Cybersecurity 2003

Date:Monday September 15, @10:31PM
Author:ewing2001
Topic:Bush
from the CBS/Freedomfiles dept.

Update: Background Info about Booz Allen Hamilton and Magic Lantern (09/22)

New Cybersecurity Chief Named

CBS -Sept. 15, 2003

(CBS/AP) The Bush administration on Monday selected Amit Yoran, a respected software executive from Symantec Corp., as the nation's new cybersecurity chief inside the Department of Homeland Security.

Yoran's selection was announced to industry executives and other government officials. Yoran, who was not at the announcement, said he expects to report for work within a few weeks.

Following a compilation of links and analysis by Freedomfiles on the same issue (To be updated)

Cybersecurity expert warns of post-9/11 vulnerability http://www.computercops.us/article3129.html

Security in the Slow Lane http://www.computercops.us/article-topic-22.html

The death spiral Will IT ride today's approach to anti-worm and anti-virus software to certain doom? http://www.computercops.us/article3130.html

Social Engineering for Security http://www.computercops.us/article2934.html

http://www.computercops.us/

Blaster II ? Microsoft Warns of new security holes http://www.computerweekly.com/

Security: No place to hide http://www.computerweekly.com/

UN hosts Global Infosec conference computerweekly.com


Hacking MCI Worldcom

From the Findlaw archive: USG vs Adrian Lamo

"NYT Representative One advised me {FBI Agent} that the intruder {Adrian Lamo} had altered the Op-Ed database, adding a record for "Adrian Lamo" and personal information such as Lamo's cellular telephone number (i.e., (414) 505-HACK) and email address, and listing his expertise as "computer hacking, national security, communications intelligence."

"Based on my {FBI Agent} training and experience, I have learned {Lamo} had accessed a New York Times staff list; obtained the name and Social Security number of a former New York Times employee; and using that information logged onto the NYT Intranet as a "superuser".

{I've been working in the IT industry for years, being responsible for security, and I really want to see how anyone can get root by getting the name and SSN of a former employee of any company}

MCI Worldcom - In or about November 2001, ADRIAN LAMO, the defendant, gained unauthorized access to MCI Worldcom's internal computer network through a MCI WorldCom proxy server.

http://news.findlaw.com/hdocs/docs/cyberlaw/uslamo803cmp.pdf
 
Lamo has earned a reputation for hacking into the networks of large corporations, alerting the companies and offering to fix their vulnerabilities - for a price.

In December, he was praised by communications monolith WorldCom after he discovered - and helped fix - gaping holes in its intranet that threatened to expose the private networks of Bank of America, Citicorp and J.P. Morgan.

http://www.suprmchaos.com/bcEnt-Fri-030102.index.html

{So he hacks MCI, gets hired and praised by them to solve their problems and will now be charged among others because he hacked MCI Worldcom ?}


More related Sources

September 10, 2003 Congressional Testimony

The director of the CERT Coordination Center presented testimony entitled "Viruses and Worms: What Can We Do About Them?"

Blaster II? Microsoft warns of new security holes Software giant issues more patches for 'critical' Blaster-related holes Infoworld.com

IDefense and Cybersecurity

Compiled by Freedomfiles

This company builds a bridge between the intelligence community and the computer security business, and is a contractor for among others the Homeland Defense Department and various other US Government Agencies.

The companies founder has it's roots in the National Security Agency.

IMHO iDefense might be involved in the creation of among others blaster and sobig, which seem to be created with the purpose to force people to patch the security leaks they abuse in an effort to beef up security on the internet.

About iDEFENSE

iDEFENSE
is a global information security intelligence company, offering information assurance solutions to clients who desire the highest level of confidence in their security posture and the ability to compete in the global electronic marketplace. Founded in 1998, the company is headquartered in Chantilly, VA, with an office in Japan. Clients include major government agencies, financial institutions and other Fortune 500 companies. For more information, visit the iDEFENSE website at http://www.idefense.com

iDEFENSE is a global security intelligence services company, iDEFENSE provides advanced warning and analysis of threats to our clients' critical information infrastructure. But iDEFENSE goes well beyond the technical vulnerabilities and virus attacks. Our analysts examine hackers, incidents, geopolitical aspects, legal implications and policy decisions to see how a critical information infrastructure can be impacted.
http://www.techsec.com/html/TechnoSponsors2003.html

Executive team:
http://www.idefense.com/exec.html

Idefense working for Department of Homeland Defense
http://www.gcn.com/21_23/news/19575-1.html

HHS also has issued a request for proposals for a managed security services contract. Seligman hopes to award a contract in several weeks and have a system in place in about three months.

