All Episodes

September 5, 2025 66 mins

Watch on Substack

This documentary exposes the hidden history of a sprawling global surveillance network that began decades ago and continues to this day. The story centers on PROMIS, a revolutionary people-tracking software developed in the 1970s by a company called Inslaw.

The program takes a dark turn when the U.S. Department of Justice is alleged to have stolen the software, modified it with a secret backdoor, and, in cooperation with Israeli intelligence, sold the Trojan Horse version to foreign governments to spy on them.

This investigation follows the trail of journalist Danny Casolaro, who was found dead in a hotel room while investigating the conspiracy he called "The Octopus". His death was ruled a suicide, but his family believes he was murdered for getting too close to a web of espionage involving illegal weapons, the Iran-Contra affair, and the Reagan-era White House.

The legacy of PROMIS lives on through more advanced programs like P-TECH, a company with terrorist financing ties that had access to the computer systems of the FAA, NORAD, and the White House on 9/11. The documentary culminates by exposing Pegasus, an invasive modern spyware sold by Israel's NSO Group that can turn any smartphone into a "spy in the pocket," monitoring your calls, texts, camera, and microphone without your knowledge.

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:05):
Anybody heard of Pine Gap Australia?
There's this huge listening postout in the middle of almost the
exact center of Australia that'sdesigned to listen to all the
communications coming from all the satellites because it's got
a good view of a lot of the southern facing satellites.
So that's Pine Gap and they write about it down in the
Australian papers about how thisis our link to the, you know,

(00:26):
the sauce, the spy sky. It basically just enables this
thing that, you know, it's called Echelon that a lot of
people heard about a carnivore, you know, it's the e-mail
version of that. And you know, it brings his
heart to it. Back to our friends, you know,
the NSA, and this is a great one.
I picked this up off the EFF site.

(00:46):
They got a lot of great images there and it's just kind of
funny. We're going to be talking about.
Anybody heard of Room 641A? We're going to be talking about
that in a minute. But so it's interesting because
the EFF has done a lot of research on the NSA and what,
you know, what their civil liberties are.
And they've even developed thesemaps that, you know, and, and
it's funny, they even call it the octopus, the NSA

(01:08):
surveillance octopus, you know, and where all these data
transmitters. And look, see, we look right up
here, up in the corner there. We got one right up there, right
near us, right right out of sideof Seattle.
It's right here. Yakima, WA.
And so, you know, I couldn't help but just turn the octopus
the other way because that's what it is.
You know, it's the the NSA octopus, you know, and they
basically, they got us, you know, they got all our data,

(01:31):
they got all our stuff. And yeah, Speaking of AT&T and
so anybody know who this is? Mark Klein?
I'll give you a hint. His name's Mark Klein.
And so once again, he used to beup, you know, at AT&T and that
switching center up in the San Francisco Bay Area.
That broke the story that broke the story on on what we see

(01:54):
here, room 641A. And it was just a mysterious
room that nobody could get into except like one person that had
that broke the story on, on whatwe see here, room 641A.
And it was just a mysterious room that nobody could get into
except like one person that had super secret security clearance

(02:16):
from the NSA because the only guy that could get in here.
And, and it turned out it was this guy Mark Klein was the guy
who was coming in later to do the maintenance on the system
and whatever. And he kept hearing this
reference to this room 641A. And, and I got the name of the
process. There's a certain processor
that's in there like SP3 or something like that.

(02:37):
And he kept hearing all these references.
What's this, I need to get in here, What's in here?
And, and so he started investigating.
He turned out to be his own investigative reporter.
And so the 641 A, nobody knew what was in there.
They thought it was like MissionControl, you know, like the the
control Dome and so, but it was probably just a bunch of hackers
in there, you know. But basically what happened is

(02:58):
that he had come across some of these documents at the AT&T
facility and somehow or another he leaked them out or snuck them
out or whatever. And he got a basically here it
is, the SG3L XLGX. Yeah, imagine having that in
your basement. And so and actually here's

(03:18):
another better shot of it in color that the EFF had created
for us. Thank you, EFF.
And so and so basically does exactly what promise wanted to
do, you know, 30 years ago, but now, you know, they got a box to
do it and just piped right into the, you know, all your
communications go right through this box.
Any e-mail you send probably gets sent through this 641 a

(03:40):
this SG. 3. Who?
It's a spy scandal that's already rocked the White House,
an intrigue that could threaten the presidency of George Bush.
This story centers on incredibleallegations of spying on a scale
never before imagined. It involves America's Central
Intelligence Agency selling computer programs to foreign

(04:02):
nations. These programs allegedly allowed
the CIA to spy on the intelligence agencies that
bought it You. Can turn back now or learn the
stuff they don't want you to know.
Here are the facts. In August of 1991, the corpse of

(04:25):
journalists Danny Casolaro was found in the tub of Sheraton
Hotels room 517 in Martinsburg, WV.
He had 10 to 12 slash wounds on his wrist.
Investigators also found a suicide note nearby.
Coroner's twice ruled the death a suicide, however Casalero's

(04:45):
family believe there was more tothe story.
In the time leading up to his death, Danny Casalero have
become increasingly panicked. He told his brother that
anonymous callers harassed and threatened him on the phone,
which is housekeeper confirmed. Casalero also told his
confidants that if he died, it would not be a suicide.

(05:06):
Instead, he implied it would have something to do with his
latest investigation. A massive conspiracy sea of
silence, touching on everything from surveillance software to
the October Surprise, Iran Contra, and more, bridging
generations and reaching all theway to the White House.
Danny Casalero called this conspiracy the Octopus.

