Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Guns and Butter - "Demolition Access To the World Trade Center Towers" with Kevin Ryan.
#11
Video: http://video.google.com/videoplay?docid=...154277932#

http://video.google.com/videoplay?docid=...6699324733


History Commons: http://www.historycommons.org/entity.jsp...dira_singh

http://www.911truth.org/article.php?stor...1231231793

PTECH, 9/11, and USA-SAUDI TERROR - Part II: PROMIS Connections to Cheney Control of 9/11 Attacks Confirmed.

http://www.fromthewilderness.com/free/ww..._pt1.shtml

http://www.fromthewilderness.com/free/ww..._pt2.shtml

Still looking for the transcript, though...
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#12
Thanks Ed, much appreciated.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#13
In the comments section of this article [ http://www.veteranstoday.com/2011/01/03/...-landfill/ ] about which includes only the same content noted elsewhere about Wheeler, MITRE, Barksdale et al, there is also this:


  • Doug says:
    January 4, 2011 at 8:05 pm
    This could be 911 related. If Ptech, a possible mossad front organization working closely with Mitre Corp., was involved in the manipulation of aircraft on 911 then possibly John Wheeler knew something or would have had to know something with his in depth involvement with the company. We know the 911 operation was very very sophisticated. Many were involved or knew about the plans. Exposure to this kind of information can be very dangerous whether you intended to participate or did not intend to facilitate the 911 operation. We can be sure that the Airforce and FAA were linked in order to stand down and redirect aircraft on 911. Gordon, someone else is posing as Doug' on this website and they do not represent my opinions. This seems to be an attempt to discredit the 911 Truth Movement. Best, Doug
    Reply

    • Hetware says:
      January 5, 2011 at 1:01 pm
      I've worked with Mitre. They are fully infiltrated by Mossad. Don't think that 9/11 and Ptech are the only angles regarding Mitre. Mitre has their hands in a whole lot of stuff. They tend to get into major projects at the their inception, and determine their course.
      Reply

and this

Big Dan says:
January 4, 2011 at 11:57 pm
How about this theory from plunger:
Google Ptech, Mitre & Bollyn
Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national "Cyber Czar," having served as director of the Department of Homeland Security's National Cyber Security Division.
Yoran had been appointed "Cyber Czar" at age 32 by President George W. Bush in September 2003.
Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million.
Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at Westpoint. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the very systems that apparently failed on 9/11.
Before founding Riptech in 1998, Yoran directed the vulnerability- assessment program within the computer emergency response team at the US Department of Defense.
Yoran previously served as an officer in the United States Air Force as the Director of Vulnerability Programs for the Department of Defense's Computer Emergency Response Team and in support of the Assistant Secretary of Defense's Office.
In June 2005, Yoran joined the board of directors of Guardium, Inc., another Mossad-spawned "provider of database security solutions" based in Waltham, Massachusetts.
Guardium is linked with Ptech, an apparent Mossad "cut out" computer security company linked with the 9/11 attacks.
Ptech, a computer software company in Quincy, Mass., was supposedly a small start-up company founded by a Lebanese Muslim and funded by a Saudi millionaire.
Yet Ptech's clients included all the key federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House.
The marketing manager at Ptech, Inc. when the company started in the mid-1990s, however, was not a Muslim or an Arab, but an American Jewish lawyer named Michael S. Goff who had suddenly quit his law firm for no apparent reason and joined the Arab-run start-up company.
Goff was the company's information systems manager and had single-handedly managed the company's marketing and "all procurement" of software, systems and peripherals. He also trained the employees. Goff was obviously the key person at Ptech.
In the wake of 9/11, during the Citizens' Commission hearings in New York, Indira Singh, a consultant who had worked on a Defense Advanced Research Project, pointed to Ptech and MITRE Corp. being involved in computer "interoperability issues" between the FAA and NORAD.
At this time Ptech's ties to Arabs was the focus, and Goff was out of the picture.
"Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA that there was a window of opportunity or to insert software or to change anything it would have been Ptech along with MITRE."
The Mossad-run Guardium company is linked with Ptech through Goff Communications, the Holliston, Mass.-based public relations firm previously run by Michael S. Goff and his wife Marcia, which represents Guardium. Since being exposed in AFP in 2005, however, Michael's name no longer appears on the company website.
Although he and his brother reportedly grew up in Pound Ridge, New York during the 1970s and 1980s, the heads of the Jewish community told AFP that they had never heard of him. One said that she had conducted a survey of the Jews living in the small village of Pound Ridge in the 1970s and she would have remembered if a wealthy Israeli family named Yoran had been found.
Why did the locals in Pound Ridge NOT remember the Yorans?
Probably because they were NOT in Pound Ridge but in Israel. The Pound Ridge address was used to give the appearance that the Yorans were Americans. I spoke with Elad and he has a distinctive Israeli accent not what you would expect for a guy who grew up in a posh Yankee village.
So who are the Yorans? Who are their parents and why did they come to the United States? To raise a couple high-level moles to infiltrate the most sensitive U.S. computer networks? How could they have lived for 20 years in Pound Ridge and NOT be remembered.


