Vicky Davis

Vicky Davis, who maintains the website, was a contract Compuer Systems Analyst/Programmer.  After the year 2000, she could no longer find contracts for her skills even though she had 20 years of solid and successful of experience.  She believes the loss of her career is the result of the Knowledge Trade Initiative, which deliberately outsourced many, many American knowledge jobs primarily to India.   

The Interviews:

Vicky Davis – 6/1/10 Interview:

Vicky Davis – 9/22/09 Interview:

Vicky Davis – 9/23/08 Interview:

Vicky Davis – 12/4/07 Interview:


Vicky Davis- 12/04/07

Silent War: Privatized government is conducting low-intensity conflict (i.e., terrorism) against the people of the U.S. It is an information war and a form of cultural warfare.

The New Federalism: The Clinton administration re-invented government, passing framework legislation, based on implementation and funding by NGO’s (non-governmental organizations- note: This violates constitution). For example, the Smart Growth Network, funded by the EPA, got grants from federal agencies and private entities. Agenda 21 (UN Agenda for the Twenty-First Century) was a coup d’etat in which government functions were contracted out to private corporations. The new government structures amount to a “market-based government.” Check report by William Perry, Ashton Carter, and Phillip Zelikow, entitled “Catastrophic Terrorism- Elements of a National Preventative Policy.” In 1991/1992, under Bush senior, Douglas Noble and a committee of corporations wrote “New American Schools for the New World Order.” The board of the “New American Schools Development Corporation” includes James Jones, James Baker, John Clendenon, and Louis Gerschner (CEO of IBM).

Agenda 21. under the banner of “smart growth” (thank you, George Orwell) and environmentalism, calls for re-wilding huge sections of the U.S. It tries to establish special places, called World Heritage Sites. President Clinton’s “Council on Sustainable Development” mandated that city mayors had to be engaged in “sustainable development.” He set up “Conference of Mayors,” an international conference in Paris. Participants included the Aspen Institute of France and the Aspen Institute of Berlin. This was followed by “Transatlantic Summit of Mayors” in 2000.

The Coup d”Etat: The 9/11-NAU (North American Union) connection is the establishment of the Free Trade Agreement of the Americas (FTAA). Colin Powell signed the Inter-American Democratic Charter on 9/11/2001. This is intended to be the Magna Carta of the Americas. In the early 1990’s, Sandy Berger, working for Anthony Lake (Department of National Security) set up the merger of all governments of all countries in the western hemisphere. Goal was to have four summits, set direction of working groups with representatives of each country to “harmonize” the laws and coordinate the policies of the future “Pan-American Union.” (By the way, all this is highly treasonous to the U.S. Constitution and to the American people). However, when John Deutch left the CIA, Lake couldn’t be confirmed, and George Tenet was selected to be CIA director. At the time, Tenet was lobbying for the Solar Industry. Senator David Boren then selected him to be his Chief of Staff, where he worked on CIA issues. As CIA director, all Tenet did was establish a paper trail on “Osama the boogie man” (the designated patsy of 9/11 and other government-sponsored synthetic terrorism acts). Check out the movie: Invasion of the Body Snatchers. BORSTOR. The Plan, the Code name for Operation 9/11 was “The Big Wedding,” because it was supposed to be catalyst for merger of all western hemisphere countries.

As a systems analyst, Vicky Davis was trained to look for the conceptual thinking behind the words, using the Yourdan Method, that helps you identify major processes, organize information and create indices and a hierarchy of concepts. Total Information Awareness- the computer system- springs from DARPA- of the Dept. of Defense.

The NAFTA corridors are planned to be smart corridors, totally automated, with remote sensors so that they can ID the people in cars. They will be designed to toll you by the mile using surveillance software of total domain awareness. GIS (Geographic Information Systems), P-tech and Promis software technology will be used to establish command and control centers.

The New Federalism: Book report, “The Blair House Papers,” by Clinton and Gore, indicates that the era of big government is over. Now, government is “privatized” through contracting out government functions to private corporations. Al Gore headed up the FTAA and re-invention of government. The new American way of war will be to use Command and Control Centers. Thomas Barrett, professor at the R.I. Military College, drew up the Pentagon’s New Map. He is father of net-centered warfare- 21st century military force. The old model is no longer needed. Art Sobrosky, author of The New American Way of War has website. Now military will utilize “effects-based operations” (i.e., terrorism), using small teams like Al Qaeda (aka Al CIA-duh), working groups (teams of government workers from the U.S., Canada and private sector, etc.), and think tanks (to write policy papers, etc.). The Report from Iron Mountain was written by the Rand Corporation and IBM.

