17 October, 2006

Enterprise Software is like Printing Money

found at http://onlinejournal.com/artman/publish/article_1322.shtml

The PROMIS of 9/11 and beyond

By Jerry Mazza
Online Journal Associate Editor

Oct 17, 2006, 00:45


As whistleblower Richard Grove (listen to his mp3 audio talks) points out, SilverStream (the software company he worked for at the time of 9/11), served not only AIG (American Insurance Group), it also built trading applications for Merrill Lynch, Deutsche Bank, Banker’s Trust, Alex Brown, Morgan Stanley, and Marsh McLennan. With this impressive list, according to Grove, “you pretty much had the major players involved in the financial aspect of the 9/11 fraudulent trading activity.”

I might add that fraudulent activity extended from finance to our government as well.

In the weeks preceding 9/11, many elves on Wall Street were working into the night to make Marsh and others’ SilverStream fully operable. The software, as Grove pointed out to me, “was an internet portal framework. Panacya is AI (Artificial Intelligence). PROMIS and P-Tech are the grandparents if you will.” So let’s consider the grandparents to fully understand the power of the grandchildren. Sort of like Prescott Bush in relation to George W., Jeb, Neil and Marvin Bush.

PROMIS software (originally Prosecutor Management Intelligence System) appeared in the early 1980s. It was developed by a by a small Washington, DC, company, Inslaw Inc., and proved to be the perfect intelligence tool. Though designed for the Department of Justice to help prosecutors in case management, it hooked the attention of corrupt officials and Israeli intelligence. Subsequently stolen from Inslaw, the software was hacked and given a “trap door.” This trojan gave it the power to retrieve info for the US and Israel from the very foreign intelligence services and banks it had been sold to in some 40 countries.

The software helped the US win the Cold War against the Soviets, but also helped the Russian mafia, Saddam Hussein, Osama bin Laden & Company and any number of spies and crooks.

In 1985 Mossad spy and British media tycoon Robert Maxwell, opened the “trap door” secret to Chinese Military Intelligence (PLA-2), at the same time selling them a copy of PROMIS for $9 million, turning it against the US. Unfortunately, in the mid-90s PLA-2 hacked the databases of Los Alamos and Sandia laboratories to cop US nuclear secrets.

The KGB also bought PROMIS from Maxwell, and also received the back door trojan to plant in a tender part of the FBI. Yes there is no honor among thieves. We also provided PROMIS to Russia and China to backdoor their intelligence, figuring the 64 federal agencies they could expose did not outweigh the many other look-sees PROMIS provided the US.

Actually, using the same PROMIS bought from Russia, Saddam and his regime shifted major money through the banking system. Some of these funds still feed Iraqi anti-coalition and resistance fighters.

Unfortunately, when Maxwell tried to extort more money from the KGB to pay off his huge corporate debts, he ended up falling off the back of a yacht into the deep blue drink, stung by a hot shot needle, this with a little help from his friends. Nevertheless PROMIS was as Michael Ruppert described in Crossing the Rubicon . . .

“ . . . software that could think, understand every major language in the world, that provided peepholes into everyone else’s computer ‘dressing rooms,’ that could insert data into computers without people’s knowledge, that could fill in blanks beyond human reasoning, and also predict what people would do — before they did it? You would probably use it wouldn’t you? But PROMIS is not a virus. It has to be installed as a program on the computer systems that you want to penetrate. Being as uniquely powerful as it is, this is usually not a problem. Once its power and advantages are demonstrated, most corporations, banks, or nations are eager to be a part of the 'exclusive' club that has it. And, as is becoming increasingly confirmed by sources connected to this story, especially in the worldwide banking system, not having PROMIS -- by whatever name it is offered -- can exclude you from participating in the ever more complex world of money transfers and money laundering. As an example, look at any of the symbols on the back of your ATM card. Picture your bank refusing to accept the software that made it possible to transfer funds from LA to St. Louis or from St. Louis to Rome.”

PROMIS Plus P-Tech Equal Disaster

The disaster I refer to is 9/11 . . . and is referenced in a FTW article by Jamey Hecht, with research assistance by Michael Kane and editorial comment by Michael C. Ruppert. The article is startlingly titled “PROMIS Connections to Cheney Control of 9/11 Attacks Confirmed.” It’s part of an equally startling piece “PTECH, 9/11, and USA-SAUDI TERROR -- Part 1. In it, is an interview between FTW and Wall Street whistleblower Indira Singh. Here’s a piece of it . . .

