The Unz Review • An Alternative Media Selection
A Collection of Interesting, Important, and Controversial Perspectives Largely Excluded from the American Mainstream Media
Email This Page to Someone

 Remember My Information



=>
 TeasersWhitney Webb Blogview

Bookmark Toggle AllToCAdd to LibraryRemove from Library • BShow CommentNext New CommentNext New ReplyRead More
ReplyAgree/Disagree/Etc. More... This Commenter This Thread Hide Thread Display All Comments
AgreeDisagreeThanksLOLTroll
These buttons register your public Agreement, Disagreement, Thanks, LOL, or Troll with the selected comment. They are ONLY available to recent, frequent commenters who have saved their Name+Email using the 'Remember My Information' checkbox, and may also ONLY be used three times during any eight hour period.
Ignore Commenter Follow Commenter

CRISPR gene-editing expert Eric Lander, Biden’s director of the Office of Science and Technology Policy, is awaiting Senate confirmation to serve in a new Cabinet-level position in the Biden administration. Jeffrey Epstein, the eugenicist pedophile and sex trafficker, bragged about funding Lander’s research and was photographed taking part in at least one meeting with him.

Shortly before he took office, President Joe Biden announced that he would be elevating the director Office of Science and Technology Policy to a cabinet-level position, meaning that his nominee to lead that office, geneticist Eric Lander, would require confirmation by the US Senate. Lander is currently serving as director of that office, but has yet to serve in cabinet-level capacity as he awaits confirmation.

Mainstream media reports described Biden’s move to place Lander in his cabinet as “meant to highlight his commitment to science,” which has been used to contrast his approach with that of Trump, who was accused of second-guessing “authoritative” voices from academia and the medical establishment. Lander is deemed to be one such “authoritative” voice, having previously served as external co-chair on former President Obama’s Council of Advisors on Science and Technology.

However, Biden placing Lander in this role begs the question of exactly what type of science he will promote in his new position, as eugenicist and intelligence-linked pedophile Jeffrey Epstein bragged on his website about having “had the priviledge [sic] of sponsoring” Lander’s research via the Jeffrey Epstein VI Foundation. Lander’s spokesperson told the New York Times in 2019 that “Mr. Epstein appears to have made up lots of things and this seems to be among them,” regarding whether or not Lander had indeed received funding from Epstein.

In addition to the issue of funding from Epstein, Lander, who is also a biology professor at MIT, is known to have met with Epstein at least once, as he was pictured taking part in a 2012 meeting with Epstein at the office of Harvard’s Martin Nowak, a mathematical biologist who received millions in funding from Epstein. After Epstein’s 2019 arrest, Lander claimed that he had been invited to the meeting by Nowak and had been unaware of who was set to attend the event. He additionally stated that he “later learned about [Epstein’s] more sordid history” and denied having had a relationship with Epstein.

Yet, there remains the issue that Epstein himself included Lander in a list of scientists he sponsored, with the other scientists on that list having indeed been supported by Epstein in some fashion. If we are to believe Lander, it remains unclear why Epstein, before he became so infamous, would falsely claim to fund Lander and why Lander would wait to deny any association until only after Epstein’s arrest. Given that the other scientists listed alongside Lander on Epstein’s website did receive funding from his foundation, it seems unlikely that Epstein would deceptively throw in Lander’s name among a list of several other scientists he was funding at a time, particularly when he was not yet publicly controversial and did not present such a grave risk to his associates’ reputations.

However, Lander’s denials seem to have been more than sufficient for some mainstream media outlets following his nomination to serve in the Biden administration, with some outlets now claiming that Lander was not reported to have received funding from Epstein, despite Epstein’s own claims to the contrary. For instance, BuzzFeed wrote on January 19, 2021 that Lander “has not been reported to have received any money from Epstein”.

The Broad Institute, Silicon Valley and Intelligence

Despite Lander’s denials of a personal relationship, Epstein also had very close ties to Lander’s employer, MIT. Epstein donated hundreds of thousands of dollars to the institution and Epstein was also used as a channel for making donations to MIT by billionaire Bill Gates. Gates has yet to explain why he would funnel his donations through Epstein as opposed to publicly donating via his well-known “philanthropic” foundation. Epstein’s funding of the MIT Media Lab in particular led to the resignation of its former director Joi Ito in September 2019 following Epstein’s arrest and subsequent “suicide.”

In addition, Epstein was particularly close to one of the biggest names at MIT, the late artificial intelligence pioneer Marvin Minsky. Minsky once organized a two-day symposium on artificial intelligence at Epstein’s private island in 2002 and Epstein victims have alleged that they were forced by Epstein to engage in sex acts with Minsky. Both Minsky and Eric Lander were corporate fellows of the Thinking Machines corporation, a DARPA contractor that made supercomputers in the late 1980s and early 1990s. That company’s various components were acquired by a web of intelligence-linked companies like CIA-linked Oracle and IBM while many of its former engineers left for Sun Microsystems, where future Google CEO Eric Schmidt was then serving as Chief Technology Officer.

Lander, more recently, has again become closely associated with tech companies deeply tied to the US national security state as the founding director of the Broad Institute, an independent genomic research institution partnered with both MIT and Harvard. Incidentally, MIT and Harvard are the two academic institutions most closely linked to Epstein’s “philanthropy,” particularly in the field in which the Broad Institute specializes.

 

The devastating hack on SolarWinds was quickly pinned on Russia by US intelligence. A more likely culprit, Samanage, a company whose software was integrated into SolarWinds’ software just as the “back door” was inserted, is deeply tied to Israeli intelligence and intelligence-linked families such as the Maxwells.

