|   
                                                            
                                                            The story of PROMIS 
                                                            software has to be 
                                                            one of the most 
                                                            intriguing stories 
                                                            I've ever read - 
                                                            especially since it 
                                                            is true.  It 
                                                            involves government 
                                                            officials, 
                                                            computerized theft 
                                                            of information, 
                                                            treachery, murder and intrigue.  
                                                            It is my belief that 
                                                            it is also at the 
                                                            root of the many of 
                                                            the problems 
                                                            we have today.
                                                             
                                                            
                                                            
                                                            The best place to 
                                                            start with the story 
                                                            of PROMIS software 
                                                            is with the 
                                                            Investigative Report 
                                                            titled,
                                                            "The INSLAW Affair" 
                                                            prepared by the 
                                                            Judiciary Committee 
                                                            of the Congress in 
                                                            1992.  
                                                            Unfortunately, the 
                                                            website where I 
                                                            obtained it is no 
                                                            longer active.  
                                                            The Wayback Machine 
                                                            had a copy of it, 
                                                            but the footnotes 
                                                            are not included on 
                                                            the document.  
                                                            I left in the 
                                                            footnote indicators 
                                                            even though the 
                                                            footnote text is 
                                                            missing.  
                                                            
                                                            
                                                            Also very 
                                                            interesting are a 
                                                            series of articles 
                                                            in a Special Report,
                                                            "Federal Corruption, 
                                                            INSLAW"  
                                                            written by Harry V. 
                                                            Martin.  The 
                                                            first articles were 
                                                            copyrighted by the 
                                                            Napa Sentinel.  
                                                            The last article is 
                                                            copyrighted by 
                                                            FreeAmerica.   
                                                            These articles have 
                                                            one detail that I've 
                                                            only seen in Mr. 
                                                            Martin's articles.  
                                                            That is the fact 
                                                            that IBM bailed out INSLAW from their 
                                                            bankruptcy ordeal in 
                                                            1991.   
                                                            
                                                            
                                                            When I first read 
                                                            about the PROMIS 
                                                            software, I was 
                                                            especially intrigued 
                                                            since I am a Systems 
                                                            Analyst/Programmer.   
                                                            The only way I could 
                                                            figure out that 
                                                            government computer 
                                                            systems could be 
                                                            breeched like this 
                                                            was if there was a 
                                                            back door in the IBM 
                                                            communications 
                                                            controllers and an 
                                                            IBM Systems Engineer 
                                                            with a background in 
                                                            telecommunications 
                                                            was exploiting it.  
                                                            People with those 
                                                            skills were a rarity 
                                                            even back in those 
                                                            days.   
                                                            Anyway, I was busy 
                                                            reading and 
                                                            researching 9-11 so 
                                                            I set aside thinking 
                                                            about PROMIS.  
                                                            Then I found a 
                                                            video, "The 
                                                            PTECH Story" of 
                                                            Indira Singh telling 
                                                            her story about 
                                                            PROMIS software AND 
                                                            9-11. 
                                                            
                                                            
                                                            As the story goes, 
                                                            the PTECH software 
                                                            is a pirated copy of 
                                                            the PROMIS software.  
                                                            At this point, I'm 
                                                            hooked.  I have 
                                                            to get to the bottom 
                                                            of this story.   
                                                            The first thing was 
                                                            there were some 
                                                            things in Indira 
                                                            Singh's story that 
                                                            just didn't sit 
                                                            right with me.  
                                                            The first of those 
                                                            questions were that 
                                                            the risk management 
                                                            software she was 
                                                            describing sounded 
                                                            rather magic to me.  
                                                            Having been a 
                                                            systems developer 
                                                            for 20 years in 
                                                            mainframe shops, I 
                                                            was suspect of the 
                                                            description of the 
                                                            system for an 
                                                            operation like JP 
                                                            Morgan.   
                                                            Secondly, there was 
                                                            a key detail of the 
                                                            story that she left 
                                                            out on the video.   
                                                            The missing detail 
                                                            was, 'what happened 
                                                            that caused her to 
                                                            stop the software 
                                                            presentation so she 
                                                            could run to the 
                                                            phone to call her 
                                                            colleagues?   
                                                            This is like asking 
                                                            the guests to a 
                                                            dinner party to 
                                                            leave before you 
                                                            serve the dinner.  
                                                            It's not done.  
                                                            And WHY would she 
                                                            leave out THE key 
                                                            detail in a video 
                                                            presentation.  
                                                            That didn't make 
                                                            sense to me since 
                                                            Indira was giving a 
                                                            live presentation of 
                                                            her story on the 
                                                            video.   
                                                             
