Archives‎ > ‎

Solving 9-11 : The Deception that Changed the World, by Christopher Bollyn (3)

Solving 9-11 -
 The Deception that Changed the World 



 Chapters V, VI

How Did Spy Software Get Onto FAA Computers ? 


The deathly precision of the attacks and the magnitude of planning would have required years of planning. Such a sophisticated operation would require the fixed frame of a state intelligence organization, something not found in a loose group, like the one led by the student Mohammed Atta in Hamburg.

- Eckehardt Werthebach, former president of Germany's Verfassungsschutz intelligence service, to Christopher Bollyn, December 2001 


The Deputy Administrator of the Federal Aviation Administration (FAA) at the time of 9-11 and the former Managing Director of the National Transportation Safety Board (NTSB), the man who oversaw the federal investigation of TWA 800, Egypt Air 990, and the downing of John F. Kennedy's plane, are linked with a captain of Israeli army intelligence and his system to remotely control aircraft. 

The relationship between these appointed officials of the federal agencies responsible for aviation safety with a senior officer of a foreign military intelligence raises serious questions about the degree of Israeli influence at the FAA and NTSB. 


THE COMPUTER CRIMES BEHIND 9-11 

The dependence of the U.S. government and military on computer systems, which run on software provided by outside vendors, is the Achilles' heel of the world's most powerful nation.  9-11 was clear proof of that fundamental weakness and vulnerability. 

9-11 was a computer crime.  Apart from being a monstrous crime of mass murder and false flag terrorism, 9-11 was also a sophisticated computer crime, carried out through long-term foreign infiltration of the most sensitive U.S. military and government computer networks.  This infiltration, carried out by a foreign intelligence agency, gave the perpetrators of 9-11 "real-time" access to all the data on the computers of the U.S. government and military.  On 9-11, this "super-user" access to the data of the most critical government computer networks gave the terrorists the ability to thwart the military response to the emergency as it developed. 

Most importantly, the terrorists who committed 9-11 through their "super-user" access to the most critical computer networks of theU.S. government still have that access.  The evidence indicates that this infiltration was carried out by the military intelligence agency of the State of Israel. 


PTECH & 9-11 

The subject of computer sabotage in relation to the aerial attacks of 9-11 was brought to the fore by Indira Singh, who spoke at early 9-11 truth events organized by Kyle Hence.  During these early 9-11 "truth" events, a small Massachusetts-based software company called Ptech was brought up by Singh, who sought to link it to Arab terrorists.  Ptech was said to be a start-up company from QuincyMassachusetts, whose software was loaded onto the most sensitive computer systems across the U.S. government, including those of the Federal Aviation Administration (FAA) and the U.S. Air Force, two agencies whose systems failed miserably on 9-11.


Indira Singh

Singh, a senior risk and IT consultant with JP Morgan Chase on 9-11, is described as a "whistle-blower" because of her revelations about Ptech's involvement with the critical computer systems that failed on 9-11.  "Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA -- that there was a window of opportunity or to insert software or to change anything -- it would have been Ptech along with MITRE." 

Singh has spoken extensively about Ptech's alleged connections with Saudi Arabia, for example, with Pacifica Radio in 2005: 

Maybe those organizations don’t fully know who their masters are. And Ptech is the one thread, the one golden thread you pull on and all of this is unraveled, because it goes into the corporations, it goes into these government entities, it goes into the terrorism financing entities that were, that none of which have been, by the way, taken to task. There are just so many questions about what does this all mean. And as we investigated, as I investigated further, we found that the origins of Ptech were very interesting – where did this company come from obviously is the first question. And how did they get to be so powerful, who were the people, who were the organizations that brought them in, who knew, who gave them the power?


Ptech software "is utilized at the highest levels of almost every government and military and defense organization in this country," Singh said, "including the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the U.S. Navy, the U.S. Air Force, and, last but not least, the Federal Aviation Administration." 

