Thomas Jefferson’s Vision of Independence

By Mifune
Conspiracy Central Blog
September 8, 2007

Thomas Jefferson’s Vision of Independence

Learning and thinking about the life of Thomas Jefferson, I have come into a greater appreciation of the influence of his philosophy upon America as well as the world. While I understand that Jefferson is by no means a perfect man, I still take him as a role model.

The year was 1826. Thomas Jefferson, designing his final will, wrote the following words for his Epitaph:

“Here was buried Thomas Jefferson Author of the Declaration of American Independence Of the Statute of Virginia for religious freedom & Father of the University of Virginia.”

It is important to note that while overlooking his eight years as President of the United States, Jefferson saw as his greatest achievement the most complete expression of John Locke’s concept of natural rights as any nation or people had yet undertaken: independence, life, liberty, the pursuit of happiness, religious freedom, and the value of education, allowing people the freedom and opportunity to author their own souls. The United States of America that exists today would not have existed but for the vision and guidance of Thomas Jefferson.

Thomas Jefferson was a very learned man; a scholar by all accounts. As a student, he would spend fifteen hours a day studying. Introduced early on to the writings and concepts of the British Empiricists John Locke, Francis Bacon, and Sir Isaac Newton, he regarded them as the “three greatest men the world had ever produced.”(Peterson, p. 1236) Jefferson often attended dinner parties at the mansion of the royal governor Francis Fauquier. Here Jefferson learned about the philosophy of the leading thinkers of the day; the Enlightenment philosophy of Rousseau and Voltaire. It was this exposure to the most learned minds of his day that led Jefferson to develop his own vision regarding independence.

In 1776, Thomas Jefferson famously wrote the Declaration of Independence, stating:

“We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. …”

“That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.” (, 2007)

Jefferson’s Republican vision for America was not always a certainty. While Jefferson was a prominent voice in favor of independence as early as 1774, when he wrote A Summary View of the Rights of British America, and in 1776 when he penned the Declaration of Independence, his vision of a limited government clashed with that of the Federalists such as John Adams, Alexander Hamilton, and Aaron Burr. Serving as the Secretary of State during George Washington’s first term, Jefferson fought with the Federalists over whether the United States should have a strong central government, or a government that reserves most of its power to the states. The Federalists eventually won Washington’s favor, moving Jefferson to resign and return to his estate at Monticello.

When John Adams won the Presidential Election of 1796, he immediately moved to levy new taxes, start a navy, build up the army, and enact the Alien and Sedition Acts in 1798 in response to an undeclared naval war with France. Adams used this act in large part to stifle dissent and criticism against his own policies.

Jefferson’s presidency, by contrast, was marked by his belief in agrarianism, states’ rights, and limited government. After winning the Presidential Election of 1800, Jefferson moved to repeal the new taxes, pardoned all political criminals, disbanded most of the Navy, decreased the size of the army, and shrunk the size of the government. These policies led to some problems, however. When British and French ships began impressing American sailors, Jefferson’s only response was to order an embargo, stopping all shipping from American ports. This policy led to terrible inflation, and was highly unpopular. Jefferson never admitted any error on his part. In 1803, Jefferson made a deal with France to buy French Louisiana for $15 million, doubling the size of the fledgling nation, despite controversy over whether the deal he had made was Constitutional. He sent an expedition led by Meriwether Louis and William Clark to explore and chart the new territory.

On political violence, Jefferson wrote, “What signify a few lives lost in a century or two? The tree of liberty must from time to time be refreshed with the blood of patriots and tyrants. It is its natural manure.”2

Religiously, Jefferson was a deist, as was common among many of the leading intellectuals of the time. According to Avery Cardinal Dulles, a leading Roman Catholic theologian,

“In summary, then, Jefferson was a deist because he believed in one God, in divine providence, in the divine moral law, and in rewards and punishments after death; but did not believe in supernatural revelation. He was a Christian deist because he saw Christianity as the highest expression of natural religion and Jesus as an incomparably great moral teacher. He was not an orthodox Christian because he rejected, among other things, the doctrines that Jesus was the promised Messiah and the incarnate Son of God. Jefferson’s religion is fairly typical of the American form of deism in his day.” (Dulles, 2005)

While publicly, Jefferson’s ideas had given the Americans moral justification to throw off their former government, his private life left a more mixed legacy. The man who had written so much about independence had owned many slaves, and had never freed them upon his death. According to,

“Jefferson owned many slaves over his lifetime. Some find it baffling that Thomas Jefferson owned slaves yet was outspoken in saying that slavery was immoral and it should be abolished. Biographers point out that Jefferson was deep in debt and had encumbered his slaves by notes and mortgages; he chose not to free them until he finally was debt-free, which he never was. Jefferson seems to have suffered pangs and trials of conscience as a result.”

In addition, at one time Jefferson had expressed views that blacks by nature were inferior to whites. He later recanted this view, in 1809.

“Sir,–I have received the favor of your letter of August 17th, and with it the volume you were so kind to send me on the “Literature of Negroes”. Be assured that no person living wishes more sincerely than I do, to see a complete refutation of the doubts I have myself entertained and expressed on the grade of understanding allotted to them by nature, and to find that in this respect they are on a par with ourselves. My doubts were the result of personal observation on the limited sphere of my own State, where the opportunity for the development of their genius were not favorable and those of exercising it still less so. I expressed them therefore with great hesitation; but whatever be their degree of talent it is no measure of their rights. Because Sir Isaac Newton was superior to others in understanding, he was not therefore lord of the person or property of others. On this subject they are gaining daily in the opinions of nations, and hopeful advances are making toward their re-establishment on an equal footing with the other colors of the human family. I pray you therefore to accept my thanks for the many instances you have enabled me to observe of respectable intelligence in that race of men, which cannot fail to have effect in hastening the day of their relief; and to be assured of the sentiments of high and just esteem and consideration which I tender to yourself with all sincerity.”

While to many, Jefferson’s legacy may send mixed signals to those who value freedom and equality, upon closer examination, many of his faults were simply based on a lack of understanding, not any malicious desire to gain from the toil and suffering of others. Above all, Jefferson’s based his philosophy upon Enlightenment principles of independence and the power of the mind. Jefferson valued exploration and discovery above all else, which allows one to use to use the unalienable rights of life, liberty, and the pursuit of happiness to an end that serves one’s own intellectual and spiritual growth, while spreading education and knowledge among society at large.

Works Cited

1. Peterson, Merrill D. Thomas Jefferson: Writings. 1236.

2. “United States Declaration of Independence.” Wikipedia. 6 Sept. 2007. 6 Sept. 2007 <;.

3. “Thomas Jefferson.” Wikipedia. 6 Sept. 2007. 6 Sept. 2007 <;.

4. Jefferson, Thomas. “Letter to William Smith.” 13 Nov. 1787.

5. Dulles, Avery Cardinal. “The Deist Minimum.” First Things: a Monthly Journal of Religion and Public Life 149 (2005): 25.


Who Am I?

By Mifune
Conspiracy Central Blog
September 8, 2007

Who Am I?

One of the most important and fundamental questions a person might ask is, “Who am I?” The implications of the answer are so profound that they must affect every aspect of one’s life. In searching for the answer, one may also want to consider the difference between true free will – a choice that is driven by one’s essence – and actions that are pre-determined by any number of natural and environmental influences, such as DNA, psychological and social conditioning, traumatic events, physical stimuli, diet, and the like. By understanding the direct causes of influences upon ones thoughts and actions, one is able then to recognize the difference between pre-determined and free will choices.

Tabula rasa, or blank slate, is the idea that human beings are born without any innate mental content; that we come to our knowledge of the world through our experiences alone. It is this idea, founded in Eastern philosophy, mentioned by Aristotle, and more fully developed by John Locke, the Founding Fathers of America such as Thomas Jefferson and the American Transcendentalists such as Thoreau and Emerson, that we derive many of our modern-day ideas about liberty and natural rights. Quoting,

“As understood by Locke, tabula rasa meant that the mind of the individual was born “blank”, and it also emphasized the individual’s freedom to author his or her own soul. Each individual was free to define the content of his or her character – but his or her basic identity as a member of the human species cannot be so altered. It is from this presumption of a free, self-authored mind combined with an immutable human nature that the Lockean doctrine of “natural” rights derives.”

Historically at odds with the concept of tabula rasa is Platonic Epistemology. According to,

“Platonic Epistemology holds that knowledge is innate, so that learning is the development of ideas buried deep in the soul, often under the mid-wife-like guidance of an interrogator. Plato believed that each soul existed before birth with “The Form of the Good” and a perfect knowledge of everything. Thus, when something is ‘learned’ it is actually just ‘recalled.’”

To approach the dichotomy of innate versus empirical from a different angle, many Eastern religions such as Hinduism and Buddhism hold that when a person dies, he or she is reincarnated as another human being according to the rules of karma. If one lived poorly and had bad karma in a past life, one will be reborn into a miserable life. If one lived well and had good karma, one will be reborn into a happy life. According to,

“Rebirth in Buddhism is the doctrine that the consciousness of a person (as conventionally regarded), upon the death or dissolution of the aggregates (skandhas) which make up that person, becomes one of the contributing causes for the arising of a new group of skandhas which may again be conventionally considered a person or individual. The consciousness arising in the new person is neither identical to, nor different from, the old consciousness, but forms part of a causal continuum or stream with it. The basic cause for this persistent re-arising of personality is the abiding of consciousness in avidya (ignorance); when ignorance is uprooted, rebirth ceases.”

Hypothetically, if one were to take the doctrine of rebirth at face value, such a reality would lend credence to the idea that knowledge is innate. However, the idea of reincarnation would also tend to support the Lockean doctrine of natural rights, that each individual is free to author his or her own soul. If we do have absolute freedom, then we also have a responsibility to use that freedom wisely. Knowledge of oneself and of the world, of how to discern truth from falsehood and good from evil, is essential to the exercise of free will, rooting out ignorance, and escaping the cycle of rebirth. Therefore, the seeking of knowledge and objectivity takes on something of a moral imperative.

There are in fact many ancient traditions that refer to escaping the cycle of rebirth. Buddhism refers to it as Nirvana. Esoteric Christianity called it the Gnosis. Sufi Islam knew it as the Path of Knowledge. According to, Georges I. Gurdjieff, a Greek-Armeniam mystic, insisted,

“… that nearly all people today live in a state of “waking sleep.” This assertion is applied to the entire moral gamut of modern society. Gurdjieff said, even specifically at times, that a pious, good, and moral man was no more “spiritually developed” (as he would define it) than a common criminal. The Gurdjieff teaching involves the development of what Gurdjieff and others would term “higher bodies,” and has very little, especially at the onset, to do with altering one’s actions in what most would call everyday, or normal, life. Gurdjieff denied the spiritual value, and indeed the existence altogether, of moral right and wrong, or of “good and evil” as we understand it, saying it was not the actions of a man that were of value (as Gurdjieff would say that man cannot lay claim to the commission of these acts, and that they were entirely automatic); the only thing of value was the extent to which a man may observe and understand his actions.”

Gurdjieff called his system of teaching the Fourth Way. Quoting,

“Generally, the term [Fourth Way] refers to a body of teaching on the possible spiritual development of man, introduced to the Western culture by George Gurdjieff in the first half of the 20th century. P. D. Ouspensky, a contemporary and student of Gurdjieff, has brought many aspects of the teaching to a condensed form in the book ‘In Search of the Miraculous.’ Within the 4th Way teaching, the term 4th Way is a path of spiritual development set apart from the 3 traditional ways, these being the Way of the Fakir, emphasizing the mastery of the physical body, the Way of the Monk, emphasizing mastery of emotions, and the Way of the Yogi, which emphasizes discipline of the mind. These different ways or approaches to spiritual development generally correspond to the three types of man.”

“The 4th Way differs from these in that it seeks to simultaneously develop all three sides and to do so in the environment of ordinary life, whereas the three first ways all require from the beginning a complete abandoning of daily life and a seclusion into a monastic environment. The 4th Way is sometimes therefore called the way of the ‘sly man.’ All the 4 ways may lead to the same understandings and may bring their practitioner from the ‘outer circle’ of humanity to the ‘exoteric’ and later ‘mesoteric’ and ‘esoteric’ circles .”

The question “Who am I” is very difficult for anyone to answer. Some people may spend their whole lives in search of the answer to this question. Upon examination of ancient and esoteric traditions such as Tibetan Buddhism, Sufi Islam, Gnostic Christianity, and the teachings of G. I. Gurdjieff, one may find that real meaning in life lies in the pursuit of knowledge with the express purpose of attaining objectivity and self mastery. Because I am ultimately a soul in search of truth, and every part of “me” that is not my essence is not of me, then I must live my life searching for truth, and disregard everything else as mere distraction.

Works Cited

1. “Tabula Rasa.” Wikipedia. 1 Sept. 2007. 4 Sept. 2007 <;.

2. “Platonic Epistemology.” Wikipedia. 7 Aug. 2007. 4 Sept. 2007 <;.

3. “Rebirth (Buddhism).” Wikipedia. 25 Aug. 2007. 4 Sept. 2007 <;.

4. “Georges Ivanovich Gurdgieff” Cassiopedia. 23 Jan. 2007. 4 Sept. 2007 <;.

5. “The Fourth Way” Cassiopedia. 1 Oct. 2006. 4 Sept. 2007 <;.





We Are Professional Conspiracy Theorists

ConCen Blog Feature

By Mifune
Conspiracy Central Blog
Saturday, August 25, 2007

We, members of the community known as Conspiracy Central, are professional conspiracy theorists. We are not crazy conspiracy theorists.

What is the difference between the two, you might ask?

A professional conspiracy theorist utilizes the power of one’s intellect, of deductive reasoning, logic, and critical thinking, in order to understand what is going on in the world. A crazy conspiracy theorist is generally paranoid without reason, and will parrot the latest information (or disinformation) coming from the alternative media.

A professional conspiracy theorist is fearless, open-minded, and willing to challenge all of his or her assumptions about life, society, and reality. He or she will seek the truth for the sake of the truth. A crazy conspiracy theorist generally believes there’s something wrong with the world, but usually ends up mired in one’s own false assumptions about same.

A professional conspiracy theorist will act on what he or she knows, for the benefit of oneself and others. A crazy conspiracy theorist indulges in the cult of conspiracy for the sake of a perverse sort of entertainment, much like that derived from observing a train wreck.