In mid-December of 2020, a massive hack compromised the networks of numerous US federal agencies, major corporations, the top five accounting firms in the country, and the military, among others. Despite most US media attention now focusing on election-related chaos, the fallout from the hack continues to make headlines day after day.

The hack, which affected Texas-based software provider SolarWinds, was blamed on Russia on January 5 by the US government’s Cyber Unified Coordination Group. Their statement asserted that the attackers were “likely Russian in origin,” but they failed to provide evidence to back up that claim.

Since then, numerous developments in the official investigation have been reported, but no actual evidence pointing to Russia has yet to be released. Rather, mainstream media outlets began reporting the intelligence community’s “likely” conclusion as fact right away, with the New York Times subsequently reporting that US investigators were examining a product used by SolarWinds that was sold by a Czech Republic–based company, as the possible entry point for the “Russian hackers.” Interest in that company, however, comes from the fact that the attackers most likely had access to the systems of a contractor or subsidiary of SolarWinds. This, combined with the evidence-free report from US intelligence on “likely” Russian involvement, is said to be the reason investigators are focusing on the Czech company, though any of SolarWinds’ contractors/subsidiaries could have been the entry point.

Such narratives clearly echo those that became prominent in the wake of the 2016 election, when now-debunked claims were made that Russian hackers were responsible for leaked emails published by WikiLeaks. Parallels are obvious when one considers that SolarWinds quickly brought on the discredited firm CrowdStrike to aid them in securing their networks and investigating the hack. CrowdStrike had also been brought on by the DNC after the 2016 WikiLeaks publication, and subsequently it was central in developing the false declarations regarding the involvement of “Russian hackers” in that event.

There are also other parallels. As Russiagate played out, it became apparent that there was collusion between the Trump campaign and a foreign power, but the nation was Israel, not Russia. Indeed, many of the reports that came out of Russiagate revealed collusion with Israel, yet those instances received little coverage and generated little media outrage. This has led some to suggest that Russiagate may have been a cover for what was in fact Israelgate.

Similarly, in the case of the SolarWinds hack, there is the odd case and timing of SolarWinds’ acquisition of a company called Samanage in 2019. As this report will explore, Samanage’s deep ties to Israeli intelligence, venture-capital firms connected to both intelligence and Isabel Maxwell, as well as Samange’s integration with the Orion software at the time of the back door’s insertion warrant investigation every bit as much as SolarWinds’ Czech-based contractor.

Orion’s Fall

In the month since the hack, evidence has emerged detailing the extent of the damage, with the Justice Department quietly announcing, the same day as the Capitol riots (January 6), that their email system had been breached in the hack—a “major incident” according to the department. This terminology means that the attack “is likely to result in demonstrable harm to the national security interests, foreign relations, or the economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people,” per NextGov.

The Justice Department was the fourth US government agency to publicly acknowledge a breach in connection to the hack, with the others being the Departments of Commerce and Energy and the Treasury. Yet, while only four agencies have publicly acknowledged fallout from the hack, SolarWinds software is also used by the Department of Defense, the State Department, NASA, the NSA, and the Executive Office. Given that the Cyber Unified Coordination Group stated that “fewer than ten” US government agencies had been affected, it’s likely that some of these agencies were compromised, and some press reports have asserted that the State Department and Pentagon were affected.

In addition to government agencies, SolarWinds Orion software was in use by the top ten US telecommunications corporations, the top five US accounting firms, the New York Power Authority, and numerous US government contractors such as Booz Allen Hamilton, General Dynamics, and the Federal Reserve. Other notable SolarWinds clients include the Bill & Melinda Gates Foundation, Microsoft, Credit Suisse, and several mainstream news outlets including the Economist and the New York Times.

Based on what is officially known so far, the hackers appeared to have been highly sophisticated, with FireEye, the cybersecurity company that first discovered the implanted code used to conduct the hack, stating that the hackers “routinely removed their tools, including the backdoors, once legitimate remote access was achieved—implying a high degree of technical sophistication and attention to operational security.” In addition, top security experts have noted that the hack was “very very carefully orchestrated,” leading to a consensus that the hack was state sponsored.

 
• Category: Foreign Policy • Tags: Hacking, Israel, Mossad, SolarWinds 

Researchers at a BSL-3 lab tied to the organizers of the 2001 Dark Winter simulation, DARPA, and the post-9/11 biodefense industrial complex are genetically modifying anthrax to express Covid-19 components, according to FOIA documents.

Soon after having been fired from his post as secretary of the treasury in December 2002, after a policy clash with the president, Paul O’Neill became a trustee of the University of Pittsburgh Medical Center. Despite having just worked under and clashed with George W. Bush and Dick Cheney, it wasn’t until O’Neill began answering to UPMC CEO Jeffrey Romoff as a member of the Center’s board that he chose to publicly denounce a superior as “evil.”

“He wants to destroy competition. He wants to be the only game in town,” O’Neill would later state of Romoff, adding that “after 18 months I quit [the UPMC board] in disgust” due to Romoff’s “absolute control” over the board’s actions. O’Neill subsequently noted that UPMC “board members who have wealth of hundreds of millions of dollars are not willing to take this guy on.” When pressed by a local reporter, O’Neill further elaborated that he had been told by other board members that they were “afraid” of Romoff because Romoff might “harm them in some way.”

O’Neill’s criticisms of Romoff are hardly an outlier, as local community activists and even a state attorney general have noted that UPMC’s board lets Romoff do as he pleases.

