Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CyberWar, PTech, PROmis, OODA loop etc.
#1
From
http://www.911blogger.com/node/20677:

9/11 and Cyberterrorism:
Did the real "cyber 9/11" happen on 9/11?

James Corbett
The Corbett Report
17 July, 2009

Government sources immediately began blaming North Korea for the recent cyberterror attacks on South Korea and the U.S., despite having no evidence to back up those claims.[1] Now, an examination of the evidence by independent computer experts show that the attack seems to have been coordinated from the UK.[2] The hysterical media coverage in the attack's wake, however, echoing the government line that it was likely the work of North Korea, served to cement in the minds of many that this was an act of cyberwarfare.

The idea that this surprisingly unsophisticated attack[3] could have come from a well-organized, hostile state or terrorist group comes as a blessing in disguise to those groups, agencies and advisors who have been calling for greater and greater federal snooping powers in the name of stopping a "cyber 9/11" from happening.

The "cyber 9/11" meme stretches back almost to 9/11 itself. Back in 2003, Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack "equivalent to the attack on the World Trade Center" if a new institution were not created to oversee cyber security.[4] Since then, report[5] after report[6] has continued to use the horror of 9/11 as a way of raising public hysteria over "cyber terrorism," a subject more often associated with juvenile hackers and lone misfits than radical terrorist organizations.

The real reason behind the invocation of 9/11 in the context of "cyber terror" was revealed last year by Harvard law professor Lawrence Lessig. He told a technology conference that former counterterrorism czar Richard Clarke admits there is a cyber equivalent of the constitution-destroying Patriot Act ready to be rubber stamped into law; all it requires is a "cyber 9/11" to make such legislation politically viable.[7] In effect, the cyber security establishment—the advisors, agents and experts in the newly-minted multi-billion dollar cyber security industry[8]—are waiting for a spectacular cyber terrorist attack to go ahead with plans for 'identity management' schemes like fingerprinting for internet access which would put an end to the free Internet as we have known it.[9]

What the cyber security establishment does not want you to know is that the most incredible cyber terrorist story of all time began 15 years ago. And it centers on 9/11. The establishment is interested in suppressing this story because it demonstrates that the very investigative bodies that are clamoring for more power on the pretext of the "cyber terror" hysteria are the exact same bodies that failed to investigate the documentable links between government-designated terrorists and a software company with direct access to some of the most sensitive computer systems in the United States. FBI agents whose investigation into this story were suppressed have even said that these investigations could have prevented 9/11.

It is a story of international terror and terrorist financiers. It stretches from New England to Saudi Arabia and involves businessmen, politicians and terror networks. And it begins in the most unlikely of places: the offices of an enterprise architecture software firm in Quincy, Massachusetts.

Enterprise Architecture: The God's-Eye View of Systems and Infrastructure

"Enterprise architecture software" refers to a computer program that allows someone to look at all of the data produced throughout an organization's structure in real time. This effectively gives the program user a god's-eye view of an enterprise, allowing for the mapping, visualization and analysis of all transactions, interactions, systems, processes and personnel in the entirety of a business or agency. This type of software could, for example, be used for robust business modeling, allowing for extremely detailed and accurate projections of how changes in an organization's structure or processes would effect a business' bottom line. What would happen if two departments were merged, for example, or if a business were to outsource one of its processes.

As this software began to mature in the 1990s, however, it went from a merely useful tool to something truly incredible. Sophisticated enterprise architecture software could, for example, examine all of the transactions taking place across a financial institution in real time and examine that data for possible money laundering operations or rogue traders. Such software could even have potentially detected and identified the insider trading leading up to 9/11.[10] Combined with rudimentary a.i. capabilities, such a program would not only be able to alert the appropriate personnel about such transactions, but even stop them as they are happening. If the software were sophisticated enough, it may even be able to identify the possibility of such transactions before they happen.

