Transforming Trajectory

ConCen Blog Feature

By mothandrust
The Conspiracy Central Blog
Monday, July 30, 2007

 

Transforming Trajectory

I

 

So the NWO has been thrown from power – now what?

I know at ConCen there are many people who talk of the New World Order (NWO) – of secret groups behind the scenes manipulating the geopolitical and geoeconomic agendas – Illuminati, Mason, Zionist, Gnostic… conspiracies abound. I am not denying the existence of these groups, or their motivation, nor indeed the amount of control they have (or think they have), far from it.

However, my position is that, far from being the NWO, they are in essence identical to the order that has governed civilisation since there was civilisation. The labels may have changed and the societies/institutions/families morphed, strengthened along the way but their motives, objectives and methods remain absolutely consistent back through the ages: Bush, Blair, Murdoch, Rothschild are no different to Hitler, Churchill, Beaverbrook, Rothschild or the royal families, princes, popes, caesars… as an ever repeating pattern. It is, in effect, a continuous line that stretches back to the Pharisees and money-changers in the Temple, and beyond. All, without exception, manipulating power (including the value of money) to service their aims and enhance their position. Civilisation, pretty much since its inception (and ignoring pre historical suppositions), has been controlled and manipulated by people who abuse power. Fact. NWO, same as the OWO, to my way of thinking.

Further, you cannot vote in a change of direction. Anyone voted in has been constructed by and has an interest in validating, strengthening and expanding that same system – nor can you have a partial collapse, with fragmented groups, as they will attempt to rebuild their power bases, expanding as quickly as possible to capitalise on the vacuum that has been created – and, in the process, rebuilding the machinery of war – in effect, we would be no better off than before.

The point I am making, the question I am asking, is, that following our current mindset, even if some great upheaval were to happen and all current economic and political power holders were thrown from office, with what will we replace them to stop history repeating itself?

As things stand, following current trajectory, whatever replacement system, no matter who/what is put in charge, power will concentrate and in the process, lead to its abuse – totalitarianism or democracy, it makes no difference. Is history not my witness?

Or course there is another journey through history, that of powerful religions and nations and groups of people uniting under a symbol and obliterating weaker, less advanced (in the nature of warfare) cultures. Accepted, we cannot bring them back, humanity has moved on, however, just because their thinking did not suit the interests of powerful men, with guns and with obedient sheep to do their bidding, does not mean we have nothing to learn from them.

*

Quite frankly, i am at a loss to know how one overthrows our current power base – they have all avenues stitched up. That is not where I’m coming from. What interests me, is how humanity, once removed from the chains of conceptual authority, might engineer a happier, more equitable world, immune to the machinations of our psychopathic tendencies.

II

If we are considering a way to transform the trajectory of humanity we must look for a new beginning, swept clean of all control structures or power bases – brands, states, religions, money… – conceptual authority must be swept into the dustbin of history. In fact, beyond family, in the widest possible sense/conception, nothing can remain.

So let us imagine this is so. A terrible cataclysm has struck the Earth – global communications along with finance have collapsed – money has become meaningless and as a consequence all transportation is stopped. As money disappears so does government, leaving people to fight over the three days food in the supermarkets. Mayhem. Devastation. Kill or be killed. Mad Max on push-bikes, because fuel will disappear at least as quickly as food. Plague spreads through the remaining population with the collapse of health and environmental control systems, with the dead littering the streets and rivers and our immune systems shot to pieces through decades of antibiotics and sterile environments. Let us not dwell on this matter, it is entirely hypothetical, let us just say, a catastrophe of biblical proportions. And assuming meltdown of nuclear reactors or some genetic modification from beyond the realms of science fiction has not engulfed us in some way, the shattered remnants of humanity would emerge from their hiding places, to start again, from scratch.

Remember, with the decimation of humanity, space is no longer at a premium. True, with poisoned soils, polluted rivers and little protection from nature, in its rawest form, life will be far from easy (mortality rates will be high) but beyond that, if humanity can find a path, lies a whole new world. A blank slate, with more than enough for everyone.

So, as these humans, chastened by apocalyptic events, start again to develop communities, devoid of religion, state, money… what ideologies, philosophies should govern their future journey?

*

Let us first note the foundations of the system that preceded the cataclysm, foundations beyond nature and family, with no ethical validity – therefore, no more than opinion.

  1. Land ownership. Rousseau argued that ‘land ownership’ was the origin of inequality, imposed by an impostor, who stuck four stakes in the ground and found someone foolish enough to believe he ‘owned’ it. In fact, ‘land ownership’ is an aberration, a logical impossibility. For, pleasing though it is to deceive oneself otherwise, one cannot own one’s host. One is indebted to one’s host – enslaved, without knowing, just as a bacterial culture in our gut. Native cultures acknowledged this, it is the arrival of the ‘enlightened’, arrogant Europeans that sort to prove otherwise and in the process carve the world into country and property shaped pieces. Making it ‘theirs’, to own and to do with as they wished.

  2. Intellectual property. Patent and copyright, designed to protect and hide knowledge and creativity, rather than share. To concentrate power in the hands of the ‘owners’, give them control over future direction – to enable capitalisation.

  3. The state. An arbitrary border, signifying conceptual ownership, and enslavement through identification. And, as with ‘land ownership’, offering no ethical justification, and illegitimate in the eye of religion (at least until 1648 when the Roman Church made their deal with the European princes).

  4. Money. Although money floats, light as a feather, above our economic system it was not always so. Our understanding of money and how it works finds its roots in gold and jewels, finite, precious materials that only few have access to – necessarily concentrating wealth as those who own it dictate value (as with land). And, in fact, although the value of money appears relatively stable, if we measure it against land as a constant (or gold) we see in actuality it’s relative value spiralling downwards (to a point where, in the UK at least, your average dwelling is worth many times its own weight in silver!).

  5. Capital interest. This again is a mechanism which reduces the value of money in relative terms – as money in the system increases, its buying power diminishes – and it is a one way process. Capital interest, through the eye of religion is an absolute sin – in Islam, worse than adultery and punishable by death.

All of these ideological structures, although entirely arbitrary, concentrate power, provide a method of division and subjugation, and facilitate and provide the process by which authority can extend, enhance its conceptual power.

*

So let us imagine humanity (what’s left of it) emerging from the forests and caves that have given protection through the cataclysm – and beginning to develop communities and cultivate the land. Which of the above concepts offers any benefit to these shattered remnants?

  1. Land ownership. Although, upon first glance, this might seem desirable, let us first reiterate the conceptual problems with this. First, much as one might wish otherwise, one cannot own one’s host, one is fundamentally and irrevocably enslaved to it, for sustenance and security, it is therefore a logical impossibility, a conceptual error. Secondly, land is now plentiful – if it is not, we have not come far enough – perhaps there are a few bullets left, perhaps disease/plague/pestilence must sweep the planet once more. And thirdly, land ownership creates haves and have-nots, an imbalance, initiating the path to slavery and dominance. This is not of course to say, that one who tends and cultivates land should not be entitled to its produce, far from it.

  2. Intellectual property. Imagine emerging from such suffering and torment, gradually rebuilding families and communities, working the land, shaping its products, honing instruments and techniques developing cross strains… and imagine families, communities across the world doing the same. Similar discoveries will be made far and wide, all through independent thought and modifying existing design, gleaned from neighbours, travellers, communication, fertilisation… all offering path and potential to filter out and filter in to and from an emerging humanity. Music and art and cultural evolution follow the same pattern. Ideas spread and generate new ideas. Who in their right mind, in such a situation, would wish to see rules and regulations and ownership of individual ideas and mechanisms, necessarily stifling knowledge, generating secrets and fear, and cheating and protection? Who would wish to give away the freedom to discover?

  3. The state. Imagine you have built a functioning community, worked out methods of exchange with other emerging communities and you are gaining mastery of tools and techniques. A sense of empowerment will gradually build, life will no longer seem brutal, fragile and fleeting, and begin to become a pleasure. What more does one need? Who in their right frame of mind in such a situation would ever wish to surrender this empowerment to some would-be tyrant who falsely believes he can have others serve him? Him and his cronies and his leeches.

  4. Money. An exchange mechanism, something that represents work or commodity – the value of. Through history there have been many examples, before we settled on tying money to gold – rare stones or shells and even crops. Authority, before all land was devoured most particularly hated the idea of crops as money. As it meant, by the sweat of their brow, individuals could grow their own money – thus distributing power, rather than concentrating it. Authority prefers something more theoretical, conceptual yet at the same time manageable, tangible and concentrated. For them gold is the best of all methods – almost the rarest known metal, almost entirely useless – and it means, no matter how far the world economy expanded, with gold as the exchange mechanism, they effectively own it all! In truth though, any community can create its own money, it just needs anchoring to that community’s primary produce and all will understand its true value – just as they would when exchanging their money with other communities. If requirement of some global benchmark, then that should fall to the most adaptable and useful crop known to humanity. This is of course, hemp – the method many European settlers used in the American colonies, until the British crown and the mercantile elite got wind of it. Tying money to crops also destroys the notion of inflation, although that is not to say value would not fluctuate depending upon utility and abundance.

  5. Capital interest. With money grounded in crops, renewables, its value is real and fixed, and because in time crops deteriorate, hoarding is detrimental, counter-productive, which leads to natural flow of supplies and surpluses. No hoarding. No hoarding means no capturing and controlling the market, it means no price manipulation – value is as it is, only, through time, deteriorating as this or that wears out or rots. It is the antithesis of interest.

So here we have a basic functioning system – no need for taxes or accountants, politicians or wars (land is still plentiful). Emerging communities appreciate communication: sharing ideas, expertise and produce brings benefits and understanding to all those involved. So far so good, but it will be just a few generations before humanity again begins to eat up all available space and consequential tensions arise. That, without some overarching authority, will necessarily lead to dispute, and then on to war.

What is to be done?

Now, with an ideological framework that offers the logical and ethical validity that our current model lacks, that disperses power, thus empowering the individual and encourageing communication: how, before humanity again falls prey to fear and hunger, violence and despotism, can we develop a control system that will not in itself fall prey to the psychopathic elements that would abuse the world for their trivial pleasure?

Advertisements

Happy Birthday, Ctrl!

http://conspiracycentral.info/index.php?showtopic=13557

Stolen Cars in the US being used as Car Bombs in Iraq

An incredible story from Fox News, and for those who are in the know and can read between the lines, you may be stunned at the depths to which the U.S. government, military, and its affiliated intelligence organizations will go to keep Iraq a bloody, shuddering mess. Read the subtitle in the video below to see what I’m getting at.

If you still don’t get it, you may want to read this story by FreeMarketNews from October 14, 2005: United States Caught in Iraq Car-Bombing.

It’s happened again – allied troops being caught with bombs. This time it is the Americans captured in the act of setting off a car bomb in Baghdad. Last time, as FMNN reported only weeks ago, two British soldiers, apparently working for British intelligence, were caught near Baghdad similarly equipped.

According to the Mirror-World, “A number of Iraqis apprehended two Americans disguised in Arab dress as they tried to blow up a booby-trapped car in the middle of a residential area in western Baghdad on Tuesday. … Residents of western Baghdad’s al-Ghazaliyah district [said] the people had apprehended the Americans as they left their Caprice car near a residential neighborhood in al-Ghazaliyah on Tuesday afternoon. Local people found they looked suspicious so they detained the men before they could get away. That was when they discovered that they were Americans and called the … police.” Just as in the British incident, the Iraq police arrived at approximately the same time as allied military forces – and the two men were removed from Iraq custody and wisked away before any questioning could take place.

The incidents are said to be fueling both puzzlement and animosity among Iraqis. Yet the motivation behind such activities remains formally unknown since in both cases the soldiers involved have been removed with an efficiency that has quashed any attempts at an interrogation.

————————————————————————————————–

FMNN FOLLOW: US. The above report came on the heels of reports regarding a similar incident in which British soldiers were involved – and which ultimately led to an apology to Iraq by the British government. However, Realityzone.com has pointed out that since the source is a Russian news agency, it is possible the above “may be disinformation.” Below is a U.S. press release which apparently refers to the incident. The original Mirror story – and reader commentary – may be seen here: http://iraqwar.mirror-world.ru/article/66519

U.S. SOLDIERS FIND, DISABLE CAR BOMB THANKS TO IRAQI TIP

BAGHDAD, Iraq – Task Force Baghdad Soldiers found and disabled a car bomb in western Rashid thanks to a tip from a group of Iraqi citizens Oct. 12. Soldiers from 3rd Battalion, 7th Infantry Regiment, 4th Combat Brigade Team were on patrol in the neighborhood of Risalah when they were flagged down by a group of Iraqis who reported a suspicious vehicle nearby.

An explosive ordnance disposal team was dispatched to the site and safely detonated the car bomb before it could be used by terrorists. Upon investigation the car bomb was determined to be made from seven 122-millimeter artillery rounds, four 130-millimeter artillery rounds and a propane tank filled with homemade explosives. -30-

FOR ADDITIONAL INFORMATION CONCERNING THIS RELEASE, CONTACT THE TASK FORCE BAGHDAD PUBLIC AFFAIRS PLANS AND OPERATIONS NCO, SGT. FIRST CLASS DAVID ABRAMS AT: DAVID.ABRAMS@ID3.ARMY.MIL
Staff Reports – Free-Market News Network

Now of course, I don’t believe any US military press releases, and you shouldn’t either. The fact remains that British special forces have also been caught red-handed, carrying out terror bombings against Iraqi citizens.

From a September 20, 2005 article by Paul Joseph Watson of PrisonPlanet.com, British Special Forces Caught Carrying Out Staged Terror In Iraq?

In another example of how the Iraqi quagmire is deliberately designed to degenerate into a chaotic abyss, British SAS were caught attempting to stage a terror attack and the media have dutifully shut up about the real questions surrounding the incident.

What is admitted is that two British soldiers in Arab garb and head dress drove a car towards a group of Iraq police and began firing. According to the Basra governor Mohammed al-Waili, one policeman was shot dead and another was injured. Pictured below are the wigs and clothing that the soldiers were wearing.

The Arab garb is obviously undeniable proof that the operation, whatever its ultimate intention, was staged so that any eyewitnesses would believe it had been carried out by Iraqis.

This has all the indications of a frame up.

This is made all the more interesting by the fact that early reports cited as originating from BBC World Service radio stated that the car used contained explosives. Was this another staged car bombing intended to keep tensions high? As you will discover later, the plan to keep Iraq divided and in turmoil is an actual policy directive that spans back over two decades.

And so it goes. Another day in the American Empire.

UPDATE:

As a follow up to this story, I’d like the reader to take a look at another example of the US causing and prolonging turmoil, in Darfur, Sudan.  From the Sudan Tribune, Friday, July 27, 2007:

Sudan accuses CIA of smuggling weapons into Darfur

Sudan’s interior minister accused Central Intelligence Agency of smuggling weapons into the troubled region of Darfur.

Interior Minister Zubair Bashir Taha addressing a crowd consisting of youth organizations said that the CIA is seeking to “disrupt the demographics of Darfur”.

The US special envoy to Darfur Andrew Natsios told reporters in Khartoum last week that Arab groups from neighboring countries were resettling in West Darfur and other lands traditionally belonging to local African tribes.

Taha accused the US of being responsible for “prolonging the war in Darfur and the death of thousands of people after the Abuja peace agreement just like they did in Iraq”.

The Los Angeles Times revealed last month that Sudan has secretly worked with the CIA to spy on the insurgency in Iraq, an example of how the U.S. has continued to cooperate with the Sudanese regime even while condemning its suspected role in the killing of tens of thousands of civilians in Darfur.

The U.S.-Sudan relationship goes beyond Iraq. Sudan has helped the United States track the turmoil in Somalia. Sudanese intelligence service has helped the US to attack the Islamic Courts positions in Somalia and to locate Al Qaeda suspects hiding there.

The Darfur conflict began in 2003 when an ethnic minority rose up against the Arab-dominated government in Khartoum, which then enlisted the Janjaweed militia group to help crush the rebellion.

According to UN estimates, at least 200,000 people have died from the combined effect of war and famine since the conflict started in February 2003. But Khartoum disputes the figures.

 

ConCen Radio – Sunday, July 29th, 2007

Ognir has posted up a new ConCen Radio recording. Today’s feature is special guest Randy Spiggett, an American living in Rwanda, Africa. Be sure to listen in!

Hotel Rwanda

ConCen_Radio_Sunday_29th_July_2007_Host_The_Ogster_Guest_Randy_Spiggett.mp3.torrent


Spies in the Ointment: The Israeli Espionage of Global Communications

ConCen Blog Feature

By Hei Hu Quan
The Conspiracy Central Blog
Thursday, July 26, 2007

Total Information Awareness, But For Whom?

This story began quite innocuously as a minor retelling of a story I discovered involving an Israeli company called Narus that collects real-time internet information on U.S. citizens for the the U.S. National Security Agency. In the course of my research, the story grew to shocking proportions revealing that the gamut of virtually all electronics communications, has not only been compromised by a foreign entity within the U.S., but the entire world. It is an intentional and directed infiltration at effectively every source and core of the scope of electronics communications worldwide. Rendering all secure systems compromised and intercepted by Israeli security services and for the benefit of using gained intelligence information to their strategic advantages. The implications, much less the ramifications are staggering, and these bold new revelations have revealed not only a treasonous complicity of the governing host nations, but criminally collusive actions towards a central malevolent end.

Every piece of electronics equipment be it telephone, cellphone, (VoIP) Voice over IP, pagers, Blackberrys, instant messaging services, emails, has a point of interception established by the Israeli intelligence services. More ominous are the specific inroads these particular groups are making in inserting themselves within strategic centers of security infrastructures within various countries. Such as providing direct security for New York’s Statue of Liberty, producing communications satellites, creation and management of firewalls for sensitive military & intelligence agencies, and the contract and production of RFID chips with user sensitive data and broadcast abilities for U.S. Passports. Think of that for a moment, especially the encoding for the RFID chips, in which personal data of citizens of the U.S. is in the hands of a foreign national organization. With declared loyalties and military allegiances to their home country, along with either! simple residencies or dual citizenships that were granted by the U.S. government or host country itself.

In this investigation you will get nowhere if you do not separate Zionism from Judaism in which the former uses as a front, to achieve it’s long-standing goals by any and all means. This includes using and manipulating Jewish people in whatever ways they see fit, for to them the ends justify the means. Bottom line is that we are talking about governments and their puppet-master cabals and orders propagating PSYOPS to manipulate through nationalism, greed and fear. This being said, the government of Israel supports Zionism and the expansion of its goals. But do their people? The corporate governments of the US and UK have open imperialist intentions, reflected in policy and brutality, but do their people condone and support this?

What I am getting at is that people want all the same things in life unless lured and indoctrinated by whatever different flavours the IllumiNazi machine have propagated. These needful things are simple, we all want peace, stability, security and! prosperity for our generations, in a clean, nurturing environment of mutual respect. Those who cannot get aboard this very pure and simple concept, can be said, harbour and support agendas of evil contrary to humanity.

Digression aside, does the Israeli government even give one single fuck about its own people? Or does it use the compulsory military service as an indoctrination system to instil racialist, nationalist and Zionist values; cultivating select young citizens and deploying them globally as spies for empire? The reason I’m positing this is to differentiate between a government that serves the people versus a people whom serve the government against their own personal interests and beliefs.

“Every piece of electronics equipment be it telephone, cellphone, (VoIP) Voice over IP, pagers, Blackberrys, instant messaging services, emails, has a point of interception established by the Israeli intelligence services.”

We’re going to peer behind the veil and see, that within Israel’s military intelligence operations center, there exists compartmentalized intelligence/spy units to specifically cultivate and train the best and brightest of their army recruits into operatives for electronic espionage and warfare. All have at their heart, and by their own explicit accounts, the development of young military intel operatives that explicitly act as soldier-techs for advanced technological warfare operations. Worse yet is that by utilizing a cover of technological start-up companies, they can not only strategically infiltrate specific targets, and gain access to secure electronics infrastructures, but also use the financial resources garnered to fund their entire operations. It is a truly Trojan horse type operation that must at it’s core have collaborative elements within the government that assist and even facilitate these infiltrations.

With that being said, let’s examine the principles and entities, their motives and some of their documented areas of interest. The following below are excerpts from sources revealing the background of Israeli military intelligence groups. I shall let the facts speak for themselves. I would also like to add that when writing this, I had my machine hacked into at least 3 times that I am able to confirm absolutely. The first two I tracked and was able to resolve successfully after some particularly invasive system analysis.The last of which specifically attacked this file as I was working on it and deleted a few paragraphs of freshly written material, so all they have done is corroborate that I am on the right track regarding this information and how they view the truth as a threat.

From December 11-14 of 2001, Fox News aired a 4-part special report on Israeli Spying in America. Because of it’s explosive content and Israel’s connections including Rupert Murdoch, the story was not only censored, but all transcripts and video of this story on Fox’s website have since been removed and suppressed. A partial transcript and videos for the 4 part series have been preserved here: http://www.whatreallyhappened.com/israeli_spyring_fox.html at whatreallyhappened.com’s website. Here’s some damning information from the series that substantiate points and allegations raised in this story.

“Since Sept. 11, more than 60 Israelis have been arrested or detained, either under the new patriot anti-terrorism law, or for immigration violations. A handful of active Israeli military were among those detained, according to investigators, who say some of the detainees also failed polygraph questions when asked about alleged surveillance activities against and in the United States.

Numerous classified documents obtained by Fox News indicate that even prior to Sept. 11, as many as 140 other Israelis had been detained or arrested in a secretive and sprawling investigation into suspected espionage by Israelis in the United States.

The first part of the investigation focuses on Israelis who say they are art students from the University of Jerusalem and Bazala Academy. They repeatedly made contact with U.S. government personnel, the report says, by saying they wanted to sell cheap art or handiwork. Documents say they, ‘targeted and penetrated military bases.’ The DEA, FBI and dozens of government facilities, and even secret offices and unlisted private homes of law enforcement and intelligence personnel. The majority of those questioned, ‘stated they served in military intelligence, electronic surveillance intercept and or explosive ordinance units.’

Another part of the investigation has resulted in the detention and arrests of dozens of Israelis at American mall kiosks, where they’ve been selling toys called Puzzle Car and Zoom Copter. Investigators suspect a front.

Why would Israelis spy in and on the U.S.? A General Accounting Office investigation referred to Israel as country ‘A’ and said, ‘According to a U.S. intelligence agency, the government of country ‘A’ conducts the most aggressive espionage operations against the U.S. of any U.S. ally.’

A defense intelligence report said Israel has a voracious appetite for information and said, ‘the Israelis are motivated by strong survival instincts which dictate every possible facet of their political and economical policies. It aggressively collects military and industrial technology and the U.S. is a high priority target.” The document concludes: ‘Israel possesses the resources and technical capability to achieve its collection objectives.'” (Transcript of Fox News Special Report with Brit Hume, from December 11, 2001) – http://www.whatreallyhappened.com/israeli_spyring_fox.html

The Israel Defense Forces (IDF)

“Since the creation of Israel in 1948, the military has compensated for its lack of resources and manpower with brainpower. Particularly in the past 20 years, the IDF has invested billions of dollars in developing technological warfare. The result is a number of secret, semisecret, and open-secret divisions devoted to coming up with cutting-edge technologies designed to help Israel know what its enemies are doing — and to kill them when the need arises. The units have code names suitable for a spy novel: 8-200, 8153, Mamram, Talpiot, Mamdas. In the incubator of the IDF, those units, as Israelis winkingly call them, have improved technologies used in everything from digital switching to wireless telephony. Military intelligence elite units, which function as basic training for startup entrepreneurs, are small working groups of highly motivated teams; they work brutal hours and get little sleep; and they face immense pressure to innovate for the sake of national survival. They more than any other single factor are responsible for Israel’s technological skills.

American high-tech giants like Cisco, Intel, and Motorola — drawn in no small part by the wealth of technical talent coming out of intelligence units — have set up research facilities in Israel.

Some of Israel’s largest and most successful tech companies call the United States home: Comverse, a voice messaging company with a market cap of $14.9 billion, is based in Woodbury, N.Y.; Mercury Interactive is based in Sunnyvale, Calif. More common these days is what’s known as the fast exit, whereby startups either sell out to a foreign multinational entirely or split themselves in two, keeping R&D in Israel but moving sales and marketing to the United States.” (Startup Nation by Stacy Perman) – http://www.timeinc.net/b2/subscribers/articles/print/0,17925,512689,00.html

“In a more creative sphere, the army and Israeli defense contractors developed the world’s first pilotless plane, launched satellites into space, and created a host of other technologies likely never to be revealed.” (Israeli Army Grads Lead Business Revolution by David Rosenberg) – http://www.cji.co.il/cji-n126.txt)

Take a close look at this unusually suspicious excerpt from an article entitled: Research Bulletin 72 – The Impact of Globalization on the Boom and Crisis of Israel’s High-Tech Industry by B.A. Kipnis. Written in January of 2002, the statements by this D. Globerman are chilling, in the way they convey an almost insider foreknowledge that takes advantage of the post 9/11 chaos and fear. Anticipating an opening and potential investment in anti-terror technologies that can be exploited by Israel to advance their economy and recovery for their High-tech industry. “This might include the upgrading of their technological systems in order to avoid any future terror threat, and the upgrading of the technological capabilities of security agencies, airports, and air companies as well as the military machine needed for the [electronic] war against global terror. These activities, fueled by the spending of many billions of dollars, will help the economy out of its crisis; they will ! be the main driving force behind the likely recovery of the high-tech industry.”

*Read the excerpt below and see if this doesn’t seem like a bit of an insider smoking gun to you as well.

“At the time of writing the war on global terror is under way and the economic media are busy speculating about the impact of that war, particularly about the effect of the horrible terror event of September 11, 2001 in the US on the world high-tech industry, the Israeli high-tech industry included. D. Globerman, conveyed the emerging stimulators for recovery in the high-tech industry, and the behavior by industry necessary to revive. He cited a ‘virtual’ pessimist as saying that the current high-tech crisis would not be over before 2003. The cited ‘virtual’ optimists, on the other hand, would assume that thanks to the vicious September 11 terror attack on the US, the crisis would be over soon because private and public agencies in the US and elsewhere would invest in anti-terror technologies. This might include the upgrading of their technological systems in order to avoid any future terror threat, and the upgrading of the technological capabilities of security agencies,! airports, and air companies as well as the military machine needed for the [electronic] war against global terror. These activities, fueled by the spending of many billions of dollars, will help the economy out of its crisis; they will be the main driving force behind the likely recovery of the high-tech industry. In addition, since the terror has minimized the risk differences between Israel and the rest of the of the developed world, and since there is no place that is 100% safe, investors, holding hot money will eventually look for promising places to invest, including in Israel.

In late September 2001 the Minister of Finance exempted foreign high-tech firms from local company income tax. This ruling is an addition to other grants offered to firms investing in Israel.” (Research Bulletin 72 – The Impact of Globalization on the Boom and Crisis of Israel’s High-Tech Industry by B.A. Kipnis) – http://www.lboro.ac.uk/gawc/rb/rb72.html

Talpiot

Talpiot is the special army training program that puts the best high school graduates through a rigorous curriculum of computer science, physics, and math, then places them in key assignments in, say, intelligence units. The selection process for Israel’s army-trained technology elite starts when teenagers apply to programs, usually in their last two years of high school. Only volunteers are eligible to be chosen for the army’s training programs. The most selective program, Talpiot, accepts only 30 applicants, or 1 in 10, a year. Officers say the army doesn’t look for fuzzy traits like creativity and leadership; it focuses on measurable qualities. Extremely high aptitude in math and science, along with success in rigorous exams, are the key qualifications.

“The IDF has created special systems to identify the country’s best and brightest, and to steer them into the most demanding areas of technological warfare and intelligence work. The elite of the elite pass through a program known as Talpiot, set up in the aftermath of the bloody Yom Kippur War in October 1973. Israel eventually prevailed, but in 18 days of fighting, Egypt and Syria inflicted heavy casualties on the much-vaunted Israeli forces. The idea behind Talpiot, says Major Yariv Danziger, ‘was for a unit to gather geniuses in the army to invent new technologies and weapons.’ The program was officially started in 1979 with an initial class of 25 “geniuses.” Danziger, 34, has headed the program for the past two years.

Think of Talpiot as something like the old East German Olympic athletics program minus the doping. By the time young men and women are inducted into the army at age 18, the IDF has in hand all of their individual psychological and academic records. The IDF is notified of students with top grades, particularly in physics and math. Each September, 3,000 Talpiot candidates submit to a brain-busting battery of intellectual and scientific tests. They undergo heavy psychological profiling, and tests on leadership skills and their ability to work with others. By March, only 35 are left. ‘The tests are so difficult, most people complete only 20 percent to 40 percent of each exam,’ says Assaf Monsa, a 29-year-old Talpiot graduate. ‘Some of the questions are not solvable. They are not meant to be solved. It’s to differentiate between the very good and the extraordinarily good.’ Danziger says he’s not sure even a known brain like Bill Gates could cut it. ‘I think he could pass the ! intellectual part, but I don’t know his human capabilities,’ the major says. ‘Is he pleasant to work with? Can he make other people do what he wants without financial authority?’ (There’s also the question of whether Gates would want to spend at least nine years in the military, as Talpiot graduates must. That’s six years more than the minimum requirement for many other Israeli soldiers.) Talpiot soldiers spend the first three years and four months of their service housed in special barracks at Hebrew University in Jerusalem, where they undertake intensive study in cutting-edge science. They also go through eight months of basic training. After graduation, they spend five years in the unit of their choice; almost all pick one of the elite technical units. ‘These are the soldiers that all of the units want,’ says Danziger.

