.S. journalist Mike Ruppert, a former Los Angeles police officer who now runs a Web site that seeks to expose CIA covert operations, said he met with RCMP investigator McDade on Aug. 3 in L.A. Ruppert said the RCMP officer was anxious to see documents he received three years ago from a shadowy Green Beret named Bill Tyre [sic] detailing the sale of rigged Promis software to Canada.” - The Toronto Star, September 4, 2000.

Only the legends of Excalibur, the sword of invincible power, and the Holy Grail, the chalice from which Christ took his wine at the Last Supper begin to approach the mysterious aura that have evolved in the world of secret intelligence around a computer software program named Promis.  Created in the 1970s by former National Security Agency (NSA) programmer and engineer Bill Hamilton, now President of Washington, D.C.’s Inslaw Corporation, PROMIS (Prosecutor’s Management Information System) crossed a threshold in the evolution of computer programming. Working from either huge mainframe computer systems or smaller networks powered by the progenitors of today’s PCs, PROMIS, from its first “test drive” a quarter century ago, was able to do one thing that no other program had ever been able to do. It was able to simultaneously read and integrate any number of different computer programs or data bases simultaneously, regardless of the language in which the original programs had been written or the operating system or platforms on which that data base was then currently installed.

In the mid 1970s, at least as far as computer programs were concerned, the “universal translator” of Star Trek had become a reality. And the realm of Star Trek is exactly where most of the major media would have the general public place the Promis story in their world views. But given the fact that the government of Canada has just spent millions of dollars investigating whether or not a special version of Promis, equipped with a so-called “back door” has compromised its national security, one must concede that perhaps the myths surrounding Promis and what has happened to it need to be re-evaluated. Myths, by definition, cannot be solved, but facts can be understood and integrated. Only a very few people realize how big the Promis story really is.

It is difficult to relegate Promis to the world of myth and fantasy when so many tangible things, like the recently acknowledged RCMP investigation make it real. Canadians are not known for being wildly emotional types given to sprees. And one must also include the previous findings of Congressional oversight committees and no less than six obvious dead bodies ranging from investigative journalist Danny Casolaro in 1991, to a government employee named Alan Standorf, to British Publisher and lifelong Israeli agent Robert Maxwell also in 1991, to retired Army CID investigator Bill McCoy in 1997, to a father and son named Abernathy in a small northern California town named Hercules. The fact that commercial versions of Promis are now available for sale directly from Inslaw belies the fact that some major papers and news organizations instantly and laughably use the epithet conspiracy theorist to stigmatize anyone who discusses it. Fear may be the major obstacle or ingredient in the myth surrounding modified and “enhanced” versions of Promis that keeps researchers from fully pursuing leads rising in its wake. I was validated in this theory on September 23rd in a conversation with FTW Contributing Editor Peter Dale Scott, Ph.D. Scott, a Professor Emeritus at UC Berkeley and noted author. Peter, upon hearing of the details of my involvement, frankly told me that Promis frightened him. Casolaro, who was found dead in a West Virginia motel room in 1991, had Scott’s name (Scott is also a Canadian) in a list of people to contact about his Promis findings. He never got that far.

A close examination of the Promis saga actually leads to more than a dozen deaths which may well be why so many people avoid it. And many of those deaths share in common a pattern where, within 48 hours of death, bodies are cremated, residences are sanitized and all files disappear. This was certainly the case with my friend Bill McCoy, a legendary retired Army CID investigator who was also the principal investigator for Hamilton in his quest to recover what may be hundreds of millions in lost royalties and to reunite him with the evolved progeny of his brain child. Those progeny now have names like SMART (Self Managing Artificial Reasoning Technology) and TECH. I will never forget hearing of McCoy’s death and his immediate cremation and then trying to reconcile that with the number of times he had told me, while sitting in his Fairfax Virginia home, that he wanted to be buried next to his beloved wife in spite of the fact that he was a Taoist.

I have tried to avoid becoming involved in Promis even though I have been in possession of documents and information about the case for more than six years. Reluctantly, as I realized that recent developments gave me a moral imperative to write, I gathered all of my scattered computer files connecting the case into one place. When assembled they totaled more than seven megabytes and that did not include maybe 500 printed pages of separate files.

In researching this story I found a starkly recurring theme. It appeared first in a recent statement I tape recorded from probably one of the three best informed open sources on the story in the world, William Tyree. I also came across the same theme, almost verbatim, in a research paper that I discovered while following leads from other sources
Tyree is no stranger to FTW. A former US Army Green Beret, framed in 1979, he has been serving a life sentence for the murder of his wife Elaine outside of Fort Devens Massachusetts, then home of the 10th Special Forces Group. I have written of him in no less than six prior issues of FTW. He has, from his prison cell in Walpole Massachusetts, been a central if little known figure in the Promis case for many years, like a monk mysteriously possessed of information that no one else could obtain. If the story is ever fully told his role may be even more significant than anyone has ever supposed.

The information from Tyree, recorded in a phone conversation on August 28, and the research work on “block-modeling” social research theory uncovered while researching other leads both describe the same unique position or vantage point from hypothetical and actual perspectives. Tyree described an actual physical point in space, further out than ever thought possible and now used by US satellites. This distance is made possible by Promis progeny so evolved that they make the original software look primitive.  The social research, which included pioneering mathematical work - apparently facilitating the creation of artificial intelligence - postulated that a similar remote hypothetical position would eliminate randomness from all human activity. Everything would be visible in terms of measurable and predictable patterns - the ultimate big picture. Just one of the key web sites where I found this information is located at <http://web.syr.edu/%7Ebvmarten/socialnet.html>http://web.syr.edu/~bvmarten/socialnet.html.

One of FTW’s guiding principles is our incessant drive to separate that which is important from that which is merely true. The purpose of this article is to provide leads and insights, some very concrete, for the continued investigation of the Promis saga. While we do not claim to be worthy of pulling Excalibur from the stone we do hope to be divorced enough from egotistical motivations and dreams of Pulitzers or glory to avoid being led into the trap that has befallen so many seeking the Holy Grail. FTW believes that the Promis story will only be solved by a group of people working together selflessly for a greater good. Maybe there is legend here after all. Put simply, from the vantage point of a child actor in 1970s Burger King commercials, “It’s too big to eat!”