FTW: You said at the 9/11 Citizens' Commission hearings, you mentioned -- it's on page 139 of transcript - that Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency [italics added].

”Indira Singh: Yes, I have a good diagram for that.

FTW: And that relationship had been going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that the Secret Service is among the government entities that had a contract with Ptech. Mike Ruppert's thesis in Crossing the Rubicon, as you know, is that the software that was running information between FAA & NORAD was superseded by a parallel, subsuming, version of itself that was being run by the Secret Service on state of the art parallel equipment in the PEOC with a nucleus of Secret Service personnel around Cheney. In your view, might it have been the case that Cheney was using Ptech to surveil the function of the people in FAA & NORAD who wanted to do their jobs on 9/11, and then intervene to turn off the legitimate response?

“Indira Singh: Is it possible from a software point of view? Absolutely it's possible. Did he (Cheney) have such a capability? I don't know. But that's the ideal risk scenario - to have an overarching view of what's going on in data. That's exactly what I wanted for JP Morgan. You know what's ironic about this - I wanted to take my operational risk blueprint which is for an operational event going wrong and I wanted to make it generic for extreme event risk to surveil across intelligence networks. What you're describing is something that I said, 'boy if we had this in place maybe 9/11 wouldn't have happened.' When I was going down to DARPA and getting these guys excited about creating an extreme event risk blueprint to do this, I'm thinking of doing exactly what you're saying Cheney might have already had!

“I believe that Dick Cheney also had the ability using evolutions of the PROMIS software, to penetrate and override any other radar computer or communications system in the government.

(Mike Ruppert, in "Summation: Ladies and Gentlemen of the Jury," from Crossing The Rubicon, p.592.)

Also of prime importance is this second statement from the same piece . . .

“The Ptech story is a crucial piece of 9/11 because the software was used to simultaneously coordinate the FAA with NORAD and the Secret Service. But it transcends 9/11 because that terror attack is continuous with preceding decades of violent Islamic extremism epitomized in the international Muslim Brotherhood, of which al Qaeda is only one, relatively recent, incarnation.6 Worse, the Muslim Brotherhood has from its first days been linked to the Nazi party and its Swiss neo-Nazi epigones.7 Anti-Soviet projects of the CIA and the Pentagon (from 11-22-63 to the Afghan War) have long been recognized as continuous with the absorption of Nazi SS personnel into what became the CIA.8 The connection of the Bush crime family to the political economy of the Nazi movement is familiar from the excellent work of former Justice Department Nazi war crimes prosecutor John Loftus and others.9 Its triangulation with the Bush-Saudi alliance forms a powerful explanatory paradigm - one to which FTW will be paying further attention in the sequel to this story.”

And in another place, FTW reports, “September 1996/ Ptech already working with the DoD’s research group DARPA: ‘Ptech, based in Cambridge, Mass., offers an integrated set of object-oriented tools that enable users to create interactive blueprints of business processes. Software code can be generated from the hierarchical layout, providing rapid and consistent application development. The [Defense] Advanced Research Projects Agency is using [Ptech’s program called] Framework to help transfer commercial software methodologies to the defense sector.”

The point of all this is aptly summed up in the “CODA: Knowledge is Power":

“The computational power of the Ptech evolution of PROMIS software represents a daunting new surveillance-and-intervention capability in the hands of the same elites who planned 9/11, prosecute the subsequent resource wars, and are presiding over what may become a full economic and military disaster for the resource-consuming citizens of America and the world. Since the ‘War On Terror’ and this coming dollar / natural gas collapse will necessitate new levels of domestic repression, this is just the capability those elites require. Ptech is Total Information Awareness . . .

“Programs based on datamining are powerful analytical tools; finding meaningful patterns in an ocean of information is very useful. But when such a tool is driven by a high-caliber artificial intelligence core [P-tech], its power gets spooky. The datamining capability becomes a smart search tool of the AI [Artificial Intelligence] program, and the system begins to learn.