Jeffrey Romoff has ruled UPMC with an iron fist since his predecessor, Thomas Detre, had a heart attack in 1992. As a result of the Center’s massive wealth accumulation, at first spurred by his magic touch for receiving National Institutes of Health (NIH) grants, Detre was able to use the financial power afforded to him to consolidate control over enough of the University of Pittsburgh to create his “own personal fiefdom,” which is now the stand-alone corporation known as UPMC.

Not long after Romoff took over the Center’s reins, he made his intentions clear to faculty and staff, stating at one 1995 UPMC meeting that his “vision” for the future of American health care was “the conversion of health care from social good to a commodity.” Motivated by profit above all else, Romoff aggressively expanded UPMC, gobbling up community hospitals, surgery centers, and private practices to create a “health-care network” that has expanded throughout much of Pennsylvania and even abroad to other countries, including China. Under Romoff, UPMC has also expanded into the health-insurance business, with 40 percent of the medical claims it pays out going straight back into places of care that are owned by UPMC—meaning UPMC is essentially paying itself.

In addition, since UPMC is officially a “charitable nonprofit corporation,” it is exempt from property taxes and has special access to the tax-exempt municipal bond market. UPMC can also solicit tax-deductible grants from private individuals and organizations, as well as governments. These grants totaled over $1 billion dollars between 2005 and 2017.

Despite these perks being officially justified because of UPMC’s “charitable institution” status, the UPMC board, with Romoff at the top, have seen their own multimillion-dollar-per-year salaries continue to climb. Perhaps this perk also comes from UPMC being a nonprofit corporation, as there are no stockholders to whom Romoff and the board must explain their increasingly exorbitant salaries. For instance, Romoff made $8.97 million last year as UPMC’s CEO, a marked increase over the $6.12 million he had raked in the prior year.

UPMC’s financial chicanery is so out of control that even Pennsylvania’s attorney general has taken action against it, suing UPMC in February 2019 for violations of the state’s charity laws based on their “unjust enrichment” and engaging in “unfair, fraudulent or deceptive acts or practices.” Though UPMC decided to settle out of court, the Center and Romoff came out of the affair relatively unscathed.

Now, thanks to the crisis caused by Covid-19, UPMC is once again on the path toward growing even larger and more powerful in pursuit of Romoff’s ultimate goal, which is, in his own words, to make UPMC the “Amazon of health care.”

In this fourth installment of the The Last American Vagabond series “Engineering Contagion: Amerithrax, Coronavirus and the Rise of the Biotech-Industrial Complex”, the “nonprofit” health-care behemoth that is UPMC is squarely placed at the intersection of post-9/11 “biodefense” public-private partnerships; corporate-funded academics who shape public policy on behalf of their private-sector benefactors; and risky research on dangerous pathogens that threatens to unleash the very “bioterror” that these institutions claim to guard against.

The Odd Trajectory of UPMC’s Covid-19 Vaccine Efforts

In January 2020, when much of the world remained blissfully unaware of the coming global pandemic, UPMC was already at work developing a vaccine to protect against the novel coronavirus that causes Covid-19, known as SARS-CoV-2. That month, before the state of Pennsylvania had a single case of Covid-19, UPMC formed a “coronavirus task force,” which was initially focused on lobbying the US Centers for Disease Control and Prevention (CDC) to obtain samples of live SARS-CoV-2 for research purposes. That research was to be conducted at the Biosafety Level 3 (BSL-3) Regional Biocontainment Laboratory (RBL) housed within UPMC’s Center for Vaccine Research. A day after the director of UPMC’s Center for Vaccine Research, W. Paul Duprex, revealed UPMC’s efforts to access the SARS-CoV-2 virus, he announced that the virus samples, containing an estimated 50 to 60 million coronavirus particles, were already en route to the university. At the time, UPMC was one of only a handful of institutions on the CDC’s short list to receive live SARS-CoV-2 samples.

 

Joining me today is Whitney Webb to discuss her recent article on the chilling 2020 election predictions being made by TIP, and how it all seems to be yet again feeding into the same, seemingly all-encompassing, technocratic agenda.

.

 
• Category: Ideology • Tags: 2020 Election, Conspiracy Theories 

Evidence of the corruption of the company Emergent BioSolutions has emerged yet again as the firm, set to play a key role in the manufacture of four leading COVID-19 vaccine candidates, has been caught selling the US government a biodefense product it knew was non-functional.

Internal documents and e-mails from the “life sciences” company Emergent BioSolutions reveal that the company was aware that its biodefense product for the treatment of nerve gas exposure, sold under the brand name Trobigard, was both non-functional and untested for safety or efficacy while it was actively marketing the product to the U.S. government.

The firm was well aware of the fact that Trobigard’s functionality and safety in humans had never been tested several months before it was awarded a no-bid $25 million contract in October 2017 and a subsequent $100 million contract in 2019 to supply troves of the product to the State Department. Indeed, the results of the company’s first study on Trobigard’s efficacy in treating exposure to nerve gas were not even available until six weeks after Emergent had won the contract with the State Department and, even then, those results could “not be directly extrapolated to the human situation,” per the study’s authors.

According to internal company records and emails from Emergent employees and government officials obtained by The Washington Post, Emergent’s director of regulatory affairs, Brenda Wolling, stated in July 2017 that “functionality testing has not been successful in this device [Trobigard]” and that even describing Trobigard as “a treatment of nerve agent poisoning” was inaccurate because that claim “implies that we have efficacy data showing it works.”

