Joined: 28 Jul 2005 Posts: 274 Location: North West London
Posted: Tue Jan 22, 2008 10:38 am Post subject:
Verint Systems (ex-Comverse Infosys) - a US or Israeli firm?
The marketing director at Verint Mr Rob Wint assured me that Verint had always been a US company. Only its parent company Comverse was Israeli. The Verint Systems company at Leatherhead was the European base, he explained.
Verint was formed in the wake of 9/11, with the surging demand for surveillance. Its "video intelligence" products help customers to sort through hours of security videos and analyze them for potential threats. After September 11 this appeared as being a fast-growing market. In February 2002, ‘Comverse Infosys,’ turned into Verint Systems, with the parent company Comverse Technology retaining a majority stake. Alexander Cobi became Chair while Dan Bodner served as president and CEO. This happened in America and legally speaking Verint is a US company. However there seems to have only ever been one press release about its use by the London Underground, and that is the one by Israeli News, in February 2004, and that began: ‘An Israeli security firm has been chosen to provide security for London’s Underground train network. Verint systems …’
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Tue Jul 15, 2008 4:13 pm Post subject:
Got to be the richest seam ever of conspiritorial clues.
Founded i 1984 - Based in Chantilly - site of 2 recent Bilderberg meetings! (see part 4 below, 1, !!!part 5 is mind-blowing!!, part 6 includes the WaC footage of Peter Power)
Whenever you look into Verint and Comverse the evidence comes pouring out. Brilliant and full report by Montreal 9/11 Truth.
Mainstream media are scared to death of criticising anything Israeli - because some media types are Zionists and others are afraid of being branded as anti-semitic and/or losing their jobs.
"Montreal 9/11 Truth has just produced a documentary film exposing a networked video surveillance contract that the Montreal Transit System (STM) has signed involving a company with an alleged shady history and very close ties to American and Israeli intelligence services."
This looks very well researched, with lots of original footage. Good job, Montreal 9/11 Truth.
(A good film to watch prior to this is 7/7 Ripple Effect which examines similar connections to the London Underground Bombings.)
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Thu Sep 04, 2008 8:06 pm Post subject:
Comverse: Rumors of Break-Up Back on the Front Burner
Posted by Tiernan Ray
Oft-heard rumors of a break-up of stock-options-fraud poster child and telecom software provider Comverse Technology (CMVT.PK) are back in the news today — specifically, in the Israeli newspaper Globes, according to a note out this morning by Friedman, Billings, Ramsey analyst Daniel Ives. Those breakup anticipations have consistently been put aside amid turmoil in Comverse’s books, from the stock-options scandal of its former CEO, Kobi Alexander (he fled prosecution in Namibia) to accounting irregularities in its revenue recognition.
But according to Ives, who has been a big proponent of the company breaking itself apart, Globes today reports that Comverse is in talks to sell two subsidiaries, one called “CNS,” that provides billing software for phone companies, to Amdocs (DOX), an Israeli company that serves telephone companies, and its Verint (VRNT.PK) subsidiary to another Israeli company, Nice Systems (NICE), also a carrier supplier................
Just to let people know this thread somehow managed to find its way into being moved to the private 7/7 forum so passwords on this forum have either been hacked or someone with a password has been censoring!
Which is annoying.
This is no mean story - it puts Mossad and the IDF firmly in the frame as possible 7/7 perpetrators.
They certainly had the motive but this story gives them the means and the opportunity.
http://en.wikipedia.org/wiki/Opportunity_(law)
Just running through this thread, and found the sound has been removed, also removed from the link. I wonder who would do such a thing, already? _________________ 'And he (the devil) said to him: To thee will I give all this power, and the glory of them; for to me they are delivered, and to whom I will, I give them'. Luke IV 5-7.
This censorship is A1 confirmation of Israeli culpability.
ZioNazi intelligence hackers have removed the blasted sound. Thus is history 'managed' by these NWO shyster/hackers. Bear in mind that this story has never appeared on any news outlet in the entire UK.
Now censored on the internet as well.
And watch this one too before the sound is removed!
Joined: 30 Jul 2006 Posts: 6060 Location: East London
Posted: Sun Sep 07, 2008 10:27 pm Post subject:
Tony, download 'RealPlayer' and it's a cinch to download these clips. By the way, why is Fox News reporting this stuff???
General Request:
Has anyboody downloaded the ones that have been 'muted'? _________________ 'And he (the devil) said to him: To thee will I give all this power, and the glory of them; for to me they are delivered, and to whom I will, I give them'. Luke IV 5-7.
No sound on either of these two YouTube videos
Fox news Israeli arrests Wiretapping Comverse infosys amdoc2
http://www.youtube.com/watch?v=bihSLKHpMHI This censorship is A1 confirmation of Israeli culpability.
ZioNazi intelligence hackers have removed the blasted sound. Thus is history 'managed' by these NWO shyster/hackers. Bear in mind that this story has never appeared on any news outlet in the entire UK.
Now censored on the internet as well.
September 27 / 28, 2008
How Israeli Backdoor Technology Penetrated the U.S. Government's Telecom System and Compromised National Security
An Israeli Trojan Horse
Since the late 1990s, federal agents have reported systemic communications security breaches at the Department of Justice, FBI, DEA, the State Department, and the White House. Several of the alleged breaches, these agents say, can be traced to two hi-tech communications companies, Verint Inc. (formerly Comverse Infosys), and Amdocs Ltd., that respectively provide major wiretap and phone billing/record-keeping software contracts for the U.S. government. Together, Verint and Amdocs form part of the backbone of the government’s domestic intelligence surveillance technology. Both companies are based in Israel – having arisen to prominence from that country’s cornering of the information technology market – and are heavily funded by the Israeli government, with connections to the Israeli military and Israeli intelligence (both companies have a long history of board memberships dominated by current and former Israeli military and intelligence officers). Verint is considered the world leader in “electronic interception” and hence an ideal private sector candidate for wiretap outsourcing. Amdocs is the world’s largest billing service for telecommunications, with some $2.8 billion in revenues in 2007, offices worldwide, and clients that include the top 25 phone companies in the United States that together handle 90 percent of all call traffic among U.S. residents. The companies’ operations, sources suggest, have been infiltrated by freelance spies exploiting encrypted trapdoors in Verint/Amdocs technology and gathering data on Americans for transfer to Israeli intelligence and other willing customers (particularly organized crime). “The fact of the vulnerability of our telecom backbone is indisputable,” says a high level U.S. intelligence officer who has monitored the fears among federal agents. “How it came to pass, why nothing has been done, who has done what – these are the incendiary questions.” If the allegations are true, the electronic communications gathered up by the NSA and other U.S. intelligence agencies might be falling into the hands of a foreign government. Reviewing the available evidence, Robert David Steele, a former CIA case officer and today one of the foremost international proponents for “public intelligence in the public interest,” tells me that “Israeli penetration of the entire US telecommunications system means that NSA's warrantless wiretapping actually means Israeli warrantless wiretapping.”
