Author Topic: PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman  (Read 53888 times)

0 Members and 1 Guest are viewing this topic.

Anti_Illuminati

  • Guest
PROMIS-Riconosciuto-Ptech-Dov Zakheim-911-BAH-SAIC-Tim Osman
« on: April 01, 2009, 02:45:48 am »


During the debriefing Indira was asked by a member of the Secret Service, "Is Ptech PROMIS?"

"I already knew what had happened to Danny Casolaro, and they were asking me if I had copies of Ptech," Indira told FTW.

Being asked such a loaded question, she responded with her Ground Zero attitude saying:

"You have a copy of the software, why don't you tell me? This is not about the software guys, ok - was it a PROMIS? It was a place you could hide a PROMIS, a place you can drop a PROMIS."

Indira told FTW, "I was going to use Ptech software for risk surveillance at JP Morgan - Duh!"


Exposing the Inslaw Scandal and Related Crimes

Source

“I think in a perverse way, I was... slow to catch on. I feel silly... I wasn’t paranoid enough,” Inslaw President Bill Hamilton said. Hamilton’s remarks referred to the bankrupting of his computer firm, known as Inslaw, and subsequent theft, by high officials within the Justice Department, of his PROMIS software.  During the late 1960s, Hamilton, who was an intelligence analyst with the National Security Agency (NSA), assigned to the research and development unit, began developing a computer database program which would interface with other computers. This program had the ability to track the movement of individuals on a worldwide scale.

Realizing the potential of his development, he resigned from the NSA and, three years later, formed Inslaw Incorporated. Believing the program could be a highly effective tool in tracking criminals, Hamilton copyrighted his PROMIS software  (which  stands  for Prosecutors Management Information Systems) and offered to lease the rights for its use to the Justice Department. In 1982, the Justice Department signed a $10 million contract with Inslaw to install PROMIS into the offices of 42 U.S. attorneys.


Obtaining a loan, and thus incurring heavy debt to complete the contract, Inslaw installed PROMIS, but by February 1985, the government had withheld payments on $1.77 million in costs and fees and Inslaw was forced into bankruptcy. Earl Brian, a close friend of then Attorney General Edwin Meese, and owner of United Press International, owned controlling interest in a software company called Hadron Incorporated. As Inslaw sought refuge in Chapter 11, Justice  Department  officials pressured the IRS to force Inslaw into Chapter 7 liquidation.

Through his influence with Meese, Brian sought to obtain the rights to Inslaw’s PROMIS software and the government contract. Hadron Chairman Dominic Laiti had previously attempted to purchase the software from Inslaw, but Hamilton had refused the offer. Brian, who was linked to covert operations with the United States and Israeli intelligence communities, and who reportedly worked for the CIA, was given the leased software by officials within the Justice Department. Former Israeli intelligence agent Ari Ben-Menashe, claims that Brain contacted Rafi Eitan, a former Mossad agent and counter terrorism adviser to Israel with the intent that the software be sold to intelligence agencies around the world.

Ben-Menashe further claims that it was Rafi Eitan who initiated the idea of installing a “trap door” into the software, which would permit the Mossad to secretly enter the database after it was sold, thus allowing them to spy on countries that purchased the program. Deciding that the trap door be installed outside Israel, Ben- Manashe contacted Yehuda Ben-Hanan, who owned Software and Engineering Consultants based in Chatsworth, California, and for a fee of $5,000 contracted him for the job.

With the trap door in place, Brian, representing Hadron Incorporated, sold the software to the Jordanian government, whereby a team of Hadron computer experts set up the software for Jordanian military intelligence. Now assured that the program was operational, the CIA, working with Justice Department officials, and Earl Brian, crafted a plan to develop their own version of PROMIS, also equipped with a trap door. This alteration of the software  was  carried  out  by  Michael Riconosciuto, who was director of Research for Wakenhut Corporation, a security firm based in Coral Gables, Florida, that also has ties to the CIA and intelligence communities.

It was on the Cabazon Indian Reservation, outside Indio, California, where Riconosciuto installed the trap door on PROMIS. In a signed affidavit, dated March 21, 1991, Riconosciuto stated, “In connection with my work for Wakenhut, I engaged in some software development and modification work in 1983 and 1984 on the proprietary PROMIS computer software product. The copy of PROMIS on which I worked came from the U.S. Department of Justice. Earl W. Brian made it available to me through Wakenhut after acquiring it from Peter Videnieks, who was then a Department of Justice contracting official with responsibility for the PROMIS software. I performed the modification to PROMIS in Indio, California; Silver Springs, Maryland; and Miami, Florida.

The purpose of the PROMIS software modifications that I made in 1983 and 1984 was to support a plan for the implementation of PROMIS in law enforcement and intelligence agencies worldwide. Earl W. Brian was spearheading the plan for this worldwide use of the PROMIS computer software.” Riconosciuto also stated that PROMIS had been implemented within two agencies of the Canadian government, and it was through this unlawful sale of their software that Bill Hamilton discovered the theft. Contacted by Canadian government personnel for information on the software, Hamilton stated that Inslaw had not sold the software to any Canadian offices and that authorization for its use was prohibited. Shortly thereafter, while in the troughs of Chapter 11 court proceedings, Inslaw’s attorney, former Attorney General Elliot Richardson, filed a civil action suit claiming that Inslaw had been the victim of a conspiracy by the Justice Department.

U.S.  Bankruptcy  Judge George Bason, who ruled in favor of Inslaw in the civil trial awarded Hamilton $6.8 million and found in September 1987, that Justice Department officials, “took, converted and stole” PROMIS through “trickery, fraud and deceit.” Judge Bason’s ruling, however, had a direct effect on his career when his reappointment to the bench was denied. “Very soon after I rendered those opinions, my application for reappointment was turned down,” Bason said. “One of the Justice Department attorneys who argued the Inslaw case before me was appointed in my stead. Although over 90 percent of the incumbent bankruptcy judges who sought reappointment were, in fact, reappointed, I was not among them.”

Two years later, Judge Bason’s ruling was appealed to the U.S. District Court where Judge William Bryant upheld the decision. In May 1991, the U.S. Court of Appeals in Washington D.C., reversed the findings, claiming that bankruptcy courts lacked jurisdiction over the matter. Following  the  reversal,  the  Senate Permanent Subcommittee on investigations conducted a Congressional investigation into the theft of PROMIS. The Senate report stated its inquiry was hampered by the Justice Department’s lack of cooperation and that it had found employees “who desired to speak to the subcommittee but chose not to out of fear for their jobs.”

Ronald LeGrand, Chief Investigator for the Senate Judiciary Committee told Bill Hamilton and his attorney that a trusted Justice Department source had confided that Inslaw was “a lot dirtier for the Department of Justice than Watergate had been, both in its breadth and depth.” The committee was forced to conclude that the charges had no basis and no action was taken  against  any  employees  of  the  Justice Department.

During this same time frame, an investigative reporter by the name of Danny Casolaro began running down leads on an operation he termed the “Octopus.” According to Danny Casolaro’s brother, Dr. Anthony Casolaro, the Octopus was not a secret organization, but a group of individuals that participated in arms dealing and clandestine covert operations. “He didn’t envision them as a group like the Mafia, but more as a network... they would overlap when their needs coincided,” Dr. Casolaro said. “Using the analogy, BCCI would be one arm of it. The October Surprise, Danny said, was literally just another arm. Inslaw is yet another arm.” Iran Contra was yet another tentacle in Casolaro’s Octopus.

During Casolaro’s investigation into Inslaw he met Michael Riconosciuto, who told Casolaro about the Wakenhut Cabazon joint venture that maintained a close liaison with certain elements of the United States government, including representatives of intelligence, military and law enforcement agencies.

Riconosciuto further stated that along with his modification on the PROMIS software that the Wakenhut Cabazon venture was to support the needs of foreign governments and forces including Central America and the Middle East. He also claimed that he was involved with the development of chemical and biological weapons in a project connected with Park-O-Meter (POM), the parking meter company owned by Arkansas’s Seth Ward.

He related that POM received the first loan granted under the state authority known as the Arkansas Development Finance Authority (ADFA) in the amount of $2.75 million. He claimed these weapons were for the Contras and were designed for the C130 transport planes that were at the time carrying weapons and drugs in and out of Mena, Ark. He further stated that he had supervised high-tech equipment transfers and had developed computer software to help launder drug money emanating from the Mena operation.

Riconosciuto confirmed Casolaro’s theory and asserted that all scandals overlapped, but amid Casolaro’s investigation a pattern of mysterious deaths was emerging.

Affiliated with the Cabazon Indian Reservation, Alfred Alvarez and two friends opposed the takeover of the reservation by Wakenhut Corporation. They were murdered in July 1981.

Paul Morasca was murdered in January 1982 in the San Francisco condominium he shared with Michael Riconosciuto. Morasca had started to expose CIA activities, which included Wakenhut Corporation.

Private  investigator Larry Guerrin, while seeking information for Riconosciuto relating to the Inslaw case, was found dead in Mason County, Washington, in February 1987.

San Francisco attorney David Meyer, who was to appear the following day in District Court, to defend clients who were reportedly tied in with CIA drug trafficking activates, died from a gunshot wound on February 6, 1989. Meyer sought to expose links between the Justice Department, the CIA and Iran-Contra.

On August 14, 1990, attorney Dexter Jacobson was found dead prior to a scheduled meeting with the FBI in regards to rampant Chapter 11 judicial corruption.

Attorney Gary Ray Pinnell, was found dead on February 11, 1991, just before he, too, was to present Chapter 11 corruption to the FBI.

The body of Alan D. Standorf was found on January 31,1991, in the back seat of a car parked at the Washington National Airport.


Casolaro had depended upon Standorf as a source and it is believed that Standorf, an electronic intelligence employee for the NSA, provided the reporter information that linked the Justice Department to the various scandals.

In April 1991, attorney David Eisman was shot to death 24 hours before he was to meet with Riconosciuto. Involved with numerous CIA activities, Eisman had been scheduled to meet with a woman in Philadelphia who was to deliver important evidence of corruption by Justice Department officials.

Alan May was found dead in his San Francisco home on June 19, 1991. May was reportedly involved with Riconosciuto in the Iranian hostage scandal and October Surprise. The local coroner’s report stated death was due to a heart attack, but a subsequent autopsy revealed that May had poly-pharmaceuticals in his blood.

In 1991, Tommy Burkett was found dead in the bedroom of his parent’s Hendon, Virginia, home from a gunshot wound to the mouth. Ruled a suicide by pathologist James Beyer, an outside pathologist, hired by Burkett’s parents, ruled that more bodily damage than normally associated with a self-inflicted wound had been found. Previous to his death, Burkett had been meeting with Casolaro, but it is unclear as to what information may have been provided.

As Casolaro continued his investigation he began to receive death threats. Undaunted, he continued his work, but told his brother, “if there was an accident and he died, not to believe it.” Preceding his death, Casolaro traveled to Martinsburg, Virginia, for a meeting with sources on Inslaw, whom Casolaro described as a relative of Mrs. Barbara Videnieks, Chief of Staff to Senator Robert Byrd of West Virginia. Peter Videnieks, husband to Barbara, served as the Justice Department’s Contracting Officer on the PROMIS Implementation Contract. During the final week of his life, Casolaro told at least five confidants that he had finally broken the Inslaw case after a year-long, full-time investigation.

The day before he died, Casolaro met William R. Turner in the parking lot of the Sheraton Hotel, in Martinsburg, to take delivery of sensitive documents that Turner had been hiding for Casolaro. According to Turner, Casolaro intended to show the documents to his sources  later in  the  evening.  Casolaro  told Turner that the Friday evening meeting in Martinsburg had been arranged by Joseph Cueller, a U.S. Army Special Forces covert intelligence officer.

On August 11, 1991, Casolaro was found dead in the bathroom of his room at the Sheraton Hotel. His wrists were slashed ten times; his briefcase and notes missing. Casolaro’s body was embalmed before the family was notified of his death, despite the fact that identification was found among his personal belongings. Sources close to the investigation claim that a NSA employee was also in the hotel room at the time of Casolaro’s death. He too was murdered; his body removed from the scene.

Following the death of Casolaro, Inslaw Attorney Elliot Richardson called for an investigation. “It’s hard to come up with any reason for this death,  other than he was deliberately murdered because he was so close to uncovering sinister elements in what he called The Octopus,” Richardson said. A congressional subcommittee on Economic and Commercial Law of the Committee on the Judiciary held hearings on Inslaw and the related death of Danny Casolaro. Its findings, which were released in a report issued on September 10, 1992 accused Justice Department officials of criminal misconduct and recommended the appointment of a special prosecutor.

Attorney General William Barr refused to appoint a special prosecutor, but appointed Chicago attorney Nicholas Bua, a former U.S.  District Judge, and his law partner. Charles Knight of the Chicago law firm Burke, Bossleman & Weaver, and five Justice Department prosecutors to investigate the misconduct. Bua impaneled a grand jury, however, midway through the investigation, Bua dismissed the jury and impaneled another one.

This action triggered a citizen’s group in Chicago, called “Citizen’s Committee to Clean Up the Courts”, to file a lawsuit against Bua and Knight. Two of the plaintiffs in the action, Sherman Scholnick, chairman of Citizen’s Committee and Mark Sato, a legal researcher and writer, met with Bua and advised him that they were going to present evidence to the grand jury relating to misconduct on the part of the Justice Department.

Skolnick claims that the first grand jury was giving credence to the evidence being presented and therefore constituted a “runaway” grand jury by exercising their allowed independence and thus acting contrary to the wishes of the U.S. attorney. Skolnick, a self-taught legal expert, states that 40 key witnesses, who were to give testimony to the grand jury, were murdered by agents within the Justice Department. Skolnick told Bua that what was occurring was considered “obstruction of justice” and demanded protection of witnesses, how-ever, Bua refused to give into Skolnick’s demands, and the pattern of mysterious deaths continued.

On November 1, 1992, the bodies of Gail Spiro and her three children were found in their Rancho Santa Fe, California, home, dead from gunshot wounds to the head. Three days later the body of Gail’s husband, Ian Spiro, was found dead in the front seat of his Ford Explorer in the remote California desert.  Authorities ruled that Ian Spiro had murdered his wife and children and then had taken his own life. Spiro had connections to the CIA and had been involved in numerous covert operations. At the time of his death, he was helping Michael Riconosciuto collect documents to be presented to a federal grand jury in connection with Inslaw.

On November 14, 1992, Jose Aguilar, a tree trimmer who occasionally worked at the Spiro home, was found dead from a gunshot wound to the head.
 
Peter Sandvugen, found dead on December 2, 1992, was assisting Riconosciuto in his defense against the Justice Department. Sandvugen was a part of a special CIA team during the eighties, and as the gun he always carried was found without the ammo clip, the circumstances of his death raised questions.


In June 1993, the Bua Report was released and exonerated Justice Department officials from any wrong doing in the case. Inslaw Attorney Elliot Richardson, issued a statement on June 18, 1993. “What I have seen of [the report] is remarkable both for its credulity in accepting at face value denials of complicity in wrongdoing against Inslaw and for its failure to pursue leads making those denials implausible,” Richardson said.

On July 23, 1993, Washington attorney Paul Wilcher was found dead in his apartment under mysterious conditions. Seeking to expose the connection between The October Surprise, Iran-Contra, BCCI and the Inslaw scandals, at the time of his death he was investigating gun-running out of Mena, Arkansas. Shortly before his death, he wrote Attorney General Janet Reno a 105 page letter describing evidence that he had concerning the various scandals. The first page of the letter stated in part, “The lives of key participants, other witnesses and even myself, are now in grave danger as a result of my passing this information on to you.

If you let this information fall into the hands of the wrong persons...some or all of those who know the truth...could well be silenced in the very near future.” Vali Delahanty disappeared on August 18, 1992. At the time of her disappearance, she had been trying to warn Michael Riconosciuto that the DEA and Justice Department officials were about to frame him on drug charges. On April 13, 1994, the skeletal remains of her body were discovered at Lake Bay, Washington. Following the issuance of the Bua report, attorneys for Inslaw issued a rebuttal and later an addendum.

In the Addendum to Inslaw’s Analysis and Rebuttal of the Bua Report, issued February 14, 1994, it states, “According to current and former Justice Department employees, the Justice Department has its own covert intelligence agency that operates out of the  Criminal  Division’s  Office  of  Special Investigations (OSI); its intelligence agents have virtually nothing to do with OSI’s publicly declared mission of locating and deporting Nazi war criminals. OSI in turn, has its own proprietary company that allegedly employs scores of agents of diverse nationalities, as well as individuals who appear to be holding other jobs in U.S. Government departments and agencies, and in the U.S. Armed Forces...OSI has  allegedly participated in the illegal trafficking in PROMIS software and in the murder of the investigative journalist Danny Casolaro.”

In December 1993, Associate Attorney General Webster Hubbell, then the third ranking official at the Justice Department, reopened the investigation into Casolaro’s death. One month later, however, Hubbell was forced to resign his position at Justice. The Rose Law Firm declared that Hubbell had failed to provide documentation for expenses charged to the firm and POM had lost $1 million in litigation fees.  This was done when Hubbell pursued a patent infringement case which he took on a contingency basis for his brother-in-law Skeeter Ward.

POM’s admitted jobs for the Pentagon and questionable  finances  at  the  ADFA  remained obscure as Hubbell’s representation of POM became the official reason for his resignation.  Critics have charged that then Governor Bill Clinton  passively  resisted  investigating  POM and the Mena operation, but the real reason for his passivity may have been the obvious tie-in with the related scandals of Casolaro’s Octopus.

Last fall, Congressman Jack Brooks (D-Texas), introduced HR4862. If passed, the bill would have countered the Bua report, legally binding the Federal Claims Court to an independent investigation into the Inslaw scandal. On September 27, 1994, Attorney General Janet Reno issued a report stating that there was no scandal, no need for an Independent Counsel or further  investigation;  on  October  7,  the resolution was defeated.

In reviewing the Inslaw scandal, a pattern of fraud and deceit involving the Justice Department is readily observed. Just how long will it take before this pattern of corruption is exposed and weeded out is pure conjecture, but the obvious crimes committed by this agency should enrage every taxpaying citizen in the country.

Equal justice under the law is an adage that has long since expired and, clearly, the Justice Department no longer understands what the word “justice” means. Someone please give them a dictionary.

Also see:  PROMIS software

Offline lordssyndicate

  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Re: Ptech originated in the NSA-You messed with the NWO's baby, you DIED
« Reply #1 on: April 01, 2009, 01:50:43 pm »
Here's  a description of how PROMIS works:
http://orlingrabbe.com/ricono.htm

Michael Riconosciuto on Encryption
by J. Orlin Grabbe

Michael Riconosciuto is one of the original architects of the PROMIS backdoor. PROMIS was a people-tracking software system sold to intelligence organizations and government drug agencies worldwide. The global dispersion of PROMIS was part of a U.S. plot to spy on other spy agencies.

Riconosciuto, who was Director of Research for a Wackenhut-Cabazon Indian joint venture, oversaw a group of several dozen people who worked out of business offices in nearby Indio, California. According to the testimony of Robert Booth Nichols, a CIA agent associated with Meridian International Logistics and connected to Music Corporation of America (MCA), Riconosciuto was in frequent contact with Bobby Inman, Director of the National Security Agency (NSA) and then Deputy Director of the Central Intelligence Agency (CIA), during this time.

Since intelligence computers are, for security reasons, usually not connected to external networks, the original backdoor was a broadcast signal. The PROMIS software was often sold in connection with computer hardware (such as a Prime computer) using a specialized chip. The chip would broadcast the contents of the existing database to monitoring vans or collection satellites using digital spread spectrum techniques whenever the software was run.

Spread spectrum techniques offer a way to mask, or disguise, a signal by making it appear as "noise" with respect to another signal. For example, one may communicate covertly on the same spectrum as a local TV broadcast signal. From the point of view of a TV receiver, the covert communication appears as noise, and is filtered out. From the point of view of the covert channel, the TV signal appears as noise. In the case of the PROMIS broadcast channel, the signal was disguised as ordinary computer noise--the type of stuff that must be reduced for TEMPEST certification in the U.S.

In spread spectrum frequency communication, the transmitted spectrum is much wider than what is really necessary. In digital communication, the transmission widths of digital signals are expanded so that many "bit periods" are needed to represent one bit at baseband. This results in an improvement in the signal-to-noise- ratio. Spread spectrum techniques are used extensively in covert military communications and secure satellite systems.

The covert communication channel operates off a pseudo-random binary sequence, such as a stream cipher. Stream ciphers differ from block ciphers such as DES (the Data Encryption Standard) widely used in banking.

A block cipher applies a static transformation to a fixed block of data. The DES algorithm, for example, encrypts a 64-bit block of data using 64-bit keys. (The effective key size is actually 56 bits, since every eighth bit is considered a parity bit and is disgarded.) In DES electronic code book (ECB) mode, each 64-bit block of data is encrypted separately from every other block. In cipher block chaining (CBC) and cipher feedback (CFB) mode, the encryption of the current data block is dependent on previous data blocks. But under any one of these three DES modes, the transformation of a given data sequence with a given DES key will nevertheless result in the same ciphertext, regardless of the time the encryption takes place.

A stream cipher, by contrast, applies a time- varying transformation to individual digits or bits of data. "Time-varying" means the same sequence of plaintext data bits seen at two different points in time will be encrypted to a different sequence of ciphertext data bits.

To illustrate this for a simple case, suppose we are doing encryption using simple XOR rules of addition, adding keybits k to plaintext bits x on a bit by bit basis to obtain cipher bits y: y = x + k. XOR addition follows the rules

0+0 = 0
0+1 = 1
1+0 = 1
1+1 = 0.


Suppose the plaintext data is "1011". The current key might be "1010". Then the ciphertext data is

1011+1010 = 0001.

The ciphertext "0001" gives no information about the original plaintext. The plaintext could have been any one of 2^4 = 16 possible sequences of 0s and 1s. To restore the original plaintext, we XOR the ciphertext "0001" again with the key "1010" to obtain

0001+1010 = 1011.

In a stream cipher, the keystream will typically be different at different points of time. This the encryption of a repeated plaintext "1011" might take the form

 
time 1:  1011 + 1010 = 0001
time 2:  1011 + 1111 = 0100
time 3:  1011 + 0011 = 1000


and so on for other times. In this example, the "time- varying transformation" takes the simple form of a time- varying keybit stream.

The most famous stream cipher is the Verdam cipher, or "one-time pad", which follows the encryption scheme just described. If the current time is i, the current plaintext bit is x(i), and the current key bit is k(i), then the ciphertext bit is y(i) = x(i) + k(i). The number of key bits, N, must exceed the number of plaintext bits M: N>M. The bits in the keystream sequence k(1), k(2), . . . , k(N) must be independently and uniformly distributed, and are used only once and then disgarded (hence "one- time pad"). Of course, this scheme--while not breakable by cryptanalysis--has other security problems. It requires both parties to have a copy of the current key, and the key to be kept secret from all hostile parties. This in turn requires that the keys be generated, stored, and communicated in a totally secure manner--a massive problem in itself. So one-time pads are typically only used in "hot lines", such as the old Red Telephone between Moscow and Washington, D.C. that was installed with the hope that a little jawboning could help avert nuclear war. ("Can we talk?")

Practical cryptography for digital and analog communication thus uses "keystream generators" which typically determine the keystream as some function f of an underlying key K, and the current state of the system s(i):

k(i) = f(K, s(i)).

This key stream k(i) can be added to the original bit stream to produce a new (encrypted) stream (as is done in "direct sequence" spread spectrum systems). Or the key stream can be used to make the carrier frequency hop around within the spread sprectrum bandwidth (as is done in "frequency hopping" systems). Many variations and combinations are possible.

Like many people associated with PROMIS (including Earl Brian, the man who sold it around the world), Michael Riconosciuto is in jail. Riconosciuto was convicted on charges relating to the construction of a methamphetamine lab.

Michael Riconosciuto appears in a recent manuscript The Last Circle by "Carol Marshall" (whose real name is Seymour). Much of the book is based on interviews with, and files purloined from, Riconosciuto. Part of the subject matter of The Last Circle involves the West Coast activities of "The Company", a paramilitary drug dealing operation using ex-law enforcement and ex-intelligence personel that was based in Lexington, KY, in the late 70s and early 80s. However, because The Last Circle makes extensive use of Riconosciuto's files, it is also concerned with many other activities, including in particular a biowarfare project undertaken by the Wackenhut-Cabazon Indian joint venture. ("The Company" itself is the subject of another book entitled The Bluegrass Conspiracy by Sally Denton.)

Riconosciuto wrote me in regard to a speech I gave to the Libertarian Party of Colorado on digital cash on April 20, 1997. I have added some comments with respect to the issues mentioned.

May 8, 1997
M. Riconosciuto
21309-086 Med. A-1
Box 819
Coleman, FL 33521
"Orlin,

"[Name omitted] has been sending me some of your published material for some time. I have some questions concerning your talk on digital cash. :

"First a little of my background. I started with computers when a "laptop" was an IBM porta-punch. My first serious computing experience was on an IBM system 1620. I went from there to the IBM 7090/7094 systems and from there to the then "new" IBM 360 family. I missed the 370 generations, because during that time my responsibilities had me in a position where comp center staff handled all my data processing. I have been on the DEC/PDP systems since they first came out (PDP 8, PDP 10, PDP 11) and stayed with them as they matured into the VAX system. My programming experience runs the gamut from absolute coding sheets in unit record type systems, to top down/structured programming. I have been at this for awhile. I am not impressed by the Intel/MS standard that has taken over the computing world. Although I might note that Windows NT has suspicious similarity to the VAX/VMS operating system.

"Up until six months ago I had access to a computer and the latest literature because of my inmate job assignments in facilities management and prison industries. We had a high end Pentium CAD set up in facilities and a network connection on a Data General Avion system in Unicor prison industries. I also had the responsibility of maintenance on a Honeywell building automation control DDC-HVAC system.

"As a direct result of the TV interview with the Germans I was pulled off my premium inmate job and re- assigned to the duty of picking up cigarette butts in the recreation yard for $5 per month. This was inspite of exemplary job assignment reports and no disruptive behavior incidents."

            [Comment: Riconosciuto is referring here to an interview he gave on the PROMIS backdoor to German television.]

"[paragraph omitted]

"The point of all this is to make it clear that I am not that far out of touch with the current state of the art.

"This brings me to the first question that I want to ask about your digital cash speech.

"1) In your reference to the "discrete logarithm problem" are you taking into consideration the Donald Coppersmith work? Coppersmith developed a computationally feasible way to take discrete logarithms back in the 80s. Needless to say, this work has been played down, but it has been in the open literature."

            [Comment: The discrete log problem is the problem of finding x such that g^x =y mod n, for a given y, g, and n. Here x is the discrete logarithm of y to the base g. Since this is hard to do, one can form a public/private key system with x as the private (secret) key and y = g^x mod n as the public key.

            [Of course, the hard-to-do job of taking discrete logarithms may not be the only way to approach a given problem. The security of Diffie-Hellman, to which I referred in my speech, is apparently based on discrete logarithms, but is susceptable to a simple attack by a person in the middle of the communication process. In Diffie- Hellman, Alice generates x and send Bob g^x mod n. Bob generates y and sends Alice g^y mod n. They both then calculate g^(xy) mod n as the session key. (The best an observer can do is calculate g^(x+y), without taking discrete logarithms.) However, if Eve controls all communication between the two, she can substitute her own parameters, and decrypt both sides of the conversation before forwarding the messages. Be this as it may, Diffie introduced a simple variant of this process--called Station to Station (STS) protocol--which completely eliminates the man-in-the-middle attack.

            [Riconosciuto refers to the work of Coppersmith [1], [2] in finding discrete logarithms. Coppersmith greatly increased the efficiency of finding discrete logs in fields of characteristic 2 (which use digits 0 and 1, and thus are efficient in programming), so that the modulus has to be of the order of n = 2^1000 to be secure.]

"2) You of course are aware that RSA type algorithms are no more secure that the modulus is difficult to factor. Are you aware of the latest advances in . . . differential cryptanalysis and meet in the middle techniques? Are you aware of the work by Lenstra . . . et al with their methods of quadratic sieves etc?"

            [Comment: Riconosciuto is refering here are to several types of cryptanalytic attacks. Differential cryptanalysis and meet-in-the- middle generally refer to attacks on DES, while the work of Lenstra is directly relevant to RSA.

            [The methods of Lenstra [3], Cohen and Lenstra [4], and Pomerance, Rumely, and Adleman [5], use Fermat's Little Theorem (or its analog in extension fields of rational numbers) and Gauss and Jacobi sums to test for primality.

            [The quadratic sieve for factoring n has running time of the order of exp((ln n ln ln n)^.5). A slightly faster method is [6] the number field sieve, which has running time of the order of exp((ln n)^(1/3) (ln ln n)^(2/3)).]

"3) Have you ever heard of the Hilbert spectral processing technique and its application to high speed factoring systems?

            [Comment: I'm not sure exactly what Riconosciuto has in mind here. But communication signals can be decomposed into addable parts using systems of orthogonal functions such as Fourier series or Walsh functions.

            [Riconosciuto may be referring to the results of Xiao and Massey [9], who characterize correlation-immune functions in terms of their Walsh transforms.]

"4) Are you familiar with fast elliptical encryption methods?"

            [Comment: I did not refer to these in my speech as they are fairly complex. Elliptic curve cryptosystems stem from the work of Neal Koblitz [7] and others.

            [The analog of taking a power in modular arithmetic is multiplication on elliptic curves. So the analog of the Diffie- Hellman problem in the elliptic curve world is to find the integer n such that nB = P, where B and P are points on an elliptic curve. Here n can be thought of as the "discrete logarithm" of P to the base B. Elliptic curve cryptosystems are believed to offer equal security at shorter key lengths.]

"5) Do you remember the hard knapsack problems of Merkle and Hellman and how they fell?"

            [Comment: Knapsack problems were so- named because they resemble the problem of fitting a number of items k into a total volume V--like packing a knapsack.. They have the characteristic that they are NP- complete, so that theoretically an encryption scheme could be constructed from them that is not solvable in polynomial time (with respect to k). However, the original Merkle-Hellman knapsack was broken by Shamir. So Riconosciuto is suggesting that implemented discrete log systems may have hidden weaknesses much like the original knapsack encryption systems. There is a knapsack system due to Chor and Rivest that hasn't been broken yet, to my knowledge.]

"This should be a good place to start. Let me know if you receive my letter. [sentence omitted.]

"Michael Riconosciuto
"21309-086"

            [Comment: Encryption issues are important. However, I doubt they will be the deciding security issue in most systems of digital cash. Ross Anderson [8] has accumulated a lot of evidence from the financial services industry that demonstrates that most security failures involve errors in protocol or in implementation. Equally important, most current systems that have been called "digital cash" have been designed with deliberate security holes to allow monitoring of transactions at critical points.]


References
[1] D. Coppersmith, "Fash Evaluation of logarithms in fields of characteristic two," IEEE Transactions on Information Theory, 30, 1984, 587-594.

[2] D. Coppersmith, A. Odlyzko, and R. Schroeppel, "Discrete Logarithms in GF(p)," Algorithmica 1, 1986, 1- 15.

[3] A. Lenstra, "Primality testing," Cryptology and Computational Number Theory, Proc. Symp. Appl. Math, 42, 1990, 13-25.

[4] H. Cohen and H. W. Lenstra, Jr., "Primality testing and Jacobi sums," Math. Comp. 42, 1984, 297-330.

[5] L.M. Adleman, C. Pomerance, and R.S. Rumely, "On Distinguishing prime numbers from composite numbers," Annals of Math. 177, 1983, 173-206.

[6] A. Lenstra and H. W. Lenstra, Jr., eds. The Development of the Number Field Sieve, Springer-Verlag, 1993.

[7] Neal Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, 1994.

[8] Anderson, Ross, "Why Cryptosystems Fail," Association for Computing Machinery, 1st Conf.- Computer and Comm. Security `93, November 1993.

[9] G. Z. Xiao and J. L. Massey, "A spectral characterization of correlation-immune functions," IEEE Transactions on Information Theory, 34, 1988, 569-571.

Posted September 2, 1997

Web Page: http://www.aci.net/kalliste/homepage.html
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Anti_Illuminati

  • Guest
Re: INSLAW/PROMIS/Ptech/ - The FOUNDATION of World Government EXPOSED -
« Reply #2 on: April 01, 2009, 04:23:13 pm »
Former Israeli intelligence agent Ari Ben-Menashe, claims that Brain contacted Rafi Eitan, a former Mossad agent and counter terrorism adviser to Israel with the intent that the software be sold to intelligence agencies around the world.

Source

Ben-Menashe further claims that it was Rafi Eitan who initiated the idea of installing a “trap door” into the software, which would permit the Mossad to secretly enter the database after it was sold, thus allowing them to spy on countries that purchased the program.

Rafael ('Rafi') Eitan (born November 23, 1926) is the leader of Gil - Gimla'ey Yisrael LaKneset (pensioners of Israel to the Knesset) party which has won an unexpected large number of seats in the Israeli legislative election of 2006. In 1960, he was in-charge of the Mossad operation that lead to the capture of [[Adolf Eichmann]]. He served as an advisor on terrorism to Prime Minister Menachem Begin, and in 1981 he was appointed to head the Bureau of Scientific Relations, then an intelligence entity on par with [[Mossad]], [[Aman]] and [[Shabak]]. Eitan assumed responsibility for and resigned over the [[Jonathan Pollard]] affair, and the Bureau was disbanded.From 1985 until 1993, he was head of the government's Chemicals company, which was expanded under his leadership. After 1993, he became a businessman, noted for several large scale agricultural and construction ventures in Cuba.

In 2006, he accepted the offer to head the list for Gil. According to the book Gideon's Spies by Gordon Thomas, during the mid 1980's the Thatcher government in Britain developed a relationship with Eitan as an advisor to MI6 on counterterrorism operations in Northern Ireland. This relationship came to a head in 1985, when Mossad agents helped track an IRA bomb team in Gibralter. The three member IRA team was killed by the British SAS, under highly contoversial circumstances. It was subsequently reported in British papers that Rafi Eitan and Mossad had played a surveilance role in the operation, and IRA command put out orders for assassination teams in Ireland and Britain to find and kill Rafi Eitan. Due to this threat of Assassination, and the embarrassment of the Israeli government over Eitan's unauthorized relationship with the operation, Eitan left Britain and ended his relationship with Britain's intelligence services. This incident strained Israeli/British relations for several years.

EXECUTIVE SUMMARY'' Eleven years ago, the Justice Department's [[PROMIS]] Project Manager arranged for an Israeli Government official to visit INSLAW for a PROMIS briefing and demonstration. The Justice Department told INSLAW that the visitor was a prosecuting attorney from the Israeli Ministry of Justice who would be overseeing a project to computerize the public prosecution offices in Israel. Three months after the visit, the Justice Department secretly turned over to a representative of the Israeli Government a copy of the PROMIS software, according to a contemporaneous internal Justice Department memorandum made public by the House Judiciary Committee in its [[September 1992 Investigative Report, The INSLAW Affair|http:www.eff.org/legal/cases/INSLAW/inslaw_hr.report]]. INSLAW followed up on this disclosure by the House Judiciary Committee by contacting the Israeli Ministry of Justice in Tel Aviv about the "prosecuting attorney" who had visited INSLAW ten years earlier in February 1983.

After obtaining information from the Ministry about the current location of the prosecuting attorney, INSLAW consulted with two journalists in Tel Aviv. One journalist interviewed the now-retired prosecuting attorney at his home in Jerusalem. The prosecuting attorney bore no resemblance to the visitor to INSLAW and was unfamiliar with some important aspects of the visit to INSLAW, although he claimed to have been the February 1983 Israeli visitor to INSLAW. The other journalist told INSLAW that the prosecuting attorney's name has been used in the past as a pseudonym for [[Rafi Eitan]], a legendary Israeli intelligence official. INSLAW employees who had met with the Israeli visitor in February 1983 attempted to identify the visitor from a police-style photographic line-up. The process was videotaped in the studio of a national television network. The photographic line-up confirmed that the visitor to INSLAW was neither a prosecutor nor an attorney, but Rafi Eitan.

At the time of the visit to INSLAW, Rafi Eitan was Director of [[LAKAM]], a super-secret agency in the Israeli Ministry of Defense responsible for collecting scientific and technical intelligence information from other countries through espionage. Rafi Eitan became well known in the United States, several years after his visit to INSLAW, when [[Jonathan Pollard]], a U.S. Navy civilian intelligence analyst, was arrested and charged with spying for Rafi Eitan and Israeli intelligence. During the interim between Rafi Eitan's visit to INSLAW and the delivery of a copy of PROMIS to an Israeli official, the Government's PROMIS Project Manager and others in the Justice Department pressured INSLAW to deliver to the [[DOJ]], without any protection for INSLAW's property rights, the proprietary version of PROMIS that was not required to be delivered under INSLAW's PROMIS Implementation Contract. The particular proprietary version of PROMIS that was the object of this Justice Department pressure was the version that INSLAW had demonstrated to the Israeli Government visitor and that operates on a VAX computer.

INSLAW was operating this proprietary version of PROMIS on a computer at INSLAW's offices and using it to support each of the 10 largest U.S. Attorneys' Offices, via telephone lines. Under its three-year contract, INSLAW was to provide this PROMIS computer time-sharing service on an interim basis until each of the U.S. Attorneys' Offices acquired its own computer, and INSLAW thereafter was to install an earlier, public domain version of PROMIS on those computers. The Justice Department explained this pressure to obtain immediate delivery of a copy of the proprietary VAX version of PROMIS by a suddenly-professed concern about INSLAW's financial viability. In response to this professed concern, INSLAW offered to place a copy of the VAX version of PROMIS in escrow in a local bank; that would have been the accepted industry remedy for the professed problem. The Justice Department, however, rejected INSLAW's escrow offer and insisted on immediately obtaining physical custody of a copy of the proprietary VAX version of PROMIS.

The Justice Department eventually accomplished its objective of physical custody of a copy of the VAX version of PROMIS through a bilateral modification to the contract in which the Government committed itself, inter alia, not to disseminate the proprietary version of PROMIS outside the U.S. Attorneys' Offices. This was the April 11, 1983 Modification #12 to the PROMIS Implementation Contract. None of the U.S. Attorneys' Offices had a VAX computer, without which it is impossible to use a VAX version of PROMIS.  Two lower federal courts found that the Justice Department entered into Modification #12 in order to "steal" the proprietary version of PROMIS "through trickery, fraud and deceit." The House Judiciary Committee independently confirmed those findings in the course of a three- year-long investigation. Rafi Eitan emerged again in the INSLAW affair in 1986 when INSLAW filed a lawsuit against the Justice Department over the theft of the PROMIS software. INSLAW's lead litigation counsel was fired by his law firm amid secret communications between the law firm and the two highest officials of the U.S. Justice Department.

The Attorney General stated under oath and the Deputy Attorney General claimed to the Senate that the secret discussions were about the INSLAW case; the law firm claimed to the press that the secret discussions were about its concurrent representation in the Jonathan Pollard-Rafi Eitan espionage case. In May 1986, three years to the month after the Justice Department secretly turned over a copy of PROMIS to an Israeli Government official, INSLAW and senior partners in the law firm that was then serving as INSLAW's litigation counsel reviewed a complaint, drafted by INSLAW's lead counsel, for the lawsuit against the Justice Department about the theft of the proprietary version of PROMIS. The complaint contained over 50 references to Jensen; included was a 23-paragraph section that described the "personal involvement" of then Deputy Attorney General [[D. Lowell Jensen]] in the INSLAW affair, beginning with Jensen's tenure as Assistant Attorney General for the Criminal Division during the first several years of the Reagan Administration.

Anti_Illuminati

  • Guest
Re: INSLAW/PROMIS/Ptech/ - The FOUNDATION of World Government EXPOSED -
« Reply #3 on: April 01, 2009, 04:26:51 pm »
The law firm immediately rejected the complaint that had been drafted by the lead counsel and set about to redraft the complaint in its entirety, assigning two additional lawyers to the INSLAW case for that purpose. These lawyers soon produced a new complaint that omitted every reference to the role of D. Lowell Jensen. Prior to the filing of the revised complaint in U.S. Bankruptcy Court, the lead counsel inserted, at INSLAW's insistence, a single parenthetical reference to Jensen's role. In October 1986, three months after INSLAW filed its lawsuit, the law firm fired INSLAW's lead counsel who had by then been a partner in the firm for 10 years.

The lead counsel told INSLAW at the time that he had been fired for naming Jensen in the complaint. He also told INSLAW at the time that the Managing Partner had stated that Senior Partner [[Leonard Garment]] had instigated the firing. On October 6, 1986, one week before Leonard Garment and the other members of the law firm's Senior Policy Committee met to vote on the decision to expel INSLAW's lead counsel from the firm, Garment had a social luncheon regarding INSLAW with Deputy Attorney General [[Arnold Burns]]. Garment never disclosed this fact either to INSLAW's lead counsel or to INSLAW.

Burns had succeeded Jensen as Deputy Attorney General in the summer of 1986 when Jensen left the Justice Department to become a U.S. District Court Judge in San Francisco. During the luncheon, Burns complained to Garment about the litigation strategy that INSLAW's lead counsel was pursuing in its lawsuit against the Department and signalled to Garment his willingness to discuss a settlement, according to Burns' later disclosures to the Senate Permanent Investigations Subcommittee.

Attorney General Meese also talked to Garment in October 1986 about INSLAW and about Garment's conversation with Burns relating to INSLAW, according to later sworn Justice Department responses to INSLAW interrogatories. In early 1988, in statements to the press, Garment disclaimed any recollection of a discussion about INSLAW with Deputy Attorney General Burns and insisted that his October 1986 discussion with Attorney General Meese had been about Israel, not INSLAW.

Moreover, Garment elaborated on this claim, reportedly telling at least one journalist that it was a discussion of a "back channel" communication that Garment had had with the Government of Israel about the Pollard case, which Garment described to the journalist as a national security problem affecting both Israel and the U.S. Justice Department.

The Israeli Government had retained Garment in an effort to prevent the indictment by the U.S. Justice Department of other Israeli officials involved in the Pollard espionage scandal. The central role of Rafi Eitan and Israeli intelligence in both the INSLAW affair and the Pollard espionage scandal may account for why Meese and Burns characterized the October 1986 discussions with Garment as having to do with INSLAW, while Garment insisted they were really about a national security problem of concern to both Israel and the U.S. Justice Department.

When Garment's law firm fired INSLAW's lead counsel, it agreed to make severance payments to him in excess of half-a-million dollars and contractually bound him to secrecy about the severance. Soon after firing INSLAW's lead counsel, the law firm, which had, by then, been representing INSLAW for almost a year, suddenly claimed to have discovered fatal deficiencies in the evidence available to prove the Justice Department's 1983 theft of PROMIS.

The law firm presented INSLAW with a written ultimatum to concede to the Justice Department on that question or find new litigation counsel. INSLAW found new litigation counsel and proved in the U.S. Bankruptcy Court and the U.S. District Court that the Justice Department had stolen the PROMIS software in 1983. A former Israeli intelligence official, Ari Ben Menashe, published a book in the fall of 1992 entitled Profits of War, that contains specific claims about Rafi Eitan and the PROMIS software, many of which are plausible in view of the aforementioned facts.

According to the author, a high-ranking member of the White House National Security Council staff was personally involved in the delivery of a copy of the proprietary version of PROMIS to Rafi Eitan during a visit by Rafi Eitan to Washington, DC in the early 1980's. [[Robert McFarlane]], who during the relevant period was Deputy National Security Advisor to President [[Ronald Reagan]], and Earl W. Brian, a private businessman who had been a member of the California cabinet of Governor Ronald Reagan, secretly presented INSLAW's proprietary software to Rafi Eitan, according to the author.

The objective of the alleged White House gift of INSLAW's software to Rafi Eitan and Israeli intelligence was for Israeli intelligence, through sales conducted by cutout companies, to disseminate PROMIS to foreign intelligence agencies, law enforcement agencies, and international commercial banks so that PROMIS could function in those target organizations as an [[electronic Trojan horse]] for Allied signal intelligence agencies, according to the author.  Among the individuals whose companies served as cutouts for the illegal dissemination of PROMIS by Israeli intelligence, according to the author, were [[Earl W. Brian]] and the late British publisher, [[Robert Maxwell]].

Earl W. Brian, for example, allegedly sold the proprietary version of PROMIS to Jordanian military intelligence, so that Israeli signal intelligence could surreptitiously access the computerized Jordanian dossiers on Palestinians. When INSLAW sought redress in the federal courts in 1986 for the Justice Department's 1983 theft of PROMIS, Israeli intelligence intervened to obstruct justice, according to the author.

While employed in Tel Aviv by Israeli military intelligence, [[Ari Ben Menashe]] claims to have seen a wire transfer of $600,000 to Earl W. Brian for use in financing a severance agreement between INSLAW's fired lead counsel and his law firm. Rafi Eitan drew the funds from a slush fund jointly administered by U.S. and Israeli intelligence, and Earl W. Brian was, in turn, to relay the money to Leonard Garment, according to the author.

In a meeting at the Justice Department on December 16, 1993, INSLAW presented a sensitive document, authored by a self-evidently credible person, offering, under appropriate circumstances, to make available evidence corroborative of significant elements of Ben Menashe's published claims. Another aspect of the role of Israeli intelligence in the INSLAW affair is its alleged use of Robert Maxwell as a [[cutout]]. Maxwell's role as a cutout for a foreign nation's sale of computer software has been implicitly acknowledged by the actions of the [[FBI]]. Robert Maxwell's dissemination of computer software was the subject of an FBI foreign counterintelligence investigation in 1984. Ten years later, in January 1994, INSLAW obtained, under the Freedom of Information Act ([[FOIA]]), 18 pages relating to an investigation on this subject in New Mexico in June 1984.

The FBI furnished the documents to INSLAW in response to a FOIA request for documents relating to Maxwell's involvement in "the dissemination, marketing or sale of computer software systems, including but not limited to the PROMIS computer software product, between 1983 and 1992." The FBI heavily redacted the 18 pages and ascribed the redactions to the secrecy requirements of national security.

One month before the FBI released the documents to INSLAW, it partially reclassified two of the pages that had been officially declassified in their entirety one year earlier. The FBI redacted the newly reclassified portions in the copies given to INSLAW. Robert Maxwell also developed a business relationship during the latter half of the 1980's with two computer systems executives from the Meese Justice Department, at least one of whom had responsibilities relating to the proprietary version of PROMIS.

