Caltech professor claims Israeli spy infiltrated JPL
UPDATE: I WAS INFORMED BY THE WESTERN AUSTRALIAN POLICE TODAY (25TH NOVEMBER, 2014), AT APPROXIMATELY 1030HRS, THAT IF I DID NOT REMOVE ALL REFERENCES TO [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP] I WOULD BE ARRESTED AS HAVING VIOLATED MY BAIL CONDITIONS NOT TO “OFFEND” ANYONE VIA ELECTRONIC MEANS. IT WAS REPORTED TO ME BY DETECTIVES THAT [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP] WAS VERY “OFFENDED” BUT WAS A GENTLEMAN AND DID NOT DEMAND MY ARREST BUT SIMPLY WANTED ANY REFERENCE TO HIMSELF REMOVED BY 5PM TODAY. I HAVE FULFILLED THIS OBLIGATION.
IT SHOULD BE NOTED THAT I AM NOT RESPONSIBLE FOR WEBSITES AND BLOGS THAT CHOOSE TO REPOST THIS MATERIAL. I WILL ENDEAVOR HOWEVER TO LIAISE WITH IDENTIFIABLE AUTHORS TO REMOVE ALL REFERENCE TO [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP] SO AS TO AVOID HARM TO BOTH MYSELF AND MY FAMILY AND THE LOSS OF PERSONAL PROPERTY AND LIBERTY. I REPEAT, PLEASE CONSIDER MY SAFETY AND SECURITY WHEN RE-POSTING THIS MATERIAL. I COULD BE SENT TO JAIL AND EASILY KILLED OR SEVERELY INJURED.
I DO NOT BLAME THE STATE POLICE FOR THIS – THEY ARE MERELY ACTING UNDER ORDERS AND IN FACT MANY HAVE RE-ITERATED TO ME THEIR DISGUST AT THE ISRAELI STATE, JEWISH SUPREMACISM AND ISRAELI INTELLIGENCE ACTIVITY IN THIS COUNTRY AND ELSEWHERE. SO PLEASE, SAVE YOUR INVECTIVE FOR THOSE WHO SEEK TO STIFLE DEBATE OF SUBJECTS “IN THE PUBLIC INTEREST” AND WHO SEEK TO SUBVERT OUR COUNTRIES CONSTITUTIONAL MONARCHICAL PARLIAMENTARY DEMOCRACY, NATIONAL SOVEREIGNTY AND NATIONAL SECURITY.
Now this is exactly what I am talking about in this previous video I made on the subject of reporting Israeli and Jewish spying.
Rocket Science Espionage?November 17, 2014
Did the California Institute of Technology ignore faculty reports that an Israeli spy might be working at a campus-controlled research facility so as not to jeopardize an $8 billion National Aeronautics and Space Administration contract? That’s the basis of a whistleblower suit filed last week against Caltech by Sandra Troian, a professor of applied physics there who says the university, after dismissing her concerns, tried to retaliate against her for speaking with federal authorities during their own investigation into the matter.
Please note this interesting extract from the article –
According to the suit, Troian hired Amir Gat, a recent Ph.D. in aerospace engineering from Technion-Israel Institute of Technology, in early 2010, to help design a new type of space micropropulsion system. The project, funded by the Defense Advanced Research Projects Agency, allegedly was subject to federal export control laws governing unauthorized sharing of information, and Troian says she and Gat signed agreements saying they would protect security-sensitive research.
The Technion was started up by Israeli Military Intelligence under a program called “Operation Talpiot”. Here, the best minds are nurtured by the Israeli Defence Force to go out into the private sector and design and build hardwear and software solutions for both the private and government sector. THE GRADUATES ARE ALL SPIES FOR THE STATE OF ISRAEL.
Watch the above video for the EXACT explanation of what scientist Sandra Troian and the FBI were trying to expose.
Of further interest –
He is also alleged to have purposely entered erroneous numbers into design software codes. Later in 2010, a computer virus attack on Troian’s work computer resulted in hundreds of files being uploaded to an IP address outside Caltech, and days of interruption to Troian’s network.
This is the exact same activities that led to the ‘catastrophe’ of the “Heartbleed” bug that allowed massive computer systems to be compromised – revealing the contents of memory – passwords, encryption – to the attacker. Heartbleed was considered the greatest coding “mistake” ever –
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
How did this massive mistake happen?
In 2011, one of the RFC’s authors, Robin Seggelmann, then a Ph.D. student at the University of Duisburg-Essen, implemented the Heartbeat Extension for OpenSSL. Following Seggelmann’s request to put the result of his work into OpenSSL, his change was reviewed by Stephen N. Henson, one of OpenSSL’s four core developers. Henson failed to notice a bug in Seggelmann’s implementation, and introduced the flawed code into OpenSSL’s source code repository on December 31, 2011. The vulnerable code was adopted into widespread use with the release of OpenSSL version 1.0.1 on March 14, 2012. Heartbeat support was enabled by default, causing affected versions to be vulnerable.
These two who “missed” the coding error didn’t train at the Technion in Israel did they?
Funnily, the man who was instrumental in getting me locked away for three years in jail also trained at the Technion in Israel – Mr [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP].
In the above video at approximately 7:15 in, you will see our little Aussie Jewish Sayanim (helper for Israeli Intelligence) [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP]. gloating on my incarceration for three years –
[NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP]. also served in the Israeli Defence Force in the mid 1970’s.
SAYANIMS like [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP]. are all over Western Institutions. They are in our military and sensitive government departments. They have their compromised hardware in our communications network. They are present in private corporations and give sensitive corporate intelligence to Israeli companies. Let me give you an example – in 2010 I met a guy who worked in wholesale IT equipment ordering and sales. He had received an order from a large Australian company called “Co-Operative Bulk Handling” for a hundred RAD GROUP routers direct from Israel. He stated to the customer that is was far cheaper and far easier to order routers from Singapore and not from Israel. The CBH I.T employee was adamant – the routers had to come from Israel. Not long after we had the explosive allegations of massive bribery of Iraqi officials by the Australian Wheat Board. the AWB is a “sister” company of CBH – did the Israeli’s get sensitive information from compromised (back doored) RAD GROUP routers that allowed them to end the lucrative and friendly trade deals with Iraq?
RAD GROUP are a massive company born directly out of OPERATION TALPIOT and the king of Technion, Zohar Zispel, who features in the top video.
Further information on this important subject available below –
Two further video’s of interviews with me explain my case.