Since Talpiot’s inception, only a few hundred people have made it through the program. Their military handiwork is classified, although it is known to have touched everything from algorithm compression to antimissile systems. But Talpiot’s role in the current tech boom is no secret. Assaf Monsa and another Talpiot graduate, Yair Mann, along with two other alumni of elite tech units, three years ago founded RichFX, which has developed streaming video technology that Monsa says uses between one-twentieth and one-hundredth of the bandwidth gobbled up by competing systems. (It’s used by Neiman Marcus to sell $500-plus shoes over the Internet.) Marius Nacht, another Talpiot grad, is a co-founder of Check Point. Eli Mintz, CEO and president of Compugen, a gene sequencing technology firm, and Yuval Shalom, co-founder and CTO of Wiseband, a maker of wireless phone technologies, also went through Talpiot. ‘The phrase ‘It can’t be done’ is not for Talpiot,’ says Ehud Ram, a recent! ly retired high-ranking intelligence officer who worked with some Talpiot grads over the years. (Ram’s own background is in geophysics and remote sensing data. During a meeting three years ago, Ram informed Steve Ballmer, then Microsoft’s second in command, that he should consider relocating the company’s Redmond campus or risk being wiped out by a nearby long-dormant but still dangerous volcano. No word yet from Ballmer, now Microsoft’s CEO.)” (Startup Nation by Stacy Perman) – http://www.timeinc.net/b2/subscribers/articles/print/0,17925,512689,00.html

“Graduates, along with those of other elite programs, are deployed throughout the armed services to do everything from reviving crashed computers to heading sophisticated military intelligence projects. Col. Albert Tregar’s IDF programming school gets to choose the best, train them, and quickly put them into the field, where they could very well wind up practicing various forms of technological warfare.” (Israeli Army Grads Lead Business Revolution by David Rosenberg) – http://www.cji.co.il/cji-n126.txt

MAMRAM

“Is the computer division of the IDF (Israel Defense Forces) in the areas of design and development of information systems. 1959 – MAMRAM, the Hebrew acronym for the IDF’s Central Computing Facility, is formed.

MAMRAM is an abbreviation for Center of Computing and Information Systems; originally, Center of Computing and Mechanized Registration is the Israel Defense Forces’ central computing system unit, providing data processing services for all arms and the general staff of the IDF. As of 2007, MAMRAM is under the command of Colonel Ayala Hakim.

In 1994, the MAMRAM programming school, considered one of the best sources of high-quality software professionals in the world, was separated into a newly-formed unit called BASMACH. However, the school’s graduates, which were and still are highly sought after in the industry, are still referred to as MAMRAM graduates. Following graduation, BASMACH students go on to serve in various IDF units. Some of the graduates are often offered a position in MAMRAM itself.” (MAMRAM – Wikipedia entry) – http://en.wikipedia.org/wiki/MAMRAM

“The demands of MAMRAM, another elite division, aren’t as withering as Talpiot’s — the MAMRAM washout rate is only 50 percent. MAMRAM, the Hebrew acronym for Central Unit for Data Processing, is the IDF’s main computer corps, and trains all military software programmers and network systems architects.

MAMRAM candidates go through a six-month trial of up to 15-hour-a-day course work before they’re admitted to the program. Those who make the grade must serve six years, minimum. Still, it is one of the most coveted postings in the military.” (Startup Nation by Stacy Perman) – http://www.timeinc.net/b2/subscribers/articles/print/0,17925,512689,00.html

8-200

“Then there is 8-200, an electronic warfare unit founded in the early 1960s that many believe has left a bigger mark on the boom than any of Israel’s other elite operations. Its name comes from its founding members: 8 Ashkenazi Jews and 200 Iraqi immigrants who were specialists in wireless communications and had worked for Iraqi Railways. Their skills became the cornerstone of the electronic intelligence gathering, encryption, and other activities known to be among the unit’s specialties. It’s illegal for past and present members to talk about 8-200, although it has become something of an open secret in the tech world. The unit has also attained a mythical status among venture capitalists for the entrepreneurial wizards who are veterans of the unit. Gil Shwed, one of Check Point’s founders, allegedly served in 8-200, though he won’t confirm that himself. ‘I had the idea in the army, three years before I started Check Point,’ Shwed says. ‘I knew I had a good idea. If you can do it in the military environment, you have the tools to do it in other environments.'” (Startup Nation by Stacy Perman) – http://www.timeinc.net/b2/subscribers/articles/print/0,17925,512689,00.html

*Here’s the confirmation:

“A four-year-long period goes virtually unmentioned in the official biography of the Israeli billionaire Gil Shwed. This much information can be cobbled together: In 1986 Shwed, just 18 years old, joined the supersecret electronic intelligence arm, Unit 8-200, of the Israeli Defense Forces. His job most likely was to string together military computer networks in a way that would allow some users access to confidential materials and deny it to others.” (A Fortune in Firewalls by Lea Goldman) – http://members.forbes.com/global/2002/0318/042.html

The legend of the name is that unit began with eight Ashkenazis and 200 immigrants from Iraq. The Iraqi immigrants had previously worked on Iraqi Railways, knew wireless communications and of course, Arabic Israel Defense Force intelligence unit 8-200 may be Israel’s greatest high-tech incubator, whose graduates have gone on to found companies like Check Point, NICE, Comverse and ECI. Israel Defense Force intelligence unit 8-200 may be Israel’s greatest high-tech incubator, whose graduates have gone on to found companies like Check Point, NICE, Comverse and ECI. Not to mention all those start-ups. The Arena presents a first-ever expose of Israel’s ultimate secret weapon.

“It began as a unit in the Intelligence Service of the Hagana (the pre-State underground army), called “Intelligence Service 2,” which was responsible for listening to enemy transmissions. 8-200 has undergone numerous incarnations. Today, it concentrates on intelligence gathering and decoding of encryption codes. It is a good and developed unit, whose contribution to the system is important. It was forbidden to talk about it for years. We have been hearing more about it recently and there have been a few publications in Israel and abroad. The unit recruits quality personnel, which then goes out and markets technologies developed there.”

“It is important to understand that this is a huge unit, that works in many fields. In general, it is responsible for all intelligence that can affect Israel’s security. Intelligence gathering in the unit comes from a variety of sources, i.e. listening to all types of broadcasts: telephones, fax, radio. The unit listens, intercepts and decodes information, mostly encrypted, though some is in clear.

“The major challenge is decoding encrypted transmissions. Unit computer experts and mathematicians are responsible for this, using mathematical models and algorithms.”

Yossi Melman, “Ha’aretz” Intelligence Affairs Correspondent and co-author of “Every Spy a Prince” says, “This is the most important intelligence unit in the State of Israel. More than the Mossad. The information obtained by this unit is of the highest priority to the entire intelligence community.” Melman continues, “In my opinion, many of the Israeli high-tech companies are based on the information amassed in the unit. But they are not exceptional. It happens everywhere. Not a few Mossad agents became businessmen after their retirement, using their connections and information amassed while in the service. There are suggestions of paying royalties to the State, but such suggestions reek of dictatorship.”

Alon of iWEB shows his courage, admitting, “It isn’t the paratroopers. There isn’t a strong social element. Guys come to work. In addition, the unit is strongly compartmentalized. If friendships developed, it was in small groups. Compartmentalization indeed. There is hardly any free movement at headquarters. Every soldier has authorization to enter only a few places, and each team is totally isolated from his neighbors. Military discipline is not rigidly enforced, apparently because there is no need for it. David of Power Dsine remembers, “I was scared when I arrived. I saluted the department head the first time I saw him. He told me that that would also be the last time.” (Nerds in Uniform by Batya Feldman) – http://web.archive.org/web/20041101081545/www.globes.co.il/DocsEn/did=387213.htm

1959 – Unit 8-200 of the Intelligence Corps is formed. Its first commander was Avraham Aloni, who in 1952 became the commander of the Signal Intelligence Unit of the IDF Intelligence Corps. Also in 1959, the electronics division was established which served as a research and technology division of the Intelligence Corps, which in turn became 8-200. Ever since, graduates of 8-200 have gone on to hold leading positions in Israelâ’s high-tech industries, becoming entrepreneurs and executives in such companies as Checkpoint, Comverse, Taldor, ECI Telecom, Audiocodes, Jacada, Compugen, Nice, and others.” (The 50s: Little Israel invents and devises by Dan Yachin) – http://www.globes.co.il/serveen/globes/docview.asp?did=487939&fid=1363

“Several of the founders of Israel’s best-known tech success, the Internet security firm Check Point Software Technologies, are former members of 8-200 who specialized in developing firewalls between classified military computer networks.” (Startup Nation by Stacy Perman) – http://www.timeinc.net/b2/subscribers/articles/print/0,17925,512689,00.html

MAMDAS

“Take the air force operational software and development center, known by its Hebrew acronym, MAMDAS. It designs some of the world’s most sophisticated military software, and most of its personnel are in their early 20s. The key to its success, says Lieutenant Colonel Zafrir, an officer in the unit (the army censor prohibits publication of some officers’ full names), lies in the close integration of development and operation and close cooperation between designers and people who use the technology in the field.” (Israeli Army Grads Lead Business Revolution by David Rosenberg) – http://www.cji.co.il/cji-n126.txt

Unit 8153

The Mapping Unit, Modern Hebrew: Yehidat Mipui of the Israel Defense Forces military intelligence (Unit 8153) is in charge of strategic mapping of locations. It is known for doing so for both strategic and tactical purposes. (Mapping Unit – Wikipedia entry) – http://en.wikipedia.org/wiki/Mapping_Unit

*Okay, now that we’ve established the covert intelligence units of Israel, whose admitted roles are to recruit, train and place in the field or remotely, active service intelligence operatives. Whose acknowledged tasks were and are to intercept electronics communications, surreptitiously compromise the security of sensitive communications of targeted foreign countries, establish and insert “Trojan Horse” start-ups and spy software in strategic areas of secure electronic communications. For the purposes of compiling military and economic intelligence, then utilizing blackmail of individuals they find compromised through the electronic surveillance grid. This is technological warfare deployed against all they perceive as their enemies, and of foreign powers they can exploit to their advantage. Now let’s examine some of the principle players and the ‘front corporations they’ve established to carry out their covert and sanctioned espionage for Israel’s military and interests! Again, I am using actual excerpts so that there may be no controversy regarding the veracity of statements.

Check Point

“Gil Shwed is the data-security company’s 34-year-old CEO. Fresh from his role as a network defense specialist for four years in the Israeli Defense Force, Shwed launched Check Point in 1993. Check Point acquired Zone Labs in 2004. In October, 2005, Check Point announced it would acquire Sourcefire, the developers of Snort for $225 million. Both the Department of Defense and the FBI objected to the acquisition due to national security concerns. The acquisition was pending during an investigation by the Committee on Foreign Investment in the United States (CFIUS), but was announced to have collapsed over security concerns related to the “Snort” software which guards some classified U.S. military and intelligence computers. The acquisition has been since withdrawn.” (Wikipedia entry) – http://en.wikipedia.org/wiki/Check_Point

“Sourcefire is at work in leading financial, healthcare, manufacturing, technology and educational organizations throughout the U.S., Europe, Asia and Latin America. But here is the kicker: Sourcefire solutions are trusted by all branches of the military, the largest civilian agencies, and domestic, internal and military intelligence organizations. This kicker has all the earmarks of a red flag, and that is exactly what came up. “We’ve decided to pursue alternative ways for Check Point and Sourcefire to partner in order to bring to market the most comprehensive security solutions,” said Gil Shwed, Check Point’s CEO.” (Who Benefits From Check Point’s Blocked Sourcefire Buyout?) – http://software.seekingalpha.com/article/8479

So it seems that Mr. Shwed is on a mission both figuratively and literally, to get access to classified U.S. military and intelligence computers.

“Sourcefire makes network defense and intrusion detection software for an array of customers, including the Defense Department. The company has deep roots in the National Security Agency. Its founder and chief technology officer, Martin Roesch, has served as an NSA contractor. Its vice president of engineering, Tom Ashoff, developed software for the secretive spy agency.” (U.S. Reviewing 2nd Dubai Firm) – http://www.washingtonpost.com/wp-dyn/content/article/2006/03/01/AR2006030102192_pf.html

“Sourcefire makes arguably the best network-based intrusion detection system that’s ever existed, and it’s used on some very sensitive networks by the US Government. Handing control of the company that develops and maintains that software to foreign interests seemed a little too much for the feds. “I think Sourcefire is a great company I think they had good things and I think I would be happy tohave them as a part of Check Point. But I don’t think that there are no alternatives to that technology,” Shwed says.

“Check Point will either form an OEM relationship with Sourcefire, or simply buy another company that owns a similar technology, he added. The roadmap stays the same, Shwed insists.” (Check Point wants to be the last pure-play security vendor by Patrick Gray) – http://www.zdnet.com.au/news/security/soa/Check-Point-wants-to-be-the-last-pure-play-security-vendor/0,130061744,139265693,00.htm

“Check Point has recently acquired Zone Labs, a company known for letting consumers download free software like Zone Alarm, a personal firewall. When asked if free software downloads will stop now with the acquisition, Mr Gil Shwed, chairman and CEO of Check Point, said: ‘No, Zone Labs is doing a good job providing free products for consumers’.”

“‘The fact that it provides free products to people is a very good way to secure people and get them familiar with the need for security and also to test software programs. The fact that we have 25 million consumers is a great way to make sure that a product is tested in every environment’.” (Check-ing on the Weakest) – http://computertimes.asiaone.com/people/story/0,5104,1885,00.html

I find this statement troubling at least as much as I find the fact that they are producing Firewall software for personal computers. Which any good intelligence technician would create with surreptitious back-door access installed.

