You are viewing an obsolete version of the DU website which is no longer supported by the Administrators. Visit The New DU.
Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Reply #8: PTEC access to the FAAs entire computer system for two years before- [View All]

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » September 11 Donate to DU
Al-CIAda Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-19-05 03:25 PM
Response to Original message
8. 
A software company called Ptech, founded by a Saudi financier placed on Americas Terrorist List in October 2001, had access to the FAAs entire computer system for two years before the 9/11 attack.

Indira Singh
P-Tech - Saudi cover-up

by Daniel Hopsicker
February 5 2004-- Venice, Florida.
Last week, when the National 9/11 Commission held hearings on The Aviation Security System and the 9/11 Attack, government and aviation officials described a system unprepared for the events that unfolded on September 11. None of them, however, mentioned security breaches involving Saudi terrorists in the basement of the FAA.

Yet that's what happened, according to a high-level risk analyst who had troubling dealings with the firm.

"Ptech had a couple of very troubling client relationships," states risk architect and whistleblower Indira Singh, "one of which was with the FAA. One of the 'persons of interest' in the investigation had a team in the basement of the FAA for two years."
Con't-
http://www.madcowprod.com/mc4512004.html

==========
The following report links the Saudi Royal family (linked to the fascist Muslim Brotherhood Secret Society), to the Bush Administration, to a Christian Cult in the U.S. known as "The Family" (which is also linked to Bush & Cheney) to Nazis and Neo-Nazis.

These are the people who pulled off 9/11. The following piece is 6,000 words with 2,000 additional words in footnotes. Well worth the read:

PTECH, 9/11, and USA-SAUDI TERROR - Part I
PROMIS Connections to Cheney Control of
9/11 Attacks Confirmed
by Jamey Hecht

With research assistance by Michael Kane
and editorial comment by Michael C. Ruppert

FTW: You said at the 9/11 Citizens' Commission hearings, you mentioned - it's on page 139 of transcript - that Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Indira Singh: Yes, I have a good diagram for that.

FTW: And that relationship had been going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that the Secret Service is among the government entities that had a contract with Ptech. Mike Ruppert's thesis in Crossing the Rubicon, as you know, is that the software that was running information between FAA & NORAD was superseded by a parallel, subsuming, version of itself that was being run by the Secret Service on state of the art parallel equipment in the PEOC with a nucleus of Secret Service personnel around Cheney. In your view, might it have been the case that Cheney was using Ptech to surveil the function of the people in FAA & NORAD who wanted to do their jobs on 9/11, and then intervene to turn off the legitimate response?

Indira Singh: Is it possible from a software point of view? Absolutely it's possible. Did he (Cheney) have such a capability? I don't know. But that's the ideal risk scenario - to have an overarching view of what's going on in data. That's exactly what I wanted for JP Morgan. You know what's ironic about this - I wanted to take my operational risk blueprint which is for an operational event going wrong and I wanted to make it generic for extreme event risk to surveil across intelligence networks. What you're describing is something that I said, 'boy if we had this in place maybe 9/11 wouldn't have happened.' When I was going down to DARPA and getting these guys excited about creating an extreme event risk blueprint to do this, I'm thinking of doing exactly what you're saying Cheney might have already had!
***
I believe that Dick Cheney also had the ability using evolutions of the PROMIS software, to penetrate and override any other radar computer or communications system in the government.

Full story-
http://www.fromthewilderness.com/free/ww3/012005_ptech_...

=======

Audio from the NYC "9/11 Omissions Hearings"

PART I- Vital Questions NOT ANSWERED, Comission comprimised, 'Failure' rewarded
http://www.septembereleventh.org/documents/911conPartI-...

PART II-
http://www.septembereleventh.org/documents/911conPartII...

PART III-
http://www.septembereleventh.org/documents/911conPartII...

PART IV-PTEC Stock Monitoring and Terrorism Financing (JP MORGAN & CHASE)
http://www.septembereleventh.org/documents/911conPartIV...


To site-
http://www.911Truth.org /
Printer Friendly | Permalink |  | Top
 

Home » Discuss » Topic Forums » September 11 Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC