Page 129 - Elana Freeland - Under an Ionized Sky
P. 129

From  ferrite-core  memory  and  transistors  to  hard  disks,  linked  modular  mainframes,
               Sketchpad,  and  vacuum  tubes  to  solid-state  logic,  the  military-industrial-intelligence  complex
               zeroed in on cybernetics. In 1961 the silicon crystal chip miniaturized the memory storage that
               transistors had been handling, packet switching and digital expanded the bandwidth and laid out
               the redundant, multilevel web for teletype data and voice.
                   After  the  Cuban  Missile  Crisis  of  1962,  Secretary  of  Defense  McNamara  called  for
               automated  intelligence  production.  The  Defense  Intelligence  Agency  (DIA)  already  had  an
               Automatic Data Processing Center on a rented IBM 360/30 mainframe that could index, store,
               and  retrieve  intelligence  like  U-2  photos  of  Soviet  military  installations.  The  RAND  packet-
               switching idea had a go, born out of a need for an alternate Cold War command-and-control (C2)
               network. The first linkup of Pentagon computers talking to each other in a closed network of
                                             2
               ARPANET  known  as  COINS   (Intelligence  Community  Computer  Communication  Network)
               was launched on December 31, 1966 from the DIA Security Office. Streams of digital data were
               broken  into  short  bursts,  followed  by  the  early  email  software  known  as  SMTP  (simple  mail
               transfer protocol).
                   Industry  and  the  State  Department  were  already  scouring  the  Earth  for  what  the  new
               cybernetic weapon would need: lead and cadmium for circuit boards, lead oxide and barium for
               monitor cathode ray tubes, mercury for switches and flat screens, brominated flame retardants,
               and most recently niobium and titanium for superconduction. Resources, dictators and war are
               practically synonymous.
                   From the beginning, the National Security State had plans for Vannevar Bush’s democratic
               dream. Computers as multiprocessors were churned out: the 360 IBM series with the internal
               military-intelligence  compatibility,  Seymour  Cray’s  6600,  7600,  and  Cray  I,  Intel’s
               microprocessor mesh Paragon, and Xerox PARC mouse-windows and ALTO in 1971.
                   And then came the supercomputer with its customized units called blades housing multiple
               nodes (CPUs, GPUs). Imagine 10 quadrillion calculations per second (10 petaflops). . .But then
               something  happened  in  the  1980s—the  theft  of  a  piece  of  computer  software—that  secretly
               ricocheted through world events even more powerfully than the Enigma.



                                                THE PROMIS BACKDOOR


               Beyond  embedded  journalists,  news  blackouts,  false  flag  events,  blacklisted  and  disappeared
               Internet domains—the plotline of America’s “free press”—there are now ISP-filtering programs
               subject to Homeland Security guidelines that sift through emails and toss some into a black hole.
               Insiders and the NSA-approved, however, can get around such protections of networks by means
               of the various hybrids of the PROMIS backdoor.
                   The 1980s theft of the Prosecutor’s Management Information System (PROMIS) software
                                                                                                     3
               handed over the golden key that would grant most of the world to a handful of criminals.  In fact,
               this one crime may have been the final deal with the devil that consigned the United States to its
               present shameful descent into moral turpitude. 4
                   PROMIS began as a COBOL-based program designed to track multiple offenders through
               multiple databases like those of the DOJ, CIA, U.S. Attorney, IRS, etc. Its creator was a former
               NSA analyst named William Hamilton. About the time that the October Surprise Iranian hostage
               drama was stealing the election for former California governor Ronald Reagan and former CIA
               director George H.W. Bush in 1980, Hamilton was moving his Inslaw Inc. from non-profit to
   124   125   126   127   128   129   130   131   132   133   134