A professional conspiracy theorist is an Average Joe who leads a normal life. In between the daily struggle to maintain a decent standard of living, working a 40-hour work week, watching too much of one’s paycheck go to the government, and maintaining one’s balance and sanity in spite of the daily stresses of modern society, a professional conspiracy theorist will spend whatever free time is left observing the latest developments of the Monolithic and Ruthless Conspiracy.

“We are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence; on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly-knit highly efficient machine that combines military, diplomatic, intelligence, economic, scientific, and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.”
– President John F. Kennedy

A professional conspiracy theorist can come from any walk of life, transcending age, race, nationality, sex, and religion. Everyone has a different reason for becoming a conspiracy theorist. Hardly any conspiracy theorist agrees in concrete terms of what the “Monolithic and Ruthless Conspiracy” is composed. Zionists? International Bankers? The Vatican? Germanic Death Cults? Aliens? Reptilians? Something we cannot even fathom? Yet, every professional conspiracy theorist generally agrees that there is a “Monolithic and Ruthless Conspiracy.”

A professional conspiracy theorist does not only look to external causes for the maladies of the world, but looks also within oneself. That evil which exists and flourishes in the world does so because good men and women do nothing to resist it. It is the nature of evil to conspire. So it should be the goal of good people to understand how evil conspires, and to resist it, both externally, within the world, and internally, within oneself.

We are professional conspiracy theorists at Conspiracy Central. We are not ashamed of that fact, as governments and news media want us to be. We are proud of it.

By choosing to become a member of Conspiracy Central, you are not simply joining a forum or a BitTorrent tracker. You are choosing to become a professional conspiracy theorist. Yet, you cannot become a professional conspiracy theorist overnight. The choice of taking the red pill, following the white rabbit down the rabbit hole, and waking up to the horrible reality of the world around you will start you along a path that is not easy, nor is it short.

You may suffer from bouts of depression and despair. Know that you are not alone. We may kill all of your sacred cows, leaving you without any sort of foundational philosophy. You may experience spiritual bankruptcy. This is necessary. At this moment, you must decide why it is you exist; what you live for; what you are here to do. At this moment, you must decide to act upon your free will alone. If you persist still further down the rabbit hole, you may find that you have gained something far more valuable than the comforting illusions of this reality.

You may in fact find the truth.

ConCen BitTorrent Tracker:

ConCen Forum:

ConCen IRC Chat: irc://

ConCen Radio:

Foxes and Chickens, and Sheep and Psychosis

ConCen Blog Feature

By mothandrust
The Conspiracy Central Blog
Monday, August 20, 2007

There is a quaint old English custom, well until at least until a couple of years back, that entailed ‘upper crust’ twits in red blazers, charging around the countryside on horseback, tooting little brass horns and trying to keep up with a pack of dogs. And if they were really lucky they got to witness a wild (untamed) animal being ripped to pieces by said dogs. Whilst in our current ‘enlightened’ times it is easy to stand aghast or shake one’s head at the idea of seeing such fun as a sport, this process killed a few thousand foxes a year. Tragic of course for the fox (or whatever they got hold of), but, nevertheless, still inherently, survival of the fittest, genetic lines extinguished or evolved (and why no doubt the craftier fox has taken to living off humanity’s waste in suburbia), and, although savage, a swift and natural (albeit engineered) death.

Governments rise and fall, the debate goes on and on, (costing the taxpayers tens of millions), eventually after screams of protest, countless column inches, such practice was banned. Hurrah!

Yet, whilst all this flag waving for animal rights and freedom for foxes occupies the public’s ‘imagination’, HUNDREDS OF MILLIONS OF CHICKENS ARE BEING TORTURED EVERY WEEK, for the sake of a cheap roast on Sunday or a KFC family bucket. Chickens, pumped full of growth hormone, unable to stand (as their bones fail to develop in line with their flesh), never to see the light of day, to be shoved on a mechanical conveyor, destined to have heads ripped off before ever seeing natural sunlight or feeling breeze ruffling their mangy feathers.

Anyone see a problem here? I do, and it’s about perspective – or, the lack of it. Is it not astounding that people are so easily distracted from the real world by irrelevance and inducement? Perhaps not, but to me it seems, the incapacity of humanity to rationalise lies at the heart of global difficulty. It gives authority carte-blanche to shepherd willing grazers in whatever way they choose using just a few techniques and tricks revolving around our basic drivers, hunger and fear, which of course includes identification, i.e. as a social animal, security through belonging. It is a practice repeated over and over again (religion and nationalism being the two prime examples). Sheep flock to the bidding of threat or inducement, never pondering for one moment the statistical relevance in relation either to their personal security or global perspectives.

We are subjected to a daily bombardment of examples, as the half dozen or so Americans killed during a bridge collapse demonstrates, for while this was being paraded across BBC news headlines, tens of millions were being displaced and thousands drowned in Bangladesh and India. What makes this all the more preposterous is that there are thousands of times more Bangladeshi and Indian residents in the UK than Americans!

Perhaps the greatest example of this inability to rationalise, to perspectivise, for the fear drummed into us, is 11th September 2001. The day, in case anyone has forgotten, when three buildings in New York were demolished and approaching three thousand people lost their lives. It is perhaps worth noting here that many times more people die every day through lack of clean drinking water, or food, or shelter, but who know of it? Who would care? Not sheep, happy to graze on diets of game show get-a-life and mega size family buckets. Gobbling up fear and hunger as it is fed through the airwaves and microwaves. No matter that one is ten times, one hundred times more likely to win the lottery than die through ‘Terrorism’ (hardly terrifying one would suggest) or ten thousand times more likely to die in a road accident. It would be laughable if it were not so tragic.

Terrorism itself is a word for sheep, bleated night and day, yet, in itself, absolutely meaningless. For it is not these so called ‘terrorists’ who create terror, but the media in their reporting and the politicians with their posturing. This, to me, is the greatest irony of all – terror – from were does it come? really? It is not of course from a bunch of towel-heads or sand niggers hiding in mountain caves, in reality it is distributed through cluster bombs and land-mines and depleted uranium and ‘shock and awe’ and polluted rivers, destroyed sewage/water/power networks and vulnerability and poverty and, and, and when you stand back to find a perspective, rationalise the situation, it becomes blazingly obvious, real terror (rather than imagined) comes from the liars and hypocrites squealing “TERRORIST!” in the first place!

Nothing is ever offered in context, so the Palestinians are labelled terrorists despite their daily suffering and humiliation and occupied territories, whilst the sheep hear no more than ‘occupied territories’ and believe Palestinians occupy them, rather than understanding Israel stole them! Indeed, contextualisation is impossible for the tension, hypocrisy, paradox and dichotomy it offers. Again, examples are endemic – take for example the need for capitalism to expand, to have people consume more and more, to make stocks rise and rise, and consider it in relation to destruction of planet-wide resources and consequential/subsequential pollution. The two pull in opposite directions and must therefore never be contextualised.

The question, “Why?” (beyond the label of evil) must never be heard – much less discussed, or discovered. Rationality, perspective, consequence and connection must be entirely expunged from the picture. Ignorance is strength, most particularly for mobilisation. Dumb it down and offer it in boxes but never stack the boxes or put them side by side. Isolate – offer potted, dishonest, useless solutions with gravitas and grandeur, then listen as the sheep bleat in unison, “two legs good, four legs bad” “freedom good, terrorism bad”.

Never must dots be joined. Ignorance is bliss, and that is just how society must be managed – bread and circuses. Anyone considering global suffering, inequality and tension and finding connections to government and/or corporate motivation (that is, markets, resources and power) must themselves be isolated, as if the very process of thinking, or challenging Capitalism, becomes evil in itself.

It is best of course if people know nothing, kept in ignorance from cradle to grave. So what education starts, (with its silly little awards of ‘A’ levels and degrees, proving sheep know absolutely nothing useful, coherent or contextualised), media finishes, with its mindless pap, to hypnotise and lobotomise. The population sits drooling over fabrication and fantasy, ignorant to anything meaningful and terrified by everything unknown, which, beyond their soaps and (ever expanding) stomachs, becomes the whole world.

Those who question, who fight above the pap, who see history and connection, who see motivation and fabrication, who attempt to make sense of the fragmented disorder, who challenge received wisdom, are heaped with scorn and derision and tarred with labels like terrorist, traitor, turncoat or ‘self hating Jew’.

To make a connection between cause and effect, action and reaction, must be condemned, ridiculed, obscured; and sheep, who have dusted at least some of the sleep from their eyes – to discover history beyond text books and reason beyond evil – must be isolated, stifled and accused of psychosis.

But remember dear readers, “it is inherently more psychotic to remember than it is to forget.” (‘Waking Life’)

IPB Image




Transforming Trajectory

ConCen Blog Feature

By mothandrust
The Conspiracy Central Blog
Monday, July 30, 2007


Transforming Trajectory



So the NWO has been thrown from power – now what?

I know at ConCen there are many people who talk of the New World Order (NWO) – of secret groups behind the scenes manipulating the geopolitical and geoeconomic agendas – Illuminati, Mason, Zionist, Gnostic… conspiracies abound. I am not denying the existence of these groups, or their motivation, nor indeed the amount of control they have (or think they have), far from it.

However, my position is that, far from being the NWO, they are in essence identical to the order that has governed civilisation since there was civilisation. The labels may have changed and the societies/institutions/families morphed, strengthened along the way but their motives, objectives and methods remain absolutely consistent back through the ages: Bush, Blair, Murdoch, Rothschild are no different to Hitler, Churchill, Beaverbrook, Rothschild or the royal families, princes, popes, caesars… as an ever repeating pattern. It is, in effect, a continuous line that stretches back to the Pharisees and money-changers in the Temple, and beyond. All, without exception, manipulating power (including the value of money) to service their aims and enhance their position. Civilisation, pretty much since its inception (and ignoring pre historical suppositions), has been controlled and manipulated by people who abuse power. Fact. NWO, same as the OWO, to my way of thinking.

Further, you cannot vote in a change of direction. Anyone voted in has been constructed by and has an interest in validating, strengthening and expanding that same system – nor can you have a partial collapse, with fragmented groups, as they will attempt to rebuild their power bases, expanding as quickly as possible to capitalise on the vacuum that has been created – and, in the process, rebuilding the machinery of war – in effect, we would be no better off than before.

The point I am making, the question I am asking, is, that following our current mindset, even if some great upheaval were to happen and all current economic and political power holders were thrown from office, with what will we replace them to stop history repeating itself?

As things stand, following current trajectory, whatever replacement system, no matter who/what is put in charge, power will concentrate and in the process, lead to its abuse – totalitarianism or democracy, it makes no difference. Is history not my witness?

Or course there is another journey through history, that of powerful religions and nations and groups of people uniting under a symbol and obliterating weaker, less advanced (in the nature of warfare) cultures. Accepted, we cannot bring them back, humanity has moved on, however, just because their thinking did not suit the interests of powerful men, with guns and with obedient sheep to do their bidding, does not mean we have nothing to learn from them.


Quite frankly, i am at a loss to know how one overthrows our current power base – they have all avenues stitched up. That is not where I’m coming from. What interests me, is how humanity, once removed from the chains of conceptual authority, might engineer a happier, more equitable world, immune to the machinations of our psychopathic tendencies.


If we are considering a way to transform the trajectory of humanity we must look for a new beginning, swept clean of all control structures or power bases – brands, states, religions, money… – conceptual authority must be swept into the dustbin of history. In fact, beyond family, in the widest possible sense/conception, nothing can remain.

So let us imagine this is so. A terrible cataclysm has struck the Earth – global communications along with finance have collapsed – money has become meaningless and as a consequence all transportation is stopped. As money disappears so does government, leaving people to fight over the three days food in the supermarkets. Mayhem. Devastation. Kill or be killed. Mad Max on push-bikes, because fuel will disappear at least as quickly as food. Plague spreads through the remaining population with the collapse of health and environmental control systems, with the dead littering the streets and rivers and our immune systems shot to pieces through decades of antibiotics and sterile environments. Let us not dwell on this matter, it is entirely hypothetical, let us just say, a catastrophe of biblical proportions. And assuming meltdown of nuclear reactors or some genetic modification from beyond the realms of science fiction has not engulfed us in some way, the shattered remnants of humanity would emerge from their hiding places, to start again, from scratch.

Remember, with the decimation of humanity, space is no longer at a premium. True, with poisoned soils, polluted rivers and little protection from nature, in its rawest form, life will be far from easy (mortality rates will be high) but beyond that, if humanity can find a path, lies a whole new world. A blank slate, with more than enough for everyone.

So, as these humans, chastened by apocalyptic events, start again to develop communities, devoid of religion, state, money… what ideologies, philosophies should govern their future journey?


Let us first note the foundations of the system that preceded the cataclysm, foundations beyond nature and family, with no ethical validity – therefore, no more than opinion.

  1. Land ownership. Rousseau argued that ‘land ownership’ was the origin of inequality, imposed by an impostor, who stuck four stakes in the ground and found someone foolish enough to believe he ‘owned’ it. In fact, ‘land ownership’ is an aberration, a logical impossibility. For, pleasing though it is to deceive oneself otherwise, one cannot own one’s host. One is indebted to one’s host – enslaved, without knowing, just as a bacterial culture in our gut. Native cultures acknowledged this, it is the arrival of the ‘enlightened’, arrogant Europeans that sort to prove otherwise and in the process carve the world into country and property shaped pieces. Making it ‘theirs’, to own and to do with as they wished.

  2. Intellectual property. Patent and copyright, designed to protect and hide knowledge and creativity, rather than share. To concentrate power in the hands of the ‘owners’, give them control over future direction – to enable capitalisation.

  3. The state. An arbitrary border, signifying conceptual ownership, and enslavement through identification. And, as with ‘land ownership’, offering no ethical justification, and illegitimate in the eye of religion (at least until 1648 when the Roman Church made their deal with the European princes).

  4. Money. Although money floats, light as a feather, above our economic system it was not always so. Our understanding of money and how it works finds its roots in gold and jewels, finite, precious materials that only few have access to – necessarily concentrating wealth as those who own it dictate value (as with land). And, in fact, although the value of money appears relatively stable, if we measure it against land as a constant (or gold) we see in actuality it’s relative value spiralling downwards (to a point where, in the UK at least, your average dwelling is worth many times its own weight in silver!).

  5. Capital interest. This again is a mechanism which reduces the value of money in relative terms – as money in the system increases, its buying power diminishes – and it is a one way process. Capital interest, through the eye of religion is an absolute sin – in Islam, worse than adultery and punishable by death.