Emergent BioSolutions declined to answer if the inaccurate marketing claims that Trobigard had been tested for safety and efficacy had been made to State Department officials prior to the awarding of the first contract for Trobigard in October 2017. The company did, however, state that Wolling’s claims had been “taken seriously” but that they did “not necessarily represent the company’s position.”

Notably, Wolling had sent internal warnings about Trobigard to colleagues a year prior, in 2016, telling Emergent salespeople to “exclude efficacy claims” about the biodefense product when marketing it to potential buyers. She specifically stated that “we have not substantiated that this co-formulated product is efficacious or safe, and have never tested against nerve agents as an antidote.” Also in 2016, a former Emergent executive, Dan Mallon, was also found to have admitted to Emergent employees that “Emergent sales representatives had made unsupported claims about Trobigard to clients.”

Even Emergent’s spokeswoman Nina DeLorenzo has since openly acknowledged that “Emergent has not tested the safety or efficacy of atropine and obidoxime co-formulated,” meaning that the combination of the two drugs that compose Trobigard has never been found to be safe or even work.

“Emergent made clear to government agencies interested in procuring Trobigard that they were doing so based on their own determination of need, without this type of safety or efficacy data from Emergent,” DeLorenzo told The Washington Post, essentially declaring that Emergent’s policy with respect to Trobigard is that of “buyer beware.”

Yet, some of Trobigard’s issues were so glaring and obvious that they resulted in public recalls, with the company recalling 61,000 units that had been sold to the United Arab Emirate in January 2019. While Emergent’s contract with the State Department obligated them to report “any issues with the safety and efficacy of delivered or ordered products and/or manufacturing or quality of the production lines” in a timely manner, the company argued that the recall in the UAE was unrelated to the State Department’s orders of Trobigard because they were different production batches. A similar recall was later made with units of Trobigard that had been sold to Italy’s government and Emergent chose to notify the State Department on that occasion. Trobigard had also been plagued with production issues, such as that which resulted in the discoloration of Trobigard injectors following sterilization, referred to as the “red spots” issue in company records.

The end result of Trobigard’s troubles was ultimately Emergent’s quiet decision to re-list it as a product in development as opposed to a marketable product on its website and to require that all future sales of Trobigard be approved by Emergent’s medical, legal and regulatory departments. However, Emergent has maintained that the Trobigard injectors sold to the State Department are safe, despite having admitted that no safety or efficacy tests of the product in humans have ever been conducted. The company has continued to receive payments from their multi-million dollar contracts with the State Department, the last of which was made last September.

Trobigard’s numerous issues appear to be precisely why Emergent sought to market the troubled product to the State Department in the first place, as marketing the product for use by U.S. diplomats overseas allowed Emergent to avoid needing the approval of the U.S. Food and Drug Administration (FDA), which is necessary for the product’s sale within the United States. In order to facilitate Trobigard’s sale without FDA approval, Emergent sold Trobigard to the State Department through a subsidiary based in the U.K. and had the injectors assembled in Europe where the finished product was then sent to U.S. embassies around the world. Trobigard is not currently approved for use by the health authorities of any nation.

An Abysmal Track Record Gets Worse

 
• Category: Foreign Policy • Tags: Anthrax, Bioweapons, Coronavirus 

A cybersecurity firm tied to Israeli intelligence’s Unit 8200 that simulated a series of terrorist attacks occurring on the U.S. 2020 election has announced a new hire with deep ties to the U.S. intelligence and defense communities with the goal of gaining greater access to U.S. government networks.

A cybersecurity company tied to Israeli intelligence and a series of unnerving simulations regarding cyber-terrorist attacks on the upcoming U.S. elections has recently announced a new hire who plans to aid the company in further penetrating the U.S. public sector. Last Wednesday, the company Cybereason announced that it had hired Andrew Borene as its Managing Director for its recently launched U.S. public sector business. Borene, who boasts longstanding ties to the U.S. intelligence community and the Pentagon, “will accelerate Cybereason’s partner and customer presence in the U.S. public sector,” according to a Cybereason press release.

“My goal is to build a strong business for Cybereason within the U.S. public sector and I am planning to recruit a group of direct support executives, veterans and alumni of the elite [U.S.] military units and agencies that have defended our nation in the information age. I’ll also work to establish a network of the best channel and delivery partners for federal, state and local governments,” Borene said per the press release.

Eric Appel, Cybereason’s General Manager for North American Sales, stated that “We’re excited about Andrew joining Cybereason and the opportunity in the U.S. public sector for Cybereason to make a profound impact on helping the nation’s federal civilian, military, state and local government agencies…”

Borene will likely be successful in his ability to recruit a sales team of prominent alumni from the U.S. intelligence and defense communities to market Cybereason’s products throughout the U.S. government. Prior to joining Cybereason, Borene was a senior advisor to the Intelligence Advanced Research Projects Activity (IARPA), the intelligence community’s “DARPA” equivalent that is housed within the Office of the Director of National Intelligence (ODNI). He served in that capacity on behalf of intelligence contractor Booz Allen Hamilton. Prior to that, Borene served as Associate Deputy General Counsel to the Pentagon and was previously a military intelligence officer for the U.S. Marine Corps.

Borene’s private sector experience is also significant, as he was a senior executive at IBM. Notably, the current Chief Information Officer for the CIA, Juliane Gallina, had served alongside Borene as a top IBM executive prior to taking her current position at the agency. In addition, Borene also boasts ties to Wall Street as a veteran of Wells Fargo’s investment banking division.

