Deep Politics Forum

Full Version: Ptech aka GoAgile
You're currently viewing a stripped down version of our content. View the full version with proper formatting.

THE PTECH STORY: Indira Singh, whistleblower, former J P Morgan Chase ‘Risk architect’. In her allotted half hour, Indira Singh, an EMT at Ground Zero on 9-11, tells how she later bumped into Ptech, thinking of hiring the high-level information spooks (PROMIS plus) for Morgan Chase. She didn’t, but took her growing suspicions and documents to the FBI and the official 911 Commission, which muzzled them. Singh takes us on a quick tour of back door banking and corporate spying and stealing and drugs and terrorism and CIA front organizations involved at every turn. 911CitizensWatch inquiry, NYC Sept. 9

INDIRA SINGH: Questions, answers, clarifications and hints. Congresswoman Cynthia McKinney, Bob McIlvanie, Faiz Khan, Michael Ruppert, Nico Haupt et al. question whistleblower Singh’s explosive revelations about Ptech and other CIA front groups. 911Citizens Watch Inquiry, NYC Sept. 9, 2004.
Ptech Inc. was a Quincy, Massachusetts-based provider of business process modelling software that was closed down in the wake of a December 5, 2002 raid by federal authorities under the auspices of Operation Green Quest.

Business domain

Describing itself as a "provider of enterprise architecture, business modeling, analysis and integration software solutions,"[1] the privately-held corporation was founded in 1994, and known for its technology, which was based on a unique implementation of neural net and semantic technologies. Ptech was recognized as one New England Technology's "Fast 50" by Deloitte Touche Tohmatsu in 2001.[2] For four years in row (from 2000 to 2003), Ptech was also recognized, for their velocity of innovation in the knowledge economy, as one of the hundred companies that matters in the world of IT and Business [3] with the major names in Technology companies such as Microsoft, IBM, HP and Oracle Corporation.[4][5].
The CEO of Ptech Oussama Ziade appeared on different television shows in the USA and has been featured on the cover of several magazines. [6]. The company was once part of UML Partners, the consortium that was convened to develop standards for UML, the Unified Modeling Language.

Federal investigation

Ptech was brought to the front of the spotlight following the visit of law enforcement officials to its Headquarters in the middle of the night of December 5th 2002, under the operation of Operation Green Quest, a U.S. Customs Services unit charged with the investigation of alleged terrorist funding networks. The December raid brought a rush of media sources to Ptech's Boston headquarters[7] amid allegations of Ptech's involvement in terrorist financing. The U.S. Government continued to do business with Ptech. Former Ptech employees described Ptech as a company who encouraged diversity in the workplace and the sharing of individual cultures and traditions, with a culture of socially responsibility and environment protection support and attributed the media frenzy to the charged atmosphere after 9/11 terrorist attack.[8]
On July 15, 2009, the FBI unsealed indictments against former PTech CEO Oussama Ziade and former PTech CFO Buford George Peterson. Peterson was arrested at JFK Airport as he returned to the U.S. Ziade remains at large overseas. The indictments charge Ziade and Peterson with concealing PTech's relationship with and dealing in the assets of the Specially Designated Global Terrorist, Yasin al-Qadi.[9]

Notable clientele

Ptech's roster of clients included several governmental agencies, including the United States Armed Forces, NATO, Congress, the Department of Energy, the Department of Justice, the Federal Bureau of Investigation, Customs, the FAA, the IRS, the Secret Service, and the White House. Despite the eventual 2009 indictment of PTech's CEO and CFO on terrorism-related charges, as late as May 2004 they were still contracted by several federal agencies, including the White House.
Ptech had a security clearance to work on sensitive military projects dating to 1997.

Notable personnel


  1. ^ KMWorld: Breaking the knowledge barrier
  2. ^ Deloitte & Touche Fast 500: Technology Fast 50
  3. ^ Goliath: Business Knowledge on demand, Ptech Inc. named among 100 companies that matter for second year in a Row
  4. ^ Ptech Inc. Named Among 100 Companies That Matter for Second Year in a Row
  5. ^ Dossier on Content & Knowledge Management Systems, September 2003
  6. ^ Mass Impact: an official report on the aftermath of 9/11 on the state of Massachusetts, page 10
  7. ^ Mass High Tech: The Journal of New England Technology - August 22, 2003: Wrongly Suspected Ptech ...
  8. ^ Computerworld: Ptech workers tell the story behind the search, January 17, 2003
  9. ^ DOJ Press Release on PTech Indictments

External links

Ptech Inc. was a participant or observer in the following events:

1994: Ptech Founded with Support from Suspected Terrorism Financiers

[Image: 575_oussama_ziade2050081722-9993.jpg]Oussama Ziade. [Source: Beta Consulting]Ptech is founded in 1994 by Oussama Ziade, Hussein Ibrahim, and James Cerrato. Ziade came from Lebanon to study at Harvard University. As the Associated Press will describe it, Ptech’s “idea was to help complicated organizations like the military and large companies create a picture of how their assets—people and technology—work together. Then the software could show how little changes, like combining two departments, might affect the whole.” They raise $20 million to start the company. A number of Ptech employees and investors will later be suspected of having ties to groups that have been designated by the US as terrorist organizations: [CNN, 12/6/2002; Wall Street Journal, 12/6/2002; Associated Press, 1/3/2003]
[Image: childbullet.gif] Yassin al-Qadi, a Saudi multimillionaire. He will invest $5 million of Ptech’s start-up money. The US will declare him an al-Qaeda financier shortly after 9/11 (see October 12, 2001). In 1998, al-Qadi will come under investigation by FBI agent Robert Wright (see October 1998) for potential ties to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Al-Qadi is also a major investor in BMI Inc., an investment firm with connections to a remarkable number of suspected terrorist financiers (see 1986-October 1999). Al-Qadi later will claims that he sold his investment in Ptech in 1999, but there will be evidence he may continue to hold a financial stake after that year, and even after the US will officially declare him a terrorism financier (see 1999-After October 12, 2001). [Wall Street Journal, 12/6/2002; Washington Post, 12/7/2002; Associated Press, 1/3/2003]
[Image: childbullet.gif] Gamel Ahmed, Ptech’s comptroller in the mid-1990s. One al-Qadi loan Wright will investigate also involves Ahmed. [Associated Press, 1/3/2003]
[Image: childbullet.gif] Hussein Ibrahim, Ptech vice president and chief scientist. He also serves as vice president and then president of BMI from 1989 until 1995. He has no known direct terrorism finance connections, but it has been reported that al-Qadi brought Ibrahim into Ptech as his representative. [Wall Street Journal, 12/6/2002; WBZ 4 (Boston), 12/9/2002; Associated Press, 1/3/2003]
[Image: childbullet.gif] Soliman Biheiri. He is the head of BMI and a member of Ptech’s board. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. He will later be convicted for lying and immigration fraud (see June 15, 2003). [FrontPage Magazine, 6/17/2005]
[Image: childbullet.gif] Abdurahman Alamoudi. He is one of Ptech’s founders, as well as an investor in BMI. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Washington Post, 10/16/2004; FrontPage Magazine, 6/17/2005]
[Image: childbullet.gif] Muhammed Mubayyid and Suheil Laheir. Neither have any known direct ties to terrorism financing. However, both are longtime Ptech employees whom formerly worked for Care International, a Boston-based suspect Islamic charity (not to be confused with a large international charity having the same name). [Wall Street Journal, 12/6/2002] In 2005, Mubayyid will be charged with conspiring to defraud the US and making false statements to the FBI. Care International had previously been the Boston branch of the Al-Kifah Refugee Center (see [a0493kifahboston]]) and a recruitment office for Mektab al Khidmat (MAK), the precursor organization to al-Qaeda (see 1985-1989). Laheir, Ptech’s chief architect, wrote many articles in support of Islamic holy war. He frequently quoted Abdullah Azzam, bin Laden’s mentor. [Associated Press, 5/13/2005; FrontPage Magazine, 6/17/2005]
[Image: childbullet.gif] Yaqub Mirza. He is a Ptech investor and on a Ptech advisory board. He directs SAAR, a multi-million dollar network of companies and charities in Herndon, Virginia (see July 29, 1983). In March 2002, US investigators will raid the SAAR network for suspected terrorism ties (see March 20, 2002). In late 2002, the Wall Street Journal will report, “US officials privately say Mr. Mirza and his associates also have connections to al-Qaeda and to other entities officially listed by the US as sponsors of terrorism.” [Wall Street Journal, 12/6/2002; WBZ 4 (Boston), 12/9/2002; Associated Press, 1/3/2003]
[Image: childbullet.gif] BMI itself directly invests in Ptech. It also gives Ptech a founding loan, and leases Ptech much of its office and computer equipment. [Wall Street Journal, 12/6/2002; Associated Press, 1/3/2003] Ptech president Ziade and other Ptech employees will claim that all of their ties to suspected terrorist financiers are coincidental. By 2002, Ptech will have annual revenues of up to $10 million. [Wall Street Journal, 12/6/2002] Ptech’s potential ties to suspected terrorist financiers will be of particular concern because of its potential access to classified government information (see 1996-1997). [Wall Street Journal, 12/6/2002; Boston Globe, 12/7/2002] Joe Bergantino, a CBS journalist who will be the first to report on Ptech, will say of Ptech in 2002, “The worst-case scenario is that this is a situation where this was planned for a very long time to establish a company in this country and in the computer software business that would target federal agencies and gain access to key government data to essentially help terrorists launch another attack.” [National Public Radio, 12/8/2002]
Entity Tags: Oussama Ziade, Hussein Ibrahim, James Cerrato, Muhammed Mubayyid, Gamel Ahmed, Care International (Boston), Yassin al-Qadi, Al-Qaeda, Yacub Mirza, BMI Inc., Suheil Laheir, Abdurahman Alamoudi, Soliman Biheiri, Ptech Inc.
Timeline Tags: Complete 911 Timeline

1996-1997: Ptech Begins to Get US Government Contracts

[Image: 611_ptech_logo.jpg] Ptech logo. [Source: Ptech]Ptech is a Boston computer company connected to a number of individuals suspected of ties to officially designated terrorist organizations (see 1994). These alleged ties will be of particular concern because of Ptech’s potential access to classified government secrets. Ptech specializes in what is called enterprise architecture. It is the design and layout for an organization’s computer networks. John Zachman, considered the father of enterprise architecture, later will say that Ptech could collect crucial information from the organizations and agencies with which it works. “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.” Another computer expert will say, “The software they put on your system could be collecting every key stroke that you type while you are on the computer. It could be establishing a connection to the outside terrorist organization through all of your security measures.” [WBZ 4 (Boston), 12/9/2002] In late 1996, an article notes that Ptech is doing work for DARPA, a Defense Department agency responsible for developing new military technology. [Government Executive, 9/1/1996] In 1997, Ptech gains government approval to market its services to “all legislative, judicial, and executive branches of the federal government.” Beginning that year, Ptech will begin working for many government agencies, eventually including the White House, Congress, Army, Navy, Air Force, NATO, FAA, FBI, US Postal Service, Secret Service, the Naval Air Systems Command, IRS, and the nuclear-weapons program of the Department of Energy. For instance, Ptech will help build “the Military Information Architecture Framework, a software tool used by the Department of Defense to link data networks from various military computer systems and databases.” Ptech will be raided by US investigators in December 2002 (see December 5, 2002), but not shut down. [Wall Street Journal, 12/6/2002; CNN, 12/6/2002; Newsweek, 12/6/2002; Boston Globe, 12/7/2002] A former director of intelligence at the Department of Energy later will say he would not be surprised if an al-Qaeda front company managed to infiltrate the department’s nuclear programs. [Unlimited (Auckland), 12/9/2002] Ptech will continue to work with many of these agencies even after 9/11. After a Customs Department raid of Ptech’s offices in late 2002, their software will be declared safe of malicious code. But one article will note, “What no one knows at this point is how much sensitive government information Ptech gained access to while it worked in several government agencies.” [WBZ 4 (Boston), 12/9/2002]
Entity Tags: White House, US Department of Defense, US Department of the Air Force, US Department of the Navy, Secret Service, Federal Bureau of Investigation, Defense Advanced Research Projects Agency, US Postal Service, Federal Aviation Administration, US Department of the Marines, Internal Revenue Service, US Congress, Ptech Inc., John Zachman, North Atlantic Treaty Organization, US Congress
Timeline Tags: Complete 911 Timeline

April 1998: FBI Agent Stifles Investigation into Ptech Figures

[Image: 522_john_vincent2050081722-9834.jpg]John Vincent. [Source: Patriot TV]FBI agent Robert Wright will later recall that at this time, he is pleasantly surprised when FBI management provides his Vulgar Betrayal investigation with a 10 year veteran agent to assist with his efforts. According to Wright, the unnamed agent is assigned to “investigate a company and its 20-plus subsidiaries which were linked to a major financer of international terrorism.” However, Wright and fellow agent John Vincent will soon become dismayed when they realize the agent is not actually doing any work. He merely shuffles papers to look busy when people walk by. He will continue to do no work on this important assignment until the Vulgar Betrayal investigation is effectively shut down one year later (see August 3, 1999). Wright will claim in 2003, “The important assignment he was given involved both the founder and the financier of Ptech.” Presumably these could be references to Oussama Ziade, the president and chief founder of Ptech, and Yassin al-Qadi, apparently Ptech’s largest investor. [Federal News Service, 6/2/2003]
Entity Tags: Oussama Ziade, Yassin al-Qadi, Robert Wright, Vulgar Betrayal, Ptech Inc., Federal Bureau of Investigation, John Vincent
Timeline Tags: Complete 911 Timeline

1999-After October 12, 2001: Al-Qadi Continues to Fund Ptech

After a 2002 US government raid on the offices of Ptech, a Boston based computer company (see December 5, 2002), Ptech officials will downplay any connection between Ptech and Yassin al-Qadi, a multimillionaire suspected of financing groups that have been officially designated as terrorist organizations. For instance, Ptech vice president Joseph Johnson will say al-Qadi had no ties to the company but “may have had something to do with it [in 1994].” Al-Qadi was one of Ptech’s biggest initial investors in 1994, if not the biggest investor (see 1994). [Associated Press, 12/7/2002] However, there is considerable evidence al-Qadi is still involved in Ptech at least through 1999. Company insiders will later tell investigators that they were summoned to Saudi Arabia in 1999 to brief Saudi investors in Ptech. They are introduced to al-Qadi, who is described as an owner of Ptech. A photograph taken at this meeting shows al-Qadi with Ptech CEO Oussama Ziade and others. [WBZ 4 (Boston), 12/9/2002] Most media accounts say al-Qadi invested about $5 million in Ptech in 1994, one quarter of the company’s start-up money. But one account claims that al-Qadi invested an additional $9 million indirectly through BMI, the New Jersey-based investment firm with ties to several individuals suspected of financing Islamic militant groups (see 1986-October 1999). Swiss investigators also allege that al-Qadi transfers $2 million to Ptech between 1997 and 2000. [FrontPage Magazine, 6/17/2005] There are even allegations that al-Qadi continues to support Ptech after the US officially designates him a terrorist financier on October 12, 2001. In late 2002, CNN will report, “Sources said Ptech executives are believed to have been aware of al-Qadi’s suspected connections but did not sever their relationship with him.” [CNN, 12/6/2002] Al-Qadi will deny allegations that he had any interest in Ptech after 9/11. But in late 2002 al-Qadi’s lawyer will concede that it is possible an al-Qadi representative continued to sit on Ptech’s board after 9/11. [Newsweek, 12/6/2002]
Entity Tags: Oussama Ziade, BMI Inc., Yassin al-Qadi, Ptech Inc.
Timeline Tags: Complete 911 Timeline