Vicky Davis- 9/23/08 

9/11 as a computer crime?

Davis stated that on the morning of 9/11 there was denial of service to the risk management system designed block such attacks.  I didn’t say that (although I’ve read that)  – what I said was that the emergency open communications line between the FAA and NMCC went dead – neither party was aware of it and it is my belief that the PTECH software was used to shut it down.

A key piece of software used on 9/11 was owned by the company PTECH.  PTECH has connections to the PROMIS software, which was written for the Justice Department by Bill Hamilton of Inslaw.  PROMIS allowed operators to traverse justice department systems to obtain information on cases including investigations and assets listed in bankruptcies.  The only way this could have been done is if the software had a “back door” through the IBM hardware controller.  “This is arcane knowledge,” and only a highly trained IBM technical support person could have devised it.  The Justice Department under Attorney General Edwin Meese confiscated the software and wouldn’t pay Hamilton, inventor of the software.  Hamilton sued and after years of litigation, when Inslaw was about to go under, they were rescued by IBM.  Rescue by IBM meant that IBM then owned the PROMIS software.

Indira Singh, Consulting Systems Analyst to J.P. Morgan for Morgan’s Risk Management systems on 9/11, has maintained that Arab’s were trying to sell PTECH software to J.P. Morgan bank.  But because of inconsistencies (to a fellow Systems Analyst) in Singh’s testimony, Vicky believes this may be just a cover story.  IBM marketed PTECH “Framework” software that produces tables and lists of all resources on the computer.  It provided a ‘window on the world’ into the computer system.  The “back door” capability of PROMIS built into the PTECH software was a way to get into the bank’s software by stealth, without at user ID or password.   This corresponds to the Congressional investigation of the Inslaw software in the 1990’s.

A 1992 Congressional investigation included allegations that the FBI was being subverted.  When FBI agents wanted  to execute a raid, they would find that evidence would be gone.  Apparently, criminals were being informed ahead of time that they were being investigated.   The implication is that the PROMIS software had the backdoor and that back door was being exploited to warn off criminals that they were being investigated.  Noteworthy – the CEO of IBM in the 1990’s, Louis Gerstner, Jr., later became CEO of the Carlyle Group.

Vicky began her career in 1976 in Silicon Valley.  And based on her experience there, she thinks she knows how the PTECH “back door” might have worked.  One company she interviewed with wrote software for a warehouse system involving fork lifts and wireless communication.  This wireless communication allowed the forklift operator to update the computer inside the warehouse even while he was driving the forklift.  If a similar (very low tech) strategy was used on 9/11, this “Trojan Horse,” could have been simply a chip on a circuit board.  All they would need to do is record the first 25 characters and they could hack into any corporate and government computer system. Using a keystroke recorder burned into the extra chip along with passive communications software that would upload the characters on demand, the hacker could obtain the User ID and Password of any User on the system.

If that’s the way they did it, it would have been the perfect crime.  One person could have shutdown the line connecting the FAA and NMCC (National Military Command and Control).  “Coincidentally,” the person manning the NMCC on the morning of 9/11 was a first day employee and his boss was away at a meeting.  So the new man on the job didn’t even know that on the morning of 9/11 the communication between FCC and NMCC was down.

Vicky believes that a coordinated sequence of events lead to PTECH and 9/11.  At the G-8 meeting in Houston in 1999 at the 2000 United Nations meeting in Okinawa, Japan, there was considerable talk about bridging the “digital divide,” that is, the gap between developed and undeveloped countries.  The Plan of Action presented in Genoa was for governments and NGO’s (non-governmental organizations) to bring the internet to under—developed countries.  The partnership team to help implement this included MARKLE, headed by Zoe Baird, Anderson Consulting Company, the Chubb Corporation, and AIG.   The idea was to export our knowledge jobs (bio-tech, computer, etc.) to India.  At that time, the US economy was 65% dependent on the knowledge industry.  On Nov. 9, 2001, President Bush signed the Knowledge Trade Initiative which was a torpedo to our economy.

