Anonymous ID: f20090 Sept. 2, 2020, 2:04 p.m. No.10507315   🗄️.is 🔗kun   >>7322 >>7548 >>7619

Related to Sentinel

ESOC provides oversight I believe

 

(from 2019)

 

*note

"Neither ESOC nor the vendor of the application was aware of the existence, origin, or purpose of this database. OIG analysis of the text messages in the database compared to ESOC productions

of text messages during the same time periods when the collection tool was functional identified a significant number of text messages found in the database that were missing from the ESOC

production. Furthermore, the Subject Matter Expert with whom the OIG consulted in connection with its forensic analysis of the devices identified additional potential security vulnerabilities

regarding the collection application. The OIG has provided these findings to the FBI. "

 

PROCEDURAL REFORM RECOMMENDATION FOR

THE FEDERAL BUREAU OF INVESTIGATION

SYNOPSIS

 

The Federal Bureau of Investigation (FBI), Enterprise Security Operations Center (ESOC) uses a commercial, off-the-shelf, automated application to wirelessly collect text messages sent to or from FBI-issued mobile devices. The application is supposed to collect the messages and store them so they are retained by ESOC. ESOC would then have the ability to produce text messages during the discovery process of criminal and civil matters, as well as for internal investigations. During the Office of the Inspector General’s (OIG) work that resulted in the report, A Review of Various Actions by the Federal Bureau of Investigation and Department

of Justice in Advance of the 2016 Election,

https://www.justice.gov/file/1071991/download (Preelection Review), the OIG found issues with the reliability of the collection application. In addition, unknown to the FBI, the OIG found that FBI text messages were saved to a database on the devices, some of which were not captured by the collection application. The OIG identified this, and other concerns, as security vulnerabilities. The OIG described these issues in its Report of Investigation: Recovery of Text Messages from Certain FBI Mobile Devices,

https://oig.justice.gov/reports/2018/i-2018-003523.pdf, in which we stated that the OIG would be submitting a procedural reform recommendation to the FBI relating to the retention of electronic

communications. We are now doing so.

 

DETAILS

 

The Problem

 

The OIG requested from the FBI text messages of, among others, two employees in connection with the Pre-election Review. When the OIG received the text message production from FBI, there was a time period of several months for which FBI did not produce text messages for mobile devices used by the two FBI employees. The FBI informed the OIG that it was aware that there were deficiencies in its collection application and that it was changing the model of the mobile device issued to FBI employees as part of a regular technical refresh and to mitigate the problem. However, the OIG later learned that, even after upgrading to new devices, the data collection tool utilized by the FBI was still not reliably collecting text messages from approximately 10 percent of more than 31,000 FBI-issued mobile devices. In addition, during the OIG’s forensic examination of FBI mobile devices that were used by the two employees, the OIG discovered a database on the mobile devices containing a plain text repository of a substantial number of text messages sent and received by those devices.

 

2

Neither ESOC nor the vendor of the application was aware of the existence, origin, or purpose of this database. OIG analysis of the text messages in the database compared to ESOC productions of text messages during the same time periods when the collection tool was functional identified a significant number of text messages found in the database that were missing from the ESOC production. Furthermore, the Subject Matter Expert with whom the OIG consulted in connection with its forensic analysis of the devices identified additional potential security vulnerabilities regarding the collection application. The OIG has provided these findings to the FBI.

 

https://oig.justice.gov/reports/2019/i1902.pdf

 

What is this application?

Who is the Vendor?

 

Is the System comprismised?

 

cont

Anonymous ID: f20090 Sept. 2, 2020, 2:05 p.m. No.10507322   🗄️.is 🔗kun   >>7335 >>7548 >>7619

>>10507315

 

cont

 

PREVIOUS VERSIONS OF FBI CASE MANAGEMENT SOFTWARE

 

The Investigative Data Warehouse -

 

"The Investigative Data Warehouse is a massive data warehouse, which the Bureau describes as "the FBI's single largest repository of operational and intelligence information." As described by FBI Section Chief Michael Morehart in 2005, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data." Unidentified FBI agents have described it "one-stop shopping" for FBI agents and an "uber-Google." […] The FBI worked with Science Applications International Corporation (SAIC), Convera and Chiliad to develop the project, among other contractors."

