06.05.2013 Views

September 11 Commission Report - Gnostic Liberation Front

September 11 Commission Report - Gnostic Liberation Front

September 11 Commission Report - Gnostic Liberation Front

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

that crashed into the Pentagon on <strong>September</strong> <strong>11</strong>? Was it possible his two arrests for<br />

trespassing on the campus (by Campus Police) were associated with his gathering of<br />

intelligence? Given that he spent no time in jail as a repeast offender for burglary or<br />

trespassing, should one assume he had ‘highly placed’ protection? (Possibly the President<br />

of OSU, Mr, David Boren, former CIA Director.)<br />

Around the same time, Mr. Berg had work installing telecommunications equipment at<br />

the Republican National Convention in 2000. Here, Ellis Kitchen, who managed the<br />

telecommunications implementation at the convention, would have pulled him into this<br />

assignment. Ellis is an interesting person, with virtually no public record. As a public<br />

official without a biography, all we know is that he ran special technology projects for the<br />

George Bush Whitehouse between 2001 and 2003, and that he arranged ‘secure satellite<br />

communications’ for sixty countries during that time. Two themes emerge on this<br />

information: high tech satellite communications, and the need to keep a low personal<br />

profile. Even more interesting are the three additional coincidences embedded in this<br />

tidbit of information. 1) Mr. Berg had connections in the Bush Whitehouse when he was<br />

executed. 2) In the space of less than a year, Nick Berg was bumping up against<br />

international terrorists, the PNAC, the Russian Mafiya, and the elite of the Republican<br />

Party security apparatus. The closeness of these two activities provided a much more<br />

compelling reason for the FBI to be investigating Nick Berg. 3) The security checks of<br />

the Republican National party convention – classified by the Secret Service as a National<br />

Security Special Event, who therefore vetted all convention personnel – somehow<br />

overlooked the public record that Nick Berg had been twice arrested for trespassing just<br />

months before. However, maybe this record was overlooked because of the vouching of<br />

George Tenet, Bush’s Director of the CIA. Tenet, (who had extremely close, personal ties<br />

to the President of the University of Oklahoma at Norman: David Boren - a former CIA<br />

director himself,) was in a position to provide a personal reference and introduction for<br />

Mr. Berg.<br />

Mr. Berg was the supposed owner of an unregistered, non-existent company called<br />

Prometheus Methods Tower Service. The fact that his company was not registered<br />

anywhere is not a big issue in-and-of-itself. A lot of consulting entrepreneurs do not<br />

register as a company. The company name also seems fairly benign: “Prometheus<br />

Methods.” The very interesting aspect of this clue, however, is the company name.<br />

‘Prometheus Methods’ refers to one thing only – an extremely sophisticated computer<br />

program for solving extremely complex problems, using parallel processing. Again, this<br />

would be a benign fact until you learn that the creator of Prometheus Methods works for<br />

Sandia International, a weapons research firm, a subsidiary of Lockheed Martin, and a<br />

significant player in research and development for US national security. The Prometheus<br />

Methods technology is based on MPI programming, which simplifies the generation of<br />

code generation for running programs on multiple processors, creating in effect, a large<br />

supercomputer. Also, seemingly benign and unrelated, is the Mossad connection to spy<br />

ware distributed through its Israeli companies Odigo (instant messaging), Zone Labs and<br />

Cydoor (maker of Kazaa, and probably contributing to the core code of Grokster as<br />

well). By planting spy ware and backdoors on over 50 million home computers, the<br />

Mossad has created the foundation for the largest wide area network computational grid<br />

THE SEPTEMBER <strong>11</strong> COMMISSION REPORT Page 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!