Monday, 4 July 2016

PROMIS - (USA)

PROMIS - (USA) 1970's-era 16-bit software program developed primarily for the US Department of Justice. Developed by Inslaw Incorporated, a Washington DC IT Company the program kept track of people in the Justice system and automatically cross-referenced data. The enhanced 32-bit version (ENHANCED PROMIS/PROMIS '82) was allegedly used by terrorist groups such as Al Qaeda and international criminals. Israel's MOSSAD and US Intelligence reportedly sold TROJAN HORSE copies of the enhanced program to foreign governments, such as Canada, while Osama bin Laden is believed to have bought a Russian black-market version to covertly move bank funds without detection. It has emerged bin Laden's version may have been Trojan Horse-enabled, covertly supplied to Russian contacts by the CIA. Further allegations have surfaced that Israel extracted US Nuclear secrets using the Trojan Horse-enabled software. See description below for a description of ENHANCED PROMIS/PROMIS '82 capabilities.


A nation's spy organization would buy Promis and have it installed in its computers at headquarters. Using a modem, the spy network would then tap into the computers of such services as the telephone company, the water board, other utility commissions, credit card companies, etc. Promis would then search for specific information. For example, if a person suddenly started using more water and more electricity and making more phone calls than usual, it might be suspected he had guests staying with him. Promis would then start searching for the records of his friends and associates, and if it was found that one had stopped using electricity and water, it might be assumed, based on other records stored in Promis, that the missing person was staying with the subject of the investigation. This would be enough to have him watched if, for example, he had been involved in previous conspiracies. Promis would search through its records and produce details of those conspiracies, even though the person might have been operating under a different name in the past - the program was sophisticated enough to find a detail that would reveal his true identity. - Extract from 'Profits of War: The Sensational Story of the World-Wide Arms Conspiracy, Allen & Unwin, Sydney 1992. 

No comments:

Post a Comment