All of these ideological structures, although entirely arbitrary, concentrate power, provide a method of division and subjugation, and facilitate and provide the process by which authority can extend, enhance its conceptual power.


So let us imagine humanity (what’s left of it) emerging from the forests and caves that have given protection through the cataclysm – and beginning to develop communities and cultivate the land. Which of the above concepts offers any benefit to these shattered remnants?

  1. Land ownership. Although, upon first glance, this might seem desirable, let us first reiterate the conceptual problems with this. First, much as one might wish otherwise, one cannot own one’s host, one is fundamentally and irrevocably enslaved to it, for sustenance and security, it is therefore a logical impossibility, a conceptual error. Secondly, land is now plentiful – if it is not, we have not come far enough – perhaps there are a few bullets left, perhaps disease/plague/pestilence must sweep the planet once more. And thirdly, land ownership creates haves and have-nots, an imbalance, initiating the path to slavery and dominance. This is not of course to say, that one who tends and cultivates land should not be entitled to its produce, far from it.

  2. Intellectual property. Imagine emerging from such suffering and torment, gradually rebuilding families and communities, working the land, shaping its products, honing instruments and techniques developing cross strains… and imagine families, communities across the world doing the same. Similar discoveries will be made far and wide, all through independent thought and modifying existing design, gleaned from neighbours, travellers, communication, fertilisation… all offering path and potential to filter out and filter in to and from an emerging humanity. Music and art and cultural evolution follow the same pattern. Ideas spread and generate new ideas. Who in their right mind, in such a situation, would wish to see rules and regulations and ownership of individual ideas and mechanisms, necessarily stifling knowledge, generating secrets and fear, and cheating and protection? Who would wish to give away the freedom to discover?

  3. The state. Imagine you have built a functioning community, worked out methods of exchange with other emerging communities and you are gaining mastery of tools and techniques. A sense of empowerment will gradually build, life will no longer seem brutal, fragile and fleeting, and begin to become a pleasure. What more does one need? Who in their right frame of mind in such a situation would ever wish to surrender this empowerment to some would-be tyrant who falsely believes he can have others serve him? Him and his cronies and his leeches.

  4. Money. An exchange mechanism, something that represents work or commodity – the value of. Through history there have been many examples, before we settled on tying money to gold – rare stones or shells and even crops. Authority, before all land was devoured most particularly hated the idea of crops as money. As it meant, by the sweat of their brow, individuals could grow their own money – thus distributing power, rather than concentrating it. Authority prefers something more theoretical, conceptual yet at the same time manageable, tangible and concentrated. For them gold is the best of all methods – almost the rarest known metal, almost entirely useless – and it means, no matter how far the world economy expanded, with gold as the exchange mechanism, they effectively own it all! In truth though, any community can create its own money, it just needs anchoring to that community’s primary produce and all will understand its true value – just as they would when exchanging their money with other communities. If requirement of some global benchmark, then that should fall to the most adaptable and useful crop known to humanity. This is of course, hemp – the method many European settlers used in the American colonies, until the British crown and the mercantile elite got wind of it. Tying money to crops also destroys the notion of inflation, although that is not to say value would not fluctuate depending upon utility and abundance.

  5. Capital interest. With money grounded in crops, renewables, its value is real and fixed, and because in time crops deteriorate, hoarding is detrimental, counter-productive, which leads to natural flow of supplies and surpluses. No hoarding. No hoarding means no capturing and controlling the market, it means no price manipulation – value is as it is, only, through time, deteriorating as this or that wears out or rots. It is the antithesis of interest.

So here we have a basic functioning system – no need for taxes or accountants, politicians or wars (land is still plentiful). Emerging communities appreciate communication: sharing ideas, expertise and produce brings benefits and understanding to all those involved. So far so good, but it will be just a few generations before humanity again begins to eat up all available space and consequential tensions arise. That, without some overarching authority, will necessarily lead to dispute, and then on to war.

What is to be done?

Now, with an ideological framework that offers the logical and ethical validity that our current model lacks, that disperses power, thus empowering the individual and encourageing communication: how, before humanity again falls prey to fear and hunger, violence and despotism, can we develop a control system that will not in itself fall prey to the psychopathic elements that would abuse the world for their trivial pleasure?

Spies in the Ointment: The Israeli Espionage of Global Communications

ConCen Blog Feature

By Hei Hu Quan
The Conspiracy Central Blog
Thursday, July 26, 2007

Total Information Awareness, But For Whom?

This story began quite innocuously as a minor retelling of a story I discovered involving an Israeli company called Narus that collects real-time internet information on U.S. citizens for the the U.S. National Security Agency. In the course of my research, the story grew to shocking proportions revealing that the gamut of virtually all electronics communications, has not only been compromised by a foreign entity within the U.S., but the entire world. It is an intentional and directed infiltration at effectively every source and core of the scope of electronics communications worldwide. Rendering all secure systems compromised and intercepted by Israeli security services and for the benefit of using gained intelligence information to their strategic advantages. The implications, much less the ramifications are staggering, and these bold new revelations have revealed not only a treasonous complicity of the governing host nations, but criminally collusive actions towards a central malevolent end.

Every piece of electronics equipment be it telephone, cellphone, (VoIP) Voice over IP, pagers, Blackberrys, instant messaging services, emails, has a point of interception established by the Israeli intelligence services. More ominous are the specific inroads these particular groups are making in inserting themselves within strategic centers of security infrastructures within various countries. Such as providing direct security for New York’s Statue of Liberty, producing communications satellites, creation and management of firewalls for sensitive military & intelligence agencies, and the contract and production of RFID chips with user sensitive data and broadcast abilities for U.S. Passports. Think of that for a moment, especially the encoding for the RFID chips, in which personal data of citizens of the U.S. is in the hands of a foreign national organization. With declared loyalties and military allegiances to their home country, along with either! simple residencies or dual citizenships that were granted by the U.S. government or host country itself.

In this investigation you will get nowhere if you do not separate Zionism from Judaism in which the former uses as a front, to achieve it’s long-standing goals by any and all means. This includes using and manipulating Jewish people in whatever ways they see fit, for to them the ends justify the means. Bottom line is that we are talking about governments and their puppet-master cabals and orders propagating PSYOPS to manipulate through nationalism, greed and fear. This being said, the government of Israel supports Zionism and the expansion of its goals. But do their people? The corporate governments of the US and UK have open imperialist intentions, reflected in policy and brutality, but do their people condone and support this?

What I am getting at is that people want all the same things in life unless lured and indoctrinated by whatever different flavours the IllumiNazi machine have propagated. These needful things are simple, we all want peace, stability, security and! prosperity for our generations, in a clean, nurturing environment of mutual respect. Those who cannot get aboard this very pure and simple concept, can be said, harbour and support agendas of evil contrary to humanity.

Digression aside, does the Israeli government even give one single fuck about its own people? Or does it use the compulsory military service as an indoctrination system to instil racialist, nationalist and Zionist values; cultivating select young citizens and deploying them globally as spies for empire? The reason I’m positing this is to differentiate between a government that serves the people versus a people whom serve the government against their own personal interests and beliefs.

“Every piece of electronics equipment be it telephone, cellphone, (VoIP) Voice over IP, pagers, Blackberrys, instant messaging services, emails, has a point of interception established by the Israeli intelligence services.”

We’re going to peer behind the veil and see, that within Israel’s military intelligence operations center, there exists compartmentalized intelligence/spy units to specifically cultivate and train the best and brightest of their army recruits into operatives for electronic espionage and warfare. All have at their heart, and by their own explicit accounts, the development of young military intel operatives that explicitly act as soldier-techs for advanced technological warfare operations. Worse yet is that by utilizing a cover of technological start-up companies, they can not only strategically infiltrate specific targets, and gain access to secure electronics infrastructures, but also use the financial resources garnered to fund their entire operations. It is a truly Trojan horse type operation that must at it’s core have collaborative elements within the government that assist and even facilitate these infiltrations.

With that being said, let’s examine the principles and entities, their motives and some of their documented areas of interest. The following below are excerpts from sources revealing the background of Israeli military intelligence groups. I shall let the facts speak for themselves. I would also like to add that when writing this, I had my machine hacked into at least 3 times that I am able to confirm absolutely. The first two I tracked and was able to resolve successfully after some particularly invasive system analysis.The last of which specifically attacked this file as I was working on it and deleted a few paragraphs of freshly written material, so all they have done is corroborate that I am on the right track regarding this information and how they view the truth as a threat.

From December 11-14 of 2001, Fox News aired a 4-part special report on Israeli Spying in America. Because of it’s explosive content and Israel’s connections including Rupert Murdoch, the story was not only censored, but all transcripts and video of this story on Fox’s website have since been removed and suppressed. A partial transcript and videos for the 4 part series have been preserved here: at’s website. Here’s some damning information from the series that substantiate points and allegations raised in this story.

“Since Sept. 11, more than 60 Israelis have been arrested or detained, either under the new patriot anti-terrorism law, or for immigration violations. A handful of active Israeli military were among those detained, according to investigators, who say some of the detainees also failed polygraph questions when asked about alleged surveillance activities against and in the United States.

Numerous classified documents obtained by Fox News indicate that even prior to Sept. 11, as many as 140 other Israelis had been detained or arrested in a secretive and sprawling investigation into suspected espionage by Israelis in the United States.

The first part of the investigation focuses on Israelis who say they are art students from the University of Jerusalem and Bazala Academy. They repeatedly made contact with U.S. government personnel, the report says, by saying they wanted to sell cheap art or handiwork. Documents say they, ‘targeted and penetrated military bases.’ The DEA, FBI and dozens of government facilities, and even secret offices and unlisted private homes of law enforcement and intelligence personnel. The majority of those questioned, ‘stated they served in military intelligence, electronic surveillance intercept and or explosive ordinance units.’

Another part of the investigation has resulted in the detention and arrests of dozens of Israelis at American mall kiosks, where they’ve been selling toys called Puzzle Car and Zoom Copter. Investigators suspect a front.

Why would Israelis spy in and on the U.S.? A General Accounting Office investigation referred to Israel as country ‘A’ and said, ‘According to a U.S. intelligence agency, the government of country ‘A’ conducts the most aggressive espionage operations against the U.S. of any U.S. ally.’

A defense intelligence report said Israel has a voracious appetite for information and said, ‘the Israelis are motivated by strong survival instincts which dictate every possible facet of their political and economical policies. It aggressively collects military and industrial technology and the U.S. is a high priority target.” The document concludes: ‘Israel possesses the resources and technical capability to achieve its collection objectives.'” (Transcript of Fox News Special Report with Brit Hume, from December 11, 2001) –

The Israel Defense Forces (IDF)

“Since the creation of Israel in 1948, the military has compensated for its lack of resources and manpower with brainpower. Particularly in the past 20 years, the IDF has invested billions of dollars in developing technological warfare. The result is a number of secret, semisecret, and open-secret divisions devoted to coming up with cutting-edge technologies designed to help Israel know what its enemies are doing — and to kill them when the need arises. The units have code names suitable for a spy novel: 8-200, 8153, Mamram, Talpiot, Mamdas. In the incubator of the IDF, those units, as Israelis winkingly call them, have improved technologies used in everything from digital switching to wireless telephony. Military intelligence elite units, which function as basic training for startup entrepreneurs, are small working groups of highly motivated teams; they work brutal hours and get little sleep; and they face immense pressure to innovate for the sake of national survival. They more than any other single factor are responsible for Israel’s technological skills.

American high-tech giants like Cisco, Intel, and Motorola — drawn in no small part by the wealth of technical talent coming out of intelligence units — have set up research facilities in Israel.

Some of Israel’s largest and most successful tech companies call the United States home: Comverse, a voice messaging company with a market cap of $14.9 billion, is based in Woodbury, N.Y.; Mercury Interactive is based in Sunnyvale, Calif. More common these days is what’s known as the fast exit, whereby startups either sell out to a foreign multinational entirely or split themselves in two, keeping R&D in Israel but moving sales and marketing to the United States.” (Startup Nation by Stacy Perman) –,17925,512689,00.html

“In a more creative sphere, the army and Israeli defense contractors developed the world’s first pilotless plane, launched satellites into space, and created a host of other technologies likely never to be revealed.” (Israeli Army Grads Lead Business Revolution by David Rosenberg) –

Take a close look at this unusually suspicious excerpt from an article entitled: Research Bulletin 72 – The Impact of Globalization on the Boom and Crisis of Israel’s High-Tech Industry by B.A. Kipnis. Written in January of 2002, the statements by this D. Globerman are chilling, in the way they convey an almost insider foreknowledge that takes advantage of the post 9/11 chaos and fear. Anticipating an opening and potential investment in anti-terror technologies that can be exploited by Israel to advance their economy and recovery for their High-tech industry. “This might include the upgrading of their technological systems in order to avoid any future terror threat, and the upgrading of the technological capabilities of security agencies, airports, and air companies as well as the military machine needed for the [electronic] war against global terror. These activities, fueled by the spending of many billions of dollars, will help the economy out of its crisis; they will ! be the main driving force behind the likely recovery of the high-tech industry.”

*Read the excerpt below and see if this doesn’t seem like a bit of an insider smoking gun to you as well.

“At the time of writing the war on global terror is under way and the economic media are busy speculating about the impact of that war, particularly about the effect of the horrible terror event of September 11, 2001 in the US on the world high-tech industry, the Israeli high-tech industry included. D. Globerman, conveyed the emerging stimulators for recovery in the high-tech industry, and the behavior by industry necessary to revive. He cited a ‘virtual’ pessimist as saying that the current high-tech crisis would not be over before 2003. The cited ‘virtual’ optimists, on the other hand, would assume that thanks to the vicious September 11 terror attack on the US, the crisis would be over soon because private and public agencies in the US and elsewhere would invest in anti-terror technologies. This might include the upgrading of their technological systems in order to avoid any future terror threat, and the upgrading of the technological capabilities of security agencies,! airports, and air companies as well as the military machine needed for the [electronic] war against global terror. These activities, fueled by the spending of many billions of dollars, will help the economy out of its crisis; they will be the main driving force behind the likely recovery of the high-tech industry. In addition, since the terror has minimized the risk differences between Israel and the rest of the of the developed world, and since there is no place that is 100% safe, investors, holding hot money will eventually look for promising places to invest, including in Israel.

