Author Topic: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IPv6  (Read 41652 times)

0 Members and 1 Guest are viewing this topic.

Anti_Illuminati

  • Guest
This is highly probable to be an avenue for a massive or multiple false flags in the future.

Ok, this thread is going to be a huge information dump (albeit somewhat orderly.)  I am going to basically explain briefly what I have learned in my own words:

One of the New World Order's key attack points to force the creation of world government will be through the use of their genius criminal computer experts.  Everyone is well familiar with compartmentalization, and the term is almost overused, and many even that are ware of it are still amazed at how so much insane criminality is carried out.  They have been constantly engaged in a full spectrum attack against literally every aspect of freedom to keep those who are awake constantly pissed off and freaked out.  There is no area that they are not attacking, you don't need me to tell you that.

Through this software (and likely newer, more advanced versions of it that have been or are being developed now) they will be able to exercise their total dictatorship of the entire world population.  To paraphrase--the PROMIS/Ptech software is so powerful that it can directly interface on a HARDWARE LEVEL of a computer, completely evading ALL security measures of any operating system.  Ptech will laugh at Unix, FreeBSD, any MacOS.

It will laugh at SMARTCARD security, it will bypass all future Biometric locks that will enslave us all.  It is irrelevant, it is the ultimate override system of control.  The absolute power to VETO THE SOVEREIGNTY/right of ownership on a per-person basis.  Remember in the DARPA IxO video that you can view online about the SEABASES, where DARPA bragged about their AUTONOMOUS military forces being immune from anyone VETOING THEIR MOVEMENTS.

Risk management software will be used to enforce the Carbon tax "be good to the Earth" enslavement or you die.  This is the physical manifestation of what Bill Cooper talked about in his video in that school in 1991 where he said they will be able to shut you off from being able to survive by "closing out your computer account."  This is how they will permanently have dictatorial power over your finances worldwide, where no bank will be able to safely hold your money.  This is how they will control you with the chip implants, there will be no way to stop it unless it gets stopped before it gets implemented.

All of the good men and women (because everyone is not evil) who work for the CIA, NSA, FBI, Police--it is not just textbook compartmentalization that prevents them from exposing a lot of the hardcore crime, it's not just textbook compartmentalization that keeps them from secrelty researching 9/11, Virginia tech, and other false flags.  It is the Risk Management software/programs.  Think of it this way:  You know that the face scanning cameras, the thumb scanners, the 3D photos for the licenses, the GPS in the vehicles, cellphones, and laptops--you know that it isn't there to keep you safe, don't think I'm preaching to the choir here--because I said all that to say this:

The Risk Management directives/programs have and are being sold to the Tyrant Pawns "above" us--the Police, FBI, CIA, military THEMSELVES are sold this "SOLUTION" FOR ***THEIR SECURITY AND FOR "NATIONAL SECURITY"***  THE REMNANTS OUR OWN REAL GOVERNMENT IS JUST AS MUCH SLAVES AS WE ARE AND THEY DON'T EVEN REALIZE **HOW**  THE ANSWER IS THEY ARE ENSLAVED BY BULLSHIT CALLED RISK MANAGEMENT ARCHITECTURE, THE PURPOSE OF THE FALSE FLAGS WAS TO VETO THE TRUE NATIONAL SECURITY OF THE UNITED STATES, PUTTING IT IN THE HANDS OF THE CONSPIRATORS WHO CONTROL THESE ROGUE COMPUTER ARCHITECTURES/SYSTEMS FOREVER!!!

It has been and will be used to steal money from banks, anywhere in the world. --allowing complete freedom to the New World Order elite to move about directly amidst the PRISON PLANET they have created for you and I, all while laughing in our faces as we are looted of the remainder of our hard earned lives savings, and suffer and die.  All the while being so horribly poisoned and damaged from what they are doing to us that we will never be able to properly understand how they carried it out.

Remember Aaron Russo talking about how Nick Rockefeller where he said that if Aaron joined his side, he would give him a "KMA" card?  That typifies the immunity the NWO will have from their own prison grid, and is exactly what will happen if this entire house of cards does not get fully fleshed out and exposed as completely as possible.  I'm done talking for now, please immediately read this 1st PDF document before you do anything else:   

http://mhkeehn.tripod.com/inslawcol.pdf

http://www.rsaconference.com/uploadedFiles/RSA2007/us/Why_Attend/PDF_Downloads/RSA07_Catalog_Brochure(1).pdf

Handling a Massive Theft of Identity Data:  A Strategic Scenario

MODERATOR:  Rich Baich, CISSP, CISM, Managing Director, PwC, and Former CISO, Choicepoint; PANELISTS:  Howard A.  Schmidt, President & CEO, R & H Security Consulting LLC, and Former White House Cyber Security Advisor; Steven Blinn, President, Blinn PR; Dan larkin, Unit Chief, Cyber Initiative & Research Fusion, FBI; Jeffrey Ritter, Co-founder and Director, Waters Edge Consulting, LLC

Given the huge number of incidents over the last few years, it seems any organization can fall prey to a large scale theft of personal information.  What if your company was next?  Would your
incident response stand the test?  In this interactive session, attendees will analyze a scenario and work through an incident,
including dealing with law enforcement, corporate executives, legal and PR.  [INSERT:  Rich Baich is also: Principal, Deloitte & Touche LLP]

DefeNDiNG CyberSpACe:
http://www.parkcitycenter.org/DefendingCyberspace.pdf

Securing Cyberspace for the 44th Presidency
http://www.asisonline.org/newsroom/120808_CSIS_Cyber_Security_Report.pdf
CSIS Cyber Security Report (excerpt):

Rich Baich, Commanding Officer, U.S. Naval Reserve Navy, Information Systems Command (Public-Private Relationships Working Group Members)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://atlanta.bizjournals.com/atlanta/stories/2004/03/22/story8.html

Friday, March 19, 2004
ChoicePoint executive tops in info security
He stresses awareness, empowerment
Atlanta Business Chronicle - by Justin Rubner Staff Writer

Securities companies at the World Trade Center lost $3.2 billion in hardware and software on Sept. 11, 2001. Such hardware and software can be replaced, but the information contained within the technology is priceless.

The potential for such a catastrophic loss of data is what prompted ChoicePoint Inc. to name Rich Baich the company's first chief information security officer last year. On March 18, he was scheduled to be honored as Georgia's Information Security Executive of the Year at a ceremony at The Fox Theatre.

Baich's position was created mainly due to the terrorist attacks of Sept. 11 and the subsequent government regulations requiring companies to disclose breaches that may harm customer data.

With the sensitive nature of ChoicePoint's mission -- ranging from underwriting services for insurance companies to personnel screening for government agencies -- Baich has had his work cut out for him.

"In general, security has been thought of as a products solution," said Baich. "But when you peel it back, it's all about processes and people. It's about defining a culture of security."

His approach is to make security enjoyable enough that employees don't dread learning how to protect their most crucial infrastructure: information.

Shortly after coming to ChoicePoint, Baich started to hold security awareness contests and "webinars" that could be taken from the comfort of an employee's bedroom.

"Our approach is to empower the employee more at home," he said. "If we can change their habits at home, when they come to work, it's a habit."

Over the past year, Baich has improved his company's virus detection by 90 percent, incorporated a security awareness program and created an incident response team that conducts various scenarios on a quarterly basis.

Baich has been in the information security business for more than 10 years.

After graduating from the U.S. Naval Academy, he served as a cryptology officer with the Navy and was stationed at National Security Agency headquarters in Maryland.

Shortly after Sept. 11, while working at software security company Network Associates Inc., he was recalled to active duty to do cryptology work for the FBI. As a lieutenant commander, Baich still serves in the Navy as an active reservist and is still pursuing higher learning, even though he holds an MBA and a master's degree in management from the University of Maryland University College. He takes distance learning classes at Rhode Island-based Naval War College.

Baich competed against 32 other nominees for the Georgia award. Five judges from Internet Security Systems Inc., Computer Associates International Inc., StoneSoft Corp., Symantec Corp. and Lancope Inc. voted for him unanimously. Lancope CEO Harland LaVigne, one of the judges, said a combination of Baich's mentoring of other employees and ChoicePoint's delicate mission led him to vote for Baich.

Honorees must be chief security officers with records of achievement in a corporate or government setting. They also must play leadership roles in making the Internet a better tool for business, mentoring others in enterprise security, and focusing on cybersecurity.

The event was sponsored by ISS (Nasdaq: ISSX) and Computer Associates. Last year's winner was BellSouth Corp.'s Monique Shivanandan.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://patrickjfitzgerald.blogspot.com/2006/09/tgif-justice-bloggers.html

GEF,

Do you find it disgusting that the zionists installed Choicepoint programs directly to the Diebold machines? And into the Pentagon's security machines as well, called INSLAWThis is considered OK and for "securing the homeland"  What a total joke!!!!!!!

Choicepoint Diebold data theft all over is stealing votes!!!!! We got these mucked up, traitiorous machines removed from several states and laws passed against them for just this reason.  Choicepoint Diebold serves the NEOCONS!!!!!!

It selects NO ONE ELSE!!!! Never. Forget party...If the person is neocon or zionist, they will be selected by Choicepoint automatically.  ALL african american votes will be discarded. They set this ruthless fraud up so it just, no thinking needed automatically wipes out votes by the poorer community!!!!!

Anyone who votes from the suburbs or "so called drug offender" area, get their vote trashed.  Every voting machine eats their votes alive and this is how elections are stolen.  ALWAYS.  And if its not that they flip the votes entirely, again using the Choicepoint linked voteflip.

Criminals is all they are every last one and they're getting the wrath of god now.  Thought they could continue throwing out these trash Sequoia/Diebold machines loaded with Choicepoint.......THINK AGAIN the world is ready for you!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://w2.eff.org/effector/18/11a.php

Diebold, Choicepoint Partner to Offer Innovative Voting Technology

Alpharetta, GA - Diebold Election Systems and Choicepoint, Inc., today announced a joint venture that could revolutionize the voting market. The concept is simple: combine Diebold's demonstrated expertise in voting systems with Choicepoint's superior data-mining techniques to produce PredictaVote(TM) - the first 100 percent voter-free, predictive voting system.

[MY INSERT:  YEAH, *PREDICTIVE* BECAUSE IT IS ARTIFICIAL INTELLIGENCE CORE SOFTWARE, PROMIS/PTECH/RISK MANAGEMENT]

"The beauty of this approach is that it is self-correcting," explained Choicepoint CEO Derrick Sithe. "If someone wants to increase the chances that his or her vote will be counted correctly, the voter simply needs to open up more of his or her life to our data-collection methods. Apply for more credit cards. Register for more grocery loyalty cards. Purchase more subscriptions. Fill out more warranty cards. Compare that to today's paperless e-voting machines, where voters have no way to determine whether votes are accurately counted. There's really no comparison."

Even more impressive than its accuracy is its cost- effectiveness, say company spokespersons. PredictaVote caps a decade of innovation and strategic thinking at Diebold, explained Diebold President and CEO Ollie O'Sell. "Elections have historically been ridiculously expensive undertakings. Who's to blame? Quite simply: the voter. Accounting for everything from allowing employees time off to vote to ensuring the accuracy and security of the machines, elections drain an average of $12 billion from the American economy every year in the form of manufacturing costs and lost productivity. With PredictaVote, all of these problems go away with the voter."

Company officials conceded that a number of design choices had yet to be finalized, but emphasized that all predictive factors were customizable on a jurisdiction-by- jurisdiction and demographic-by-demographic basis. Immigrants and the homeless, for example - i.e., those without extensive credit histories - will be excluded from final vote tallies or be subject to additional invasive investigatory procedures, said Choicepoint's Sithe.

"This approach seems to be working well for us in our airport screening algorithms, and we see no reason that it wouldn't work here."

AP article:
http://www.eff.org/cgi/tiny?urlID=441
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://archive.cert.uni-stuttgart.de/isn/2005/02/msg00100.html
[ISN] Feds prepare security test

http://www.fcw.com/fcw/articles/2005/0221/web-cyber-02-22-05.asp

[INSERT: From original sourced link--"The page you requested is not available.  The page that you have requested has changed locations or is no longer available on our server.

By Florence Olsen
Feb. 22, 2005

SAN FRANCISCO -- The federal government and several international partners will hold a cyber preparedness exercise in November, Homeland Security Department officials said here at the RSA Conference.  Its purpose is to give federal agencies an opportunity to test their plans for responding to a direct or indirect attack on the computer networks that control the nation's critical infrastructure such as power plants and oil pipelines. The exercise will be unclassified, and the public will be informed, said Hun Kim, deputy director of the National Cyber Security Division at DHS.

Although the federal government's best cyber experts say they don't
know what kind of attack to expect, they can offer scenarios of what a cyber winter might be. G. Rick Wilson, special assistant for strategic policy at the National Security Agency's Information Assurance Directorate, said he doubts that a cyber winter would be caused by a massive denial-of-service attack on critical routers and servers. "I don't think it's going to be loud and noisy," he said.

Instead, Wilson said he suspects that sophisticated intruders would
quietly try to wreak havoc, causing a loss of confidence in the
interconnected system of networks and information systems on which the nation's economy and security now depends.
"Somebody's going to figure out how to get across a low wall and get on the inside, and they're not going to go in a chat room and talk about it," Wilson said. "We're talking about a sophisticated adversary."

Wilson, continuing with his hypothetical scenario, said the adversary
would "remain hidden until something happens, maybe something in the geopolitical sphere."

Finding a hidden enemy and cleaning up the damage in such a scenario would be extremely difficult, Wilson said. "You're going to have not only national security issues; you're going to have privacy issues.
 
I'll leave it at that," he said.

Offline heavyhebrew

  • Member
  • *****
  • Posts: 3,986
  • Laughter is the best medicine.
Damn that is scary stuff. I will be researching this. Smells like it comes from DARPA's TIA research.
We work jobs we hate to pay for stuff we don't need to impress people we don't like. Am I the crazy one here?

Anti_Illuminati

  • Guest
How is Infragard tied into all this?  I'll show you:


INFRAGARD ATLANTA PREVIOUS QUARTERLY MEETINGS
http://www.infragardatlanta.org/past_meetings.htm

Q3 2004 Meeting was Monday, September 13th 8:0AM-Noon at e^deltacom (link to directions)

This past quarterly meeting wass scheduled for Monday, September 13th from 8am until 12 noon. It was held at e^deltacom which is located at 300 Satellite Boulevard in Suwanee, GA. (The commute northward towards Suwanee is easy in the mornings, Joe does it daily).

We were also pleased to announce that our breakfast sponsor for Sept 13th was e^deltacom.

e^deltacom is the largest data center storage facility in the southeastern United States offering co-location and managed services for it's clients (www.edeltacom.com). They volunteered the use of their e^deltatorium for our meeting in September.

WE REQUIRED AN RSVP's FOR THIS MEETING. Click HERE to RSVP.

Given the nature of their facility, secure access is guaranteed, therefore our RSVP's will facilitate the entry of InfraGard personnel into their facility that morning. If you are in doubt, please RSVP anyway, it will be better to have you on the list than to add you at the last minute.

InfraGard Atlanta is pleased to announce we will have two separate presentations:

Our first presentation was from Rich Baich, CISSP, CISM, and CISO of ChoicePoint. Mr. Baich was selected as the Information Security Executive of the Year in Georgia this past March. ChoicePoint is the leading provider of identification and credential verification services for business and government (www.choicepoint.com). Mr. Baich presented on Identity Theft, his presentation was very well received by the InfraGard National Congress in Washington this year and we had the benefit of receiving this presentation locally from a notable expert in this regard.

Our second presentation was from Dave McGirt, VP/CTO of e^deltacom and Matt Searfoss, Director - Hosting and Managed Services of e^deltacom. They discussed the workings of a world-class data storage facility, and how such a facility can support a company's business continuity needs effectively.