 

https://www.eff.org/issues/foia/investigative-data-warehouse-report

 

*NOTE- Chiliad (Maxwell) and SAIC both have history involving stolen Promis software

 

"Chiliad’s founders were influenced by the space shuttle Challenger disaster and the 9/11 terrorist attacks. Investigations into both events concluded that information stored in incompatible databases and documents maintained by different departments and organizations could have allowed managers and officials to prevent those disasters. But there simply was no existing technology to “connect the dots” across so many incompatible systems and organizations. […] After an extensive evaluation of available technologies, the FBI turned to Chiliad to create its Investigative Data Warehouse. […] [FBI] users execute one million searches and analyses each month to connect the dots across more than 700 million records and documents from more than 50 multi-agency, multi-format data sources, connected to the National Counterterrorism Center and to databases of the Department of Homeland Security, the CIA, the NSA and the Pentagon, with an average execution time of four to six seconds. […] On the strength of its success at the FBI, the Office of the Director of National Intelligence selected and funded Chiliad to create the first operational pilot to achieve and demonstrate effective, secure decentralized information sharing across U.S. intelligence and law enforcement agencies – a direct and successful response to one of the 9/11 Commission’s most pointed recommendations."

 

https://www.businesswire.com/news/home/20080303005669/en/Chiliad-Company-Solved-911-Connecting-Dots-Problem

 

(Maxwell family, Information on Demand, Promis, Sandia background)

https://unlimitedhangout.com/2020/07/investigative-series/the-maxwell-family-business-espionage/

 

Mike Ruppert,

"Bin Laden's Magic Carpet - Secret U.S. PROMIS Software", 2001/10/26 -

mentions defense contractors DynCorp, Raytheon, Boeing, and SAIC using PROMIS, along with the Harvard Endowment, Financial Criminal Enforcement Network (FINCEN), and US Treasury

 

http://www.fromthewilderness.net/free/ww3/11_19_01_magic_carpet.html

 

Sharona Merel,

"NATIONAL BALLOT INTEGRITY PROJECT: Frequently Asked Questions (FAQ)" - further allegation of SAIC using PROMIS:

"In January 2005, it was reported at Boston.com, that SAIC was awarded a $170 million contract for a PROMIS-type computer software program for the FBI, intended “to help agents share data about terrorist threats and criminal cases.” Could SAIC be the keeper of the “improved” PROMIS technology?"

 

http://www.bushstole04.com/hackingelections/national_ballot_integrity.htm

Anonymous ID: f20090 Sept. 2, 2020, 2:06 p.m. No.10507335   🗄️.is 🔗kun   >>7340 >>7548 >>7619

>>10507322

 

cont

 

The Virtual Case File system -

 

"In March, the bureau deployed the first phase of the Trilogy project at 591 FBI sites worldwide. The network connects 22,000 workstations, 2,612 switches and routers, 622 Ethernet LANs and 291 servers, Lowery said. […] Trilogy later this year will host the Virtual Case File system, a browser application that will let FBI agents store, inspect and correlate data about criminal cases and national security investigations. The bureau plans to deploy the VCF on Dec. 13. […] Lowery said the agency's new information warehouse, a data mart project known as Scope, is built on an Oracle9i database with a capacity of 9T. […] The bureau plans to connect the Scope data mart to state and local databases, telephone records, and databases at the Pentagon, Drug Enforcement Administration, Bureau of Alcohol, Tobacco, Firearms and Explosives, and other agencies, as well as the State Department's visa database. […] The bureau has adopted commercial data analysis tools to exploit the content of Scope. Some of the tools include the Chiliad Business Intelligence Suite from Chiliad Inc. of Amherst, Mass., which the bureau used to build its Athena Search System; ClearResearch from ClearForest Corp. of New York; RetrievalWare from Convera of Vienna, Va., and Infoworkspace by Ezenia Inc. of Burlington, Mass. […] Contractor Computer Sciences Corp. is creating the hardware infrastructure for the Trilogy deployment, while Science Applications International Corp. of San Diego is providing the VCF application. […] Larry Glock, program manager for Trilogy, said SAIC and CSC are using commercial products with some custom code. 'We empowered them to come up with their best architecture for the system. It mainly relies on Oracle9i database software and Sun [Microsystems Inc.] servers in several locations.'"