                                                            
                                                            
                                                            After several rather 
                                                            nasty encounters 
                                                            with Indira Singh on 
                                                            the internet 
                                                            (another story for 
                                                            another day), I 
                                                            found out that the 
                                                            missing clue was in 
                                                            the written account 
                                                            of the PTECH story 
                                                            on Mike Ruppert's 
                                                            website -
                                                            
                                                            FromTheWilderness.   
                                                            From Singh's written 
                                                            account, the PTECH 
                                                            marketing people 
                                                            were Saudis.  
                                                            They basically 
                                                            walked into JP 
                                                            Morgan and offered 
                                                            to hack JP Morgan's 
                                                            computer system to 
                                                            demonstrate the 
                                                            software.  That 
                                                            was Indira's clue 
                                                            that something was 
                                                            wrong with the PTECH 
                                                            software.  In 
                                                            my experience, there 
                                                            is not a software 
                                                            professional in the 
                                                            world that is stupid 
                                                            enough to walk into 
                                                            a bank and offer to 
                                                            hack their computer 
                                                            system.  That's 
                                                            like a bank robber 
                                                            walking into a bank 
                                                            offering to crack 
                                                            their safe. 
                                                             
                                                            
                                                            
                                                            I tried to find 
                                                            Indira's original 
                                                            account that was on 
                                                            From the Wilderness 
                                                            but couldn't find 
                                                            it.  I did find 
                                                            the two paragraphs 
                                                            in the timeline 
                                                            below:   
                                                             
                                                            
                                                            
                                                            
                                                            http://www.fromthewilderness.com/free/ww3/012005_ptech_pt1.shtml 
                                                            
                                                            http://www.fromthewilderness.com/free/ww3/012705_ptech_pt2.shtml
                                                             
                                                            
                                                                      
                                                                      
                                                                      
                                                                      "September 
                                                                      1996. 
                                                                      Ptech 
                                                                      already 
                                                                      working 
                                                                      with DoD's 
                                                                      research 
                                                                      group, 
                                                                      DARPA: 
                                                                      "Ptech, 
                                                                      based in 
                                                                      Cambridge, 
                                                                      Mass., 
                                                                      offers an 
                                                                      integrated 
                                                                      set of 
                                                                      object-oriented 
                                                                      tools that 
                                                                      enable 
                                                                      users to 
                                                                      create 
                                                                      interactive 
                                                                      blueprints 
                                                                      of 
                                                                      business 
                                                                      processes. 
                                                                      Software 
                                                                      code can 
                                                                      be 
                                                                      generated 
                                                                      from the 
                                                                      hierarchical 
                                                                      layout, 
                                                                      providing 
                                                                      rapid and 
                                                                      consistent 
                                                                      application 
                                                                      development. 
                                                                      The 
                                                                      [Defense] 
                                                                      Advanced 
                                                                      Research 
                                                                      Projects 
                                                                      Agency is 
                                                                      using 
                                                                      [Ptech's 
                                                                      program 
                                                                      called]
                                                                      
                                                                      
                                                                      
                                                                      Framework 
                                                                      to help 
                                                                      transfer 
                                                                      commercial 
                                                                      software 
                                                                      methodologies 
                                                                      to the 
                                                                      defense 
                                                                      sector."
                                                                      
                                                                      
                                                                      http://www.govexec.com/archdoc/rrg96/0996rrg5.htm.   
																		[Note - 
																		the 
																		Framework 
																		document 
																		is no 
																		longer 
																		available 
																		at the 
																		original 
																		website 
																		but I 
																		kept a 
																		copy of 
																		it - 
																		Click
																		
																		HERE 
																		] 
  
                                                                      
                                                                      
