In this electrifying timeline-driven report, Wall Street whistleblower Indira Singh lays out the connections between the providers of this advanced software (derived from the PROMIS software stolen from the Inslaw corporation in the 1980s by the US Justice Department and others) and the network of terrorist financing (sustained with US blessing) that has pervaded U.S covert operations for years. That deep-political relationship is at its strongest in the Bush administration, whose Saudi and Pakistani ties go back decades.
Dick Cheney, James Baker, GHWB, Dubya, and the people in and around the once and future American ruling junta have financially live links to the Muslim Brotherhood milieu that formed part of BCCI and, more recently, al Qaeda (this is also the context of a fascinatingly influential relationship among Kermit Roosevelt, GHWB, and Adnan Khashoggi). Nazis and their admirers are the third piece in the triangle, connected to Islamists since the Muslim Brotherhood's creation in 1928 by Hitler ally Hasam al-Banna, and connected to the Bush clan through decades of interdependence with American oil and intelligence elites - including the Rockefellers (Standard Oil) and the Harrimans (Brown Bros. Harriman / Kellogg Brown and Root / Halliburton).2
Viewed in this context, the Ptech story is a chilling reminder that this network is still in charge; that it facilitated the 9/11 attacks that murdered thousands and destroyed the health of thousands more; and that "our" American defenses against sabotage are woefully dependent upon the goodwill of saboteurs (both foreign and domestic).
And we know what happened to Mr. Kennedy.The computational power of the Ptech evolution of PROMIS represents a daunting new surveillance-and-intervention capability in the hands of the same elites who planned 9/11, prosecute the subsequent resource wars, and are presiding over what may become a full economic and military disaster for the resource-consuming citizens of America and the world. Since the "War On Terror" and the coming dollar/fossil fuel collapse will necessitate new levels of domestic repression, this is just the capability those elites require. Ptech is the functional equivalent of Total Information Awareness.[...]
The issue of Saudi complicity in the attacks of 9/11 has played out into two different views. The first is the idea that the Saudis were solely responsible. This has been pumped up by Fox News and largely accepted as gospel in certain parts of the mainstream media. The second view is that the Saudis were set up to take the fall for having pulled off 9/11, covering up U.S. complicity. Neither view is correct, and both depend on a mistaken view of that country as a monolithic, homogeneous actor on the world stage. The opposite is true.
[...]
Like virtually all Islamic states, Saudi Arabia has been the target of ongoing efforts by American intelligence aimed at suppressing any stirrings of incipient secular leftism. This is opposed, we believe, to what may be convenient and clandestine support for "al-Qaeda" terrorists (i.e. fundamentalists), acting as US proxies, who might destabilize the kingdom in advance of the US carving off only those regions with oil reserves.
[...]
The Ptech story is of intense interest for its implications about US government guilt in 9/11. As Ralph Schoenman, Michel Chossudovsky, Paul Thompson and others have argued, "al Qaeda" is not only traceable to CIA activity in Pakistan and Afghanistan during the Soviet period, it is also a current tool of American imperial ambitions.
[...]
Beneficiaries of the Ptech-connected MAK charities, the young men in Hezbollah and Hamas are fighting in land disputes, not heady ideological quests. They are also bitter, bereaved, murderous bigots with all the psychic rigidity and hysteria found in fundamentalists from Oklahoma to Hebron to Jeddah. Their hatred of the American national security state is surely absolute, but they are also beneficiaries of the Pentagon's need for an Enemy. That means that they can expect the United States to provide covert help of some kind at crucial points in the game. And the most despicable element in the American side of that process is the Bush-Cheney junta itself, which used its own assets inside the terrorist network associated with Osama bin Laden to murder three thousand civilians in New York, Washington, and Pennsylvania as a pretext for unending warfare. This was done for reasons of state. But it was also done for personal gratifications including vast sums of money, permanent blackmail over those involved, and a heroin-like rush of criminally insane individual power. Sophisticated or naïve, cynical or grandiose and idealistic, each person involved betrayed humanity. And the apparatus that permitted this remains in place - as do most of the personnel.
[...]
The solution to the Ptech problem is not just to get all that creepy software the hell off the computers. The bigger solution is transparency and disclosure, de-militarization and political internationalism; localization of production and exchange; and a more equitable distribution of resources and opportunity.[...]
