Donate.

Advertisement

PROMIS, PRISM, PALANTIR, PEGASUS Exposed! NSA Surveillance 2019 Documentary [SWAY GUEVARA MIRROR]

Please select playlist name from following

[ MIRROR] from SWAY GUEVARA
PROMIS, PRISM, PALANTIR, PEGASUS Exposed! NSA Surveillance 2019 Documentary
Published on Jun 5, 2019

1 Comments

Please login to comment

Video Transcript:

I think anybody heard a Pine Gap Australia? There's this huge listening post out in the middle of an almost exact center of Australia that's designed to listen to all the communications coming from all the satellites because it's got a good wheel of a lot of the Southern facing satellites. So that's Pine Gap and they write about it down in the Australian papers about how this is our link to the, you know, the sauce, the spy sky. It basically just enables this thing that, you know, it's called echelon. A lot of people heard about a carnivore, you know, it's the email version of that. And you know, it brings us to a back of our friends, you know, the NSA. And this is a great one. I picked this up off the EFF site. They got a lot of great images there and it's just kind of funny. We're going to be talking about anybody heard a room 641A? We're going to be talking about that in a minute. So it's interesting because the EFF has done a lot of research on the NSA and what, you know, what their civil liberties are. And they've even developed these maps that, you know, and it's funny, they even call it the octopus, the NSA surveillance octopus, you know, and where all these data transmitters and look, see we look right up here, up in the corner there. We got one right up there, right nearest, right out of sight of Seattle. It's right here, Yakima, Washington. And so, you know, I couldn't help but just turn the octopus the other way because that's what it is. The NSA octopus, you know, and they basically, they got us, you know, they got all our data, they got all our stuff. And yeah, speaking AT&T. And so anybody know who this is? Mark Klein, I'll give you a hint, it's named Mark Klein. And so once again, he used to be up, you know, AT&T and that switching center up in the San Francisco Bay Area that broke the story. And so, it broke the story on what we see here, room 641A. And it was this mysterious room that nobody could get into except like one person that had, that broke the story on what we see here, room 641A. And it was this mysterious room that nobody could get into except like one person that had super secret security clearance from the NSA because the only guy that could get in here. And it turned out, it was this guy. Mark Klein was the guy who was coming in later to do the maintenance on the system and whatever. And he kept hearing this reference to this room 641A and I got the name of the process. There's a certain process that's in there like SP3 or something like that. And he kept hearing about all these references. What's this, I don't need to get in here, what's in there? And so he started investigating, he turned out to be his own investigative reporter. And so the 641A, nobody knew what was in there. They thought it was like mission control, you know, like the control dome. And so, but it was probably just a bunch of hackers in there, you know. But basically what happened is that he had come across some of these documents at the AT&T facility and somehow or another, he leaked them out or snuck them out or whatever. And he got it basically, here it is, the SG3 LGX, he had, imagine having that in your basement. And so, and actually here's another better shot of it in color that the EFF had created for us. Thank you EFF. And so, and so basically does exactly what Promas wanted to do, you know, 30 years ago. But now, you know, they got a box to do it and just pifed right into the, you know, all your communications go right through this box. Any email you send probably gets sent through this 641A, this SG3 HOOF. It's a spy scandal that's already rocked the White House and intrigued that could threaten the presidency of George Bush. This story centers on incredible allegations of spying on a scale never before imagined. It involves America's Central Intelligence Agency selling computer programs to foreign nations. These programs allegedly allowed the CIA to spy on the intelligence agencies that bought it. You can turn back now or learn the stuff they don't want you to know. Here are the facts. In August of 1991, the corpse of journalist Danny Casillaro was found in the top of Sheraton hotels room 517 in Martin's Burg, West Virginia. He had 10 to 12 slash wounds on his wrist. Investigators also found a suicide note nearby. Coroners twice ruled the death of suicide. However, Casillaro's family believed there was more to the story. In the time leading up to his death, Danny Casillaro had become increasingly panicked. He told his brother that anonymous callers harassed and threatened him on the phone, which is Housekeeper confirmed. Casillaro also told his confidence that if he died, it would not be a suicide. Instead, he implied it would have something to do with his latest investigation. A massive conspiracy of silence touching on everything from surveillance software to the October surprise, Iran Contra, and more, bridging generations and reaching all the way to the White House. Danny Casillaro called this conspiracy the octopus. Here's where it gets crazy. Today, most people have not heard of Danny Casillaro. What was he working on? What happened to him on the night of his death? According to witnesses, he was traveling to Martin's Burg to meet with a contact, possibly regarding the now obscure ins law case. In the 1970s, an IT company named Inslaw developed a people tracking program called the Prosecutor's Management Information System, or Promise. A data traveling to Martin's Burg to meet with a contact, possibly regarding the now obscure ins law case. In the 1970s, an IT company named Inslaw developed a people tracking program called the Prosecutor's Management Information System, or Promise. A data mining tracking system easily decades ahead of its time. The deal went sour, and Inslaw eventually took the Department of Justice to court, alleging that the United States did not honor the contract. Inslaw argued that the government pirated this software, sold it to other countries, and tried to bankrupt and silence their company to stop the truth from getting out. This came forth, including former Mossad Deputy Director Rafael Etan, who claimed that US and Israeli intelligence agencies who operated to sell a Trojan horse version of Promise to foreign governments. It's possible that Kasselero's investigation began here, but soon he stumbled into what he believed was an international web of espionage, assassination, drugs, illegal weapon trades, and more. He traced the ring leaders to the upper reaches of private security firms, the CIA, and the Reagan era White House. Today, questions about the events persist and remain unanswered. The arrest of draw on increasingly complicated links between events alleged to be part of the octopus, but how much