"We want a managed security service provider to be watching our perimeter and in some cases our interior with intrusion detection sensors on a real-time basis around the clock, and to be alerting us to abnormal incidences that they may see," he said.

Another recent enterprise initiative was to go departmentwide with a cyberthreat intelligence service from iDefense Inc. of Chantilly, Va.

Seligman piloted the service at CDC about two years ago before awarding iDefense a contract for all of CDC.

The service, called iAlert, gives subscribers daily, in-depth intelligence reports on threats such as viruses, worms and hackers so organizations have the data they need to combat them. Citing a recent experience, Seligman said CDC received an iAlert warning about malicious software in the wild with a .CPL file extension.

"We put an absolute blanket prohibition on having an attachment come in through e-mail with that file extension on it in advance of noticing any of it at the agency," he said. "That's an example of where [iDefense's] intelligence alerts helped us out before we ever experienced any negative outcomes."

HHS's one-year contract with iDefense is worth about $140,000, said Brian Kelly, chief executive officer of company.


HHS Boosting Cyber Security
http://www.fcw.com/fcw/articles/2003/0602/web-hhs-06-04-03.asp

The Department of Health and Human Services has expanded its contract with iDefense Inc. to provide cyberthreat intelligence to the entire department.

Reston, Va.-based iDefense will help the department protect its computers, networks and Internet functions with the company's iAlert intelligence service.

The service will provide intelligence reports to keep HHS officials aware of possible risks. The company delivers the intelligence reports via e-mail, a secure Web interface and wireless devices.

"The Department of Health and Human Services is setting the standard for proactive defense by uniformly equipping all of its agencies with the capability to quickly deploy countermeasures against emerging threats before they can cause any damage," iDefense vice president of intelligence operations John Frazzini said in a statement.

IDefense will provide the following services for HHS:

* Daily intelligence reports providing early warning notification and analysis on cyberthreats.

* Proactive countermeasure information, such as patches and workarounds, to avoid damage from the latest vulnerability.

* Profiles of threats, including individual and groups of hackers and areas of increased malicious cyberactivity.


State buying Cyberalert Service
http://www.fcw.com/fcw/articles/2001/

The State Department is buying an online service to provide its workers with daily news and bulletins related to Internet threats and security.

State intends to buy iAlert cybersecurity service on a sole-source basis from iDefense Inc. of Fairfax, Va., according to an announcement published on BidRadar, a Web service that alerts businesses to government contract purchases and requests for proposals.

A contract amount was not included in the announcement, and State offered no comment. A company spokesman said iDefense has yet to conclude a deal and so declined to talk about it.

But company spokesman Jerry Irvine did describe what iAlert provides:

From their desktops, customers log on to a secure Web site where they find up-to-date reports on viruses, hacker tools or activities—"anything that would potentially emanate from an online or cyber or electronic threat, or present a vulnerability to an organization," Irvine said.

Bulletins on cyberthreats, for example, would be followed up by in-depth analysis of the activity, including methods and location, he said.

According to the announcement, State will be able to subscribe to the service for a year.



National Security Risks of Cyber Threats

http://www.pbs.org/wgbh/pages/frontline/...