The utility of such software for organizations of all stripes should be obvious enough. It is unsurprising, then, that numerous government agencies and powerful corporations were hungry for this software in the 1990s. A surprising number of them, including DARPA, the FBI, the Secret Service, the White House, the Navy, the Air Force, the FAA, NATO, IBM, Booz Allen Hamilton and Price Waterhouse Coopers (amongst many others) turned to a small New England-based software firm called Ptech.[11]

Ptech: Not Your Average Software Firm

Ptech was founded in Quincy, Mass. in 1994 and by 1996 had secured a contract with DARPA to help transfer commercial software methodologies to the defense sector.[12] In 1997, it gained security clearance to bid on sensitive military contracts and bid on work for a range of other government agencies.[13] Within four years Ptech had built up a stable of clients that would make any third-party software vendor green with envy. From the inner sanctum of the White House to the headquarters of the FBI, from the basement of the FAA to the boardroom of IBM, some of the best-secured organizations in the world running on some of the most protected servers housing the most sensitive data welcomed Ptech into their midst. Ptech was given the keys to the cyber kingdom to build detailed pictures of these organizations, their weaknesses and vulnerabilities, and to show how these problems could be exploited by those of ill intent. For all of its incredible success, however, many of the firm's top investors and employees were men with backgrounds that should have been raising red flags at all levels of the government.

The firm was founded on $20 million of startup money, $5 million of which was provided by Yassin al-Qadi[14], a wealthy and well-connected Saudi businessman who liked to brag about his acquaintance with Dick Cheney.[15] He also had connections to various Muslim charities suspected of funding international terrorism.[16] In the wake of 9/11 he was officially declared a Specially Designated Global Terrorist by the U.S. government and his assets were frozen.[17] At the time, Ptech's owners and senior management denied that al-Qadi had any involvement with the company other than his initial investment, but the FBI now maintains they were lying and that in fact al-Qadi continued investing millions of dollars in the company through various fronts and investment vehicles. [18] Company insiders told FBI officials that they were flown to Saudi Arabia to meet Ptech's investors in 1999 and that al-Qadi was introduced as one of the owners.[19] It has also been reported that Hussein Ibrahim, Ptech's chief scientist, was al-Qadi's representative at Ptech[20] and al-Qadi's lawyers have admitted that al-Qadi's representative may have continued to sit on Ptech's board even after 9/11.[21]

Ibrahim himself was a former president of BMI, a New Jersey-based real estate investment firm that was also one of the initial investors in Ptech and provided financing for Ptech's founding loan. Ptech leased office space and computer equipment from BMI[22] and BMI shared office space in New Jersey with Kadi International, owned and operated by none other than Ptech's sweetheart investor and Specially Designated Global Terrorist, Yassin al-Qadi.[23] In 2003, counterterrorism czar Richard Clarke said: "BMI held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support." [24]

Suheil Laheir was Ptech's chief architect. When he wasn't writing the software that would provide Ptech with detailed operational blueprints of the most sensitive agencies in the U.S. government, he was writing articles in praise of Islamic holy war. He was also fond of quoting Abdullah Azzam, Osama Bin Laden's mentor and the head of Maktab al-Khidamat, which was the precursor to Al-Qaeda.[25]

That such an unlikely cast of characters were given access to some of the most sensitive agencies in the U.S. federal government is startling enough. That they were operating software that allowed them to map, analyze and access every process and operation within these agencies for the purpose of finding systemic weak points is equally startling. Most disturbing of all, though, is the connection between Ptech and the very agencies that so remarkably failed in their duty to protect the American public on September 11, 2001.

Ptech on 9/11: The Basement of the FAA

For two years prior to 9/11, Ptech was working to identify potential problems or weaknesses in the FAA's response plans to events like a terrorist hijacking of a plane over U.S. airspace. According to their own business plan for their contract with the FAA, Ptech was given access to every process and system in the FAA dealing with their crisis response protocols. This included examining key systems and infrastructure to analyze the FAA's "network management, network security, configuration management, fault management, performance management, application administration, network management and user desk help operations." [26] In short, Ptech had free reign to examine every FAA system and process for dealing with the exact type of event that was to occur on 9/11. Even more incredible, researcher Indira Singh points out that Ptech was specifically analyzing the potential interoperability problems between the FAA, NORAD and the Pentagon in the event of an emergency over U.S. airspace.[27]

