Inslaw affair

From CAVDEF
Jump to: navigation, search

History

PROMIS development

[1]

DOJ theft

[1]

Bill Hamilton's lawsuit

[1]

Government uses

Main articles: Earl Brian, Robert Gates, Robert Maxwell, Rex 84

[Aside from using PROMIS for case management, the DOJ provided it to numerous other agencies, including US and foreign intelligence services. Oliver North allegedly used PROMIS for tracking political dissidents. Various intelligence services worked to add backdoors into PROMIS and sell the software to other countries. One copy of PROMIS was delivered to the Wackenhut-Cabazon joint venture by Earl Brian, where Michael Riconosciuto bugged the software for espionage.]

[1]

Riconosciuto allegations

Main article: Michael Riconosciuto

Casolaro investigation

Main article: Danny Casolaro

Bua report

Private sector development

RCMP investigation

[2]

9/11 controversy

Main articles: Robert Hanssen, Ptech

Alleged PROMIS uses

Intelligence tracking

Foreign espionage

Banking software

Related article: Systematics Inc.

[3][4]

Osama bin Laden

Ptech and 9/11

Main article: Ptech

Surveillance state

Election theft

Jeff Averbeck, CEO of SmarTech, might have used PROMIS at a former company of his, and the name of SmarTech is similar to some of the names Mike Ruppert identifies for PROMIS successors ("SMART" and "TECH").[2] Furthermore, SmarTech is (according to whistleblower Dana Jill Simpson) a client of the data-mining company TLO run by Hank Asher, who allegedly used PROMIS at his former company Seisint.

Involved parties

Government agencies

  • Department of Justice - Stole the PROMIS software from Inslaw
  • CIA - Research and development alongside DARPA; targeted espionage against hostile actors; controlling financial transactions
  • DARPA - Involved with the 1980s Cabazon reservation research and the Bush-era TIA program
  • NSA - Monitoring the global flow of information, including financial transactions; picked up some of the remnants of TIA
  • Mossad - Partner alongside the US intelligence services in the PROMIS software bugging

Corporations

References

  1. 1.0 1.1 1.2 1.3 Wired, "The INSLAW Octopus", 1993/01/01
  2. 2.0 2.1 Mike Ruppert, "Promis", 2000 (archive of http://www.fromthewilderness.com/free/pandora/052401_promis.html)
  3. Lars Schall, "9/11 Terror Trading: Beware of a Limited Hangout, Part Two", 2017/03/24 - PROMIS's infiltration of the banking sector
  4. International Banking Regulator, "U.S. Spy Agency May Be Tapping Foreign Banks' Computer Data", 1994/01/17 - bugged PROMIS software was allegedly used by the World Bank

External links

Books

Casolaro files

  • Notebook scans
    • ...
    • Folder 5 - on page 68 are "RANDOM NOTES" on Riconosciuto, such as "Straight Theatre, San Francisco -- Soviet drug plan -- contacts with Charles Manson, Timothy Leary, Janet Joplin, etc."; "Hells Angels -- taught how to set up narcotics laboratory"; "British Government -- Falklands War -- counter-measures against Exovet Missiles after Sheffield incident -- ref: P.Z. -- preceding shock wave, no detonation, South Africa origin"; "large armory robbery in Nevada -- cover-up for ACVAL/ANVAL study theft -- also cover-up for 5k and 20k (related to heavy water missing, Seattle)"
    • ...
    • Folder 7 - on page 20 begin excerpts of an interview that Robert Booth Nichols (U.P.) and Ted Gunderson (T.G.) did with Michael Riconosciuto (M.R.) in 1983, as referenced multiple times throughout The Last Circle
    • ...
  • 1991/05/05 interview of Michael James Riconosciuto by Alan D. Boyack and Ted Gunderson - from p.1-7, Riconosciuto claims that the people involved in getting him busted on meth lab charges were connected to a pedophile ring in the Mason County WA area that included Paul Ingram of Thurston County WA; on p.16, Riconosciuto describes how six weeks before his drug arrest, Gunderson told him to contact Maury Terry who in turn told him to contact an officer in Miami police intelligence, an agency with whom he had formerly worked in busting Carlos Cardoen (misspelled "Carlos Cardoin") for illegal arms trafficking; on p.17, Riconosciuto says his attorney is John Rosellini (misspelled "John Rosalini"), son of the former Washington governor (ed. note: Albert Rosellini) whose campaign Riconosciuto claims was managed by his father (ed. note: Marshall Riconosciuto); on p.27, Riconosciuto mentions Gunderson tracking down Chicago mob hitman "Sam Marowitz" with the help of (ed. note: Los Angeles nightclub owner and Wonderland murders orchestrator) Eddie Nash, who he describes as "a big Israeli mafia guy"; on p.45, Riconosciuto details a contract that John Philip Nichols put out on him and Gunderson through Bill Mentzer (misspelled "Billy Mincer")