In late September 2001 the Minister of Finance exempted foreign high-tech firms from local company income tax. This ruling is an addition to other grants offered to firms investing in Israel.” (Research Bulletin 72 – The Impact of Globalization on the Boom and Crisis of Israel’s High-Tech Industry by B.A. Kipnis) –


Talpiot is the special army training program that puts the best high school graduates through a rigorous curriculum of computer science, physics, and math, then places them in key assignments in, say, intelligence units. The selection process for Israel’s army-trained technology elite starts when teenagers apply to programs, usually in their last two years of high school. Only volunteers are eligible to be chosen for the army’s training programs. The most selective program, Talpiot, accepts only 30 applicants, or 1 in 10, a year. Officers say the army doesn’t look for fuzzy traits like creativity and leadership; it focuses on measurable qualities. Extremely high aptitude in math and science, along with success in rigorous exams, are the key qualifications.

“The IDF has created special systems to identify the country’s best and brightest, and to steer them into the most demanding areas of technological warfare and intelligence work. The elite of the elite pass through a program known as Talpiot, set up in the aftermath of the bloody Yom Kippur War in October 1973. Israel eventually prevailed, but in 18 days of fighting, Egypt and Syria inflicted heavy casualties on the much-vaunted Israeli forces. The idea behind Talpiot, says Major Yariv Danziger, ‘was for a unit to gather geniuses in the army to invent new technologies and weapons.’ The program was officially started in 1979 with an initial class of 25 “geniuses.” Danziger, 34, has headed the program for the past two years.

Think of Talpiot as something like the old East German Olympic athletics program minus the doping. By the time young men and women are inducted into the army at age 18, the IDF has in hand all of their individual psychological and academic records. The IDF is notified of students with top grades, particularly in physics and math. Each September, 3,000 Talpiot candidates submit to a brain-busting battery of intellectual and scientific tests. They undergo heavy psychological profiling, and tests on leadership skills and their ability to work with others. By March, only 35 are left. ‘The tests are so difficult, most people complete only 20 percent to 40 percent of each exam,’ says Assaf Monsa, a 29-year-old Talpiot graduate. ‘Some of the questions are not solvable. They are not meant to be solved. It’s to differentiate between the very good and the extraordinarily good.’ Danziger says he’s not sure even a known brain like Bill Gates could cut it. ‘I think he could pass the ! intellectual part, but I don’t know his human capabilities,’ the major says. ‘Is he pleasant to work with? Can he make other people do what he wants without financial authority?’ (There’s also the question of whether Gates would want to spend at least nine years in the military, as Talpiot graduates must. That’s six years more than the minimum requirement for many other Israeli soldiers.) Talpiot soldiers spend the first three years and four months of their service housed in special barracks at Hebrew University in Jerusalem, where they undertake intensive study in cutting-edge science. They also go through eight months of basic training. After graduation, they spend five years in the unit of their choice; almost all pick one of the elite technical units. ‘These are the soldiers that all of the units want,’ says Danziger.

Since Talpiot’s inception, only a few hundred people have made it through the program. Their military handiwork is classified, although it is known to have touched everything from algorithm compression to antimissile systems. But Talpiot’s role in the current tech boom is no secret. Assaf Monsa and another Talpiot graduate, Yair Mann, along with two other alumni of elite tech units, three years ago founded RichFX, which has developed streaming video technology that Monsa says uses between one-twentieth and one-hundredth of the bandwidth gobbled up by competing systems. (It’s used by Neiman Marcus to sell $500-plus shoes over the Internet.) Marius Nacht, another Talpiot grad, is a co-founder of Check Point. Eli Mintz, CEO and president of Compugen, a gene sequencing technology firm, and Yuval Shalom, co-founder and CTO of Wiseband, a maker of wireless phone technologies, also went through Talpiot. ‘The phrase ‘It can’t be done’ is not for Talpiot,’ says Ehud Ram, a recent! ly retired high-ranking intelligence officer who worked with some Talpiot grads over the years. (Ram’s own background is in geophysics and remote sensing data. During a meeting three years ago, Ram informed Steve Ballmer, then Microsoft’s second in command, that he should consider relocating the company’s Redmond campus or risk being wiped out by a nearby long-dormant but still dangerous volcano. No word yet from Ballmer, now Microsoft’s CEO.)” (Startup Nation by Stacy Perman) –,17925,512689,00.html

“Graduates, along with those of other elite programs, are deployed throughout the armed services to do everything from reviving crashed computers to heading sophisticated military intelligence projects. Col. Albert Tregar’s IDF programming school gets to choose the best, train them, and quickly put them into the field, where they could very well wind up practicing various forms of technological warfare.” (Israeli Army Grads Lead Business Revolution by David Rosenberg) –


“Is the computer division of the IDF (Israel Defense Forces) in the areas of design and development of information systems. 1959 – MAMRAM, the Hebrew acronym for the IDF’s Central Computing Facility, is formed.

MAMRAM is an abbreviation for Center of Computing and Information Systems; originally, Center of Computing and Mechanized Registration is the Israel Defense Forces’ central computing system unit, providing data processing services for all arms and the general staff of the IDF. As of 2007, MAMRAM is under the command of Colonel Ayala Hakim.

In 1994, the MAMRAM programming school, considered one of the best sources of high-quality software professionals in the world, was separated into a newly-formed unit called BASMACH. However, the school’s graduates, which were and still are highly sought after in the industry, are still referred to as MAMRAM graduates. Following graduation, BASMACH students go on to serve in various IDF units. Some of the graduates are often offered a position in MAMRAM itself.” (MAMRAM – Wikipedia entry) –

“The demands of MAMRAM, another elite division, aren’t as withering as Talpiot’s — the MAMRAM washout rate is only 50 percent. MAMRAM, the Hebrew acronym for Central Unit for Data Processing, is the IDF’s main computer corps, and trains all military software programmers and network systems architects.

MAMRAM candidates go through a six-month trial of up to 15-hour-a-day course work before they’re admitted to the program. Those who make the grade must serve six years, minimum. Still, it is one of the most coveted postings in the military.” (Startup Nation by Stacy Perman) –,17925,512689,00.html


“Then there is 8-200, an electronic warfare unit founded in the early 1960s that many believe has left a bigger mark on the boom than any of Israel’s other elite operations. Its name comes from its founding members: 8 Ashkenazi Jews and 200 Iraqi immigrants who were specialists in wireless communications and had worked for Iraqi Railways. Their skills became the cornerstone of the electronic intelligence gathering, encryption, and other activities known to be among the unit’s specialties. It’s illegal for past and present members to talk about 8-200, although it has become something of an open secret in the tech world. The unit has also attained a mythical status among venture capitalists for the entrepreneurial wizards who are veterans of the unit. Gil Shwed, one of Check Point’s founders, allegedly served in 8-200, though he won’t confirm that himself. ‘I had the idea in the army, three years before I started Check Point,’ Shwed says. ‘I knew I had a good idea. If you can do it in the military environment, you have the tools to do it in other environments.'” (Startup Nation by Stacy Perman) –,17925,512689,00.html

*Here’s the confirmation:

“A four-year-long period goes virtually unmentioned in the official biography of the Israeli billionaire Gil Shwed. This much information can be cobbled together: In 1986 Shwed, just 18 years old, joined the supersecret electronic intelligence arm, Unit 8-200, of the Israeli Defense Forces. His job most likely was to string together military computer networks in a way that would allow some users access to confidential materials and deny it to others.” (A Fortune in Firewalls by Lea Goldman) –

The legend of the name is that unit began with eight Ashkenazis and 200 immigrants from Iraq. The Iraqi immigrants had previously worked on Iraqi Railways, knew wireless communications and of course, Arabic Israel Defense Force intelligence unit 8-200 may be Israel’s greatest high-tech incubator, whose graduates have gone on to found companies like Check Point, NICE, Comverse and ECI. Israel Defense Force intelligence unit 8-200 may be Israel’s greatest high-tech incubator, whose graduates have gone on to found companies like Check Point, NICE, Comverse and ECI. Not to mention all those start-ups. The Arena presents a first-ever expose of Israel’s ultimate secret weapon.

“It began as a unit in the Intelligence Service of the Hagana (the pre-State underground army), called “Intelligence Service 2,” which was responsible for listening to enemy transmissions. 8-200 has undergone numerous incarnations. Today, it concentrates on intelligence gathering and decoding of encryption codes. It is a good and developed unit, whose contribution to the system is important. It was forbidden to talk about it for years. We have been hearing more about it recently and there have been a few publications in Israel and abroad. The unit recruits quality personnel, which then goes out and markets technologies developed there.”

“It is important to understand that this is a huge unit, that works in many fields. In general, it is responsible for all intelligence that can affect Israel’s security. Intelligence gathering in the unit comes from a variety of sources, i.e. listening to all types of broadcasts: telephones, fax, radio. The unit listens, intercepts and decodes information, mostly encrypted, though some is in clear.

“The major challenge is decoding encrypted transmissions. Unit computer experts and mathematicians are responsible for this, using mathematical models and algorithms.”

Yossi Melman, “Ha’aretz” Intelligence Affairs Correspondent and co-author of “Every Spy a Prince” says, “This is the most important intelligence unit in the State of Israel. More than the Mossad. The information obtained by this unit is of the highest priority to the entire intelligence community.” Melman continues, “In my opinion, many of the Israeli high-tech companies are based on the information amassed in the unit. But they are not exceptional. It happens everywhere. Not a few Mossad agents became businessmen after their retirement, using their connections and information amassed while in the service. There are suggestions of paying royalties to the State, but such suggestions reek of dictatorship.”

Alon of iWEB shows his courage, admitting, “It isn’t the paratroopers. There isn’t a strong social element. Guys come to work. In addition, the unit is strongly compartmentalized. If friendships developed, it was in small groups. Compartmentalization indeed. There is hardly any free movement at headquarters. Every soldier has authorization to enter only a few places, and each team is totally isolated from his neighbors. Military discipline is not rigidly enforced, apparently because there is no need for it. David of Power Dsine remembers, “I was scared when I arrived. I saluted the department head the first time I saw him. He told me that that would also be the last time.” (Nerds in Uniform by Batya Feldman) –

1959 – Unit 8-200 of the Intelligence Corps is formed. Its first commander was Avraham Aloni, who in 1952 became the commander of the Signal Intelligence Unit of the IDF Intelligence Corps. Also in 1959, the electronics division was established which served as a research and technology division of the Intelligence Corps, which in turn became 8-200. Ever since, graduates of 8-200 have gone on to hold leading positions in Israelâ’s high-tech industries, becoming entrepreneurs and executives in such companies as Checkpoint, Comverse, Taldor, ECI Telecom, Audiocodes, Jacada, Compugen, Nice, and others.” (The 50s: Little Israel invents and devises by Dan Yachin) –

“Several of the founders of Israel’s best-known tech success, the Internet security firm Check Point Software Technologies, are former members of 8-200 who specialized in developing firewalls between classified military computer networks.” (Startup Nation by Stacy Perman) –,17925,512689,00.html


“Take the air force operational software and development center, known by its Hebrew acronym, MAMDAS. It designs some of the world’s most sophisticated military software, and most of its personnel are in their early 20s. The key to its success, says Lieutenant Colonel Zafrir, an officer in the unit (the army censor prohibits publication of some officers’ full names), lies in the close integration of development and operation and close cooperation between designers and people who use the technology in the field.” (Israeli Army Grads Lead Business Revolution by David Rosenberg) –

Unit 8153

The Mapping Unit, Modern Hebrew: Yehidat Mipui of the Israel Defense Forces military intelligence (Unit 8153) is in charge of strategic mapping of locations. It is known for doing so for both strategic and tactical purposes. (Mapping Unit – Wikipedia entry) –

*Okay, now that we’ve established the covert intelligence units of Israel, whose admitted roles are to recruit, train and place in the field or remotely, active service intelligence operatives. Whose acknowledged tasks were and are to intercept electronics communications, surreptitiously compromise the security of sensitive communications of targeted foreign countries, establish and insert “Trojan Horse” start-ups and spy software in strategic areas of secure electronic communications. For the purposes of compiling military and economic intelligence, then utilizing blackmail of individuals they find compromised through the electronic surveillance grid. This is technological warfare deployed against all they perceive as their enemies, and of foreign powers they can exploit to their advantage. Now let’s examine some of the principle players and the ‘front corporations they’ve established to carry out their covert and sanctioned espionage for Israel’s military and interests! Again, I am using actual excerpts so that there may be no controversy regarding the veracity of statements.

Check Point

“Gil Shwed is the data-security company’s 34-year-old CEO. Fresh from his role as a network defense specialist for four years in the Israeli Defense Force, Shwed launched Check Point in 1993. Check Point acquired Zone Labs in 2004. In October, 2005, Check Point announced it would acquire Sourcefire, the developers of Snort for $225 million. Both the Department of Defense and the FBI objected to the acquisition due to national security concerns. The acquisition was pending during an investigation by the Committee on Foreign Investment in the United States (CFIUS), but was announced to have collapsed over security concerns related to the “Snort” software which guards some classified U.S. military and intelligence computers. The acquisition has been since withdrawn.” (Wikipedia entry) –

“Sourcefire is at work in leading financial, healthcare, manufacturing, technology and educational organizations throughout the U.S., Europe, Asia and Latin America. But here is the kicker: Sourcefire solutions are trusted by all branches of the military, the largest civilian agencies, and domestic, internal and military intelligence organizations. This kicker has all the earmarks of a red flag, and that is exactly what came up. “We’ve decided to pursue alternative ways for Check Point and Sourcefire to partner in order to bring to market the most comprehensive security solutions,” said Gil Shwed, Check Point’s CEO.” (Who Benefits From Check Point’s Blocked Sourcefire Buyout?) –

So it seems that Mr. Shwed is on a mission both figuratively and literally, to get access to classified U.S. military and intelligence computers.

“Sourcefire makes network defense and intrusion detection software for an array of customers, including the Defense Department. The company has deep roots in the National Security Agency. Its founder and chief technology officer, Martin Roesch, has served as an NSA contractor. Its vice president of engineering, Tom Ashoff, developed software for the secretive spy agency.” (U.S. Reviewing 2nd Dubai Firm) –

“Sourcefire makes arguably the best network-based intrusion detection system that’s ever existed, and it’s used on some very sensitive networks by the US Government. Handing control of the company that develops and maintains that software to foreign interests seemed a little too much for the feds. “I think Sourcefire is a great company I think they had good things and I think I would be happy tohave them as a part of Check Point. But I don’t think that there are no alternatives to that technology,” Shwed says.