As early as 1999, the National Security Agency issued a warning that records of U.S. government telephone calls were ending up in foreign hands – Israel’s, in particular. In 2002, assistant U.S. Attorney General Robert F. Diegelman issued an eyes only memo on the matter to the chief information technology (IT) officers at the Department of Justice. IT officers oversee everything from the kind of cell phones agents carry to the wiretap equipment they use in the field; their defining purpose is secure communications. Diegelman’s memo was a reiteration, with overtones of reprimand, of a new IT policy instituted a year earlier, in July 2001, in an internal Justice order titled “2640.2D Information Technology Security.” Order 2640.2D stated that “Foreign Nationals shall not be authorized to access or assist in the development, operation, management or maintenance of Department IT systems.” This might not seem much to blink at in the post-9/11 intel and security overhaul. Yet 2640.2D was issued a full two months before the Sept. 11 attacks. What group or groups of foreign nationals had close access to IT systems at the Department of Justice? Israelis, according to officials in law enforcement. One former Justice Department computer crimes prosecutor tells me, speaking on background, “I’ve heard that the Israelis can listen in to our calls.”
Retired CIA counterterrorism and counterintelligence officer Philip Giraldi says this is par for the course in the history of Israeli penetrations in the U.S. He notes that Israel always features prominently in the annual FBI report called “Foreign Economic Collection and Industrial Espionage” – Israel is second only to China in stealing U.S. business secrets. The 2005 FBI report states, for example, “Israel has an active program to gather proprietary information within the United States. These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel’s sizable armaments industry.” A key Israeli method, warns the FBI report, is computer intrusion.
In the big picture of U.S. government spying on Americans, the story ties into 1994 legislation called the Communications Assistance for Law Enforcement Act, or CALEA, which effected a sea-change in methods of electronic surveillance. Gone are the days when wiretaps were conducted through on-site tinkering with copper switches. CALEA mandated sweeping new powers of surveillance for the digital age, by linking remote computers into the routers and hubs of telecom firms – a spyware apparatus linked in real-time, all the time, to American telephones and modems. CALEA made spy equipment an inextricable ligature in our telephonic life. Top officials at the FBI pushed for the legislation, claiming it would improve security, but many field agents have spoken up to complain that CALEA has done exactly the opposite. The data-mining techniques employed by NSA in its wiretapping exploits could not have succeeded without the technology mandated by CALEA. It could be argued that CALEA is the hidden heart of the NSA wiretap scandal.
THE VERINT CONNECTION
According to former CIA officer Giraldi and other US intelligence sources, software manufactured and maintained by Verint, Inc. handles most of American law enforcement’s wiretaps. Says Giraldi: “Phone calls are intercepted, recorded, and transmitted to U.S. investigators by Verint, which claims that it has to be ‘hands on’ with its equipment to maintain the system.” Giraldi also notes Verint is reimbursed for up to 50 percent of its R&D costs by the Israeli Ministry of Industry and Trade. According to Giraldi, the extent of the use of Verint technology “is considered classified,” but sources have spoken out and told Giraldi they are worried about the security of Verint wiretap systems. The key concern, says Giraldi, is the issue of a “trojan” embedded in the software.
A trojan in information security hardware/software is a backdoor that can be accessed remotely by parties who normally would not have access to the secure system. Allegations of massive trojan spying have rocked the Israeli business community in recent years. An AP article in 2005 noted, “Top Israeli blue chip companies…are suspected of using illicit surveillance software to steal information from their rivals and enemies.” Over 40 companies have come under scrutiny. “It is the largest cybercrime case in Israeli history,” Boaz Guttmann, a veteran cybercrimes investigator with the Israeli national police, tells me. “Trojan horse espionage is part of the way of life of companies in Israel. It’s a culture of spying.”
This is of course the culture on which the U.S. depends for much of its secure software for data encryption and telephonic security. “There’s been a lot discussion of how much we should trust security products by Israeli telecom firms,” says Philip Zimmerman, one of the legendary pioneers of encryption technology (Zimmerman invented the cryptographic and privacy authentication system known as Pretty Good Privacy, or PGP, now one of the basic modern standards for communications encryption). “Generally speaking, I wouldn’t trust stuff made overseas for data security,” says Zimmerman. “A guy at NSA InfoSec” – the information security division of the National Security Agency – “once told me, ‘Foreign-made crypto is our nightmare.’ But to be fair, as our domestic electronics industry becomes weaker and weaker, foreign-made becomes inevitable.” Look at where the expertise is, Zimmerman adds: Among the ranks of the International Association for Cryptological Research, which meets annually, there is a higher percentage of Israelis than any other nationality. The Israeli-run Verint is today the provider of telecom interception systems deployed in over 50 countries.
Carl Cameron, chief politics correspondent at Fox News Channel, is one of the few reporters to look into federal agents’ deepening distress over possible trojans embedded in Verint technology. In a wide-ranging four-part investigation into Israeli-linked espionage that aired in December 2001, Cameron made a number of startling discoveries regarding Verint, then known as Comverse Infosys. Sources told Cameron that “while various FBI inquiries into Comverse have been conducted over the years,” the inquiries had “been halted before the actual equipment has ever been thoroughly tested for leaks.” Cameron also noted a 1999 internal FCC document indicating that “several government agencies expressed deep concerns that too many unauthorized non-law enforcement personnel can access the wiretap system.” Much of this access was facilitated through “remote maintenance.”
Immediately following the Cameron report, Comverse Infosys changed its name to Verint, saying the company was “maturing.” (The company issued no response to Cameron’s allegations, nor did it threaten a lawsuit.) Meanwhile, security officers at DEA, an adjunct of the Justice Department, began examining the agency’s own relationship with Comverse/Verint. In 1997, DEA transformed its wiretap infrastructure with the $25 million procurement from Comverse/Verint of a technology called “T2S2” – “translation and transcription support services” – with Comverse/Verint contracted to provide the hardware and software, plus “support services, training, upgrades, enhancements and options throughout the life of the contract,” according to the “contracts and acquisitions” notice posted on the DEA’s website. This was unprecedented. Prior to 1997, DEA staff used equipment that was developed and maintained in-house.
But now Cameron’s report raised some ugly questions of vulnerability in T2S2.
