Ptech, 9-11, and the Financial Collapse of 2008
By Christopher Bollyn
"All of this stuff took money to fund. And it was funded through major financial crimes, money laundering, and looting, looting of the S&L’s, looting of the banking system...it’s all being done systematically to keep the slush funds up for the game at play."
– Indira R. Singh
The terror attacks of 9-11 and the financial crisis that exploded in September 2008 are similar and connected. The similarity between the two events that occurred almost exactly seven years apart reveals the criminal thinking behind both events – and the method.
What we know about the destroyed towers is that they had recently come under the control of two Zionist Jews, Larry Silverstein and the former Israeli commando fighter, Frank Lowy. With the connivance of fellow Zionist Jews, these two active and dedicated Zionists obtained the leases, with borrowed funds, for the WTC properties in the end of July 2001 and immediately insured them to the hilt – including anticipated future earnings – against a terror attack like the one that occurred six weeks later on 9-11. They won the jackpot, blood and all.
The security of the twin towers was also in the hands of a Zionist firm and had been since 1993. That company was under the control of Maurice Greenberg and Jules Kroll. The first plane that struck the World Trade Center homed in on the secure computer room of a company (Marsh) headed by one of Greenberg's sons, in the northeast section of the North Tower.
The first plane flew directly into the secure computer room of a Greenberg (A.I.G.) company, Marsh. The second plane also homed in on a secure computer room in the South Tower. The planes were not being flown by incompetent Arab pilots; they were remotely guided and directed by computer signals. The whitish burst on the left is indicative of pre-placed explosives.
An Israeli-American Zionist, Michael Chertoff, headed the criminal division of the Dept. of Justice in 2001-2002 and is ultimately responsible for the non-investigation and destruction of evidence from 9-11.
The Israeli Michael Chertoff oversaw the criminal non-investigation of 9-11 in which virtually all of the evidence was destroyed. His mother was one of the first Mossad agents. He went on to head the Dept. of Homeland Security.
The Zionist-controlled media promoted the preposterous and unproven theory that Osama Bin Laden and his 20 hijackers had carried out the attack from their headquarters in Afghanistan. The United States went to war against the Taliban regime in Afghanistan based on wholly unproven allegations and false evidence as the real evidence of mass murder was furtively being shipped to Asia where it was destroyed in smelters.
Larry Silverstein and Frank Lowy received huge pay-outs from the insurance companies. The American people and U.S. taxpayers were left with a pile of incredibly hot rubble and an immense price tag, which only grew as time went on.
The incredibly hot fires that raged beneath the rubble created a bluish smoke rich in extremely toxic nano-size particles of heavy metals. This is prima facie evidence that the owners of the World Trade Center, i.e. Larry Silverstein and Frank Lowy, were complicit in the demolition of the twin towers and WTC 7. Did Osama put tons of Thermite in the twin towers?
Seven years later, to the exact day, two immense pillars of the financial world collapsed in a strikingly similar fashion. These two columns were Lehman Brothers bank and the American International Group (A.I.G.), managed and controlled for decades by the very same Maurice R. Greenberg.
Like the twin towers, both companies were thought to be too large and powerful to simply collapse, but collapse they did. By September 11, 2008, these companies seemed to have lost both their foundations and core columns and were in a state of free fall. Investors pulled their money and global panic ensued. Like the twin towers, both Lehman and A.I.G. were Zionist-controlled organizations.
The systems of corporate financial security, enforcement, and investigation were also under their control. Despite repeated warnings, indictments, and violations of the law by A.I.G., the heads of the U.S. Treasury and Federal Reserve Bank called for the U.S. taxpayer to bail-out these corrupt and criminal enterprises. The key player in this huge and historic bail-out was Ben Shalom Bernanke, a dedicated Zionist who spent summers working for a well-known Jewish criminal who controlled elections in Dillon, South Carolina, when he studied at Harvard.
Ben Shalom Bernanke is the driving force behind the trillion dollar bail-out.
An immense amount of taxpayer money, some $180 billion, has been poured into the financial black hole known as A.I.G. This is roughly equivalent to taking $600 from every man, woman, and child in the United States and using it to prop up (or absorb the losses of) the criminal and fraudulent financial/insurance structure built by Maurice Greenberg.