Robert Maxwell set up a tiny publishing company in Mc Lean, Virginia, in August 1985. That company then hired two senior computer systems executives from a unit of the Meese Justice Department that operated the proprietary version of PROMIS. One was the Director of the Justice Data Center, the Justice Department's own internal computer time-sharing facility where the proprietary IBM version of PROMIS was operating for one of the legal divisions under license from INSLAW.

The Director of the Justice Data Center resigned his estimated $90,000-a-year Senior Executive Service position to become Vice President for Technical Services at the six-employee start-up national defense publishing company owned by Robert Maxwell.  In piecing together the puzzle of the Government's theft of the proprietary version of PROMIS from INSLAW, we have noted the role of the Government's PROMIS Project Manager in sending Rafi Eitan to INSLAW under false pretenses and the alleged role of a senior White House National Security official in giving the proprietary version of PROMIS to Rafi Eitan.

Anti_Illuminati

  • Guest
Re: INSLAW/PROMIS/Ptech/ - The FOUNDATION of World Government EXPOSED -
« Reply #4 on: April 01, 2009, 04:32:46 pm »
The missing piece to the puzzle appears to be the piece that links the actions of the Justice Department's PROMIS Project Manager with the alleged actions of the senior White House National Security official. Based on the available evidence, the missing piece appears to be [[D. Lowell Jensen]], who was Assistant Attorney General for the Criminal Division at the time of the theft.

Jensen pre-approved virtually every decision taken by the Government's PROMIS Project Manager under INSLAW's contract, according to the latter's sworn testimony to the House Judiciary Committee. Jensen engineered INSLAW's problems with the Justice Department through specified top Criminal Division aides in order to give the PROMIS business to unidentified "friends," according to Justice Department officials whose statements and backgrounds INSLAW summarized in its July 11, 1993 rebuttal.

At the time of the 1983 theft, Jensen in the Criminal Division and [[Edwin Meese]] at the White House were planning to award a massive sweetheart contract to unidentified "friends" for the installation of PROMIS in every litigative office of the Justice Department, according to statements made in June 1983 by a Justice Department whistleblower to the staff of a Senator on the Judiciary Committee.

The award was allegedly to take place once Meese left the White House to become Attorney General. Jensen and Meese had been close friends since the 1960's when they served together in the Alameda County, California, District Attorney's Office. INSLAW has repeatedly given the Justice Department the names of senior Criminal Division officials under Jensen who either allegedly helped him implement the malfeasance against INSLAW or who allegedly witnessed it.

On more than one occasion, INSLAW summarized for the Justice Department the circumstantial evidence that is at least partially corroborative of these allegations. Based on warnings from confidential informants in the Justice Department, INSLAW has repeatedly emphasized to the Justice Department the absolute necessity of placing these officials under oath before interrogating them, as well as the importance of a public statement by the Attorney General guaranteeing no reprisals.

More than five years have elapsed since INSLAW began furnishing this information to the Justice Department. Not one of these Criminal Division officials has, it appears, ever been interrogated under oath regarding the INSLAW affair. And no Attorney General has seen fit to issue a public statement to Justice Department employees making it clear that the Attorney General wishes employees who have information about the INSLAW affair to come forward, and giving Justice Department employees the public assurance that reprisals will not be tolerated.

One of the senior Criminal Division officials who allegedly knows the whole story of Jensen's malfeasance against INSLAW is Mark Richard, the career Deputy Assistant Attorney General who has responsibility for intelligence and national security matters. In May 1988, the Chief Investigator of the Senate Judiciary Committee told INSLAW that a trusted source, who was in a position to observe Jensen's malfeasance, had identified [Mark Richard] as someone who not only knew the whole story but who was also "pretty upset" about it.

One of the organizational units that reports to Mark Richard is the Office of Special Investigations (OSI). OSI's publicly-declared mission is to locate and deport Nazi war criminals. The Nazi war criminal program is, however, a front for the Justice Department's own covert intelligence service, according to disclosures recently made to INSLAW by several senior Justice Department career officials.

One undeclared mission of this covert intelligence service has been the illegal dissemination of the proprietary version of PROMIS, according to information from reliable sources with ties to the U.S. intelligence community. INSLAW has, moreover, obtained a copy of a 27-page Justice Department computer printout, labelled "Criminal Division Vendor List." That list is actually a list of the commercial organizations and individuals who serve as "cutouts" for this secret Justice Department intelligence agency, according to intelligence community informants and a preliminary analysis of the computerized list.

A significant proportion of the 100-plus companies on the list appear to be in the computer industry. The Justice Department's secret intelligence agency also has its own "proprietary" company that employs scores of agents of diverse nationalities, as well as individuals who appear to be regular employees of various departments and agencies of the U.S. Government or members of the U.S. Armed Forces, according to several sources.

According to written statements of which INSLAW has obtained copies, another undeclared mission of the Justice Department's covert agents was to insure that investigative journalist [Danny Casolaro] remained silent about the role of the Justice Department in the INSLAW scandal by murdering him in West Virginia in August 1991. INSLAW has acquired copies of two relevant written statements furnished to a veteran investigative journalist by a national security operative of the U.S. Government, several months after Casolaro's death.

The individual who reportedly transmitted these written statements to the journalist by fax has testified under oath to being a national security operative for the [FBI] and the [CIA]. Partial corroboration for his claimed work for the FBI is reportedly available in the sworn testimony of several FBI agents during a recent criminal prosecution. One statement purportedly reflects the operative's personal knowledge and belief that Casolaro was killed by agents of the Justice Department and is allegedly written in the operative's own hand.

The other statement is an excerpt from a typewritten set of questions and answers. The questions were posed to a senior CIA official by the investigative journalist; the answers, purportedly from the senior CIA official, were reportedly sent by fax to the journalist by the national security operative, who was acting as an intermediary. The following is the pertinent question and answer:

''Q. Do you have any information for [San Francisco-based investigative journalist] George Williamson yet regarding the Danny Casolaro matter? A. Yes. Casolaro appears to have been working as a free lance writer at the time of his death and was gathering material for a book. He was investigating the INSLAW case. He was on the trail of information that could have made the whole matter public and led to the exposure of the Justice Department and their involvement in the matter. Apparently he was very close to obtaining that information.

We do not agree with the consensus of opinion among the reporters who looked into the matter, that Casolaro committed suicide. Casolaro was murdered by agents of the Justice Department to insure his silence. The entire matter was handled internally by Justice, and our agency was not involved.'' Although these allegations are profoundly disturbing, there is significant circumstantial evidence that bears on the plausibility of the allegations.

As reported in INSLAW's July 11, 1993 rebuttal, Casolaro was scheduled to have his final, follow-up meeting with two sources on INSLAW in West Virginia the night before he died, and one of those sources was connected to the Justice Department's PROMIS Contracting Officer. As reported in this addendum, the meeting between Casolaro and those sources had allegedly been brokered by a covert intelligence operative for the U.S. Government, an Army Special Forces Major. This individual appeared in Casolaro's life during the final several weeks and introduced himself to Casolaro as one of the closest friends of the Government's PROMIS Contracting Officer.

Anti_Illuminati

  • Guest
Re: INSLAW/PROMIS/Ptech/ - The FOUNDATION of World Government EXPOSED -
« Reply #5 on: April 01, 2009, 04:33:05 pm »
Finally, during the final week of his life, Casolaro told at least five confidants something that he had never told a single one of them at any other time during his year-long, full-time investigation: that he had just broken the INSLAW case. The preceding facts and the following information are noted in the July 11, 1993 rebuttal.

Shortly after Casolaro was found dead, the aforementioned covert intelligence operative allegedly made the following statement, in words or substance, to a woman who had been present during several of his meetings with Casolaro: What Danny Casolaro was investigating is a business. If you don't want to end up like Danny or like the journalist who died a horiffic death in Guatemala, you'll stay out of this. Anyone who asks too many questions will end up dead. Not all of the secret Justice Department dissemination of PROMIS has gone through Rafi Eitan and Israeli intelligence.

For example, in June 1983, the month after the Justice Department secretly conveyed a copy of PROMIS to a representative of the Government of Israel, it also, in partnership with the National Security Agency ([[NSA]]), secretly delivered a copy of PROMIS to the [[World Bank]] and the International Monetary Fund ([[IMF]]), according to a recent series of articles in the American Banker's International Banking Regulator.

The Justice Department and its NSA partner conveyed a copy of the\nproprietary VAX version of PROMIS to the two international financial institutions so that the NSA could electronically monitor their operations. This is the same version of PROMIS that the Justice Department had asked INSLAW to demonstrate to Rafi Eitan in February 1983. As noted earlier, the Justice Department had committed itself not to disseminate the proprietary version of PROMIS outside the U.S. Attorneys' Offices.

A second example is the alleged secret Justice Department conveyance of a copy of the proprietary IBM version of PROMIS to the CIA. In September 1993, CIA Director [[R. James Woolsey]] told INSLAW counsel [[Elliot Richardson]] that the CIA is using a PROMIS software system that it acquired from the [[NSA]] and that is identical to the PROMIS software that NSA uses internally and that is described on page 80 of the [[Bua Report]]. The application domain of the NSA's PROMIS is the mission critical application of tracking the intelligence information it produces. The NSA's PROMIS operates on an IBM mainframe computer. This latest CIA disclosure underscores the difficulty the CIA has had in accounting for its PROMIS. The CIA initially told the House Judiciary Committee in writing that it had been unable to locate internally any PROMIS software.

Approximately one year later, the CIA wrote again to the House Judiciary Committee, stating that components of the CIA were operating a software system called PROMIS but that it had purchased its PROMIS from a company in Massachusetts. That PROMIS operates on a personal computer with project management as the application domain.

In both written reports, the CIA inexplicably failed to mention the PROMIS that operates on an IBM mainframe computer at the CIA and that is critical to the CIA's primary mission of producing intelligence information. The third example is the alleged Justice Department secret dissemination of PROMIS to the NSA. Although the NSA is quoted in the Bua Report as claiming that it internally developed its PROMIS, the Toronto Globe and Mail reported in May 1986 that the NSA had purchased a PROMIS software system from a Toronto-based company.

As shown in Exhibit A to INSLAW's July 11, 1993 rebuttal, [[Earl Brian]]'s [[Hadron, Inc.]] sold INSLAW's PROMIS to the same Toronto company in 1983, in a transaction that also allegedly involved [[Edwin Meese]], then Counsellor to the President. The final example concerns the allegation that the Justice Department secretly distributed the proprietary VAX version of PROMIS to the U.S. Navy for an intelligence application on board nuclear submarines.

The Navy confirmed to a reporter for Navy Times that it has a PROMIS software system and that it operates its PROMIS on a VAX computer in support of its nuclear submarines. The Navy's Undersea Systems Center in Portsmouth, Rhode Island, furthermore, notified the reporter in writing that its engineers had locally developed this VAX version of PROMIS; that its PROMIS is installed only at its land-based facility at Newport, Rhode Island; and that its PROMIS has never been installed on board any nuclear submarine.

INSLAW has, however, obtained a document published by the same Undersea Systems Center in 1987 that reveals that its PROMIS is not only operating at the land-based "test facility" in Newport, but is also operational on board both attack class and "boomer" class submarines. The Navy, like the CIA and the NSA, clearly has difficulty in giving a credible accounting of its PROMIS software. The Justice Department continues to try to convince INSLAW, Congress, the press and the American public that the INSLAW affair is, at best, a government contract dispute which could have been resolved long ago if INSLAW had submitted the dispute to the only forum deemed appropriate by the Justice Department: an [[Executive Branch Contract Appeals Board]].

What the evidence summarized in this addendum demonstrates, however, is that the essence of the INSLAW affair is radically different. The INSLAW affair was a premeditated, cynical and deceitful taking of INSLAW's software property by the chief law enforcement agency of the United States without due process of law and without compensation to INSLAW in violation of the Fourth Amendment to the Constitution.

They [the Hamiltons] don't know squat about how dirty that\n INSLAW deal was. If they ever find out half of it, they will\n be sickened. It is a lot dirtier for the Department of Justice than Watergate. It is not just the breadth of it, but also the depth of it. The Department of Justice has been compromised at every level. - Statements attributed to a senior Justice Department career official by the Chief Investigator of the Senate Judiciary Committee in 1988 (Schematic depicting the alleged use of INSLAW's PROMIS Computer Software Product to satisfy a longstanding need for compatible database software within the U.S. Intelligence community.)

Federal Bureau of Investigation (FBI)\Individual Agency PROMIS Database - known internally as [[FOIMS]] (Field Office Information Management System) Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), Individual Agency PROMIS Database\Master PROMIS Database\White House National Security Council (NSC), Individual Agency PROMIS Database\Primary Telecommunications\Network for PROMIS Data \National Security Agency (NSA)\Exchange: INFO NET\Individual Agency PROMIS Database\Alternative Telecommunications\Networks for PROMIS Data\Exchange:

Internet Use Net\Each Nuclear Submarine allegedly has a copy of the CIA's Master PROMIS Database in the event of a national emergency. Each submarine receives regular updates from the CIA via one of the telecommunications networks.

Anti_Illuminati

  • Guest
April 1996, pgs. 14, 113

Defense and Intelligence

Pentagon, GAO Report Israeli Espionage And Illegal Technology Retransfer


by Shawn L. Twing

The new year started off on a sour note for the controversial U.S.-Israeli "strategic relationship" when two reports from the Department of Defense and one from the General Accounting Office (GAO) highlighted Israel's espionage activities against the United States and Israeli thefts of U.S. military technology secrets, and confirmed that Israel has illegally retransferred U.S. technology from the largely U.S.-funded Lavi fighter program to China.

The first round of revelations began with a report in the February issue of Moment, a Jewish monthly published in Washington, DC. The magazine described a Defense Investigative Service (DIS) warning to U.S. defense contractors about espionage by U.S. allies. One of the counterintelligence profiles provided with the memo detailed Israeli "espionage intentions and capabilities" aimed at the United States (see p. 113 for the full text of the DIS Counterintelligence Profile). The memo was sent to defense contractors last October by the Syracuse, NY-based agency responsible for issuing security clearances to Department of Defense employees and defense contractors.

Shortly after the Moment story appeared, Anti-Defamation League (ADL) executive director Abraham Foxman protested that the profile "impugns American Jews and borders on anti-Semitism" because of its reference to the potential security threat posed by individuals having "strong ethnic ties" to Israel, a euphemism for American Jews.

The Pentagon responded to Foxman by canceling the memo and promising not to issue a similar one in the future. In a letter to Foxman, Assistant Secretary of Defense for military intelligence Emmett Paige, Jr. wrote that, "The content of [the DIS counterintelligence profile] does not reflect the official position of the Department of Defense." He added that, "We have instructed appropriate personnel that similar documents will not be produced in the future."

Within days after the DIS warning became public, however, the General Accounting Office, the investigative arm of Congress, released a declassified report which also included numerous revelations about espionage against the United States by its allies. The report, "Defense Industrial Security: Weaknesses in U.S. Security Arrangements With Foreign-Owned Defense Contractors," claimed that "Country A" (publicly identified as Israel in the Feb. 22 Washington Times) "conducts the most aggressive espionage operation against the United States of any U.S. ally." The list of espionage operations described in the report included the following:

    * "An espionage operation run by the intelligence  organization responsible for collecting scientific and  technologic information for [Israel] paid a U.S.  government employee to obtain U.S. classified military  intelligence documents. [This is a reference to the 1985  arrest of Jonathan Pollard, a civilian U.S. naval  intelligence analyst who provided Israel's LAKAM  espionage agency an estimated 800,000 pages of classified  U.S. intelligence information.]

    * "Several citizens of [Israel] were caught in the  United States stealing sensitive technology used in  manufacturing artillery gun tubes.

    * "Agents of [Israel] allegedly stole design plans for  a classified reconnaissance system from a U.S. company  and gave them to a defense contractor from [Israel].

    * "A company from [Israel] is suspected of  surreptitiously monitoring a DOD telecommunications  system to obtain classified information for [Israeli]  intelligence.

    * "Citizens of [Israel] were investigated for  allegations of passing advanced aerospace design  technology to unauthorized scientists and researchers.

    * "[Israel] is suspected of targeting U.S. avionics,  missile telemetry and testing data, and aircraft  communications systems for intelligence operations.

    * "It has been determined that [Israel] targeted  specialized software that is used to store data in  friendly aircraft warning systems.

    * "[Israel] has targeted information on advanced  materials and coatings for collection. An [Israeli]  government agency allegedly obtained information  regarding a chemical finish used on missile re-entry  vehicles from a U.S. person."

No U.S. Response

The release of the General Accounting Office report makes it clear that Congress is aware of the extent of Israeli espionage in the United States, but so far no public action has been taken by the U.S. government in response.

The third revelation of Israel's violation of its privileged security relationship with the United States came from the Office of Naval Intelligence (ONI). Its 36-page report, "Worldwide Challenges to Naval Strike Warfare," contained the first unclassified confirmation by the U.S. government that Israel has retransferred sensitive U.S. military technology to China. In reference to the Israeli-Chinese military relationship, the report reads, in part: "U.S. technology has been acquired through Israel in the form of the Lavi fighter and possibly [surface-to-air] missile technology." Prior to the release of the ONI report, U.S. intelligence officials had been unwilling to state publicly what has become an open secret: that Israel violated U.S. law and numerous agreements with the United States by providing China with sensitive U.S. technology that has the potential to threaten U.S. national security interests directly (for a report on Israel's illegal retransfer of Lavi technology, see the January 1996 Washington Report, p. 12).

Defense and intelligence analysts have speculated that these reports signal the beginning of a new, downgraded chapter in the U.S.-Israeli intelligence and security relationship. One CIA veteran who has served in Tel Aviv told the Washington Report that "the CIA has seen less and less return for its investment with Israeli intelligence of late." The agent said that "the failure of their entire intelligence apparatus to anticipate the Rabin shooting, in many people's minds, was probably one of the biggest reasons for us to downgrade our ties with the Israelis."

Another U.S. government official from the Defense Investigative Service was quoted in the Saudi Gazette as saying that the frank DIS counterintelligence profile of Israel resulted from the fact that "the Pentagon has gone kind of sour on Israel as of late," because of Israel's "illegal sale of the Lavi fighter to China and dozens of other spy cases within the U.S. defense industry, which I'm not at liberty to discuss."

Criticism also has come from other, seemingly unlikely sources. Dov Zakheim and Stephen Bryen are Jewish Americans who held high-level posts in the Pentagon during the Reagan administration (Bryen was undersecretary of defense for trade security policy, and Zakheim was undersecretary of defense for planning and resources). They had much to say about the DIS counterintelligence profile.

In the Feb. 19, 1996 issue of The Jewish Week of Queens, NY, Bryen condemned the profile as "blatant racism," but admitted that "the biggest problem is primarily Israel's sale of war materials to countries that may be adverse to our interests, and maybe Israel's, too." He concluded that "Israel's attitude seems to be, we don't care about thatwe're just arms merchants." Bryen's comments were notable because he is the founder and his wife is executive director of the Washington-based Jewish Institute for National Security Affairs (JINSA), a hard-line lobbying group with ties to Israel's arms industry.


Dov Zakheim

Video of Dov Zakheim's/Booz Allen Hamilton ties to 9/11 Black Op involvement

Zakheim, who currently is president of a security consulting firm in Arlington, VA, told the Israeli financial paper Globes that, in reference to U.S. allegations of Israeli espionage, "It's obvious that there is a lot of smoke, and Israel does nothing to dispel it. This is not an American problem but an Israeli problem." He also argued that raising the specter of anti-Semitism in the Pentagon is misguided. "Do you know how many Jews work in the Defense Department?" he asked. "I'd recommend to Israel and the Jewish establishment not to play this card. This can only cause damage."
______________________________________________________
http://thomas.loc.gov/cgi-bin/query/z?c103:H.R.4862.IH:

For the relief of INSLAW, INC., a Delaware Corporation, and William A. Hamilton and Nancy Hamilton, individually. (Introduced in House)
HR 4862 IH

103d CONGRESS

2d Session

H. R. 4862

For the relief of INSLAW, INC., a Delaware Corporation, and William A. Hamilton and Nancy Hamilton, individually.

IN THE HOUSE OF REPRESENTATIVES

July 29, 1994

Mr. ROSE introduced the following bill; which was referred to the Committee on the Judiciary

A BILL

For the relief of INSLAW, INC., a Delaware Corporation, and William A. Hamilton and Nancy Hamilton, individually.

      Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That jurisdiction be, and the same is hereby, conferred upon the United States Court of Federal Claims to hear, determine, and render judgment upon the claims of INSLAW, INC., a Delaware Corporation, and William A. Hamilton and Nancy Hamilton, individually, as hereinafter described and in the manner set out, which claims arise out of the furnishing of computer software and services to the United States Department of Justice.

SECTION 1. FINDINGS OF THE HOUSE COMMITTEE ON THE JUDICIARY.

      That the findings of the House Committee on the Judiciary in the INSLAW Affairs, dated September 10, 1992, and committed to the Committee of the Whole House on the State of the Union are hereby reaffirmed and adopted, verbatim herein, as follows:

            `(1) The Department, in an attempt to implement a standardized case management system, ignored advice from vendors--including INSLAW--that PROMIS should not be adapted to word processing equipment. As predicted, problems arose with adapting PROMIS to word processing equipment. The Department immediately set out to terminate that portion of the contract and blamed INSLAW for its failure.

            `(2) The Department exhibited extremely poor judgment by assigning C. Madison Brewer to manage the PROMIS implementation contract. Mr. Brewer had been asked to leave his position as general counsel of INSLAW under strained relations with INSLAW's owner, Mr. William Hamilton. INSLAW's problems with the Department, which started almost immediately after the award of the contract in March 1982, were generated in large part by Mr. Brewer, with the support and direction of high level Department officials. The potential conflict of interest in the hiring of Mr. Brewer was not considered by Department officials. However, Mr. Brewer's past strained relationship with Mr. Hamilton, and the fact that he lacked experience in ADP management and understanding of Federal procurement laws, raises serious questions about why he was selected as the PROMIS project manager.

            `(3) Mr. Brewer's attitude toward INSLAW, combined with Mr. Videnieks' harsh contract philosophy, led to the rapid deterioration of relations between the Department and INSLAW. Any semblance of fairness by key Department officials toward INSLAW quickly evaporated when Mr. Hamilton attempted to protect his companies' proprietary rights to a privately funded enhanced version of the PROMIS software. In a highly unusual move, Mr. Brewer recommended just 1 month after the contract was signed that INSLAW be terminated for convenience of the Government even though INSLAW was performing under the contract. From that point forward there is no indication that Mr. Brewer or Mr. Videnieks ever deviated from their plan to harm INSLAW. The actions taken by Messrs. Brewer and Videnieks were done with the full knowledge and support of high level Department officials.

            `(4) Peter Videnieks, the Department's contracting officer, negotiated Modification 12 of the contract which resulted in INSLAW agreeing to provide its proprietary Enhanced PROMIS software for the Department's use. This negotiation was conducted in bad faith because Justice later refused to recognize INSLAW's rights to privately financed PROMIS enhancements. Mr. Videnieks and Mr. Brewer, supported by Deputy Attorney General Jensen and other high level officials, Unilaterally concluded that the Department was not bound by the property laws that applied to privately developed and financed software.

            `(5) Therefore, the Department ignored INSLAW's data rights to its enhanced version of its PROMIS software and misused its prosecutorial and litigative resources to legitimize and cover up its misdeeds. This resulted in extremely protracted litigation and an immense waste of resources both for the Government and INSLAW. These action were taken even though the Department had already determined that INSLAW's claim was probably justified and that the Department would lose in court. In fact, Deputy Attorney General Burns acknowledged this fact to OPR investigators.

            `(6) Department of Justice documents show that a `public domain' version of the PROMIS software was sent to domestic and international entities including Israel. Given the Department's position regarding its ownership of all versions of PROMIS, questions remain whether INSLAW's Enhanced PROMIS was distributed by Department officials to numerous sources outside the Department, including foreign governments.

            `(7) Several witnesses, including former Attorney General Elliot Richardson, have provided testimony, sworn statements or affidavits linking high level Department officials to a conspiracy to steal INSLAW's PROMIS software and secretly transfer PROMIS to Dr. Brian. According to these witnesses, the PROMIS software was subsequently converted for use by domestic and foreign intelligence services. This testimony was provided by individuals who knew that the Justice Department would be inclined to prosecute them for perjury if they lied under oath. No such prosecutions have occurred.

            `( 8 ) Justice had made little effort to resolve conflicting and possibly perjurious sworn statements by key departmental witnesses about the alleged attempt by high level Department officials to liquidate INSLAW and steal its software. It is very possible that Judge Blackshear may have perjured himself and even today his explanations for his recantation of his sworn statement provided to INSLAW are highly suspicious. The investigation of this matter by the Department's Office of Professional Responsibility was superficial.

            `(9) The Department's response to INSLAW's requests for investigations by an independent counsel and the Public Integrity Section was cursory and incomplete.

            `(10) The reviews of the INSLAW matter by Congress were hampered by Department tactics designed to conceal many significant documents and otherwise interfere with an independent review. The Department actions appear to have been motivated more by an intense desire to defend itself from INSLAW's charges of misconduct rather than investigating possible violations of the law.

            `(11) Justice officials have asserted that, as a result of the recent ruling by the Appeals Court and the refusal of the Supreme Court to hear INSLAW's appeal, the Findings and Conclusions of Bankruptcy Judge George Bason and senior Judge William Bryant of the District Court are no longer relevant. The Appeals Court decision, in fact, did not dispute the Bankruptcy Court's ruling that the Department `stole . . . through trickery, fraud and deceit' INSLAW's PROMIS software. Its decision was based primarily on the narrow question of whether the Bankruptcy Court had jurisdiction; the Appeals Court ruled that it did not. This decision in no way vindicates the Department nor should it be used to insulate Justice from the criticism it deserves over the mishandling of the INSLAW contract.

            `(12) The Justice Department continues to improperly use INSLAW's proprietary software in blatant disregard of the findings of two courts and well established property law. This fact coupled with the general lack of fairness exhibited by Justice officials throughout this affair is unbefitting of the agency entrusted with enforcing our Nation's laws.

            `(13) Further investigation into the circumstances surrounding Daniel Casolaro's death is needed.

            `(14) The following criminal statutes may have been violated by certain high level Justice officials and private individuals:

                  `18 U.S.C. Sec. 371--Conspiracy to commit an offense.

                  `18 U.S.C. Sec. 654--Officer or employee of the United States converting the property of another.

                  `18 U.S.C. Sec. 1341--Fraud.

                  `18 U.S.C. Sec. 1343--Wire fraud.

                  `18 U.S.C. Sec. 1505--Obstruction of proceedings before departments, agencies and committees.

                  `18 U.S.C. Sec. 1512--Tampering with a witness.

                  `18 U.S.C. Sec. 1513--Retaliation against a witness.

                  `18 U.S.C. Sec. 1621--Perjury.

                  `18 U.S.C. Sec. 1951--Interference with commerce by threats or violence (RICO).

                  `18 U.S.C. Sec. 1961 et seq- Racketeer Influenced and Corrupt Organizations.

                  `18 U.S.C. Sec. 2314--Transportation of stolen goods, securities, moneys.

                  `18 U.S.C. Sec. 2315--Receiving stolen goods.

            `(15) Several key documents subpoenaed by the committee on July 25, 1991, were reported missing or lost by the Department. While Justice officials have indicated that this involves only a limited number of documents, it was impossible to ascertain how many documents or files were missing because the Department did not have a complete index of the INSLAW materials. The Department failed to conduct a formal investigation to determine whether the subpoenaed documents were stolen or illegally destroyed.' Investigative Report by the Committee on the Judiciary, THE INSLAW AFFAIR, Report 102-857, pp. 110-113.

SEC. 2. SATISFACTION OF CLAIMS AGAINST THE UNITED STATES.

      The Secretary of the Treasury shall pay, out of money in the Treasury not otherwise appropriated:

            (1) To INSLAW, INC. (INSLAW) an amount of money in compensation for any and all direct, consequential, incidental and/or punitive damages sustained by INSLAW as a result of a negligent or wrongful act, or acts, or failure to act, on the part of the United States Department of Justice (DOJ), its officials, officers, employees, and agents, and other United States agencies, their officials, officers, employees and agents. The negligent or wrongful acts of the aforestated agencies of the United States government arise out of complex issues of fact, and involve willful, wanton and malicious breaches of contract, tortious activity, deceit, trickery, conversion, copyright and trademark infringement, abuse of software licensing agreements, and other such unjustified, egregious and fraudulent conduct of officials and agents of the United States government, relating to the unauthorized use and/or dissemination and/or conversion, theft or other misappropriation, of computer software proprietary to INSLAW, including INSLAW's PROMIS software and INSLAW's Enhanced PROMIS software, and/or a conspiracy to sell, transfer and distribute INSLAW's Enhanced PROMIS software to other Federal agencies and/or foreign governments and/or agencies, all to the damage of INSLAW in the loss of its software, service contracts, loss or termination of business relationships with other companies or entities, and the loss of the profits thereof, and the prevention of growth that INSLAW would otherwise have had, all to the unjust enrichment of the DOJ, other government agencies, and officials, officers, agents and employees of such agencies, as well as other persons, entities and conspirators.

            (2) To William A. Hamilton and Nancy Hamilton, individually, any and all direct, consequential, incidental and/or punitive damages, and/or all reasonable legal expenses and other costs to the Hamiltons, not directly related to the contract between INSLAW and DOJ, but caused by the actions taken by DOJ, its officials, officers, employees and agents to harm INSLAW or its officers and/or employees.

SEC. 3. WAIVER OF SOVEREIGN IMMUNITY AND DEFENSES.

      (a) Any available defense of sovereign immunity of the United States, the DOJ, any other United States government agency, or any United States government official, officer, agent or employee is specifically waived as to the respective claims of INSLAW, William A. Hamilton and Nancy Hamilton, and the amounts payable to them under section 2 above.

      (b) INSLAW, INC., William A. Hamilton and Nancy Hamilton shall each be entitled to payment of said claims notwithstanding any defense pertaining to lack of personal and/or subject matter jurisdiction, statutes of limitation, statutes of repose, statute of frauds, laches, stare decisis, waiver, estoppel, including, but not limited to, judicial estoppel, equitable estoppel, collateral estoppel, estoppel by judgment and promissory estoppel, res judicata, failure to exhaust all legal remedies, administrative or otherwise, payment, accord and satisfaction, release, pendency of claims in others courts, tribunals or departments, or any other equitable or legal defense that might have otherwise been available to the United States, the Department of Justice, or any other United States agencies, and their respective officials, officers, employees, agents and/or conspirators, all such defenses being hereby waived with respect to the claims of INSLAW, and/or William A. Hamilton and Nancy Hamilton, individually, and the amounts payable under section 2.

      (c) The amounts payable under section 2 shall be in satisfaction of all claims, legal or equitable, by INSLAW, William A. Hamilton and Nancy Hamilton, individually, against the United States of America, any agency thereof, or its officials, officers, employees, agents and/or conspirators, and shall include interest accrued on all damages, attorneys' fees and expenses.

Offline Initiated

  • Member
  • ****
  • Posts: 458
I was wondering if you know this person or are this person? She is a moderator on one of my 'truth' documentary channels I used to run regularly.

http://desertfae.com/
http://desertfae.com/indexplain.htm



Who Am I?

Let me tell you who I am so you understand why I’m so interested in this case.

My dad was Ralph Boger, murdered with his best friend Fred Alvarez and their friend Patty Castro in 1981 at Fred’s house in Rancho Mirage. My dad and Fred were about to expose the octopus before their murder. The last time I saw my dad alive he told me that he and Fred were trying to stop some “bad people from doing shady things”.

Since the murders, I was told various lies to keep me quiet. I didn’t know about the "octopus" or any of this stuff until just recently. Let me give you a few things that made me question the investigation early on:

* We were never notified by police of the murders, we found out from the TV
* Our family was not allowed to see my dad’s body, ever
* We were not allowed to have the remains
* When we asked to speak with the other families, we were told that they could not give us that information
* The autopsy on my dad was wrong
* When my step mom and I went to get my dad’s bus hundreds of miles from the murder scene, my dad’s dog, Pal, a large St Barnard was there, when the dog was initially at the murder scene days before. When we attempted to get the dog we were shot at. We then went to the police and told them about the dog and getting shot at and were told to “forget it happened” after a phone call was made.
* When I was 16 and got my first car I decided to go to find out what I could. I went to the murder scene which was bulldozed over and spoke with neighbors, found that the police lied to us about no close neighbors. I also went to the Cabazon Reservation and started asking questions there and was told to stop snooping around.
* The following month I received death threats via the phone-there was no caller ID at the time so I don’t know who it was calling.
* I went back down to Indio and made a huge scene in their lobby demanding they do something about the murder because they wouldn’t see me.. then I threatened to get the media down there. At that point they took me into a room and told me “someone is in the witness protection program and if you don’t shut up they will die. You know you never saw your dad’s body.” So of course, I thought it was my dad.

For the following years I called randomly to see how the investigation was going.. I was told a lot of different stories and never really given an answer.

In late Aug 2007 I was doing a random search online for family history and looked up both my grandpa’s on my mom’s and dad’s side and wasn’t able to find anything. I then searched for my dad and found a book. I couldn’t understand why his name was in a book so I tried to contact the author with no luck, he never responded. I then bought the book and read most of it. I found that it was a book to debunk the Inslaw affair and such.. so I then did a search for Fred and came up with a million sites about different conspiracies.

Let me explain before I go on, that before all of this, I thought the conspiracy people were just freaks.. until I got involved in this.

The next day after looking up so much my head hurt I called the sheriffs dept in Indio and told them that I found all this and they needed to squash it all. The Sgt I spoke to didn’t seem to have any clue about my dad, Fred’s and Patty’s case.. he said he’d look up some of the sites and the case and call back. Approx 5-6 hours later he called and told me he had a chance to go through the files and look up the sites and told me it was all true. He also told me that there was nobody in the witness protection program at anytime that he could find. I was floored. I then asked what he was going to do about the case and he told me NOTHING, unless I got him evidence.

That’s where my story comes into play.

I started investigating all of this. I have contacts now with the same people Danny Casolaro did (well, not all of them, some I choose not to speak with due to their dangerous activities). I have some contact’s Danny didn’t have as well. And the kicker is.. I’m posting what I find online for all to see.

The Octopus

The Cabazon Native Americans were a small tribe with less than 20 members back in the day.. they were very poor, had no running water or electricity. John P Nichols approached them and promised to help them if he could take over the tribe and they let him. His motives were not to help them but because the reservation was sovereign he knew he could get away with multiple black ops programs without the same laws as say, a regular city.

He ruled there by keeping the tribe in fear, formed a joint partnership with Wackenhut and started doing things like arms deals, drug deals, the Iran-Contra affair, October Surprise, the Promis(e) software modifications (inslaw affair), money laundering, human traffickin etc.

Fred found out about what was going on.. confronted JP Nichols and was told to back off. He approached my dad and told him of what was going on-he wrote Ronald Reagan who was about to run for president or already had announced that he was running to let him know of his concerns. Reagan wrote him back IN DETAIL about October Surprise and other black ops programs. At that point either Fred or both my dad and Fred (I’m not sure cause I was only 13) broke into JP Nichols office and either took or copied paperwork proving everything.

Fred then went to the Desert Sun (a local newspaper) and told them that the government was abusing Indian land and told them he was afraid he would be killed.. My dad and Fred were supposed to meet with someone about all of this on July 1 1981 to turn over the paperwork and were found dead that day.. all paperwork gone.

My dad did tell me the last time I saw him that him and Fred (who I considered an uncle) were trying to stop bad guys.
"Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives."  ~ James Madison

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
Hi Initiated! Long time no see!
First, I have multiple documents on the octopus which aren't up at my site .. yet. Over 15,000 actually.
One of the documents that Danny was killed over was this:
http://www.desertfae.com/img/image002.gif
(below)
I also want to have you guys read something that Ed Encho wrote. Bill Hamilton and I worked with him on this based on documented, vetted evidence we both have: http://www.opednews.com/articles/3/US-Spying--Main-Core-PRO-by-Ed-Encho-090202-224.html
I will let you guys know that the KESQ series has not ended, but is stalled due to safety issues for those of us involved. It will continue when it's safe to do so.

(pasted document)

Exposing the Octopus and my dad's murder-www.desertfae.com

Offline Initiated

  • Member
  • ****
  • Posts: 458
Hi Fae. I am happy to see you are around. This issue could act as dominoes. I assume you are in contact (...) with Anti-Illuminati and was curious as to if (they) managed to get on Bermas' show yet.

Thanks for the document. You know I save everything.
"Knowledge will forever govern ignorance, and a people who mean to be their own governors, must arm themselves with the power knowledge gives."  ~ James Madison

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
Hi Fae. I am happy to see you are around. This issue could act as dominoes. I assume you are in contact (...) with Anti-Illuminati and was curious as to if (they) managed to get on Bermas' show yet.

Thanks for the document. You know I save everything.
Initiated,
You know JJ from jtv? When I was on my month long journey across the US gathering evidence recently I met with him, and showed him a tiny portion of my evidence-stuff that is not public. Next time you see him, ask him what his reaction was when I showed him some of it lol.
He cracked me up.. every other word was "OMG", "JEEEZE!" haha
I mainly showed him to have a witness to some of what I have, because most wouldn't believe I have these documents. I've since given them to multiple trusted sources incase anything happens to me or my family, but those sources are staying in hiding unless something happens.
JJ can confirm I have some extremely damning evidence, and the head of the octopus.
Exposing the Octopus and my dad's murder-www.desertfae.com

Offline Jackson Holly

  • Member
  • *****
  • Posts: 13,576
  • It's the TV, stupid!
    • JACKSON HOLLY'S OLD HOME PLACE
Anti_Illuminati:

I've scanned over your posts here and I remembered some stuff I found and posted in another thread awhile back.

Were you aware of this memo? It seems to link Osama with Riconosciuto, and mentions the PROMIS 'upgrade'.

Also, hit the links - about Bio-Rad and the Race Specific weapons:


http://forum.prisonplanet.com/index.php?topic=67847.msg358601#msg358601

http://forum.prisonplanet.com/index.php?topic=67847.msg360424#msg360424
St. Augustine: -The truth is like a lion; you don't have to defend it.
Let it loose; it will defend itself.-

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
Anti_Illuminati:

I've scanned over your posts here and I remembered some stuff I found and posted in another thread awhile back.

Were you aware of this memo? It seems to link Osama with Riconosciuto, and mentions the PROMIS 'upgrade'.

Also, hit the links - about Bio-Rad and the Race Specific weapons:


http://forum.prisonplanet.com/index.php?topic=67847.msg358601#msg358601

http://forum.prisonplanet.com/index.php?topic=67847.msg360424#msg360424

Osama went by the name Tim Osmond and was at the Cabazon reservation. He was working for the CIA. I have documented evidence of it.
Exposing the Octopus and my dad's murder-www.desertfae.com

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
(edit) added part of one of my documents on the subject of Tim Osmand. Keep in mind, I had to blank out some of this due to open murder cases.

Exposing the Octopus and my dad's murder-www.desertfae.com

Offline lordssyndicate

  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Umnnn, wow.

So, desertfae - I see you have quite a good bit of evidence to fill in the gaps so to speak.

Not to say that Anti Illuminati hasn't got enough proof here in these threads of who exactly was involved.

But, wow from what I've seen of your site and your docs posted here - it looks like you have some pretty damning / convicting evidence of your own. That has it's own legs - so to speak - even. Also, when combined with what I've already read of Anti Illuminati's research - it adds yet another layer to the onion - proving much of what I have known via classified un-mentionable sources.  

Having worked in Big IT as per the resume shown on the website listed in my profile I have dealt with many things that I have had much trouble proving because I was not aware that any of this was publicly printed in non-secure areas.  

Thanks to Anti Illuminati's ability to find things even on this horribly censored internet we no have - I now have proof that fully documents much of what I have known for a very long through personal experience.

Please people wake up - these companies specialize in developing false flags for our government. Without these people and corporations 9/11 would have never been possible.

Desertfae and Anti Illuminati have research that could both independently bring down the entire Kleptocratic regime. We need to support them.  From what I understand Desertfae already has criminal cases open regarding her research. We need a group of people who understand Anti Illuminati's research to  join me in initiating an investigation based on his research as well. We need Alex to read this and understand how direly important this is before we are all on IPv6 and he has nothing left but a radio audience again.

Alex - if people don't wake up to the fact that what we have here is not only evidence incriminating all the major players in 9/11 and all of their lackeys. But, also evidence showing every one of their upcoming major false flags in exacting details.

WE HAVE THEM BY THE BALLS NOW WITH THIS EVIDENCE. WE CAN CONVICT THEM WITHOUT A SHADOW OF A DOUBT BASED ON WHAT WE NOW HAVE HERE!   Get IT? If We don't do this now  the we will never have another opportunity to expose this!


IPv6 will be implemented very soon. Most likely by the end of this year. Nothing you or any one else can do will stop this.

There is no congressional approval for this. As I said before this was decided by the non-profit org known as ARIN. ARIN is comprised of members who are any valid person or organization  who pays $500 a year and doesn't violate any of ARIN's existing policies. Meaning mainly ISPs and Global Telecom Carriers.  They control ALL IPs - They write the policy. NOT the government.  The internet has been privatized. Meaning the fascist corporations can do what ever they want with it and  congress has  NO say in any of it.
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline lordssyndicate

  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
Let me also take a second to say this.

I do not mean to sound like I am saying the evidence Desertfae has won't stand without Anti Illuminati's research and that it isn't extremely important independently. On the contrary that both are equal of importance.  However , both  her evidence and Anti Illuminati's research when combined fill in many of  the gaps.

So when you put the two together it gives both hers and his evidence a rock solid undeniable foundation, from which to base a criminal case against all of the people and parties involved in perpetrating these crimes on the American people.

 
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

LATruth

  • Guest
WHO IS DOV ZAKHEIM???

Click for the video...

Anti_Illuminati

  • Guest
Re: Rockefeller funded INSLAW-PROMIS-Police State Technocracy-Mind Control
« Reply #17 on: April 21, 2009, 07:40:15 pm »
In reference to the subsequent info, please read this to see the connections:  EDMO dhsMRR Criminal Database - Ptech, NIEM, N-DEx Cognitive Engineering

http://forum.prisonplanet.com/index.php?topic=83769.msg482296#msg482296




Still, some anti-terrorism experts remain troubled by the variety of the company's ties to groups under suspicion by the U.S. government.

Ptech was born in 1994 when Ziade, who had come to the U.S. from Lebanon to study at Harvard, and co-founder James Cerrato teamed up to develop software that visually represents large amounts of information. The idea was to help complicated organizations like the military and large companies create a picture of how their assets -- people and technology -- work together. Then the software could show how little changes, like combining two departments, might affect the whole. Ptech even thought it might help the new Department of Homeland Security.
________________________________________________________________________
Note, many of the sourced links no longer work in the following post.

Source

HOW THE THEFT OF INSLAW'S PROMIS CREATED THE NEW WORLD ORDER'S MASSIVE NON-LETHAL WEAPONS MIND-CONTROL PLAN VIA "CRIMINAL-TRACKING" TECHNOLOGY.
By Linda Minor © 2000

The Inslaw/PROMIS theft is part and parcel of the New World Order plan to control the hearts, minds and souls of the people of this country.  The following series of links shows that what Casolaro was about to connect was the criminal-tracking technology to a massive mind-control enterprise using "non-lethal weapons. Connect the dots.

CASOLARO DIED JUST AFTER TALKING TO A SOURCE CONNECTED TO A DEPARTMENT OF JUSTICE CONTRACTING OFFICER.

Inslaw's Executive Summary states, in part:

    Although these allegations are profoundly disturbing, there is significant circumstantial evidence that bears on the plausibility of the allegations. As reported in INSLAW's July 11, 1993 rebuttal, Casolaro was scheduled to have his final, follow-up meeting with two sources on INSLAW in West Virginia the night before he died, and one of those sources was connected to the Justice Department's PROMIS Contracting Officer. As reported in this addendum, the meeting between Casolaro and those sources had allegedly been brokered by a covert intelligence operative for the U.S. Government, an Army Special Forces Major. This individual appeared in Casolaro's life during the final several weeks and introduced himself to Casolaro as one of the closest friends of the Government's PROMIS Contracting Officer. Finally, during the final week of his life, Casolaro told at least five confidants something that he had never told a single one of them at any other time during his year-long, full-time investigation: that he had just broken the INSLAW case...
    ....

    Although the NSA is quoted in the Bua Report as claiming that it internally developed its PROMIS, the Toronto Globe and Mail reported in May 1986 that the NSA had purchased a PROMIS software system from a Toronto- based company. As shown in Exhibit A to INSLAW's July 11, 1993 rebuttal, Earl Brian's Hadron, Inc. sold INSLAW's PROMIS to the same Toronto company in 1983, in a transaction that also allegedly involved Edwin Meese, then Counselor to the President. ....

    The INSLAW affair was a premeditated, cynical and deceitful taking of INSLAW's software property by the chief law enforcement agency of the United States without due process of law and without compensation to INSLAW in violation of the Fourth Amendment to the Constitution.

          Source: http://www.newsmakingnews.com/#INSLAW'S EXECUTIVE SUMMARY


PROMIS WAS ORIGINALLY FINANCED BY THE USA'S LEAA TO HELP US ATTORNEYS TRACK CRIMINAL CASELOADS.

    The Department of Justice has long recognized the need for a standardized management information system to assist law  enforcement  offices across the  country in the record keeping and tracking of criminal cases. During the 1970's, the Law Enforcement Assistance Administration (LEAA) funded  the development by INSLAW of  a  computer  software system called  the  Prosecutor's Management  Information System or PROMIS.  This  system  was designed to meet the criminal prosecutor workloads of  large urban  jurisdictions;  and  by  1980,  several  large   U.S. attorneys  offices were using the PROMIS software.  At  this time,  INSLAW  (formerly called  the  Institute for Law and Social Research)  was  a nonprofit   corporation  funded  almost  entirely  through Government  grants  and  contracts.  When  President  Carter terminated the LEAA, INSLAW converted the company to a  for-profit  corporation in 1981 to commercially  market  PROMIS.

    Source: http://www.eff.org/pub/Legal/Cases/INSLAW/inslaw_hr.report

THE LEAA (FOUNDER OF PROMIS) WHICH SPURRED THE COMPUTERIZATION OF POLICE WORK THROUGHOUT THE US WAS DESIGNED TO CONTROL "SOCIAL TURBULENCE."  THE LEAA WAS THE FATHER OF NLECTC AND LEATC. AND GUESS WHOSE DEEP INTO THE OPERATION--NASA.