The director of security programs at DEA, Heidi Raffanello, was rattled enough to issue an internal communiqué on the matter, dated Dec. 18, 2001, four days after the final installment in the Cameron series. Referencing the Fox News report, she worried that “Comverse remote maintenance” was “not addressed in the C&A [contracts and acquisitions] process.” She also cited the concerns in Justice Department order 2640.2D, and noted that the “Administrator” – meaning then DEA head Asa Hutchinson – had been briefed. Then there was this stunner: “It remains unclear if Comverse personnel are security cleared, and if so, who are they and what type of clearances are on record….Bottom line we should have caught it.” On its face, the Raffanello memo is a frightening glimpse into a bureaucracy caught with its pants down.
American law enforcement was not alone in suspecting T2S2 equipment purchased from Comverse/Verint. In November 2002, sources in the Dutch counterintelligence community began airing what they claimed was “strong evidence that the Israeli secret service has uncontrolled access to confidential tapping data collected by the Dutch police and intelligence services,” according to the Dutch broadcast radio station Evangelische Omroep (EO). In January 2003, the respected Dutch technology and computing magazine, c’t, ran a follow-up to the EO scoop, headlined “Dutch Tapping Room not Kosher.” The article began: “All tapping equipment of the Dutch intelligence services and half the tapping equipment of the national police force…is insecure and is leaking information to Israel.” The writer, Paul Wouters, goes on to discuss the T2S2 tap-ware “delivered to the government in the last few years by the Israeli company Verint,” and quoted several cryptography experts on the viability of remote monitoring of encrypted “blackbox” data. Wouters writes of this “blackbox cryptography”:
…a very important part of strong cryptography is a good random source. Without a proper random generator, or worse, with an intentionally crippled random generator, the resulting ciphertext becomes trivial to break. If there is one single unknown chip involved with the random generation, such as a hardware accelerator chip, all bets are off….If you can trust the hardware and you have access to the source code, then it should theoretically be possible to verify the system. This, however, can just not be done without the source code.
Yet, as Wouters was careful to add, “when the equipment was bought from the Israelis, it was agreed that no one except [Verint] personnel was authorized to touch the systems....Source code would never be available to anyone.”
Cryptography pioneer Philip Zimmerman warns that “you should never trust crypto if the source code isn’t published. Open source code means two things: if there are deliberate backdoors in the crypto, peer review will reveal those backdoors. If there are inadvertent bugs in the crypto, they too will be discovered. Whether the weaknesses are by accident or design, they will be found. If the weakness is by design, they will not want to publish the source code. Some of the best products we know have been subject to open source review: Linux; Apache. The most respected crypto products have been tested through open source. The little padlock in the corner when you visit a browser? You’re going through a protocol called Secure Socket Layer. Open source tested and an Internet standard. FireFox, the popular and highly secure browser, is all open source.”
THE CALEA CONNECTION
None of U.S. law enforcement’s problems with Amdocs and Verint could have come to pass without the changes mandated by the Communications Assistance for Law Enforcement Act of 1994, which, as noted, sought to lock spyware into telecom networks. CALEA, to cite the literature, requires that terrestrial carriers, cellular phone services and other telecom entities enable the government to intercept “all wire and oral communications carried by the carrier concurrently with their transmission.” T2S2 technology fit the bill perfectly: Tied into the network, T2S2 bifurcates the line without interrupting the data-stream (a T2S2 bifurcation is considered virtually undetectable). One half of the bifurcated line is recorded and stored in a remote tapping room; the other half continues on its way from your mouth or keyboard to your friend’s. (What is “T2S2”? To simplify: The S2 computer collects and encrypts the data; the T2 receives and decrypts.)
CALEA was touted as a law enforcement triumph, the work of decades of lobbying by FBI. Director Louis Freeh went so far as to call it the bureau’s “highest legislative priority.” Indeed, CALEA was the widest expansion of the government’s electronic surveillance powers since the Crime Control and Safe Streets Act of 1968, which mandated carefully limited conditions for wiretaps. Now the government could use coercive powers in ordering telecom providers to “devise solutions” to law enforcement’s “emerging technology-generated problems” (imposing a $10,000 per day penalty on non-compliant carriers). The government’s hand would be permanently inserted into the design of the nation's telecom infrastructure. Law professor Lillian BeVier, of the University of Virginia, writes extensively of the problems inherent to CALEA. “The rosy scenario imagined by the drafters cannot survive a moment's reflection,” BeVier observes. “While it is conventionally portrayed as ‘but the latest chapter in the thirty year history of the federal wiretap laws,’ CALEA is not simply the next installment of a technologically impelled statutory evolution. Instead, in terms of the nature and magnitude of the interests it purports to ‘compromise’ and the industry it seeks to regulate, in terms of the extent to which it purports to coerce private sector solutions to public sector problems, and in terms of the foothold it gives government to control the design of telecommunications networks, the Act is a paradigm shift. On close and disinterested inspection, moreover, CALEA appears to embody potentially wrong-headed sacrifices of privacy principles, flawed and incomplete conceptions of law enforcement's ends and means, and an imperfect appreciation of the incompatible incentives of the players in the game that would inevitably be played in the process of its implementation.”(emphasis mine)
The real novelty – and the danger – of CALEA is that telecom networks are today configured so that they are vulnerable to surveillance. “We’ve deliberately weakened the computer and phone networks, making them much less secure, much more vulnerable both to legal surveillance and illegal hacking,” says former DOJ cybercrimes prosecutor Mark Rasch. “Everybody is much less secure in their communications since the adopting of CALEA. So how are you going to have secure communications? You have to secure the communications themselves, because you cannot have a secure network. To do this, you need encryption. What CALEA forced businesses and individuals to do is go to third parties to purchase encryption technology. What is the major country that the U.S. purchases IT encryption from overseas? I would say it’s a small Middle Eastern democracy. What we’ve done is the worst of all worlds. We’ve made sure that most communications are subject to hacking and interception by bad guys. At the same time, the bad guys – organized crime, terrorist operations – can very easily encrypt their communications.” It is notable that the first CALEA-compliant telecom systems installed in the U.S. were courtesy of Verint Inc.
THE AMDOCS CONNECTION
If a phone is dialed in the U.S., Amdocs Ltd. likely has a record of it, which includes who you dialed and how long you spoke. This is known as transactional call data. Amdocs’ biggest customers in the U.S. are AT&T and Verizon, which have collaborated widely with the Bush Administration’s warrantless wiretapping programs. Transactional call data has been identified as a key element in NSA data mining to look for “suspicious” patterns in communications.