What would you do if you possessed software that could think, understand every language in the world, that provided peep holes into everyone else’s computer “dressing rooms,” that could insert data into computers without people’s knowledge, that could fill in blanks beyond human reasoning and also predict what people would do - before they did it? You would probably use it wouldn’t you? But Promis is not a virus. It has to be installed as a program on the computer systems that you want to penetrate. Being as uniquely powerful as it is this is usually not a problem. Once its power and advantages are demonstrated, most corporations, banks or nations are eager to be a part of the “exclusive” club that has it. And, as is becoming increasingly confirmed by sources connected to this story, especially in the worldwide banking system, not having Promis - by whatever name it is offered - can exclude you from participating in the ever more complex world of money transfers and money laundering. As an example, look at any of the symbols on the back of your ATM card. Picture your bank refusing to accept the software that made it possible to transfer funds from LA to St. Louis, or from St. Louis to Rome.

The other thing to remember is that where mathematics has proved that every human being on the earth is connected to every other by only six degrees of separation, in covert operations the number shrinks to around three. In the Promis story it often shrinks to two. It really is a small world.

The First Rip Off
Reagan confidant and overseer for domestic affairs from 1981 to 1985 Ed Meese loved Promis software. According to lawsuits and appeals filed by Hamilton, as well as the records of Congressional hearings, the FBI and dozens of news stories, the legend of Promis began in 1981-2. After a series of demonstrations showing how well Promis could integrate the computers of dozens of US attorneys offices around the country, the Department of Justice (DoJ) ordered an application of the software under a tightly controlled and limited license. From there, however, Meese, along with cronies D. Lowell Jensen (also no stranger to FTW’s pages) and Earl Brian allegedly engaged in a conspiracy to steal the software, modify it to include a “trap door” that would allow those who knew of it to access the program in other computers, and then sell it overseas to foreign intelligence agencies. Hamilton began to smell a rat when agencies from other countries, like Canada, started asking him for support services in French when he had never made sales to Canada.

The Promis-managed data could be anything from financial records of banking institutions to compilations of various records used to track the movement of terrorists. That made the program a natural for Israel which, according to Hamilton and many other sources, was one of the first countries to acquire the bootlegged software from Meese and Company. As voluminously described by Inslaw attorney, the late Elliot Richardson, the Israeli Mossad under the direction of Rafi Eitan, allegedly modified the software yet again and sold it throughout the Middle East. It was Eitan, the legendary Mossad captor of Adolph Eichmann, according to Hamilton, who had masqueraded as an Israeli prosecutor to enter Inslaw’s DC offices years earlier and obtain a first hand demonstration of what the Promis could do.

Not too many Arab nations would trust a friendly Mossad agent selling computer programs. So the Mossad provided their modified Promis to flamboyant British publishing magnate Robert Maxwell, a WWII Jewish resistance fighter who had assumed the Anglo name and British citizenship after the war. It was Maxwell, capable of travelling the world and with enormous marketing resources, who became the sales agent for Promis and then sold it to, among others, the Canadian government. Maxwell drowned mysteriously in late 1991, not long after investigative reporter Danny Casolaro was “suicided” in West Virginia. Maxwell may not have been the only one to send Promis north.

In the meantime, after winning some successes, including a resounding Congressional finding that he had been cheated, Bill Hamilton hit his own buzz saw in a series of moves by the Reagan and Bush Justice Departments and rigged court decisions intended to bankrupt him and force him out of business. He survived and fought on. In the meantime hundreds of millions of dollars in royalties and sales fees were going into the wrong pockets.  And, as was later revealed from a number of directions, this initial tampering with the software was far from the only game in town. Both the CIA, through GE Aerospace in Herndon Virginia (GAO Contract #82F624620), the FBI and elements of the NSA were tinkering with Promis, not just to modify it with a trap door, but to enhance it with artificial intelligence or AI. It’s worth it to note that GE Aerospace was subsequently purchased by Martin-Marietta which then merged to become Lockheed-Martin the largest defense and aerospace contractor in the world. This will become important later on.

Confidential documents obtained by FTW indicate that much of the AI development was done at the Los Alamos National Laboratory and Sandia Labs using research from other US universities, including Harvard, Cal-Tech and the University of California. And it was not just Reagan Republicans who got their hands on it either. As we’ll see shortly, Promis came to life years before the election of Ronald Reagan. It was also, according to Bill Tyree, an essential element in the espionage conducted by Jonathan Pollard against not only the US government but the Washington embassies of many nations targeted by Israel’s Mossad.

The Last Circle
For more than a year and half, members of the National Security Section of the Royal Canadian Mounted Police (RCMP) have been travelling through the US, often in the company of a savvy female homicide detective from the small California town of Hercules named Sue Todd. Even now questions linger as to what the Canadians were really after. But there is absolutely no question that while surreptitiously in the U.S. the Mounties spent more time with author and investigative reporter Cheri Seymour than with anyone else. And for good reason.

Seymour, under the pen name of Carol Marshall is the author of a meticulously researched e-book entitled The Last Circle located at <http://www.lycaeum.org/books/books/last_circle/index.htm>http://www.lycaeum.org/books/ books/last_circle/. So meticulously researched and documented is the book that FTW’s researcher “The Goddess” has fact checked it and found it flawless. Same with Bill Hamilton and the Mounties, who have also told me of its precision. Anyone seeking to understand the Promis story must include this book as a part of their overall research.

I first met Cheri in person this spring after she had contacted me via the Internet. I traveled to her home, some three hours outside of Los Angeles and viewed acres of documentation for a saga that started with drug related murders and police corruption around methamphetamine production in northern California in the 1980s. That investigation later connected to politicians like Tony Coelho and major corporations like MCA and eventually led to a shadowy scientist named Michael Riconosciuto. Familiar names like Ted Gunderson and relatively unknown names like Robert Booth Nichols weave throughout this detailed epic that takes us to the Cabazon Indian Reservation in the California Desert and into the deepest recesses of the 1980s Reagan/Bush security apparatus.