“Check Point will either form an OEM relationship with Sourcefire, or simply buy another company that owns a similar technology, he added. The roadmap stays the same, Shwed insists.” (Check Point wants to be the last pure-play security vendor by Patrick Gray) –,130061744,139265693,00.htm

“Check Point has recently acquired Zone Labs, a company known for letting consumers download free software like Zone Alarm, a personal firewall. When asked if free software downloads will stop now with the acquisition, Mr Gil Shwed, chairman and CEO of Check Point, said: ‘No, Zone Labs is doing a good job providing free products for consumers’.”

“‘The fact that it provides free products to people is a very good way to secure people and get them familiar with the need for security and also to test software programs. The fact that we have 25 million consumers is a great way to make sure that a product is tested in every environment’.” (Check-ing on the Weakest) –,5104,1885,00.html

I find this statement troubling at least as much as I find the fact that they are producing Firewall software for personal computers. Which any good intelligence technician would create with surreptitious back-door access installed.


“Google was co-founded by Larry Page and Sergey Brin while they were students at Stanford University, and the company was first incorporated as a privately held company on September 7, 1998. The first funding for Google as a company was secured in the form of a USD100,000 contribution from Andy Bechtolsheim, co-founder of Sun Microsystems, given to a corporation which did not yet exist. After viewing a quick demo, Sun Microsystems co-founder Andy Bechtolsheim (himself a Jewish immigrant from Germany) wrote a $100,000 check to ‘Google, Inc.'” (The Story of Sergey Brin by Mark Malseed) –

“Around six months later, a much larger round of funding was announced, with the major investors being rival venture capital firms Kleiner Perkins Caufield & Byers and Sequoia Capital. Sequoia Capital, one of the first Silicon Valley venture capital firms, has only one office outside the United States — in Israel. Financier Michael Moritz, from Sequoia currently sits on the board of Directors of Google. Google also owns both Google video and YouTube which was purchased in late 2006. In 2004, Google launched its own free web-based email service, known as Gmail. Google admits that deleted messages will remain on their system, and may be accessible internally at Google, for an indefinite period of time. For the first time in Google’s history, the language in their new policy made it clear that they will be pooling all the information they collect on you from all of their various services. Moreover, they may keep this information indefinitely, and give this information to whomever they warrant. Their corporate motto is “Don’t be evil“, and they even made sure that the Securities and Exchange Commission got this message in Google’s IPO filing. Google has never been known to delete any of the data they’ve collected, since day one. For example, their cookie with the unique ID in it, which expires in 2038, has been tracking all of the search terms you’ve ever used while searching their main index. For all searches they record the cookie ID, your Internet IP address, the time and date, your search terms, and your browser configuration. Increasingly, Google is customizing results based on your IP number. This is referred to in the industry as ‘IP delivery based on geolocation.'” (Compiled from various documented sources)

“Google has also developed Google Earth, an interactive mapping program powered by satellite imagery that covers the vast majority of the earth. Google Earth is generally considered to be remarkably accurate and extremely detailed. For example, some major cities have such remarkably detailed images that one can zoom in close enough and read the license plates on cars on a street. Specifically, some countries and militaries contend the software can be used to pinpoint with near-precision accuracy thephysical location of critical infrastructure, commercial and residential buildings, bases, government agencies, and so on.” (Google Wikipedia entry) –

“Sergey Brins parents, Michael Brin, 59, a mathematics professor at the University of Maryland, and his wife, Eugenia, 58, is a research scientist at NASA’s Goddard Space Flight Center. They are Jews who emigrated from Russia with the assistance of HIAS, the Hebrew Immigrant Aid Society, and $2,000 dollar loan from the Jewish community in Maryland. Google’s first employee and a number of other early hires were Jewish and, when the initial winter holiday season rolled around, a menorah rather than a Christmas tree graced the lobby.

Like Sergey, Larry is the son of high-powered intellects steeped in computer
science. His father, Carl Victor Page, a computer science professor at Michigan State University until his death in 1996, received one of the first Ph.D.s awarded in the field. His mother, Gloria, holds a master’s degree in computer science and has taught college programming classes. The two young graduate students also shared a Jewish background.” (The Story of Sergey Brin by Mark Malseed) –

“DAVOS, Switzerland – Google ‘is in the process of establishing an R&D center in Israel,’ Sergey Brin, a founder of the Internet search titan, told Haaretz during the World Economic Forum here. Brin and co-founder Larry Page were among the more visible participants at the economic conference. Both have a solid connection with Israeli entrepreneurs in the Internet field.” (Google plans Research and Development center in Israel) –

Google Facts:

“Matt Cutts, a software engineer at Google since January 2000, used to work for the National Security Agency.Keyhole, the satellite imaging company that Google acquired in October 2004, was funded by the CIA. Keyhole is supported by In-Q-Tel, a venture capital firm funded by the CIA, in an effort to ‘identify and invest in companies developing cutting-edge information technologies that serve United States national security interests.’

‘We are moving to a Google that knows more about you.'” Google CEO Eric Schmidt, February 9, 2005 (Creepy Gmail) –

“Both Google founders Sergey Brin and Larry Page attended Shimon Peres’ 80th birthday extravaganza in September of 2003. Brin even spoke at a symposium entitled ‘The Promise and Risk of Technology'” (Celebrating 80 Years with Shimon Peres) –

Onset Technology

“The problem is that BlackBerry’s operating system includes only e-mail, an appointment book, and a contact list (personal information management). There are already several small software companies in the world that have discovered this vacuum, and are supplying added value services for BlackBerry’s operating system. One of these companies is Israeli start-up Onset Technology Ltd., founded in 1997 by president and CEO Gadi Mazor and Ron Maor, both veterans of Unit 8-200 (the IDF signal intelligence gathering unit). Most of Onset Technology’s current work involves the BlackBerry. The company’s METAmessage software provides access to an enterprise’s network via a BlackBerry. The software enables users to see files on an office computer, print them, and check for errors.” (Bettering BlackBerry: Israeli Start-up Onset Technology will Develop Homeland Security Apps for Blackberry PDAs – by Ofer Levi) –


“Odigo was an Israeli company whose headquarters were in New York, with offices in Herzliya. It offered instant messaging services via a minor messaging client called Odigo Messenger. Formally an affiliate web service provider Bravenet, Odigo was acquired by Comverse Technology on May 20, 2002. The founders of Odigo are Avner Ronen and his wife Maskit. Odigo is named after the Greek word for ‘Guide’.

Avner, 24, would soon find himself living like a student in a battered East Village loft. He would see his fledgling company, Odigo, laid siege to by America Online, the user-friendly Godzilla of the Internet world. He would be poised to earn fantastic amounts of wealth — and would be equally poised to earn nothing. But having spent five years in the Israeli Defense Forces, he was not given to panic. ‘Conflict with AOL is not so terrible,’ he once told me. ‘Things are more difficult with Hezbollah.’ Ronen has never quite shed his military appearance — though having settled in Manhattan, and Banana Republic.

The Jan. 25 start-up of Odigo, which specializes in instant-message technology, was fast approaching. ‘It may sound absurd in this Internet age,’ he says, ‘but sometimes you must physically be in an environment to feel what is happening. You need presence.’ Choosing Silicon Alley over Silicon Valley was a matter of pure logistics: Odigo had 70 employees back home, and Ronen believed that the extra time difference between Israel and California would be too burdensome.

Still in the cab, Avner called Israel and casually informed his wife, Maskit, of his impulse to move. She agreed instantly. Maskit, who is also 24, met Avner in the military, where she had a senior rank and, significantly, was his computer instructor. (She is now one of Odigo’s software engineers.) ‘There was no time to digest this information for either of us,’ Avner recalls. ‘Moving here was just a theory.'” (Immigrants with an I.P.O. by Marshall Sella) –

“Odigo came into the news in the aftermath of the September 11 attacks, because two workers claimed that they received word of an upcoming terrorist attack two hours in advance, via their own messaging service. The two employees allegedly recorded the ip-address and notified the authorities after the attack. [1]” (Wikipedia entry) –

“Odigo, the instant messaging service, says that two of its workers received messages two hours before the Twin Towers attack on September 11, predicting the attack would happen, and the company has been cooperating with Israeli and American law enforcement, including the FBI, in trying to find the original sender of the message predicting the attack.

Micha Macover, CEO of the company, said the two workers received the messages and immediately after the terror attack informed the company’s management, which immediately contacted the Israeli security services, which brought in the FBI.

Odigo usually zealously protects the privacy of its registered users, said Macover, but in this case the company took the initiative to provide the law enforcement services with the originating Internet Presence address of the message, so the FBI could track down the Internet Service Provider, and the actual sender of the original message.” (Odigo says Workers were warned of attack by Yuval Dror) –

“Odigo, Inc., founded in 1998, is a leading provider of Instant Messaging and Presence Solutions to wireless carriers and service providers worldwide with a community of over 8M users world wide. Odigo’s products include IM servers, SMS-IM gateways, and presence management solutions. On May, 2002 Odigo was Aquired by Comverse, the world’s leading supplier of software and systems enabling network-based multimedia enhanced communications services. The field-proven Odigo Instant Messaging service, which serves millions of subscribers, enables Comverse to expand its offering to include both in-network and outsourced Instant Communications Solutions.

“AOL aol (nyse: aol – news – people) last weekend blocked the latest version of the Odigo Messenger from working with AOL Instant Messenger (AIM). Late Monday, Odigo figured out a way around the blockade, but early today AOL again put the kibosh on Odigo’s software.

Both companies say they’re ready for a long battle. AOL contends that by accessing its servers, Odigo is compromising AOL’s security and risking the privacy of AIM users.

AOL spokeswoman Tricia Primrose was equally adamant: ‘We’re not going to allow unauthorized access to our servers. No doubt they will try to devise a new workaround, and then we’ll block them again.'” (AOL Again Blocks Odigo by David Einstein) –

Does anyone else think this is abusive technical hacking into AOL’s servers who clearly don’t want them there and feel it would compromise the security and personal records of AOL users? If this AOL was a woman and Odigo a man, he would be guilty of stalking, harassment and repetitive date rape. What do you call a company that forces its services and products on you whilst attempting to gain access to confidential consumer data? Oh that’s right a spy op.

“Shortly after 9-11, Odigo was completely taken over by Comverse Technology, which had been part owner of Odigo since early 2000, if not earlier. Shortly after 9/11, five executives from Comverse were reported to have profited by more than $267 million from ‘insider trading.’

Avner Ronen, the ‘founder’ of Odigo, was Vice President of Business Development of Comverse Technology in October 2005. This indicates that Ronen and Kobi Alexander (of Comverse), both Israeli military officers with computer backgrounds, have been close business partners since early 2000.

‘Comverse and Odigo have had a long-standing partnership and together have developed instant communications products and services that we have recently begun to offer to operators around the world,’ Zeev Bregman, CEO of the Israel-based Comverse Ltd., told The Jerusalem Post in May 2002. (Why was Kobi Alexander Allowed to Flee?) –

Gilat Satellite Networks

Made more than half of the interactive VSATs (Very Small Aperture satellite Terminals), or small satellite earth stations used in communications networks sold in the world.

“(06/13/2006 10:03 AM EDT)
ZICHRON YAACOV, Israel – Satellite maker Gilat Satellite Networks said its technology will be incorporated into Cisco Systems’ routers. Gilat’s touts its SkyEdge technology as allowing Cisco routers to supply integrated services and the capacity to securely transmit high-speed voice, video and data services. The move is designed to provide an alternative communications path in parallel with terrestrial communications.” (Cisco to Cooperate with Gilat for Satellite Backup) –

“Like many others in the Israeli high tech field, Yoel Gat is a graduate of the Intelligence Corps, and a protege of Zohar Zisappel. He entered the civilian job market in 1987 only because he did not win against Eric Paneth in the stand-off for the position of unit commander. Three years later, Paneth became one of the founders of Orckit.

Gilat Satellite Networks subsidiary Gilat Communications, set up in Israel under the management of Shlomo Tirosh, is increasingly becoming a major factor in the Israel inland communications market, and like its parent company, was highly successful in issuing on Wall Street. Gilat grew from being a start-up to a 500-staff company, which constantly shows profits (generally exceeding expectations), and never ceases to innovate in satellite communications. Gat stands at the head of the pyramid of a company with a hush-hush aura attached to it by a team of guys who left the Intelligence Corps and globally conquered the satellite communications market.

Leaving the unit together with Gat were Amiram Levinberg, his brother Joshua Levinberg, Shlomo Tirosh and Gideon Kaplan, and together they set up Gilat Satellite Networks (GILTF).” (Yoel Gat – Gilat Satellite Networks, The Hush-hush Guy by Efi Landau) –


“ECtel, a unit of telecoms equipment holding firm ECI Telecom, makes monitoring equipment for communications networks. In August of 2003, a major unnamed telecoms carrier had ordered the Israeli company’s lawful Interception application. A valuation for deal was not given and a spokeswoman for the firm declined to comment on the size of the contract. For those who may not be familiar with the term ‘lawful interception’ it is more commonly known as wiretapping.” (Israel ECtel wins U.S. telecoms carrier deal) –

From ECTel’s own website it states that Chairman of the Board Yair Cohen, “served as Brigadier General of Unit 8-200, the central military intelligence unit of the Israeli Defense Forces.” It further elaborates that “in this capacity, he was engaged in the development of state-of-the-art military technology.” ( –


“Narus is a private company founded in 1997 by Ori Cohen, who had been in charge of technology development for VDONet, an early media streaming pioneer.

It is notable for being the creator of NarusInsight, a supercomputer system which is used by the NSA and other bodies to perform mass surveillance and monitoring of citizens’ and corporations’ Internet communications in real-time, and whose installation in AT&T’s San Francisco Internet backbone gave rise to a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.

In 2004, Narus engaged the former Deputy Director of the National Security Agency, William Crowell as a director. From the Press Release announcing this:

‘Crowell is an independent security consultant and holds several board positions with a variety of technology and technology-based security companies. Since 9/11, Crowell has served on the Defense Advanced Research Projects Agency (DARPA) Task Force on Terrorism and Deterrence, the National Research Council Committee on Science and Technology for Countering Terrorism and the Markle Foundation Task Force on National Security in the Information Age.'” (Narus Wikipedia entry) –

“One of the devices in the ‘Cabinet Naming’ list is particularly revealing as to the purpose of the ‘secret room’: a Narus STA 6400. Narus is a 7-year-old company which, because of its particular niche, appeals not only to businessmen (it is backed by AT&T, JP Morgan and Intel, among others) but also to police, military and intelligence officials. Last November 13-14, for instance, Narus was the ‘Lead Sponsor’ for a technical conference held in McLean, Virginia, titled ‘Intelligence Support Systems for Lawful Interception and Internet Surveillance.’ Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint and Verizon. Narus founder, Dr. Ori Cohen, gave a keynote speech. So what does the Narus STA 6400 do?