Over the last decade, Amdocs has been the target of several investigations looking into whether individuals within the company shared sensitive U.S. government data with organized crime elements and Israeli intelligence services. Beginning in 1997, the FBI conducted a far-flung inquiry into alleged spying by an Israeli employee of Amdocs, who worked on a telephone billing program purchased by the CIA. According to Paul Rodriguez and J. Michael Waller, of Insight Magazine, which broke the story in May of 2000, the targeted Israeli had apparently also facilitated the tapping of telephone lines at the Clinton White House (recall Monica Lewinsky’s testimony before Ken Starr: the president, she claimed, had warned her that “a foreign embassy” was listening to their phone sex, though Clinton under oath later denied saying this). More than two dozen intelligence, counterintelligence, law-enforcement and other officials told Insight that a “daring operation,” run by Israeli intelligence, had “intercepted telephone and modem communications on some of the most sensitive lines of the U.S. government on an ongoing basis.” Insight’s chief investigative reporter, Paul Rodriguez, told me in an e-mail that the May 2000 spy probe story “was (and is) one of the strangest I've ever worked on, considering the state of alert, concern and puzzlement” among federal agents. According to the Insight report, FBI investigators were particularly unnerved over discovering the targeted Israeli subcontractor had somehow gotten his hands on the FBI’s “most sensitive telephone numbers, including the Bureau's ‘black’ lines used for wiretapping.” “Some of the listed numbers,” the Insight article added, “were lines that FBI counterintelligence used to keep track of the suspected Israeli spy operation. The hunted were tracking the hunters.” Rodriguez confirmed the panic this caused in American intel. “It's a huge security nightmare,” one senior U.S. official told him. “The implications are severe,” said a second official. “All I can tell you is that we think we know how it was done,” a third intelligence executive told Rodriguez. “That alone is serious enough, but it's the unknown that has such deep consequences.” No charges, however, were made public in the case. (What happened behind the scenes depends on who you talk to in law enforcement: When FBI counterintelligence sought a warrant for the Israeli subcontractor, the Justice Department strangely refused to cooperate, and in the end no warrant was issued. FBI investigators were baffled.)
London Sunday Times reporter Uzi Mahnaimi quotes sources in Tel Aviv saying that during this period e-mails from President Clinton had also been intercepted by Israeli intelligence. Mahnaimi’s May 2000 article reveals that the operation involved “hacking into White House computer systems during intense speculation about the direction of the peace process.” Israeli intelligence had allegedly infiltrated a company called Telrad, subcontracted by Nortel, to develop a communications system for the White House. According to the Sunday Times, “Company managers were said to have been unaware that virtually undetectable chips installed during manufacture made it possible for outside agents to tap into the flow of data from the White House.”
In 1997, detectives with the Los Angeles Police Department, working in tandem with the Secret Service, FBI, and DEA, found themselves suffering a similar inexplicable collapse in communications security. LAPD was investigating Israeli organized crime: drug runners and credit card thieves based in Israel and L.A., with tentacles in New York, Miami, Las Vegas, and Egypt. The name of the crime group and its members remains classified in “threat assessment” papers this reporter obtained from LAPD, but the documents list in some detail the colorful scope of the group’s operations: $1.4 million stolen from Fidelity Investments in Boston through sophisticated computer fraud; extortion and kidnapping of Israelis in L.A. and New York; cocaine distribution in connection with Italian, Russian, Armenian and Mexican organized crime; money laundering; and murder. The group also had access to extremely sophisticated counter-surveillance technology and data, which was a disaster for LAPD. According to LAPD internal documents, the Israeli crime group obtained the unlisted home phone, cell phone, and pager numbers of some 500 of LAPD’s narcotics investigators, as well as the contact information for scores of federal agents – black info, numbers unknown even to the investigators’ kin. The Israelis even set up wiretaps of LAPD investigators, grabbing from cell-phones and landlines conversations with other agents – FBI and DEA, mostly – whose names and phone numbers were also traced and grabbed.
LAPD was horrified, and as the word got out of the seeming total breakdown in security, the shock spread to agents at DEA, FBI and even CIA, who together spearheaded an investigation. It turned out that the source of much of this black intel could be traced to a company called J&J Beepers, which was getting its phone numbers from a billing service that happened to be a subsidiary of Amdocs.
A source familiar with the inquiries into Amdocs put to me several theories regarding the allegations of espionage against the company. “Back in the early 1970s, when it became clear that AT&T was going to be broken up and that there was an imminent information and technology revolution, Israel understood that it had a highly-educated and highly-worldly population and it made a few calculated economic and diplomatic discoveries,” the source says. “One was that telecommunications was something they could do: because it doesn’t require natural resources, but just intellect, training and cash. They became highly involved in telecommunications. Per capita, Israel is probably the strongest telecommunications nation in the world. AT&T break-up occurs in 1984; Internet technology explodes; and Israel has all of these companies aggressively buying up contracts in the form of companies like Amdocs. Amdocs started out as a tiny company and now it’s the biggest billing service for telecommunications in the world. They get this massive telecommunications network underway. Like just about everything in Israel, it’s a government sponsored undertaking.
“So it’s been argued that Amdocs was using its billing records as an intelligence-gathering exercise because its executive board over the years has been heavily peopled by retired and current members of the Israeli government and military. They used this as an opportunity to collect information about worldwide telephone calls. As an intelligence-gathering phenomenon, an analyst with an MIT degree in algorithms would rather have 50 pages of who called who than 50 hours of actual conversation. Think about conversations with friends, husbands, wives. That raw information doesn’t mean anything. But if there’s a pattern of 30 phone calls over the course of a day, that can mean a lot. It’s a much simpler algorithm.”
Another anonymous source – a former CIA operative – tells me that U.S. intelligence agents who have aired their concerns about Verint and Amdocs have found themselves attacked from all sides. “Once it’s learned that an individual is doing footwork on this [the Verint/Amdocs question], he or she is typically identified somehow as a troublemaker, an instigator, and is hammered mercilessly,” says the former CIA operative. “Typically, what happens is the individual finds him or herself in a scenario where their retirement is jeopardized – and worse. The fact that if you simply take a look at this question, all of a sudden you’re an Arabist or anti-Semitic – it’s pure baloney, because I will tell you first-hand that people whose heritage lies back in that country have heavily worked this matter. You can’t buy that kind of dedication.”