Much more there too...
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#14
I followed a link to a whistle blower who refers to the missing 2.3 trillion dollars. This amount is staggering, but the statement is deceptive.

What were these missing trillions supposed to be spent on? Are most of the pentagon's budget line items in appropriations bills? When congress appropriates these enormous amounts, they are not sent as single lump sum check and deposit in XYZ bank. They are broken up into specific and smaller (though enormous) sums and transferred electronically and show up as a positive amount on some balance sheet. And then checks are drawn to sub contractors, and all the related highly inflated expense items.

So what is being referred to when they say they were looking for 2.3 trillion dollars gone lost? Perhaps they were trying to put together a second set of books to explain were years of DOD spending went.
Reply
#15
Ed, Jeffrey - excellent thread. Thank you.

Please can you clarify something for me.

Like your good selves, I'm highly familiar with US government theft of PROMIS software, the Riconoscuito claims, and the fatal journey of Danny Casolaro.

My hesitation over the legacy of PROMIS is that it was essentially database software, used by banks, police forces, federal agencies, etc, with a secret intelligence service back door to all the data contained therein. And that this information has been public domain for a long time.

If I was planning a major terrorist act to take place in the heart of western power, I wouldn't go anywhere near PROMIS software....

However if I understand whistleblower Indira Singh, and the articles Ed kindly posted, correctly, the claim is that PROMIS was at the heart of the Total Information Awareness which enabled covert control of the players involved in the events of 9/11.

Am I correct in assuming that what is being claimed here is the latent power of PROMIS for Total Information Awareness as it has been developed, and as it has been transformed, into new software programmes over the past 15-20 years?

In other words, that rather than PROMIS itself, in the context of 9/11 and PTECH we are talking of the prodigal great grandson of PROMIS - as sketched in the quote below?

PROMIS incestuously mated and mutated with Artificial Intelligence to morph into something brand spanking new?


Quote:CODA: Knowledge is Power
The computational power of the Ptech evolution of PROMIS software represents of a daunting new surveillance-and-intervention capability in the hands of the same elites who planned 9/11, prosecute the subsequent resource wars, and are presiding over what may become a full economic and military disaster for the resource-consuming citizens of America and the world. Since the "War On Terror" and this coming dollar / natural gas collapse will necessitate new levels of domestic repression, this is just the capability those elites require. Ptech is Total Information Awareness.

It combines datamining, artificial intelligence, and "interoperability," the capacity for one program to read, operate, and modify the source codes of other programs. Datamining is a technique for detecting and extracting meaningful patterns hidden within vast quantities of apparently meaningless data. Applications include policing and case management (where PROMIS -- Prosecutor's Management Information System began), aviation (Mitre), banking and risk management (JP Morgan), enterprise architecture and knowledge management (Popkin), the gathering and sifting of political and industrial intelligence information (FBI, RCMP, et al.), and a wide range of military applications (NORAD, Navy, etc.).