PROMIS theft

  • Overviews of the PROMIS bugging
  • Justice Department theft
  • CIA and NSA usage
    • According to p.283 of Freedom, a Fading Illusion by Charles Merlin Umpenhour (2005): "Although the Canadians at first denied it, after further probing, the Canadian government admitted they had purchased a form of the PROMIS software to be used in the construction industry as a project management program from Strategic Software Planning Corporation (SSP) located in Cambridge, Massachusetts. SSP Corporation was founded in 1982 with twenty employees and had sales of specialized prepackaged software of over $20 million dollars that year. At a 1991 Congressional Hearing, Deputy Director of the CIA, Richard J. Kerr, admitted the PROMIS software had been purchased from SSP and was also being used by other components of the CIA. The Hamiltons said they were told that the PROMIS software was being used to spy on people in foreign countries and that the National Security Agency (NSA) uses it to spy on Americans."
    • Emma Best, "Memo reveals CIA was offered PROMIS software in 1981", 2016/11/17: "One CIA memo in particular highlights some of the problems with the investigations into the Inslaw affair and the stolen PROMIS software. The memo shows that the Agency was offered a government copy of PROMIS as early as 1981. Details from the memo also confirm that this PROMIS software is [not] the “wholly unrelated” Project Management Integrated System distributed by Strategic Software Planning Corporation and Digital Planning, Inc. that CIA claims is the only PROMIS software they have used. Unlike the Project Management Integrated System software and the PROMIS software used by NSA (which the NSA claims is also unrelated to Inslaw’s software), this software is listed as being used for criminal justice, general tracking and information processing."
  • Foreign sales
    • From p.??? of The Last Circle by Cheri Seymour (2010):

          Neither Danny or Bob Bickel were aware at that time of a document from the U.S. Department of Justice, dated May 16, 1985, written by William Bradford Reynolds, Assistant Attorney General in the Civil Rights Division, to William F. Weld, United States Attorney in Boston, Massachusetts, advising Mr. Weld that the PROMIS(E) software was being provided to an Arab Sheik for resale and general distribution.

              Dear Mr. Weld: As agreed Messrs, Manichur Ghorbanifar, Adnan Khashoggi, and Richard Armitage will broker the transaction of Promise software to Sheik Klahid bin Mahfouz for resale and general distribution as gifts in his region contingent upon the three conditions we last spoke of. Promise must have a soft arrival. No paperwork, customs, or delay. It must be equipped with the special data retrieval unit. As before, you must walk the financial aspects through Credit Suisse into National Commercial Bank. If you encounter any problems contact me directly.
              Sincerely, WM. Bradford Reynolds
              Assistant Attorney General, Civil Rights Division
       