‘The (Narus) STA Platform consists of stand-alone traffic analyzers that collect network and customer usage information in real time directly from the message…. These analyzers sit on the message pipe into the ISP (internet service provider) cloud rather than tap into each router or ISP device’ (Telecommunications magazine, April 2000). A Narus press release (1 Dec., 1999) also boasts that its Semantic Traffic Analysis (STA) technology ‘captures comprehensive customer usage data … and transforms it into actionable information…. (It) is the only technology that provides complete visibility for all internet applications.’

The next logical question is, what central command is collecting the data sent by the various ‘secret rooms’? One can only make educated guesses, but perhaps the answer was inadvertently given in the DOD Inspector General’s report (cited above):

‘For testing TIA capabilities, Darpa and the U.S. Army Intelligence and Security Command (INSCOM) created an operational research and development environment that uses real-time feedback. The main node of TIA is located at INSCOM (in Fort Belvoir, Virginia)… .”

Among the agencies participating or planning to participate in the INSCOM ‘testing’ are the ‘National Security Agency, the Defense Intelligence Agency, the Central Intelligence Agency, the DOD Counterintelligence Field Activity, the U.S. Strategic Command, the Special Operations Command, the Joint Forces Command and the Joint Warfare Analysis Center.’ There are also ‘discussions’ going on to bring in ‘non-DOD federal agencies’ such as the FBI.” (AT&T Whistle-Blower’s Evidence by Wired) –

“If you’ve been keeping track of American Internet and the battles over surfer privacy, then you have run into the name Narus, which specializes in tapping surfer traffic. It was founded in 1997 by Dr Ori Cohen, Stas Khirman and four other guys in Israel.

For years Narus sailed on untroubled. But today it’s become associated with the likes of Carnivore or Echelon, the notorious software programs that have become linked with spying on email and delivering data on surfers to government agencies.

The image change Narus has suffered and its frequent mentions in debates on privacy and the freedom of information, is mainly because of Mark Klein. That would be a technician retired from AT&T for 22 years, who reported to the American authorities a few months ago that he suspected AT&T of allowing the National Security Agency to bug its customers’ phone calls.

Customer Internet traffic via the WorldNet service provider was reportedly shunted to data-mining technology in a secret room at AT&T facilities. The data analysis technology was made by Narus.

It is very possible that Cohen and Khirman are working at a startup that nobody is willing to talk about. A stealthy startup they helped found called Cright that has lots of employees in Israel and California, and which is reportedly about to avail itself of Ukrainian development talent too. Almost nobody has heard of Cright and nobody at all, including its distinguished investors, is willing to discuss what it does.

Sequoia Israel, the Rolls Royce of the technological venture capital world, is whispered to have invested $7 million in Cright together with Charles River. But the enigmatic startup is not mentioned on the Sequoia site, which otherwise describes the portfolio very thoroughly. Nor does the Charles River site mention it.

Nor could I glean any information about the company or about the Narus people manning it. Cright has a website, a naked one that reveals nothing: and has taken a vow of utter silence.

Market sources surmise that Cright is tight-lipped because what it does would spark outrage among surfers jealous of their privacy, which could culminate in migraines for the startup and its backers.

But that is assuming that Ori Cohen and Stas Khirman are still working on products that analyze Internet traffic, and possibly, that this time their prying eye is looking at private surfers.

Industry sources in the know claim they’re harnessing Israeli developers to develop a DRM product designed for installation at Internet providers, which will among other things frustrate file sharing and peer-2-peer networks. These sources say Cright (could that be short for copyright?) is supposed to filter P2P networks, to monitor and analyze files being shared, and possibly to shut down errant P2P network, or at least to block certain content.

In other words, if may be a new twist on the old trick of monitoring the Internet’s main line, analyzing content, and interfering with it, just as Narus says it does in Saudi Arabia.” (Ori Cohen, Private Eye by Raphael Fogel) –

You have Narus, established to collect internet intel on American citizens for the NSA, DIA, CIA, DHS and a host of others within the US intelligence community. What don’t they want you to know beyond that? Well, Narus was founded by Israeli native Ori Cohen in 1997, prior to that he was the VP of Business and Technology Development for VDOnet, a leading provider of Internet video conferencing and video on demand software solutions. Prior to VDOnet, he served as CEO for IntelliCom Ltd.

So both Narus and later companies Skyrider and CRight were founded by a shadowy Israeli citizen with substantial U.S. intelligence connections named Ori Cohen. But Cohen’s bio doesn’t go beyond his work in the UK with Intellicom Ltd. UK, the rest has been aggressively sanitized and filtered. No picture, and absolutely no information beyond Intellicom Ltd. which I find most unusual. But I’m going to go out on a limb and wager that what are the odds that U.S. telecom traffic is being compromised by at least 3 Israeli intel fronts, and then the NSA’s internet monitoring own capacities just happen to be farmed out to yet another Israeli founded company with tenuous intel connections? Evidence at this level, you think, would make this extremely suspicious to any agency pledged to defend the country against foreign espionage. Yet here before all, it not only doesn’t raise an eyebrow, but they’ve actually instituted the espionage by allowing a foreign power access to all of their sensitive data! One can only wonder at the extortion and blackmail material these Israeli companies have amassed that’s being used against powerful figures within the U.S. to sanction this level of insanity. But in thinking this out further, maybe there’s something more. Because by using these Israeli cut-out contractors, the U.S. agencies can effectively bypass those troublesome domestic surveillance laws and other legal obstacles, by utilizing foreign intelligence agencies such as in Israel to collect the data for them. So, the Israeli intelligence can amass extortion and blackmail material to force any leaders with something to hide, to supporting their wars and agenda. Whilst the U.S. can illegally collect net profiles, histories and whatever from any Joe and Jane citizen they want to, and reserve any incriminating or useful information for further use down the road.

Comverse Technology, Inc. ( a.k.a Comverse Infosys & Verint)

“Comverse Infosys designs, develops, manufactures and markets advanced telecommunications processing solutions for telecommunications carriers and Law Enforcement Agencies. Solutions include the acquisition, storage, processing and analysis of voice, data and video electronic communications. The open-ended, modular designs provide the versatility to easily adapt new technologies and enhancements to meet future requirements, such as 3G Cellular and packet data networks.” (Comverse Infosys Profile) –

“Founded in 1981, the company focuses on providing services to third party telecommunication service providers. The real parent company of Comverse was Jacob ‘Kobi’ Alexander’s Tel Aviv-based Efrat Future Technology Ltd., which carried out ‘all research, development, and manufacturing,’ for Comverse. (Wikipedia entry) –

“The latest incarnation known as Verint Systems defines itself as a global organization providing analytic software solutions for communications interception, digital video security and surveillance, and enterprise business intelligence. We generate actionable intelligence through the collection, retention and analysis of video, email, Internet and data transmissions from multiple types of communications.” (

“CARL CAMERON, FOX NEWS CORRESPONDENT: The company is Comverse Infosys, a subsidiary of an Israeli-run private telecommunications firm, with offices throughout the U.S. It provides wiretapping equipment for law enforcement. Here’s how wiretapping works in the U.S.

Every time you make a call, it passes through the nation’s elaborate network of switchers and routers run by the phone companies. Custom computers and software, made by companies like Comverse, are tied into that network to intercept, record and store the wiretapped calls, and at the same time transmit them to investigators. The manufacturers have continuing access to the computers so they can service them and keep them free of glitches. This process was authorized by the 1994 Communications Assistance for Law Enforcement Act, or CALEA. Senior government officials have now told Fox News that while CALEA made wiretapping easier, it has led to a system that is seriously vulnerable to coundermined the whole wiretapping system.

Congress [sic, probably Comverse] insists the equipment it installs is secure. But the complaint about this system is that the wiretap computer programs made by Comverse have, in effect, a back door through which wiretaps themselves can be intercepted by unauthorized parties.

Adding to the suspicions is the fact that in Israel, Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide.

And sources say that while various F.B.I. inquiries into Comverse have been conducted over the years, they’ve been halted before the actual equipment has ever been thoroughly tested for leaks. A 1999 F.C.C. document indicates several government agencies expressed deep concerns that too many unauthorized non-law enforcement personnel can access the wiretap system. And the FBI’s own nondescript office in Chantilly, Virginia that actually oversees the CALEA wiretapping program, is among the most agitated about the threat.

But there is a bitter turf war internally at F.B.I. It is the FBI’s office in Quantico, Virginia, that has jurisdiction over awarding contracts and buying intercept equipment. And for years, they’ve thrown much of the business to Comverse. A handful of former U.S. law enforcement officials involved in awarding Comverse government contracts over the years now work for the company. Numerous sources say some of those individuals were asked to leave government service under what knowledgeable sources call “troublesome circumstances” that remain under administrative review within the Justice Department.”

“CAMERON: Beyond the 60 apprehended or detained, and many deported since Sept. 11, another group of 140 Israeli individuals have been arrested and detained in this year in what government documents describe as “an organized intelligence gathering operation,” designed to “penetrate government facilities.” Most of those individuals said they had served in the Israeli military, which is compulsory there.

But they also had, most of them, intelligence expertise, and either worked for Amdocs or other companies in Israel that specialize in wiretapping. Earlier this week, the Israeli embassy in Washington denied any spying against or in the United States” (Transcripts of Fox News Special Report with Brit Hume, from December 13, 2001) – and

CARL CAMERON, FOX NEWS CORRESPONDENT: Los Angeles, 1997, a major local, state and federal drug investigating sours. The suspects: Israeli organized crime with operations in New York, Miami, Las Vegas, Canada, Israel and Egypt. The allegations: cocaine and ecstasy trafficking, and sophisticated white-collar credit card and computer fraud. The problem: according to classified law enforcement documents obtained by Fox News, the bad guys had the cops’ beepers, cell phones, even home phones under surveillance. Some who did get caught admitted to having hundreds of numbers and using them to avoid arrest.

‘This compromised law enforcement communications between LAPD detectives and other assigned law enforcement officers working various aspects of the case. The organization discovered communications between organized crime intelligence division detectives, the FBI and the Secret Service.’

Shock spread from the DEA to the FBI in Washington, and then the CIA. An investigation of the problem, according to law enforcement documents, concluded, ‘The organization has apparent extensive access to database systems to identify pertinent personal and biographical information.'” (Transcripts of Fox News Special Report with Brit Hume, from December 14, 2001) – and

“Another Israeli telecom company is Comverse Infosys, which subcontracts the installation of the automatic tapping equipment now built into every phone system in America. Comverse maintains its own connections to all this phone tapping equipment, insisting that it is for maintenance purposes only. However, Converse has been named as the most likely source for leaked information regarding telephone calls by law enforcement that derailed several investigations into not only espionage, but drug running as well.” (The Israeli Spy Ring) –

“Comverse is one of the most notable companies involved in the options backdating scandal. The Ex-CEO of Comverse, Jacob Alexander, an Israeli citizen, has been classified as a wanted fugitive from August 2006 by the American Federal Bureau of Investigation. Along with former finance chief David Kreinberg and former senior general counsel William Sorin, Alexander faces multiple charges of conspiracy, securities fraud, wire fraud, mail fraud, money laundering and making false filings to the Securities and Exchange Commission; all of these charges relate to alleged options backdating or other actions related to stock options. Jacob “Kobi” Alexander, was an Israeli military officer connected to the Odigo instant messaging company whose employees and users received an early warning of the 9/11 attacks, has become a fugitive from U.S. justice and taken refuge in Israel along with other prime suspects of the terror attacks.” (Wikipedia entry) –

“BEIJING, Sept. 28, 2006 (Xinhuanet) — Securities fraud fugitive Jacob “Kobi” Alexander, former Comverse Technology Inc. chief executive officer, was arrested Wednesday in Namibia.

Alexander, 54, former Israeli intelligence officer turned high-technology entrepreneur, will be brought before a court in Windhoek within 48 hours, and the U.S. will seek his extradition, the Justice Department said.

Federal prosecutors charged Alexander on Aug. 9 with backdating stock options to boost the compensation of executives at New York-based Comverse, the world’s largest maker of voicemail software.

‘Alexander’s alleged role in options backdating victimized Comverse shareholders and deceived prospective investors,’ Brooklyn U.S. Attorney Roslynn Mauskopf said in a statement. ‘The fraud affected the company’s bottom line by misstating earnings.’

After Alexander was charged and fled the U.S. the FBI put his face on its Most Wanted list and Interpol initiated a global ‘red notice,’ asking police to arrest the former CEO. Prosecutors said today that Alexander isn’t a U.S. citizen as the FBI stated in a press release after he was first charged.

Robert Nardoza, a spokesman for Mauskopf, said the former CEO, a citizen of Israel, is also a permanent resident of the U.S.

Alexander wired 57 million U.S, dollars to Israel in July from an account at Citigroup Inc.’s Smith Barney Unit, the U.S. government said, calling the transfer an effort to ‘aunder the proceeds of the fraud.’ His assets in two Citigroup Smith Barney accounts were frozen July 31.

A 32-count indictment unsealed Wednesday by Garaufis in Brooklyn federal court charged Alexander with crimes relating to an alleged ‘slush fund” and the backdating of stock options from 1998 to 2006. He is charged with conspiracy, securities fraud, making false filings with the U.S. Securities and Exchange Commission, mail fraud, wire fraud and money laundering.” (Fugitive: Interpol arrests Jacob Alexander) –

Comverse Technology, the U.S.-based ‘parent company’ of an older and much bigger Israel-based company with the same name, is the owner of the Verint, Ulticom, Starhome, Mercom and Startel companies.

Alexander, was recently allowed to flee the United States after he and two other former Comverse executives were charged with securities, mail and wire fraud by U.S. prosecutors in Brooklyn, New York. A warrant has been issued for his arrest. While a spokesman for the U.S. Attorney’s office for the Eastern District of New York told AFP on August 15 that he ‘expected’ that Alexander would turn himself in, The New York Times was rather less optimistic. ‘It will be a long time – if ever – before Alexander explains himself in a courtroom,’ the Times wrote on August 21. Alexander’s lawyer, Robert Morvillo, said he ‘believed’ that Alexander and his family were on vacation in Israel. Alexander, an Israeli citizen and a former military officer, wired $57 million to an account in Israel at the end of July and was evidently allowed to flee the United States.