New Federalism

Under Clinton and Gore’s “re-inventing government”  program, they implemented what has been termed ‘New Federalism’ which is essentially the privatization of government.  Congress passes framework legislation and funding; but the programs are implemented by a partnership of Foundations and Non-Governmental organizations – funded by corporations.  This leaves in place the façade of a federal government but it is actually closer to the German model of socialism (ref. Ludwig Von Mises).

The Harvard paper written by Phillip Zelikow and Ashton Carter lays this out: “Catastrophic Terrorism, a National Policy” includes a reference to “market-based governance.”   ‘New Federalism is market-based ‘governance.  There is a video on Newt Gingrich’s website where Elaine Kamarck, PhD describes market-based governance in a presentation titled, “End of Government As We Know it” .  Clinton’s ‘New Federalism’ was the end of constitutional government and the beginning of the communist system of “governance by soviets” with soviet being defined as councils or committees.

The soviet system corresponds to the idea of “virtual government,” where all policies come from a central source.  The policies come from the EU and UN in Geneva (or where ever), and then are implemented by NGO’s.  But in this “virtual government,” there is no representation for people.  The most active part of the United Nations is UNESCO.  Their sustainable development groups are charged with  implementing U.N. environmental policies.  Under the heading of accountability, they have to tag and inventory everything because remote “governance” requires computerized monitoring of the performance of the soviets and the level of cooperation of the people.

The World Bank plan is to measure our productivity relative to the resources we consume.   If the ratio of our productivity to consumption is over 1 that’s OK, but if not, you are a “useless eater,” and perhaps need to be disposed of.  This idea is codified in the U.N. term, “family dependency ratio,” which refers to this kind of analysis being applied to an entire family.

These ideas are kind of implicit in what they write about their “poverty reduction strategies.”  The strategy is that under-developed countries would get development dollars if they reduce poverty.  To even get the development dollars, then, third world leaders more or less have to eliminate the poor.   The “poverty reduction” campaigns are eliminating poor people in Africa.  Indeed, much of the modern environmental movement traces back to the eugenics movement.  The definition of the environment as “everything we touch and everything that touches us” justifies the totalitarian control of everything under the heading of efficient utilization of resources.  This corresponds to the The Report from Iron Mountain, written by the Rand Corporation concerning population reduction.  It is Vicky’s believe that this report is real and that it served to provide the plan to the various players. Indeed, our government is fomenting revolution in a lot of countries.

Turnkey Democracy and Revolution

The National Endowment for Democracy (NED) is a granting agency funded by the U.S. government that provides grants four organizations representing business, labor, the International Republican Institute, National Democratic Institute.  NED provides “turn-key democracy”  through the soviet system of NGO’s.  NED has been linked to the “Color Revolutions” that are now going on all over the world.

Control of Resources by Supply Chain

Our transportation system and transportation systems all over the world are being redesigned to facilitate “supply chain management.”  The monopoly cartels will control all supplies through supply chain management.  For example, Dell Computers have lots of components.  Each component generates orders and each of these generates lots of smaller orders.  The idea is that if you want to stay in business you control all aspects of the supply chain, thereby putting everyone else out of business.

Thus, we have to break up the monopolies.  It seems that Sec. of Treasury Paulson and Fed Reserve Chairman Bernanke want to set up an E-Bay style auction to handle the junk assets.  Only in this reverse auction, the government rewards the lowest bidder.  This is essentially D-Day for the capitalistic system and it gives Secretary Paulson unprecedented control over the economy and the system.  It also sets up a new market mechanism.  It is not a bail out, per se.  All these pieces of legislation have U.N. Agendas embedded in them.   If you control the supplies – you control country.

If this evil program is implemented, the UN system of “governance by soviets” will have complete control- forever.  The concept of “virtual governance” by computer system includes a national health care system.  The nationalization of medical records and outcome performance measuring provides the capability for human experimentation and potentially genetic modification- of people.  What scares Vicky, is that they could create a population of drones, like an ant colony, using genetic modification.

Essentially 9/11 was part of a Mind War experiment- to see how the population would react when you couple emotional shock with absurd explanations.

At first, all government revenues were from tariffs.  Then in 1913, tariffs were cut in half, with the remaining being paid by American citizens and business.  This has resulted in the indenture of the American people.  Now our labor is collateral to the bankers.  Americans need to awaken and snap out of their dream-sleep.