Gunderson, a retired FBI Special Agent in Charge (SAC) from Los Angeles, and Nichols, a mysterious Los Angeles man, exposed through court documents obtained by Seymour as being a career CIA operative, connected with scientist/programmer, Riconosciuto in a sinister, yet now very well documented phase of Promis’ development. In affidavits Riconosciuto claimed that one of the tasks he performed at the Cabazon reservation was to install a back door in the version of Promis that was sold to Canada.

In August of this year the RCMP investigators told both Seymour and me that they had traveled to the reservation several times and had confirmed many details of Seymour’s research. They had also interviewed Riconosciuto on more than one occasion. As with everyone else I have ever met who has spoken with him, both the Mounties and Seymour kept a reserved distance >from him and always “counted their fingers after every hand shake.” By using treaties between the U.S. Government and Native American peoples that recognize Native American reservations as sovereign nations, the CIA has long and frequently avoided statutory prohibitions against operating inside the United States. The financial rewards for tribal nations have been significant and the extra security afforded by tribal police in remote areas has been a real blessing for covert operatives.

The Last Circle describes in detail how Promis software was modified by Riconosciuto to allegedly include the back door “eavesdropping” capability but also enhanced with one form of AI and subsequently applied to the development of new weapons systems including “ethnospecific” biowarfare compounds capable of attacking specific races. Riconosciuto, now serving time in a Federal prison in Pennsylvania has a cell a very short distance >from fellow espionage inmates Edwin Wilson and Jonathan Pollard. While his tale is critical to understanding what has happened to Promis, the fact remains that Riconosciuto has been out of the loop and in legal trouble for eight years. He has been in a maximum security prison for at least six. What was surprising was that in 1998 he contacted homicide detective Sue Todd in Hercules and told her that the murder of a father and son, execution style, was connected to the Promis story. One connection was obvious. Hercules is a “company town” connected to a weapons manufacturer described in Seymour’s book that also connects to the Cabazon Indian Reservation.

The Three Bills
I lived in Washington, D.C. from August 1994 until late October of 1995.  It was during that time that I was a semi-regular visitor at the Fairfax, Virginia home of Bill McCoy, a loveable sixty-something giant, always adorned with a beret who complained ruthlessly about what had happened to the United States since “The Damned Yankee Army” had taken over. Writers were “scribblers.” People who thought they knew something about covert operations without ever having seen one were “spooky-groupies.” “Mac,” as we called him, had his investigative fingers in almost everything but he was most involved with Promis. McCoy was a retired Chief Warrant Officer >from the U.S. Army’s Criminal Investigation Division. He had broken some of the biggest cases in Army history. It was Mac who first introduced me to both Bill Tyree and to Bill Hamilton in 1994. I recall scratching my head as I would be sitting at Mac’s dinner table when a call would come in >from Hamilton asking if there was any new information from Tyree. “Not yet, “ McCoy would answer, “I’ll call as soon as I get something.”

“How,” I asked, “could a guy in a maximum security prison like Walpole State Penitentiary in Massachusetts be getting information of such quality that someone like Hamilton would be calling urgently to see what had come in?” “That,” answered McCoy was the work of someone known only as “The Sergeant Major,” and alternately as “His Eminence” who fed the information to Tyree, who in turn fed it to McCoy, who then passed it on to Hamilton.  Sometimes however, Tyree and Hamilton communicated directly. To this day the identity of the Sergeant Major remains a mystery and the puzzle piece most pursued by the RCMP when they visited me in August, 2000.

It was also not by coincidence then that, in the same winter of 94-95, McCoy revealed to me that he was using former Green Berets to conduct physical surveillance of the Washington, D.C. offices of Microsoft in connection with the Promis case. FTW has, within the last month, received information indicating that piracy of Microsoft products at the GE Aerospace Herndon facility were likely tied to larger objectives, possibly the total compromise of any Windows based product. It is not by chance that most of the military and all of the intelligence agencies in the U.S.  now operate on Macintosh systems.

In late 1996 Tyree mailed me a detailed set of diagrams and a lengthy narrative explaining the exact hows and whys of the murder of Danny Casolaro and an overall view of the Promis saga that is not only consistent with what is described by Seymour in The Last Circle but also provides many new details. Asked about Mike Riconosciuto for this story Tyree would say only that, “He’s very good at what he does. There are very, very few who can touch him, maybe 200 in the whole world.  Riconosciuto’s in a class all by himself.” Those documents, as later described to me by RCMP Investigator Sean McDade, proved to be “Awesome and right on the money.”

The essence of those documents was that, not only had the Republicans under Meese exploited the software, but that the Democrats had also seen its potential and moved years earlier. Nowhere was this connection more clearly exposed than in understanding the relationship between three classmates from the U.S. Naval Academy: Jimmy Carter, Stansfield Turner (Carter’s CIA director), and billionaire banker and Presidential kingmaker (Carter’s Annapolis roommate), Arkansas’ Jackson Stephens. The Tyree diagrams laid out in detail how Promis, after improvement with AI, had allegedly been mated with the software of Jackson Stephens’ firm Systematics. In the late seventies and early eighties, Systematics handled some 60-70% of all electronic banking transactions in the U.S.

The goal, according to the diagrams which laid out (subsequently verified) relationships between Stephens, Worthen Bank, the Lippo Group and the drug/intelligence bank BCCI was to penetrate every banking system in the world. This “cabal” could then use Promis both to predict and to influence the movement of financial markets worldwide. Stephens, truly bipartisan in his approach to profits, has been a lifelong supporter of George Bush and he was, at the same time, the source of the $3 million loan that rescued a faltering Clinton Campaign in early 1992. There is a great photograph of Stephens with a younger George “W” Bush in the excellent BCCI history, False Profits.

