The Israeli Criminals Behind the NSA Spy Scandal
June 13, 2013
At the center of the NSA scandal is a gang of Israeli high-tech criminals which is connected to the false-flag terror attacks of 9-11. These connections underline the involvement of the same Israeli criminals to both 9-11 and the NSA’s secret program to collect and store our personal information and conversations, which came about mainly as a consequence of 9-11.
Two Israeli companies, Narus and Verint, are involved in the National Security Agency (NSA) spy scandal in which copies of our phone calls and email data are sent to secret rooms at NSA buildings across the country. These Israeli companies are closely connected to Unit 8200, the electronic espionage unit of the Israeli military. (Narus was acquired by Boeing in 2010.)
Jacob “Kobi” Alexander
The founder and former chairman of Verint is wanted by the FBI for a long list of crimes. He is veteran Israeli intelligence officer.
Jacob “Kobi” Alexander, the former head of Comverse, the parent company of Verint, is a wanted criminal who has fled U.S. justice to Africa and probably subsequently to Israel. It is important to note that Kobi Alexander and Comverse were closely connected to Odigo, the Israeli messaging system that was used to warn Israelis to stay away from the World Trade Center on 9-11.
Furthermore, the NSA has used Israeli encryption software from RSA Security, Inc. since 2006, which means that Israelis hold the encryption keys to the entire NSA computer network. The Israelis obviously have easy access to everything at the NSA.
The following video clip is of James Bamford discussing the two Israeli companies, Narus and Verint, who are involved in the massive collection of our telephone and Internet data. Bamford was on “Democracy Now!” on October 14, 2008, discussing the role of these Israeli companies, who are closely tied to Israeli intelligence.
To have access to personal phone calls and emails allows Israeli intelligence to blackmail and control people, like General David Petraeus, who was forced to resign from his position as director of the C.I.A. after an extra-marital affair was revealed by unknown agents who had access to his personal email.
James Bamford on Democracy Now! – October 14, 2008
Video Link – http://youtu.be/hI_k9Xt00YE
Bamford wrote an article entitled “Shady Companies With Ties to Israel Wiretap the U.S. for the NSA” for Wired.com in April 2012 in which he discussed the Israeli companies and the criminals who ran them:
In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network.
According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters.
At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment.
What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.
In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.”
Several of the top people involved in these Israeli wiretapping companies are if fact criminals who are currently wanted for serious crimes committed in the United States, as Bamford explains in the 2012 article:
Like Narus, Verint was founded in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”
In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”
According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’aretz in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”
Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.
When asked about these contractors, the NSA declined to “verify the allegations made.”
Kobi Alexander is also closely connected to the 9-11 criminal atrocity. Alexander and Comverse are connected to the Israeli Odigo messaging company through which warnings were sent to the Israelis who were expected to be at work at the World Trade Center on 9-11. As I explained in an article entitled “Why was Kobi Alexander Allowed to Flee? The Israeli Fugitive, Odigo, and the Forewarning of 9/11” in August 2006:
The case of the Israeli criminal Kobi Alexander is like the proverbial “tip of the iceberg.” While Alexander’s crimes, through which he became immensely wealthy, are now evident, they are but a very small piece of a much larger Zionist criminal network – connected to the 9/11 terror attacks – which remains hidden beneath the surface.
Alexander, former head of the Israel-based Comverse Technology, was, until his crimes were discovered, one of the highest paid executives in the United States.
In the year 2000, for example, he reportedly earned some $102.5 million, with $93 million coming from the “exercise of options.” We now know that most of Alexander’s money was made through the fraudulent “exercise of options.”
Comverse Technology, the U.S.-based “parent company” of an older and much bigger Israel-based company with the same name, is the owner of the Verint, Ulticom, Starhome, Mercom and Startel companies. The key positions in these companies are all held by Israeli nationals.
Alexander, was recently allowed to flee the United States after he and two other former Comverse executives were charged with securities, mail and wire fraud by U.S. prosecutors in Brooklyn, New York. A warrant has been issued for his arrest…
While Alexander is obviously connected with Israel’s military intelligence apparatus and George Soros through the mutually owned investment fund ComSor, what is not widely reported is his company’s close links with Odigo, the Israeli-run instant messaging company that received – and conveyed – urgent warning messages about the imminent terror attacks on the World Trade Center, several hours before the first plane hit…
Shortly after 9-11, Odigo was completely taken over by Comverse Technology, which had been part owner of Odigo since early 2000, if not earlier. Shortly after 9/11, five executives from Comverse were reported to have profited by more than $267 million from “insider trading.”
Avner Ronen, the “founder” of Odigo, was Vice President of Business Development of Comverse Technology in October 2005. This indicates that Ronen and Alexander, both Israeli military officers with computer backgrounds, have been close business partners since early 2000.
Sources and Recommended Reading:
“Israelis Hold Keys to NSA/US Military Computer Networks,” by Christopher Bollyn, June 16, 2006, also published as “Israeli Code on U.S. Government Computers” in Solving 9-11: The Original Articles, p. 157
“Narus knows what you are doing on the network” by Om Malik, Forbes, August 11, 1999
“Shady Companies With Ties to Israel Wiretap the U.S. for the NSA” by James Bamford, Wired.com, April 3, 2012
“Why was Kobi Alexander Allowed to Flee? The Israeli Fugitive, Odigo, and the Forewarning of 9/11” by Christopher Bollyn, August 24, 2006, also published as “The Israeli Fugitive and the Forewarning of 9-11” in Solving 9-11: The Original Articles, p. 162
Note: Due to the transfer of information from the original website to this updated format, some article post dates may differ from the date they were originally published. However, most articles contain the actual publish date at the top of the article.