
Deception Dollars

t-shirts
Sections
Main
SGTV/INN

MUST SEE: 911 Documentry
Watch SGTV, our TV show, every Thursday on MNN webcast, 8 PM EST

Watch INN World Report, our new cooperation partner, every Friday (Repeats on Saturday + Sunday) on Free Speech TV, MNN and many other Public Access Channels, 6 PM EST.
INN is also our new breaking news partner. Their news shows incl. Interview Highlights with John Pilger, Joe Conason, Michael Meacher, Bev Harris, Cynthia McKinney, Sander Hicks and many others...
911 Encyclopedia

Ewing2001 Has compiled a comprehensive list of links an articles pertaining
to 911.
This is required reading for anyone interested in understanding that horrid
day ESPECIALLY since the presstitutes refuse to their job.
more...
Search
9/11 News and GFP-911 Archive

Mike Malloy
Mike Malloy pulls no punches with the FLYING MONKEY RIGHT. If you want to
hear a REAL liberal tell it like it is don't miss his show!
Listen Daily 9pm
to 12pm
One Year Later

Peter Werbe
Tune in to get a liberal helping of the TRUTH. Peter Werbe stands up to the
neo-cons and for liberal cause daily while keeping us all informed on the daily
events that are shaping our world.
Listen Daily 2pm till 5pm

Liberal Talk Radio In Florida!
Spread the word. Tell your friends to listen in. Call
the station every Saturday and give them your supportive
comments (239-732-9369). Call The Guy James Show live
on the air (239-530-1660).
The Randi Rhodes Show

more...
Internet Radio/Tv For Progressives
Books
Alex Jones Video
Global Outlook

Michel Chossudovsky's Magazine on 911 and Post-911 Analysis
Issue No.5-out now:
Bush's "Project for a New American Century"
Was 9/11 a Hoax?
Diving up the Spoils of War
Website Topics of the month:
Was Kelly assassinated for "pulling the plug"
The Forged Intelligence on Iraq
Who's Who on the 9/11 "Independent" Commission
Hot ranking thread:
CIA closed friend with the finanzsystem of Al-Quida!
GLOBAL RESEARCH (CANADA) : FEATURE ARTICLES
25 November - 3 December 2003
Iraq: The Truth on the
Convoy which was attacked while driving through
Samara
The Rise of a New Dictatorship in Iraq , Firas Al-Atraqchi
The FTAA Protests: This is What Democracy Looks Like in Miami, Al Crespo
Enforcing Globalization: New World Order Weapons, John Valleau
Police State in America:
Bush’s Operation Clean Sweep: World War IV in
2004? John Stanton
Manipulating Pathologic Evidence: The David Kelly Story: Turning Murder
into Suicide, Rowena Thursby
The Legend of 9/11: Coincidence or Conspiracy: The Tale of The Millennial
Bomber, Chaim Kupferberg
Assassination of Reuters Cameraman, who had uncovered evidence of Mass US
Casualties in Iraq, Felicity Arbuthnot
Legal Scam in Denmark:
Danish government lawyers removed preconditions
for invasion of Iraq, Coilín Oscar ÓhAiseadha
Le Général Franks doute que la Constitution survive à une
attaque aux ADM
(armes de destruction massive) , John O. Edwards
Who’s Holding All the Cards?... The Bipartisan War Agenda, Michel
Chossudovsky & Ian Woods
Being "Against the War" is now a "Terrorist Act":
FBI
Targets Anti-War Activists
Counterpunch
|
(Open Headlines Popup Window)
posted by ewing2001
on Monday September 15, @10:31PM
from the CBS/Freedomfiles dept.
Update: Background Info about Booz Allen Hamilton and Magic Lantern (09/22)
New Cybersecurity Chief Named
CBS -Sept. 15, 2003
(CBS/AP) The Bush administration on Monday selected Amit Yoran, a respected software executive from Symantec Corp., as the nation's new cybersecurity chief inside the Department of Homeland Security.
Yoran's selection was announced to industry executives and other government officials. Yoran, who was not at the announcement, said he expects to report for work within a few weeks.