    • New Statesman, "Dirtier than Watergate", 2011/04/20: "A letter from the US department of justice in 1985, later obtained by Inslaw, documented more plans for the covert sale and distribution of the espionage-enabled version of PROMIS, this time to governments in the Middle East (which would surreptitiously allow the US to spy on foreign intelligence agencies). The letter outlined how sales of the software were to be facilitated by the late Saudi billionaire Khalid bin Mahfouz and the arms dealers Adnan Khashoggi and Manucher Ghorbanifar. PROMIS should be delivered without “paperwork, customs, or delay”, it stated, and all of the transactions paid for through a Swiss bank account."
  • Congressional investigation
  • Judge Nicholas Bua investigation
  • Russian intelligence
  • Chinese intelligence
    • Mark Dankof, review of SEEDS OF FIRE: CHINA AND THE STORY BEHIND THE ATTACK ON AMERICA by Gordon Thomas (2001): "Subsequently, Rafi Eitan would turn to British media mogul and Mossad asset, Robert Maxwell, in the further distribution of the PROMIS derivative software to a diverse coalition of intelligence agencies worldwide, including over $500 million in covert sales to Canada, Great Britain, Australia, South Korea, the Soviet KGB, a Polish intelligence agency, and Communist China. [...] But who served as the liaison between Eitan/Maxwell and the apparently unsuspecting software purchasers of Los Alamos National Laboratory, whose procurement of the Israeli doctored Enhanced PROMIS would facilitate the Communist Chinese CSIS theft of American nuclear secrets in New Mexico, including the particulars of the W-88 Trident nuclear submarine warhead?"
      • Other illicit activities involving China that are mentioned include: "the involvement of American defense contractors like Grumman and Garret Aerospace in advancing Chinese military aviation (p. 187)"; "the development of a satellite-linked computer database network based in Beijing, courtesy of Asset Management, International Financing and Settlement, Ltd, which employed as a consultant one Prescott Bush, the brother of President George Herbert Walker Bush (p. 289)"; "that Osama bin Laden had made several trips to China in the preceding two years [to 9/11]"
      • From p.454 of Gideon's Spies: The Secret History of the Mossad by Gordon Thomas (1999): "The Los Alamos theft had been prepared by the director general of CSIS, Qiao Shi. As well as being China's longest serving and most senior spy master, the eighty-two-year-old Qiao Shi was also chairman of the Chinese National Assembly since 1993 and the security chief of the Chinese Communist Party. It effectively made him overall intelligence supreme of the entire Chinese spying apparatus."
      • Carol Adler, "Secret Report Shows China Using Canada To Infiltrate US", 2002/02/09: "A top-secret report reveals that "a dangerous consortium of Chinese triads, agents of the Chinese Secret Intelligence Service (CSIS), and Hong Kong tycoons has established itself in Canada. "They operate on several fronts. Smuggling heroin into Canada for shipment to the United States. Using Canada as a key in the lucrative human smuggling trade to Europe and the United States. By obtaining ownership of key companies in Canada, the PRC uses them to infiltrate the United States, says the report. [...] Codenamed "Sidewinder, the report is officially titled "Canadian Intelligence Services and Triads Financial Links in Canada. [...] Copies of the original "Sidewinder report were shredded. Those on disc were electronically destroyed. But a copy survived and was passed to Gordon Thomas. He says the document reveals: *Triads own one-third of downtown Vancouver. [...] *China is one of the largest stockholders 10 per cent in Canada's Imperial Bank. *China has "virtual control of 15 corporations in the country's technology sector. [...] In Seeds of Fire, Thomas has detailed how the U.S. has successfully "all but wiped out the memory of the massacre on Tiananmen Square by the PLA acting on the orders of the Chinese leadership."
      • Progressive Review, "CHINA CONNECTIONS" by Sam Smith