    The Omnibus Crime Control and Safe Streets Act of 1968 created LEAA in, as one commentator noted, "an environment of social turbulence. Crime rates were climbing, the incidence of drug abuse was on the rise, riots and disorders were becoming commonplace, and America's political leaders were targets for assassination attempts." In this climate, LEAA sought to spur the computerization of policing. The big push started in the early 1970s. It is uncertain how much LEAA spent on police computerization, but police agencies began to acquire computers. However, many departments with access to computers in the 1970s and even into the 1980s seemed reluctant to use them for more than routine tasks. Why were many police agencies not making more effective use of computers? Leading police chiefs blamed the complexities of the new technology, the cautious, conservative nature of many police officers, and citizens' "fear of Big Brother." Lack of funds for computer training and equipment maintenance also played a part.
    ....

    The Law Enforcement Assistance Administration paid for big ticket technology items such as computers, software, and crime laboratories, but the National Institute of Justice (NIJ), an agency for many years under the LEAA umbrella [2], was the designated federal source of research and development in law enforcement technology. In its review of its first 25 years, the Institute made special note of two accomplishments in technology -- the development of lightweight body armor and support for DNA analysis to improve evidence used in investigating crimes.
    .....
    In a time of rapidly advancing technologies, NLECTC serves as a one-stop technology education, assessment, and referral source for the nation's law enforcement agencies. NLECTC consists of a national hub in Rockville, Maryland; regional centers in New York, South Carolina, Colorado, and California; and three specialized offices: the Border Research and Technology Center (BRTC) in California; the Office of Law Enforcement Technology Commercialization (OLETC) in West Virginia; the Office of Law Enforcement Standards (OLES) in Maryland; and the National Center for Forensic Science in Orlando, Florida. NLECTC's hub is in a Maryland suburb of Washington, D.C., and has several functions.
    ....
    The Maryland office is the nation's collection agent and repository of information about law enforcement and corrections technology. It publishes and distributes a large collection of reports on diverse matters, such as body armor, pepper spray, patrol car tire tests, metallic handcuffs, and DNA profiling. It also publishes TechBeat, a periodical covering the latest developments in police technology. It created and manages JUSTNET, NLECTC's site on the World Wide Web.
    ....
    The Office of Law Enforcement Technology Commercialization (OLETC) encourages the commercial development and manufacture of promising, innovative technologies. It offers support and information about the intricacies of commercialization to law enforcement agencies and criminal justice organizations, as well as the research, product development, and manufacturing communities. OLETC is a joint project sponsored by NIJ, the National Aeronautics and Space Administration, and the National Technology Transfer Center. The Border Research and Technology Center in San Diego has the special mission of fostering technologies which provide improved capabilities in border surveillance, security, and identification. The center works closely with the U.S. Customs Service, the U.S. Border Patrol, and local law enforcement agencies concerned with border problems. The National Center for Forensic Science in Orlando, Florida, focuses on research and training in the area of arson and explosives.
    ....
    The Office of Law Enforcement Technology Commercialization (OLETC) fosters commercial development and manufacture of promising, innovative technologies. It operates by providing technology commercialization and support and technology transfer information to law enforcement and other criminal justice organizations and the manufacturing and technology communities. OLETC is a joint project sponsored by NIJ, the National Aeronautics and Space Administration, and the National Technology Transfer Center, and is located at Wheeling Jesuit College in Wheeling, West Virginia.

    Source: http://www.nlectc.org/txtfiles/policetech.html

WHY IS THE OLETC LOCATED AT WHEELING JESUIT COLLEGE IN WEST VIRGINIA?

    The youth-centered activities began early as Wheeling Jesuit University (WJU) buses transported children from parts of Wheeling to a free breakfast served in the culinary arts dining room at West Virginia Northern Community College's Hazel Atlas Building. Faculty and staff volunteers from WVNCC prepared eggs, French toast, juice and other healthy items. WJU buses then transported the children to WJU to begin the full day of activities.

     More than 200 children participated in a variety of youth activities including visiting the Erma Ora Byrd Center for Educational Technology (CET) and to participate in activities at the Challenger Leaning Center (CLC). They visited the Robert C. Byrd National Technology Transfer Center (NTTC) to explore flight and invention. The Office of Law Enforcement Technology Commercialization (OLETC) and Blockbuster Video conducted Kidsprint video identifications. The children were also able to participate in mini soccer or basketball clinics and viewed artifacts from the Flushing's Underground Railroad Museum Traveling Trunk. Artworks from Old Town assisted children in making story quilts and essays from Ohio County students were on display at the Erickson Alumni Center in the Alma Grace McDonough Center.

    Source: http://www.nttc.edu/homepage/pressrelease/mlkday.asp

    Standing like a sentinel above modest houses and neat yards, the $13 million structure dominates the hillside entrance to its host, Wheeling Jesuit College.

    If there is a monument to the federal government's adulation of technology transfer - the idea that technology created by government scientists can now be used to revive American industries, create jobs and help the United States catch up with global competitors - this is it.

    That such a facility is located at an obscure liberal-arts college in Wheeling is a testament to the determination of its president, who saw federal aid to his school increase threefold in a year.

    That such a facility is situated in West Virginia is a testament to the political clout of its namesake, Democratic Sen. Robert C. Byrd, who once boasted he would deliver $1 billion in public-works to his home state before he was through.

    Source: http://www.corporations.org/welfare/inquirer5.html

GET A FEEL FOR WHAT'S COMING! THE OLETC INTRODUCES ITS LASER DISSUADER!

        Project Title: The Laser DissuaderT Non-Lethal Weapon

    Operational performance of the concept was first successfully tested by the U.S. Marines who used early Saber 203 devices for Force Protection in the extraction of UN Forces from Somalia. A very limited demonstration was performed at a Mock Prison Riot at the West Virginia Penitentiary, sponsored by OLETC in April 1998. Full-fledged military operational testing for the rifle mounted Saber 203 will be conducted by the U.S. Air Force in late Summer 1998.

    SEA reports that the Laser DissuaderT will be ready for market by late summer 1998. It is a follow-on product based on the Saber 203. Saber 203 is a non-lethal laser device built to be used in the military M-203 Grenade Launcher. This device was developed for the US Air Force by SEA under a Small Business Innovative Research contract (SBIR). The technology was initially developed by SEA for a set of nuclear weapons security devices under an SBIR contract with the Defense Nuclear Agency.

    Source: http://www.nlectc.org/techproj/oletc_p5.html

THE LOCAL POLICE WANT THESE NON-LETHAL WEAPONS, SAYS NLECTC.

    "Did They Have to Die? Police Explore Less Than Lethal Weapons"
    Associated Press (06/19/00); Cabrera, Luis © 2000

    Police are exploring new weapons that offer cops an alternative to ending
    armed and aggressive standoffs. Law enforcement departments are researching non-lethal weapons, and officers are now being trained and equipped with Taser guns and beanbags fired from shotguns. Critics say that non-lethal weapons like the beanbag guns were used in situations and were not effective in taking down suspects, and these weapons may not be reliable when cops are in life-threatening situations. Many law enforcement departments are optimistic about the new technology's ability to save lives.

    Source: http://www.nlectc.org/inthenews/newssummary/06222000.html

    Orange County's Force of Technology: Less Crime With Fewer Cops. Los Angeles Times (06/18/00) P. 1; Roug, Louise

    California's Orange County cities have half the number of police officers per capita than the national average, yet still recorded some of the biggest declines in crime over the last decade. Federal money is now being spent on computers and sophisticated equipment instead of more officers. The county's police departments have shifted by relying more on technology and lower-paid civilian employees to handle time-consuming tasks that officers once performed. Expenditures on law enforcement technology has proven to be cost-effective, and more efficient than hiring more officers because crime rates have dropped. Counties that have increased officers per capita have not witnessed a significant drop in crime. Law enforcement departments are trying to balance between police officers and resources to become more effective.

DANNY'S DEAD!
The Casolaro files. By C.D. Stelzer (copyright 1996)
....WHISPERS OF GOLD AND SENATOR  BYRD
http://home.stlnet.com/~cdstelzer/casolaro.html

"It was very eerie. We were sitting there in the Hilton. It was raining. It was sort of this secluded area with this light over us and the waitresses were staring. By the time I walked outside,I was a wreck. I called (William) Hamilton and told him never,never, never again am I going to be around these crazy people." -- Lois Battistoni, aformer DOJ employee talking about the night she met with a top Justice Department official and a reporter to discuss the Danny Casolaro case.

Lois Battistoni is among those who believe someone killed Danny Casolaro. At her request, investigators for the Bua inquiry informally interviewed her in the initial
stages of that investigation, but they never returned to ask for a sworn statement. Of the
Bua report Battistoni says: "It's really a cover-up from the very beginning."

The former paralegal, who spent nine years at the DOJ between 1979 and 1988, claims knowledge of the Inslaw case from her stint at the department. But her belief that Casolaro was murdered is based on what she overheard at a meeting in the dining room of the Sheraton Hotel in Springfield, Va. The other two parties in attendance, according to Battistoni and others, were Norman E. Mixon, a high-ranking Department ofJustice official in the management and finance division, and George Williamson, a reporter who has worked for the San Francisco Chronicle and Time magazine. Williamson had arranged to meet Mixon to confirm information gathered from his high-level CIA sources, informed sources say.

Battistoni, who had been speaking to another West Coast reporter, acted as a go-between for the rendezvous. "Different things were brought up and they both concurred. They both seemed to know the same things," she says. She thought the tete-a-tete had been arranged to discuss the Hamiltons' legal battle with the DOJ, but what she learned at the dinner table came as a complete shock. "(It) was a very shilling situation for me," says Battistoni. "I had no idea it had to do with ... murders. I thought we were going to discuss Inslaw. That's not what was discussed," she says. Instead, the conversation turned toward "CIA operations in gold and the Cabazon Indians."

One person who claims knowledge of Casolaro's interests in secret gold dealings is Donald Devereux. Devereux, a Phoenix investigative reporter who has reported on gold fencing operations in the Southwest. Devereux says Casolaro called him only two weeks before he died to ask specific questions about gold transactions."He did not tell me what he was doing," says Devereux, but from his own investigation Devereux now speculates that Casolaro was trying to connect the shipments of Phillippine gold through the Cabazon reservation to the October Surprise conspiracy. A scheme to use massive quantities of gold -- recovered Japanese war booty  - to fund U.S. convert intelligence operations was reported in a series of stories inthe Las Vegas Sun.

Based on his own knowledge of secret gold brokering, Devereux estimates the buillion deals may be worth billions of dollars. When there is that kind of money involved, "people get hurt in a hurry. There are a lot of bodies around this stuff, "Devereux alleges.

At the meeting between Williamson and Mixon, Battistoni recalls hearing one name repeatedly. "I kept hearing Earl Brian's name," she says. The two men talked about vast sums of money, as much as a billion of dollars, according to Battistoni. There were points when she was asked politely to leave the table so Williamson and Mixon could discuss even more confidential information, Battistoni says. According to Battistoni, she saw Mixon hand over a briefcase full of documents to Williamson.

Mixon and Williamson also talked about Danny Casolaro's death, Battistoni says. What she says she heard is this: "The Martinsburg, (W. Va.) police called Sen. Byrd's office after the alleged suicide." Sen. Robert C. Byrd is the senior senator from West Virginia. Battistoni's says her understanding of the conversation is that the police were instructed to clean up the motel room through Byrd's office.

In regard to this allegation, a spokesperson for Sen. Byrd'soffice has says that "there's absolutley no truth to that."  But there was at least one connection between the DOJ and Sen. Byrd's office. Barbara Videnieks  - the wife of the former Inslaw contract officer at the Justice Department --  is a top aide in Sen. Byrd's office. In addition, copies of notes by William Turner, one of Casolaro's sources, indicate that the late writer planned to meet in Martinsburg with relatives of "Ms. V, plus one or two others from SB off [Sen. Byrd's office]." A source who wishes to remain anonymous says he has been told that there are at least two relatives of Barbara Videnieks who work in Sen. Byrd's office.

Turner has claimed to have met with Casolaro in Martinsburg the day before his death to deliver sensitive papers that William Hamilton says pertained to Inslaw. Hamilton says the documents, which allegedly disappeared at the time of Casolaro's death, were to be shown to the sources from Sen. Byrd's office. The relevance of this allegation is completely dismissed by a spokesperson for Byrd. "The link that you are trying to make is preposterous, and this office has no further comment," she says...

Since the meeting that Battistoni attended, reporter George Williamson has withdrawn from pursuing the story. When finally contacted, Williamson refused to discuss the alleged meeting on the grounds that he had sworn confidentiality to his source. Reached at his DOJ office, Mixon respectfully declined to comment, saying all telephone conversations are recorded at the Justice Department. ...

SENATOR BIRD AND CATHY O'BRIEN - TRUE OR FALSE?

http://www.parascope.com/articles/1196/obrien.htm

Sex, Lies, and Mind Control
by Cathy O'Brien © 1999

Nowhere to run to When I was 13 years old, I was dedicated to a man who would become my mind control owner. That's US Senator Robert C. Byrd. Senator Byrd had been in office as long as I had been alive. Senator Byrd is head of our US Senate appropriations committee. He holds the purse strings for our country. And I know from my victimization under his control that he had absolutely no concern for the American public. In stead he was interested in appropriating our money to usher in the NWO. Senator Byrd's perversions were extremely brutal and just being sexually assaulted by him was sufficient to traumatize my mind to readily accept anything that he instructed me to do.

One of the things that he instructed me to do was to attend the Muskegon Catholic Central High School -- which was very much involved in this ClA/Jesuit merger of mind control information. Through implementation of trauma in the school system, a person such as myself would photographically record whatever I was taught. I got all A's but I didn't gain any information I could use. I couldn't think to use anything that I had
learned, but I was recording facts and that's what they were interested in.

I wasn't the only one. Muskegon Catholic Central had many students that had been severely traumatized and subjected to occult rituals. Some were groomed to participate in organized sports. After all, a person suffering from DID had no limitations on what they thought they could accomplish in sports. Since they had compartmentalized memory, they "forgot" how tired they were. Therefore they were always fresh and ready for more with a real high energy level and extreme endurance. Catholic Central was first in the state and first in the nation in sports throughout those years.

It was while I was in Catholic Central that Gerald Ford became President. This devastated me. Not that I could even think about it by that time, because I couldn't. I could only sense that if Gerald Ford was President, then people everywhere actually condoned child abuse and mind control.

I was conditioned to believe that I had no place to run or hide--a theme that's widely used on traumatized people all the way from the lowest level of occultism. Even in sexual abuse, the children are told "we're watching you--there's no place to run and no place to hide." That's the theme that therapists hear many times over.

On a CIA level, of course, they were using that same theme. And I felt totally trapped. Who was I going to turn to? I couldn't turn to my parents. I couldn't turn to my church. I couldn't turn to my school or local politicians--and now I couldn't even turn to the President of the United States. I felt totally helpless and totally locked in--which was exactly what they wanted.

However, now that I'm in control of my own mind and can think for myself, I know that I do have a place to run--and it's right at them!
....

Meaner and Mena

Since I was primed and ready for mind control programming, I was taken to Tinker Air Force Base in Oklahoma. Tinker Air Force Base is where many of Johnston's mercenaries had been programmed and I became a "tinker belle"--mind control programmed through high voltage, sleep, food and water deprivation, and subconscious mind manipulation. I was programmed to carry out my first trial run operation. This involved carrying a large quantity of cocaine that had been brought back in on one of those airplanes, to load it up and carry it to a remote area in Washita Forest in the neighboring state of Arkansas. It was 1978. I've since identified this area as the Mena Airport....

It was my experience during the Reagan/Bush administration that Ronald Reagan followed orders from George Bush ! Look at George Bush's background. He began with the United Nations, then he went on to head our CIA and then he ran our country right into NWO controls through three administrations: Ronald Reagan followed orders from George Bush; then George Bush was in office; and I know for a fact that Bill Clinton follows orders from George Bush. Not robotically - but because he also believes in mind control of the masses.

In 1984 I was at the Lampe, Missouri at a CIA near-death trauma center. It's an enormous cocaine hub, but more importantly a sophisticated mind control center to program paramilitary--guys who are used in paramilitary operations. The Lampe operation was just across the Arkansas border and was very much a part of Clinton's operation. It was there in 1984 that I ever heard (and photographically recorded after severe trauma) Bill Clinton and George Bush talking (they're friends), and George Bush said how when the American people become disillusioned with Republicans in control of our country and running it into the NWO, that Bill Clinton as a Democrat would be put in office.

Obviously, it happened according to plan. But I tell you this so that you know this has nothing to do with party lines. this is not about Democrats or Republicans. This is about NWO controls -- those who are for them and those who are against them....

There has been sufficient public out cry to make change were it not for the fact that the governors have been corrupted. Not all governors have been corrupted. I don't know that all governors even know exactly what OBE is all about. But I am aware that Senator Byrd decided that he would put the states in a financial position whereby they would be forced to accept OBE in order to get any kind of federal funding for education. For this purpose, this year every governor in the United States but one accepted OBE into the school systems. Only Alabama's Governor James said the federal government has no business meddling in the minds of our children. We must be aware of OBE and mind control on all levels for our children's' sake.

Source: http://www.parascope.com/articles/1196/obrien.htm


SOME LIGHT ON THIS SITUATION.

At first, "mind control " sounds scary and seems to offer more evidence of government's unassailable power. But when you stop to think about it, despite the enormous resources in time and manpower that were allegedly spent by government to control Ms. O'Brien 's mind, she got free. Mind control failed to control.

Further -- just as Ms. O 'Brien claims that much information on mind control was discovered by the European Crusaders (1000-1200 A.D.), Spain's Inquisitors (1480-1800 A.D.), and Germany's Nazi's (1939-1945 A.D.) -- her associate Mark Phillips claims that the foundation for mind control was found in ancient copies of the "Egyptian Book of the Dead " (written centuries, perhaps millennia, before the birth of Christ). Given that huge historical advantage, if mind control were as potent as some fear, we might reasonably expect Egypt, Italy, England, Spain, or Germany to rule the world. Do they? No. The Crusaders lost, the Inquisitors lost, and the Nazi's lost, and the Egyptians haven't won anything since they built the Pyramids. More recently, the mighty U.S -- with its alleged "masters of mind control" -- lost in Viet Nam. Apparently, there 's a common denominator among governments that allegedly used mind control .. they're losers headed for destruction.

Therefore, mind control may be an interesting, even dangerous parlor trick but it offers no sustainable, cost-effective ability to suppress the power of a living mind and spirit.

It may be reasonable to be concerned about "mind control", but it is unreason able to be fearful. If you don't believe me, ask the Pharoahs, Crusaders, Inquisitors, Storm Troopers of history or the CIA guys that ran Operation Phoenix in Viet Nam. "Mind control" is razzle dazzle, "secret weapon " b.s. used as a last resort by morally bankrupt governments desperate to try anything to avoid impending doom and/or shore up their troops' sagging morale. If our government uses mind control, it's only more evidence that they can't even win the "hearts and minds" of their own people.

I suspect that our spirits, much like "unalienable rights", are God-given and beyond the destructive capability of any mortal or government. To the extent any government tries to destroy its own people's spirits, that government attempts the impossible and must not only fail but probably perish.

Anti_Illuminati

  • Guest
Re: Rockefeller funded INSLAW-PROMIS-Police State Technocracy-Mind Control
« Reply #18 on: April 21, 2009, 07:51:47 pm »
http://www.nasatech.com/resrep/NTTC.html

Resource Report:
National Technology Transfer Center
Serving the Nation's Industrial Competitiveness

It might seem a long leap from the federal laboratory network to the local dry-cleaning establishment, but bringing the two together is just one of the more unusual successes of the National Technology Transfer Center (NTTC). Since its establishment in 1990, the center has acted on more than 10,000 technical requests and recorded more than 100,000 log-ons to its electronic information system.

Funded by NASA, and with additional support from the Ballistic Missile Defense Organization, the U.S. Navy, and other federal agencies, the NTTC has its headquarters on the campus of Wheeling Jesuit College in Wheeling, WV. From there it extends its reach throughout the country, drawing on the expertise of more than 700 laboratories and thousands of scientists, engineers, and managers who make up the Federal Laboratory Consortium. NTTC also teams with NASA's Regional Technology Transfer Centers (RTTCs) - six offices nationwide that assist local industry in technology evaluation and commercialization, as well as market assessment and other areas of business expertise.

NTTC's programs run the gamut of technology transfer initiatives. A key service is called the National Gateway, providing callers from business and industry free access to technology and expertise from the NASA labs and other federally funded research facilities. This is done through NTTC technology access agents, who, once apprised of a technical challenge or area of interest, search the proper databases, contact the labs, and often put the inquirer in touch with the individual experts who are the best resources.

But if the inquirer simply wants to browse through the ideas and technical information available from federal sources, there is Business Gold, a free service available via the Internet or direct modem contact. Operating 24 hours a day, NTTC's electronic bulletin board provides information that can be downloaded onto the user's computer free of all charges except for the phone lines. Included are descriptions of new technologies available for licensing and commercialization; NASA RTTC contacts; current SBIR, Technology Reinvestment Program, and similar solicitations; technology transfer conference calendars; information from government software centers; and more.

Forging Partnerships

NTTC acts either directly or through the regional network to facilitate technology transfer. When Hi-Shear Technology Corp. Of Torrance, CA, was looking for a new design for the power unit for Lifeshear, a cutting tool for extracting auto accident victims from wreckage, NTTC provided the immediate link to NASA's Jet Propulsion Laboratory. An advanced technology for powering an initiator for multi-stage rockets and explosive bolts was co- developed for dual use under a JPL-managed Technology Reinvestment Project award to Hi- Shear. Federal Emergency Management Agency rescue workers later used Lifeshear at the Oklahoma City bombing site. (See "Mission Accomplished," NASA Tech Briefs, August 1995, Vol. 19, No. 8, page 20.)

Using the regional connection, NTTC referred Jay Carter Jr., president of CarterCopters Inc. of Wichita Falls, TX, and designer of a unique gyroplane, to the Mid-Continent Technology Transfer Center (MCTTC) in Texas. After MCTTC's evaluation, Carter was directed to NASA Ames Research Center officials, who helped him draw up a Small Business Innovation Research proposal that won a $70,000 award from NASA last fall. He hopes the CarterCopter will fly as early as the end of the year.

The Office of Law Enforcement Technology Commercialization (OLETC) is another recent example of NTTC's successful partnerships. The center hosts OLETC, a joint undertaking with NASA and the Justice Department's National Institute of Justice. Through it, NTTC funnels state-of-the-art law-enforcement product ideas to the manufacturing community, and arranges for rapid prototyping at test facilities. The center also provides timely funding information to law-enforcement and criminal justice organizations throughout the country to help them acquire advanced technology.

OLETC is pursuing several innovative projects, including a remote-controlled retractable roadway barrier strip that deflates tires, thus eliminating the hazards of high-speed auto chases; a "smart" gun that can be fired only by its owner; a pepper spray launcher-dispenser intended for use in efforts to free hostages; a disabling net and launcher system that deploys a lightweight net to trap escaping suspects; and concealed-weapons detection s;systems.

Last year the partners in OLETC presented Law Enforcement Technology Innovation Awards to Idaho National Engineering Laboratory (INEL) and 3M Law Enforcement Products. INEL designed a rear-seat air bag for patrol vehicles that restrains a violent apprehended suspect, preventing him from injuring himself or others or damaging the vehicle. 3M's fingerprint visualization system (FVIS) is a small kit that detects prints left on nonporous surfaces at a crime scene by dispensing heated cyanoacrylate vapor over an area via a self-igniting wand.

Another critical function of OLETC is helping law-enforcement agencies find ways to pay for innovative equipment. The office has compiled a guide to federal law-enforcement technology funding sources that provides eligibility requirements, criteria for selecting proposals, and examples of funded projects.

Training for the Future

Education and training are significant aspects of NTTC's activities. Idea Contactª, a new program directed at federal lab and agency personnel, teaches scientists, engineers, and managers how to evaluate a technical innovation for its manufacturability, marketability, and usefulness to the commercial world. For small and medium-sized manufacturers, NTTC provides technology-driven industrial extension programs, concentrating on the use of federal technologies as a catalyst for economic revitalization. As part of the Technology Reinvestment Program, NTTC received a grant to work with the Pennsylvania Technical Assistance Program, Rensselaer Polytechnic Institute, and other manufacturing assistance groups to create a national curriculum for training industrial extension agents. Finally, in cooperation with Wheeling Jesuit College, NTTC has developed courses of study for bachelor and master of science degrees in technology management, innovation, commercialization, and technology transfer.

As for the dry-cleaning innovation, David Porter, president of Garment Care Inc. in Kansas City, came to NTTC with an idea that would eliminate the environmentally troublesome dry-cleaning chemical perchloroethylene. His rack conveyor system would carry soiled clothes through a water-based ultrasound bath, eliminating the need for the traditional chemical. An NTTC agent searched the center's technology database and came up with a potential research partner: the Kansas City Department of Agriculture facility operated by AlliedSignal. Researchers there responded with 40 hours of free discussion and preliminary tests on swatches of material. The ultimate result was a two-year Department of Energy "mini-CRADA" award of $50,000 for full-fledged research and development.

The dry-cleaning industry "wants innovation that not only takes care of our environment, but also our wallets," Porter says. "That's why we're excited about the technology transfer possibilities now before us. NTTC has, in my opinion, great networking potential for small business."

To access the National Gateway, phone 1-800-678-6882; to reach Business Gold, use Internet: http://www.nttc.edu. For more information on the NTTC, phone Jim Reed, Deputy Director of Marketing, at (304) 243-4400. OLETC is searching for 1996 Technology Innovation Award candidates: call NTTC at 800-678-6882 for more information.
________________________________________________________________________
Institute for Law and Social Research = INSLAW

http://www.rockarch.org/collections/nonrockorgs/commonwealth.php#

Excerpt from above link:

COMMONWEALTH FUND ARCHIVES, 1918-1988 

I

Illinois, State of (Board of Higher Education), 1966-1977
Illinois, University of, 1956-1975
Independent Sector, 1979-1982
Independent Sector, 1982-1989 (Series 18.3)
Indiana University, 1951-1972
Industrial Personnel Problem, 1919-1921
Institute for Crippled and Disabled Men, 1922-1925
Institute for Law and Social Research, 1979-1983 (Series 18.2)
Institute for Muscle Research, 1953-1965
Institute for Policy Studies, 1964-1967
Institute for the Study of Humanistic Medicine, 1977-1978
Institute of International Education, 1948-1981
Institute of International Education, 1980-1982 (Series 18.2)
Institute of International Education, 1982-1986 (Series 18.3)
Institute of Latin
American Studies, 1979-1980
Institute of Society, Ethics and Life Sciences, 1972-1983
Institute of Society, Ethics and Life Sciences, 1980-1983 (Series 18.3)
International Association for Child Psychiatry and Allied Professions, 1971-1981
International Association for Child and Adolescent Psychiatry and Allied Professions, International Study Group of, 1980-1983 (Series 18.3)
International Center for Integrative Studies, 1980-1984 (Series 18.3)
International Committee of the Red Cross, 1975-1977
International Congress on Mental Health, 1947-1949
International Council of English, 1927
International Council on the Future of the University, 1979-1981
International Epidemiological Association, 1967-1981
International Hospital Convention, 1928
International Mass Education Movement
International Women's Health Coalition, 1984-1986 (Series 18.3)
Inter-Racial Committee, 1919-1922
Iowa, University of, 1979-1983 (Series 18.2)
University of Iowa, 1982-1987 (Series 18.3)
Irvington House, 1936-1943
Ittleson (Henry) Center for Child Research, 1950-1962
________________________________________________________________________


http://www.fordfound.org/archives/item/0188/text/29

The Rockefeller Foundation contributed to the support for the Office of Environmental Mediation, but its emphasis is on the international context. Most of the other major foundations are not active in this area, except for this Foundation's involvement, described below.

As a consequence of the 1976 National Conference on the Causes of Popular Dissatisfaction with the Administration of Justice, the American Bar Association (ABA) and the American Bar Foundation (ABF) have initiated several projects. The ABF is engaged in studies and projects involving class-action litigation. The ABA has established a Special Committee on Minor Disputes; the ABA Commission on Law and the Economy, which is assisted by the Foundation, is discussed below.

The Institute for Judicial Administration is chiefly concerned with studies of the structure of state and federal courts, educational programs for judges and court administrators, and publication of research on the administration of justice. The National Center for State Courts has been concerned with encouraging and collecting better data on state courts, a study of judicial diversion, and mechanisms for creating more effective small claims courts. A relatively new organization, the Institute for Law and Social Research (a Foundation grantee), is working on a systems approach to the criminal justice system.

The American Enterprise Institute is exploring the role of information and incentives in regulation. The Center for Administrative Justice, an organization concerned with training and research in administrative law, has completed a large study of Social Security hearings. Other projects are under way at the Urban Institute, the Rand Corporation, the Stanford Research Institute, and Abt Associates.
________________________________________________________________________
http://w2.eff.org/legal/cases/INSLAW/inslaw_hr.report

Excerpt from:  Union Calendar No. 491
102d Congress, 2d session -------------------------------- House Report 102-857 THE INSLAW AFFAIR


I. SUMMARY

The Department of Justice has long recognized the need for a standardized management information system to assist law enforcement offices across the  country in the recordkeeping and tracking of criminal cases. During the 1970's, the Law Enforcement Assistance Administration (LEAA) funded the development by INSLAW1 of a computer software system called the Prosecutor's Management Information System or PROMIS.  This system was designed to meet the criminal prosecutor workloads of  largeurban jurisdictions; and by 1980, several large U.S. attorneys offices were using the PROMIS software.  At this time, INSLAW (formerly called the Institute for Law and Social  Research) was a nonprofit corporation funded almost entirely through Government grants and contracts.  When President Carter terminated the LEAA, INSLAW converted the company to a for-profit corporation in 1981 to commercially  market  PROMIS.

The new corporation made several significant improvements to the original PROMIS software and the resulting product came to be known as INSLAW's proprietary Enhanced PROMIS.  The original PROMIS was funded entirely with Government funds and was in the public domain.

Offline Elvis

  • Member
  • *****
  • Posts: 1,356
  • just one
Re: Rockefeller funded INSLAW-PROMIS-Police State Technocracy-Mind Control
« Reply #19 on: April 21, 2009, 08:10:21 pm »
I suspect that our spirits, much like "unalienable rights", are God-given and beyond the destructive capability of any mortal or government. To the extent any government tries to destroy its own people's spirits, that government attempts the impossible and must not only fail but probably perish.
i also suspect that to be true.
"A great civilization is not conquered from without until it has destroyed itself from within." - Will Durant

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
Re: Rockefeller funded INSLAW-PROMIS-Police State Technocracy-Mind Control
« Reply #20 on: April 21, 2009, 08:51:46 pm »
I haven't had time to read all of this just yet because we're having a surprise party in a few minutes-but just a word of caution. I noticed you linked newsmakingnews. Be very leary of anything from there. The women that run that site, Virginia McCullough and Kate Dixon are first off running active interference in my case as well as other open cases, spreading LOTS of lies along with a tiny bit of truth, and they also are friends with the 'bad guys'. I have evidence against them (more than what I'm about to link here)
http://desertfae.com/dixon.htm
I'll hopefully be able to read all of this tomorrow though because I think you only linked a small part to their site.
Exposing the Octopus and my dad's murder-www.desertfae.com

Anti_Illuminati

  • Guest
Re: Rockefeller funded INSLAW-PROMIS-Police State Technocracy-Mind Control
« Reply #21 on: April 21, 2009, 09:58:52 pm »
I haven't had time to read all of this just yet because we're having a surprise party in a few minutes-but just a word of caution. I noticed you linked newsmakingnews. Be very leary of anything from there. The women that run that site, Virginia McCullough and Kate Dixon are first off running active interference in my case as well as other open cases, spreading LOTS of lies along with a tiny bit of truth, and they also are friends with the 'bad guys'. I have evidence against them (more than what I'm about to link here)
http://desertfae.com/dixon.htm
I'll hopefully be able to read all of this tomorrow though because I think you only linked a small part to their site.

Thank you for letting me know.  If you find ANYTHING about this to be false in any way, do not hesitate to point it out immediately.  I had asked Sane to look into these 2 specific posts, and I want anyone else so inclined to doing quality research to vet this info and point out anything that can be proven to be incorrect or is in any way misleading or "agenda based".  I have no interest in anything but the absolute truth in exposing the NWO, and I will insert annotations where any incorrect info is discovered so that we can even expose those who try to co-opt/infiltrate/side track/point fingers at wrong people, or otherwise in any way obfuscate or derail real investigation and hard facts.

That being said I want to reiterate that I did back up some of the info in the questionable site that you mention from here:  http://www.nasatech.com/resrep/NTTC.html

Again, do not hesitate to weight in and tell me if even my other sources in reference to things that you have unique knowledge of is (or is not) legitimate and debunk-proof, or able to be further cross-referenced against other known trusted sources.

Anti_Illuminati

  • Guest
Re: Blowing the lid off of PROMIS once and for all - You cannot lie to me
« Reply #22 on: April 26, 2009, 09:31:53 pm »
NORMAN.JIM
By David P Beiter

Date:     Sun Dec 10, 1995  8:55 pm  CST
From:     David J Sussman
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:     * David Beiter / MCI ID: 635-1762

MR-Received: by mta STIM; Relayed; Mon, 11 Dec 1995 02:08:12 -0500
Alternate-recipient: prohibited
Disclose-recipients: prohibited
Date: Sun, 10 Dec 1995 20:00:00 -0500 (CDT)
From: BRENDA JINKINS 383-4248
Subject: Norman Interview on Quinn
To: [email protected]
Posting-date: Sun, 10 Dec 1995 20:05:00 -0500 (CDT)
Importance: normal
Priority: normal
X400-MTS-identifier: [;00702011215991/[email protected]]
A1-type: MAIL
Hop-count: 2
Sender: [email protected]
Precedence: bulk

Date: Sun, 10 Dec 1995 19:37:00 CDT
From: "BRENDA JINKINS"@mr.stim.tec.tn.us
Subject: Norman Interview on Quinn
MIME-version: 1.0
Content-type: TEXT/PLAIN; CHARSET=US-ASCII
Posting-date: Sun, 10 Dec 1995 00:00:00 CDT
A1-type: DOCUMENT

Forwarded:

   ****************************************************************

The following is a Radio Interview between James Norman, formerly Senior
Editor of Forbes Magazine and now with Media Bypass Magazine and Jim
Quinn DJ of WRRK 96.9 FM in Pittsburgh.  In this interview from December
7th, they discuss issues of national importance and STUNNING IMPACT.
Essentially they give out the reason for Vincent Fosters Death, and the
fact that the "resignations" of the Congresscritters is NOT for policy
reasons but because they have been caught with millions in corrupt funds
in Swiss Banks.  Read this to learn what the "mainstream media" doesn't
ever tell you...


Quinn's Interview with Jim Norman

QUINN: Jim Norman, former Senior Editor at Forbes Magazine, and
currently writing for Media Bypass Magazine after having uncovered
Caspar Weinberger's Swiss bank account (we do get punished for some of
the truths we uncover,do we not?).  Jim is on the phone with us this
morning.  Good Morning, Jim.

NORMAN: Hi, how are you?

QUINN: Pretty good.  I want to give people a chance to get an idea of
what it is we are going to launch into after 8 o'clock, and I want to
give some background into this.  Is it fair to say that since Iran
Contra that the government has sort of been involved in the drug
business?

NORMAN: Yes, it goes way back before then, actually.  It goes back even
to the Vietnam War days -- remember the Golden Triangle, Laos, Cambodia
and all that, Pakistan and Afghanistan, but it was always on a much
smaller scale.  What apparently happened was that in the 80s we got into
it in a big way, basically nationalizing the wholesale importation of
drugs from Central and South America.  The idea was that we control it
somehow that way; instead, it has just become the tail wagging the dog,
I think.

QUINN: It's become the funding source for just about anything that the
government covertly wants to do, and for the moneys that various
elements of the government don't want to ask the congress for, nor do
they want congress to know about.

NORMAN: Right.  And it's an arms business, too.  They are kind of all
tied up together.

QUINN: So it's arms and drugs?

NORMAN: Right.

QUINN: Kenneth Starr is currently our Whitewater prosecutor, and I have
long said on this show that I find Ken Starrr interesting but also
troubling in that there are many elements to the Whitewater scandal.
Part of the laments have to do with banking and have to do with Madison
Savings and Loan, check kiting, stuff that went on with the Arkansas
Development Financial Authority, but basically there are really two
elements -- there is Whitewater and then there is all the stuff with
Mena Airport, Iran Contra, drugs into the country, various unexplained
deaths, one of them Vince Foster, the possibility of espionage on the
part of the first lady, and all of this lies behind a brick wall that
Mr.  Starr has been positioned upon to make sure that they get Clinton
but that the fire doesn't burn past that wall; because on the other side
of that wall are Republicans and Democrats.  Am I right?

NORMAN: That's right.  He is not looking at Mena; he doesn't have the
authority to from Janet Reno.  He does have authority to look at the
Vince Foster death, but I think only inasmuch as it relates to the
Whitewater situation.  The whole thing is hemmed in and beyond that is
this whole national security blanket that has been thrown over big parts
of this thing that you couldn't touch if you wanted to.

QUINN: It's interesting, I find, that Dr.  Henry Lee, who was part of
the defense team for the Simpson trial, has ended up working on the
Vince Foster affair.  The word that I get is that he is going to say it
was indeed a suicide.  You have to remember something about Dr.  Henry
Lee -- he was, oddly enough, the guy that was called in to do some work
on the Danny Casalaro death down in Martinsburg, WV back in the early
nineties.  Was it 1991?

NORMAN: I think it was 1991.

QUINN: This was that reporter that you may have heard about that was
found dead in a motel room, supposedly from a self-inflicted wound, even
though the papers (a year's worth of investigative reporting) were all
missing.  He was working on the story that he called the "octopus" and
basically it's the same story that you are working on, isn't it?

NORMAN: Yes, I know I'm talking to a lot of the same sources.  Danny
supposedly slashed his wrists twelve times, sometimes deep enough to cut
the tendon.

QUINN: Yeah, right.  And his files were all missing.  Sure, there's a
suicide.  Right.  And they embalmed his body before they even had a
chance to inform his parents that he was dead.

So it's another "Arkanside."

NORMAN: George Williamson, who is an investigative reporter out of San
Francisco, has been working on that.  He has come up with all kinds of
stuff -- other witnesses that have disappeared, people in the hotel who
just aren't there anymore -- disappeared mysteriously.

QUINN: It's interesting.  There are a lot of people who are witnesses to
various deaths involved with this Arkansas crowd, Danny Casalaro for
one.  Also, the two young boys on the railroad tracks down in Arkansas
who stumbled on the drug operation.  A lot of the witnesses around that
have met violent and untimely deaths as well.  So here are a great deal
of ugly people involved in this.  We are going to get down to what it
all means in terms of government corruption and scandal of immense
proportions that touch both parties.  This is really nonpartisan.  The
fact that I don't happen to like "President Pantload" doesn't have a
whole lot to do with this; he was just sort of a guy who happened to be
there with his hand out at the time.  It all goes back to the late 70's,
right Jim?

NORMAN: Yeah, and even before that.  Let's start with the early 80s when
Bill Casey came into office in the CIA under Ronald Reagan.  That's when
our government decided to embark on this amazing and extremely
unbelievably successful effort to spy on the world's banks.  We did it!
We have been spying on world banking transactions for more than a dozen
years.  The way we do it is by basically forcing foreign banks,
wittingly or unwittingly, to buy bugged software and bugged computers
that let our NSA (National Security Agency) which is the intelligence
arm of the government, to basically surveil wire transfers all over the
globe.

QUINN: Let me ask you this.  How do you sucker the rest of the banking
community around the globe into buying the software that you are
selling?

NORMAN: First of all you sell to front companies like this company
Systematics in Arkansas, now called Alltel Information Services.  They
had another company called Boston Systematics, an affiliate based in
Israel mainly.  There is Robert Maxwell, the UK publisher, who is
fronting this stuff.  There are a whole bunch of people fronting this.

QUINN: Wait a minute, Robert Maxwell -- isn't he dead?

NORMAN: Yeah, he is now.

QUINN: Didn't he have an unfortunate accident?

NORMAN: Fell off his yacht in the Atlantic Ocean somewhere.

QUINN: Why, isn't that amazing!

NORMAN: The tinkering of it was mainly putting back doors, just a few
lines of code, that would allow somebody to dial into a computer without
leaving any footprints, any audit trail that you were in there.  Then
you could go around and look around in files or you could collect
information from a system without the user even knowing it

QUINN: Now this software, which was originally called Promise, was
stolen from a company called Inslaw by the Justice Department.  It ended
up somewhere, probably at E Systems or somewhere, and it was converted
into banking software.  It Started out as software designed to track
prosecutorial cases around the country.  My question is -- Why didn't Ed
Meese just pay the damn bill, and none of this would ever have come to
light!  Danny Casalaro was chasing the stolen software when he stumbled
on what it was being used for.

NORMAN: Well, the trouble with it was that they bought it for use in the
Justice Department, but they were going to use it all over the place.
If they were paying royalties on it, Inslaw would know just how
extensive the use was of the software, and they didn't want people to
know how extensively it was going to be used.

QUINN: I see...

NORMAN: Plus, a lot of the profits from the resale of this went back
into private profits.  It was customized and resold to the intelligence
community.  It became sort of a basic platform database tracking system
for most of our intelligence agencies and many of those abroad.  The
idea was "Well, we can all talk to each other now." In fact what it has
allowed us to do is basically rifle through other people's data files
abroad too, because the stuff was apparently being sold to foreign
intelligence agencies and it was also bugged.  We have other ways of
basically surveilling and downloading foreign electronic databases.  The
whole computer world is much more porous and transparent than anybody
wants you to believe.

QUINN: There is a bank here that I know that uses this software right
here in this town, and I'm sure that there is probably more than one.
Everybody's got it.

NORMAN: In some form or another.  It goes under different names now.
It's been modified many times.  I think when Inslaw had it, it was a
half million lines of code.  I'm told now it's a couple of million lines
anyway.  It's gone through many, many modifications over the years.

QUINN: This company, Systematics, which is I believe still 8% owned by
Jackson Stevens at Stevens Inc., who, by the way, is one of the backers
of Bob Dole -- how troubling is that?

NORMAN: He is the co-chairman of Dole's finance committee.

QUINN: That's right!  Bob's in town -- Hi Bob -- You'd better explain
this.  You'd better explain Mena, too, Bob or it's going to follow you
to the White House.  Systematics, I understand, had an attorney who was
kind of off the record doing work for them, named Vince Foster.  Is that
true?

NORMAN: Yep, that's true.  We've heard that from many, many sources
now.  In fact, Jim Leach's committee has established that pretty well
with some of the investigation that they have done.  Foster was a
trusted deal guy for Stevens at the law firm.  Although Foster never
shows up officially as an attorney of record for Systematics, he was
definitely in the loop, basically smoothing out things between
Systematics and the NSA, which was the main government agency that was
contracting for a lot of this stuff.

QUINN: So this is how Foster got involved in intelligence, right.

NORMAN: Yes, because there is heavy duty code and computer technology
stuff involved here.  Apparently, some time in the early 80s he
developed this relationship with the State of Israel.  In fact, some of
the same handlers I am told were involved in the Jonathan Pollard case.
They basically nurtured him and groomed him for many years and then
bingo, they hit the jackpot -- he ended up in the White House.
Apparently he convinced Hillary to help him out on some stuff.

QUINN: So...  what is Foster involved in?  It's the mid 80s...

NORMAN: Mid 80s.  Foster is at the Rose Law Firm.  Think of him as a
high- level marketing guy between Systematics and the NSA.  NSA -- they
have all these spooky contracts that they are trying to find contractors
for.  Foster would have been sort of a go-between there.  Plus Hillary
was actually an attorney of record for Systematics back in 1978 when
Stevens tried to take over the Financial General Bank shares in
Washington.  Those bank holding companies later became First American -
Clark Clifford, Robert Altman, all that crowd.

QUINN: Yeah, the BCCI thing.

NORMAN: Stevens was fronting for the BCCI crowd and trying to take over
this Washington Bank Holding Co.  The SEC blocked him at the time,
partly because one of the things he was insisting on was that this
company Systematics which at that time was a tiny little thing in
Arkansas, he was insisting that they be brought in to do all of the data
processing for this multistate bank holding company in Washington.
Hillary represented Systematics in that.  Now the thing about
Systematics at the time -- it was before they even got involved with the
bank spying stuff.  Abroad for many years, they had been what amounted
to a Laundromat for covert funds for the CIA and the intelligence
community, quite legally, probably.  It was done for the national
interest.  Somebody had to move this money around and Systematics was in
a perfect place to do it because they owned the computers and a whole
bunch of small banks.  They could move this money around electronically
without the bankers even knowing about it necessarily, and it wouldn't
go through the normal clearing houses.  The regulators wouldn't see it.
It would just crop up wherever the CIA needed it in whatever bogus front
company account, and it was all just bits and bytes; it was a
cyberbank -- it still is.

QUINN: I'm here with Jim Norman, former Senior Editor at Forbes
Magazine.  You know, it's interesting, here is a guy who was with Forbes
Magazine, a respected senior editor who figured probably this would be
his life's work.  All of a sudden, he finds himself a defrocked commando
journalist working for Media Bypass Magazine out of what Evanston,
Illinois, or somewhere in Indiana?

NORMAN: Indiana.

QUINN: Yeah, that's right.  Now, I got a question.  Before we get into
Vince Foster in the mid 80s and Hillary Clinton's role in this, how did
you get onto this whole scandal?  Where did you walk through the door on
this?

NORMAN: I came in the back door completely.  Look, I had no ax to grind
here against Bill Clinton or the Administration.  I hated covering
politics.  I thought it was all baloney.  I'm just a business writer,
and I never wanted to get enmeshed in this whole Whitewater/Vince Foster
thing, but I started for a couple of years I had been following this oil
company bankruptcy up in Stanford, Connecticut, because I had covered
oil.  This thing never made sense to me.  There is no reason why this
company went bust and, in fact, when I actually got into it and started
redoing the oil trading transactions, the reason they lost money: they
weren't losing it.  They were hiding it.  They were parking it off shore
with another company that was financing arms sales to Iraq, cluster
bombs and stuff like that all through the 80s.  And, this Chilean arms
dealer, Cardone, who was providing weapons, was also it turns out
brokering some of the sales of this stolen software.  Okay, that gets me
into the software story.