The former CIA operative adds, “There is no defined policy, at this time, for how to deal with this [security issues involving Israel] – other than wall it off, contain it. It’s not cutting it. Not after 9/11. The funeral pyre that burned on for months at the bottom of the rubble told a lot of people they did not need to be ‘politically correct.’ The communications nexuses [i.e. Amdocs/Verint] didn’t occur yesterday; they started many years ago. And that’s a major embarrassment to organizations that would like to say they’re on top of things and not co-opted or compromised. As you start to work this, you soon learn that many people have either looked the other way or have been co-opted along the way. Some people, when they figure out what has occurred, are highly embarrassed to realize that they’ve been duped. Because many of them are bureaucrats, they don’t want to be made to look as stupid as they are. So they just go along with it. Sometimes, it’s just that simple.”
Christopher Ketcham writes for Vanity Fair, GQ, Harper’s, Salon and many other magazines and websites.
You can reach him at cketcham99@mindspring.com.
Nov. 19 (Bloomberg) -- Former Comverse Technology Inc. Chief Executive Officer Jacob `Kobi' Alexander, who is wanted in the U.S. for alleged securities fraud, won a Namibian court bid to postpone an extradition hearing until March 4.
The case was rescheduled pending the outcome of Alexander's appeal to the Supreme Court of Namibia over which judge should hear the case, Magistrate Cosmos Ndjala said today in Katutura on the outskirts of the capital, Windhoek. Alexander's legal team argues that under Namibian law, the case should be heard by the magistrate who presided over Alexander's initial bail application.
Alexander, an Israeli citizen, was arrested in Namibia in September 2006. He is free on bail while the U.S. seeks his return to face 35 criminal counts related to securities fraud including stock-option backdating. He intends to plead ``not guilty'' to those charges, according to his original affidavit.
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Sun Dec 14, 2008 10:07 pm Post subject:
Berlin, The Next Terror Target?
Verint Systems' robust cameras and recording units help to protect bus passengers in Berlin
For transport operators, protecting their passengers, staff and their assets is of paramount importance, and increasingly so. Whether on buses, trains or trams, indeed on any passenger transport, combating crime and dealing with the fall-out of crime is a major concern, fraught with challenges.
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Sun Dec 14, 2008 10:21 pm Post subject:
here they all are - at Verint Systems. - excellent bit of investigative journalism by Tom Burghardt at Pacific Free Press
Thick as Thieves: The Private (and very profitable) World of Corporate Spying
The Ties that Bind: Verint's Spooky Board of Directors
The close interconnections amongst firms such as Verint and the U.S. and Israeli National Security States are revealed by a glance at the firm's Board of Directors.
When Kobi Alexander fled the country in 2006, Dan Bodner became the company's CEO. According to Business Week, Bodner, a Comverse Infosys insider, "served in the Israeli Defense Forces in an engineering capacity." A graduate of Technion, Israel's Institute of Technology, Bodner was previously the President and CEO of Comverse Government Systems Corporation.
David T. Ledwell, Verint's Chief Strategic Officer since 2003, was formerly the President and CEO of Verint subsidiary Loronix Information Systems, according to Business Week. Apparently Loronix has been folded into its parent company Verint, and no longer exists as a separate corporate entity. However, the firm's products made the transition. According to Verint, the former Loronix division was responsible for its Nextiva IP Video Surveillance System. The "Nextiva portfolio" is loaded with "a broad array of solutions" for video recording and analysis in the banking, critical infrastructure, retail and mass transit "markets."
Andre Dahan, CEO, President and Executive Director of Verint's parent company Comverse Technology Inc., was a former CEO and President of AT&T Wireless Services Inc., Business Week reveals. Dahan, a graduate of the Jerusalem Institute of Technology, is described as having "more than 30 years of leadership experience in the information technology industry."
Victor DeMarines, a Verint board member since 2002 and Advisor to National Security Solutions, Inc., a "private equity firm" that focuses on "services and software" in the security and homeland defense industries, served as President and CEO of the spooky MITRE Corporation, where he worked in the "command and control" field as general manager of MITRE's Center for Integrated Intelligence Systems and oversaw the non-profit's Intelligence and Electronic Warfare Systems. Interestingly enough, from 1967-1969 DeMarines "managed MITRE's Bangkok, Thailand, site, where he helped coordinate MITRE's support for Air Force systems ... on support operations issues," according to Business Week. In addition to his duties at Verint and MITRE, DeMarines is a member of the advisory group for the National Reconnaissance Office (NRO) that oversees operations of America's fleet of military spy satellites.
Howard Safir, formerly New York City Police Commissioner under "Mr. 9/11" himself, Mayor Rudy Giuliani, has been a Verint board member since 2002 according to his Business Week profile. After his tenure as Police Commissioner, Safir became the CEO of SafirRosetti, the intelligence and security division of GlobalOptions Group, Inc., described as a firm that provides "crisis management and emergency response plans for disaster mitigation, continuity of operations, and other emergency management issues."
Larry Myers, another MITRE alumni was MITRE's Chief Financial Officer and Treasurer. At MITRE, Myers' brief included work on that firms' wide-ranging contracts for computer systems for the Department of Defense, the Federal Aviation Administration, the Internal Revenue Service and "several organizations" in the "U.S. intelligence community," according to Business Week. He joined Verint's board in 2003.
Paul D. Baker, Vice President of Corporate Marketing and Corporate Communications of Comverse Technology, joined Verint's board in 2002 according to his Business Week profile. Additionally, Baker is a director with Ulticom, Inc., a firm that provides the telecommunications industry with "Mobility, Location, Payment, Switching and Messaging services within wireless, IP and wireline networks," according to Ulticom's website.
Lt. General (retired) Kenneth Minihan, joined Verint's board in 2002, according to Business Week. Described by the business publication as the "most connected" member on Verint's board of directors, after leaving his post as the Director of the National Security Agency, NSA's Central Security Service and Director of the Defense Intelligence Agency, Minihan became managing director of the Paladin Capital Group. A private equity firm based (where else!) in Washington, D.C. Paladin's management team is loaded with heavy-hitting embeds from the security-intelligence complex, including among others, Dr. Alf Andreassen, described by his Paladin profile as having "promoted technological innovation in the area of national security ... for AT&T's support of classified national programs in the areas of Command, Control, Communications and Intelligence" (C3I). Minihan is well placed on some 17 boards of directors to implement the Pentagon's vision of creating a panoptic police state. Indeed, while at NSA Minihan oversaw that agency's transition into the digital age of surveillance.