The profits made by Lehman Brothers and A.I.G. have gone into private off-shore accounts while the debts and obligations have been passed on to the U.S. taxpayer. These companies were looted and plundered and then allowed to collapse. Once again, the rubble and costs were forced upon the American people against their will. The American public was at least 1,000-to-1 against the Zionist bail-out.
The fact that the first plane that hit the World Trade Center flew directly into the secure computer room of Marsh, a company run by Maurice Greenberg's son Jeffrey, is just one of the most obvious connections between these two catastrophic events; Ptech's dodgy enterprise software is another.
Maurice Greenberg's son Jeffrey is CEO of MMC.
The first plane flew directly into his company's computer room. His company revamped security at the World Trade Center in 1993. What a coincidence.
In Part 1 of this chapter, the key role of Ptech enterprise software in 9-11 was discussed. The primary person who brought public awareness to the Ptech problem is a "risk architect" named Indira R. Singh, who lived near the World Trade Center and was working with JP Morgan Chase on 9-11. Singh is very knowledgeable about Ptech and what such enterprise software can do in situations like 9-11 -- and the financial crisis that gripped Wall Street in September 2008.
My research found that one of the key people involved in the founding of Ptech was a Jewish lawyer from Worcester, Massachusetts, named Michael S. Goff. Goff's father and grandfather had both been highest level Freemasons in the Zionist secret society of B'nai B'rith [The Real Elders of Zion]. Michael was Ptech's first marketing manager and all-around general director in 1994, according to his own published statements about his role with the company. He was responsible for all hiring, training, and procurement for the company.
Goff went on to work for Guardium, an Israeli software company founded and headed by individuals from Israeli military intelligence. As I explain in The Architecture of Terror: Mapping the Israeli Network Behind 9-11, one of the founders and directors of Guardium is Gill Zaphrir (a.k.a. Zafrir), an Israeli colonel who "headed the research and development department of the Israel Air Force." Goff worked for Zaphrir's Guardium in 2005 when I discovered his role in founding Ptech.
Michael Goff quit his job as a lawyer and played a key role in creating Ptech. He described the various functions he performed at Ptech on his company website.
Singh doesn't say anything about Goff at Ptech, but that is understandable. This Israeli connection is something I discovered in 2005 and it has not been discussed in any of the mainstream media. It is unlikely that anybody else would have told Singh about Goff's key role in building Ptech in the mid-1990s. Furthermore, Israelis are generally seen as allies of the United States.
Understanding the role of Ptech's dodgy enterprise software and the connection between Ptech and Israeli military intelligence requires reading my previous articles about Ptech and Mitre. With this Israeli conection to Ptech in mind, I recommend reading "The Story of Indira Singh" from an interview she did in April 2005. This is one of the most informative and least biased interviews she has done. It's rather long, but well worth reading for anyone interested in understanding 9-11 and the financial crisis. This interview also has extremely interesting testimony about the downing of Flight 93 and extremely mysterious demolition of the 47-story WTC 7, which was the third tower owned by Larry Silverstein.
Singh's comments about Ptech and her work at JP Morgan shed a great deal of light on how this Ptech enterprise software may have played a role in both 9-11 and the financial meltdown. I strongly recommend reading the entire interview. To give an idea of what Singh discusses, I have provided some of the most interesting extracts below.
- Indira Singh
Singh: September 11th I was a senior consultant for JPMorganChase and Risk. I had cycled through several of their Risk areas as an enterprise architect, or an information architect, technology architect… which basically means that you take a look at the entire enterprise and come up with a blueprint, make sure that all the systems, not just one system, but all the systems, the blueprints for all the systems that are developed to support the business, are in-line, in tune with the business goals and the business architecture and the business processes and where the business is going. So it’s pretty high-level, we call it the CXO level, or the Chief Information Officer, Chief Technology Officer levels and there are disciplines and methodologies and very esoteric software that’s used to manage this. I did that at JPMorganChase and I also worked for a small company in Washington, D.C. that was doing some very innovative work regarding technology interoperability, they were developing some inference engines to think about how to put technology architectures together and I wanted to use that for my risk work, basically. …we were seeking funding from In-Q-Tel, which was the CIA’s information technology seeking arm, I had been spending pretty much every Friday, Thursday-Friday down in D.C. trying to get that project off the ground, and trying to get it funded.
Singh: P-Tech is the one thread, the one golden thread you pull on, and all of this is unraveled. Because it goes into the corporations, it goes into these government entities, it goes into the terrorism financing entities… none of which have been taken to task… there are just so many questions about what does this all mean? And as I investigated further, we found that the origins of P-Tech were very interesting. Where did this company come from? Obviously, that is the first question. And how did they get to be so powerful? Who were the people, who were the organizations that brought them in who knew, who gave them the power?
Singh: BMI was identified as being involved with terror financing, but this is just not going to be, ‘The Muslims Hate America!’, that’s not what it is, there is something else going on here, they’re being used as a tool, just as the good people of the U.S. are being used, are being misled, and frightened and terrorized into, ‘if we don’t wage these horrific wars, our way of life will be over’. Who benefits?
Singh: The FBI. In fact, this has to be made very clear, there are some extraordinarily real patriotic Americans, and good people in the FBI, as has been said by Colleen Rowley, one of the FBI whistleblowers, there’s a wall in the FBI. And this has been validated to me by various in Houston who are very close to the power bases and are pretty ticked off at what’s happening in this country and are speaking out. As are many CIA agents who are very concerned that it has gone too far, as are many NSA agents who are concerned that it has gone too far, and FBI agents. So we have a lot of people who are speaking out, they have kept quiet too long, they’re afraid, they are afraid of what’s happening to this country…
Singh: Ari Fleischer spun it to find sugar that day. He said, ‘There’s nothing wrong. Nothing to see here, everything’s fine.’ So they did a token raid and that was basically it. But everything that I have done since that time has been for one reason and one reason only, that there may come a time, that people will find the trail to P-Tech, and it won’t be hidden or buried, I’ve kept it alive, whether they’ve renamed their company and moved on I want to keep the names, the details, everything alive, no matter what I have to do, so that, should there come a time for justice and accounting for 9/11, and for what’s happening in the world today, it makes it easier for other people to unravel the truth… Whatever you’re political inclinations, this is wrong. This is criminal, this is murder, this is worldwide atrocity. And I have reached some very good people on the left and on the right, who are willing to speak out about P-Tech.
Singh: It was possible that there was an alternate command and control system. Could you technically use P-Tech software to do the surveillance and intervention? Well, gosh, yes, that’s exactly what I was planning on using it for in one of the largest banks in the world.
Singh: The Towers came down, 3,000 people were killed, and what I know is the characters behind the funding of it, were totally in bed with characters in the U.S. And not only just for 9/11, but going on through our nation’s history, and the big question is, “Why?” What are they up to?
Question: Could you describe the relationship of P-Tech with the FAA? P-Tech worked with the FAA for several years, didn’t they?
Singh: It was a joint project between P-Tech and Mitre, and they were looking at holes, basically in the FAA’s interoperability, responding with other agencies, law enforcement, in the case of an emergency such as hijacking. So they were looking for… what people would do, how they would respond in case of an emergency, and find the holes, and make recommendations to fix it. Now, if anyone was in a position to know where the holes were, P-Tech was. And that’s exactly the point. If anybody was in a position to write software to take advantage of those holes, it would have been P-Tech.
Singh: Now, with the FAA in particular, if something goes wrong, and there is an emergency with a particular flight, and the DOD needs to be notified, well that’s a really major interoperability thing, a signal has to be sent in some way, shape or form, either mediated by a human in most cases, or automatically, or even if its mediated by a human something needs to be initiated on a separate computer to start a whole other sequence of events, interventions, scrambling a jet, notification up and downstream with many other organizations, such as NORAD, such as other terminal radar areas, such as local law enforcement, you name it. So, this all has to be blueprinted, mapped out, and that’s where Enterprise Architecture comes in, you need some kind of blueprint to keep all of this together and that’s what P-Tech was so good at.
Question: Now was there a reference to P-Tech having operated in the basement, out of the FAA?
Singh: Yes. Now, typically, because the scope of such projects are so overarching and so wide-ranging, when you are doing an enterprise architecture project, you pretty much have access to how anything in the organization is being done, where it’s being done, on what systems, what the information is, and you pretty much have carte blanche. Now if it’s a major project that spans several years, the team that comes in has literally access to almost anything they want because you’re operating on a blueprint level, on a massive scale. So, yes, they were everywhere, and I was told that they were in places that required clearances, I was told they had log-on access to FAA flight control computers, I was told that they had passwords to many computers that you may not on the surface… let’s say you… isolated part of a notification process that was mediated by a computer, and you wanted to investigate it further, then you typically get log-on access to that computer, and from that back upstream or downstream, so, who knows? In my experience, I could have access to almost anything I wanted to in JPMorganChase… and didn’t, for the reason if anything went wrong, I didn’t wanna have the access. But if you were up to no good, as an enterprise architect, with such a mandate, you typically could have anything you wanted. Access to anything.