The Myth of Cyberterrorism

http://www.washingtonmonthly.com/features/2001/0211.green.html

Promise of Security

http://www.securitysoft.com/news/theenemywithin.html

Bugbear Worm: New Kind of Crime ?

http://www.msnbc.com/news/922529.asp


http://www.mmicommunications.net/pdf/iDEFENSE.pdf

Issue Date: 2/11/2003
Title: Don't Underestimate Cyberterrorists, Experts Warn
Author: Costello-Dougherty, Malaika
Publication: Medill News Service
Publication Date: 02/07/03
Security experts warn that America's enemies can exploit cyberspace to wreak havoc with the nation's public infrastructure, unless its online defenses are beefed up with the installation of security software and increased awareness among users of both the risks and ways to avoid them. A report by Dartmouth College's Institute for Security Technology Studies notes that cyberattacks designed to carry a political agenda are often harbingers for physical acts of terrorism, and warns that Internet-based assaults on information systems as well as public utility systems are "extremely likely" if the United States goes to war. IDEFENSE intelligence analyst Ken Dunham notes that a known hacker claiming allegiance to al Qaida has threatened to unleash a computer worm upon the United States if it attacks Iraq, and adds that this individual has the capability to do so. The Dartmouth report says that most cyberattacks are likely to be led by terrorist sympathizers, or hackers who do it for the thrill. Dunham cautions that hackers can use scanning tools available online that could enable them to find security holes in a matter of minutes, and can hinder the dissemination of information by altering or imitating legitimate Web sites. He adds that knowledgeable Web surfers can recognize spoofed sites by noticing the "@" symbol within the link. A recent Symantec report says that threat severity and computer vulnerabilities increased last year, and lists blended threats as the most pressing danger to Internet security; government agencies and security firms have joined forces to encourage users to deploy security software and adopt protective measures. "As long as we have vulnerabilities in cyberspace and as long as America has enemies, we are at the risk of the two coming together to severely damage our great country," declared White House cybersecurity adviser Richard Clarke in an email announcing his resignation.

http://www.lodisecurity.com/news/021103.htm





March 20, 2003
Microsoft has warned users that most versions of its Windows software have a "critical" flaw that, if exploited, can allow a hacker  to usurp control of a system or network when a victim visits a Web site or uses an e-mail program.
http://www.crmdaily.com/perl/story/21051.html

The company urged users of Windows 98 and all newer versions, including Windows XP , to download a patch, though it said newer versions of Outlook Express and Outlook 2002 are not susceptible.

The software giant said it is not aware of any attacks that exploit the vulnerability, which it first learned of in January, shortly after security research firm iDefense got word of the flaw from a UK-based researcher. iDefense said it alerted some of its clients to the flaw before the patch was officially made available.


June 18, 2003
SoBig Worm Rears Its Head Again
http://www.internetnews.com/infra/article.php/2224271

"The author of the SoBig.D worm likely waited a few days after security experts published information expecting a new variant to appear on the kill date of SoBig.C," said Ken Dunham, senior intelligence analyst for iDefense. "It's truly amazing to watch a series of worms be sequentially released, with such great success in the wild. SoBig.D spits in the face of traditional security measures, showing how important it is to have rapid response systems and intelligence programs in place to help respond to such threats."

While firms like Symantec and McAfee say the new worm's threat rating is low, iDefense has concluded it has a moderate severity rating. "SoBig.D is quickly gaining ground in the wild," Dunham said. "We recommend taking immediate action to mitigate this emerging threat. To effectively block against the e-mail component of this worm, simply block e-mail attachments such as .exe, .scr, and .pif at the gateway level."


June 26, 2003
Sobig.E Worm Spreads Rapidly Across The Internet
http://www.techweb.com/wire/story/TWB20030626S0006

Sobig.E was spreading Wednesday at a faster rate than its predecessor, Sobig.D, according to iDefense, a security intelligence firm. Most reports of the worm are from the United States, the United Kingdom and the Netherlands, the firm said.

More copies of Sobig.E are making it to the client level because .zip files "are commonly allowed through gateway filers where other file types are blocked," said Ken Dunham, iDefense senior intelligence analyst, in a prepared statement.



August 18, 2003
Blaster 'Fixer' Worm Sprouts New Versions
http://www.internetnews.com/infra/article.php/3065371

Ken Dunham, a manager at security specialist iDefense, said the new worm opens TCP port 707, which could lead to exploitation by a malicious actor. "This upgrades the threat significantly," Dunham said. 'Some may call this a good virus, but it can cause all sorts of problems when patches are applied to a computer, unbeknownst to the administrator of that computer," he added.

