This Forum is Closed
April 20, 2024, 06:26:27 am
Welcome, Guest. Please login or register.

Login with username, password and session length
News: GGF now has a permanent home: http://forum.globalgulag.com
 
  Home Help Search Links Staff List Login Register  

Anti_Illuminati for dummies. The ultimate study guide for the layman.

Pages: [1]   Go Down
  Print  
Author Topic: Anti_Illuminati for dummies. The ultimate study guide for the layman.  (Read 6839 times)
0 Members and 1 Guest are viewing this topic.
birther truther tenther
Full Member
***
Offline Offline

Posts: 182


View Profile
« on: November 23, 2010, 01:23:14 am »


Anti_Illuminati has the floor on the Corbett Report
About 1 hour long, no interruptions.


THIS INTERVIEW IS THE MOST COMPREHENSIVE!!!


http://www.corbettreport.com/mp3/2009-08-28%20Anti-Illuminati.mp3


What follows is a transcription of The Corbett Report's interview with Prison Planet Forum member Anti_Illuminati.  The transcription was provided by Prison Planet forum member TheScribbler. PLEASE READ ALONG WHILE LISTENING TO THE INTERVIEW.  PAUSE AND LOOK UP TERMS/CONCEPTS/PEOPLE/ORGANIZATIONS YOU ARE NOT FAMILIAR WITH!!!!

Transcript of Anti-Illuminati Interview: 2009/08/28

http://www.corbettreport.com/articles/20090901_anti-illuminati.htm



//begin transcript//



James Corbett: This is James Corbett of The Corbett Report. It's currently the 28th of August, 2009 here in Japan. And I'm joined on the line by a member of the Prisonplanet forum community who posts by the name Anti_Illuminati. He has been painstakingly researching and documenting the global information control grid and cyber false flag terror. So, Anti_Illuminati, thank you for joining me on the program today.

Anti_Illuminati: Thank you James. It's great to be here.

JC:Well, I know you've done a lot of information that connects with a lot of the things that we've talked about on the Corbett Report in the past including, of course, Ptech, which, my listeners will probably know by now is one of the key pieces of the 9/11 puzzle. And, of course, Ptech was a computer software firm specializing in enterprise architecture software that was set up in 1994 by Oussama Ziade and mystery investor Yasin al-Qadi, who...recently there was a break in that case with the Boston FBI indicting Oussama Ziade for lying to the FBI about their investigation into Ptech and Yasin al-Qadi's links to Ptech. So, for mor information about that, I certainly suggest that my listeners listen to my recent interview with James Evan Pilato at mediamonarchy dot com or check out some of my articles. But you've been researching into this for years now and you have uncovered a weath of information about Ptech and where it really came from. So what can you tell us about the global information control grid and cyber false flag terror?

AI: Well, I think that a good way to start off with this is to kind of go over some solid details about what Ptech actually is in terms of the company make-up and the people behind it. There's virtually hundreds of articles about this on the internet. And some of them have more quality information than others. And I happen to have right in front of me a kind of...one of the best descriptions of the people who run the company and a little bit on their background that most people are unaware of. And I'll just go ahead and kind of read this here regarding executives that run Ptech so that you'll have a better understanding of this.

Quote:
"As far as the CEO, Mr. Oussama Ziade, his background was that he was a chairman/CEO of Ptech. He established it in 1994. He has over 15 years of professional experience. He's the chief architect and driving force behind the company. One of the key attributes was his ability to sense market direction and play early on into potential markets while still in their infancy. He is a proponent of competition, customer-partnering, and value-oriented solutions. His philosophy of management is based on the balanced involvement of customers, management of employees in the operation of the company to create value for all stakeholders, while creating a culture of innovation and focus. He has raised over $20 million in private investment for Ptech. Prior to launching Ptech,"...

And I'm gonna pause right there. This is the key to this because what a lot of people don't know about this that are looking into it is that the Ptech software existed in name before the company even existed. The executives that created Ptech were formerly comprised of another company prior to that that traces back as early as 1989. And that company is called ADT. Now that's not to be confused with the home alarm system company. This is a company that stands for Associative Design Technology. And with that being said, I'll continue with this as that's where it goes into talking about the bio of the CEO.

Quote:
"Mr. Ziade was Chief Executive Officer at Associative Design Technology and previously held a series of progressively responsible management positions in software development. Mr. Ziade holds a Bachelor of Science degree in Physics and participated in the Ph.D. program in High Energy Physics at Harvard University. In addition, he holds a Master of Science in Software Engineering from Boston University. Mr. Ziade has appeared on several TV shows and is a published author in industry leading publications, appearing on the cover of several magazines."