Programs based on datamining are powerful analytical tools; finding meaningful patterns in an ocean of information is very useful. But when such a tool is driven by a high-caliber artificial intelligence core, its power gets spooky. The datamining capability becomes a smart search tool of the AI program, and the system begins to learn.

http://www.fromthewilderness.com/free/ww..._pt1.shtml
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#16
Jan, I think your assumptions are correct; they are mine as well, and perhaps your comment/question points to the need for us all to be more super-precise if and when possible when discussing this. I have probably succumbed to an easy but bad habit of referring to these kinds of software programs as PROmis as if it is the original version (or even the one modified to have the back door) was the one used or in use when, indeed, it is son-of or great-grandson-of. But we should be sure to stay vigilant and ask for assistance from others who function in the field of computer software at a very high end.

If I understand computer software (not a good assumption), it is simply a chain of commands in certain obscure numeric languages that contain a series of subsets like DNA or a sentence (nay, multiple paragraphs) in English with commas, clauses, semicolons, other punctuation and a burp or two that can be reverse-engineered and re-constructed with ease if you understand the languages, the field, and have the machinery to run and test the program.

I suspect that a great deal of reverse-engineering and re-construction has taken place inside private military contractor organizations which are, both by company and product, proprietary in nature and thus totally unavailable to curious eyes, as well as hiding behind the usual wall of state secrecy.

Thus, at any given point in time, we are not even talking about great-grandsons but distant bastard cousins thrice removed by way of annulments and divorce decrees, marriages with under-aged people in the Church of We-Can-Do-Whatever-We-Want and perhaps even an occasional gene splice.

You will never be able to buy such a product at Operating Systems R US.
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#17
My sense about this "software" is a bit different from Ed's. Caveat: I know nothing ab out programming.

Computers actually have many levels of language or code. At the most basic level its binary. But like words are made up of 26 letters (in English) and letters are composed of lines and arcs... eventually you get to sentences which have "meaning" and can describe actions. At the level most people use computers the "commands" are like point and click at some "routine" and so forth. Enough of the "structure" of software.

What software does is enable processes or actions which required lots of data and computations. And these are done at "lightning speeds" which humans can't match. Think of navigating and manually processing "inputs" from observations. With computers the observations are turned to data and the navigation is done by "algorithims".

Back to the issue at hand.

What has happened in our world is that organizations have grown to enormous size and still have a pyramidal hierarchical structure for processing information and decision making. Most decisions are made without having to be send up to the top. But clearly in some systems an individual low down in the pyramid can make a decision of repercussion throughout the whole organization and "bring it down". Software has been created to mitigate such risks... and it does so "automatically" by monitoring the performance (data) produced by the system (workers in some cases).

The implication here is that if you can control the performance of the software, parameters and so forth, you can "control" or take control of the entire system.

Another key aspect of such software is interoperability which enables large organizations to communicate, hand shake and "transact". So you can pay with PayPal and get a ticket to the Opera for example. The opera and PayPal must communicate - transact.

On 9/11 our defenses seemed to have been "gamed". Most decision makers in the chain of command are looking at computer screens which tell them the "status" of what's happening. Even ATC are looking at radar screens to tell them about the planes up there.

Where does that data on those screens come from? We believe it comes from "transponders" aboard the aircraft which are send by radio frequency, received by antenna and processed to appear on those screens by computers.

Why can't a false signal be sent and received and read as "real"? It can!

In fact, what seems to have happened is that the software which runs the entire DOD, NORAD, ATC, and even the airlines was "played with" on 9/11 and confusion ensued. We have no reliable data about what happened save from some witnesses and videos.

Software is at the heart of every large organization from a bank to an air line to a navy. Whomever can access the back door of this software can do some mighty mischief if they want and know how.

We have so little to go one which is reliable.

And analysis of the videos shows many of them have been tampered with. No one saw 9/11 live on TV because it was delayed by as much as 14 seconds if I am correct. All videos were confiscated by the FBI and few if any raw footage is available.

We simply do not know what happened and the results... the evidence was destroyed before it could be carefully examined.
Reply
#18
Jeffrey Orling Wrote:I followed a link to a whistle blower who refers to the missing 2.3 trillion dollars. This amount is staggering, but the statement is deceptive.

What were these missing trillions supposed to be spent on? Are most of the pentagon's budget line items in appropriations bills? When congress appropriates these enormous amounts, they are not sent as single lump sum check and deposit in XYZ bank. They are broken up into specific and smaller (though enormous) sums and transferred electronically and show up as a positive amount on some balance sheet. And then checks are drawn to sub contractors, and all the related highly inflated expense items.