We also met our new FBI InfraGard Program Coordinator at this meeting. As a gentle reminder, the quarterly meeting breakfast sponsor enjoys the one opportunity we offer for vendors to present to our membership.
________________________________________________________________________

The Q2 2004 Meeting was May 27 7:30AM-10:00AM at Cobb Galleria

Infragard Atlanta was pleased to announce the Second Quarter 2004 Infragard meeting occurred in conjunction with the second annual Atlanta SecureWorld, May 26-27, Cobb Galleria.
http://www.secureworldexpo.com/atlanta04.php

Infragard Atlanta invited members to a complimentary Infragard Breakfast meeting, May 27th, 7:30am - 10:00am that included a Keynote and Panel Discussion on "Corporate Interface with Law Enforcement during or after a Critical incident, both Physical and/or Cyber".
As a principle partner in the program Infragard members were invited to the event with complimentary exhibit & open session passes and a $60.00 discount off the $145.00 two day conference fee (Discount Code INFR855)

Infragard members throughout the region found SecureWorld programs timely, informative and a great opportunity to network with peers in the industry.  In addition to the quarterly meeting, InfraGard Atlanta had an exhibit table both days of the SecureWorld Expo.

Applications and brochures were available to interested visitors.
________________________________________________________________________

The Q1 2004 Meeting was April 6, 2004 8:00AM-12:00PM

It was at the GCATT facility at 250 14th Street.

The meeting followed a different format this time with a panel of notable experts who spoke in a 'roundtable' format while answering questions from the membership about their concerns and interests relative physical and cyber security planning and Business Continuity Planning. With the continuing convergence of physical and logical security, new and emerging regulations, potential liability issues and the ever growing threat to our physical and IT worlds we needed to look at the entire security picture. And then the big question came, once we have all these great plans created, how are we going to get it all paid for, how will we 'sell it' to upper management and justify the expenditures?

Our panel group included: Rich Baich, CISO - ChoicePoint (recently named the Information Security Executive of the Year in Georgia), Bob Brand, Director of Corporate Security - Cox Enterprises, Bob Lang, Director of Homeland Security - Georgia Tech, Steve Edwards, SAIC - GBI, and Dave McGirt, VP - e`deltacom.

Our breakfast sponsor for this meeting was Cisco Systems, Inc. Thank you to Seth Judd and Julie Pennington of Cisco Systems, Inc. for their generous support of InfraGard in sponsoring our breakfast. The breakfast and networking portion of the meeting began at 8am with the formal meeting starting at 9am and concluding by 11:45am.

Those who came to the meeting on April 6th learned how major corporations, universities and the public sector handle these issues, what legal pitfalls to avoid and what resources exist to help achieve success in this ever demanding field of interest. The panel members helped answer those questions and also provided some valuable answers.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://epic.org/alert/EPIC_Alert_15.10.html

EPIC Wiretap Page:  http://epic.org/privacy/wiretap/

EPIC Urges FTC to Impose Civil Penalties in Data Breach Settlements

On April 28, 2008, EPIC filed comments with the Federal Trade Commission
urging the FTC to include civil penalties in settlements with TJX, Reed
Elsevier, and Seisint. The Commission recently concluded investigations
of the companies' weak security policies.  The companies' weak security
policies resulted in data breaches involving hundreds of thousands of
consumers, and the Commission reached preliminary settlements with TJX,
Reed Elsevier, and Seisint.  The proposed settlements would impose
security and audit responsibilities, but no financial penalties.  EPIC
noted that civil penalties were necessary to provide incentives for
companies to better safeguard personal consumer data in the future.
EPIC further observed that the FTC imposed $10 million in civil penalties in the Choicepoint case - a similar case that affected fewer consumers.

The FTC's investigations arose from TJX, Reed Elsevier, and Seisint's
2004-2005 data breaches, which exposed the sensitive personal
information of over 500,000 consumers and resulted in millions of
dollars in alleged financial fraud.  As a result of the 2005 TJX data
breach, between 45 million and 100 million credit card numbers were
exposed to fraud.  As a result of the 2004 data breach involving both
Reed Elsevier and Seisint, personal information regarding several
hundred thousand people was exposed in a scheme involving stolen
computer logins and passwords.  The proposed settlements do not include
civil penalties.  In comparison, in 2006, the FTC imposed $10 million in
civil penalties on Choicepoint as a result of a data breach that
affected approximately half as many consumers.

Agency Announces Settlement of Separate Actions Against Retailer TJX,
and Data Brokers Reed Elsevier and Seisint for Failing to Provide
Adequate Security for Consumers' Data:

http://www.ftc.gov/opa/2008/03/datasec.shtm

EPIC's Comments to the FTC: http://epic.org/privacy/idtheft/042808_ftc.pdf
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.wired.com/politics/security/news/2005/02/66710

California Woman Sues ChoicePoint
Kim Zetter Email 02.24.05

A California woman has filed the first lawsuit against ChoicePoint for fraud and negligence in the wake of the company's recent disclosure that it sold personal information about more than 140,000 people to identity thieves.

The case could set a precedent that would help establish better standards for how data brokers secure and sell consumers' private information and lead to regulations that would hold them accountable for lax data protection.

Eileen Goldberg filed the suit Friday in Los Angeles Superior Court after receiving one of about 34,000 letters that ChoicePoint sent to California residents informing them that the company had mistakenly sold personal data about them to identity thieves.

Goldberg, who is being represented by her son's law firm, Glancy, Binkow and Goldberg, is seeking class-action status for her suit to cover the thousands of other victims of ChoicePoint's data breach.

Previous lawsuits seeking damages for similar kinds of negligence in identity theft cases have not ended in favor of victims who sued banks and credit agencies for not better protecting them from identity theft.

But Peter Binkow, a partner in the firm representing Goldberg, said that he expects the case could set a new precedent since ChoicePoint directly profits from the sale of private data of people who have not given the company permission to sell that data.

"Regarding privacy, we're still pretty early in the process to some degree," he said. "The laws are still developing. But since ChoicePoint is obviously profiting off of this, it has a responsibility to maintain the information in a proper fashion. When you have a criminal operation that went on for over a year, it's pretty indicative that there were not adequate steps in place to protect (the data)."

According to the filing, Goldberg seeks to hold ChoicePoint responsible for negligence in protecting the private data of consumers from scam artists who purchased it from the company. The scam continued for a year before ChoicePoint discovered what the thieves were up to.

An unknown number of perpetrators posed as legitimate businesses to open 50 customer accounts at ChoicePoint, a data broker that collects financial, medical and other personal information on billions of people and sells it to marketers and government agencies, among others. The ID thieves were able to purchase Social Security numbers, credit histories and other personal information on thousands of people whose data ChoicePoint had collected.

Two weeks ago, ChoicePoint began sending letters to 145,000 people around the country revealing that their personal information was exposed to the thieves. So far, authorities have determined that at least 750 have become victims of identity theft as a result of the security breach.

ChoicePoint did not return calls for comment.

In a previous case in South Carolina, an identity theft victim tried to sue Citibank and two credit agencies for negligence for not properly authenticating the identity of someone who applied for credit cards under his name. The case was thrown out of court by judges who concluded that since the victim was not a customer of the bank and credit agencies and they had no business relationship with him, they had no responsibility to protect his personal data or identity.

But Andrea Matwyshyn, an assistant professor of law at Northwestern University who specializes in technology regulation and information security best practices, said that judges could determine that ChoicePoint did have a relationship with the public, albeit an indirect one, and assumed a certain level of responsibility for the data when it decided to sell people's private information.

"I think that in states like New York and California there will emerge a body of negligence law that will provide some recourse for consumers," she said. "But I think it's going to take five to 10 years."
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.wired.com/politics/security/news/2005/02/66685

ID Theft Victims Could Lose Twice
Kim Zetter Email 02.23.05

The recent security breach at data aggregator ChoicePoint that exposed at least 145,000 consumers to identity theft and renewed a call for regulation of the data industry will likely leave victims of the breach twice bitten -- first from the identity theft itself and second from thwarted attempts to recover damages for their losses if they decide to seek recourse.

Legal experts say that people who suffered losses as a result of the breach will find it difficult to get compensation from ChoicePoint for selling their personal data to con artists, even if the victims can prove that ChoicePoint was negligent in screening customers who purchased their data. That's because courts have been unwilling to penalize companies when victims of identity theft are not their direct customers.

Experts are hoping the ChoicePoint case may begin to swing court opinion, which could force companies like ChoicePoint to take better care of consumer privacy and data in the absence of federal legislation.

"There is a lot of political support behind consumer frustration in this area," said Charles Merrill, a New Jersey-based attorney who focuses on information technology cases. "I think that information security liability may be the next 'toxic tort' -- like asbestos. The time is right for it."

Atlanta-based ChoicePoint is a data-aggregation company that collects information on individuals from birth certificates, DMV records, credit and medical histories, court records and consumer transactions to create database dossiers on billions of individuals.

The company sells the data to direct marketers to help them target products to consumers. ChoicePoint also sells data to government agencies. Since 9/11, the company has positioned itself as a homeland security company to provide government agencies with data to help them authenticate and verify the identity of individuals.

This strikes an ironic chord for privacy advocate Richard M. Smith, who noted that the company's inability to verify and authenticate the identities of its own customers led to the recent breach in which scam artists illegally purchased consumer data from the company and stole the identities of more than 700 people.

Last October, ChoicePoint uncovered suspicious activity during an audit and contacted law enforcement agents to determine if it was fraud-related.

An investigation revealed that unknown perpetrators had used stolen identities to open 50 customer accounts with ChoicePoint to purchase data on at least 145,000 individuals. They purchased data for more than a year before ChoicePoint discovered the fraud.

It's not the first time ChoicePoint has had a security lapse. In 2002, the company acknowledged that it had left an internal corporate database viewable by anyone with a web browser.

According to ChoicePoint spokesman Chuck Jones, the perpetrators of the most recent incident set up phony businesses and obtained authentic business licenses, listing addresses and phone numbers, to obtain the accounts. Jones said that ChoicePoint did due diligence in verifying the individuals and their companies and that everything checked out.

"We checked out the principals of the businesses and they came back clean," he said. "The business licenses also came back as valid."

When asked if ChoicePoint called the phone numbers on the business licenses or looked up the addresses, he declined to say. But the company acknowledged that it has changed its procedures for verifying new accounts and will be investigating existing accounts to make sure that they are valid. ChoicePoint also said that it has hired a retired Secret Service agent to help revamp its verification process.

Although the fraud had continued for a year, federal authorities asked the company to put off notifying consumers that their data had been exposed until two weeks ago, when the company sent out more than 34,000 letters to California residents. California investigators also told the Associated Press this week that they believed the number of people whose data was compromised could rise to half a million. So far, one man has been sentenced to 16 months in prison in California, but authorities do not believe he acted alone, so there may be more perpetrators and more victims.



Anti_Illuminati

  • Guest
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=203x351888

*** THIS pisses me off...I was 'infiltrated' by the wife of Choicepoint executive early on in my legal pursuits against Diebold and now I see that her husband was in cahoots with Diebold all along.

WE ALL NEED TO WORK LONG AND HARD TO SHUT DOWN CORPORATE TYRRANY like the crap Diebold and Choicepoint is pulling on the American public..it's time for action folks... big bad citizen action... let's go!!!

IF YOU HATE DIEBOLD / RAISE YOUR ELECTRONIC HANDS!!!!

THEY NEED TO REWRITE IT...

COMBINE DIEBOLD'S REVOLUTIONARY VOTE RIGGING SOFTWARE WITH CHOICEPOINT'S REVOLUTIONARY IDENTITY THEFT SYSTEM AND WHEN YOU GO TO THE POLLS, NOT ONLY IS YOUR VOTE STOLEN, BUT YOUR IDENTITY TOO!!!!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.scmagazineus.com/Best-practices-for-companies-that-have-suffered-a-breach-offered-at-SC-World-Congress/article/122010/

Best practices for companies that have suffered a breach offered at SC World Congress
Greg Masters
December 04, 2008

What happens after a company suffers a data breach? There are strategies to take to lessen the damage, and to soothe customers whose personal information may now be at risk. And to stay out of the newspapers.
 
At next week's SC World Congress, experts will be on hand to offer techniques, strategies and procedures companies that have suffered a breach can take to lessen or minimize the damage.

Sometimes, it's not even clear when a company has been put in jeopardy.

“Defining what an incident is continues to be a challenge for organizations as they grapple with traditional data leakages and the growing threat of organized cybercriminal activity,” says Rich Baich, principal for security and privacy, Deloitte and Touche

Baich will be speaking on a panel, Breach PR -- Best Practices, taking place on Wednesday, Dec. 10, as part of the two-day SC World Congress in Javits Center, New York City.

Also on the panel are Maurice Hampton, information security program manager, GE -- Global Infrastructure Services; and Steve Collins, director, and security sector lead, Text 100 Public Relations. The moderator is Dan Kaplan, senior reporter, SC Magazine.

Rich Baich (right) has led multinational teams designing, implementing, measuring and advising organizations to effectively and efficiently balance risk, technology and data management decisions with data protection risks, regulatory compliance issues, privacy and security controls. Baich is former CISO at ChoicePoint where he held enterprise-wide responsibility for information and technology security. Previously, he held leadership positions within NSA, McAfee and the FBI. In 2005, Baich authored Winning as a CISO, a security executive leadership guidebook.

About the SC World Congress

To keep today's companies and organizations secure requires up-to-the-minute information about current threats to the corporate environment, best practices and optimum solutions. The inaugural SC World Congress offers attendees the opportunity to become better informed, while at the same time providing a hands-on sampling of state-of-the-art technologies and services being used to thwart the increasing range of threats trying to interfere with business operations and abscond with corporate and customer data.

Located in New York, the largest concentration of corporate headquarters and federal and local government offices in the United States, the SC World Congress is the only dedicated IT security event focused on providing the latest solutions and inside information to help IT & data security professionals do their jobs better.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://z13.invisionfree.com/THE_UNHIVED_MIND/index.php?act=Print&client=printer&f=2&t=7252

History Lesson Points:
1- August 6, 2001 - Bushfraud the Loser receives daily Presidential briefing in Texas that Bin Laden is determined to attack the U.S. with hijacked aircraft within 30 days of August 6, 2001.

2- Remember the WD-199 warning to the N.S.A. that the F.B.I. had penetrated the Wildcard-9/11-Red/Blue U.S./Canadian war games Toronto, Canada H.Q. Reference Udday Hussein letter to Russian President Putin.

3-The French warning to America that British M.I.-6 and U.S. N.S.A had been compromised inside the 9/11 Red/Blue war games. New witnesses inside the U.S. Dept. of Transportation now ready to go forward to further confirm of these facts. Again dots fully connected making Bob Woodward of Washington Post guilty of High Treason.

Woodward covered up the Stephen Cambone 9/11 notes from his book Plan of Attack. Book & Snake Woodward clearly knew Valerie Plame could connect the dots between the scripted N.S.A. attack on America and the urgency of Bushfraud and Rumsfeld to attack Iraq on the day of 9-11 in order to eliminate the two Husseins who were both aware as was Vladimir Putin of the attack which was to come and slaughter 3,000 Americans in cold blood for political and financial purposes. Reference again the famous Udday Hussein letter to Putin and Cambone notes.

P.S. - It is clear now that spec counsel Fitzgerald continues to investigate the valerie plame leak case as he takes direct aim at the greatest criminal conspiracy in the history of the United States.

P.P.S. - The PTECH SOFTWARE that we used to compromise the U.S. defense shield on 9/11 is connected directly to the Texas company CHOICEPOINT SOFTWARE INC.; that company was used to steal the year 2000 presidential election from duly-elected non-inaugurated extortion-resistant ALBERT GORE. FloridaGate remains 9-11Gate.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.btquarterly.com/?mc=info-risk-management&page=sp-viewresearch
Information Risk Management
Q4 2006

The technology wave of the late 1980's and 1990's has helped fuel enormous profitability of many organizations. The ingenuity and creativity of various technologists and entrepreneurs turned many "what- if scenarios" into booming organizations. During this period, the spend rate of technology increased significantly and soon became a commodity. The risk associated with implementing technology and the potential impact on the privacy and security of the underlying information was rarely ever factored or considered in the business process. Our future is potentially in danger because advancements in our information systems have been built on a capability that we have yet to figure out how to protect. The infrastructure that was created was one which gave birth to the information highway.

In the late 1990's, forward thinking organizations were expected to have firewalls and anti-virus software to help secure information. As time passed, the expectations expanded to include intrusion detection systems, personal desktop firewalls, virtual private networks, encryption, and vulnerability assessment capabilities. Today, the expectation in these components, as well as additional technology and programs, should be part of any defense-in-depth approach to information risk mitigation. These terms and technology have become common components; however, successful information risk management cannot be achieved with a pure technology focus.