Google

“Google was co-founded by Larry Page and Sergey Brin while they were students at Stanford University, and the company was first incorporated as a privately held company on September 7, 1998. The first funding for Google as a company was secured in the form of a USD100,000 contribution from Andy Bechtolsheim, co-founder of Sun Microsystems, given to a corporation which did not yet exist. After viewing a quick demo, Sun Microsystems co-founder Andy Bechtolsheim (himself a Jewish immigrant from Germany) wrote a $100,000 check to ‘Google, Inc.'” (The Story of Sergey Brin by Mark Malseed) – http://www.momentmag.com/Exclusive/2007/2007-02/200702-BrinFeature.html

“Around six months later, a much larger round of funding was announced, with the major investors being rival venture capital firms Kleiner Perkins Caufield & Byers and Sequoia Capital. Sequoia Capital, one of the first Silicon Valley venture capital firms, has only one office outside the United States — in Israel. Financier Michael Moritz, from Sequoia currently sits on the board of Directors of Google. Google also owns both Google video and YouTube which was purchased in late 2006. In 2004, Google launched its own free web-based email service, known as Gmail. Google admits that deleted messages will remain on their system, and may be accessible internally at Google, for an indefinite period of time. For the first time in Google’s history, the language in their new policy made it clear that they will be pooling all the information they collect on you from all of their various services. Moreover, they may keep this information indefinitely, and give this information to whomever they warrant. Their corporate motto is “Don’t be evil“, and they even made sure that the Securities and Exchange Commission got this message in Google’s IPO filing. Google has never been known to delete any of the data they’ve collected, since day one. For example, their cookie with the unique ID in it, which expires in 2038, has been tracking all of the search terms you’ve ever used while searching their main index. For all searches they record the cookie ID, your Internet IP address, the time and date, your search terms, and your browser configuration. Increasingly, Google is customizing results based on your IP number. This is referred to in the industry as ‘IP delivery based on geolocation.'” (Compiled from various documented sources)

“Google has also developed Google Earth, an interactive mapping program powered by satellite imagery that covers the vast majority of the earth. Google Earth is generally considered to be remarkably accurate and extremely detailed. For example, some major cities have such remarkably detailed images that one can zoom in close enough and read the license plates on cars on a street. Specifically, some countries and militaries contend the software can be used to pinpoint with near-precision accuracy thephysical location of critical infrastructure, commercial and residential buildings, bases, government agencies, and so on.” (Google Wikipedia entry) – http://en.wikipedia.org/wiki/Google

“Sergey Brins parents, Michael Brin, 59, a mathematics professor at the University of Maryland, and his wife, Eugenia, 58, is a research scientist at NASA’s Goddard Space Flight Center. They are Jews who emigrated from Russia with the assistance of HIAS, the Hebrew Immigrant Aid Society, and $2,000 dollar loan from the Jewish community in Maryland. Google’s first employee and a number of other early hires were Jewish and, when the initial winter holiday season rolled around, a menorah rather than a Christmas tree graced the lobby.

Like Sergey, Larry is the son of high-powered intellects steeped in computer
science. His father, Carl Victor Page, a computer science professor at Michigan State University until his death in 1996, received one of the first Ph.D.s awarded in the field. His mother, Gloria, holds a master’s degree in computer science and has taught college programming classes. The two young graduate students also shared a Jewish background.” (The Story of Sergey Brin by Mark Malseed) – http://www.momentmag.com/Exclusive/2007/2007-02/200702-BrinFeature.html

“DAVOS, Switzerland – Google ‘is in the process of establishing an R&D center in Israel,’ Sergey Brin, a founder of the Internet search titan, told Haaretz during the World Economic Forum here. Brin and co-founder Larry Page were among the more visible participants at the economic conference. Both have a solid connection with Israeli entrepreneurs in the Internet field.” (Google plans Research and Development center in Israel) – http://www.cji.co.il/cji-n301.txt

Google Facts:

“Matt Cutts, a software engineer at Google since January 2000, used to work for the National Security Agency.Keyhole, the satellite imaging company that Google acquired in October 2004, was funded by the CIA. Keyhole is supported by In-Q-Tel, a venture capital firm funded by the CIA, in an effort to ‘identify and invest in companies developing cutting-edge information technologies that serve United States national security interests.’

‘We are moving to a Google that knows more about you.'” Google CEO Eric Schmidt, February 9, 2005 (Creepy Gmail) – http://www.gmail-is-too-creepy.com/

“Both Google founders Sergey Brin and Larry Page attended Shimon Peres’ 80th birthday extravaganza in September of 2003. Brin even spoke at a symposium entitled ‘The Promise and Risk of Technology'” (Celebrating 80 Years with Shimon Peres) – http://www.israelnewsagency.com/peres80.html

Onset Technology

“The problem is that BlackBerry’s operating system includes only e-mail, an appointment book, and a contact list (personal information management). There are already several small software companies in the world that have discovered this vacuum, and are supplying added value services for BlackBerry’s operating system. One of these companies is Israeli start-up Onset Technology Ltd., founded in 1997 by president and CEO Gadi Mazor and Ron Maor, both veterans of Unit 8-200 (the IDF signal intelligence gathering unit). Most of Onset Technology’s current work involves the BlackBerry. The company’s METAmessage software provides access to an enterprise’s network via a BlackBerry. The software enables users to see files on an office computer, print them, and check for errors.” (Bettering BlackBerry: Israeli Start-up Onset Technology will Develop Homeland Security Apps for Blackberry PDAs – by Ofer Levi) – http://www.jgv.com/portfolio/port_onset2.htm

Odigo

“Odigo was an Israeli company whose headquarters were in New York, with offices in Herzliya. It offered instant messaging services via a minor messaging client called Odigo Messenger. Formally an affiliate web service provider Bravenet, Odigo was acquired by Comverse Technology on May 20, 2002. The founders of Odigo are Avner Ronen and his wife Maskit. Odigo is named after the Greek word for ‘Guide’.

Avner, 24, would soon find himself living like a student in a battered East Village loft. He would see his fledgling company, Odigo, laid siege to by America Online, the user-friendly Godzilla of the Internet world. He would be poised to earn fantastic amounts of wealth — and would be equally poised to earn nothing. But having spent five years in the Israeli Defense Forces, he was not given to panic. ‘Conflict with AOL is not so terrible,’ he once told me. ‘Things are more difficult with Hezbollah.’ Ronen has never quite shed his military appearance — though having settled in Manhattan, and Banana Republic.

The Jan. 25 start-up of Odigo, which specializes in instant-message technology, was fast approaching. ‘It may sound absurd in this Internet age,’ he says, ‘but sometimes you must physically be in an environment to feel what is happening. You need presence.’ Choosing Silicon Alley over Silicon Valley was a matter of pure logistics: Odigo had 70 employees back home, and Ronen believed that the extra time difference between Israel and California would be too burdensome.

Still in the cab, Avner called Israel and casually informed his wife, Maskit, of his impulse to move. She agreed instantly. Maskit, who is also 24, met Avner in the military, where she had a senior rank and, significantly, was his computer instructor. (She is now one of Odigo’s software engineers.) ‘There was no time to digest this information for either of us,’ Avner recalls. ‘Moving here was just a theory.'” (Immigrants with an I.P.O. by Marshall Sella) – http://partners.nytimes.com/library/magazine/home/20000917mag-sella.html

“Odigo came into the news in the aftermath of the September 11 attacks, because two workers claimed that they received word of an upcoming terrorist attack two hours in advance, via their own messaging service. The two employees allegedly recorded the ip-address and notified the authorities after the attack. [1]” (Wikipedia entry) – http://en.wikipedia.org/wiki/Odigo

“Odigo, the instant messaging service, says that two of its workers received messages two hours before the Twin Towers attack on September 11, predicting the attack would happen, and the company has been cooperating with Israeli and American law enforcement, including the FBI, in trying to find the original sender of the message predicting the attack.

Micha Macover, CEO of the company, said the two workers received the messages and immediately after the terror attack informed the company’s management, which immediately contacted the Israeli security services, which brought in the FBI.

Odigo usually zealously protects the privacy of its registered users, said Macover, but in this case the company took the initiative to provide the law enforcement services with the originating Internet Presence address of the message, so the FBI could track down the Internet Service Provider, and the actual sender of the original message.” (Odigo says Workers were warned of attack by Yuval Dror) – http://www.haaretz.com/hasen/pages/ShArt.jhtml?itemNo=77744&contrassID=/has%5C

“Odigo, Inc., founded in 1998, is a leading provider of Instant Messaging and Presence Solutions to wireless carriers and service providers worldwide with a community of over 8M users world wide. Odigo’s products include IM servers, SMS-IM gateways, and presence management solutions. On May, 2002 Odigo was Aquired by Comverse, the world’s leading supplier of software and systems enabling network-based multimedia enhanced communications services. The field-proven Odigo Instant Messaging service, which serves millions of subscribers, enables Comverse to expand its offering to include both in-network and outsourced Instant Communications Solutions. http://www.odigo.com/

“AOL aol (nyse: aol – news – people) last weekend blocked the latest version of the Odigo Messenger from working with AOL Instant Messenger (AIM). Late Monday, Odigo figured out a way around the blockade, but early today AOL again put the kibosh on Odigo’s software.

Both companies say they’re ready for a long battle. AOL contends that by accessing its servers, Odigo is compromising AOL’s security and risking the privacy of AIM users.

AOL spokeswoman Tricia Primrose was equally adamant: ‘We’re not going to allow unauthorized access to our servers. No doubt they will try to devise a new workaround, and then we’ll block them again.'” (AOL Again Blocks Odigo by David Einstein) – http://www.forbes.com/2000/06/13/mu5.html

Does anyone else think this is abusive technical hacking into AOL’s servers who clearly don’t want them there and feel it would compromise the security and personal records of AOL users? If this AOL was a woman and Odigo a man, he would be guilty of stalking, harassment and repetitive date rape. What do you call a company that forces its services and products on you whilst attempting to gain access to confidential consumer data? Oh that’s right a spy op.

“Shortly after 9-11, Odigo was completely taken over by Comverse Technology, which had been part owner of Odigo since early 2000, if not earlier. Shortly after 9/11, five executives from Comverse were reported to have profited by more than $267 million from ‘insider trading.’

Avner Ronen, the ‘founder’ of Odigo, was Vice President of Business Development of Comverse Technology in October 2005. This indicates that Ronen and Kobi Alexander (of Comverse), both Israeli military officers with computer backgrounds, have been close business partners since early 2000.

‘Comverse and Odigo have had a long-standing partnership and together have developed instant communications products and services that we have recently begun to offer to operators around the world,’ Zeev Bregman, CEO of the Israel-based Comverse Ltd., told The Jerusalem Post in May 2002. (Why was Kobi Alexander Allowed to Flee?) – http://www.iamthewitness.com/Bollyn-Kobi-Alexander.html

Gilat Satellite Networks

Made more than half of the interactive VSATs (Very Small Aperture satellite Terminals), or small satellite earth stations used in communications networks sold in the world.

“(06/13/2006 10:03 AM EDT)
ZICHRON YAACOV, Israel – Satellite maker Gilat Satellite Networks said its technology will be incorporated into Cisco Systems’ routers. Gilat’s touts its SkyEdge technology as allowing Cisco routers to supply integrated services and the capacity to securely transmit high-speed voice, video and data services. The move is designed to provide an alternative communications path in parallel with terrestrial communications.” (Cisco to Cooperate with Gilat for Satellite Backup) – http://www.eetimes.com/showArticle.jhtml?articleID=189400601

“Like many others in the Israeli high tech field, Yoel Gat is a graduate of the Intelligence Corps, and a protege of Zohar Zisappel. He entered the civilian job market in 1987 only because he did not win against Eric Paneth in the stand-off for the position of unit commander. Three years later, Paneth became one of the founders of Orckit.

Gilat Satellite Networks subsidiary Gilat Communications, set up in Israel under the management of Shlomo Tirosh, is increasingly becoming a major factor in the Israel inland communications market, and like its parent company, was highly successful in issuing on Wall Street. Gilat grew from being a start-up to a 500-staff company, which constantly shows profits (generally exceeding expectations), and never ceases to innovate in satellite communications. Gat stands at the head of the pyramid of a company with a hush-hush aura attached to it by a team of guys who left the Intelligence Corps and globally conquered the satellite communications market.

Leaving the unit together with Gat were Amiram Levinberg, his brother Joshua Levinberg, Shlomo Tirosh and Gideon Kaplan, and together they set up Gilat Satellite Networks (GILTF).” (Yoel Gat – Gilat Satellite Networks, The Hush-hush Guy by Efi Landau) – http://web.archive.org/web/20041125013723/www.globes.co.il/DocsEn/did=381329.htm

ECTel

“ECtel, a unit of telecoms equipment holding firm ECI Telecom, makes monitoring equipment for communications networks. In August of 2003, a major unnamed telecoms carrier had ordered the Israeli company’s lawful Interception application. A valuation for deal was not given and a spokeswoman for the firm declined to comment on the size of the contract. For those who may not be familiar with the term ‘lawful interception’ it is more commonly known as wiretapping.” (Israel ECtel wins U.S. telecoms carrier deal) – http://www.forbes.com/technology/newswire/2003/08/19/rtr1061040.html

From ECTel’s own website it states that Chairman of the Board Yair Cohen, “served as Brigadier General of Unit 8-200, the central military intelligence unit of the Israeli Defense Forces.” It further elaborates that “in this capacity, he was engaged in the development of state-of-the-art military technology.” (ecTel.com) – http://www.ectel.com/content.aspx?id=367

Narus

“Narus is a private company founded in 1997 by Ori Cohen, who had been in charge of technology development for VDONet, an early media streaming pioneer.

It is notable for being the creator of NarusInsight, a supercomputer system which is used by the NSA and other bodies to perform mass surveillance and monitoring of citizens’ and corporations’ Internet communications in real-time, and whose installation in AT&T’s San Francisco Internet backbone gave rise to a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.

In 2004, Narus engaged the former Deputy Director of the National Security Agency, William Crowell as a director. From the Press Release announcing this:

‘Crowell is an independent security consultant and holds several board positions with a variety of technology and technology-based security companies. Since 9/11, Crowell has served on the Defense Advanced Research Projects Agency (DARPA) Task Force on Terrorism and Deterrence, the National Research Council Committee on Science and Technology for Countering Terrorism and the Markle Foundation Task Force on National Security in the Information Age.'” (Narus Wikipedia entry) – http://en.wikipedia.org/wiki/Narus

“One of the devices in the ‘Cabinet Naming’ list is particularly revealing as to the purpose of the ‘secret room’: a Narus STA 6400. Narus is a 7-year-old company which, because of its particular niche, appeals not only to businessmen (it is backed by AT&T, JP Morgan and Intel, among others) but also to police, military and intelligence officials. Last November 13-14, for instance, Narus was the ‘Lead Sponsor’ for a technical conference held in McLean, Virginia, titled ‘Intelligence Support Systems for Lawful Interception and Internet Surveillance.’ Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint and Verizon. Narus founder, Dr. Ori Cohen, gave a keynote speech. So what does the Narus STA 6400 do?

‘The (Narus) STA Platform consists of stand-alone traffic analyzers that collect network and customer usage information in real time directly from the message…. These analyzers sit on the message pipe into the ISP (internet service provider) cloud rather than tap into each router or ISP device’ (Telecommunications magazine, April 2000). A Narus press release (1 Dec., 1999) also boasts that its Semantic Traffic Analysis (STA) technology ‘captures comprehensive customer usage data … and transforms it into actionable information…. (It) is the only technology that provides complete visibility for all internet applications.’

The next logical question is, what central command is collecting the data sent by the various ‘secret rooms’? One can only make educated guesses, but perhaps the answer was inadvertently given in the DOD Inspector General’s report (cited above):

‘For testing TIA capabilities, Darpa and the U.S. Army Intelligence and Security Command (INSCOM) created an operational research and development environment that uses real-time feedback. The main node of TIA is located at INSCOM (in Fort Belvoir, Virginia)… .”

