-
The True History
of Our National Debt
THE COMING BATTLE
$25.00 PPD
-
Barbarians Inside The Gates
Book I The Serpent's Sting
Book II The Viper's Venom
By Col. Donn de Grand Pré
(available here
click the image)
informative please help
by making a donation to
ETERNAL VIGILANCE
of $10 or more to help defeat
the New World Order.
Thank you for your support.
Use Digital Liberty Dollars
to purchase or donate.
Contact
Links
- A RETURN TO TRUTH,
JUSTICE, AND
THE AMERICAN WAY - Dave Baugh's Website
Help Dave Overcome His
Unlawful Incarceration - Studio C -
Jeff Thomas' Blog
Jeff is the producer for
The Derry Brownfield Show - Henk Ruyssenaars -
Foreign Press Foundation - Jeff Wells - Rigorous Intuition
- Swan of Tuonela
- Bob Chapman's Train Wreck
of the Week and the
International Forecaster - The Political Cesspool
With James Edwards &
Austin Farley "The South's
Foremost Populist
Radio Program"
Third Parties
- The Nationalist Party USA
- The American Patriot Party
- The America First Party
- The Constitution Party
- 06/01/2003 - 07/01/2003
- 07/01/2003 - 08/01/2003
- 08/01/2003 - 09/01/2003
- 09/01/2003 - 10/01/2003
- 10/01/2003 - 11/01/2003
- 11/01/2003 - 12/01/2003
- 12/01/2003 - 01/01/2004
- 02/01/2004 - 03/01/2004
- 03/01/2004 - 04/01/2004
- 04/01/2004 - 05/01/2004
- 05/01/2004 - 06/01/2004
- 06/01/2004 - 07/01/2004
- 07/01/2004 - 08/01/2004
- 08/01/2004 - 09/01/2004
- 09/01/2004 - 10/01/2004
- 10/01/2004 - 11/01/2004
- 11/01/2004 - 12/01/2004
- 12/01/2004 - 01/01/2005
- 01/01/2005 - 02/01/2005
- 02/01/2005 - 03/01/2005
- 03/01/2005 - 04/01/2005
- 04/01/2005 - 05/01/2005
- 05/01/2005 - 06/01/2005
- 06/01/2005 - 07/01/2005
- 07/01/2005 - 08/01/2005
- 08/01/2005 - 09/01/2005
- 12/01/2005 - 01/01/2006
- 01/01/2006 - 02/01/2006
- 02/01/2006 - 03/01/2006
- 03/01/2006 - 04/01/2006
- 05/01/2006 - 06/01/2006
- 06/01/2006 - 07/01/2006
- 07/01/2006 - 08/01/2006
- 08/01/2006 - 09/01/2006
- 09/01/2006 - 10/01/2006
- 10/01/2006 - 11/01/2006
- 12/01/2006 - 01/01/2007
- 05/01/2007 - 06/01/2007
Archives
Newsworthy Postings
Thursday, June 22, 2006
Networks Using Israeli ‘Security’ Software
By Christopher Bollyn
June 26, 2006 | American Free Press
The most critical computer and communication networks used by the U.S. government and military are secured by encryption software written by an Israeli “code breaker” tied to an Israeli state-run scientific institution. This comes on the heels of public outrage that stymied a U.S.-brokered deal in which a foreign firm would take control of several U.S. ports.
On March 28, 2006, a Bedford, Mass.-based company called RSA Security, Inc. issued a press release, which revealed that the National Security Agency (NSA), the U.S. intelligence agency with the mandate to protect government and military computer networks and provide secure communications for all branches of the U.S. government, would be using its security software.
RSA stands for the names of the founders of the company: Ronald L. Rivest, Adi Shamir and Leonard M. Adleman. Shamir, the lead theoretician, is an Israeli citizen and a professor at the Weizmann Institute, a scientific institution tied to the Israeli defense establishment.
“My main area of research is cryptography—making and breaking codes,” Shamir’s web page at the Weizmann Institute says. “It is motivated by the explosive growth of computer networks and wireless communication. Without cryptographic protection, confidential information can be exposed to eavesdroppers, modified by hackers, or forged by criminals.”
AFP inquired with the NSA about its use of Israeli-made security software for classified communications projects and asked why such outsourcing was not seen as a national security threat. Why is “America’s cryptologic organization” using Israeli encryption codes? NSA spokesman Ken White said that the agency was “researching” the matter and would respond in the coming week. By the time AFP went to press, White had not responded to requests for more information.
AFP has previously revealed that scores of “security software” companies—spawned in Israel—have proliferated in the United States.