Shortly After October 12, 2001: Software Company Whistleblowers Ignored

Yassin al-Qadi, a Saudi multimillionaire businessman, was officially declared a terrorist financier in October 2001 (see October 12, 2001). [Arab News, 9/26/2002] That same month, a number of employees at Ptech, a Boston-based computer company that al-Qadi and other individuals suspected of financing officially designated terrorist groups invested in (see 1994), tell the Boston FBI about the connections between Ptech and al-Qadi. However, FBI agents do little more than take their statements. A high-level government source later will claim the FBI does not convey the Ptech-al-Qadi link to Operation Greenquest, a Customs Department investigation into al-Qadi and other suspected financiers, and none of the government agencies using Ptech software are warned about the possible security threat Ptech represents. [Boston Globe, 12/7/2002; WBZ 4 (Boston), 12/9/2002] According to a private counterterrorism expert involved in investigating Ptech at the time, “Frighteningly, when an employee told [Ptech president Oussama Ziade] he felt he had to contact the FBI regarding al-Qadi’s involvement in the company, the president allegedly told him not to worry because Yaqub Mirza, who was on the board of directors of the company and was himself a target of a [Greenquest] terrorist financing raid in March 2002 (see March 20, 2002), had contacts high within the FBI.” [National Review, 5/27/2003] A Ptech investigation will finally begin in 2002 after more whistleblowers come forward (see May-December 5, 2002).
Entity Tags: US Customs Service, Yacub Mirza, Operation Greenquest, Yassin al-Qadi, Federal Bureau of Investigation, Ptech Inc., Oussama Ziade
Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After March 20, 2002-Early 2003: Customs and FBI Battle to Control Finance Investigations

[Image: 621_larry_thompson.jpg]Larry Thompson. [Source: White House]Serious tensions develop between the FBI and Operation Greenquest investigators in the wake of the Greenquest raid on the SAAR network in March 2002 (see After March 20, 2002). The Customs Department launched Greenquest, an investigation into the financing of al-Qaeda and similar groups, weeks after 9/11. In June 2002, the Washington Post will headline an article, “Infighting Slows Hunt for Hidden al-Qaeda Assets.” [Washington Post, 6/18/2002]
FBI Wants Control of Greenquest - With the creation of the new Department of Homeland Security (see November 25, 2002), the FBI and its parent agency the Justice Department are given a chance to gain total control over Operation Greenquest. Newsweek reports, “Internally, FBI officials have derided Greenquest agents as a bunch of ‘cowboys’ whose actions have undermined more important, long-range FBI investigations into terrorist financing.” Meanwhile: “The FBI-Justice move, pushed by [Justice Department] Criminal Division chief Michael Chertoff and Deputy Attorney General Larry Thompson, has enraged Homeland Security officials.… They accuse the [FBI] of sabotaging Greenquest investigations—by failing to turn over critical information to their agents—and trying to obscure a decade-long record of lethargy in which FBI offices failed to aggressively pursue terror-finance cases. ‘They [the FBI] won’t share anything with us,’ [says] a Homeland Security official. ‘Then they go to the White House and they accuse us of not sharing. If they can’t take it over, they want to kill it.’”
Derails Greenquest's Investigation into Firm with Terrorist Ties - This battle has a large effect on the investigation into Ptech, a Boston-based computer company with ties to suspected terrorist financiers. When Ptech whistleblowers approach the FBI, the FBI “apparently [does] little or nothing in response” (see Shortly After October 12, 2001 and May-December 5, 2002). Then Greenquest launches an investigation in Ptech, which culminates in a raid on the Ptech offices in December 2002 (see December 5, 2002). “After getting wind of the Greenquest probe, the FBI stepped in and unsuccessfully tried to take control of the case. The result, sources say, has been something of a train wreck.” [Newsweek, 4/9/2003]
Greenquest Based on Single FBI Agent's Investigations - Greenquest appears to have been heavily based on the pre-9/11 investigations of FBI agent Robert Wright. The New York Post will report in 2004: “After 9/11, Wright’s work was picked up by David Kane of the US Customs Service, who raided companies owned by [Yassin] al-Qadi, leading to al-Qadi’s designation as a ‘global terrorist’ and to money-laundering indictments of companies in Northern Virginia linked to al-Qadi and Soliman Biheiri (another Wright investigatee). The [Greenquest] indictments rely heavily on Wright’s work.” [New York Post, 7/14/2004]
FBI Will Win Battle for Greenquest - The FBI will eventually win the battle with Homeland Security and Customs, and Greenquest will cease to exist at the end of June 2003 (see May 13-June 30, 2003). [Newsweek, 4/9/2003]
Entity Tags: Operation Greenquest, Larry D. Thompson, Federal Bureau of Investigation, Michael Chertoff, Ptech Inc.
Timeline Tags: Complete 911 Timeline, 9/11 Timeline

May-December 5, 2002: US Investigators Pressed to Look Into Ptech

[Image: 545_indira_singh.jpg] Indira Singh. [Source: Michael Kane]In October 2001, Ptech insiders attempted to warn the FBI that suspected terrorist financier Yassin al-Qadi had funded Ptech (see Shortly After October 12, 2001). Then Indira Singh, an employee at JP Morgan Chase bank, develops her own suspicions about Ptech after her bank assigned her to investigate Ptech for a potential business deal. In May 2002, she speaks with the FBI about her concerns. Weeks later, she learns the FBI still has not told any other government agencies about the potential Ptech security threat. She later will recall, “the language, the kind of language law enforcement, counterterrorism, and the FBI agents themselves were using basically indicated to me that absolutely no investigation was going on, that it was totally at a standstill, at which point my hair stood on end.” She contacts a Boston CBS television station, WBZ-TV, and a reporter for the station named Joe Bergantino begins investigating Ptech. [Boston Globe, 12/7/2002; National Public Radio, 12/8/2002; WBZ 4 (Boston), 12/9/2002] Around the same time, a former government official with contacts in the Bush administration tells officials at the National Security Council about the Ptech allegations. By late August, Operation Greenquest then opens its own Ptech investigation. The FBI then tries “to muscle its way back into the probe once it [becomes] clear that [Greenquest is] taking the case seriously.” [Newsweek, 12/6/2002; WBZ 4 (Boston), 12/9/2002] Beginning in late November, US agents begin calling Ptech officials and asking them if they have ties to money laundering, thus tipping them off. Ptech will also be notified when a December raid will be occurring before it happens. [Associated Press, 1/3/2003] WBZ-TV prepared a story on Ptech, but withheld it from the public for more than three months after receiving “calls from federal law enforcement agencies, some at the highest levels.” The station claims the government launched its Ptech probe in August 2002, after they “got wind of our investigation” and “asked us to hold the story so they could come out and do their raid and look like they’re ahead of the game.” [Boston Globe, 12/7/2002; WBZ 4 (Boston), 12/9/2002]
Entity Tags: Operation Greenquest, Federal Bureau of Investigation, Ptech Inc., National Security Council, Indira Singh
Timeline Tags: Complete 911 Timeline, 9/11 Timeline

December 5, 2002: Software Company with Access to Government Secrets Raided

[Image: 186_ptech_raid2050081722-10041.jpg]FBI agents raid Ptech offices. [Source: ABC News]Federal agents search the offices of Ptech, Inc., a Boston computer software company, looking for evidence of links to Osama bin Laden. A senior Ptech official confirms that Yassin al-Qadi, one of 12 Saudi businessmen on a secret CIA list suspected of funneling millions of dollars to al-Qaeda, was an investor in the company, beginning in 1994. Ptech appears to have connections to other potential terrorist financiers (see 1994). In particular, there seem to be many ties between Ptech and BMI Inc., a New Jersey-based company whose list of investors has been called a “who’s who of designated terrorists and Islamic extremists” (see 1986-October 1999). [Newsweek, 12/6/2002; WBZ 4 (Boston), 12/9/2002] A former FBI counterterrorism official states, “For someone like [al-Qadi] to be involved in a capacity, in an organization, a company that has access to classified information, that has access to government open or classified computer systems, would be of grave concern.” [WBZ 4 (Boston), 12/9/2002] On the day after the raid, US authorities will claim that Ptech’s software has been scrutinized and poses no danger. But security expert John Pike comments, “When you look at all of the different military security agencies that they have as customers, it’s very difficult to imagine how they would not be encountering sensitive information, classified information.” [National Public Radio, 12/8/2002] The search into Ptech is part of Operation Greenquest, which has served 114 search warrants in the past 14 months involving suspected terrorist financing. Fifty arrests have been made and $27.4 million seized. [Forbes, 12/6/2002] However, the raid appears to have been largely for show. Ptech was notified by US officials in November that they were being investigated, and they were told in advance exactly when the raid would take place (see May-December 5, 2002). Top officials in the US government appear to have made up their minds before the results of the raid can even be examined. White House Press Secretary Ari Fleischer comments on the Ptech raid only hours after it ends: “The one thing I can share with you is that the products that were supplied by this company to the government all fell in the nonclassified area. None of it involved any classified products used by the government. The material has been reviewed by the appropriate government agencies, and they have detected absolutely nothing in their reports to the White House that would lead to any concern about any of the products purchased from this company.” [White House, 12/6/2002] The fact that the raid takes place at all appears to be due to the persistence of Operation Greenquest investigators, who are engaged at this time in a bureaucratic battle with other investigators over who will control US government investigations into terrorist financing (see After March 20, 2002-Early 2003). Greenquest will lose this battle early in 2003 and get shut down (see May 13-June 30, 2003). In his 2003 book Black Ice, author Dan Verton will call Ptech an “innocent” casualty of Operation Greenquest’s “scorched-earth” tactics. [Verton, 2003, pp. 223] No charges will be brought against Ptech, and the company will continue fulfilling sensitive government contracts under a new name (see May 14, 2004).
Entity Tags: Operation Greenquest, Federal Bureau of Investigation, Yassin al-Qadi, Central Intelligence Agency, Ari Fleischer, BMI Inc., Ptech Inc.
Timeline Tags: Complete 911 Timeline, 9/11 Timeline

May 14, 2004: Ptech Continues Business with US Government Under New Name

A newspaper article reveals that Ptech, the Boston-based computer company with ties to Yassin al-Qadi and other suspected terrorist financiers (see 1994), is still continuing its business under a different name. The article states, “Although no one associated with the company has been charged, the US attorney’s office has never issued a statement exonerating the company or ending the investigation.” Ptech is now called GoAgile. The company lost many customers in the wake of the widely-publicized raid on its offices in 2002 (see December 5, 2002). However, CEO Oussama Ziade states, “We still have government agencies as customers, including the White House.” [Patriot Ledger, 5/14/2004; FrontPage Magazine, 6/17/2005]
Entity Tags: Oussama Ziade, Ptech Inc.
Timeline Tags: Complete 911 Timeline

August 21, 2004: 9/11 Commission’s Terrorist Financing Conclusions at Odds with Media Accounts

The 9/11 Commission releases a report on terrorism financing. Its conclusions generally stand in complete contrast to a great body of material reported by the mainstream media, before and after this report. For instance, while the report does mention some terrorism-supporting organizations in great detail, such as the Global Relief Foundation or Al Barakaat, many seemingly important organizations are not mentioned a single time in either this report or the 9/11 Commission Final Report. The Commission fails to ever mention: BMI, Inc., Ptech, Al Taqwa Bank, Holy Land Foundation, InfoCom, International Islamic Relief Organization, Muslim World League, Muwafaq (Blessed Relief) Foundation, Quranic Literacy Institute, and the SAAR network or any entity within it. Additionally, important efforts to track terrorist financing such as Vulgar Betrayal and Operation Greenquest are not mentioned a single time. [9/11 Commission, 7/24/2004, pp. 61; 9/11 Commission, 8/21/2004, pp. 134-5 [Image: pdfbw.png]] Some select quotes from the report:
[Image: childbullet.gif] “While the drug trade was an important source of income for the Taliban before 9/11, it did not serve the same purpose for al-Qaeda. Although there is some fragmentary reporting alleging that bin Laden may have been an investor, or even had an operational role, in drug trafficking before 9/11, this intelligence cannot be substantiated and the sourcing is probably suspect.” Additionally, there is “no evidence of [al-Qaeda] drug funding after 9/11.” [9/11 Commission, 8/21/2004, pp. 22-23 [Image: pdfbw.png]]
[Image: childbullet.gif] “[C]ontrary to some public reports, we have not seen substantial evidence that al-Qaeda shares a fund-raising infrastructure in the United States with Hamas, Hezbollah, or Palestinian Islamic Jihad.” [9/11 Commission, 8/21/2004, pp. 24 [Image: pdfbw.png]]
[Image: childbullet.gif] “The United States is not, and has not been, a substantial source of al-Qaeda funding, but some funds raised in the United States may have made their way to al-Qaeda and its affiliated groups. A murky US network of jihadist (holy war) supporters has plainly provided funds to foreign mujaheddin with al-Qaeda links. Still, there is little hard evidence of substantial funds from the United States actually going to al-Qaeda. A CIA expert on al-Qaeda financing believes that any money coming out of the United States for al-Qaeda is ‘minuscule.’” [9/11 Commission, 8/21/2004, pp. 24 [Image: pdfbw.png]]
[Image: childbullet.gif] The notion “that bin Laden was a financier with a fortune of several hundred million dollars” is an “urban legend.” “[S]ome within the government continued to cite the $300 million figure well after 9/11, and the general public still [incorrectly] gives credence to the notion of a ‘multimillionaire bin Laden.’” [9/11 Commission, 8/21/2004, pp. 20, 34 [Image: pdfbw.png]] (A few months after this report, it will be reported that in 2000 over $250 million passed through a bank account jointly controlled by bin Laden and another man (see 2000).)
[Image: childbullet.gif] “To date, the US government has not been able to determine the origin of the money used for the 9/11 attacks.… Ultimately the question of the origin of the funds is of little practical significance.” [9/11 Commission, 8/21/2004, pp. 144 [Image: pdfbw.png]]
[Image: childbullet.gif] “The US intelligence community has attacked the problem [of terrorist funding] with imagination and vigor” since 9/11. [New York Times, 8/22/2004]
[Image: childbullet.gif] According to the New York Times, the report “largely exonerate[s] the Saudi government and its senior officials of long-standing accusations that they were involved in financing al-Qaeda terrorists.” [New York Times, 8/22/2004] Author Douglas Farah comments on the Commission’s report, “The biggest hole is the complete lack of attention to the role the Muslim Brotherhood has played in the financing of al-Qaeda and other radical Islamist groups. While the ties are extensive on a personal level, they also pervade the financial structure of al-Qaeda.… According to sources who provided classified briefing to the Commission staff, most of the information that was provided was ignored.… [T]he Commission staff simply did not include any information that was at odds with the official line of different agencies.” [Farah, 8/27/2004]
Entity Tags: Muwafaq Foundation, Vulgar Betrayal, Operation Greenquest, Osama bin Laden, Saudi Arabia, Quranic Literacy Institute, Palestinian Islamic Jihad, Muslim World League, SAAR Foundation, Muslim Brotherhood, Ptech Inc., InfoCom Corporation, Al-Qaeda, Al Taqwa Bank, 9/11 Commission, BMI Inc., Al Barakaat, Central Intelligence Agency, Douglas Farah, Holy Land Foundation for Relief and Development, International Islamic Relief Organization, Global Relief Foundation, Hamas
Timeline Tags: Complete 911 Timeline, 9/11 Timeline
PTECH, 9/11, and USA-SAUDI TERROR - Part I
PROMIS Connections to Cheney Control of
9/11 Attacks Confirmed

Jamey Hecht
With research assistance by Michael Kane
and editorial comment by Michael C. Ruppert
© Copyright 2005, From The Wilderness Publications, All Rights Reserved. This story may NOT be posted on any Internet web site without express written permission. Contact May be circulated, distributed or transmitted for non-profit purposes only.
FTW: You said at the 9/11 Citizens' Commission hearings, you mentioned - it's on page 139 of transcript - that Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Indira Singh: Yes, I have a good diagram for that.
FTW: And that relationship had been going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that the Secret Service is among the government entities that had a contract with Ptech. Mike Ruppert's thesis in Crossing the Rubicon, as you know, is that the software that was running information between FAA & NORAD was superseded by a parallel, subsuming, version of itself that was being run by the Secret Service on state of the art parallel equipment in the PEOC with a nucleus of Secret Service personnel around Cheney. In your view, might it have been the case that Cheney was using Ptech to surveil the function of the people in FAA & NORAD who wanted to do their jobs on 9/11, and then intervene to turn off the legitimate response?
Indira Singh: Is it possible from a software point of view? Absolutely it's possible. Did he (Cheney) have such a capability? I don't know. But that's the ideal risk scenario - to have an overarching view of what's going on in data. That's exactly what I wanted for JP Morgan. You know what's ironic about this - I wanted to take my operational risk blueprint which is for an operational event going wrong and I wanted to make it generic for extreme event risk to surveil across intelligence networks. What you're describing is something that I said, 'boy if we had this in place maybe 9/11 wouldn't have happened.' When I was going down to DARPA and getting these guys excited about creating an extreme event risk blueprint to do this, I'm thinking of doing exactly what you're saying Cheney might have already had!