Among the agencies participating or planning to participate in the INSCOM ‘testing’ are the ‘National Security Agency, the Defense Intelligence Agency, the Central Intelligence Agency, the DOD Counterintelligence Field Activity, the U.S. Strategic Command, the Special Operations Command, the Joint Forces Command and the Joint Warfare Analysis Center.’ There are also ‘discussions’ going on to bring in ‘non-DOD federal agencies’ such as the FBI.” (AT&T Whistle-Blower’s Evidence by Wired) – http://www.commondreams.org/headlines06/0517-10.htm

“If you’ve been keeping track of American Internet and the battles over surfer privacy, then you have run into the name Narus, which specializes in tapping surfer traffic. It was founded in 1997 by Dr Ori Cohen, Stas Khirman and four other guys in Israel.

For years Narus sailed on untroubled. But today it’s become associated with the likes of Carnivore or Echelon, the notorious software programs that have become linked with spying on email and delivering data on surfers to government agencies.

The image change Narus has suffered and its frequent mentions in debates on privacy and the freedom of information, is mainly because of Mark Klein. That would be a technician retired from AT&T for 22 years, who reported to the American authorities a few months ago that he suspected AT&T of allowing the National Security Agency to bug its customers’ phone calls.

Customer Internet traffic via the WorldNet service provider was reportedly shunted to data-mining technology in a secret room at AT&T facilities. The data analysis technology was made by Narus.

It is very possible that Cohen and Khirman are working at a startup that nobody is willing to talk about. A stealthy startup they helped found called Cright that has lots of employees in Israel and California, and which is reportedly about to avail itself of Ukrainian development talent too. Almost nobody has heard of Cright and nobody at all, including its distinguished investors, is willing to discuss what it does.

Sequoia Israel, the Rolls Royce of the technological venture capital world, is whispered to have invested $7 million in Cright together with Charles River. But the enigmatic startup is not mentioned on the Sequoia site, which otherwise describes the portfolio very thoroughly. Nor does the Charles River site mention it.

Nor could I glean any information about the company or about the Narus people manning it. Cright has a website, a naked one that reveals nothing: and has taken a vow of utter silence.

Market sources surmise that Cright is tight-lipped because what it does would spark outrage among surfers jealous of their privacy, which could culminate in migraines for the startup and its backers.

But that is assuming that Ori Cohen and Stas Khirman are still working on products that analyze Internet traffic, and possibly, that this time their prying eye is looking at private surfers.

Industry sources in the know claim they’re harnessing Israeli developers to develop a DRM product designed for installation at Internet providers, which will among other things frustrate file sharing and peer-2-peer networks. These sources say Cright (could that be short for copyright?) is supposed to filter P2P networks, to monitor and analyze files being shared, and possibly to shut down errant P2P network, or at least to block certain content.

In other words, if may be a new twist on the old trick of monitoring the Internet’s main line, analyzing content, and interfering with it, just as Narus says it does in Saudi Arabia.” (Ori Cohen, Private Eye by Raphael Fogel) – http://www.haaretz.com/hasen/pages/ArticleContent.jhtml?itemNo=737258

You have Narus, established to collect internet intel on American citizens for the NSA, DIA, CIA, DHS and a host of others within the US intelligence community. What don’t they want you to know beyond that? Well, Narus was founded by Israeli native Ori Cohen in 1997, prior to that he was the VP of Business and Technology Development for VDOnet, a leading provider of Internet video conferencing and video on demand software solutions. Prior to VDOnet, he served as CEO for IntelliCom Ltd.

So both Narus and later companies Skyrider and CRight were founded by a shadowy Israeli citizen with substantial U.S. intelligence connections named Ori Cohen. But Cohen’s bio doesn’t go beyond his work in the UK with Intellicom Ltd. UK, the rest has been aggressively sanitized and filtered. No picture, and absolutely no information beyond Intellicom Ltd. which I find most unusual. But I’m going to go out on a limb and wager that what are the odds that U.S. telecom traffic is being compromised by at least 3 Israeli intel fronts, and then the NSA’s internet monitoring own capacities just happen to be farmed out to yet another Israeli founded company with tenuous intel connections? Evidence at this level, you think, would make this extremely suspicious to any agency pledged to defend the country against foreign espionage. Yet here before all, it not only doesn’t raise an eyebrow, but they’ve actually instituted the espionage by allowing a foreign power access to all of their sensitive data! One can only wonder at the extortion and blackmail material these Israeli companies have amassed that’s being used against powerful figures within the U.S. to sanction this level of insanity. But in thinking this out further, maybe there’s something more. Because by using these Israeli cut-out contractors, the U.S. agencies can effectively bypass those troublesome domestic surveillance laws and other legal obstacles, by utilizing foreign intelligence agencies such as in Israel to collect the data for them. So, the Israeli intelligence can amass extortion and blackmail material to force any leaders with something to hide, to supporting their wars and agenda. Whilst the U.S. can illegally collect net profiles, histories and whatever from any Joe and Jane citizen they want to, and reserve any incriminating or useful information for further use down the road.

Comverse Technology, Inc. ( a.k.a Comverse Infosys & Verint)

“Comverse Infosys designs, develops, manufactures and markets advanced telecommunications processing solutions for telecommunications carriers and Law Enforcement Agencies. Solutions include the acquisition, storage, processing and analysis of voice, data and video electronic communications. The open-ended, modular designs provide the versatility to easily adapt new technologies and enhancements to meet future requirements, such as 3G Cellular and packet data networks.” (Comverse Infosys Profile) – http://cryptome.org/verint-spysys.htm

“Founded in 1981, the company focuses on providing services to third party telecommunication service providers. The real parent company of Comverse was Jacob ‘Kobi’ Alexander’s Tel Aviv-based Efrat Future Technology Ltd., which carried out ‘all research, development, and manufacturing,’ for Comverse. (Wikipedia entry) – http://en.wikipedia.org/wiki/Comverse_Technologyhttp://en.wikipedia.org/wiki/Comverse_Technology)

“The latest incarnation known as Verint Systems defines itself as a global organization providing analytic software solutions for communications interception, digital video security and surveillance, and enterprise business intelligence. We generate actionable intelligence through the collection, retention and analysis of video, email, Internet and data transmissions from multiple types of communications.” (Crytome.org) http://cryptome.org/verispy.htm

“CARL CAMERON, FOX NEWS CORRESPONDENT: The company is Comverse Infosys, a subsidiary of an Israeli-run private telecommunications firm, with offices throughout the U.S. It provides wiretapping equipment for law enforcement. Here’s how wiretapping works in the U.S.

Every time you make a call, it passes through the nation’s elaborate network of switchers and routers run by the phone companies. Custom computers and software, made by companies like Comverse, are tied into that network to intercept, record and store the wiretapped calls, and at the same time transmit them to investigators. The manufacturers have continuing access to the computers so they can service them and keep them free of glitches. This process was authorized by the 1994 Communications Assistance for Law Enforcement Act, or CALEA. Senior government officials have now told Fox News that while CALEA made wiretapping easier, it has led to a system that is seriously vulnerable to coundermined the whole wiretapping system.

Congress [sic, probably Comverse] insists the equipment it installs is secure. But the complaint about this system is that the wiretap computer programs made by Comverse have, in effect, a back door through which wiretaps themselves can be intercepted by unauthorized parties.

Adding to the suspicions is the fact that in Israel, Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide.

And sources say that while various F.B.I. inquiries into Comverse have been conducted over the years, they’ve been halted before the actual equipment has ever been thoroughly tested for leaks. A 1999 F.C.C. document indicates several government agencies expressed deep concerns that too many unauthorized non-law enforcement personnel can access the wiretap system. And the FBI’s own nondescript office in Chantilly, Virginia that actually oversees the CALEA wiretapping program, is among the most agitated about the threat.

But there is a bitter turf war internally at F.B.I. It is the FBI’s office in Quantico, Virginia, that has jurisdiction over awarding contracts and buying intercept equipment. And for years, they’ve thrown much of the business to Comverse. A handful of former U.S. law enforcement officials involved in awarding Comverse government contracts over the years now work for the company. Numerous sources say some of those individuals were asked to leave government service under what knowledgeable sources call “troublesome circumstances” that remain under administrative review within the Justice Department.”

“CAMERON: Beyond the 60 apprehended or detained, and many deported since Sept. 11, another group of 140 Israeli individuals have been arrested and detained in this year in what government documents describe as “an organized intelligence gathering operation,” designed to “penetrate government facilities.” Most of those individuals said they had served in the Israeli military, which is compulsory there.

But they also had, most of them, intelligence expertise, and either worked for Amdocs or other companies in Israel that specialize in wiretapping. Earlier this week, the Israeli embassy in Washington denied any spying against or in the United States” (Transcripts of Fox News Special Report with Brit Hume, from December 13, 2001) – http://www.whatreallyhappened.com/israeli_spyring_fox.html and http://cryptome.org/fox-il-spy.htm

CARL CAMERON, FOX NEWS CORRESPONDENT: Los Angeles, 1997, a major local, state and federal drug investigating sours. The suspects: Israeli organized crime with operations in New York, Miami, Las Vegas, Canada, Israel and Egypt. The allegations: cocaine and ecstasy trafficking, and sophisticated white-collar credit card and computer fraud. The problem: according to classified law enforcement documents obtained by Fox News, the bad guys had the cops’ beepers, cell phones, even home phones under surveillance. Some who did get caught admitted to having hundreds of numbers and using them to avoid arrest.

‘This compromised law enforcement communications between LAPD detectives and other assigned law enforcement officers working various aspects of the case. The organization discovered communications between organized crime intelligence division detectives, the FBI and the Secret Service.’

Shock spread from the DEA to the FBI in Washington, and then the CIA. An investigation of the problem, according to law enforcement documents, concluded, ‘The organization has apparent extensive access to database systems to identify pertinent personal and biographical information.'” (Transcripts of Fox News Special Report with Brit Hume, from December 14, 2001) – http://www.whatreallyhappened.com/israeli_spyring_fox.html and http://cryptome.org/fox-il-spy.htm

“Another Israeli telecom company is Comverse Infosys, which subcontracts the installation of the automatic tapping equipment now built into every phone system in America. Comverse maintains its own connections to all this phone tapping equipment, insisting that it is for maintenance purposes only. However, Converse has been named as the most likely source for leaked information regarding telephone calls by law enforcement that derailed several investigations into not only espionage, but drug running as well.” (The Israeli Spy Ring) – http://www.whatreallyhappened.com/spyring.html

“Comverse is one of the most notable companies involved in the options backdating scandal. The Ex-CEO of Comverse, Jacob Alexander, an Israeli citizen, has been classified as a wanted fugitive from August 2006 by the American Federal Bureau of Investigation. Along with former finance chief David Kreinberg and former senior general counsel William Sorin, Alexander faces multiple charges of conspiracy, securities fraud, wire fraud, mail fraud, money laundering and making false filings to the Securities and Exchange Commission; all of these charges relate to alleged options backdating or other actions related to stock options. Jacob “Kobi” Alexander, was an Israeli military officer connected to the Odigo instant messaging company whose employees and users received an early warning of the 9/11 attacks, has become a fugitive from U.S. justice and taken refuge in Israel along with other prime suspects of the terror attacks.” (Wikipedia entry) – http://en.wikipedia.org/wiki/Comverse_Technology

“BEIJING, Sept. 28, 2006 (Xinhuanet) — Securities fraud fugitive Jacob “Kobi” Alexander, former Comverse Technology Inc. chief executive officer, was arrested Wednesday in Namibia.

Alexander, 54, former Israeli intelligence officer turned high-technology entrepreneur, will be brought before a court in Windhoek within 48 hours, and the U.S. will seek his extradition, the Justice Department said.

Federal prosecutors charged Alexander on Aug. 9 with backdating stock options to boost the compensation of executives at New York-based Comverse, the world’s largest maker of voicemail software.

‘Alexander’s alleged role in options backdating victimized Comverse shareholders and deceived prospective investors,’ Brooklyn U.S. Attorney Roslynn Mauskopf said in a statement. ‘The fraud affected the company’s bottom line by misstating earnings.’

After Alexander was charged and fled the U.S. the FBI put his face on its Most Wanted list and Interpol initiated a global ‘red notice,’ asking police to arrest the former CEO. Prosecutors said today that Alexander isn’t a U.S. citizen as the FBI stated in a press release after he was first charged.

Robert Nardoza, a spokesman for Mauskopf, said the former CEO, a citizen of Israel, is also a permanent resident of the U.S.

Alexander wired 57 million U.S, dollars to Israel in July from an account at Citigroup Inc.’s Smith Barney Unit, the U.S. government said, calling the transfer an effort to ‘aunder the proceeds of the fraud.’ His assets in two Citigroup Smith Barney accounts were frozen July 31.

A 32-count indictment unsealed Wednesday by Garaufis in Brooklyn federal court charged Alexander with crimes relating to an alleged ‘slush fund” and the backdating of stock options from 1998 to 2006. He is charged with conspiracy, securities fraud, making false filings with the U.S. Securities and Exchange Commission, mail fraud, wire fraud and money laundering.” (Fugitive: Interpol arrests Jacob Alexander) – http://news.xinhuanet.com/english/2006-09/28/content_5149944.htm

Comverse Technology, the U.S.-based ‘parent company’ of an older and much bigger Israel-based company with the same name, is the owner of the Verint, Ulticom, Starhome, Mercom and Startel companies.

Alexander, was recently allowed to flee the United States after he and two other former Comverse executives were charged with securities, mail and wire fraud by U.S. prosecutors in Brooklyn, New York. A warrant has been issued for his arrest. While a spokesman for the U.S. Attorney’s office for the Eastern District of New York told AFP on August 15 that he ‘expected’ that Alexander would turn himself in, The New York Times was rather less optimistic. ‘It will be a long time – if ever – before Alexander explains himself in a courtroom,’ the Times wrote on August 21. Alexander’s lawyer, Robert Morvillo, said he ‘believed’ that Alexander and his family were on vacation in Israel. Alexander, an Israeli citizen and a former military officer, wired $57 million to an account in Israel at the end of July and was evidently allowed to flee the United States.

‘Given Alexander’s stature and military service,’ the Times reported, quoting unnamed law professors, ‘Israel might be reluctant to readily hand him over.’ One might reasonably ask, ‘What does the 54-year old Alexander’s ‘military service’ have to do with Israel refusing to extradite him for crimes committed in the United States?’

While Alexander is obviously connected with Israel’s military intelligence apparatus and George Soros through the mutually owned investment fund ComSor, what is not widely reported is his company’s close links with Odigo, the Israeli-run instant messaging company that received – and conveyed – urgent warning messages about the imminent terror attacks on the World Trade Center, several hours before the first plane hit.” (Why was Kobi Alexander Allowed to Flee?) – http://www.iamthewitness.com/Bollyn-Kobi-Alexander.html

AmDocs Limited

“Headquarters in St. Louis, Missouri but primarily based in Ra’anana, Israel, is a provider of software and services for billing, CRM (Customer Relationship Management) and OSS (Operational Support Systems) systems. Its clients are primarily focused on the telecommunications, including such “Tier-1” players as Comcast, Cablevision, DirecTV, Jupiter Communications, Cable One, Sprint-Nextel, Cingular, Vodafone, T-Mobile and Sensis.