And though all ideals are warped by the rigors of practice, this was the point of President Kennedy's de-escalation in Laos, his Alliance for Progress in Latin America, and his refusal to invade Cuba:
What kind of peace do I mean? What kind of peace do we seek? Not a Pax Americana enforced on the world by American weapons of war. Not the peace of the grave or the security of the slave. I am talking about genuine peace, the kind of peace that makes life on earth worth living, the kind that enables men and nations to grow and to hope and to build a better life for their children--not merely peace for Americans but peace for all men and women--not merely peace in our time but peace for all time.
PTECH, 9/11, and USA-SAUDI TERROR PART II: * The FAA & Ptech; * Debriefed by Secret Service - looking for a PROMIS; * Muslim Brotherhood, Christian Cultists, and Nazis
These excerpts are from summaries of stories online at From the Wilderness that are available only to subscribers. Michael Ruppert used to provide his website completely free. Now, some things are and some aren't. It's too bad that it isn't all free, but the man is an investigative reporter, and he can't work for nothing.
Here are some other links to information about PROMIS, including this interesting article:
"The Americans, through Hadron, sold Promis to a number of countries, including Britain, Australia, South Korea, Iraq, and Canada. Many of the secrets of those nations' intelligence agencies were read through the Promis trap door by the Americans." [...] The Israelis, through Degem, sold Promis to the East Bloc and other countries, including Brazil, Chile, Colombia, and Nicaragua. An abridged version of Promis, including the trap door, was also sold by Degem to Credit Suisse in 1985. [...] Maxwell's Degem even sold Promis to the Soviet Union in the late 1980s. [...] When the Soviets expressed a desire to have Promis, Degem technicians fitted it to the IBM computers, complete with the tell-all trap door. In early 1991, before the coup against Mikhail Gorbachev, Soviet military intelligence, GRU, was still using Promis. So whether he knew about the trap door or not, Maxwell gave the Americans a direct line into Soviet military intelligence.
I believe that one of the reasons I was arrested in 1989 on a trumped-up arms charge was that I, on behalf of the Israeli government, threatened to expose what the Americans were doing with Promis if they continued their support of chemical weapons being supplied to Saddam Hussein's Iraq.[...]
The question is, why was Bin Laden recently provided with a copy of this software? [...] Now his men which were trained by the CIA can travel freely with no fear of reprisal. George Bush Sr. was vice president when the software was developed, and is a definite insider of this faction of government that sent Promise worldwide. He is connected to the Bin Laden family through the Carlyle Group, which means that both the Bin Laden fortune and the Bush fortune are greatly increased with every military act.
[...]
Newer computer operating systems have "background housekeeping". This means that, at times, the computer will do things you didn't tell it to, such as building indexes. But it could also be performing surveillance on you.
Windows, from 95 up, is bugged. This means that it contains a trapdoor, and the NSA has a key.
To probe this further, search for "windows NSA key" in a search engine.
Not only Windows, but all newer OS may be bugged.
A Mac expert informed me that the Mac OS is bugged from version 9 up. A Unix expert informed me that Unix is probably bugged too - even Open Source Unix. It would be possible to bug it because it's so complex, and written in the cryptic language "C".
Don't trust encryption; and back up your OS & data regularly.
How Big Brother can keep info on your computer.
But for better protection, switch to Mac or Unix - Department of Homeland Security Standardizes on Mac OS 10 (X)
Bin Laden's Magic Carpet - Secret U.S. PROMIS Software
America’s Spy Software Scandal, Courtesy of the U.S. DOJ
One last thing...this paragraph from a short Michael Ruppert article written in September of 2001:
This is certain: opium production surely blossomed again in Afghanistan.A final question: Why, in light of all the information we now know the government had about imminent attacks, did the Bush Administration gift the Taliban with $43 million in May of this year? The move by the White House, sorely criticized by columnist Robert Scheer in the May 22, 2001 Los Angeles Times, was an alleged reward by the U.S. for the Taliban's destruction of Afghan opium crops in February. Now, the U.S. government is rushing to mate with a Pakistani regime that sustains itself by, and derives liquid currency from, the drug trade. The result of that is that opium production will surely blossom again in Afghanistan - under U.S./CIA control. The obvious suggestion here is that the U.S., directly or indirectly, helped to fund the WTC attacks.
No comments:
Post a Comment
Comments are moderated. There may be some delay before your comment is published. It all depends on how much time M has in the day. But please comment!