In addition, Borene has deep ties to Washington’s foreign policy establishment as a “life member” of the Council on Foreign Relations (CFR) and to the national security-think tank nexus through his senior fellowship at the National Security Institute (NSI). NSI’s board includes former NSA directors, Keith Alexander and Michael Hayden (also a former CIA director); former Deputy Defense Secretary and “architect” of the Iraq War, Paul Wolfowitz; former director of the Defense Intelligence Agency, David Shedd; and a variety of other former top intelligence and defense officials as well as Silicon Valley executives and venture capitalists.

Notably, Borene is the latest addition to Cybereason with ties to the U.S. intelligence and defense communities as the company’s advisors include Robert Bigman, former Chief Information Security Officer for the CIA as well as Peter Sherlock, the former Chief Operating Officer of MITRE corporation, a major intelligence and defense contractor connected to the Ptech-9/11 controversy.

Cybereason: a front for Israeli Military Intelligence

Cybereason’s announcement of its hire of Andrew Borene coincided with its launch of its new “U.S. public sector business,” meaning that Cybereason now seeks to have its cybersecurity software running on even more of the U.S. government’s most classified networks. Cybereason, for years, has already been running on several sensitive U.S. government networks through its partnerships with IT contractors for intelligence and defense, such as Lockheed Martin (also a Cybereason investor), WWT and Leidos. However, Borene’s hire and this new publicly announced pivot towards the U.S. public sector clearly demonstrates the company’s interest in further deepening its presence on U.S. government networks.

Cybereason’s pivot is concerning for several reasons. First, its co-founders are alumni of Israel’s Unit 8200, an elite unit of the Israeli Intelligence corps that is part of the IDF’s Directorate of Military Intelligence and is involved mainly in signal intelligence, surveillance, cyberwarfare and code decryption. It is also well-known for its surveillance of Palestinian civilians and for using intercepted communications as blackmail in order to procure informants among Palestinians living under occupation in the West Bank.

In addition, all three Cybereason co-founders, after leaving Unit 8200, went on to work for two private Israel-based tech/telecom companies with a notorious history of aggressive espionage against the U.S. government: Amdocs and Comverse Infosys (the latter is now known as Verint Systems Inc.). This raises the possibility that Cybereason software could potentially be used as a backdoor by unauthorized actors, given that the company’s co-founders all previously worked for firms that have a history of placing backdoors into U.S. telecommunications and electronic infrastructure as well as aggressively spying on U.S. federal agencies.

 
• Category: Ideology • Tags: 2020 Election, Israel, Mossad 

By moving in “the same circles as her father” and vowing to “work only on things involving Israel,” Isabel Maxwell became a pivotal liaison for the entry of Israeli intelligence-linked tech firms into Silicon Valley with the help of Microsoft’s two co-founders, Paul Allen and Bill Gates.

This is Part II of the series “The Maxwell Family Business: Espionage” and focuses on Isabel Maxwell. Part I can be found here.

In 1992, Israel’s government created the Yozma Program at the urging of Chief Scientist of Israel’s Ministry of Industry and Trade – Yigal Erlich – as Erlich moved to leave that position. The Yozma Program aimed to “incentivize venture investment” by creating state-linked venture capital funds, which later spawned a myriad of Israeli hi-tech start ups with merging them with major, foreign technology companies. According to Erlich’s website, he had lobbied Israel’s government to launch Yozma because he had “identified a market failure and a huge need in Israel to establish for the first time a professionally-managed venture capital industry that will fund the exponential growth of high tech ventures coming out of Israel.” He then “convinced the Israeli government to allocate $100 million for his venture capital vision.”

Erlich’s vision would also result in the fusion of Israel’s hi-tech sector, which he helped to create, with Israel’s intelligence apparatus, with numerous Israeli hi-tech conglomerates created with funding from the Yozma program and its successors doubling as tools of Israeli espionage. Notably, not long before Erlich convinced Israel to place $100 million into this program, Israeli intelligence, thanks largely to the work of infamous spymaster Rafi Eitan, had learned the benefits of placing backdoors for their intelligence services into commercial software through the theft and subversion of the PROMIS software. As noted in Part I of this series, Israel’s bugged version of PROMIS was largely marketed by Robert Maxwell.

After the Yozma program was established, the first venture capital fund it created was called Gemini Israel Ventures and Israel’s government chose a man named Ed Mlavksy to lead it. Mlavksy, at the time, was the Executive Director of the Israel-U.S. Bi-national Industrial Research and Development Foundation (BIRD), where Erlich was Chairman of the Executive Committee. Mlavsky states that, while heading the BIRD foundation, “he was responsible for investments of $100 million in more than 300 joint projects between U.S. and Israeli high-tech companies.” BIRD’s connections to Gemini Israel Ventures and the Yozma Program in general are interesting, given that – just a few years prior – it had come under scrutiny for its role in the one of the worst spy cases in U.S. history – the Jonathan Pollard affair.

Jonathan Pollard had been a naval intelligence analyst turned Israeli spy who passed troves of documents regarding U.S. military technology (specifically nuclear technology) as well as clandestine U.S. intelligence operations to Israeli intelligence, specifically to the now defunct spy agency Lekem. Pollard’s handler was none other than Rafi Eitan, who had engineered Israel’s outsized role in the PROMIS software scandal. In the indictment of Pollard for espionage, it was noted that Pollard delivered documents to agents of Israel at two locations, one of which was an apartment owned by Harold Katz, the then-legal counsel to the BIRD foundation and an adviser to Israel’s military, which oversaw Lekem. Government officials told the New York Times at the time that they believed Katz “has detailed knowledge about the [Pollard] spy ring and could implicate senior Israeli officials.”

