The story of PROMIS software has to be one of the most intriguing stories I've ever read - especially since it is true.  It involves government officials, computerized theft of information, treachery, murder and intrigue.  It is my belief that it is also at the root of the many of the problems we have today.

The best place to start with the story of PROMIS software is with the Investigative Report titled, "The INSLAW Affair" prepared by the Judiciary Committee of the Congress in 1992.  Unfortunately, the website where I obtained it is no longer active.  The Wayback Machine had a copy of it, but the footnotes are not included on the document.  I left in the footnote indicators even though the footnote text is missing.

Also very interesting are a series of articles in a Special Report, "Federal Corruption, INSLAW"  written by Harry V. Martin.  The first articles were copyrighted by the Napa Sentinel.  The last article is copyrighted by FreeAmerica.   These articles have one detail that I've only seen in Mr. Martin's articles.  That is the fact that IBM bailed out INSLAW from their bankruptcy ordeal in 1991. 

When I first read about the PROMIS software, I was especially intrigued since I am a Systems Analyst/Programmer.   The only way I could figure out that government computer systems could be breeched like this was if there was a back door in the IBM communications controllers and an IBM Systems Engineer with a background in telecommunications was exploiting it.  People with those skills were a rarity even back in those days.   Anyway, I was busy reading and researching 9-11 so I set aside thinking about PROMIS.  Then I found a video, "The PTECH Story" of Indira Singh telling her story about PROMIS software AND 9-11.

As the story goes, the PTECH software is a pirated copy of the PROMIS software.  At this point, I'm hooked.  I have to get to the bottom of this story.   The first thing was there were some things in Indira Singh's story that just didn't sit right with me.  The first of those questions were that the risk management software she was describing sounded rather magic to me.  Having been a systems developer for 20 years in mainframe shops, I was suspect of the description of the system for an operation like JP Morgan.   Secondly, there was a key detail of the story that she left out on the video.   The missing detail was, 'what happened that caused her to stop the software presentation so she could run to the phone to call her colleagues?   This is like asking the guests to a dinner party to leave before you serve the dinner.  It's not done.  And WHY would she leave out THE key detail in a video presentation.  That didn't make sense to me since Indira was giving a live presentation of her story on the video.   

After several rather nasty encounters with Indira Singh on the internet (another story for another day), I found out that the missing clue was in the written account of the PTECH story on Mike Ruppert's website - FromTheWilderness.   From Singh's written account, the PTECH marketing people were Saudis.  They basically walked into JP Morgan and offered to hack JP Morgan's computer system to demonstrate the software.  That was Indira's clue that something was wrong with the PTECH software.  In my experience, there is not a software professional in the world that is stupid enough to walk into a bank and offer to hack their computer system.  That's like a bank robber walking into a bank offering to crack their safe. 

I tried to find Indira's original account that was on From the Wilderness but couldn't find it.  I did find the two paragraphs in the timeline below:

"September 1996. Ptech already working with DoD's research group, DARPA: "Ptech, based in Cambridge, Mass., offers an integrated set of object-oriented tools that enable users to create interactive blueprints of business processes. Software code can be generated from the hierarchical layout, providing rapid and consistent application development. The [Defense] Advanced Research Projects Agency is using [Ptech's program called] Framework to help transfer commercial software methodologies to the defense sector."   [Note - the Framework document is no longer available at the original website but I kept a copy of it - Click HERE ]

"May 2002. Dr. Hussein Ibrahim, co-founder of BMI and Ptech's chief scientist, and a delegation of other Ptech personnel come to JP Morgan at Singh's invitation, to demonstrate why Singh's blueprint project should buy Ptech software for its inference engine core. But the Ptech delegation has come to the Morgan offices unprepared, and they behave strangely: Singh's suspicions are aroused when Ibrahim offers to demonstrate the software on his laptop, using proprietary JP Morgan data. This would have compromised JPM information security and is entirely outside industry protocols ("a show-stopper"). In an adjoining room, Singh calls Roger Burlton, who runs Business Process Renewal in Vancouver. He tells her, "Don't let them out of your sight and don't let them leave with anything." Burlton recommends that she speak with Jeff Goins, a former Ptech employee. Goins informs Singh that Saudi terror financier Yassin Al Qadi is an investor in Ptech. Al Qadi claims to have met Dick Cheney in Jeddah before he became vice president, and that they still maintain "cordial relations." Singh confirms that Goins had taken his concerns to an FBI agent, and arranges to speak with that agent."

As I read Indira's account, my feeling was - "Gimme a Break here - she is tying the PTECH story to 9/11 and she is pointing fingers at Saudis who sound totally clueless.  BMI is an anagram of IBM. And PTECH was an IBM Business Partner - meaning that IBM was assisting PTECH in marketing their software.  Now - refer back to Harry Martin's news article that says that IBM saved INSLAW from bankruptcy - which means that IBM owned the PROMIS software.   My feeling is that either Indira Singh is an unwitting dupe or a participant in a misdirection and cover story for IBM's very significant role in the PROMIS/PTECH saga.  My suspicions are amplified by the fact that Lou Gerstner Jr. who was the CEO of IBM is now the Chairman of the Carlyle Group

What was driving me crazy about this whole story was the question, "How did the PROMIS/PTECH software work"?  The concept of a back door in IBM's communications controllers was possible, but it wasn't very satisfactory.  From the accounts of all that was possible to do with this software, they would need an easier way than through the controllers. Then it hit me - OF COURSE!  I know how they did it!