of this is mere conjecture. It's common knowledge that the world's intelligence agencies have and will murder to keep secrets, but did they murder Denny Kasselero, or did he commit suicide? Newmer's people, including former congressmen and other journalists, don't believe the official story. And more than 20 years later, questions remain. Did someone murder Denny Kasselero? On the theft of the ins law software, which belonged to a couple called Hamilton in Washington, who developed this case management software that was just the bees and bees at the time, and the Justice Department showed it an interest in buying it and then developing it. And they ended up in effect stealing it from the Hamilton and letting it loose all around the world to the Saudis, to the Israelis, to the Canadians. You name it, they had it. But with this backdoor feature that allowed US intelligence to be monitoring it, anyway. So that's just the bare bones of the ins law software connection. And there were many investigations and they drew contrary conclusions of whether the Justice Department really acted with malfeasance here. But to me, the matter is pretty much settled. And then this document alone, which I'm going to read to you about Kasselki. Okay. Okay, here we go. This is dated May 16, 1985. It's addressed to William Weld, US Attorney. It's signed by W Bradford Reynolds, Assistant Attorney General of the Civil Rights Division. I'm going to first read the document and they comment on it. As agreed, Messeurs, Manik Kuer, Gorbara Fawar, Adnan Kasselki, and Richard Armichage will broker the transaction of Promise software to shake Khalid Bin Mahfouz for real ill and general distribution as gifts in his region. He continues upon the three conditions we last spoke of. Promise must have a soft arrival, no paperwork, customs or delay. It must be equipped with the special data retrieval unit. As before, you must walk the financial aspect through CreditSWiz International Commercial Bank. And we will encounter any problems contact me directly. And people should know that Kasselki is best buddies with none other than Donald Trump. And this is going on at the time of these Iran arms dealings with these railings. Promise software is a revolutionary computer program developed in the 1970s by a former NSA programmer and engineer Bill Hamilton. In terms of computer programs, it represents the universal translator of Star Trek. Promise stands for Prosecutors Management Information System. It's able to read and integrate any number of different computer programs or databases simultaneously, regardless of language or operating system. According to Bill Hamilton, the inventor, Edwin Messe, Reagan's Attorney General, along with Dr. Earl Bryan and others stole the amazing software, modified it, installing a trap door into that would allow those who knew of it to access the program and other computers. And then sold the software overseas to foreign intelligence agencies. Bill Hamilton knew his software had been stolen when requests for tech support came in from people he hadn't sold it to. The Israeli Masad under Rayfi Aiton began modified the software and sold it throughout the Middle East using British publishing magnet Robert Maxwell as a cutout. The revolutionary software allowed almost anyone with the trap door code to enter every database and every computer and every language it will simultaneously. This ability represents perfect information gathering, technology that is undetectable. The ultimate prize of every intelligence agency in the world. The CIA through GE Aerospace in Hurned, and Virginia, GAO Contract Number 824620. The FBI and the NSA modified the back door, but more importantly had enhanced the ultimate program with artificial intelligence or AI. The program which came to be called other names such as SMART had originally been capable of automatically and secretly drawing any information from any computer and all computers connected to the internet. The contractor that added the artificial intelligence component GE Aerospace was purchased by Martin Mary Eda which merged with Lockheed Martin, the largest defense aerospace contractor in the world. Ed Mies was not the only one who recognized the potential promise in promise. Democrats had their own moves. Jackson Stevens is a presidential kingmaker, a lifelong supporter of George Bush and anapolis roommate of Jimmy Carter. The billionaire Stevens firm Systematics later Axecom had made the illegal software with banking software. In late 70s and 80s Systematics handled roughly 70% of all electronic banking systems in the US. Stevens teamed with the War of the Bank, Lipo Group, and BCCI, the Drug Intelligence Bank, to penetrate every banking system in the world. Promise software could be used to influence and predict financial markets worldwide. When Clinton was out of funds during his campaign it was Jackson Stevens that loaned him 3 million to keep it going. Herbert Pug Winocruer CEO of Dine Corp from 1989 to 1997 is a PhD mathematician from Harvard, where the mathematical breakthroughs using block modeling gave rise to artificial intelligence. In the 60s Winocruer did research for the DOD on the causes of inner city unrest in the wake of the 1967 Detroit riots. Dine Corp was heavily involved in the evolution of promise software. Winocruer is a member of the Board of the Harvard Endowment, which is not a benevolent university fund, but an aggressive predatory investor with 19 billion in assets invested in a hub subsidized housing, high tech defense operations, and George Bush's failing oil company, Harkin Energy. The Harvard Endowment saw its holding skyrocket in the last decade, making 33% in 1999. That was the same year HUD announced a manual adjustment to reconcile a $59 billion accounting shortfall between its accounts and the US Treasury account. Geomatics is a company at the heart of the Canadian Space Program and associated with Lockheed Martin. This uses remote sensing from space to locate natural resources such as oil, precious minerals, and other commodities. In the commodities market of the world, this kind of perfect information is the ultimate tool to predicting and controlling markets. Remote sensing can closely estimate the size of harvest of agricultural commodities such as coffee or oranges. The ultimate information on the size of the orange harvest translates potentially to millions of dollars in the US commodity markets alone. Exploration for oil and gas can be very expensive, but advances in imaging technology, GPS global positioning systems, and remote sensing technologies have advanced light years over the last few decades. This situation is custom made for enhanced promised software with backdoor technology. What better way to map and inventory the world's resources by making each client nation pay for it? Promise software makes it possible to compile a worldwide database on every marketable natural resource. Artificial intelligence enhanced promise-based programs would be the perfect setup to make billions of dollars in profits by manipulating the