In the fall of 1997, Bill McCoy, having recently gone off of his heart medication was found dead in his favorite chair. In the days and weeks before he had been advised by Tyree that a Pakistani hit man, on an Israeli contract had been in the states seeking to fulfill a hit on McCoy.  There had been other hints that someone closer to McCoy might do the job.  Tyree recently told FTW that just before his death, he had given McCoy information on “Elbit” flash memory chips, allegedly designed at Kir Yat-Gat south of Tel Aviv. The unique feature of the Elbit chips was that they worked on ambient electricity in a computer. In other words, they worked when the computer was turned off. When combined with another newly developed chip, the “Petrie,” which was capable of storing up to six months worth of key strokes, it was now possible to burst transmit all of a computer’s activity in the middle of the night to a nearby receiver - say in a passing truck or even a low flying SIGINT (Signals Intelligence) satellite. According to Tyree this was the methodology used by Jonathan Pollard and the Israeli Mossad to compromise many foreign embassies in Washington.

Within 48 hours of his death Bill McCoy had been cremated and in less than four days all of Mac’s furniture, records and personal belongings had been removed from his home by his son, a full Colonel in the Army. The house had been sanitized and repainted and, aside from the Zen garden in the back yard, there was no trace that McCoy had ever lived there.

Harvard and HUD
Former Assistant Secretary of Housing, Catherine Austin Fitts has had about as much ink in FTW as anyone else. A feisty, innovative thinker she has seen raging success as a Managing Director of the Wall Street investment bank Dillon Read and she has been “nuked” into near poverty after devising software strategies seeking to optimize financial data and returns for the US taxpayer. While acting as a HUD consultant in 1996, selling defaulted HUD Mortgages into the private market through her own investment bank, Hamilton Securities (no relation), she achieved unheard of taxpayer returns of around 90 cents on the dollar. In doing so she ran afoul of an entrenched Washington financial power structure feeding uncompetitively at the HUD trough.

Last month we described how Fitts devised a data optimization method using hand coding by residents of a HUD Housing project in Washington to produce Promis-like results. She successfully “mapped” the flow of HUD money and was about to create proprietary software that would make the job easier.  That software would have integrated billions of pieces of disorganized HUD financial data. Suddenly, in August 1996, DoJ and HUD InspectorÕs General investigations started that seized her computers and resulted in a four-year blatantly illegal campaign to crush everything she stood for. No charges were ever brought, Fitts, her money and her data are still viciously separated.

One of the empires Fitts threatened was that of the Harvard Endowment. The Harvard Endowment is not really a benevolent university fund but an aggressive investment predator with $19 billion in assets, some from HUD subsidized housing. Harvard also has a number of other investments in high tech defense operations and had a big hand in investing George W BushÕs lackluster firm Harken Energy. “W” has a Harvard MBA. FittsÕ chief nemesis at Harvard, Herbert “Pug” Winokur, head of Capricorn Investments, and member of the board of the Harvard Endowment is also a PhD mathematician >from Harvard where the mathematical breakthroughs that gave rise to Artificial Intelligence using block-modeling research were discovered. In the 60s Winokur had done social science research for the Department of Defense on causes of inner city unrest in the wake of the 1967 Detroit riots.

The pioneering research at Harvard that allegedly gave rise to the Artificial Intelligence installed in Promis later moved north. According to a Harvard website (<http://www.analytichtech.com/mb119/chap2e.htm>www.analytichtech.com/mb119/chap2e.htm) “Much of the effort of the Harvard group - no longer based solely at Harvard - was centered on the International Network for Social Network Analysis (INSNA) at Toronto...”. Things grew more suspicious as FittsÕ research disclosed that Winokur, through Capricorn Investments, had a decisive role in the 1980s management of the intelligence/government outsourcing mega-firm DynCorp, of Reston, VA. Winokur served as DynCorp CEO from 1989 to 1997. DynCorp handles everything for Uncle Sam from aircraft maintenance, to sheep-dipping of combat troops into private assault forces in Colombia, to the financial management of HUD records, to the maintenance of computer security at government facilities. One of DynCorpÕs most interesting contracts is with the DoJ for the financial management of assets seized in the drug war. DynCorp also counts among its shareholders former CIA Director James Woolsey. Pug Winokur made DynCorp what it is today and he still sits on the board.

In juxtaposition, Harvard and HUD differ in one striking respect according to Fitts. The Harvard Endowment has enjoyed wildly uncharacteristic above market tax-free returns for the last decade, (33% in 1999), while HUD, in the same year, was compelled to do a “manual adjustments” to reconcile a $59 billion shortfall between its accounts and the U.S. Treasury account.  [This is not a typographical error]. Where did all that money go? $59 billion in an election year is a staggering amount of money Why is no one screaming? HUD’s explanation is that it was loading a new accounting system that did not work and then did not bother to balance its checkbook for over a year.

I was not surprised when Bill Hamilton confirmed to both Fitts and to me that WinokurÕs DynCorp had played a role in the evolution of Promis in the 1980s. One other surprise was to come out of FittsÕ investigations that had months earlier led her to conclude that she was up against Promis-related interests. On the very day that DoJ and HUD shut her down she was discussing software development with a Canadian firm that is at the heart of the Canadian space program, Geomatics. The term Geomatics applies to a related group of sciences - all involving satellite imagery - used to develop geographic information systems, global positioning systems and remote sensing from space that can actually determine the locations of natural resources such as oil, precious metals and other commodities.

Apparently centered in Canada, the Geomatics industry offers consulting services throughout the world in English, German, Russian, French, Arabic, Spanish and Chinese. Geomatics technology, launched aboard Canadian satellites via US, European or Japanese boosters can help developing or industrialized nations inventory and manage all of their natural resources. There are also several Geomatics related companies in the U.S.  including one not far from the Johnson Space center in Houston.

This situation is custom made for enhanced Promis software with back-door technology. What better way to map and inventory all of the worldÕs resources than by making each client nation pay for the work. By providing the client nation Promis-based software it would then be possible to compile a global data base of every marketable natural resource. And it would not be necessary to even touch the resources because commodities and futures markets exist for all of them. An AI enhanced, Promis-based program would then be the perfect set up to make billions of dollars in profits by watching and manipulating the worldÕs political climate to trade in, letÕs say Tungsten futures. Such a worldwide database would be even more valuable if there were, for example, a sudden surge in the price of gold or platinum. Bill Hamilton readily agreed that this was an ideal situation for the application of Promis technology. In furthering our research on Geomatics we discovered that almost everywhere Geomatics technology went we also found Lockheed-Martin.

