The PROMIS of 9/11 and beyond
By Jerry Mazza
Online Journal Associate Editor
Oct 17, 2006, 00:45
As whistleblower
Richard Grove points out, SilverStream
(the software company he worked for at the time of 9/11), served not only AIG
(American Insurance Group), it also built trading applications for Merrill
Lynch, Deutsche Bank, Banker�s Trust, Alex Brown, Morgan Stanley, and Marsh
McLennan. With this impressive list, according to Grove, �you pretty much had
the major players involved in the financial aspect of the 9/11 fraudulent
trading activity.�
I might add that
fraudulent activity extended from finance to
our government
as well.
In the weeks
preceding 9/11, many elves on Wall Street were working into the night to make
Marsh and others� SilverStream fully operable. The software, as Grove pointed
out to me, �was an internet portal framework. Panacya is AI (Artificial
Intelligence). PROMIS and P-Tech are the grandparents if you will.� So let�s
consider the grandparents to fully understand the power of the grandchildren.
Sort of like Prescott Bush in relation to George W., Jeb, Neil and Marvin Bush.
PROMIS software
(originally Prosecutor Management Intelligence System) appeared in the early
1980s. It was developed by a small Washington, DC, company, Inslaw Inc.,
and proved to be the perfect intelligence tool. Though designed for the
Department of Justice to help prosecutors in case management, it hooked the
attention of corrupt officials and Israeli intelligence. Subsequently stolen
from Inslaw, the software was hacked and given a �trap door.� This trojan gave
it the power to retrieve info for the US and Israel from the very foreign
intelligence services and banks it had been sold to in some 40 countries.
The software helped
the US win the Cold War against the Soviets, but also helped the Russian mafia,
Saddam Hussein, Osama bin Laden & Company and any number of spies and
crooks.
In 1985 Mossad spy
and British media tycoon Robert Maxwell, opened the �trap door� secret to
Chinese Military Intelligence (PLA-2), at the same time selling them a copy of
PROMIS for $9 million, turning it against the US. Unfortunately, in the mid-90s
PLA-2 hacked the databases of Los Alamos and Sandia laboratories to cop US
nuclear secrets.
The KGB also bought
PROMIS from Maxwell, and also received the back door trojan to plant in a
tender part of the FBI. Yes there is no honor among thieves. We also provided
PROMIS to Russia and China to backdoor their intelligence, figuring the 64
federal agencies they could expose did not outweigh the many other look-sees PROMIS
provided the US.
Actually, using the
same PROMIS bought from Russia, Saddam and his regime shifted major money
through the banking system. Some of these funds still feed Iraqi anti-coalition
and resistance fighters.
Unfortunately, when
Maxwell tried to extort more money from the KGB to pay off his huge corporate
debts, he ended up falling off the back of a yacht into the deep blue drink,
stung by a hot shot needle, this with a little help from his friends.
Nevertheless PROMIS was as Michael Ruppert described in Crossing the Rubicon . . .
� . . . software
that could think, understand every major language in the world, that provided
peepholes into everyone else�s computer �dressing rooms,� that could insert
data into computers without people�s knowledge, that could fill in blanks
beyond human reasoning, and also predict what people would do � before they did
it? You would probably use it wouldn�t you? But PROMIS is not a virus. It has
to be installed as a program on the computer systems that you want to penetrate.
Being as uniquely powerful as it is, this is usually not a problem. Once its
power and advantages are demonstrated, most corporations, banks, or nations are
eager to be a part of the 'exclusive' club that has it. And, as is becoming
increasingly confirmed by sources connected to this story, especially in the
worldwide banking system, not having PROMIS -- by whatever name it is offered
-- can exclude you from participating in the ever more complex world of money
transfers and money laundering. As an example, look at any of the symbols on
the back of your ATM card. Picture your bank refusing to accept the software
that made it possible to transfer funds from LA to St. Louis or from St. Louis
to Rome.�
PROMIS Plus P-Tech Equal Disaster
The disaster I
refer to is 9/11 . . . and is referenced in a FTW article by Jamey Hecht, with research assistance by Michael
Kane and editorial comment by Michael C. Ruppert. The article is startlingly
titled �PROMIS Connections to Cheney Control of 9/11 Attacks Confirmed.� It�s
part of an equally startling piece �PTECH, 9/11, and USA-SAUDI TERROR -- Part
1." In it, is an interview between FTW and Wall Street whistleblower Indira
Singh. Here�s a piece of it . . .