        • "Little-noticed evidence from the Iran-contra files reveals that it was the Reagan-Bush administration that opened the door to sharing sensitive national security secrets with communist China in the 1980s. This clandestine relationship evolved from China's agreement to supply sophisticated weapons to the Nicaraguan contras beginning in 1984, a deal with the White House that entrusted China with one of the government's most sensitive intelligence secrets, the existence of Oliver North's contra supply network."
      • Shayan Zarrin, "Robert Maxwell, Promisgate, and the advent of the Israeli cybersecurity industry", 2018/11/20: "Maxwell’s most infamous and damaging Promis affair was his business venture with China and the CSIS (China’s Secret Service). The Chinese could only dream of obtaining U.S. nuclear secrets and other secret technology from the Los Alamos National Laboratories. “What about Los Alamos, one of his hosts was later reported by Goldstein to have mused; was even Los Alamos no longer impenetrable? Maxwell had laughed and said that even Los Alamos’ defenses, like the walls of Jericho, would tumble under the electronic power of Enhanced Promis. Thus, Maxwell gave China access to Israel’s secret backdoor. [...] Author Gordon Thomas detailing Maxwell’s selling of backdoored Promis software to Sandia National Laboratories: “On a blistering hot day in January 1985, Robert Maxwell lumbered down the steps of his private Lear jet at Albuquerque airport. Behind him an aide carried the magnate’s bulky briefcase, emblazoned with Maxwell’s initials in gold leaf. This was the tycoon’s second trip to Albuquerque in the past four months."
      • Role of Clinton Administration Secretary of Energy Bill Richardson in the theft
        • The Nation, "The Spy Who Wasn’t", 1999/07/22: "Pat Buchanan calls Wen Ho Lee the epicenter of the most dangerous penetration of America’s nuclear labs “since the Rosenbergs went to the electric chair in 1953.” [...] Yet as the facts have emerged during the relentless four-month media frenzy surrounding Lee, he has looked less like a master spy and more like the innocent victim of neo-McCarthyite Republicans who see the Chinese menace everywhere and hope to use the “China threat” as a bludgeon against Democrats in the upcoming presidential election. [...] But Republican politics and a reckless media don’t deserve all the blame. [...] Energy Secretary Bill Richardson not only acquiesced in the scandal mongering by firing Lee; his efforts to find scapegoats and to blame the affair on his predecessor, Federico Peña, have lent credence to the right’s claims of Chinese penetration of the nuclear labs. [...] As if proof of espionage had been predetermined, Richardson told the Washington Post, “We are still trying to pin down exactly when the information was passed.”"
    • Possible that Yang Enterprises used PROMIS or something similar, as they sold an Electronic Document Management System (EDMS) to the Florida Department of Transportation (FDOT) which had an espionage backdoor
  • Subsequent development
    • Mike Ruppert, "Bin Laden's Magic Carpet - Secret U.S. PROMIS Software", 2001/10/26 - mentions defense contractors DynCorp, Raytheon, Boeing, and SAIC using PROMIS, along with the Harvard Endowment, Financial Criminal Enforcement Network (FINCEN), and US Treasury
    • Sharona Merel, "NATIONAL BALLOT INTEGRITY PROJECT: Frequently Asked Questions (FAQ)" - further allegation of SAIC using PROMIS: "In January 2005, it was reported at Boston.com, that SAIC was awarded a $170 million contract for a PROMIS-type computer software program for the FBI, intended “to help agents share data about terrorist threats and criminal cases.” Could SAIC be the keeper of the “improved” PROMIS technology?"
      • Electronic Frontier Foundation, "Report on the Investigative Data Warehouse", 2009/04: "The Investigative Data Warehouse is a massive data warehouse, which the Bureau describes as "the FBI's single largest repository of operational and intelligence information." As described by FBI Section Chief Michael Morehart in 2005, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data." Unidentified FBI agents have described it "one-stop shopping" for FBI agents and an "uber-Google." [...] The FBI worked with Science Applications International Corporation (SAIC), Convera and Chiliad to develop the project, among other contractors."
      • GCN, "FBI gets on the case", 2003/07/09 (pages 1, 2): "In March, the bureau deployed the first phase of the Trilogy project at 591 FBI sites worldwide. The network connects 22,000 workstations, 2,612 switches and routers, 622 Ethernet LANs and 291 servers, Lowery said. [...] Trilogy later this year will host the Virtual Case File system, a browser application that will let FBI agents store, inspect and correlate data about criminal cases and national security investigations. The bureau plans to deploy the VCF on Dec. 13. [...] Lowery said the agency's new information warehouse, a data mart project known as Scope, is built on an Oracle9i database with a capacity of 9T. [...] The bureau plans to connect the Scope data mart to state and local databases, telephone records, and databases at the Pentagon, Drug Enforcement Administration, Bureau of Alcohol, Tobacco, Firearms and Explosives, and other agencies, as well as the State Department's visa database. [...] The bureau has adopted commercial data analysis tools to exploit the content of Scope. Some of the tools include the Chiliad Business Intelligence Suite from Chiliad Inc. of Amherst, Mass., which the bureau used to build its Athena Search System; ClearResearch from ClearForest Corp. of New York; RetrievalWare from Convera of Vienna, Va., and Infoworkspace by Ezenia Inc. of Burlington, Mass. [...] Contractor Computer Sciences Corp. is creating the hardware infrastructure for the Trilogy deployment, while Science Applications International Corp. of San Diego is providing the VCF application. [...] Larry Glock, program manager for Trilogy, said SAIC and CSC are using commercial products with some custom code. 'We empowered them to come up with their best architecture for the system. It mainly relies on Oracle9i database software and Sun [Microsystems Inc.] servers in several locations.'"
      • Chiliad background - founded by Christine Maxwell, the daughter of Robert Maxwell and sister of Ghislaine Maxwell
        • Business Wire, "Chiliad, the Company That Solved the 9/11 'Connecting the Dots' Problem, Hires Dan Ferranti as CEO", 2008/03/03: "Chiliad’s founders were influenced by the space shuttle Challenger disaster and the 9/11 terrorist attacks. Investigations into both events concluded that information stored in incompatible databases and documents maintained by different departments and organizations could have allowed managers and officials to prevent those disasters. But there simply was no existing technology to “connect the dots” across so many incompatible systems and organizations. [...] After an extensive evaluation of available technologies, the FBI turned to Chiliad to create its Investigative Data Warehouse. [...] [FBI] users execute one million searches and analyses each month to connect the dots across more than 700 million records and documents from more than 50 multi-agency, multi-format data sources, connected to the National Counterterrorism Center and to databases of the Department of Homeland Security, the CIA, the NSA and the Pentagon, with an average execution time of four to six seconds. [...] On the strength of its success at the FBI, the Office of the Director of National Intelligence selected and funded Chiliad to create the first operational pilot to achieve and demonstrate effective, secure decentralized information sharing across U.S. intelligence and law enforcement agencies – a direct and successful response to one of the 9/11 Commission’s most pointed recommendations."
        • Business Wire, "New CEO to lead Company into key commercial markets", 2013/07/24: "The Chiliad Board of Directors announced today the appointment of Ms. Christine Maxwell as the Company’s interim Chief Executive Officer. Maxwell is Chiliad´s Vice Chairman of the Board and a co-founder of the Company. She replaces Craig Norris, who is leaving to rejoin an environmental green energy start-up company that he helped co-found a few years ago. [...] Ms. Maxwell is a 35-year veteran of the scientific and educational publishing industries; she has been a leading pioneer in the online information retrieval industry since the early 1990s. Ms. Maxwell created “Magellan”, one of the first Internet professionally curated directories that was featured on the Home page of Netscape in the early 90’s and was acquired by EXCITE in 1996."