According to Dunham, the new Welchia copycat doesn't attempt to remove itself from an infected computer until the year 2004. "This may be an attempt for the worm to spread in the wild, patch vulnerable computers, until most computers successfully update against the RPC vulnerability exploited by DCOM RPC based worms," he explained.

iDefense's Dunham echoed calls for users to update against the DCOM RPC vulnerability. "Thousands of computers have been compromised with Trojans as well as hundreds of thousands of computers compromised by recent DCOM RPC based worms," he added.


August 29, 2003
Minnesota teen arrested in MSBlaster Case
http://www.gcn.com/vol1_no1/daily-updates/23373-1.html

Ken Dunham, malicious code intelligence manager at iDefense Inc. of Reston, Va., characterized him as a “script kiddy,” a derogatory term for a malicious hacker without the expertise to do original coding. But Dunham said arrests and prosecutions even at that level are important

If there is no accountability, there will be a lot of people who will decide to play on the dark side,” Dunham said. “We can’t rely on the morality of people. There must be consequences to have order on the Internet.”

The Ralekab worm first appeared three days ago, and three variants have been found so far. The new worm carries a backdoor Trojan horse and can update itself from a remote Web site, according to iDefense. But Ralekab might not get the opportunity to spread as far or as fast as Blaster.

“New worms like Welchia or Nachi (which actually patched the vulnerability), and aggressive patching are helping to patch computers vulnerable to remote procedure calls,” Dunham said. “As a result, this and future worms will likely have less success than former variants exploiting the same vulnerability.”


Evolution of Cross-Site Scripting Attacks
by David Endler - iDEFENSE Labs
http://www.net-security.org/article.php?id=113

 
http://www.infosecuritymag.com/2003/jun/digest26.shtml
 
http://groups.google.com/...
 
 
 
 
17. Why did Jack Kelly, idefense.com, inform USA Today
only 12 minutes after the first crash (8:48AM), that
terror groups using Web encryption may have been
responsible? And why was he so sure before the second
crash at 9:03 PM?
18. Did Kelly serve with the U.S. government where he
managed several significant programs for the
information warfare and intelligence communities?

www.rense.com/general24/t500.htm


James Adams is the founder, Chairman and Chief Executive Officer of the Ashland Institute for Strategic Studies. He is also a Senior Associate at the Center for Strategic and International Studies where he specializes in globalization, intelligence, cyber security and homeland defense.

For the past three years Adams was a member of the National Security Agency’s Advisory Board and the founding Chairman of the Technology Advisory Panel of the Signals Intelligence Directorate at NSA, which is responsible for oversight of all technology programs. In June 2001, Adams was presented with the Special Recognition Award for “outstanding contributions in meeting the goals of this Agency.” He is a member of the Strategic Assessments Group of the Central Intelligence Agency and advises the Pentagon on strategy for Information Operations in the war against terrorism.

He is the Vice-President at Applied Minds, a Glendale-based company founded by Danny Hillis, the founder of Thinking Machines, and Bran Ferren, the former head of Disney’s Imaginarium. The company develops very high value intellectual property through innovative solutions to high technology problems.

He was the founder, Chairman and Chief Executive Officer of iDEFENSE, the world’s first cyber-intelligence organization with clients in the intelligence community, the government and Fortune 100 companies. A former Managing Editor of the London Sunday Times and CEO of United Press International, Adams trained as a journalist in England, where he graduated first in the country. His work has appeared in many of the world’s leading newspapers and journals, including Foreign Affairs, Los Angeles Times, New York Times, and the Washington Post. For more than 25 years Adams has specialized in national security and international relations. He is the author of 13 books with a particular emphasis on covert warfare including The Financing of Terror, Secret Armies and The New Spies. His latest book, The Next World War, a study of information warfare, was published by Simon and Schuster (New York). Other titles by Adams include Sell Out: Aldrich Ames: The Spy Who Broke the CIA (Viking, New York), The New Spies: Intelligence After the Cold War (Hutchinson, London) and Bull’s Eye: The Assassination and life of Iraqi Supergun Inventor Gerald Bull (Random House, New York).