I found it hard to believe that the most sensitive government and military computers would run enterprise software from a Lebanese-owned start-up company called Ptech from QuincyMassachusetts.  All the talk about the Saudi-financier behind Ptech being linked to Osama Bin Laden smelled like a "cut out" to me.  It simply did not make sense that the most secure computer systems of the U.S. government would be running software written by a Lebanese Muslim financed by a Saudi who happened to be on the most-wanted list of global terrorists. 

When I turned my attention to Ptech, I soon discovered that the real key person involved in the development of the company was a Zionist Jewish lawyer named Michael Goff from WorcesterMassachusetts.  Goff also worked for an Israeli-run computer security company called Guardium. This confirmed my suspicion that Ptech was probably an Arab "cut out" controlled by the Mossad, and that Goff was their point man in Ptech.


Michael S. Goff, Mossad's Man at Ptech 

Goff's father and grandfather had been high-level Masons in the Worcester lodge of B'nai B'rith, a secret Jewish Masonic group formed in New York City in 1843.  Goff obviously lied to me about how he had gotten involved with Ptech in 1994 when he said that he had wound up becoming the manager of the company through a temporary agency.  It seemed to me that the Ptech cut-out had been exposed.  My revelations about Ptech's Zionist roots were published in a newspaper based in WashingtonD.C.  Singh, however, ignored the evidence of Israeli involvement with the creation of Ptech and continued to accuse the company of being linked to Saudi sponsors of terror.  Meanwhile, Ptech software is still running on U.S. government and military computers. 

Singh and I were asking the same questions:  How did Ptech get to be so powerful?  Who were the people, who were the organizations that brought them in?  Who knew?  Who gave them the power? 

After 9-11, the crucial question was how did Ptech's software get loaded onto the critical U.S. government networks – particularly those of the FAA, the U.S. Air Force, and NORAD?  Who, in their right mind, would have allowed Ptech personnel and software anywhere near the FAA's core air traffic control system computers in HerndonVirginia? 

During my research about the military exercises that were on-going when 9-11 occurred, I read documents about how the FAA and NEADS computer systems failed.  The FAA in particular was extremely slow to contact the military about the rogue aircraft of 9-11.  In one case, one of the rogue aircraft had been allowed to fly without communication for nearly thirty minutes before the military was notified. 


"THE HEART OF THE MATTER" 

The flawed and delayed FAA procedures and communications with the military are at "the heart of the matter," as 9-11 relative Kristen Breitweiser said: 

You know, it is very upsetting that the 9/11 Commission had to subpoena the Federal Aviation Administration [FAA]. According to news reports, there are 150,000 documents that were left out of what the FAA sent to the commission. Those documents went toward the time line of when the FAA notified the North American Aerospace Defense Command [NORAD], when the fighter jets were scrambled and the communications between air-traffic control and the pilots. These are threshold issues that go to the heart of the matter. How did the FAA overlook 150,000 documents pertaining to these issues? It is more than mildly upsetting that they would leave out these documents.


MONTE BELGER – FAA DEPUTY ADMINISTRATOR 

In the documents about the FAA failures on 9-11, I came across the name of a Monte R. Belger, acting deputy administrator of the FAA at the time.  A long-term FAA official who began his career with the FAA in Chicago, Monte Belger was the senior official who oversaw the upgrading of the FAA air traffic computer systems that began in the late 1990s and which was on-going in 2001.


Monte Belger, Acting Deputy of the FAA from 1997-2002, was the official responsible for the computerized air traffic control system upgrade that allowed MITRE and Ptech to infiltrate critical computer systems with Israeli spyware. 


Belger, as the Acting Deputy Administrator for Air Traffic Services and System Operations, was the key man at the FAA making the executive decisions about these upgrades.  As the New York Times of June 7, 2001, reported: 

The aviation agency is installing a computer system that controllers can use to determine whether airplanes can depart from established traffic lanes and fly long distances, and whether they will conflict with other airplanes by doing so.

Belger was the key decision maker at the Federal Aviation Administration, responsible for the software and computer upgrades that involved Ptech, the suspicious upgrades which were being done during the years prior to 9-11.  Documents and reports from theMITRE Center for Advanced Aviation System Development in McLeanVirginia, show that Ptech was working with MITRE on FAA computer systems. 