3 PILLARS OF A SUCCESSFUL INFORMATION RISK MANAGEMENT FRAMEWORK:

PEOPLE, PROCESS, AND TECHNOLOGY

There is not a sole source solution that will mitigate the inherit risks associated with information. Information has the capability to be replicated, stored, transported, destroyed, and then reborn. Information risk management requires organizations to review their business operations from a holistic viewpoint, integrating various aspects of business operations. No longer is information security a silo program found within the office of the CIO. At an executive level, established security and data protection silos have merged. Traditionally, organizations have had different departments focused on information protection such as information security, corporate security, legal, privacy, business continuity, and most recently, operational risk. Although each one of these departments conveys a unique service to the organization, it is crucial that each of these services align themselves to an organizational framework geared at reducing information risk management, regardless of the fact that organizational structure, people, process, and technology are leading components found in existing information risk management frameworks. Examples of components found within these pillars would include:

• Governance Structure

• Information Risk Awareness Program & Training

• Data Retention and Destruction

• Incident Response

• Encryption Strategy

• Social Engineering Assessment

• Penetration Testing

• Privacy Notices and Preference Management

• Third-Party vendor and Outsourcing Oversight

• Mobile Workforce (Tele-commuting)

• Consumer and Business-to-Business Privacy

• Data Classification

Each of these components should also be mapped back to a regulation or industry guideline such as Federal Sentencing Guidelines, ISO 17799, the Fact Act, GLBA 501(b), or the recent requirements resulting from more than 20 states enacting laws regarding SSN restriction and safeguards laws. The documentation of these components and the relating industry reference provides a strong foundation for your organization to begin to take action to reduce risks.

FIVE STEPS ORGANIZATIONS CAN TAKE TO IMPROVE INFORMATION RISK

Taking the time to understand how information flows within your organization can provide a risk- based view of the three factors which help quantify risk potential threats, required safeguards, and probability of occurrence. Organizations acknowledge their information is at risk; using the five steps below can help an organization understand the extent of risk associated with the different phases of information.

1) Understand and document how information is created or collected: It is critical to understand and document how information is created or collected within your organization. Leading practices suggest organizations should have a data classification program, including documentation of what information is required to run your business.

Often organizations will discover unwanted or undesired information is being collected. Eliminating the collection/ creation of data can decrease costs through reduced storage space and bandwidth utilization, while reducing the risk around erroneously collected information that could require potential disclosure if lost or mishandled. In addition, decreasing vulnerabilities around the points of collection before the information is secured in company servers and systems can also help reduce operational risk.

2) Determine the business processes and lifecycle of how data moves throughout the enterprise: Once you understand what information you own and its point of entry, you should ensure the information has the appropriate protection while it travels to its intended location. The appropriate protection spend should be a result of the classification assigned to the specific data elements involved. valuing data is difficult, but today there are several laws/regulations that require data to have different safeguards based on the content of the data or specific data elements involved.

For example, there are more than 20 u.S. state laws that impose various requirements on the use of Social Security numbers or that demand specific controls and protections be in place to safeguard such data. Moreover, in the last three years, there have been more than 30 states that have passed security breach and disclosure laws that are triggered by access of an unauthorized party to more than 40 data elements in the aggregate specifically enumerated under these laws. As a result, data classifications and the corresponding controls at many companies are being updated to classify systems and applications based on criticality of the underlying application as well as sensitivity of the information for privacy purposes of the data elements maintained in a particular application or system.

3) Define approved data storage mechanisms: Documented and tested standards enable you to mitigate the risk of improperly configured storage devices. Mobile computing has made this step very difficult. Actions such as requiring individuals to utilize only encrypted mobile storage devices can reduce the risk of lost data prevalent with lost/stolen laptops and uSB flash drives. Providing technology options along with awareness training can reduce this risk. Today's risks have found their way into many newspaper headlines; lost laptops and mobile devices have been the leading source of security breaches requiring public notifications covered in the media.

4) Design and test appropriate access controls: We live in a mobile environment with the ability to access information from work, home, cell phones, airplanes, restaurants, and most public locations. The threat of individuals remotely accessing your organization is all too real. Taking the appropriate steps to ensure least privilege controls, implemented and combined with multi-factor authentication, can mitigate these risks. When building access technology strategy, it is critical to design a flexible access framework with mitigating controls. This will decrease threats that occur as a result of an inability to manage a non-standardized access framework.

Once you have designed a solid framework, work equally as hard to break it before spending additional funds on technology. Technology will enable the power of the framework, but failure in process will create the executable vulnerabilities. As companies expand globally and employ new business models, reliance on a sound framework will allow secure access controls that prevent intrusion by excluding unauthorized access, but will allow inclusion of an increasing diverse population of employees, contractors, vendors, outsourcers, and business partners.

5) Make sure appropriate information is properly destroyed: Awareness is one of the most critical elements of this step. Selecting the appropriate technology to ensure the information is actually destroyed requires research and a selection process. Developing the appropriate documented process requires assigning responsibility to the appropriate division or person.

Having both the technology and the process in place does not add considerable value if the workforce does not understand the corporate policy requirements concerning appropriate destruction. This step should be embedded in the security awareness program covering electronic information, as well as hard copy documents that are often created at work or offsite home. under the FACT Act, the Destruction Rule can make individuals personally liable for the improper access and use of background report information that is not properly destroyed following its proper use.

POLICY COMPLIANCE

Policies are a common place in the industry they communicate the boundaries of business operations. To ensure people, processes, and technology operate within these boundaries, each policy should have controls in place to ensure compliance with policy. For example, your organization may have a policy that states "all sensitive paper must be properly destroyed." In order for this policy to be effective, the methods of destruction must be well-known, easily deployable, and destruction must be verifiable.

Requiring all employees to complete corporate data destruction awareness training, posting adequate signage in your facilities, and providing easy access to shred bins would provide your employees with the tools to comply with policy. Obtain a receipt from your vendor stating that the contents from the shred bin were correctly destroyed per your requirements, along with a quarterly "spot check" to verify appropriate destruction has occurred.

SUMMARY

Information risk management is a cross departmental responsibility which requires cohesiveness between people, process, and technology. Process helps define the goal while providing the path to achieve it. Technology is the enabler pillar; once the proper resources and processes have been defined, the appropriate technology can be selected to optimize performance and reduce risk. People remain the weakest pillar; failure to follow policy or recognize threats continues to fuel the large number of data disclosures.

Information is created, it moves, it is stored, it is accessed, used, shared, and ultimately it is destroyed risk exists within each of these stages. Policy exists to provide operational boundaries; however, policy that exists without the appropriate compliance controls can often be labelled as a paper tiger. Establishing an information risk management framework can enable you to leverage the existing operational disciplines within your organization. It can ultimately improve your operational effectiveness, reduce your operational risk, and help you achieve your compliance goals.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.freerepublic.com/focus/f-news/944193/posts

Michelle Malkin: Spy software scandal threatens government's credibility
The Union Leader ^ | 7/11/03 | Michelle Malkin

Posted on 07/11/2003 5:25:38 AM PDT by RJCogburn

DID SADDAM HUSSEIN and Osama bin Laden have access to a U.S. computer tracking program that enabled them to monitor our intelligence-gathering efforts and financial transactions? If so, who is responsible for allowing the program to fall into their hands? And who else among America's enemies might have access to the tracking system?

It's an explosive spy software scandal that no one in official Washington wants to investigate.

This complex, tangled story began two decades ago, when a tiny private company called Inslaw Inc. developed a software package to help U.S. attorneys' offices in large urban districts keep tabs on their criminal prosecutors' caseloads. The program, dubbed the Prosecutor's Management Information System (PROMIS), was effective and popular. It allowed a prosecutor to locate defendants and witnesses, track motions and monitor ongoing investigations. In 1982, Inslaw won a large Justice Department contract to implement the system nationwide.

In the meantime, Inslaw also developed privately owned enhancements to PROMIS. Despite contractual guarantees of Inslaw's proprietary rights to the enhanced version of PROMIS, the Justice Department essentially commandeered the improved program for its own uses without paying for it. Inslaw was forced into bankruptcy and began an endless fight with the Justice Department to recoup its losses.

In the course of their court battles, Inslaw founder Bill Hamilton and his wife innocently stumbled upon shocking national security revelations. Former Attorney General Ed Meese, the Hamiltons concluded, had conspired to force Inslaw into bankruptcy so that an old Meese crony, California businessman Earl Brian, could take over the company's assets. The Hamiltons obtained information through sworn affidavits of several individuals that suggested Meese, Brian, high-ranking Justice Department official Peter Videnieks and others wanted to modify and distribute the enhanced PROMIS software with "back-door" capabilities for covert intelligence operations.

Sound preposterous?

In 1987, a federal judge blasted the Justice Department for stealing PROMIS. The government, Judge George Bason said, stole Inslaw's software through "trickery, fraud, and deceit" with "contempt for both the law and any principle of fair dealing." The House Judiciary Committee also found in 1992 that there was "strong evidence" the Justice Department had conspired to steal the PROMIS program. An internal Justice Department memo made public by the committee revealed that the Justice Department had secretly turned over a copy of PROMIS to the Israeli government.

An extensive four-part series by Insight magazine reporter Kelly Patricia O'Meara retraced a lengthy investigation by the Royal Canadian Mounted Police two years ago, which "uncovered a network involving friend and foe alike that may be using PROMIS and systems like it for a variety of illegal activities worldwide."

In June 2001, Jerry Seper of The Washington Times reported that former FBI agent and convicted spy Robert Hanssen sold an enhanced version of PROMIS for $2 million to Russian crime figures, who in turn are suspected of selling a black-market version of it to Osama bin Laden.

More recently, the International Currency Review, a London-based financial newsletter, reportedly obtained Iraqi intelligence documents alleging that PROMIS came into Saddam Hussein's possession under the Bush I administration. The publication's editor says the documents were owned by Hussein's half-brother, Barzan al Takriti.

And last week, British news outlets suggested that the resignation of top Bush terrorism intelligence official Paul Redmond was tied to his investigation of Hanssen and the PROMIS theft. The Department of Homeland Security claims that Redmond, a legendary spy catcher who came out of retirement to take the Bush administration position and had served only three months, left for "health reasons."

The odor of a cover-up is unmistakable. To this day, the Justice Department, FBI and other government agencies continue to insist that they have never possessed or used any pirated version of PROMIS.  [INSERT: WHICH IS PTECH] Career Justice officials who oversaw the theft of the Hamiltons' software program in the 1980s remain in place today. And according to my sources, the 9-11 Commission created by President Bush has declined to investigate this spy software fiasco and its possible role in facilitating the terrorist attacks on America.

Inslaw deserves to be compensated. More importantly, the American people deserve to know the truth: Did government greed and bureaucratic hubris lead to a wholesale sellout of our national security? The Bush White House's credibility is on the line.

Anti_Illuminati

  • Guest
http://www.canadafreepress.com/2006/dastych013106.htm

Promisgate: World's longest spy scandal still glossed over

By David Dastych
Tuesday, January 31, 2006

The so called PROMIS affair would never have happened if the software invented by an American computer specialist, Mr. William A. Hamilton, had been a technical failure. But this case management and data mining software, developed in the early 1980s by a small Washington D.C. company, Inslaw Inc., had proven itself to be a perfect intelligence tool. Originally made for the Department of Justice to help the country's prosecutor offices in their case management, it drew the attention of corrupt officials and of Israeli Intelligence. Stolen by ruse from its owner, Inslaw Inc., the software was hacked and provided with a "trap door", a sort of a Trojan Horse hacker's trick, that enabled the retrieval of information from the foreign intelligence services and banks it had been sold to on behalf of Israeli and U.S. intelligence. Without the knowledge of the software's owner, and in violation of copyright laws, the PROMIS software was sold to over 40 countries and used in an unprecedented "sting operation", which yielded huge financial and intelligence benefits to the United States and Israel.

In February 1985, Inslaw Inc. filed for Chapter 11 bankruptcy protection because the Justice Department had withheld payments totaling almost $1.8 million U.S. due Inslaw Inc. under a PROMIS Implementation Contract for U.S. Attorneys Offices. The PROMIS affair, broken by investigative journalists, two federal courts, and a congressional investigation and published in thousands of media stories and in several books, has never been resolved.

But "blowback" from the U.S. Government's theft of PROMIS in 1982 soon turned into a series of painful losses for U.S. national security, into criminal financial benefits for corrupt officials, and into intelligence "scoops" for the secret services of adversaries. "It's far worse than Watergate"--commented former U.S. Attorney General and Inslaw counsel Elliot Richardson.

From KGB to PLA-2

The history of this world-famous computer software goes back a quarter of a century, and its applications by intelligence, organized crime and terrorist organizations began almost from the start. The software helped the United States win the Cold War against the Soviet Union, but it also served the Russian mafia, Saddam Hussein's regime, Osama bin Laden's al Qaeda, and an unspecified number of foreign spies and criminals. As far back as 1985, when the late British media tycoon and top [Israeli] Mossad spy, Robert Maxwell, revealed the software's "trap door" secret to Chinese Military Intelligence (PLA-2), while selling them a copy of PROMIS for $ 9 million, the powerful software was turned against the United States.

The Soviet KGB purchased PROMIS from Robert Maxwell, but they also [later] received a copy (together with the Trojan Horse secret) from Robert Hanssen, a spy planted in a most sensitive office of the FBI.
The Soviets and their East European allies, including Poland, used PROMIS to spy on the U.S. State Department and 170 American Embassies and Consulates all over the world. This practice may have continued as late as 1997, and the post-communist intelligence agencies of Russia and other countries, including Polish Military Intelligence (WSI), may have been able to retrieve information from U.S. Government agencies, because as many as 64 of them [are believed to have] used modified versions of PROMIS.

Using the same PROMIS software, purchased from Russia, Saddam Hussein and members of his regime could shift huge sums of money undetected through the banking system. Some of these funds are still supporting the anti-Coalition insurrection in Iraq and terrorists. In the mid-1990s, Chinese Military Intelligence (PLA-2) organized their own hackers department, which [exploited] PROMIS [database systems] [in the] Los Alamos and Sandia national laboratories to steal U.S. nuclear secrets.

No over-all damage assessment has been prepared yet. But the losses to the U.S. economy may be in billions of dollars, and damage to the national security of the United States and its allies may be incalculable.

An American intelligence officer, whose name cannot be disclosed, made the following comment on the consequences of the illegal operations performed with the use of PROMIS:

(…) "Yes, we gave PROMIS to the Russians and Chinese to back door their intel. Worked like a charm. The only problem was ‘blowback'. As we gave it to our enemies in order to back door them through the trap door Trojan horse asset in PROMIS, we left sixty-four federal agencies wide open in the U.S. Government who also used PROMIS. The powers-that-be felt that the information obtained far outweighed the damage done to the security of the 64 federal agencies. Just think, federal agents exposed, witness relocation programs compromised, etc. Just a matter of time."

PROMIS sold to bin Laden

There were also two reported connections between the U.S. intelligence failure relating to the terrorist attacks on 9-11 and unauthorized derivatives of the PROMIS software.

First, unnamed government sources familiar with the debriefing of Hanssen in 2001 reportedly told the Washington Times, Fox News, and the washingtonpost.com that year that someone in Russia had sold copies of PROMIS-derivative software source codes, which Hanssen had stolen from the FBI and U.S. intelligence agencies for the Russians, to Osama bin Laden for $2 million and that al Qaeda had used the stolen U.S. intelligence software to access the U.S. intelligence database systems in order to evade detection and monitoring before 9-11 and to move funds undetected through the banking system.

Osama bin Laden received PROMIS software, bought for him by wealthy Saudis through their connections with the Russian mafia. An American intelligence expert told Wprost: "Salah Idris, along with members of the Saudi Royal family, arranged for the sale of PROMIS to Bin Laden. Yes, it came from the Russians, but not in as big a part as the spook community would have you believe. Nor was it entirely the work of Robert Hanssen. He was merely available to point the finger at." Thanks to PROMIS, computer wizards working for al Qaeda could move funds and avoid tracking by U.S. and other intelligence, at least until the assaults on the United States, on September 11, 2001.

Secondly, the 9-11 Commission in the United States reported, in its April 14, 2004 report on the U.S. intelligence failure, that the FBI had failed to connect the dots between leads in its computerized case management system from two different field offices during the summer of 2001 about Arab men taking flight training courses, blaming the FBI's failure on the fact that its case management software "employs 1980's technology that is by all accounts user-unfriendly."