Shortly after Minihan's appointment to Verint's board, Verizon Communications installed STAR-GATE, an intrusive communications interception system. According to a blurb on the firm's website,
http://www.pacificfreepress.com/news/1/3385-the-private-and-profitable -world-of-corporate-spying.html
How Israeli Backdoor Technology Penetrated the U.K. Government's Telecom System and Compromised National Security
".........Another anonymous source – a former CIA operative – tells me that U.S. intelligence agents who have aired their concerns about Verint and Amdocs have found themselves attacked from all sides. “Once it’s learned that an individual is doing footwork on this [the Verint/Amdocs question], he or she is typically identified somehow as a troublemaker, an instigator, and is hammered mercilessly,” says the former CIA operative. “Typically, what happens is the individual finds him or herself in a scenario where their retirement is jeopardized – and worse. The fact that if you simply take a look at this question, all of a sudden you’re an Arabist or anti-Semitic – it’s pure baloney, because I will tell you first-hand that people whose heritage lies back in that country have heavily worked this matter. You can’t buy that kind of dedication.”
The former CIA operative adds, “There is no defined policy, at this time, for how to deal with this [security issues involving Israel] – other than wall it off, contain it. It’s not cutting it. Not after 9/11. The funeral pyre that burned on for months at the bottom of the rubble told a lot of people they did not need to be ‘politically correct.’ The communications nexuses [i.e. Amdocs/Verint] didn’t occur yesterday; they started many years ago. And that’s a major embarrassment to organizations that would like to say they’re on top of things and not co-opted or compromised. As you start to work this, you soon learn that many people have either looked the other way or have been co-opted along the way. Some people, when they figure out what has occurred, are highly embarrassed to realize that they’ve been duped. Because many of them are bureaucrats, they don’t want to be made to look as stupid as they are. So they just go along with it. Sometimes, it’s just that simple.”
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Mon Dec 15, 2008 10:36 pm Post subject:
ISRAELI SPIES IN AMERICA? Massive Federal Cover-Up Exposed! Why are they in America? What are they really doing? Are they involved in terror? Why is the media silent?
Although most Americans have been told by the media that Israel is “America’s best ally”—perhaps even America’s “only real ally”—most folks find it hard to understand why Israel has what might be called a “grand tradition,” even a bad habit, of spying on the United States. While there are those who have heard about Israeli intelligence operations on American soil, they tend to believe—quite mistakenly—that Israel’s one and only espionage venture against America was the Pollard spy case, first publicly revealed in 1985 when the FBI arrested American-born Jonathan Pollard, a Jewish-American civilian employee of the U.S. Navy, on charges of spying for Israel. Many Americans—Christian and Jewish alike—who are devoted to Israel because of religious reasons, said that what Pollard was doing was “a good thing—helping America’s ally,” even though Pollard was violating the law by taking classified U.S. defense information and passing it on to elements in Israeli intelligence. However, many American intelligence and military officials felt otherwise, saying that Pollard did more damage to U.S. national defense than any other spy in American history. In the end, Pollard was tried and convicted and sentenced to life in prison, although to this day extreme enthusiasts of Israel demand Pollard’s release from prison so that he may emigrate to Israel where the government has set up a trust fund to help Pollard if he is ever released. All during the Pollard affair, the government of Israel officially denied that Pollard was acting on behalf of the Israeli government. Israeli officials said that Pollard was acting only on behalf of “rogue” agents in the employ of Israel. However, no serious student of the Pollard affair ever believed the Israeli denials. Although Pollard is the only Israeli spy ever indicted and convicted in a U.S. courtroom, there are—as hard as it may be to believe—several additional well-known American-born supporters of Israel (including two top-ranking current Bush administration officials) who have been investigated for espionage on behalf of Israel. Both Deputy Defense Secretary Paul Wolfowitz and his immediate deputy in the Pentagon, Douglas Feith, were investigated by the FBI on suspicion of having passed classified U.S. defense intelligence information to the Israeli Embassy in Washington. The allegations regarding possible treason by Wolfowitz go back to 1978. Feith was fired from the National Security Council in the Reagan administration in 1982 after he, too, was suspected of espionage. No charges were ever brought against either individual. Additionally, Wolfowitz’s longtime friend and associate, Richard Perle, another leading Bush administration advisor, was investigated by the FBI during the mid-1970s. Perle—like Wolfowitz and Feith—was suspected of having passed classified information to the Israelis. Stephen Bryen—another close longtime colleague of Perle and Wolfowitz—was also the subject of a major FBI inquiry into his own dealings with the Israelis after Bryen was overheard passing U.S. defense information on to Israeli officials in a coffee shop at the Madison Hotel in Washington, D.C. A Jewish-American prosecutor at the Justice Department was convinced that he had a strong case against Bryen. However, heavy-handed pressure from supporters of Israel led to the intended indictment of Bryen being quashed. Taking all of this into consideration, espionage by agents of Israel is clearly a grand tradition in official Washington. Still it has not hindered most spies for Israel from receiving positions of power and influence, despite the fact that there are American patriots in the FBI and the CIA and in other government agencies who have tried (largely unsuccessfully) to root out the spies. The fact that the mainstream media has, for the most part, failed to detail this highly controversial assessment makes it all the more important that this issue come to the forefront in light of the United States’ increasing involvement in the Middle East. This special report from American Free Press provides a brief overview of other evidence regarding Israeli espionage on American soil in recent years. It is not a pretty picture, by any means, but it is a story that Americans need to know about. _ Israeli Spy Operations on U.S. Soil A SPECIAL INVESTIGATIVE REPORT FROM AMERICAN FREE PRESS The Scandal the Controlled Press Won’t Touch Israeli spying on the most sensitive locations in the U.S., including the Pentagon (pictured above), is one of the most underreported stories of our time. From Jonathan Pollard to Larry Franklin, every secret the U.S. government maintains has been targeted. This special report details the latest news on this controversial issue. ISRAELI SPIES IN AMERICA? Massive Federal Cover-Up Exposed! Why are they in America? What are they really doing? Are they involved in terror? Why is the media silent? ......................
see pdf ffi
American Free Press - Israeli Spy Operations On U.S Soil (January 10, 2005).pdf
Description:
ISRAELI SPIES IN AMERICA? Massive Federal Cover-Up Exposed! Why are they in America? What are they really doing? Are they involved in terror? Why is the media silent?
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Wed Jan 07, 2009 12:34 pm Post subject:
Verint office locations and sackings
Verint to fire dozens of workers in Israel
Provider of analytic software, hardware based solutions expected to make official announcement on dismissals early next week. Company employs some 2,500 workers
Tomer Korenfeld, Calcalist
Published: 12.13.08, 08:40 / Israel Money
http://www.ynetnews.com/articles/0,7340,L-3637685,00.html
The Verint high-tech company is planning to fire dozens of workers in Israel.
An official announcement to the employees on the dismissals is expected to be made early next week. The company plans to convene a meeting with all its workers in Israel to announce its efficiency plan.