Adams is a sought after speaker in the intelligence community and at high-technology forums both in the United States and overseas. He makes regular appearances on television and has been featured in various documentaries in the US, Japan, UK, Germany, and Italy.

http://www.ashlandinstitute.com/people.php

Hackers Pass Out New Software for Attacks

Newsday -September 16, 2003

WASHINGTON -- Security researchers on Tuesday detected hackers distributing software to break into computers using flaws announced last week in some versions of Microsoft Corp.'s Windows operating system.

The threat from this new vulnerability -- which already has drawn stern warnings from the Homeland Security Department -- is remarkably similar to one that allowed the Blaster virus to infect hundreds of thousands of computers last month.

The discovery gives fresh impetus for tens of millions of Windows users -- inside corporations and in their homes -- to immediately apply a free repairing patch from Microsoft. Homeland Security officials have warned that attacks could result in a "significant impact" on the operation of the Internet.

Researchers from iDefense Inc. of Reston, Va., who found the new attack software being distributed from a Chinese Web site, said it was already being used to break into vulnerable computers and implant eavesdropping programs. They said they expect widespread attacks similar to the Blaster infection within days...


Who is Booz Allen Hamilton?

Memes.org -Sep 22, 2003

By Spycraft

A company with strong ties to the atrocity of September 11, 2001 is also implicated in the intense digital harrasment experienced in the past couple of years by anti-war activists.

Let's get right to the meat, eh?

Big Brother Alive and Well at Yahoo
http://www.crazyjeff.net/yahoobug.html

is an excellent piece from which the following is snipped:

~Booz-Allen is engaged in the creation of a program called "Magic Lantern." This program is designed to figure out people's passwords so the military can have access to *ALL* email accounts...for the purpose of fighting terrorism. Magic Lantern insidiously will install a "virus" on your computer so that when you next log in to your email using a password, Magic Lantern sends a copy of the password to a Military computer, and they can then access your email. This is all stuff I got to read in the Washington Technology (a magazine devoted to celebrating the newest technological contracts awarded on Capitol Hill). It was H IGHLY recomended to me that those of us that use our email to engage in social justice work be aware of these realities and change our passwords VERY Frequently, making sure to include numbers in our passwords.~

Now, many of you may remember the enormous disruption that occurred last year in the online activist community with worms, virii, digital identity theft, email bombs, etc. and how it all targeted anti-war activists, pro-palestinian activists, and those trying to get to the bottom of 9-11. One can deduce that the authors and/or puppetmasters behind this barrage were all of the same mind and all perhaps had something to do with the advancement of the military position of Israel, the advancement of the "War on Terror" and the obscuring of any real investigation of the events of September 11, 2001.

In light of such, I consider it no accident that Booz, Allen, & Hamilton (cited above) are also heavily implicated by much of the serious research on 9-11.

Please read on.

The following is snipped from:
Booz, Allen, and Hamilton Awareness
http://groups.yahoo.com/group/Enronscam/message/297

~snip~

The Defense Advanced Research Projects Agency (DARPA), which oversees the Total Information Awareness System (TIA), awarded 13 contracts to Booz Allen & Hamilton amounting to more than $23 million.

~snip~

TIA draws heavily on the private sector. Five of the eight contractors identified by the Center are involved in evaluating future contracts for the program. Grey E. Burkhart, an associate of Booz Allen Hamilton, identifies himself on his resume as “assistant project manager” of TIA system implementation. Even the phrase “Total Information Awareness” has a private pedigree—Visual Analytics, Inc., a Poolesville, Md.-based software developer and DARPA contractor, has applied for a trademark for the phrase.