‘Given Alexander’s stature and military service,’ the Times reported, quoting unnamed law professors, ‘Israel might be reluctant to readily hand him over.’ One might reasonably ask, ‘What does the 54-year old Alexander’s ‘military service’ have to do with Israel refusing to extradite him for crimes committed in the United States?’

While Alexander is obviously connected with Israel’s military intelligence apparatus and George Soros through the mutually owned investment fund ComSor, what is not widely reported is his company’s close links with Odigo, the Israeli-run instant messaging company that received – and conveyed – urgent warning messages about the imminent terror attacks on the World Trade Center, several hours before the first plane hit.” (Why was Kobi Alexander Allowed to Flee?) –

AmDocs Limited

“Headquarters in St. Louis, Missouri but primarily based in Ra’anana, Israel, is a provider of software and services for billing, CRM (Customer Relationship Management) and OSS (Operational Support Systems) systems. Its clients are primarily focused on the telecommunications, including such “Tier-1” players as Comcast, Cablevision, DirecTV, Jupiter Communications, Cable One, Sprint-Nextel, Cingular, Vodafone, T-Mobile and Sensis.

The company was originally called ‘Aurec Group’ (the Hebrew word for Artery, which in Hebrew is used to describe a communication channel) and dealt only with directory services, i.e. Yellow Pages. They now provide application suites for CRM, sales, and billing operations for telecommunication service providers. Amdocs still provides publishing software for creating print and online directories. The company also offers outsourced customer service and data center operations. Amdocs claims to be the largest billing system’s software and services provider in the world.; in the USA, they provide billing and directory assistance for 90% of the phone companies.

As of 2002, Dov Baharav replaced Avi Naor, as Amdocs’ CEO.” (Wikipedia entry) –

“CARL CAMERON, FOX NEWS CORRESPONDENT: Here’s how the system works. Most directory assistance calls, and virtually all call records and billing in the U.S. are done for the phone companies by Amdocs Ltd., an Israeli-based private telecommunications company. Amdocs has contracts with the 25 biggest phone companies in America, and more worldwide. The White House and other secure government phone lines are protected, but it is virtually impossible to make a call on normal phones without generating an Amdocs record of it.

In recent years, the FBI and other government agencies have investigated Amdocs more than once. The firm has repeatedly and adamantly denied any security breaches or wrongdoing. But sources tell Fox News that in 1999, the super secret National Security Agency, headquartered in northern Maryland, issued what’s called a Top Secret sensitive compartmentalized information report, TS/SCI, warning that records of calls in the United States were getting into foreign hands in Israel, in particular. Investigators don’t believe calls are being listened to, but the data about who is calling whom and when is plenty valuable in itself. An internal Amdocs memo to senior company executives suggests just how Amdocs generated call records could be used.

“Widespread data mining techniques and algorithms…. combining both the properties of the customer (e.g., credit rating) and properties of the specific ‘behavior…. ‘” Specific behavior, such as who the customers are calling. The Amdocs memo says the system should be used to prevent phone fraud. But U.S. counterintelligence analysts say it could also be used to spy through the phone system. Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible.

Another briefing document said, ‘It has become increasingly apparent that systems and networks are vulnerable… Such crimes always involve unauthorized persons, or persons who exceed their authorization…citing on exploitable vulnerabilities.’ Those vulnerabilities are growing, because according to another briefing, the U.S. relies too much on foreign companies like Amdocs for high-tech equipment and software. Fox News has documents of a 1997 drug trafficking case in Los Angeles, in which telephone information, the type that Amdocs collects, was used to ‘completely compromise the communications of the FBI, the Secret Service, the DEA and the LAPD.’

BRIT HUME, HOST: Last time we reported on an Israeli-based company called Amdocs Ltd. that generates the computerized records and billing data for nearly every phone call made in America. As Carl Cameron reported, U.S. investigators digging into the 9/11 terrorist attacks fear that suspects may have been tipped off to what they were doing by information leaking out of Amdocs.” (Transcripts of Fox News Special Report with Brit Hume, from December 11-14, 2001) – and

“Amdocs Limited was founded by Avi Naor. Avi served in the Israeli army, and holds a BSC degree in computer sciences from the Technion Israel Institute of Technology. In 1976 he joined the Aurec Group, and in 1982 he founded Amdocs.

Naor also founded an organization by the name of Mahal2000 and serves as it’s director. Mahal is the Hebrew acronym for “Overseas Volunteers” and is a non-profit organization dedicated to enabling young (ages 18-23 ) overseas Jews to volunteer for service in the IDF, followed by a commitment to Jewish community service in their country of origin. Mahal2000 cooperates directly with the IDF, Ministry of Interior and many others in order to facilitate the enlistment of overseas volunteers. What this smells like is an active global training programme for spies, including their deployment overseas at conclusion. It even spells out specifically what non-Jews can do for the programme in this following excerpt obtained here:

“Since then however, the policy has been to restrict service in the armed forces to citizens of Israel, Jews as well as Christians, Moslems, Druze and others, and to non-Israeli Jews so as to avoid placing at risk persons who do not have this connection to Israel. In addition, the maximum enlistment date limit is the 23rd birthday for men and the 20th for women. Unfortunately no exception can be made.

You have the opportunity, however, to take your place defending Israel on the ‘public relations front’. Today, wars and battles are often won or lost on TV screens, in the minds and hearts of good people. Therefore, public relations is no less important than planes and tanks. You could, for example, volunteer to be a PR Ambassador of and explain to others what it means for Israel to be the sole democracy in a region comprising 23 dictatorships (including 5 out of the world’s 7 state sponsors of terrorism and about half of the world’s major terror groups). Of the 19 most repressive regimes in the world, 7 are in Arab states and Iran. Arab regimes and Iran are also a breeding ground for advocating Jihad (Holy War) against all non-Muslims (Christians, Hindus, Buddhists, Animists and Jews included) and openly seek world domination and the ultimate destruction of freedom.” The very nature of this enterprise confirms the fact that Avi Naor is very currently active in military circles within Israel. Also of note regarding Amdocs, is that Israeli spies using the cover as “art students’ were arrested for gaining access into the offices and even the homes of federal law enforcement agents and government officials. Thirteen in all were busted and the two principals of the operation were Itay Simon and Michael Calmanovic, who were bailed out immediately by Amdocs employee Ophir Baer, who posted their $50,000 bond. While in custody, Simon told his interrogators that he “did classified work for the Israeli army.” According to the report, “Simon refused to answer questions about his military service” As for Calmanovic, he stated that he was a recently discharged “electronic intercept operator for the Israeli military”. One striking fact stands out, and that is the large number of “art students” who were experts in the art of handling explosives. What were these guys doing during their stay in this country before it was so rudely interrupted by the feds or, rather, what were they preparing to do? (Leaked Government Report Exposes Israeli Spy Ring by Justin Raimondo) –

The FBI was probing allegations that the government of Israel had penetrated four White House telephone lines and was able to relay real-time conversations on those lines from a remote site outside the White House directly to Israel for listening and recording. The article also charged that the FBI was investigating whether similar penetrations had been made into State Department lines, possibly Pentagon lines and, most interesting, into unlisted, secret lines used by the FBI in its counterintelligence work, including its probe into the Israeli penetration already being investigated. The two reporters said the FBI investigation had been launched in late 1996 or early 1997 when a local telephone company manager became suspicious of an Israeli employee of Amdocs, an Israeli company that sells billing software to telephone companies. The American telephone manager’s suspicions came to the attention of the CIA, the reporters said, which turned the matter over to the FBI. The Israeli worked as a subcontractor on a telephone-billing program being developed for the CIA, and was married to an Israeli woman employed in the Israeli Embassy in Washington. In a search of the husband’s workplace, the FBI found a list of the FBI’s most sensitive telephone numbers, including the Bureau’s “black lines” that FBI counterintelligence used to keep track of the suspected Israel spy operation, the reporters noted. They reported also that husband-and-wife assignments are common in the Mossad. (Report of Israeli Eavesdropping on White House Telephones gets Varying Media Treatment By Richard H. Curtiss) –

More than two dozen U.S. intelligence, counterintelligence, law-enforcement and other officials have told Insight that the FBI believes Israel has intercepted telephone and modem communications on some of the most sensitive lines of the U.S. government on an ongoing basis. The worst penetrations are believed to be in the State Department. But others say the supposedly secure telephone systems in the White House, Defense Department and Justice Department may have been compromised as well.

The problem for FBI agents in the famed Division 5, however, isn’t just what they have uncovered, which is substantial, but what they don’t yet know, according to Insight’s sources interviewed during a year-long investigation by the magazine. Of special concern is how to confirm and deal with the potentially sweeping espionage penetration of key U.S. government telecommunications systems allowing foreign eavesdropping on calls to and from the White House, the National Security Council, or NSC, the Pentagon and the State Department.

This discovery by Division 5 should have come as no surprise, given what its agents had been tracking for many months. But the FBI discovered enough information to make it believe that, somehow, the highest levels of the State Department were compromised, as well as the White House and the NSC. According to Insight’s sources with direct knowledge, other secure government telephone systems and/or phones to which government officials called also appear to have been compromised.

The subcontractor was employed by an Israeli-based company (*Amdocs) and cleared for such work. But suspicious behavior raised red flags. After a fairly quick review, the CIA handed the problem to the FBI for follow-up. This was not the first time the FBI had been asked to investigate such matters and, though it was politically explosive because it involved Israel, Division 5 ran with the ball. “This is always a sensitive issue for the Bureau”, says a former U.S. intelligence officer. “When it has anything to do with Israel, it’s something you just never want to poke your nose into. But had too much potential to ignore because it involved a potential systemwide penetration.”

As for how this may have been done technologically, the FBI believes it has uncovered a means using telephone-company equipment at remote sites to track calls placed to or received from high-ranking government officials, possibly including the president himself, according to Insight’s top-level sources. One of the methods suspected is use of a private company that provides record-keeping software and support services for major telephone utilities in the United States.

A local telephone company director of security Roger Kochman tells Insight, “I don’t know anything about it, which would be highly unusual. I am not familiar with anything in that area”. U.S. officials believe that an Israeli penetration of that telephone utility in the Washington area was coordinated with a penetration of agents using another telephone support-services company to target select telephone lines. Suspected penetration includes lines and systems at the White House and NSC, where it is believed that about four specific phones were monitored — either directly or through remote sites that may involve numbers dialed from the complex.

“[The FBI] uncovered what appears to be a sophisticated means to listen in on conversations from remote telephone sites with capabilities of providing real-time audio feeds directly to Tel Aviv”, says a U.S. official familiar with the FBI investigation. Details of how this could have been pulled off are highly guarded. However, a high-level U.S. intelligence source tells Insight: “The access had to be done in such a way as to evade our countermeasures … That’s what’s most disconcerting.”

Despite elaborate precautions by the U.S. agencies involved, say Insight’s sources, this alleged Israeli intelligence coup came down to the weakest link in the security chain: the human element.

The technical key appears to be software designs for telephone billing records and support equipment required for interfacing with local telephone company hardware installed in some federal agencies. The FBI has deduced that it was this sophisticated computer-related equipment and software could provide real-time audio feeds. In fact, according to Insight’s sources, the FBI believes that at least one secure T-1 line routed to Tel Aviv has been used in the suspected espionage.

The potential loss of U.S. secrets is incalculable. So is the possibility that senior U.S. officials could be blackmailed for indiscreet telephone talk. Many officials do not like to bother with using secure, encrypted phones and have classified discussions on open lines. (Insight Magazine – FBI Probes Espionage at Clinton White House By J. Michael Waller and Paul M. Rodriguez) –

Also of interest is the fact that the Chief Operations Officer (COO) of Amdocs in 2003 was a man named Sami Totah. Totah is a veteran of Israel’s military intelligence group Unit 8-200 and is now the Eternal Director of ECTel.

Vuance Ltd. formerly SuperCom

VUANCE Ltd. (formerly SuperCom) is an established Solution Provider, providing its customers with innovative Incident Management, Asset Management, e-ID solutions. ( –

SuperCom, Ltd. is engaged in research, development and marketing of advanced technologies and products for smart-card solutions and government e-ID projects. SuperCom offers a wide range of standard and customized smart card-based solutions for physical and logical security, education, corrections facilities and air & seaports. SuperCom is also a leader in the manufacturing of secure and durable documents such as national identity cards, passports, visas, drivers’ licenses and vehicle registration. Together with its subsidiaries, SuperCom offers advanced, innovative and flexible solutions in contact and contactless smart-card technologies. Headquartered in Israel, SuperCom has subsidiaries in the US and Hong Kong.

New York, NY, and Raanana, Israel, October 11, 2004 — SuperCom, Ltd. (Euronext: SUP) a leading smart card and e-ID technology integrator and solutions provider serving governmental and commercial markets, announced today that the United States Government Printing Office (GPO) has informed that the Company’s proposal as a prime contractor for the integration of smart card technology in the US new electronic passports has been accepted for award.

This project is considered to be the largest and most advanced smart passport project in the world to date. The US authorities have announced multiple awards for the implementation of the project that will include the production of smart inlay for the new passports with a sophisticated chip containing personal identification such as biometric data This type of passport will be difficult to forge and will replace the traditional passport that contained a printed personal photograph and was considered to be easy to falsify. The scope of the project based on the RFP is estimated at 50 million passports over the following five years.

In this project, SuperCom will supply the smart card technology that it has developed over the recent years including the smart chip with an operating system and antenna that is embedded in the passport. (SuperCom Wins Tender for the Integration of Technology in the United States Smart Passport) –〈=en-US&mkt=en-US&FORM=CVRE

KADIMA, Israel — ” SuperCom Ltd. has unveiled new technology for active tracking of people and assets.

The Israeli provider of smart card and electronic identification products has developed movement detection technology that can monitor and track numerous items simultaneously. The tracking technology employs small, low-powered RF tags attached to an object or a person. License-free radio bands are used to track the RF band from a programmable transmitter.

SuperCom claims its Pure RF product can monitor and locate tagged items using a hand-held tracking device, which can also be integrated into cellphones.