Following a compilation of links and analysis by Freedomfiles on the same issue (To be updated)
Cybersecurity expert warns of post-9/11 vulnerability
http://www.computercops.us/article3129.html
Security in the Slow Lane
http://www.computercops.us/article-topic-22.html
The death spiral
Will IT ride today's approach to anti-worm and anti-virus software to
certain doom?
http://www.computercops.us/article3130.html
Social Engineering for Security
http://www.computercops.us/article2934.html
http://www.computercops.us/
Blaster II ? Microsoft Warns of new security holes
http://www.computerweekly.com/
Security: No place to hide
http://www.computerweekly.com/
UN hosts Global Infosec conference
computerweekly.com
Hacking MCI Worldcom
From the Findlaw archive: USG vs Adrian Lamo
"NYT Representative One advised me {FBI Agent} that
the intruder {Adrian Lamo} had altered the Op-Ed database, adding a record for
"Adrian Lamo" and personal information such as Lamo's cellular telephone number
(i.e., (414) 505-HACK) and email address, and listing his expertise as "computer
hacking, national security, communications
intelligence."
"Based on my {FBI Agent} training and experience, I
have learned {Lamo} had accessed a New York Times staff list; obtained the name
and Social Security number of a former New York Times employee; and using that
information logged onto the NYT Intranet as a "superuser".
{I've been working in the IT industry for years,
being responsible for security, and I really want to see how anyone can get root
by getting the name and SSN of a former employee of any company}
Lamo has earned a reputation for hacking into the
networks of large corporations, alerting the companies and offering to fix their
vulnerabilities - for a price.
In December, he was praised by communications
monolith WorldCom after he discovered - and helped fix - gaping holes in its
intranet that threatened to expose the private networks of Bank of America,
Citicorp and J.P. Morgan.
http://www.suprmchaos.com/bcEnt-Fri-030102.index.html
{So he hacks MCI, gets hired and praised by them
to solve their problems and will now be charged among others because he hacked
MCI Worldcom ?}
More related Sources
September 10, 2003
Congressional Testimony
The director of the CERT Coordination Center presented testimony entitled "Viruses and Worms: What Can We Do About Them?"
Blaster II? Microsoft warns of new security holes
Software giant issues more patches for 'critical' Blaster-related holes
Infoworld.com
IDefense and Cybersecurity
Compiled by Freedomfiles
This company builds a bridge between the
intelligence community and the computer security business, and is a contractor
for among others the Homeland Defense Department and various other US Government
Agencies. The companies founder has it's roots in the
National Security Agency.
IMHO iDefense might be involved in the
creation of among others blaster and sobig, which seem to be created with the
purpose to force people to patch the security leaks they abuse in an effort to
beef up security on the internet.
About iDEFENSE
iDEFENSE
is a global information security intelligence company, offering information
assurance solutions to clients who desire the highest level of confidence in
their security posture and the ability to compete in the global electronic
marketplace. Founded in 1998, the company is headquartered in Chantilly, VA,
with an office in Japan. Clients include major government agencies, financial
institutions and other Fortune 500 companies. For more information, visit the
iDEFENSE website at http://www.idefense.com
iDEFENSE is a global security intelligence
services company, iDEFENSE provides advanced warning and analysis of threats to
our clients' critical information infrastructure. But iDEFENSE goes well beyond
the technical vulnerabilities and virus attacks. Our analysts examine hackers,
incidents, geopolitical aspects, legal implications and policy decisions to see
how a critical information infrastructure can be impacted.
http://www.techsec.com/html/TechnoSponsors2003.html
Executive team: http://www.idefense.com/exec.html
Idefense working for Department of Homeland Defense
http://www.gcn.com/21_23/news/19575-1.html
HHS also has issued a request for proposals for a
managed security services contract. Seligman hopes to award a contract in
several weeks and have a system in place in about three months.
"We want
a managed security service provider to be watching our perimeter and in some
cases our interior with intrusion detection sensors on a real-time basis around
the clock, and to be alerting us to abnormal incidences that they may see," he
said.
Another recent enterprise initiative was to go departmentwide with
a cyberthreat intelligence service from iDefense Inc. of Chantilly, Va.
Seligman piloted the service at CDC about two years ago before awarding
iDefense a contract for all of CDC.
The service, called iAlert, gives
subscribers daily, in-depth intelligence reports on threats such as viruses,
worms and hackers so organizations have the data they need to combat them.
Citing a recent experience, Seligman said CDC received an iAlert warning about
malicious software in the wild with a .CPL file extension.
"We put an
absolute blanket prohibition on having an attachment come in through e-mail with
that file extension on it in advance of noticing any of it at the agency," he
said. "That's an example of where [iDefense's] intelligence alerts helped us out
before we ever experienced any negative outcomes."
HHS's one-year
contract with iDefense is worth about $140,000, said Brian Kelly, chief
executive officer of company.