(05:29):
Here's where it gets crazy. Today, most people have not
heard of Danny Casillero. What was he working on?
What happened to him on the night of his death?
According to witnesses, he was travelling to Martinsburg to
meet with the contact, possibly regarding the now obscure Inslaw
case. In the 1970s, an IT company

(05:50):
named Inslaw developed a people tracking program called the
Prosecutor's Management Information System.
Or promise a date of travelling to Martin to meet with the
contact, possibly regarding the now obscure Inslaw case.
In the 1970s, an IT company named Inslaw developed a people

(06:11):
tracking program called the Prosecutor's Management
Information System. Or promise a data mining
tracking system. Easily decades ahead of its
time, the deal went sour and Inslaw eventually took the
Department of Justice to court, alleging that the United States
did not honor the contract. Insurance Law argued that the

(06:33):
government pirated this software, sold it to other
countries, and tried to bankruptand silence their company to
stop the truth from getting out.This is came forth including
former Mossad deputy director Rafael Itan, who claimed that US
and Israeli intelligence agencies cooperated to sell a

(06:53):
Trojan horse version of promise to foreign governments.
It's possible that Casaleros investigation began here, but
soon he stumbled into what he believed was an international
web of espionage, assassination,drugs, illegal weapon trades and
more. He traced the ringleaders to the

(07:14):
upper reaches of private security firms, the CIA and the
Reagan era White House. Today, questions about the
events persist and remain unanswered.
Theorists have drawn increasingly complicated links
between events alleged to be part of the octopus.
But how much of this is mere conjecture?
It's common knowledge that the world's intelligence agencies

(07:37):
have and will murder to keep secrets.
But did they murder Danny Casolaro or did he commit
suicide? Numerous people, including
former congressman and other journalists, don't believe the
official story, and more than 20years later, questions remain
Did someone murder Danny Casolaro?

(07:58):
On the theft of the Inslaw software, which belonged to this
couple called the Hamiltons in Washington, who developed this
case management software that was just the bee's knees of the
time. And the Justice Department
showed immediate interest in it in in buying it and then
developing it. And they ended up in effect
stealing it from the Hamiltons and letting it loose all around

(08:20):
the world to the Saudis, to the Israelis, to the Canadians.
I mean, you name it, they had it.
But with this back door feature that allowed U.S. intelligence
to be monitoring it anyway. So that's just the the bare
bones of the the In's law software connection.
And, and there were many investigations and they they
threw contrary conclusions as towhether the Justice Department

(08:40):
really acted with malfeasance here.
But to me, the matter is pretty much settled and this document
alone. So I'm going to read you about
Khashoggi. OK, OK, here we go.
This is dated May 16th, 1985. It's addressed to William Weld,
US Attorney. It's signed by West Bradford
Reynolds, assistant attorney general of the Civil Rights
Division. I'm going to 1st read the

(09:01):
document and then comment on it.As agreed.
Messrs Manukar Gorbanafar, AdnanKhashoggi and Richard Armitage
will broker the transaction of Promise Software to Sheikh
Khalid bin Mahfuz For real and as gifts in his region, he
continues. Upon the three conditions we

(09:23):
last spoke of, Promised must have a soft arrival.
No paperwork, customs or delay. It must be equipped with the
Special Data Retrieval Unit. As before, you must walk the
financial aspect through Credit Suisse International Commercial
Bank. If you encounter any problems,
contact me directly. And people should know that

(09:44):
Khashoggi is best buddies with none other than Donald Trump.
And this is going on at the timeof these Iran arms dealings with
the Israelis. Promise Software is a
revolutionary computer program developed in the 1970s by a
former NSA programmer and engineer, Bill Hamilton.

(10:04):
In terms of computer programs, it represents the universal
translator of Star Trek. Promise stands for Prosecutors
Management Information System isable to read and integrate any
number of different computer programs or databases
simultaneously, regardless of language or operating system.

(10:25):
According to Bill Hamilton, the inventor, Edwin Meese, Reagan's
Attorney general, along with Doctor Earl Bryan and others,
stole the amazing software, modified it, installing a
trapdoor into that would allow those who knew of it to access
the program and other computers and then sold the software
overseas to foreign intelligenceagencies.

(10:48):
Bill Hamilton knew his software had been stolen when requests
for tech support came in from people he hadn't sold it to.
The Israeli Mossad under Rafi Eitan again modified the
software and sold it throughout the Middle East using British
publishing magnet Robert Maxwellas a cut out.

(11:08):
The revolutionary software allowed almost anyone with the
trap door code to enter every database in every computer, in
every language it will simultaneously.
This ability represents perfect information gathering technology
that is undetectable. The ultimate prize of every
intelligence agency in the world, the CIA through GE

(11:31):
Aerospace in Herndon, VA GAO contract #82-F624620 The FBI and
the NSA modified the back door, but more importantly had
enhanced the ultimate program with an artificial intelligence
or AI. The program, which came to be

(11:53):
called other names such as SMART, had originally been
capable of automatically and secretly drawing any information
from any computer and all computers connected to the
Internet. The contractor that added the
artificial intelligence component, GE Aerospace, was
purchased by Martin Marietta, which merged with Lockheed

(12:15):
Martin, the largest defense and aerospace contractor in the
world. Ed Meese was not the only one
who recognized the potential promise in promise, Democrats
had their own moves. Jackson Stevens is a
presidential kingmaker, A lifelong supporter of George
Bush and Annapolis, roommate of Jimmy Carter.

(12:37):
The billionaire Stevens firm Systematics, later Axicom, had
mated the illegal software with banking software.
In the late 70s and 80s, Systematics handled roughly 70%
of all electronic banking systems in the US.
Stevens teamed with Wortham Bank, Lippo Group and BCCI, the

(13:02):
Drug Intelligence bank, to penetrate every banking system
in the world. Promised software could be used
to influence and predict financial markets worldwide.
When Clinton was out of funds during his campaign, it was
Jackson Stevens that loaned him 3 million to keep it going.

(13:23):
Herbert Pug Winokur, CEO of Dyncorp from 1989 to 1997, is a
PhD mathematician from Harvard where the mathematical
breakthroughs using block modeling gave rise to artificial
intelligence. In the 60s.
Winter Corp did research for theDoD on the causes of inner city

(13:46):
unrest in the wake of the 1967 Detroit riots.
Dyncorp was heavily involved in the evolution of Promise
Software. Winnecor is a member of the
board for the Harvard Endowment,which is not a benevolent
university fund, but an aggressive, predatory investor
with 19 billion in assets invested in a hub, subsidized

(14:09):
housing, high tech defense operations, and George W Bush's
failing oil company, Harkin Energy.
Harkin Energy, the Harvard Endowment, saw its holdings
skyrocket in the last decade, making 33% in 1999.
That was the same year HUD announced a manual adjustment to

(14:33):
reconcile a $59 billion accounting shortfall between its
accounts and the US Treasury account.
Geomatics is a company at the heart of the Canadian Space
Program and associated with Lockheed Martin.
Geomatics uses remote sensing from space to locate natural
resources such as oil, precious minerals and other commodities