Now, another key guy which I'll just go into next, is the Chief Product Officer, Mr. James Cerrato. And what tt talks about with respect to him is that...

Quote:
"J ...he serves as Chief Product Officer of Adaptive, Inc. Mr. Cerrato is responsible for the full product lifecycle of all of Adaptive's products, from defining product strategy, to gathering market requirements, creating product specifications and controlling product release schedules. He applies a holistic product approach, and ensures that all Adaptive product components including software, documentation, training material and collateral are consistent, integrated, and synchronized with the release schedule. He serves as Chief Product Officer of Ptech Inc. He has been with Ptech since its inception in 1994 as a Co-founder."

I'll skip some of this here. It's just kind of basic info.

Quote
"He guided the successful development and release of a suite of products including enterprise architecture modeling tools and web portals and as a part of the core team, he helped guide this company from startup to recognition by Deloitte and Touche as one of the 50 fastest growing technology companies in New England."

What this talks about next is very important. There's a link made here to a company that is very behind-the-scene in all of this stuff that's going on.

Quote
"He served in role as representative to the Object Management Group (OMG), and participated in the OMG Object Analysis and Design task force that developed the Unified Modeling Language (UML). In addition to his involvement with the OMG, he speaks frequently at conferences. Mr. Cerrato worked with Associative Design Technology, where he held a series of progressively responsible roles culminating in his position as Chief Technologist. He has been a speaker at major conferences and has been active in several standards organizations. Mr. Cerrato Bachelor's in Computer Science degree from Massachusetts Institute of Technology."

And of course you have the chief scientist, one of the founders, Dr. Hussein Ibrahim. Very, very important individual for many reasons other than the already public information that's well disseminated from Indira Singh with her 9/11 Citizen's Committee testimony along with Cynthia Mckinney and former LAPD narcotics officer Michael Ruppert. Talks about in here where he was with Ptech...

Quote
"since its inception in 1994. Dr. Ibrahim has more than 20 years of experience in enterprise architecture and business consulting. He oversees the innovation and creation of new domain specific add-on solutions. In this capacity, he acts as lead consultant, advising customers in the modeling of technology and human capabilities aspects of an integrated eBusiness architecture. Dr. Ibrahim taught computer science at Columbia University, where he also led a research team in a computer vision research project funded by the United States Department of Defense."

That's a key right there. So, the DOD already knows everything about this guy. That's something you're not gonna hear anywhere else.

Quote
"Dr. Ibrahim completed his undergraduate work in Computer Engineering at Ain-Shams University, and received his Master's and Doctorate degrees in Computer Science from Columbia University. Dr. Ibrahim has had many articles on computer science published in leading professional magazines."

And I'll stop there with the bios. Basically, I just wanna mention, in terms of myself with respect to, you know, who am I in relation to this? My name is Mark. I'm Anti_Illuminati, one of the moderators of the Prisonplanet forum. I'm just your average Joe Citizen. I don't have any industry connections or any respective background that gives me any...that is contributing to anything that I know here. All this is is that I was...after I began to see things that Indira Singh brought out when I saw her testimony years ago. I really woke me up more than anything else that I'd ever seen already knowing that 9/11 was an inside job but not quite understanding with any detail how they could have really pulled this off. And then just seeing the continual erosion, evisceration of the Constitution and our liberties. And it's like, "OK, wait a minute. This has to be fleshed out. This needs to be investigated." And that was the thing that led me down to the myriad of rabbit holes that showed me just how absolutely sinister and huge this media-blacked-out topic is. This is something...Ptech has never been mentioned on TV virtually. I think maybe it was back in 2002 or something on some local news stations which are accompanied by some local news articles that you have to use the web archives to even access anymore. But largely, it's something that nobody knows about. And it's the biggest thing that's...it's been said that it makes Watergate look like nothing, basically. This is the huge thing. In one respect, it's the foundation of being able to carry on forward with world government. World government has myriads of facets from the New World Order's perspective in terms of what they need to achieve to try to eliminate the sovereignty of every nation and consolidate everything. And one of the keys for them to do that is the technology aspect of it. They have to have everything integrated so that they have full control over everything so that nobody can challenge their power, no one can challenge their authority. And that they can administer their tyrannical virtual government, their communist model, long distance. And remove all representation towards all free human beings from having any say in what would have been their formerly elected representatives. That's a big component to this. And that's where a lot of my research goes into and what I'll talk about today.

JC:Well, I think you and I are in total agreement that Ptech is absolutely central to any kind of understanding to 9/11. And Ptech branches out into a lot of other topics. And it sort of shows the way on cyber false flag terror and how that can be implemented. But, for those listeners that are maybe tuning in for the first time, can you just go over, sort of, what is enterprise architecture software and how is it used to implement a false flag terror attack?

