Friday, January 21, 2005

Fw: PTECH, 9/11, and USA-SAUDI TERROR by Hecht, Ruppert, Kane


----- Original Message -----
From: "A"
To: "carol wolman"
Sent: Friday, January 21, 2005 2:15 PM
Subject: important article, please forward to all contacts


>
>
>
> > http://www.fromthewilderness.com/free/ww3/012005_ptech_pt1_summary.shtml
> >
> > January 20th, 2005
> >
> >
> > PTECH, 9/11, and USA-SAUDI TERROR -
> > Part I
> >
> > PROMIS Connections to Cheney Control of 9/11 Attacks Confirmed
> > by Jamey Hecht
> > With research assistance by Michael Kane and editorial comment by
> > Michael C. Ruppert
> > --------
> > © Copyright 2005, >From The Wilderness Publications,
> > www.fromthewilderness.com. All Rights Reserved. This story may NOT be
> > posted on any Internet web site without express written permission.
> > Contact admin@copvcia.com. May be circulated, distributed or transmitted
> > for non-profit purposes only.
> > --------------
> > [Few have grasped the overall long-term significance of the saga of
> > PROMIS software and what it has become. When I reported on it in October
> > 2000, after meeting with and assisting members of the RCMP's National
> > Security Staff I was aware that - in terms of secret technologies -
> > PROMIS and its evolutions were the lynchpin of every new military,
> > scientific and financial advance being pursued by the US government and
> > corporate sector. PROMIS progeny have become the "operating system"
> > underlying data management and data mining for every major technology
> > under development in all arenas of technological advance from medicine,
> > to finance, to surveillance, to battlefield Command, Control and
> > Communications or C3.
> >
> > In the long ordeal to secure a publisher for Crossing the Rubicon, my
> > agent and I went through a number of publishers who expressed keen
> > interest in the book. The problem was that almost every one we dealt
> > with came back to us and said, "We'd like to publish the book but we
> > need for you to remove certain things." By a great margin, it was our
> > chapter on PROMIS and my many subsequent references to it that appeared
> > to be public enemy number one for mainstream publishers (most owned by
> > multi-national corporations).
> >
> > By definition, PROMIS progeny are the backbone of a current DoD plan to
> > develop a "Godlike" view of all human (or battlefield) activity from
> > space. They are also inherently a part of the data processing being
> > envisioned for advanced space weapons requiring machines to think as
> > they share data in virtual real time. MIT in a recent scientific
> > publication titled "Space Weapons: Crossing the US Rubicon"(a possible
> > tip of the hat to my book) described a number of capabilities to which
> > FTW referred in our October 2000 story on PROMIS, including a statement
> > that space is "the ultimate high ground."
> >
> > The MIT article also contains a reference to one of the greatest fears
> > expressed by all who wonder what hidden technologies might be making the
> > Neocons so brazen in their attempts at bullying the world into
> > submission: "On the other hand, the prospect of weapons in orbit-poised
> > to strike anywhere on the globe at any time-has elicited vigorous
> > opposition, both in the United States and abroad."45 The Neocons have
> > placed their faith in technologies we have only begun to evaluate and
> > discuss, and this is an area needing much additional research by
> > authentic journalists.
> >
> > Iran is a much more industrialized and automated nation than the ruin
> > and rubble of Iraq. What if Donald Rumsfeld believed that he could use
> > computers through the Internet to turn off all of the power generating
> > stations supplying Tehran? What if Dick Cheney could shut down all of
> > the computerized pumping, pipeline, refining and chemical technology
> > used to keep Iran's oil flowing to the rest of the world? This is how
> > the American, British and Israeli elites (including corporations) think
> > and how they plan.
> >
> > All three countries have long, deep and continuous links to PROMIS
> > software. As time passes it is beginning to appear that PROMIS is
> > literally what made possible not only 9/11, but everything that has
> > followed since and what is being planned.
> >
> > Recently the New York Times published a story about how the US military
> > was envisioning a costly new "Internet" in space to control all military
> > operations worldwide, calling it a "God's-eye view" of battle. Called
> > Global Information Grid or GIG, this new platform performs the exact
> > functions we described in an FTW article more than four years ago. Then
> > we were called delusional conspiracy theorists. Four years later we are
> > shown to have been right on the money.
> >
> > Giant, expensive technology programs like SDI and GIG are sometimes
> > neither wasteful porkbarrels nor the actual instruments that are
> > presented to the public; instead, they are some third thing nobody knows
> > about. This is the way large black projects are funded.
> >
> > Total Information Awareness or TIA, an Orwellian nightmare of data
> > mining that uses PROMIS-evolved technologies and artificial
> > intelligence, is now operating and able to incorporate vastly divergent
> > data bases of personal information on private citizens from computer
> > systems using different languages in near-real-time. Every bit of
> > personal information from grocery shopping habits to driving records,
> > credit reports, credit card transactions and medical records is now
> > almost instantly accessible. Access will be expedited and broadened to
