Page 129 - Elana Freeland - Under an Ionized Sky
P. 129
From ferrite-core memory and transistors to hard disks, linked modular mainframes,
Sketchpad, and vacuum tubes to solid-state logic, the military-industrial-intelligence complex
zeroed in on cybernetics. In 1961 the silicon crystal chip miniaturized the memory storage that
transistors had been handling, packet switching and digital expanded the bandwidth and laid out
the redundant, multilevel web for teletype data and voice.
After the Cuban Missile Crisis of 1962, Secretary of Defense McNamara called for
automated intelligence production. The Defense Intelligence Agency (DIA) already had an
Automatic Data Processing Center on a rented IBM 360/30 mainframe that could index, store,
and retrieve intelligence like U-2 photos of Soviet military installations. The RAND packet-
switching idea had a go, born out of a need for an alternate Cold War command-and-control (C2)
network. The first linkup of Pentagon computers talking to each other in a closed network of
2
ARPANET known as COINS (Intelligence Community Computer Communication Network)
was launched on December 31, 1966 from the DIA Security Office. Streams of digital data were
broken into short bursts, followed by the early email software known as SMTP (simple mail
transfer protocol).
Industry and the State Department were already scouring the Earth for what the new
cybernetic weapon would need: lead and cadmium for circuit boards, lead oxide and barium for
monitor cathode ray tubes, mercury for switches and flat screens, brominated flame retardants,
and most recently niobium and titanium for superconduction. Resources, dictators and war are
practically synonymous.
From the beginning, the National Security State had plans for Vannevar Bush’s democratic
dream. Computers as multiprocessors were churned out: the 360 IBM series with the internal
military-intelligence compatibility, Seymour Cray’s 6600, 7600, and Cray I, Intel’s
microprocessor mesh Paragon, and Xerox PARC mouse-windows and ALTO in 1971.
And then came the supercomputer with its customized units called blades housing multiple
nodes (CPUs, GPUs). Imagine 10 quadrillion calculations per second (10 petaflops). . .But then
something happened in the 1980s—the theft of a piece of computer software—that secretly
ricocheted through world events even more powerfully than the Enigma.
THE PROMIS BACKDOOR
Beyond embedded journalists, news blackouts, false flag events, blacklisted and disappeared
Internet domains—the plotline of America’s “free press”—there are now ISP-filtering programs
subject to Homeland Security guidelines that sift through emails and toss some into a black hole.
Insiders and the NSA-approved, however, can get around such protections of networks by means
of the various hybrids of the PROMIS backdoor.
The 1980s theft of the Prosecutor’s Management Information System (PROMIS) software
3
handed over the golden key that would grant most of the world to a handful of criminals. In fact,
this one crime may have been the final deal with the devil that consigned the United States to its
present shameful descent into moral turpitude. 4
PROMIS began as a COBOL-based program designed to track multiple offenders through
multiple databases like those of the DOJ, CIA, U.S. Attorney, IRS, etc. Its creator was a former
NSA analyst named William Hamilton. About the time that the October Surprise Iranian hostage
drama was stealing the election for former California governor Ronald Reagan and former CIA
director George H.W. Bush in 1980, Hamilton was moving his Inslaw Inc. from non-profit to