With an eye on the U.S. homeland security market, the company has appointed former CIA Director R. James Woolsey as chairman of its advisory board. (Tracking Technology could have Homeland Defense Apps by Joel Bainerman) –

R. James Woolsey served as Director of Central Intelligence from 1993-1995. He is currently Vice President of Booz Allen Hamilton’s Global Strategic Security practice. Woolsey previously served on the National Commission on Terrorism. He was Under Secretary of the Navy, Ambassador to the Negotiation on Conventional Armed Forces in Europe (CFE), and was General Counsel to the U.S. Senate Committee on Armed Services. Woolsey was appointed by President Reagan as Delegate at Large to the U.S.-Soviet Strategic Arms Reduction Talks (START), and the Nuclear and Space Arms Talks (NST). He also was an Advisor with the U.S. Delegation to the Strategic Arms Limitation Talks (SALT I). Woolsey served on the President’s Commission on Defense Management, President’s Commission on Federal Ethics Law Reform, and President’s Commission on Strategic Analysis. He was a Captain in the U.S. Army and was a staff member for the National Security Council. Mr. Woolsey is a graduate of Stanford (P! hi Beta Kappa), holds an M.A. from Oxford University (where he was a Rhodes Scholar), and received a L.L.B. from Yale Law School (where he was Managing Editor of the Yale Law Journal). ( –

As persistent and as dilligently as I tried, I could find nothing on the backgrounds of either Supercom or Vuance’s founders as of this writing. All search results were heavily sanitized and filtered from any of the numerous entries I tried to locate them on. Also, please bear in mind that any of the links I’ve posted could be taken down at any time by the very parties who wish this information to remain covert.

Adnan Khashoggi, GCN, the Protocols, Alex Jones, and the 9/11 Truth Movement

ConCen Blog Feature

By Mifune
The Conspiracy Central Blog
Monday, July 9, 2007

Adnan Khashoggi is the individual who owns Genesis Communications Network, famous for hosting such heavyweight radio personalities as Alex Jones, self proclaimed “Grandfather of the 9/11 Truth Movement,” and Jeff Rense.

According to a 2004 article by Daniel Hopsicker from MadCow Morning News:

“Info on Khashoggi runs the gamut from the ridiculous to the sinister. To get the serious stuff out of the way first:

Khashoggi was among a number of prominent Arab businessmen, like Khalid Mahfouz, who agreed to continue what have been described by US intelligence officials as “protection payments” to bin Laden at a meeting in Paris in 1998, said London’s Sunday Business Post October 7, 2001.

Even Khashoggi’s guru has CIA connections, we learned: the vastly rich swami has been under official suspicion in the assassination of Indian Premier Rajiv Ghandi, and was even arrested by Indian police for currency fraud.

Adnan Khashoggi revealed: He is wanted in Thailand, where he was convicted for fraud in absentia; is currently being sued, in a major and well-publicized case in Federal Court in Minneapolis for what may turn out to be criminal fraud; reportedly, he is also currently the subject of a massive investigation being conducted by the U.S. Attorney in Los Angeles.

Add to that the recently declassified American intelligence report from 1991 listing the top 100 drug traffickers and associates. It included lawyers, right-wing paramilitary fighters, a Peruvian rebel commander, a Colombian singer, a pre-dead Pablo Escobar, a pre-jailbird Manuel Noriega… and Adnan Khashoggi.”

Further quoting the same article,

“From their base in Tampa Florida, Khashoggi and El Batrawi controlled a network of companies, all using the word “Genesis” in their name. The number of Khashoggi-owned Genesis companies we’ve found keeps growing. There is, or was, Genesis Aviation, Inc., Genesis Aviation II, Genesis Diversified Investments, Genesis Studio and Production Corp., Genesis Media Group, Genesis Properties, Genesis Intermedia;; Genesis Delaware; Genesis Florida… The list, it do go on. And on.”

And then there’s the Genesis Communications Network. There’s actually two of them, seemingly unrelated, but they’re so extremely similar in the fraud department to each other and to “Saudi Genesis” that the relationship appears strongly familial. We’re still uncertain as to how close they all are; kissing cousins, at the very least.

The first GCN is a so-called “patriot” network hosting Alex Jones and Dave Van Kliest, the, ah, the individual fronting for the latest See the Flash extravaganza, advertisements for which are spamming the Internet at a rate that must be causing concern among conservationists of our digital landscape of ‘1’s and ‘ 0’s.’

VanKliest is our pick for Disinfotainer of the Year… an especial honor, considering that there was some fierce competition. Of course, “See the Flash Dave” from the powerhour, like Alex Jones, is part of the GENESIS Communications Network.

As if that weren’t enough, evidence from an investigation into the death of Princess Diana indicates that Dodi Al Fayed was the nephew of none other than Adnan Khashoggi. The following quote is from the blog Shaphan, in a 2006 article entitled “Collision or Collusion:”

Adnan Khashoggi. Not named by Stevens. But he turns up, I think, in the evidence of Richard Tomlinson [p.827]. In 1992 I was working on an operation to recover high-tech weapons from the former Soviet Union. This operation was being conducted in collaboration with a very powerful arms dealer whose exact identity I did not know. When I read the file I discovered that this arms dealer was in very frequent contact with Mr Mohamed Al Fayed. I saw that the MI6 informant supplying this information had a code beginning with P, followed by several numbers. As this source was mentioned several times I tried to find out who it was. It was a Frenchman who was head of security at the Ritz Hotel. Stevens discounts the part about the P source in the Ritz but doesn’t address or dispute the claim about the “very powerful” arms dealer whom Al-Fayed saw ‘very frequently’. Al-Fayed’s first wife Samira, the mother of Dodi Fayed, was Adnan Khashoggi’s sister. According to the Paget Report, Dodi had bought a £130k engagement ring for Diana that afternoon and intended proposing imminently. The Daily Express newspaper [caveat lector] cites an author who alleges that Dodi spoke with his Uncle Adnan (by phone?) on the evening of his death – i.e. they were close. The possibility that princes William and Harry would be spending their adolescent summers in Adnan Khashoggi’s mansion in Monaco would have been motive enough for Edinburgh, Blair and MI6 to act to prevent it, for justifiable reasons of national security.” Shaphan, Collision or Collusion, 19 December, 2006, Revised 8 January, 2007.

To top it all off we have evidence that Khashoggi is connected to former Nazis, the Bilderberg Group, Japanese Yakuza, and President Marcos of the Philippines, famous as a dictator from 1960 to 1982. Quoting from Yeadon and Hawkings’ 2004 book, The Nazi Hydra in America – How America’s Right Wing Politicians are Plunging the Country Into a Fascist Police State,

“The Bilderberg group held its first meeting in 1954. The Bilderberg group was founded by Prince Bernhard of the Netherlands and former
officer in the SS.
Bernhard had also worked in I.G. Farben’s notorious NW7 group, which served as spies for the Third Reich. The Prince
is also associated with the Knights of Templar, through its Dutch variety. Bernhard was appointed to govern the Dutch order in 1954.
John Foster Dulles was reported to have been one of the most helpful Americans in establishing the Bilderberg group. Incidentally, in
1954 Dulles testified in favor of a bill designed to return vested enemy assets such as GAF, to their previous owners. From the beginning,
the Bilderberg group had several members of the intelligence community associated with it. Sir Colin Gubbins, Britian’s wartime SOE
head, was a founding member. Walter Bedell Smith was a co-chairman of the group in the US. (644)”

“A partial list of significant events of 1954 follows: After learning about the Japanese treasures in November 1953, Marcos starts digging
for gold in the Philippines.
Fred Meuser, Lockheed’s European Director, transfers to Geneva to live, this event figures in later. The Four-
Power Treaty is signed in Paris to terminate the occupation regime in Germany. Germany joins NATO. Geneva Accord reached regarding
peace between France and Indochina. Additionally, 1954 was the year that Edward Landsdale arrived in Vietnam to take over the opium
trade. The Israeli Mossad and US CIA formed an intelligence “partnership.” Nazi gold was moved from Argentina to the Philippines in
1954 after the Mosad determined it was located in Argentina.

One of the earliest documents attesting to Marcos’s recovering the treasure of the Golden Lily is a gold certificate dated 1956. (646)”

Another gold certificate was issued on January 17, 1963 by Unions Bank of Switzerland. The certificate was issued to Adnan Kasogi.
Adnan Kasogi was actually Adnan Khashoggi, a Marcos crony.
Khashoggi’s name was misspelled, but that is often the case in these
certificates. Khashoggi was a Lockheed agent and partner of Yoshio Kodama. Kodama was a Japanese rear admiral during the war and
also a member of the Japanese Yakuza crime clan. Kodama was charged with shipping the loot to the Philippines during the war. This
gold certificate was issued just before Lockheed paid the first known bribe to Prince Bernhard. Lockheed was being used by the CIA to
funnel money worldwide. Moreover, Lockheed’s European Sales Director, Dutchman Fred Meuser, had been a member of Prince
Bernhard’s wartime air force squadron. An additional member of the Lockheed bribe team was CIA officer Nicholas Deak. Deak had
founded a money brokering firm that was used to funnel money to Kodama. Deak’s company later merged with Lionel C. Perera, who
founded the money firm of Perera, Manfra & Brookes. Perera was attached to the Chief of Military Government Finance Office at the
Third Army’s headquarters in Germany at war’s end, where he interviewed Colonel Rauch. Rauch was the SS colonel responsible for
hiding the Reich Bank gold reserves. (646)”

Now just recently, we have a report from the Times Online: Egyptian billionaire ‘who spied for Mossad’ found dead.

Here’s the kicker: Adnan Khashoggi was one of his associates.

An Egyptian billionaire financier who feared for his life after being accused of being a Mossad spy was found dead outside his Mayfair flat yesterday in suspicious circumstances.

Ashraf Marwan, the son-in-law of the late President Gamel Abdel Nasser, was found beneath his fourth-floor flat in Carlton House Terrace.

Police were treating his death as suspicious. Friends of Mr Marwan, a former shareholder in Chelsea Football Club, said that he had feared assassination after being named three years ago as an agent during the Yom Kippur war.

Rumours of his death circulated in London’s Arab community last night. Some believe that he may have taken his life after a serious illness was diagnosed.

Mr Marwan’s death will send shockwaves across the Middle East and among some of Britain’s wealthiest people. His associates included Adnan Khashoggi, the arms dealer, Ken Bates, the football club chairman, the Libyan leader Colonel Muammar Gaddafi and the late Tiny Rowland.

At this point I would like to broach the subject of The Protocols of the Learned Elders of Zion, or as one author, Laura Knight Jadczyk, has called them, The Protocols of the Pathocrats, in her February 2006 editorial by the same title. I agree with her statement:

“In this week’s podcast we discuss what we have identified as the very first problem that must be solved in order for positive changes to be undertaken in American and elsewhere in the world: the Media.

Knowledge is power. Those who control information can control the masses; it’s that simple.

As we researched the subject of the media, we came across The Protocols of the Learned Elders of Zion. As everyone knows, this is a vicious anti-Semitic hoax. We agree. We do not for a minute think that this represents Judaism or ordinary Jewish people.

What was shocking for us was our realization that the Protocols is being implemented almost line by line by many of the members of the Bush Administration and the various government ‘think-tanks’ that formulate their policy. In other words, the Protocols is not a hoax because it is nonsense, but rather it is only a hoax because it was attributed to Jews.

Here, we present the text of Protocol 12 from which several excerpts were read on the podcast and which we jokingly referred to as “The Gospel According to Karl Rove.”

Read it and understand that this is, indeed, the number one issue that America must deal with before they can do a single other thing.”

This is not to say that there are not Zionists involved in the plan to bring about a one world goverment. I would like to focus on one particular portion of Protocol 12, which pertains to control of the press.

“8. Literature and journalism are two of the most important educative forces, and therefore our government will become proprietor of the majority of the journals. This will neutralize the injurious influence of the privately-owned press and will put us in possession of a tremendous influence upon the public mind …. If we give permits for ten journals, we shall ourselves found thirty, and so on in the same proportion. This, however, must in no wise be suspected by the public. For which reason all journals published by us will be of the most opposite, in appearance, tendencies and opinions, thereby creating confidence in us and bringing over to us quite unsuspicious opponents, who will thus fall into our trap and be rendered harmless.

9. In the front rank will stand organs of an official character. They will always stand guard over our interests, and therefore their influence will be comparatively insignificant.

10. In the second rank will be the semi-official organs, whose part it will be to attack the tepid and indifferent.

11. In the third rank we shall set up our own, to all appearance, opposition, which, in at least one of its organs, will present what looks like the very antipodes to us. Our real opponents at heart will accept this simulated opposition as their own and will show us their cards.

12. All our newspapers will be of all possible complexions — aristocratic, republican, revolutionary, even anarchical – for so long, of course, as the constitution exists …. Like the Indian idol “Vishnu” they will have a hundred hands, and every one of them will have a finger on any one of the public opinions as required. When a pulse quickens these hands will lead opinion in the direction of our aims, for an excited patient loses all power of judgment and easily yields to suggestion. Those fools who will think they are repeating the opinion of a newspaper of their own camp will be repeating our opinion or any opinion that seems desirable for us. In the vain belief that they are following the organ of their party they will, in fact, follow the flag which we hang out for them.”

In light of all of this, certain questions need to be asked:

  • Can we honestly consider any radio personality broadcasting on GCN to be free of ulterior motives, such as Alex Jones gatekeeping[1] in terms of Mossad connections to 9/11, or steering the 9/11 Truth Movement into ineffectiveness and hyper-emotional states of mind?
  • Can anyone who holds any position of prominence within GCN’s management, be considered free of ulterior motives and/or ties to the rogue network? I’m looking at you, Ted Anderson.
  • I have one more question, which I ask you all to consider deeply: Is the real role of Genesis Communications Network to “present what looks like the very antipodes” to the power elite of the Monolithic and Ruthless Conspiracy?

Don’t answer right away. Just think about it. For those of you who are wondering, I don’t think that Daryl Bradford Smith is much better as a source of information; he covers Zionism, but falls into racism and hate speech. The issue of Zionism must be approached delicately and precisely in order to be fought properly.



  1. During a broadcast of Infowars on February 18, 2007, Alex Jones made the following statement:

    “Watson: …and the Jewish Conspiracy angle.

    Alex Jones: Now let’s be clear. Neither I, Avery or Fetzer, uh, think it’s an Israeli attack. In fact, they’ve had national polls of people who believe it’s an inside job, 7% believe Israel was involved. “

    The broadcast from which this excerpt was obtained can be downloaded from here. Start listening at 84:30 to hear the exact quote.