> > local law enforcement agencies when what will become a national ID card
> > comes into being. That will happen as driver's licenses are standardized
> > nationwide (following the recent intelligence reform act) to include a
> > simple UPC-like code that will allow approved agencies to get all of our
> > data. The surveillance and intervention capabilities of PROMIS progeny
> > can now be used to prohibit a credit card purchase or (soon) prevent
> > someone from boarding a commercial aircraft. These capabilities could
> > also be used to empty a private bank account or - when coupled with
> > biometric face recognition technology - prevent you from making a
> > withdrawal from your bank or even buying food.
> >
> > In every one of these software applications there are two themes:
> > machines that "talk" to each other and artificial intelligence. (Please
> > see Crossing the Rubicon.) As you will see below these capabilities are
> > now known to exist.
> >
> > TIA has been renamed several times. We know that the first software was
> > delivered to the Defense Advanced Research Projects Agency (DARPA) in
> > 2003. Its latest nom de guerre is TIE or Trusted Information
> > Environment. According to the San Francisco Chronicle last October TIE
> > now allows the government to access private databases without a warrant.
> > I go one step further to assert that TIE allows access to private
> > databases without the knowledge of the database owners, provided only
> > one condition exists: the database can be accessed through the internet.
> >
> > And although the public face of TIA pretends that these technologies
> > have not yet been applied, we are certain with the publication of this
> > story that the same software the government needs is already in use by
> > private corporations - the big ones - and we remind the reader that
> > FTW's map of the world states that the government has been turned into a
> > franchise operation of these corporations anyway. So where's the seam?
> >
> > What the courageous and brilliant Indira Singh has to tell us is a
> > matter of monumental importance. Based upon these new revelations which
> > confirm what I suggested in Crossing the Rubicon every American and
> > quite likely every citizen of an industrialized nation should assume
> > that all of these technologies are operational today. A bit of breathing
> > room is left as I conclude that they have not been sufficiently deployed
> > yet to monitor all citizens in real time. My best assumption is that
> > right now perhaps a million or so high-interest Americans are under
> > constant surveillance; all by computer technology which has proven so
> > accurate that it can detect suspicious movements just by correlating
> > gasoline and food purchases with bank withdrawals and utility
> > consumption. [--MCR]
> >
> > FTW readers are aware that on the morning of 9/11 NORAD was engaged in
> > multiple war games which drew fighter jets away from the doomed
> > airliners, and polluted air traffic control screens with false
> > information from the exercises. One of those injected blips was the
> > so-called "phantom Flight 11," which appeared and persisted on control
> > screens after the war games had been aborted.1 That would require
> > exactly the kind of technology that Ptech (with whom Singh did business)
> > and its partner Mitre had been providing to each of the three agencies
> > involved: the FAA, NORAD, and - most significantly for Dick Cheney that
> > morning - the Secret Service. In other words, one of the most central
> > arguments in the Rubicon's case has just been independently validated.
> > (See Part II)
> >
> > In this electrifying timeline-driven report, Wall Street whistleblower
> > Indira Singh lays out the connections between the providers of this
> > advanced software (derived from the PROMIS software stolen from the
> > Inslaw corporation in the 1980s by the US Justice Department and others)
> > and the network of terrorist financing (sustained with US blessing) that
> > has pervaded U.S covert operations for years. That deep-political
> > relationship is at its strongest in the Bush administration, whose Saudi
> > and Pakistani ties go back decades.
> >
> > Dick Cheney, James Baker, GHWB, Dubya, and the people in and around the
> > once and future American ruling junta have financially live links to the
> > Muslim Brotherhood milieu that formed part of BCCI and, more recently,
> > al Qaeda (this is also the context of a fascinatingly influential
> > relationship among Kermit Roosevelt, GHWB, and Adnan Khashoggi). Nazis
> > and their admirers are the third piece in the triangle, connected to
> > Islamists since the Muslim Brotherhood's creation in 1928 by Hitler ally
> > Hasam al-Banna, and connected to the Bush clan through decades of
> > interdependence with American oil and intelligence elites - including
> > the Rockefellers (Standard Oil) and the Harrimans (Brown Bros. Harriman
> > / Kellogg Brown and Root / Halliburton).2
> >
> > Viewed in this context, the Ptech story is a chilling reminder that this
> > network is still in charge; that it facilitated the 9/11 attacks that
> > murdered thousands and destroyed the health of thousands more; and that
> > "our" American defenses against sabotage are woefully dependent upon the
> > goodwill of saboteurs (both foreign and domestic). - JAH]
> >
> > ==============
> > ***NOTICE: In accordance with Title 17 U.S.C. Section 107, this material
> > is distributed without profit to those who have expressed a prior
> > interest in receiving the included information for research and
> > educational purposes.***
> >
> >
> >
> >
>

0 Comments:

Post a Comment

<< Home