“ . . . ’Neural Network’ programming is modeled on the computational techniques used by the human brain - an electrochemical computer that uses neurons instead of semiconductors; the firing or non-firing of neurons instead of ones and zeros.

With neural networking, software has become much smarter than it had been . . .

“ . . . Ptech's Framework can exploit the patterns it detects and extrapolate future probabilities. Then it can integrate itself with the computers from which it's getting the information and intervene in their functioning. The result is a tool for surveillance and intervention. The program can identify suspect streams of cash in a banking network and allow a bank officer to freeze the suspect assets. Of course, a user could direct the same program to prevent detection. It can discover salient anomalies in a person's movements through a city and either flag those anomalies for further scrutiny, or erase them from the record. And it can find errant flights in an air traffic map and initiate an intercept response. Or not.”

We seem to have arrived not only at 1984 but taken off for an unbidden future of governmental "Total Information Awareness" (TIA from DARPA) to be used in a new kind of warfare, not only on enemies, but on the people, too. For instance, IBM in a 2001 newsletter/promotion piece, boasts that “IBM Enterprise Architecture Method [is] enabled through Ptech Framework” for commercial purposes. But considering Ptech’s nasty beginning and development through financial support from a trilogy of elites, neo-Nazis plus Muslim Brotherhood forces, we should take a look back to IBM’s historic contributions to the Nazi effort on Final Solutions: How IBM Helped Automate the Nazi Death Machine in Poland by Edwin Black.

“When Adolf Hitler came to power in 1933, most of the world saw a menace to humanity. But IBM saw Nazi Germany as a lucrative trading partner. Its president, Thomas J. Watson, engineered a strategic business alliance between IBM and the Reich, beginning in the first days of the Hitler regime and continuing right through World War II. This alliance catapulted Nazi Germany to become IBM's most important customer outside the U.S. IBM and the Nazis jointly designed, and IBM exclusively produced, technological solutions that enabled Hitler to accelerate and in many ways automate key aspects of his persecution of Jews, homosexuals, Jehovah's Witnesses, and others the Nazis considered enemies. Custom-designed, IBM-produced punch cards, sorted by IBM machines leased to the Nazis, helped organize and manage the initial identification and social expulsion of Jews and others, the confiscation of their property, their ghettoization, their deportation, and, ultimately, even their extermination”

This opening paragraph of the article from the Village Voice, March 27 - April 2, 2002, should not only give you pause, but hopefully propel you through the rest of the piece. You will see specifically how IBM of 1933 and beyond enabled the organization of the death camps -- thanks to the chairman of IBM, Thomas Watson, the New York Madison Avenue branch of IBM, the German Subsidiary, acronym “Dehomag,” and Watson Business Machines headquartered at Warsaw, continuing operation well past 1941 under German management, preserving and delivering profits on all the information-organization machines of IBM.

Here we have a military industrial complex at one of its lowest ebbs in history. Perhaps it is about to be matched in the use of various software technology and its intelligence gathering capability to initiate and implement the War on Terror vis-a-vis 9/11, the New Pearl Harbor, and in the ongoing neocon march to world hegemony. That may be the PROMIS of our future. Or do we have something to say about it as a people?

If this all seems terribly grim to you, its purpose is to help keep you aware and alive, to enjoy the beauty and power of life; and also to understand just how low sectors of humanity can sink to reach the greatest heights of political power, which inevitably ends up destroying untold numbers of innocent people around the world.

This theme is explored as well in Carolyn Baker’s FTW article, The War On You: U.S. Government Targeting of American Dissidents, Part II, provided free. It not only connects many dots but blows its whistle loud enough to wake up the most “doubting Thomas” as to what was and is being planned for the near future. My thanks to Michael Ruppert, wherever he is in the Wilderness, to have so diligently put his intelligence and life on the line to first inform us. What began as software to help prosecutors manage their intelligence data has evolved into a Big Brother Prosecutor with a super human intelligence to manage our existence through data mining.

Have a good and conscious day.

Jerry Mazza is a freelance writer living in New York. Reach him at gvmaz@verizon.net.

Bookmark and Share
posted by u2r2h at Tuesday, October 17, 2006

0 Comments:

Post a Comment

<< Home

Locations of visitors to this page Politics Blogs - Blog Top Sites