AI:Enterprise architecture is...to make an analogy. If you're gonna have a new home built, say you can have a custom home built for you. If you're gonna do that, you obviously hire an architect to design your home. It's the same kind of concept with enterprise architecture. The architecture that would be applicable to the physical world brought into the digital world to engineer the blueprinting for business process modeling for a large organization on how everything is going to take place and streamlining everything, all of your operations, your systems, the people that you have to do business with, communicate with, so forth. And including security and everything else. One interesting point is, see, the idea of enterprise architecture in and of itself is not a bad thing. It's just like technology. Technology is not evil innately. It's what people are doing with it and how they're using it and what they're putting into it to use for nefarious means.

A lot of people are well aware of this individual, Catherine Austin Fitts who has her own website, solari dot com I believe, where she worked for the US government. I can't remember her exact position but she was involved the financial fraud investigation. Michael Ruppert makes mention of her as she was his mentor or instructor on everything that he knew about the PROMIS software. And the thing about Catherine Austin Fitts is she was actually, she was working for the US government. She was working on a non-backdoor, non-corrupt type of enterprise architecture, kind of akin to what Indira Singh is talking about but not using Ptech, that kind of stuff. She was actually creating this herself. She was creating the software by herself. And she wanted to use this to reconcile all of the financial discontinuities and discrepancies within the US government so that the numbers would line up and there wasn't all these shenanigans going on. And the government saw that Katherine Austin Fitts was doing this and that she was actually..."Hey, you're actually trying to foster real accountability within the government. You can't do that. You're fired. Get out of here. What do you think you're doing? We're criminals. We run things. You don't come in here and bring honor and integrity. What are you doing? You can't do that." //laughs// There's an actual article on this. This is on the forums too.

By the way, what I wanna mention is when we're done here, I'm gonna put up a post for all of you listening to this show. I wanna put up a post with links that will back up every single topic that I'm gonna bring up. And it'll be pinned so that you can browse it at your leisure and go ahead and look at the information.

JC:OK. And just for the listener's benefit, I will put a link to that post in the documentation section of this interview so that when you click on the "interviews" tab on corbettreport dot com, find this interview and press "documentation" and you'll find a link to that post that Anti_Illuminati is talking about.

AI:Now in terms of the false flag aspect of enterprise architecture, keep in mind too that when you think of enterprise architecture, think in terms of blueprinting because that's what it is. And that's what Indira Singh...she herself has used that term and that's what she was working on. Specifically was the, in her own words, the next generation of risk blueprint. And that has every painstaking detail of all systems within a business. That includes the electronics, the network infrastructure, and everything like that. The partner to this is risk management. And you see this all the time. All of the big new world order corporations, you'll find them talking about stuff like this. If you do a search for risk management by itself, you'll probably find tens of thousands of hits on it, maybe more than that.

Let's say, for example, you're incorporating an artificial-intelligence-based architecture to protect a network from cyber attack. Sounds good, right? This software can scan incoming network traffic like a highly advanced firewall and if there's different thtreats that are unprecedented or there's different types of hacker attacks or something, the idea is that this can adapt to real-time attacks and learn new things that were previously unknown to it. And then harden itself to be able to deal with that in the future so it's immune to such attacks. Well the problem with risk management is that not only can it protect you but it can be specifically reversed to amplify risks. It can be used for the exact opposite of that. It can be used to create risks where none existed before. And it can also be used to make existing risks within an enterprise, a business, security risks, whatever...it can make them invisible. It can just say that, "Oh, there's nothing wrong here." when there is something wrong. You have a multifaceted way that this can be implemented. And this ties into 9/11 because ostensibly, the idea behind the interoperability that Ptech was touted as going to provide for the FAA and the Federal Aviation Administration's NAS, which is the National Airspace System, which the documents that talk about that, where this whole thing was engineered before 9/11. The documents from like 1999 from MITRE Corporation. There's 2 different ones from MITRE and 1 from the FAA dot gov website. You can still down download these. When you read the contents of them, they can still be used in a court of law to get people indicted for treason if you know what they're (the documents) talking about.