futures trade in, for example, a rare metal like tungsten, or exploiting a sudden surge in the price of gold in platinum. The Royal Canadian Mountain Police, RCMP, were sold's promised software to use in their intelligence gathering operations, and began to suspect that their copies may have been altered, and possibly all of their files were transparent and had been so for some time. The RCMP had been given their version of promise by the Canadian Security and Intelligence Services CSIS, which was created with the assistance and direction of the CIA. RCMP investigators stated that they and the CSIS had a rivalry similar to the one between the CIA and FBI. And questioned whether any intelligence agency created by the CIA could be completely loyal to its native country. They further stated that they knew that the NSA had compromised their communications equipment. The Canadians put out a report that friendly nations were stealing sensitive technology, particularly related to aerospace, biotechnology, chemicals, communications, information technology, mining, and metallurgy, nuclear energy, oil and gas, and the environment. The doctored versions of promised software were acquired from both Robert Maxwell and Dr. Earl Bryan. Bryan is a medical doctor who founded Hadron and had been involved in shady dealings with firms connected with disease research, cytology, and biotechnology. Hadron is at the heart of the US government operations involving biowarfare and vaccines. Ari Ben Manashi is Israel's top spy who in reports was linked to Iran's contra scandal and the October surprise in selection in 1980. Promise software is described in his book, Prophets of War. The inventor of promised software hired Army CID investigator Bill McCoy to investigate the theft, but the famed investigator who had broken many of the Army's biggest cases was found dead of a heart attack. Within 48 hours of his death, McCoy's body was cremated and two days later all of his files, furniture, and personal belongings had been removed from his home. His home was then painted and sanitized. The promised saga leads to more than a dozen deaths, many of which share the same pattern. Within 48 hours of death, the body is cremated. Residences are sanitized and all records disappear. From Rupert Murdock. In the current market, a good friend of mine helped write a book with another friend of mine, Jim Keith, called the octopus, the secret government and the death of Danny Castellero, which is what we're going to talk about here today. And so there's Ken and his little conspiracy scene called Steam Shuffle Press. And so we basically cut to that. Yeah, and so basically Jim Keith and Ken wrote this synopsis about Danny Castellero and they basically wrote this book. So this is Danny. I guess I should dedicate this presentation to Danny's memory because he's no longer with us. He wouldn't have really enjoyed a book like this. I should point out that Jim Keith, who isn't in this photo, but we'll see him later, he also died actually Burning Man a few years back. And so a lot of people associated with this story have died in one way or another. In fact, there's some researchers say there's up to 40 people who have died under mysterious circumstances associated with this story. And so hopefully we're not one of them. Anyway, so this is Danny. We're going to be talking about him a lot later. So there's this octopus. Danny was investigating something called the octopus. And the octopus basically had one to control everything. All of our basically entire society, our infrastructure, who we pay our taxes to, what the whole thing is about. So this octopus basically came across this piece of software called Promise from A to Z, for example, would go out and get everything to the least common denominator, go out and search everything at once, and then come back and sort it all out and figure out what all that stuff was and then make information out of it. In today's age, that would be like Google or something. Any of the stuff that's out there now, we'll see as the presentation goes on that a lot of the things that happen out here now, especially in terms of Trojans and viruses and things like that are exactly what Promise was designed to do because Promise was a data miner. And so we'll see here in a minute. And in fact, let me back up a slide to this enterprise slide because today we call it enterprise with a cloud or whatever. And so basically what it was designed to do was go out and it didn't matter what system it was on or what where it was at, depending on what system it was installed on, it would basically go out and get everything down to its least common denominator and then bring it all back and sort it all out and then spit out some information. Unlike any other software at the time, 1978, 1979. And the company that released this software is called Insla, the Institute for Law and something, something, something, they're actually still in business, believe it or not, after being almost driven out of business by the government as we will soon. And so there's this Promise software. And here's an example of basically what it could look like because it's out on the market today. And so this is basically an example of something that Promise might do. And it was the first software to let somebody figure out like be able to sort by a defendant or attorney involved or whatever. You know, they could sort by all these different things. It's like Excel is today, but you know, today what they had needed in mainframes to do before, of course, we can do, you know, on a Macbook Pro. But at the time, this was like revolutionary software, processing where we get everything down to that least common, where it used to that now. But back then, that wasn't the case. And so it's very interesting that basically everything we built, everything today that we built on is all based on on this kind of computing power. And so basically, Promise wanted to get down to that root level, figure out all the data and try to make sense of it and then bring it all back. It's basically almost artificial intelligence at the time. And we'll soon see that they use this kind of software to basically develop almost all the technology that we're used to. Today, you know, we're about to, we know it as like the social network. And this, in crossing the Rubicon, I have one whole chapter on Promise, but Promise, which stands for Prosecutors Management Information System, PROMIS, which was its original name in the early 1980s. Appears in about, I have 32 chapters in the book and Promise appears in probably 11 of them. Now what Cynthia was asking and what you were talking about, and to illustrate the case, there's another company that you and I are extremely familiar with called DineCorp, which has been very closely connected. I wrote a major exposé on Promise in October of 2000 after the National Security Staff of the Royal Canadian Mounted Police came to ask me questions about how their promise software got compromised. The story's on the From the World and its website. But DineCorp, aside