QUINN: So that gets you onto the Promise software, and you and Danny
Casalaro are now on the same road.

NORMAN: Right, and then in the process of that, I Started talking to a
whole bunch of rather spooky, strange intelligence community characters,
and I was sitting at a guy's living room down in Kentucky one day.  He
was sitting there in the middle of the night blowing smoke rings, and he
said, "yo by the way, Vince Foster, he was under investigation." I
said, "under investigation, for what?" And, he said, "well, it's
spelled 'Espionage.'" BOINK!!...and that's how I got on this whole Vince
Foster thing.

QUINN: So that's how it happened?

NORMAN: Yeah.

QUINN: Okay, now here it is, the mid 80s.  Vince Foster is working for
Systematics, and he is coming into contact with the intelligence
community.  What is, how did Hillary Clinton and the Israeli Mossad and
all of this come together and what happened?

NORMAN: Well, I think that they had been...look the Israelis were key
partners with us in this bank spying effort.  This is a joint allied
government effort, and the Israelis were one of the key front people in
this in selling and supporting this software all over the world so that
people weren't thinking they were getting the software directly from the
U.S.  You know, there was an Israeli front company used to sell this
stuff to foreign banks.

QUINN: Well, they sold it to the Moscow bank.  I know that.

NORMAN: Well, Systematics did, yeah, and Systematics got involved in
supporting this stuff all over the world, a little company in
Arkansas...go figure.  Come on.

QUINN: Yeah, really.

NORMAN: I mean, main software people, they operate in New York and
places like that and not out of Podonk, Arkansas.  So, at any rate, the
Israelis had ties into this whole thing all along, and, you know, they
are our friends.  We do give them a lot of stuff and share a lot of
stuff.

QUINN: Well, the whole idea was to track terrorist money, and the
Israelis have a great interest in that, and rightly so.  There is no
problem here.

NORMAN: The name of this problem was "follow the money for terrorist
reasons," but once you set that up, you can do all kinds of stuff with
it.  I mean, we were spying on everybody's money.  I think that's
probably how we helped bust the Soviet Union.  We found out just how
deep their pockets were, where their money was, who we could bribe.  You
know, acting as a financial destruction of their society more than
anything.

QUINN: So, how does Foster get involved in espionage?

NORMAN: Well, I think it was money.  Money, money, money.  And,
especially you know with this whole political thing, it takes so much
money to run for office.  I mean, my theory is that the actual spending
is probably twice of what anybody declares when you add up all of the
soft dollars and everything.  I think there is a tremendous need for
money there, and they just weren't real cautious about where it was
coming from.  I think this thing about selling state secrets to the
Israeli's and other countries was just a business.  It was just for
money.  I don't think there was any ideology involved here at all, and
it was one of many businesses.  There is also insider trading going on
here.  There was the kickback on drugs and arms stuff and so the money
has to go...you have to hide it some way so it goes into Swiss bank
accounts.  And Foster would have known that yeah we're tracking this
money off shore, but there is such a blizzard of information that unless
somebody knows exactly what they are looking for they would never find
anything.  They thought they could cover this up pretty well so Foster
had...actually he had several accounts, and there was one in particular
in this bank, bank at Villa Switsaria Italiano in Chaso on the Italian
border.  It is a little kind of a mafia kind of community there reputed,
and so he was taking the money in there for the payments from the
Swiss.  He was going to Geneva every six or eight months, and his
curious one-day trips - I don't think it was for sightseeing.

QUINN: No.  I'm sure he wasn't doing any real estate work for Arkansas.

NORMAN: No.  The whole thing about money laundering is...you know the
money would go into a Swiss bank.  Somebody would have to go physically
and take it out and take it to a friendly bonded dealer or something
like that, buy bearer bonds or other kinds of bonds or something that
you could pledge as collateral for loans back in the states and turn it
back into cash again legitimately, and so that is how money laundering
works.  Vince, in effect, was a bag man here because when they go to the
White House all of a sudden they hit the jackpot.  There was so much
more goodies there, and, in fact, Deborah Goram, Foster's executive
assistant, testified under oath that Foster had given her two, inch-
thick ring binders from the National Security Agency to put in Bernie
Nussbaum's safe in the White House.  What were these binders?  Well, I
have talked to brokering experts on this stuff, and they say, "look,
when you are talking NSA binders in the White House, you are talking
mainly one thing, and these are the codes and protocol by which the
President authenticates himself when he has to call up the Pentagon to
say let's go nuke somebody." Now, what was Foster doing with these
things?  He had no business with them.  He would have had no access to
them.  It would have to come from somebody with access to the Oval
Office or the Presidential living quarters.

QUINN: And, who would that be?

NORMAN: Well, I think we know who we are talking about here.

QUINN: We're talking about Hillary Clinton, aren't we?

NORMAN: That's right.  She has been under investigation in this whole
thing, too, but I think that they had a strong case against Vince and
not such a strong case against Hillary.  But, you see what happened was
and this is another whole part of the story as to how they got onto
Foster.  Basically, there was a team of computer hackers and computer
intelligence guys in the CIA who were going through most databases.
They found names there that they identified as being Foster and
Hillary.  They put them under surveillance actually before they went to
the White House.  I think it was between the election and the time that
they went to the White House, and that's when the alarm bells went off.
They had been surveilling these accounts for a while, and when Foster on
July 1, 1993 bought a ticket to Geneva, a round-trip one-day ticket to
Geneva, these guys said, "oops, he's going to take the money.  We're
going to beat him to it." And, they went in.  They hacked their way into
the bank and obtained the necessary authorization codes on this coded
account for which no signature is required to withdraw money, by the
way.

QUINN: Right.

NORMAN: They were able to effect their own technically legitimate wire
transfer of this money back to the U.S.  Treasury where it sits in a
holding account escrowed for use by the CIA.

QUINN: So, the CIA empties Vince Foster's Swiss bank account of its
ill-gotten money.

NORMAN: Yeah, actually it wasn't the CIA.  It was this sort of renegade
vigilante group of guys they called the Fifth Column that has been out
doing this stuff.  They don't take any of the money for themselves.  The
money goes to the...

QUINN: They just do it for fun?

NORMAN: The CIA only gets the money.  It is escrowed for use by the CIA
but only when the CIA gets rid of a bunch of its bad apples there who've
got dirty hands from drug kickbacks, arms.

QUINN: Let's pick this story up.  There was a meeting just before Vince
Foster died on the eastern shore of Maryland in which Webster Hubble,
Vince Foster, and some others were present.  Okay, this was just before
Foster died.  Pick up the story here.

NORMAN: All right.  Well, we mentioned July 1, 1993, Foster buys this
round-trip ticket to Switzerland.  They raid his account.  They take
out $2.73 million.  Foster apparently calls up the bank to let them know
he was coming.  They say, "Oh, Vince don't you know you took the money
out already?" Boing...that's when he found out he was under
investigation.  That's when he got so mysteriously depressed.  It had
nothing to do with editorials in the Wall Street Journal.  He had his
bank account raided big time, and he knew he was under surveillance, or
he knew he was under investigation.  And, that Started this curious
chain of events.  Webster Hubble testified that not so much Vince was
depressed, but he was worried.  He was afraid to use the White House
telephones.  The guy had heart palpitations.  He couldn't sleep at
night.  His doctor gave him a prescription for sleeping pills.  His
sister tried to get him to talk to some psychiatrist.  He never got in
touch with them.  Instead, he hired a high-powered lawyer in Washington,
Jim Hamilton, this big deal white-collar crime fix-it guy who handles
people who get hauled up for Congressional hearings.  And, then there is
this curious meeting the weekend before Foster died.  He and his wife,
Lisa, go down to the eastern shore of Maryland for a getaway weekend,
and then, by coincidence, they meet Hubble and his wife down there.
Hubble, also from the Rose Law Firm, at the time the country's de-facto
top law enforcement law officer because Janet Reno in effect was taking
her orders from Hubble.  They go over to the estate of Michael Cardoza
who is the son-in-law of Nathan Landau, a big deal Democratic
fund-raiser, and Cardoza is also the head of Clinton's legal defense
fund.  Supposedly, this was all poolside chit chat.  Baloney, it was
damage control.  They were trying to figure out how to contain this
scandal from spreading to other people in the White House, and they were
trying to lean on Vince to get him to, you know, cop a plea, go quietly,
or shut up and don't talk about it.  And, in fact, what my sources have
told me is that there was actually a huge payment made to an account
held by Lisa Foster with more than $286,000 on the Friday before that
meeting.

QUINN: Wait a minute, on the Friday before that meeting, Lisa Foster's
bank account gets a deposit of $286 million?

NORMAN: $286,000, yeah.

QUINN: I'm sorry, yeah $286,000.  Okay, so does she take it out?

NORMAN: Well, I don't know what ever happened to that money.  It is hard
to tell where it came from even.  It is all very mysterious to me, but
it sure smells like hush money to me.  It's like, "look Vince, don't
worry, we'll take care of your money."

QUINN: You don't know if she wrote a check on it?

NORMAN: Well, I'm told that it came through the hands somehow of Sheila
Anthony, who was Foster's sister and at the time she was a
"congressional liaison" person at the Justice Department, whatever a
congressional liaison is.

QUINN: So she takes the money to Foster, and Foster turns it down?

NORMAN: Well, no...I think he probably accepted it, or it went there.
But, apparently, he was having second thoughts, I think.  You know, on
the Monday after they came back from this meeting, the records showed,
the public records showed, that he has a parade of people coming by his
office in the White House saying, "hey, how'd your weekend go, Vince?
You cool with this?  I mean, you on board with all of this?  Everything
okay?" you know.  Then,...

QUINN: A lot of very nervous people in the White House.

NORMAN: That's right.  Then, the day he died he had like a two-hour
meeting with another person from the Arkansas contingent there.  I think
the problem was that they were afraid that Vince was going to talk or
that he was going to crack under questioning, and here's a guy who was
now, at this point, under intense surveillance.  I mean, he had not only
CIA counter intelligence people, but you had NSA.  You had FBI
surveilling him.  There was a four-person IRS team we know was assigned
to tail this guy, probably in connection with the money laundering
aspect of the Swiss bank account.

QUINN: God, this thing's got everything but floats in the....I mean all
they need is Goofy, a big balloon with ropes on it following this guy
around.

NORMAN: You almost did.  I mean, you had the Secret Service with a
bomb-sniffing dog squad out there checking his car in the parking lot.
The video tapes of that gone.  The video tapes of the room where they
are stored, gone.  I mean, this whole thing is massively covered up, and
I guess it is for national security reasons.

QUINN: Well now, I understand that Foster had a meeting scheduled with
Bill Clinton.  I believe it was on a Wednesday.

NORMAN: Right.

QUINN: And, it was the Tuesday he was killed.

NORMAN: Right.  Exactly.  The question is well, gee, was he going to
drop something in the President's lap and blow the plausible deniability
that he might have on this stuff.

QUINN: Well, this Foster suicide thing is so sloppy.  It leads me to
believe that on Tuesday they thought he would take the money and shut
up, and he didn't take it so they had to do something real quick.

NORMAN: Well, that could be it or that even if he wanted to shut up
maybe they were afraid he would crack under interrogation or something.
You know, it is just somebody wanted him real dead, and there is a bunch
of people who had ample reason for it.  This was not suicide.  It was
not over depression.  This was a political assassination carried out on
U.S.  soil by foreign government.  The Israelis were involved in this.
There was apparently a three person Masad contracted team that went into
the apartment that Foster had gone to that afternoon where he was
apparently lured by a female person from the White House staff who I
think still works in the White House.

QUINN: Now, who would that be?

NORMAN: Well, I...

QUINN: Because, he had sex with her?

NORMAN: That's the impression, yeah.

QUINN: I mean, there was semen on his shorts.  There was brownish-blonde
hair on his clothing and rug fibers all over him which may or may not
have had to do with having sex on the floor.  It might have been...

NORMAN: No, I think that was because he was rolled up in a rug
afterwards and taken over to Fort Marcy Park.  Now, the question is were
elements of our intelligence community involved in helping to dispose of
the body and cover it up some way?

QUINN: Who is the woman in the White House?

NORMAN: I can't say.

QUINN: Patsy Thomason?

NORMAN: No.  I don't want to say.  I suspect...

QUINN: Dee Dee.  Well, she's not there anymore.

NORMAN: That name is known.  I mean, she has been identified on these
tapes apparently, but....

QUINN: I think Dee Dee and Bill are doing it, but that's just me.
Anyway, let's get back to the story here.  Okay, so I understand at
least you are claiming that there is a videotape of Foster's murder?

NORMAN: Well, of the people entering and leaving this apartment a few
blocks from the White House where it apparently occurred.

QUINN: Has anybody located this apartment?  Do you know where it is?

NORMAN: I don't know exactly where it is myself.  I am told it is
actually within a few blocks of the White House.

QUINN: Okay, so they lure him here, and they pop him, and there is a
videotape of it or there is a videotape of the people going in and out.
Then, they go to Fort Marcy Park, and they dump him.

NORMAN: Right.

QUINN: Okay, and we've got a witness now that says they saw the two guys
that fit the same description that Patrick Knowlton, the other witness,
to Foster's car.  He describes the one guy that threatens him.  One of
those people is one of the two that supposedly was walking Foster, who
looked drunk to this guy, into the park, but he says that they laid him
out.

NORMAN: Yeah.  I don't know too much about all that stuff, but what I
know is this that Paul Rodriguez is the Editor of Insight Magazine that
came up with this Mr.  X source.  When Forbes decided not to run the
story for reasons that were kind of mysterious to me at the time and
while I was still there, they gave me permission to publish it
elsewhere.  And, as I approached Insight because they are kind of a
gutsy magazine, David Rodriguez made a whole bunch of calls around
Washington trying to corroborate this stuff, and I think he was making
some headway.  Then, he gets this visit in person from some military
intelligence guy from the Pentagon who comes to him and says, "Paul, lay
off this story.  You don't know what you're dealing with here."

QUINN: No.  I think we do know what we are dealing with here.  We're
dealing with the biggest scandal since maybe...

NORMAN: And, you got Israeli relations at stake here.  You know, the
intelligence community has a lot of joint ventures with the Israelis.
They don't want to "queer" those things.  I mean, we do business with
those people a lot, and you know a lot of it is probably quite necessary
but you know there is a scandal here that dwarfs the Jonathan Pollard
case by orders of magnitude really.

QUINN: I want to discuss a couple of things with you.  First of all, now
it would appear that a bunch of Republicans picking Kenneth Starr to put
him in charge of this investigation of Vince Foster and the Whitewater
problem in Washington, D.C.  On the surface, it looked like they were
going for the jugular, but see Mr.  Starr has some background that leads
back to the Inslaw case we discussed earlier in the show about the
Promise software and stuff.  He excused himself from that litigation.

NORMAN: And, the reason was because he was the inside counsel at the
William French Smith at the Justice Department in 1982 at the time that
the Inslaw software was expropriated by the government really.

QUINN: Okay.  So he really is not in the position to be the pit bull to
expose this.  He is in a better position to get Clinton on whatever
Republicans need to get him on and make sure that Republicans don't get
burned here.

NORMAN: I think that's it.  Yeah.

QUINN: Okay, now.  Given that that's the case and given that the
Washington inside the beltway crowd on both sides of the aisle are
trying to make sure that the fix is in on this, how do you think or what
leads you to believe that this is going to come out and through what
channels?

NORMAN: Well, again, it goes back to resources of mine.  Basically,
there are a few good guys in the intelligence community particularly
this handful of people in the so-called Fifth Column who are so incensed
about this bipartisan coverup, the government's inability and
unwillingness to deal with the high level corruption here, they've just
decided to take things into their own hands.  They never had government
authorization to go raid the foreign bank accounts, but....

QUINN: How many accounts are there?  How many people in the government
right now have Swiss bank accounts filled with money from BCCI, drug
laundering, defense kickbacks, arms trades, I mean all of this nonsense?

NORMAN: Not as many as two years ago.  These guys have been out raiding
these accounts.  They've pulled back $2.5 billion, more than $2.5
billion with a "B" dollars from 300, 400, 500 of these accounts.  There
is probably 3,000 coded Swiss and other foreign bank accounts that they
have been rifling through the computers on.

QUINN: How can there be this many of them and it doesn't come out?

NORMAN: It is because it is endemic corruption.  The government is
corrupt.  Why should we give the President of South Korea $600
million?  ...country more powerful, more worth corrupting, more venal
and with weaker controls for policing this stuff.

QUINN: Well, because we don't believe it can happen here.

NORMAN: That's right.  We're Americans.  Well, this is greed and money.
But, there is....

QUINN: Well, it's murder too.

NORMAN: That's right, and there have been hundreds of these accounts
already raided, and nobody, NOBODY has been able to stand up and say, "I
was robbed." Why?  Because, the money came from exactly what you said -
kickbacks on drugs, kickbacks on arms, insider trading, and they never
paid any taxes on this stuff.  They've never disclosed it, and the
minimum sentence for willful tax evasion is ten years, that's the
minimum.  So, what you have going on right now in Congress is basically
there is an angel of death.  Actually, there is two I'm told.  There is
one on the Democratic side and one on the Republican side.

QUINN: Now, do they make their rounds together?

NORMAN: No.  It's separately.  What I'm told is that the people in
Congress with these Swiss bank accounts who have had these accounts if
they haven't already left, if they haven't had the good sense to already
get their butts out of there they have been delivered, hand delivered a
brown paper envelope with transaction records of their Swiss bank
accounts and within a day or so they get a visit from this angel of
death who says it's time for you to go, time to do some career planning,
you're out of here, we don't want you in the government when the stuff
hits the fan here as it's gonna do in the spring apparently.  The
records are going to Starrt coming out.  It's going to be obvious.
These vigilantes are just going to take this situation into their own
hands and release this stuff, I'm convinced.

QUINN: These people are real patriots.  They could end up dead doing
this.

NORMAN: Some of them may already have.  I think...but they've planned
this quite well.  I think they've got it down now.  They know that if
anything happens to them that the stuff would just come out in a gush so
it would be counterproductive for....

QUINN: Yeah, but I mean is it going to come out in the mainstream
media.  You've got the Mena story being spiked a year ago by Katherine
Graham at the Washington Post, and I've uncov...you what I stumbled on a
memo from Paul Keiser yesterday from the editor at the Washington Post
who writes me in this memo a flat out blatant lie.  He says that the
authors of the Mena story that was supposed to run January 26, 1995 in
the Washington Post Outlook Section had withdrawn the article before the
Washington Post had decided to run it, and that's just a flat out lie.

NORMAN: Well, it's technically probably true.  But, what they've done,
they've left those people dangling by a thread for like 6-8 months.  I
don't blame them for taking the story elsewhere as the....

QUINN: Yeah, but no, but Jim they didn't.  The type galleys had been
laid, and the artwork had been done.  It was supposed...they didn't pull
it until the Thursday before the Sunday it was supposed to run.  NORMAN:
Right.  Well, technically the Post can say, "oh, we never quieted
you..."

NORMAN: That's what they told me at Forbes, too, about my story.
Finally, I never got a good reason why my story didn't run at Forbes.
Ultimately, they said, "oh we didn't trust your sources." But, actually
what my immediate supervisor said, "we can't say this about
Systematics," which was a big advertiser at Forbes, and we can't say
this about the Israelis.

QUINN: Yeah, right.

NORMAN: That's why didn't run in Forbes.

QUINN: Well, there's actually no proof that Systematics has deliberately
delivered stolen software.  I mean, they may not even know that the
software was stolen, and it may be another version of it.

NORMAN: Systematics is under heavy duty investigation though right now
for money laundering because once you set up a system for laundering
covert funds for the government who knows what else you can piggyback on
top of that.  The suspicion is that this was the quid pro quo here in
return for laundering supposedly call it legitimate funds that the
intelligence community can piggyback other stuff to.

QUINN: Let's get back to the angel of death here and the resignations in
Congress which have been pretty much attributed by guys like Rush
Limbaugh to the fact that Democrats just don't like being in the
minority anymore, and they don't have the guts or stamina to stick it
out the way the Republicans did for 40 years.  And, some of that may be
true, but how many of these people who have said that they are pulling
their hats out of the ring.  And, now we have two Republicans.  How many
of these people have been visited by this so-called angel of death?  All
of them?

NORMAN: Well, the figures I've heard is that I think there's like 25 or
26 so far since the last election who have decided they are not going to
run again or had actually resigned and out of there like Norman Manetta
from Los Angeles.  Of those, I'm told about 21 or 22 so far can be
directly attributed to Swiss bank account problems.  There is probably
another dozen or so that are going to go that way.  Again, there is an
argument that, "oh, we just can't stand the nasty politics in Washington
anymore." Come on, give me a break.

QUINN: Well, I like Patsy Schroeder.  She wanted us to believe that now
that the Democratic party is in such good shape she can leave it and it
doesn't...did you see that?

NORMAN: No....

QUINN: That was great.  Oh yeah, now that....

NORMAN: Patsy Schroeder, somebody noted on the Internet that at the news
conference where she was announcing she wasn't going to run, there had
already been re-elect Schroeder bumper stickers printed up.  I mean,
she....take this guy Ron Coleman from Texas a Congressman down there.
He made his announcement at his supposed re-election campaign kickoff
party.

QUINN: You're kidding?  This is right out of a...this is a movie.

NORMAN: That's right.  Listen, these people have been confronted.
They've been given 24 hours basically to clean out their desks.  That's
what it amounts to.

QUINN: So, they're gonna try and get all these people out who have Swiss
bank accounts before it hits the fan.  Now, when do you suppose that
this is going to happen.  Can you give us a timetable?

NORMAN: Well, that's happening in tears.  I mean, we've already seen a
bunch of departures.  I think that the early spring is the timetable.
You know, Wall Street is going to get hit with this stuff too.  Now,
every year in the spring soon after the first of the year after these
guys collect their year-end bonuses you have abig exodus.  But, I'm told
Wall Street is going to get hit with this big time this year because
those guys were in it too.  You gotta remember, there was so much money
sloshing around here...

QUINN: Yeah, really.

NORMAN: ..from arms deals you could not launder all of that money
without the knowing, willing cooperation and participation of major
banks, major brokerage houses, and...

QUINN: Goldman Sachs possibly?

NORMAN: Oh yeah.  Look, Goldman...

QUINN: I always found it strange that Robert Rubin showed up when he
did.

NORMAN: His Goldman, they were the chief investment bankers to Robert
Maxwell in the U.K., helped Maxwell loot a half a billion dollars out of
his pension funds, and it now costs a huge amount of money for a
settlement there.

QUINN: It sounds like somebody's calling you.

NORMAN: They still have the bond for ADFA, the Arkansas Development...

QUINN: Whoa, hold on a second.  What's that?

NORMAN: That's another one of these...

QUINN: Well no, I know what it is.  You're telling me that Goldman Sachs
was holding the bonds for the Arkansas Development?

NORMAN: No, they were the underwriter on a bunch of these $8 billion or
so of bonds that ADFA marketed to who knows whom.

QUINN: Oh man.  You know, I have transactions on my desk at home, $80
million of money transfers to the Fuji Bank in the Cayman Islands from
ADFA, the Arkansas Development Financial Authority who I believe never
had more than $8 million to begin with.  I mean, where did they get $80
million and what's it going to the Fuji Bank for?  The interest rate?
Come on, the Switzerland of the Caribbean.  Jim, I gotta let you go.  I
gotta wrap this up here, but I want to thank you for joining us this
morning.

NORMAN: It's a pleasure.  I'll keep you posted as more develops.
There's going to be more coming down the pike here soon.

QUINN: Well, I'll tell you what.  I'm gonna call you later on today.
I'll give you my home number.  Let's stay in touch because if what you
say is true and if there are truly some patriots in the intelligence
community who are finally going to blow the whistle on this.  By the
way, all of these resignations and the angel of death and all of this I
think is evidence that these people know that this is inevitable that
this is going to come out.

NORMAN: It's like AIDS.  I think there are a bunch of people back before
the last election who realized they, in fact, have slept with the wrong
woman or person and that did not run again, but there has been denial,
denial, denial by a bunch of these people.  Finally, I think it's like
the angel of death is finally coming around saying, "you gotta go.
Bye.  You're outta here."

********************************* ****************************

If you are a talk show host and want to contact either one of these guys
for an interview you can reach James Norman at MEDIA BYPASS MAGAZINE
1-800-4-BYPASS

Jim Quinn can be contacted at WRRK , 7 Parkway Center, Suite 780,
Pittsburgh, PA 15220, Fax Number 412-928-9290, Internet address is
[email protected] homepage at http://www.warroom.com or Compuserve
72662,3507.

This is the story of the decade...spread this far and wide, printout and
FAX to your local talk show hosts.

-------------------------------------------------------------------

Brenda C. Jinkins
---------------------------------------------------------------------------
David Sussman
Oakland University SBA WWW Administrator
[email protected]
http://www.sba.oakland.edu/staff/djsussma/djsussma.htm
----------------------------------------------------------------------------


Date:     Thu Dec 07, 1995 10:28 pm  CST
From:     David J. Sussman
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:     * David Beiter / MCI ID: 635-1762
Subject:  Jim Norman - The Still Before The Storm (fwd)



---------- Forwarded message ----------
Date: 4 DEC 1995 22:28:58 GMT
From: Ken Cook
Newgroups: alt.current-events.clinton.whitewater
Subject: Jim Norman - The Still Before The Storm

This is the entire text of the James Norman article for the December 1995
issue of Media Bypass magazine.

THE STILL BEFORE THE STORM
by James Norman

  By all appearances, things are business as usual in Washington. There
is the traditional budget bickering this time of the year, the partisan
sniping and the backstabbing among Republican presidential hopefuls
angling for pole position next year. Meanwhile, President Clinton and his
ambitious wife manage to hold a comfortable approval rating in the polls,
enjoy favorable press and seemingly have managed to shrug off persistent
"Whitewater" allegations that have dogged his presidency.

  But don't be lulled by the mainstream media, which has been hard at
work pooh-poohing these corruption charges and doubts about the official
"suicide" of former White House Deputy Counsel Vincent W. Foster. This is
just the eerie still before a storm. A hurricane lurks just over the
horizon. Thunderheads are gathering and looming darker. Distant lightning
can be seen but not yet heard. Straws are starting to blow in the wind.

  This government may be on the threshold of upheaval unprecedented since
the Civil War. That is the cryptic message coming from multiple well-
connected sources close to the intelligence community, who say big things
are quietly afoot that could fundamentally shuffle this country's
political deck. And that may be just fine with Speaker of the House Newt
Gingrich (R-Ga.), who sources say is quietly maneuvering to use this
impending turmoil not just to "re-engineer government" but to purge both
political parties and effect what amounts to a bloodless coupe d'etat.

  Swept away will be not only a raft of big-name Democratic senators and
congressmen, but also many prominent, oldline Republicans who have been
feeding at the trough of corruption for years. It won't stop with
politicians, either. Prominent Wall Streeters, bureaucrats, military
officers and a slew of intelligence bigshots are also said to be about to
take a fall. Well over 300 names are said to be involved in the scandal.

  "Apocalypse soon!" predicts P.P. Willie.

  P.P. Willie is actually a dog. But it is also the pen name for a
legendary World War II military intelligence veteran, now living in St.
Petersburg, Fla., who writes for a semi-weekly newsletter called
WASHINGTON REPORT. It is a pithy, irreverent Capitol gossip sheet with a
penchant for pink paper. But it is read with considerable interest by its
5,000 subscribers - mostly in Washington and overseas - because Willie is
known to be well-connected within the intelligent community. In the past
he has been uncannily accurate about goings-on in the spook world. And
times there now are very troubled.

  Willie's latest:

  "Remember reading about TEA POT DOME? How about WATERGATE? Then came
IRAN-CONTRA. Not bad. All the past WASHINGTON political SCANDALS are ITTY
BITTY compared to one that should surface next year, about early spring.

  "You don't suppose a few GOOD GUYS in the CIA, FBI, IRS, and NSA (they
are not many, but they exist) are fed up with tucking their tails and
running in the face of WHITE HOUSE pressure? What if they went public
with TRUE DOCUMENTED stories of ESPIONAGE, MURDER, TAX EVASION, DRUG
DEALING, MILLIONS OF DOLLARS STASHED IN OFFSHORE BANK ACCOUNTS AND OTHER
BIG TIME HANKY PANKY at the very TIP TOP of the WASHINGTON manure pile?
The MAJOR MEDIA would not want to embarrass the LIBERAL DARLINGS. But
WHAT IF A LONDON newspaper and PINK newsletter broke the story? Talk
RADIO would then spread the word across the nation...The odds are this
scandal will break. We hear it's a DONE DEAL."

  Whispers of such a spilling of the beans are being heard from multiple,
separate intelligence sources. Specifically, as reported in the August
and October editions of MEDIA BYPASS, a small, vigilante team of CIA
computer hackers dubbed the Fifth Column has managed to penetrate Swiss
and other foreign banks to quietly withdraw what is now an astounding $2.
5 billion in illicit money from coded accounts they have identified as
belonging to government figures.

  Starting in 1991, this five-man Fifth Column team has been using its
own Cray supercomputer to break into foreign bank computers, download
vast libraries of data and trace this money to a wide range of illegal
activities, from kickbacks on drug and arms deals to insider trading
profits, software piracy and the sale of state secrets. Oh yes, don't
forget tax evasion.

  The money has been moved to a U.S. Treasury holding account at several
Federal Reserve Banks, escrowed for use by the CIA if and only if the CIA
gets rid of its own bad apples. How could the government hide that much
money, denying under Freedom of Information Act requests that it even
exists? Just ask the National Reconnaissance Office, the government's spy
satellite agency, which recently fessed up to having $1.7 billion stashed
in secret accounts.

  More important then the money, however, are the NAMES. Who had these
accounts? Are they still in office? Who has the list and the proof? Are
they using this information to extort political blackmail? Will the bad
guys be able to buy their way out of exposure? One thing is certain:
  Whoever controls this phantom roster of corrupt politicians and money
men has this government's private parts in a tightening vise. One man who
may know is Charles S. Hayes, an irascible Kentucky computer salvage
dealer and recently-retired CIA contractor believed to be part of, or
closely involved with, this Fifth Column.

  Hayes, corroborating P.P. Willie's report, does declare that all the
names will come out. Eventually. "When we get good and ready," Hayes says.
 The Powers That Be can do little to stop him. Any move against the three
remaining Fifth Column compatriots (one has died and another is disabled)
would be certain to unleash the information in a flood.

  At least one big name has already been revealed: Vince Foster. Multiple
sources say one of Foster's several Swiss accounts was raided just before
his death of $2.73 million in proceeds from the sale of sensitive codes
and other secrets to Israel's Mossad. Which may explain why the
government is so anxious to portray Foster's death as a simple suicide.
In reality, it could be the loose thread that unravels a massive tapestry
of corruption.

  That suicide cover story is rapidly fraying, despite intense efforts by
the White House and Washington establishment to hold it together. For
instance, credible independent handwriting analysts concluded in late
October that Foster's supposed suicide note is a forgery.

  Indeed, there are a number of recent tell-tale events that suggest that
something very big is at hand. Among them:

  - CIA briefings. Beginning in late October, high-level CIA officials
began sensitive one-on-one briefings with key members of Congress and
those with intelligence committee assignments. No staff members are
allowed. All parties are sworn to secrecy. Less than a dozen lawmakers
are involved. The subject, according to two sources: Espionage activities
of Vincent Foster and his alleged partner - First Lady Hillary Rodham
Clinton - on behalf of Israel's Mossad and perhaps other foreign
governments.

  The purpose of these briefings appears to be to prep key leaders for
cataclysmic political events ahead, including the likely indictment and
possible flight to a foreign country of the First Lady and what would
surely be the inevitable removal of Bill Clinton from office.

  -  Resignations. There has been an unusually large number of veteran
congressmen and senators announcing their resignations, retirements or
switching parties. Among them, Sen. Sam Nunn (D-Ga.), former chairman and
now ranking minority member of the powerful Armed Services Committee.
Another is Rep. Norman Minetta (D-Calif.), former chairman of the pork-
laden House Transportation Committee. The official explanation: It's no
fun now that the Republicans control Congress.

  But sources claim the real reason is that some of these departees have
been quietly confronted with evidence that they took bribes or payoffs
through Swiss or other offshore bank accounts. Rumor has it that about 30
current members of the House and Senate ahve been identified as having
such foreign slush-fund accounts and that Gingrich is trying to weed them
out before the names become public.

  [Since this article was written, three more senators have announced
their retirements. Schroeder of Colorado; Hatfield of Oregon; and Simpson
of Wyoming. This is now the most retirements in Congress since 1896. Jim
Norman was on several radio talk shows recently stating that Schroeder
and Hatfield have been presented with evidence of these secret Swiss
accounts.  The Simpson retirement was announced after these radio
appearances- krc]

  - Curious denials. Multiple good sources have confirmed a report by
veteran Washington correspondent Sarah McClendon that over the Labor Day
weekend, Gingrich attended a "party" at the home of Vice President Al
Gore that included Sen. Bill Bradley, Attorney General Janet Reno and
some other prominent Democrats, after which Gore and Clinton had a
shouting match.

  But everyone said to be involved in the meeting claims it never took
place. Is it because Gingrich was there to deliver the bad news: a
mountain of hard evidence of high-level corruption? Gingrich declines to
be interviewed by MEDIA BYPASS.

  This Fifth Column team apparently began its work in the late 1980s.
Their primary assignment was to break into foreign intelligence agency
databases by a variety of physical and electronic means. But the main
means of entry was via secret "back doors" programmed into the modified
"PROMIS" tracking software which our government, under the direction of
CIA spymaster William Casey, managed to market all over the globe, even
to our enemies.

  This initial phase of the computer spy effort succeeded in downloading
data from more than 50 foreign intelligence services, including the KGB,
the Mossad and most of Europe's spy agencies, according to various CIA-
related sources. Contrary to boastful claims by the FBI, this is
apparently how Russian mole Aldrich Ames was identified as a double agent
more than two years before his dramatic arrest in February 1994. Is is
also how the CIA found out Foster was working for the Mossad, after
learning that someone in our government was delivering highly sensitive
computer codes to the Israelis; Foster had been a long-time handler of
sensitive computer spy deals and covert money-laundering for the NSA
(MEDIA BYPASS, Aug. 1995). Found along with Foster's name in the Mossad
data base was that of Hillary Clinton, whose name also cropped up as an
operative for at least two other European intelligence services, as yet
unidentified.

Anti_Illuminati

  • Guest
Re: Blowing the lid off of PROMIS once and for all - You cannot lie to me
« Reply #23 on: April 26, 2009, 09:44:02 pm »
At the time of his death, MEDIA BYPASS has previously reported, Foster
was under close counter-espionage surveillance involving members of the
CIA, FBI, Secret Service as well as an IRS team. Two good sources say
they have heard that Saudi Arabia also had agents surveilling Foster. He
knew he was being investigated and was apparently under pressure to cop a
plea to prevent the probe from bringing down others in the White House.
The FBI apparently also knew that Foster's life was in danger: According
to two reliable intelligence sources, on the day of his death, FBI agents
used a pair of bomb-sniffing dogs to inspect Foster's Honda in the White
House parking lot - and probably planted a transponder on the car so they
could track the movements.

  White House videotapes of the parking lot, which would have shown that
inspection, have allegedly disappeared, according to this intelligence
source. But sources say the surveillance teams have still photos and
videotapes of Foster's activities on the afternoon he died, July 20, 1993,
showing him entering an apartment. It is here that Foster was apparently
killed, after a sexual encounter with a brownish-blond woman photographed
leaving the apartment afterwards. Also photographed, these sources say,
was the hit squad, apparently "assets" contracted by the Mossad but not
including any agents of the Mossad itself. Foster's body was apparently
rolled up in a rug and deposited at Fort Marcy Park - which is still
closed to visitors as teh FBI supposedly searches for the bullet that
killed him.

  Doggedly, the White House and offical Washington, aided by a blinded
mainstream press, continue to claim it was just a suicide, despite the
seriously flawed and widely discredited report to that effect by original
Whitewater Special Counsel Robert Fiske, and a cursory Senate inquiry.

  Sources say it is the continuing coverup, now more than two years after
Foster's death, and the brazen nature of Foster's assassination, that has
soured CIA professionals and has prompted them to consider going public
with what they know. Adding to their frustration was the resignation of
reform-minded CIA director James Woollsey last year and his replacement
by John Deutch.

  Deutch's job appears to be to keep a lid on things and to protect the
Clintons and the massive, ongoing illegal drug and arms trade that
provides the agency with billions of dollars in revenue completely out of
view of Congress and government watchdogs.

  Deutch's recent attempt to use the Aldrich Ames case as a club to
attack the CIA and its past directors has brought the agency's simmering
revolt to a boil. "Deutch had better watch his altitude and attitude,"
said one veteran CIA man. "He'd better get off his soapbox before he gets
indicted himself."

  Rumors of CIA involvement in drug trafficking go back to before the
Vietnam war, with heroin trade from Laos' Golden Triangle. But in the
late '70s or early '80s, the agency virtually took over and nationalized
the wholesale importation of cocaine into this country through obscure
airfields like the one at Mena, Ark., on the grounds that it was the only
way to control the drug trade. In other words: "If you can't lick them,
join them." The operation was soon generating vastly more money than ever
imagined - which has come back to line the pockets of top government
officials from the Reagan, Bush and Clinton administrations. The money-
laundering operations have likewise drawn in major banks and brokerage
houses. By some accounts, the revenues still run upwards of $7 billion a
year.

  Details of government involvement in this society-wrecking drug trade
are now emerging from various sources. Bits and pieces emerged during the
Iran-Contra and Iraqgate hearings of the 1980s, which produced a million
pages of documents but only a handful of indictments, and fewer
convictions. Perhaps the biggest fish caught was Reagan Defense Secretary
Caspar Weinberger, charged with lying to Congress. He was pardoned by
President George Bush just as Bush was leaving office in 1992. Curiously,
Weinberger's right-hand-man through most of that period was would-be
presidential contender Gen. Colin Powell, who Weinberger had brought up
to be a top military advisor, out of Casey's intelligence empire where he
is said to have served with the NSA and to have been intimately familiar
with the drug and arms flow.

  There is also a growing court record of sworn testimony in the wrongful
prosecution case of former CIA contract pilot Terry Reed. Reed claims in
his book, "Compromised: Clinton, Bush and the CIA," that Bill Clinton,
while governor of Arkansas, was well aware of the drug trafficking there
but played along with the game to earn himself the status of an
"approved" candidate for the presidency. With that would come plenty of
financing.

  Another source now openly discussing the massive drug business is
retired Navy Lt. Commander Alexander Martin. Martin was, in effect, the
chief accountant for the Reagan/Bush drug operations run by Marine Lt.
Col. Oliver North, through an obscure arm of the White House National
Security Council called the Natinal Programs Office. In a radio interview
with talk show host Tom Valentine last July, Martin spoke not only of
drugs and money, but death. "Out of roughly 5,000 of us who were
originally involved in Iran-Contra, approximately 400, since 1986, have
committed suicide, died accidently or died of natural causes. In over
half those deaths, official death certificates were never issued. In 187
circumstances, the bodies were cremated before the families were notified.
" Martin then said he was lying low.

  Not low enough. In late October, Martin was arrested and jailed without
bond in Broward County, Fla., for supposed violation of his probation on
a 1990 bad-check charge. Such small-time charges are a common device used
to squelch and discredit former players in this government-run drug and
arms racket.

  Corruption. Most Americans like to think their government is somehow
immune to the kinds of bribery and abuse of public power rampant in
"Third World" countries. The emerging reality is that the exact opposite
is true. The more wealth and power at stake, the greater the incentive to
subvert and corrupt. Sources say the dark truths predicted to be unveiled
by P.P. Willie will be utterly damning.

END OF JAMES NORMAN ARTICLE FOR DEC 1995 MEDIA BYPASS

Posted to Internet by
Ken Cook


RECAP OF AND UPDATE ON THE NORMAN THESIS
========================================

For those who are tuning in late, here is "our story thus far":

Back around March 4th, 1995, Mr. Sherman Skolnick of the
Citizens' Committee to Clean Up the Courts came out with a story
about a company called Systematics and alleged high-tech spying
being done on foreign banks. (This was covered in CN 4.22 and, so
far as I can tell, Skolnick's phone message, Hotline News at 312-
731-1100, was first to break the story.)

Here is how Skolnick's story appeared in Conspiracy Nation:

  A telephone company in Arkansas is called ALLTEL. They have
  a subsidiary called Systematics which is a proprietary
  espionage operation of the National Security Agency [NSA].
  Developed was a highly refined version of the Inslaw
  software called PROMIS. Originally designed to keep track of
  the caseloads of federal prosecutors, it was adapted to be
  used by spy agencies to track people worldwide, by
  satellite. The software has a "trapdoor" built into it. So,
  the NSA arranged to sell it or give it to supposedly
  friendly or other spy agencies: France, Sweden, Israel, and
  others. The "trapdoor" was a sort of "Trojan Horse",
  enabling U.S. espionage to spy on other spy shops.
  Systematics [allegedly] adapted it to be used through low-
  orbit satellites, to spy on the computers of central
  banks...


Perhaps a better word than "trapdoor" would be "backdoor". The
software sold or given to the unsuspecting banks is said to have
had a hidden "door" through which prying eyes could enter
unannounced. This is worth emphasizing, because some have said it
would be impossible for a hacker or group of hackers to get into,
for example, a Swiss bank. What these critics are neglecting to
factor in is this "backdoor" through which electronic burglars
possessing the "key" could easily enter. This last has not, to my
knowledge, been refuted.

The late White House aide Vince Foster is said to have had about
$2.73 million stashed away in a Swiss bank account. CIA hackers,
perhaps taking advantage of a "backdoor" in the bank's software,
are said to have stumbled across not only Foster's hidden account
but also hidden accounts belonging to members of Congress and
other high government officials. This, it seems, is where these
"public servants" were hiding bribe money they had illegally
received.

But apparently it was feared that breaking such a huge scandal
publicly would cause Grandpa and Grandma USA to fall out of their
rocking chairs. Yet something had to be done. These
congresspersons and others could not be allowed to get away with
their crookedness. While the CIA hackers, known as the "Fifth
Column", are said to have cleaned out the accounts of the
offenders, still it was obvious that some punishment was in
order. Then too, you can't just leave these bribe-takers in
office -- what's to stop them from accepting more bribes?

So it is reported by several independent sources that these
bribe-takers are being told to leave their jobs, or else have
their alleged rotteness revealed. As former *Forbes* senior
editor James R. Norman put it in the December 1995 issue of Media
Bypass magazine (1-800-4-Bypass):

     There has been an unusually large number of veteran
  congressmen and senators announcing their resignations,
  retirements or switching parties... The official
  explanation: It's no fun now that the Republicans control
  Congress.

     But sources claim the real reason is that some of these
  departees have been quietly confronted with evidence that
  they took bribes or payoffs through Swiss or other offshore
  bank accounts. Rumor has it that about 30 current members of
  the House and Senate have been identified as having such
  foreign slush-fund accounts...


Richard L. Franklin, writing in his monthly newsletter,
"Franklin's Focus" (Focus Press, 1820 Palisades Drive, Appleton,
WI 54915), confirms the charges. He reports that he has checked
with several of his sources and that, "as they say in the trade,
the story now has legs." According to Franklin, a so-called
"Angel of Death" is visiting the various congressional
representatives and informing them that they have just 24 hours
to announce their retirement.

It is beyond dispute that a record number of Senators and
Representatives are suddenly announcing their respective
retirements from public office. What is more, the Norman article
which appeared in the December 1995 Media Bypass is on record as
predicting many of these retirements *before* they actually
occurred. If Jim Norman's name was Jean Dixon or Irene Hughes, he
would be everywhere on the talk shows by now, hailed for his
amazing "psychic" abilities. Yet we hear nary a word of this
remarkable story in our "free" press. To me, the very fact that
this story is not being allowed into the public dialogue -- that,
in itself, says something. Aren't the networks at least hungry
for ratings? Why won't they draw in viewers with these intriguing
and widely-believed allegations? Why too aren't members of
Congress furiously demanding the opportunity to defend their
impugned "honor"? The silence is deafening.

Reporting on the phenomena of the disappearing Congress critters,
the Washington Times, National Weekly Edition (Jan. 8-14, 1996)
declares that "Congress is going through a shakeout." There have
been, says the Times, 49 announced retirements or resignations
since the November 1994 elections. And, it adds, a dozen of them
have bowed out just recently, since Thanksgiving. Well, Times,
here are two more names to add to your "trickle that has grown
into a stream" of retirements: Associated Press reports ("Clinger
to Retire", Jan. 15, 1996) that Rep. William Clinger "said Monday
he will leave Congress after serving 18 years." The AP story
adds, as if it is an afterthought, that Rep. Pat Williams,
Montana Democrat, announced retirement plans on Saturday, Jan.
13th. Clinger says, "It's probably time for me to move on." Says
Williams, "he's homesick." The AP article also notes that the
high number of congressional retirements is the "most in a
century."

So that's the story thus far. Now, thanks to an east coast source
whom I will call "Mr. Mercedes", I have received an audio tape of
Jim Norman's recent appearance on New York radio station WBAI,
marked on the cassette as having been January 10, 1996.

Says Mr. Norman: "This country is in a *major* political crisis."
According to the ex-*Forbes* senior editor, it is "unfolding
right before our eyes."

"For many years," he says, "[Vince Foster] had been a behind-the-
scenes go-between between the NSA, the National Security Agency,
and a company in Arkansas called Systematics -- a bank and data
processing company now owned or controlled by a telephone
conglomerate called ALLTEL... He may have had access to very
high-level code, encryption [and] other kind of computer
intelligence systems."

According to Norman, "More important than that: when [Foster]
arrived in the White House he -- according to sworn testimony by
his executive assistant, Deborah Gorham(sp?) -- somehow or other,
he came to have possession of at least two, inch-thick ring
binders from the NSA, from the White House offices, which my
sources tell me would have been *extremely* sensitive code
materials -- probably the codes, and more important than that,
the protocols, by which the President authenticates himself when
he calls up the Pentagon and says, 'Let's go nuke somebody.'"

"Plus the fact," adds the controversial but respected journalist,
"that we have documented evidence of Foster making periodic, one-
day trips to Geneva. Over every 6 or 8 months he had been making
a one-day trip to Geneva. And multiple sources have confirmed
that he had at least one, if not several, Swiss bank accounts."