Singh: But there were 4 war games, 4 simulations going on the morning of 9/11, and I just want people to remember that the whole nature of what Mitre, they also developed software for intelligence, which includes the CIA, Mitre and P-Tech would have, if they were going to test whether they had fixed these holes, would have probably run a simulation. I don’t know that they did, but that’s how we do things, but there were 4 of them going on. So was there room for confusion? I don’t think these people were stupid, I think they were deliberately confused, if anything.
Q. Well we know very well that there was a simulation of the very event taking place during the event.
Singh: And I believe there is proof there was more than one. Just in case the first one didn’t confuse people enough. So what does this say? I can be very objective about this and say, “Well, the terrorists knew that there were war games scheduled for this day and they took advantage of it and called 9/11 a particular day, however, we do know that 9/11 had been selected prior… ok, so maybe the war games were set many weeks prior for 9/11…” and you can play this game over and over and over. Yes, it was the perfect day, and yes, you needed inside knowledge, and yes, P-Tech with all its myriad associations would have had the inside knowledge, and yes, P-Tech was a CIA front, and yes, P-Tech was protected.
Singh: Interestingly enough, I did not let people know that it was P-Tech until maybe August, 2002 at ICH… we had pretty much moved on and uh, I accidentally let slip to one of my colleagues there that the name of the company that was being investigated was P-Tech. And she was horrified… she said, “They’re everywhere.” And I said, “Yeah, fancy that. Wonder who put them there.”
Singh: Before P-Tech was ever raided, before it ever became public, I took it all the way up to the top of the FBI. I took it everywhere. The reality of the situation is proven by the response I got there. More telling than the actual deed itself. Their response to that is really what indicts them all.
Q. What was their response?
Singh: Uhm, “Shut up and go away, or you will be killed.” Basically.
Q. Now, you got that response from all different levels in government…
Singh: I got that response from JPMorgan. I got that response from P-Tech. I got that warning from people within the FBI. Mostly the FBI…
Q. And what kind of response did you get from JPMorganChase, your employers at the time when you went to them with what you had found out about P-Tech?
Singh: Well, they had told me that I should be killed for getting all this evidence… I was intimidated. I wrote a letter to my boss saying that I had been intimidated, and the person who had intimidated me, the 3rd highest ranking person in the bank, the General Auditor, so this has gone all the way up to the top, they were very aware of it, and that they were going to deny using P-Tech at JPMorganChase. In fact they would even explicitly deny the URL to the website, so that no one could even look into them. Now the name has changed, so you wonder what is going on there, but, when he asked me, ‘where did you get this from and that from?’, I was basically thoroughly intimidated. They treated me as though I was the bad guy. That’s what happened. They treated me as if I was the bad guy for having dug up all of this stuff.
Q. And you were told by the Chief Auditor at JPMorganChase that the different individuals that you had gotten this information from should have been killed?
Singh: Yeah… I pointed down the street, I said, “I lost people there.” And he said, “I lost people there, too. Look, look, this is about 9/11… I put it in a folder named 9/11…” and it got pretty ugly from that point on. Basically he said that, “He needed to be sure that I would never mention P-Tech again.” And I said, “Here’s the problem. I’m a senior consultant, I consult with a lot of people… you may deny P-Tech business here… what happens to CITIBANK, what happens to Goldman-Sachs, what happens to the rest?” He said, “That’s not my problem.” And I said, “That’s why we have that hole in the ground up the street. It is everyone’s problem.”
Singh: All of this stuff took money to fund. And it was funded through major financial crimes, money laundering, and looting, looting of the SNL’s, looting of the banking system, what we’re in the middle of now which is the looting of Social Security. And this is all being done, the looting of HUD, it’s all being done systematically to keep the slush funds up for the game at play.
Q. Where do you think this is headed?
Singh: Not any place good for people. And it isn’t just going to be America, it is going to be global.
Bollyn, Christopher, "The Architecture of Terror: Mapping the Israeli Network Behind 9-11," 24 July 2008
Bollyn, Christopher, "Is MITRE Corp. the Trojan Horse of 9/11?" 1 April 2005
Last Updated ( Friday, 13 March 2009 )