from being everywhere and doing everything possibly dirty, DineCorp also operates the telephone systems for the United States House of Representatives and the United States Senate. The billing records are maintained by an Israeli company called Amdox, which monitors every phone call, call, every phone call, placed, every bill, every time, the duration of every call, who made the call, et cetera, et cetera, et cetera. We know that DineCorp has Promise. And this is where I truly wish our dear friend and colleague Catherine Austin Fitz were here today because I would speak this on her behalf because she was my teacher on this. What we see is that all these government agencies, as a result of promise and promise progeny, promise enhanced versions with artificial intelligence being in the hand of private corporations, has turned the entirety of the United States government into a franchise feeding trough for the benefit of private corporations. The government belongs to private corporations when you consider that another company known to have promise, aside from DineCorp, is Lockheed Martin, who's on his board of directors at Lynn Cheney, the vice president's wife, until he took office. She was also in the PEOC Presidential Emergency Operations Center with her husband on the morning of 9-11. How did she get in? She didn't hold the government office. New information on the cold case investigation of a 1981 ranch of Moran's triple murder. News Channel 3 has learned three local Indian tribes are part of the investigation into these murders. News Channel 3's Nathan Baca joins us tonight with a look at what these three tribes are suspected of doing. Nathan. Tower John, the three tribes under investigation are the cabisons, the Santa Rosa and the Torres Martinas. They are suspected of setting up secret, experimental weapons testing deals in the 1980s. Three people who knew too much were murdered execution style in 1981. Riverside County cold case detectives pleased the documents you were about to see are what they died for. New documents reveal how local Indian tribes were involved in bringing large caliber weapons testing to the Coachella Valley. Riverside County Sheriff's Department cold case detectives are looking into whether a former cabison Indian vice chairman was murdered in 1981 with two other people in this home to keep these weapons deals secret. An experimental electromagnetic weapon called a rail gun was on the testing list. Documents show a 1980s business partnership between the cabison band of mission Indians and security contractor Wacken Hut to form cabison arms. This is Santa Rosa Mountain near Highway 74 where the secret weapons testing was meant to take place. Nullian cover documents show the Santa Rosa band of Indians was working with the cabison Indians. They plan to build the experimental weapons in the mountain south of Pinyu Pines. To find out more about rail guns we talked to UC Riverside physics professor Dr. Harry Tom. A rail gun is an electric operated gun. It uses only a battery and you send electricity through the projectile itself and you make it propel. This recent video from US Navy weapons testing shows how gunpowder isn't needed to hurl a giant bullet at supersonic speeds. It is the future of artillery but it's so hard to perfect it's been tested for 30 years. We asked the Santa Rosa band of Indians at pursuing weapons testing requiring enormous amounts of electricity and environmental dangers fits in with its promise to protect the natural resources of sovereign tribal land. The tribe has not responded. In the last few weeks the police have been working on the mission of the transport and the mission of the family. This video shows how gunpowder isn't needed to hurl a giant bullet at supersonic speeds. It is the future of artillery but it's so hard to perfect it's been tested for 30 years. We asked the Santa Rosa band of Indians at pursuing weapons testing requiring enormous amounts of electricity and environmental dangers fits in with its promise to protect the natural resources of sovereign tribal land. The tribe has not responded. Additional documents show the Torres Martina's tribe granted cabison arms company the right to test large-scale weapons on 30,000 acres near the salt and sea. Torres Martina's tribal leadership have also not responded to our questions. Considering the Indian tribes and moved on with their large casinos, experimental weapons testing deals 28 years ago may not seem to matter anymore. But three people were murdered 28 years ago in Rancho Maraj. They left behind family members that search for their killers to this day. Many of the small-scale weapons testing were later used for the Nicaraguan Contra Gorillas that became the focus of the Iran Contra scandal in the 1980s. Wagonhut Corporation withdrew from doing business locally for a while but it is back. Now winning the contract for jail security and desert hot springs. Approval of professional services agreement with Wagonhut for jail security services for the police department. This is quite frankly right up Wagonhut so you know, alley. I was in favor. I opposed. Motion carries 5-0. The crimes of decades past are being investigated once again by local detectives, looking into whether three people died to bury the secrets, now finally coming to light. The Department of Justice official is involved in a criminal conspiracy to force ins law, a small computer company, out of prison. A top secret government computer program comes back to haunt the US. Tonight you'll see how that program is now being connected to multiple local murder cases. It's 11 o'clock time for news. Now from the desert's news leader, KESQ News Channel 3 HD at 11. Hello, I'm Tamar Demonti. And I'm John Weither and new developments tonight in the year long news channel 3 investigation. The Riverside County Sheriff's Department is looking into possible connections between a triple murder back in 1981 and a murder suicide in 2005 that claimed six lives. It's a story you will only see right here on News Channel 3 at 11, the reporter Nathan Baca. John Tamar we have internal documents from the cold case division of the Riverside County Sheriff's Department showing the depth of the investigation. We will not reveal the investigators identity at this time since the documents show their lives may be in danger. Now we are learning the murders may be a cover up for one of the federal government's most secret computer programs. Promise is the name of one of the government's most secret computer database programs. Computer programmer Michael Ricanasciuto wrote in this affidavit that major modifications to the program were made here in India. On July 1st 1981, Fred Alvarez, his girlfriend, Patty Castro and friend Ralph Booger were shot to death here on Bob Hope Drive and Rancham Raj. There was a house here that has since been bulldozed. Nobody was ever arrested for the shooting. Family friends say, Kazan Band of Mission Indians vice chairman Fred Alvarez was going to blow the whistle on this documents. When the early 1980s showing a business