Skip to content or view screen version

THE PERLE THAT'S A SWINE

Rosalinda | 26.03.2003 04:49

[source: NYTimes, Editorial, ``Richard Perle's Conflict'' 3/24]
THE PERLE THAT'S A SWINE. In a lead editorial called
``Richard Perle's Conflict,'' the New York Times gives the
``thumbs down,'' to the Empire's ``Prince of Darkness.''

The New York Times article says
``federal ethics rules prohibit using public office for private
gain.... Mr. Perle will have to choose between the gain [his
$725,000 payment from telecommunications giant Global Crossing,]
and the office [Defense Policy Board].''

In case you missed it, the Times repeats, ``This is conflict
pure and simple, and Mr. Perle should immediately drop one of his two roles.''

The Times asserts, ``Global Crossing's fee is
clearly payment, at least in part for the influence Mr. Perle
exerts.'' Influence peddling? Conflict of Interest? It goes on.

This is the third major scandal currently against Perle:

First, there was the March 17 New Yorker magazine where
Seymour Hersh exposed Perle's $100 million attempted
``sheikhdown'' of the Saudi princes through his Trireme company,
which is getting contracts from the U.S. government.

Second, there is the March 19 investment conference call for
Goldman Sachs that Perle ran under the title of ``Implications of
an Imminent War ... North Korea Next?'' This was exposed by
columnist Maureen Dowd as ``Perle's Plunder Blunder.''

Stay tuned.

Rosalinda

Comments

Hide the following comment

Don't forget

26.03.2003 09:15

Also, he's director of Autonomy (www.autonomy.com), a useless software company over in Cambridge, England, which markets their vaporware to the Office of Homeland Security.

From the webpage.
>>>>
Numerous Federal agencies are already using Autonomy's automatic technology as a fundamental element of the U.S. Government's drive to combat terrorism. Autonomy's software employees pattern matching algorithms and identifies concepts (and is therefore not reliant on keywords), and assists agencies in uncovering suspicious activity by identifying patterns of meaning and relationships between pieces of data that may denote cause for concern. Consequently, government agencies are able to act upon information to prevent or minimize potential security threats.
>>>>

Go get him!

Gauss