Page 11 of 66
• By Glenn Krawczyk Ari Ben-Menashe is a man without a home, a coun.lry. or many friends in the cut-throat world of international intelli gence. In his recently released book entitled Profits of War, the sensational story of the worldwide arrtJs cOIispiracy, Ben Menashe details the unbelievable story of an international cabal of well-connected intelligence community and corporate arms dealers who, as dIe title of the book suggests, wage war to covertly gain power, influence and personal wealth. Ben-Menashe is the man responsible for leaking the information that eventually led to the Iran-eontra investigalions and the demise (or sacrifice) of Oliver North whO', it ,turns out, was only a small player in a much much bigger game. After serving in the External Relations Department of Israeli Military Intelligence and acting as personall)a!ional security advi sor to Yitzhak Shamir (former President of Israel) for a total of twelve years, Ben-Menashe has written what must arguably rate as one the mosl importanl political and intelligence exposes ever. I met with Ari Ben-Menashe twice during 1991 to discuss vari ous issues, including the theft by the US Justice Department of the most sophisticated data-eollecting computer program ever devel oped, which is known as 'The Inslaw Affair", and the subsequent modification and international sale of that program to various countries around the world, including Australia, by a CIA front company and an Israeli Intelligence front-company owned and ron by Robert Maxwell. The Do~sier Society The computeF program we are talking about is called Promis and its use presents the Diggest threat to individual rights by any computer technology in use today. Not only that, it has given US Intelligence agencies access to extremely sensitive infonnation stored in the databases of possibly as many as eighty-eight coun tries around the globe. Ben-Menashe devotes an entire chapter of his book detailjng Ithe joint ADtericaI}-jsraeJi initjative to sell Promis to intelligence ;md law enforcement agencies worldwide, and gives several examples of how the program has been used to ,interfere with the politic-al process of various countries and keep track of citizens. Since obtaining an illegal copy of the program over a decade ago, the Central Intelligence Agency has, in conjunction with Israeli Iptelligence, embarked on a highly-successful worldwide initiative to i1Istalf "bugged" copies of the software in computer systems run by intelligence and bw-enforcement agencies, (as well as otb.er government organisations), to which they now covertly have Yiilimiteg access. One of the earliest "leaks" regarding this covert computer dou ble-dealing came out in an article entitled "Spy vs. Spy", (written by Zuhair Kashmeri for the Toronto Globe and Mail), which was published on Saturday 20 April 1991. Devoted entirely to the FEBRUARY-MARCH '93