So anyways, the documents talk about the engineering, the actual use of Ptech to supposedly reconcile all of these former interoperability problems. And that everything was gonna be great and everything was just gonna be made so much more efficient and so forth. Well, the reality of it is is that it didn't create interoperability. You see, the new world order, the criminals that carried this out, when they're talking about interoperability, they're not talking about that for your benefit. They're not talking about it for the benefit of the people. That's for them. That's so they have interoperability. In other words, they have control. All of their people, all of their criminals are on the same page. They all have exclusive access to the system to exploit it however they want to and strip the administrative, supervisory controls from the people who would not otherwise be criminals, who would actually be doing their job to defend the United Stated against an internal threat of hijacked airliners or aircraft that have remotely been seized by this software through their advanced automatic flight systems, like ILS and so forth. So they strip the command and control away and the interoperability is in the hand of the new world order and everyone else is left with a chaotic scene of basically shock and awe. (That) is actually what that was, even back then. It was just total overload. And even what they did, that actually leads into another thing, which I'll get into later, called the OODA Loop. If you wanna really understand 9/11, you need to know what the OODA Loop is. And that's an abbreviation for Observe, Orient, Decide and Act. It's a military term that was developed, it was coined by Col. John Boyd who was a fighter pilot like 50 years ago who had an exemplary dogfighting record of kills. He had like, I can't remember the number, like 84 planes that he shot down using his OODA loop.

Basically, in a nutshell, it is a methodology of outthinking your opponent. It is being able to preempt their actions and act upon where they're going to be so that when you're in the position to attack you're enemy, they're not even prepared to begin to react to your attack. Because they don't even know that you're gonna be there. And that's the methodology that was used on 9/11 against our own Department of Defense systems. That's how they did that.

They overloaded the response/decision, the legitimate command and control that could have otherwise stopped the black op from being executed. And that sets the whole precedent for the entire fraudulent war on terror and all of this, literally terror engineering is what you have. Or like what Indira Singh, in her own words talks about where she says, "The terror economy is alive and well." So, in one respect that's the replacement for the cold war. It's the new permanent enemy so that the new world order can have unlimited money for no bid contracts and to fight illegal wars and to basically enslave everyone, steal all the money so that they can eventually be unchallengeable.

So, the false flags, that whole thing is a very huge subject in terms of where you can go with that. The idea is that you have painstaking details of everything within wherever you have that software. And (this is) allowing you to attack whatever points that you want to. And also, you can set it up to blame whoever you want. And the thing of it is is that this is used in conjunction with the backdoor capability of this stuff.

The back-dooring into enterprise architecture that's based off of Ptech or the like, a PROMIS based program. That Ptech is just a name. You want to use a term that kinda is more encompassing, that could attribute for whatever it could be called. There's a lot of different companies that make the same exact thing. If you do some research, you will find that the current iteration of the actual company Ptech, in the United States, is a company called Intelligile. And they actually have a website that you can go to. And you can tell that that's what it is. Intelligile dot com. It's very interesting that there are no names of anyone on the website as far as who runs the company. And there's no street address. //laughs// And there's no phone number. So you can only E-Mail them if you wanna consult them about their software services. That's kinda interesting.

JC:It certainly seems that the picture you're painting is that all of the roads lead back to the DOD and most of them lead through these types of defense contractors and intelligence fronts. And you've done a good job of, I think, identifying a lot of the individuals that are connecting these dots. So can you go through some of the people and the companies that you've highlighted in your work?

AI:Sure. I'll do that. The one brief thing I wanted to mention was what Ptech represents. It falls under a title of what they call agile software methodology. There's several buzzwords that the new world order uses in their own documentation pertaining to all of this stuff. And one of those words is "agility". From their point of view, what that means is...that speaks to their predictive analysis. It's kind of like how you see articles now where they have cameras that can scan you. And they're trying to make it so they can scan your facial expressions and predict what you're gonna do. This idea of "pre-crime". That's where all of that stuff comes into play. It's like being able to preempt what you enemy's gonna do. And the enemy is the American people and everyone else, basically, that's not part of their cabal.

So anyways, just thought I'd mention that. The companies involved with this software that are involved with 9/11...and you can do your own research on this and your eyes will be greatly opened when you see the connections here. 'Cause a lot of these names are not talked about. There's weblogs obviously. But you don't hear about this stuff. You have SAIC, which is Science Applications International Corporation. It's a major defense contractor/police state company that is involved in the police state technology infrastructure. SAIC for example is one of the companies that is behind the gamma radiation scanners that they're gonna want everyone to drive through, that they can x-ray your vehicle to see if you have any terror materials on you, if you're carrying bombs or something. And then they claim, "Oh, don't worry. The radiation is safe. Don't worry about it." when it's been reported to be worse than an x-ray itself so that you get cancer and so forth.

//30 minutes into podcast//
Report Spam   Logged
Pages: [1]   Go Up
  Print  
 
Jump to:  

Powered by EzPortal
Bookmark this site! | Upgrade This Forum
Free SMF Hosting - Create your own Forum

Powered by SMF | SMF © 2016, Simple Machines
Privacy Policy
Page created in 0.055 seconds with 18 queries.