As his on-line biography says, Belger, a thirty-year veteran of the FAA, was Acting Deputy Administrator for the FAA for five years, from 1997-2002, leading the 49,000-person team and in charge of operating the world's safest aviation system. 

During his tenure with the FAA, Belger was the Associate Administrator for Air Traffic Services, responsible for day-to-day operations of the nation's airspace system, and supervised the FAA's modernization plan aimed at improving aviation capacity, safety and service to airlines. Belger played a pivotal role in assisting in the transition of aviation security responsibilities from the FAA to the new Transportation Security Administration, and he co-chaired the FAA's successful efforts to adopt acquisition and personnel reform. Belger retired from the FAA in September 2002. 


U.S. AVIATION TECHNOLOGY LLC 

After he left the FAA, Belger became the "Vice President, Government Connection" of a small Israeli-run company based in the Fort Lauderdale area called U.S. Aviation Technology.  The company was founded by Ehud "Udi" Mendelson, who described himself as "a captain in the prestigious Army Intelligence Unit of the Israel Defense Force." 

"Ehud received his BS Degree in Business and Economics from the Bar-Elan [sic] University in Tel-AvivIsrael.  He holds a computer Network Engineer certification from Microsoft and Novel," according to his webpage. 

Company documents and information from the Israel Venture Capital Research Center website specifically name Monte Belger of Centreville, Virginia, as a Vice President and Government Connection of U.S. Aviation Technology LLC. 

Mendelson, age 51, was also the Chief Technology Officer of U.S. Aviation Technology, which was based in his apartment inParklandFlorida.  Mendelson's company promoted a remote-control system that allows a "ground pilot" to monitor and adjust the computer flight systems on aircraft.  As he says in his presentations, "We put the ground 'pilot' in the cockpit." 

His software and design was promoted as a system to obtain real-time data from the aircraft's computer recorders (black box, FDR) in order to monitor flight systems – and make corrections – if necessary.  The possibility to remotely hijack a plane with Mendelson's system is obvious.  Mendelson also promoted a Flight Data Animator, which he said gives the ground pilot all of the data and the visuals that the pilot in the aircraft has.  In the two on-line presentations of this equipment it is implied that corrections can be made by the ground pilot to avoid an accident or situation. 


The data is sent via satellite to the satellite antenna on the top of the aircraft.  This software and equipment clearly would allow the ground "pilot" to fly the aircraft.  Mendelson was promoting his software and system before 9-11 and hoped to have it on the market in November 2001, according to a document in his company presentation. 

I called Monte Belger to ask him about his relationship with Ehud Mendelson, an officer in Israel's military intelligence agency, and his remote-control aviation company.  I found it very disturbing that an administrator with the FAA would be associated with such a business project, especially after 9-11. 

I called Mr. Belger at his home on Eagle Tavern Lane in CentrevilleVirginia at about 9 a.m. on January 24, 2008.  I asked him about his relationship with U.S. Aviation Technology and Ehud Mendelson.  He denied knowing or having anything to do with either and asked me to call him later at his office at Lockheed Martin Corporation where he is a Vice President responsible for Transportation Systems Security. 

When I called his office, he put me on speaker phone, he said, in order to try and access the websites where he was named as a Vice President of U.S. Aviation Technology.  He continued to deny knowing anything about the company or its founder, a member ofIsrael's Army Intelligence Unit. 


PETER GOELZ – NTSB 

Peter Goelz, the former managing director of the NTSB, the federal investigative body that oversees air crashes, is also named, along with Monte Belger and others, as a Vice President, Corporate Strategy, in U.S. Aviation Technology. 

Goelz, at the NTSB from 1995 until 1999, personally supervised the investigations of TWA Flight 800, Egypt Air 990, the ValuJet crash in Miami, and the mysterious crash of the young John F. Kennedy's plane off the coast of Cape Cod.  There are many outstanding questions about what really happened to the aircraft involved in several of the high-profile cases that Goelz was involved in.