partnership between defense contractor Wacken Hut services and cabison manager John Philip Nichols to form cabison arms. One of their alleged projects was the promise computer program database and pattern recognition software was a new source of information and power in the early 1980s. It starts with the program's designers ins law corporation accused the US Justice Department of stealing the software for their own foreign policy purposes. This programmer testified he altered the program to create what's in the distribution of this software were involved in covert operations. And they were involved in Nicaragua and Central America. And they were involved in operations in the Middle East. This US Justice Department memo from 1985 shows the promise software was being sold to Middle Eastern arm dealers and want to know paperwork or customs inspections to interfere. Even unsolved mysteries got on the case from the last journalist to investigate this spy scandal was found dead in his hotel room. Danny Kessler was risks were slashed in 1991. It was ruled a suicide. But his reporter notes disappeared and the book on the conspiracy he was to title. India was never finished congressional hearings were held in 1992. Describes of committees investigation into serious allegations at high level Department of Justice officials. For involved in a criminal conspiracy to force ins law a small computer company out of business. The hearings ended in conclusively. The promise software was allegedly altered on tribal land in India with a lack of federal oversight. And just like Microsoft Windows the database program kept up with the times upgraded several times over the years. But promise came back to haunt America in ways never imagined. There were a disturbing indication that Robert Hansen the FBI man accused of spying for the Russians and what officials said at the time of his arrest was a massive security breach ended up helping Usama bin Laden. His correspondent Carl Cameron reports Hansen sold the Russians an extremely sensitive piece of US technology and the indications are that they in turn sold it to bin Laden's al-Qaeda terrorist network. From an office in India to foreign capitals all over the world several murder investigations are connected to this spy scandal. Whether answers can still be found 27 years later remains in the hands of the sheriff's cold case squad. She was looking at p-tech software to implement the next generation of risk management enterprise architecture software at JP Morgan. But became suspicious after she began her own investigation into the company. She uncovered information that indicated that p-tech was running at software with access to the most sensitive parts of an organization cyber infrastructure in the basement of the FAA on the morning of 9-11. Hours after the president and CEO walked out the federal agents went in raiding this non-descript building in suburban Boston looking for evidence that could tie the computer consulting for p-tech to international terrorism. P-tech CEO is Osama Ziyadi. This is him three years ago in Saudi Arabia. He's pictured with a man named Yassin El-Kadi, a Saudi named by president Bush as a financial backer of Osama bin Laden. Yassin El-Kadi is a fits in this category of wealthy Saudi businessmen who believe in and finance radical Islamic extremist groups worldwide. In an investigation done by CBS station WBZ TV, three sources say Al-Kadi is the chief financial backer of p-tech. Then there's p-tech board member Yaku Mierza. He's an officer for a string of Islamic charities which have been a concern to the US government. This becomes all the more alarming when you learn exactly what it is p-tech does. The company works in enterprise architecture, the blueprinting of an entire computer network. Computer consultant Indira Singh says such a company could gain full access to a client's data. That could be rather dangerous. It could be devastatingly dangerous. Especially when you examine the roster of p-tech's clients, the company's webpage lists the FBI, the IRS, NATO, the Air Force, the Naval Air Command, the departments of energy and education, the postal service, the US House of Representatives. Other sources say p-tech has done business with the Department of Defense, the Secret Service, even the White House. And that gives you a tremendous opportunity if you're so inclined to examine, manipulate, download all of the most sensitive information of whoever it is you've contracted with. Absolutely. Absolutely. But tonight, the National Security Agency tells CBS News it is absolutely convinced p-tech software is safe. I'm sure that in the end they're going to find that there's nothing of interest here. But experts like Matthew Levy, look at Yasin Elkati and disagree. For someone like that to be involved in any- What can a test do is that by noon or one o'clock, they told us we had to move from that triage site up to paste university a little further away because building seven was going to come down or being brought down. Did they actually use the word brought down and who was it that was telling you this? The Fire Department and the Fire Department and they did use the word we're going to have to bring that we're going to have to bring it down. Who's really behind p-tech is the question? Correct. I asked that of many intelligence people who came to my aid as I was being blacklisted and I was told in Dira, it is a CIA clandestine op on the level of Iran Contra and I have reason to believe this because care international that was mentioned in one of the slides is a renamed version of Al-Qifa which was the funding arm for WTC 93 prior to Al-Qifa. It was called Maktavel Kitamat which was the funding arm for the Afghani Muja Hidin. It was how the money's got to a some of been laden through the Pakistani ISI. I asked the FBI and Boston how come Mak was being run out of p-tech and 911. And that jived with a lot of what Intel was telling me that it's a CIA front shut up and go away. At that level I said, well why doesn't the FBI take advantage of their celebrated differences with the CIA and I was told because at that level they worked together. They are not. That's a zero. And you go, we got two minutes so next question. Is there a connection between this software and the old ins law software? The old ins law software is promised. P-tech is actually more sophisticated version. It's a place. P-tech and it's hard. It's software that builds other software with such capability. So it's a more agile, adaptable version of it. Okay. And you go, we got two minutes. So next question. Is there a connection between this software and the old ins law software? The old ins law software is promised. P-tech is actually more sophisticated version. It's a place. P-tech and it's hard. It's software that builds other software with such capability. So it's a more agile, adaptable version of it. Singh was hired as a consultant for JPMorgan Chase to develop the next generation of business architecture enterprise software. The software she was seeking to implement at JPMorgan