 

https://gcn.com/articles/2003/07/09/fbi-gets-on-the-case.aspx

https://gcn.com/Articles/2003/07/09/FBI-gets-on-the-case.aspx?Page=2

 

(Background on VCF- SAIC and DynCorp)

*both link directly to Promis and DynCorp has history of Trafficking/ other crimes)

 

Patton also claimed that SAIC was determined to write much of the VCF from scratch. This included an e-mail-like system that at least one team, to his knowledge, was writing, even though the FBI was already using an off-the-shelf software package, Novell’s GroupWise, for e-mail. “Every time you write a line of code, you introduce bugs,” noted Patton. “And they had a bunch of people slinging code. I’m not saying that the guys were technically incompetent. But bugs happen, and not all programmers are great.”

 

*Note – the project was deemed DOA after completion and essentially was a giant blunder that coincidentally led to Sentinel.

 

FBI officials say they are taking what they learned from the VCF and charging ahead with new IT projects on two major fronts. Last September, the White House’s Office of Management and Budget tapped the bureau to spearhead the development of a framework for a Federal Investigative Case Management System, an effort involving the National Institutes of Health and the departments of Justice and Homeland Security. The goal here is to provide a guide for any agency in the federal government to use when creating a case-management system.

 

Then, late last May, Mueller announced Sentinel, a four-phase, four-year project intended to do the VCF’s job and provide the bureau with a Web-based case- and records-management system that incorporates commercial off-the-shelf software. Sentinel’s estimated cost remains a secret. The bureau expects to award the contract for phase one by the end of this year for delivery by December 2006. SAIC is one of only a handful of preapproved government contractors eligible to bid on the project.

 

https://spectrum.ieee.org/computing/software/who-killed-the-virtual-case-file

 

*Similar story with PROMIS connection Hank Asher and his MATRIX TLO software. His software ends up in all 50 states for PEDO/ child trafficking and is used by FBI.

 

 

cont

Anonymous ID: f20090 Sept. 2, 2020, 2:07 p.m. No.10507340   🗄️.is 🔗kun   >>7391

>>10507335

 

cont

 

Connections to Main Core

 

https://www.salon.com/control/2008/07/23/new_churchcomm/

 

And here’s a kek moment to top it off, from article above.

 

“From 1982 to 1984, Bailey ran a top-secret program for President Reagan's National Security Council, called "Follow the Money," that used NSA signals intelligence to track loans from Western banks to the Soviet Union and its allies. PROMIS, he told me, was "the principal software element" used by the NSA and the Treasury Department then in their electronic surveillance programs tracking financial flows to the Soviet bloc, organized crime and terrorist groups. His admission is the first public acknowledgement by a former U.S. intelligence official that the NSA used the PROMIS software.

 

Coincidental timing with this?

 

In early August 1984, FBI headquarters and other higher-ups in the Ed Meese-led Department of Justice, which itself was complicit in the whole sordid PROMIS affair, ordered the New Mexico office to halt its investigation into Information on Demand, Maxwell and PROMIS. The cover-up, oddly enough, continues today, with the FBI still refusing to release documents pertaining to Robert Maxwell and his role in the PROMIS scandal.