Enter The Mounties
Thanks to a strong push in my direction from Cheri Seymour, the Mounties and Hercules PD Homicide Detective Sue Todd arrived at my door on August 3rd. They had already consumed most of the FTW web site and were well familiar with my writings. I had let them know, through Cheri, that I did have information on Promis from Bill Tyree and that I would be happy to share it. Before getting into details we all went out for lunch at a nearby Chinese restaurant.

In setting basic outlines for our conversations that day I indicated that, as a journalist, I viewed our discussions as off-the-record. I took no notes and did not tape record any of the discussion. I am recounting the events now only after corresponding with McDade and advising him of my intention to write. He responded and did not object. I took the same position with Detective Todd. I warned the Mounties and Todd at the outset that a sudden termination of their investigations was likely and that they would all become expendable. It happened to me once.

Over lunch the Mounties were quite candid about the fact that the RCMP had Promis software and that it even went by the name Promis. I think they may have also mentioned the name PIRS which is an acknowledged system in the RCMP network. They stated that they had been given their version of Promis by the Canadian Security and Intelligence Service (CSIS).

CSIS was an intelligence breakaway from the Mounties in 1984, intended to be a pure [sic] intelligence agency. It was created largely with the expertise and assistance of the CIA. All of us understood two things about that arrangement and we discussed them openly First, there was a question as to whether or not any intelligence service created by the CIA could be completely loyal to its native country. Secondly, it was also understood that there was a rivalry between the two agencies similar to the one that existed between the FBI and the CIA, or in a larger context, the Clinton gang and the Bush gang in the US. The chief concern of the Mounties, clearly, was to ascertain whether or not their version of Promis was one that was compromised. McDade also described in detail how he knew that supposedly secure RCMP communications equipment had been compromised by the NSA. The Mounties acknowledged regular meetings with Cheri Seymour but evinced none of the interest she said that they had previously shown in the Mossad. With me their single-minded focus was Bill Tyree and where and how he obtained his information.

Sue Todd, confirmed for me suspicions that there was an unspoken alliance between the RCMP investigators and the FBI She said that during the course of her three years of efforts to solve the double murder in Hercules, she had routinely visited FBI offices and enjoyed access to FBI files relative to both the Promis investigation and anything connected to her victims.  That information was obviously being shared with the Mounties and that implied the blessings of the FBI. In short, a domestic law enforcement officer was sharing information with agents of a foreign government. In some cases that could provoke espionage charges but in this case it was apparently sanctioned. The Hercules murder victims had no apparent connection to Promis software in any way except for the fact that Riconosciuto had possessed knowledge about the murders which he had provided to Todd from prison. The Hercules Armament Corporation, featured in The Last Circle, was an obvious link. I also noted that the father in Todd’s case had been a computer engineer with passions for both geological research and hypnosis and no other visible connections to the Promis story.

As we copied Tyree’s papers and went through other materials the next day I was aware that the Canadians expressed special interest in Jackson Stephens and anything having to do with the manipulation of financial markets. They asked for copies of news reports I had showing that General Wesley Clark, the recently retired NATO Commander, has just gone to work for Stephens, Inc. in Little Rock Arkansas. I also provided documents showing that Stephens’ financial firm Alltel, heir to Systematics, was moving heavily into the mortgage market. As the Mounties repeatedly pressed for information on the identity of the Sergeant Major I referred them to Tyree directly through his attorney Ray Kohlman and to Tyree’s closest friend, the daughter of CIA bagman and paymaster Albert Carone, Dee Ferdinand. [For more on Carone visit the FTW web site].

McDade did eventually contact Ferdinand by phone and shortly thereafter one of the most bizarre twists in the whole story took place. About a week after meeting the Mounties I heard back from Sean that the Tyree documents and flow charts from 1996 had been right on the money. A special recurring theme in those documents that meshes with Seymour’s research is the fact that modified versions of Promis software with both artificial intelligence and trap doors were being smuggled out of Los Alamos nuclear labs in containers labeled as radioactive waste According to Tyree and other sources, after an Indian reservation, the safest place in the world that no one will ever break into is a nuclear waste dump.  This also applies to containers in transit between countries. The radioactive warning label guarantees unmolested movement of virtually anything. Promis software is apparently no exception.

Bill Casey and Al Carone from the Grave
Albert Vincent Carone has also been covered exhaustively in FTW, both in the newsletter and on the web site. A retired NYPD Detective, also a made-member of the Genovese crime family, Carone spent his entire working career as a CIA operative. (FTW has special reports on both Bill Tyree and Al Carone available from the web site or at the end of this newsletter).  For more than 25 years before his mysterious death in 1990, Al Carone served as a bagman and liaison between George Bush, CIA Director Bill Casey, Oliver North, Richard Nixon and many other prominent figures including Robert Vesco, Manuel Noriega and Ferdinand Marcos. The Carone-Tyree connection, covered in detail in the Sept. 1998 issue (Vol.  I, No.7) goes back to operations in the mid 1970s when Tyree, serving with the Special Forces, engaged in CIA directed missions for which Carone was the paymaster.

Carone’s death from “chemical toxicity of unknown etiology” in 1990 resulted in the sanitizing of all of his military and NYPD records as well as the theft and disappearance of nearly ten million dollars in bank accounts, insurance policies and investments. Virtually overnight, almost every record of Carone disappeared leaving his daughter and her family nearly bankrupt under the burden of tens of thousands of dollars in medical bills. In 1996, Carone’s daughter, Dee Ferdinand, discovered that Tyree and Carone had known each other and that Tyree could prove instrumental in helping to restore Carone’s lost fortune. Ferdinand filed suit in U.S. District Court this spring seeking to recover pensions, insurance policies and benefits in a case which has no known connection to Promis. I have known Ferdinand and her family for more than seven years.  Never once has she mentioned a connection between her father and Promis although she was well familiar with the case from Tyree and conversations with Bill Hamilton. I had referred the Mounties to her because of my belief that she could possibly help identify Tyree’s source, the Sergeant Major.