                                                                      
                                                                      "May 2002. 
                                                                      Dr. 
                                                                      Hussein 
                                                                      Ibrahim, 
                                                                      co-founder 
                                                                      of BMI and 
                                                                      Ptech's 
                                                                      chief 
                                                                      scientist, 
                                                                      and a 
                                                                      delegation 
                                                                      of other 
                                                                      Ptech 
                                                                      personnel 
                                                                      come to JP 
                                                                      Morgan at 
                                                                      Singh's 
                                                                      invitation, 
                                                                      to 
                                                                      demonstrate 
                                                                      why 
                                                                      Singh's 
                                                                      blueprint 
                                                                      project 
                                                                      should buy 
                                                                      Ptech 
                                                                      software 
                                                                      for its 
                                                                      inference 
                                                                      engine 
                                                                      core. But 
                                                                      the Ptech 
                                                                      delegation 
                                                                      has come 
                                                                      to the 
                                                                      Morgan 
                                                                      offices 
                                                                      unprepared, 
                                                                      and they 
                                                                      behave 
                                                                      strangely: 
                                                                      Singh's 
                                                                      suspicions 
                                                                      are 
                                                                      aroused 
                                                                      when 
                                                                      Ibrahim 
                                                                      offers to 
                                                                      demonstrate 
                                                                      the 
                                                                      software 
                                                                      on his 
                                                                      laptop, 
                                                                      using 
                                                                      proprietary 
                                                                      JP Morgan 
                                                                      data. This 
                                                                      would have 
                                                                      compromised 
                                                                      JPM 
                                                                      information 
                                                                      security 
                                                                      and is 
                                                                      entirely 
                                                                      outside 
                                                                      industry 
                                                                      protocols 
                                                                      ("a 
                                                                      show-stopper"). 
                                                                      In an 
                                                                      adjoining 
                                                                      room, 
                                                                      Singh 
                                                                      calls
                                                                      
                                                                      
                                                                      
                                                                      Roger 
                                                                      Burlton, 
                                                                      who runs 
                                                                      Business 
                                                                      Process 
                                                                      Renewal in 
                                                                      Vancouver. 
                                                                      He tells 
                                                                      her, 
                                                                      "Don't let 
                                                                      them out 
                                                                      of your 
                                                                      sight and 
                                                                      don't let 
                                                                      them leave 
                                                                      with 
                                                                      anything." 
                                                                      Burlton 
                                                                      recommends 
                                                                      that she 
                                                                      speak with
                                                                      
                                                                      
                                                                      
                                                                      Jeff Goins, 
                                                                      a former 
                                                                      Ptech 
                                                                      employee. 
                                                                      Goins 
                                                                      informs 
                                                                      Singh that 
                                                                      Saudi 
                                                                      terror 
                                                                      financier 
                                                                      Yassin Al 
                                                                      Qadi is an 
                                                                      investor 
                                                                      in Ptech. 
                                                                      Al Qadi 
                                                                      claims to 
                                                                      have met 
                                                                      Dick 
                                                                      Cheney in 
                                                                      Jeddah 
                                                                      before he 
                                                                      became 
                                                                      vice 
                                                                      president, 
                                                                      and that 
                                                                      they still 
                                                                      maintain 
                                                                      "cordial 
                                                                      relations." 
                                                                      Singh 
                                                                      confirms 
                                                                      that Goins 
                                                                      had taken 
                                                                      his 
                                                                      concerns 
                                                                      to an FBI 
                                                                      agent, and 
                                                                      arranges 
                                                                      to speak 
                                                                      with that 
                                                                      agent." 
                                                             
                                                            
                                                            
                                                            As I read Indira's 
                                                            account, my feeling 
                                                            was - "Gimme a Break 
                                                            here - she is tying 
                                                            the PTECH story to 
                                                            9/11 and she is 
                                                            pointing fingers at 
                                                            Saudis who sound 
                                                            totally clueless.  
                                                            BMI is an anagram of 
                                                            IBM. And PTECH was 
                                                            an IBM Business 
                                                            Partner - meaning 
                                                            that IBM was 
                                                            assisting PTECH in 
                                                            marketing their 
                                                            software.  Now 
                                                            - refer back to 
                                                            Harry Martin's news 
                                                            article that says 
                                                            that IBM saved 
                                                            INSLAW from 
                                                            bankruptcy - which 
                                                            means that IBM owned 
                                                            the PROMIS software.   
                                                            My feeling is that 
                                                            either Indira Singh 
                                                            is an unwitting dupe 
                                                            or a participant in 
                                                            a misdirection and 
                                                            cover story for 
                                                            IBM's very 
                                                            significant role in 
                                                            the PROMIS/PTECH 
                                                            saga.  My 
                                                            suspicions are 
                                                            amplified by the 
                                                            fact that Lou 
                                                            Gerstner Jr. who was 
                                                            the CEO of IBM is 
                                                            now the
                                                            