Chase, one of the largest financial institutions in the world, was specialized cutting edge risk architecture software that would essentially be artificially intelligent and capable of scanning through the millions of transactions taking place across the JPMorgan Chase institution. In real time, monitoring these transactions for suspicious activity such as rogue trading and would then be able to alert the proper people within the JPMorgan institution to the problem and potentially even stop the transactions from taking place. The importance, sensitivity, and sophistication of any such software necessarily led Ms Singh to seek out the true leaders in the enterprise architecture software industry. Her research and due diligence into the issue led her to a company called P-tech. As the senior risk management consultant for one of the largest financial institutions in the world, Ms Singh knew to trust credible proven sources of third-party software. That's why P-tech's roster of clients immediately put them in the top echelon of software providers. P-tech's clients included some of the most sensitive organizations and agencies in the United States government, including NATO, the US Armed Forces, Congress, the Department of Energy, the Department of Justice, the FBI, customs, the FAA, the IRS, the Secret Service, and the White House. This sterling roster of clients made India a very eager to take a look at P-tech's software. However, when the P-tech representatives arrived at the JPMorgan Chase offices to display and present their software, Ms Singh knew there was something wrong right away. Well, if this is true, did you not report this P-tech as a private company? So this relationship would have been privy only to those on the inside. I said, did you report it anywhere? That's someone who has been placed in the US terror list is key funder, angel investor, to a company whose software is utilized at the highest levels of almost every government and military and defense organization in this country, the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the US Navy, the US Air Force, and last but not least, the Federal Aviation Administration. Are you saying these were all P-tech clients? These were all P-tech clients, and when I was evaluating them, I was pretty impressed. Why not P-tech? Exactly. They're being used at the highest levels of all of these organizations. So I was very excited about using them and having their software be able to be a heart of what I wanted to develop. And I had no reason to believe that if they were in use everywhere, that caliber, that I would have a problem. They're also used in Enron, perhaps I should have talked twice about that, but at use in IBM, of course, and the top accounting firms, and even in the FBI, in Miter. What is Miter? Miter is a large company that does specialized technology for defense and intelligence. You would not expect to have an exposure with the company that was so well-entrenched and embedded in these kinds of organizations. What do you mean by the source code? Well, all software products have some group or organizational person rights code that is then packaged up. And for instance, the word processor in your desk, the waspred sheet, and so on and so forth, the browser is all written in some sort of code. Those are the keys to it. And if you wanted to improve it, add new functionality, you would change the original code and add new functionality, and then repackage it and send it out there. So whoever had access to the source code of P-tech, that was where the value was. If you lost the source code, you essentially lost the product. For all intents and purposes, marketing point of view. So only one or two people would have access to the source code. It would be like having the formula for Coca-Cola, basically, was the perfect day. And yes, you needed inside knowledge. And yes, P-tech with all its myriad associations would have had the inside knowledge. And yes, P-tech was a CIA front. And yes, a P-tech was protected. So was it an inside dog? You don't have to look at this indirectly. This is direct. This requires direct investigation. Again, that's a stunning interview. Jam packed with incredible information that goes to the very heart of 9-11. And I suggest that people who find this information important and find the controlled corporate media's complete blackout on this information, reprehensible, do their own part to get this word out by spreading the word about Indira Singh and this breakthrough interview. Remarkably enough, considering the bombshell information provided by this corporate whistleblower, Indira Singh, about this company, which actually operated in the basement of the FAA with complete and total access to every operational detail, including their management of interoperability systems with NORAD that could have directly affected the response of NORAD on 9-11. Absolutely nothing has resulted from the FBI investigation of this company. Another hit game that was developed was Tetris, which he first licensed from at Soviet Creator in 1987, where there's some negotiations with the Soviet government as well on that or dealing with the Russians. The difference between negotiating the rights for Tetris is not that different than negotiating a nuclear-armerant disarmament treaty with them. The fight for Tetris' rights began. Whole books have been written on this fight, and all the companies involved in it. The only thing that's ever really certain about this, one of the first times an Eastern product had hit paid at in the West, is that Pigeon of himself didn't see a single cent of Tetris' profit until well after the fall of the wall. Mirrorsoft were one of the most focal companies when it came to securing the rights to Pigeon of Skame, in spite of the overtures of Nintendo, who wanted Tetris as one of the launch titles for their new handheld system, the Game Boy. The whole thing was outrageously shady. Mirrorsoft and Maxwell's claim was that they had the rights to Tetris because the American company spectrum Holibite, you know, the sister company of Mirrorsoft, that's also under the Maxwell Umbrella, had purchased the rights to it from Andromeda. But where did Andromeda get the rights from? Did they even have the right to sell the rights to Tetris? In any case, Mirrorsoft wanted nothing less than exclusivity to Tetris, a piece of every version of the game, and would seemingly do just about anything to secure that. It was even reported that Robert Maxwell himself had stepped in to help vocal a deal through his connections. And yes, you may well wonder exactly what that meant. Maybe he sought an audience with Gorbachev himself to try and get the game. Yeah, probably not. However, Mirrorsoft were able to sell Tetris for computers using those rights from Andromeda, and naturally did so pretty sharpish all things considered, resulting in the sale of what is probably the most successful game on various computers through 1987 and 1988. Mirrorsoft's version of Tetris is, as you would probably expect, the one that hands up the Soviet