On August 10th, exactly one week after the Mounties came to see me, the DoJ mailed Ferdinand a response to her suit seeking dismissal. Included in the paperwork was a bizarre document, now in FTW’s possession, that, by the account of both Ferdinand and her lawyer, had absolutely nothing to do with her case. The document in question was a March 29, 1986 Declaration >from CIA Director William Casey, a close friend of the Carone family.  Paragraph 6 of that document (prepared for another case) stated, “Two of the documents responsive to Plaintiffs’ Request No 1, specifically the one-page letter dated 28 March 1979 and a one-page letter dated 8 January 1980, have been released in the same excised form as they were previously released by the Government of Canada. I independently and formally assert the state secrets privilege for the information excised from these two documents.”

Dee Ferdinand called me immediately The letter had nothing to do with her suit. It mentioned Canada. Canada was not even mentioned in her suit. What was going on?” she asked. “It’s blackmail,” I answered. “CIA, which is monitoring everything the Canadians do, everything I do, everything you do, knows that I will tell the Mounties of these letters.” McDade didn’t grasp the concept at first. He was a straight-ahead street cop. But I had been through something similar when serving as the press spokesman for the Perot Presidential campaign in 1992. I explained it to Sean, “Sean, you and I are just the messengers. But I guarantee that at some level of your government the CIA’s reference to these letters will scare people to death. It is a reminder that CIA has them.”

A week later McDade told me that the dates were indeed significant - very significant. That’s all he would say.
FTW has what may be a possible explanation for the dates in question. The President and CIA Director on these dates the letters were written were Jimmy Carter and Stansfield Turner. Aside from the then recent Russian invasion of Afghanistan, a saga in which the Canadian government played a minor role, the largest drama on the world scene was the overthrow of the Shah of Iran in January 1979, the rise of the Ayatollah Khomeini and the seizure of the U.S. Embassy in Teheran later that year. The Canadian government and the CIA worked very closely in Iran, the Canadian Embassy even housing some CIA personnel who had escaped the crowds of students.  But that kind of assistance is not something to hide. Another explanation was needed to explain shock waves in Ottawa.

Recently, a source using a code name known to FTW has surfaced with information relating to Promis. In his communiqués he describes the use of Promis software by the Bush family to loot the secret bank accounts of Manuel Noriega and Ferdinand Marcos. Promis is able to do this because funds can be transferred out of accounts without a trace. Remember the trap door? The rule of thumb here is that crooks, especially CIA sponsored crooks, don’t usually go to the cops when somebody steals their stolen money. From my personal experience in the era, and direct exposure to two members of the Iranian Royal family, both before and after the overthrow, I am acutely aware that the Shah, then perhaps the richest man in the world, was actually targeted by the CIA. His downfall was no accident Once worth more than $20 billion, the Shah ended his life a refugee in Egypt.  Many of his billions disappeared and the family was very upset about it.

Could the financial power of Promis have been turned loose first through Canada when Carter was President in the US? The Shah did a lot of banking in Canada. We may never know the answer. But if the downfalls of wealthy US supported dictators Noriega and Marcos are any indication the answer is likely, yes. And the Shah was wealthier than both of them put together.  Where’d all that money go?

Headlines
On August 25th the Toronto Star broke what was to become a series of stories by Valerie Lawson and Allan Thompson. The cat was out of the bag.  Various figures known to have direct connections to Riconosciuto had been virtually dogging the Mounties’ every move as they traveled in the US. One even contacted me just days after the Mounties left LA. It was a story that could not be kept under wraps forever. Most of the Star story was accurate. It was going to be difficult for the RCMP to move quietly now. A Reuters story the same day closed with the following paragraphs, “CanadaÕs national counterintelligence agency said in a June report that friendly nations were making concerted efforts to steal sensitive technology and information.

“The Canadian Security Intelligence Service said outsiders were particularly interested in aerospace, biotechnology, chemicals, communications, information technology, mining and metallurgy, nuclear energy, oil and gas, and the environment.” That was Geomatics, at the heart of Canada’s space program, Canada’s flagship space technology. I checked the Star story. There had been no mention of high tech or space related issues. What did Reuters know? In mid September, after receiving confidential source documents related to the case telling me that one version of Promis, modified in Canada was handled through the Canadian firm I.P. Sharp, I got an answer. A quick search on the web revealed that Sharp, a well documented component of the case, had been bought by a Reuters company in the early 90s. Hamilton later told me that he had heard that Reuters possibly had the Promis software. That would explain how they knew about the aerospace connection.

Michael Dobbs of The Washington Post called and asked what I knew. I confirmed that I had met with the Mounties but didn’t know much else other than giving them the Tyree flow charts. The Post was never going to tell the truth. Their business was keeping secrets, not revealing them. The Mounties had made waves.

On August 28 the phone rang and it was a collect call from Tyree. “Get a tape recorder and turn it on,” he said. Over the course of the next half an hour Tyree, obviously reading from detailed and copious notes, named individuals and companies dealing with Promis software and its progeny.  The tape was specific down to naming specific engineers in military and private corporations doing Promis research. Tyree described specific Congressional committees that had been infiltrated with “enhanced” Promis.  Tyree described how Promis progeny, having inspired four new computer languages had made possible the positioning of satellites so far out in space that they were untouchable. At the same time the progeny had improved video quality to the point where the same satellite could focus on a single human hair. The ultimate big picture.

Promis progeny had also evolved to the point where neural pads could be attached to plugs in the back of the human head and thought could be translated into electrical impulses that would be equally capable of flying a plane or wire transferring money. Names like Sandia, Cal-Tech, Micron, Tech University of Graz, Oded Leventer and Massimo Grimaldi rolled >from his lips as he tore through the pages of notes. Data, such as satellite reconnaissance, could also now be downloaded from a satellite directly into a human brain. The evolution of the artificial intelligence had progressed to a point where animal behavior and thought were being decoded. Mechanical humans were being tested. Animals were being controlled by computer.