HHS Boosting Cyber Security
http://www.fcw.com/fcw/articles/2003/0602/web-hhs-06-04-03.asp
The Department of Health and Human Services has
expanded its contract with iDefense Inc. to provide cyberthreat intelligence to
the entire department.
Reston, Va.-based iDefense will help the
department protect its computers, networks and Internet functions with the
company's iAlert intelligence service.
The service will provide
intelligence reports to keep HHS officials aware of possible risks. The company
delivers the intelligence reports via e-mail, a secure Web interface and
wireless devices.
"The Department of Health and Human Services is
setting the standard for proactive defense by uniformly equipping all of its
agencies with the capability to quickly deploy countermeasures against emerging
threats before they can cause any damage," iDefense vice president of
intelligence operations John Frazzini said in a statement.
IDefense will
provide the following services for HHS:
* Daily intelligence reports
providing early warning notification and analysis on cyberthreats.
*
Proactive countermeasure information, such as patches and workarounds, to avoid
damage from the latest vulnerability.
* Profiles of threats, including
individual and groups of hackers and areas of increased malicious cyberactivity.
State buying Cyberalert Service http://www.fcw.com/fcw/articles/2001/
The State Department is buying an online service to
provide its workers with daily news and bulletins related to Internet threats
and security.
State intends to buy iAlert cybersecurity service on a
sole-source basis from iDefense Inc. of Fairfax, Va., according to an
announcement published on BidRadar, a Web service that alerts businesses to
government contract purchases and requests for proposals.
A contract
amount was not included in the announcement, and State offered no comment. A
company spokesman said iDefense has yet to conclude a deal and so declined to
talk about it.
But company spokesman Jerry Irvine did describe what
iAlert provides:
From their desktops, customers log on to a secure Web
site where they find up-to-date reports on viruses, hacker tools or
activities—"anything that would potentially emanate from an online or cyber or
electronic threat, or present a vulnerability to an organization," Irvine said.
Bulletins on cyberthreats, for example, would be followed up by in-depth
analysis of the activity, including methods and location, he said.
According to the announcement, State will be able to subscribe to the
service for a year.
National Security Risks of Cyber Threats
http://www.pbs.org/wgbh/pages/frontline/...
The Myth of Cyberterrorism http://www.washingtonmonthly.com/features/2001/0211.green.html
Promise of Security http://www.securitysoft.com/news/theenemywithin.html
Bugbear Worm: New Kind of Crime ?
http://www.msnbc.com/news/922529.asp
http://www.mmicommunications.net/pdf/iDEFENSE.pdf
Issue Date: 2/11/2003 Title: Don't Underestimate
Cyberterrorists, Experts Warn Author: Costello-Dougherty, Malaika
Publication: Medill News Service Publication Date: 02/07/03 Security
experts warn that America's enemies can exploit cyberspace to wreak havoc with
the nation's public infrastructure, unless its online defenses are beefed up
with the installation of security software and increased awareness among users
of both the risks and ways to avoid them. A report by Dartmouth College's
Institute for Security Technology Studies notes that cyberattacks designed to
carry a political agenda are often harbingers for physical acts of terrorism,
and warns that Internet-based assaults on information systems as well as public
utility systems are "extremely likely" if the United States goes to war.
IDEFENSE intelligence analyst Ken Dunham notes that a known hacker claiming
allegiance to al Qaida has threatened to unleash a computer worm upon the United
States if it attacks Iraq, and adds that this individual has the capability to
do so. The Dartmouth report says that most cyberattacks are likely to be led by
terrorist sympathizers, or hackers who do it for the thrill. Dunham cautions
that hackers can use scanning tools available online that could enable them to
find security holes in a matter of minutes, and can hinder the dissemination of
information by altering or imitating legitimate Web sites. He adds that
knowledgeable Web surfers can recognize spoofed sites by noticing the "@" symbol
within the link. A recent Symantec report says that threat severity and computer
vulnerabilities increased last year, and lists blended threats as the most
pressing danger to Internet security; government agencies and security firms
have joined forces to encourage users to deploy security software and adopt
protective measures. "As long as we have vulnerabilities in cyberspace and as
long as America has enemies, we are at the risk of the two coming together to
severely damage our great country," declared White House cybersecurity adviser
Richard Clarke in an email announcing his resignation.
http://www.lodisecurity.com/news/021103.htm
March 20, 2003 Microsoft has
warned users that most versions of its Windows software have a "critical" flaw
that, if exploited, can allow a hacker to usurp control of a system or
network when a victim visits a Web site or uses an e-mail program. http://www.crmdaily.com/perl/story/21051.html
The company urged users of Windows 98 and all newer
versions, including Windows XP , to download a patch, though it said newer
versions of Outlook Express and Outlook 2002 are not susceptible.