What was the main reason for the FBI's failure? The inventor of PROMIS and President of its producer, Inslaw Inc. company in Washington D.C., Mr. William L. Hamilton, told Wprost that:

"The 9-11 Commission called attention to the fact that the FBI did not install the current version of its case management software, called the ACS (Automated Case Support) system, until October 1995 and [to the fact that ACS was obsolete from the time the FBI developed it in the mid-1990s because it was based on ‘1980s technology'.

Although the 9-11 Commission offered no explanation for why the FBI used obsolete technology to develop its ACS case management software in 1995, the apparent explanation is that the FBI simply re-named its 1980s technology case management software, which was called FOIMS and was based on PROMIS, and translated it in October 1995 into a different computer programming language in order to obstruct a court hearing that the U.S. Senate had ordered earlier that year.

The Senate had ordered the court in May 1995 to determine whether the United States owes Inslaw compensation for the government's use of PROMIS, and the court, in turn, ordered outside software experts to compare the FBI's software with PROMIS, but the FBI modified its software and told the court that it no longer retained the unmodified first 11 years (1985 through 1995) of its own case management software].

"A June 2001 front-page story in the Washington Times quoted unnamed federal law enforcement sources familiar with the Hanssen case as stating that al Qaeda had been able to use a copy of the FBI's FOIMS software, [purchased on the Russian black market], for espionage against the United States as late as 2001, six years after FOIMS had supposedly been replaced by ACS. This may be an additional indication of what the FBI actually did in 1995. Instead of using its ACS software project in 1995 to take advantage of early 1990s improvements in computer technology in order to make FOIMS easier for FBI agents to use, the primary purpose of the FBI's ACS project in 1995 was obstruction of justice."

To put this into simpler words, the FBI (and possibly a number of other agencies of the U.S. Government) still use unauthorized derivatives of the PROMIS software. This means that foreign intelligence agencies, which have bought or otherwise acquired PROMIS, can easily "break in" into such FBI and U.S. intelligence data bases, posing a serious threat to the national security of the United States.

A Spy in the White House?

In September 2005, the FBI arrested one of its own intelligence analysts for computer-based espionage. The arrest of Leandro Aragoncillo, an FBI intelligence analyst, has rekindled concerns about computer security at the F.B.I. that were first raised in the wake of the February 2001 arrest of FBI Agent Robert Hanssen for computer-based spying for the Soviet Union and the Russians. An October 7, 2005 an article in the New York Times, for example, entitled "New Spy Case Revives Concerns Over Security at F.B.I." reported that the arrest of Aragoncillo was probably the result of happenstance, rather than the result of the pro-active auditing by the FBI, which the FBI was supposed to have begun because of the Hanssen case, into the actual uses of its case management system.

The FBI complaint against Aragoncillo stated that he emailed to associates in the Phillipines more than 100 sensitive intelligence documents that he had downloaded from the FBI's computer-based ACS case management system. There have, moreover, been U.S. press reports, including a report by ABC, that Aragoncillo spied for the Phillipines by downloading classified information from the computer systems of other agencies. Prior to joining the FBI, Aragoncillo was a U.S. Marine assigned to the Office of the Vice President, and reportedly used computers in that office to download classified documents from computer systems at the Pentagon and at the CIA.

The case of Aragoncillo can be compared to the earlier case of Robert Hanssen. The FBI complaint filed against Hanssen in February 2001 stated that Hanssen had made "extensive use" of the FBI's computer-based case management system to steal U.S. intelligence secrets for the Russians, and that he had also given the Russians a copy of a technical manual on the COINS II (Community On-Line Information System, 2d version), a software system used by various U.S. intelligence agencies to track the intelligence information they produce. A report by the washingtonpost.com in 2001 stated that Hanssen had also stolen U.S. intelligence secrets from the computer systems of other agencies such as the CIA, NSA, the Pentagon, and the White House.

In both cases, the spies planted in the FBI had evidently been able to gather information by using the PROMIS-derivative software system underpinning all of these U.S. intelligence community database systems.

Reporting on the recent Phillipino spy case, John Diamond of USA Today wrote: "After the Hanssen case, the FBI began a $170 million upgrade of its computer network. Severe technical problems led that upgrade to be scrapped, and only now is the FBI seeking bids for a new system, called Sentinel." The FBI has serious problems.

Teaching a Lesson to China

U.S. Attorney General Alberto R. Gonzales accompanied President Bush on his November 2005 trip to China, primarily to talk turkey to the Chinese authorities about their need to better enforce the copyrights protecting U.S. intellectual property. A recent study estimated that 90% of all software sold in China has been stolen from its copyright owners. On November 10, 2005, just days before the President's visit to China, Gonzales unveiled proposed legislation called the Intellectual Property Protection Act of 2005. The proposed legislation seeks to promote full restitution to companies victimized by copyright infringement.

The new legislative proposal and lobbying of the Chinese Government expose the Bush Administration and its Justice Department to charges of hypocrisy. The United States is attempting to convince China to do a better job of enforcing software copyright rights, and, where necessary, to see to it that "victim companies" receive full restitution. But the U.S. Government has set a poor example by refusing for two decades to make any restitution to Inslaw. Moreover, the Justice Department, which is the U.S. Government's main agency for enforcing copyright rights, has instead obstructed attempts to get to the bottom of the Inslaw affair, according to the fully-litigated findings of two federal courts and the investigative findings of two congressional committees.

   "Inslaw deserves to be compensated. More importantly, the American people deserve to know the truth: Did government greed and bureaucratic hubris lead to a wholesale sellout of our national security? The Bush White House's credibility is on the line," wrote nationally syndicated columnist, Michelle Malkin, in The Washington Times. There is no better way to state it.

David Dastych,

Contribution: Bill Hamilton (Washington D.C.)

Offline TelepesT

  • Member
  • *****
  • Posts: 960
  • Genetic Dictator
    • Freedom T
Thanks for the follow thru - I will parse and give my own opinion.

I am a cyber security nerd as well
Ten Foot Lizard Man from Planet Snickle-Snack in the POP-TART sector 
Freedom T
Even if you are a minority of one, the truth is the truth.
- Mohandas Gandhi

Anti_Illuminati

  • Guest
http://www.asisonline.org/newsroom/120808_CSIS_Cyber_Security_Report.pdf

Download and open this PDF and type "Baich" into the search field.  He falls under the classification "INFRASTRUCTURE WORKING GROUP"  Look at the other names and see if any of them grab your attention as well. 

Rich Baich, Commanding Officer, U.S. Naval Reserve Navy, Information Systems Command

Now read the Infragard article. This guy being a top level Internet infrastructure/"security" guy is like putting David Rockefeller in direct control over every hospital, day care center, etc. in the U.S.  But I am just repeating myself at the moment here--but there is a reason why--watch this: 

RSA Link to Ptech? DUMP RSA.  [INSERT: SEE THE TOP POST WITH PDF LINK WITH RSA IN THE ADDRESS]

Matthew X
Sat, 07 Dec 2002 00:24:10 -0800

http://www.mail-archive.com/[email protected]/msg30470.html

Ptech's current list of Partners include:

[INSERT:  CROSS REFERENCE THIS WITH INDIRA SINGH'S TESTIMONYhttp://www.youtube.com/watch?v=QxheqcjYDC4&feature=PlayList&p=B7F34DE8EF475B0B&index=4

Now there is one other very specific think I want to bring your attention to:  Pause the video at about 2:15 in (watch the whole thing though as well as the other parts.)  What company name do you see in the upper right-hand corner? (which is a Ptech client
PricewaterhouseCoopers

Why is that important?  You will see why.

Booz | Allen | Hamilton
Booz Allen, a global leader in management and technology consulting, provides services to major international corporations and government clients around the world. Their major areas of expertise include: Strategy, Organization and Strategic Leadership, Operations, Information Technology, Technology Management, and E-Business Strategy and Implementation. Booz Allen Hamilton is organized into two major operating sectors: the Worldwide Commercial Business, which primarily focuses on management consulting services for commercial entities, and the Worldwide Technology Business, which focuses on technical and management services primarily for public sector clients.

Business Rules Solutions, LLC
Business Rule Solutions, LLC is the recognized world leader in the advancement of the business rule approach. BRS Principals, Ronald G. Ross and Gladys S.W. Lam, are internationally acclaimed as the foremost experts and practitioners of business rule techniques and methodology. BRS' mission is to provide leadership, guidance, education, and support for organizations seeking to apply the business rule approach, with an aim to find practical and affordable solutions for companies seeking new ways to manage change.

KPMG
KPMG is recognized globally as a premier provider of Assurance, Advisory, and Tax Services. More than 100,000 KPMG professionals in member firms worldwide collaborate across industry, service and national boundaries to deliver professional services in 159 countries. This enviable network of firms is connected through three operating regions, bringing together KPMG's local and national resources with greater flexibility, responsiveness and consistency of service delivery worldwide. KPMG helps clients successfully respond to changing opportunities by providing professional services, wherever and whenever they're needed.

PricewaterhouseCoopers
PricewaterhouseCoopers is the world's largest professional services organization. Drawing on the knowledge and skills of more than 150,000 people in 150 countries, we help our clients solve complex business problems and measurably enhance their ability to build value, manage risk and improve performance in an Internet-enabled world.


[INSERT: PricewaterhouseCoopers IS THE ONLY *PTECH* CLIENT LISTED HERE THAT MAKES SPECIFIC MENTION OF RISK MANAGEMENT]  Guess who the Managing Director is for them?  In my OP it just says "PwC"--I didn't know what "PwC stood for, now I know, and so do you.  Securing Cyberspace for the 44th Presidency CSIS Cyber Security Report

CSIS?  WTF?  Center for Strategic and International Studies--Rich Baich is a member of the New World Order group that put out the martial law report:

Excerpt of some names:

Zbigniew Brzezinski -- Counselor and Trustee, CSIS
Henry A. Kissinger -- Chairman & CEO, Kissinger Associates, Inc.
James L. Jones -- Trustee, CSIS OBAMA's NEW NATIONAL SECURITY ADVISOR

http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB890.pdf

Process Renewal Group

The Process Renewal Group is a consulting organization committed to helping its clients successfully manage business change. PRG's mission is to help dramatically improve their client's performance through the renewal of business strategies and business processes, as well as the innovative application of information technologies. PRG's challenge is to make a lasting difference in their clients' effectiveness by helping them to deliver creative and pragmatic business approaches and solutions.

http://www.ptechinc.com/01/abou/abou.part.list.asp#5

Business Process Management
Profiting From Process
This book, authored by Process Renewal Group founder, Roger Burlton, provides a comprehensive coverage of process renewal and change management. It is divided into a manager's guide and a practitioners guide and is an invaluable source of knowledge for process centric organizations and those that are trying to be so.
Master the Concepts:
· Create adaptable processes
· Improve business performance
· Align your processes and technologies
· Enable sustainable human change
· Implement continuous learning
· Grow a process-organized enterprise
· Discover a reusable method for process objects
http://www.processrenewal.com/
Our Clients
Since its formation, The Process Renewal Group members have provided services to numerous organizations. Some of these are:
· ABN-Amro Bank ( Amsterdam)
· AT&T
· American Express
· Bank of Nova Scotia
· Barclays Bank
· BC Hydro
· BC Ministry of Environment
· BC Tel
· Celestica
· Digital Consulting Institute (DCI)
· French Saudi Bank
· Great West Life
· IBM
· JP MorganChase
· Johnson & Johnson
· Lloyds TSB (UK)
· Maersk Shipping (Denmark)
· Merrill Lynch
· Mobil Oil
· NATO
· National Grid (UK)
· Northwest Pipelines(Williams Group)
· Panasonic
· Pfizer
· Portugal Telecom
· Qualcomm
· RAC Plc.(UK)
· Regional Municipality of Ottawa Carleton
· Royal & Sun Alliance (UK)
· Sprint Canada
· Stanford University
· Union Gas
· Vancouver Wharves
· City of Winnipeg
· Zurich Insurance Group
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Rich Baich, CISSP, CISM, Managing Director, PwC, and Former CISO, Choicepoint


http://www.publicrelations.uncc.edu/default.asp?id=15&objId=155
NEWS RELEASE

October 9, 2006
Information Security Experts to Present at UNC Charlotte
Oct. 25 symposium targeted to cyber-security professionals


CHARLOTTE – Oct. 9, 2006 – Several national computer security experts, including Pieter “Mudge” Zatko, Dan Geer and Doris Gardner, will address the 2006 Fall Computer Security Symposium on Oct. 25 at the University of North Carolina at Charlotte.

The event will be held from 8:15 a.m.-6:15 p.m. at UNC Charlotte’s Cone University Center.
Co-sponsors of this event include UNC Charlotte’s College of Computing and Informatics, Charlotte Research Institute, the North Carolina Technology Association, the Information Technology Council of the Charlotte Chamber of Commerce and InfraGard.

Last year’s event attracted more than 300 people and the 2006 symposium is expected to attract another large crowd of cyber-security professionals. The conference will especially benefit business continuity professionals, information technology managers, software developers, systems administrators, information security professionals, information security consultants and policy makers.

“Now in its sixth year, the Computer Security Symposium continues to draw attention to the urgency of dealing with cyber terrorism,” said Bill Chu, chairman of the Department of Software and Information Systems at CCI at UNC Charlotte. “We have invited the best and the brightest again this year to talk about this ongoing global threat.

“We have also invited a distinguished list of business leaders and professionals from around the region in an attempt to help them better understand the current and future threats they could be facing and what is being done to address them,” he said.

Rapid advancements in communication and information technology have increased interdependence among diverse groups including businesses and government agencies. The spread of such technologies, and the consequential reliance on it, require participants to understand and take action to minimize security threats.

This symposium will focus on these issues and solutions as seen by some of the most prominent researchers and practitioners in the information-security field. The following distinguished cyber-security leaders in the country are scheduled to speak:

· Mike Ferris is Director, Security Solutions for Red Hat's infrastructure solutions, including Security, Identity and Systems Management products and services.

· Pieter “Mudge” Zatko, Division Scientist, BBN Technologies, Mr. Zatko has a long track record of success in the security industry, most recently as founding scientist of Intrusic, Inc., the first security software company to target the 'Insider Threat.' He is renowned for running L0pht Heavy Industries (and later founding @stake, Inc.), a hacker research collaborative and consultancy that released security tools such as L0phtCrack, now the industry standard Microsoft password-auditing tool.

· Doris Gardner, supervisory special agent of the FBI office in Charlotte, supervises the Cyber Crime Squad for the entire state and former headquarters supervisor for the Infrastructure Protection and Computer Crime Program for the southeastern offices of the FBI.

· Dan Geer is vice president and chief scientist for Verdasys and the principal of Geer Risk Services. He authored the white paper, “The Shrinking Perimeter – Making the Case for Data Level Risk Management” and has also co-written several books and reports, including “Cyber Insecurity.”

· Rich Baich, CISSP/CISM, is a managing director of performance improvement practice at PricewaterhouseCoopers in Charlotte and former chief information security officer (CISO) with ChoicePoint Inc. He is the author of the security executive leadership guidebook, “Winning as a CISO.”

· Eric Hanselman is network protection architect for Internet Security Solutions, Inc. He is responsible for understanding and translating the network security space for both ISS product strategy and designed security solutions.

· Joshua Davis is Chief Information Security Officer at Qualcomm

· Carter Heath is the information technology security officer in the Information and Technology Services department at UNC Charlotte.

· Dr. Gail Joon Ahn is an Associate Professor, Department of Software and Information Systems in the College of Computing and Informatics at UNC Charlotte

· Dr. Thomas Holt is an assistant professor in the Criminal Justice department at UNC Charlotte. He specializes in computer crime and technology.

· Joe Jarzombek, PMP, is director for software assurance in the National Cyber Security Division of the Department of Homeland Security.

· David Jones is president, chief executive officer and co-founder of Peak 10, a leading data center and managed services provider in the Southeast. He is former president of the Competitive Solutions Group at CHR Solutions.

· Doug Smith is Corporate Information Security and Corporate Business Continuity Executive for Bank of America.

· Trey Guerin is CEO of NSC. Trey is past Director of Network Security at ZEFER, Senior Security Engineer at Computer Sciences Corporation (CSC) and Network Supervisor for the White House Communications Agency.