Journalist Claudia Wright, writing in 1987, openly speculated about whether the close ties between Katz and Pollard’s handlers meant that BIRD itself had been used to pass funds to Pollard or that BIRD funds themselves, most of which were provided by U.S. taxpayers as opposed to public claims of “joint” funding, had been used to pay Pollard for his “services” to Israel. In her article, she notes that Mlavsky had considerable discretion over the use of those funds while the U.S. official in charge of overseeing the U.S.’ interests in BIRD did “not know how investment is regulated” by the foundation. In addition, no U.S. official had access to any audit of the foundation, which were said to be conducted by an Israel-based accounting firm with no U.S. offices. The New York Times noted at the time that Katz specifically “may have knowledge of the method used to pay Mr. Pollard, who received tens of thousands of dollars from his Israeli handlers.”

 

The alleged gunmen who killed the son of Esther Salas, the judge recently assigned to the Epstein-Deutsche Bank case, worked for a company of corporate spies and mercenaries with ties to intelligence and also to Deutsche Bank.

The news of the shooting of the husband and son of Esther Salas, the judge recently assigned to oversee the Jeffrey Epstein – Deutsche Bank case, caused shock and confusion while also bringing renewed scrutiny to the Epstein scandal just a week after Epstein’s main co-conspirator, Ghislaine Maxwell, was denied bail in a separate case.

The case Salas is set to oversee is a class action lawsuit brought by Deutsche Bank investors who allege that Deutsche Bank “failed to properly monitor customers that the Bank itself deemed to be high risk, including, among others, the convicted sex offender Jeffrey Epstein.” The case came after the New York state Department of Financial Services had settled with Deutsche Bank over the bank’s failure to cut ties with Epstein-linked accounts, resulting in Deutsche Bank paying a $150 million fine. Deutsche Bank, unlike other financial institutions, failed to close all of its accounts linked to Epstein until less than a month prior to his arrest last year, even though the bank had identified him as “high risk” years before.

Beyond the tragedy of Sunday’s shooting, which claimed the life of Salas’ only child, the quick discovery of the death of the main suspect, Roy Den Hollander, of a “self-inflicted” gunshot to the head before he could be arrested or questioned by authorities has led to speculation that there is more to the official narrative of the crime than meets the eye.

With law enforcement sources now claiming that Esther Salas was not the intended target of the attack and some media reports now suggesting that Den Hollander’s motive was related to his dislike of feminism, it appears there are efforts underway to distance Sunday’s tragic shooting from Salas’ recent assignment to the Epstein case, which occurred just four days before the tragic shooting.

The most likely reason for any such “damage control” effort lies in the fact that both U.S. law enforcement investigations and mainstream media reports have consistently downplayed the connections of Jeffrey Epstein’s sexual trafficking and financial crimes to intelligence agencies in the U.S. and Israel. Similarly, Roy Den Hollander previously worked for a New York firm has been described as a “private CIA” with ties to those countries’ intelligence agencies and, also, ties to Deutsche Bank.

A Private CIA

According to his website, Den Hollander once worked for Kroll Associates Moscow Office, where he “managed and upgraded Kroll’s delivery of intelligence and security in the former Soviet Union” from 1999 to 2000. A few years prior, Kroll had won a considerable bid from the Russian government to locate money allegedly “spirited out of the country by the directors of state enterprises when they realized that privatization was inevitable.” The Kroll executives in charge of the Russian portfolio prior to Den Hollander were E. Norbett Garrett, a former CIA station chief in Cairo and Kuwait, and Joseph Rosetti, former chief of security for IBM. During that period and prior to his hiring at Kroll, Den Hollender worked as a lawyer in Russia regarding “legal and business issues, including international financing and marketing” and married a Russian woman he met during his time there that he subsequently claimed was part of the “Russian mafia.”

Founded by Jules Kroll in 1972, Kroll Associates would later become known as the “CIA of Wall Street” and “Wall Street’s Private Eye” and was alleged to be an actual front for the CIA by French intelligence agencies, according to the Washington Post. Part of the reason for this nickname, which was once a boasting point for top Kroll executives, owes to the fact that the firm frequently hired former CIA and FBI officers, as well as former members of MI6 and Mossad. K2 Intelligence, the successor to Kroll Associates founded by Jules Kroll and his son Jeremy in 2009, has similar hiring practices, counting former FBI and NSA officials among its ranks alongside former high-ranking members of the Israel Defense Forces (IDF) and Shin Bet, Israel’s domestic intelligence agency. Kroll also boasted ties to the Bush family, with Jonathan Bush (George Bush Sr.’s brother) serving on its corporate advisory board, and Kroll was also employed by Bill Clinton’s first presidential campaign.

Though it is mainly involved in corporate security and investigations, Kroll has also frequently investigated targets of Washington foreign policy, including Saddam Hussein, and was also the company tapped to “reorganize” Enron in 2002. Kroll Associates also has long been a subject of scrutiny for those that question the official narrative on the attacks of September 11, 2001, given that the company was put in charge of security for the World Trade Center complex from 1993 bombing up through the 2001 attacks and has no shortage of ties to companies and individuals that profited from the attacks. Kroll itself experienced a “surge in business” following the events of 9/11, a day when its top executives all avoided going to work despite ostensibly providing security for the complex.