*** I believe that Dick Cheney also had the ability using evolutions of the PROMIS software, to penetrate and override any other radar computer or communications system in the government.
- Mike Ruppert, in "Summation: Ladies and Gentlemen of the Jury," from Crossing The Rubicon, p.592
[Few have grasped the overall long-term significance of the saga of PROMIS software and what it has become. When I reported on it in October 2000, after meeting with and assisting members of the RCMP's National Security Staff I was aware that - in terms of secret technologies - PROMIS and its evolutions were the lynchpin of every new military, scientific and financial advance being pursued by the US government and corporate sector. PROMIS progeny have become the "operating system" underlying data management and data mining for every major technology under development in all arenas of technological advance from medicine, to finance, to surveillance, to battlefield Command, Control and Communications or C3.
In the long ordeal to secure a publisher for Crossing the Rubicon, my agent and I went through a number of publishers who expressed keen interest in the book. The problem was that almost every one we dealt with came back to us and said, "We'd like to publish the book but we need for you to remove certain things." By a great margin, it was our chapter on PROMIS and my many subsequent references to it that appeared to be public enemy number one for mainstream publishers (most owned by multi-national corporations).
By definition, PROMIS progeny are the backbone of a current DoD plan to develop a "Godlike" view of all human (or battlefield) activity from space. They are also inherently a part of the data processing being envisioned for advanced space weapons requiring machines to think as they share data in virtual real time. MIT in a recent scientific publication titled "Space Weapons: Crossing the US Rubicon"(a possible tip of the hat to my book) described a number of capabilities to which FTW referred in our October 2000 story on PROMIS, including a statement that space is "the ultimate high ground."
The MIT article also contains a reference to one of the greatest fears expressed by all who wonder what hidden technologies might be making the Neocons so brazen in their attempts at bullying the world into submission: "On the other hand, the prospect of weapons in orbit-poised to strike anywhere on the globe at any time-has elicited vigorous opposition, both in the United States and abroad."45 The Neocons have placed their faith in technologies we have only begun to evaluate and discuss, and this is an area needing much additional research by authentic journalists.
Iran is a much more industrialized and automated nation than the ruin and rubble of Iraq. What if Donald Rumsfeld believed that he could use computers through the Internet to turn off all of the power generating stations supplying Tehran? What if Dick Cheney could shut down all of the computerized pumping, pipeline, refining and chemical technology used to keep Iran's oil flowing to the rest of the world? This is how the American, British and Israeli elites (including corporations) think and how they plan.
All three countries have long, deep and continuous links to PROMIS software. As time passes it is beginning to appear that PROMIS is literally what made possible not only 9/11, but everything that has followed since and what is being planned.
Recently the New York Times published a story about how the US military was envisioning a costly new "Internet" in space to control all military operations worldwide, calling it a "God's-eye view" of battle. Called Global Information Grid or GIG, this new platform performs the exact functions we described in an FTW article more than four years ago. Then we were called delusional conspiracy theorists. Four years later we are shown to have been right on the money.
Giant, expensive technology programs like SDI and GIG are sometimes neither wasteful porkbarrels nor the actual instruments that are presented to the public; instead, they are some third thing nobody knows about. This is the way large black projects are funded.
Total Information Awareness or TIA, an Orwellian nightmare of data mining that uses PROMIS-evolved technologies and artificial intelligence, is now operating and able to incorporate vastly divergent data bases of personal information on private citizens from computer systems using different languages in near-real-time. Every bit of personal information from grocery shopping habits to driving records, credit reports, credit card transactions and medical records is now almost instantly accessible. Access will be expedited and broadened to local law enforcement agencies when what will become a national ID card comes into being. That will happen as driver's licenses are standardized nationwide (following the recent intelligence reform act) to include a simple UPC-like code that will allow approved agencies to get all of our data. The surveillance and intervention capabilities of PROMIS progeny can now be used to prohibit a credit card purchase or (soon) prevent someone from boarding a commercial aircraft. These capabilities could also be used to empty a private bank account or - when coupled with biometric face recognition technology - prevent you from making a withdrawal from your bank or even buying food.
In every one of these software applications there are two themes: machines that "talk" to each other and artificial intelligence. (Please see Crossing the Rubicon). As you will see below, these capabilities are now known to exist.
TIA has been renamed several times. We know that the first software was delivered to the Defense Advanced Research Projects Agency (DARPA) in 2003. Its latest nom de guerre is TIE or Trusted Information Environment. According to the San Francisco Chronicle last October TIE now allows the government to access private databases without a warrant. I go one step further to assert that TIE allows access to private databases without the knowledge of the database owners, provided only one condition exists: the database can be accessed through the internet.
And although the public face of TIA pretends that these technologies have not yet been applied, we are certain with the publication of this story that the same software the government needs is already in use by private corporations - the big ones - and we remind the reader that FTW's map of the world states that the government has been turned into a franchise operation of these corporations anyway. So where's the seam?
What the courageous and brilliant Indira Singh has to tell us is a matter of monumental importance. Based upon these new revelations which confirm what I suggested in Crossing the Rubicon every American and quite likely every citizen of an industrialized nation should assume that all of these technologies are operational today. A bit of breathing room is left as I conclude that they have not been sufficiently deployed yet to monitor all citizens in real time. My best assumption is that right now perhaps a million or so high-interest Americans are under constant surveillance; all by computer technology which has proven so accurate that it can detect suspicious movements just by correlating gasoline and food purchases with bank withdrawals and utility consumption. [--MCR]
FTW readers are aware that on the morning of 9/11 NORAD was engaged in multiple war games which drew fighter jets away from the doomed airliners, and polluted air traffic control screens with false information from the exercises. One of those injected blips was the so-called "phantom Flight 11," which appeared and persisted on control screens after the war games had been aborted.1 That would require exactly the kind of technology that Ptech (with whom Singh did business) and its partner Mitre had been providing to each of the three agencies involved: the FAA, NORAD, and - most significantly for Dick Cheney that morning - the Secret Service. In other words, one of the most central arguments in the Rubicon's case has just been independently validated. (See Part II)
In this electrifying timeline-driven report, Wall Street whistleblower Indira Singh lays out the connections between the providers of this advanced software (derived from the PROMIS software stolen from the Inslaw corporation in the 1980s by the US Justice Department and others) and the network of terrorist financing (sustained with US blessing) that has pervaded U.S covert operations for years. That deep-political relationship is at its strongest in the Bush administration, whose Saudi and Pakistani ties go back decades.
Dick Cheney, James Baker, GHWB, Dubya, and the people in and around the once and future American ruling junta have financially live links to the Muslim Brotherhood milieu that formed part of BCCI and, more recently, al Qaeda (this is also the context of a fascinatingly influential relationship among Kermit Roosevelt, GHWB, and Adnan Khashoggi). Nazis and their admirers are the third piece in the triangle, connected to Islamists since the Muslim Brotherhood's creation in 1928 by Hitler ally Hasam al-Banna, and connected to the Bush clan through decades of interdependence with American oil and intelligence elites - including the Rockefellers (Standard Oil) and the Harrimans (Brown Bros. Harriman / Kellogg Brown and Root / Halliburton).2
Viewed in this context, the Ptech story is a chilling reminder that this network is still in charge; that it facilitated the 9/11 attacks that murdered thousands and destroyed the health of thousands more; and that "our" American defenses against sabotage are woefully dependent upon the goodwill of saboteurs (both foreign and domestic). - JAH]

January 20, 2005, 0900 PST (FTW) - In 1995 Indira Singh started working on Wall Street (around the corner from the WTC) as a Senior Enterprise Architecture Consultant for JP Morgan. When the company was purchased by Chase Manhattan Bank in January 2001, Singh moved from enterprise architecture to a related part of Morgan's IT operations: the Operational Risk Management (ORM) group.3 ORM is the informational part of bank security, in which sophisticated software is engineered and deployed to detect malfeasance - especially money-laundering, rogue trading, and accounting fraud.4 Since the spectacular collapse of BCCI in 1991, a decade of bank failures had shown the terrible importance of such surveillance and intervention capability. At JP Morgan Chase, Singh worked on the next generation of risk software, whose function, according to Singh, was "to think about all the information going on throughout the enterprise as bank business was being conducted worldwide… If it spotted something, it would be able to react by notifying an intelligent agent or actually stop what was happening in real time."5
In the wrong hands, such a program could have disastrous political and financial implications. From The Wilderness has published several stories about PROMIS software, the robust datamining program whose theft by the Justice Department has occasioned decades of international legal and illegal maneuvering. PROMIS is also the subject of a chapter in Crossing The Rubicon, because it took on geopolitical importance when a group of criminals connected to US intelligence modified PROMIS and sold it to foreign intelligence agencies in multiple countries as far back as the early 80s. There, it acted as a back door through which intelligence agencies stole proprietary and national-security information from those countries and dumped it into US computers. That was before artificial intelligence. In the twenty years since PROMIS was developed, artificial intelligence (AI) has potentiated such datamining programs in astonishing ways.
Half of Crossing The Rubicon is about 9/11; the other half is about the surrounding system of deep political alliances, terrorism, narcotraffic, money laundering, bank fraud, and information technology (PROMIS) that made it possible. Following where her Ptech experience led, Singh came face to face with the monster behind a half-century of criminally funded rightwing militarism.
The Ptech story is a crucial piece of 9/11 because the software was used to simultaneously coordinate the FAA with NORAD and the Secret Service. But it transcends 9/11 because that terror attack is continuous with preceding decades of violent Islamic extremism epitomized in the international Muslim Brotherhood, of which al Qaeda is only one, relatively recent, incarnation.6 Worse, the Muslim Brotherhood has from its first days been linked to the Nazi party and its Swiss neo-Nazi epigones.7 Anti-Soviet projects of the CIA and the Pentagon (from 11-22-63 to the Afghan War) have long been recognized as continuous with the absorption of Nazi SS personnel into what became the CIA.8 The connection of the Bush crime family to the political economy of the Nazi movement is familiar from the excellent work of former Justice Department Nazi war crimes prosecutor John Loftus and others.9 Its triangulation with the Bush-Saudi alliance forms a powerful explanatory paradigm - one to which FTW will be paying further attention in the sequel to this story.
The following timeline is a red thread running through the larger fabric of contemporary Rightist attacks on democracy and the rule of law. Global in scope, this milieu transcends the boundaries of nation-states just as banks and multinational corporations do; it transcends the boundaries of religions as does the conceptual purview of what is universally recognized as "fundamentalism"; and it comprehends the wide range of projects that unite every domestic political assassination in America from RFK to the latest "suicided" Enemy of the State. Such a tapestry cannot hang on the single nail of an article like this one, but if we are to understand this "warthatwillnotendinourlifetimes," we need to pick up the hammer. With the Rubicon behind us and Indira Singh at our side, we begin with her experience.
  • 1985. Egyptian banker Soliman Biheiri is introduced to members of the Muslim Brotherhood.10

  • March 19, 1986. The articles of incorporation for BMI, Inc. show that Soliman Biheiri forms Islamic investing firm Bait ul-Mal, Inc. (BMI). His partner in that venture is Hussein Ibrahim, BMI's Vice President from 1989 to 1995 and later chief scientist at Ptech.

  • 1988. Makhtab al-Khidamat (MAK) is installed as the CIA accounting mechanism through which ISI / BCCI money moves to the Pakistani Mujaheddin. In False Profits: The Inside Story of BCCI, the World's Most Corrupt Financial Empire, Peter Truell and Larry Gurwin document the close relationship between BCCI's founder Agha Hasan Abedi, and then-CIA Director William Casey. Control of the proliferating MAK recruitment centers and training camps shifted to bin Laden when Azzam was murdered, apparently on bin Laden's orders.

  • 1992. FBI agent Robert Wright begins his investigation of terrorism financing and Yassin al-Qadi.

  • 1993. WTC bombing is funded in part by BMI, the BCCI-linked shell company that includes Ptech.

  • 1995-2000. Indira Singh is Senior Enterprise Architecture Consultant at JP Morgan.

  • April 19, 1995. The Murrah Federal Building USG complex in Oklahoma City is bombed.11

  • September 1996. Ptech already working with DoD's research group, DARPA: "Ptech, based in Cambridge, Mass., offers an integrated set of object-oriented tools that enable users to create interactive blueprints of business processes. Software code can be generated from the hierarchical layout, providing rapid and consistent application development. The [Defense] Advanced Research Projects Agency is using [Ptech's program called] Framework to help transfer commercial software methodologies to the defense sector."

  • 1998. Yassin Al-Qadi contributes $14 million to Ptech, becoming its major investor. "Those involved in this deal from Ptech Senior Management were; Mr. Oussama Ziade (CEO); Mr. Jeff Goins (VP Marketing); and Mr. Ulf Fagerquist (Technical Adviser). Also present was a key value-added reseller of Ptech software in the business architecture space that complements technology architectures, Mr. Roger Burlton. This meeting took place in Jeddah at the offices of Mr. Al Qadi, and other locations." - Indira Singh, Advisory Report on Ptech (see August 2002, below).

  • August 7, 1998. "Terrorists bomb the US embassies in Kenya and Tanzania. The bomb in Nairobi, Kenya kills 213 people, including 12 US nationals, and injures more than 4,500. The bomb in Dar es Salaam kills 11 and injures 85. The attack is blamed on al-Qaeda." - Paul Thompson, 911 Timeline.

  • October 1998. "FBI agents Robert Wright and John Vincent are tracking a terrorist cell in Chicago, but are told to simply follow suspects around town and file reports. The two agents believe some of the money used to finance the 1998 US embassy bombings (see August 7, 1998) leads back to Chicago and Saudi multimillionaire businessman Yassin al-Qadi. Supervisors try, but temporarily fail, to halt the investigation into al-Qadi's possible terrorist connections... a supervisor prohibits Wright and Vincent from making any arrests connected to the bombings, or opening new criminal investigations." - Paul Thompson, 911 Timeline. That supervisor - named in Crossing the Rubicon - is Supervisory Special Agent David Frasca.