�FTW: You said at the 9/11 Citizens'
Commission hearings, you mentioned -- it's on page 139 of transcript - that Ptech was with Mitre Corporation in the
basement of the FAA for 2 years prior to 9/11 and their specific job was to
look at interoperability issues the FAA had with NORAD and the Air Force, in
case of an emergency [italics added].
�Indira Singh: Yes,
I have a good diagram for that.
�FTW: And that relationship had been
going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that
the Secret Service is among the government entities that had a contract with
Ptech. Mike Ruppert's thesis in Crossing the Rubicon, as you know, is that the
software that was running information between FAA & NORAD was superseded by
a parallel, subsuming, version of itself that was being run by the Secret
Service on state of the art parallel equipment in the PEOC with a nucleus of
Secret Service personnel around Cheney. In your view, might it have been the
case that Cheney was using Ptech to surveil the function of the people in FAA
& NORAD who wanted to do their jobs on 9/11, and then intervene to turn off
the legitimate response?
�Indira Singh: Is
it possible from a software point of view? Absolutely it's possible. Did he
(Cheney) have such a capability? I don't know. But that's the ideal risk
scenario - to have an overarching view of what's going on in data. That's
exactly what I wanted for JP Morgan. You know what's ironic about this - I
wanted to take my operational risk blueprint which is for an operational event
going wrong and I wanted to make it generic for extreme event risk to surveil
across intelligence networks. What you're describing is something that I said,
'boy if we had this in place maybe 9/11 wouldn't have happened.' When I was
going down to DARPA and getting these guys excited about creating an extreme
event risk blueprint to do this, I'm thinking of doing exactly what you're
saying Cheney might have already had!
�I believe that
Dick Cheney also had the ability using evolutions of the PROMIS software, to
penetrate and override any other radar computer or communications system in the
government.
(Mike Ruppert, in
"Summation: Ladies and Gentlemen of the Jury," from Crossing The Rubicon, p.592.)
Also of prime
importance is this second statement from the same piece . . .
�The Ptech story is
a crucial piece of 9/11 because the software was used to simultaneously
coordinate the FAA with NORAD and the Secret Service. But it transcends 9/11
because that terror attack is continuous with preceding decades of violent
Islamic extremism epitomized in the international Muslim Brotherhood, of which
al Qaeda is only one, relatively recent, incarnation.6 Worse, the Muslim
Brotherhood has from its first days been linked to the Nazi party and its Swiss
neo-Nazi epigones.7 Anti-Soviet projects of the CIA and the Pentagon (from
11-22-63 to the Afghan War) have long been recognized as continuous with the
absorption of Nazi SS personnel into what became the CIA.8 The connection of
the Bush crime family to the political economy of the Nazi movement is familiar
from the excellent work of former Justice Department Nazi war crimes prosecutor
John Loftus and others.9 Its triangulation with the Bush-Saudi alliance forms a
powerful explanatory paradigm - one to which FTW will be paying further
attention in the sequel to this story.�
And in another place,
FTW reports, �September 1996/ Ptech already working with the DoD�s
research group DARPA: �Ptech, based in Cambridge, Mass., offers an integrated
set of object-oriented tools that enable users to create interactive blueprints
of business processes. Software code can be generated from the hierarchical
layout, providing rapid and consistent application development. The [Defense]
Advanced Research Projects Agency is using [Ptech�s program called] Framework to help transfer commercial
software methodologies to the defense sector.�
The point of all
this is aptly summed up in the �CODA: Knowledge is Power":
�The computational
power of the Ptech evolution of PROMIS software represents a daunting new
surveillance-and-intervention capability in the hands of the same elites who
planned 9/11, prosecute the subsequent resource wars, and are presiding over
what may become a full economic and military disaster for the
resource-consuming citizens of America and the world. Since the �War On Terror�
and this coming dollar / natural gas collapse will necessitate new levels of
domestic repression, this is just the capability those elites require. Ptech is
Total Information Awareness . . .
�Programs based on
datamining are powerful analytical tools; finding meaningful patterns in an
ocean of information is very useful. But when such a tool is driven by a
high-caliber artificial intelligence core [P-tech], its power gets spooky. The
datamining capability becomes a smart search tool of the AI [Artificial
Intelligence] program, and the system begins to learn.