· Dr. Csilla Farkas, Computer Science Faculty, University of South Carolina

· Dr. Yuliang Zheng, Information Technology Faculty, University of North Carolina Charlotte

· Dr. Yongge Wang, , Information Technology Faculty, University of North Carolina Charlotte
For more information or to register for this year’s symposium, visit: http://www.cci.uncc.edu/symposium/2006/site/index.cfm or call Nancy Clarke at (704) 687-8644.

About UNC Charlotte

A doctoral/research intensive university, UNC Charlotte celebrated its 60th anniversary in September. It is the fourth-largest of the 16-constituent University of North Carolina system and the largest institution of higher education in the Charlotte region. The university comprises seven professional colleges and currently offers 17 doctoral programs, 59 master’s degree programs and 85 programs leading to bachelor’s degrees. Enrollment exceeds 21,500 students, including more than 4,400 graduate students.

                                                         # # #

Media contacts: Olin H. Broadway Jr., 704-687-8638, [email protected]
Nancy E. Clarke, 704-687-8644, [email protected]
 

49er Fact:
UNC Charlotte’s College of Computing and Informatics is home to the National Champion “Cyber Defenders” team, comprised of College of Computing and Informatics students. Another UNC Charlotte team, “Miner’s Threat,” placed first in the Southeast, fourth in the nation and tenth in the world last winter.

Anti_Illuminati

  • Guest
Warning:  RFID is now nearly invisible to the naked eye:

http://www.cai.gouv.qc.ca/06_documentation/01_pdf/RFID_en.pdf
"nanotechnology promises generalization of microchips invisible to the naked eye"



Hitachi’s new RFID chips (pictured on right, next to a human hair) are 64 times smaller than their mu-chips (left)

http://www.pinktentacle.com/2007/02/hitachi-develops-rfid-powder/

RFID keeps getting smaller. On February 13, Hitachi unveiled a tiny, new “powder” type RFID chip measuring 0.05 x 0.05 mm — the smallest yet — which they aim to begin marketing in 2 to 3 years.

By relying on semiconductor miniaturization technology and using electron beams to write data on the chip substrates, Hitachi was able to create RFID chips 64 times smaller than their currently available 0.4 x 0.4 mm mu-chips. Like mu-chips, which have been used as an anti-counterfeit measure in admission tickets, the new chips have a 128-bit ROM for storing a unique 38-digit ID number.

The new chips are also 9 times smaller than the prototype chips Hitachi unveiled last year, which measure 0.15 x 0.15 mm.

At 5 microns thick, the RFID chips can more easily be embedded in sheets of paper, meaning they can be used in paper currency, gift certificates and identification. But since existing tags are already small enough to embed in paper, it leads one to wonder what new applications the developers have in mind.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://compnetworking.about.com/od/tcpiptutorials/a/ipaddrnotation.htm

Quote
the new chips have a 128-bit ROM for storing a unique 38-digit ID number.

IPv6 addresses are generally written in the following form:

      hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh

In this full notation, pairs of IPv6 bytes are separated by a colon and each byte in turns is represented as a pair of hexadecimal numbers, like in the following example:

      E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420

As shown above, IPv6 addresses commonly contain many bytes with a zero value.  Shorthand notation in IPv6 removes these values from the text representation (though the bytes are still present in the actual network address) as follows:

      E3D7::51F4:9BC8:C0A8:6420


IPV6 INTERNET 2 ADDRESSES (SH):   5 SETS OF 4 DIGITS, 5 X 4 = 20

FULL STREET ADDRESS ZIP CODES IN UNITED STATES:

FORMAT:  XXXXX-XXXX  5 + 4 = 9

SOCIAL SECURITY NUMBER:  XXX - XX - XXXX  3 + 2 + 4 = 9

20 + 9 + 9 = 38

FOLKS THIS IS STRAIGHT MATH, THIS HAS NOTHING TO DO WITH NUMEROLOGY.  There is much more info pertaining to this, I will post later today.  Google does not allow copying and pasting from translated sites to where it will show up in English, so I have to type the entire articles out by hand as I have here.  There appears to be a wide blackout on this information.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.rfidjournal.com/article/view/4104/

Copenhagen Airport Pilots RFID Tags for Passengers
The airport is testing a system combining active RFID and Bluetooth technologies to create a detailed flow map of passenger traffic through the terminal, enabling it to reduce delays and improve its layout.

By Brett Neely

May 30, 2008—Today's modern airports are often huge and filled with stores, restaurants and other distractions. But that size frequently means passengers must walk far from a terminal's central area to reach their gates.

At Copenhagen Airport, approximately 4 percent of all flight delays are caused by passengers arriving late at a gate. To alleviate that problem, and to help plan retail strategy, the airport is testing a system combining active RFID and Bluetooth mobile phone technologies to track passengers' locations within the terminal. The system alerts customers via cell phone if it detects them to be far from the gate as their flight begins boarding.


The Gatecaller project uses active 433.92 MHz to track the location of air passengers.

The system, known as Gatecaller, employs credit-card-sized, battery-powered RFID tags transmitting at a frequency of 433.92 MHz, which passengers receive upon checking in, then return upon boarding. Gatecaller is being developed by a consortium that includes Lyngsoe Systems, Copenhagen Airport, the IT University of Copenhagen, Blip Systems and the Riso National Laboratory.

At present, the consortium is halfway through a three-year project dubbed SPOPOS (the Danish acronym for "tracking technology personal and operator services"), to develop and test technology for tracking people and objects. SPOPOS is backed by a $2.7 million grant from the Danish government.

On May 15, Scandinavian Airlines (SAS) took part in a successful live trial that involved providing the tags (provided by Lyngsoe) to 106 passengers from one of its flights, then registering their names and cell phone numbers. The consortium installed RFID readers supplied by Lyngsoe, as well as Bluetooth transmitters from Blip Systems, at 25 key "gateway" points throughout the terminal to track passengers passing those locations.

"Overall, for SAS, it's obvious we have to participate in a project that makes travel more efficient and smooth," says Mikkel Londahl, a spokesman for the airline. "We are pretty sure this technology can help us achieve more punctual departures."

According to Henrik Bjorner Soe, the marketing manager at Copenhagen Airport, which initiated the project, the RFID system will reduce stress for passengers and further the airport's goal of being "silent"—that is, without frequent calls for passengers over the public address system. "We have 300 personal calls every day over our loudspeakers calling passengers to the gate," Soe says. "This is because we do not know which passengers are close to the gate and which passengers are far away from the gate."

As a flight prepares to board, the system codes the appropriate passengers with a red, yellow or green designation, based upon their projected walking distance from the gate. On a computerized map, those near the proper gate appear as green dots. Yellow dots indicate passengers who are some distance away, but who will be able to make the flight, so the system calls or sends a text message warning them about the impending takeoff. Red passengers are far enough away that they will not likely be able reach the gate in time to make their flight; if necessary, airline personnel can pull those customers' bags from the aircraft and begin rebooking them.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Lyngsoe Systems

http://www.lyngsoesystems.com/frontpage/frontpage.asp

http://www.allbusiness.com/technology/software-services-applications/5099911-1.html

Lyngsoe Systems Announces Reseller Agreement for Alien Technology RFID Products.

Publication: Business Wire
Date: Monday, April 25 2005

MORGAN HILL, Calif. -- Lyngsoe Systems, one of the world's leading integrators of RFID systems, today announced an agreement with Alien Technology(R) under which Lyngsoe will resell Alien(R) RFID reader and tag products in Europe and South America. The Alien products will be integrated by Lyngsoe Systems into turnkey solutions that utilize RFID for fast, effective and accurate data capture in supply chains.

"Lyngsoe Systems has vast experience in the application of RFID technology in numerous industries, coupled with a thorough understanding of European Union market requirements," said Andrew Berger, Vice President, International, Alien Technology Corporation. "We look forward to working closely with Lyngsoe to meet the growing demand for RFID solutions."

"As Alien's passive RFID technology is well suited for a variety of applications, a strong collaborative relationship between Lyngsoe Systems and Alien is a logical way forward," said Jens Jensen, Manager of projects at Lyngsoe Systems. "Alien's well-optimised production processes help Lyngsoe Systems' ability to provide cost-effective solutions to our customers."

About Lyngsoe Systems

Headquartered in Denmark, Lyngsoe Systems is one of the world's leading software manufacturer and systems integrator of a wide range of IT solutions for monitoring and automating processes in complex logistics chains. Many of the solutions are based on automatic data capture technology. Most of the company's annual turnover is generated from solutions utilising RFID. With more than 1100 installations worldwide, and with numerous customers among Fortune 100 level companies, Lyngsoe Systems delivers solutions that enable customers to improve their service, reduce costs and optimise returns on investments.

About Alien Technology

Alien Technology Corporation is a leading provider of Radio Frequency Identification (RFID) products for global customers in government, retail, manufacturing, pharmaceuticals, transportation, and other industries. Using its patented manufacturing process, Fluidic Self Assembly (FSA(R)), Alien manufactures EPC tags in very high-volumes and at low cost. The company provides a family of RFID readers for a variety of applications including supply chain management, logistics, and anti-counterfeiting, to improve inventory management and reduce operating costs. Alien is an active member of EPCglobal. More information about Alien Technology Corporation can be found on the Company's website at www.alientechnology.com.

Alien, Alien Technology, the Alien logo and FSA, are trademarks or registered trademarks of Alien Technology Corporation in the United States and other countries.

Copyright 2005 Alien Technology Corporation. All rights reserved
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.allbusiness.com/company-activities-management/board-management-changes/5027630-1.html

Alien Technology Announces Election of Thomas M. Coughlin, Retired Vice Chairman, Wal-Mart...
Publication: Business Wire
Date: Wednesday, March 2 2005

MORGAN HILL, Calif. -- Alien Technology(R) today announced the election of Thomas M. Coughlin to the company's Board of Directors. Mr. Coughlin, former Vice Chairman, Wal-Mart Stores, Inc., is widely recognized as a pioneer in leading the adoption of advanced information technologies, including RFID, to transform business processes and operational efficiency in retail. After 28 years with Wal-Mart, he retired from his executive management role with the company in January 2005.

"We are extremely pleased that Tom has joined our board," said Tom Baruch, Chairman of the Board, Alien Technology, and Managing Partner and Founder of CMEA Ventures. "His vast industry experience and vision for the adoption of RFID in the retail industry will be valuable for Alien(R) as the company continues to pioneer development and implementation of RFID."

"During the last quarter, Alien has added two distinguished pioneers in transformational business solutions to its Board, Thomas M. Coughlin, and C. Scott Hartz, former Global CEO of PwC Consulting. Their election underscores the company's commitment to leading the RFID industry to broad-based implementations," said David Shrigley, Alien Director, and General Partner of Sevin Rosen Funds.

"I look forward to providing guidance and corporate governance for Alien, a company leading the development and rollout of RFID technology. I am delighted at the opportunity to continue to contribute to the adoption of RFID in retail as I had envisioned over 10 years ago," said Thomas M. Coughlin.

As Vice Chairman of the Board of Directors of Wal-Mart Stores, Inc., Coughlin was responsible for the U.S. operations of Wal-Mart Discount Stores, Supercenters, Neighborhood Markets, and SAM'S CLUBS, as well as Walmart.com. Prior to this position, he served as Executive Vice President and President and Chief Executive Officer of the Wal-Mart Stores Division and SAM'S CLUB (USA). Since joining Wal-Mart Stores in 1978, he served as Vice President of Loss Prevention, Vice President of Human Resources, Executive Vice President SAM'S Club Operations, Executive Vice President of Specialty Groups, and Executive Vice President and Chief Operating Officer of Wal-Mart Store Operations. In the fall of 2001, he was elected to the Wal-Mart Board of Directors.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://investing.businessweek.com/businessweek/research/stocks/private/person.asp?personId=6494875&privcapId=26667001&previousCapId=387618&previousTitle=Erie%20Indemnity%20Co.


C. Scott Hartz


C. Scott Hartz CPA
Partner, SCIUS Capital Group LLC

BACKGROUND

C. Scott Hartz has been a Managing Partner of Spire Capital LLC, a merchant bank based in New York City since 2003 and where he focuses on the commercialization of early stage technologies from well known government and private research institutions. Mr. Hartz has been the Chief Executive Officer and Consultant of Hartz Group, IT and Technology consulting since 2002. Mr. Hartz served as the Chief Executive Officer of Consulting for PricewaterhouseCoopers, LLP, one of ... the world's largest consulting organizations from 1995 to January 2002 and where he held various positions since 1970.

He has been a Director of Alien Technology Corporation since January 2005. He has been a Director of Erie Family Life Insurance Co., since 2003 and serves as a Member of its Audit Committee. He has been a Director of Erie Indemnity Co., which provides management services to the member companies of the Erie Insurance Group, since April 29, 2003 and serves as a Member of its Audit and the Investment Committees. He has been a Director of Siebel Systems Inc., since August 4, 2003.

He also serves on The Wharton School Graduate Board and Lehigh University Business School Advisory Board. He was Named as one of Consulting Magazine's Top 10 Most Influential Consultants in 1999 and 2000, He serves as a member of the Japan Society, the U.S. Asia Foundation, and The World Affairs Council. Mr. Hartz received a B.S. degree in business and Economics from Lehigh University and an MBA degree from The Wharton School at the University of Pennsylvania.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.alientechnology.com/company/board_of_directors.php

Alien is served by a Board of Directors made up of thought leaders in the development and adoption of RFID, electronics manufacturing and supply-chain technologies.
     
Duane Zitzner    Mark W. Perry
George W. Everhart    Ben Terk
Ken Ehrhart    Keith G. Daubenspeck
C. Scott Hartz




C. Scott Hartz, Director


C. Scott Hartz is recognized as a pioneer in leading transformational business solutions for Fortune 500 global enterprises. His 32-year career in management consulting with Price Waterhouse, and Price Waterhouse Coopers spans experience with the organizations' client base of over 70% of the Fortune Global 500 enterprises on a worldwide basis as well as numerous smaller business organizations and governmental units throughout the world.

Mr. Hartz is a managing director of Spire Capital Group LLC, where he focuses on the commercialization of early-stage technologies from universities, government and private research institutions. From 1995 to 2002, while Global CEO of PwC Consulting, Hartz led the company's growth to a $6.0 billion enterprise with a global leadership position serving multi-national companies in corporate transformation, e-business and e-markets, supply chain services, CRM, and enterprise resource planning. In 1999 and 2000, he was named one of Consulting Magazine's top-10 most influential consultants.

Hartz serves on the Board of Directors of Erie Indemnity Company. He also serves on The Wharton School Graduate Board and Lehigh University Business School Advisory Board. Mr. Hartz holds a B.S. degree in Economics from Lehigh University and an MBA degree from The Wharton School at the University of Pennsylvania.

Offline mr anderson

  • Member
  • *****
  • Posts: 7,355
    • WeAreChange Brisbane
Re: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IP v6
« Reply #8 on: February 07, 2009, 11:23:14 pm »
http://www.polarisinstitute.org/files/Wackenhut.pdf

Page 13

Illegal use of Promis Software – as director of research for a joint venture between Wackenhut and the Cabazon Indians of Indio, California, Michael Riconosciuto made modifications to a pirated version of PROMIS, a software program which is used by Canadian law enforcement and intelligence agencies. The modifications make PROMIS monitorable by outside interests. The investigation, which goes well beyond Riconosciuto and Wackenhut, is still pending. (See Insight on the News. "The Plot Thickens in PROMIS Affair." Feb 5th)

The Plot Thickens in PROMIS Affair

http://findarticles.com/p/articles/mi_m1571/is_5_17/ai_72274301/pg_1

Insight on the News|Feb 5, 2001| by Kelly Patricia O'Meara 

In the second of a four-part series, Insight investigates the relationships between a convicted felon, a prominent U.S. security firm, government officials and mobsters.

Royal Canadian Mounted Police (RCMP) officers Sean McDade and Randy Buffam set out in January 2000 on an eight-month secret investigation in the United States. The two were attempting to determine whether Canada's law-enforcement and intelligence agencies were using an allegedly pirated software program called PROMIS that had been modified to be monitorable by shadowy interests said to have the electronic key; and, if so, whether Canada's national security had been compromised because of the suspected electronic backdoors installed in the software.