The
software giant said it is not aware of any attacks that exploit the
vulnerability, which it first learned of in January, shortly after security
research firm iDefense got word of the flaw from a UK-based researcher. iDefense
said it alerted some of its clients to the flaw before the patch was officially
made available.
June 18, 2003 SoBig Worm Rears Its Head Again
http://www.internetnews.com/infra/article.php/2224271
"The author of the SoBig.D worm likely waited a few
days after security experts published information expecting a new variant to
appear on the kill date of SoBig.C," said Ken Dunham, senior intelligence
analyst for iDefense. "It's truly amazing to watch a series of worms be
sequentially released, with such great success in the wild. SoBig.D spits in the
face of traditional security measures, showing how important it is to have rapid
response systems and intelligence programs in place to help respond to such
threats."
While firms like Symantec and McAfee say the new worm's threat
rating is low, iDefense has concluded it has a moderate severity rating.
"SoBig.D is quickly gaining ground in the wild," Dunham said. "We recommend
taking immediate action to mitigate this emerging threat. To effectively block
against the e-mail component of this worm, simply block e-mail attachments such
as .exe, .scr, and .pif at the gateway level."
June 26, 2003
Sobig.E Worm Spreads Rapidly Across The Internet http://www.techweb.com/wire/story/TWB20030626S0006
Sobig.E was spreading Wednesday at a faster rate
than its predecessor, Sobig.D, according to iDefense, a security intelligence
firm. Most reports of the worm are from the United States, the United Kingdom
and the Netherlands, the firm said.
More copies of Sobig.E are making it
to the client level because .zip files "are commonly allowed through gateway
filers where other file types are blocked," said Ken Dunham, iDefense senior
intelligence analyst, in a prepared statement.
August 18, 2003
Blaster 'Fixer' Worm Sprouts New Versions http://www.internetnews.com/infra/article.php/3065371
Ken Dunham, a manager at security specialist
iDefense, said the new worm opens TCP port 707, which could lead to exploitation
by a malicious actor. "This upgrades the threat significantly," Dunham said.
'Some may call this a good virus, but it can cause all sorts of problems when
patches are applied to a computer, unbeknownst to the administrator of that
computer," he added.
According to Dunham, the new Welchia copycat
doesn't attempt to remove itself from an infected computer until the year 2004.
"This may be an attempt for the worm to spread in the wild, patch vulnerable
computers, until most computers successfully update against the RPC
vulnerability exploited by DCOM RPC based worms," he explained.
iDefense's Dunham echoed calls for users to update against the DCOM RPC
vulnerability. "Thousands of computers have been compromised with Trojans as
well as hundreds of thousands of computers compromised by recent DCOM RPC based
worms," he added.
August 29, 2003 Minnesota teen arrested in
MSBlaster Case http://www.gcn.com/vol1_no1/daily-updates/23373-1.html
Ken Dunham, malicious code intelligence manager at
iDefense Inc. of Reston, Va., characterized him as a “script kiddy,” a
derogatory term for a malicious hacker without the expertise to do original
coding. But Dunham said arrests and prosecutions even at that level are
important
If there is no accountability, there will be a lot of people
who will decide to play on the dark side,” Dunham said. “We can’t rely on the
morality of people. There must be consequences to have order on the Internet.”
The Ralekab worm first appeared three days ago, and three variants have
been found so far. The new worm carries a backdoor Trojan horse and can update
itself from a remote Web site, according to iDefense. But Ralekab might not get
the opportunity to spread as far or as fast as Blaster.
“New worms like
Welchia or Nachi (which actually patched the vulnerability), and aggressive
patching are helping to patch computers vulnerable to remote procedure calls,”
Dunham said. “As a result, this and future worms will likely have less success
than former variants exploiting the same vulnerability.”
Evolution
of Cross-Site Scripting Attacks by David Endler - iDEFENSE Labs
http://www.net-security.org/article.php?id=113
17. Why did Jack Kelly, idefense.com, inform USA
Today only 12 minutes after the first crash (8:48AM), that terror groups
using Web encryption may have been responsible? And why was he so sure
before the second crash at 9:03 PM? 18. Did Kelly serve with the U.S.
government where he managed several significant programs for the
information warfare and intelligence communities?
www.rense.com/general24/t500.htm
James Adams is the founder, Chairman and Chief Executive Officer of the Ashland Institute for Strategic Studies. He is also a
Senior Associate at the Center for Strategic and International Studies where he
specializes in globalization, intelligence, cyber security and homeland defense.