A similar “surge in business” for Kroll followed the 2003 U.S. invasion of Iraq after the company’s investigations into Saddam Hussein’s and the Bath Party’s finances had been used as partial justification for the military incursion. Kroll became a major provider of mercenaries along with companies like Blackwater and DynCorp to the U.S. invasion and subsequent occupation through its subsidiary Kroll Security International. Its clients included the United States Agency for International Development (USAID), which has long fronted for the CIA, and also provided mercenaries for the war in Afghanistan.

 
• Category: Foreign Policy • Tags: Donald Trump, Jeffrey Epstein, Mossad 

Ghislaine Maxwell is hardly the only Maxwell sibling to continue their father’s controversial work for intelligence, with other siblings carrying the torch specifically for Robert Maxwell’s sizable role in the PROMIS software scandal and subsequent yet related hi-tech espionage operations.

Many were surprised to learn earlier this month that the key co-conspirator in Jeffrey Epstein’s intelligence-linked sexual blackmail operation, Ghislaine Maxwell, had been in hiding in New England since Epstein’s arrest and subsequent “suicide” last summer. Her recent arrest, of course, has returned attention to the Epstein scandal and to Ghislaine’s ties to the entire operation, in which she played a central and crucial role, arguably more so than Epstein himself.

Ghislaine was first reported to be living in New England at the mansion of her alleged boyfriend Scott Borgeson on August 14th of last year. Though Maxwell is believed to have stayed there until purchasing the nearby New Hampshire home where she was arrested, attention from her presence on the East Coast was immediately and sensationally re-directed to the West Coast when, a day later on August 15th, the New York Post published a picture allegedly depicting Maxwell reading a book on “CIA operatives” at an In-N-Out Burger in Los Angeles, California. The photo was later revealed to have been photoshopped and a fake, but ultimately served its purpose in distracting from her actual location in New England.

While the media frenziedly covered the fake In-N-Out Burger photo, the appearance of an unexpected visitor nearby Borgeson’s mansion succeeded in largely slipping under the radar. On August 18th, Ghislaine’s sister Christine was spotted “packing up a number of bags” into a SUV just a few miles from Borgeson’s “secluded beachfront” home. Christine, who currently lives and works in Dallas, Texas, declined to comment on why she was visiting the exact area where Ghislaine was allegedly hiding at the time.

Out of the seven Maxwell siblings, Ghislaine Maxwell has undoubtedly received the bulk of media scrutiny both in recent years and arguably ever since the suspected homicide of the family patriarch, Robert Maxwell, in 1991. In the years since his death, Robert Maxwell’s close ties to Israeli intelligence and links to other intelligence agencies have been documented by respected journalists and investigators including Seymour Hersh and Gordon Thomas, among others.

While Ghislaine’s own ties to intelligence have since come to light in relation to her critical role in facilitating the Jeffrey Epstein sexual blackmail operation. Little, if any attention, has been paid to her siblings, particularly Christine and her twin sister Isabel, despite them having held senior roles at the Israeli intelligence front company that facilitated their father’s greatest act of espionage on Israel’s behalf, the sale of the bugged PROMIS software to the U.S. national laboratories at the heart of the country’s nuclear weapons system.

Not only that, but Christine and Isabel later became directly involved with technology-based business ventures that directly involved Ghislaine during the very period she worked with Epstein on behalf of Israeli and U.S. intelligence to ensnare powerful U.S. political and public figures in a sexual blackmail scheme involving minors. At the time, Ghislaine described her profession to a number of newspapers as “an internet operator.” Then, after this venture’s multi-million dollar sale to a competitor, Christine and Isabel became involved with successors to the PROMIS software scandal that were closely tied to U.S. intelligence and Israeli intelligence, respectively.

Ghislaine herself also became involved in these affairs, as did Jeffrey Epstein following his first arrest, as they began courting the biggest names in the U.S. tech scene, from Silicon Valley’s most powerful venture capital firms to its most well-known titans. This also dovetailed with Epstein’s investments in Israeli intelligence-linked tech firms and his claims of having troves of blackmail on prominent tech company CEOs during this same period.

With Ghislaine’s name and her ties to intelligence now inking their way back into the media sphere, detailing the decades-long course of these technology-focused espionage operations and their persistent ties to the Maxwell sisters demands the attention it deserves, as the need to air out the real Maxwell family business – espionage – is now greater than ever before.

Trap doors and Treason

One of the most brazen and successful operations conducted by Israeli intelligence on a global scale is undeniably its sale of a bugged software program to governments, corporations and major financial and scientific institutions around the world. That software program, known as the Prosecutor’s Information Management System or by its acronym PROMIS, was originally created and marketed by Inslaw Inc., a company created by former NSA official Bill Hamilton and his wife Nancy.

In 1982, Inslaw leased its revolutionary PROMIS software to the U.S. Justice Department, then headed by arch neocon Edwin Meese III, Ronald Reagan’s most trusted advisor and who would later go on to advise Donald Trump following the 2016 election. The success of the software, which allowed integration of separate databases and information analysis on a previously unimaginable scale, eventually caught the attention of Rafi Eitan, the notorious and legendary Israeli spymaster and handler of the “most damaging spy” in American history, Jonathan Pollard. Eitan, at the time, was serving as the then-head of the now defunct Israel intelligence service known as Lekem, which focused specifically on espionage related to scientific and technical information and discoveries.