Much of the Mounties' investigation focused on the reported activities and relationships of Michael Riconosciuto, a computer wizard who claimed to have modified the PROMIS software for illegal use. A convicted felon, Riconosciuto also claimed knowledge of a compendium of suspicious characters and activities that include:

* Arms development for an alleged joint venture between the Cabazon Indians of Indio, Calif., and the Wackenhut Corp.;

* A former high-ranking Justice Department attorney named Mike Abbell and his alleged relationship with the Cali drug cartel; and

* Riconosciuto's own activity as an undercover operative in a Drug Enforcement Administration (DEA) sting operation in Lebanon.

Insight has followed the trail of the two RCMP investigators as they moved secretly throughout the United States collecting hard data from a variety of sources and interviewing witnesses, including Riconosciuto. They ultimately returned to Canada to continue their still-secret national-security probe that raises troubling questions about international espionage, crime and scandalous cover-ups said to date back more than a decade.

In this second installment of an exclusive four-part series, Insight focuses on Riconosciuto, on whom the RCMP investigators invested so much time, expense and effort to examine and try to confirm his shocking stories. By following the Mounties, Insight has assembled new information that sheds light on the shadowy world in which Riconosciuto operated and what the RCMP found -- including long-sought computer tapes that Riconosciuto has said contain a version of PROMIS that was stolen by high-level U.S. government officials and that he then modified for illegal purposes.

This was not the first time such claims had been made. Before the RCMP got involved, a great deal of this information was provided to Congress (among others) and surfaced during a 1992 taped telephone conversation between Riconosciuto and an FBI agent at a time Riconosciuto was on trial for the manufacture and sale of methamphetamine and was attempting to trade information to the FBI in exchange for entry to the federal Witness Protection Program.

But, as so often with Riconosciuto, the stories he offered to federal agents were not confirmed or just ignored. That is, until the RCMP entered the picture last year and got a break. Helping the Mounties was Cheri Seymour, a Southern California journalist turned private detective. Years before, in January 1992, she had retrieved boxes of documents from Riconosciuto's hidden desert trailer. The Mounties spent three days copying these documents and, with the help of Seymour, returned to the trailer where yet more documents were retrieved.

These combined Riconosciuto papers revealed the dark and disturbing landscape of crime, espionage and betrayal of which he had been part -- one that ever since his arrest and conviction in 1992 had been labeled the fictional embellishments of a convicted felon.

Each new twist and turn of the covert investigation took the Mounties deeper into a forest of bizarre machinations as they sought to validate information which, though it had no direct connection to the alleged theft of the PROMIS software, raised astonishing questions about national security and organized crime. This is not to say the RCMP agents didn't probe the allegations that Canada's law-enforcement and intelligence services were operating a stolen version of the software developed years before by Bill and Nancy Hamilton.

The Hamiltons own a company called Inslaw, and it is they who, in the early 1970s, developed a version of PROMIS for the Justice Department. At some point, they have claimed, a proprietary version of their software was stolen and a dispute arose with the government. In March 1991, just before Riconosciuto was arrested on illegal drug charges, he provided a sworn affidavit to Inslaw stating that between 1981 and 1983 he had made modifications to a pirated version of PROMIS. He told Inslaw, and subsequently Congress and federal investigators, that he did so when he was director of research for a joint venture between the Cabazon Indians and the Wackenhut Corp.

At the time, there were fewer than two dozen members of the Cabazon Band of Mission Indians. John Nichols, who is not an American Indian, was the administrator of the tribe's business affairs, which included the joint-venture partnership with Wackenhut, one of the top private security agencies in the world, run by former FBI and other intelligence specialists.

 The Indian reservation presented unique opportunities for secrecy, according to interviews and documents obtained by Insight. Under broad state and federal exemptions, Indian reservations enjoy status just short of being sovereign nations and are free to govern within the confines of the reservation without outside intervention. Wackenhut was one of the first corporations to take advantage of this special status.

Whether the Cabazon/Wackenhut "joint venture" existed is not in question. What have been dismissed by federal investigators are Riconosciuto's claims about what went on at the reservation and the people involved.

For example, Riconosciuto has maintained that one of the projects he was involved in dealt with new munitions he and the Cabazon/Wackenhut partnership had created, not to mention a nifty new night-vision device. RCMP officers McDade and Buffam obtained a copy of a 1991 "Special Operations Report" (SOP) that was written by Gene Gilbert, an investigator for the district attorney's office in Riverside, Calif. In this report -- a copy of which was given to the

House Judiciary Committee in 1991 and subsequently to the Justice Department in 1993 -- Gilbert describes a weapons demonstration that took place in September 1981 at the Lake Cahuilla Shooting Range in Indio, Calif. Details of who attended this test nearly 20 years ago, Riconosciuto claims, should corroborate his assertions about people he associated with involved in the alleged theft of the PROMIS software and other activities in which the RCMP officers now are probing.

U.S. federal investigators dismissed the report because, they said, the document was a re-creation of 10-year-old events based on recollections Gilbert had cobbled together at the request of federal authorities. The RCMP officers traveled to Riverside in August 2000 to see for themselves. According to a law-enforcement officer who asked not to be identified, Gilbert not only verified the information in his 1991 SOP report but allowed the Mounties to review all the contemporaneous backup in local police-department files associated with the weapons demonstration and other activities at the reservation.

Insight has obtained some of these crucial 1980s police-intelligence files which Gilbert used for his 1991 SOP report. And these confirm that there was a demonstration in 1981 consisting of tests for a new night-vision device and a firing of special semiautomatic weapons. The records show it was attended by Riconosciuto and 15 others --including two anticommunist Nicaraguan freedom fighters identified as Eden Pastora Gomez (code-named "Commander Zero") and Jose Curdel ("Commander Alpha"); John Vander-worker, a former CIA employee; Wayne Reeder, a wealthy California developer and investor in the Cabazon Reservation; Peter Zokosky, a board member of Meridian International Logistics who also was a Cabazon investor and former owner of Armtec Defense Products Inc.; and John Philip Nichols, administrator of Cabazon, to name a few.

 This is not the only story that emerged as the RCMP investigated Riconosciuto's revelations. For instance, for years he had said he'd worked for the government, briefing and lecturing military brass and Pentagon officials. In a January 1992 letter obtained by Insight on Wackenhut stationery, the company's director of corporate relations, Patrick Cannan, writes that "John P. Nichols had first introduced Riconosciuto to Wackenhut (Frye, V.P. of Wackenhut, Indio, Ca., office) on a May 1981 trip to the U.S. Army installation at Dover, N.J., where Nichols, Zokosky, Frye and Riconosciuto met with Dr. Harry Fair and several of his Army associates who were the project engineers on the Railgun Project. Riconosciuto and these Army personnel conducted an extensive and highly technical `theoretical' blackboard exercise on the Railgun and, afterward, Dr. Fair commented that he was extremely impressed with Riconosciuto's scientific and technical knowledge in this matter." The letter goes on to state that Dr. Fair considered Riconosciuto a "potential national resource."

The significance of this is that it is consistent with evidence unearthed by RCMP investigators that Riconosciuto's claims of technical and scientific expertise and access are not rantings.

The RCMP investigators also discovered another link in a Riconosciuto story that had been dismissed. The permit to hold the arms demonstration in 1981 at Lake Cahuilla was obtained by Meridian Arms, a subsidiary of Meridian International Logistics, owned by Robert Booth Nichols, a self-proclaimed CIA operative and licensed arms dealer (and no relation to Cabazon administrator John Nichols). Riconosciuto for years was a partner with Booth Nichols in the Meridian Arms business and, at the time the permits were approved for the Lake Cahuilla weapons demonstration, Nichols was unaware that he was being investigated by the FBI for suspected mob-related money laundering of drug profits and for stock fraud.

Booth Nichols also served on the board of First Intercontinental Development Corp. (FIDCO), a building/ construction company. Among Nichols' corporate partners at FIDCO in the 1980s were Michael McManus, then an aide to President Reagan; Robert Maheu, former chief executive officer of Howard Hughes Enterprises; and Clint Murchison Jr. of the Murchison empire based in Dallas.

Riconosciuto long has maintained that Booth Nichols and FIDCO were associated with U.S. intelligence agencies and used as a cutout. Again, whereas others summarily had dismissed this claim, the RCMP investigators pursued the lead, poring over documents from the long-abandoned Riconosciuto storage and in the files of U.S. law-enforcement agencies. For example, RCMP obtained FBI wiretap summaries of telephone conversations between Nichols and another of his then-partners in FIDCO, Eugene Giaquinto, who at the same time also was president of MCA Home Entertainment Division. The wiretap summaries reads like a who's who of alleged mob figures with close ties to the motion-picture industry. The Mounties also received substantial related information from classified internal FBI files.

 But, based on Insight's own sources, what the RCMP investigators were after wasn't just PROMIS but people associated with Riconosciuto and their business ties in a vast array of enterprises that include intelligence activities overseas. Somehow, this network was tied in to what the Mounties were investigating involving security lapses such as those at the Los Alamos National Laboratory last year that McDade and Buffam knew about -- and shared with Seymour and others -- months before the news hit U.S. newspapers. And it appeared that Riconosciuto and his cronies were in the thick of such international intrigue -- especially Booth Nichols.

In response to RCMP requests to help to corroborate Riconosciuto's claims and connections to Booth Nichols, Seymour provided McDade a January 1992 recording of a telephone conversation between Riconosciuto and an FBI agent. From this tape McDade heard Riconosciuto claim that Booth Nichols was connected to a high-ranking Justice Department official. Riconosciuto also tells the FBI agent that "the bottom line here is Bob [Nichols], Gilberto Rodriguez, Michael Abbell [who's now an attorney in Washington but then was with the Criminal Section of the Justice Department], Harold Okimoto, Jose Londono and Glen Shockley are all in bed together."

Riconosciuto also details in the tape-recorded phone call specific information about an alleged meeting between Booth Nichols and Abbell. He subsequently provided the FBI agent a handwritten note with additional information about the alleged Abbell meeting: "Bob [Nichols] handed him [Abbell] $50,000 cash to handle an internal-affairs investigation the Department of Justice was having that would lead to extradition of [brothers] Gilberto and Miguel Rodriguez and Jose Londono. Bob said it was necessary to `crowbar' the investigation because they were `intelligence' people."

What is significant, and of interest to the Mounties, is that Riconosciuto fingered Abbell's ties to the Cali drug cartel three years before Abbell was indicted in Miami on federal criminal charges that the former official did work on behalf of the Cali cartel and its leaders. (Abbell was convicted of money laundering in July 1998 and sentenced to seven years in prison.) Interestingly enough, once McDade returned to Canada with tapes of a dozen telephone conversations and his secret investigation began to leak in the Canadian press (albeit briefly), he mailed to Seymour a transcript of the Riconosciuto taped conversation with the FBI agent. Was this a message?

The Mounties clearly were interested in Riconosciuto's partner of nearly 20 years, Booth Nichols. This connection was strange, according to those interviewed by Insight, because Booth Nichols apparently had nothing to do with PROMIS and everything to do with other more nefarious allegations. And the Mounties also were interested in claims Riconosciuto has made about his participation in a DEA drug-sting operation in Cyprus.

In one of the taped interviews Riconosciuto had with the FBI agent, he says that he was in Lebanon working on "communications protocol" for FIDCO in the Middle East to rebuild the infrastructure of two cities in Lebanon. Why the RCMP would be interested in this additional twist in the intrigue is unknown, but Insight has obtained documents that support the convicted felon's claims here as well. A June 1983 letter from Michael McManus Jr., the Reagan assistant who also sat on the FIDCO board, to George Pender, president of FIDCO, describes the administration's support for the rebuilding of Lebanon: "Without question FIDCO seems to have a considerable role to offer, particularly in the massive financial participation being made available to the government of Lebanon."

 There also is a July 1983 letter to the president of Lebanon, Amin Gemayel, from Pender in which FIDCO's desire to participate in the rebuilding of Lebanon is discussed. What is interesting about this letter is that Pender advises the Lebanese president that he (Pender) "may be reached via telex 652483 RBN Assocs. LSA." And whose address is that? None other than Booth Nichols. The same Nichols who at the time was a board member of FIDCO and under investigation by the FBI for suspected drug trafficking, money laundering and connections to the mob --and the same man who obtained the permits at the Cahuilla gun range for the weapons demonstration to Nicaraguan Contra leaders and others.

The more the Mounties dug, the weirder the connections got and the more the convicted felon's stories of the bizarre underground seemed to be borne out. Besides its interest in the RCMP probe and what it was uncovering, Insight also sought -- and confirmed -- the details of many other Riconosciuto accounts of these intrigues.

Riconosciuto has said he was involved in that DEA drug-sting operation in the Middle East while he was working on communications protocol for FIDCO. What part he played in any alleged sting operation is unknown but, based on what Riconosciuto told the FBI agent in those taped conversations, detailed information about a safe house used by the DEA in Cyprus seems accurate. According to Riconosciuto, the DEA safe house was located in Nicosia, Cyprus, and operated under the code name of Eurame Trading Ltd., which was located on Collumbra Street. "It was an apartment and it had a ham-radio station. It was ICOM," Riconosciuto said, "a single side-band amateur radio setup. It [the apartment] was on the top floor" There is corroboration for these details.

Lester Coleman, a former contract employee with the Defense Intelligence Agency (DIA) who was on loan to the DEA in the late 1980s, wrote a book in 1993 called Trail of the Octopus: From Beirut to Lockerbie, Inside the DIA. Coleman claims there to have worked out of a safe house in Cyprus at the same location Riconosciuto described and under the same name, Eurame Trading Ltd. Coleman also confirmed secret Bekaa Valley drug shipments and the names of the U.S. agents working undercover in Cyprus that Riconosciuto had revealed to the FBI in 1992 -- a year before it was outlined in Coleman's book.

Insight asked Coleman who would know about such a secret U.S. government safe house, let alone a cutout company? "I don't know" Coleman says, "unless he was there. ... I have never met or talked with [Riconosciuto], so I have no idea whether he was there or not. ... But what he is describing is accurate. No one would know about the ICOM radio unless they had been there and seen it," Coleman says.

Again, like Riconosciuto's comments about Justice Department attorney Abbell and his connections to the Cali drug cartel, Riconosciuto knew detailed information well before the public. And he tried to tell the FBI, among others, but to no avail. The stories then seemed too wild and woolly to be credible.

 But they were credible to these RCMP investigators, who spent considerable time, effort and money to prove or disprove what Riconosciuto has been saying. So clearly did this key source for their original inquiry into the alleged theft and misuse of the PROMIS software lead the RCMP afield that one must wonder why. Is it possible that the Canadian investigators focused so much interest on these associates and tales by Riconosciuto to test his credibility about allied espionage matters and PROMIS?

No one is talking about what the RCMP probe ultimately was after or what was taken back to Canada, let alone McDade. However, according to RCMP spokesman Michelle Gaudet, this investigation is "ongoing within the national-security perspective."

COPYRIGHT 2001 News World Communications, Inc.
COPYRIGHT 2008 Gale, Cengage Learning

WeAreChange Brisbane
I hold personal views, beliefs and opinions that do not necessarily reflect the beliefs and opinions of WeAreChange Brisbane as a whole.

Our Bitcoin address: 1Fzb4bp48oMr7CFzT3SbkTzKpMSvWW1X1t

luckee1

  • Guest
bump

Offline chrsswtzr

  • Member
  • *****
  • Posts: 1,700
Re: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IPv6
« Reply #10 on: May 09, 2009, 01:56:46 am »
First, I want to thank you AI for all your heavy duty research and input into this brilliant display of high intellect "connect-the-dots" with PROMIS (PTech) and its connection to mass murder, pay off, drug rings and a corrupt Justice Department to say the very least. I read every last morsel you put out there, and every PDF file to boot. My eyes are a little burnt, and my mind a little frizzed, but I'm happy I did!
---------------------------

The next excerpts are from the http://mhkeehn.tripod.com/inslawcol.pdf document you gave us:

U.S. Bankruptcy Judge George Bason, who ruled in favor of Inslaw in the civil trial awarded Hamilton $6.8 million and found in September 1987, that Justice Department officials, "took, converted and stole" PROMIS through "trickery, fraud and deceit." Judge Bason's ruling, however, had a direct effect on his career when his reappointment to the bench was denied. "Very soon after I rendered those opinions, my application for reappointment was turned down, "Bason said. "One of the Justice Department attorneys who argued the Inslaw case before me was appointed in my stead. Although 90 percent of the incumbent bankruptcy judge who sought reappointment were, in fact, reappointed, I was not among them."