So what is being referred to when they say they were looking for 2.3 trillion dollars gone lost? Perhaps they were trying to put together a second set of books to explain were years of DOD spending went.


I think of several things when I read this post:

1) Lots of stuff I have read by Catherine Austin Fitts who was screaming about money transactions connected to 9/11 starting as early as 9/13, perhaps. I'd have to wade back through it all to excise and excerpt out relevant passages. She may well have been one of the very first 9/11 Truthers.

2) The movie starring Sean Connery and Catherine Zeta Jones in which they pulled off a heist of a bank in the tall towers of Malaysia at the absolute stroke of midight at the turn of the millennium by stopping the clock for milli-seconds and draining the inflow during that time period to a different account.

http://www.sleeplessinkl.com/wp-content/...bridge.jpg

3) The fact that an obscure Air Force colonel at Maxwell Air Force base did a million dollars worth of unauthorized and unnoticed number-crunching on Air Force computers proving his design of the F-15 yet the Air Force could never prove that he pulled off the heist of time. He eventually only showed them how when he was given full immunity in writing. [Remember that this same fellow was pulled out of retirement to go to Washington to meet with the Secretary of Defense and brief him on his theories of destruction, creation, orientation, observation, and decision-making in action.

http://image56.webshots.com/156/4/27/45/...RDM_fs.jpg

4) The same techniques used by high end traders on Wall Street using computers that work faster and over shorter cable lengths to see what others are trading and how the market is performing milli-seconds faster than the competitors.

4) The suggestion (see Fitts above, as well as others) that the nation's intel agencies drain Federal budgets and perhaps other accounts in such tiny amounts that their losses seem minuscule but, collectively, add to mega-dollars for the express purpose of funding covert operations or creating corporations that Congress will not either fund or permit.

A recent GAO report notes that almost all the accounting of the Federal spending for the last ten years is effectively so messy than an audit would not suffice to add clarity, that no one can say with any authority what is going on.

Finally, it apparently doesn't matter to some, as there is a printing operation in the basement making $100,000 bills in sheets at a high rate 24 hours a day.

[If there is anyone who thinks this is the way to do business, there is a job for you somewhere in the US Treasury Department.]
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Dr. Judy Wood's Book 'Where Did The Towers Go?' Peter Lemkin 8 21,426 05-04-2022, 10:57 AM
Last Post: O. Austrud
  NEW Proof of Controlled Demolition of WTC-7 Peter Lemkin 6 5,957 19-04-2020, 05:27 AM
Last Post: Peter Lemkin
  Kevin Ryan on 9/11 Insider Trading Lauren Johnson 1 7,091 06-09-2018, 03:19 AM
Last Post: Lauren Johnson
  Seismic Evidence of Controlled Demolition of WTC Towers [all three] Peter Lemkin 0 4,042 12-01-2018, 09:59 AM
Last Post: Peter Lemkin
  European Scientific Journal Concludes 9/11 a Controlled Demolition David Guyatt 5 14,265 22-02-2017, 11:39 PM
Last Post: Magda Hassan
  Million-Dollar Diamond Theft at the World Trade Center on 9/11 Tracy Riddle 0 4,712 05-12-2016, 05:54 PM
Last Post: Tracy Riddle
  Kevin Ryan: Dulles 9/11 Video Probably Faked Lauren Johnson 8 13,423 10-06-2016, 08:12 PM
Last Post: Peter Lemkin
  Demolition Access to the WTC Towers Peter Lemkin 1 11,022 29-02-2016, 09:53 PM
Last Post: R.K. Locke
  New Detailed Analysis of WTC 7 Controlled Demolition Peter Lemkin 0 5,056 01-12-2015, 04:42 AM
Last Post: Peter Lemkin
  Dutch Demolition Expert ID's WTC-7 as Controlled Demo...then is killed in accident. Peter Lemkin 7 19,787 20-09-2015, 07:42 AM
Last Post: Peter Lemkin

Forum Jump:


Users browsing this thread: 1 Guest(s)