Verint is a public company which belongs to the Comverse Group and is run by President and Chief Executive Officer Dan Bodner. The company is a provider of actionable intelligence solutions for workforce optimization, IP video, communications interception, and public safety, and is NICE System's biggest competitor.
Verint employs some 2,500 workers, hundreds of them at the company headquarters in Herzliya.
The company's stock is traded on Nasdaq non-NMS Pink Sheet following its failure to issue financial reports for several years now, after Comverse got caught up in the stock options-backdating scandal. Verint cannot issue financial reports before Comverse corrects its own reports.
The Verint company refused to comment on this report.
On Thursday morning, Ynet reported that the NetApp proprietary computer storage and data management company was dismissing most of the people working at its development center in Haifa, which will be closed in January. The company informed its employees that about 50 of them would be fired.
Joined: 11 Nov 2008 Posts: 558 Location: Lancashire
Posted: Thu Feb 12, 2009 11:36 am Post subject: Man sought by UK authorities over alleged sending of DVD
Hi All.
Well what have we got going on here?
This is certainly a new move by the elite to begin the prosecution of activist's, we must up the anti also. They are trying to scare people do not fall foul of this :
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Mon Aug 10, 2009 10:54 pm Post subject:
Kobi Alexander will be facing charges of money-laundering
By Shirley Yom-Tov - Ha'aretz - Apr 4, 2009
The indictment against Jacob (Kobi) Alexander was unsealed and publicized yesterday. The charges, which could lead to a maximum of 25 years in jail if he is convicted on all counts, served as the basis for the American extradition request to Namibia that led to his arrest on Wednesday.
Alexander, 54, was arrested while eating lunch with his wife in their suite at the luxurious Windhoek Country Club, a hotel and casino complex in the capital city of Namibia. The family was staying there while looking for a house to buy in the former colonial town.
New facts revealed by the indictment show that while preparing to flee fraud charges in the United States, Alexander, the former head of Comverse Technologies, deposited $57 million in two Israeli bank accounts, one in Bank Hapoalim and one in Bank Leumi. While fact that he had deposited money in Israel was known even before the fugitive ex-CEO was captured this week, the details of the accounts were new.
Spread out over 44 pages, the indictment consists of 32 charges against the disgraced Israeli hi-tech executive, who founded the Comverse empire and ran it until being booted out in May, when the true dimensions of a stock options scandal came to light. Not only had Alexander, along with other company officers, backdated and springloaded stock options; they had run a secret slush fund of options to pamper disgruntled company officers, sometimes registering allocations to fake employees.
Most of the facts are well-known, but reading the charge sheet brings some new points to light.
The U.S. is demanding that Alexander return $138 million. That is over half his fortune - which, according to last year's TheMarker report on the 500 richest Israelis, is estimated at $250 million.
Under the money-laundering section of the charges, the American prosecutors say that Alexander had two accounts in Israel: accounts 131883 at Bank Hapoalim and 603401/78 at Leumi. In New York, the high-tech millionaire had two more accounts, at Citigroup Smith Barney.
The American authorities say that Alexander transferred the $57 million to Israel from his Citigroup account in order to hide it from them - thereby meeting the definition of money-laundering.
Bank Leumi said that it could not provide any details, and added that, with no connection to this case, it always complies with the law in all matters. Bank Hapoalim said much the same thing: "The bank wants to emphasize that it upholds all legal requirements, including, of course, the regulations concerning money-laundering. The bank does not comment on the business of others, whether they are clients or not."
Experts in Israel said that transferring money to Israel in this fashion may not be against Israeli law, since when Alexander moved the money, he had not yet been indicted or even declared a fugitive in the U.S. As long as the American authorities have not submitted, and the Israeli Justice Ministry has not approved, a request to block the funds, Alexander is legally entitled to make use of them in any legal manner. He could therefore even withdraw them to prevent the Americans from seizing the money.
However, it is possible that charges will be filed against Alexander in Israel too, and that his funds could be blocked.
The charge sheet also lists Alexander's assets in the U.S. It turns out that he owns two apartments in central Manhattan, one on the corner of 8th Avenue and 57th Street and another nearby, just two blocks from Central Park. The value of the flats was not mentioned in the documents.
The Wall Street Journal reported that while in Windhoek, Namibia, Alexander conducted a perfectly open lifestyle. He even received a temporary residency permit and registered his two children in an international school there.
So how was he caught, exactly? According to the Wall Street Journal, a month ago, a clerk at the Namibian supervisor of banks' office noticed an unusual influx of capital into the country - in fact, tens of millions of dollars - into accounts that Alexander had opened.
The clerk thought that suspicious, especially since Alexander was not a resident and had no business contacts in Namibia, and he had only arrived a few days earlier.
The clerk lodged a query with Interpol, which contacted the FBI, and the rest is history.
Namibia is on the southwest coast of Africa, a neighbor of South Africa. It recently made headlines after actors Brad Pitt and Angelina Jolie chose to give birth to their daughter there.
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Sat Dec 05, 2009 11:00 pm Post subject:
Verint’s Back Door
As if this were not enough, Bamford goes on to explain that in 2004 Verint acknowledged in a closed-door hearing in Australia that its proprietary eavesdropping system gives it the capability to “automatically access the mega-terabytes of stored and real-time data from anywhere, including Israel.” Which, of course, means that Verint’s bugging technology includes a back door giving the company remote access 24/7 to a large percentage of America’s, and the world’s, voice and data communications.
Talk about super intrusive. What is more, given the revolving door between Israel’s intelligence community and its high-tech firms, I think we must assume that Verint’s back door leads ultimately to Unit 8200, the Israeli equivalent of the NSA. Bamford does not state this but he did not need to, such a conclusion is inescapable. So, it is not too surprising that the Israeli government was privy, last January, to confidential discussions at the UN Security Council about the Gaza cease-fire resolution. No doubt, the Israelis were (and are) listening to every word of every private conversation or email within the US that is of interest to them. One wonders how this shocking state of affairs has remained under the radar. One would think, at very least, that Verint’s involvement in warrantless wiretapping would merit prime time coverage by the major networks, especially after its founder and former CEO, “Kobi” Alexander, was indicted for criminal activity. But insofar as I am aware there has been not a peep about it on television, at least, not yet. The public broadcasting NOVA special about Bamford’s research that aired on February 3, 2009 failed to mention it, [2] and the only article about Kobi’s flight from prosecution in the New York Times (2006) gave no hint. [3] The US corporate media appears curiously blasé about the strong likelihood that the state of Israel engages in wholesale spying on its principal ally. As for the exiled “Kobi” Alexander, despite his legal travails the former spook still has defenders. One source told The New York Post that "[in Israel] He's seen as a genius and a wunderkind of Wall Street. Israel is very proud of him." [4]
May 03, 2010
Verint Systems Wins 2010 North America Company of the Year Award
By Rajani Baburajan, TMCnet Contributor
Verint Systems, a provider of networked video solutions, announced that the company has won 2010 North America Frost & Sullivan Company of the Year Award for its IP Video Surveillance Software.