Right in the beginning it shows you who is in control, and what happens (lightly, too!) to you if you go against the grain. Strong words Mr. Judge, you will never work in that field again!

Ronald LeGrand, Chieft Investigator for the Senate Judiciary Committee told Bill Hamilton and his attorney tha a trusted Justice Department source had confided that Inslaw was "a lot dirtier for the Department of Justice than Watergate had been, both in its breadth and depth." The committee was forced to conclude that the charges had no basis and no action was taken against employees of the Justice Department.

A lot dirtier than Watergate, and the following excerpts will show you exactly why! Dirty is the understatement of the YEAR!!! No action taken against the employees of the Justice Department because (a) you will be murdered and (b) they are probably on the pay roll!

Riconosciuto confirmed Casolaro's theory and asserted that all scandals overlapped, but amid Casolaro's investigation a pattern of mysterious deaths was emerging.

Watch the pattern now...............

Affiliated with the Cabazon Indian Reservation, Alfred Alvarez and two friends opposed the takeover of the reservation by Wakenhut Corporation. They were murdered in July 1981.

Paul Morasca was murdered in January 1982 in the San Francisco condominium he shared with Michael Riconosciuto. Morasca had started to expose CIA activities, which included Wakenhut Corporation.

Private investigator Larry Guerrin, while seeking information for Riconosciuto relating the Inslaw case, was found dead in Mason County, Washington, in February 1987.

San Francisco attorney David Meyer, who was to appear the following day in District Court, to defend clients who were reportedly tied in with CIA drug trafficking activates, died from a gunshot wound on February 6, 1989. Meyer sought to expose links between the Justice Department, the CIA and Iran-Contra.

On August 14, 1990, attorney Dexter Jacobson was found dead prior to a scheduled meeting with the FBI in regards to rampant Chapter 11 judicial corruption.

Attorney Gary Ray Pinnell, was found dead on February 11, 1991, just before he, too, was to present Chapter 11 corruption to the FBI.

The body of Alan D. Standorf was found January 31, 1991, in the back seat of a car parked at the Washington National Airport. Casolaro had depended upon Standorf, an electronic intelligence employee for the NSA, provided the reporter information that linked the Justice Department to the various scandals.

In April 1991, attorney David Eisman was shot to death 24 hours before he was to meet with Riconosciuto. Involved with numerous CIA activities, Eisman had been scheduled to meet with a woman in Philadelphia who was to deliver important evidence of corruption by Justice Department officials.

Alan May was found dead in his San Francisco home on June 19, 1991. May was reportedly involved with Riconosciuto in the Iranian hostage scandal and October Surprise. The local coroner's report stated death was due to a heart attack, but a subsequent autopsy revealed that May had poly-pharmaceuticals in his blood.

In 1991, Tommy Burkett was found dead in the bedroom of his parents' Hendon, Virginia, home from a gunshot wound to the mouth. Ruled a suicide by pathologist James Beyer, an outside pathologist, hired by Burkett's parents, ruled thatm ore bodily damage that normally associated with a self-inflicted wound had been found. Previous to his death, Burkett had been meeting with Casolaro, but it is unclear as to what information may have been provided.

As Casolaro continued his investigation he began to recieve death threats. Undaunted, he continued his work, but told his brother, "if there was an accident and he died, not to believe it." Preceding his death, Casolaro traveled to Martinsburg, Virginia, for a meeting with sources on Inslaw, whom Casolaro described as a relative of Mrs. Barbara Videnieks, Chief of Staff to Senator Robert Byrd of West Virginia.

Peter Videnieks, husband to Barbara, served as the Justice Deparment's Contracting Officer on the PROMIS Implementation Contract.

During the final week of his life, Casolaro told at least five confidants that he had finally broken the Inslaw case after a year-long full-time investigation.

The day before he died, Casolaro met William R. Turner in the parking lot of the Sheraton Hotel, in Martinsburg, to take delivery of sensitive documents that Turner had been hiding for Casolaro. According to Turner, Casolaro intended to show the documents to his sources later in the evening. Casolaro told Turner that the Friday evening meeting in Martinsburg had been arranged by Joseph Cueller, a U.S. Army Special Forces covert intelligence officer.

On August 11, 1991, Casolaro was found dead in the bathroom of his room at the Sheraton Hotel. His wrists were slashed ten times; his briefcase and notes missing. Casolaro's body was embalmed before the family was notified of his death, despite the fact that indentification was found among his personal belongings. Sources close to the investigation claim that a NSA employee was also in the hotel room at the time of Casolaro's death. He too was murdered; his body removed from the scene.


Whoa, that's a whole lot of peopled murdered, isn't it? Hmmm... they're all attached to this case surrounding the theft and thuggery of this PROMIS case, right? Yes, yes they are.... well wouldn't you be smart to conclude, intellectually, that it's all part of a big conspiracy of the Justice Department to contract kills to carry out their end game? Of course this is the correct answer, if you read all the evidence and eye witness testimony, and deduce your own conclusion!

Following the death of Casolaro, Inslaw Attorney Elliot Richardson called for an investigation. "It's hard to come up with any reason for this death, other than he was deliberately murdered because he was close to uncovering sinister elements in what he called The Octopus," Richardson said.

The Octopus has long arms my friends, long arms.... they have far greater reach than one can imagine! Keep an eye out the next time Octopus is mentioned, and look who's name pops up!

On November 1, 1992, the bodies of Gail Spiro and her three children were found in their Rancho Santa Fe, California, home, dead from gunshot wounds to the head. Three days later the body of Gail's husband, Ian Spiro, was found dead in the fornt seat of his Explorer in the remote California desert. Authorities ruled that Ian Spiro had murdered his wife and children and then had taken his own life. Spiro had connections to the CIA and had been involved in numerous covert operations. At the time of his death, he was helping Michael Riconosciuto collect documents to be presented to a federal grand jury in connection with Inslaw.

On November 14, 1992, Jose Aguilar, a tree trimmer who occasionally worked at the Spiro home, was found dead from a gunshot wound to the head.

Peter Sandvugen, found dead on December 2, 1992, was assisting Riconosciuto in his defense against the Justice Department. Sandvugen was a part of a special CIA team during the eighties, and as the gun he always carried was found without the ammo clip, the circumstances of his death raised questions.


More, and more deaths surrounding the investigation of the Justice Departments theft, thuggery, drug running and murder!!! God, don't they sleep??!

In June 1993, the Bua Report was released and exonerated Justice Department officials from any wrong doing in the case.

Honestly, would you, at this point, stand up and TAKE STAND AGAINST these criminals?!! You'd have to have a lot of balls, and a lot of personal sentiment invested!

Following the issuance of the Bua Report, attorney's for Inslaw issued a rebuttal and later an addendum. In the Addendum to Inslaw's Analysis and Rebuttal of the Bua Report, issued February 14, 1994, it states, "According to current and former Justice Department employees, the Justice Department has its own covert intelligence agency that operates out of the Criminal Division's Office of Special Investigations (OSI); its intelligence agents have virtually nothing to do with OSI's publicly declared mission of locating and deporting Nazi war criminals. OSI in turn, has its own proprietary company that allegedly employs scores of agents of diverse nationalities, as well as individuals who appear to be holding other jobs in the U.S. Government departments and agencies, and in the U.S. Armed Forces...OSI has allegedly participated in the illegal trafficking in PROMIS software and in the murder of the investigative journalist Danny Casolaro."

More evidence, more murders, more Government involvement....

POM's admitted jobs for the Pentagon and questionable finances at the ADFA remained obscure as Hubbell's representation of POM became the official reason for his resignation. Critics have charged that then Governor Bill Clinton passively resisted investigating POM and the Mena operation, but the real reason for his passivity may have been the obvious tie-in with the related scandals of Casolaro's Octopus.

What do ya know, it's Arkansas' own William Jefferson Clinton!!! I thought he never told no lies!!

In reviewing the Inslaw scandal, a pattern of fraud and deceit involving the Justice Department is readily observed.

This, my friends, is quite obvious.

Just how long will it take before this pattern of corruption is exposed and weeded out is pure conjecture, but the obvious crimes committed by this agency should enrage every taxpaying citizen in the country.

Equal justice under the law is an adage that has long since expired, and, clearly, the Justice Department no longer understands what the word "justice" means. Someone please give them a dictionary.


Truer words were never spoken.

-------------------------------

I'm very, very tired..... I've been up almost 24 hours and I have to wake up again in about 3.5 hrs! I'm going to come back online again and give my analysis on the current state of PROMIS(PTech) and the whole voting side of this affair also!

PEACE :)

luckee1

  • Guest
Re: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IPv6
« Reply #11 on: May 16, 2009, 06:13:24 pm »
Kudos to all three of you!

O just got sick over the new torture posts.

It seems there is no limit to evil!

EvadingGrid

  • Guest
Re: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IPv6
« Reply #12 on: June 13, 2009, 08:03:00 am »
"Through this software (and likely newer, more advanced versions of it that have been or are being developed now) they will be able to exercise their total dictatorship of the entire world population.  To paraphrase--the PROMIS/Ptech software is so powerful that it can directly interface on a HARDWARE LEVEL of a computer, completely evading ALL security measures of any operating system.  Ptech will laugh at Unix, FreeBSD, any MacOS."

I am intrigued by this statement.

I'm also completely and utterly puzzled as to how such a thing is technically possible.



Offline Gandalf

  • Member
  • ****
  • Posts: 484
Re: PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IPv6
« Reply #13 on: November 10, 2009, 10:47:49 pm »
Quote
the new chips have a 128-bit ROM for storing a unique 38-digit ID number.

128 bits = 16 bytes.

The last 64 bits of an IPv6 address is the part which will be used to identify you. The first 64 bits are for routing and do not stay constant. IPv6 is really a 64bit addressing protocol where the last 64bits can be used either as a serial number for each computer or to extend the first 64bits to 128bits.

FULL STREET ADDRESS ZIP CODES IN UNITED STATES:

FORMAT:  XXXXX-XXXX = 30 BINARY bits (999999999 = 0x3B9AC9FF in hex)

SOCIAL SECURITY NUMBER:  XXX - XX - XXXX = (999999999 = 0x3B9AC9FF) = 30 bits

64bits + 30 bits + 30 bits = 124 bits. I guess that would fit on a 128 bit ROM!


Anti_Illuminati

  • Guest
Hahahahahahahaha, look at the article after this quote about Choicepoint:
How is Infragard tied into all this?  I'll show you:


INFRAGARD ATLANTA PREVIOUS QUARTERLY MEETINGS
http://www.infragardatlanta.org/past_meetings.htm

Q3 2004 Meeting was Monday, September 13th 8:0AM-Noon at e^deltacom (link to directions)

This past quarterly meeting wass scheduled for Monday, September 13th from 8am until 12 noon. It was held at e^deltacom which is located at 300 Satellite Boulevard in Suwanee, GA. (The commute northward towards Suwanee is easy in the mornings, Joe does it daily).

We were also pleased to announce that our breakfast sponsor for Sept 13th was e^deltacom.

e^deltacom is the largest data center storage facility in the southeastern United States offering co-location and managed services for it's clients (www.edeltacom.com). They volunteered the use of their e^deltatorium for our meeting in September.

WE REQUIRED AN RSVP's FOR THIS MEETING. Click HERE to RSVP.

Given the nature of their facility, secure access is guaranteed, therefore our RSVP's will facilitate the entry of InfraGard personnel into their facility that morning. If you are in doubt, please RSVP anyway, it will be better to have you on the list than to add you at the last minute.

InfraGard Atlanta is pleased to announce we will have two separate presentations:

Our first presentation was from Rich Baich, CISSP, CISM, and CISO of ChoicePoint. Mr. Baich was selected as the Information Security Executive of the Year in Georgia this past March. ChoicePoint is the leading provider of identification and credential verification services for business and government (www.choicepoint.com). Mr. Baich presented on Identity Theft, his presentation was very well received by the InfraGard National Congress in Washington this year and we had the benefit of receiving this presentation locally from a notable expert in this regard.

Our second presentation was from Dave McGirt, VP/CTO of e^deltacom and Matt Searfoss, Director - Hosting and Managed Services of e^deltacom. They discussed the workings of a world-class data storage facility, and how such a facility can support a company's business continuity needs effectively.

We also met our new FBI InfraGard Program Coordinator at this meeting. As a gentle reminder, the quarterly meeting breakfast sponsor enjoys the one opportunity we offer for vendors to present to our membership.
________________________________________________________________________

The Q2 2004 Meeting was May 27 7:30AM-10:00AM at Cobb Galleria

Infragard Atlanta was pleased to announce the Second Quarter 2004 Infragard meeting occurred in conjunction with the second annual Atlanta SecureWorld, May 26-27, Cobb Galleria.
http://www.secureworldexpo.com/atlanta04.php

Infragard Atlanta invited members to a complimentary Infragard Breakfast meeting, May 27th, 7:30am - 10:00am that included a Keynote and Panel Discussion on "Corporate Interface with Law Enforcement during or after a Critical incident, both Physical and/or Cyber".
As a principle partner in the program Infragard members were invited to the event with complimentary exhibit & open session passes and a $60.00 discount off the $145.00 two day conference fee (Discount Code INFR855)

Infragard members throughout the region found SecureWorld programs timely, informative and a great opportunity to network with peers in the industry.  In addition to the quarterly meeting, InfraGard Atlanta had an exhibit table both days of the SecureWorld Expo.

Applications and brochures were available to interested visitors.
________________________________________________________________________

The Q1 2004 Meeting was April 6, 2004 8:00AM-12:00PM

It was at the GCATT facility at 250 14th Street.

The meeting followed a different format this time with a panel of notable experts who spoke in a 'roundtable' format while answering questions from the membership about their concerns and interests relative physical and cyber security planning and Business Continuity Planning. With the continuing convergence of physical and logical security, new and emerging regulations, potential liability issues and the ever growing threat to our physical and IT worlds we needed to look at the entire security picture. And then the big question came, once we have all these great plans created, how are we going to get it all paid for, how will we 'sell it' to upper management and justify the expenditures?

Our panel group included: Rich Baich, CISO - ChoicePoint (recently named the Information Security Executive of the Year in Georgia), Bob Brand, Director of Corporate Security - Cox Enterprises, Bob Lang, Director of Homeland Security - Georgia Tech, Steve Edwards, SAIC - GBI, and Dave McGirt, VP - e`deltacom.

Our breakfast sponsor for this meeting was Cisco Systems, Inc. Thank you to Seth Judd and Julie Pennington of Cisco Systems, Inc. for their generous support of InfraGard in sponsoring our breakfast. The breakfast and networking portion of the meeting began at 8am with the formal meeting starting at 9am and concluding by 11:45am.

Those who came to the meeting on April 6th learned how major corporations, universities and the public sector handle these issues, what legal pitfalls to avoid and what resources exist to help achieve success in this ever demanding field of interest. The panel members helped answer those questions and also provided some valuable answers.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://epic.org/alert/EPIC_Alert_15.10.html

EPIC Wiretap Page:  http://epic.org/privacy/wiretap/

EPIC Urges FTC to Impose Civil Penalties in Data Breach Settlements

On April 28, 2008, EPIC filed comments with the Federal Trade Commission
urging the FTC to include civil penalties in settlements with TJX, Reed
Elsevier, and Seisint. The Commission recently concluded investigations
of the companies' weak security policies.  The companies' weak security
policies resulted in data breaches involving hundreds of thousands of
consumers, and the Commission reached preliminary settlements with TJX,
Reed Elsevier, and Seisint.  The proposed settlements would impose
security and audit responsibilities, but no financial penalties.  EPIC
noted that civil penalties were necessary to provide incentives for
companies to better safeguard personal consumer data in the future.
EPIC further observed that the FTC imposed $10 million in civil penalties in the Choicepoint case - a similar case that affected fewer consumers.

The FTC's investigations arose from TJX, Reed Elsevier, and Seisint's
2004-2005 data breaches, which exposed the sensitive personal
information of over 500,000 consumers and resulted in millions of
dollars in alleged financial fraud.  As a result of the 2005 TJX data
breach, between 45 million and 100 million credit card numbers were
exposed to fraud.  As a result of the 2004 data breach involving both
Reed Elsevier and Seisint, personal information regarding several
hundred thousand people was exposed in a scheme involving stolen
computer logins and passwords.  The proposed settlements do not include
civil penalties.  In comparison, in 2006, the FTC imposed $10 million in
civil penalties on Choicepoint as a result of a data breach that
affected approximately half as many consumers.