  • 2000. Seeing the limitations of existing risk management software, Indira Singh begins to design a new, more agile program - an extremely adaptable enterprise architecture blueprint which, when integrated with sufficient AI, has applications far beyond JP Morgan's banking practices. These include Defense and Intelligence. Traditional enterprise architecture (e.g., Popkin Software) creates models; Singh wants to create a living, flexible surveillance and intervention system that can monitor an enterprise from within while coordinating it with the event risks of the changing outside world. That requires a core AI software component called an "inference engine."12

  • January 2001. Chase Manhattan Bank buys JP Morgan. Indira Singh moves to Operational Risk Management group within Morgan. While developing a risk blueprint program for JP Morgan, she presents the blueprint programming idea to Interoperability Clearing House, a DARPA-funded think tank for software R&D.13 Interested potential clients include CIA, through In-Q-tel14; JP Morgan itself; and, after 9/11, persons at Dowling College's School of Aviation who have probable access to DHS funds.

  • Aug. 28, 2001. Ptech CFO George Peterson Adds COO Role; Jeff Goins is promoted to General Manager, Europe; Blake Bisson joins Ptech as Vice President of Sales. Fagerquist and Goins are allegedly affiliated with a longstanding and politically potent Christian secret society called "The Fellowship" - with which Dick Cheney, John Ashcroft15 and other high US government officials16 are also affiliated. Wayne Madsen has established the involvement of the Fellowship in the rigging of the 2004 presidential election in the United States, and has linked Dick Cheney to that organization.17

  • SEPTEMBER 11, 2001

  • September 12, 2001. In-Q-Tel, the CIA's IT-seeking arm is holding funding hearings. Backed by Interoperability Clearing House, Indira Singh presents the "Blue Prophet" risk blueprint.18 When In-Q-Tel / CIA declines funding, Singh goes on to shop for an inference engine core and for funding.

  • October 2001. In the wake of traumatizing experience on 9/11 - as a civilian EMT at Ground Zero, as a career employee in the World Trade Center, and as a resident of the neighborhood - Singh's focus on "extreme event risk" is intensified. Decides ICH are "techies" who don't really understand risk. "There was a Risk technology conference on the [WTC] 106th floor on 9/11 that my team was supposed to be at... as you can imagine that wouldn't be one for my group to miss, yet we did because I was late and had spent the previous week in DC focusing on In-Q-Tel and Blue Prophet. If I had been more focused on JPM and NY the prior week, who knows... there was free breakfast and it was Windows on the World."

  • October 12, 2001. Yassin Al-Qadi is listed as a Specially Designated Global Terrorist. "The Treasury Department Press Release issued on the date of Yassin Qadi's designation as an SDGT…states that Qadi was named an SDGT on the basis that he and other well-connected Saudi citizens transferred millions of dollars to Osama bin Laden through charities and trusts like the Muwafaq Foundation… [of which] Qadi was a trustee." - Affidavit of David C. Kane, Senior Special Agent, Bureau of Immigration and Customs Enforcement. August 14, 2003.

  • December 2001. Roger Burlton and others recommend Ptech to Indira.

  • March 20, 2002. Under Operation Greenquest, Federal agents raid approximately 100 companies and charities operating in a single office at 555 Grove Street in Herndon, Virginia, taking hundreds of boxes of documents. Yaqub Mirza, a member of the Ptech board of directors, is a central target.19 In a major story in the conservative Weekly Standard (04/08/2002, Volume 007, Issue 29), "Wahhabis in the Old Dominion: What the federal raids in Northern Virginia uncovered," Stephen Schwartz writes:
    The keystone of the Saudi-sponsored Northern Virginia network is the Saar Foundation, created by Suleiman Abdul Al-Aziz al-Rajhi, a scion of one of the richest Saudi families. The Saar Foundation is connected to Al-Taqwa, a shell company formerly based in Switzerland, where its leading figures included a notorious neo-Nazi and Islamist, Ahmed Huber. Subsequently moved to the United States, Al-Taqwa was shut down after September 11 and its assets frozen by U.S. presidential order. But operations continued, as the Wahhabi lobby shifted to its backup institutions here. Saar has also been linked to Khalid bin Mahfouz, former lead financial adviser to the Saudi royal family and ex-head of the National Commercial Bank of Saudi Arabia. Mahfouz has been named by French intelligence as a backer of Osama bin Laden; Mahfouz endowed the Muwafaq Foundation, which U.S. authorities confirm was an arm of bin Laden's terror organization. Muwafaq's former chief, Yassin al-Qadi, oversaw the financial penetration of Bosnia-Herzegovina and Albania by Wahhabi terrorists in the late 1990s.

    "Men like al-Rajhi, Mahfouz, and al-Qadi are the big players in the financing of Islamic extremism. And their paths repeatedly lead back to Northern Virginia. They don't play for small stakes: Saar received $1.7 billion in donations in 1998, although this was left out of the foundation's tax filings until 2000."
  • March 2002. "Searches by FBI agents and Bosnian police in Sarajevo uncover numerous handwritten Arabic documents detailing the origin and history of the al Qaida organization. Among the recovered files is a copy of a 1988 handwritten draft listing wealthy financiers of Osama bin Laden's mujaheddin operations in Afghanistan, referred to within al Qaida as the "Golden Chain." This list contains 20 names with a parenthetical after each name, likely indicating the person who received funds from the specified donor. "Osama" appears after seven of the listings. While Ptech President Yassin al Qadi does not appear on this list, he has ties to the listed Yussef Nada20 and Golden Chain businessmen. He invested millions of dollars in BMI and funded a Turkish firm run by senior al Qaeda figures."

  • April 28- May 2, 2002. In a private meeting at a conference in San Antonio, Texas,21 industry leader Dr. John Zachman suggests Singh use Ptech, citing their relationship to IBM, a strategic partner of JP Morgan Chase.

  • May 2002. Dr. Hussein Ibrahim, co-founder of BMI and Ptech's chief scientist, and a delegation of other Ptech personnel come to JP Morgan at Singh's invitation, to demonstrate why Singh's blueprint project should buy Ptech software for its inference engine core. But the Ptech delegation has come to the Morgan offices unprepared, and they behave strangely: Singh's suspicions are aroused when Ibrahim offers to demonstrate the software on his laptop, using proprietary JP Morgan data. This would have compromised JPM information security and is entirely outside industry protocols ("a show-stopper"). In an adjoining room, Singh calls Roger Burlton, who runs Business Process Renewal in Vancouver. He tells her, "Don't let them out of your sight and don't let them leave with anything." Burlton recommends that she speak with Jeff Goins, a former Ptech employee. Goins informs Singh that Saudi terror financier Yassin Al Qadi is an investor in Ptech. Al Qadi claims to have met Dick Cheney in Jeddah before he became vice president, and that they still maintain "cordial relations." Singh confirms that Goins had taken his concerns to an FBI agent, and arranges to speak with that agent.

  • May 30, 2002. Agent Robert Wright of the Chicago FBI holds a press conference on the steps of the Capital and bursts into tears apologizing to the 9/11 families. Wright says his ten-year investigation into terrorism financing by Yassin Al-Qadi - whom he called bin Laden's banker - had been repeatedly shut down, that he had been censured for pushing it, and that if he had been able to continue and shut down the funding to al Qaeda, 9/11 would not have happened.

  • June 2002. Indira Singh is dismissed from JP Morgan.

  • June 2002. FBI validates everything Singh has said about Ptech, and passes her a copy of a news segment on Ptech by Joe Bergantino of WBZ TV, a CBS affiliate in Boston, which is set to air on September 11, 2002. Toward the end of his investigation, Bergantino contacts Rita Katz of the SITE Institute to validate some information. A former colleague of Katz notifies the White House that Bergantino's program will break the Ptech story.22

  • August, 2002. The White House intervenes to quash the story, and it never airs. Singh and Bergantino suspect that Jeff Goins, a Ptech vendor, makes a deal with Osama Ziade around this time. Goins handles an active White House account with Ptech, and he, too, alerts the WH about the story. Singh learns that the WH prevented several other journalists from going ahead with the Ptech story, including ABC's Brian Ross and John Miller,23 and NBC's Lisa Myers.24 Singh writes an Advisory Report on Ptech and, acting on information from Jeff Goins, she advises GHWB in that report that there is a related threat on President GWB's life.

  • September 2002. Singh delivers her report to GHWB. The persons of interest at Ptech remove their files and leave.

  • November 2002. Still no raid. Singh threatens to send her report to ten Chief Intelligence Officers per month until something is done (i.e., until Ptech is raided). She begins by personally bringing the Ptech story to Charlie Lewis, a Chief Technology Architect for Air Products and Chemicals (a powerful company which had earned over 5.7 billion dollars in sales during 2000); to the CIO of Gartner (a major enterprise architecture / IT firm); to the CIO of the U.S. Department of Defense; and to John Osterholz, DOD Director of Architecture and Interoperability.

  • December 6, 2002. Ptech is raided by Operation Greenquest, but the White House announces that Ptech is clean - on the very day of the raid: "The material has been reviewed by the appropriate government agencies, and they have detected absolutely nothing in their reports to the White House that would lead to any concern about any of the products purchased from (Ptech)."

  • April 2003. Singh is debriefed at the National Threat Assessment Center (CERT).
From Wall Street to the Wilderness
Early in the game, as the shady background of Ptech began to emerge, Indira Singh came to a point of decision. Should she go forward with Ptech's product, or reject the company? Were the allegations about Ptech serious, or were they disinformation from competitors engaged in commerce interference? She sought out the FBI agent to whom Jeff Goins had spoken. He sent her a video documentary produced by Joe Bergantino for WBZ TV, a CBS affiliate in Boston, about an Islamist charity called CARE International.
"The people in the video that the FBI were looking for right after 9/11 were Ptech employees: Muhammed Mubayyid and Suheil Laher, who had also worked for CARE International. But this was not the Care International everyone knows. This CARE listed its corporate office in the same suite as Al Khifah's Boston office25 - whose more famous location was the Al-Khifah Refugee Centre in Brooklyn's Atlantic Avenue, where mujaheddin recruits were processed for the CIA's Afghani "Operation Cyclone." It was later named as the locus of the 1993 conspiracy to bomb the World Trade Center.26 Muhammed Mubayyid, a Ptech employee and former treasurer of CARE, has donated money to Al Khifah's Brooklyn office.
Recall the notorious intransigence of the FBI in the 1993 WTC case - using Egyptian informant Emad Salem, the Bureau had successfully infiltrated the terrorist cell responsible for the bombing and secretly recorded myriad hours of the cell's planning discussions. It has never given a satisfactory account of its failure to act on that abundant advance information. As documented in Crossing The Rubicon, the same deeply disturbing obstructionism pervades the behavior of middle and high officials in the FBI's before and after 9/11/01.
This is the same FBI.
Indira took Joe Bergantino's video report down to Virginia and interviewed Ptech employees herself. Having confirmed fears, she demanded the FBI agent who gave her Bergantino's report re-open an investigation into Ptech. He said he couldn't. She told him to tell his supervisor. He already had, and was told there was nothing they could do. The FBI was one of Ptech's clients.
Her next stop was Mark Coughlin, the Chief Information Officer (CIO) at JP Morgan Chase. His particular position equipped him to understand the kind of damage the firm might suffer if it were to adopt a malicious program with Ptech's computational power. Moved and alarmed, Coughlin called Security, the General Auditor, and the CEO.
They contacted the FBI - at a very high level - who validated all of Indira Singh's claims about Ptech.
Coughlin was shaken. He sent her to William Moran, the General Auditor, who refused to meet with her until she had been debriefed by his security people. "They treated me like I was crazy, like I was the terrorist." And when the meeting finally happened, it was an Orwellian horror show. He asked where she had gotten her information, and as she named her individual sources Moran answered each name the same way, over and over: "That person should be killed... that person should be killed… that person should be killed."27
Hateful words, motivated by a terrible fear of the truth.
CODA: Knowledge is Power
The computational power of the Ptech evolution of PROMIS software represents of a daunting new surveillance-and-intervention capability in the hands of the same elites who planned 9/11, prosecute the subsequent resource wars, and are presiding over what may become a full economic and military disaster for the resource-consuming citizens of America and the world. Since the "War On Terror" and this coming dollar / natural gas collapse will necessitate new levels of domestic repression, this is just the capability those elites require. Ptech is Total Information Awareness.
It combines datamining, artificial intelligence, and "interoperability," the capacity for one program to read, operate, and modify the source codes of other programs. Datamining is a technique for detecting and extracting meaningful patterns hidden within vast quantities of apparently meaningless data. Applications include policing and case management (where PROMIS -- Prosecutor's Management Information System began), aviation (Mitre), banking and risk management (JP Morgan), enterprise architecture and knowledge management (Popkin), the gathering and sifting of political and industrial intelligence information (FBI, RCMP, et al.), and a wide range of military applications (NORAD, Navy, etc.).
Programs based on datamining are powerful analytical tools; finding meaningful patterns in an ocean of information is very useful. But when such a tool is driven by a high-caliber artificial intelligence core, its power gets spooky. The datamining capability becomes a smart search tool of the AI program, and the system begins to learn.
In recent decades, great strides have been made by the mutually fertile disciplines of mathematics, computer science, and neuroscience. Among the results has been a new discipline called cognitive neuroscience, which constitutes a powerful new understanding of the way the human brain works (see Churchland, Gazzaniga, etc.) While this has illuminated some very fundamental and grand issues of philosophy, it also has applications so practical that they have reshaped our world. "Neural Network" programming is modeled on the computational techniques used by the human brain - an electrochemical computer that uses neurons instead of semiconductors; the firing or non-firing of neurons instead of ones and zeros.
With neural networking, software has become much smarter than it had been. Now it can perform multiple, related operations at the same time through parallel processing; now it can learn from setbacks, and use genetic algorithms to evolve its way out of limitations. Now it can respond to more kinds of data from the electronic environment, including "fuzzy" values that don't come in discreet numerical packages. This kind of computational power supports an inference engine that can digest the mined data into results that are not only descriptive of the system's present state but predictive for imminent and, to some degree, even middle-term outcomes. That's why the same family of programs that does enterprise architecture, which is descriptive (and prescriptive if you take its descriptions as a mandate for cutting costs by firing people - "process management"), comes to include risk management software, which is predictive of the future. It extrapolates from current trends in a more than quantitative way.
Conventional electronic surveillance finds patterns in the data of other instruments; Ptech's Framework can exploit the patterns it detects and extrapolate future probabilities. Then it can integrate itself with the computers from which it's getting the information and intervene in their functioning. The result is a tool for surveillance and intervention. The program can identify suspect streams of cash in a banking network and allow a bank officer to freeze the suspect assets. Of course, a user could direct the same program to prevent detection. It can discover salient anomalies in a person's movements through a city and either flag those anomalies for further scrutiny, or erase them from the record. And it can find errant flights in an air traffic map and initiate an intercept response. Or not.
Additional Reading on PROMIS and Its Evolutions:
1 Crossing the Rubicon, p. 444 (quoting from Air War Over America, p. 59): "Could Deskins and her colleagues have been confused by one of the radar injects left in place by the maestro? A subsequent statement by General Arnold suggests that at least some of the exercises continued to run well into the attacks. United Airlines Flight 175 crashed into the South Tower of the World Trade Center at 9:03 AM with 65 people aboard. Two 767s were gone, and it was anyone's guess what might happen next. "I thought it might be prudent to pull out of the exercise [Vigilant Guardian] which we did." Arnold says. "We called NORAD, and they were well aware of what had happened obviously. … As we pulled out of the exercise we were getting calls about United Flight 93 and we were worried about that." Here Arnold states that Vigilant Guardian was not terminated until about the same time that the first reports of Flight 93's hijacking, which we have already established occurred at around 9:16 or 54 minutes after it had been known that Flight 11 was a hijack. Why did it take so long?"