� . . . �Neural
Network� programming is modeled on the computational techniques used by the
human brain - an electrochemical computer that uses neurons instead of
semiconductors; the firing or non-firing of neurons instead of ones and zeros.
With neural
networking, software has become much smarter than it had been . . .
� . . . Ptech's Framework can exploit the patterns it
detects and extrapolate future probabilities. Then it can integrate itself with
the computers from which it's getting the information and intervene in their
functioning. The result is a tool for surveillance and intervention. The
program can identify suspect streams of cash in a banking network and allow a
bank officer to freeze the suspect assets. Of course, a user could direct the
same program to prevent detection. It can discover salient anomalies in a
person's movements through a city and either flag those anomalies for further
scrutiny, or erase them from the record. And it can find errant flights in an
air traffic map and initiate an intercept response. Or not.�
We seem to have
arrived not only at 1984 but taken off for an unbidden future of governmental
"Total
Information Awareness" (TIA from DARPA) to be used in a new kind of
warfare, not only on enemies, but on the people, too. For instance, IBM in a
2001 newsletter/promotion piece, boasts that �IBM Enterprise Architecture
Method [is] enabled through Ptech Framework� for commercial purposes. But
considering Ptech�s nasty beginning and development through financial support
from a trilogy of elites, neo-Nazis plus Muslim Brotherhood forces, we should
take a look back to IBM�s historic contributions to the Nazi effort on Final
Solutions: How
IBM Helped Automate the Nazi Death Machine in Poland by Edwin Black.
�When Adolf Hitler
came to power in 1933, most of the world saw a menace to humanity. But IBM saw
Nazi Germany as a lucrative trading partner. Its president, Thomas J. Watson,
engineered a strategic business alliance between IBM and the Reich, beginning
in the first days of the Hitler regime and continuing right through World War
II. This alliance catapulted Nazi Germany to become IBM's most important
customer outside the U.S. IBM and the Nazis jointly designed, and IBM
exclusively produced, technological solutions that enabled Hitler to accelerate
and in many ways automate key aspects of his persecution of Jews, homosexuals,
Jehovah's Witnesses, and others the Nazis considered enemies. Custom-designed,
IBM-produced punch cards, sorted by IBM machines leased to the Nazis, helped
organize and manage the initial identification and social expulsion of Jews and
others, the confiscation of their property, their ghettoization, their
deportation, and, ultimately, even their extermination�
This opening
paragraph of the article from the Village
Voice, March 27 - April 2, 2002, should not only give you pause, but
hopefully propel you through the rest of the piece. You will see specifically
how IBM of 1933 and beyond enabled the organization of the death camps --
thanks to the chairman of IBM, Thomas Watson, the New York Madison Avenue
branch of IBM, the German Subsidiary, acronym �Dehomag,� and Watson Business
Machines headquartered at Warsaw, continuing operation well past 1941 under
German management, preserving and delivering profits on all the
information-organization machines of IBM.
Here we have a
military industrial complex at one of its lowest ebbs in history. Perhaps it is
about to be matched in the use of various software technology and its
intelligence gathering capability to initiate and implement the War on
Terror vis-a-vis 9/11, the New Pearl Harbor, and in the ongoing neocon
march to world hegemony. That may be the PROMIS of our future. Or do we have
something to say about it as a people?
If this all seems
terribly grim to you, its purpose is to help keep you aware and alive, to enjoy
the beauty and power of life; and also to understand just how low sectors of
humanity can sink to reach the greatest heights of political power, which
inevitably ends up destroying untold numbers of innocent people around the
world.
This theme is
explored as well in Carolyn Baker�s FTW
article, The War
On You: U.S. Government Targeting of American Dissidents, Part II, provided
free. It not only connects many dots but blows its whistle loud enough to wake
up the most �doubting Thomas� as to what was and is being planned for the near
future. My thanks to Michael Ruppert, wherever he is in the Wilderness, to have
so diligently put his intelligence and life on the line to first inform us. What
began as software to help prosecutors manage their intelligence data has
evolved into a Big Brother Prosecutor with a super human intelligence to manage
our existence through data mining.
Have a good and
conscious day.
Jerry Mazza is a
freelance writer living in New York. Reach him at gvmaz@verizon.net.
Copyright © 1998-2007 Online Journal
Email Online Journal Editor