Billy saved Canada for last.
“Here’s how we f**k Canada,” he started. He was laughing as he facetiously described what was coming as some sort of bizarre payback for the War of 1812. Then, placing the evolutions of Promis in context with the Canadian story Tyree asked a question as to why one would really now need to go to all the trouble of monitoring all of a foreign country’s intelligence operations. “There’s an easier way to get what I want,” he said. “I access their banks. I access their banks and I know who does what and who’s getting ready to do what,” he said. He described how Canada had been provided with modified Promis software which Canada then modified, or thought they had modified, again to eliminate the trap door. That software turned loose in the financial and scientific communities then became Canada’s means of believing that they were securing the trap door information from the entities to whom they provided their versions of Promis. But, unknown, to the Canadians the Elbit chips in the systems bypassed the trap doors and permitted the transmission of data when everyone thought the computers were turned off and secure. Tyree did not explain how the chips physically got into the Canadian computers.

“This,” Tyree said “is how you cripple everything Canada does that you don’t like. And if you want proof I offer you the fact that we toppled the government of Australia in 1980.” “[Prime Minister] Gough Whitlam and Nugan Hand [Bank],” I answered. Tyree affirmed. The Labor Government of Whitlam had been suddenly unseated after making nationalistic noise and questioning the role of US intelligence agencies in Australian affairs.

The issue of a coming feud between the dollar and the Euro came up. I suggested that rapidly vanishing support in South America and Europe both were threatening the military operations of “Plan Colombia” and the economic boost it would give the US economy. Tyree jumped in, “If I can put Canada in line and show the Eurodollar, the ‘Eurotrash’ what I have already done to my neighbor, whom I value to some degree - remember, these are not nice people - these are financial thugs at their worst. So what they are going to do is sit down discreetly and say, ‘Look, this is what we did to Canada. Now, would you like us to do this to the European market as well?’ Mike, they’re not going to think twice about itÉ A weapon is only good if someone knows what its capability is. Prior to using the atomic bomb it was irrelevant.” He continued, “They refer to it as the Nagasaki Syndrome.”

After describing in some detail how the financial powers-that-be had gutted American manufacturing productivity through globalization he described a strategy intended to halt any move by the Euro to overshadow the dollar or even compete with it. It was pure economic hostage taking and Canada would be the object lesson. Then, chillingly, he described something familiar to any military strategist. The penetration and looting of HUD was the test bed, the proving ground, the “White Sands” of the Promis economic Atom bomb. Once the CIA and the economic powers-that-be had proven that, over a period of years, they could infiltrate and loot $59 billion dollars from HUD, they knew that they could do it anywhere.  Said Tyree, “Then they knew they had what it took to go abroad and create mayhemÉ It was planned twenty years ago.”

It took several days to reach Sean McDade who had been on vacation. I played the Tyree tape for him over an open phone line into RCMP headquarters. He asked me to make a physical copy right away and send it to him. After he had had time to listen to it he cautioned me against sending it anywhere else. I told him that as long as his investigation was active that I would do nothing more than make the standard copies I make of any sensitive documents as a precaution. I could tell that the tape had rattled him. Though I had known from the start that the large and energetic Mountie, whom I believed to be a dedicated an honest man, would never be allowed to ride his case out to the end, I still had hopes. But in my heart I knew that Tyree was right. In all the years he had been feeding me information I had never known him to be wrong and, apparently, neither had Bill Hamilton. I did not send a copy of the tape to Hamilton because I knew how difficult and potentially dangerous McDade’s job was going to be now that the press had exposed him. Having been a cop in dangerous political, CIA infested waters I knew what it was like to not know who you could trust. If keeping the tape quiet would give the Mounties and edge I would do it - but only as long as they had a case.

Sudden Death
Then it was over.

On September 16th the Toronto Star announced that the RCMP had suddenly closed its Promis investigation with the flat disclaimer that it did not have and never did have any version of Bill Hamilton’s software. That was as shocking a statement as it was absurd. “The only way that you can identify Promis,” said a perplexed Bill Hamilton, “is to compare the code.  Sean McDade said that he was not an engineer and couldn’t read code so how did he know?” Hamilton was as emphatic as I was that McDade had said that RCMP had Promis. So was Cheri Seymour. I offered a fleeting hope that the Mounties were playing a game, saying that they had terminated the investigation to shake some of the incessant probing that had been taking place around McDade’s every move.

I was finally convinced when McDade e-mailed me and said that it was his view that the Mounties did not have any version of Promis and that he had no objections if I decided to write a story. I then agreed with Seymour that, whether they had said so or not, both the Mounties and Sue Todd had left enough visible footprints that it was their intention for us to go public. It might be the only protection they had.

As I had predicted from the start, they had come too close to bigger issues and been shut down ruthlessly. I called Sue Todd who lamented that she was marking her three year homicide investigation, “Closed by the press.” Even though she was convincing I had the feeling that she was playing back a rehearsed script. I told her that I was not satisfied with the statements that there was no Promis in the RCMP. I recalled our lunchtime conversation of August 3rd. She agreed with me that the RCMP mission was to determine whether or not RCMP Promis was a stolen or compromised version. She knew that they had it. So did I. I e-mailed McDade one last time saying that I was going to write it like I remembered it. He never got back to me.

Bill Hamilton added one last twist when he told me in a conversation that the Mounties claimed to have developed their software on their own. That, he said, was nonsense because the Mounties did not have that kind of sophistication or ability. He thought that the RCMP program had been specially prepared FBI. That would explain the role of retired FBI agent Ted Gunderson. Though I didn’t tell him at the time I knew that he had obtained that information from Bill Tyree. And Bill Tyree and his provider, the Sergeant Major, are two people that Bill Hamilton and I both have learned to respect.

Diplomacy
Just three days after the Toronto Star announced the abrupt termination of the RCMP investigation the Canada based International Network on Disarmament and Globalization (INDG) posted an electronic bulletin on a speech by former Canadian Ambassador to the US. In an address the night before, less than 48 hours after the termination of the RCMP investigation, Derek Burney, current President of CAE, a Canadian firm manufacturing flight simulators, criticized the U.S. aerospace industry for being overly-protectionist under the guise of national security. In addressing the Aerospace Industries Association of Canada, according to large stories that appeared in CP (Canadian Press) and Toronto’s Globe and Mail, Burney was characterized as sounding unusually tough in his criticism of American policy that was freezing Canadian firms out of aerospace contracts. Both stories were ambivalent in that they alternately made Burney sound critical of the U.S. while championing Canadian interests and at the same time weak as he noted that Mexico stood poised under NAFTA to replace Canada as the U.S.’s number one trading partner.