What this all means is that, according to all official accounts, we have the exercises called off by 9:16 - well before 9:25 when "Phantom Flight 11" comes on the scene [-MK].
2 Glenn R. Simpson, "U.S. Tries to Tie Maze of Firms, Charities Based in Herndon Into a Global Network: Bin Laden's 'Golden Chain'" The Wall Street Journal, June 21, 2004 ; Page A1.
3 FTW interview with Indira Singh. She worked for Peter Cerenita & Mark Coughlin under Martha Gallo on the Morgan side of the newly merged organization. For Gallo, see:
5 See FTW, May 16, 2002, "The Lie Won't Stand," by Michael C. Ruppert.
"To quote 60 Minutes from Sept. 19,'Sources tell CBS News that the afternoon before the attack, alarm bells were sounding over unusual trading in the U.S. stock options market.'" Those "alarm bells" were part of this software. The irony of ultra-sophisticated software is that whatever it is equipped to protect, it is also equipped to sabotage; everything depends on the intentions of the user. Note that one of the earliest and most potent articles on 9/11 insider trading was the September 19, 2001 "Black Tuesday: The World's Largest Insider Trading Scam?" by Don Radlauer, a consultant at the International Policy Institute for Counter-Terrorism in Herzliya, Israel.
6 National Commission On Terrorist Attacks Upon The United States. Public Hearing
Wednesday, July 9, 2003. 253 Russell Senate Office Building, Washington, DC
Panel 1: Terrorism, Al Qaeda, And The Muslim World. Testimony of Dr. Mamoun Fandy: "Prince Nayef of Saudi Arabia finally admitted that the Muslim Brotherhood is the mother of all problems in the Arab world. And Saudi Arabia hosted the Muslim Brotherhood during the Arab Cold War that was between Nasser and King Faisal in the '70s. And, in fact, the Muslim Brotherhood, one can argue that they hijacked the total educational Saudi system and turned it around to produce what we know as al Qaeda. The Muslim Brotherhood was the first Islamic organization with global reach, in fact. With its headquarters now next to CENTCOM in Qatar, under Sheikh Qaradawi, practically the Muslim Brotherhood has global reach. It has offices in Germany. It has offices in Virginia next door. It has offices in Yemen and other places. So unless we really consider the Muslim Brotherhood as part of that larger network, we fail to understand this whole organization. The Muslim Brotherhood is responsible for the civil war in Algeria, responsible for its civil war in Yemen, and responsible for the current situation that we see in Egypt and in Saudi Arabia."
7 See Marc Erikson, "Islamism, fascism and terrorism (Part 2 of 3)," Asia Times, November 5, 2002: "During the 1936-39 Arab Revolt, Admiral Wilhelm Canaris, head of German military intelligence, sent agents and money to support the Palestine uprising against the British, as did Muslim Brotherhood founder and "supreme guide" Hassan al-Banna. A key individual in the fascist-Islamist nexus and go-between for the Nazis and al-Banna became the Grand Mufti of Jerusalem, Haj Amin el-Husseini - incidentally the later mentor (from 1946 onward) of a young firebrand by the name of Yasser Arafat.
"Having fled from Palestine to Iraq, el-Husseini assisted there in the short-lived April 1941 Nazi-inspired and financed anti-British coup. By June 1941, British forces had reasserted control in Baghdad and the mufti was on the run again, this time via Tehran and Rome to Berlin, to a hero's welcome. He remained in Germany as an honored guest and valuable intelligence and propaganda asset through most of the war, met with Hitler on several occasions, and personally recruited leading members of the Bosnian-Muslim "Hanjar" (saber) division of the Waffen SS.
"Another valued World War II Nazi collaborator was Youssef Nada, current board chairman of al-Taqwa (Nada Management), the Lugano, Switzerland, Liechtenstein, and Bahamas-based financial services outfit accused by the US Treasury Department of money laundering for and financing of Osama bin Laden's al-Qaeda."
For links between Ptech's board member Yassin al Qadi, Soliman Biheiri, and al Taqwa / Nada, see Glenn R. Simpson, "U.S. Tries to Tie Maze of Firms, Charities Based in Herndon Into a Global Network; Bin Laden's 'Golden Chain,' Wall Street Journal, June 21, 2004.; John Loftus, "The Muslim Brotherhood, Nazis and Al-Qaeda," Jewish Community News, October 4, 2004:; Marc Perelman,
"Terror Fund Trail Leads To Alpine Kingdom," Forward, October 17, 2003:
8 "For excellent published works on the CIA/Nazi connection read: Trading With The Enemy by Charles Higham; The Secret War Against the Jews by Loftus and Arrons; Blowback by Christopher Simpson." From Robert Lederman, "CIA Admits Nazi Connection," September 23, 2000:
9 John Buchanan and Stacey Michael, "Bush - Nazi Dealings Continued Until 1951 - Federal Documents," The New Hampshire Gazette Vol. 248, No. 3, November 7, 2003: "After the seizures in late 1942 of five U.S. enterprises he managed on behalf of Nazi industrialist Fritz Thyssen, Prescott Bush, the grandfather of President George W. Bush, failed to divest himself of more than a dozen "enemy national" relationships that continued until as late as 1951, newly-discovered U.S. government documents reveal.
Furthermore, the records show that Bush and his colleagues routinely attempted to conceal their activities from government investigators.
Bush's partners in the secret web of Thyssen-controlled ventures included former New York Governor W. Averell Harriman and his younger brother, E. Roland Harriman. Their quarter-century of Nazi financial transactions, from 1924-1951, were conducted by the New York private banking firm, Brown Brothers Harriman.
The White House did not return phone calls seeking comment.
Although the additional seizures under the Trading with the Enemy Act did not take place until after the war, documents from The National Archives and Library of Congress confirm that Bush and his partners continued their Nazi dealings unabated."
10 Stephen Schwartz, "Wahhabis in the Old Dominion: What the federal raids in Northern Virginia uncovered," Weekly Standard 04/08/2002, Volume 007, Issue 29
[EXCERPT: ] The keystone of the Saudi-sponsored Northern Virginia network is the Saar Foundation, created by Suleiman Abdul Al-Aziz al-Rajhi, a scion of one of the richest Saudi families. The Saar Foundation is connected to Al-Taqwa, a shell company formerly based in Switzerland, where its leading figures included a notorious neo-Nazi and Islamist, Ahmed Huber. Subsequently moved to the United States, Al-Taqwa was shut down after September 11 and its assets frozen by U.S. presidential order. But operations continued, as the Wahhabi lobby shifted to its backup institutions here.
Saar has also been linked to Khalid bin Mahfouz, former lead financial adviser to the Saudi royal family and ex-head of the National Commercial Bank of Saudi Arabia. Mahfouz has been named by French intelligence as a backer of Osama bin Laden; Mahfouz endowed the Muwafaq Foundation, which U.S. authorities confirm was an arm of bin Laden's terror organization. Muwafaq's former chief, Yassin al-Qadi, oversaw the financial penetration of Bosnia-Herzegovina and Albania by Wahhabi terrorists in the late 1990s.
A major personality on the ground in Virginia is an individual named Jamal Barzinji, whose office in Herndon was a major target of the raids. In 1980, he was listed in local public records as a representative of the World Assembly of Muslim Youth (WAMY), an arm of the Saudi regime with offices in Virginia. WAMY has been deeply involved in providing cover for Wahhabi terrorism. The 2002 entry in the U.S. Business Directory lists the president of the WAMY office in Annandale, Va., as Abdula bin Laden--the terrorist's younger brother.
Barzinji serves as a trustee and officer of the Amana Mutual Funds Trust, a growth and income mutual fund headquartered in Bellingham, Wash., conveniently near the Canadian border. Amana's board also includes Yaqub Mirza, a Pakistani physicist who shares Barzinji's Herndon office address and who is widely described as a financial genius. Another board member and tenant in the Herndon office is Samir Salah. He formerly ran a branch of Al-Taqwa in the Caribbean, heads a financial firm linked to Saar, and directs Dar al-Hijra, a mosque in Falls Church, Va., notable for hardline Wahhabi preaching. Salah is also deeply involved with Taibah International Aid Association, a Virginia charity with a Bosnian branch that is being investigated by authorities in Sarajevo.
11 "Another exhibit from the defense motion is an affidavit filed by Edwin Angeles, a founder of Abu Sayyaf, a Filipino terrorist group. Angeles, who was assassinated by former comrades, wrote in 1996 that he was at a 1991 meeting in Davao City, attended by Yousef, Murad and Nichols, at which, they discussed 'bombing activities, providing firearms and ammo' to terrorists and 'training in bomb making and handling' of explosives. Nichols, he claimed, was introduced to him as 'the farmer.'"
12 For a definition of and information about inference engines, see:;;
13 For DARPA's letter of appreciation to ICH, see:
14 For In-Q-Tel, see Rick E. Yannuzzi, "In-Q-Tel: A New Partnership Between the CIA and the Private Sector," Defense Intelligence Journal, Volume 9 Number 1 Winter 2000. "Yannuzzi was Senior Deputy National Intelligence Officer for Strategic and Nuclear Programs in the National Intelligence Council (NIC). He previously was a member of the CIA's Enterprise - i.e., In-Q-Tel - Start-Up Team and served as its first Director of Business Operations. Mr. Yannuzzi also served as the DCI's Executive Secretary [and] DCI Representative to the White House Science Office."
15 "As for the Bush connection, there is Ashcroft. I [Jeffrey Sharlet] discovered in their archives a correspondence between Ashcroft and Coe that began in 1981." Anthony Lappé, Guerrilla News Network, "Meet 'The Family'," June 13, 2003.
16 "Senators Don Nickles (R., Okla.), Charles Grassley (R., Iowa), Pete Domenici (R., N.Mex.), John Ensign (R., Nev.), James Inhofe (R., Okla.), Bill Nelson (D., Fla.), and Conrad Burns (R., Mont.) are referred to as "members," as are Representatives Jim DeMint (R., S.C.), Frank Wolf (R., Va.), Joseph Pitts (R., Pa.), Zach Wamp (R., Tenn.), and Bart Stupak (D., Mich.). Regular prayer groups have met in the Pentagon and at the Department of Defense, and the Family has traditionally fostered strong ties with businessmen in the oil and aerospace industries." Jeffrey Sharlet, "Jesus Plus Nothing," Harper's Magazine, March 2003.
17 "The Fellowship is now trying to take over government boards in my county of Arlington, VA and are making a major power play in Annapolis, MD. Tom Feeney, Ashcroft, DeLay, Bush (Dubya and Jeb), Cheney, Sean O'Keefe, Condi Rice, John Bolton, Ed Meese, [Charles] Colson, Brownback, Ralph Reed, Frank Wolf, Ernie Fletcher, Katherine Harris, [Newt] Gingrich, JC Watts, Burr, Jindal, Lamar Smith, Zach Wamp, Scalia, Ensign, Kyl, [Kenneth]Blackwell, Bob Ehrlich, Karl Rove, Jack Kemp, James Baker, Clarence Thomas, Tom Coburn, Asa and Tim Hutchinson, Gens. Boykin and Myers, DeMint, Curt Weldon, Grover Norquist, George Allen, [Rick] Santorum, are all in this group. The late Lee Atwater was close to this group.
"The Fellowship, which has strong links to the "Rev." Sun Myung Moon's Unification Church, operates in cells and not only takes over governments but also local church congregations to further their goals. Two local congegations taken over by the Fellowship are Falls Church Episcopal and Cherrydale Baptist. They also maintain the private Riverdell School, another way to brainwash young children who are not already being brainwashed by home schooling.
"The Prime Minister of Norway has just been outed as a member of this group. In fact, most of the so-called "Coalition of the Willing" nations' leaders are members of The Fellowship, e.g., Tonga, Macedonia, Palau, Netherlands, Bulgaria, Lithuania, Solomon Islands, Uganda, Rwanda, Guatemala, El Salvador, Denmark, Romania, Iceland, Fiji, Georgia, Colombia, possibly also Howard of Australia and Blair of Britain."
19 See Dan Verton, "Feds turn up heat on IT sector links to al-Qaeda," in New Zealand's Unlimited business news magazine (9 December, 2002). "Senior counterintelligence officials familiar with the case said the U.S. Customs Service initiated the investigation of Ptech after a disgruntled employee tipped off the agency to the company's alleged hidden ownership. As a result, Customs and the FBI began investigating Yacub Mirza, a former member of Ptech's board of directors who also manages a number of other businesses in the U.S. 'Mirza was acting on behalf of Yassin Qadi, the Saudi financier who was on the U.S. [terrorism] watch list and whose accounts here are frozen,' said Vince Cannistraro, the former chief of counterterrorism at the CIA. 'Qadi is the guy behind Ptech.'"
See Mirza investigation at:
See also: David Lytel, "The War at Home: Federal Law Enforcement Officials Follow International Terrorism's Money Trail from Northern Virginia to Saudi Arabia, but President Bush Says That's Far Enough."
20 Youssef Nada is "an Egyptian exile based in Switzerland who has served for decades as the longtime foreign liaison of the Muslim Brotherhood." From Glenn R. Simpson, "U.S. Tries to Tie Maze of Firms, Charities Based in Herndon Into a Global Network; Bin Laden's 'Golden Chain,' Wall Street Journal, June 21, 2004.
21 DAMA International Symposium and Wilshire Meta-Data Conference in San Antonio.
22 Search for International Terrorist Entities is a 501©(3) non-profit organization that provides information related to terrorist networks to the government, news media, and general public.
24 Myers' retreat from the story is summed up here: "NEVER MIND… Remember the Massachusetts software company which the feds raided in search of terrorist ties? NBC's Lisa Myers found that Ptech's suspicious Saudi backer Yassin al-Qadi 'sold his interest at least three years ago' and then offered $500,000 to Bush's 2000 Presidential campaign. The GOP rejected al-Qadi 'because it is illegal to take contributions from foreigners.'" January 11, 2003:
25 "Software firm mired in terrorism probe," Associated Press, January 5, 2003
26 "U.S. probes terror ties to Boston software firm," by Jerry Guidera and Glenn R. Simpson, Wall St. Journal, December 6, 2002
27 Dan Hopsicker interview with Indira, "Conspiracy Tonight" online TV program at