(14:59):
in the commodities market of theworld.
This kind of perfect informationis the ultimate tool to
predicting and controlling markets.
Remote sensing can closely estimate the size of harvest of
agricultural commodities such ascoffee or oranges.
Perfect information on the size of the orange harvest translates
potentially to millions of dollars in the US commodity

(15:22):
markets alone. Exploration for oil and gas can
be very expensive, but advances in imaging technology, GPS,
global positioning systems, and remote sensing technologies have
advanced light years over the last few decades.
This situation is custom made for enhanced promised software

(15:43):
with backdoor technology. What better way to map and
inventory the world's resources,but by making each client nation
pay for it, Promise software makes it possible to compile a
worldwide database on every marketable natural resource.
Artificial intelligence enhancedpromise based programs would be

(16:05):
the perfect setup to make billions of dollars in profits
by manipulating the futures trade in, for example, a rare
metal like tungsten or exploiting a sudden surge in the
price of gold and platinum. The Royal Canadian Mounted
Police RCMP were sold promised software to use in their

(16:26):
intelligence gathering operations and began to suspect
that their copies may have been altered and possibly all of
their files were transparent andhad been so for some time.
The RCMP had been given their version of promise by the
Canadian Security and Intelligence Services, CSIS,

(16:47):
which was created with the assistance and direction of the
CIARCMP. Investigators stated that they
and the CSIS had a rivalry similar to the one between the
CIA and FBI, and questioned whether any intelligence agency
created by the CIA could be completely loyal to its native

(17:08):
country. They further stated that they
knew that the NSA had compromised their communications
equipment. The Canadians put out a report
that friendly nations were stealing sensitive technology,
particularly related to aerospace, biotechnology,
chemicals, communications, information technology, mining

(17:32):
and metallurgy, nuclear energy, oil and gas, and the
environment. The doctored versions of Promise
software were acquired from bothRobert Maxwell and Doctor Earl
Bryan. Bryan is a medical Doctor Who
founded Hadron and had been involved in shady dealings with

(17:52):
firms connected with disease research, cytology and
biotechnology. Hadron is at the heart of the US
government operations involving bio warfare and vaccines.
Ari bin Menashi is Israel's top spy who in reports was linked to
Iran Contra scandal and the OctoOctober Surprise against

(18:15):
election in 1980. Promise software is described in
his book Prophets of War. The inventor of Promise software
hired Army CID investigator BillMcCoy to investigate the theft.
But the famed investigator, who had broken many of the Army's
biggest cases, was found dead ofa heart attack within 48 hours

(18:41):
of his death. Mccoy's body was cremated, and
two days later all of his files,furniture and personal
belongings had been removed fromhis home.
His home was then painted and sanitized.
The promised saga leads to more than a dozen deaths, many of
which share the same pattern, with eight within 48 hours of

(19:04):
death. The body is cremated, residences
are sanitized and all records disappear from Rupert Murdoch.
In the current market, a good friend of mine helped helped
write a book with another friendof mine, Jim Keith called The

(19:26):
Octopus, The Secret, The Government and the Death of
Danny Castellero, which is what we're going to talk about here
today. And so there's there's Ken and
his his little conspiracy Zine called Steam Shovel Press.
And so we basically, yeah, let'scut to that.

(19:46):
Sure. Yeah.
And so basically Jim, Keith and Ken wrote this synopsis about
Danny Castellero and they basically basically wrote this
book. So this is Danny.
I guess I should dedicate this presentation to Danny's in
Danny's memory because he's no longer with us.

(20:06):
He wouldn't have really enjoyed it, a book like this.
I should point out that Jim Keith, who isn't in this photo,
but we'll see him later. He also died actually Burning
Man a few years back. And so a lot of people
associated with this story have.Died in one way or another.
In fact, there's some researchers say there's up to 40
people who have died under mysterious circumstances

(20:28):
associated with this story. And so hopefully we're not one
of them. Anyway, so this is Danny.
We're going to be talking about him a lot later.
And so there's this Octopus. Danny was investigating
something called the Octopus. And the Octopus basically had
full wanted to control everything, all of our,

(20:49):
basically our entire society, our infrastructure, our who we
pay our taxes to, what you know,what the whole thing's about.
And so, so this octopus basically came across this piece
of software called Chromis from A-Z for an example, would go out

(21:13):
and get everything to the least common denominator and go out
and search everything at once and then come back and sort it
all out and figure out what all that stuff was and then make
information out of it. In today's age, that would be
like Google or something, any ofthis stuff that's out there now.
We'll see, we'll see as the presentation goes on that a lot

(21:34):
of the things that happen out here now, especially in terms of
Trojans and and viruses and things like that are exactly
what Promos was designed to do because Promos was a data miner.
And so we'll see here in a minute.
And in fact, let me back up a slide to this enterprise slide
because today we call it enterprise with the cloud or
whatever. And so basically what it was

(21:57):
designed to do was go out. It didn't matter what system it
was on or what where it was at, depending on what system it was
installed on, it would basicallygo out and get everything down
to its least common denominator.And then bring it all back and
sort it all out and then spit out some information unlike any
other software at the time in 19781979.

(22:20):
And the company that that released the software was called
Inslaw, the Institute for Law. And something, something,
something, they're actually still in business, believe it or
not, after being almost driven out of business by the
government, as we will soon seen.
And so there's this Promis software.
And here's an example of basically what it could look
like because it's out on the market today.

(22:41):
And so this is basically an example of something that Promis
might do. And it was the first software to
let somebody figure out like be able to sort by a defendant or
attorney involved or, or whatever.
You know, they could sort by allthese different things.
It's like Excel is today, but you know, today what they had
needed in mainframes to do before.
Of course we can do, you know, on a MacBook Pro, but at the

(23:02):
time this was like revolutionarysoftware processing where we get
everything down to that least common.
We're used to that now, but backthen that wasn't the case.
And so it's very interesting that basically everything we've
built, everything today that we've built on is all based on
on this kind of computing power.And so basically promos wanted

(23:26):
to get down to that root level, figure out all the data and try
to make sense of it and then bring it all back.
It's basically almost an artificial intelligence at the
time and we'll soon see that they use this kind of software
to basically develop almost all the technology that we're used
to today. You know, we're known about the
we know it is like the social network.
It's in Crossing the Rubicon. I have one whole chapter on