Mr. Norman charges that Vince Foster, *and* *Hillary* *Clinton*,
were both under surveillance for espionage at the time of
Foster's so-called "suicide". Norman wonders, "Where would Foster
have gotten access to these very sensitive documents [e.g. the
ring binders with the authentication codes] within the White
House?"

This last rings true when it is recalled that Foster and Mrs.
Clinton had been widely reported as being lovers.

According to Mr. Norman, *significant* national security issues
are lurking beneath the surface of the otherwise dropsical
Whitewater hearings. "Vince Foster, as problematic as his death
is, it's small potatoes compared to what we discovered... In
fact, former intelligence people who have been involved in
computer surveillance of foreign accounts have found *hundreds*
of Swiss, [Grand] Cayman [and] other off-shore bank accounts,
coded bank accounts, maintained on behalf of high-level U.S.
political figures. Both parties. *Many* members of Congress.
Elected officials. Appointed officials. Military officers.
Intelligence community big-shots. Wall-streeters. Bankers."

"There's a massive scandal here, about to blow up. And, in fact,
we're already starting to see it."

         [...to be continued...]

-----------------------------------------------------------------
     I encourage distribution of "Conspiracy Nation."
-----------------------------------------------------------------
If you would like "Conspiracy Nation" sent to your e-mail
address, send a message in the form "subscribe cn-l My Name" to
[email protected]          (Note: that is "CN-L" *not* "CN-1")
-----------------------------------------------------------------
  For information on how to receive the new Conspiracy Nation
  Newsletter, send an e-mail message to [email protected]
-----------------------------------------------------------------
Want to know more about Whitewater, Oklahoma City bombing, etc?
(1) telnet prairienet.org (2) logon as "visitor" (3) go citcom
-----------------------------------------------------------------
       See also: http://www.europa.com/~johnlf/cn.html
-----------------------------------------------------------------
     See also: ftp.shout.net  pub/users/bigred
-----------------------------------------------------------------
Aperi os tuum muto, et causis omnium filiorum qui pertranseunt.
Aperi os tuum, decerne quod justum est, et judica inopem et
  pauperem.                    -- Liber Proverbiorum  XXXI: 8-9




Date:     Tue Jan 16, 1996 10:32 pm  CST
From:     bigred
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:     * David Beiter / MCI ID: 635-1762
Subject:  Conspiracy Nation -- Vol. 7 Num. 03

The following is brought to you thanks, in part, to the kind
assistance of CyberNews and the fine folks at Cornell University.


         Conspiracy Nation -- Vol. 7  Num. 03
        ======================================
          ("Quid coniuratio est?")


-----------------------------------------------------------------

RECAP OF AND UPDATE ON THE NORMAN THESIS
========================================

Thanks to an east coast source whom I will call "Mr. Mercedes", I
have received an audio tape of Jim Norman's recent appearance on
New York radio station WBAI, marked on the cassette as having
been January 10, 1996.

[...continued from CN 7.02...]

Here are further excerpts from the program:

JAMES NORMAN:
[Hillary] had actually been an attorney of record for Systematics
which at the time was owned by the Arkansas billionaire Jackson
Stephens, who tried to take over a Washington bank holding
company on behalf of the BCCI [Bank of Credit and Commerce
International] crowd and install Systematics as the data
processing manager of that entire operation. Which is extremely
curious, because BCCI itself was essentially a huge money-
laundering, arms-finance and drug-finance/drug-money laundering
operation.

In the process of going through all this, I actually came across
what turned out to be a Swiss bank account number: it was a 10-
digit, encrypted series of letters... When I turned it over to
some of the intelligence sources who I'd been using on this
story, they ran it through their system. And, actually a couple
of months later, when I asked them, "Gee. Is it possible [that]
Cap Weinberger might have money in these accounts?" They said,
"Well, yeah. Don't you know? That account number you gave us was
Cap's!" In fact, they mentioned that a relative of Howard
Metzenbaum, former Senator from Ohio, was another co-signatory to
that account; that Weinberger had multiple accounts -- not
implausible to me at all.

I mean, here was Weinberger, Secretary of Defense throughout the
Reagan era, during which we had one of the biggest defense build-
ups in history. We also participated in the massive illicit
arming of Iraq with high-technology weapons systems capabilities,
plus the armaments themselves. It was an environment *fertile*
for kickbacks. Payola. Corruption. And, in fact, Weinberger was
eventually indicted by Iran-Contra prosecutor Lawrence Walsh for
lying to Congress, for failing to turn over his diaries. He was
pardoned by George Bush just as Bush was leaving office. And so
he never had to stand trial -- which was probably a merciful
reprieve for Colin Powell, who was Weinberger's chief assistant
at that time, chief advisor.

Weinberger had basically elevated Powell to a high-level advisory
position, and Powell would have been effecting a lot of the
orders that Weinberger was giving him -- about moving arms here,
and drugs there.

And in fact... Weinberger's name has come up in connection with a
Costa Rican legislative investigation, a two-volume report down
there that identifies Weinberger, as well as Ollie North, our
former Ambassador to Costa Rica, and various others as being
personas non grata for helping facilitate a massive drug and arms
operation which helped corrupt that country's society. If those
people set foot down there again, they're getting arrested.

So suddenly it starts to make a lot of sense. And when you think
in terms of Swiss bank accounts and massive amounts of money --
kickbacks -- it explains a lot of stuff that's going on right
now.

What we're looking at here is massive, endemic, high-level
corruption of the federal government. Bipartisan. Democrats and
Republicans. It's been going on for years -- particularly since
the early 1980s. The dollars involved have grown exponentially...
I believe from arms and drugs trading. There is *huge* amounts of
money sloshing around here. And it has corrupted the government
in a fundamental way. The government cannot police itself. The
normal enforcement mechanisms have been compromised: the Justice
Department. The IRS. Customs. The intelligence community.

And what has happened is that there *are* a lot of good people in
our government who have watched this happen, have been powerless
to stop it -- their protests would go nowhere. There's been *no*
effective investigation by anybody of this stuff. And finally,
what had happened was, a small handful of guys -- they call
themselves the Fifth Column. Retired intelligence people. One is
a former CIA contractor. Another is a former National Security
Agency person. I know they're assisted by a variety of other
people of the intelligence community -- they were able to acquire
their own used Cray supercomputer from Clark Air Force Base. It's
apparently an air-cooled and generator-driven machine that can
actually be packed into the back of I think what *looks* like a
refrigerated semi-trailer truck with a satellite uplink. And
they've got this thing rollin' around the country so it doesn't
get nailed.

And so for the last 5 years, they have been downloading,
systematically, tapping into foreign bank databases and pulling
down reams and reams of account data.

[James Norman goes on to describe how this Fifth Column allegedly
raided the secret bank accounts of corrupt government officials,
transferring the money into U.S. government accounts.] For two
years they've been raiding these accounts. Now they're into Phase
II.... Phase I: "Take the marbles." Phase II: "Get them out of
government."

Now, how do you do that? How do you get these people *out* of
government in the most time-efficient and cost-efficient manner?
... Apparently they've been hand-delivering brown manila
envelopes to people in Congress with actual copies of the
transaction records of these Swiss and other off-shore accounts.
The people get about a day to read these things, and then they
get a call from one of *these* guys who I have referred to as the
"Angel of Death". And then the elected official gets a choice:
... You can either announce your retirement immediately, or you
can face immediate prosecution for tax evasion and various other
crimes -- the minimum penalty for which, if you are convicted, is
10 years in prison.

Now when a congressman goes to prison, you lose your federal
pension benefits. And the pensions on these people are
significant. (For instance, Pat Schroeder, congresswoman from
Colorado: relatively young, she's been there a long time... She's
got, over her expected lifetime, more than 4 million bucks coming
to her.) Now I think the implication here is that if you just
shut up, go away, get out of the line of fire -- *maybe* you'll
get lucky and get to keep your pension down the road. There's no
guarantee that you won't be prosecuted.

But what's happened so far: all of these people have taken the
retirement option.

And what you have seen: an unprecedented, record number of
retirements of *powerful* people from Congress. These are not
"back benchers"! Since the end of the last election, until now,
more than 50 Senators and Congressmen have announced their
retirement. In fact, there were two more in just the last couple
of days: a 30-year Republican from Indiana, and a two-term
Democrat from Arkansas.

The excuses they give? *Utterly* *bogus*, frankly. "Oh, we can't
stand the nasty politics." "Oh, I want to spend more time with my
family." "Oh, it's just time to go." It strains credulity. It
just does not make sense -- until you realize there's something
*else* going on here.

         [...to be continued...]

-----------------------------------------------------------------
     I encourage distribution of "Conspiracy Nation."
-----------------------------------------------------------------
If you would like "Conspiracy Nation" sent to your e-mail
address, send a message in the form "subscribe cn-l My Name" to
[email protected]          (Note: that is "CN-L" *not* "CN-1")
-----------------------------------------------------------------
  For information on how to receive the new Conspiracy Nation
  Newsletter, send an e-mail message to [email protected]
-----------------------------------------------------------------
Want to know more about Whitewater, Oklahoma City bombing, etc?
(1) telnet prairienet.org (2) logon as "visitor" (3) go citcom
-----------------------------------------------------------------
       See also: http://www.europa.com/~johnlf/cn.html
-----------------------------------------------------------------
     See also: ftp.shout.net  pub/users/bigred
-----------------------------------------------------------------
Aperi os tuum muto, et causis omnium filiorum qui pertranseunt.
Aperi os tuum, decerne quod justum est, et judica inopem et
  pauperem.                    -- Liber Proverbiorum  XXXI: 8-9



Date:     Wed Jan 17, 1996 11:58 am  CST
From:     snet l
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:     * David Beiter / MCI ID: 635-1762
Subject:  Hackers Whack 45 Politicians


      Early Retirement [of Politicians]

         By James R. Norman

   Ain't it amazing!
   
   One after another in recent months, big-name U.S. senators
and representatives have announced they are "retiring."  Since the
last election, a record 45 members of congress have decided not to
run for relection -- or have outright resigned from office. Not in a
hundred years has there been such an exodus.  And it is not over:
dozens of other lawmakers and powerful government leaders are
privately hinting they may be leaving office soon.
   
   Nor are these departees the obscure back-benchers.   They
are among the most powerful people in the most powerful
government that has ever existed on earth, with egos to match.  Take
a look at the list.  Look at all the committee chairmen, or ranking
minority members -- who would be committee chairmen if the
Democrats regained control.   Look at the powerful committees or
subcommittees they are on: appropriations, rules, armed services,
agriculture....  Look at the startling last-minute withdrawal of retired
Gen. Colin Powell as a potential candidate for president -- a job for
which many pundits had him pegged as a shoo-in.

   Common sense and history teach that people with this kind
of power, pay and perks don't give it up easily or without good
reason.  But what are the lame excuses we get?
   
   Senators Sam Nunn and Alan Simpson claim they just don't
have that ol' "fire in the belly" any more.  A tearful Rep. Jack Fields
of Texas, Republican chairman of the House Telecommunications
and Finance committee, held a press conference to say he wants to
spend more time with his kids. Veteran Democrat  Rep. Patricia
Schroeder says she wants to give up her $133,600 a year job to be
a writer.    GOP Sen. Nancy Kassebaum, chairman of the Senate
Labor Committee and the daughter of  GOP legend Alf Landon,
wants to go back to her little farmhouse on the prairie.
   
   A common complaint the new retirees bemoan is the high
cost of running for political office in this country.   Without a doubt,
campaign spending levels have been going off the charts: in 1992 the
average House incumbent spent almost $1 million on campaign
expenses. Senate incumbents averaged almost $2 million with some
contenders, like tk Huffington squandering almost $20 million in his
losing bid in California.   Simpson whines that he has to raise
$10,000 a day for re-election.  "Retiring" Sen. Bill Bradley (D-NJ)
outspent his last rival by 10:1 with a $10 million budget and still only
narrowly won re-election.
   
   But these are crocodile tears.   The reality is that federal
incumbents CAN raise $10,000 a day easily, with just a few phone
calls and meetings -- far more than their challengers can hope to
garner.  And the record shows that loose enforcement of campaign
spending rules and creative accounting have allowed incumbents to
run a myriad of personal expenses through their campaign accounts,
from cars and plush office space to posh vacations.  Only a third of
what they raise actually goes for advertising.  Then there are the fat
"honoraria" and expense-paid trips for speeches, which can be
turned into valuable PR as charitable gifts if they exceed $20,000 a
year.  And as Newt Gingrich has vividly demonstrated, huge payola
from bogus book contracts is exempt from outside income limits.
   
   We are supposed to believe these retirees are getting off this
gravy train VOLUNTARILY?  Riiiiiiight.  Schroeder already had her
re-election bumper stickers printed.   So had rakish Charlie Wilson
(D-Tex.), who had already begun booking air time and newspaper
ad space for his re-election campaign when he suddenly announced
retirement to become a "consultant."  Rep. Ron Coleman (D-Tex.),
the up-and-coming young ranking minority member of the powerful
House Appropriations subcommittee on telecommunications,
stunned his supporters by announcing his retirement at what was
supposed to be his re-election kickoff party.  His excuse: To spend
more time with his family.   No definite plans.  Uh huh.
   
   At best, these excuses are disingenuous half-truths.   They
utterly strain credulity.  And given the sheer number of these
"retirements,"  you don't have to be a rocket scientist to realize there
is a pattern here.  Something else is afoot.   Nevertheless, the lazy,
gullible, lap-dog mainstream media swallow this swill and regurgitate
it, imbuing these transparent falsehoods with legitimacy.   In recent
weeks "60 Minutes," Time, Newsweek, The Wall Street Journal and
The New York Times -- the big-deal media outlets that set the news
agenda for the rest of the nation's wire services, newspapers and
broadcast outlets -- have noted the unusual level of retirements, but
then have explained it away as just a symptom of the nasty tone of
public discourse these days.  Especially now that those mean Newt
Gingrich Republicans control Congress, it's no fun any more, the
fawning press seems to say.    Awwwwww!

   But if that was the case, why would so many powerful
Republicans be leaving as well.  Such as Mark O. Hatfield, chairman
of the Senate Appropriations Committee, or Veterans Affairs
Committee chairman Sen. Simpson, or Rep. Robert Walker, a close
confidante and ally of Gingrich who was almost elected House
Majority Leader.  All hold safe seats, and though Hatfield is 73, he's
still young by traditional Senate retirement standards.   For that
matter, why did veteran Oregon Republican Sen. Bob Packwood,
chairman of the powerful Senate Finance Committee, up and quit
after agreeing to turn over his diaries?  Was it really just for kissing
female staffers in the elevators?

   Get real!   There is a political hurricane brewing here and all
of official Washington and the media are in an advanced state of
denial.  By the time Media Bypass published its early warning forcast
in December,  "The Still Before the Storm," a gale was already
blowing.   Before the magazine could be delivered, Colin Powell had
battened the hatches and withdrawn from the presidential race,
supposedly because of concerns about his wife's past mental
condition.   Since then, the pace of  "retirements" has increased from
a trickle to a steady stream.
   
   What's going on?  As we said in December, you could call it
a coup d'etat of a mortally corrupt government by a handful of
vigilante computer hackers, formerly affiliated with various U.S.
intelligence agencies.  After years and years of watching the top
echelons of leadership tainted with kickbacks on drug and arms
deals, insider trading and other payola -- with no agency and neither
major party having the guts to stop it -- this "Fifth Column" team has
effectively taken it upon themselves to clean house.
   
   According to two reliable sources directly connected to this
Fifth Column group, corroborated by multiple, credible, independent
sources in or close to the CIA and other intelligence services, the
clean-up began about two years ago.  Phase One: Take away their
marbles.  Using the access codes and other data surreptitiously
downloaded through "trap doors" in foreign bank computer software
systems, the Fifth Column began wire-transfering money out of
hundreds of supposedly annonymous foreign bank accounts held by
U.S. government officials. The take so far is in excess of $3 billion.
The money has all been repatriated to the U.S. Treasury, where it is
said to sit in various regional Federal Reserve Banks escrowed for
use by the CIA if and only if that heavily corrupted agency gets rid of
its own rogue elements.
   
   Among the prominent names nailed for millions of dollars
each, according to Fifth Column sources: Nancy Reagan, Henry
Kissinger, Oliver North, Caspar Weinberger, Elizabeth Dole,
George Bush and his sons, Maggie Thatcher....  And don't forget
Vincent W. Foster, Deputy White House Counsel to President Bill
Clinton, who supposedly committed suicide shortly after his Swiss
account was raided in July 1993 for $2.73 million paid into it by the
State of Isreal for high-level codes and other secrets Foster was
suspected of selling (See Media Bypass, August 1995:
"Fostergate").

   Now Phase Two of the program has begun: removing the
bad guys from office. Beginning last fall, according to two Fifth
Column sources, somebody started hand-delivering to each of  these
retiring "public servants" their own plain manilla envelope.  Inside:
detailed transaction records of the culprit's Swiss, Cayman or other
offshore bank accounts.  Then about a day after receiving the
envelope, they get a phone call from someone we'll just identify as
the Avenging Angel.  The options offered are simple.  Plan A:
Promptly announce your retirement. Plan B: face immediate,
widespread distribution of the information to news media,
enforcement agencies or directly to the doorsteps of your
constituents.
   
   Oh, by the way, the minimum federal sentencing guideline on
willful income tax evasion is 10 years in prison.  Add to that possible
jail time for bribery, money laundering and violation of federal
financial disclosure rules.  Any member of Congress sentenced to
prison is subject to loss of  his government pension, which acrues at
the at the very rapid pace of 2.5% of  yearly pay for each year
served and vests in in just 5 years.  For relatively young long-timers
like Pat Schroeder that could be worth upwards of $4 million;almost
$3.5 million for Rep. Gerry Studds (D-Mass.)
   
   Go ahead.  Take your time.  Think about it.   You have 24
hours to decide.
   
   To a person, so far, these esteemed lawmakers have opted
for Plan A.   And from the Fifth Column perspective, a "retirement"
announcement is about as good as an actual resignation.   It
immediately marks the culprit as a lame duck, not worth bribing any
more and wielding much less power.  And it does not preclude later
prosecution or the eventual release of information.   No promises are
made.   No deals.
   
   Outrageous!   Undemocratic!  Extortion! You say.   But the
better adjectives would be: dramatically successful, cost-effective
and entirely in the public good  When grilled about why anyone
would go to all this effort and risk going to jail for breaking bank
secrecy rules,  the Fifth Column reply is: "BOC."   Betterment Of
Country.
   
   Is it legal?   Is it "authorized" by some government agency?
Well, no.   But an army of honest civil servants long squelched from
persuing this high-level rot are tacitly cheering from the sidelines.
Attorney General Janet Reno is said to be fully aware of the effort,
perplexed by it, but is keeping hands off so long as this Fifth Column
team sticks to its commitment that there will be no deals cut and no
favorites played.  Besides, can you imagine a jury convicting any of
these hackers of anything?  They ought to get medals!
   
   What about Bill and Hillary Clinton?  Let's just say they've
got their own problems to worry about and the dust speck called
Whitewater that the mainstream media is finally latching on to is
probably among the least of them.
   
   Of course, from a journalistic perspective, what we'd like is
full and complete disclosure with hard documentary evidence against
these culprits.   Above all, there has to be some assurance that All
the bad guys get nailed with equal justice and that nobody will be
able to "buy" their way out of  a manilla envelope problem.  But from
the Fifth Column viewpoint, which holds the news media in justifiably
low regard, it's the results that count.   Not the PR.

   Premature release of hard evidence would make it difficult
for the crooks to gracefully step aside under the guise of retirement.
If cornered in broad daylight, they would have to stand and fight.
That would be messy.  Witness the Packwood fiasco.   And costly:
the average federal white collar criminal prosecution nicks taxpayers
for more than $1 million.   If vigorously contested, the costs can
quadruple quickly.  So if the goal is to get bad people out of
positions of power quickly and cheaply, the best way is through
persuasion.   And the more who are persuaded, the harder it
becomes for the holdouts to play tough.  We're talking method, not
just madness.
   
   There is, actually, a precedent for all this.  It is called Bop
Trot, perhaps this country's biggest and most successful effort at
cleaning up public corruption.  Focussed on state-level political
corruption in Kentucky, the sweep used an elite task force of
investigators drawn from various federal agencies, including the FBI,
IRS, DEA and, yes, calling on the talents of some of the Fifth
Column crowd.   It began in the early 1990s and is still under way,
having branched out to other states, including Illinois.  In Kentucky,
65 public officials have been indicted and every single one has been
convicted -- almost all of them by pleading guilty.  Among those now
in prison: the husband of former Kentucky Gov. Martha Lane
Collins.

   But before the Bop Trot indicting began, there were a raft of
resignations and retirements eerily similar to what we are now seeing
at the federal level.    Another curious parallel: virtually no media
attention.  Aside from some regional news coverage, almost nobody
has heard of Bop Trot.   Partly that is because the local U.S.
Attorneys -- themselves often corrupt political appointees noted for
their grandstanding antics -- have been kept mostly in the dark with
the cases handled by special prosecutors.  And aside from Media
Bypass, talk radio and the Internet, there has never been any
mention of the Fifth Column by any major national newspaper,
magazine or TV network.   Which is fine by us!   Let those sleeping
dogs lie.

   You have to be deaf, dumb and blind, though, not to see the
other dramatic parallels looming all around us now, which further
validate what our sources have been uncannily predicting for months
and months.  Consider:

   MEXICO -- Somehow or other, the Drug Enforcement
Administration has found out about hundreds of millions of dollars in
accounts in Switzerland, Luxembourg and England belonging to the
family of Carlos Salinas de Gotari, the former president of Mexico,
and DEA has apparently tipped the Federales.  Salinas' sister-in-law
was arrested recently when she tried to withdraw $84 million from a
Geneva bank, believed to be a branch of Citibank.  Was the DEA,
not particularly known for its computer intelligence capabilities, itself
tipped by the Fifth Column?

   All told, Citibank may have helped move half a billion dollars
of  drug money and other graft for the Salinas clan.  Could that have
happened without the awareness or even paid-for complicity of top
bank officers?  What is a matter of public record is that Citibank
insiders have been dumping shares of Citi's high-flying stock like
mad in recent months, symptomatic of either an expected stock price
plunge or high level management departures.  And in mid-December
Christopher Steffen, the chief financial officer of Citibank parent
Citicorp, abruptly left amid a curious smoke screen of lame excuses
by the bank's PR department.  Next to go, according to a Fifth
Column source: Citibank Chairman and Chief Executive John Reed
himself, the top dog at America's biggest bank.    Something about
gold bearer bonds in another Swiss bank....  Hmm.

   CANADA -- Former Prime Minister Brian Mulroney is
under investigation by the Mounties over what appear to be
kickbacks of C$50 million (US$37 million) on the sale of $1.8
billion worth of Airbus aircraft to Air Canada.   The money
apparently went into one or more Swiss accounts. Mulroney, who
has tried to stymie the investigation by suing the Canadian
government for libel for even asking provocative questions, may also
be under investigation for much bigger payoffs from Columbia's Cali
drug cartel, which had its computer data bases raided recently,
according to a Fifth Column source.
   
   PANAMA -- It now appears likely that former Panama
dictator Manuel Noriega, now in a federal prison in Florida, will win
a new trial on his conviction for drug trafficking.   The reason:
Somebody with apparent access to those Cali cartel computer
records discovered that the Cali's paid $1.5 million to the star U.S.
prosecution witness against Noriega, whose supporters have long
claimed Noriega was "set up" for prosecution by the Bush
adminsitration to silence and discredit his claims of CIA and U.S.
involvement in the Central American drug trade.  Makes you wonder
what other palms the Calis have been greasing all these years to
protect their cocaine trade into the U.S.  Gee, maybe we'll all know
soon.
   
   SOUTH KOREA -- Both of the country's two past
presidents are now in prison, accused of  corruption.  Chun Doo
Hwan is charged with staging the 1979 coup that put him in power.
He's also being questioned about a $133 million slush fund. His
hand-picked succesor, Roh Tae Woo, is charged with running a
$650 million slush fund of corporate "gifts."  Translated to English,
that's "bribes and kickbacks."  If the money came from U.S. arms
makers, like, say, Lockheed Martin, that's a crime for which
corporate honchos can go to jail.  Once again, the key was finding
that money stashed in English and other bank accounts.   Did the
Fifth Column strike again?   Gosh, that's hard to prove.   It seems
the Koreans just happened to get a plain manilla envelope with some
very interesting bank records.
   
   JAPAN -- Similarly, rumors are swirling that Japanese
Prime Minister Tomiichi Murayama will soon resign amid a financial
scandal brewing in that country.  You don't think it's possible that
Japan's opposition party got a plain manilla envelope with foreign
banking records in it do you? Besides the corruption of Japanese
politicians, it will be entertaining to learn who  in our government has
been on the take from the Japan, which has for many years
maintained a massive, well funded lobbying effort here.
   
   Is it really plausible that both our neighboring countries, as
well as our major Asian trading partners, could be so rife with high
level corruption and yet the U.S. be somehow immune?  Are our
controls against corruption that much better than these other
countries? Good enough to overcome the much greater incentive
toward corruption here?  Unlikely.   It is only by willfully ignoring
reality that we can pretend we are less suseptible to endemic
corrption that other nations.  And just as it appears those nations
have needed help from the outside to root out their crooked
politicians, so it is that the only way the U.S. government, polluted
with drug and arms money, will be purged is by what amounts to
vigilante, extra-legal citizen action. That's why we'd like to make our
own modest proposal: Let's all become Fifth
Columnists.   

Anti_Illuminati

  • Guest
Re: Blowing the lid off of PROMIS once and for all - You cannot lie to me
« Reply #24 on: April 26, 2009, 09:44:50 pm »
The fundamental truth here is that no government can truly
police itself.

   Whatever internal auditing mechanism that is set up can
ultimately be intimidated and emasculated by whomever controls the
purse strings (Congress) or does the hiring and firing (the chief
executive).  And forget about the press.  They're whimps.  If
anybody's going to keep the bastards honest, it is US.   You and me.
   
   Here is how we can do it, by just applying the same back-
to-basics gumshoe tactics the IRS uses against us but is too gutless
to employ against Congress and the White House.  Find out what
they own when they enter office, and what they have after they've
been there a while. Chances are they haven't bought that million-
dollar DC condo, the Martha's Vinyard summer place and the two
Volvos on just their federal paycheck.
   
   First, write to the Federal Election Commission and ask for
the required semi-annual financial disclosures of your senator or
congresscritter.   Then ask questions.  Check real estate records,
motor vehicle registrations, divorce pleadings.  Stay tuned and we'll
offer more ideas on becoming citizen sleuths. Then, if what you find
doesn't match the official disclosures, send your findings to your local
newspaper or TV station.  Copy the FEC and the IRS.

   If you don't see prompt action, SEND IT TO MEDIA
BYPASS, and be sure to include the name of whomever you sent it
to first.
   
   As a certain Fifth Columnist is fond of saying: "If it is to be, it
is up to me."
   
   Let's make that "We."



Date:     Wed Jan 17, 1996 11:12 pm  CST
From:     bigred
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:     * David Beiter / MCI ID: 635-1762
Subject:  Conspiracy Nation -- Vol. 7 Num. 04

The following is brought to you thanks, in part, to the kind
assistance of CyberNews and the fine folks at Cornell University.


         Conspiracy Nation -- Vol. 7  Num. 04
        ======================================
          ("Quid coniuratio est?")


-----------------------------------------------------------------

RECAP OF AND UPDATE ON THE NORMAN THESIS
========================================

Thanks to an east coast source whom I will call "Mr. Mercedes", I
have received an audio tape of Jim Norman's recent appearance on
New York radio station WBAI, marked on the cassette as having
been January 10, 1996.

[...continued from CN 7.03...]

Here are further excerpts from the program:

CALLER #2:
...How is it exactly -- I remember when I heard this story first
and I was talking to somebody about it and they said, "Well how
can they possibly get into these bank accounts?"


DR. MICHIO KAKU [Host]:
O.K. Mr. Norman, how *do* you get into another person's bank
account?


JAMES NORMAN:
Let me begin by saying that bank computer systems are nowhere
near as secure as the banks would like you to believe... Granted,
there are many security features built into bank communications
and software systems. But in most large software systems there
are what you call "service entrances" or "back doors" by which
software maintenance people would get in routinely to fix "bugs"
and so forth. If you take that concept, and then consider the
idea that our intelligence agencies, which have an extremely
high-priority collection of financial information, would somehow
or other see to it that they have perhaps their own "back doors"
plugged into these various bank data systems...

*That's* how I got onto the story, actually, was the
proliferation of a customized version of what was called the
PROMIS software. This was, it was designed for tracking legal
cases, originally, [then] customized for use in tracking wire
transfers, sold and promulgated around most of the world's
banking system, had "back doors" in it that would allow -- if you
knew where the "back door" was, it would allow you to basically
dial into a computer system and not leave an audit trail: go in,
snoop around, pull down information, and then leave.


DR. MICHIO KAKU:
I think the key thing, at least from my point of view, is that
we're not dealing with high school "hackers" who, by trial and
error, and guile, try to get into somebody's bank account. We're
talking about former intelligence agents.


JAMES NORMAN:
Right. But let me point this out: a couple of months ago,
Citibank, there were published stories about how a "hacker" in
Russia, armed with no more than a personal computer, apparently
had got into Citibank accounts and was doing, essentially,
exactly the same thing. He was wire-transferring money out of
corporate accounts... to banks in Argentina and Finland -- always
in small amounts so that it would not set off the internal alarm
system... What I am told is that somehow or other, this guy got
hold of the "back door" address at Citibank and was able to use
it.


CALLER #3:
Mr. Norman, outside of WBAI, has word of this gone out?


JAMES NORMAN:
Actually, *this* *story* has become a classic case study in
"guerrilla journalism". Because I think it's too hot for any
mainstream media to deal with. I mean, it's just loaded with too
many problems: first of all, it deals with a lot of background,
"deep throat" kind of sources; the attribution, the documents are
kind of non-existent at this point -- although I think they'll
eventually come out. And you're dealing with a lot of big names
and nobody really wants to rock the boat in a big-deal
publication.

Media Bypass, this little magazine in Indiana, *they* came to me
and asked me if they could run the story, because they had heard
that Forbes [magazine] wouldn't run it; that the Wall Street
Journal and New York Times and everybody else I'd talked to about
it was scared of it. *They* [Media Bypass] managed to corroborate
a key element of it themselves. One of their investigative
reporters knew a guy who used to train IRS agents, who was
talking with one of his former students who was assigned to
surveil Vince Foster at the time he died. And the guy actually
read him some of the surveillance report, off the computer
screen, over the telephone.

And it's not that big of a secret, apparently, within the
intelligence community. There was a *massive* counter-
intelligence effort going on regarding Foster. It apparently
began just after the '92 election, but before the inauguration in
January '93. And for about the 6 months until he died, Foster was
under pretty intense surveillance.

There's a French intelligence newsletter which has also
corroborated the fact that Foster was under counter-intelligence
surveillance at the time he died. There's, Sarah McClendon has
written about it. (She's an old "war horse" Washington
correspondent.)

But the story is just *too*... It's like the media cannot deal
with this. And ultimately I think the media will be on trial as
much as the government for not dealing with this story. Instead,
we've got Media Bypass, we've got talk radio... And the Internet
has actually become a rather successful outlet for this stuff.
And in fact, it's amazing: it has brought a whole bunch of other
people out of the woodwork, talking about this, including a lot
of very literate computer people, financial people.

And I know, particularly, a former Wharton finance professor,
Orlin Grabbe, who has posted a series of his own rather revealing
exposes' on this stuff. [CN -- Archived at ftp.shout.net
pub/users/bigred/og] He, after leaving Wharton, started his own
software company, making software for pricing derivatives. And
the intelligence community came to *him*! And said, "Hey. Can we
use your company to help spy on brokerage houses and banks too?
We want some way to insinuate our people into these computer
rooms." That's what sent *him* up the wall. He said, "Holy
smokes, we're dealin' with the Surveillance State here." And I
think he became a renegade ever since.

Particularly, I think he's also angry about the government's
tirade here on money laundering: it's used, basically, as a tax
raising measure. I mean, they want to go after every little guy
for any kind of cash transaction. But we have, you know, what is
so outrageous about this is, you have a two-tier system: you have
rampant money laundering, drug dealing and kickbacks for the
privileged elite; and you have the government's boot on the neck
of everybody else.

So there's significant grass-roots rage brewing over all this
stuff, and it's gonna find an outlet somehow or other -- even if
it's just WBAI, you and me!


DR. MICHIO KAKU:
O.K. Well, let's hope it gets beyond WBAI.


CALLER #5:
It's obvious that Iran-Contra never stopped. But my question is,
driving along the interstate I noticed that "Next Six Exits, the
NSA." *Who* are the people at the top of the NSA? Who runs the
NSA? Who are they, where do they come from, and how far-reaching
is their power?


JAMES NORMAN:
That's a good question. You call up Washington and they say,
"NSA? 'No Such Agency.'" That's their nickname.

It's a *huge* bureaucracy. It's based at Fort Meade, Maryland.
Their budget is bigger than the CIA and the FBI combined. Their
job was originally signal surveillance.


CALLER #5:
Do we know who the people are, though?


JAMES NORMAN:
When you look it up... I tried to find out, actually, "Who runs
the NSA?" They have a list in this two-inch-thick book on federal
offices I've got. *They* merit about a two-inch thing that only
has about six names associated with it. And I forget the top
guy's name there. I think he's an Admiral who's on assignment to
the NSA.

         [...to be continued...]

-----------------------------------------------------------------
     I encourage distribution of "Conspiracy Nation."
-----------------------------------------------------------------
If you would like "Conspiracy Nation" sent to your e-mail
address, send a message in the form "subscribe cn-l My Name" to
[email protected]          (Note: that is "CN-L" *not* "CN-1")
-----------------------------------------------------------------
  For information on how to receive the new Conspiracy Nation
  Newsletter, send an e-mail message to [email protected]
-----------------------------------------------------------------
Want to know more about Whitewater, Oklahoma City bombing, etc?
(1) telnet prairienet.org (2) logon as "visitor" (3) go citcom
-----------------------------------------------------------------
       See also: http://www.europa.com/~johnlf/cn.html
-----------------------------------------------------------------
     See also: ftp.shout.net  pub/users/bigred
-----------------------------------------------------------------
Aperi os tuum muto, et causis omnium filiorum qui pertranseunt.
Aperi os tuum, decerne quod justum est, et judica inopem et
  pauperem.                    -- Liber Proverbiorum  XXXI: 8-9




Date:     Fri Jan 19, 1996  4:45 am  CST
From:     bigred
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:     * David Beiter / MCI ID: 635-1762
Subject:  Conspiracy Nation -- Vol. 7 Num. 05

The following is brought to you thanks, in part, to the kind
assistance of CyberNews and the fine folks at Cornell University.


         Conspiracy Nation -- Vol. 7  Num. 05
        ======================================
          ("Quid coniuratio est?")


-----------------------------------------------------------------

RECAP OF AND UPDATE ON THE NORMAN THESIS
========================================

Thanks to an east coast source whom I will call "Mr. Mercedes", I
have received an audio tape of Jim Norman's recent appearance on
New York radio station WBAI, marked on the cassette as having
been January 10, 1996.

[...continued from CN 7.04...]

Here are further excerpts from the program:

CALLER #5:
But aren't G.E. and Westinghouse and all the networks part of it?


JAMES NORMAN:
Well... Of course the government contracts out vast amounts of
work to other countries. But the NSA, for sure, they do a lot of
their work through "cut-outs" -- front companies. In fact, that's
what this Systematics was -- which is now called ALLTEL
Information Systems. (The CEO [Chief Executive Officer] of which
just retired, mysteriously, at age 56, last week, and announced
plans to go spend more time with his family.) That thing is about
to blow up, because I think Systematics, in addition to helping
the NSA plant "bugged" software in foreign banks, Systematics
also functioned, I'm told (and this is corroborated by various
*good* intelligence sources), for many years they functioned as
sort of a "cyber bank" for covert funds.


CALLER #5:
What part did the major corporations play?


JAMES NORMAN:
Well... Let's put it this way: one of Inslaw's partners was AT&T.
IBM was involved in this too. Apparently IBM does *lots* of
business with the government and there's... I'm told, one of the
applications of this PROMIS software is it was customized to
track submarine sounds -- maritime sounds -- catalog the stuff,
develop files on foreign ships... IBM was a prime contractor on
that system.

[...contention for who will speak...]


CALLER #5:
Ed Meese and Nichols had actually taken away from the owner, and
that's who this [unclear] sueing.


JAMES NORMAN:
Well, Inslaw is sueing the Justice Department for damages.


CALLER #5:
'Cuz the owner was a competitor with Nichols, who was a friend of
Ed Meese. [CN -- Meese was Attorney General under President
Reagan.] When they got to power, that was the deal: to try to get
it away from him. Nichols, who worked for Wackenhut...


JAMES NORMAN:
Robert Booth Nichols, I think you're talkin' about, right?


CALLER #5:
And he was a friend of Ed Meese. And he was competing to put this
system in for tracking criminals in Los Angeles. I believe the
guy's name was "Campbell" or something like that, the one with
the Inslaw...


JAMES NORMAN:
Bill Hamilton and his wife own Inslaw...


CALLER #5:
Hamilton! *That's* it.


JAMES NORMAN:
They... What happened was, the government was desperate to get
hold of that source code so they could customize it and *re-sell*
it, with the profits going into private pockets. Like cronies of
Ed Meese. Particularly, there's a guy named Earl Brian who has
this company called Hadron... Infotechnology. He owned UPI
[United Press International] for awhile... He's actually under
indictment in L.A. right now. He was [unclear] SEC [Securities
and Exchange Commission] charges for financial manipulation.

This stuff got customized and sold all over the place. *Robert*
*Maxwell* was re-selling it, on behalf of the Israelis. Again:
the object was to get this software planted into foreign
intelligence agencies and particularly into foreign banks. It was
basically a version of this software that went into Guatemala.
Maxwell's front company sold this software to Guatemala, and
basically it was used to help assassinate 30,000 civilians down
there: catalogue 'em and find out who is an "enemy of the state"
and...


CALLER #5:
We of the WBAI audience are quite familiar with this. But I'm
much more interested in the players with the NSA who I think are
really running the country.


JAMES NORMAN:
I think you're right. I *wish* I knew who the bad guys were.


DR. MICHIO KAKU:
Let me also say, for those of you who tuned in: the NSA [National
Security Agency] is a very large organization whose budget is
reputed to be something on the order of 10 times the size of the
CIA budget. And they're, historically, involved with surveilling
the Soviet Union. The CIA was mainly interested in spies on the
ground and analyzing information. However it takes an enormous
body simply to monitor what was happening in the Soviet Union at
the height of the Cold War, and that's where the NSA was set up.
It's basically a surveillance organization.

However, many people claim that it has since taken a life of its
own and it is also part of some kind of secret government.


JAMES NORMAN:
The CIA reports directly to the President. It's a civilian
entity. The NSA reports to the Director of Central Intelligence
*through* *the* *Pentagon*. It's essentially a military function.
And, in fact, it was made up of various elements of the Army, Air
Force and Navy; their intelligence, signal gathering entities
ultimately became NSA-type entities.

NSA is also responsible for all of the government's activity in
terms of encryption. And they're the guys who are behind all the
Clipper chip and all that other kind of stuff.

There's a healthy debate goin' on about this stuff. Everybody
needs to talk about it.

-----------------------------------------------------------------
     I encourage distribution of "Conspiracy Nation."
-----------------------------------------------------------------
If you would like "Conspiracy Nation" sent to your e-mail
address, send a message in the form "subscribe cn-l My Name" to
[email protected]          (Note: that is "CN-L" *not* "CN-1")
-----------------------------------------------------------------
  For information on how to receive the new Conspiracy Nation
  Newsletter, send an e-mail message to [email protected]
-----------------------------------------------------------------
Want to know more about Whitewater, Oklahoma City bombing, etc?
(1) telnet prairienet.org (2) logon as "visitor" (3) go citcom
-----------------------------------------------------------------
       See also: http://www.europa.com/~johnlf/cn.html
-----------------------------------------------------------------
     See also: ftp.shout.net  pub/users/bigred
-----------------------------------------------------------------
Aperi os tuum muto, et causis omnium filiorum qui pertranseunt.
Aperi os tuum, decerne quod justum est, et judica inopem et
  pauperem.                    -- Liber Proverbiorum  XXXI: 8-9




Date:     Sun May 26, 1996  8:02 pm  CST
From:     bigred
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:       Conspiracy Nation
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]
BCC:    * David Beiter / MCI ID: 635-1762
Subject:  Conspiracy Nation -- Vol. 7 Num. 98

The following is brought to you thanks, in part, to the kind
assistance of CyberNews and the fine folks at Cornell University.


         Conspiracy Nation -- Vol. 7  Num. 98
        ======================================
          ("Quid coniuratio est?")


-----------------------------------------------------------------

JAMES NORMAN || WBAI RADIO || MAY 13, 1996
==========================================

James  Norman was featured on a "Hidden Agenda" broadcast, hosted
by Gary Null, on WBAI  Radio  in  New  York City on May 13, 1996.
The following is an abbreviated transcript of that interview:


GARY NULL:
We will interview at this point a man named James Norman.

James Norman is a  journalist.   He's  been a journalist for many
years.  He was senior editor, specializing in stories about major
companies,  for  Forbes  magazine  [and]  the  Auckland  Star  in
Auckland, New Zealand.  Also Business  Week:   he  was  a  senior
writer  for  them.   And  he  was also bureau manager in Houston,
Texas,  bureau  manager  in  Minneapolis,  and  senior  writer in
Stanford, Connecticut.  He worked for the Oakland Press, the  Ann
Arbor News, and the Daily Telegram.

He came across a story.  And it's a story  that  won't  go  away.
And we've decided to pursue it.

But  a  little background on this:  Normally, when I do a "Hidden
Agenda" series, as I just did with  Horowitz -- he had to send me
hundreds and hundreds of documents.  Because  the  statements  he
was making, for most people would be considered too extreme.  And
I  can assure you that virtually all the documents, from official
and government sources, are  there.   Or  he wouldn't have got on
the show.

And similarly, when I first became aware of the  story  of  James
Norman,  it  was  about  a  year ago.  And many people said, "Why
don't you have James Norman on the show?"

So, I contacted  James  Norman,  went  over his information.  But
because it's not a single story -- it is a  story  with  so  many
tentacles,  it's  like an octopus.  And I thought, "Well, some of
these stories are plausible.  Some are not."  And I said, "James,
you're going to have  to  supply  me  with documentation."  And I
said, "Even with the best of intents, you may have been conned by
some people."  (Where you take a good part of the story, that you
can hold your own  on,  and  next  thing  you  know  is,  they've
discredited you on another; they've planted some misinformation.)

So  anyhow,  back and forth, over a long period of time, I've met
with James Norman; he  supplied  me with documents.  And finally,
he supplied me with one of his primary  sources.   I  spent  some
time interviewing this primary source.

And  so I just want our audience to know that I am satisfied that
many of  the  statements  that  you're  about  to  hear  *can* be
corroborated.


JAMES NORMAN:
It is a rather infuriating cluster of stories, because  it's  not
the  kind  of  thing  there  is  readily  [available]  documented
evidence  for.   But it's the kind of thing where we've talked to
an awful lot of  people  and  had  it corroborated verbally.  And
since  this  thing  broke  about  a  year   ago,   there's   been
consistently  mounting  bits and pieces of corroborative evidence
that are cropping  up.   And  unfortunately,  the  story has been
rather predictive of events.

The way it all  started:   I  didn't  set  out  to  do  some  big
investigative  piece;  I was just doing a story on an oil company
bankruptcy in Connecticut.  But  it  got  into looking at various
covert arms financing vehicles used by the government  or  people
connected with it.  And that got into the murky realm of computer
software,  and  particularly  to  bank  spying  activities by our
government.  I stumbled  onto  what  actually  was a major effort
that our country has had underway for  about  a  dozen  years  to
surveil  foreign wire transfer traffic.  (We've got people coming
out of the woodwork  now  from  the  early  Reagan years who were
directly involved in  this  program;  people  from  the  National
Security Council who helped set it up, and it's still ongoing.)

What  that  led  to, quite inadvertantly, was a connection to the
Vince Foster case -- which a number of journalists have continued
to follow.   Because  there's  just  so  many  unresolved issues.
There's so many questions about  the  circumstances  of  Foster's
death.

Here's  what  we  found  out:   at the time of his death, in July
1993, Vince Foster, who was  a  Deputy White House Counsel in the
Clinton administration, was under  some  kind  of  investigation,
surveillance,    in   connection   with   a   counterintelligence
investigation.  He was suspected of  selling secrets to a foreign
government.  What we were able to determine was, he had been tied
in for many years on the periphery of this bank spying effort  by
our  National  Security  Agency.   He  had  been, for many years,
connected as sort of  a behind-the-scenes go-between, between the
National Security Agency and a company in Little  Rock,  Arkansas
--  a  rather  curious,  secretive,  bank data processing company
called  Systematics.   (It's  now  changed  its  name  to AllTel.
They're a wholly-owned  subsidiary  of  AllTel  Corporation,  the
telephone utility in Arkansas.)

But  Foster,  while  he was at the Rose Law Firm, was in effect a
sort of "handler" for  that  company.  And that would conceivably
have given him access to various sensitive kinds of computer code
secrets, encryption stuff, [and] other insight into  intelligence
activities by our government.

The  way  that  Foster came under suspicion, according to sources
that I've dealt  with,  was  that  he  himself  had  a Swiss bank
account [at] a former affiliate of the Banca Ambrosiana.

(The Banca Ambrosiana had been a key target of "computer  spooks"
of  our  intelligence  community  who were very curious about the
activities of that bank.  It was closely tied to the Vatican Bank
and was suspected  of  money  laundering  and other illicit money
activities.  In fact, when it collapsed there was a  great  cloud
of secrecy about it.  The head of the bank was found hanging from
Blackfriars  Bridge  in  London.   The whole thing was surrounded
with intrigue.)

Apparently,  from  surveilling  accounts   within  the  bank,  by
"hacking" their way into that bank, they had  come  across  many,
many,   many  accounts:   coded,  numbered,  off-shore  accounts,
belonging to hundreds of  high-level government officials -- U.S.
government officials, and other governments.

And Foster was one of these people who they came across.  He  was
suspected  of  selling  secrets to the state of Israel because of
the $2.73 million that was apparently in this account.

Again:  using this  wire  transfer  tracking  technology that our
government had developed, they had been able to track the  money,
apparently,  back  to Israeli sources.  And that was what was the
beginning of this counterintelligence investigation.

To sell state secrets  on  the  side:  that's called "espionage".
And that's what we're talking about here, in terms of the  nature
of the investigation.

We were able to determine that there were various entities of the
government,  various intelligence agencies, that were taking part
in this surveillance.

One of  the  key  sources  on  this  --  which  we  were  able to
corroborate various things he said  with  anywhere  from  half  a
dozen,  to  a  dozen, to a couple of dozen sources -- is a fellow
who is a retired CIA contractor by the name of Charles Hayes.  He
lives in Kentucky now.  He  is  part  of a small group of retired
intelligence community guys who were  associated  with  something
that  was  called  "Division D" -- which is actually mentioned in
Bob  Woodward's  book,   *Veil*.    This   group's  job,  in  the
government, had been to  break  into  foreign  computer  systems,
either physically or electronically.

They  [now]  have  access  to  what are called "back door", coded
entryways into the software  used  in  many foreign banks.  Which
allows them to circumvent the normal security systems around bank
databanks.  Which has allowed them, apparently, to surveil  these
foreign banks.


GARY NULL:
We're  not  gonna  have time to finish this today.  I want you to
come back on the show tomorrow, so we can do a "part 2".

I want our audience to know  that this is just the *beginning* of
his story.  There are a lot of "cast  of  characters",  including
Hillary  Clinton.   And  it's  strong  stuff.   It  seems  almost
impossible, but the documentation is there for a lot of this.

I'm  Gary Null.  And if you'd like a copy of this show, just call
212-799-1246 and ask for the program with James Norman.  We'll be
back tomorrow.

 +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +

If you would like  to  know  more  about this explosive story, CN
recommends the  Orlin  Grabbe  material,  currently  archived  at
ftp.shout.net  in  subdirectory pub/users/bigred/og -- or use the
http address, http://www.europa.com/~johnlf/cn.html to read it.

-----------------------------------------------------------------
     I encourage distribution of "Conspiracy Nation."
-----------------------------------------------------------------
If you would like "Conspiracy Nation" sent to your e-mail
address, send a message in the form "subscribe cn-l My Name" to
[email protected]          (Note: that is "CN-L" *not* "CN-1")
-----------------------------------------------------------------
    For information on how to receive the improved Conspiracy
  Nation Newsletter, send an e-mail message to [email protected]
-----------------------------------------------------------------
Want to know more about Whitewater, Oklahoma City bombing, etc?
(1) telnet prairienet.org (2) logon as "visitor" (3) go citcom
-----------------------------------------------------------------
       See also: http://www.europa.com/~johnlf/cn.html
-----------------------------------------------------------------
     See also: ftp.shout.net  pub/users/bigred
-----------------------------------------------------------------
Aperi os tuum muto, et causis omnium filiorum qui pertranseunt.
Aperi os tuum, decerne quod justum est, et judica inopem et
  pauperem.                    -- Liber Proverbiorum  XXXI: 8-9





Date:     Mon May 27, 1996  5:48 pm  CST
From:     bigred
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]

TO:       Conspiracy Nation
     EMS: INTERNET / MCI ID: 376-5414
     MBX: [email protected]
BCC:    * David Beiter / MCI ID: 635-1762
Subject:  Conspiracy Nation -- Vol. 7 Num. 99

The following is brought to you thanks, in part, to the kind
assistance of CyberNews and the fine folks at Cornell University.


         Conspiracy Nation -- Vol. 7  Num. 99
        ======================================
          ("Quid coniuratio est?")


-----------------------------------------------------------------

JAMES NORMAN || WBAI RADIO || MAY 14, 1996
==========================================

James  Norman was featured on a "Hidden Agenda" broadcast, hosted
by Gary Null, on WBAI  Radio  in  New  York City on May 14, 1996.
The following is an abbreviated transcript of that interview:


GARY NULL:
Hi. I'm Gary Null and  I'd  like  to  welcome you to our program:
today, continuing our series on "Hidden Agendas".  This series is
meant to explore some of the areas where we  have  been  told  an
official  version  of events, and our own, in-depth investigation
or those of the guests  that  I  have on, shows that the official
version should be challenged.

You are going to hear information today that you simply will  not
believe.   However:   after  an  enormous  amount  of  effort  to
corroborate  the  evidence  of  James Norman, my guest, I can say
that much of what he is  about  to say, at least *I'm* convinced,
is true.

[Null next summarizes info from the previous, May 13th broadcast.
See Conspiracy Nation, Vol. 7 Num. 98 for background.]


JAMES NORMAN:
It  almost makes your brain hurt to think about what's been going
on here.  But the essence  of  it  is  exactly as you say:  we've
been spying on foreign banks.


GARY NULL:
What happened was, when they were looking  into  these  accounts,
looking  for  terrorists  supposedly,  they also came across some
major  U.S.  legislators:   Senators,   House  members,  who  had
*enormous* amounts of money.  The question is:  How did they  get
all  this  money  in  these  bank  accounts?  Why this particular
[Swiss] bank?  And  that  gives  us  an  idea  why  many of these
individuals, as you'll hear in a few moments, have suddenly begun
to retire in unprecedented numbers -- so  they  can  "spend  more
time  with  their families".  There's some big names involved:  I
mean *major* names.


JAMES NORMAN:
Once these fellows  [rogue  CIA  hackers]  were  able to get into
these foreign banks and identify accounts belonging to government
officials, satisfy themselves that it was dirty money,  they,  by
obtaining  the  authorization  codes  off  of these accounts (and
given that they were  numbered  accounts  and  that there were no
signatures required for  withdrawal),  they  have  been  able  to
effect  technically legitimate wire transfers of this money.  And
according to my sources, the  money  has been pulled back to some
kind of holding account at the U.S. Treasury, escrowed for use by
CIA or the intelligence community if and only if the CIA gets rid
of a bunch of its own bad apples.

Vince Foster's account, which we mentioned on the earlier show...
He was found to have $2.73 million  in  a  Swiss  account.   That
money  was apparently taken out by this "Fifth Column" [rogue CIA
hackers] group right at  the  time  that  Foster was scheduled to
make one of these periodic, curious, one-day trips to Geneva that
he was making.

Now the Sunday London Telegraph has reported about these  curious
trips.   Based  on  the  findings  of  a  private investigator in
Arkansas, whose credentials have been spoken of extremely highly,
this guy was able  to  find  private  American Express records of
Vince Foster that showed  he  had  been  making  these  periodic,
one-day  trips  to Geneva every six or eight months.  And on July
1, 1993, he bought round-trip travel to Geneva and back -- but he
cancelled that trip!  He  didn't  make  the  trip.  I'm told it's
because he learned, in the process of making that trip, that  the
money  had been taken out of his account.  He cancelled the trip.
And subsequently, he bought $2400 worth of travel to *somewhere*.
We don't know where. He never lived to make that trip.

His wife denies knowing anything about any of this.

This apparently is when he  found  out  he was under some kind of
surveillance.  *That* began this curious chain of events  in  the
final weeks of his life, including a meeting on the eastern shore
of  Maryland  with  Webster  Hubbell  and  other  people from the
Clinton  administration  that,   in  retrospect,  clearly  seemed
designed to convince Vince Foster to shut up, "cop a plea", don't
implicate anybody else.  Because there were other people  in  the
White  House  who were directly threatened by this investigation.
Including Hillary Clinton.

Hillary Clinton, at the Rose  Law Firm, was an attorney-of-record
for this company, Systematics:  a bank data processing company, a
front company for the  National Security Agency, heavily involved
in banking intelligence.  And, as  well,  this  company  was,  in
effect,   a   "money   laundromat"  for  covert  funds  that  the
intelligence community  was  moving  around.   It  was  sort of a
well-known  thing  within   the   intelligence   community   that
Systematics  was,  in effect, a "cyber-bank" for the intelligence
community.

Hillary was the attorney-of-record  for  the  "bank" in 1978 when
Jackson  Stephens,  the  Arkansas  billionaire  who  *owned*  the
company 100 percent at that time, fronting  for  Arab  interests,
tried  to  take over, on behalf of what were BCCI [Bank of Credit
and Commerce  International]  people,  tried  to  take  over this
Washington bank holding company -- then-called Financial  General
Bankshares,  now  called  First  American.  (That's the bank that
ultimately did come under  BCCI  control, with Clark Clifford and
Robert Altman.)

One of the stipulations Stephens had when he tried to  make  that
acquisition  was  to bring in Systematics to do all the bank data
processing  for  the   multi-state   holding  company.   The  SEC
[Securities  and  Exchange  Commission]  blocked   that   initial
acquisition.   Ultimately,  we're  told,  Systematics  *did*  get
involved with that bank after BCCI eventually was allowed to take
control of it later on.

Hillary,  we're  told  by  Foster in an interview in the American
Lawyer magazine in 1992, developed an entire practice at the Rose
Law Firm in intellectual  property  law  -- mainly from immersing
herself in the affairs of this  company,  Systematics.   Clearly,
she  had  more than a passing acquaintance with this stuff.  When
you talk about  intellectual  property  law,  we're talking about
software licensing and extremely sensitive stuff like that.

That raises a question:  Could Hillary have been involved somehow
in this espionage situation that Foster  was  being  investigated
for?   Now  I  have no conclusive proof that Foster was guilty of
espionage.  All we know is  that  he was under investigation.  He
was under surveillance.  What we *do* know is that his  executive
assistant,  Deborah Gorham, testified under oath, in an interview
by Senate  investigators,  that  Foster  had  given  her, shortly
before his death, two, inch-thick ring binders of materials  from
the  National  Security  Agency,  which  he had her put in Bernie
Nussbaum's  safe  in  the   White  House.   Clearly,  these  were
sensitive documents.  And according to one Brookings  Institution
expert  I  talked  to, and corroborated, one of these binders was
*indeed* sensitive  stuff  and  probably  involved  the codes and
protocols by which the President would  authenticate  himself  to
the  Pentagon in ordering military action.  These are the kind of
materials that Foster would  have  had  no  reason to have in the
routine course of his duties as a Deputy White House Counsel.  He
did not have a high enough security clearance for them.  He would
not have had access to them.  It  would  have  required  somebody
that  had  access  to  the Oval Office or the Presidential living
quarters to apparently even  provide  these things.  *What* *was*
*he* *doing* *with* *these*??  It's a question  that  has  begged
for  an  answer,  or  even  to be asked in public in the official
Washington hearings.

So that has helped to put, over the whole Vince  Foster  case,  a
shadow  of  National  Security  Interests which helps explain the
rather bizarre cover-up behavior of people in the government, and
in the news media in  particular,  in  failing to pursue the real
nature of that case.

What is becoming clear to me is that the political  scandal  here
is  so immense that the government just cannot come to grips with
it.

Have I  seen  any  of  the  hard  documents  on  these Swiss bank
accounts?  No, I haven't.  And it's extremely frustrating to  me.
I  keep  talking  to these sources.  I say, "At some point you've
got to let this out."  In fact,  what I've been told is that they
*have* been turning  over  this  information  to  Kenneth  Starr,
probably under some kind of a grant of immunity.

There's  a  whole  bunch of sensitivities here, questions:  Could
this stuff be used?  Admissable  as evidence?  That's why there's
been this basically extra-legal approach to the whole thing:  get
these people [e.g.  crooked  congressmen,  etc.]  out  of  office
first,  then  eventually  --  perhaps  with  a  stronger  Justice
Department,  willing  to  go  after them -- they'll eventually be
prosecuted.

It's a heck of a way  to  do business.  But, again...  [laughs] I
couldn't have made up this story if I tried!


GARY NULL:
Do you think Hillary Clinton will be indicted?


JAMES NORMAN:
Certainly if you "read the tea leaves" of what's  been  going  on
with  the  Starr,  Senate, and House investigations, certainly it
looks like  indictments  are  rapidly  approaching  for the First
Lady.  Probably the first round  would  be  on  relatively  minor
obstruction of justice or banking-related infractions.

The  scenario  I have been told by people who are involved in the
investigations is that there  will  be  an initial round of these
kind of charges.  Probably there would be pardons available.  But
maybe next year sometime,  there  could  be  a  second  round  of
indictments that would involve much more sensitive crimes, crimes
against  the  state,  potentially,  for  which  there *may* be no
pardon available.

So the stakes here are extremely  high.  And we could end up with
a  situation  much   like   Mexico   right   now,   where   their
former-President  Salinas  is essentially a world wanderer, a man
without a country  right  now,   himself  having  been accused of
being involved in maybe half-a-billion  dollars  worth  of  slush
funds, stashed in CitiBank accounts in Switzerland.

There's  a  lot  of  good  people in the government.  And in many
agencies, I think there's an  attempt  now to try and finally get
justice.  I think that for years and years, good people have  had
to basically put the kibosh on investigations that would have got
too  close  to high political figures.  Now I think a lot of this
information is coming out.  And I think there is a serious effort
to clean up the corruption in our government, which unfortunately
has become  of  a  giant  magnitude:   from  kickbacks, payola on
illicit drug and arms transactions,  and  who  knows  what.   And
unfortunately,  the  money  involved  now is so much more than it
ever has been in  the  past.   There  has always been corruption;
there will always be corruption.  But the  dollars  involved  now
have   become   *so*  significant  that  they've  tainted  almost
everybody, it looks  like,  at  high  levels.   And  it's made it
impossible to clean up the system.

So that's why this "Fifth Column"  group  has  resorted  to  this
extra-legal approach.  And I don't endorse it necessarily.  But I
have  to  say,  "Hats  off"  to  'em.   It  looks like it's being
dramatically effective.

 +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +  +

If you would like  to  know  more  about this explosive story, CN
recommends the  Orlin  Grabbe  material,  currently  archived  at
ftp.shout.net  in  subdirectory pub/users/bigred/og -- or use the
http address, http://www.europa.com/~johnlf/cn.html to read it.

-----------------------------------------------------------------
     I encourage distribution of "Conspiracy Nation."
-----------------------------------------------------------------
If you would like "Conspiracy Nation" sent to your e-mail
address, send a message in the form "subscribe cn-l My Name" to
[email protected]          (Note: that is "CN-L" *not* "CN-1")
-----------------------------------------------------------------
    For information on how to receive the improved Conspiracy
  Nation Newsletter, send an e-mail message to [email protected]
-----------------------------------------------------------------
Want to know more about Whitewater, Oklahoma City bombing, etc?
(1) telnet prairienet.org (2) logon as "visitor" (3) go citcom
-----------------------------------------------------------------
       See also: http://www.europa.com/~johnlf/cn.html
-----------------------------------------------------------------
     See also: ftp.shout.net  pub/users/bigred
-----------------------------------------------------------------
Aperi os tuum muto, et causis omnium filiorum qui pertranseunt.
Aperi os tuum, decerne quod justum est, et judica inopem et
  pauperem.                    -- Liber Proverbiorum  XXXI: 8-9

Anti_Illuminati

  • Guest
Re: Blowing the lid off of PROMIS once and for all - You cannot lie to me
« Reply #25 on: April 26, 2009, 09:47:53 pm »
Transcript: Catherine Austin Fitts's Visit To The DrugSense

original URL: http://www.mapinc.org/drugnews/v01/n2024/a03.htm
Newshawk: Guest Schedule http://www.cultural-baggage.com/schedule.htm
Pubdate: Sun, 02 Dec 2001
Source: The DrugSense Chat Room
Website: http://www.drugsense.org/chat/

 

TRANSCRIPT: CATHERINE AUSTIN FITTS'S VISIT TO THE DRUGSENSE CHAT ROOM

Dean Becker:

Catherine, please tell us what you and Al Giordano were doing in Boston

Catherine:

Al and I spoke at Boston University.  The Student Underground organized a speech.  There were about 50 people in attendance.  Al covered the War on Drugs.  I covered money laundering and the financial aspects.  The response was very good.  A representative comment was from one member of the audience who said "Is it really this simple" Al was great.  He said.  Yes, it is really this simple.  I really felt a breakthrough was happening.

Dean Becker:

I think you are right Catherine.  I am the worlds "worst" optimist.  Are there plans to take this idea on the road?

Catherine:

Al is interested in doing other colleges together.  I assume it depends on what groups are organizing where.

Richard Lake:

Catherine, have you known Al a long time? Is there any news on his case???

Catherine:

Hey, Richard.  I have known Al since he started Narco News about 18 months ago.  He published an article by Mike Ruppert that covered some of my thoughts on the relationship between narco dollars and the 1996 campaign fundraising.

Catherine:

I am not sure where Al's case is.  He is sure to win so long as he gets the resources and the judge is clean.

Dean Becker:

Catherine, give us a brief on that relationship please

Catherine:

One of my favorite quotes is from William Colby, former CIA director.  H e said in 1995 that "the Latin American drug cartels have stretched their tentacles much deeper into our lives than most people believe.  It's possible they are calling the shots at all levels of government.  The 1996 presidential campaign fundraising was dirty beyond imagination.  A lot of the money was coming in from what looked like legitimate sources, but a few steps back.

Catherine:

Last week, I saw Kevin Zeese speak in Philadelphia at the White Dog Cafe.  He got a lot of questions about how the money worked.  Again, I sense that people are ready to look at what I call "The Real Deal", much of which involves hard issues about power, money and sex.

Dean Becker:

Catherine, of course you are right, everyone in the movement I talk to is ready to fully explore this facet

Catherine:

I am in Philly once a month, and delighted to speak on "Narco Dollars" if there is a forum.

cellogirl:

Are you always at the white dog cafe?

Catherine:

The presentation was at White Dog.  I went to U of Penn and used to be the bar manager down the street at La Terrassee.  When Judy Wicks, the owner of White Dog was the manager at La Terrasse, I worked for her, so we are old friends.  I am a great admirer of her efforts.

Richard Lake:

Catherine, 'Narco-Dollars For Dummies' probably got more discussion in the various email discussion lists, chat rooms, forums, etc.  than anything Al has ever put on Narco News.  Did you receive much feedback and could you tell us the general reactions???

Catherine:

I have gotten about 50 e-mails and a few calls on Narco Dollars.  The most common response is one of real relief and energy.  Folks realize that this is something they can understand and it is not hopeless.  About a third are following up on how to do a solari and issues of solutions.

celaya:

Catherine - What do you think about the friendship between Gov.  Johnson and Bush? They seem at such opposite polls.

Catherine:

I don't know anything about Johnson and Bush's friendship.  I was always someone who believed in working inside the system.  Events forced me out as what we were doing was too successful.  I have a hard time seeing a rationale reason for anyone going along with the system at this point.  So a friendship with someone like Bush is not something that works for me.

celaya:

Catherine, Have you had any more verification of your theories about the drug cartels controlling things?

Catherine:

I have had lots of verification of organized crime cartels controlling things---drugs being only a piece.  The best verification, however, is simply doing the math on legal vs illegal businesses.  One is compounding at very high rates, the other at low rates.

celaya:

Ralph Nader and the Green Party ran mostly on a platform of getting the money out of politics.  Do you see any hope there?

Catherine:

I don't see a way to get money out of politics.  I think the most important reform requires place based financial disclosure.  Each citizen needs lots of easily accessible information about how "all the money works" in their local area.  If we are all looking at the money in our neighborhood, a lot of the organized crime and fraud will be eliminated by sunshine---in a manner that generates lots of jobs and equity profits for the honest folks.

Catherine:

I think sunshine works better than creating more rules.  Roaches play in the dark.

Catherine:

Another thing we can do is "vote with our money" This starts with our purchases.  Anytime we give our attention or pay money for media that does not tell the truth we send a message "we will buy your news even if you lie to us".

celaya:

Do you think that the people can be roused from their apathy? Most folks seem complacent and not interested in change

Catherine:

I don't think people are apathetic at all.  They are tired and they are scared.  They need solutions which save them time and make them money.  Most solutions that are proposed cost them money and time.

Catherine:

Most people want to get off the Titanic.  They don't know how to build arks.  Until they can see a way to build an ark they are going to keep pretending that they do not notice what is going on in the titanic.

Dean Becker:

Catherine, did you get a chance to read Judge Grays article: "Follow the money"? I think you guys see things a lot alike.

Catherine:

I read Judge Gray's book.  Is the article different?

Dean Becker:

It focuses more on the terror/money aspect than the book, though it is heavy on that too.

Catherine:

I will find it and read it.  Comments on book coming in 2 seconds.

Jo-D:

http://www.mapinc.org/drugnews/v01/n2008/a11.html = 'Follow the Money' by Gray

Catherine:

Judge Gray and I appear to be differ in 2 important respects.  He thinks the drug laws have failed.  I think they have been very successful.  This is an important framework difference.  The political strategies you use to defeat a successful policy are different than the ones you use to defeat a failed policy.

Catherine:

He says in his intro "We are all on the same side of this issue, i.e., we all desire to reduce drug use and abuse and all of the crime and misery that accompany them." I disagree very strongly with this statement.

allan:

Catherine- I am curious why and how do you disagree w/ Judge Gray's statement?

Catherine:

I think the Drug War has being very successful at achieving its primary goals:

Catherine:

Goal One: Generate a substantial pool of capital in the US to finance new technology and corporate growth from WWII on.

Catherine:

Goal Two: Permit increased centralization of power; shifting political power from local and state governments to the federal government in a manner that will permit a much higher percent of government money and local markets to be controlled by large corporations.

Catherine:

they got her for maintaining and dwelling and she don't pay the bills she don't have a job she was a house wife he paid them all and he is free

Catherine:

KV, in my experience what you need is an honest attorney who knows the system and the laws of this precise situation'

Catherine:

Once the enforcement folks see that you have a hired gun who understands ho the game works, they will be more careful....

allan:

Catherine, KV's visit is fairly frequent occurrence in this chat, lots of drop ins in fresh trouble wit' da law...

Catherine:

Are their any list serves or chat rooms that specialize in helping folks in his situation?

Catherine:

I don't know if you are familiar with Operation Safe Home, but it was one of the ways that they turned HUD into a War on Drugs agency.  I got to see a lot of the tricks through Operation Safe Home.  A mother can be evicted from public housing if her child uses drugs even if the mother had no knowledge.

Catherine:

The War on Drugs stuff at HUD is very intense.

Catherine:

One of the reasons that I am so interested in the Enron story is because of the tie in with the DOJ Asset Forfeiture Fund.

Catherine:

Pug Winokur is the head of Capricorn Holdings.  He is the lead investor in DynCorp, the company with the contract for the DOJ asset forfeiture Fund and for the War on Drugs in Bolivia, Peru and Colombia.

Catherine:

From the late 80's, Pug was the Chairman of DynCorp, stepping down to be chair of the compensation committee and member of the board in 1997.  He is still very active.  DynCorp was the company that picked up responsibilities for PROMIS after Inslaw was fired.  PROMIS is critical to understanding the War on Drugs.

Dean Becker:

Catherine, I have worked for Enron on several occasions, please elaborate on the tie in with DOJ.

Catherine:

Pug is a member of the Executive Committee of Enron and the head of the Finance Committee.  That means he is the person on the Board of Directors who is supposed to be making sure that the finances of the company are sound.

Dean Becker:

Catherine more please on the benefit / offset with Enron, the flow of money goes how?

Catherine:

Pug is also a member of the Harvard Corporation.

J_White:

So he's behind Enron's "creative" accounting?

allan:

yeah, that's what I'm reading...

Catherine:

YUP!

Catherine:

DynCorp also has the main contract to back up HUD enforcement

Catherine:

I would like to see the same legal philosophies about "negligence" that Pug and his colleagues use against people in the War on Drugbs as they profit from it at DOJ, State and HUD, applied to what they have done at Enron.

allan:

http://www.cccis.com/aboutccc/hwinokur.htm

allan:

"Prior to his current appointment, Mr.  Winokur was Senior Executive Vice President and Director of Penn Central Corporation.  Mr.  Winokur is a Director of Enron Corp., Azurix Corp., The WMF Group, Ltd., Mrs.  Fields' Holding Company, Inc., and DynCorp.  Mr.  Winokur is Chairman of the Compensation Committee."

kaptinemo:

And of course, DynCorp has some major contracts with Uncle concerning providing pilots and technical assistance to the fumigation efforts in Colombia...which is poisoning the local campesinos

Dean Becker:

I did several audits for the FDIC at the Penn Central and Cont.  Ill banks back about 87, 89..crooks every one!

Catherine:

In my research, Pug and the Harvard Corporation are significant players in the policies we are talking about tonight.  During the Clinton Administration, the Harvard Endowment grew from $4 billion to $19 billion.

allan:

http://www.iconservative.com/power_scam.htm

Catherine:

Now, if a mother is thrown out of public housing for a child using drugs without her knowledge or consent, what should happen to Pug Winokur and the board and senior management of Enron?

Catherine:

The most important thing is to switch control of the resources to the right people and policies.

Catherine:

The Enron story offers an opportunity to illuminate the current double standard in a way that can build support for a fundamental shift.

allan:

"DynCorp Chairman, Pug Winokur, begged out of Commerce Secretary Ron Brown's ill fated last flight in the Balkans." http://home.talkcity.com/ReportersAlley/thecatbirdseat/Power.htm

kaptinemo:

what's that? he dodged the Brown flight!!!!!!!

kaptinemo:

Brown was about to spill his guts to the Justice Dept

Catherine:

On the reference to the Brown flight, they is some uncertainty as to whether it was Pug or the President.  Wherever there are durgs and terrorism, DynCorp is there---Kosovo, HUD, Peru, Colombia, Bolivia, the Gulf...they are worth a serious look.  They are one of teh c9ompanies that make the War on Drugs really work.  I can not STRESS ENOUGH the importance of the knowledge managers.  Do I have time to tell a DynCorp story?

allan:

yes!

kaptinemo:

please!!!

Catherine:

In 1998 or 99, I went to a presentation on the War on Drugs at the Institute for Policy Studies.

Catherine:

A Quaker group from Philadelphia had sponsored a tour of three peasant women.  One was from Bolivia, one was from Peru and one was from Colombia.

Catherine:

They described for about an hour how American financed military was moving them off of their land into newly built cities.  This "War on Drugs" had nothing to do with stopping the War on Drugs.  It had to do with stealing land and depopulation.

Catherine:

When they were finished I started to ask a series of questions about who was making all the money and how the money worked.

Catherine:

At first, they seemed very excited about being free to speak openly about the money aspects.  After a while, they started to seem tense.

Catherine:

They described how the land was being acquired by the military leaders and the big multinational corporations as the peasants got moved off the land at the American taxpayers expense.

Catherine:

Finally, one women burst out in a very angry tone "Senora...you say that you have never been to our countries.  And yet, from your questions you know down to the most minute detail how this is working.  How can that be?" I think she thought I was lying or I was from the CIA.

allan:

"Allegations also exist regarding the use by Lockheed and Pug Winokur/DynCorp of the PROMIS system to compromise the HUD systems, with $17 billion and $59 billion reported missing in FY1998 and FY1999.  "

Catherine:

I said to her, "I know nothing about your countries.  I know about my country.  Apparently the economic cleaning in your countries works exactly as it does in my country.

Richard Lake:

A quick check of the MAP archives using www.mapinc.org/find shows over 200 news items with DynCorp in the story.  I think they are the same folks who put mercenaries in the ARMY ROTC battalions to teach cadets how to kill....

allan:

and they are one of the "private contractors" doing "defense" contract work in Colombia...

Catherine:

We all sat there looking at each other in shock.  We realized that we were dealing with one problem and one plan.  Three months later I read DynCorp's SEC filings to discover that the same company had the lead on planning and management for DOJ, HUD and State Department.  Indeed, it was one company that the women of North and South America who were there that day were dealing with.

kaptinemo:

DynCorp was in hot water earlier this year when a bottle containing liquid heroin was found enclosed in a package received at the company's offices in FL

Catherine:

There is a new book on the role of IBM in collecting and manipulation the data on the holocaust in Germany, It gives a wonderful historical precedent for the role of DynCorp and PROMIS in the War on Drugs.

Catherine:

The people who are making money on DynCorp include the people who invested through PUg's company but MORE IMPORTANT...

Catherine:

is to look at the other investments of the same folks.  For example: AIMCO, NHP, WMF.  So I invest in DynCorp which has access to all sorts of DOJ and HUD enforcement.  Then I and my network invest in a group of HUD real estate and mortgage banking companies that benefit from the knowledge and policies that I rig from the other company.

Catherine:

The IBM book is by Edwin Black.  I forget the exact name.  It is a VERY GOOD way oif understanding how VERY IMPORTANT the role of database technology and simulation and artificial software is to what is happening.  If you have not read Black Money by Michael Thomas, I would strongly recommend it.  It is out of print, but you can always find copies on Amazon second had lists.

allan:

http://www.edwinblack.com/

Catherine:

Not to overcomplicate, but a great deal of money has gone missing in recent years, particularly in agencies in which Lockheed, DynCorp and AMS are in control of the key information systems and accounting systems.  It is important to understand that the financial and accounting systems at the federal government are controlled by the New York Fed and a groupof contractors.  As a practical matter, there is no government.

Catherine:

The Enforcement bureaucracy that was built up around the War on Drugs appears to have been very useful to the contractors getting a free hand with the federal accounts.  One of the reasons I am interested in the Enron story is to see if this was one of the places that Pug et al were using to launder the $3.3 trillion plus that has gone missing from federal agencies since fiscal 1998.

Catherine:

If you go to www.solari.com/gideon you will find a link for financial fraud.  It will link you to various articles about all the missing money.

Catherine:

In 1997, I was told by the President of the largest US pension fund that the top investors had given up on the US and were moving all the money aboard.  I made the mistake of assuming that he meant all the money that could be moved legal.ly.  I am afraid that this is probably not the case, that they are moving as much as can be rounded up.

celaya:

Catherine.  Your information is quite overwhelming.  What I wonder - Is there a country that is not involved in this evil network? Netherlands perhaps?

Catherine:

Sorry about that.  If anyone would like to know more send me your e-mail address and I will send you a copy of the Myuth of the Rule of Law article.  Again, the articles by me and others that you can link to at www.solari.com/gideon will be useful.

Catherine:

We are dealing with a global phenomenon.  This is everywhere.

Dean Becker:

And the end result, move the money, repossess the lands and send us to camps?

Catherine:

I think camps are highly unlikely.

Catherine:

I think that events are far more fractured and organic.  There are various factions.  As they compete the one thing they can agree on is stealing more from those who do not understand what is happening.

Catherine:

We have the power to change all of this and to move things in a positive direction.  As I keep saying "If we can face it, God can fix it"

G:

I prefer if we can face it in time we can fix it.

Catherine:

One of the reasons that I say that God can fix it is that people are overwhelmed by the thought of having to "fix" this themselves.  No one has time.  Everyone is tired.  That is because we do not understand the power of our shared intelligence to shift the money.  If tomorrow everyone in America turned off their TV and refused to buy or watch any media that did not tell them the total truth the game would shift tremendously.  We have the power.

Catherine:

Hey, thanks.  What a pleasure to be with you tonight! Goodnight!

cellogirl:

Thank you Catherine, it's been a pleasure watching this conversation : )

allan:

Catherine- many thanks! you were great!

celaya:

Thanks Catherine! We are with you!

bumbleweed:

thank you Catherine

kaptinemo:

please come back again when you can!

Richard Lake:

Yes, Thank You so much for being here.  The NYT forum is great because you can do much longer statements but it is much slower to work with.  We will see you there Wednesday....

Anti_Illuminati

  • Guest
Conspiracy Nation -- Vol. 5  Num. 73
             ======================================
                    ("Quid coniuratio est?")


-----------------------------------------------------------------

EXPLOSIVE NEW FACTS REVEALED IN MYSTERIOUS DEATH OF FOSTER
[The *Spotlight*, 08/07/95]

[...continued...]

TOM VALENTINE:
In other words the United States was spying on banks around the
world to track people's money?


JAMES NORMAN:
Actually, it was an allied government effort, which also included
Israel. It was originally designed as an anti-terrorist effort.
The program was nicknamed "Follow the Money."

Senior people from the Reagan years who were involved in
designing and crafting this program have confirmed that there was
such a program underway and that massive amounts of data were
collected. However, because of the highly sensitive security
nature of this, they can't say quite how it was done, but we have
figured out that one of the companies involved in implementing
the software system (and probably the hardware) was a company in
Little Rock that went by the name of Systematics.


TOM VALENTINE:
Was the Inslaw company's computer software called PROMIS involved
anywhere in this? (The owners of Inslaw claim that during the
Reagan administration the Justice Department reneged on a
contract with them, stole the software and used it and sold it to
foreign governments. -- Ed.)


JAMES NORMAN:
Yes. It started out looking like a little cloud on the horizon,
but it's turned out that the uses to which this PROMIS software
has been put would boggle the mind. It's a very powerful system
that was initially designed for tracking legal cases, but it was
also designed to be customized so that you could adjust it to
track all kinds of things. It's been used in tracking nuclear
submarines, intelligence data and banking transactions.

It was in 1982 -- right about the time that this "Follow the
Money" program was launched -- that Inslaw came up with its
proprietary enhancement (PROMIS) of what had, until then, been
public domain software that had been developed by the government
with taxpayer dollars. The government's funding for the program
had run out, but Inslaw came in and re-wrote and enhanced the
software. It was those enhancements that the government took
since the government was so desperate for a software to implement
this "Follow the Money" program in particular since it required
massive amounts of tracking.

I think what was involved here was an effort to get all of the
world's megabanks to standardize their data in a way that would
be easily analyzed by the National Security Agency (NSA). Now the
NSA is the signals intelligence arm of the government. It's the
computer spy agency, really, and highly secretive.

Systematics in Little Rock was one of a number of companies that
got involved in installing, selling, supporting, customizing and
managing this software and bank data center operations. Actually,
it appears that there was a cluster of such companies.

Systematics was started by Jackson Stephens, the investment
banker, who has been heavily involved in bond trading in
Arkansas. It grew rapidly in the 1970s as it took out more
domestic business. In 1982, as the government was looking for a
company to help out with this "Follow the Money" program,
Systematics took on a big role in that and its business boomed
even more.

Then when Bill Clinton came to the White House and Foster and
Hubbell came along with him, Systematics' overseas business
blossomed along with it and they started getting contracts from a
number of foreign banks.


TOM VALENTINE:
Was Vince Foster in the NSA?


JAMES NORMAN:
When you say "in" the NSA, it's hard to say. The way it's been
described to me is that he was an interface person between the
NSA and Systematics. The way I see it, is that Vince Foster at
the Rose Law Firm was a very quiet but a very bright guy. He was
one of Jackson Stephens' trusted "deal guys" at the law firm. He
was a litigator, but more than that he was a business lawyer.

In that role he would have been in charge of supervising
contracts, setting up accounts, high-level marketing and
smoothing all of the lumps that would naturally go on between [a
company he represented] and a government it was involved in
contracts with.

Foster never showed up as an employee of Systematics. He never
billed Systematics for any time. You won't find his name cropping
up on any Systematics documents, although we've been told by good
sources that he was involved with Systematics, although the
company denies it. There's an absolute solid wall of denials
about this. Somebody's lying.


TOM VALENTINE:
Was Webb Hubbell ever retained by Systematics?


JAMES NORMAN:
They did retain Hubbell and Hillary Clinton. In 1978 Jackson
Stephens ended up being the front man for a group of Arab backers
of BCCI, which at the time tried to take over Financial General
Bankshares, a major Washington-based bank holding company. It was
one of the few banks that was then able to own banks over state
lines. Stephens came in and bought a big chunk of that bank and
wanted to take it over.

One of the things he wanted to do, according to the SEC lawsuit
that blocked the takeover, was to bring in Systematics to do all
of the data processing for that bank. In that case, Hubbell and
Hillary Clinton ended up representing Systematics in some of the
filings that they made in that case.

The reason this is significant is that, I've been told, the first
work that Systematics was doing for the government really was
shuffling covert money, managing the covert funds moving around
in secret government covert operations accounts.

This was no small job. It took a significant amount of computer
power because they were moving money around from one account to
another, setting up new accounts, phony companies, etc. It was a
major task and Systematics was in an ideal position to do that
because its business was to outsource the data processing
function in a number of small banks, mainly in the Midwest, the
West Coast and Texas.


Systematics would go to these small banks and say, "You can't
keep up with the technology. Why don't you just let us take your
computers and your people and provide all of that processing. You
don't have to worry about it." That may be a prudent thing for a
small bank to do, but when it would do that, it would give up a
tremendous amount of control over the guts of your bank and what
this allowed to happen was the creation, essentially, of a
cyberbank for the covert funds.


What we've been told -- and Systematics will adamantly deny this
-- is that at the end of every day there would be a direct bank-
to-bank balancing transaction of funds. We are told that imbedded
in these day-end transactions would be information codes --
compressed data that would convey the information about these
coded accounts. The banks that were involved themselves might not
even know this was going on. However, we are told that this is
how all of this money got moved around.


If you think about it, there had to be maybe hundreds of billions
of dollars moving around during the 1970s and 1980s in these
covert arms-and-drugs transactions. Nobody has adequately
explained where that money came from or where it went. It
certainly never went through Congress. It certainly was never
appropriated and didn't show up in government budgets. It was not
just "black" money but "black black" money that even the
congressional oversight people didn't know was sloshing around
out there.[/b]


TOM VALENTINE:
Has the *Washington Post*, for example, reported any of this?


JAMES NORMAN:
On July 4 the *Washington Post* published an article pooh-poohing
what they called all of the "conspiracy theories" about the
Foster death. What is interesting, though, is the shift that's
going on at the *Post*. Prior to that article, the *Post* was
utterly dismissive of any of these things. The tone in this most
recent article moves to a more neutral position. I think you are
gradually going to see more of the major media moving to get on
board this freight train before they get run over by it. The
cover-up is unraveling.


TOM VALENTINE:
So Vince Foster was investigated as a possible spy for Israel?


JAMES NORMAN:
That's what makes him a very key figure. He was a double agent in
a sense. He was overseeing a massive intelligence effort for our
country which conceivably gave him access to very high level
intelligence. You have to realize that the keys to the kingdom
these days are in computer encryption, codes, systems. That's
what loses and wins wars these days. You can listen to the other
guy's traffic.

By the nature of what Systematics was doing and what we believe
was some relationship between Systematics and E-Systems which is
one of the NSA's primary black operations subcontractors, it's
conceivable that Foster could have had very high level code and
encryption information. The problem is that he died before
investigators could figure out what did or did not get out the
door.

I've been told that perhaps because of Foster's long-time
involvement with intelligence matters for the Rose Law Firm that
when he went to the White House he was probably a key interface
person between the White House and the intelligence community,
which, I think, perhaps explains why there was such a frenzy of
activity after he died. That's why they held the Park Police and
the FBI at bay while they rifled through his papers trying to
figure out what was "national security" and what wasn't. That
explains so much about why this thing has been covered up.


TOM VALENTINE:
The American people have been led to believe that Foster was just
another nice-guy lawyer who came to town with Bill and Hillary.


JAMES NORMAN:
Wrong. Here's the problem: the media tries so hard to be
responsible and not get carried away and to not impugn the
government unnecessarily and the government is able to play that
like a violin and squelch any story that questions the
government's position. It's hard to get any story like that into
print because the standards of proof have to be so high. I'm
thoroughly ashamed and embarrassed at the performance of the
American major media and it makes you wonder why.


TOM VALENTINE:
Why would Israel have paid Vince Foster anything?


JAMES NORMAN:
Well, I don't think it's any secret that both Israel and the
United States have been spying on one another for a long time. As
close as the relationship is between the U.S. and Israel, there
are some things we don't want to tell them and vice versa, and
particularly during the Bush administration the relationship
soured. Israel is a foreign country and their concerns are not
always congruent to ours. Who knows?

We know Foster was under investigation for espionage. We don't
know what he gave Israel. We know that there was $2.73 million in
his Swiss bank account -- the funds that came from Israel. He had
other Swiss bank accounts as well that were receiving funds from
U.S. interests. His periodic one-day trips to Geneva are
problematic in and among themselves.


TOM VALENTINE:
You discovered some other interesting things.


JAMES NORMAN:
This other matter is very troubling to me. It's another
bombshell. Foster's was not the only Swiss bank of a high-level
U.S. political figure that's been raided and deleted this way in
the past year and a half. The Fifth Column has gone into and
cleaned out probably a couple of hundred coded Swiss bank
accounts belonging to high-level U.S. political figures -- the
biggest names going -- in both parties. The take, we've been told
-- is over $2 billion, going on $3 billion.


TOM VALENTINE:
Will the Fifth Column ever go public?


JAMES NORMAN:
I don't know. I think that probably the way the intelligence
community works that the name will get changed, it will be
shuffled around and you'll never find it.


TOM VALENTINE:
This is the kind of thing that I know bothers you as a
journalist.


JAMES NORMAN:
The issues here are so immense that they've just got to be
discussed in some way. The persuasiveness of the cover stories by
the government is so disturbing. Under the cover of national
security the government is allowed to lie to the public and lie,
cheat and steal if they have to to protect national security. The
more that you look at the Foster case the more you realize that
this is an authorized cover story.

-----------------------------------------------------------------

Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435


TOM VALENTINE:
So Vince Foster was investigated as a possible spy for Israel?


JAMES NORMAN:
That's what makes him a very key figure. He was a double agent in
a sense. He was overseeing a massive intelligence effort for our
country which conceivably gave him access to very high level
intelligence. You have to realize that the keys to the kingdom
these days are in computer encryption, codes, systems.
That's
what loses and wins wars these days. You can listen to the other
guy's traffic.


By the nature of what Systematics was doing and what we believe
was some relationship between Systematics and E-Systems which is
one of the NSA's primary black operations subcontractors
, it's
conceivable that Foster could have had very high level code and
encryption information. The problem is that he died before
investigators could figure out what (he) did (get) or did not get
out the
door.
into the President's door

----------------------------------------------------------
JAMES NORMAN:
The issues here are so immense that they've just got to be
discussed in some way. The persuasiveness of the cover stories by
the government is so disturbing. Under the cover of national
security the government is allowed to lie to the public and lie,
cheat and steal if they have to to protect national (or their own) security. The
more that you look at the Foster case the more you realize that
this is an authorized cover story.

-----------------------------------------------------------------


This Hillary Clinton / NSA Binder joke is a pure red herring. No disrespect to Mr Norman but simply consider this far more likely and logical motivational scenario for/behind all the subsequent ensuing mayhem:

First off "the football" which is now an electronic data terminal that uses the most sophisticated physical self-protection and data login security, secure transmission and encryption cell/satcom command link is no longer a briefcase full of little numbered scraps of paper sealed in envelopes clipped into a 'binder' one uses over the telephone and has not been so since before the time of Nixon. (even then they ALL changed every two days on the command end)

Since a 24 hour marine guard detail assigned to accompany, stand by the door and/or hover by the commander in chief whenever and wherever he goes are the only persons on earth with this one thing chained to his arm, Vince Foster, the assistant to the Chief White House council (Bernie Nussbaum) would not be 'photocopying launch codes LOL' and even if he had been do so to any other FYEO NSA Reports, would certainly not be 'dropping them off' with his secretary to put back in the bosses safe for the President. These were most likely old briefing paper collections

How the first lady might figure into such an obscure stretch of illogic is an even more abstruse a line of disinformed and disinformative musing.

This notion that the NSA/CIA Mafia's senior unconstitutional crooks in charge (Fifth Column) of the original master-key back doors of the original base-compilations of the original PROMIS core are some sort of secret-patriot Mr Waverlys operating out of some underground secret "world good-guy" (U.N.C.L.E.) control center under a lower 40's dry cleaning shop is pure fantasy.

The even more ludicrous notion that they would be snooping on wealthy and influential Americans Swiss bank accounts and stealing them as a charitable donations revenue center for illicit covert black ops funding as a routine matter of course affecting hundreds of corrupt officials totaling billions in thefts is even more hilarious.

The only reason one would do such a thing (kidnap an investigators nest egg) is to coerce someone who you found out, through your master control encrypted PROMIS searches flag logging analysis who had likely used a later-compiled lower grade "add-on PROMIS back door" to discover damning information on the system about one of your ongoing or future operations!

Remember know by late 1993 PROMIS was no longer a financial infosystem but with text database integration had become a fully hierarchically semi-secured spymasters Google.

Around this time the MI6/CIA/Mossad Mafia became incredibly terrified and totally destabilized in their long term global-fascist strategies by the horrible, detestable and seriously dangerous threat of an Israeli-Arab World posed by the horrific prospect of any further constructive progress based upon the incalculable defeat to them represented by the agenda of the upcoming August 1993 signing of the already-known Oslo Peace Accords!


Quote
In December 1992, in the background of the official "Madrid negotiations" in London, Israeli vice-minister of foreign affairs Yossi Beilin and Norwegian researcher Terje Rød-Larsen set up a secret meeting for PLO representative Ahmed Qurei and Israeli history professor Yair Hirschfeld. Qurei and Hirschfeld made a connection and decided to meet again in what was going to be a series of 14 meetings in Oslo. During the first few meetings, an outline of the accords was discussed and agreed upon. -Wiki


It was just before late Nov 1992 that plans for that Nobel Peace Prize winning moment that they began their "Daniel Chapter 8 Show" Planning for the 9/11 false flag attack. Of crucial importance to the overall plan was the advance hardening of one face of the Pentagon, the development of remote aircraft guidance, piloting and targeting systems and dealing with testing-out the issue of destroying the WTC7 Triage Deathcamp to execute and silence WTC 1&2 Basement Bombing witnesses due to the needed subsequent collapse preparatory sub-basement bombings. In addition they needed to establish the WTC 1&2 buildings as a favorite 'Arab terrorist target' by getting the FBI in on a token, hastily concocted  (Feb 1993) pre-attack.

The only way to test the effectiveness of escape-proof destroying a modern steel skyscraper like WTC7 in order to both destroy legal evidence archives there AND murder witnesses to the early morning central core basement pre-stressing core base demolition explosions in towers 1 & 2, was to try out a similar escape route street level truck bombing on a similarly designed glass fronted tower like the Alfred P. Murrah Federal Building in Oklahoma City!

So, Vince comes across all these strange plans directives and fundings while investigating NSA leaks on PROMIS, but sadly his researches are logged for the spy master criminals to see and detect - right?

THEN we have some dudes who need to coerce him into coming over for a secret tete-a-tete negotiation that turns out to be a guillotining. Then we have a sudden "urgent secret meeting" with Bill Clinton on state business (related to the binders) that never happens.

Vince Foster was far more likely the greatest American whistle blower hero (and martyr) since Paul Revere. Sadly we may never know, unless we nail them on torture and then use that to pop the lid off this MI6/CIA/Mossad Mafia can of stinking, world-destroying worms once and for all...


Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435
Back doors into subsequent re-compilations of PROMIS must be visualized in the way you'd look at a safe house. All the traffic in and out the front and side doors and windows, the phones and radios etc are subject to monitoring and unencrypting by the original CIA/NSA top secret backdoor's master key.

When the DOJ through it's  Law Enforcement Assistance Administration (LEAA/Inslaw) (A CIA Cutout) originally developed PROMIS v.5 using the non profit Inslaw 1 cutout, the first working compilations ALREADY contained the entire master-control  CIA/NSA "Back Door 0" (v1). Subsequently (for show) the NSA requested that the DOJ add a secret "back door' which was then recompiled by Inslaw 1 as "(Official) Back Door 1" (v2).

Then they decide to export and commercialize it, since it works so well at home and create the new INALAW 2 as a for-profit commercial business dispersal. Now it's recompiled and ported to more OS's as INSLAW 2's proprietary Enhanced PROMIS and then comes the INSLAW 2 commercial version 1 (v3) with the original backdoors PLUS a new "Back Door 2".  The original PROMIS was funded entirely with Government funds stays in the public domain with the original 2 backdoors in it forever.

Thus INSLAW 2 licenses it to Systematics/AllTell who add more additions with backdoors and fronts it, in turn, to Boston Systematics (Israel) who likely add even more multilingual packages and additions and more backdoors to their versions.

No matter how many additions you add to the house all wings lead into the old main structure and all core traffic is still on the master back doors hierarchic-priority radars!

Thus if Vince Foster has a Systematics (v3) or even Inslaw 1 (v2) level of backdoor access and does some snooping on any version from a computer at his IP address somewhere (even at the White House) NSA/CIA immediately have his number and his search and data trails. (and all his personal hooks too)

So did Bill (or Hillary) kill him before he could tell them something?  Absolutely Not bloody likely... The missed next-day meeting is the key, the evidence only subtracts one-way..

This was a lightning fast short-circuiting of a pre-OKC info stream, uncovered by Vince looking into NSA Briefing matters surrounding the first FBI WTC Bombings on some laptop copy of PROMIS (vX) that revealed links to other operations that had to be kept from Clinton! There is no other likely explanation.

Offline desertfae

  • Member
  • *
  • Posts: 38
    • desertfae - exposing the octopus
Ok, this doesn't 'really' belong here, but I wasn't sure where else to put it, and it does have a connection so.. here I am.
You may know the name Robert Booth Nichols in connection with Cabazon, Meridian Arms etc...I have put evidence on my twitter acct of RBN's involvement with Bayou and Samuel Israel III, as well as Bush's first cousin's involvement where he says the Bayou stuff was government approved, with documented evidence. twitter.com/desertfae
It also involves a Treasury Note, which came from the Fed Reserve.. serial number of the note is listed on the documentation as well. I have verified that this TN is real.
Exposing the Octopus and my dad's murder-www.desertfae.com

Anti_Illuminati

  • Guest
It Happened Right Here!

        Wife of key witness in
        Justice scandal - INSLAW
        case - is arrested in Napa

    By Harry V. Martin
    Copyright, Napa Sentinel, 1992

    TUESDAY, NOVEMBER 17, 1992           VOLUME 8, NUMBER 547

    The greatest argument Michael Riconosciuto had with his wife Bobbie, was over whether or not Riconosciuto should testify before Congress, a U.S. Bankruptcy Court and a Federal Grand Jury. Bobbie told Riconosciuto that his testimony would destroy their life, and she was right.

    WHO IS RICONOCSIUTO?

    Riconosciuto was the computer expert for the Central Intelligence Agency, he was their Einstein. There was nothing he couldn't do with a computer – for good or for bad. But Riconosciuto had many secrets and he began to see the ruthlessness of his colleagues. Riconosciuto decided to testify about massive corruption in the U.S. Justice Department and the intelligence agency. He agreed to provide his insider knowledge to the U.S. House Judiciary Committee investigating the INSLAW affair. He also gave his testimony to a Federal Bankruptcy Court which ruled that the Justice Department was deceitful, stole a $6 million software package. The INSLAW case was considered by members of Congress and the Federal Bankruptcy Judge to be "dirtier than Watergate". In fact, the Judge was removed from the bench after 14 years because of his ruling against the Justice Department.

    Riconosciuto, in providing his testimony, warned Congress and the Courts that he had been threatened should he testify he would be arrested and his wife would lose a custody battle involving her children by a former marriage. The threats were carried in the Washington Times, St. Louis Post Dispatch and the Napa Sentinel. Within a week of Riconosciuto's testimony he was arrested by Federal Agents. Even while under arrest, he was subpoenaed to testify before a U.S. Federal Grand Jury seated to hear the INSLAW case. On Thursday, November 12, Riconosciuto made a declaration to the court. After the declaration was filed his wife, Bobbie, was arrested – in Napa. Bobbie was arrested on a Washington warrant, charged with custodial interference. The warrant was three years old and it actually may be invalid inasmuch as Bobbie was never subpoenaed to appear before a custody suit after a temporary order giving custody of their children to the father was overturned years ago. When Bobbie was arraigned on Friday, heavy security was on hand and everyone was subject to electronic and personal search, a very unusual step associated with such a minor charge. She was being held without bail. Bail was finally set at $50,000. Bobbie had just delivered a letter to the Sentinel addressed to Congressman Jack Brooks and then a few minutes later she was arrested. Her arrest sparked interest with several national radio talk shows and some national media.

    The federal agent who arrested Riconosciuto after his Congressional declaration is the same agent who called the Napa County District Attorney's Office to have Bobbie arrested. The children voluntarily left with their father yesterday, but they indicated they felt it was only temporary.

    After Riconosciuto's arrest, Bobbie went into hiding – she and her family had been threatened and their home broken into. Both Bobbie and Riconosiuito felt that the children were as much in danger as they were. Riconosciuto possessed the knowledge that could destroy powerful forces in and out of Washington. In an August 1992 report from the Brooks Committee in Congress, Riconosciuto is given high credibility for his testimony. The Congress, after reviewing the entire INSLAW case for nearly two years, asked for a Special Prosecutor. The Congressional report also was critical of the Justice Department's cover-ups, missing records and total lack of cooperation with Congressional requests and subpoenas.

    HIS FIRST TESTIMONY

    On March 21, 1992, Riconosciuto stated in an affidavit to the Court and Congress – and before he was arrested – the following:

        * During the 1980s he served as the Director of Research for a joint venture between the Wackenhut Corporation of Coral Gables, Florida, and the Cabazon Band of Indians of Indio, California. The joint venture was located on the Cabazon reservation.
          
        * The Wackenhut-Cabazon joint venture sought to develop and/or manufacture certain materials that are used in military and national security operations, including night vision goggles, machine guns, fuel-air explosives, and biological and chemical warfare weapons.
          
        * The Cabazon Band of Indians are a sovereign nation. The sovereign immunity that is accorded the Cabazons as a consequence of this fact made it feasible to pursue on the reservation the development and/or manufacture of materials whose development or manufacture would be subject to stringent controls off the reservation. As a minority group, the Cabazon Indians also provided the Wackenhut Corporation with an enhanced ability to obtain federal contracts through the 8A Set Aside Program, and in connection with Government-owned contractor-operated (GOCO) facilities.
          
        * The Wackenhut-Cabazon joint venture was intended to support the needs of a number of foreign governments and forces, including forces and governments in Central America and the Middle East. The Contras in Nicaragua represented one of the most important priorities for the joint venture.
          
        * The Wackenhut-Cabazon joint venture maintained close liaison with certain elements of the United States Government, including representatives of intelligence, military, and law enforcement agencies.
          
        * Among the frequent visitors to the Wackenhut-Cabazon joint venture were Peter Videnieks of the U.S. Department of Justice in Washington, D.C., and a close associate of Videnieks by the name of Earl W. Brian. Brian is a private businessman who lives in Maryland and who has maintained close business ties with the U.S. intelligence community for many years.
          
        * In connection with my work for Wackenhut, I engaged in some software development and modification work in 1983 and 1984 on the proprietary PROMIS computer software product. The copy of PROMIS on which I worked came from the U.S. Department of Justice. Earl W. Brian made it available to me through Wackenhut after acquiring it from Peter Videnieks, who was then a Department of Justice contracting official with responsibility for the PROMIS software. I performed the modifications to PROMIS in Indio, California, Silver Spring, Maryland, and Miami, Florida.
          
        * The purpose of the PROMIS software modification that I made in 1983 and 1984 was to support a plan for the implementation of PROMIS in law enforcement and intelligence agencies worldwide. Earl W. Brian was spearheading the plan for this worldwide use of the PROMIS computer software.
          
        * Some of the modifications that I made were specifically designed to facilitate the implementation of PROMIS within two agencies of the Government of Canada: the Royal Canadian Mounted Police (RCMP) and the Canadian Security and Intelligence Service (CSIS). Earl W. Brian would check with me from time to time to make certain that the work would be completed in time to satisfy the schedule for the RCMP and CSIS implementations of PROMIS.
          
        * The propriety version of PROMIS, as modified by me, was, in fact implemented in both the RCMP and the CSIS in Canada. It was my understanding that Earl W. Brian had sold this version of PROMIS to the Government of Canada.
          
        * In February 1991, I had a telephone conversation with Peter Videnieks, then still employed by the U.S. Department of Justice. Videnieks attempted during this telephone conversation to persuade me not to cooperate with an independent investigation of the government's piracy of INSLAW's proprietary PROMIS software being conducted by the Committee on the Judiciary of the U.S. House of Representatives.
          
        * Videnieks stated that I would be rewarded for a decision not to cooperate with the House Judiciary Committee investigation. Videnieks forecasted an immediate and favorable resolution of a protracted child custody dispute being prosecuted against my wife by her former husband, if I were to decide not to cooperate with the House Judiciary Committee investigation.
          
        * Videnieks also outlined specific punishments that I could expect to receive from the U.S. Department of Justice if I cooperated with the House Judiciary Committee's investigation.
          
        * One punishment that Videnieks outlined was the future inclusion of me and my father in a criminal prosecution of certain business associates of mine in Orange County, California, in connection with the operation of a savings and loan institution in Orange County. By way of underscoring his power to influence such decisions at the U.S. Department of Justice, Videnieks informed me of the indictment of these business associates prior to the time when that indictment was unsealed and made public.
          
        * Another punishment that Videnieks threatened against me if I cooperate with the House Judiciary Committee is prosecution by the U.S. Department of Justice for perjury. Videnieks warned me that credible witnesses would come forward to contradict any damaging claims that I made in testimony before the House Judiciary Committee, and that I would subsequently be prosecuted for perjury by the U.S Department of Justice for my testimony before the House Judiciary Committee.

    THREATS FULFILLED

    Videnieks alleged threats came true – Riconosciuto was arrested, and Bobbie's former husband was given favorable treatment in the courts in her absence.

    Bobbie's arrest was timely. Her husband filed a declaration with the Federal Grand Jury in Chicago in compliance with a subpoena to testify. He told the Grand Jury that he needed two customized DEC VAX 11-730 computers with the customized operating system media. This is equipment seized by the U.S. Government when Riconosciuto was arrested. The declaration of Riconosciuto was filed in the United States District Court for the Northern District of Illinois Eastern Division (case No. 92 C 6217, Michael J. Riconosciuto, et al., Plaintiffs vs. Nicholas Bua, et al., Defendants.)

    GRAND JURY STATEMENT

    Riconosciuto told the Grand Jury that with the equipment he could produce information about various operations which developed extremely sensitive military applications from highly advanced technology, such as:
    

        * Electrostatic heat transfer, modified to enable ordinary and readily available electronic parts and hardware to transform ordinary and readily available explosives into devices capable of destruction of nuclear dimension.
          
        * Biotechnological weapons, including, but not limited to, lethal monoclonal antibodies which are gene specific, e.g., able to distinguish between specific racial characteristics and cause painful, disastrous, lethal effects for only those individuals exposed to such antibodies whose cell structure contains the target genes.
          
        * Compact high voltage power supplies, intended to be used in various hi-tech weapons systems and development.
          
        * Advanced communications systems, e.g., spread spectrum data compression, which would enable current microwave transmissions to be 100 times more efficient and, under appropriate development, 100 times more deadly.
          
        * Advanced precious metals recovery systems essential to hi-tech weapons systems.
          
        * Advanced infrared sensor technology, used in night vision goggles, missile surveillance and tracking, and in more sinister applications, saturation surveillance of all movements of all people in every open, visible space on the entire planet.
          
        * Thermal imaging, enabling surveillance through fog.
          
        * Bragg cell technology.

    MILITARY CONTRACTS

    Riconosciuto also told the Grand Jury the computer can prove that he worked on the following military contracts:
    

        * Beacon technology.
          
        * Threat emitter technology, which would enable the transmission of false images on radar scopes, e.g., airplanes could be made to appear to be birds, or vice versa.

          
        * Fuel flow monitoring systems for the F-16 aircraft, enabling higher performance and better fuel optimization.

    WACKENHUT INVOLVEMENT

    He also told the Grand Jury that the computer would prove the duplicity and treasonous activity of certain officials of the Wackenhut Corporation, such as:
    

        * Double-billing by Wackenhut officials on U.S. Army contracts at the Yuma, Arizona test site, during 1982 and 1983.
          
        * The misappropriation or theft of highly advanced and lucrative technological developments during the period from 1980 to 1991.
          
        * The brokering and facilitation of the transfer of embargoed technology to listed countries (i.e., countries prohibited from receiving embargoed technology – enemies of the people of the United States):

            (a) Wackenhut would facilitate and broker said embargoed technology to countries, such as Chile, Brazil and Argentina, using military test sites as demonstration facilities.

            (b) Officials of said countries would then, with full knowledge of Wackenhut officials, transfer said embargoed technology to countries such as Iran, Iraq, Jordan, Syria, the Peoples' Republic of China, South Africa and Israel.

    Riconosciuto further stated that the computer would prove the duplicity and treasonous activity of certain officials of First Intercontinental Development Company, a corporation cut-out (i.e., secret negotiating agent) for treasonous deals made through the White House, similar to the deals made through Wackenhut. He stated that one such deal was made with Iraq.

    Prior to Operation Desert Shield, the Iraqis obtained the latest fibre-optic command and control capability which enable them to have jam-resistant links from their military command center to the forward battle areas; possession by the Iraqis of said capability required an accelerated manufacturing program of building 4000 pound bombs to eliminate said capability.

    The Iraqis had also obtained the latest radio-jamming technology, which enable them to interdict communications of the allied forces; had the Iraqis not showed their hand during Operation Desert Shield, they would have been able to undermine critical communications during the first days of Operation Desert Storm, potentially causing a major military setback for the allied forces with the resultant loss of life and demoralization.

    Riconosciuto testified that he was doing business with Thomsen CSF (a French conglomerate which developed the Exocet Missile), International Signals, Eaton Corporation, the Santa Barbara Research Division of Hughes Corporation, Dorn-Margolin, Texas Instruments, General Dynamics, Northrop, Kures-Alterman, E-Systems and Reynolds Capacitor.

    CIA MONEY LAUNDERING

    With Riconosciuto's credentials acclaimed by Congress and the Grand Jury, he further stated that he facilitated the laundering of CIA funds via his expertise in manipulating electronic data transmission equipment. This included the transfer of funds which were involved in the October Surprise payment to the Ayatollah Khomeini's regime in Iran. He said he was also responsible for the manner in which caused the interdiction of funds from the sale of Red Chinese gold and the manner in which large sums of CIA funds were secreted and knowledge of where those funds are located.

    "The information available on my computer equipment would also tend to prove and show that the above described treasonous deals are related to the ongoing international scandals involving the Bank of Credit and Commerce International and the Banca Nazionale del Lavoro and that crucial features of said deals are centered in Chicago and involve the courts and prosecutors in Chicago," he stated.

    THEN SHE WAS ARRESTED

    After this explosive declaration was made public in the courts, Bobbie was arrested in Napa, where she has been for about ten months. Her children were registered in local schools and she was living in American Canyon at the time. Bobbie is still in jail awaiting an extradition hearing.

    The Napa Valley Register ran an article on Friday indicating that a Roberta Peterson was arrested for custodial interference and that her husband was a federal prisoner. Little did the public in Napa know the impact and national repercussions. Congressman Jack Brooks was notified. Neither the District Attorney's Office, Napa Police Department nor the Child Protective Services have knowledge of who Bobbie Riconosciuto (Peterson) is. Things like this never usually touch Napa – but they did Thursday.

    The arrest of Bobbie on the eve of Riconosciuto's testimony to a Federal Grand Jury probing corruption in the U.S. Government may not be a mere coincidence.
__________________________________________________________
http://toddjumper.com/eaglenet/BrantonsFiles/naznwo57.html

Hard Decision

Napa judge must decide what to do with wife of a key federal witness
EXCLUSIVE REPORT

By Harry V. Martin
Copyright, Napa Sentinel, 1992

From the Halls of Congress, to the Cabazon Indian Reservation, to a Federal Grand Jury in Chicago, many eyes are focussed on what Napa Municipal Court Judge John Quigley will do.

Judge Quigley must decide whether or not Roberta Peterson Riconoscuito is extradited to the State of Washington. Riconoscuito was arrested in Napa on Thursday, November 12 near Vintage High School on an out-of-state warrant for custodial interference. It is a simple enough judicial case, if child custody were the real issue, but it isn't. The Judge reduced her bail from $50,000 to $7,500 and she was bailed out Monday from Napa County Jail. He also moved the hearing date to Monday, December 7, allowing her two weeks to gather up her paper work.

Held without bail on November 12, Riconoscuito was later allowed to have bail, $50,000 worth. The Napa County Probation Department this week has recommended bail be reduced to $7500. Riconoscuito's first arraignment on November 13 was held under unusually strict security. A rumor had been circulated that a violent attempt would be made to rescue her. Rumor was also spread throughout the jail that Riconoscuito had severely beaten her child, because of that rumor Riconoscuito was locked up in protective custody. The inmates, however, later retracted their threats of harm to Riconoscuito when they learned the rumors were totally unfounded. Three of the Riconoscuito's children are now with their father and the other is with family friends.

Strangely enough, the Napa County Probation report indicates that the Riconoscuito's children were well cared for, that the father knew at all times where Riconoscuito was located and that he is willing to return the children to her once she becomes settled. The report indicates Riconoscuito is no danger to the community.

Riconoscuito, the mother of four children, is caught in a national whirlwind that is drowning her and her children. She has been a key witness to the murder of an Indian leader of the Cabazon Tribe, and also has testified against law enforcement officials in the State of Washington. She has also cooperated with the F.B.I. on RITUAL CHILD ABUSE issues in Washington.

Riconoscuito's husband, Michael, is currently in jail in Chicago waiting to testify before a Federal Grand Jury investigating one of the biggest scandals in the U.S. Justice Department History, what some judges and congressmen refer to as "dirtier than Watergate"... Michael Riconoscuito was a computer expert for the Central Intel- ligence Agency, he was their Einstein. There was nothing he couldn't do with a computer, for good or for bad. But he had many secrets and he began to see the ruthlessness of his colleagues.

Michael Riconoscuito decided to testify about massive corruption in the U.S. Justice Department and the intelligence agency. He agreed to provide his insider knowledge to the U.S. House Judiciary Committee investigating the INSLAW affair. He also gave his testimony to a Federal Bankruptcy Court which ruled that the Justice Department was deceitful, stole a $6 million software package. The INSLAW case was considered by mem- bers of Congress and the Federal Bankruptcy Judge to be dirtier than "Watergate". In fact, the Judge WAS REMOVED FROM THE BENCH after 14 years because of his ruling against the Justice Department.

Michael Riconoscuito, in providing his testimony, warned Congress and the Courts that he had been threatened [that] should he testify he would be arrested and his wife would lose a custody battle involving her children by a former marriage. The threats were carried in the Washington Times, St. Louis Post Dispatch and the Napa Sentinel. Within a week of Riconoscuito's testimony he was arrested by Federal Agents. Even while under arrest, he was subpoenaed to testify before a U.S. Federal Grand Jury seated to hear the INSLAW case. On Thursday, November 12, Michael Riconoscuito made a declaration to the court.

After the declaration was filed his wife, Bobbie, was arrested, in Napa. Bobbie was arrested on a Washington warrant, charged with custodial interference. The warrant was three years old and it actually may be invalid inasmuch as Bobbie was never subpoenaed to appear before a custody suit after a temporary order giving custody of their children to the father was overturned years ago.

When Bobbie was arraigned on Friday, heavy security was on hand and everyone was subject to electronic and personal search, a very unusual step associated with such a minor charge. She was being held without bail. Bail was finally set at $50,000. Bobbie had just delivered a letter to the Sentinel addressed to Con- gressman Jack Brooks and then a few minutes later she was arrested. Her arrest sparked interest with several national radio talk shows and some national media.

The federal agent who arrested Michael Riconoscuito after his Congres- sional declaration is the SAME AGENT who called the Napa County District Attorney's Office to have Bobbie arrested. The children voluntarily left with their father yesterday, but they indicated they felt it was only temporary.

After Michael Riconoscuito's arrest, Bobbie went into hiding, she and her family had been THREATENED and their home broken into. Both Bobbie and Michael Riconoscuito felt that the children were as much in danger as they were.

Michael Riconoscuito possessed the knowledge that could destroy powerful forces in and out of Washington. [Indeed, if Riconosciuto's father was a pro-Nazi friend of Fred L. Crisman, and Michael himself was involved in the core of the CIA-Wackenhut biogenetics/underground base/suppressed tech- nology/abduction scenarios, and given that he is no doubt aware of most or all of those people around him who have been murdered -- researcher Danny Caso- laro, the 5 Wackenhut employees whe died in the helicopter 'crash', the Cabazon Indian leader Fred Alvares and his two friends, London reporter Anson Ng, Attorney Dennis Eisman, etc. -- as well as the claim that the Wackenhut-Inslaw-Octopus conspiracy is potentially far more damaging to certain elements of 'government' than was Watergate, then I would agree that the Riconosciuto's have much to be concerned about... but moreso those who could be implicated as a result of the exploding public interest in this unraveling web of corruption. - Wol.] In an August 1992 report from the Brooks Committee in Congress, Michael Riconoscuito is given high credibility for his testimony.

The Congress, after reviewing the entire INSLAW case for nearly two years, asked for a Special Prosecutor. The Congressional report also was critical of the Justice Department's COVER-UPS, MISSING RECORDS and TOTAL LACK OF COOPERATION with Congressional requests and subpoenas...

Riconoscuito states in her federal court document that her ex-husband, Steven Peterson "was involved in criminal activity, including, but not limited to, sexual abuse and the conspiracy to murder Fred Alvarez, a member of the Caba- zon Indian Nation in Indio, California. [Also] that Riconoscuito was seeking to enter the California Witness Protection Program because (of) her willingness to testify about the criminal activity of Peterson."

The petition also alleges that Peterson beat Riconoscuito while she was pregnant, which had nearly caused a miscarriage and her own death, supported by separate affidavits. When Ricono- scuito was providing such testimony in the past, she sought to have the affidavit sealed and made her allegation in camera (closed session) out of fear for her life and that the Mason County authorities placed her life in jeopardy by putting the affidavit into the public record.

The three year old warrant is based on an action taken when the courts gave custody of the children to the father without notifying Riconoscuito, she had already fled after the beating. The custody order was set aside, however. So another order was issued, this time not only providing the ex-husband with custody but also assigning real estate and insurance entitlements to her ex- husband.

Riconoscuito is claiming there is no valid warrant. On April 7, 1989, Riconoscuito's ex-husband stated he did not want custody of the children. Riconoscuito is charging that her arrest was a method to intimidate her present husband, Michael Riconoscuito. Michael Riconoscuito was scheduled to testify on November 18, 1992, before the Federal Grand Jury impaneled to investigate the Inslaw case. Roberta Riconoscuito was arrested in Napa on November 17, she had been residing here for nearly a year and her children were enrolled in local schools.

Anti_Illuminati

  • Guest
Re: PROMIS-Interoperability-MAIN CORE-enemies list-Exposed
« Reply #31 on: May 25, 2009, 06:38:40 pm »
Loss of US Civil Liberties
PROMIS / Main Core

Project: Loss of US Civil Liberties
Open-Content project managed by Paul, PDevlinBuckley, blackmax

Mid-1970s: PROMIS Software Developed, Can Integrate Information from Multiple Databases

An application known as PROMIS, the Prosecutor’s Management Information System, is developed. [Wired News, 3/1993] It is designed to be used to keep track of criminal investigations through a powerful search engine that can quickly access all data items stored about a case. [Salon, 7/23/2008] William Hamilton, one of the application’s developers, will describe what it can be used to do: “Every use of PROMIS in the court system is tracking people. You can rotate the file by case, defendant, arresting officer, judge, defence lawyer, and it’s tracking all the names of all the people in all the cases.”

Wired magazine will describe its significance: “What this means is that PROMIS can provide a complete rundown of all federal cases in which a lawyer has been involved, or all the cases in which a lawyer has represented defendant A, or all the cases in which a lawyer has represented white-collar criminals, at which stage in each of the cases the lawyer agreed to a plea bargain, and so on. Based on this information, PROMIS can help a prosecutor determine when a plea will be taken in a particular type of case.” In addition, PROMIS can integrate several databases without requiring any reprogramming, meaning it can “turn blind data into information.”

PROMIS is developed by a private business entity that will later become the company Inslaw, Inc. Although there will later be a series of disputes over the application’s use by the US government and others, this version of PROMIS is funded by a Law Enforcement Assistance Administration grant and is therefore in the public domain. [Wired News, 3/1993]

1980s or Before: Database of Potential Enemies Established as Part of Continuity of Government Plan

As a part of the plan to ensure Continuity of Government (COG) in the event of a Soviet nuclear strike or other emergency, the US government begins to maintain a database of people it considers unfriendly. A senior government official who has served with high-level security clearances in five administrations will say it is “a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated.

The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources say that the database is sometimes referred to by the code name Main Core, and one says it was set up with help from the Defense Intelligence Agency. Alleged Link to PROMIS - The database will be said to be linked to a system known as PROMIS, the Prosecutor’s Management Information System, over which the US government conducts a long-lasting series of disputes with the private company Inslaw.

The exact connection between Main Core and PROMIS is uncertain, but one option is that code from PROMIS is used to create Main Core. PROMIS is most noted for its ability to combine data from different databases, and an intelligence expert briefed by high-level contacts in the Department of Homeland Security will say that Main Core “is less a mega-database than a way to search numerous other agency databases at the same time.”

Definition of National Emergency - It is unclear what kind of national emergency could trigger such detention. Executive orders issued over the next three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Defense Department documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to US military invasion abroad” could be a trigger.

How Does It Work? - A former military operative regularly briefed by members of the intelligence community will be told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations using “social network analysis” and artificial intelligence modeling tools. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he will say. “Main Core is the table of contents for all the illegal information that the US government has [compiled] on specific targets.”

Origin of Data - In 2008, sources will reportedly tell Radar magazine that a “host of publicly disclosed programs… now supply data to Main Core,” in particular the NSA’s domestic surveillance programs initiated after 9/11. [Radar, 5/2008]

Spring 1981: Justice Department Official Reportedly Says ‘We’re Out to Get Inslaw’

Lawrence McWhorter, director of the Executive Office for US Attorneys, tells one of his subordinates, “We’re out to get Inslaw.” Inslaw developed the PROMIS database and search application (see Mid-1970s) and is soon to become embroiled in a dispute with the Justice Department over it. Mallgrave will later tell Wired magazine: “We were just in his office for what I call a B.S. type discussion. I remember it was a bright sunny morning.… [McWhorter] asked me if I would be interested in assuming the position of assistant director for data processing… basically working with Inslaw. I told him… I just had no interest in that job. And then, almost as an afterthought, he said ‘We’re out to get Inslaw.’ I remember it to this day.” [Wired News, 3/1993]

April 1981: President Reagan’s Counsellor Praises PROMIS to Prosecutors

Edwin Meese, Counsellor to President Ronald Reagan, praises the PROMIS application at a gathering of prosecutors. He calls it “one of the greatest opportunities for [law enforcement] success in the future.” PROMIS is a database search system to help prosecutors find information about cases and people involved in them. [Wired News, 3/1993]

Spring 1981 or Shortly After: Justice Department Appoints Former Inslaw Employee to Supervise Contract with Company

Lawrence McWhorter, director of the Justice Department’s Executive Office for US Attorneys, gives the job of supervising a contract with Inslaw for the installation of the PROMIS database and search application to C. Madison “Brick” Brewer. Brewer once worked for Inslaw, but, according to documents used in court proceedings, was allowed to resign when Inslaw’s founder William Hamilton found his performance inadequate. McWhorter had told a previous candidate for the position that he was “out to get Inslaw” (see Spring 1981). The Justice Department’s Office of Professional Responsibility will examine the matter and rule there is no conflict of interest. Brewer will later tell a federal court that everything he does regarding Inslaw is approved by Deputy Attorney General Lowell Jensen. Jensen had previously supervised a product known as DALITE, which lost a major contract to Inslaw in the 1970s. [Wired News, 3/1993]

1982-1984: PROMIS Used by NSA, Treasury, and NSC to Track Loans to Soviet Union

The PROMIS database application is used for a program called “Follow the Money” to track loans made by Western banks to the Soviet Union and its allies. The top-secret program is run for the National Security Council (NSC) by Norman Bailey, who uses NSA signals intelligence to track the loans. Bailey will later say that the PROMIS application is “the principal software element” used by the NSA and the Treasury Department in their electronic surveillance programs that track financial flows to the Soviet bloc, organized crime, and terrorist groups. According to Bailey, this program marks a significant shift in resources from human spying to electronic surveillance, as a way to track money flows to suspected criminals and American enemies. [Salon, 7/23/2008]

March 1982: Inslaw Wins Contract to Install PROMIS from Justice Department

Inslaw wins a $9.6 million contract from the Justice Department to install the PROMIS application in 20 US attorney’s offices as a pilot program. PROMIS is an application designed to be used by prosecutors to keep track of case records (see Mid-1970s). If the trial installation is successful, the company will install PROMIS in the remaining 74 federal prosecutors’ offices around the country. According to William Hamilton, one of Inslaw’s owners, the eventual market for complete automation of the Federal court system is worth up to $3 billion. However, this is the last contract Inslaw receives from the Justice Department for PROMIS, as the deal becomes mired in a series of disputes. [Wired News, 3/1993]

April 14, 1982: Justice Department Official Suggests Terminating PROMIS Installation Contract

One month after the Justice Department and Inslaw sign a contract on the installation of PROMIS software (see March 1982), a departmental official raises the possibility of terminating the contract. At a meeting of the PROMIS Project Team, project manager C. Madison Brewer and others discuss terminating the contract with Inslaw for convenience of the government, according to notes taken at the meeting by department officials. In a sworn statement, Brewer will say he does not recall the details of the meeting, but if this recommendation were made, it was made “in jest.” However, Brewer will admit to being upset with Inslaw’s handling of the contract and its demand for payment for enhancements it had made privately to the application. After the contract is terminated, Bankruptcy Court Judge George Bason will find Brewer’s recommendation to terminate the contract constitutes “a smoking gun that clearly evidences Brewer’s intense bias against Inslaw, his single-minded intent to drive Inslaw out of business.” [US Congress, 9/10/1992]

April 19, 1982: Justice Department Official Criticizes Inslaw in Meeting

Justice Department manager C. Madison Brewer displays his hostility towards Inslaw, Inc., in a meeting to discuss the implementation of the PROMIS application. An Inslaw memorandum of the meeting says, “Brewer seized upon this issue [that Inslaw wanted to be paid for privately-financed enhancements it had made to the software] and launched into a tirade which was very emotional, unorganized, and quite illogical.” Brewer’s complaints are:

The memo claiming the payments is “typical of Inslaw and [Inslaw owner] Bill Hamilton and that it was self-serving and unnecessary.”

How did the Justice Department “know that we might say work was not finished under our government contracts and the next week copyright the work and begin selling it back to the Justice Department?”

A press release about a contract awarded to Inslaw was inaccurate because “it described West Virginia as a successful implementation when in fact, they had spent an additional 20K [$20,000] on the project and Lanier was doing all the work.”

The memo had caused “all kinds of problems in Justice and had many people upset.”

“Illinois Criminal Justice Coordinating Council, Michigan Prosecuting Attorney’s Association, Andy Voight, and others,” would say that “Inslaw did not do good or successful work.”

“Hamilton started the PROMIS system as an employee of the DC, USAO [US Attorneys Office in Washington, DC]. And that all of the software was developed with Federal funds and what right did Hamilton have to try to claim ownership of the software.”

The House Judiciary Committee will later comment, “All of these comments were based with an obvious dislike of Bill Hamilton and a resentment for the success of Inslaw personified in him.” [US Congress, 9/10/1992]

August 11, 1982: Justice Department Concedes Inslaw Owns Enhanced PROMIS

The Justice Department says that it accepts Inslaw has proprietary rights to the enhanced PROMIS database and search application. An initial version of the software had been designed using government money, and so is in the public domain, but a later version was funded by Inslaw itself, so the modifications belong to Inslaw. A Justice Department lawyer writes: “To the extent that any other enhancements (beyond the public domain PROMIS) were privately funded by Inslaw and not specified to be delivered to the Department of Justice under any contract or other agreement, Inslaw may assert whatever proprietary rights it may have.”

This statement is made in response to a letter sent by lawyers acting for Inslaw founder William Hamilton informing the department that Inslaw intended to become a private company, and asking it to waive any proprietary rights it might claim to the enhanced version. Clarification will be provided in a 1988 deposition in which Deputy Attorney General Arnold Burns will say, “Our lawyers were satisfied that Inslaw’s lawyers could sustain the claim in court, that we had waived those [proprietary] rights.” [Wired News, 3/1993]

May 6, 1983: Justice Department Official Says PROMIS Will Be Provided to Israeli Government

A Justice Department official writes a memo saying he will soon provide the PROMIS application to an Israeli government representative. The official is Jack Rugh, the acting assistant director of the Office of Management Information Systems Support at the Executive Office of US Attorneys. The memo states that “Reference my memorandum to file dated April 22, 1983, on the same subject. [C. Madison] Brick Brewer [PROMIS project manager at the Justice Department] recently instructed me to make a copy of an LEAA version of PROMIS [a version wholly owned by the Justice Department] available to Dr. Ben Orr, a representative of the government of Israel.

Dr. Orr called me to discuss that request after my earlier memorandum was written. I have made a copy of the LEM DEC version of PROMIS and will provide it along with the corresponding documentation, to Dr. Orr before he leaves the United States for Israel on May 16.”

High Officials Possibly Involved - The House Judiciary Committee will comment: “Given the international dimensions to the decisions, it is difficult to accept the notion that a group of low-level Department personnel decided independently to get in touch with the government of Israel to arrange for transfer of the PROMIS software.

At the very least, it is unlikely that such a transaction occurred without the approval of high-level Department officials, including those on the PROMIS Oversight Committee.”

Actual Version of PROMIS Unclear - The committee will also later speculate that a version whose ownership is under dispute was also given to the Israelis, saying: “It is uncertain what version actually was transferred. Department managers believed that all versions of the Enhanced PROMIS software were the Department’s property. The lack of detailed documentation on the transfer, therefore, only creates new questions surrounding allegations that Enhanced PROMIS may have been sold or transferred to Israel and other foreign governments.” [US Congress, 9/10/1992] Rugh will pass the application to Brewer for handing over to Orr six days later (see May 12, 1983).

May 12, 1983: PROMIS Application Handed Over for Passage to Israeli Government

Jack Rugh, the acting assistant director of the Office of Management Information Systems Support at the Justice Department’s Executive Office for US Attorneys, writes a memo turning over the PROMIS application to a colleague, C. Madison Brewer. The application is for passage to the government of Israel, a transfer already discussed by Brewer and Rugh (see May 6, 1983). Rugh writes: “Enclosed are the PROMIS materials that you asked me to produce for Dr. Ben Orr of the government of Israel. These materials consist of the LEM DEC PDP 11/70 version of PROMIS on magnetic tape along with the printed specifications for that tape, as well as two printed volumes of PROMIS documentation for the LEAA version of the system.” [US Congress, 9/10/1992]

December 29, 1983: Justice Department Decides to Terminate Part of PROMIS Contract

Deputy Attorney General Lowell Jensen and other members of the Justice Department’s PROMIS Oversight Committee approve the termination of part of a contract with Inslaw, Inc., for the installation of PROMIS software (see March 1982). The termination, pushed through despite a report that there was progress with Inslaw’s attorney on the resolution of contract problems, only concerns the part of the contract for the installation of PROMIS on word processing hardware in 74 small US attorneys’ offices. Inslaw will still be contracted to install the application in 20 other US attorneys’ offices. The termination is to be for default, as Inslaw has allegedly failed to perform this portion of the contract, although a different reason will later be given (see February 1984). [US Congress, 9/10/1992]

February 1984: Justice Department Counsel Finds Inslaw Has Not Failed to Perform PROMIS Contract, Portion Terminated Anyway

Justice Department procurement counsel William Snider issues a legal opinion stating that the department lacks legal justification to terminate part of a contract on the installation of PROMIS software for default. The department’s PROMIS Oversight Committee had decided on this course of action in December (see December 29, 1983), as it said that Inslaw, the company installing PROMIS, was not performing the contract properly. However, the committee decides to terminate the portion of the contract anyway, but for convenience—meaning Inslaw may receive some compensation—not default. PROMIS project manager C. Madison Brewer then notifies INSLAW owner William Hamilton that Deputy Attorney General Lowell Jensen has decided on partial termination. [US Congress, 9/10/1992]

1985: Private Company’s Attempt to Purchase Inslaw Fails

A company called SCT attempts to purchase Inslaw, which designed the PROMIS database and search application. SCT is assisted by the New York investment bank Allen & Co., which helps with the finance for the proposed deal. The attempt fails, but, according to Inslaw’s founder William Hamilton, in the process a number of Inslaw’s customers are warned by SCT that Inslaw will soon go bankrupt and will not survive reorganization. Wired magazine will say that Allen & Co. has “close business ties” to Earl Brian, a businessman who is said to be interested in PROMIS software and who is well-connected inside the Ronald Reagan administration. [Wired News, 3/1993]

Before 1986: Oliver North Develops Emergency Plan Including Suspension of Constitution, Detentions

National Security Council officer Colonel Oliver North heads the development of a secret contingency plan called REX 84. In the event of an emergency, the plan calls “for suspension of the Constitution, turning control of the United States over to FEMA [the Federal Emergency Management Agency], [and the] appointment of military commanders to run state and local governments.” The plan, initially revealed in the Miami Herald in 1987, also reportedly calls for the detention of upwards of 400,000 illegal aliens and an undisclosed number of American citizens in at least 10 military facilities maintained as potential holding camps.

North operates the program from a secure White House site, allegedly using a software program known as PROMIS. PROMIS was designed to track individuals, such as prisoners, by pulling together information from disparate databases into a single record. According to Wired magazine: “Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States. Compared to PROMIS, Richard Nixon’s enemies list or Senator Joe McCarthy’s blacklist look downright crude.” [Radar, 5/2008]

June 9, 1986: Inslaw Files Action against Justice Department in Bankruptcy Court

Inslaw files a $30 million lawsuit against the Justice Department over the alleged theft of the PROMIS software (see Mid-1970s) by the department. Inslaw’s attorney for the case, Leigh Ratiner of the Washington firm Dickstein, Shapiro & Morin, chooses the bankruptcy court for the filing based on the premise that the Justice Department, the creditor, has control of PROMIS. He will later say, “It was forbidden by the Bankruptcy Act for the creditor to exercise control over the debtor property. And that theory—that the Justice Department was exercising control—was the basis that the bankruptcy court had jurisdiction. As far as I know, this was the first time this theory had been used. This was ground-breaking.” [Wired News, 3/1993]

1990: Court Rules Attorney General Does Not Have to Appoint Special Prosecutor in Inslaw Affair

A US District Court rules that Attorney General Richard Thornburgh does not have to appoint a special prosecutor in the Inslaw affair. Inslaw’s attorney Elliot Richardson had filed the case because of a dispute with the Justice Department over allegations that the department had stolen a version of the PROMIS database and search application from the company. However, the court rules against Inslaw, stating that a prosecutor’s decision not to investigate—“no matter how indefensible”—cannot be corrected by any court. [Wired News, 3/1993]

December 5, 1990: House Subcommittee Holds Hearing on Inslaw Affair

The House Subcommittee on Economic and Commercial Law holds a hearing about the failure of Attorney General Richard Thornburgh to provide full access to all documents and records about the Inslaw case. At the hearing, Inslaw owner William Hamilton and its attorney Elliot Richardson air their complaints about an alleged criminal conspiracy in the Justice Department’s handling of a contract with Inslaw and its alleged theft of an enhanced version of the PROMIS application.

Judge George Bason, a bankruptcy judge who had found in favor of Inslaw in a dispute with the department, testifies that he believes his failure to be reappointed as bankruptcy judge was the result of improper influence on the court selection process by the department because of his findings. Steven Ross, the general counsel to the clerk of the US House of Representatives, refutes the Justice Department’s rationale for withholding documents related to possible wrongdoing by its officials involved with the Inslaw contract.

In addition, Government Accountability Office representatives describe deficiencies in the Justice Department’s Information Resources Management Office and its administration of data processing contracts. Following this hearing, Thornburgh agrees to cooperate with the subcommittee, but then fails to provide it with several documents it wants. [US Congress, 9/10/1992]

December 11, 1990: CIA Says It Does Not Have PROMIS Application; Retired CIA Official Disputes Claim

The CIA says that it does not have the PROMIS database and search application (see Mid-1970s). The statement is made in response to a letter sent to CIA Director William Webster by the House Judiciary Committee on November 20 asking him to help them “by determining whether the CIA has the PROMIS software.” In response the CIA states, “We have checked with Agency components that track data processing procurement or that would be likely users of PROMIS, and we have been unable to find any indication that the [CIA] ever obtained PROMIS software.”

However, information contradicting this will subsequently emerge. For example, a retired CIA official whose job it is to investigate the Inslaw allegations internally will tell Wired magazine that the Justice Department gave PROMIS to the CIA: “Well, the Congressional committees were after us to look into allegations that somehow the agency had been culpable of what would have been, in essence, taking advantage of, like stealing, the technology [PROMIS]. We looked into it and there was enough to it, the agency had been involved.” However, the official will say that when the CIA accepted PROMIS, it did not know that there was a serious dispute about the Justice Department’s ownership of the software. [Wired News, 3/1993]

July 17, 1991: Attorney General Refuses to Attend House Committee Hearing about PROMIS, Despite Prior Agreement

Attorney General Richard Thornburgh informs the House Judiciary Committee that he will not attend a committee hearing the next day, despite previously saying he would. The hearing is to discuss the committee’s access to departmental documents and the Inslaw affair, in which the department had allegedly stolen an enhanced version of the PROMIS application. According to a report by the committee, Thornburgh refuses to appear because a “press release announcing the hearing had been unduly aggressive and contentious and not in keeping with the tenor of an oversight hearing.” [US Congress, 9/10/1992]

July 25, 1991: House Subcommittee Subpoenas PROMIS Documents

The House Subcommittee on Economic and Commercial Law votes 10 to six to authorize the issuance of a subpoena to the Department of Justice for documents related to the Inslaw affair. The subpoena follows on from a refusal by Attorney General Richard Thornburgh to appear before the House Judiciary Committee (see July 17, 1991). [US Congress, 9/10/1992] Some of the documents will be forthcoming, but others will be reported missing (see July 31, 1991).

July 31, 1991: Justice Department Says 51 PROMIS Documents Are Missing

Responding to a Congressional subpoena (see July 25, 1991), the Justice Department sends most documents requested about the alleged theft of a version of the enhanced PROMIS software to the House Subcommittee on Economic and Commercial Law. However, the department says that 51 documents or files are missing and cannot be found. A report issued by the House Judiciary Committee in September 1992 will say that the subcommittee has still not received an adequate explanation on how the documents came to be missing. [US Congress, 9/10/1992]

Spring 1992: US Intelligence Official Mentions Connection between PROMIS and Main Core Database to Businessman

An unnamed US intelligence official tells businessman William Hamilton that there is a connection between the PROMIS database and search program and the Main Core database. Hamilton is a former NSA official who helped developed PROMIS, but is now involved in a series of disputes with the government over money he says it owes his company, Inslaw. Main Core is a database that is said to collect sensitive information, including about US persons. The specific type of connection is not certain. This is one of three times officials will tell Hamilton about the link (see 1995 and July 2001). [Salon, 7/23/2008]

1995: Former NSA Official Tells Businessman about Connection between PROMIS and Main Core Database

A former NSA official tells businessman William Hamilton that there is a connection between the PROMIS database and search program and the Main Core database. Hamilton is a former NSA official who helped developed PROMIS, but is now involved in a series of disputes with the government over money he says it owes his company, Inslaw. Main Core is a database that is said to collect sensitive information, including about US persons. The specific type of connection is not certain. This is one of three times officials will tell Hamilton about the link (see Spring 1992 and July 2001). [Salon, 7/23/2008]

July 2001: Former Official Possibly Alludes to Link between PROMIS and Main Core Database in Conversation with Businessman

Retired Admiral Dan Murphy, a former deputy director of the CIA, indicates to businessman William Hamilton that there is a connection between the PROMIS database and search program and the Main Core database. Hamilton is a former NSA official who helped develop PROMIS, but is now involved in a series of disputes with the government over money he says it owes his company, Inslaw. Main Core is a database that is said to collect sensitive information, including about US persons.

The specific type of connection is not certain and Murphy does not specifically mention Main Core, but says that the NSA’s use of PROMIS involves something “so seriously wrong that money alone cannot cure the problem.” Hamilton will later say, “I believe in retrospect that Murphy was alluding to Main Core.” This is one of three times officials will tell Hamilton about the link (see Spring 1992 and 1995). [Salon, 7/23/2008]

Shortly After September 11, 2001: Senior National Security Analyst Sees Main Core Database in Use at White House

According to a former senior Justice Department official, a high-level former national security official working as a senior intelligence analyst for a large domestic law enforcement agency inside the White House accidentally walks into a restricted room, where he finds a computer system logged on to what he recognizes to be the Main Core database. Main Core contains a list of potential enemies of the state for use by the Continuity of Government program (see 1980s or Before). He will refuse to be interviewed about the matter, but will tell the senior Justice Department official about it. The Justice Department official will add that when she mentions the specific name of the top-secret system during a conversation, he turns “white as a sheet.” [Salon, 7/23/2008]

October 23, 2007: National Intelligence Official Says Privacy Should be Redefined

Donald Kerr, the principal deputy director of national intelligence, tells a conference of intelligence officials that the government needs new rules about how to balance privacy rights and investigative needs. Since many people routinely post details of their lives on social-networking sites such as MySpace, he says, their identity should not require the same protection as in the past. Instead, only their “essential privacy,” or “what they would wish to protect about their lives and affairs,” should be veiled.