The company was originally called ‘Aurec Group’ (the Hebrew word for Artery, which in Hebrew is used to describe a communication channel) and dealt only with directory services, i.e. Yellow Pages. They now provide application suites for CRM, sales, and billing operations for telecommunication service providers. Amdocs still provides publishing software for creating print and online directories. The company also offers outsourced customer service and data center operations. Amdocs claims to be the largest billing system’s software and services provider in the world.; in the USA, they provide billing and directory assistance for 90% of the phone companies.

As of 2002, Dov Baharav replaced Avi Naor, as Amdocs’ CEO.” (Wikipedia entry) – http://en.wikipedia.org/wiki/Amdocs

“CARL CAMERON, FOX NEWS CORRESPONDENT: Here’s how the system works. Most directory assistance calls, and virtually all call records and billing in the U.S. are done for the phone companies by Amdocs Ltd., an Israeli-based private telecommunications company. Amdocs has contracts with the 25 biggest phone companies in America, and more worldwide. The White House and other secure government phone lines are protected, but it is virtually impossible to make a call on normal phones without generating an Amdocs record of it.

In recent years, the FBI and other government agencies have investigated Amdocs more than once. The firm has repeatedly and adamantly denied any security breaches or wrongdoing. But sources tell Fox News that in 1999, the super secret National Security Agency, headquartered in northern Maryland, issued what’s called a Top Secret sensitive compartmentalized information report, TS/SCI, warning that records of calls in the United States were getting into foreign hands in Israel, in particular. Investigators don’t believe calls are being listened to, but the data about who is calling whom and when is plenty valuable in itself. An internal Amdocs memo to senior company executives suggests just how Amdocs generated call records could be used.

“Widespread data mining techniques and algorithms…. combining both the properties of the customer (e.g., credit rating) and properties of the specific ‘behavior…. ‘” Specific behavior, such as who the customers are calling. The Amdocs memo says the system should be used to prevent phone fraud. But U.S. counterintelligence analysts say it could also be used to spy through the phone system. Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible.

Another briefing document said, ‘It has become increasingly apparent that systems and networks are vulnerable… Such crimes always involve unauthorized persons, or persons who exceed their authorization…citing on exploitable vulnerabilities.’ Those vulnerabilities are growing, because according to another briefing, the U.S. relies too much on foreign companies like Amdocs for high-tech equipment and software. Fox News has documents of a 1997 drug trafficking case in Los Angeles, in which telephone information, the type that Amdocs collects, was used to ‘completely compromise the communications of the FBI, the Secret Service, the DEA and the LAPD.’

BRIT HUME, HOST: Last time we reported on an Israeli-based company called Amdocs Ltd. that generates the computerized records and billing data for nearly every phone call made in America. As Carl Cameron reported, U.S. investigators digging into the 9/11 terrorist attacks fear that suspects may have been tipped off to what they were doing by information leaking out of Amdocs.” (Transcripts of Fox News Special Report with Brit Hume, from December 11-14, 2001) – http://www.whatreallyhappened.com/israeli_spyring_fox.html and http://cryptome.org/fox-il-spy.htm

“Amdocs Limited was founded by Avi Naor. Avi served in the Israeli army, and holds a BSC degree in computer sciences from the Technion Israel Institute of Technology. In 1976 he joined the Aurec Group, and in 1982 he founded Amdocs.

Naor also founded an organization by the name of Mahal2000 and serves as it’s director. Mahal is the Hebrew acronym for “Overseas Volunteers” and is a non-profit organization dedicated to enabling young (ages 18-23 ) overseas Jews to volunteer for service in the IDF, followed by a commitment to Jewish community service in their country of origin. Mahal2000 cooperates directly with the IDF, Ministry of Interior and many others in order to facilitate the enlistment of overseas volunteers. What this smells like is an active global training programme for spies, including their deployment overseas at conclusion. It even spells out specifically what non-Jews can do for the programme in this following excerpt obtained here: http://www.mahal2000.com/about/non-Jewish-volunteer.htm.

“Since then however, the policy has been to restrict service in the armed forces to citizens of Israel, Jews as well as Christians, Moslems, Druze and others, and to non-Israeli Jews so as to avoid placing at risk persons who do not have this connection to Israel. In addition, the maximum enlistment date limit is the 23rd birthday for men and the 20th for women. Unfortunately no exception can be made.

You have the opportunity, however, to take your place defending Israel on the ‘public relations front’. Today, wars and battles are often won or lost on TV screens, in the minds and hearts of good people. Therefore, public relations is no less important than planes and tanks. You could, for example, volunteer to be a PR Ambassador of Middle-East-Info.org and explain to others what it means for Israel to be the sole democracy in a region comprising 23 dictatorships (including 5 out of the world’s 7 state sponsors of terrorism and about half of the world’s major terror groups). Of the 19 most repressive regimes in the world, 7 are in Arab states and Iran. Arab regimes and Iran are also a breeding ground for advocating Jihad (Holy War) against all non-Muslims (Christians, Hindus, Buddhists, Animists and Jews included) and openly seek world domination and the ultimate destruction of freedom.” The very nature of this enterprise confirms the fact that Avi Naor is very currently active in military circles within Israel. Also of note regarding Amdocs, is that Israeli spies using the cover as “art students’ were arrested for gaining access into the offices and even the homes of federal law enforcement agents and government officials. Thirteen in all were busted and the two principals of the operation were Itay Simon and Michael Calmanovic, who were bailed out immediately by Amdocs employee Ophir Baer, who posted their $50,000 bond. While in custody, Simon told his interrogators that he “did classified work for the Israeli army.” According to the report, “Simon refused to answer questions about his military service” As for Calmanovic, he stated that he was a recently discharged “electronic intercept operator for the Israeli military”. One striking fact stands out, and that is the large number of “art students” who were experts in the art of handling explosives. What were these guys doing during their stay in this country before it was so rudely interrupted by the feds or, rather, what were they preparing to do? (Leaked Government Report Exposes Israeli Spy Ring by Justin Raimondo) – http://www.antiwar.com/justin/j032202.html

The FBI was probing allegations that the government of Israel had penetrated four White House telephone lines and was able to relay real-time conversations on those lines from a remote site outside the White House directly to Israel for listening and recording. The article also charged that the FBI was investigating whether similar penetrations had been made into State Department lines, possibly Pentagon lines and, most interesting, into unlisted, secret lines used by the FBI in its counterintelligence work, including its probe into the Israeli penetration already being investigated. The two reporters said the FBI investigation had been launched in late 1996 or early 1997 when a local telephone company manager became suspicious of an Israeli employee of Amdocs, an Israeli company that sells billing software to telephone companies. The American telephone manager’s suspicions came to the attention of the CIA, the reporters said, which turned the matter over to the FBI. The Israeli worked as a subcontractor on a telephone-billing program being developed for the CIA, and was married to an Israeli woman employed in the Israeli Embassy in Washington. In a search of the husband’s workplace, the FBI found a list of the FBI’s most sensitive telephone numbers, including the Bureau’s “black lines” that FBI counterintelligence used to keep track of the suspected Israel spy operation, the reporters noted. They reported also that husband-and-wife assignments are common in the Mossad. (Report of Israeli Eavesdropping on White House Telephones gets Varying Media Treatment By Richard H. Curtiss) – http://www.washington-report.org/backissues/072000/0007043.html

More than two dozen U.S. intelligence, counterintelligence, law-enforcement and other officials have told Insight that the FBI believes Israel has intercepted telephone and modem communications on some of the most sensitive lines of the U.S. government on an ongoing basis. The worst penetrations are believed to be in the State Department. But others say the supposedly secure telephone systems in the White House, Defense Department and Justice Department may have been compromised as well.

The problem for FBI agents in the famed Division 5, however, isn’t just what they have uncovered, which is substantial, but what they don’t yet know, according to Insight’s sources interviewed during a year-long investigation by the magazine. Of special concern is how to confirm and deal with the potentially sweeping espionage penetration of key U.S. government telecommunications systems allowing foreign eavesdropping on calls to and from the White House, the National Security Council, or NSC, the Pentagon and the State Department.

This discovery by Division 5 should have come as no surprise, given what its agents had been tracking for many months. But the FBI discovered enough information to make it believe that, somehow, the highest levels of the State Department were compromised, as well as the White House and the NSC. According to Insight’s sources with direct knowledge, other secure government telephone systems and/or phones to which government officials called also appear to have been compromised.

The subcontractor was employed by an Israeli-based company (*Amdocs) and cleared for such work. But suspicious behavior raised red flags. After a fairly quick review, the CIA handed the problem to the FBI for follow-up. This was not the first time the FBI had been asked to investigate such matters and, though it was politically explosive because it involved Israel, Division 5 ran with the ball. “This is always a sensitive issue for the Bureau”, says a former U.S. intelligence officer. “When it has anything to do with Israel, it’s something you just never want to poke your nose into. But had too much potential to ignore because it involved a potential systemwide penetration.”

As for how this may have been done technologically, the FBI believes it has uncovered a means using telephone-company equipment at remote sites to track calls placed to or received from high-ranking government officials, possibly including the president himself, according to Insight’s top-level sources. One of the methods suspected is use of a private company that provides record-keeping software and support services for major telephone utilities in the United States.

A local telephone company director of security Roger Kochman tells Insight, “I don’t know anything about it, which would be highly unusual. I am not familiar with anything in that area”. U.S. officials believe that an Israeli penetration of that telephone utility in the Washington area was coordinated with a penetration of agents using another telephone support-services company to target select telephone lines. Suspected penetration includes lines and systems at the White House and NSC, where it is believed that about four specific phones were monitored — either directly or through remote sites that may involve numbers dialed from the complex.

“[The FBI] uncovered what appears to be a sophisticated means to listen in on conversations from remote telephone sites with capabilities of providing real-time audio feeds directly to Tel Aviv”, says a U.S. official familiar with the FBI investigation. Details of how this could have been pulled off are highly guarded. However, a high-level U.S. intelligence source tells Insight: “The access had to be done in such a way as to evade our countermeasures … That’s what’s most disconcerting.”

Despite elaborate precautions by the U.S. agencies involved, say Insight’s sources, this alleged Israeli intelligence coup came down to the weakest link in the security chain: the human element.

The technical key appears to be software designs for telephone billing records and support equipment required for interfacing with local telephone company hardware installed in some federal agencies. The FBI has deduced that it was this sophisticated computer-related equipment and software could provide real-time audio feeds. In fact, according to Insight’s sources, the FBI believes that at least one secure T-1 line routed to Tel Aviv has been used in the suspected espionage.

The potential loss of U.S. secrets is incalculable. So is the possibility that senior U.S. officials could be blackmailed for indiscreet telephone talk. Many officials do not like to bother with using secure, encrypted phones and have classified discussions on open lines. (Insight Magazine – FBI Probes Espionage at Clinton White House By J. Michael Waller and Paul M. Rodriguez) – http://www.spongobongo.com/zy9850.htm

Also of interest is the fact that the Chief Operations Officer (COO) of Amdocs in 2003 was a man named Sami Totah. Totah is a veteran of Israel’s military intelligence group Unit 8-200 and is now the Eternal Director of ECTel.

Vuance Ltd. formerly SuperCom

VUANCE Ltd. (formerly SuperCom) is an established Solution Provider, providing its customers with innovative Incident Management, Asset Management, e-ID solutions. (Vuance.com) – http://www.vuance.com/SiteFiles/1/765/3283.asp

SuperCom, Ltd. is engaged in research, development and marketing of advanced technologies and products for smart-card solutions and government e-ID projects. SuperCom offers a wide range of standard and customized smart card-based solutions for physical and logical security, education, corrections facilities and air & seaports. SuperCom is also a leader in the manufacturing of secure and durable documents such as national identity cards, passports, visas, drivers’ licenses and vehicle registration. Together with its subsidiaries, SuperCom offers advanced, innovative and flexible solutions in contact and contactless smart-card technologies. Headquartered in Israel, SuperCom has subsidiaries in the US and Hong Kong.

New York, NY, and Raanana, Israel, October 11, 2004 — SuperCom, Ltd. (Euronext: SUP) a leading smart card and e-ID technology integrator and solutions provider serving governmental and commercial markets, announced today that the United States Government Printing Office (GPO) has informed that the Company’s proposal as a prime contractor for the integration of smart card technology in the US new electronic passports has been accepted for award.

This project is considered to be the largest and most advanced smart passport project in the world to date. The US authorities have announced multiple awards for the implementation of the project that will include the production of smart inlay for the new passports with a sophisticated chip containing personal identification such as biometric data This type of passport will be difficult to forge and will replace the traditional passport that contained a printed personal photograph and was considered to be easy to falsify. The scope of the project based on the RFP is estimated at 50 million passports over the following five years.

In this project, SuperCom will supply the smart card technology that it has developed over the recent years including the smart chip with an operating system and antenna that is embedded in the passport. (SuperCom Wins Tender for the Integration of Technology in the United States Smart Passport) – http://cc.msnscache.com/cache.aspx?q=8275198176058〈=en-US&mkt=en-US&FORM=CVRE

KADIMA, Israel — ” SuperCom Ltd. has unveiled new technology for active tracking of people and assets.

The Israeli provider of smart card and electronic identification products has developed movement detection technology that can monitor and track numerous items simultaneously. The tracking technology employs small, low-powered RF tags attached to an object or a person. License-free radio bands are used to track the RF band from a programmable transmitter.

SuperCom claims its Pure RF product can monitor and locate tagged items using a hand-held tracking device, which can also be integrated into cellphones.

With an eye on the U.S. homeland security market, the company has appointed former CIA Director R. James Woolsey as chairman of its advisory board. (Tracking Technology could have Homeland Defense Apps by Joel Bainerman) – http://www.eetimes.com/news/semi/showArticle.jhtml?articleID=180204127

R. James Woolsey served as Director of Central Intelligence from 1993-1995. He is currently Vice President of Booz Allen Hamilton’s Global Strategic Security practice. Woolsey previously served on the National Commission on Terrorism. He was Under Secretary of the Navy, Ambassador to the Negotiation on Conventional Armed Forces in Europe (CFE), and was General Counsel to the U.S. Senate Committee on Armed Services. Woolsey was appointed by President Reagan as Delegate at Large to the U.S.-Soviet Strategic Arms Reduction Talks (START), and the Nuclear and Space Arms Talks (NST). He also was an Advisor with the U.S. Delegation to the Strategic Arms Limitation Talks (SALT I). Woolsey served on the President’s Commission on Defense Management, President’s Commission on Federal Ethics Law Reform, and President’s Commission on Strategic Analysis. He was a Captain in the U.S. Army and was a staff member for the National Security Council. Mr. Woolsey is a graduate of Stanford (P! hi Beta Kappa), holds an M.A. from Oxford University (where he was a Rhodes Scholar), and received a L.L.B. from Yale Law School (where he was Managing Editor of the Yale Law Journal). (Vuance.com) – http://www.vuance.com/SiteFiles/1/764/3280.asp

As persistent and as dilligently as I tried, I could find nothing on the backgrounds of either Supercom or Vuance’s founders as of this writing. All search results were heavily sanitized and filtered from any of the numerous entries I tried to locate them on. Also, please bear in mind that any of the links I’ve posted could be taken down at any time by the very parties who wish this information to remain covert.