The CP story made two telling observations. It quoted Burney as saying that Canada needed to do more to “preserve and enhance its access to the American market.” Then it closed it’s story on Burney’s speech, advocating a compromise agreement between the US and Canada, by saying that Burney’s position “risks being perceived here at home as a sellout or worse.”

A close examination of Burney’s remarks, published in the INDG bulletin revealed something more like an obsequious surrender rather than a mere sellout. While there were a few tough-talking paragraphs that saved Canadian face, the essence of the speech was that Burney believed that American defense firms, the largest of which is Lockheed-Martin, were poised to transfer the bulk of their contracts to companies in Mexico.  Citing Canada’s dependence upon access to American avionics and “databases,” Burney painted a picture that seemingly left Canada over a barrel. Without access to American technology the Canadian aerospace industry could not function. Buried deep in the text of Burney’s speech we found the following paragraph which is, we believe, the best place to end this story.

“That does not mean that we have to agree with everything Washington does or says or do things exactly as the Americans do. On the contrary, one of the advantages of being a good neighbor and close ally is that we can speak freely and forthrightly to the Americans - provided we have a solid case and are seeking to influence their position and not simply capture a quick headline. And, never forget, it is always more effective to be frank in private. Otherwise your motive can be somewhat suspect.”


Anti_Illuminati

  • Guest
Wow, what a read.

1. The Israeli elbit chips with the Petrie dish is a trojan Horse. virtually stores 6 months of data on ambient or dormant electricity. the data can be transmitted wirelessly to a Bus terminal(vessel) or a Satelite in space.

2. Investigator Danny Casolaro was killed due to his investigation of death of Robert Maxwell(mysteriously drowned in 91), who was the salesman of Israeli Promis software to world clients.

3. Michael Reconoscuito worked with Jonathon Pollard and Edwin Wilson in Cabazon Indian reservation. to create a back door to Promis Software. The enhanced software by the CIA in Los Alamos was then exported to Cabazon Indian reserve through the way of disguising the software as Nuclear waste material. In which an Indian Reservation is also a Nuclear Waste dumping site. All three men are still in prison.

4. Another faction led by Jackson Stephens who is president of Systematics also was interested in the application of PROMIS software. Systematics was at the time involved in 60-70% of all financial transactions at the time. Jackson clearly saw how Promis could implement itself to predict the nature of financial transactions, loans, and world markets.


4. Edwin Meese a member of the DOJ in the 1980's envied the possibility of using Bill Hamilton's PROMIS software for his own gains(To gain Backdoor capability (espionage and eavesdropping). He conspired with other member(Lowell Jensen and Earl Brian) in the DOJ to bankrupt Bill Hamilton's INSLAW and in turn, sell it foreign interests like Rafi Eidan.

4.5 GE aerospace, CIA, FBI division of the NSA also tampered with the power of the 'Ring'. Not only to create backdoors to the PROMIS software but to enhance its AI capability. Much of the work was done in Los Alamos Laboratory.

5. Israeli Rafi Eidan infiltrated Washington D.C to view a glimpse of Promis's potential ability. He buys the software from Edwin Meese(after Edwin Meese stole the technology from Promis founder Bill Hamilton). Through the help of Israeli research, installs an Elbit Chip with the Petrie Chip to gain back door information via a prospective client. Eidan works in collaboration with Robert Maxwell, a Jew, to sell Eidan's version of Promis software through out the middle east. Maxwell is found dead. and Danny Casolaro an investigator to the Maxwell murder is found Suicided.

6. Bill Tyree is a central figure in Ruppert's investigation. Tyree, ex-green beret in Massachusetts State penitentiary for the murder of his wife(which was a set-up), gains information through a special man named "Sargeant Major". Tyree passes the information to Bill McCoy, an ex Army CID. Who then communicates info to Bill Hamilton, former NSA scientist and the Father of Promis Software. McCoy is found dead. McCoy's son, an Army man, cleans up removes all belongings. The house is repainted. No trace of Bill mcCoy is left.

7. Catherine Austin Fitts, an ex directing manager of Dillon Reed was looking ways to optimize the investments of disorganized HUD's, by creating creative software using hand coding. the DOJ and the inspector general in 96 seized Fitt's computers and shut her operations and grabbed her wealth.
The primary reason being, Fitts provided competition from Harvard endowments, which profit from subsidized HUD's. One of the Harvard Trustee board members, Pugs Winoker, was the president of Capricorn Investments which is financially connected to DYNCORPS. Pugs, was one time a CEO of DYNCORPs in 97. What is found is that DYNCORPS also found itself investing its resources and profiteering in the HUD goldmine. DYNCORPS was also found developing a progenitor of the PROMIS software in the 80's, enhanced, that would act as a brain and forecaster to HUD's market financial dynamics, Possibly much more.

8. The bankruptcy of the SHAW in Iran, the HUD bankruptcy is connected to the use of the Backdoor option that Companies or factions exploited to steal billions of dollars. the Promis Software can creep into a computer, then withdraw all money from the account and then dissapear without a trace. The HUD 59 billion laundering of money was just a test bed of what power the PROMIS software resides. If governments get access to the use of PROMIS software, economic terrorism, threats, and flat out theft can occur nation, company or magnate.

9. One of the ideal uses of the PROMIS software is in geomatics. Canadians sough the PROMIS software to compliment its Geomatics technology, which uses satelite mapping to find Raw materials underground. The reason for the RMCP investigations was to find out whether a backdoor was placed onto one of the PROMIS based  computers.  If A backdoor was installed and not eliminated, another company can access information regarding the relevance of Geomatics data and to steal valuable data Canadian investment put into searching and analyzing.  Unfortunately, the elbit processor along with the petrie chip were not known of to the Canadian parties. Which left real risk to theft and security breaches to the Canadian government itself.


--

PROMIS Software Linked To Several Murders
http://www.youtube.com/watch?v=x3kbikyxrpg

http://www.stewwebb.com/Ted%20Gunderson%20The%20Plot%20Thickens%20in%20Inslaw%20Promis%20Affair%20by%20Kelly%20O%20Meara.html

Who are the real cyber-terrorists again?