(23:47):
Promise, but Promise, which stands for Prosecutors
Management Information System. PROMIS, which was its original
name in the early 1980s, appearsin about.
I have 32 chapters in the book, and Promise appears in probably
11 of them. Now, what Cynthia was asking and

(24:07):
what you were talking about, andto illustrate the case, there's
another company that you and I are extremely familiar with
called Dyne Corp, which has beenvery closely connected.
I wrote a major expose on Promise in October of 2000 after
the national security staff of the Royal Canadian Mounted
Police came to ask me questions about how their Promise software

(24:28):
got compromised. The stories on the From the
Wilderness website. But Dyncorp, aside from being
everywhere and doing everything possibly dirty, Dyncorp also
operates the telephone systems for the United States House of
Representatives and the United States Senate.
The billing records are maintained by an Israeli company
called Amdocs, which monitors every phone call called, every

(24:51):
phone call placed, every bill, every time, the duration of
every call, who made the call, etcetera, etcetera, etcetera.
We know that Dyncorp has Promiseand this is where I truly wish
our dear friend and colleague Catherine Austin Fitz were here
today because I would speak thison her behalf because she was my
teacher on this. What we see is that all these
government agencies, as a resultof promise and promise progeny

(25:15):
promise enhanced versions with artificial intelligence being in
the hand of private corporations, has turned the
entirety of the United States government into a franchise
feeding through for the benefit of private corporations.
The government belongs to private corporations when you
consider that another company known to have promise aside from

(25:41):
Dyncorp is Lockheed Martin, who's on whose board of
directors sat Lynn Cheney, the vice president's wife until he
took office. She was also in the PEOC
Presidential Emergency Operations Center with her
husband on the morning of 9/11. How did she get in?
She didn't hold the government office.
New information on the cold caseinvestigation of a 1981 Rancho

(26:02):
Mirage triple murder. News Channel 3 has learned 3
local Indian tribes are part of the investigation into these
murders. News Channel 3's Nathan Baca
joins us tonight with a look at what these 3 tribes are
suspected of doing. Nathan.
Tamara, John. The three tribes under
investigation are the Cabazons, the Santa Rosa and the Torres
Martinez. They are suspected of setting up
secret experimental weapons testing deals.

(26:24):
In the 1980s. Three people who knew too much
were murdered. Execution in 1981, Riverside
County cold case detectives believes the documents you were
about to see or what they died for.
New documents reveal how local Indian tribes were involved in
bringing large caliber weapons testing to the Coachella Valley.
Riverside County Sheriff's Department Cold case detectives

(26:44):
are looking into whether a former Cabozon Indian Vice
chairman was murdered in 1981. With two other people in this
home to keep these weapons steelsecret, an experimental
electromagnetic weapon called a rail gun was on the testing
list. Documents show a 1980s business
partnership between the Cabazon Band of Mission Indians and

(27:05):
security contractor Wackenhut toform Cabazon Arms.
This is Santa Rosa Mountain nearHwy. 74, where the secret
weapons testing was meant to take place.
Newly uncovered documents show the Santa Rosa Band of Indians
was working with the Cabazon Indians.
They plan to build the experimental weapons in the
mountain South of Pinon Pines. To find out more about railguns,

(27:28):
we talked to UC Riverside physics professor Doctor Harry
Tom. A railgun is a electric operated
gun. It uses only a battery and you
send electricity through the projectile itself and you make
it. This recent video from U.S.

(27:49):
Navy weapons testing shows how gunpowder isn't needed to hurl a
giant bullet at supersonic speeds.
It is the future of artillery, but it's so hard to perfect.
It's been tested for 30 years. We asked the Santa Rosa Band of
Indians at pursuing weapons testing requiring enormous
amounts of electricity and environmental dangers fits in
with its promise to protect the natural resources of sovereign

(28:12):
tribal land. The tribe has not responded.
Additional documents show that. And you send electricity through
the projectile itself, and you make it propel.
This recent video from U.S. Navy weapons testing shows how
gunpowder isn't needed to hurl agiant bullet at supersonic
speeds. It is the future of artillery,

(28:34):
but it's so hard to perfect. It's been tested for 30 years.
We asked the Santa Rosa Band of Indians that pursuing weapons
testing requiring enormous amounts of electricity and
environmental dangers fits in with its promise to protect the
natural resources of sovereign tribal land.
The tribe has not responded. Additional documents show the
Tourist Martinez Tribe granted Cabazon Arms Company the right

(28:56):
to test large scale weapons on 30,000 acres near the Salton
Sea. Tourist Martinez tribal
leadership have also not responded to our questions.
Considering the Indian tribes have moved on with their large
casinos, experimental weapons testing deals 28 years ago may
not seem to matter anymore. But three people were murdered
28 years ago in Rancho Mirage. They left behind family members

(29:18):
that search for their killers tothis day.
Many of the small scale weapons testing were later used for the
Nicaraguan Contra guerrillas that became the focus of the
Iran Contra scandal in the 1980s.
Wackenhut Corporation withdrew from doing business locally for
a while, but it is back now, winning the contract for jail
security in Desert Hot Springs. Approval of professional

(29:38):
services agreement with Mackinutfor jail security services for
the Police Department. This is, quite frankly, right up
Wackenhut. So you.
Know Alley all those in favor aye.
Opposed motion carries 50. The crimes of decades past are
being investigated once again bylocal detectives looking into
whether three people died to bury the secrets now finally

(30:00):
coming to light. Department of Justice officials
were involved in a criminal conspiracy to force Inflow, a
small computer company, out of business.
A top secret government computerprogram comes back to haunt the
US tonight. You'll see how that program is
now being connected to multiple local murder cases.