Ptech also presumably had operational information about the systems that the FAA, NORAD and others employed during crisis response exercises like Vigilant Guardian[28], the NORAD exercise that was taking place on 9/11 and included simulations of hijacked jets being flown into New York[29] and hijacked jets being flown into government buildings.[30] This is significant because there is every indication that just such drills were confusing NORAD's response to the real hijackings that were taking place that day. As researcher Michael Ruppert points out, a rogue agent with access to a Ptech backdoor into the FAA's systems could have been deliberately inserting fake blips onto the FAA's radars on 9/11[31]. That scenario would explain the source of the phantom Flight 11 that the FAA reported to NORAD at 9:24 a.m. (well after Flight 11 had already hit the World Trade Center)[32], a report whose source the 9/11 Commission claims they were unable to find.[33]

In short, Ptech's software was running on the critical systems responding to the attacks of 9/11 on 9/11 itself. The software was designed for the express purpose of giving its users a complete overview of all the data flowing through an organization in real time. The father of enterprise architecture himself, John Zachman, explained that with Ptech-type software installed on a sensitive server "You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it."[34]

Stifled Investigations

In the late 1990s, Robert Wright—an FBI special agent in the Chicago field office—was running an investigation into terrorist financing called Vulgar Betrayal.[35] From the very start, the investigation was hampered by higher-ups; the investigation was not even allocated adequate computers to carry out its work.[36] Through Wright's foresight and perseverance, however, the investigation managed to score some victories, including seizing $1.4 million in U.S. funds that traced back to Yassin al-Qadi.[37] Wright was pleased when a senior agent was assigned to help investigate "the founder and the financier of Ptech", but the agent did no work and merely pushed papers during his entire time on the case.[38]

Shortly after the 1998 African embassy bombings, Vulgar Betrayal began to uncover a money trail linking al-Qadi to the attack.[39] According to Wright, when he proposed a criminal investigation into the links, his supervisor flew into a rage, saying "'You will not open criminal investigations. I forbid any of you. You will not open criminal investigations against any of these intelligence subjects." Wright was taken off the Vulgar Betrayal investigation one year later and the investigation itself was shut down the following year.

In the aftermath of 9/11, Indira Singh—a risk management conultant for JP Morgan—was looking for enterprise architecture software to implement the next generation of risk management at the financial juggernaut. Impressed by their client list, Singh invited Ptech to demonstrate their software. It wasn't long before she began discovering the connections between Ptech and international terrorist financing. She worked exhaustively to document and uncover these links in an effort to persuade the FBI in Boston to open their own investigation into Ptech, but she was told by one agent that she was in a better position to investigate this than someone inside the FBI.[40] Despite the persistent efforts of Singh and the testimony of company insiders, the FBI did not inform any of the agencies contracting with Ptech that there were concerns about the company or its software.

In late 2002, Operation Green Quest—a Customs Department-led multi-agency investigation into terrorist financing—raided Ptech's offices due to its ties to al-Qadi and others.[41] The very same day of the raid White House Press Secretary Ari Fleischer declared the company and its software safe.[42] Mainstream news articles defending Ptech after the story broke, however, blithely admit that the company was informed of the raid weeks in advance, hoping perhaps that readers will not notice that his completely defeats the purpose of such a raid or calls into question its results.[43] Eventually, Michael Chertoff led an effort to give the FBI total control over Greenquest, leading to Customs officials accusing him of sabotaging the investigation.[44] No indictments were laid in the immediate aftermath of the Ptech raid against al-Qadi or anyone else related to the company. Chertoff went on to become the head of Homeland Security.

The 9/11 Commission Report, obviously, does not mention Ptech. Given the incredible information about this company and its links to Specially Designated Global Terrorist Yassin al-Qadi, this is perhaps surprising. This startling omission becomes more ominous however, when it is understood that the 9/11 Commission co-chair, Thomas Kean, made $24 million dollars off a land deal with al-Qadi linked organization BMI.[45]

For over a decade, investigations into Ptech, its employees and its investors have been stifled, suppressed or derailed by people in key positions. But all of that finally changed this week.