Eitan had first learned of PROMIS from Earl Brian. Brian was a long-time associate of Ronald Reagan who had previously worked for the CIA in covert operations and had been in charge of Reagan’s healthcare program when Reagan was governor of California. Brian often bragged of the nickname he had acquired in overseeing that health care initiative – “the man who walked over the dead.” In 1982, however, Brian was attempting to build a business empire, in which then-AG Ed Meese’s wife was a major investor, and he had first met Eitan while attempting to sell a healthcare system in Iran.

 

AN ISRAELI GOVERNMENT CONTRACTOR FOUNDED BY A FORMER ISRAELI SPY HAS PARTNERED WITH ONE U.S. STATE AND IS SET TO ANNOUNCE A SERIES OF NEW PARTNERSHIPS WITH OTHER STATES AND U.S. HEALTHCARE PROVIDERS TO MONITOR CIVILIAN HEALTH AND USE AN IDF-DESIGNED AI SYSTEM TO PROFILE AMERICANS LIKELY TO CONTRACT CORONAVIRUS AND TO INFORM U.S. GOVERNMENT LOCKDOWN POLICY.

A company tied to Israel’s military signal intelligence unit, Unit 8200, has recently partnered with the state of Rhode Island to use an artificial intelligence-based system developed in tandem with the Israel Defense Forces (IDF) to profile Americans potentially infected and/or “at risk” of being infected with coronavirus, then informing government authorities of their “risk profile.” Once flagged, state health officials can target those individuals as well as their communities for mandatory testing, treatment and/or more restrictive lockdown measures.

The firm, Israel-based Diagnostic Robotics, is poised to announce a series of new such partnerships with several other U.S. states as well as major U.S. hospital systems and healthcare providers in the coming weeks, according to a company spokesperson. The first of these announcements came on June 30 regarding the firm’s new partnership with Mayo Clinic, which will soon implement the Diagnostic Robotics’ “artificial intelligence platform that predicts patients’ hospitalization risk.” They have also been in discussions with Vice President Mike Pence about the platform’s implementation nationwide since April.

Their creeping expansion into the U.S.’ state coronavirus response and that of other countries has been directly facilitated by the organization Start-Up Nation Central, funded by controversial hedge fund manager Paul Singer and directly partnered with an Israeli government-backed intelligence initiative aimed at making the United States dependent on technology developed by the Israeli military or intelligence community as a means of preventing the adoption of policies that support the non-violent Boycott, Divest and Sanctions (BDS) movement at the state and local levels. This initiative also serves the dual purpose of ensuring Israel’s political influence and positioning as the global “cyber power,” an oft-repeated policy goal of Israeli Prime Minister Benjamin Netanyahu.

Since March, Diagnostic Robotics’ AI-based “risk profiling” software for coronavirus has been utilized by the Israeli state in the form of the National Israeli COVID-19 Monitoring System, a key component of its increasingly Orwellian national health surveillance system. That system, which also initially partnered with Clalit — Israel’s largest health services provider, now involves the “daily nation-wide monitoring of coronavirus-related symptoms of the population.” Of course, these “coronavirus-related symptoms” include common symptoms such as headaches, coughing, abdominal pain and confusion, which can indicate any number of minor illnesses, allergic reactions or other conditions entirely unrelated to coronavirus.

The Diagnostic Robotics platform specifically acquires information from individuals via an online questionnaire, but also has access to national and private health databases by virtue of its partnerships with Clalit as well as all four of Israel’s health management organizations (HMOs), all of the country’s domestic healthcare providers and Israel’s Health Ministry. That data is then pooled and analyzed to assess a given individual’s “probability of infection” that is then cross checked with the information of “millions of others,” according to the company’s co-founder and Unit 8200 alumnus Kira Radinsky.

After that mass of data is pooled and analyzed by the platform’s AI-powered algorithm, the company’s platform, as used in Israel and now elsewhere, creates a “personalized, AI-based risk profile for Covid-19” for individuals and delivers that individual’s information and any “red flags” to health authorities, providing the Health Ministry with a map of corona “hot spots” that the government then uses to identify which communities to target with testing and more restrictive lockdown measures. Forbes noted that Israel’s use of Diagnostic Robotics’ platform has allowed it to “quickly close contaminated areas…as fast as a single day from the identification of symptomatic patients.” An internal study conducted by the company itself claims that the platform has a predictive accuracy of 73%, but their study has not been audited by independent scientists.

Israel’s health ministry, led by Yuli Edelstein, recently announced that Diagnostic Robotics “predictive” platform would be used more intensively to inform government decision-making as he, Netanyahu and other Israeli ministers have recently asserted that Israel is beginning to experience a “second wave” of coronavirus and must implement more restrictive measures and augment the use of existing and new “digital solutions.” Former Israeli health officials and other critics have asserted, however, that there is no “second wave” given that the test used by the government does not distinguish between active and inactive coronavirus cases. Others still have argued that the proposed measures are grossly unnecessary, given that there are less than 40 serious cases of coronavirus in the entire country and only 22 coronavirus patients are on ventilators.

Notably, the timing of this renewed push for more restrictive lockdowns and an expansion of its AI-driven Orwellian “health” surveillance coincides directly with the imminent initiation of Israel’s government plans to annex large swaths of Palestine’s West Bank, an act that is expected to generate unrest, not only in occupied Palestine, but also parts of Israel and internationally due to its flagrant illegality and far-reaching implications.

 
• Category: Foreign Policy • Tags: Coronavirus, Israel, Mossad 
PastClassics
The JFK Assassination and the 9/11 Attacks?
Becker update V1.3.2
Analyzing the History of a Controversial Movement