For example, Unisys integrated Israeli security software, provided by the Israel-based Check Point Software Technologies and Eurekify, into its own software, so that Israeli software now “secures” the most sensitive computers in the U.S. government and commercial sector.
RSA, an older security software company, acquired an Israeli-run security software company, named Cyota, at the end of 2005 for $145 million.
In January 2005, Cyota, “the leading provider of online security and anti-fraud solutions for financial institutions,” had announced that “security expert” Amit Yoran had joined the company’s board of directors. Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national “cyber czar,” having served as director of the Department of Homeland Security’s National Cyber Security Division.
Yoran had been appointed “cyber czar” at age 32 by President George W. Bush in September 2003.
Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million.
Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at West Point. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the various systems that apparently failed on Sept. 11, 2001.
Before founding Riptech in 1998, Yoran directed the vulnerability-assessment program within the computer emergency response team at the U.S. Department of Defense. Yoran previously served as an officer in the U.S. Air Force as the Director of Vulnerability Programs for the Department of Defense’s Computer Emergency Response Team and in support of the Assistant Secretary of Defense’s Office.
In June 2005, Yoran joined the board of directors of Guardium, Inc., another Israeli-spawned “provider of database security solutions” based in Waltham, Mass.
Guardium is linked with Ptech, a Quincy, Mass., computer security company that was providing computer security to key government agencies during the 9-11 attacks.
Ptech’s official history states that it was founded by a Lebanese Muslim and funded by a Saudi millionaire. Yet Ptech’s clients included all the key federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service and even the White House.
The marketing manager at Ptech, Inc. when the company started in the mid-1990s, however, was not a Muslim or an Arab, but an American Jewish lawyer named Michael S. Goff.
In the wake of 9-11, during the Citizens’ Commission hearings in New York, Indira Singh, a consultant who had worked on a Defense Advanced Research Project, pointed to Ptech and MITRE Corp. being involved in computer “interoperability issues” between the FAA and NORAD. At this time, however, Ptech’s ties to Arabs was the focus, and Goff was out of the picture.
Editor's comment: Chris Bollyn turns in another outstanding piece of investigative journalism. In the process, he uncovers yet another link of possible Israeli espionage to the events of 9-11-2001.
Given the previous information revealed concerning Ptech and the theft and worldwide black marketing of knock-off versions of PROMIS software, these latest revelations fit into the scheme of things quite nicely and show that the U.S. is a proxy state for Israel and not vice versa.
So deeply entrenched is the Israeli espionage apparatus within the corporate structure of the U.S. government that, short of wholesale elimination of these companies and the spooks who operate them, regaining control of the sovereign power of this nation would be an all but impossible task.
What is so amazing is that the NSA would allow any foreign-linked company, whether or not based in the U.S., to become a source for technology used to secure the nation's most high level computer systems.
This is incompetence and treason at the highest levels and further proof that the neocon managers who have infiltrated key agencies in the past few decades are the source of all of the intrigue and sell outs which are promoting the Israeli, Marxist version of the New World Order in an attempt to pre-empt the Bush Crime Family version of soft fascism.
Dual-loyalists abound within the ranks of the government-corporate symbiant. The story outlined above about the Yoran brothers is the epitome of dual-loyalist treason.
We can best draw an analogy to this modern day betrayal from an earlier era and the words of Teddy Roosevelt from a speech to the Knights of Columbus on October 12, 1915:
"There is no room in this country for hyphenated Americanism. When I refer to hyphenated Americans, I do not refer to naturalized Americans. Some of the very best Americans I have ever known were naturalized Americans, Americans born abroad. But a hyphenated American is not an American at all. ... The one absolutely certain way of bringing this nation to ruin, of preventing all possibility of its continuing to be a nation at all, would be to permit it to become a tangle of squabbling nationalities, an intricate knot of German-Americans, Irish-Americans, English-Americans, French-Americans, Scandinavian-Americans or Italian-Americans, each preserving its separate nationality, each at heart feeling more sympathy with Europeans of that nationality, than with the other citizens of the American Republic. ... There is no such thing as a hyphenated American who is a good American. The only man who is a good American is the man who is an American and nothing else."
Woodrow Wilson followed the same thought with this utterance:
"Any man who carries a hyphen about with him carries a dagger that he is ready to plunge into the vitals of this Republic whenever he gets ready."
-
Download Evidence Eliminator⢠software and protect your PC from investigations.
Click here to download
FAIR USE NOTICE: The content on this site may be copyrighted material, and the use of it on this site may not have been specifically authorized by the copyright owner. Such material is made available on a non-profit basis for educational and discussion purposes only. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in 17 USC § 107. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.