A Break in the Case

On Wednesday the Boston Field Office of the FBI unsealed a 2007 indictment of Oussama Ziade, Ptech's former CEO, and Buford George Peterson, the former CFO and COO.[46] The indictment charges that the pair knowingly lied to investigators about the extent of al-Qadi's investments and ties with Ptech. Another unsealed indictment, this one from 2005, alleges Ziade attempted to engage in transactions involving al-Qadi's property, a federal offence as al-Qadi was a Specially Designated Global Terrorist at the time. If the pair are convicted on the charges, they face 30 years in prison and a $1 million fine.

Whether this represents a significant breakthrough in the case and the beginning of the official unraveling of the Ptech story will likely depend on whether political pressure is brought to bear by an informed public who are concerned with this story.

Given that the public has been whipped into cyber-hysteria over the North Korean figments of the government's imagination, it will require the media to stop parroting the government's talking points and begin informing the public about the very real, documentable links between terrorist financiers and the technological capability to override key emergency response systems on 9/11.

Two questions remain to be answered:

Did the real "cyber 9/11" happen on 9/11? And will the public care enough to demand the answer to that question?

If the answer to either question is 'yes,' concerned readers are advised to download the mp3 file of Episode 045 of The Corbett Report podcast, "Ptech and the 9/11 software," [ http://www.corbettreport.com/mp3/episode...ftware.mp3 ] and begin distributing it to others to bring awareness to this incredible story.[47]


[1] http://antifascist-calling.blogspot.com/20...rattacks-on-a...
[2] http://blog.bkis.com/?p=718
[3] http://www.wired.com/threatlevel/2009/07/mydoom/
[4] http://www.smh.com.au/cgi-bin/common/popup...ath=/articles...
[5] http://www.nationalterroralert.com/updates...el-chertoff-c...
[6] http://voices.washingtonpost.com/securityf...l_pearl_harbo...
[7] http://www.infowars.net/articles/august2...08i911.htm
[8] http://www.nytimes.com/2009/05/31/us/31cyber.html?_r=1
[9] http://www.csmonitor.com/2005/0602/p01s04-ussc.htm
[10] http://www.business.uiuc.edu/poteshma/rese...teshman2006.pdf
[11] http://en.wikipedia.org/wiki/Ptech
[12] http://www.govexec.com/archdoc/rrg96/0996rrg5.htm
[13] http://www.islamicsupremecouncil.org/CMS/T...18159502002.h...
[14] http://www.boston.com/news/daily/03/ptech.htm
[15] http://www.saudia-online.com/newsoct01/news30.shtml
[16] http://www.historycommons.org/context.jsp?...ney#a91qlimoney
[17] http://ustreas.gov/press/releases/po689.htm
[18] http://boston.fbi.gov/dojpressrel/pressr...071509.htm
[19] http://www.historycommons.org/context.jsp?...ch#a99alqadip...
[20] http://www.historycommons.org/context.jsp?...bmi#a94ptechbmi
[21] http://www.historycommons.org/context.jsp?...ch#a99alqadip...
[22] http://www.boston.com/news/daily/03/ptech.htm
[23] http://www.investigativeproject.org/docume...ase_docs/81.pdf
[24] http://www.investigativeproject.org/docume...estimony/77.pdf
[25] http://www.frontpagemag.com/readArticle.aspx?ARTID=8245
[26] http://www.fromthewilderness.com/free/ww3/...ptech_pt2.shtml
[27] ibid.
[28] http://www.911readingroom.org/whole_docume...?article_id=278
[29] http://hcgroups.wordpress.com/2009/06/14/t...1-military-ex...
[30] http://www.boston.com/news/packages/sept11..._stories/0903...
[31] http://www.fromthewilderness.com/free/ww3/...ptech_pt2.shtml
[32] http://www.911blogger.com/node/19181
[33] http://www.msnbc.msn.com/id/5233007
[34] http://www.nationalcorruptionindex.org/pag...hp?profile_id=6
[35] http://www.laweekly.com/2004-08-26/news/...r-betrayal
[36] http://www.foxnews.com/story/0,2933,54070,00.html
[37] http://www.apfn.org/apfn/Wtc_whistleblower3.htm
[38] http://www.historycommons.org/context.jsp?...ork#a0498nowork
[39] http://web.archive.org/web/20021220054102/...s.go.com/sect...
[40] http://www.911blogger.com/2005/07/indira-s...researcher.html
[41] http://archives.cnn.com/2002/US/Northeas...tech.raid/
[42] http://www.forbes.com/2002/12/06/cx_ah_1206raid.html
[43] http://www.boston.com/news/daily/03/ptech.htm
[44] http://www.newsweek.com/id/58250/output/print
[45] http://www.insider-magazine.com/911Kean.pdf
[46] http://boston.fbi.gov/dojpressrel/pressr...071509.htm
[47] http://www.corbettreport.com/index.php?i...umentation