As the flying fickle finger of fate would have it, early in my career - in the late 1970's, I interviewed for a company that was developing a computerized system for warehouses.  The concept was a radio frequency controlled terminal on a forklift that communicated with the main computer.  This allowed the forklift driver to enter the location of pallets in a warehouse as he stored them.   This was probably among the first wireless telecommunications systems for the business world.   THAT was the way they did it.    After that, I bought Danny Casolaro's book, Octopus.  That book confirmed my suspicions on the method of access. 

Again, the flying finger of fate comes into play.  I also worked for a corporation that manufactured microchips so I knew that chips were manufactured to precise specifications.  The properties of the silicon ingots are transformed by the chemical baths they are put through during the manufacturing process so when I found an article on the 'miracle' of the metallic ferris oxide coatings on microchips for wireless communications, I knew then that the PROMIS/PTECH software was a way to do direct communications with a chip on the motherboard.   My God, I thought - this is brilliant.   It is almost the perfect crime.  

The PROMIS/TECH software could be as simple as just a keystroke program.  On all corporate and government systems, the first thing that anybody enters on the machine is their ID and password.   All the program on the chip would have to do is to record the first 25 keystrokes after any period of inactivity on the machine.  With the capability of getting the ID and password of key people in an organization - the DBA, the RACF security person, the payroll person, the Key men in a corporations, an intruder could do anything.  The possibilities were virtually limitless.  NOBODY would think to consider the hardware as an open door to a computer system - at least in the early days.  The programmers would be looking for software bugs in their own code - the thought of an external intrusion into the system to a microchip via wireless communications wouldn't even cross their minds.   That means that anything that was done on the computer would be attributed to a software bug - or to the person whose ID was used to execute a transaction. 

Most people, upon reading this will think simply of the ability to steal money - and most certainly the people behind this conspiracy did do that.  But again, these people are brilliant and I believe they had bigger things in mind - such as a coup d'etat on the United States government.  If you control the U.S. government - by controlling the people in key government positions and most importantly - controlling the investigative arms of the government, then you are well on your way to controlling the world - right?  Sounds pretty fantastic doesn't it? 

Since the INSLAW case began with law enforcement files and court systems, the obvious thing would be to add your people onto the payroll of the FBI and into the court system.  With your own people in the FBI, you could block investigations that would lead to a discovery of the conspiracy.  As with the pre-9/11 FBI agents.  They found suspicious characters doing suspicious things - but when they tried to investigate, their information went into the FBI management and into a black hole.  This is completely inexplicable if FBI management are there to do the job they were hired to do.  It only makes sense if they were on the FBI payroll to block such investigations.   And the beauty of the whole thing is that secrecy is the watch word of these organizations so each agent is basically working in a blackbox.  Since they are ostensibly working for the U.S. government - following orders of their immediate supervisor, they have no way of knowing if they are legitimately working for the FBI or if they are unwittingly part of a conspiracy. 

My suspicions on this were confirmed the other day when I was listening to the Greg Szymanski radio program.  His guest was John Peeler, a guy who claimed to have worked for the FBI and who was involved in the Oklahoma City bombing of the Murrah building.   He thought his job was to infiltrate the conspiracy which the FBI knew about - but he was also ordered to be a participant - up to and including helping Tim McVeigh figure out how to build the bomb.   One of the callers on the radio called the guy a pathological liar.  He didn't sound like a liar to me so I called and asked him two questions.  1) When did you go to work for the FBI?   2) Did you go to the FBI academy?    The answers were 1988 (in the time frame) and 'NO' - he was hired for a special black op program that officially didn't exist.    He said he was hired because of his background which I guessed was Special Forces (I have more information on this - "Special Forces - and teams working independently is the 'New American Way of War').  

April 20, 2006 - John Peeler with Greg Szymanski 

I believe that the guy's story is true.  He did think he was working for the FBI and he no doubt was drawing an FBI paycheck.  He was probably added to the FBI's payroll via the PROMIS/PTECH software.   And nobody would be the wiser - least of all John Peeler.  Further, his story is that his son is serving life in prison for a crime he didn't commit.  Peeler's story is that his son was setup and that he was convicted on no evidence at all linking him to the crime that was supposedly committed.  According to Peeler - this was done in an attempt to keep Peeler from telling his story.   

It is highly possible that the judge is one of the conspirators.  In one of my email groups, there is a lawyer who was on to this story with the judges.  Apparently there is supposed to be some paperwork on file for judges - signed commission papers.  He has made a project out of filing requests for this paperwork on judges - and he is finding a whole lot of judges that don't have the proper paperwork on file.   My guess would be that these judges were 'inserted' into the system via PROMIS/PTECH also. 

The whole scenario fits with what we observe as outsiders - which is that we have a government at war with itself.  There are unwitting drones like Peeler who thought they were working for the government who are actually working for the conspirators.  We have honest hardworking people working for the government who are confounded by the obstruction to their doing the job they were hired to do - with no recourse because of the secrecy required of them.  We have conspirators who - through the use of this software are able to set up anybody to take a fall for crimes they didn't commit and with the ability to create chaos in the government computer systems.   Nobody knows who they can trust - who is real and who is not.   As I said earlier - almost the perfect crime.