PROMIS Connections to Cheney Control of
9/11 Attacks Confirmed
  • The FAA & Ptech
  • Debriefed by Secret Service - looking for a PROMIS
  • Muslim Brotherhood, Christian Cultists, and Nazis
Michael Kane
© Copyright 2005, From The Wilderness Publications, All Rights Reserved. May be reprinted, distributed or posted on an Internet web site for non-profit purposes only.
"I believe that Dick Cheney also had the ability using evolutions of the PROMIS software, to penetrate and override any other radar computer or communications system in the government."
- Mike Ruppert, in "Summation: Ladies and Gentlemen of the Jury," from Crossing The Rubicon, p.592
[At the heart of our story is a program (we'll call it Ptech, after the company that produced it) that combines artificial intelligence, datamining, and "interoperability," the capacity for one program to read, operate, and modify the source codes of other programs. The computational power of the Ptech evolution of PROMIS represents a daunting new surveillance-and-intervention capability in the hands of the same elites who planned 9/11, prosecute the subsequent resource wars, and are presiding over what may become a full economic and military disaster for the resource-consuming citizens of America and the world. Since the "War On Terror" and the coming dollar/fossil fuel collapse will necessitate new levels of domestic repression, this is just the capability those elites require. Ptech is the functional equivalent of Total Information Awareness.
The human side of Ptech is where the thievery and murder come in: among the financiers and programmers of Ptech are apparent members of an international network of organized criminals involved in decades of narcotraffic, gunrunning, money laundering, and terrorism. Their personal and professional connections reach up into the highest levels of the American government, and their activities are still underway.
The issue of Saudi complicity in the attacks of 9/11 has played out into two different views. The first is the idea that the Saudis were solely responsible. This has been pumped up by Fox News and largely accepted as gospel in certain parts of the mainstream media. The second view is that the Saudis were set up to take the fall for having pulled off 9/11, covering up U.S. complicity. Neither view is correct, and both depend on a mistaken view of that country as a monolithic, homogeneous actor on the world stage. The opposite is true.
At the top of Arabian society is the giant royal House of Saud, descendants of Abdul Aziz Ibn Saud, a charismatic warlord who used religious and marital alliances to consolidate his military conquests and, eventually, found a modern state on the Arabian Peninsula in 1932. Ibn Saud's success was partially dependent on his powerful religious allies, the inheritors of a doctrinaire form of Islam founded by the cleric Mohammed bin Abdul Wahhab (1702 - 1793). That coalition became increasingly unstable with the massive influx of oil wealth that began shortly after the first Arabian discoveries by SoCal (now Chevron) and Texaco, also in the 1930's.
Like virtually all Islamic states, Saudi Arabia has been the target of ongoing efforts by American intelligence aimed at suppressing any stirrings of incipient secular leftism. This is opposed, we believe, to what may be convenient and clandestine support for "al-Qaeda" terrorists (i.e. fundamentalists), acting as US proxies, who might destabilize the kingdom in advance of the US carving off only those regions with oil reserves. Socially polarized oil wealth, the ever-changing Arab-Israeli conflict, and American geopolitical maneuvering configure a daunting matrix of hidden forces that can't be fully understood or managed - not least because the intelligence elements are often double or triple agents with inscrutable loyalties.
The Ptech story is of intense interest for its implications about US government guilt in 9/11. As Ralph Schoenman, Michel Chossudovsky, Paul Thompson and others have argued, "al Qaeda" is not only traceable to CIA activity in Pakistan and Afghanistan during the Soviet period, it is also a current tool of American imperial ambitions. That directly contradicts the official story, in which al Qaeda is the foreign devil incarnate, a militant hate group formed straight from the soil of Saudi ideology - with no economic grievances, no interests in common with anyone in the non-Muslim world, and above all, no connections to the United States through funding, personnel, armaments, drug trafficking, visa assistance, or communications. It certainly is a militant hate group, but the rank and file may be totally unaware of real connections between their own leaders and the people they oppose with their very lives. These disturbing links would be just as agonizing - and just as unthinkable - for American citizens as they would be for a militant Islamist teenager in a ski mask jumping hurdles at some secret training camp.
Beneficiaries of the Ptech-connected MAK charities, the young men in Hezbollah and Hamas are fighting in land disputes, not heady ideological quests. They are also bitter, bereaved, murderous bigots with all the psychic rigidity and hysteria found in fundamentalists from Oklahoma to Hebron to Jeddah. Their hatred of the American national security state is surely absolute, but they are also beneficiaries of the Pentagon's need for an Enemy. That means that they can expect the United States to provide covert help of some kind at crucial points in the game. And the most despicable element in the American side of that process is the Bush-Cheney junta itself, which used its own assets inside the terrorist network associated with Osama bin Laden to murder three thousand civilians in New York, Washington, and Pennsylvania as a pretext for unending warfare. This was done for reasons of state. But it was also done for personal gratifications including vast sums of money, permanent blackmail over those involved, and a heroin-like rush of criminally insane individual power. Sophisticated or naïve, cynical or grandiose and idealistic, each person involved betrayed humanity. And the apparatus that permitted this remains in place - as do most of the personnel.
The solution to the Ptech problem is not just to get all that creepy software the hell off the computers. The bigger solution is transparency and disclosure, de-militarization and political internationalism; localization of production and exchange; and a more equitable distribution of resources and opportunity. As Stan Goff has explained in these pages, the word opportunity does not necessarily refer to competition for purchasing power and domination. It means the opportunity to grow Haitian rice in Haiti and sell it in Haiti, without having to contend with the export dumping of American corporate agribusiness. It means the chance to maintain a tribal existence in an Afghanistan that is neither the proving ground for a US-Soviet proxy war nor the playground of American-funded drug lords. And though all ideals are warped by the rigors of practice, this was the point of President Kennedy's de-escalation in Laos, his Alliance for Progress in Latin America, and his refusal to invade Cuba:
What kind of peace do I mean? What kind of peace do we seek? Not a Pax Americana enforced on the world by American weapons of war. Not the peace of the grave or the security of the slave. I am talking about genuine peace, the kind of peace that makes life on earth worth living, the kind that enables men and nations to grow and to hope and to build a better life for their children--not merely peace for Americans but peace for all men and women--not merely peace in our time but peace for all time.
Now let's get back to the business of sticking up for people who were murdered on 9/11 and in its aftermath, and to diminishing the present danger. - JAH].
January 27, 2005, PST 0900 (FTW) - Ptech - the software company whose major investors and directors are strongly linked to the Muslim Brotherhood - produced software that derived from PROMIS, had an artificial intelligence core, and was installed on virtually every computer system of the U.S. government and its military agencies on September 11, 2001.
This included the White House, Treasury Department (Secret Service), Air Force, FAA, CIA, FBI, both houses of Congress, Navy, Department of Energy, IRS, Booz Allen Hamilton, IBM, Enron and more.
Whoever plotted 9/11 definitely viewed the FAA as an enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful. To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House & Secret Service had the same software on their systems - likely a superior modified version capable of "surveillance and intervention" functions.
Ptech is enterprise architecture software, which Indira planned on customizing to use as "risk architecture" software.
Enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the enterprise in real-time. In the case of Ptech software installed on Whitehouse, Secret Service, Air Force and FAA systems, the enterprise included all of the data produced by those agencies in real-time.
Maybe this is why Ari Fleischer stated the Whitehouse didn't view Ptech as a threat; quite to the contrary.1 The Ptech software was a vital asset needed for the White House to execute the 9/11 plot, and may still be in place for possible use against professionals in government and military positions trying to do their jobs in the future.
The FAA & Ptech
In the 9/11 Commission report a "phantom flight 11" was added to the official version of what happened that day. A tape was played at the final commission hearing on June 17, 2004, of a woman from the FAA telling NORAD that flight 11 was still airborne at 9:24 am, long after it had actually struck the WTC. Originally this was reported to be the time when the FAA notified NORAD that flight 77 was off course and headed to the Pentagon.

This information was used by the commission to claim NORAD had never been informed that flight 77 was headed towards Washington D.C., leaving the FAA holding the bag for the penetration of the most heavily guarded airspace in the world. The commission's report states they were "unable to identify the source of this mistaken FAA information."
It has been clearly documented that "false blips," or radar injects, were placed on FAA radar screens on the morning of 9/11 as part of the Air Force war games that morning.2 "Phantom flight 11" fits the description of a "false blip." If it was, in fact, a radar inject, that would explain why the 9/11 commission was unable to locate the source of the "mistaken FAA information." The 9/11 war games are classified and specific information regarding such details is not publicly available. We do know by the time "phantom flight 11" appeared on FAA screens - 9:24 am - the war games had reportedly been called off.3
So what was it doing there?
FTW's position is that "phantom flight 11" was injected onto FAA radar screens by "the maestro"4 using Ptech software to override FAA systems. Let's examine the feasibility of such a scenario.
Ptech had been working on the data blueprint of the FAA's entire network for 2 years prior to 9/11. Their confidential business plan lays out just how much access they had to the FAA's data systems.
Ptech Inc. Confidential Business Plan: Page 37 of 46 11/7/2001
The FAA recognized the need for leveraging its IT investment, with a means of centralizing activities and introducing consistency and compatibility within the operating systems environment. A Ptech consulting team was organized to use activity modeling to identify key functions that could be examined for improvement in network management, network security, configuration management, fault management, performance management, application administration, network accounting management, and user help desk operations.5
What the above tells us is that Ptech had access to the entire informational barn door of the FAA's data systems. In an amazing exchange published in part 1 of this series, FTW editor Jamey Hecht was able to confirm a central thesis of Crossing the Rubicon while interviewing Wall St. Whistleblower Indira Singh. Indira is an IT professional who started First Boston's first Information Technology group in 1975 and had worked on Wall St. until 2002. She's been an IT consultant for Banker's Trust, the U.N., JP Morgan, and American Express. In 1988 she started TibetNet - a derivative of DARPA's Internet, the service you are likely reading this report on at the moment. The exchange was as follows:
Jamey Hecht: You said at the 9/11 Citizens' Commission hearings, you mentioned - its on page 139 of transcript - that Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Indira Singh: Yes, I have a good diagram for that…
Jamey Hecht: And that relationship had been going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that the Secret Service is among the government entities that had a contract with Ptech. Mike Ruppert's thesis in Crossing the Rubicon, as you know, is that the software that was running information between FAA & NORAD was superseded by a parallel subsuming version of itself that was being run by the Secret Service on state of the art parallel equipment in the PEOC with a nucleus of Secret Service personnel around Cheney.
…In your view, might it have been the case that Cheney was using Ptech to surveil the function of the people who wanted to do their jobs on the day of 9/11 in FAA & NORAD, and then intervene to turn off the legitimate response?
Indira Singh: Is it possible from a software standpoint? Absolutely it's possible. Did he (Cheney) have such a capability? I don't know. But that's the ideal risk scenario - to have an over-arching view of what's going on in data. That's exactly what I wanted for JP Morgan.
You know what's ironic about this; I wanted to take my operational risk blueprint which is for an operational event going wrong and I wanted to make it generic for extreme event risk to surveil across intelligence networks. What you're describing is something that I said, 'boy if we had this in place maybe 9/11 wouldn't have happened.' When I was going down to In-Q-Tel and getting these guys excited about creating an extreme event risk blueprint to do this, I'm thinking of doing exactly what you're saying Cheney might have already had! [emphasis added]
-- end of transcript
Ptech was working with Mitre Corp. in the FAA and, according to Indira, Ptech was the Alpha dog in that relationship. Mitre has provided simulation & testing technologies for the Navy.6 They provide multiple FAA technologies and boast in their annual reports that their two biggest clients are DOD & FAA. Mitre knew the FAA's technological enterprise inside and out, including any simulation-and-testing (war game) technology operated by the FAA.
This was the perfect marriage to ensure that the capacity to covertly intervene in FAA operations on 9/11 existed - in the middle of simulated war games.It is also the perfect marriage to ensure that the command and control of these capabilities was readily available to Dick Cheney via Secret Service Ptech software in the Presidential Emergency Operations Center, the bunker to which Cheney was "rushed" by the Secret Service. As already pointed out in part 1 of this series, Ptech does what Total Information Awareness (TIA, the DARPA program to monitor all electronic transactions in real-time) is supposed to do. (There are an undetermined number of other software programs in the hands of an undetermined number of corporations also capable of this. Again, enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the "enterprise" in real-time.
In the case of Ptech software, installed on White House, Secret Service, Air Force and FAA systems (as well as most American military agencies), the enterprise included all of the real-time data of the above mentioned agencies. Indira has confirmed Ptech software could have been set up to allow Dick Cheney to surveil and intervene on FAA radar screens.
As documented by former Bush counter-terrorism advisor Richard Clarke in his book, Against All Enemies, on 9/11 the Secret Service had the capability of seeing FAA radar screens in real time; and as documented by Mike Ruppert in Crossing the Rubicon, Secret Service has the authority to take supreme command over any and all American agencies - including the Air Force.
9/11 is a prime example of what Indira Singh calls "extreme event risk." In the months prior to the attack, she was working on a program capable of providing data in real time to prevent these types of events from happening. She had pitched this very idea just one week before 9/11 at In-Q-Tel Headquarters (CIA) in Virginia, giving a final presentation for an ICH (Interoperability Clearinghouse) project code named "Blue Prophet." Indira explained to CIA why she was supporting ICH in this project.
She told the In-Q-Tel team, "The intelligence and other agencies need this now." One of the men with CIA looked at Indira with what she describes as the "blackest, coldest look anyone has ever given her."
They weren't interested in Blue Prophet's software for interoperability or risk, but rather the data it would produce because the data would point in the right directions. That data was very predictive, producing quality real-time intelligence. This is one week before 9/11. If In-Q-Tel already had this capability, it's no wonder they would be wary of someone like Indira - the woman from New York in Risk Management who resided a few minutes' walk from the Twin Towers.
Debriefed by Secret Service - looking for a PROMIS
It was Indira Singh whose investigative research into Ptech laid the groundwork for this series. One of the first reporters Indira contacted was Joe Bergantino, a 20-year veteran investigative reporter for a CBS affiliate in Boston.
"There are some great people in mainstream media," says Indira, and according to her, Joe is one of them. Joe told her that Ptech's CEO Oussama Ziade had stated, "If it wasn't for that woman in New York, none of this (the Joint Terrorism Task Force (JTTF) raid) would be happening". Neither Joe nor Indira liked the way that sounded.
Joe contacted Senator Grassley's office. A Secret Service agent, Charlie Bopp, was reassigned to Grassley's office, and put in charge of the Ptech file. An initial meeting was scheduled with Indira in January 2003.
Indira showed up with what she called, "A major Ground Zero attitude." She was supposed to be on the 106th floor of the WTC on 9/11 but instead responded as a civilian EMT that morning. This was very personal for her. Charlie understood and nevertheless made the arrangements for a debriefing at the Secret Service's National Threat Assessment Center (NTAC) in April 2003.
During the debriefing Indira was asked by a member of the Secret Service, "Is Ptech PROMIS?"
"I already knew what had happened to Danny Casolaro, and they were asking me if I had copies of Ptech," Indira told FTW.
Danny Casolaro was the investigative journalist mysteriously "suicided" in a West Virginia hotel room while investigating the theft of PROMIS software. Casolaro's investigation had uncovered a shadowy network he called "the Octopus" that seemed to have its hands in everything from drug trafficking and money laundering, all the way up to political assassinations and coups d'etat. When Casolaro's body was discovered, his arms were violently slashed and all the documents he traveled with were missing. He had told friends and relatives if anything happened to him they shouldn't believe it was by accident.