~snip~

August 8, 2001: Booz, Allen, & Hamilton employee named head of NIMA (the National Imagery and Mapping Agency - the 'eyes of America')
http://cartome.org/new-nima.htm

~NIMA, the eyes of America, gets a new head one month before Operation Two Towers (9-11), one month AFTER Larry Silverstein takes over propietorship from Chase Manhattan and Citigroup.~

James R. Clapper named Director of National Imagery and Mapping Agency. Secretary of Defense Donald H. Rumsfeld and Director of Central Intelligence George J. Tenet jointly announced the appointment of James R. Clapper Jr. as the new director of the National Imagery and Mapping Agency (NIMA) on August 8, 2001. Clapper, who will become the first civilian head of the agency, succeeds Army Lt. Gen. James C. King who has headed NIMA since March 1998 and will be retiring from the Army later this year. Clapper was chosen for the position owing to his grasp of intelligence matters and his knowledge of the needs of NIMA's principal users, the combat commanders. The director has more than 37 years experience in intelligence, working at all levels and phases of the field. He retired from the Air Force in September 1995 as a lieutenant general after a four-year tour as the director of the Defense Intelligence Agency. Since his retirement, he has served successively as executive vice president of Vredenburg, a systems acquisition services company headquartered in Reston, Va.; executive director, military intelligence for Booz, Allen & Hamilton, McLean, Va.; and recently as vice president, director of intelligence programs for SRA, International, Fairfax, Va.

~snip~

Back in 1999, "a Saudi government audit acquired by US intelligence showed that 5 of Saudi Arabia’s top business executives ordered the National Commercial Bank (NCB), the kingdom’s largest, to transfer personal funds along with $3 million diverted from a Saudi pension fund to New York and London banks. The money was diverted into the accounts of Islamic charities, including Islamic Relief and Blessed Relief, that serve as fronts for Bin Laden."

The company's client list reads like a who's who of the high-tech industry, including companies such as IBM, Booz Allen & Hamilton Inc., Motorola Inc., Sprint Corp. and The Mitre Corp...

"Booz-Allen & Hamilton, in conjunction with the U.S. Navy and Marine Corps, runs the Saudi Armed Forces Staff College, while O'Gara Protective Services (former U.S. CIA and Secret Service agents) protects the Saudi royal family and their property and provides Saudi forces with security training."

~~~

The following is snipped from:
Total Information Awareness Relies on Private Sector to Track Americans
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1458

~snip~

DARPA has hired diversified defense industry giants Lockheed-Martin and Booz Allen & Hamilton for TIA and related projects. Booz Allen has won what may become the largest TIA contract, potentially worth $62 million over the next five years if DARPA exercises all the contract’s options.

Booz Allen employee Grey E. Burkhart’s resume notes that he is the “assistant program manager for the implementation of an advanced collaborative analysis system for the counterterrorism and intelligence communities,” which he identifies as “Total Information Awareness (TIA) System Implementation.” DARPA spokeswoman Walker told the Center that Burkhart is not an employee of the government.

Burkhart has had more than 25 years of experience in strategic security, intelligence, and telecommunications. Working in both the private and public sectors he was a career intelligence officer, CEO of Allied Communications Engineering, and has become a “recognized expert on in the global proliferation of information technology.”

Burkhart’s resume also notes that he was a member of Booz Allen’s Homeland Security Coordination Center and Tiger Team, for which he “conducted analysis of new legislation and executive orders and assessed their impact on current and future business.”

~~~

The following is snipped from:
Mitre Corp., Warren Buffet, Global Hawk, and September 11, 2001
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1663
~snip~

