Michael Riconosciuto, PROMIS

John Young jya at pipeline.com
Mon Dec 6 12:52:31 PST 2004


Cryptome hosts a 2000 book excerpt on PROMIS as
allegedly used by Mossad, though not much about
the technical details of the program:


http://cryptome.org/promis-mossad.htm

The file has links to other information on Riconosciuto
offered by Orlin Grabbe, a long-time supporter of
Riconosciuto.

Back then we telephoned Hamilton about his DoJ travails
and he politely refused to discuss the topic.

A TEMPEST backdoor in PROMIS would be interesting
for what it would take configure code to emit identifiable
signals. Code emits signals, as does any transmission, 
but not easily identifiable or correlatable with the code, 
but perhaps it can be done. 

Capabilities and sensitivity of interception is a dark world, 
as was TEMPEST in its early years. Now what passes 
for knowledge about TEMPEST is hardly all there is to 
know. Indeed, some think that most of the information 
about the technolody now in the public domain is disinfo.

The TEMPEST material released under FOI to Cryptome 
some years ago should be seen as part of the camouflage
about what's now being done in EM interception,
analysis, tracking, and not least, smoke blowing.

PROMIS is sufficiently old, if not a hoary horse, that
it could be used now to honey-pot eager buyers to
induce trust where it's not to be found, following the 
lead of Bill Gates, if not floater Robert Maxwell. Intel has
come a long way since the lazy days of the Cold War
when agent double-crossing and the inside US/USSR
mil-joke-con of Mutually Assured Destruction was all to 
worry about.





More information about the cypherpunks-legacy mailing list