Agency Announces Settlement of Separate Actions Against Retailer TJX,
and Data Brokers Reed Elsevier and Seisint for Failing to Provide
Adequate Security for Consumers' Data:

http://www.ftc.gov/opa/2008/03/datasec.shtm

EPIC's Comments to the FTC: http://epic.org/privacy/idtheft/042808_ftc.pdf
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.wired.com/politics/security/news/2005/02/66710

California Woman Sues ChoicePoint
Kim Zetter Email 02.24.05

A California woman has filed the first lawsuit against ChoicePoint for fraud and negligence in the wake of the company's recent disclosure that it sold personal information about more than 140,000 people to identity thieves.

The case could set a precedent that would help establish better standards for how data brokers secure and sell consumers' private information and lead to regulations that would hold them accountable for lax data protection.

Eileen Goldberg filed the suit Friday in Los Angeles Superior Court after receiving one of about 34,000 letters that ChoicePoint sent to California residents informing them that the company had mistakenly sold personal data about them to identity thieves.

Goldberg, who is being represented by her son's law firm, Glancy, Binkow and Goldberg, is seeking class-action status for her suit to cover the thousands of other victims of ChoicePoint's data breach.

Previous lawsuits seeking damages for similar kinds of negligence in identity theft cases have not ended in favor of victims who sued banks and credit agencies for not better protecting them from identity theft.

But Peter Binkow, a partner in the firm representing Goldberg, said that he expects the case could set a new precedent since ChoicePoint directly profits from the sale of private data of people who have not given the company permission to sell that data.

"Regarding privacy, we're still pretty early in the process to some degree," he said. "The laws are still developing. But since ChoicePoint is obviously profiting off of this, it has a responsibility to maintain the information in a proper fashion. When you have a criminal operation that went on for over a year, it's pretty indicative that there were not adequate steps in place to protect (the data)."

According to the filing, Goldberg seeks to hold ChoicePoint responsible for negligence in protecting the private data of consumers from scam artists who purchased it from the company. The scam continued for a year before ChoicePoint discovered what the thieves were up to.

An unknown number of perpetrators posed as legitimate businesses to open 50 customer accounts at ChoicePoint, a data broker that collects financial, medical and other personal information on billions of people and sells it to marketers and government agencies, among others. The ID thieves were able to purchase Social Security numbers, credit histories and other personal information on thousands of people whose data ChoicePoint had collected.

Two weeks ago, ChoicePoint began sending letters to 145,000 people around the country revealing that their personal information was exposed to the thieves. So far, authorities have determined that at least 750 have become victims of identity theft as a result of the security breach.

ChoicePoint did not return calls for comment.

In a previous case in South Carolina, an identity theft victim tried to sue Citibank and two credit agencies for negligence for not properly authenticating the identity of someone who applied for credit cards under his name. The case was thrown out of court by judges who concluded that since the victim was not a customer of the bank and credit agencies and they had no business relationship with him, they had no responsibility to protect his personal data or identity.

But Andrea Matwyshyn, an assistant professor of law at Northwestern University who specializes in technology regulation and information security best practices, said that judges could determine that ChoicePoint did have a relationship with the public, albeit an indirect one, and assumed a certain level of responsibility for the data when it decided to sell people's private information.

"I think that in states like New York and California there will emerge a body of negligence law that will provide some recourse for consumers," she said. "But I think it's going to take five to 10 years."
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.wired.com/politics/security/news/2005/02/66685

ID Theft Victims Could Lose Twice
Kim Zetter Email 02.23.05

The recent security breach at data aggregator ChoicePoint that exposed at least 145,000 consumers to identity theft and renewed a call for regulation of the data industry will likely leave victims of the breach twice bitten -- first from the identity theft itself and second from thwarted attempts to recover damages for their losses if they decide to seek recourse.

Legal experts say that people who suffered losses as a result of the breach will find it difficult to get compensation from ChoicePoint for selling their personal data to con artists, even if the victims can prove that ChoicePoint was negligent in screening customers who purchased their data. That's because courts have been unwilling to penalize companies when victims of identity theft are not their direct customers.

Experts are hoping the ChoicePoint case may begin to swing court opinion, which could force companies like ChoicePoint to take better care of consumer privacy and data in the absence of federal legislation.

"There is a lot of political support behind consumer frustration in this area," said Charles Merrill, a New Jersey-based attorney who focuses on information technology cases. "I think that information security liability may be the next 'toxic tort' -- like asbestos. The time is right for it."

Atlanta-based ChoicePoint is a data-aggregation company that collects information on individuals from birth certificates, DMV records, credit and medical histories, court records and consumer transactions to create database dossiers on billions of individuals.

The company sells the data to direct marketers to help them target products to consumers. ChoicePoint also sells data to government agencies. Since 9/11, the company has positioned itself as a homeland security company to provide government agencies with data to help them authenticate and verify the identity of individuals.

This strikes an ironic chord for privacy advocate Richard M. Smith, who noted that the company's inability to verify and authenticate the identities of its own customers led to the recent breach in which scam artists illegally purchased consumer data from the company and stole the identities of more than 700 people.

Last October, ChoicePoint uncovered suspicious activity during an audit and contacted law enforcement agents to determine if it was fraud-related.

An investigation revealed that unknown perpetrators had used stolen identities to open 50 customer accounts with ChoicePoint to purchase data on at least 145,000 individuals. They purchased data for more than a year before ChoicePoint discovered the fraud.

It's not the first time ChoicePoint has had a security lapse. In 2002, the company acknowledged that it had left an internal corporate database viewable by anyone with a web browser.

According to ChoicePoint spokesman Chuck Jones, the perpetrators of the most recent incident set up phony businesses and obtained authentic business licenses, listing addresses and phone numbers, to obtain the accounts. Jones said that ChoicePoint did due diligence in verifying the individuals and their companies and that everything checked out.

"We checked out the principals of the businesses and they came back clean," he said. "The business licenses also came back as valid."

When asked if ChoicePoint called the phone numbers on the business licenses or looked up the addresses, he declined to say. But the company acknowledged that it has changed its procedures for verifying new accounts and will be investigating existing accounts to make sure that they are valid. ChoicePoint also said that it has hired a retired Secret Service agent to help revamp its verification process.

Although the fraud had continued for a year, federal authorities asked the company to put off notifying consumers that their data had been exposed until two weeks ago, when the company sent out more than 34,000 letters to California residents. California investigators also told the Associated Press this week that they believed the number of people whose data was compromised could rise to half a million. So far, one man has been sentenced to 16 months in prison in California, but authorities do not believe he acted alone, so there may be more perpetrators and more victims.

http://www.scmagazineus.com/reed-elsevier-acquires-choicepoint-in-41-billion-deal/article/107120/

Reed Elsevier acquires ChoicePoint in $4.1 billion deal
Dan Kaplan
February 21, 2008

ChoicePoint, whose breach disclosure in 2005 served as a watershed moment, has been acquired by LexisNexis information service parent, Reed Elsevier, for $4.1 billion, the two companies announced Thursday.

Alpharetta, Ga.-based ChoicePoint, a data aggregator and credentialing service founded in 1997, said that the merger will “create a powerful combination of technology, information and workflow products to meet the growing needs of customers for analytics-based solutions.”

News of the merger with Europe-based Reed Elsevier comes less than a month after ChoicePoint agreed to pay $10 million to settle the final bit of pending litigation resulting from the breach, in which criminals, posing as customers, stole the personal information of 163,000 people.

The data-loss event prompted most states to pass notification laws requiring organizations to alert customers about a breach if their personally identifiable information was exposed. At the time of ChoicePoint's revelation, only California had such a law on the books.

According to a prepared question-and-answer document, ChoicePoint said Thursday that it will continue to apply its newly implemented privacy and security controls until the expected close of the deal this summer.

“Reed Elsevier has committed to develop business plans that maintain our privacy principals,” ChoicePoint said. “And, we have made commitments to regulators that will maintain certain components of our administrative, physical and technical security requirements for 20 years.”

As part of a January 2006 settlement with the Federal Trade Commission over charges that ChoicePoint's record-handling procedures violated consumers' privacy rights and federal laws, the company agreed to pay $15 million in fines and consumer redress. In addition, it consented to biennial audits by an independent, third-party security profession until 2026.

Since the breach, ChoicePoint has served as a poster child for data-loss incidents, and company executives have traveled across the country to chronicle their prior shortcomings and how they have worked to fix them, including implementing better customer verification protocols and discontinuing the sale of some consumer data.

"ChoicePoint has made remarkable progress since the breach incident back in February of 2005," Paul Stephens, director of policy and advocacy at the nonprofit Privacy Rights Clearinghouse. "They have probably become an industry leader in terms of doing good things to protect the security of the data that is entrusted to them."

Roughly 70 percent of ChoicePoint's revenue is generated by providing consumer records for insurance claim verifications and workplace background screenings, according to the company.

“The acquisition of ChoicePoint represents a major further step in the building of Reed Elsevier's risk management business and in the development of our online workflow solutions strategy,” said Sir Crispin Davis, Reed Elsevier's chief executive officer. “The market growth in risk information and analytics is highly attractive, and ChoicePoint brings important assets and market positions that fit well with our existing business.”

Stephens, though, said he worries that combining the two companies could yield a record payday for data thieves if they were to pull off a heist.

"We would consider any consolidation of two powerhouses in the information field to be a negative thing from the standpoint of consumer privacy," he said. "Each of them has their own set of data. So...the amount of data within one corporate entity is going to be much larger."

Reed Elsevier has not gone without its own security woes. In June 2006, five men were charged with hacking passwords of at least 32,000 LexisNexis users, according to the Privacy Rights Clearinghouse.

A ChoicePoint spokesman on Thursday referred any questions about the acquisition to a Reed Elsevier representative, who did not respond to a request for comment.

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: PROMIS/Ptech=Choicepoint=Infragard=DIEBOLD=World ID/Theft/C TAX Enforcement
« Reply #15 on: November 10, 2010, 01:01:36 pm »
Process Renewal Group

The Process Renewal Group is a consulting organization committed to helping its clients successfully manage business change. PRG's mission is to help dramatically improve their client's performance through the renewal of business strategies and business processes, as well as the innovative application of information technologies. PRG's challenge is to make a lasting difference in their clients' effectiveness by helping them to deliver creative and pragmatic business approaches and solutions.

http://www.ptechinc.com/01/abou/abou.part.list.asp#5

Business Process Management
Profiting From Process
This book, authored by Process Renewal Group founder, Roger Burlton, provides a comprehensive coverage of process renewal and change management. It is divided into a manager's guide and a practitioners guide and is an invaluable source of knowledge for process centric organizations and those that are trying to be so.
Master the Concepts:
· Create adaptable processes
· Improve business performance
· Align your processes and technologies
· Enable sustainable human change
· Implement continuous learning
· Grow a process-organized enterprise
· Discover a reusable method for process objects
http://www.processrenewal.com/
Our Clients
Since its formation, The Process Renewal Group members have provided services to numerous organizations. Some of these are:
· ABN-Amro Bank ( Amsterdam)
· AT&T
· American Express
· Bank of Nova Scotia
· Barclays Bank
· BC Hydro
· BC Ministry of Environment
· BC Tel
· Celestica
· Digital Consulting Institute (DCI)
· French Saudi Bank
· Great West Life
· IBM
· JP MorganChase
· Johnson & Johnson
· Lloyds TSB (UK)
· Maersk Shipping (Denmark)
· Merrill Lynch
· Mobil Oil
· NATO
· National Grid (UK)
· Northwest Pipelines(Williams Group)
· Panasonic
· Pfizer
· Portugal Telecom
· Qualcomm
· RAC Plc.(UK)
· Regional Municipality of Ottawa Carleton
· Royal & Sun Alliance (UK)
· Sprint Canada
· Stanford University
· Union Gas
· Vancouver Wharves
· City of Winnipeg
· Zurich Insurance Group

Process Renewal Group

Extracted from
http://web.archive.bibalex.org/web/20000918235544/ptechinc.com/ProcessRenewa.doc

Process Renewal Group

Formed in 1993, Process Renewal Group (PRG) is a team of consultants who are focused on transferring their knowledge of how to navigate business change.  Its members, all of whom have senior management backgrounds, share a common perspective and common approaches and techniques.  They all have a customer-centric view of business, so one of their primary goals is to help organizations improve their service to both external and internal customers.  Process Renewal Group consults with and provides training to groups throughout the world to help them enhance their value to the corporations and government agencies of which they are a part.


"For some time, we had been seeking a software tool for business transformation and process modeling that would allow us to take our ideas and our way of doing things and embed them – without our having to develop any software ourselves.  After evaluating everything on the market, we felt that Ptech's ability to connect concepts and define their interrelationships was just what we needed."

    - Roger Burlton,
   Founder,
   Process Renewal Group
   www.processrenewal.com


Consultants Tailor
Ptech's Framework™ to Help Clients Improve Customer Service and Business Processes


 
"We help organizations get pointed in the right direction," says Roger Burlton, founder of Process Renewal Group.  "We are usually called in by a senior IT manager who is trying to find better ways to support the business.  A lot of our clients play an internal consulting role, and we help them to be successful with their internal constituents.  Our ultimate goal is to enable our clients to become more self-sufficient."

Formed in 1993, PRG is a team of consultants who are focused on transferring their knowledge of how to do things better.  Its members, all of whom have senior management backgrounds, share a common perspective and common approaches and techniques.  They have a customer-centric view of business, so one of their primary goals is to help organizations improve their service to both external and internal customers.  PRG consults with and provides training to groups throughout the world to help them enhance their value to the corporations and government agencies of which they are a part.

PRG’s team members have developed a very specific methodology for working with an organization.  First, they conduct an enterprise-wide diagnosis, and then they recommend and initiate priority changes within that enterprise.  "We are extremely process-oriented," says Burlton, "We know that all the facets of a business – technology, organizational and human resource capabilities, facilities, locations, etc. – need to be properly aligned.  In most organizations, these elements are out of synch, so that when that organization tries to build an IT infrastructure and roll out solutions, they can encounter big problems."


Tailoring Framework™ to Meet Their Needs

For some time, PRG had been seeking a software tool to guide its clients through the necessary steps in business and IT architecture development and process modeling and design. Not wishing to become software developers, they needed an environment that would allow them to take their ideas and ways of doing things and embed them simply and quickly.  "After evaluating everything on the market, we felt that Ptech's ability to capture concepts and define their interrelationships was just what we needed," says Burlton.



PRG selected Framework™ for its adaptability and traceability.  Burlton elaborates. "Framework is a highly flexible tool.  The fact that it is object-oriented has enabled us to tune and adjust it to do things exactly the way we want to.  As for its traceability, we like the way it can take any concept and identify that concept's ramifications on any number of other related ones."

Starting with Framework's base toolkit and overlaying their own Process Renewal Accelerator, the PRG team now has a customized software model of their methodology as well as the tools to build the things that the methodology advocates. This enables them to provide their clients with specific descriptions of who, what, when, where, how, and why to do things.  "With the tool’s guidance, our clients can actually say, 'OK, we do this first.  And then we do this.'  And so forth.  Everything is very clear," notes Burlton.


The Learning Curve

For PRG clients, using the business architecture and process modeling tool is not difficult.  Instead, the key challenges lie with the business issues.  Business and IT can now focus on articulating how best to do the work of their organization.  "If they choose to use what we have constructed – using the fundamental underlying concepts – the tool is not hard to use," says Burlton.  "Our job as consultants is to help them with those concepts, and to help them understand why they should do architecture and process modeling in the first place.  We are trying to help them solve a business problem, and we want to isolate them from the challenges of building and maintaining their own modeling tool or having to pick one that is unsuitable."


Some Consulting Advice

A strong advocate of the value of architecture and process modeling, Burlton cautions that organizations should take their time and do their homework before they purchase tools.  "I have seen many occasions when clients or potential clients are comparing apples and oranges," he says.  "They are evaluating one tool that does something one way and another tool that does something totally differently.  Until they really understand what methods they wish to use, they should not even consider buying these types of tools."  But, after that homework is done, Burlton and his PRG colleagues are the first to tout the valuable role that architecture and process modeling tools can play in helping organizations to make the changes they need to become more successful.