Financial monitoring

  • J. Orlin Grabbe, "The End of Ordinary Money, Part II", 1995/05
  • Salon, "Exposing Bush's historic abuse of power" by Tim Shorrock, 2008/07/23
    • "In May, I interviewed Norman Bailey, a private financial consultant with years of government intelligence experience dating from the George W. Bush administration back to the Reagan administration. According to Bailey -- who from 2006 to 2007 headed a special unit within the Office of the Director of National Intelligence focused on financial intelligence on Cuba and Venezuela -- the NSA has been using its vast powers with signals intelligence to track financial transactions around the world since the early 1980s.

      From 1982 to 1984, Bailey ran a top-secret program for President Reagan's National Security Council, called "Follow the Money," that used NSA signals intelligence to track loans from Western banks to the Soviet Union and its allies. PROMIS, he told me, was "the principal software element" used by the NSA and the Treasury Department then in their electronic surveillance programs tracking financial flows to the Soviet bloc, organized crime and terrorist groups. His admission is the first public acknowledgement by a former U.S. intelligence official that the NSA used the PROMIS software."

Modern surveillance

  • BusinessWeek, "They're Watching You", 2005/01/24 (archive of http://www.fromthewilderness.com/free/ww3/012605_watching_you.shtml) - describes modern surveillance technology akin to that of TIA outsourced to private corporations like ChoicePoint, Acxiom (of Little Rock with connections to the Jackson T. Stephens financial empire), Equifax, and Seisint
  • DU thread citing UPI, "DOD secretly continued intel program", 2006/02/23
  • DU thread citing a National Journal article on how TIA was stopped in name only - shift away from DARPA to those providing NSA services; two components of TIA were moved to the Advanced Research and Development Activity at the NSA
  • DU thread started 2006/02/25 about a TV program interviewing Robert O'Harrow - mentions ChoicePoint selling personal data to unauthorized individuals, causing them to lose a Pennsylvania state contract in January 2000; says that two ChoicePoint board members are close associates of Rudy Giuliani (former fundraiser Ken Langone and former New York Police Commissioner Howard Safir); asserts ChoicePoint is a partner of SAIC, who was a contractor for TIA; says DBT was hired by Florida in November 1998 for over $2 million with no bidding; VP of ChoicePoint was proud of "the outcome of our work in Florida", announcing plans to "expand across the country"; insurance companies are some of the biggest clients of ChoicePoint; discusses how ChoicePoint could benefit from HAVA; references congressional testimony about Seisint being involved in MATRIX; describes how Acxiom provides credit information to vendors
  • DU thread continuing the above thread - suggests that TIA was privatized and offshored to Global Information Group in the Bahamas; mentions Acxiom as being hired by big companies for "marketing purposes" and recently getting in the business of selling information to the DHS; points out that Alltel Corporation was fined for failing to certify they protected customer data, leading one poster to ask if the phone lines are secured; claims General Wesley Clark was pitching surveillance ideas to Dick Cheney; mentions a Department of Agriculture contract with ChoicePoint and false Social Security numbers; quotes interview with Hank Asher after explaining how he pitched MATRIX to Cheney, DHS secretary Tom Ridge, and FBI director Robert Mueller in 2003; according to Greg Palast, ChoicePoint illegally got data on Latin Americans; points out the interrelated nature of the data-mining companies and how many of them are trying to buy each other out; DOJ made Seisint the sole contractor for their $12 million MATRIX project; mentions a Chicago Tribune report from 1987 on how court documents in a federal drug case showed F. Lee Bailey offering Hank Asher as an informant; when intelligence heads were asked if TIA was terminated, most answered "I don't know" but NSA director Hayden requested a closed session; says that right after 9/11, Wesley Clark lobbied government officials for Acxiom; claim that ES&S recently contracted SAIC to handle their voting system security; suggestion that all the data mining companies are really the same entity, legally doing what the government isn't allowed to do; former attorney general John Ashcroft hired to lobby for ChoicePoint; later addition from Robert O'Harrow says that Hank Asher was accompanied by Jeb Bush when he pitched his software at the White House; mentions Asher being listed as a witness in drug trials from Gainesville to Chicago; former Accenture officer Paul Cameron joined Seisint; claim that Accenture was handpicked by Katherine Harris to replace ChoicePoint, had partnership with Acxiom
  • Michael Green, "How They Get Away With It", 2006/06/28 - alleges that PROMIS was being used by Seisint
  • 2009 email response to an EIR article about Mindwar, alleging that TIA and MATRIX were based on PROMIS: "Furthermore, Vallely and Aquino's MindWar scheme is remarkably similar to the Total Information Awareness (TIA) program launched by the Donald Rumsfeld Pentagon, under the direction of Irangate figure Adm. John Poindexter. Ostensibly, the Total Information Awareness global propaganda and mega-data-mining plan was scrapped after a series of negative news stories, but Pentagon sources have reported that the program was merely "taken into a black box."