For the past three years Adams was a member of the National Security
Agency’s Advisory Board and the founding Chairman of the Technology Advisory
Panel of the Signals Intelligence Directorate at NSA, which is responsible for
oversight of all technology programs. In June 2001, Adams was presented with the
Special Recognition Award for “outstanding contributions in meeting the goals of
this Agency.” He is a member of the Strategic Assessments Group of the Central
Intelligence Agency and advises the Pentagon on strategy for Information
Operations in the war against terrorism.
He is the Vice-President at
Applied Minds, a Glendale-based company founded by Danny Hillis, the founder of
Thinking Machines, and Bran Ferren, the former head of Disney’s Imaginarium. The
company develops very high value intellectual property through innovative
solutions to high technology problems.
He was the founder, Chairman and
Chief Executive Officer of iDEFENSE, the world’s first cyber-intelligence
organization with clients in the intelligence community, the government and
Fortune 100 companies. A former Managing Editor of the London Sunday Times and
CEO of United Press International, Adams trained as a journalist in England,
where he graduated first in the country. His work has appeared in many of the
world’s leading newspapers and journals, including Foreign Affairs, Los Angeles
Times, New York Times, and the Washington Post. For more than 25 years Adams has
specialized in national security and international relations. He is the author
of 13 books with a particular emphasis on covert warfare including The Financing
of Terror, Secret Armies and The New Spies. His latest book, The Next World War,
a study of information warfare, was published by Simon and Schuster (New York).
Other titles by Adams include Sell Out: Aldrich Ames: The Spy Who Broke the CIA
(Viking, New York), The New Spies: Intelligence After the Cold War (Hutchinson,
London) and Bull’s Eye: The Assassination and life of Iraqi Supergun Inventor
Gerald Bull (Random House, New York).
Adams is a sought after speaker in
the intelligence community and at high-technology forums both in the United
States and overseas. He makes regular appearances on television and has been
featured in various documentaries in the US, Japan, UK, Germany, and Italy.
http://www.ashlandinstitute.com/people.php
Hackers Pass Out New Software for Attacks
Newsday -September 16, 2003
WASHINGTON -- Security researchers on Tuesday detected hackers distributing software to break into computers using flaws announced last week in some versions of Microsoft Corp.'s Windows operating system.
The threat from this new vulnerability -- which already has drawn stern warnings from the Homeland Security Department -- is remarkably similar to one that allowed the Blaster virus to infect hundreds of thousands of computers last month.
The discovery gives fresh impetus for tens of millions of Windows users -- inside corporations and in their homes -- to immediately apply a free repairing patch from Microsoft. Homeland Security officials have warned that attacks could result in a "significant impact" on the operation of the Internet.
Researchers from iDefense Inc. of Reston, Va., who found the new attack software being distributed from a Chinese Web site, said it was already being used to break into vulnerable computers and implant eavesdropping programs. They said they expect widespread attacks similar to the Blaster infection within days...
Who is Booz Allen Hamilton?
Memes.org -Sep 22, 2003
By Spycraft
A company with strong ties to the atrocity of September 11, 2001 is also implicated in the intense digital harrasment experienced in the past couple of years by anti-war activists.
Let's get right to the meat, eh?
Big Brother Alive and Well at Yahoo
http://www.crazyjeff.net/yahoobug.html
is an excellent piece from which the following is snipped:
~Booz-Allen is engaged in the creation of a program called "Magic Lantern." This program is designed to figure out people's passwords so the military can have access to *ALL* email accounts...for the purpose of fighting terrorism. Magic Lantern insidiously will install a "virus" on your computer so that when you next log in to your email using a password, Magic Lantern sends a copy of the password to a Military computer, and they can then access your email. This is all stuff I got to read in the Washington Technology (a magazine devoted to celebrating the newest technological contracts awarded on Capitol Hill). It was H IGHLY recomended to me that those of us that use our email to engage in social justice work be aware of these realities and change our passwords VERY Frequently, making sure to include numbers in our passwords.~
Now, many of you may remember the enormous disruption that occurred last year in the online activist community with worms, virii, digital identity theft, email bombs, etc. and how it all targeted anti-war activists, pro-palestinian activists, and those trying to get to the bottom of 9-11. One can deduce that the authors and/or puppetmasters behind this barrage were all of the same mind and all perhaps had something to do with the advancement of the military position of Israel, the advancement of the "War on Terror" and the obscuring of any real investigation of the events of September 11, 2001.