Commenting on the speech, the Wall Street Journal will say that this is part of a project by intelligence agencies “to change traditional definitions of how to balance privacy rights against investigative needs.” [Office of the Director of National Intelligence, 10/23/2007 pdf file; Wall Street Journal, 3/10/2008] According to some accounts, the prime repository of information about US citizens that the government has is a database known as Main Core, so if the government collected more information about citizens, the information would be placed in or accessed through this database (see 1980s or Before).

March 2008 or Shortly Before: National Security Lawyer Questions Legality of Information in US Government Databases

National security lawyer Suzanne Spaulding says that the constitutional question of whether the US government can examine a large array of information about citizens contained in its databases (see 1980s or Before) without violating an individual’s reasonable expectation of privacy “has never really been resolved.” She adds that it is “extremely questionable” to assume Americans do not have a reasonable expectation of privacy for data such as the subject-header of an e-mail or a Web address from an Internet search, because those are more like the content of a communication than a phone number. “These are questions that require discussion and debate,” she says. “This is one of the problems with doing it all [collecting data on citizens] in secret.” [Wall Street Journal, 3/10/2008]

Spring-Summer 2008: New Church Committee Suggested to Investigate Possible Abuses of Power during Bush Administration and Before

A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.

Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:

The NSA’s domestic surveillance activities;

The CIA’s use of rendition and torture against terrorist suspects;

The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and

The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).

Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.

Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.

'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.”

“It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”

Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]

May 2008 or Shortly Before: Constitutional Lawyer Questions Legality of Main Core Database

Constitutional lawyer Bruce Fein, formerly an associate deputy attorney general under President Ronald Reagan, says that the legality of the Main Core database, which contains a list of enemies primarily for use in national emergencies (see 1980s or Before), is murky: “In the event of a national emergency, the executive branch simply assumes these powers”—the powers to collect domestic intelligence and draw up detention lists, for example—“if Congress doesn’t explicitly prohibit it.

It’s really up to Congress to put these things to rest, and Congress has not done so.” Fein adds that it is virtually impossible to contest the legality of these kinds of data collection and spy programs in court “when there are no criminal prosecutions and [there is] no notice to persons on the president’s ‘enemies list.’ That means if Congress remains invertebrate, the law will be whatever the president says it is—even in secret. He will be the judge on his own powers and invariably rule in his own favor.” [Radar, 5/2008]

May 2008 or Before: Former CIA Officer Speculates Main Core Database Resides within Homeland Security

Former CIA officer Philip Giraldi is interviewed by journalist Christopher Ketcham about the Main Core database, which apparently contains a list of potential enemies of the US state. Giraldi does not know any definite information about the database, but he speculates that it must be contained within the Department of Homeland Security (DHS): “If a master list is being compiled, it would have to be in a place where there are no legal issues”—the CIA and FBI would be restricted by oversight and accountability laws—“so I suspect it is at DHS, which as far as I know operates with no such restraints.”

Giraldi notes that the DHS already maintains a central list of suspected terrorists and says it has been freely adding people who pose no reasonable threat to domestic security. “It’s clear that DHS has the mandate for controlling and owning master lists. The process is not transparent, and the criteria for getting on the list are not clear.” Giraldi continues, “I am certain that the content of such a master list [as Main Core] would not be carefully vetted, and there would be many names on it for many reasons—quite likely including the two of us.” [Radar, 5/2008]

May 2008: Former Official Admits PROMIS Application Given to NSA

Former national security official Norman Bailey admits publicly and on the record that the PROMIS database and search application has been given to the NSA. As Salon magazine points out: “His admission is the first public acknowledgement by a former US intelligence official that the NSA used the PROMIS software.” Bailey also says that the application was given to the Treasury Department for a financial tracking project in the early 1980s that also involved the National Security Council (see 1982-1984).

Bailey worked for US governments from the Ronald Reagan era until the George W. Bush administration and, in addition to the 1980s tracking program, he headed a special unit within the Office of the Director of National Intelligence focused on financial intelligence on Cuba and Venezuela in 2006 and 2007. [Salon, 7/23/2008]

May 2008: Number of Americans Listed as Potential Suspects in Main Core Database Reportedly Reaches Eight Million

What Radar magazine describes as a “knowledgeable source” claims that 8 million Americans are now listed in the Main Core database as potentially suspect. Main Core is a database of enemies of the state established several decades before as a part of the Continuity of Government (COG) program (see 1980s or Before). In the event of a national emergency, the suspects could be subject to, for example, heightened surveillance, tracking, direct questioning, or even detention. [Radar, 5/2008]

Anti_Illuminati

  • Guest
Re: PROMIS-Interoperability-MAIN CORE-enemies list-Exposed
« Reply #32 on: May 25, 2009, 08:34:20 pm »
9/11, FEMA and Martial Law in the USA

I came across this article at: 911truth.org/article.php Please read and pass the word. 9/11 and false flag terrorist attacks have become the excuse to abolish our cherished Constitution. Let's do what we have to do to prevent martial law from taking over our beloved country.
--FF


Wednesday, April 30 2008


This is an incredibly important article--one of the most important we've posted. It's long, thorough, historical, and frightening... Several links for other, related reading are at the end. Please follow-up with your Representatives and other elected officials immediately, and let us know what you her. Thank you.
— Ed.



For decades the federal government has been developing a highly classified plan that would override the Constitution in the event of a terrorist attack. Is it also compiling a secret enemies list of citizens who could face detention under martial law?

The Last Roundup
By Christopher Ketcham
Illustration by Brett Ryder
April 29, 2008

In the spring of 2007, a retired senior official in the U.S. Justice Department sat before Congress and told a story so odd and ominous, it could have sprung from the pages of a pulp political thriller. It was about a principled bureaucrat struggling to protect his country from a highly classified program with sinister implications. Rife with high drama, it included a car chase through the streets of Washington, D.C., and a tense meeting at the White House, where the president’s henchmen made the bureaucrat so nervous that he demanded a neutral witness be present.

The bureaucrat was James Comey, John Ashcroft’s second-in-command at the Department of Justice during Bush’s first term. Comey had been a loyal political foot soldier of the Republican Party for many years. Yet in his testimony before the Senate Judiciary Committee, he described how he had grown increasingly uneasy reviewing the Bush administration’s various domestic surveillance and spying programs. Much of his testimony centered on an operation so clandestine he wasn’t allowed to name it or even describe what it did. He did say, however, that he and Ashcroft had discussed the program in March 2004, trying to decide whether it was legal under federal statutes.

Shortly before the certification deadline, Ashcroft fell ill with pancreatitis, making Comey acting attorney general, and Comey opted not to certify the program. When he communicated his decision to the White House, Bush’s men told him, in so many words, to take his concerns and stuff them in an undisclosed location.

Comey refused to knuckle under, and the dispute came to a head on the cold night of March 10, 2004, hours before the program’s authorization was to expire. At the time, Ashcroft was in intensive care at George Washington Hospital following emergency surgery. Apparently, at the behest of President Bush himself, the White House tried, in Comey’s words, “to take advantage of a very sick man,” sending Chief of Staff Andrew Card and then-White House counsel Alberto Gonzales on a mission to Ashcroft’s sickroom to persuade the heavily doped attorney general to override his deputy. Apprised of their mission, Comey, accompanied by a full security detail, jumped in his car, raced through the streets of the capital, lights blazing, and “literally ran” up the hospital stairs to beat them there.

Minutes later, Gonzales and Card arrived with an envelope filled with the requisite forms. Ashcroft, even in his stupor, did not fall for their heavy-handed ploy. “I’m not the attorney general,” Ashcroft told Bush’s men. “There”—he pointed weakly to Comey—“is the attorney general.” Gonzales and Card were furious, departing without even acknowledging Comey’s presence in the room. The following day, the classified domestic spying program that Comey found so disturbing went forward at the demand of the White House—“without a signature from the Department of Justice attesting as to its legality,” he testified.

What was the mysterious program that had so alarmed Comey? Political blogs buzzed for weeks with speculation. Though Comey testified that the program was subsequently readjusted to satisfy his concerns, one can’t help wondering whether the unspecified alteration would satisfy constitutional experts, or even average citizens. Faced with push-back from his bosses at the White House, did he simply relent and accept a token concession? Two months after Comey’s testimony to Congress, the New York Times reported a tantalizing detail: The program that prompted him “to threaten resignation involved computer searches through massive electronic databases.” The larger mystery remained intact, however. “It is not known precisely why searching the databases, or data mining, raised such a furious legal debate,” the article conceded.

Another clue came from a rather unexpected source: President Bush himself. Addressing the nation from the Oval Office in 2005 after the first disclosures of the NSA’s warrantless electronic surveillance became public, Bush insisted that the spying program in question was reviewed “every 45 days” as part of planning to assess threats to “the continuity of our government.”

Few Americans—professional journalists included—know anything about so-called Continuity of Government (COG) programs, so it’s no surprise that the president’s passing reference received almost no attention. COG resides in a nebulous legal realm, encompassing national emergency plans that would trigger the takeover of the country by extra-constitutional forces—and effectively suspend the republic. In short, it’s a road map for martial law.

While Comey, who left the Department of Justice in 2005, has steadfastly refused to comment further on the matter, a number of former government employees and intelligence sources with independent knowledge of domestic surveillance operations claim the program that caused the flap between Comey and the White House was related to a database of Americans who might be considered potential threats in the event of a national emergency. Sources familiar with the program say that the government’s data gathering has been overzealous and probably conducted in violation of federal law and the protection from unreasonable search and seizure guaranteed by the Fourth Amendment.

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Of course, federal law is somewhat vague as to what might constitute a “national emergency.” Executive orders issued over the last three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Department of Defense documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to U.S. military invasion abroad” could be a trigger.

Let’s imagine a harrowing scenario: coordinated bombings in several American cities culminating in a major blast—say, a suitcase nuke—in New York City. Thousands of civilians are dead. Commerce is paralyzed. A state of emergency is declared by the president. Continuity of Governance plans that were developed during the Cold War and have been aggressively revised since 9/11 go into effect. Surviving government officials are shuttled to protected underground complexes carved into the hills of Maryland, Virginia, and Pennsylvania. Power shifts to a “parallel government” that consists of scores of secretly preselected officials. (As far back as the 1980s, Donald Rumsfeld, then CEO of a pharmaceutical company, and Dick Cheney, then a congressman from Wyoming, were slated to step into key positions during a declared emergency.) The executive branch is the sole and absolute seat of authority, with Congress and the judiciary relegated to advisory roles at best. The country becomes, within a matter of hours, a police state.

Interestingly, plans drawn up during the Reagan administration suggest this parallel government would be ruling under authority given by law to the Federal Emergency Management Agency, home of the same hapless bunch that recently proved themselves unable to distribute water to desperate hurricane victims. The agency’s incompetence in tackling natural disasters is less surprising when one considers that, since its inception in the 1970s, much of its focus has been on planning for the survival of the federal government in the wake of a decapitating nuclear strike.

Under law, during a national emergency, FEMA and its parent organization, the Department of Homeland Security, would be empowered to seize private and public property, all forms of transport, and all food supplies. The agency could dispatch military commanders to run state and local governments, and it could order the arrest of citizens without a warrant, holding them without trial for as long as the acting government deems necessary. From the comfortable perspective of peaceful times, such behavior by the government may seem farfetched. But it was not so very long ago that FDR ordered 120,000 Japanese-Americans—everyone from infants to the elderly—be held in detention camps for the duration of World War II.

This is widely regarded as a shameful moment in U.S. history, a lesson learned. But a long trail of federal documents indicates that the possibility of large-scale detention has never quite been abandoned by federal authorities. Around the time of the 1968 race riots, for instance, a paper drawn up at the U.S. Army War College detailed plans for rounding up millions of “militants” and “American negroes” who were to be held at “assembly centers or relocation camps.” In the late 1980s, the Austin American-Statesman and other publications reported the existence of 10 detention camp sites on military facilities nationwide, where hundreds of thousands of people could be held in the event of domestic political upheaval.

More such facilities were commissioned in 2006, when Kellogg Brown & Root—then a subsidiary of Halliburton—was handed a $385 million contract to establish “temporary detention and processing capabilities” for the Department of Homeland Security. The contract is short on details, stating only that the facilities would be used for “an emergency influx of immigrants, or to support the rapid development of new programs.” Just what those “new programs” might be is not specified.

In the days after our hypothetical terror attack, events might play out like this: With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.

It is, of course, appropriate for any government to plan for the worst. But when COG plans are shrouded in extreme secrecy, effectively unregulated by Congress or the courts, and married to an overreaching surveillance state—as seems to be the case with Main Core—even sober observers must weigh whether the protections put in place by the federal government are becoming more dangerous to America than any outside threat.

Another well-informed source—a former military operative regularly briefed by members of the intelligence community—says this particular program has roots going back at least to the 1980s and was set up with help from the Defense Intelligence Agency. He has been told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with “social network analysis” and artificial intelligence modeling tools.

“The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.”

A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as “warrantless wiretapping.” In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor “huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records.”

Authorities employ “sophisticated software programs” to sift through the data, searching for “suspicious patterns.” In effect, the program is a mass catalog of the private lives of Americans. And it’s notable that the article hints at the possibility of programs like Main Core. “The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed,” the Journal reported, quoting unnamed officials. “Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach.”

The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.

Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts.

According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.

If previous FEMA and FBI lists are any indication, the Main Core database includes dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.

A veteran CIA intelligence analyst who maintains active high-level clearances and serves as an advisor to the Department of Defense in the field of emerging technology tells Radar that during the 2004 hospital room drama, James Comey expressed concern over how this secret database was being used “to accumulate otherwise private data on non-targeted U.S. citizens for use at a future time.” Though not specifically familiar with the name Main Core, he adds, “What was being requested of Comey for legal approval was exactly what a Main Core story would be.” A source regularly briefed by people inside the intelligence community adds: “Comey had discovered that President Bush had authorized NSA to use a highly classified and compartmentalized Continuity of Government database on Americans in computerized searches of its domestic intercepts. [Comey] had concluded that the use of that ‘Main Core’ database compromised the legality of the overall NSA domestic surveillance project.”

If Main Core does exist, says Philip Giraldi, a former CIA counterterrorism officer and an outspoken critic of the agency, the Department of Homeland Security (DHS) is its likely home. “If a master list is being compiled, it would have to be in a place where there are no legal issues”—the CIA and FBI would be restricted by oversight and accountability laws—“so I suspect it is at DHS, which as far as I know operates with no such restraints.” Giraldi notes that DHS already maintains a central list of suspected terrorists and has been freely adding people who pose no reasonable threat to domestic security. “It’s clear that DHS has the mandate for controlling and owning master lists. The process is not transparent, and the criteria for getting on the list are not clear.” Giraldi continues, “I am certain that the content of such a master list [as Main Core] would not be carefully vetted, and there would be many names on it for many reasons—quite likely, including the two of us.”

Would Main Core in fact be legal? According to constitutional scholar Bruce Fein, who served as associate deputy attorney general under Ronald Reagan, the question of legality is murky: “In the event of a national emergency, the executive branch simply assumes these powers”—the powers to collect domestic intelligence and draw up detention lists, for example—“ if Congress doesn’t explicitly prohibit it. It’s really up to Congress to put these things to rest, and Congress has not done so.” Fein adds that it is virtually impossible to contest the legality of these kinds of data collection and spy programs in court “when there are no criminal prosecutions and [there is] no notice to persons on the president’s ‘enemies list.’ That means if Congress remains invertebrate, the law will be whatever the president says it is—even in secret. He will be the judge on his own powers and invariably rule in his own favor.”

The veteran CIA intelligence analyst notes that Comey’s suggestion that the offending elements of the program were dropped could be misleading: “Bush [may have gone ahead and] signed it as a National Intelligence Finding anyway.”

But even if we never face a national emergency, the mere existence of the database is a matter of concern. “The capacity for future use of this information against the American people is so great as to be virtually unfathomable,” the senior government official says.

In any case, mass watch lists of domestic citizens may do nothing to make us safer from terrorism. Jeff Jonas, chief scientist at IBM, a world renowned expert in data mining, contends that such efforts won’t prevent terrorist conspiracies. “Because there is so little historical terrorist event data,” Jonas tells Radar, “there is not enough volume to create precise predictions.”

The overzealous compilation of a domestic watch list is not unique in post-war American history. In 1950, the FBI, under the notoriously paranoid J. Edgar Hoover, began to “accumulate the names, identities, and activities” of suspect American citizens in a rapidly expanding “security index,” according to declassified documents. In a letter to the Truman White House, Hoover stated that in the event of certain emergency situations, suspect individuals would be held in detention camps overseen by “the National Military Establishment.”

By 1960, a congressional investigation later revealed, the FBI list of suspicious persons included “professors, teachers, and educators; labor-union organizers and leaders; writers, lecturers, newsmen, and others in the mass-media field; lawyers, doctors, and scientists; other potentially influential persons on a local or national level; [and] individuals who could potentially furnish financial or material aid” to unnamed “subversive elements.” This same FBI “security index” was allegedly maintained and updated into the 1980s, when it was reportedly transferred to the control of none other than FEMA (though the FBI denied this at the time).

FEMA, however—then known as the Federal Preparedness Agency—already had its own domestic surveillance system in place, according to a 1975 investigation by Senator John V. Tunney of California. Tunney, the son of heavyweight boxing champion Gene Tunney and the inspiration for Robert Redford’s character in the film The Candidate, found that the agency maintained electronic dossiers on at least 100,000 Americans, which contained information gleaned from wideranging computerized surveillance. The database was located in the agency’s secret underground city at Mount Weather, near the town of Bluemont, Virginia.

The senator’s findings were confirmed in a 1976 investigation by the Progressive magazine, which found that the Mount Weather computers “can obtain millions of pieces [of] information on the personal lives of American citizens by tapping the data stored at any of the 96 Federal Relocation Centers”—a reference to other classified facilities. According to the Progressive, Mount Weather’s databases were run “without any set of stated rules or regulations. Its surveillance program remains secret even from the leaders of the House and the Senate.”

Ten years later, a new round of government martial law plans came to light. A report in the Miami Herald contended that Reagan loyalist and Iran-Contra conspirator Colonel Oliver North had spearheaded the development of a “secret contingency plan,”—code named REX 84—which called “for suspension of the Constitution, turning control of the United States over to FEMA, [and the] appointment of military commanders to run state and local governments.” The North plan also reportedly called for the detention of upwards of 400,000 illegal aliens and an undisclosed number of American citizens in at least 10 military facilities maintained as potential holding camps.

North’s program was so sensitive in nature that when Texas Congressman Jack Brooks attempted to question North about it during the 1987 Iran-Contra hearings, he was rebuffed even by his fellow legislators. “I read in Miami papers and several others that there had been a plan by that same agency [FEMA] that would suspend the American Constitution,” Brooks said. “I was deeply concerned about that and wondered if that was the area in which he [North] had worked.” Senator Daniel Inouye, chairman of the Senate Select Committee on Iran, immediately cut off his colleague, saying, “That question touches upon a highly sensitive and classified area, so may I request that you not touch upon that, sir.” Though Brooks pushed for an answer, the line of questioning was not allowed to proceed.

Wired magazine turned up additional damaging information, revealing in 1993 that North, operating from a secure White House site, allegedly employed a software database program called PROMIS (ostensibly as part of the REX 84 plan). PROMIS, which has a strange and controversial history, was designed to track individuals—prisoners, for example—by pulling together information from disparate databases into a single record. According to Wired, “Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States. Compared to PROMIS, Richard Nixon’s enemies list or Senator Joe McCarthy’s blacklist looks downright crude.” Sources have suggested to Radar that government databases tracking Americans today, including Main Core, could still have PROMIS based legacy code from the days when North was running his programs.

In the wake of 9/11, domestic surveillance programs of all sorts expanded dramatically. As one well-placed source in the intelligence community puts it, “The gloves seemed to come off.” What is not yet clear is what sort of still-undisclosed programs may have been authorized by the Bush White House. Marty Lederman, a high-level official at the Department of Justice under Clinton, writing on a law blog last year, wondered, “How extreme were the programs they implemented [after 9/11]? How egregious was the lawbreaking?” Congress has tried, and mostly failed, to find out.

In July 2007 and again last August, Rep. Peter DeFazio, a Democrat from Oregon and a senior member of the House Homeland Security Committee, sought access to the “classified annexes” of the Bush administration’s Continuity of Government program. DeFazio’s interest was prompted by Homeland Security Presidential Directive 20 (also known as NSPD-51), issued in May 2007, which reserves for the executive branch the sole authority to decide what constitutes a national emergency and to determine when the emergency is over. DeFazio found this unnerving.

But he and other leaders of the Homeland Security Committee, including Chairman Bennie Thompson, a Mississippi Democrat, were denied a review of the Continuity of Government classified annexes. To this day, their calls for disclosure have been ignored by the White House. In a press release issued last August, DeFazio went public with his concerns that the NSPD-51 Continuity of Government plans are “extra-constitutional or unconstitutional.” Around the same time, he told the Oregonian, "Maybe the people who think there’s a conspiracy out there are right.”

Congress itself has recently widened the path for both extra-constitutional detentions by the White House and the domestic use of military force during a national emergency. The Military Commissions Act of 2006 effectively suspended habeas corpus and freed up the executive branch to designate any American citizen an “enemy combatant” forfeiting all privileges accorded under the Bill of Rights. The John Warner National Defense Authorization Act, also passed in 2006, included a last-minute rider titled “Use of the Armed Forces in Major Public Emergencies,” which allowed the deployment of U.S. military units not just to put down domestic insurrections—as permitted under posse comitatus and the Insurrection Act of 1807—but also to deal with a wide range of calamities, including “natural disaster, epidemic, or other serious public health emergency, terrorist attack, or incident.”

More troubling, in 2002, Congress authorized funding for the U.S. Northern Command, or NORTHCOM, which, according to Washington Post military intelligence expert William Arkin, “allows for emergency military operations in the United States without civilian supervision or control.”

“We are at the edge of a cliff and we’re about to fall off,” says constitutional lawyer and former Reagan administration official Bruce Fein. “To a national emergency planner, everybody looks like a danger to stability. There’s no doubt that Congress would have the authority to denounce all this—for example, to refuse to appropriate money for the preparation of a list of U.S. citizens to be detained in the event of martial law. But Congress is the invertebrate branch. They say, ‘We have to be cautious.’ The same old crap you associate with cowards. None of this will change under a Democratic administration, unless you have exceptional statesmanship and the courage to stand up and say, ‘You know, democracies accept certain risks that tyrannies do not.’ ”

As of this writing, DeFazio, Thompson, and the other 433 members of the House are debating the so-called Protect America Act, after a similar bill passed in the Senate. Despite its name, the act offers no protection for U.S. citizens; instead, it would immunize from litigation U.S. telecom giants for colluding with the government in the surveillance of Americans to feed the hungry maw of databases like Main Core. The Protect America Act would legalize programs that appear to be unconstitutional.

Meanwhile, the mystery of James Comey’s testimony has disappeared in the morass of election year coverage. None of the leading presidential candidates have been asked the questions that are so profoundly pertinent to the future of the country: As president, will you continue aggressive domestic surveillance programs in the vein of the Bush administration? Will you release the COG blueprints that Representatives DeFazio and Thompson were not allowed to read? What does it suggest about the state of the nation that the U.S. is now ranked by worldwide civil liberties groups as an “endemic surveillance society,” alongside repressive regimes such as China and Russia? How can a democracy thrive with a massive apparatus of spying technology deployed against every act of political expression, private or public? (Radar put these questions to spokespeople for the McCain, Obama, and Clinton campaigns, but at press time had yet to receive any responses.)

These days, it’s rare to hear a voice like that of Senator Frank Church, who in the 1970s led the explosive investigations into U.S. domestic intelligence crimes that prompted the very reforms now being eroded. “The technological capacity that the intelligence community has given the government could enable it to impose total tyranny,” Church pointed out in 1975. “And there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know.”

Source: Radar Magazine (http://radarmagazine.com/from-the-magazine/2008/04/mayjune_2008_table_of_contents.php). Please purchase a copy of the May/June 2008 issue immediately, or subscribe.

Related Reading: www.constitutionally.blogspot.com/ "Investigation into Whether America is Still a Constitutional Government" -- Are we currently living under Continuity of Government? (Excellent links for documentation, more reading).
Peter Dale Scott's recent article, Congress, the Bush Adminstration and Continuity of Government Planning--The Showdown www.911truth.org/article.php

We also very highly recommend Dr. Scott's "The Road to 9/11: Wealth, Empire, and the Future of America" which devotes two entire chapters to this issue. www.911truthstore.com/product_info.php
Jpg version of this article: www.911truth.org/images/COGRadarPDF.jpg

Fair Use Notice
This page contains copyrighted material, the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of political issues relating to alternative views of the 9/11 events, etc. We believe this constitutes a "fair use" of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond "fair use", you must obtain permission from the copyright owner.

Anti_Illuminati

  • Guest
Re: PROMIS-Interoperability-MAIN CORE-enemies list-Exposed
« Reply #33 on: May 26, 2009, 01:40:44 am »
http://bahoowah.blogspot.com/2008/10/big-brother-and-block-modeling.html



Big Brother and Block Modeling

By Scott A. Boorman and Paul R. Levitt
(New York Times Nov, 20 1983)

As 1984 approaches, a quiet revolution in computers and information gathering may be bringing us closer than we realize to George Orwell’s controlled state of Oceania. The public seems preoccupied with teen-age computer “hackers” accessing sensitive computer systems. But our more enduring fears should focus on a technology that corporations, nonprofit organizations and governments are using with increasing frequency to harness seemingly innocuous data from the personnel or communications departments and adapt it in new and unexpected ways such as targeting individuals for promotion or dismissal.

One name for this new computer game is block modeling – a programming technique that evaluates how employees fit within an organization on the basis of their relations with other employees. Recent impetus has come from such diverse independent quarters as Bell Laboratories, the American Broadcasting Companies, the Wharton School, and even the Institute for Social Management in Bulgaria.

Each of these organizations has recently spent time and money to develop advanced computer methods capable of “X-raying” a complex population- several hundred middle managers for example – to detect structural patterns of interaction and communication. And though these technologies certainly have significant benevolent uses, their premise is a recognizable extension of the “guilt by association” idea, and can therefore be abused.

Most crucially, these methods have the capacity to capitalize on the unguarded moments of ordinary people; to probe organizations for factional alignments in a low-visibility and therefore insidious way; to play to human biases – particularly among managers – to name names; and to give sometimes facile technological rationales for settling complex personnel problems.

Block-modeling does not require particularly sensitive information like tax returns medical histories. Rather, it exploits the unexpected, even uncanny synergy of large masses of “relational” data buried in organizational files. Examples of relevant data: Whom you talk with in your company; whose phone calls you do not return; whom you eat lunch with; whom you have worked with; who owes you favors; to whom to you send carbon copies of memos and letters; even whom you go bowling with. There is every expectation that far more such data bases will be routinely collected in the near future as minicomputer advances merger ever more widely with office information technology.

Only rarely will any relation between two people be very informative in isolation. But as many relations connecting many pairs of people accumulate, block modeling provides ways to distill frequently very striking and revealing patterns. Moreover, by throwing light on interlocking activities of specific people, block modeling goes a step beyond even the most refined kinds of geo-demographical data analysis such as extrapolating people’s characteristics by Postal Zip Code of residence.

The output of a block-model analysis is simple to state – even deceptively so since a large amount of advanced mathematics and computing is involved. The block model of the social structure chops the social group up into “blocs.” As Justice William O. Douglas once observed, a person is defined by the checks he writes. Blocs in similar positions in the relationship networks and who are thus likely to behave similarly in ways important to the organization, and be candidates for receiving similar “treatment.” Blocs can be, but don’t have to be, tightly-knit groups or factions. Two people may never have heard of each other, yet can end up in the same bloc because of common patterns of relationship with third parties.

In the mid-1970’s, we were part of a research team at Harvard that published the first papers on block-modeling’s social applications. The response was revealing. Places like mental institutions and rehabilitation centers in Lithuania were quick to request reprints. Perhaps they saw block-modeling as a way to ferret out dissidents. Later, members of the group received inquiries from the Swiss as well as West Germans whose questions (and travel reports sent back home) were especially exhaustive.

Interest then seemed to wane until two or three years ago, when a wave of, if often unobtrusive interest started coming from American business sources.

Possible uses of blockmodeling, beyond deciding promotions and dismissals, could include the following:

Identifying sources of grassroots opposition in hostile corporate takeover situations or bankruptcy reorganizations.

Indicating where to put the “good stuff” – raises, promotions, funding, new employees and perks.

Obtaining early warning of trouble spots portending possible “blowups”, in organizations, for example when internal tensions get out of hand, producing a wave of firings or resignations.

In fact, one of the earliest application of this class of methods was set in a Roman Catholic monastery which in the late 1960’s was on the brink of organizational collapse. The block model successfully identified three factions – loyalists, “Young Turks,” and outcasts – whose membership foreshadowed the way the organization would unravel. In an application to a more complex organization in difficulties, the block model not only correctly identified the outcast group, whose members would be dismissed, but also detected a submerged case of personnel misassignment in a different corner of the organization.

With proper safeguards, use of such methods can be sound, ethical and constructive. Obviously, internal sudit departments should at times be permitted to scrutinize employees closely. But stride sin the new “guilt-by-association” technologies are easily outstripping the vastly slower evolution of protective legal and administrative responses.

The typical employee whose position is likely to be most vulnerable to a block-model analysis is the middle manager, who has a family, a mortgage and a career locked into the XYZ Corporation. If the model locates him in a favorably regarded bloc, innocence by association prevails and all is well. But if he associated with known non-cooperators, or worse still, is assigned to a bloc judged likely to split off and found a rival company, he then can be passed over in the next promotion.

Inevitably, these new technologies create an unusually sensitive and complex web of management, privacy, information access, social control, and legal liability problems. In the end, the true 1984 threat lies not so much in the computer methods themselves, but in our society’s slowness to react.

Mike Philbin

  • Guest
Re: PROMIS-Interoperability-MAIN CORE-enemies list-Exposed
« Reply #34 on: May 26, 2009, 01:57:10 am »
I'll also add to the mix this informative Australian TV investigation into INSLAW from the 90's

http://mikephilbin.blogspot.com/2009/05/promis-inslaw-australian-government.html

great intel, guys

PS: surprise, surprise, this 'Video of Dov Zakheim's/Booz Allen Hamilton ties to 9/11 Black Op involvement' has been removed due to a terms of use violation.

Anti_Illuminati

  • Guest
Re: PROMIS-Riconosciuto-Tim Osman-Cabazon-Stormont Labs-Wackenhut
« Reply #35 on: June 03, 2009, 07:24:15 pm »
http://cryptome.org/tim-osman.htm

9 November 2001. Thanks to J. Orlin Grabbe


November 8, 2001
When Osama Bin Ladin Was Tim Osman

By J. Orlin Grabbe

The two men headed to the Hilton Hotel in Sherman Oaks, California in the late Spring of 1986 were on their way to meet representatives of the mujahadeen, the Afghan fighters resisting the Soviet invasion of Afghanistan.

One of the two, Ted Gunderson, had had a distinguished career in the FBI, serving as some sort of supervisor over Special Agents in the early 60s, as head of the Dallas field office from 1973-75, and as head of the Los Angeles field office from 1977-1979. He retired to become an investigator for, among others, well-known attorney F. Lee Bailey. And all along the way, Gunderson, whether or not actually a CIA contract agent, had been around to provide services to various CIA and National Security Council operations, as he was doing now.

In more recent years Gunderson was to become controversial for his investigations into child prostitution rings, after he became convinced of the innocence of an Army medical doctor named Jeffrey McDonald, who had been convicted of the murder of his wife and three young children in the 1970s. This has led to various attempts by the patrons and operators of the child prostitution industry to smear Gunderson's reputation.

Michael Riconosciuto was there to discuss assisting the mujahadeen with MANPADs—Man Portable Air Defense Systems. Stinger missiles were one possibility. If the U.S. would permit their export, Riconosciuto could modify the Stinger's electronics, so the guided missile would still be effective against Soviet aircraft, but would not be a threat to U.S. or NATO forces.

But Riconosciuto had another idea. Through his connections with the Chinese industrial and military group Norinco, he could obtain the basic components for the unassembled Chinese 107 MM rocket system. These could be reconfigured into a man-portable, shoulder-fired, anti-aircraft guided missile sytem, and produced in Pakistan at a facility called the Pakistan Ordinance Works. The mujahadeen would then have a lethal weapon against Soviet helicopter, observation, and transport aircraft.

Riconosciuto was more than just an expert on missile electronics; he was also an expert on electronic computers and associated subjects such as cryptology (see my "Michael Riconosciuto on Encryption").

Riconosciuto was a prodigy who had grown up in the spook community. The Riconosciuto family had once run Hercules, California, as a company town. In the early days (1861) a company called California Powder Works had been established in Santa Cruz, CA. It later purchased land on San Pablo Bay, and in 1881 started producing dynamite, locating buildings in gullies and ravines for safety purposes. A particularly potent type of black powder was named "Hercules Powder", which gave the name to the town of Hercules, formally incorporated in 1900. In World War I, Hercules became the largest producer of TNT in the U.S. Hercules, however, had gotten out of the explosives business by 1940 when an anhydrous ammonia plant was constructed. In 1959 Hercules began a new manufacturing facility to produce methanol, formaldehyde, and urea formaldehyde. In 1966 the plant was sold to Valley Nitrogen Producers. Labor problems led to a plant closure in 1977. In 1979 the plant and site was purchased by a group of investors calling themselves Hercules Properties, Ltd.

However, Michael and his father Marshall Riconosciuto, a friend of Richard Nixon, continued to run the Hercules Research Corporation. In the early 1980s Michael also served as the Director of Research for a joint venture between the Wackenhut Corporation of Coral Gables, Florida, and the Cabazon Band of Indians in Indio, California. Riconosciuto's talents were much in demand. He had created the a-neutronic bomb (or "Electro-Hydrodynamic Gaseous Fuel Device"), which sank the ground level of the Nevada test site by 30 feet when a prototype was tested. Samuel Cohen, the inventor of the neutron bomb, said of Riconosciuto: "I've spoken to Michael Riconosciuto (the inventor of the a-neutronic bomb) and he's an extraordinarily bright guy. I also have a hunch, which I can't prove, that they both (Riconosciuto and Lavos, his partner) indirectly work for the CIA."

Riconosciuto's bomb made suitcase nukes obsolete, because it achieved near-atomic explosive yields, but could be more easily minaturized. You could have a suitcase a-neutronic bomb, or a briefcase a-neutronic bomb, or simply a lady's purse a-neutronic bomb. Or just pull out your wallet for identification and —. The Meridian Arms Corporation, as well as the Universities of California and Chicago owned a piece of the technology.

But there was more than explosives in the portfolios of the CIA agents who surrounded Riconosciuto like moths around a candle. Both Robert Booth Nichols, the shady head of Meridian Arms Corporation (with both CIA and organized crime conections), and Dr. John Phillip Nichols, the manager of the Cabazon reservation, were involved in bio-warfare work—the first in trying to sell bio-warfare products to the army through Wackenhut, the second in giving tribal permission for research to take place at Cabazon. According to Riconosciuto, the Pentagon's Defense Advanced Research Projects Agency (DARPA) was in charge of the classified contracts for biological warfare research. Riconosciuto would later testify under oath that Stormont Laboratories was involved in the DARPA-Wackenhut-Cabazon project. Jonathan Littman, a reporter for the San Francisco Chronicle would relate: "Cabazons and Wackenhut appeared to be acting as middlemen between the Pentagon's DARPA and Stormont Laboratories, a small facility in Woodland near Sacramento."
The Race Weapon

Riconosciuto would make additional claims about Bio-Rad corporation, a medical supplier which had gradually taken over Hercules, California. They were also, Riconosciuto would say, covertly engaged in bio-warfare research—producing some of the deadliest toxins known to man. The focus of Bio-Rad's research was said to be bio-active elements that could be tailored to attack those with certain types of DNA. Weapons could thus be produced that were specifically designed to wipe out specific races or genetic classes of human beings. (Alternatively, particular DNA types could be immunized against a deadly biological agent; the agent could then be released, and everyone else would die.)

A couple of years later, Meridian International Logistics, the parent company of Meridian Arms, was to farm similar research out to the Japanese. This included (according to minutes of a corporate meeting dated Aug. 26, 1988) methods for "induction and activation of cytotoxic T-lymphocytes". Associated with Meridian's Robert Booth Nichols in a Middle Eastern operation called FIDCO, a company that ran arms into and heroin out of Lebanon's Beqaa (Bekaa) Valley, was Harold Okimoto, a high-ranking member of the Yakuza. Okimoto had longed worked under Frank Carlucci (who served as Secretary of Defense and Deputy Director of the CIA before becoming Chairman of The Carlyle Group). Okimoto owned food concessions in casinos around the world—Las Vega, Reno, Macao, and the Middle East. (Free drinks and anthrax while you play blackjack, anyone?)

Meeting Riconosciuto and Gunderson at the hotel were two representatives of the mujahadeen, waiting to discuss their armament needs. One of the two was named "Ralph Olberg." The other one was called Tim Osman (or Ossman).

"Ralph Olberg" was an American businesman who was leading the procurement of American weapons and technology on behalf of the Afghan rebels. He worked through the Afghan desk at the U.S. State Department, as well as through Senator Hubert Humphrey's office. Olberg looked after the Afghanis through a curious front called MSH—Management Sciences for Health.

The other man, dressed in Docker's clothing, was not a native Afghan any more than Olberg was. He was a 27-year-old Saudi. Tim Osman (Ossman) has recently become better known as Osama Bin Ladin. "Tim Osman" was the name assigned to him by the CIA for his tour of the U.S. and U.S. military bases, in search of political support and armaments.

Gunderson and Riconosciuto were not on an altruistic mission. They had some conditions for their help. And they had some bad news to deliver. The mujahadeen needed to be willing to test new weapons in the field and to return a research report, complete with photos.

The bad news was that some factions of the CIA didn't feel that Oldberg and Osman's group were the real representatives of the Afghans. Upon hearing this both Tim and Ralph were indignant. They wanted to mount a full-court press. Round up other members of their group and do a congressional and White House lobbying effort in Washington, D.C.
"Pleased to meet you. Hope you guess my name."

-- The Rolling Stones, Sympathy for the Devil

Did the lobbying effort take place? I don't know. There is some evidence that Tim Osman and Ralph Oldberg visited the White House. There is certainty that Tim Osman toured some U.S. military bases, even receiving special demonstrations of the latest equipment. Why hasn't this been reported in the major media?

One week after giving an affidavit to Inslaw regarding the PROMIS software in 1991, Riconosciuto was arrested on trumped-up drug charges. The Assistant U.S. Attorney prosecuting the case attempted to cover up Riconosciuto's intelligence background by claiming to the jury he was "delusional." A TV station came and pointed a camera out at the desert at Cabazon and said, "Riconosciuto says he modified the PROMIS software here." Of course Riconosciuto didn't modify the software out between the cacti and yucca. Sand isn't good for computers. He did the modifications in offices in nearby Indio, California. The AUSA told reporters Riconosciuto had been diagnosed with a mental condition, the implication being "he's making all this stuff up". Yes, there had been a mental evaluation of Riconosciuto. I have a copy of the report. The diagnosis? Here it is: NO MENTAL DISORDER. The Department of Justice consistently and maliciously lied to the jury, just as had been threatened by Justice Department official Peter Viednicks if Riconosciuto cooperated with the congressional investigation of PROMIS.

If the war against Osama Bin Ladin (Tim Osman) is not a total fraud, then what is Michael Riconosciuto doing in prison? Why doesn't he have an office next to Colin Powell so he can give realistic advice on Bin Ladin's thinking? And where is Ralph Olberg?

Thirty-four days before the East African embassy bombings of August 7, 1998, Riconosciuto notified the FBI in Miami that the bombings were going to take place. Two days prior to the bombings he requested of BOP (Bureau of Prisons) officials at the Federal Corrections Institution (FCI) in Coleman, FL., that he be allowed to call ECOMOG security headquarters to warn African officials. The BOP denied the request. Riconosciuto was mystified at being ignored by the relevant government authorities. I'm not mystified. I suspect the reason Riconosciuto was ignored was that the relevant parties, including especially the Miami FBI office, knew all along the bombings would take place. And they wanted them to happen.

The same is true with respect to the recent plane bombings of the WTC. It wasn't an intelligence "failure". The terrorist acts were deliberately allowed to happen. The actors may have been foreign. But the stage directors appear to have been all along here in the U.S. Cui bono?

Isn't it time to let Michael Riconosciuto out of prison, and wipe the slate clean of the trumped up drug charges, and let him be a national security advisor—at least with respect to the government's pursuit of Osama Bin Ladin? Isn't it time to quit pretending Osama Bin Ladin came out of nowhere?

This is not an academic argument. Sources say three dozen MANPADs have been imported into Quebec, Canada, from Colombia (where they arrived from Eastern Europe). The missile shipments followed the "northern" drug route—from Colombia into Canada. The missiles involved are Russian Strellas and Iglas. These will serve just fine to take down commercial airline flights. Just like TWA 800. Which group of terrorists has the missiles? Meanwhile, how many biological warfare agents are in the hands of organized crime? Maybe you should ask Riconosciuto about all this.

Michael Riconosciuto is now incarcerated at the FCI Allenwood, PA. You know where to find him.
Note: Michael Riconosciuto has just been moved to Springfield, MO. His address is:

Michael J. Riconosciuto
21309-086 Box 4000
U.S. Medical Center
Springfield, MO
65801-4000
J. Orlin Grabbe's homepage is located at http://orlingrabbe.com.

-30-

from The Laissez Faire City Times, Vol 5, No 46, November 12, 2001
__________________________________________________________________
Excerpt:

"'COMPANY' PROPERTY & BIOWARFARE

One business in the CIA's Arkansas network was Park-on-Meter, or POM Inc. Based in Russellvile, AR its current annual revenue is estimated at $18 million.[4]
Commercially, it produces parking meters and machine parts. Covertly, it was manufacturing untraceable custom weapons parts for the Contras and shipping them to Mena. POM had subcontracted the job from a CIA front called Iver Johnson's Firearms (now bankrupt), of Jacksonville, AR.[5]

Former CIA scientist Michael Riconosciuto[6] has told reporters that he was closely involved in these covert arms operations at POM. He claims that he supervised high-tech equipment transfers to POM, and had developed software to help launder the Mena drug money.[7] He also says that POM manufactured external fuel tanks for C-130 transport planes. This would have allowed the massive cargo planes to travel the long distances to Central and South America.[8] He also claims to have worked on fuel-air explosives specifically for use in the Contra war.[9] But Riconoscuito's most disturbing allegations concern his work in developing chemical and biological weapons in a project connected to POM. He says that in 1983 the company, in conjunction with the infamous "private" police force Wackenhut and Stormont Laboratories in Woodland, CA, began production of the delivery system for the new chemical and biological warfare CBW weaponry for use in the Contra war.

He claims that POM was to receive chemical agents from the 354th Chemical Company of the Army Reserve
, located on property across from the corrugated barn housing the POM facilities, for use in small explosive devices made with the same equipment POM used to produce parking meters.[10] When contacted by journalist Alexander Cockburn, Stormont Labs acknowledged only "discussions" with Wackenhut about biological weapons. Wackenhut denied ever working with POM.

POM pres. Seth Ward admitted that the company had defense contracts, but only for "re-entry nose cones for the nuclear warheads on the MX missile and nozzles for rocket engines," not CBW weapons. Ward also falsely denied that POM ever accepted any money from the ADFA.



http://www.videonewslive.com/view/311104/who_is_tim_osman_aka__osama_bin_laden

Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435
Re: PROMIS-Riconosciuto-Tim Osman-Cabazon-Stormfront Labs-Wackenhut
« Reply #36 on: June 03, 2009, 07:42:09 pm »
The Last Circle is a great read, to me most interesting of all is how Robert Gates survived his CIA-USSR "critical crisis of infrastructure" leak.

Funny indeed how phony, falsified CIA Mafia disinformation falsely portraying a 'Red Menace" was criminally used in false unconstitutional secret intelligence reports to criminally maintain the unconstitutional standing army and finance the criminal Star Wars, Bush-Iran Hostage arms payoffs and Mujihadeen fiasco's while all the while they knew the embargo had destroyed their treasured enemy lng ago and were just waiting for it to collapse.

Wackenhut was also in charge of the security at the largest private intelligence gathering operation in the US, American media where the chief photo editor was murdered by Anthrax that did not come from a postal sorting plant - but was dragged back there by mail from Bob Steven's the famed Bruno Magli editor's desk....

he was the first Anthrax victim poisoned by some means almost within hours of the 8/11 attacks. Obviouslt he had some damning photographic evidence

He was murdered two days before the photos of the supposed arab 9/11 Daniel Chapter 8 Show 'hijackers' were to be published by the FBI Mafia and an FBI CIA Cointelpro 'investigator' headed the investigation and clean-up of the photo evidence they so feared would connect Atta et al to Island Tobacco agents in US Casinos...


Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435
Re: PROMIS-Riconosciuto-Tim Osman-Cabazon-Stormont Labs-Wackenhut
« Reply #37 on: June 03, 2009, 08:02:30 pm »
The missing link in all this is a so-called Washington "lobbyist" named  Jack Abramoff who was apparently photographed with certain other parties and Atta in Miami - parties that Bob Stevens had been waiting for insider info on identifying...

He got a bad tip, delivered personally it would seem

Alex still seems to think it had something to do with Bush's daughters and the Enquirer but I strongly disagree

http://www.angelfire.com/ny/syzargy

They needed to kill Stevens in a very speacial way indeed so that they would have unrestricted and unmonitored access to American Media's photo archives for as long as it took to cover up the 9/11 evidence that they knew was there. That was why Jeb declared the emergency in Florida a bit too far ahead of schedule...

Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435
Re: PROMIS-Riconosciuto-Tim Osman-Cabazon-Stormont Labs-Wackenhut
« Reply #38 on: June 03, 2009, 08:21:18 pm »
It's Stormont

Anti_Illuminati

  • Guest