Being asked such a loaded question, she responded with her Ground Zero attitude saying:

"You have a copy of the software, why don't you tell me? This is not about the software guys, ok - was it a PROMIS? It was a place you could hide a PROMIS, a place you can drop a PROMIS."
Indira told FTW, "I was going to use Ptech software for risk surveillance at JP Morgan - Duh!"
By the very nature of risk surveillance, it is necessary to use PROMIS progeny based on artificial intelligence to achieve the capabilities we are describing. Charlie Bopp and those present for Indira's debriefing knew this, but they wanted to talk about the software and not the people behind the software. That is extremely significant. In part 1 of this series we've shown how the major people behind Ptech link to the Muslim Brotherhood, elements of the Saudi Royal Family, as well as Dick Cheney and the powerful American 'Christian' cult known as "The Fellowship," or, "The Family."
Indira wanted to name names, but Charlie wouldn't let her. "We can't investigate the people behind Ptech," said Charlie. "Just trust me, let's focus on the software." They gave no reasoning for this, they just said, "we can't."
"Well if you can't talk about the people behind this, it's a waste of time because with software like that you can't find trapdoors now. This is live stuff!" Singh told FTW. "You can't prove an intelligent agent [a small software component that reaches out to claim or insert information from another system - Ed.] went out and sent information somewhere. It's like proving you ate a piece of cake when you were 10 years old, unless you have video of it, it's not going to happen. It's that ephemeral." [emphasis added]
In other words, PROMIS-based activity leaves no footprints.
This means trapdoors are no longer necessary, or at least, no longer detectable. If Indira is correct, there would have been no "fingerprints" left of any kind showing just what Ptech software was used for on 9/11 and who used it.
"These guys debriefing me were from Military Intel, so they were trying to find out what I knew," says Singh. According to her, August of 2002 (the month before the story on Ptech was shut down by the White House, and three months before Ptech was raided) was a significant month. There were supposedly leaks of some kind coming out of the Persian Gulf. She was asked if Ptech software could have been the source of those leaks.
Singh responded, "Well if Military Intel are using Ptech in the Gulf, obviously! YES!"
During one of the initial meetings Indira threw a hat on the table from FDNY Engine 4, Ladder 15 and said, "I want you to put this on your desk, so any time you think of playing some political games you remember there were real people down there."
Indira Singh was done playing games.
Muslim Brotherhood, Christian Cultists, and Nazis
In part 1 of this series we documented the extensive ties from the Muslim Brotherhood running through Ptech. The Brotherhood was founded by Hassan Al-Banna and expanded with the help of Mahmoud Abu Saud of the House of Saud.7
This extensive network runs through various shell organizations and charities with interlocking boards, such as the New Jersey based real estate investment company BMI, CARE International, and the Northern Virginia based SAAR network - named after al Sulaiman Abdul Al-Aziz al-Rajhi, a scion of one of Saudi Arabia's richest families. Heading the SAAR network (renamed Safa) is Yakub Mirza, who also sits on the board of Ptech. It is of interest to note that claims against Al-Rajhi Banking & Investment Corp. for funding and supporting terrorism were recently dismissed by U.S. District Judge Richard Casey.
One of the central funding mechanisms in this nexus is the Al Taqwa Bank of Switzerland - now Nada Management - which the Department of Treasury says funds Al Qaeda.
Hitler supporter Albert Friedrich Armand Huber (aka Ahmed Huber) and Youseff Nada sit on the board of Al Taqwa. Nada reportedly helped the Grand Mufti escape from Nazi Germany when the Third Reich was teetering on the brink of collapse, and Ahmed Huber knew the Grand Mufti quite well; so well in fact, it was the Mufti who convinced Huber to convert to (the Brotherhood's form of) Islam.
Huber has spoken publicly of a "New Right" marriage of Nazi ideology and Islamist fascism. He has both a picture of Adolph Hitler and Osama bin Laden in his Swiss home.
Al Taqwa is a "hawala," a bank conducting transactions leaving no paper trail through a "good faith" global network that transfers funds - no questions asked.8 Bank Al Taqwa is located in the Bahamas; the parent company, Nada Management, is based in Lugarno, Switzerland, and is linked to the Royal Family of Liechtenstein.
Al Taqwa has done business with Asat Trust. The now deceased Prince Emanuel von und zu Liechtenstein became a board member of Asat Trust in May 1970 and stayed until November 1990, when he was replaced by Martin Wachter, the trust's current director.9
Asat Trust is on the American and U.N. terror list. According to the American Jewish Daily Forward, copies of business registration documents on file with authorities in Liechtenstein show that Asat Trust has been intimately involved with the Al Taqwa network during the last 30 years, registering changes in company names, personnel and financial structure.10
Most frightening of all is that this network seems to have links back to the powerful American Christian cult known as "The Fellowship," or "The Family." This organization is tied to American 'Christian' men of high political power including John Ashcroft, Dick Cheney, George W. Bush, multiple Congressional members and prominent business leaders. Some "Family" members have stated they would love to have Osama bin Laden as a guest speaker because of the covenant he has with his followers. Doug Coe, the Family's leader who was praised by George H.W. Bush at the 1990 National Prayer Breakfast for his "quiet diplomacy," openly admires Hitler's "covenant."11
Yassin Al Qadi - the Saudi terrorist financier who funded Ptech and BMI - claimed to have met Dick Cheney in Jeddah before he became Vice President and the two "still share cordial relations." When Cheney's office was asked to comment on this, spokeswoman Jennifer Miller Wise stated the Vice President gave her no reason to believe he had met with Al Qadi before he assumed office.12
That is a non-answer; "no reason to believe" he met Al Qadi leaves no reason to believe he didn't. Regardless, there are more transparent connections between elements of Saudi and American elites.
In November of 2001, Halliburton was awarded a $140 million contract to develop an oil field in Saudi Arabia by the kingdom's state-owned petroleum firm, Saudi Aramco, and a Halliburton subsidiary, Kellogg Brown & Root, along with two Japanese firms, hired by the Saudis to build a $40 million ethylene plant.13
Dick Cheney is, of course, the former CEO of Haliburton.
As recently as 1991 ARAMCO had Khalid bin Mahfouz sitting on its Supreme Council or board of directors. Mahfouz, Saudi Arabia's former owner of the nation's largest bank, has been reported in several places to be Osama bin Laden's brother in law. However, he has denied this and brought intense legal pressure to bear demanding retractions of that allegation.14 He also denies any involvement in financing terror organizations.
One journalist who was sued by bin Mahfouz, Dr. Rachel Ehrenfeld, is counter suing in New York Federal Court. She is the only one of some 30 authors not to retract claims that Mahfouz has financed Al Qaeda operations as published in her book, Funding Evil: How Terrorism is Financed and How to Stop it.
Khalid bin Mahfouz has major partnership investments with the multi-billion dollar BinLadin Group of companies and is a former director of BCCI, the infamous criminal drug-money laundering bank which performed a number of very useful services for the CIA before its 1991 collapse under criminal investigation by the legal apparatus of multiple countries.15
George Herbert Walker Bush, George W. Bush and Dick Cheney all have extensive ties to the Saudi Royal family and Saudi elites, who in turn have questionable ties to terrorist financiers such as Yassin al-Qadi. It is therefore not unreasonable for Dick Cheney to have met al-Qadi while in Jeddah while CEO of Haliburton.
This is the reality of the world we live in; where a covert international power structure supercedes the interests of nation states, and the misnomer of "national security" is used to keep this network's secrets hidden from the prying eyes of authentic journalists and the public at large.
1 On the very day the FBI raids Ptech, Ari Fleischer - president Bush's press secretary - gives Ptech a "clean bill of health" by stating: "The material has been reviewed by the appropriate government agencies, and they have detected absolutely nothing in their reports to the White House that would lead to any concern about any of the products purchased from (Ptech)."
2 See Crossing the Rubicon, chapters 19 & 20.
3 See footnote #1 from Part 1 of this series.
4 "The Maestro" is the term used by Major Don Arias of NORAD to describe the individual who was in charge of coordinating the 9/11 war games. FTW's research has concluded the 9/11 maestro was either Dick Cheney, or both Cheney and General Ralph "Ed" Eberhart. See Crossing the Rubicon for full documentation.
5 Copy of page 37 of Ptech's Business Plan from 11/17/2001, provided by Indira Singh via email.

8 "A Banking System Built for Terrorism," by Meenakshi Ganguly, Time, 10/05/01:,00.html.
"Shareholders in the Bank of Terror?" by Lucy Komisar, Salon, 11/09/01
9 "Terror Fund Trail Leads to Alpine Kingdom," by Marc Perelman, Forward
10 Ibid.
11 Coe listed other men who had changed the world through the strength of the "covenants" they had forged with their "brothers": "Look at Hitler," he said. "Lenin, Ho Chi Minh, Bin Laden." The Family, of course, possessed a weapon those leaders lacked: the "total Jesus" of a brotherhood in Christ.
"In a document entitled "Our Common Agreement as a Core Group," members of the Family are instructed to form a "core group," or a "cell," which is defined as "a publicly invisible but privately identifiable group of companions." A document called "Thoughts on a Core Group" explains that "Communists use cells as their basic structure. The mafia operates like this, and the basic unit of the Marine Corps is the four man squad. Hitler, Lenin, and many others understood the power of a small core of people." From "Jesus Plus Nothing," by Jeffrey Sharlet, Harper's, March 2003
12 "Software company tries to survive terror investigation," by Justin Pope, Associated Press, 01/03/03
13 "Bush Advisors Cashed in on Saudi Gravy Train," by Jonathan Wells, Jack Meyers and Maggie Mulvihill, Common Dreams, 12/11/01
14 "COUP D'ETAT," by Michael Ruppert, FTW, 6/8/04
15 Ibid
Al-Kadi's ownership of Ptech acknowledged

Rachel Ehrenfeld
On July 15, the Boston U.S. Attorney’s office announced the arrest of a former Ptech officer Buford George Peterson. The announcement also revealed indictments Paterson’s and Oussama Abdul Ziade, also a former officer of Ptech, Inc., a computer software company that operated from Quincy, Mass., for making false statements to the U.S. Small Business Administration (SBA) in connection with a loan application. Thus, revealing that Yassin al Kadi was the major shareholder of the company that provided IT services to most U.S. government offices, and had access to information detrimental to our national security.
In addition to Ptech, Kadi was the Director of the Saudi-based, bin Mahfouz owned Muwafaq Foundation ("Blessed Relief") that fronted for, and funded, Makhtab Al-Khidamat (MK), Al-Qaeda, Hamas, and the Abu-Sayyaf organization, to name just a few. According to a Treasury Department letter to Switzerland’s Attorney General in November 2001, there was "a reasonable basis to believe that Mr. Kadi has a long history of financing and facilitating the activities of terrorists and terrorist-related organizations, often, acting through seemingly-legitimate charitable enterprises and businesses."
Kadi’s businesses extended throughout the world, and included banking, diamonds, chemicals, construction, transportation, and real estate. It would be hard to find a more strategically placed individual to advance the agenda of al-Qaeda, or any other terrorist organization.
The identities and connections of some other Ptech major investors and managers should have also raised a red flag: Suliman Biheiri, an Egyptian, is alleged by the government to have funneled $3.7 million from the Saudi funded charity, the SAAR Foundation, to Islamist terrorists through BMI, a now-defunct New Jersey-based Islamic investment firm of which he was the founder and president, and which fronted for and funded Hamas. Biheiri, who was convicted in October 2004, for lying about businesses with Hamas’ Mousa Abu Marzook, was already in prison for immigration fraud. He also had links to the Muslim Brotherhood's and al Qaeda’s money-laundering machine, the Al-Taqwa network.
Yakub Mirza, a Pakistani, was not only a business partner with Kadi in Ptech, but also the financial mastermind, Trustee, President and CEO of the SAAR Foundation, which according to the government is connected to the Safa Foundation, which the government claimed also provided material support to Islamist terrorist groups. Mirza was also a Trustee on the board of Sanabel, the investment arm of the Saudi International Islamic Relief Organization (IIRO), which shared the same address as the SAAR Foundation: 555 Grove Street in Herndon, Virginia. He set up and was the Secretary/Treasurer of the US branch of the Muslim World League (MWL), another Saudi charity that also served as the fund- raising arm of the US branch of the IIRO. Over the last four decades, the MWL received more than $1.3 billion directly from the late Saudi King Fahad. Both organizations have been documented to support Islamist around the world.
Abdurahman Muhammad Alamoudi was the President of the American Muslim Council (AMC) and the American Muslim Foundation (AMF); both received thousands of dollars from the Success Foundation. The Success Foundation also shared offices with the SAAR Foundation and provided the logistical and financial support for Islamist terror organizations. Alamoudi also served as the Secretary of the Success Foundation, and openly stated his support for HAMAS and Hizbollah. Like Mirza, he was a member of the IIRO. Alamoudi pled guilty in July 2004 on charges related to a Libyan plot to assassinate then Saudi Crown Prince Abdullah.
Other partners in Ptech had similar connections to al-Qaeda and Hamas.
In October 2001, former Vice-President of Sales for Ptech approached the FBI Boston office with detailed information regarding possible links between Ptech and the 9/11 attacks. He was followed by Indira Singh, a risk consultant at J. P. Morgan Chase, in May 2002, who approached the Boston FBI office, the NY Joint Terrorism Task Force, the management of J. P. Morgan Chase and FBI headquarters with more documentation regarding possible Ptech penetration of US government agencies and corporations.
The FBI finally raided Ptech on December 6, 2002. However, no arrests were made and the company continues to operate, and according to Ptech’s CEO, Oussama Ziade, in May 2004, "Ptech still has government agencies as customers, including the White House." If Ziade, a Lebanese national, who left the U.S. in 2005 is "arrested and convicted of the charges in the indictment, he could faces up to 30 years in prison, to be followed by five years supervised release and a $1 million fine....If convicted on these charges, Peterson faces up to 30 years in prison, to be followed by five years of supervised release and a $1 million fine."
Even if convicted, we are still in the dark regarding the information to which Ptech’s employees, management and investors had access. The possibility that the Saudi funded al-Qaeda have taken advantage of then America's free market system to undermine its economy and national security seems quite real when one identifies the connections and affiliations of Ptech’s management, investors and employees.
So, how could a small, Saudi-financed company with questionable terrorist connections obtain significant government and business contracts, and who facilitated this? Was Horizons, its Egyptian branch, ever investigated? Why wasn’t Ptech shut down immediately? And even more importantly, are there other Ptechs around?
Ptech owner's assets confiscated in Albania
Devlin Buckley, 1/16/07
The Albanian government has seized the assets of a wealthy Saudi that, for several years, reportedly maintained simultaneous connections to both al-Qaeda and the U.S. government while serving the interests of the CIA. “The Finance Ministry said it ordered authorities to block four apartments, a house, four bars and shops, and more than 2 hectares (about 5 acres) of land belonging to Yasin al-Qadi,” the Associated Press reports, citing the Official Gazette.1
Yasin al-Qadi, the owner of the property, according to the U.S. Treasury Department, “heads the Saudi-based Muwafaq Foundation…an al-Qaeda front that receives funding from wealthy Saudi businessmen.”2 The Treasury has thus identified the prominent entrepreneur as a Specially Designated Global Terrorist (SDGT).3
Despite his alleged affiliations to terrorism, al-Qadi has maintained concurrent contacts within influential Washington circles.4 In fact, prior to being publicly connected to money laundering and terrorist financing, al-Qadi regularly spoke of his relationship with Vice President Dick Cheney.5
Al-Qadi, who has been identified as one of Osama bin Laden’s “chief money launderers,”6 owned a prominent U.S. technology firm and alleged CIA front known as Ptech.7 He also escorted U.S. officials around during their visits to Saudi Arabia.8
As reported by the Associated Press, al-Qadi “allegedly worked with Osama bin Laden to provide support to terror networks in Albania,” prompting the recent confiscation of his assets in that country.9
According to the Associated Press, al-Qadi used six different names for the recently seized assets, all of which were in the Tirana area, Albania’s capital city.10
The confiscation comes approximately 14 months after the Albanian government made a similar seizure of property belonging to al-Qadi,11 who is suspected of laundering about $10 million in Albania alone for the al-Qaeda network.12
As documented in a report issued by the Library of Congress, “In December 2001, Albanian authorities announced the discovery of a major instance of terrorist support money being concealed behind the facade of a legitimate business operating in Albania.”13
“Yasin al-Qadi,” the report states, “the Saudi Arabian head of a company called Karavan Construction, has been accused of using a twin-tower construction project being built by that company in Tirana to launder money for al Qaeda.”14
“In 2004 the government confirmed that the location was being used to launder financial activities for al-Qaeda,” and in October 2005 “the Albanian authorities took possession of office space at the so-called Twin Towers of central Tirana,” the Southeast European Times recently noted.15
Al-Qadi has a history of using legitimate businesses to reportedly launder money for terrorist activities.
Most notably, he once owned a Quincy, Massachusetts-based technology company known as Ptech,16 which he allegedly used to funnel cash to Islamic militants.17
Raided by federal authorities in 2002, Ptech marketed highly sophisticated software to numerous U.S. government agencies,18 maintained a security clearance with the military,19 and held several sensitive contracts.20
Intelligence officials have privately confided to 9/11 whistleblower Indira Singh that Ptech served as a front for the CIA, apparently laundering mob-linked drug money for covert operations.21
A similar pattern is apparent in Albania, where Yasin al-Qadi, according to federal law enforcement officials, assisted the CIA with efforts to provide underground support to the Kosovo Liberation Army (KLA).22
As author Nafeez Mosaddeq Ahmed documents in his book, The War on Truth, “Extensive military training and assistance was provided to the KLA during the Kosovo conflict in the late 1990s by both American and British forces.”23
“This training continued,” Ahmed writes, “despite the fact that it was documented in a 1999 Congressional report by the US Republican Party Committee that the KLA is closely involved with
The extensive Albanian crime network that extends throughout Europe and into North America, including allegations that a major portion of the KLA finances are derived from that network, mainly proceeds from drug trafficking; and Terrorist organizations motivated by the ideology of radical Islam, including assets of Iran and of the notorious Osama bin-Ladin -- who has vowed a global terrorist war against Americans and American interests."24
Indeed, according to Fatos Klosi, the head of Albanian intelligence, “a major network of bin Laden supporters was established in 1998 in Albania under the cover of various Muslim charities.”25
One charity to allegedly launder money in Albania for the al-Qaeda network was Yasin al-Qadi’s Muwafaq Foundation.26
Khalid bin Mahfouz, an extremely influential and wealthy Saudi who “established and funded” the Muwafaq Foundation, was once the principal shareholder and director of BCCI,27 a criminal enterprise used by the CIA during the 1980s to funnel cash to Osama bin Laden for the anti-Soviet jihad in Afghanistan.28
As former DEA undercover agent Michael Levine explained to The New American in 1999, the U.S. armed and funded “the worst elements of the Mujahideen in Afghanistan — drug traffickers, arms smugglers, anti-American terrorists. We later paid the price when the World Trade Center was bombed [in 1993], and we learned that some of those responsible had been trained by us. Now we’re doing the same thing with the KLA.”29
“These guys,” Levine said, referring to the KLA, “have a network that’s active on the streets of this country. ... They’re the worst elements of society that you can imagine, and now, according to my sources in drug enforcement, they’re politically protected.”30
According to Yossef Bodansky, Director of Research of the International Strategic Studies Association, “The role of the Albanian Mafia, which is tightly connected to the KLA, is laundering money, providing technology, safe houses, and other support to terrorists within this country.”31
“In any case,” Bodansky told The New American, “a serious investigation of the Albanian mob isn’t going to happen, because they’re ‘our boys’ — they’re protected."32
This may help explain why, according to FBI whistleblower Robert Wright, his investigation into Yasin al-Qadi during the 1990s was "intentionally and repeatedly thwarted and obstructed" by higher ups at the FBI.33
According to Agent Wright, who seized $1.4 million directly linked to al-Qadi in 1998,34 “FBI intelligence agents lied and hid vital records from criminal agents for the purpose of obstructing his criminal investigation of the terrorists in order to protect their ‘subjects,’ and prolong their intelligence operations,” as reported by the group representing Wright, Judicial Watch.35
"The supervisor who was there from headquarters was right straight across from me and started yelling at me: 'You will not open criminal investigations. I forbid any of you. You will not open criminal investigations against any of these intelligence subjects,'" Agent Wright told ABC News in 2002.36
According to Agent Wright and other members of his former unit, the money trails of the 1998 African embassy bombings led back to al-Qadi, but even after the bombings, FBI headquarters wanted no arrests.37
According to Agent Wright, it is very likely that 9/11 would have been prevented if he had simply been allowed to do his job.38
Yasin al-Qadi, in addition to crossing paths with the CIA in Albania, Kosovo, and the United States, may have also been involved with covert operations in Bosnia during the mid-1990s.39
Al-Qadi’s charity, the Muwafaq Foundation, which was established by former BCCI head Khalid bin Mahfouz,40 provided support to Islamic militants in Bosnia,41 where the CIA conducted operations of mutual interest.42
As London’s The Spectator has noted, “If Western intervention in Afghanistan created the mujahadeen, Western intervention in Bosnia appears to have globalised it.”43
“From 1992 to 1995,” according to The Spectator, “the Pentagon assisted with the movement of thousands of mujahadeen and other Islamic elements from Central Asia into Europe, to fight alongside Bosnian Muslims against the Serbs.”44
During the civil war, Alija Izetbegovic, Bosnia’s then president, invited Mujahideen fighters into the region and incorporated them into the Bosnian army.45
As Adrian Morgan recently reported for Spero News, “Izetbegovic was portrayed by the Clinton administration as a moderate, though it was recently revealed that he was in the pay of a Saudi Al Qaeda operative, Yassin al-Khadi (Yassin al Qadi).”46
Izetbegovic reportedly received $195,000 from al-Qadi in 1996,47 the same year the wartime president earned the "International Democracy Award" from the Center for Democracy.48