In light of such, I consider it no accident that Booz, Allen, & Hamilton (cited above) are also heavily implicated by much of the serious research on 9-11.
Please read on.
The following is snipped from:
Booz, Allen, and Hamilton Awareness
http://groups.yahoo.com/group/Enronscam/message/297
~snip~
The Defense Advanced Research Projects Agency (DARPA), which oversees the Total Information Awareness System (TIA), awarded 13 contracts to Booz Allen & Hamilton amounting to more than $23 million.
~snip~
TIA draws heavily on the private sector. Five of the eight contractors identified by the Center are involved in evaluating future contracts for the program. Grey E. Burkhart, an associate of Booz Allen Hamilton, identifies himself on his resume as “assistant project manager” of TIA system implementation. Even the phrase “Total Information Awareness” has a private pedigree—Visual Analytics, Inc., a Poolesville, Md.-based software developer and DARPA contractor, has applied for a trademark for the phrase.
~snip~
August 8, 2001: Booz, Allen, & Hamilton employee named head of NIMA (the National Imagery and Mapping Agency - the 'eyes of America')
http://cartome.org/new-nima.htm
~NIMA, the eyes of America, gets a new head one month before Operation Two Towers (9-11), one month AFTER Larry Silverstein takes over propietorship from Chase Manhattan and Citigroup.~
James R. Clapper named Director of National Imagery and Mapping Agency. Secretary of Defense Donald H. Rumsfeld and Director of Central Intelligence George J. Tenet jointly announced the appointment of James R. Clapper Jr. as the new director of the National Imagery and Mapping Agency (NIMA) on August 8, 2001. Clapper, who will become the first civilian head of the agency, succeeds Army Lt. Gen. James C. King who has headed NIMA since March 1998 and will be retiring from the Army later this year. Clapper was chosen for the position owing to his grasp of intelligence matters and his knowledge of the needs of NIMA's principal users, the combat commanders. The director has more than 37 years experience in intelligence, working at all levels and phases of the field. He retired from the Air Force in September 1995 as a lieutenant general after a four-year tour as the director of the Defense Intelligence Agency. Since his retirement, he has served successively as executive vice president of Vredenburg, a systems acquisition services company headquartered in Reston, Va.; executive director, military intelligence for Booz, Allen & Hamilton, McLean, Va.; and recently as vice president, director of intelligence programs for SRA, International, Fairfax, Va.
~snip~
Back in 1999, "a Saudi government audit acquired by US intelligence showed that 5 of Saudi Arabia’s top business executives ordered the National Commercial Bank (NCB), the kingdom’s largest, to transfer personal funds along with $3 million diverted from a Saudi pension fund to New York and London banks. The money was diverted into the accounts of Islamic charities, including Islamic Relief and Blessed Relief, that serve as fronts for Bin Laden."
The company's client list reads like a who's who of the high-tech industry, including companies such as IBM, Booz Allen & Hamilton Inc., Motorola Inc., Sprint Corp. and The Mitre Corp...
"Booz-Allen & Hamilton, in conjunction with the U.S. Navy and Marine Corps, runs the Saudi Armed Forces Staff College, while O'Gara Protective Services (former U.S. CIA and Secret Service agents) protects the Saudi royal family and their property and provides Saudi forces with security training."
~~~
The following is snipped from:
Total Information Awareness Relies on Private Sector to Track Americans
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1458
~snip~
DARPA has hired diversified defense industry giants Lockheed-Martin and Booz Allen & Hamilton for TIA and related projects. Booz Allen has won what may become the largest TIA contract, potentially worth $62 million over the next five years if DARPA exercises all the contract’s options.
Booz Allen employee Grey E. Burkhart’s resume notes that he is the “assistant program manager for the implementation of an advanced collaborative analysis system for the counterterrorism and intelligence communities,” which he identifies as “Total Information Awareness (TIA) System Implementation.” DARPA spokeswoman Walker told the Center that Burkhart is not an employee of the government.
Burkhart has had more than 25 years of experience in strategic security, intelligence, and telecommunications. Working in both the private and public sectors he was a career intelligence officer, CEO of Allied Communications Engineering, and has become a “recognized expert on in the global proliferation of information technology.”
Burkhart’s resume also notes that he was a member of Booz Allen’s Homeland Security Coordination Center and Tiger Team, for which he “conducted analysis of new legislation and executive orders and assessed their impact on current and future business.”