The NRO (National Reconnaissance Office) demonstrated its new satellite capabilities (NRO payload launched into space on September 8, 2001) and the National Imagery and Mapping Agency (NIMA - "the eyes of America") gained a new director one month prior to that fateful day. Considering all of this, one gets a pretty clear picture of where all those 'Star Wars' dollars went. James R. Clapper is the man named to head NIMA and he comes from Booz, Allen, & Hamilton which is a client for Blessed Relief, the charity said to be a front for Osama Bin Laden. Booz, Allen, & Hamilton also works closely with DARPA. DARPA is, of course, closely aligned with John Poindexter, head of Total Information Awareness and the guy that called the shots in Iran-Contra.


~~~~~~~~~~

FBI Data Mining with trojans, worms and warez
http://groups.yahoo.com/group/psy-op/message/10107

Total Information Awareness Relies on Private Sector to Track Americans
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1458

(From last year) Total Information Oppression: Now my mailing list has been killed! http://memes.org/modules.php?op=modload&name=News&file=article&sid=1428

From eight months ago: PLEASE HELP - DEATH THREAT
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1695

The NRO, September 11, UAV's, Echelon, ARPANET, the NSA, the Israeli Space Agency, NIMA, Booz-Allen & Hamilton, NASA, Ron Sega, Vince Foster, Global Hawk, TIA, Mitre Corp., Star Wars (SDI), Prince Fahd of Saudi Arabia (and his satellite investments), and the NMCI.
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1622

Also see:
Agent "Souljah" Smiley's Last Stand
http://memes.org/modules.php?op=modload&name=News&file=article&sid=1921

from which the following is snipped:

~snip~

Consider this: the Advanced Research Projects Agency (ARPA), which would later become the DEFENSE Advanced Research Projects Agency, developed the internet. It was a DOD project before it was a public forum, which would later be turned over to the private sector for "management." DARPA it is that houses the Information Awareness Office which, in turn spawned TIA, the Total Information Awareness effort, headed by one John Poindexter, an Iran-Contra Felon that, like so many others, escaped retribution and now sits high up on the pyramid, under George W. Bush.

*

P.S. Recently, I ended a relative silence by hitting the web with a couple of pieces entitled 'Agent "Souljah" Smiley's Last Stand' and 'Chemtrails, Mormonism, Halliburton, Meth, the West Nile Virus, and Zion.' I posted from a relatively new addy and upon doing so, within a matter of a day of hitting Indymedia, several Yahoogroups, and Memes.org with the releases, the account received its first ever virus and worm attacks. I also got my first attempt by the dreaded NigeriaScam to get ahold of my personal banking specifics. Pretty blatant aren't they?


Booz, Allen, & Hamilton and Haliburton (Dick Cheney's company)

Booz, Allen, & Hamilton and Mitre Corp. (another company with strong ties to the events of September 11, 2001)

Booz, Allen, & Hamilton and Brown and Root (evil subsidiary of Halliburton)

Booz, Allen, and Hamilton and TRW (big NRO contractor)

Booz, Allen, & Hamilton and Global Hawk (the system used on September 11 to remotely smack some buildings)

Booz, Allen, and Hamilton and the NRO (on September 8, 2001, the NRO would run an exercise simulating the hijacking of airliners)

Booz, Allen, & Hamilton and the Carlyle Group (company houses ties between the Bushes and bin Laden)

BOOZ-ALLEN HAMILTON INTERNATIONAL

~*~

P.P.S. ..a few more applicable snips..

The following is snipped from:
All In The Family

Richard Perle resigned as chairman of the defense policy board last month after it was disclosed that he had financial ties to several companies doing business with the Pentagon.

But Perle still sits on the board, along with former CIA director James Woolsey, who works for the consulting firm of Booz, Allen, Hamilton. The firm did nearly $700 million dollars in business with the Pentagon last year.

~

The following is snipped from:
The Real Saudi Ties are U.S. Ties

"We’re doing a better job of sharing intelligence and collecting data, so we’re able to find, you know, able to anticipate" (President Bush)

Booz-Allen Hamilton (BAH), another global leader in strategy and technology consulting, runs the Military Staff College of Saudi Arabia. But BAH has its corporate headquarters in McLean, Virginia.

On August 15th, 2002, Dale Watson, former FBIHQ, went to work for Booz. No one ever complained that it was Watson who was unwilling to connect the dots during the increased warnings on a pending attack against America in Summer, 2001, and it is clear why: Watson formerly worked for the CIA and seems to have political support from their headquarter.

Booz Allen is also supported by ex-CIA director James Woolsey, who became Vice President of BAH on July 15th, 2002.

In May 2003, Consultant News and Navy Weeks reports, that the government of Saudi Arabia, awarded Booz Allen Hamilton with a sole-source contract for naval consulting work worth $7.9 million with options that could take it to $95.3 million.

Financial interests win out over political embarrassment. Getting Booz Allen Hamiliton involved in an investigation, seems more unrealistic than ever.

Please check out follow-up articles and links at Waiting for a digital 9/11


All trademarks and copyrights on this page are owned by their respective companies.

printed from Cybersecurity 2003 on 2004-06-03 17:26:13