                                                            Chairman of the 
                                                            Carlyle Group. 
                                                             
                                                            
                                                            
                                                            What was driving me 
                                                            crazy about this 
                                                            whole story was the 
                                                            question, "How did 
                                                            the PROMIS/PTECH 
                                                            software work"?  
                                                            The concept of a 
                                                            back door in IBM's 
                                                            communications 
                                                            controllers was 
                                                            possible, but it 
                                                            wasn't very 
                                                            satisfactory.  
                                                            From the accounts of 
                                                            all that was 
                                                            possible to do with 
                                                            this software, they 
                                                            would need an easier 
                                                            way than through the 
                                                            controllers. Then it 
                                                            hit me - OF COURSE!  
                                                            I know how they did 
                                                            it! 
                                                            
                                                            
                                                            As the flying fickle 
                                                            finger of fate would 
                                                            have it, early in my 
                                                            career - in the late 
                                                            1970's, I 
                                                            interviewed for a 
                                                            company that was 
                                                            developing a 
                                                            computerized system 
                                                            for warehouses.  
                                                            The concept was a 
                                                            radio frequency 
                                                            controlled terminal 
                                                            on a forklift that 
                                                            communicated with 
                                                            the main computer.  
                                                            This allowed the 
                                                            forklift driver to 
                                                            enter the location 
                                                            of pallets in a 
                                                            warehouse as he 
                                                            stored them.   
                                                            This was probably 
                                                            among the first 
                                                            wireless 
                                                            telecommunications 
                                                            systems for the 
                                                            business world.   
                                                            THAT was the way 
                                                            they did it.    
                                                            After that, I bought 
                                                            Danny Casolaro's 
                                                            book, Octopus.  
                                                            That book confirmed 
                                                            my suspicions on the 
                                                            method of access. 
                                                             
                                                            
                                                            
                                                            Again, the flying 
                                                            finger of fate comes 
                                                            into play.  I 
                                                            also worked for a 
                                                            corporation that 
                                                            manufactured 
                                                            microchips so I knew 
                                                            that chips were 
                                                            manufactured to 
                                                            precise 
                                                            specifications.  
                                                            The properties of 
                                                            the silicon ingots 
                                                            are transformed by 
                                                            the chemical baths 
                                                            they are put through 
                                                            during the 
                                                            manufacturing 
                                                            process so when I 
                                                            found an article on 
                                                            the 'miracle' of the 
                                                            metallic ferris 
                                                            oxide coatings on 
                                                            microchips for 
                                                            wireless 
                                                            communications, I 
                                                            knew then that the 
                                                            PROMIS/PTECH 
                                                            software was a way 
                                                            to do direct 
                                                            communications with 
                                                            a chip on the 
                                                            motherboard.   
                                                            My God, I thought - 
                                                            this is brilliant.   
                                                            It is almost the 
                                                            perfect crime.  
                                                             
                                                            
                                                            
