Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Uncle Bill
"This is more than just a technical blunder,” says a well-placed source with detailed knowledge of White House security issues. “This is a very serious security failure with unimaginable consequences. Anyone could have accessed that [back door] and gotten into the entire White House phone system and obtained numbers and passwords that we never could track,” the source said, echoing yet another source familiar with the issue."

Maybe somebody ought to send that quote as a singing telegram to Cheeney, or Bush, or....... Mueller so they get a Hint where the secret passwords that were used to pass on a threat might have come from.

36 posted on 09/16/2001 10:01:45 AM PDT by rdavis84
[ Post Reply | Private Reply | To 34 | View Replies ]


To: rdavis84
One thing I've been looking for since January is an article touching on the subject of whether the Bush administration, for the most part, left the Jackson Stephens phone/data system in place. If they did in any way, shape or form, they're crazy.

The White House Phone System Boondoggle - The Clinton administration may have broken the law FR

New cover-up: 'Project PBX' White House changed phone software to disguise long-distance caller traffic

Dialing for DNC dollars? - Clinton rigged Arkansas phone system to hide fund-raising calls: state official

Reno ignored 'Big Brother' FBI: Justice dropped ball on Hillary's secret database

Webb Hubbell and Big Brother (WHODB)

Whistle-Blower Stuns White House

Charles Wilbourne Miller - Arkancide

Why Red China Targeted the Clinton White House
"The safe room holding the keys is what Charlie Smith, president of Virginia-based Softwar Co. and a critic of Clipper, calls the "Mission: Impossible" room, with the big mainframe computer, stacks of classified data, secret radio frequencies and wired alarm systems. "It's a highly classified library with guards," Smith says. "The clipper or key recovery as it is currently being called was supposed to protect government secrets. Instead, they have built an electronic version of Pearl Harbor and put it neatly in one little row where one guy can walk in and then walk out with it."

There also are others involved in Clinton fund-raising to whom congressional committees are anxious to pose questions about interest in secret U.S. technology. Ira Sockowitz, a Clinton administration lawyer, admitted during a deposition with Judicial Watch, a Washington-based watchdog group pursuing the Clipper documents in relation to Huang's activities at Commerce, that he walked out of the Commerce Department with CIA, NSC and NSA classified files on encryption or decoding software, spy satellites, China, Russia and other countries. Sockowitz, who had a top-secret clearance, was appointed by Clinton to serve as a special legal counsel in Commerce. He says he simply was transferring the files to his new post at the Small Business Administration, where he became deputy administrator in the spring of 1996. The records removed contain some 2,800 pages, including a classified report called "A Study of the International Market for Computer Software With Encryption."

Sockowitz, now a Washington consultant, claims he never met Huang, although the two men worked together on the Asian Pacific American Working Group -the principal unit in the DNC responsible for raising about $7 million in campaign contributions in the Asian communities during 1996 - much of it returned because of questionable origins.

How spooky does it get? An odd link to this story is that the NSA chose Arkansas-based Systematics on Sept. 14, 1990, to construct the "Mission: Impossible" room called the Secured Compartmentalized Information Facility, or SCIF, in Fort Gillem, Ga., according to an unclassified NSA memo. At that time Systematics was run by Jackson Stephens who, along with Mochtar Riady and James Riady controlled Lippo's Worthen bank, which gave Clinton a multimillion-dollar loan to get through the 1992 presidential election. The same Lippo Group, which later dumped Worthen, is linked to China Resources, a front for Chinese military-intelligence operations, say U.S. defense intelligence sources.

The concern of the U.S. intelligence community is whether Chinese agents penetrated the SCIF. An NSA staffer notes that the Chinese once managed to bug the Russian Embassy in Beijing, and that if they built the SCIF "they could do a lot of things there."

#40 - INVESTIGATION OF THE CONVERSION OF THE $1.7 MILLION CENTRALIZED WHITE HOUSE COMPUTER SYSTEM, KNOWN AS THE WHITE HOUSE DATABASE

The White House "Big Brother" Data Base & How Jackson Stephens Precipitated a Banking Crisis

JACKSON STEPHENS: Out-Sourcing Big Brother - Systematics - AllTel - Acxiom

56 posted on 09/16/2001 11:13:29 AM PDT by Uncle Bill
[ Post Reply | Private Reply | To 36 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson