It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
PTECH & 9-11
The dependence of the U.S. government and military on computer systems, which run on software provided by outside vendors, is the Achilles' heel of the world's most powerful nation. 9-11 was clear proof of that fundamental weakness and vulnerability.
9-11 was a computer crime. Apart from being a monstrous crime of mass murder and false flag terrorism, 9-11 was also a sophisticated computer crime, carried out through long-term foreign infiltration of the most sensitive U.S. military and government computer networks.
This infiltration, carried out by a foreign intelligence agency, gave the perpetrators of 9-11 "real-time" access to all the data on the computers of the U.S. government and military. On 9-11, this "super-user" access to the data of the most critical government computer networks gave the terrorists the ability to thwart the military response to the emergency as it developed.
Most importantly, the terrorists who committed 9-11 through their "super-user" access to the most critical computer networks of the U.S. government still have that access. The evidence indicates that this infiltration was carried out by the military intelligence agency of the State of Israel.
During these early 9-11 "truth" events, a small Massachusetts-based software company called Ptech was brought up by Singh, who sought to link it to Arab terrorists.
Ptech was said to be a start-up company from Quincy, Mass. whose software was loaded onto the most sensitive computer systems across the U.S. government, including those of the Federal Aviation Administration (FAA) and the U.S. Air Force, two agencies whose systems failed miserably on 9-11.
Singh, a senior consultant with JP Morgan Chase on 9-11, is described as a "whistle-blower" because of her revelations about Ptech's involvement with the critical computer systems that failed on 9-11.
"Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA -- that there was a window of opportunity or to insert software or to change anything -- it would have been Ptech along with MITRE."
en.wikipedia.org...
Daniel M. Lewin
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Daniel "Danny" Mark Lewin (Hebrew: דניאל (דני) מארק לוין; May 14, 1970 – September 11, 2001) was a mathematician and entrepreneur, best known for co-founding internet company Akamai Technologies.
Lewin was born in Denver, Colorado and raised in Jerusalem, where he served for four years in the Israel Defence Forces. He was an officer in Sayeret Matkal, an elite and secretive intelligence unit.
He attended the Technion university in Haifa, Israel while simultaneously working at IBM's research laboratory in Haifa. While at IBM, he was responsible for developing the Genesys system, a processor verification tool that is used widely within IBM and in other companies such as AMD and SGS Thompson.
Man who set up Operation Gladio tells Italy's largest newspaper attacks were run by CIA, Mossad
Paul Joseph Watson
Prison Planet
Tuesday, December 4, 2007
Former Italian President and the man who revealed the existence of Operation Gladio Francesco Cossiga has gone public on 9/11, telling Italy's most respected newspaper that the attacks were run by the CIA and Mossad and that this was common knowledge amongst global intelligence agencies....
....Cossiga's new revelations appeared last week in Italy's oldest and most widely read newspaper, Corriere della Sera. Below appears a rough translation.
"[Bin Laden supposedly confessed] to the Qaeda September [attack] to the two towers in New York [claiming to be] the author of the attack of the 11, while all the [intelligence services] of America and Europe ... now know well that the disastrous attack has been planned and realized from the CIA American and the Mossad with the aid of the Zionist world in order to put under accusation the Arabic Countries and in order to induce the western powers to take part ... in Iraq [and] Afghanistan."
Cossiga first expressed his doubts about 9/11 in 2001, and is quoted in Webster Tarpley's book as stating that "The mastermind of the attack must have been a “sophisticated mind, provided with ample means not only to recruit fanatic kamikazes, but also highly specialized personnel. I add one thing: it could not be accomplished without infiltrations in the radar and flight security personnel.”
Cossiga's revelations contributed to an Italian parliamentary investigation of Gladio in 2000, during which evidence was unearthed that the attacks were being overseen by the U.S. intelligence apparatus.
In March 2001, Gladio agent Vincenzo Vinciguerra stated, in sworn testimony, "You had to attack civilians, the people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple: to force ... the public to turn to the state to ask for greater security."
Google Video Link |
Investigative journalist Joseph Trento will later report that in 1976, the Safari Club, a newly formed secret cabal of intelligence agencies (see September 1, 1976-Early 1980s), decides it needs a network of banks to help finance its intelligence operations. Saudi Intelligence Minister Kamal Adham is given the task. “With the official blessing of George H. W. Bush as the head of the CIA, Adham transformed a small Pakistani merchant bank, the Bank of Credit and Commerce International (BCCI), into a world-wide money-laundering machine, buying banks around the world to create the biggest clandestine money network in history.” BCCI was founded in 1972 by a Pakistani named Agha Hasan Abedi, who was an associate of Adham’s. Bush himself has an account at BCCI established while still director of the CIA. French customs will later raid the Paris BCCI branch and discover the account in Bush’s name. [Trento, 2005, pp. 104] Bush, Adham, and other intelligence heads work with Abedi to contrive “a plan that seemed too good to be true. The bank would solicit the business of every major terrorist, rebel, and underground organization in the world. The intelligence thus gained would be shared with ‘friends’ of BCCI.” CIA operative Raymond Close works closely with Adham on this. BCCI taps “into the CIA’s stockpile of misfits and malcontents to help man a 1,500-strong group of assassins and enforcers.” [Trento, 2005, pp. 104] Soon, BCCI becomes the fastest growing bank in the world. Time magazine will later describe BCCI as not just a bank, but also “a global intelligence operation and a Mafia-like enforcement squad. Operating primarily out of the bank’s offices in Karachi, Pakistan, the 1,500-employee black network has used sophisticated spy equipment and techniques, along with bribery, extortion, kidnapping and even, by some accounts, murder. The black network—so named by its own members—stops at almost nothing to further the bank’s aims the world over.” [Time, 7/22/1991]
Entity Tags: Kamal Adham, Agha Hasan Abedi, Bank of Credit and Commerce International, George Herbert Walker Bush, Raymond Close, Central Intelligence Agency, Safari Club
Category Tags: Soviet-Afghan War, Pakistan and the ISI, Saudi Arabia, Terrorism Financing, BCCI
According to the information, the Mosad elements tried to impede the takeoff of the aircraft so that they could act and obtain the notepad. Having failed, they resorted to advanced Israeli computer capabilities to control the plane, especially that Sharm al-Shaykh is not very far from Israeli sites equipped with these capabilities. This way they managed to remote control the airliner and plunge it into the Red Sea immediately after it had taken off.
Communications expert Muhammad al-Tahir who participated in jamming lots of hostile stations, says that Sharm al-Shaykh airport's proximity to the Red Sea, and the presence of a great number of yachts and private vessels at the harbor, arouse suspicion that the scheme was willfully executed.
The Egyptian expert sees that one of the yachts in the sea could be equipped with electronic jamming devices and instruments that direct certain vibrations at the planes when they take off, especially that the airport is very near to the sea.
The communications expert who has spent over 44 years in this field says: "The jamming caused by vibrations aimed direct at the plane could make the pilot lose control of the airliner, which is corroborated by foreign eyewitnesses who saw the entire plane plunge suddenly into the sea".
Originally posted by Boone 870
reply to post by ULTIMA1
How does being able to make an airliner crash equate into being able to take over and remotely control it?
How did they fly into the World Trade Center and Pentagon using radar or whatever magical technology that is implied to be used?
Originally posted by Boone 870
Do you have the link?
How does being able to make an airliner crash equate into being able to take over and remotely control it?