In a market with weak growth strategies Verint (News - Alert) has pioneered IP surveillance management with its best-in-class solutions and has remained competitive by including integrated video analytics in its management platform, increasing the value of its software to both end users and systems integrators, the company said.
According to Verint officials, the total IP surveillance market, which includes IP surveillance management software, encoders, IP cameras, and NVRs, is the fastest-growing segment in the security industry. Verint has maintained a healthy market share right from the outset..
http://sip-trunking.tmcnet.com/topics/security/articles/83858-verint-s ystems-wins-2010-north-america-company-the.htm
Interesting that the first mention of phone hacking was by three royal aides in 2005.
Also interesting is that Schillings use this event (about people accessing info re Prince William's injured knee) to justify super injunctions. Schillings now protect the royals and their interests.
When Tony Farrell talks about 'the enemy within' I presume that he means the enemy within our government (the John Adam St Gang, which includes the queen and co).
Interesting that Farrell is now interviewed by the Murdoch press, who set off the publicity for this story on the back of the royal aides' complaints.
'
Quote:
Andrew. wrote:
Quote:
Caz wrote
Quote:
The John Adamn st Gang (aka Committee of 300) most certainly do need to be exposed for what they are - criminals.
Agreed.
Thanks Andrew. It is rare indeed that anyone so much as breathes the name of the John Adam St Gang.
I do suspect Schillings may have put a super-injunction in place to silence exposure of this network.
does rather suggest that there is indeed a superinjunction in place to prevent exposure of the ARK/Dutroux connection. So we can't expect this story to be exposed by leading figures in the' truth movement' for a while to come.
Hence the chat will be about everything else but. (And that includes everything else but the John Adam St Gang/Committee of 300.)
Joined: 25 Jul 2005 Posts: 18335 Location: St. Pauls, Bristol, England
Posted: Sat Jul 30, 2011 10:29 am Post subject:
Common Purpose in the hacking enquiry cover-up frame:
How Labour's 'favourite lobbyist' is pushing hacking campaign
A key part of the campaign to "reform" the press is being financed by senior Labour figures with direct personal and professional interests in muzzling the media.
.........Sir David Bell was appointed to the Leveson inquiry because of his role as chairman and co-founder of the Media Standards Trust, which campaigns for for "transparency and accountability in news" and against "all forms of illegal intrusion by the press."
The Media Standards Trust is another supporter, with Sovereign Strategy, of the Hacked Off campaign, paying for the campaign's website.
There are close links between the Media Standards Trust and Common Purpose. The trust's deputy chairman and other co-founder, Julia Middleton, is chief executive of Common Purpose.
The two organisations shared offices until recently. Chris Bryant, the Labour MP who has led the parliamentary campaign on the phone-hacking issue, is a former manager at Common Purpose.
One of those who complained to the Information Commissioner, Michael White, from Walton-on-Thames, Surrey, said: "My private address was in their blacklist and I was described as a vexatious and harassing individual. I felt sick to think that Common Purpose had passed this around half the public authorities in the country.
"They got this data from their contacts in councils. The hypocrisy is stunning. These people quite rightly condemn invasions of privacy by the press while invading people's privacy themselves. They demand transparency for other people and fight it for themselves."
Ms Middleton said last night: "As an organisation we made a genuine mistake in this instance. We did so following what we believed to be sound advice from the Information Commissioner's Office, but it was in a very rapidly changing legal context. We have since changed our practices accordingly."
A Common Purpose spokeswoman said the charity no longer held the offending list and no further action had been taken against it.
And in previously unreported remarks, Lord Leveson has repeatedly criticised the media.......
http://www.telegraph.co.uk/news/uknews/phone-hacking/8656563/How-Labou rs-favourite-lobbyist-is-pushing-hacking-campaign.html
2. MST appoints Roger Graef as acting chair
Roger Graef has been appointed as the new acting Chair of the Media Standards Trust.
Sir David Bell suspended his chairmanship of the Trust following his appointment to the Leveson Inquiry. The Media Standards Trust Board asked Roger Graef to act as chairman in his absence.
http://mediastandardstrust.org/mst-news/mst-appoints-roger-graef-as-ac ting-chair/
Posted: Sat Jul 30, 2011 7:00 pm Post subject: Comverse/Verint of the John Adam St Gang/Committee of 300
.
Seems people around the internet are trying to attach Murdoch to Comverse/Verint, involved in intelligence, and said to be Israeli.
(Verint were responsible for the malfunctioned CCTV on July 7th).
I certainly haven't seen any evidence that Comverse (Verint a related company) is an Israeli company. (Although maybe I have missed something).
Comverse is most certainly of the John Adam Street Gang/Committee of 300 as they are located in Adelphi House (1-11 John Adam St). This is stated by the United States Securities and Exchange Commission.
Comverse and Verint are registered at Companies House in the UK.
Founded in 1982, the company went public on the Nasdaq Stock Market in 1986.
However, the documents at Companies House in the UK state that Comverse Kenan UK was incorporated in 1992, with the original name of Hackremco (No.764) Ltd (and hence one of the group of Hackremco shell companies, registered at Companies House, UK, most if not all having had one or more name changes). Verint Systems UK Ltd was incorporated in 1991 under the original name of Worldclass Technology Ltd.
So, some odd contradictions in this.
And nothing (at least in the public domain found so far) which suggests that Murdoch has anything to do with these companies.
And nothing to suggest that Comverse/Verint has originated from Israel. It has not been possible to access Ministry of Justice Israel, Register of Companies; the link is currently inactive.
Verint Systems keeps a close eye on all sorts of data. Formerly Comverse Infosys, the company provides analytic software for communications interception, video surveillance, and business intelligence. Its software allows communications service providers to capture voice, fax, video, and e-mail transmissions for customer service operations, while other products (sold to law enforcement and government agencies) are used for intercepting, processing, and analyzing data. Verint offers business intelligence software to improve call center efficiency by recording and analyzing the actions of call center agents, as well as video surveillance systems. Comverse Technology owns a majority stake in the company.
Your contact centre agents' voice and screen interactions provide a rich source of data. They tell you what customers want and need – and how well your company is serving those needs.
BT Contact Recording – Verint captures, stores and indexes your contact centre interactions to help you provide a better service to customers, comply with industry regulations and reduce liability.
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum