The story of PROMIS
software has to be
one of the most
intriguing stories
I've ever read -
especially since it
is true. It
involves government
officials,
computerized theft
of information,
treachery, murder and intrigue.
It is my belief that
it is also at the
root of the many of
the problems
we have today.
The best place to
start with the story
of PROMIS software
is with the
Investigative Report
titled,
"The INSLAW Affair"
prepared by the
Judiciary Committee
of the Congress in
1992.
Unfortunately, the
website where I
obtained it is no
longer active.
The Wayback Machine
had a copy of it,
but the footnotes
are not included on
the document.
I left in the
footnote indicators
even though the
footnote text is
missing.
Also very
interesting are a
series of articles
in a Special Report,
"Federal Corruption,
INSLAW"
written by Harry V.
Martin. The
first articles were
copyrighted by the
Napa Sentinel.
The last article is
copyrighted by
FreeAmerica.
These articles have
one detail that I've
only seen in Mr.
Martin's articles.
That is the fact
that IBM bailed out INSLAW from their
bankruptcy ordeal in
1991.
When I first read
about the PROMIS
software, I was
especially intrigued
since I am a Systems
Analyst/Programmer.
The only way I could
figure out that
government computer
systems could be
breeched like this
was if there was a
back door in the IBM
communications
controllers and an
IBM Systems Engineer
with a background in
telecommunications
was exploiting it.
People with those
skills were a rarity
even back in those
days.
Anyway, I was busy
reading and
researching 9-11 so
I set aside thinking
about PROMIS.
Then I found a
video, "The
PTECH Story" of
Indira Singh telling
her story about
PROMIS software AND
9-11.
As the story goes,
the PTECH software
is a pirated copy of
the PROMIS software.
At this point, I'm
hooked. I have
to get to the bottom
of this story.
The first thing was
there were some
things in Indira
Singh's story that
just didn't sit
right with me.
The first of those
questions were that
the risk management
software she was
describing sounded
rather magic to me.
Having been a
systems developer
for 20 years in
mainframe shops, I
was suspect of the
description of the
system for an
operation like JP
Morgan.
Secondly, there was
a key detail of the
story that she left
out on the video.
The missing detail
was, 'what happened
that caused her to
stop the software
presentation so she
could run to the
phone to call her
colleagues?
This is like asking
the guests to a
dinner party to
leave before you
serve the dinner.
It's not done.
And WHY would she
leave out THE key
detail in a video
presentation.
That didn't make
sense to me since
Indira was giving a
live presentation of
her story on the
video.
After several rather
nasty encounters
with Indira Singh on
the internet
(another story for
another day), I
found out that the
missing clue was in
the written account
of the PTECH story
on Mike Ruppert's
website -
FromTheWilderness.
From Singh's written
account, the PTECH
marketing people
were Saudis.
They basically
walked into JP
Morgan and offered
to hack JP Morgan's
computer system to
demonstrate the
software. That
was Indira's clue
that something was
wrong with the PTECH
software. In
my experience, there
is not a software
professional in the
world that is stupid
enough to walk into
a bank and offer to
hack their computer
system. That's
like a bank robber
walking into a bank
offering to crack
their safe.
I tried to find
Indira's original
account that was on
From the Wilderness
but couldn't find
it. I did find
the two paragraphs
in the timeline
below:
http://www.fromthewilderness.com/free/ww3/012005_ptech_pt1.shtml
http://www.fromthewilderness.com/free/ww3/012705_ptech_pt2.shtml
"September
1996.
Ptech
already
working
with DoD's
research
group,
DARPA:
"Ptech,
based in
Cambridge,
Mass.,
offers an
integrated
set of
object-oriented
tools that
enable
users to
create
interactive
blueprints
of
business
processes.
Software
code can
be
generated
from the
hierarchical
layout,
providing
rapid and
consistent
application
development.
The
[Defense]
Advanced
Research
Projects
Agency is
using
[Ptech's
program
called]
Framework
to help
transfer
commercial
software
methodologies
to the
defense
sector."
http://www.govexec.com/archdoc/rrg96/0996rrg5.htm.
[Note -
the
Framework
document
is no
longer
available
at the
original
website
but I
kept a
copy of
it -
Click
HERE
]
"May 2002.
Dr.
Hussein
Ibrahim,
co-founder
of BMI and
Ptech's
chief
scientist,
and a
delegation
of other
Ptech
personnel
come to JP
Morgan at
Singh's
invitation,
to
demonstrate
why
Singh's
blueprint
project
should buy
Ptech
software
for its
inference
engine
core. But
the Ptech
delegation
has come
to the
Morgan
offices
unprepared,
and they
behave
strangely:
Singh's
suspicions
are
aroused
when
Ibrahim
offers to
demonstrate
the
software
on his
laptop,
using
proprietary
JP Morgan
data. This
would have
compromised
JPM
information
security
and is
entirely
outside
industry
protocols
("a
show-stopper").
In an
adjoining
room,
Singh
calls
Roger
Burlton,
who runs
Business
Process
Renewal in
Vancouver.
He tells
her,
"Don't let
them out
of your
sight and
don't let
them leave
with
anything."
Burlton
recommends
that she
speak with
Jeff Goins,
a former
Ptech
employee.
Goins
informs
Singh that
Saudi
terror
financier
Yassin Al
Qadi is an
investor
in Ptech.
Al Qadi
claims to
have met
Dick
Cheney in
Jeddah
before he
became
vice
president,
and that
they still
maintain
"cordial
relations."
Singh
confirms
that Goins
had taken
his
concerns
to an FBI
agent, and
arranges
to speak
with that
agent."
As I read Indira's
account, my feeling
was - "Gimme a Break
here - she is tying
the PTECH story to
9/11 and she is
pointing fingers at
Saudis who sound
totally clueless.
BMI is an anagram of
IBM. And PTECH was
an IBM Business
Partner - meaning
that IBM was
assisting PTECH in
marketing their
software. Now
- refer back to
Harry Martin's news
article that says
that IBM saved
INSLAW from
bankruptcy - which
means that IBM owned
the PROMIS software.
My feeling is that
either Indira Singh
is an unwitting dupe
or a participant in
a misdirection and
cover story for
IBM's very
significant role in
the PROMIS/PTECH
saga. My
suspicions are
amplified by the
fact that Lou
Gerstner Jr. who was
the CEO of IBM is
now the
Chairman of the
Carlyle Group.
What was driving me
crazy about this
whole story was the
question, "How did
the PROMIS/PTECH
software work"?
The concept of a
back door in IBM's
communications
controllers was
possible, but it
wasn't very
satisfactory.
From the accounts of
all that was
possible to do with
this software, they
would need an easier
way than through the
controllers. Then it
hit me - OF COURSE!
I know how they did
it!
As the flying fickle
finger of fate would
have it, early in my
career - in the late
1970's, I
interviewed for a
company that was
developing a
computerized system
for warehouses.
The concept was a
radio frequency
controlled terminal
on a forklift that
communicated with
the main computer.
This allowed the
forklift driver to
enter the location
of pallets in a
warehouse as he
stored them.
This was probably
among the first
wireless
telecommunications
systems for the
business world.
THAT was the way
they did it.
After that, I bought
Danny Casolaro's
book, Octopus.
That book confirmed
my suspicions on the
method of access.
Again, the flying
finger of fate comes
into play. I
also worked for a
corporation that
manufactured
microchips so I knew
that chips were
manufactured to
precise
specifications.
The properties of
the silicon ingots
are transformed by
the chemical baths
they are put through
during the
manufacturing
process so when I
found an article on
the 'miracle' of the
metallic ferris
oxide coatings on
microchips for
wireless
communications, I
knew then that the
PROMIS/PTECH
software was a way
to do direct
communications with
a chip on the
motherboard.
My God, I thought -
this is brilliant.
It is almost the
perfect crime.
The PROMIS/TECH
software could be as
simple as just a
keystroke program.
On all corporate and
government systems,
the first thing that
anybody enters on
the machine is their
ID and password.
All the program on
the chip would have
to do is to record
the first 25
keystrokes after any
period of inactivity
on the machine.
With the capability
of getting the ID
and password of key
people in an
organization - the
DBA, the RACF
security person, the
payroll person, the
Key men in a
corporations, an
intruder could do
anything. The
possibilities were
virtually limitless.
NOBODY would think
to consider the
hardware as an open
door to a computer
system - at least in
the early days.
The programmers
would be looking for
software bugs in
their own code - the
thought of an
external intrusion
into the system to a
microchip via
wireless
communications
wouldn't even cross
their minds.
That means that
anything that was
done on the computer
would be attributed
to a software bug -
or to the person
whose ID was used to
execute a
transaction.
Most people, upon
reading this will
think simply of the
ability to steal
money - and most
certainly the people
behind this
conspiracy did do
that. But
again, these people
are brilliant and I
believe they had
bigger things in
mind - such as a
coup d'etat on the
United States
government. If
you control the U.S.
government - by
controlling the
people in key
government positions
and most importantly
- controlling the
investigative arms
of the government,
then you are well on
your way to
controlling the
world - right?
Sounds pretty
fantastic doesn't
it?
Since the INSLAW
case began with law
enforcement files
and court systems,
the obvious thing
would be to add your
people onto the
payroll of the FBI
and into the court
system. With
your own people in
the FBI, you could
block investigations
that would lead to a
discovery of the
conspiracy. As
with the pre-9/11
FBI agents.
They found
suspicious
characters doing
suspicious things -
but when they tried
to investigate,
their information
went into the FBI
management and into
a black hole.
This is completely
inexplicable if FBI
management are there
to do the job they
were hired to do.
It only makes sense
if they were on the
FBI payroll to block
such investigations.
And the beauty of
the whole thing is
that secrecy is the
watch word of these
organizations so
each agent is
basically working in
a blackbox.
Since they are
ostensibly working
for the U.S.
government -
following orders of
their immediate
supervisor, they
have no way of
knowing if they are
legitimately working
for the FBI or if
they are unwittingly
part of a
conspiracy.
My suspicions on
this were confirmed
the other day when I
was listening to the
Greg Szymanski radio
program. His
guest was John
Peeler, a guy who
claimed to have
worked for the FBI
and who was involved
in the Oklahoma City
bombing of the
Murrah building.
He thought his job
was to infiltrate
the conspiracy which
the FBI knew about -
but he was also
ordered to be a
participant - up to
and including
helping Tim McVeigh
figure out how to
build the bomb.
One of the callers
on the radio called
the guy a
pathological liar.
He didn't sound like
a liar to me so I
called and asked him
two questions.
1) When did you go
to work for the FBI?
2) Did you go to the
FBI academy?
The answers were
1988 (in the time
frame) and 'NO' - he
was hired for a
special black op
program that
officially didn't
exist.
He said he was hired
because of his
background which I
guessed was Special
Forces (I have more
information on this
- "Special Forces -
and teams working
independently is the
'New American Way of
War').
April 20, 2006 -
John Peeler with
Greg Szymanski
I believe that the
guy's story is true.
He did think he was
working for the FBI
and he no doubt was
drawing an FBI
paycheck. He
was probably added
to the FBI's payroll
via the PROMIS/PTECH
software.
And nobody would be
the wiser - least of
all John Peeler.
Further, his story
is that his son is
serving life in
prison for a crime
he didn't commit.
Peeler's story is
that his son was
setup and that he
was convicted on no
evidence at all
linking him to the
crime that was
supposedly
committed.
According to Peeler
- this was done in
an attempt to keep
Peeler from telling
his story.
It is highly
possible that the
judge is one of the
conspirators.
In one of my email
groups, there is a
lawyer who was on to
this story with the
judges.
Apparently there is
supposed to be some
paperwork on file
for judges - signed
commission papers.
He has made a
project out of
filing requests for
this paperwork on
judges - and he is
finding a whole lot
of judges that don't
have the proper
paperwork on file.
My guess would be
that these judges
were 'inserted' into
the system via
PROMIS/PTECH also.
The whole scenario
fits with what we
observe as outsiders
- which is that we
have a government at
war with itself.
There are unwitting
drones like Peeler
who thought they
were working for the
government who are
actually working for
the conspirators.
We have honest
hardworking people
working for the
government who are
confounded by the
obstruction to their
doing the job they
were hired to do -
with no recourse
because of the
secrecy required of
them. We have
conspirators who -
through the use of
this software are
able to set up
anybody to take a
fall for crimes they
didn't commit and
with the ability to
create chaos in the
government computer
systems.
Nobody knows who
they can trust - who
is real and who is
not. As
I said earlier -
almost the perfect
crime.
|