    Key to the TIA program was Iran-Contra figure Hank Asher. He is mentioned in conjunction with the TIA program in a Vanity Fair article, as well as in a few other places but most news stories omit mention of his involvement. Asher ran dope for the Iran-Contra operations and then turned over a new leaf and retired to his 95 foot yacht to put together the MATRIX. MATRIX appears to be nothing more than the PROMIS software by another name and Asher appears to have been doing the exact same thing as George Meese (Edwin's brother) and Earl Brian, Reagan's HHS head. Proprietary and private information on US citizens was downloaded onto the software, which was supposedly going to be used to identify terrorist's and their funding networks.

    Fast-forward to now and we have Hank Asher, Mayo, and Giuliani Partners LLC as business partners: Rudy was #2 man at DOJ when the theft of the PROMIS software occurred. We also have Hank Asher partnered with Mayo Clinic and the University of MN. There is a cancer research initiative through a company called JARI research, but there is also Asher's latest database effort through a company he has called, "The Last F*****g One". This is supposed to be his most powerful database yet, which says a lot since Asher had MATRIX for social networking information, Seisint, the worlds most powerful asset location database, TIA - which appears to be a combination of the first two. TLFO is supposedly for identification of child predators, but that is redundant since MATRIX and TIA can already accomplish those things with the social networking database. The partnership with Mayo and U of M, viewed under the lens where we see the powerful people behjind Perseus-Soros and GHWB/GWB Administrations showing up to invest in the largest biotech research corridor in the US with start-up at Elk Run, speaks to something health related and is perhaps going to be unveiled as the place where taxpayer money was sent to fund the creation of the national healthcare database. Big bucks there!"
  • Naval Criminal Investigative Service (NCIS) purportedly had PROMIS-like software in use by local police agencies at least by 2010
  • Set of articles compiled in 2010 on surveillance, one of which mentions Jackson Stephens being involved with John Huang (Assistant Deputy Secretary of Commerce under Bill Clinton) and Acxiom (which is part of TIA) (National Corruption Index profile on Jackson Stephens) - also refers to Unisys
  • Allegations of Unisys being involved with FEMA (confirmed), TIA, and Ptech
  • Palantir data mining
    • Email on 2011/10/05 from govcon@palantir.com to gibbons@stratfor.com with the subject "FINAL REMINDER: Palantir Technologies' 7th Government Conference": "GovCon 7 Is Almost Here!

      Palantir's seventh Government Conference is only a week away and is on track to be our largest event yet! Seating is limited and we encourage you to register now to reserve your spot. Register for GovCon 7