 

https://unlimitedhangout.com/2020/07/investigative-series/the-maxwell-family-business-espionage/

Anonymous ID: f20090 Sept. 2, 2020, 2:13 p.m. No.10507391   🗄️.is 🔗kun

>>10507340

 

this ties in as well

 

excerpt

 

"In 1983, John started a computer equipment distribution company (supposedly out of his basement in Atlanta) called Teqspec Distribution Company, Inc. Within the next year, he hooked up with local businessmen J. Thomas Woolsey and Robert A. Dinning, changing its name to MicroSouth Inc. Apparently simultaneously, John had a business called Teqspec II, Inc., which was renamed in 1985 to ElectroSouth, Inc. and also included Woolsey and Dinning on the board. In 1985 as well, John's father-in-law Donald Paugh (who worked for likely CIA front Union Carbide and almost certainly abused his daughter Patsy) appears to have started a company called Advanced Products Group, Inc. In 1988, ElectroSouth and Advanced Products Group merged. The next year, APG merged with CAD Distributors of Boulder CO and CADSources Inc. of Piscataway NJ to form Access Graphics, headquartered in Boulder. John Ramsey maintained high-level positions at Access, eventually becoming president. In 1991, Lockheed Corporation purchased Access Graphics, and John relocated the family to Boulder.

 

Lockheed Corporation, of course, would end up merging with Martin Marietta in 1993 to become Lockheed Martin, one of the nation's largest defense contractors. The fact that John Ramsey was the president and CEO of a tech company owned by such a major part of our military-industrial complex raised some eyebrows when this case broke. Most notable was Robert Sterling's 1998 article on this case, which combined the history of Lockheed Martin's corrupt dealings, other pedophile ring cases like Franklin, and John's military background to suggest that Access was a "stick in CIA stick and carrot affairs".

 

Such an accusation is of course far from proven, but I've come to believe that something about Access Graphics doesn't add up, and that it is indeed likely to be an intelligence front. Like Robert Sterling, I don't have any direct proof, just a lot of tantalizing associations, but I wanted to put it all together to show how well the case stacks up, and also solicit people who might have any additional evidence. The following evidence hints at Access Graphics being a CIA front involved in child pornography, satellite espionage, and/or the PROMIS software development:

 

One early story in the tabloids (The Star, "JonBenet Dad Linked to Kiddie Porn Scandal", 1997/04/29) claimed that child pornography had been found on Access Graphics computers. While anything printed in the tabloids should be taken with a grain of salt, it is worth noting that neither the Ramseys nor Lockheed Martin had any reaction to the story, in spite of the very disturbing allegations made against their company and the fact that the Ramseys would later sue the same tabloid over a Burke-did-it story (Boulder Daily Camera, "Ramseys sue Star on behalf of son", 1999/12/01). Robert Sterling, noting the CIA's historical involvement in the tabloid press, wrote "if anyone has a better explanation than that it was released by the Star to discredit the report, I'd like to hear it". If the report is true, Access Graphics would appear to have some involvement in child pornography.

 

As mentioned above, a key witness in the JonBenet case was Nancy Krebs. She claimed abuse at the hands of oilman Fleet White Sr., oilman Fleet White Jr. (John Ramsey's best friend in Boulder, who hosted the Christmas party that the family attended right before JonBenet's death), and "Uncle Johnny" who she identified as John Ramsey. Nancy specifically accused John of producing child pornography and setting up various front companies to launder the profits from it:

 

D. And in this letter I’m expressing my feelings about how he treated me

 

A. Mm-huh

 

D. What he did with the money or whatever that was made from umm prostituting me in pornographic films and pictures

 

A. Ok

 

D. And it’s also saying what little that I know about the involvement that he had with my family and in a business sense

 

A Ok, so let’s take the last part first..so you knew John Ramsey and your mother and your father were in some sort of a business agreement

 

D No..no I am saying that some of the money that was made on some of the film that they did and prostituting of me and probably countless other people were funneled through business or things that John Ramsey would set up for them

 

cont