(30:23):
It's 11:00, time for news. Now from the desert's news
leader, KESQ News, Channel 3 HD at 11.
And. I'm John White.
There are new developments tonight in a year long news
Channel 3 investigation. The Riverside County Sheriff's
Department is looking into possible connections between a

(30:44):
triple murder back in 1981. And a murder suicide in 2005
that claimed 6 lives. It's a story you will only see
right here on News Channel 3 at 11.
The reporter? Nathan Baca.
John Tamara We have internal documents from the Cold Case
Division of the Riverside CountySheriff's Department showing the
depth of the investigation. We will not reveal the
investigator's identity at this time since the documents show

(31:06):
their lives may be in danger. Now we are learning the murders
may be a cover up for one of thefederal government's most secret
computer programs. This promise is the name of one
of the government's most secret computer database programs.
Computer programmer Michael Ricona Shooto wrote in this
affidavit that major modifications to the program
were made here in Indio. On July 1st, 1981, Fred Alvarez,

(31:30):
his girlfriend Patty Castro and friend Ralph Bogert were shot to
death here on Bob Hope Drive in Rancho Mirage.
There was a house here that has since been bulldozed.
Nobody was ever arrested for theshooting.
Family friends say Cabazon Band of Mission Indians Vice Chairman
Fred Alvarez was going to blow the whistle on this.
Documents from the early 1980s showing a business partnership

(31:51):
between defense contractor Wackenhut Services and Cabazon
manager John Phillip Nichols to form Cabazon Arms.
One of their alleged projects was the Promise computer
program. Database and pattern recognition
software was a new source of information and power in the
early 1980s. It starts from the program's
designers Insurance Law Corporation accused the US
Justice Department of stealing the software for their own

(32:14):
foreign policy purposes. This programmer testified he
altered the program to create what's.
In the distribution of this software were involved in covert
operations and they were involved in Nicaragua and
Central America and they were involved in operations in the
Middle East. This US Justice Department memo

(32:34):
from 1985 shows the promise software was being sold to
Middle Eastern arms dealers and wanted no paperwork or customs
inspections to interfere. Unsolved Mysteries got on the
case when the last journalist toinvestigate this spy scandal was
found dead in his hotel room. Danny Casoleros wrists were

(32:55):
slashed in 1991. It was ruled a suicide, but his
reporter notes disappeared and the book on the conspiracy he
was to title Indio, was never finished.
Congressional hearings were heldin 1992.
Describes the committee's investigation into serious
allegations at high level Department of Justice officials.

(33:16):
We were involved in a criminal conspiracy to force Inslaw, a
small computer company, out of business.
The hearings ended inconclusively.
The Promise software was allegedly altered on tribal land
in India with a lack of federal oversight.
And just like Microsoft Windows,the database program kept up
with the times, upgraded severaltimes over the years.

(33:37):
But Promise came back to haunt America in ways never imagined.
Now a disturbing. Indication that Robert Hanson,
the FBI man accused of spying for the Russians in what
officials said at the time of his arrest was a massive
security breach, ended up helping Osama bin Laden.
As correspondent Carl Cameron reports, Hanson sold the
Russians an extremely sensitive piece of US technology, and the

(34:00):
indications are that they in turn.
Sold it to bin Laden's al Qaeda terrorist network.
From an office in India to foreign capitals all over the
world, several murder investigations are connected to
this spy scandal. Whether answers can still be
found 27 years later remains in the hands of the sheriff's cold
case squad. She was looking at P Tech
software to implement the next generation of risk management

(34:22):
enterprise architecture softwareat JP Morgan, but became
suspicious after she began her own investigation into the
company. She uncovered information that
indicated that P Tech was running its software with access
to the most sensitive parts of an organization's cyber
infrastructure in the basement of the FAA.
On the morning of 9/11, hours after the president and CEO
walked out, the federal agents went in, raiding this

(34:45):
nondescript building in suburbanBoston, looking for evidence
that could tie the computer consulting firm P Tech to
international terrorism. P Tech CEO is Osama Ziadi.
This is him three years ago in Saudi Arabia.
He's pictured with a man named Yasin Al Qadi, a Saudi named by
President Bush as a financial backer of Osama bin Laden.

(35:06):
Yasin Al Qadi is fits in this category of wealthy Saudi
businessmen who believe in in finance radical Islamic
extremist groups worldwide. In an investigation done by CBS
station WBZ, TV3 sources say al Qaeda is the chief financial
backer of P Tech. Then there's P Tech board member
Yakub Mirza. He's an officer for a string of

(35:29):
Islamic charities, which have been a concern to the US
government. This becomes all the more
alarming when you learn exactly what it is P Tech does.
The company works in enterprise architecture, the blueprinting
of an entire computer network. Computer consultant Indira Singh
says such a company could gain full access to a client's data.

(35:51):
That could be rather dangerous IT.
Could be devastatingly dangerous.
Especially when you examine the roster of P Tech's clients.
The company's Web page lists theFBI, the IRS, NATO, the Air
Force, the Naval Air Command, the Departments of Energy and
Education, the Postal Service, the US House of Representatives.

(36:12):
Other sources say P Tech has done business with the
Department of Defense, the Secret Service, even the White
House. And that gives you a tremendous
opportunity, if you're so inclined, to examine,
manipulate, download all of the most sensitive information of

(36:33):
whoever it is you've contracted with.
Absolutely, Absolutely. But tonight, the National
Security Agency tells CBS News it is absolutely convinced P
tech software is safe. I'm sure that in the end they're
going to find that there's nothing of interest here.
But experts like Matthew Levitt look at Yasin Al Qadi and
disagree for someone like that to be involved in any.

(36:56):
Can attest to is that by noon or1:00 they told us we we had to
move from that triage site up toPace University a little further
away because building 7 was going to come down or being
brought down. Did they actually use the word
brought down? And who was it that was telling
me? This in the fire department, the
fire department and they did usethe word we're going to have to

(37:18):
bring we're going to have to bring it down.
Who who's really behind P tech is, is the question correct?
I asked, I asked that of many intelligence people who came to
my aid as I was being blacklisted and I was told
Indira, it is ACIA clandestine off on the level of Iran Contra.

(37:44):
And I have reason to believe this because Care International
that was mentioned in one of theslides is a renamed version of
Al Kifah which was the funding arm for WTC 93.
Prior to Al Kifah, it was calledMakhta of Al Qidamat which was
the funding arm for the Afghani Mujahideen.
It was how the monies got to Osama bin Laden through the

(38:06):
Pakistani ISII asked the FBI in Boston how come Mach was being
run out of P tech in 911 and it it that jive with a lot of what
Intel was telling me that it's ACIA front, shut up and go away
at that level. I said, well, why doesn't the
FBI take advantage of their celebrated differences with the

(38:28):
CIA? And I was told because at that
level they work together or not.And Nico, we got 2 minutes.
So next question, is there a connection between this software
and the old In's law software? The old In's law software is
promise. P tech is actually more
sophisticated version. It's a place.

(38:49):
P tech in its heart is is software that builds other
software with such capability. So it's a more agile, adaptable
version of it. OK, Nico, we got 2 minutes.
So next question, is there a connection between this software
and the old insurance law software?
The old insurance law software is promise.
P tech is actually more sophisticated version.

(39:11):
It's a place. P tech in its heart is is
software that builds other software with such capability.
So it's a more agile, adaptable version of it.
Singh was hired as a consultant for JP Morgan Chase to develop
the next generation of business architecture enterprise
software. The software she was seeking to

(39:33):
implement at JP Morgan Chase, one of the largest financial
institutions in the world, was specialized cutting edge risk
architecture software that wouldessentially be artificially
intelligent and capable of scanning through the millions of
transactions taking place acrossthe JP Morgan Chase institution
in real time. Monitoring these transactions

(39:55):
for suspicious activity such as rogue trading, and would then be
able to alert the proper people within the JP Morgan institution
to the problem and potentially even stop the transactions from
taking place. The importance, sensitivity, and
sophistication of any such software necessarily LED Missing

(40:17):
to seek out the true leaders in the enterprise architecture
software industry. Her research and due diligence
into the issue LED her to a company called P Tech.
As the senior risk management consultant for one of the
largest financial institutions in the world, missing new to
trust credible, proven sources of third party software.

(40:41):
That's why P Tech's roster of clients immediately put them in
the top echelon of software providers.
P Tech's clients included some of the most sensitive
organizations and agencies in the United States government,
including NATO, the US Armed Forces, Congress, the Department
of Energy, the Department of Justice, the FBI, Customs, the

(41:04):
FAA, the IRS, the Secret Service, and the White House.
This sterling roster of clients made Indira Singh very eager to
take a look at P Tech software. However, when the P Tech
representatives arrived at the JP Morgan Chase offices to
display and present their software, Missing knew there was

(41:25):
something wrong right away. Well, if this is true, did you
not report this to Tech as a private company?
So this relationship would have been Privy only to those on the
inside? I said did you report it
anywhere? That someone who has been placed
on the US terror list is key funder, Angel investor to a

(41:46):
company whose software is utilized at the highest levels
of almost every government and military and defense
organization in this country, including the Secret Service,
the FBI, the Department of Defense, the House of
Representatives, the Treasury Department, the IRS, the US
Navy, the US Air Force, and lastbut not least, the Federal

(42:09):
Aviation Administration. Are you saying these were all P
tech clients? These were all P Tech clients
and when I was evaluating them Iwas pretty impressed.
Why not P tech exactly? They're being used at the
highest levels of all of these organizations.
So I was very excited about using them and having their
software be able to be at the heart of what I wanted to

(42:30):
develop. And I had no reason to believe
that if they were in use everywhere at that caliber that
I would have a problem. They're also used in Enron.
Perhaps I should have thought twice about that, but they're at
use in IBM, of course, and the top accounting firms and even in
the FBI in Miter. What is Miter?

(42:53):
Miter is a large company that does specialized technology for
defense and intelligence. You would not expect to have an
exposure with the company that was so well entrenched and
embedded in these kinds of organizations.
What do you mean by the source code?
Well, all software products has some group or organization or
person writes code that is then packaged up and for instance the

(43:16):
word processor in your desk, thespreadsheet and so on and so
forth. The browser is all written in
some sort of code. Those are the keys to it.
And if you wanted to improve it,add new functionality, you would
change the original code and addnew functionality and then
repackage it and send it out there.
So whoever had access to the source code of P tech, that was

(43:36):
where the value was. If you lost the source code, you
essentially lost the product forall intents and purposes,
marketing point of view. So only one or two people would
have access to the source code. It would be like having the
formula for Coca-Cola basically was the perfect day.
And yes, you need it inside knowledge.
And yes, P tech with all its myriad associations would have
had the inside knowledge. And yes, P tech was ACIA front.

(43:59):
And yes, AP tech was protected. So was it an inside job?
You don't have to look at this indirectly.
This is direct. This requires direct
investigation. Again, that's a stunning
interview jam packed with incredible information that goes
to the very heart of 911. And I suggest that people who
find this information important and find the controlled
corporate media's complete blackout on this information

(44:21):
reprehensible, do their own partto get this word out by
spreading the word about Indira Singh.
And this breakthrough interview.Remarkably enough, considering
the bombshell information provided by this corporate
whistleblower, Indira Singh, about this company, which
actually operated in the basement of the FAA with
complete and total access to every operational detail,

(44:42):
including their management of interoperability systems with
NORAD that could have directly affected the response of NORAD
on 9/11. Absolutely nothing has resulted
from the FBI investigation of this company.
Another hit game that was developed was Tetris, which he
first licensed from its Soviet creator in 1987, where there's
some negotiations with the Soviet government as.

(45:02):
Well, on that or. Dealing with the Russians, you
know, the class is still value on the US government.
So, government, the difference between negotiating the rights
for Tetris is not that differentthan negotiating a nuclear
armament disarmament treaty withthem.
The fight for Tetris is whites began.
The whole books have been written on List Fight and all
the companies involved in it. The only thing that's ever
really certain about this one ofthe first times an Eastern

(45:25):
product had hit paydirt in the West is that Pyjitnov himself
didn't see a single cent of Tetris's profit until well after
the fall of the Wall. Mirrorsoft were one of the most
vocal companies when it came to securing the whites to
Pyjitnov's game. In spite of the overtures of
Nintendo, who wanted Tetris as one of the launch titles for
their new handheld system, the Game Boy.

(45:47):
The whole thing was outrageouslyshady.
Mirasoft and Maxwell's claim wasthat they had the whites to
Tetris because the American company Spectrum Hollabyte, you
know the sister company of Mirasoft that's also under the
Maxwell umbrella, had purchased the whites to it from Andromeda.
But where did Andromeda get the whites from?
Did they even have the right to sell the whites to Tetris?

(46:10):
In any case, Mirasoft wanted nothing less than exclusivity to
Tetris, a piece of every versionof the game, and would seemingly
do just about anything to securethat.
It was even reported that RobertMaxwell himself had stepped in
to help broker the deal through his connections.
And yes, you may well wonder exactly what that meant.
Maybe he sought an audience withGorbachev himself to try and get

(46:32):
the game. Yeah, probably not.
However, Mirasoft were able to sell Tetris for computers using
Lowe's rights from Andromeda, and naturally did so pretty
sharpish all things considered, resulting in the sale of what is
probably the most successful game on various computers
through 1987 and 1988. Mirasoft's version of Tetris is,

(46:57):
as you would probably expect, the one that hands up the Soviet
mystique the most. It's white Layer in the box art
and white layer in the title, which did more than anything to
popularise the classic trope that in order to white in
Russian, all you do is white theRs the other way around in.
Russian. You just put the Rs the wrong
way round. As for the game itself, well,

(47:18):
it's Tetris basically. The music is pretty cracking for
out actually, which is nice, butthe game does default to having
these backgrounds in the world that make it incredibly hard to
see what's going on. And his job was to he walked
both sides of the fence almost on the road.
He was extraordinary. I mean, one day he would be with
President Reagan in the White House.