                                                            The PROMIS/TECH 
                                                            software could be as 
                                                            simple as just a 
                                                            keystroke program.  
                                                            On all corporate and 
                                                            government systems, 
                                                            the first thing that 
                                                            anybody enters on 
                                                            the machine is their 
                                                            ID and password.   
                                                            All the program on 
                                                            the chip would have 
                                                            to do is to record 
                                                            the first 25 
                                                            keystrokes after any 
                                                            period of inactivity 
                                                            on the machine.  
                                                            With the capability 
                                                            of getting the ID 
                                                            and password of key 
                                                            people in an 
                                                            organization - the 
                                                            DBA, the RACF 
                                                            security person, the 
                                                            payroll person, the 
                                                            Key men in a 
                                                            corporations, an 
                                                            intruder could do 
                                                            anything.  The 
                                                            possibilities were 
                                                            virtually limitless.  
                                                            NOBODY would think 
                                                            to consider the 
                                                            hardware as an open 
                                                            door to a computer 
                                                            system - at least in 
                                                            the early days.  
                                                            The programmers 
                                                            would be looking for 
                                                            software bugs in 
                                                            their own code - the 
                                                            thought of an 
                                                            external intrusion 
                                                            into the system to a 
                                                            microchip via 
                                                            wireless 
                                                            communications 
                                                            wouldn't even cross 
                                                            their minds.   
                                                            That means that 
                                                            anything that was 
                                                            done on the computer 
                                                            would be attributed 
                                                            to a software bug - 
                                                            or to the person 
                                                            whose ID was used to 
                                                            execute a 
                                                            transaction. 
                                                             
                                                            
                                                            
                                                            Most people, upon 
                                                            reading this will 
                                                            think simply of the 
                                                            ability to steal 
                                                            money - and most 
                                                            certainly the people 
                                                            behind this 
                                                            conspiracy did do 
                                                            that.  But 
                                                            again, these people 
                                                            are brilliant and I 
                                                            believe they had 
                                                            bigger things in 
                                                            mind - such as a 
                                                            coup d'etat on the 
                                                            United States 
                                                            government.  If 
                                                            you control the U.S. 
                                                            government - by 
                                                            controlling the 
                                                            people in key 
                                                            government positions 
                                                            and most importantly 
                                                            - controlling the 
                                                            investigative arms 
                                                            of the government, 
                                                            then you are well on 
                                                            your way to 
                                                            controlling the 
                                                            world - right?  
                                                            Sounds pretty 
                                                            fantastic doesn't 
                                                            it?   
                                                            
                                                            
                                                            Since the INSLAW 
                                                            case began with law 
                                                            enforcement files 
                                                            and court systems, 
                                                            the obvious thing 
                                                            would be to add your 
                                                            people onto the 
                                                            payroll of the FBI 
                                                            and into the court 
                                                            system.  With 
                                                            your own people in 
                                                            the FBI, you could 
                                                            block investigations 
                                                            that would lead to a 
                                                            discovery of the 
                                                            conspiracy.  As 
                                                            with the pre-9/11 
                                                            FBI agents.  
                                                            They found 
                                                            suspicious 
                                                            characters doing 
                                                            suspicious things - 
                                                            but when they tried 
                                                            to investigate, 
                                                            their information 
                                                            went into the FBI 
                                                            management and into 
                                                            a black hole.  
                                                            This is completely 
                                                            inexplicable if FBI 
                                                            management are there 
                                                            to do the job they 
                                                            were hired to do.  
                                                            It only makes sense 
                                                            if they were on the 
                                                            FBI payroll to block 
                                                            such investigations.   
                                                            And the beauty of 
                                                            the whole thing is 
                                                            that secrecy is the 
                                                            watch word of these 
                                                            organizations so 
                                                            each agent is 
                                                            basically working in 
                                                            a blackbox.  
                                                            Since they are 
                                                            ostensibly working 
                                                            for the U.S. 
                                                            government - 
                                                            following orders of 
                                                            their immediate 
                                                            supervisor, they 
                                                            have no way of 
                                                            knowing if they are 
                                                            legitimately working 
                                                            for the FBI or if 
                                                            they are unwittingly 
                                                            part of a 
                                                            conspiracy. 
                                                             
                                                            
                                                            
                                                            My suspicions on 
                                                            this were confirmed 
                                                            the other day when I 
                                                            was listening to the 
                                                            Greg Szymanski radio 
                                                            program.  His 
                                                            guest was John 
                                                            Peeler, a guy who 
                                                            claimed to have 
                                                            worked for the FBI 
                                                            and who was involved 
                                                            in the Oklahoma City 
                                                            bombing of the 
                                                            Murrah building.   
                                                            He thought his job 
                                                            was to infiltrate 
                                                            the conspiracy which 
                                                            the FBI knew about - 
                                                            but he was also 
                                                            ordered to be a 
                                                            participant - up to 
                                                            and including 
                                                            helping Tim McVeigh 
                                                            figure out how to 
                                                            build the bomb.   
                                                            One of the callers 
                                                            on the radio called 
                                                            the guy a 
                                                            pathological liar.  
                                                            He didn't sound like 
                                                            a liar to me so I 
                                                            called and asked him 
                                                            two questions.  
                                                            1) When did you go 
                                                            to work for the FBI?   
                                                            2) Did you go to the 
                                                            FBI academy?    
                                                            The answers were 
                                                            1988 (in the time 
                                                            frame) and 'NO' - he 
                                                            was hired for a 
                                                            special black op 
                                                            program that 
                                                            officially didn't 
                                                            exist.    
                                                            He said he was hired 
                                                            because of his 
                                                            background which I 
                                                            guessed was Special 
                                                            Forces (I have more 
                                                            information on this 
                                                            - "Special Forces - 
                                                            and teams working 
                                                            independently is the 
                                                            'New American Way of 
                                                            War').   
                                                            
                                                            
                                                            
                                                            April 20, 2006 - 
                                                            John Peeler with 
                                                            Greg Szymanski 
                                                             
                                                            
                                                            
                                                            I believe that the 
                                                            guy's story is true.  
                                                            He did think he was 
                                                            working for the FBI 
                                                            and he no doubt was 
                                                            drawing an FBI 
                                                            paycheck.  He 
                                                            was probably added 
                                                            to the FBI's payroll 
                                                            via the PROMIS/PTECH 
                                                            software.   
                                                            And nobody would be 
                                                            the wiser - least of 
                                                            all John Peeler.  
                                                            Further, his story 
                                                            is that his son is 
                                                            serving life in 
                                                            prison for a crime 
                                                            he didn't commit.  
                                                            Peeler's story is 
                                                            that his son was 
                                                            setup and that he 
                                                            was convicted on no 
                                                            evidence at all 
                                                            linking him to the 
                                                            crime that was 
                                                            supposedly 
                                                            committed.  
                                                            According to Peeler 
                                                            - this was done in 
                                                            an attempt to keep 
                                                            Peeler from telling 
                                                            his story.   
                                                             
                                                            
                                                            
                                                            It is highly 
                                                            possible that the 
                                                            judge is one of the 
                                                            conspirators.  
                                                            In one of my email 
                                                            groups, there is a 
                                                            lawyer who was on to 
                                                            this story with the 
                                                            judges.  
                                                            Apparently there is 
                                                            supposed to be some 
                                                            paperwork on file 
                                                            for judges - signed 
                                                            commission papers.  
                                                            He has made a 
                                                            project out of 
                                                            filing requests for 
                                                            this paperwork on 
                                                            judges - and he is 
                                                            finding a whole lot 
                                                            of judges that don't 
                                                            have the proper 
                                                            paperwork on file.   
                                                            My guess would be 
                                                            that these judges 
                                                            were 'inserted' into 
                                                            the system via 
                                                            PROMIS/PTECH also. 
                                                             
                                                            
                                                            
                                                            The whole scenario 
                                                            fits with what we 
                                                            observe as outsiders 
                                                            - which is that we 
                                                            have a government at 
                                                            war with itself.  
                                                            There are unwitting 
                                                            drones like Peeler 
                                                            who thought they 
                                                            were working for the 
                                                            government who are 
                                                            actually working for 
                                                            the conspirators.  
                                                            We have honest 
                                                            hardworking people 
                                                            working for the 
                                                            government who are 
                                                            confounded by the 
                                                            obstruction to their 
                                                            doing the job they 
                                                            were hired to do - 
                                                            with no recourse 
                                                            because of the 
                                                            secrecy required of 
                                                            them.  We have 
                                                            conspirators who - 
                                                            through the use of 
                                                            this software are 
                                                            able to set up 
                                                            anybody to take a 
                                                            fall for crimes they 
                                                            didn't commit and 
                                                            with the ability to 
                                                            create chaos in the 
                                                            government computer 
                                                            systems.   
                                                            Nobody knows who 
                                                            they can trust - who 
                                                            is real and who is 
                                                            not.   As 
                                                            I said earlier - 
                                                            almost the perfect 
                                                            crime.   
                                                            
                                                              
                                                             |