~~~
The following is snipped from:
Mitre Corp., Warren Buffet, Global Hawk, and September 11, 2001
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1663
~snip~
The NRO (National Reconnaissance Office) demonstrated its new satellite capabilities (NRO payload launched into space on September 8, 2001) and the National Imagery and Mapping Agency (NIMA - "the eyes of America") gained a new director one month prior to that fateful day. Considering all of this, one gets a pretty clear picture of where all those 'Star Wars' dollars went. James R. Clapper is the man named to head NIMA and he comes from Booz, Allen, & Hamilton which is a client for Blessed Relief, the charity said to be a front for Osama Bin Laden. Booz, Allen, & Hamilton also works closely with DARPA. DARPA is, of course, closely aligned with John Poindexter, head of Total Information Awareness and the guy that called the shots in Iran-Contra.
~~~~~~~~~~
FBI Data Mining with trojans, worms and warez
http://groups.yahoo.com/group/psy-op/message/10107
Total Information Awareness Relies on Private Sector to Track Americans
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1458
(From last year) Total Information Oppression: Now my mailing list has been killed! http://memes.org/modules.php?op=modload&name=News&file=article&sid=1428
From eight months ago: PLEASE HELP - DEATH THREAT
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1695
The NRO, September 11, UAV's, Echelon, ARPANET, the NSA, the Israeli Space Agency, NIMA, Booz-Allen & Hamilton, NASA, Ron Sega, Vince Foster, Global Hawk, TIA, Mitre Corp., Star Wars (SDI), Prince Fahd of Saudi Arabia (and his satellite investments), and the NMCI.
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1622
Also see:
Agent "Souljah" Smiley's Last Stand
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1921
from which the following is snipped:
~snip~
Consider this: the Advanced Research Projects Agency (ARPA), which would later become the DEFENSE Advanced Research Projects Agency, developed the internet. It was a DOD project before it was a public forum, which would later be turned over to the private sector for "management." DARPA it is that houses the Information Awareness Office which, in turn spawned TIA, the Total Information Awareness effort, headed by one John Poindexter, an Iran-Contra Felon that, like so many others, escaped retribution and now sits high up on the pyramid, under George W. Bush.
*
P.S. Recently, I ended a relative silence by hitting the web with a couple of pieces entitled 'Agent "Souljah" Smiley's Last Stand' and 'Chemtrails, Mormonism, Halliburton, Meth, the West Nile Virus, and Zion.' I posted from a relatively new addy and upon doing so, within a matter of a day of hitting Indymedia, several Yahoogroups, and Memes.org with the releases, the account received its first ever virus and worm attacks. I also got my first attempt by the dreaded NigeriaScam to get ahold of my personal banking specifics. Pretty blatant aren't they?
Booz, Allen, & Hamilton and Haliburton (Dick Cheney's company)
Booz, Allen, & Hamilton and Mitre Corp. (another company with strong ties to the events of September 11, 2001)
Booz, Allen, & Hamilton and Brown and Root (evil subsidiary of Halliburton)
Booz, Allen, and Hamilton and TRW (big NRO contractor)
Booz, Allen, & Hamilton and Global Hawk (the system used on September 11 to remotely smack some buildings)
Booz, Allen, and Hamilton and the NRO (on September 8, 2001, the NRO would run an exercise simulating the hijacking of airliners)
Booz, Allen, & Hamilton and the Carlyle Group (company houses ties between the Bushes and bin Laden)
BOOZ-ALLEN HAMILTON INTERNATIONAL
~*~
P.P.S. ..a few more applicable snips..
The following is snipped from:
All In The Family
Richard Perle resigned as chairman of the defense policy board last month after it was disclosed that he had financial ties to several companies doing business with the Pentagon.
But Perle still sits on the board, along with former CIA director James Woolsey, who works for the consulting firm of Booz, Allen, Hamilton. The firm did nearly $700 million dollars in business with the Pentagon last year.
~
The following is snipped from:
The Real Saudi Ties are U.S. Ties
"We’re doing a better job of sharing intelligence and collecting data, so we’re able to find, you know, able to anticipate" (President Bush)
Booz-Allen Hamilton (BAH), another global leader in strategy and technology consulting, runs the Military Staff College of Saudi Arabia. But BAH has its corporate headquarters in McLean, Virginia.
On August 15th, 2002, Dale Watson, former FBIHQ, went to work for Booz. No one ever complained that it was Watson who was unwilling to connect the dots during the increased warnings on a pending attack against America in Summer, 2001, and it is clear why: Watson formerly worked for the CIA and seems to have political support from their headquarter.
Booz Allen is also supported by ex-CIA director James Woolsey, who became Vice President of BAH on July 15th, 2002.
In May 2003, Consultant News and Navy Weeks reports, that the government of Saudi Arabia, awarded Booz Allen Hamilton with a sole-source contract for naval consulting work worth $7.9 million with options that could take it to $95.3 million.
Financial interests win out over political embarrassment. Getting Booz Allen Hamiliton involved in an investigation, seems more unrealistic than ever.
Please check out follow-up articles and links at
Waiting for a digital 9/11
< 9/11 Truth Movement : 1000s at the Anniversary Events
| Paris: "Sonic Jihad" finally out- Rapper thinks U.S. behind 9/11 >
Global Free Press Login
Related Links
Perl
http://www.computercops.us/art icle3129.html
http://www.computercops.us/art icle-topic-22.html
http://www.computercops.us/art icle3130.html
http://www.computercops.us/art icle2934.html
http://www.computercops.us/
http://www.computerweekly.com/
http://www.computerweekly.com/
computerweekly.com
http://news.findlaw.com /hdocs/docs/cyberlaw/uslamo803 cmp.pdf
http://www.suprmchaos.com/bcEn t-Fri-030102.index.html
Congressional Testimony
Infoworld.com
http://www.idefense.com
http://www.techsec.com/html/Te chnoSponsors2003.html
http://www.idefense.com/exec.h tml
http://www.gcn.com/21_23/news/ 19575-1.html
http://www.fcw.com/fcw/article s/2003/0602/web-hhs-06-04-03.a sp
http://www.fcw.com/fcw/article s/2001/
http://www.pbs.org/wgbh/pages/ frontline/...
http://www.washingtonmonthly.c om/features/2001/0211.green.ht ml
http://www.securitysoft.com/ne ws/theenemywithin.html
http://www.msnbc.com/ news/922529.asp
http://www.mmicommuni cations.net/pdf/iDEFENSE.pdf
http://www.lodisecuri ty.com/news/021103.htm
http://www.crmdaily.c om/perl/story/21051.html
http://www.internetne ws.com/infra/article.php/22242 71
http://www.techweb.co m/wire/story/TWB20030626S0006< /font>
http://www.internetne ws.com/infra/article.php/30653 71
http://www.gcn.com/vo l1_no1/daily-updates/23373-1.h tml
http://www.net-securi ty.org/article.php?id=113
http://www.infosecuri tymag.com/2003/jun/digest26.sh tml
http://groups.google.com/...
www.rense.com /general24/t500.htm
http://www.ashlandins titute.com/people.php
Newsday
Memes.org
http://www.crazyjeff.net/yahoo bug.html
Booz-Allen
Magic Lantern
virus
http://groups.yahoo.com/group/ Enronscam/message/297
DARPA
TIA
http://cartome.org/new-nima.ht m
The Mitre Corp
http://memes.org/modules.php?o p=modload&name=News&fi le=article&sid=1458
http://memes.org/modules.php?o p=modload&name=News&fi le=article&sid=1663
http://groups.yahoo.com/group/ psy-op/message/10107
http://memes.org/modules.php?o p=modload&name=News&fi le=article&sid=1428
http://memes.org/modules.php?o p=modload&name=News&fi le=article&sid=1695
http://memes.org/modules.php?o p=modload&name=News&fi le=article&sid=1622
http://memes.org/modules.php?o p=modload&name=News&fi le=article&sid=1921
Agent "Souljah" Smiley's Last Stand
Chemtrails, Mormonism, Halliburton, Meth, the West Nile Virus, and Zion
NigeriaScam
Booz, Allen, & Hamilton and Haliburton (Dick Cheney's company)
Booz, Allen, & Hamilton and Mitre Corp. (another company with strong ties to the events of September 11, 2001)
Booz, Allen, & Hamilton and Brown and Root (evil subsidiary of Halliburton)
Booz, Allen, and Hamilton and TRW (big NRO contractor)
Booz, Allen, & Hamilton and Global Hawk (the system used on September 11 to remotely smack some buildings)
Booz, Allen, and Hamilton and the NRO (on September 8, 2001, the NRO would run an exercise simulating the hijacking of airliners)
Booz, Allen, & Hamilton and the Carlyle Group (company houses ties between the Bushes and bin Laden)
BOOZ-ALLEN HAMILTON INTERNATIONAL
All In The Family
The Real Saudi Ties are U.S. Ties
Waiting for a digital 9/11
CBS
More on Bush
Also by ewing2001
| |