(47:40):
The next day he would be in the Kremlin doing a deal which would
be in favour of Israel. And I remember what David
Kimchi, the former deputy director of, of Mosser, told me.
He said, you know, Robert Maxwell had one philosophy.
It was Israel first, last, enormous.
Never forget that when you writeabout him.

(48:00):
He was for us a great patriot and that was so.
But therefore, you may wonder, well why did they have to get
rid of him? Well, what happened?
Maxwell became more and more in love with himself, I suppose
with his power, his authority, his connections, nobody he felt
could dare challenge him, dare say no to him.

(48:23):
He once said, prime ministers come and go, presidents come and
go, but I'll be here forever. And So what happened?
On that premise? He was approached by Vladimir
Khrushchev of the KGB to ask himif he would assist in a plot to
overthrow Mikhail Gorbachev, whohad just, you know, taking power

(48:47):
in Russia was bringing democracy, perestroika into that
devastated country. And Maxwell thought, where's the
deal for me here? And they said, well, you can
handle the national debt if we pull this off.
And that would have meant a verygood, very good take for him
because he's on 15% of everything you get on that.
So he went to Israel and he saidto his friends at Mossad, how

(49:16):
about this? Shall we get involved?
We should get involved, he kept saying.
And he outlined what the plan was, what he hadn't realized.
He had totally miscalculated onething.
There were those high up in the Israeli government and in Mossad
who were horrified at the idea that anybody would want to
remove Gorbachev because it would immediately bring them

(49:38):
into confrontation with the United States.
America saw Gorbachev as the only possible hope for salvation
in Soviet Union, which was, you know, powerful threat.
They thought against it. Still, though, in fact, it
wasn't that powerful a threat aswe were to discover.
And the idea of overthrowing gorge of and probably
assassinating him with Israel being implicated through Maxwell

(50:01):
or perhaps even worse, implicated through other forces,
horrified them. And they they thought Maxwell
has gone a step too far. At the same time, he was running
out of banks. He was borrowing and spending
and losing, and his once powerful newspaper empire was

(50:23):
beginning to toss a party due tounion troubles.
He couldn't stave off huge expenses, never mind the $0.50.
A poor reporter, but he was running into huge bills,
printing difficulties, all the things that we've seen Murdoch
deal with and overcome successfully.
I think Maxwell couldn't and he was losing money.

(50:47):
The evidence is in. So what's the verdict?
Although the lack of bruising onMaxwell's body turned out to be
a red herring, Doctor Hooper conclusively proved that Maxwell
could not have fallen over the. Side of his yacht.
His death was no accident. Everything.
Points against suicide, which leaves murder as the only

(51:07):
possible explanation. The tests conducted have shown
that it would have been relatively easy for a boat to
duck under the Lady Galaine's radar and for a team of
assassins to board the yacht. Maxwell could then have been
subdued, removed and his dead body later dumped in the sea.

(51:27):
It's kind of really interesting.You know, what happened to us
was this. We're sitting around at the
Consumer Electronics Show, and typically you have these guys
who go who scurry around lookingfor interesting games from
abroad and try to get the rightsand then license them into the
US by selling it to a game publisher.
And so he showed us this game, and it was Tetris, and I loved

(51:48):
it. I said, this is great.
And the agent was saying, hey, look, everybody's turned down
this game because Brother Buttonturned down the game.
EA turned down the game. Sega turned down the game
because it was a stupid game, right?
There's the graphics were awful,nobody dies, no bad sound,
right? And I kind of go, yeah, but it's
really a big thing. I really kind of like this game.
And I said I want to make some changes.
I need to talk to the programmers.

(52:09):
The agent kind of looks at me and goes, well, we got a
problem. Here I go, what's the problem?
He goes, well, the programmers are in the Soviet Union.
So I turned to my partner, Phil Adams.
I said get the rights, put it ina red box with a hammer and
sickle and get it out in the next 6 months because I had
heard through the rumor mill that there was going to be a the
very first set of talks between the Soviet Union and the US and

(52:31):
it would be between Reagan and Gorbachev.
So I said get the game rights, right.
And if this thing actually comesreal, we're going to launch the
game during the talks. And that's what we did, right?
We watched the game during talk.We even hired a fake Gorbachev
and a fake Ronald Reagan look alike.
If we were running ads and this end of the day that says, you
know, of course there'll be the headlines, you know, Gorbachev
meet with Reagan, going through all the issues around nuclear
proliferation. And then on, you know, the back

(52:52):
of the page will be our ad with the fake Reagan, the Gorbachev
saying what they were really doing during the secret summit
instead. That's a very convincing
impersonator. This Kim Jong Un look alike made
many tourists look twice in Singapore impersonating Kim Jong
Un. It's been great.
Comedian Howard X checked out ofhis Hanoi hotel on Monday after
Vietnamese authorities allegedlyrevoked his visa.

(53:14):
The visa that I got from my travel agency was invalid.
They grabbed the. Person the person who issued the
the visa letter and made a sign a piece of paper saying that it
was invalid. Howard X teamed up with comedian
Russell White. A Donald.
Trump look alike. For the media stunt.
I think satire is a powerful weapon against any dictatorship.
So. You know they are.

(53:36):
Scared of, you know, a couple ofguys that look like the real
thing. It's not my fault.
It's not our fault for for people like this.
That's what I said to these guysearlier, like, yeah, this is
what I look like. The two comedians had been
questioned by police on Friday after staging a fake summit in
the capital, drawing crowds and media.

(53:56):
According to Howard X, authorities told him not to
create any disturbances as the city prepares to host Kim and
Trump on Wednesday and Thursday for their second nuclear summit.
They didn't know what the thing was, but they were trying to
solve a problem. The problem they were trying to
solve was how to get technology companies, who historically has
never engaged with the federal government to actually provide

(54:20):
technologies, particularly in the IT space that the government
can leverage because they were really afraid of what they
called at that time the prospects of a digital Pearl
Harbor. But in 1999, because the
community got so good at collecting data, but not
necessarily that good at processing all the data, that

(54:42):
the biggest fear that there was going to be a new attack
somewhere in the world, maybe even on the mainland, Like that
means there's a revenue source and the stuff was good.
If we reject it, then they kind of go, particularly it's like
some of my cyber security said, well, we're not making that
investment. I mean, I don't know if you guys
want to. Thank you very much.
Here's the next one. And so that's how we got the

(55:03):
problem set and how it got to work.
And then we would then find a customer in the building that
was related to that problem in the 1st place and pay that
customer to take that technologyin and use it in an operational
way. That's how Palantir got started.
And the Palantir was this Peter,Theo and Alex basically meeting
with me saying we got these algorithms on, on fraudulent
transactions. We think there might be some

(55:25):
value for the intelligence community.
We brainstorm. They came back and actually kind
of said on the blackboard, he needs to kind of look at this.
The team went away and did a mock up in 2 weeks.
And then immediately we took that team and put them inside
the building to work out what wecall CT counter terrorist
problem. And they just learned that
business and they became Palantir.
And Palantir is worth somewhere between 10 to 20 billion

(55:56):
dollars. I am Veda, I work as a content
developer. We develop videos, infographics
and motion graphics to combat extremist.

(56:17):
What? I.

(57:25):
But the key is you've got this network of sensors around the
world. And then I, sitting at the NSA
in Hawaii, come in in the morning.
I type in my search, I look for,let's say I want to read John
Key's e-mail. I answer his e-mail address, and
it sends that search to every one of these sensor networks
around the world. And they search their local

(57:47):
database of metadata and content.
The content of all communications that pass through
these sites is held for about 3 to 5 days, depending on the
storage. And it's constantly getting
constantly going back further and further in time as we gain
more capability. So I can see everything.
I can see what book you looked at at Amazon.com, you know, last

(58:11):
week. I can see who you talked to.
I can see who your friends on Facebook are.
I can see the text messages you sent.
I can read the emails you wrote and I can set up things that are
called fingerprints that allow me to track where you've been on
the web, who you're talking to, even if you're using sort of
anonymizing technology and so forth.

(58:48):
Introducing the Huawei Ascend D Quad, stunningly designed and
crafted with a pen Sharp 4.5 inch HD screen, an incredible 8

(59:10):
megapixel BSI camera, breathtaking Dolby surround
audio. and a quad core processor,

(59:39):
making it the fastest smartphonein the world.
Beauty, power, agility and speed.
We call it the Ascend, the Huawei Ascend D Quad.
Herzlia, just north of the Israeli city of Tel Aviv, and
this building is home to an Israeli company called NSO

(01:00:02):
Group, which develops and sells one of the most invasive spy
ways in the world. The software is called Pegasus,
and it doesn't matter whether you're an iOS or Android person,
your phone could become a target.
The phone becomes a spy in the pocket.
The phone's. Camera.
The microphone, text messages and anything else done on the

(01:00:24):
phone or close to it. Are.
Susceptible to monitoring. This is how Pegasus works.
The target receives a text message with a special link.
One click on it and the spyware is secretly downloaded to your
smartphone. From then on, all your private
data, personal messages, passwords, just about everything
is being sent back to the operator.

(01:00:45):
So who are the targets? According to NSO Group, its
software is designed to track criminals.
Our products have saved the lives of thousands of people,
prevented suicide terror attacks, helped convict drug
cartel Lords, facilitated complex crime investigations.
And return kidnap children to their parents.

(01:01:05):
But Internet researchers from Citizen Lab embarked on a hunt
for Pegasus and according to them, it does not serve only a
good cause. Instead, it may be breaching
innocent people's privacies and some countries laws against
cross-border hackers. Citizen Lab tracked the malware
in as many as 45 countries, among them six states with a
history of abusing spyware to target civilian society set.

(01:01:30):
The goal for Israel? Becoming one of the top five
cyber security powers in the world.
And this really surveillance software tool capable of
accessing microphones, cameras and other data.
One Saudi dissident says he spoke to Jamal because she'll
show you regularly about Riyadh's use of technology to

(01:01:50):
crack down on critics. Well, I was working with Jamal
in some different projects and I've learned in in in maybe the
beginning of August that my phone was hacked.
So basically they were listeningto every single conversation
that we had. NSO Group in today's world,
based on the evidence we have, they are.
The worst of the worst. They send you a time sensitive

(01:02:37):
text message and it's got a linkto it.
It's something that you, you have that, you know, human
impulse. You see it, you go, oh,
goodness, I need to check that everything in the entire history
of your phone, it can immediately copy everything that
happens on your phone from that day forward.
Every place you go, everyone youcall, everything you read, every

(01:02:59):
photo. You take.
Every, you know, audio note that's been on that or actually
because they can turn the microphone on remotely, they can
turn the camera on remotely evenwhen you haven't already taken
pictures. button, you can bring down

(01:05:21):
nations to their knees. If you made a phone call today
or sent an e-mail to a friend, there's a good chance that what
you said or wrote was captured and screened by the country's
largest intelligence agency. The top secret global
surveillance network is called Echelon, and it's run by the
National Security Agency and four English speaking allies,

(01:05:43):
Canada, Great Britain, Australiaand New Zealand.
The mission is to eavesdrop on enemies of the state, foreign
countries, terrorist groups and drug cartels.
But in the process, Echelon's computers capture virtually
every electronic conversation around the world.
And as we first reported last February, a lot of people have

(01:06:04):
begun to question just how that information is being used.
We can't see them, but the air around us is filled with
invisible electronic signals, everything from cell phone
conversations to fax transmissions to ATM transfers.
What most people don't realize is that virtually every signal
radiated across the electromagnetic spectrum is

(01:06:26):
being collected and analyzed. How much of the world is covered
by it? The entire world, the whole
planet covers everything. Echelon covers everything that's
radiated worldwide at any given instant.
Every square inch is covered.
Advertise With Us

Popular Podcasts

Stuff You Should Know
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

The Herd with Colin Cowherd

The Herd with Colin Cowherd

The Herd with Colin Cowherd is a thought-provoking, opinionated, and topic-driven journey through the top sports stories of the day.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.