      Our guest speakers will be former DHS Secretary Michael Chertoff, National Center for Missing and Exploited Children Assistant Executive VP Linda Krieg and Executive Director Michael Geraghty, and The Institute for the Study of War Deputy Director Marisa Sullivan and Senior Fellow LTG James Dubik."
    • Bloomberg, "Palantir, the War on Terror's Secret Weapon", 2011/11/22
      • "[...] Since its founding in 2004, the company has quietly developed an indispensable tool employed by the U.S. intelligence community in the war on terrorism. Palantir technology essentially solves the Sept. 11 intelligence problem. [...]"
      • "Depending where you fall on the spectrum between civil liberties absolutism and homeland security lockdown, Palantir’s technology is either creepy or heroic. Judging by the company’s growth, opinion in Washington and elsewhere has veered toward the latter. Palantir has built a customer list that includes the U.S. Defense Dept., CIA, FBI, Army, Marines, Air Force, the police departments of New York and Los Angeles, and a growing number of financial institutions trying to detect bank fraud. [...]"
      • "[...] Overlooked by the moneyed institutions on Sand Hill Road, Thiel put up the original funds before enticing In-Q-Tel, the investment arm of the CIA, to invest as well. [...]"
      • "Michael E. Leiter, the former head of the National Counterterrorism Center, recalls being skeptical when Karp arrived to sell Palantir’s system to the NCTC, created by President George W. Bush after the attacks. “There’s Karp with his hair and his outfit—he doesn’t look like me or the other people that work for me,” he says. But Leiter soon discovered that Palantir’s software cost a fraction of competing products and actually worked. Palantir not only made the connections between the data sets but also drew inferences based on the clues and empowered the analysts. Leiter is now a Palantir consultant."
      • "[...] Palantir has also been used to unravel child abuse and abduction cases. Palantir “gives us the ability to do the kind of link-and-pattern analysis we need to build cases, identify perpetrators, and rescue children,” says Ernie Allen, CEO of the National Center for Missing and Exploited Children. The software recently helped NCMEC analysts link an attempted abduction with previous reports of the suspect to the center’s separate cyber-tip line—and plot that activity on a map. “We did it within 30 seconds,” Allen says. “It is absolutely a godsend for us.”"
      • "[...] Christopher Soghoian, a graduate fellow at the Center for Applied Cybersecurity in the School of Informatics and Computing at Indiana University, worries that Palantir will make these agencies ever hungrier consumers of every piece of personal data. “I don’t think Palantir the firm is evil,” he says. “I think their clients could be using it for evil things.”

        Soghoian points out that Palantir’s senior legal adviser, Bryan Cunningham, authored an amicus brief three years ago supporting the Bush Administration’s position in the infamous warrantless wiretapping case and defended its monitoring domestic communication without search warrants. Another event that got critics exercised: A Palantir engineer, exposed by the hacker collective Anonymous earlier this year for participating in a plot to break into the PCs of WikiLeaks supporters, was quietly rehired by the company after being placed on leave."
    • The Nation, "The Strange Case of Barrett Brown", 2013/06/18
      • "One connection was between Bank of America and the Chamber of Commerce. WikiLeaks had claimed to possess a large cache of documents belonging to Bank of America. Concerned about this, Bank of America approached the United States Department of Justice. The DOJ directed it to the law and lobbying firm Hunton and Williams, which does legal work for Wells Fargo and General Dynamics and also lobbies for Koch Industries, Americans for Affordable Climate Policy, Gas Processors Association, Entergy among many other firms. The DoJ recommended that Bank of America hire Hunton and Williams, explicitly suggesting Richard Wyatt as the person to work with. Wyatt, famously, was the lead attorney in the Chamber of Commerce’s lawsuit against the Yes Men.

        In November 2010, Hunton and Williams organized a number of private intelligence, technology development and security contractors—HBGary, plus Palantir Technologies, Berico Technologies and, according to Brown, a secretive corporation with the ominous name Endgame Systems—to form “Team Themis”—‘themis’ being a Greek word meaning “divine law.” Its main objective was to discredit critics of the Chamber of Commerce, like Chamber Watch, using such tactics as creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that US Chamber Watch cannot be trusted with information and/or tell the truth.” In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch. They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.” The leaked e-mails showed that similar disinformation campaigns were being planned against WikiLeaks and Glenn Greenwald."
    • Jason Goodman, "Exploring Palantir with Quinn Michaels", 2017/08/06 (important timestamps)
    • Vice, "Revealed: This Is Palantir’s Top-Secret User Manual for Cops", 2019/07/12
  • PRISM surveillance program by the NSA

Danny Casolaro death