Peter Goelz
 

Peter Goelz, former managing director of NTSB, oversaw the seriously flawed TWA 800 and Egypt Air 990 investigations.  The New York-born Goelz was a lobbyist for gambling interests in Kansas City prior to coming to the NTSB.  A political advisor and lobbyist, Goelz lacks any real expertise in accident investigation.  Prior to being appointed to the NTSB during the Clinton administration, Goelz was a political advisor in New Hampshire and a lobbyist for gambling interests in Kansas City.  I have not found anything in his resume that would make him a suitable candidate to oversee aviation accident investigations. 


I called Peter Goelz at his home on January 25, 2008, and asked him about his relationship with Ehud Mendelson and U.S. Aviation Technology.  Goelz immediately recalled Mendelson, saying that he had been based in Miami, and said he had met with the Israeli captain from Israeli military intelligence "two or three" times in WashingtonD.C. 

When asked if his relationship with Mendelson had begun before or after 9-11, Goelz said that he did not remember.  He did, however, have a very clear recall what Mendelson's company was all about:  real-time access to all the data from the computer system on an aircraft. 

Goelz said he had a hard time understanding what was proprietary about Mendelson's U.S. Aviation Technology.  He asked me to send him an email with my questions and the scope of my article. 


In my email, I explained that he was listed as a Vice President of U.S. Aviation Technology on the company's website and on that of Israel Venture Capital, and asked how and when he had gotten involved with Mr. Mendelson. 

He wrote back on January 26 and asked me to "enlighten" him "a little more on the focus of [my] work in this matter."  It is worth noting that Goelz did not deny being a Vice President of Mendelson's company. 

If Goelz was confused about Mendelson's system, he certainly does not show it in his comments that are found on the testimonial page of U.S. Aviation Technology, where he wrote (as found on the website, with corrections in brackets): 

I have reviewed your proposed integrated aircraft early warning system and believe it has considerable technical merit. During my years at the National Transportation Safety Board we were greatly concerned about the increasing complexity of airplane accidents. Advance in safety (ground proximity warning devices, TCAS, etc.) have virtually eliminated certain type[s] of accidents and have forced a greater reliance on the flight data recorder (FDR). In a number of accidents, particular[ly] those over open water (TWA Flight 800, Egypt Air, Swiss Air) the investigations were seriously hindered until the boxes were recovered. In the tragic events of September 11th, three of the four FDR’s were destroyed so no data (or voice recordings) was recovered. 

Your system of real time downloading of aircraft data meets a very real and pressing problem. Not only is it important from a safety and security standpoint it also has applicability for navigation and flight management. A robust two-way data pipe from the aircraft to the ground and back could revolutionize the industry. 

The key to your system is it[s] initial simplicity, relying on tested, almost off the shelf, components. That your concept is well on the way to securing a patent further strengthens your proposal. 

I look forward to working with you on this project and believe that with the appropriate backing it will be successful. 

Peter Goelz, Former NTSB Managing director.

Finis

Sources and Recommended Reading: 

Important Note – After contacting Belger and Goelz, the incriminating documents were immediately taken down from the Internet.  This was evident from the quick deletions of the U.S. Aviation Technology documents.  A warning message appeared when you try to access these documents. Some of these links are no longer available and can be found using the Internet Archive tool (Way Back Machine).

"Ground Zero 911, Blueprint for Terror, Part Two" Indira Singh Interview with Pacifica, July 20, 2005


http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=103x142316 

Bollyn, Christopher, "How Mossad Deceived the U.S. Military on 9-11" April 1, 2005
http://www.bollyn.com/index/?id=10761 

O'Meara, Kelly Patricia, "A Historical Whitewash? - The ' 9/11 Commission' runs into resistance from official Washington as it investigates the attacks on New York City and the Pentagon," Insight, The Washington Times, December 22, 2003 

MITRE Technical Report, FAA Data Registry (FDR) Concepts of Use and Implementation, September 2000 

MITRE Working Note, Adapting Information Engineering for the National Airspace System and Its Application to Flight Planning, September 1999 

Mendelson, Udi, U.S. Aviation Technology documents:
http://us-aviation-technology.com/bplan325.pdf 
http://www.bollyn.info/pdf/us.aviation.pdf

(See pp. 44 -50 regarding the key personnel) 

Mendelson, UdiU.S. Aviation Technology, Aircraft Security & Safety Enhancement:
http://bollyn.info/pdf/us.aviation.tech.pres.pdf 

U.S. Aviation Technology LLC on Israel Venture Capital website:
http://www.ivc-online.com/G_info.asp?fObjectID=5387&ObjectType=1 

Monte Belger on Israel Venture Capital website:
http://www.ivc-online.com/G_info.asp?objectType=9&fObjectID=7244&CameFrom=GoogleSearch 

Peter Goelz on Israel Venture Capital website:
http://www.ivc-online.com/G_info.asp?objectType=9&fObjectID=7243&CameFrom=GoogleSearch 

Related files for Christopher Bollyn's 9-11 research:
http://www.matrixfiles.com/CB/CB.html 

Solving 9-11:  How Did Israeli Spy Software Get Onto Critical FAA Computers?, January 28, 2008
Final Edit – August 20, 2009
Latest Correction - February 16, 2010

 

 Chapter VI

Who Controls Our Elections ? 

Computer Crimes: Understanding the Deception Behind 9-11 and Election Fraud


The stealing of American elections is primarily a computer crime, as was the false flag terror attack of 9-11. These crimes are carried out by criminals who produce malicious computer code and enterprise software.
 

I know Americans who watch television every night. I actually know people who spend virtually every non-working minute of the day in front of a television, bathing in the absolutely fake and utterly non-intellectual "reality" of TV.  Millions of Americans, in fact, receive the bulk of their news and information about the world from the television. That means that a very large segment of the American population has a worldview that has been shaped primarily by what they have seen on TV. For many people, the artificial and contrived "reality" of the two-dimensional television screen largely defines and informs their view of the real world. 

This is why so many Americans know so little about the Middle East. The most obvious symptom of this television-induced ignorance is that most Americans know nothing about the real history of Zionism and the State of Israel. They are completely unaware, for example, of the long history of Zionist terrorism against Palestinians, Americans, Jews, and even Israelis. Raised on Hollywoodtelevision and movies, many Americans don't have the slightest clue about the real nature of Zionism.  


Think about this for a minute: When was the last time you saw a movie in which the bad guys were Israelis speaking a guttural Slavic-based language called Yiddish or "Ivreet"?  Can you recall even one television program in which the criminals or terrorists were Israelis?  Apart from The Little Drummer Girl by John Le Carre, I have never seen a film in which Israelis were anything but heroes or victims, usually both. The Little Drummer Girl, which is a film worth watching, shows how false flag terror attacks are frequently committed by Israeli intelligence agents to be blamed on their enemies. Such false flag Zionist terror attacks were carried out against synagogues in Europe in the movie, and in Baghdad in real life during the late 1940s. 

In the usual Hollywood films about terrorists, such as the Die Hard films and others produced by Zionist media moguls, the bad guys are always Arabs, Germans, or corrupt members of the U.S. military. For many decades the Zionists who control Hollywood have defined who the "bad guys" are for most Americans.  Israelis and their fellow Zionists are, therefore, never the "bad guys" inHollywood films, although Israelis and Zionists play a very major role, if not the leading role, in the real world of organized crime.


Kobi Alexander, one of the high-level Israeli criminals involved in Comverse, Odigo, and 9-11.  After stealing hundreds of millions of dollars, Alexander fled to Israel and Namibia seeking refuge from U.S. justice.  Israeli criminals like Alexander are seldom portrayed in Hollywood films.

For the people in the U.S. military whose job it is to protect and defend the United States, reality is largely defined by the information they receive on their computer monitors. These people spend most of their workdays sitting in front of screens that provide the data to which they respond, often in life-or-death situations. 

But who really controls the information that the average American and the specialists in the U.S. military receive on their screens? You may be surprised to discover that the man behind the curtain is an Israeli with a thick guttural accent and a foreign and extremely racist view of the world. 