mystique the most. It's right there in the box, are tanned right there in the title, which did more than anything to popularise the classic trope that in order to write in Russian, all you do is write the arsly other way around. As for the game itself, well, it's Tetris basically. The music is pretty cracking throughout, actually, which is nice, but the game does default to having these backgrounds in the world that make it incredibly hard to see what's going on. And his job was to, he walked both sides of the fan-former of the road. He was extraordinary. I mean, one day he would be with President Reagan in the White House. The next day he would be in the Kremlin doing a deal, which would be in favour of Israel. And I remember what David Kimschi, the former Deputy Director of of Mosah, told me, he said, you know, Robert Maxwell had one philosophy. It was Israel first last in all, but never forget that when you write about him. He was for us a great patriot. And that was so, but therefore you may wonder, well, why did they have to get rid of him? Well, what happened? Maxwell became more and more in love with himself, I suppose, with his power, his authority, his connections. Nobody he felt could dare challenge him, dare say no to him. He once said, prime minister, come and go, presence, come and go, but I'll be here forever. And so what happened on that premise? He was approached by Vladimir Khoyschev of the KGB to ask him if he would assist in a plot to overthrow Mikhail Gorbachev, who had just taken power in Russia, was being a democracy perestroika into that devastated country. And Maxwell thought, well, it's a deal for me here. And they said, well, you can handle the national debt if we pull this off. And that would have meant a very good take for him, because he's on 15 percent of everything you get on that. So he went to Israel and he said to his friends at Mosah. How about this? Shall we get involved? We should get involved, he kept saying. And he outlined what the plan was. What he hadn't realized, he had totally miscalculated one thing. There were those high up in this early government and in Mosah, who were horrified at the idea that anybody would want to remove Gorbachev because it would immediately bring them into confrontation with United States, America saw Gorbachev as the only possible hope for salvation in Soviet Union, which was powerful threat that they thought against it. So in fact, it wasn't that powerful threat as we were to discover. And the idea of overthrowing Gorbachev from probably assassinating him with Israel being implicated through Maxwell, or perhaps even worse implicated through other forces, horrified them and they thought Maxwell has gone a step too far. At the same time, he was running out of bank. He was borrowing and spending and losing. And his once powerful newspaper empire was beginning to toss a party due to union troubles. He couldn't save off huge expenses. I don't mind the 50 cents at all reporter, but he was running the huge bills printing difficulties, all the things that we've seen murdered or deal with and overcome successfully, I think. Maxwell couldn't and he was losing money. The evidence is in. So what's the verdict? Although the lack of bruising on Maxwell's body turned out to be a red herring, Dr. Hooper conclusively proved that Maxwell could not have fallen over the side of his yacht. His death was no accident. Everything points against suicide, which leaves murder as the only possible explanation. The test conducted have shown that it would have been relatively easy for a boat to duck on the Lady Galanes radar and for a team of assassins to board the yacht. Maxwell could then have been subdued, removed and his dead body later dumped in the sea. It's kind of really interesting, you know, what happened to us was this, we're sitting around at the Consumer Electronics Show and typically you have these guys who go for, who scurry around, will give you interesting games from abroad and try to get the rights and then license them into the US by selling to a game publisher. And so they showed us this game and it was Tetris and I loved it. It was great. And the agent was saying, hey, everybody's turned down this game because, you know, brother button turned down the game, EA turned down the game, Sega turned down the game because, you know, it was a stupid game, right? There's the graphics were awful, nobody dies, you know, bad sound, right? And I kind of go, they have been really a big thing. I really kind of like this game and I said, I want to make some changes. I need to talk to the programmers. And the agent kind of looks at me and goes, well, we got a problem here. I go, what's the problem? It goes, well, the programmers are in the Sylvia Union. So I turned to my partner Phil Adams. I said, get the rights, put it in a red box with a hammer and sickle and get it out in the next six months because I had heard through the rumor mill that there was going to be a the very first set of talks between the Sylvia Union and the US and it would be between Reagan and Gorbachev. So I said, get the game rights, right? And if this thing actually comes to you, we're going to launch the game during the talks. And that's what we did. We launched the game during talks, we even hired a fake Gorbachev in a fake Ronald Reagan look-alike. Maybe we were in ads and we're going to say today, that says, you know, Chris, there will be the headlines in a Gorbachev mixture of Reagan and going through all the issues around nuclear perforation. And then on, you know, the back of the page will be our ad with the fake Reagan and Gorbachev saying what they were really doing during the secret summits instead. It's a very convincing impersonator. This Kim Jong-un look-alike made many tourists look twice in Singapore and impersonating Kim Jong-un. Comedian Howard X checked out of his Hanoi hotel on Monday after Vietnamese authorities allegedly revoked his visa. The visa I got from my travel agency was invalid. They grabbed the person, the person that issued the visa letter and made a sign of visa pay for saying that it was invalid. Howard X teamed up with comedian Russell White, a Donald Trump look-alike with a media stunt. I think Satai is a powerful weapon against any dictatorship. So, you know, they are scared of, you know, a couple of guys that look like the real thing. It's still my fault. It's not our fault for people like this. I said to these guys earlier, like, yeah, this is what they look like. The two comedians had been questioned by police on Friday after staging a fake summit in the capital, drawing crowds and media. According to Howard X, authorities told him not to create any disturbances, as the city prepares to host Kim and Trump on Wednesday and Thursday for their second nuclear summit. They didn't know what the thing was, but they were trying to solve a problem. The problem they were trying to solve was how to get technology companies who historically has never engaged with the federal government to actually provide technologies, particularly in the IT space, that