### ### ### ### ###

n follow-up to the above: Bring lunch and a thermos of coffee.

Major link:
http://forum.prisonplanet.com/index.php?to...92684#msg792684

Link to the audio show:
http://www.corbettreport.com/mp3/2009-08-2...-Illuminati.mp3


References everything discussed in the above mp3:

VIDEO: Ptech built Supply Chain Infrastructure - Destruction of Free Market
http://www.vimeo.com/5770472

Resigned Cybersecurity "chief" to be used as scapegoat for 2009 false flag?
http://forum.prisonplanet.com/index.php?to...29509#msg529509

"I have a personal message for Booz Allen Hamilton, Jay Rockefeller & the NCOIC" [contains references back to my old blog entries from years ago]:
http://forum.prisonplanet.com/index.php?to...14218#msg614218

Excerpt of document:
http://forum.prisonplanet.com/index.php?topic=104135.0


A. H. Levis/AFRL - USJFCOM James Mattis - FF Terror (Effects Based Operations)
Barnett-Air Force Research Lab-OODA Loop-SAIC, Pentagon VPN Red Team

http://forum.prisonplanet.com/index.php?topic=102061.0

Ptech CONFIRMED-Booz Allen, *False Flag Warning* to usher in Internet2/GIG
http://forum.prisonplanet.com/index.php?topic=91740.0

FAA-NIAC-NAS-USAF ALL DoD Systems deliberately setup to be False Flag Hacked
http://forum.prisonplanet.com/index.php?to...#msg5743019/11-

Schlesinger | MITRE | Hanscom ESC | CAASD | GIG Infrastructure
http://forum.prisonplanet.com/index.php?to...27539#msg627539

Do you have any evidence of 9/11 being an Inside Job?
http://forum.prisonplanet.com/index.php?to...59746#msg559746

Internet2 is about enabling AI weapons for genocide, Full Spectrum Dominance
http://forum.prisonplanet.com/index.php?to...21702#msg521702

CAESAR III, Temper, Pythia, Data Fusion Ptech AI wargame C2 process modeling
http://forum.prisonplanet.com/index.php?to...13938#msg613938

####

The Data Beast- by Catherine Austin Fitts
http://solari.com/blog/?p=2082

#####


There is more at the original link:

http://forum.prisonplanet.com/index.php?to...92684#msg792684


####

See also this link which has the same mp3 link and also scroll down for the cached "Insight" article by Kelly O'Meara on PROmis....

http://rigorousintuition.ca/board/viewtopi...4780db006eb23db
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#2
MORE...:

#### #### ####

Adaptive Multi-modal
Data Mining and Fusion
For Autonomous Intelligence Discovery


http://www.galaxy.gmu.edu/stats/syllabi/...cture4.pdf

http://forum.prisonplanet.com/index.php?topic=143749.0

See also:

http://forum.prisonplanet.com/index.php?topic=129340.0

http://forum.prisonplanet.com/index.php?topic=89041.0

http://forum.prisonplanet.com/index.php?topic=79634.0

http://forum.prisonplanet.com/index.php?topic=100871.0

http://forum.prisonplanet.com/index.php?topic=142259.0 (VIP on use of PROmis to loot bank accounts)

http://forum.prisonplanet.com/index.php?topic=91752.0

http://forum.prisonplanet.com/index.php?topic=129048.0


NATIONAL MILITARY COMMAND CENTER SETUP FOR 911FF BY A. H. LEVIS/PTECH
« on: August 27, 2009, 10:53:29 PM »
http://www.dtic.mil/descriptivesum/Y2002...02016K.pdf

A. Mission Description and Budget Item Justification:

This program provides concept development, requirements definition, technical specifications, proof-of-concept testing, rapid prototyping, technology insertions, systems engineering and integration and technical assessments for National Military Command System (NMCS) Command and Control (C2) systems. This support provides informed, decision-making linkage between the National Command Authorities (NCA) and the Commanders-in-Chief of the Unified and Specified Commands. This engineering draws upon improved C2 methodologies and technology insertion opportunities to meet the command, control and information requirements of the NCA and the CINCs for all crises and security threats involving US military forces. These efforts emphasize interoperability and are designed to contribute directly to the achievement of the global C4I infrastructure.

The primary customer is the Joint Staff. As the DOD Systems Engineer for the National Military Command Center (NMCC) and the Alternate NMCC (ANMCC), DISA performs planning, integration, and testing/ evaluation of new systems or improvements to existing systems. Support is provided to the Joint Staff in configuration management of over 120 systems. Engineering support is provided in the planning and implementation of the relocation of the NMCC as part of the Pentagon renovation (NMCC is scheduled to transition to a new location in FY 2003).

Beginning FY 2002, funding from the program C4I for the Warrior (PE 0303149K) will be transferred to this program in order to support the Site R Integration Program (SRIP), which provides backup and mirroring of selected NMCC systems and provides software maintenance of the NMCC Command and Control System (NCCS) Automated Message Handling System (AMHS). This program element is under Budget Activity 07 because it involves efforts supporting operational systems development. This administration has not addressed FY 2003-2007 requirements. All FY 2003-2007 budget estimates included in this book are notional only and subject to change.

http://forum.prisonplanet.com/index.php?...#msg674543

9/11 as a computer crime?

Davis stated that on the morning of 9/11 there was denial of service to the risk management system designed to block such attacks. I didn’t say that (although I’ve read it) - what I said was that the emergency open communications line between the FAA and NMCC went dead - neither party was aware of it and it is my belief that the PTECH software was used to shut it down.

"If that’s the way they did it, it would have been the perfect crime. One person could have shutdown the line connecting the FAA and NMCC (National Military Command and Control). “Coincidentally,” the person manning the NMCC on the morning of 9/11 was a first day employee and his boss was away at a meeting. So, the new man on the job didn’t even know that on the morning of 9/11 the communication between FCC and NMCC was down."

-Vicky Davis
_________________________________________________________
Summary:

“This three-part series grapples with the risks of a growing dependence on automated information systems to control combat forces. A collection of research papers from the DoD-sponsored C2 Research Program, the series focuses on the difficulties in accurately portraying the uncertainties and ambiguities of war with computer systems.” – Publisher’s description.
_________________________________________________________
http://sysarch.gmu.edu/main/media/public...5p-ABS.pdf
JUNE 1993



CRISIS MANAGEMENT IN THE NATIONAL MILITARY
COMMAND CENTER (NMCC)


Brian S. Ray
Alexander H. Levis


ABSTRACT


A functional architecture of NMCC crisis management is developed beginning with the identification and description of the mission and concept of operations. A functional decomposition of crisis management activities is then built based on current operating instructions and actions officer interviews. The model is validated for a limited set of crisis management requirements by exercising it with data collected during an actual crisis management situation. Functional shortfalls and redundancies are examined. The result is a functional architecture of NMCC crisis management suitable as a foundation for quantitative effectiveness analysis.

CRISIS MANAGEMENT IN THE NMCC
http://sysarch.gmu.edu/main/media/public.../135p_.pdf


From
http://forum.prisonplanet.com/index.php?topic=129048.0

## ## ## ## ## ##
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  PTech and 9/11 Software - Spooks come in digital form too! Peter Lemkin 1 7,126 14-07-2018, 07:48 PM
Last Post: Lauren Johnson
  Ptech, the CIA, FBI, SS, 911, PROMIS, Terrorists-R-US Peter Lemkin 10 33,771 26-12-2016, 05:17 AM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)