ACCEPTING VIRTUAL REALITY 

Having observed the counting of the votes in the elections in many countries, I found this essential process of democratic elections to be the most bizarre in Chicago, where there is absolutely no interest by the public or the media in how the votes are actually counted. So far gone is the democratic franchise in Chicago that it can be said that it no longer exists in any meaningful way.

 
An electronic voting machine: a device for stealing elections and controlling nations.


When I was at Election Headquarters at the office of the Clerk of Cook County in downtown Chicago to observe the "vote count," I was told to wait at a counter and simply watch the television screens overhead.  I inquired, “But where is the vote count happening?  I was informed by Scott Burnham that I could observe the counting of the votes.” 

The vote count, I was then told, was being done in a back room by the employees of a private company, and there I could not go.  When I monitored the election in Chicago in March 2006, the back room "counting of the votes" process was being run by a bunch of Venezuelans working for a mysterious company called Sequoia Voting Systems. This privately-owned and foreign company was running the elections for Chicago and Cook County, that shining beacon of democracy. 


Sequoia's website says this:

Sequoia is a leading American-owned election technology provider with major offices in California, Colorado and New York and an unsurpassed 100-year-plus history of providing accurate, reliable, accessible and innovative voting solutions dating back to the nation's first lever-based mechanical voting equipment in the 1890s.

Nobody in Chicago had the slightest clue who really owned Sequoia, nor did anybody even care. All I could find was that it was a shell company registered in the Dutch Antilles registered to another shell company in The Netherlands. The two young Venezuelans who were running the company were apparently Sephardic Jews whose fathers were film producers in the movie business in South America. 

The election results for Cook County, produced by our Venezuelan friends, were displayed on television monitors, and the members of the press simply recorded the results and called it an election. They could not have cared less about how the votes were being counted. When I told a Chicago television person that I was there to see how the votes were counted, and commented that they did a better job counting votes in Serbia, she responded that she was glad she was not in Serbia. 


That is how elections are done in Chicago, one of the most corrupt cities in the world, and it is very much the same in every other city and state in the United States.  The counting of the votes in American elections, you see, has been completely removed from the oversight of the American people and has been turned over to private foreign-owned companies, who own the equipment and control the software that runs the voting equipment and counts the votes for most American voters. 


Some of these companies involved in U.S. elections, such as Voxeo, which processed the tally of the Iowa caucus in 2004 giving John Forbes Kerry an undeserved boost, are owned or controlled by Israeli military intelligence. Again in 2008, the Voxeo results of the Iowa caucus gave Barack Obama an unexpected victory.  In many cases, the election software is controlled by the Israelis, and through back doors they are able to manipulate the results. 

The controlled media ignores the fundamental problem that there is no transparency in American elections. The theft of American elections by privately owned election and software companies tied to Israeli intelligence is an absolute non-issue in the Zionist-controlled media in the United States.  So, who really controls American elections? Ask Shimon Peres or Ehud Olmert or the director of Mossad, but don't expect the Zionist-controlled media in the United States to tell you. 

The stealing of American elections is primarily a computer crime, as was the false flag terror attack of 9-11. These crimes are carried out by criminals who produce malicious computer code and enterprise software. The part of the crime done through the computer systems is very difficult to detect and trace, which gives the perpetrators a false sense of invulnerability, not unlike the bad guys in a James Bond film.  There is, however, an agent who leaves a record of producing and distributing the software that is used in these computer crimes. This is the starting point from which we can determine who is really behind these computer crimes. 


PTECH & 9-11 – THE "ARAB" DISGUISE FAILS 

During the first 9-11 "truth" events, there was a great deal of discussion about a Massachusetts-based software company called Ptech, which had been involved with the computer systems of the FAA and NORAD, two agencies whose systems completely failed on 9-11. 

"Ptech was with Mitre Corporation in the basement of the FAA for two years prior to 9-11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency," the former risk and software specialist Indira Singh told the 9-11 Citizens' Commission hearings. 