the government can leverage, because they were really afraid of what they called at that time, the prospects of a digital pool harbor. But in 1999, because the community got so good at collecting data, but not necessarily that good at processing all the data, that the biggest fear that there was going to be a new attack somewhere in the world, maybe even on the mainland. Like that, there's a revenue source, and the stuff was good. If we rejected, then they kind of go, particularly, it was like, I think my cyber security is that, well, we're not making that investment. I mean, I don't know if you guys want to, they'll thank you very much. Here's the next one. And so that's how we got the problem set, and how it got to work. And then we then find a customer in the building that was related to that problem in the first place, and paid that customer to take that technology in and use it in operation. That's how Palantir got started. Palantir was this PDADO and Alex basically meeting with me and saying, we got these algorithms on fraudulent transactions. We think that it might be some value for the intelligence community, the brainstorm. They came back, and I kind of said, on a black way, these kind of looked like this. The team went away and did a mock-up in two weeks, and then immediately we took that team and put them inside the building to work out what we call CT counterterrorist problem. And they just learned that business, and the apricot palantirum palantirum is worth somewhere between $10-20 billion. I am Leyda. I work as a content developer. We develop videos, infographics, and emotional graphics to combat tremendous content. They're action. But the key is you've got this network of sensors around the world, and then I, sitting at the NSA in Hawaii, coming in the morning, I type in my search. I look for, let's say I want to read John T's email. I answer his email address, and it sends that search to every one of these sensor networks around the world, and they search their local database of metadata and content. The content of all communications that passed through these sites is held for about three to five days, depending on the storage, and it's constantly going back further and further in time, as we gain more capability. So I can see everything. I can see what book you looked at at Amazon.com, last week. I can see who you talked to. I can see who your friends on Facebook are. I can see the text message you sent. I can read the emails you wrote. I can set up things that are called fingerprints that allow me to track where you've been on the web, who you're talking to, even if you're using sort of anonymizing technology and so forth. Introducing the Huawei S&D Quad. Stunningly designed and crafted. With a pin shop, 4.5 inch HD screen. An incredible 8 megapixel BSI camera. Reth taking Dolby surround audio. Smart power saving technology in the most compact body. And a quad core processor, making it the fastest smartphone in the world. Beauty, power, agility and speed. We call it the Ascend. The Huawei S&D Quad. Here in Hutsalia, just north of the Israeli city of Tel Aviv, and this building is home to an Israeli company called NSO Group, which develops and sells one of the most invasive spyways in the world. The software is called Pegasus and it doesn't matter whether you're an iOS or Android person, your phone could become a target. The phone becomes a spy in the pocket. It belongs camera, the microphone, text messages and anything else done on the phone or close to it are susceptible to monitoring. This is how Pegasus works. The target receives a text message with a special link. One click on it and the spyware is quickly downloaded to your smartphone. From then on, all your private data, personal messages, passwords, just about everything is being sent back to the operator. So who are the targets? According to NSO Group, its software is designed to track criminals. Our products have saved the lives of thousands of people, prevented suicide terror attacks, helped convict drug cartel lords, facilitated complex crime investigations and returned Kipnatt children to their parents. But internet researchers from Citizen Lab embarked on a hunt for Pegasus and according to them, it does not serve only a good cause instead it may be breaching innocent people's privacy and some countries' laws against cross-border hackers. Citizen Lab tracked the malware in as many as 45 countries, among them, six states with a history of abusing spyware to target civilian society. At the goal of becoming one of the top five cyber security powers in the world. And there's really surveillance software, tool capable of accessing microphones, cameras and other data. One Saudi dissident says he spoke to Jamal, she showed you regularly about ReADS use of technology to crack down on critics. I was working with Jamal in some different projects and I've learned in maybe the beginning of focus that my phone was hacked. So basically they were listening to every single conversation that we had. In a so group, in today's world, based on the evidence we have, they are the worst of the worst. They send you a time-sensitive text message and it's got a link to it. It's something that you have that human impulse you see. You go, oh goodness, I need to check that. Everything in the entire history of your phone is going to immediately come in. Everything that happens on your phone from that day forward, every place you've gone, everyone you call, everything you read, every photo you take, every audio note that's been on that or actually because they can turn the microphone on remotely. They can turn the camera on remotely even when you have an architect picture. They can turn the camera on remotely even when you have an architect picture. With the click of a button, you can bring down nations to their knees. If you made a phone call today or sent an email to a friend, there's a good chance that what you said or wrote was captured and screened by the country's largest intelligence agency. The top secret global surveillance network is called Eschalan and it's run by the National Security Agency and four English-speaking allies, Canada, Great Britain, Australia, and New Zealand. The mission is to eavesdrop on enemies of the state, foreign countries, terrorist groups, and drug cartels. But in the process, Eschalan's computers capture virtually every electronic conversation around the world. As we first reported last February, a lot of people have begun to question just how that information is being used. We can't see them, but the error around us is filled with invisible electronic signals. Everything from cell phone conversations, the facts, transmissions, to ATM transfers. What most people don't realize is that virtually every signal radiated across the electromagnetic spectrum is being collected and analyzed. How much of the world is covered by it? The entire world, the whole planet covers everything. Eschalan covers everything that's radiated worldwide at any given instant. Every square inch is covered. Every square inch is covered.