Adnan Khashoggi, GCN, the Protocols, Alex Jones, and the 9/11 Truth Movement

ConCen Blog Feature

By Mifune
The Conspiracy Central Blog
Monday, July 9, 2007

Adnan Khashoggi is the individual who owns Genesis Communications Network, famous for hosting such heavyweight radio personalities as Alex Jones, self proclaimed “Grandfather of the 9/11 Truth Movement,” and Jeff Rense.

According to a 2004 article by Daniel Hopsicker from MadCow Morning News:

“Info on Khashoggi runs the gamut from the ridiculous to the sinister. To get the serious stuff out of the way first:

Khashoggi was among a number of prominent Arab businessmen, like Khalid Mahfouz, who agreed to continue what have been described by US intelligence officials as “protection payments” to bin Laden at a meeting in Paris in 1998, said London’s Sunday Business Post October 7, 2001.

Even Khashoggi’s guru has CIA connections, we learned: the vastly rich swami has been under official suspicion in the assassination of Indian Premier Rajiv Ghandi, and was even arrested by Indian police for currency fraud.

Adnan Khashoggi revealed: He is wanted in Thailand, where he was convicted for fraud in absentia; is currently being sued, in a major and well-publicized case in Federal Court in Minneapolis for what may turn out to be criminal fraud; reportedly, he is also currently the subject of a massive investigation being conducted by the U.S. Attorney in Los Angeles.

Add to that the recently declassified American intelligence report from 1991 listing the top 100 drug traffickers and associates. It included lawyers, right-wing paramilitary fighters, a Peruvian rebel commander, a Colombian singer, a pre-dead Pablo Escobar, a pre-jailbird Manuel Noriega… and Adnan Khashoggi.”

Further quoting the same article,

“From their base in Tampa Florida, Khashoggi and El Batrawi controlled a network of companies, all using the word “Genesis” in their name. The number of Khashoggi-owned Genesis companies we’ve found keeps growing. There is, or was, Genesis Aviation, Inc., Genesis Aviation II, Genesis Diversified Investments, Genesis Studio and Production Corp., Genesis Media Group, Genesis Properties, Genesis Intermedia; GenesisIntermedia.com.; Genesis Delaware; Genesis Florida… The list, it do go on. And on.”

And then there’s the Genesis Communications Network. There’s actually two of them, seemingly unrelated, but they’re so extremely similar in the fraud department to each other and to “Saudi Genesis” that the relationship appears strongly familial. We’re still uncertain as to how close they all are; kissing cousins, at the very least.

The first GCN is a so-called “patriot” network hosting Alex Jones and Dave Van Kliest, the, ah, the individual fronting for the latest See the Flash extravaganza, advertisements for which are spamming the Internet at a rate that must be causing concern among conservationists of our digital landscape of ‘1’s and ‘ 0’s.’

VanKliest is our pick for Disinfotainer of the Year… an especial honor, considering that there was some fierce competition. Of course, “See the Flash Dave” from the powerhour, like Alex Jones, is part of the GENESIS Communications Network.

As if that weren’t enough, evidence from an investigation into the death of Princess Diana indicates that Dodi Al Fayed was the nephew of none other than Adnan Khashoggi. The following quote is from the blog Shaphan, in a 2006 article entitled “Collision or Collusion:”

Adnan Khashoggi. Not named by Stevens. But he turns up, I think, in the evidence of Richard Tomlinson [p.827]. In 1992 I was working on an operation to recover high-tech weapons from the former Soviet Union. This operation was being conducted in collaboration with a very powerful arms dealer whose exact identity I did not know. When I read the file I discovered that this arms dealer was in very frequent contact with Mr Mohamed Al Fayed. I saw that the MI6 informant supplying this information had a code beginning with P, followed by several numbers. As this source was mentioned several times I tried to find out who it was. It was a Frenchman who was head of security at the Ritz Hotel. Stevens discounts the part about the P source in the Ritz but doesn’t address or dispute the claim about the “very powerful” arms dealer whom Al-Fayed saw ‘very frequently’. Al-Fayed’s first wife Samira, the mother of Dodi Fayed, was Adnan Khashoggi’s sister. According to the Paget Report, Dodi had bought a £130k engagement ring for Diana that afternoon and intended proposing imminently. The Daily Express newspaper [caveat lector] cites an author who alleges that Dodi spoke with his Uncle Adnan (by phone?) on the evening of his death – i.e. they were close. The possibility that princes William and Harry would be spending their adolescent summers in Adnan Khashoggi’s mansion in Monaco would have been motive enough for Edinburgh, Blair and MI6 to act to prevent it, for justifiable reasons of national security.” Shaphan, Collision or Collusion, 19 December, 2006, Revised 8 January, 2007.

To top it all off we have evidence that Khashoggi is connected to former Nazis, the Bilderberg Group, Japanese Yakuza, and President Marcos of the Philippines, famous as a dictator from 1960 to 1982. Quoting from Yeadon and Hawkings’ 2004 book, The Nazi Hydra in America – How America’s Right Wing Politicians are Plunging the Country Into a Fascist Police State,

“The Bilderberg group held its first meeting in 1954. The Bilderberg group was founded by Prince Bernhard of the Netherlands and former
officer in the SS.
Bernhard had also worked in I.G. Farben’s notorious NW7 group, which served as spies for the Third Reich. The Prince
is also associated with the Knights of Templar, through its Dutch variety. Bernhard was appointed to govern the Dutch order in 1954.
John Foster Dulles was reported to have been one of the most helpful Americans in establishing the Bilderberg group. Incidentally, in
1954 Dulles testified in favor of a bill designed to return vested enemy assets such as GAF, to their previous owners. From the beginning,
the Bilderberg group had several members of the intelligence community associated with it. Sir Colin Gubbins, Britian’s wartime SOE
head, was a founding member. Walter Bedell Smith was a co-chairman of the group in the US. (644)”

“A partial list of significant events of 1954 follows: After learning about the Japanese treasures in November 1953, Marcos starts digging
for gold in the Philippines.
Fred Meuser, Lockheed’s European Director, transfers to Geneva to live, this event figures in later. The Four-
Power Treaty is signed in Paris to terminate the occupation regime in Germany. Germany joins NATO. Geneva Accord reached regarding
peace between France and Indochina. Additionally, 1954 was the year that Edward Landsdale arrived in Vietnam to take over the opium
trade. The Israeli Mossad and US CIA formed an intelligence “partnership.” Nazi gold was moved from Argentina to the Philippines in
1954 after the Mosad determined it was located in Argentina.
(645)”

One of the earliest documents attesting to Marcos’s recovering the treasure of the Golden Lily is a gold certificate dated 1956. (646)”

Another gold certificate was issued on January 17, 1963 by Unions Bank of Switzerland. The certificate was issued to Adnan Kasogi.
Adnan Kasogi was actually Adnan Khashoggi, a Marcos crony.
Khashoggi’s name was misspelled, but that is often the case in these
certificates. Khashoggi was a Lockheed agent and partner of Yoshio Kodama. Kodama was a Japanese rear admiral during the war and
also a member of the Japanese Yakuza crime clan. Kodama was charged with shipping the loot to the Philippines during the war. This
gold certificate was issued just before Lockheed paid the first known bribe to Prince Bernhard. Lockheed was being used by the CIA to
funnel money worldwide. Moreover, Lockheed’s European Sales Director, Dutchman Fred Meuser, had been a member of Prince
Bernhard’s wartime air force squadron. An additional member of the Lockheed bribe team was CIA officer Nicholas Deak. Deak had
founded a money brokering firm that was used to funnel money to Kodama. Deak’s company later merged with Lionel C. Perera, who
founded the money firm of Perera, Manfra & Brookes. Perera was attached to the Chief of Military Government Finance Office at the
Third Army’s headquarters in Germany at war’s end, where he interviewed Colonel Rauch. Rauch was the SS colonel responsible for
hiding the Reich Bank gold reserves. (646)”

Now just recently, we have a report from the Times Online: Egyptian billionaire ‘who spied for Mossad’ found dead.

Here’s the kicker: Adnan Khashoggi was one of his associates.

An Egyptian billionaire financier who feared for his life after being accused of being a Mossad spy was found dead outside his Mayfair flat yesterday in suspicious circumstances.

Ashraf Marwan, the son-in-law of the late President Gamel Abdel Nasser, was found beneath his fourth-floor flat in Carlton House Terrace.

Police were treating his death as suspicious. Friends of Mr Marwan, a former shareholder in Chelsea Football Club, said that he had feared assassination after being named three years ago as an agent during the Yom Kippur war.

Rumours of his death circulated in London’s Arab community last night. Some believe that he may have taken his life after a serious illness was diagnosed.

Mr Marwan’s death will send shockwaves across the Middle East and among some of Britain’s wealthiest people. His associates included Adnan Khashoggi, the arms dealer, Ken Bates, the football club chairman, the Libyan leader Colonel Muammar Gaddafi and the late Tiny Rowland.

At this point I would like to broach the subject of The Protocols of the Learned Elders of Zion, or as one author, Laura Knight Jadczyk, has called them, The Protocols of the Pathocrats, in her February 2006 editorial by the same title. I agree with her statement:

“In this week’s podcast we discuss what we have identified as the very first problem that must be solved in order for positive changes to be undertaken in American and elsewhere in the world: the Media.

Knowledge is power. Those who control information can control the masses; it’s that simple.

As we researched the subject of the media, we came across The Protocols of the Learned Elders of Zion. As everyone knows, this is a vicious anti-Semitic hoax. We agree. We do not for a minute think that this represents Judaism or ordinary Jewish people.

What was shocking for us was our realization that the Protocols is being implemented almost line by line by many of the members of the Bush Administration and the various government ‘think-tanks’ that formulate their policy. In other words, the Protocols is not a hoax because it is nonsense, but rather it is only a hoax because it was attributed to Jews.

Here, we present the text of Protocol 12 from which several excerpts were read on the podcast and which we jokingly referred to as “The Gospel According to Karl Rove.”

Read it and understand that this is, indeed, the number one issue that America must deal with before they can do a single other thing.”

This is not to say that there are not Zionists involved in the plan to bring about a one world goverment. I would like to focus on one particular portion of Protocol 12, which pertains to control of the press.

“8. Literature and journalism are two of the most important educative forces, and therefore our government will become proprietor of the majority of the journals. This will neutralize the injurious influence of the privately-owned press and will put us in possession of a tremendous influence upon the public mind …. If we give permits for ten journals, we shall ourselves found thirty, and so on in the same proportion. This, however, must in no wise be suspected by the public. For which reason all journals published by us will be of the most opposite, in appearance, tendencies and opinions, thereby creating confidence in us and bringing over to us quite unsuspicious opponents, who will thus fall into our trap and be rendered harmless.

9. In the front rank will stand organs of an official character. They will always stand guard over our interests, and therefore their influence will be comparatively insignificant.

10. In the second rank will be the semi-official organs, whose part it will be to attack the tepid and indifferent.

11. In the third rank we shall set up our own, to all appearance, opposition, which, in at least one of its organs, will present what looks like the very antipodes to us. Our real opponents at heart will accept this simulated opposition as their own and will show us their cards.

12. All our newspapers will be of all possible complexions — aristocratic, republican, revolutionary, even anarchical – for so long, of course, as the constitution exists …. Like the Indian idol “Vishnu” they will have a hundred hands, and every one of them will have a finger on any one of the public opinions as required. When a pulse quickens these hands will lead opinion in the direction of our aims, for an excited patient loses all power of judgment and easily yields to suggestion. Those fools who will think they are repeating the opinion of a newspaper of their own camp will be repeating our opinion or any opinion that seems desirable for us. In the vain belief that they are following the organ of their party they will, in fact, follow the flag which we hang out for them.”

In light of all of this, certain questions need to be asked:

  • Can we honestly consider any radio personality broadcasting on GCN to be free of ulterior motives, such as Alex Jones gatekeeping[1] in terms of Mossad connections to 9/11, or steering the 9/11 Truth Movement into ineffectiveness and hyper-emotional states of mind?
  • Can anyone who holds any position of prominence within GCN’s management, be considered free of ulterior motives and/or ties to the rogue network? I’m looking at you, Ted Anderson.
  • I have one more question, which I ask you all to consider deeply: Is the real role of Genesis Communications Network to “present what looks like the very antipodes” to the power elite of the Monolithic and Ruthless Conspiracy?

Don’t answer right away. Just think about it. For those of you who are wondering, I don’t think that Daryl Bradford Smith is much better as a source of information; he covers Zionism, but falls into racism and hate speech. The issue of Zionism must be approached delicately and precisely in order to be fought properly.

__________________________________________________________

Footnotes:

  1. During a broadcast of Infowars on February 18, 2007, Alex Jones made the following statement:

    “Watson: …and the Jewish Conspiracy angle.

    Alex Jones: Now let’s be clear. Neither I, Avery or Fetzer, uh, think it’s an Israeli attack. In fact, they’ve had national polls of people who believe it’s an inside job, 7% believe Israel was involved. “

    The broadcast from which this excerpt was obtained can be downloaded from here. Start listening at 84:30 to hear the exact quote.

Dr. Layton’s Jungle Hell: Jonestown Revisited

ConCen Blog Feature

By Hei Hu Quan
The Conspiracy Central Blog
Sunday, July 1, 2007

Welcome to the Conspiracy Central Blog, for those who are new we extend a hearty welcome, as well as friends and compatriots from the powerful Conspiracy Central forum.

Con·spir·a·cy [kuhn-spir-uh-see]
–noun, plural -cies.

  1. The act of conspiring.
  2. An evil, unlawful, treacherous, or surreptitious plan formulated in secret by two or more persons; plot.
  3. A combination of persons for a secret, unlawful, or evil purpose: He joined the conspiracy to overthrow the government.
  4. Law. an agreement by two or more persons to commit a crime, fraud, or other wrongful act.
  5. Any concurrence in action; combination in bringing about a given result.

As you can plainly see from the commonly accepted dictionary entry the meaning is concise and clear. Nowhere do any of the definitions break down as Mainstream or Gatekeeper Media defines it:

  1. Wild, fantastical tales told by mentally deficient individuals.
  2. Unsubstantiated claims and accusations propagated by deranged fools.
  3. Crazy, unfounded stories compounded and blown out of proportion.
  4. Urban mythos.

Conspiracy as a term has been deliberately turned on its head and co-opted by concerted forces within the news media hemisphere, to now be the catch-phrase to readily dismiss any and all reports, fact-finding and investigations into the world of the global criminal order. Its methods, crimes, evidence, facts and well-insulated criminals, have been concealed, ridiculed, diverted by disinformation operatives, ignored and attacked. The funniest part of it all is that it is as real as the sun. Like the proverb, “The biggest trick the Devil ever pulled was convincing people he wasn’t real,” the best black propaganda ever advanced was to spin conspiracy to a running joke.

Along the way there have been a great many heroes, both men and women who dedicated their very lives to standing up for the public interest and against forces that have literally collaborated and conspired towards common goals that protected, secured and advanced the goals of their criminal generations and empires. This is documented fact for all who would take the time to pull at the frayed fabric of history and begin the process of unweaving the lies, deceit and carefully prepared and sanctioned propaganda. When you have crime you have motive, opportunity and benefit as the primary components in any investigation. I would behoove those who are sincerely interested in getting at the facts and core to keep this in mind.

In all investigational training involving the analysis and deductive reasoning of interpreting evidence, the first and most important element they teach is freeing your mind of prejudicial information. Keeping an open mind is critical in reviewing the evidence with as un-jaundiced an eye as possible. Those who do not avail themselves of this will fail at discerning wheat from chaff during an investigation and blind themselves to the facts that scream to be heard.

If you are ready to journey down this rabbit hole, then strap yourself in and prepare for the white knuckle ride. Join us as we journey to restore the true and proper definition of the term Conspiracy.

Dr. Layton’s Jungle Hell: Jonestown Revisited

By Hei Hu Quan
Conspiracy Central Blog
June 26, 2007

Unfortunately there is a recent campaign to re-affirm the ‘official story’ of the horror of Jonestown to indoctrinate a young generation who have no exposure to this intelligence field-test and subsequent clean-up operation. Recently we’ve been assailed by a media PSYOPS rewrite of that history like intel sponsored propaganda pieces called “Jonestown: The Life and Death of Peoples Temple” and the Freemason-friendly History Channel’s “Jonestown: Paradise Lost” that was released in 2006.

First off this is an immense story with a number of tributaries that I could literally write pages upon pages on. The best course of action is to give a down and dirty account on one of America’s premier and sickeningly successful black ops. I will tell you unequivocally and point blank, that Jonestown was a two-fold operation that involved establishing a working concentration camp complete with literal slave labor, as well as an isolated laboratory for the field-testing of MKULTRA mind control techniques of Monarch (psychic driving and eventual trauma compartmentalization with programming), Mass mind-control, and Delta hypno-assassin training and programming for use in the U.S. against special and covert COINTELPRO targets.

The particular project was sponsored by Laurence Laird Layton and his family of whom the patriarch worked as the Chief of Chemical Warfare at the U.S. Army’s Dugaway Proving Grounds. Layton was literally contacted because of his expertise in the chemicals that might produce a pharmaceutical solution to the perceived growing black and native people’s unrest churning within the U.S. Jonestown was an adjunct project of the well known MKULTRA called MKDELTA which was th actual field-testing of psychotropics and techniques developed from BLUEBIRD to MKULTRA, MKNAOMI and sub-projects of military intelligence; the Office of Naval Intelligence (ONI) in particular.

Jim Jones was born in Indiana and his father was reputed to be a member of the Ku Klux Klan. In his rise to become a charismatic Christian preacher he held many different jobs, one odd and notable one being a seller of laboratory and pet monkeys of all things. I would imagine also that being a purveyor of these animals, it put him in the proximity of a number of research laboratories, including ones that performed mind control and worse. In any event, Jones’ ambition to become a prophet and preacher, and his success in captivating audiences in tent revivals, huckster shows and the like began to build his name as well as following.

He met up with a right bastard charlatan black preacher by the name of Father Divine who shared with Jim Jones a common closeted homosexuality that was known only to a few of each in their inner circles. Father Divine gained his fame and fortune by using psychological techniques to enthrall masses into virtual Alpha states and then bilk them out of their hard earned money. Jones being the ever cunning opportunist eagerly learned and refined Father Divine’s amateur psyops, and it propelled him further and further along. The years were during the early 1970’s and revolutionary thought was at the forefront of American culture.

Jones’ angle on his evolving con was to use a socialist variation of this to draw in young, African-Americans and women in particular into his newly forming church that was later to be dubbed the People’s Temple. He gained popularity by attaching himself to San Francisco’s mayor George Moscone, Harvey Milk and other inside players who could assist in his power plays and manipulations of the public. He spouted a message of universal love and socialist/communist principles that would “destroy racism, sexism and castes of all kinds’ and provide protection and a shelter from the evils of society. This message particularly appealed to the poor, the disaffected and black in which he filled the membership of his churches with. He amassed a retinue of bodyguards whom he claimed would protect him from the forces within the U.S. government who wanted him dead because of his beliefs and commitment to aid the poor and black.

As a deceit to further inculcate his hold on his audience and deify himself before their eyes, Jones would fake his own death through elaborately staged assassination attempts from time to time. He would be “shot” by his disguised bodyguards in a drive-by assassination complete with theatrical blood. Only to be whisked away by other bodyguards and after a time reappear safe and sound to the cheers and adulation of his congregation. Sometimes he would even use one of his doubles to stand in for him and stage his death. At this time, he was literally demanding that they turn over their assets to the People’s Temple and used his local government contacts to assist in obtaining their pensions, Social Security payments as well as grants and access to patients of Retirement homes, halfway houses, and other agencies that served the poor and paid for their expenses.

About this time Jones became involved with the CIA and good friends with one of their strongest assets, a piece of utter shit by the name of Dan Mitrione. Mitrione literally ran a school teaching torture techniques to the CIA’s puppet dictators and soldiers in Brazil and Uruguay and assisting them in establishing death squads to kill leftists and their leaders. Mitrione would have random homeless street people and citizens abducted as “teaching aids” where they would be tortured to death in front of his slavering, sadistic students. Karma eventually caught up with this sanctioned demonic monster and Tupamaro guerrillas captured and executed him. Grieving over the loss of their friend, celebrities Frank Sinatra, Dean Martin and Jerry Lewis personally sponsored a lavish fund-raiser for Mitrione’s family. Makes you wonder at their backgrounds huh? How long did Sinatra hide the original ‘Manchurian Candidate’ film from the public again? 10 years.

Dan Mitrione had a number of close and significant CIA contacts and station chiefs like Forbes Burnham, Richard Welch, Richard Dwyer that worked with Jim Jones who was contracted by them as an agent provocateur, and who would incite and foment riots and strategic labor strikes within prime political organizations of certain South American countries that the CIA had wanted destabilized. He was even given the code-name of ‘Raven’ as a play on his jet black hair. Bird code-names during that time were extremely popular within the intelligence circles of the CIA and NSA.

Back in the U.S. the dirty little secrets of the People’s Temple abuses began to leak. Relatives of family members within his congregation began asking questions and demanding investigations into Jones and his cult. With heat and controversy mounting, Jones used his contacts within the CIA to acquire a large parcel of land in Guyana that he wanted to escape with his golden flock in tow. The CIA and NSA wanted in exchange, Jones to be point-man for Dr. Layton’s little field experiment in the isolated jungles of Guyana. The deal was set and Jones airlifted his People’s Temple followers en masse to clear the jungle and establish settlement. With MKULTRA firmly underground thanks in part to the revelations of the Church Committee, the CIA and military intelligence went from deploying their projects in Universities, brothels, prisons, the military and medical facilities to creating and/or sponsoring cults to continue mind-control experiments on the public. It provided both a distanced plausible denial aspect as well as a controlled environment in which to refine their weapons of psychological destruction.

Soon after, family members back in the U.S. began hearing reports of public tortures and rapes as traumatic punishments (Monarch and mass control through fear and trauma), as well as enslavement to work on crop plantations, paedophilia, murder and weird experiments at the Jonestown medical facility. Jones set up a perimeter of exclusively Caucasian guards who were Jones’ enforcers and Laurence Layton’s own son Larry was head of it. Layton’s daughter Deborah was also inserted amongst the hierarchy of the Jonestown organization as liaison to the political figures and officials that helped facilitate Jonestown.

Before long Jim Jones began programs of administering the massive cache of pharmaceuticals through the food and cookies in particular. Troublemakers or dissidents were selected for the advanced mind experimentation, and within his own guard unit Jones had a Delta programmed hit team to carry out special missions or await their triggers for specified assassinations. All through the active period of Jonestown, CIA/NSA doctors with expertise in Layton’s project would visit the camp to verify experiments and confirm reports. Nazi doctor Josef Mengele was rumoured to have been a visitor, but this is unconfirmed as of yet.

Suicide drills began to be run called ‘White Nights’ in which all camp members were roused in the middle of the night to prepare for an eventual mass suicide Jones was programming into his wards. Many of them already under Jones’ sleep deprivation and driven to exhaustion upon Jones’ orders provided yet another venue for the refinement of mind-control techniques in use currently for torture at global CIA rendition destinations and prisons like Guantanamo Bay and Abu Ghraib.

The letters, complaints and demands of families of those now held against their will in Jonestown, grew louder and stronger. Eventually reaching the interest and ears of U.S. Congressman Leo Ryan who vowed to personally investigate their claims. In November 1978, U.S. Congressman Leo Ryan led a fact-finding mission to the Jonestown settlement in Guyana after allegations by relatives in the U.S. of human rights abuses. Ryan’s delegation arrived in Jonestown on November 15 and spent three days interviewing residents. They left hurriedly on the morning of Saturday November 18 after an attempt was made on Ryan’s life by Don Sly.

Ryan and his party were convinced that the tales they had heard were all too real and now threatened their very lives. They took with them roughly 15 Peoples Temple members who wished to leave. As they were boarding planes at the airstrip, a flatbed truck bearing Jones’ Delta hypno-programmed death squad arrived and began to shoot at them. An NBC cameraman Bob Brown who ended up murdered by the Jonestown death squad, captured the entire attack on film (I’ve seen the footage). At the same time Larry Layton, who had pretended to be a defector drew a weapon and began to fire on members of the party. When it was over, six members of the Ryan party were murdered on the tarmac.

Meanwhile back at the Jonestown encampment CIA agent Richard Dwyer told Jim Jones that the operation had been compromised by Ryan and the media and it was being shut down. Jones then turned on the klaxon sirens and screamed ‘White Nights’ and beckoned all to amass for suicide while audio recording the entire affair. On one of the recordings Jones is clearly heard shouting “Get Dwyer out of here now!”. Then despite protests from some members, Jones’ guards and other programmed lackeys began poisoning the babies and children orally, then as resistance grew, through forcible injections. Some utter dumbass adults willingly drank the poisoned grape flavor-aid whilst a good number broke and ran into the jungle, some were shot, some were injected at the epicentre. It is reported that Jones “committed suicide” even though he had tattoos and the corpse who was found next to his ‘throne’ with the gunshot wound behind his left ear (a murdered and planted double who had posed as Jones 5 years earlier) had none. It was also reported that Black Watch Forces from the UK, combined with Guyanese elite soldiers and U.S. Special Forces teams were dispatched from maneuvers on nearby Matthews Ridge in Guyana, to track and kill any and all survivors who escaped into the jungle and drag their bodies back to the epicentre.

Here’s where it all gets murky with contrasting opinions, outright disinformation and the racist “official story”.

1) The “official cover story” of a bunch of black, cult zealots drinking poisoned grape Kool-Aid is absolute shite and undermined by Guyanese coroner C. Leslie Mootoo, who examined the corpses found needle marks on 83 victims. Secondly, common sense will remind one of the total improbability of getting 908 people to willingly consume poison is total bullshit. The population of Jonestown was said to have been 1,200. That leaves 292 people missing from the bodycount of 908, so what happened to the missing additional 292 people? The great majority of the bodies were strategically posed face down, to accommodate identity obfuscation and accelerate decomposition. If any were shot it would most likely have been while face down so the wound trauma would be on the undersides away from any photos. Since the bodies were also arranged, the ones with the most trauma would most likely be taken from the epicenter to a secured perimeter, away from cameras.

2) For the great mass of the murders I find it implausible that a large number of the victims were killed through forcible injections even at gunpoint. Resistance would be too great. Or maybe I just don’t want to think people are really that sheep-like and stupid. My contention is that either another fast acting death agent was used, or that perhaps an airborne incapacitate was administered by air followed-up by either injection or other deadly means.

3) In examining published photos of the victims, I find the usual destructive patterns of gunfire and the associated blood and viscera absent. Just piles and piles of slightly bloated, peacefully posed corpses. Perhaps a different weapon was used entirely. Or perhaps they only filmed certain piles of victims. The report of Guyanese, British and American Special Forces clean-up (kill) teams said that they used crossbows in addition to standard issue assault rifles. Still not a lot of wounds consistent with that firepower does one see in the known and published images. Crossbow bolts would be an ideal weapon that provides the silence and virtually bloodless assassination they’d be looking for.

4) 400 bodies were initially found and reported, that leaves a full 503 to have escaped the kill zone into the jungle. If you count the other 300 that’s a full 803 that ran to into the jungle when everything started. 803 of whom some totally escaped, some who might have succumbed to the jungle, and the great majority who were tracked like prey and systematically exterminated. Without access to evidence it is very difficult to discern what actually happened in the Jonestown kill-zone. The prime authors who “escaped” from Jonestown are also now the ones who assisted in the fabrication of the official story and have ties with intelligence. They have all issued books or interviews that “expose” what really happened including and especially Deborah Layton!

So ultimately from the available evidence it can be determined that it was a coordinated and sustained intelligence operation most black in nature and execution (definitely no pun intended). The CIA, military inteligence, and NSA were directly involved, as well as lawyers Charles Garry and Mark Lane. Lane and Garry are 2 deep-cover intelligence assets who delivered caches of confidential COINTELPRO dossiers on black, white and native American radical leaders in the U.S. to Jonestown. Mark Lane was also found to have engineered a plot to take an instrumental MLK assassination witness Grace Walden Stephans, into Jonestown to conveniently die with everyone else. They were both inside men placed for their access to the Black Panther Party and the Martin Luther King assassination. Un-coincidentally, they were in both in Jonestown during the exterminations, but “managed to escape” unharmed and make it back to the U.S. to write disinformation books about their ordeal and further spy on leftist organizations for their paymasters. Mark Lane has a documented background in U.S. Army Intelligence, which played a considerable role in the King assassination.

Bibliography:

Was Jonestown a CIA Medical Experiment by Micheal Meiers

Raven by Tim Reiterman & John Jacobs

The Black Hole of Guyana by John Judge compiled in Secret and Suppressed by Jim Keith