So this mysterious little company from QuincyMassachusetts, whose software was on all the critical computer networks of the U.S.government and military, we were told, was Arab-owned, financed, and linked to terrorists.  This, however, was quite false; Ptech was simply an Arab "cut out." 

As I quickly discovered, Ptech's Arab identity was fake; it was nothing but an Arab "cut out." Ptech was, in fact, an Israeli-controlled Mossad front company, made to look like an Arab-owned company. When a company goes to such lengths to mask its true identity, you can be sure there is a very important reason. 


In an article of January 2005, entitled "Ptech, 9-11, and USA-Saudi Terror, Part II," an author named Michael Kane wrote on Michael Ruppert's website From The Wilderness: 

January 27, 2005 (FTW) - Ptech - the software company whose major investors and directors are strongly linked to the Muslim Brotherhood - produced software that derived from PROMIS, had an artificial intelligence core, and was installed on virtually every computer system of the U.S. government and its military agencies on September 11, 2001.  This included the White House, Treasury Department (Secret Service), Air Force, FAA, CIA, FBI, both houses of Congress, Navy, Department of Energy, IRS, Booz Allen Hamilton, IBM, Enron and more. 

Whoever plotted 9/11 definitely viewed the FAA as an enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful. To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House & Secret Service had the same software on their systems - likely a superior modified version capable of "surveillance and intervention" functions. 

Ptech is enterprise architecture software, which Indira planned on customizing to use as "risk architecture" software. 

Enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the enterprise in real-time. In the case of Ptech software installed on White House, Secret Service, Air Force and FAA systems, the enterprise included all of the data produced by those agencies in real-time. 


How odd. What was so telling about these early reports by Kane and others about Ptech in the 9-11 "truth" movement is that these people seemed to know a great deal about how the Ptech software works, while they were completely blind about the Israeli connection to the company. They all stressed that Ptech was an Arab-owned and financed company from QuincyMassachusetts. Either they don't know anything about who Ptech is -- or they are supporting the lie that it is an Arab company. I suspect the latter. 

I never accepted the notion that 9-11 had been carried out by Muslims in Pakistan or terrorists based in the caves of Afghanistan. This always seemed preposterous and it didn't take me very long to find that Ptech was an Arab cut-out controlled by an agent of Israeli intelligence.  It made no sense that Arab terrorists, who could barely fly, could deceive the U.S. Air Force, NORAD, and the FAA, and that the extremely sophisticated 9-11 operation was directed from a cave in Afghanistan. I'm sorry, but that is just not believable. 

Ptech, as I discovered, was from the beginning controlled by a Jewish lawyer from WorcesterMassachusetts, named Michael S. Goff. It is very clear that Goff worked for Mossad, because the prize client of his PR firm was a Mossad-owned company named Guardium.

 
Michael S. Goff, the son of B'nai B'rith and Worcester lawyer who quit his law practice to market Ptech software to the U.S.government.  (Photo from Goff website)


This is how I reported this discovery in my article of April 2005 entitled "How Mossad Deceived the U.S. Military on 9-11": 

Joe Bergantino, a reporter for WBZ-TV's investigative team, was torn. He could risk breaking a story based on months of work investigating a software firm linked to terrorism, or heed the government's demand to hold the story for national security reasons. In mid-June, Bergantino received a tip from a woman in New York who suspected that Ptech, a computer software company in QuincyMass., had ties to terrorists. Ptech specialized in developing software that manages information contained in computer networks.

Bergantino's investigation revealed that Ptech's clients included many federal governmental agencies, including the U.S. Army, the U.S. Air Force, the U.S. Naval Air Command, Congress, the Department of Energy, the Federal Aviation Administration, the Internal Revenue Service, NATO, the Federal Bureau of Investigation, the Secret Service, and even the White House.
 

"Ptech was doing business with every federal government in defense and had access to key government data," Bergantino said. 

The Mossad handler at Ptech was, in my opinion, an American named Michael S. Goff, who is disingenuous about what he did, when he worked at, and when he left, Ptech.  It should be noted that Ptech "got on its feet in 1994." Goff implies that he left Ptech when Goff Communications began in 1994; certainly not true. 

Here is what Michael Goff's website says about his work there: 

Michael was marketing manager at Ptech, Inc., a leading provider of business process modeling, design and development software. In this capacity, Michael managed various marketing programs and activities including public relations, direct mail, Web development, collateral, trade shows and seminars. Additionally, Michael worked closely with the Ptech sales organization to perform competitive analysis as well as manage lead tracking and fulfillment activities. 

When Michael first joined Ptech, he shared responsibilities between marketing and information systems for the company. As information systems manager, Michael handled design, deployment and management of its Windows and Macintosh, data, and voice networks. As part of this effort, Michael developed Lotus Notes-based systems for sales and marketing lead tracking and IS service and support requests. Michael also performed employee training and handled all procurement for software, systems and peripherals. 


From Goff Communications website, you will notice that one of his current prize clients is an Israeli company known as Guardium. This company is located less than 5 miles from Hanscom AFB, site of MIT's Lincoln Labs and about the same distance from Boston's Logan Airport. The Israeli presence can be seen all over MIT and Boston. 

Guardium, a "database security" firm, is clearly a Mossad operation working in a critical area - the same area that the two planes that hit the World Trade Center originated - Boston's Logan Airport. 

Don't take my word for it, look at who finances Guardium. Three firms, all Israeli, and all manned by Mossad agents. It should be noted that Mossad's headquarters are in Herzliya. It is clear that the three firms, Cedar Fund, Veritas Venture Partners, and Stage One, are all Mossad funding outfits. 


Ari Bronshtein, currently a director of Elron Electronic, the Israeli defense company behind Voxeo and the stealing of the Iowa caucus in 2004, was the manager of business analysis at Comverse Technologies, Inc. (See: Kobi Alexander and Odigo on 9-11) from 1999 to 2000. Bronshtein was also chairman of the investment committee of Stage One, one of the Mossad investors of Guardium. Do you see the links between the Israeli military intelligence and the computer crimes of 9-11 and the theft of elections in the United States? This is, however, just the tip of the iceberg. 


When I exposed the Israeli players behind Ptech, it should have changed everything, at least for those who follow what happened on 9-11. Ptech, whose "enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the enterprise in real-time," was not an evil Arab company after all. It was an Israeli-run company disguised as an Arab company. 

Do you really think that the most critical computer networks in the U.S. government would accept and run enterprise software from a Lebanese Muslim immigrant from Massachusetts? Of course not, but there were agents on the inside, and then there was the Jewish lawyer for Worcester, Michael Goff. 


Another "Arab" cut-out company tied to 9-11 surfaced when I got a tip from a reader in the Fort Lauderdale area of Florida. It concerned a graphics company called Next Graphics, a firm my source had done business with and which he even thought was Palestinian-owned. 

The facade of being a Muslim-owned firm at Next Graphics was entirely fake, like the bogus religious shrine they had in the entry. The principal owners of Next Graphics were Israelis and they are very closely tied to the Israelis who met with Ehud Olmert in New York on the day before September 11, 2001.

Finis

Sources and Recommended Reading: 

Bollyn, Christopher, "How Mossad Deceived the U.S. Military on 9/11," April 2005
http://www.bollyn.com/index/?id=10761 

Bollyn, Christopher, "Is MITRE Corp. The Trojan Horse of 9/11?" April 2005
http://www.erichufschmid.net/TFC/Bollyn-MITRE.html 

Bollyn, Christopher, "How a Private Company Counts our Votes"
http://www.votefraud.org/how_a_private_company_counts_our_votes.htm 

"Michael Chertoff and the sabotage of the Ptech investigation"
http://rigorousintuition.blogspot.com/2005/01/michael-chertoff-and-sabotage-of-ptech.html 

Goff Communications (Michael's image disappeared after my 2005 article appeared.)
http://web.archive.org/web/20050403162911/http://www.goffpr.com/about.asp

Solving 9-11: How Israeli Military Intelligence Controls Our Elections, Government and Military, January 2, 2008  
Final Edit – August 20, 2009
Latest Correction - February 16, 2010


Continue to Part IV..