1. “Albania seizes assets of alleged bin Laden associate,” The Associated Press, December 22, 2006, <>.
2. Lee S. Wolosky, "An Assessment of Current Efforts to Combat Terrorism Financing,"Statement before Senate Committee on Governmental Affairs, June 15, 2004, <>.
3. “Treasury Department releases list of 39 additional Specially Designated Global Terrorists,” United States Treasury Department Office of Public Affairs press release, October 12, 2001, <>.
4. Merrie Najimy, “Support Ptech Employees,” The American Arab Anti-Discrimination Committee- Massachusetts, March 2003, <>.
5. Dan Verton, “Ptech workers tell the story behind the search,” Computer World Magazine, January 17, 2003, quoting Ptech Chairman and CEO Oussama Ziade, <,00.html>; “Treasury action smacks of arrogance, violates human rights, says Al-Qadi,” Arab News, October 14, 2001, <>.
6. Jeff Johnson, “Tearful FBI Agent Apologizes To Sept. 11 Families and Victims,” Cybercast News Service, May 30, 2002, <>.
7. "Customs searches software firm near Boston," CNN, December 6, 2002, <>; Dr. Rachel Ehrenfeld, "Dollars of Terror," Front Page Magazine, April 18, 2005, <>; Dr. Rachel Ehrenfeld, "The Business of Terror," Front Page Magazine, June 17, 2005, <>.
8. Ibid., 4; Lynn Grant, “Hastert’s Turkish Allies Tied to Bin Laden,” International Post, August 15, 2005, quoting The Boston Globe, <>.
9. Ibid., 1.
10. Ibid., 1.
11. Erlis Selimaj, “Albania moves against terrorists' assets,” Southeast European Times, October 24, 2005, <>.
12. Alban Bala, “Albania: Officials Crack Down On Terror Suspects,” Radio Free Europe / Radio Liberty,” January 27, 2002, <>.
13. “A Global Overview of Narcotics-Funded Terrorist and Other Extremist Groups,” Library of Congress, Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Department of Defense, May 2002, page 90, <>.
14. Ibid.
15. Erlis Selimaj, “Alleged terrorist's assets seized in Albania,” Southeast European Times, January 2, 2007, <>.
16. Ibid., 7.
17. Thanasis Cambanis and Ross Kerber, "Ptech CEO Says Probe Put Firm on Ropes," Boston Globe, September 13, 2002.
18. Joe Bergantino and the I-Team, “The I Team Investigates P-Tech,” CBS4 Boston, December 9, 2002, <>.
19. Jerry Guidera and Glenn R. Simpson, “U.S. probes terror ties to Boston software firm,” The Wall Street Journal, December 6, 2002, <>.
20. Citizens’ Complaint and Petition to Attorney General of the State of New York for an Independent Grand Jury Investigation, Appendix A7, Reference 28, compiled by Indira Singh, November 19, 2004, <>; Matthew Levitt, “Subversion from Within: Saudi Funding of Islamic Extremist Groups Undermining U.S. Interests and the War on Terror from within the United States,” Testimony before the Senate Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, September 10, 2003, <>.
21. Indira Singh, Testimony at the 9/11 Citizens’ Commission Hearing, September 9, 2004, <>, <>.
22. Wayne Madsen, Wayne Madsen Report, January 10, 2007, <>.
23. Nafeez Mosaddeq Ahmed, The War on Truth: 9/11, Disinformation, and the Anatomy of Terrorism (Olive Branch Press, 2005) pages 39-45.
24. Ibid.; “The Kosovo Liberation Army: Does Clinton Policy Support Group with Terror, Drug Ties?,” United States Senate Republican Policy Committee, March 31, 1999, <>.
25. Jamie Dettmer, “Al-Qaeda's links in the Balkans; Macedonian officials contend the Bush administration largely is ignoring intelligence information that has connected al-Qaeda elements to Albanian separatists - World: war on terror,” Insight on the News, July 22, 2002, <>.
26. Jonathan M. Winer, Origins, Organization and Prevention of Terrorist Finance, Testimony before U.S. Senate Committee on Governmental Affairs, July, 31, 2003, <>; David Pallister and Jamie Wilson, “Muslim relief groups caught in crossfire,” The Guardian, September 26, 2001, <,00.html>.
27. Rachel Ehrenfeld, “The Saudi Buck Stops Here,” Front Page Magazine, March 3, 2005, quoting New York District Attorney Robert Morgenthau, <>.
28. Lucy Komisar, “The Case That Kerry Cracked,” AlterNet, October 22, 2004, <>.
29. William Norman Grigg, “Behind the Terror Network,” The New American, Vol. 17, No. 23, November 5, 2001, <>.
30. Ibid.
31. Ibid.
32. Ibid.
33. Ibid., 6.
34. Ibid.
36. Brian Ross and Vic Walter, “FBI Called off Terror Investigations,” ABC News, December 19, 2002, <>.
37. Ibid.
38. Transcript of Judicial Watch press conference, National Press Club, May 30, 2002, <>.
39. Devlin Buckley, “Scratching the Surface,” The American Monitor, November 16, 2006, <>.
40. Ibid., 27.
41. Ibid., 26.
42. Nafeez Mosaddeq Ahmed, The War on Truth: 9/11, Disinformation, and the Anatomy of Terrorism (Olive Branch Press, 2005) pages 32-34.
43. Brendan O'Neill, “How we trained al-Qa'eda,” The Spectator, September 13, 2003, archived online by, <>.
44. Ibid.
45. Adrian Morgan, “Bosnia: Muslims upset by Wahhabi leaders,” Spero News, November 13, 2006, <>.
46. Ibid.
47. “Terrorism: Weekly Claims Wartime Bosnian President Linked to al-Qaeda,” VPR/AKI, September 8, 2006, <>.
48. United Nations photo highlights of 1997, March 27, 1997, <>.
Friday, January 14, 2005
Remember Ptech? That’s the Boston software firm financed by Saudi businessman Yassin Al-Qadi, who also happens to be an al Qaeda bagman, whose clients happened to include numerous sensitive US federal branches and agencies, including the FAA, the FBI, the military and the White House.

A little background, from the mainstream, even, thanks to WBZ-TV:
Joe Bergantino, a reporter for WBZ-TV’s investigative team, was torn. He could risk breaking a story based on months of work investigating a software firm linked to terrorism, or heed the government’s demand to hold the story for national security reasons. In mid-June [2002], Bergantino received a tip from a woman in New York [Indira Singh] who suspected that Ptech, a computer software company in Quincy, Mass., had ties to terrorists. Ptech specialized in developing software that manages information contained in computer networks.
Bergantino’s investigation revealed that Ptech’s clients included many federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House.
“Ptech was doing business with every federal government in defense and had access to key government data,” Bergantino said.

Bergantino was ready to air the story by September, but the government had different plans. Federal authorities told Bergantino not to air the story because it would jeopardize their investigation and would threaten national security. According to federal authorities, documents would be shredded and people would flee if we ran the story, Bergantino said.
But Bergantino claims the government’s demand to hold off on the story was merely a pretext.
In October 2001, President George W. Bush signed an executive order freezing the assets of individuals linked to terrorism. According to Bergantino, the list identified Saudi Arabian businessman Yassin Al-Qadi as a key financial backer of Osama Bin Laden. As it turns out, Bergantino said, Al-Qadi also is the chief financier of Ptech. The government failed to investigate Ptech in October 2001 and didn’t start it’s investigation until August 2002 when WBZ-TV’s investigation called attention to Ptech.
Even if Ptech was unaware that the President’s October 2001 order contained the name of its chief financier, documents seized in a March 2002 government raid revealed Ptech’s connections with another organization linked to terrorism, Bergantino said. And again, the government failed to investigate Ptech.
Bergatino’s tipster was Indira Singh, who has said she recognizes the separate command and control communications system Mike Ruppert describes Dick Cheney to have been running on September 11th as having “the exact same functionality I was looking to utilize [for] Ptech.”
Now, how does Chertoff figure in the Ptech story? It goes back to the turf war of two years ago over Operation Greenquest, “the high-profile federal task force set up to target the financiers of Al Qaeda and other international terrorist groups.” The aggressive, Customs-led task force was folded into Homeland Security, sending both the FBI and its minders at the Department of Justice into a tizzy. They “demanded that the White House instead give the FBI total control over Greenquest.”
Now, consider this, also from the two-year-old Newsweek:
The FBI-Justice move, pushed by DOJ Criminal Division chief Michael Chertoff and Deputy Attorney General Larry Thompson, has enraged Homeland Security officials, however. They accuse the bureau of sabotaging Greenquest investigations by failing to turn over critical information to their agents and trying to obscure a decade-long record of lethargy in which FBI offices failed to aggressively pursue terror-finance cases.

One prime example of the tension is the investigation into Ptech, the Boston-area computer software firm that had millions of dollars in sensitive government contracts with the Air Force, the Energy Department and, ironically enough, the FBI. In what turned into a minor embarrassment for the bureau, the firm’s main investors included Yasin Al-Qadi, a wealthy Saudi businessman whom the Bush administration had formally designated a terrorist financier under the International Emergency Economic Powers Act. Al-Qadi has vigorously denied any connection to terrorism.
The Ptech case turned into an ugly dispute last year when company whistleblowers told Greenquest agents about their own suspicions about the firm’s owners. Sources close to the case say those same whistleblowers had first approached FBI agents, but the bureau apparently did little or nothing in response. With backing from the National Security Council, Greenquest agents then mounted a full-scale investigation that culminated in a raid on the company’s office last December. After getting wind of the Greenquest probe, the FBI stepped in and unsuccessfully tried to take control of the case.
The result, sources say, has been something of a train wreck. Privately, FBI officials say Greenquest agents botched the probe and jeopardized other more promising inquiries into Al-Qadi. Greenquest agents dismiss the charges and say the problem is that the bureau was slow to respond to legitimate allegations that an outside contractor with terrorist ties may have infiltrated government computers.
Whatever the truth, there is no dispute that the case has so far produced no charges and indictments against Al-Qadi or anyone else connected with Ptech. The company has denied wrongdoing.
That Ptech logo. Has anyone noticed its underlying cloaked message?

[Image: 611_ptech_logo.jpg]

Take away the surrounding triangle (numerically 3 btw) and you have a somewhat stylized this:

[Image: Isle-of-Man.gif]

And this Triskelion is a favourite symbol of today's Neo-Nazis as can be seen from the following flag of the Afrikaner Weerstandsbeweging (AWB):

[Image: za%7Dawb.gif]