- In the past year, I have been threatened with a libel
suit in London from a rich Saudi billionaire whose Washington-based law
firm that just so happens to have a former Bush-Cheney campaign finance
chairman and one of George W. Bush's closest Texas pals as two of its major
partners.
-
- In addition, I have earned the attention of an Orwellian
Ministry of Truth-like "counter-propaganda" office at the U.S.
Department of State, which maintains a web site that criticizes my articles.
It is against U.S. law for the International Public Diplomacy unit to directly
respond to my counter-arguments, they can only legally respond to foreign
queries and not from U.S. citizen journalists whom they cavalierly attack.
-
- Plus, the White House and some officials in the U.S.
intelligence community apparently have found it necessary to suppress from
publication my book on corruption in the oil industry and defense contracting
community.
-
- And I have now been threatened by the company CACI International,
which, according to the Taguba Report, was involved in the prison torture
at Abu Ghraib. The threat was based on a very important story concerning
contract fraud and corruption at the super secret National Security Agency
(NSA)"America's premier electronic surveillance body.
-
- Unlike Newsweek, CBS News and 60 Minutes, and the Public
Broadcasting System and National Public Radio, I do not intend to allow
the friends of Bush and the globally-despised U.S. military intelligence
complex to stymie my right to report on the graft and corruption and the
steady move toward fascism from my vantage point inside the Washington
Beltway. To George W. Bush, Dick Cheney, Karl Rove, CACI (and its law firm
Steptoe & Johnson), and Akin Gump Strauss Hauer & Feld and its
Bush buddies and Saudi paymasters, I have one simple admonition: "Go
to Hell!"
-
- And to show that I mean business, I will soon establish
a website called the Wayne Madsen Report that will expose the bottom dwelling
vermin now infesting our body politic. In the finest tradition of H. L.
Mencken, Drew Pearson and Jack Anderson, Edward R. Murrow and other hard
hitting members of the Fourth Estate, I have a simple warning: if you hold
political office or another responsible position in this three degrees
of separation town called Washington and you steal taxpayer's money, hypocritically
proclaim born-again Christianity and then go out and beat up a female prostitute
or call a gay male prostitute hot line, get busted for publicly urinating
on Capitol Hill, or engage in disloyal behavior against the United States,
you can be sure your name and your activities will be featured on the website.
You will be held accountable"it's as simple as that. You may not have
to worry about The Washington Post or CNN, but you will have to contend
with me.
-
- And for federal law enforcement officials who find it
proper or exciting to subpoena journalists' notebooks and require testimony
before grand juries, forget about me. I won't play your political games.
I'll gladly go to prison rather than subject myself and my sources to interrogations
from a neocon fascist regime.
-
- The Neocon Power Grab at the NSA
-
- Now more on what is happening at NSA and how it is adversely
affecting U.S. national security. On August 1, 2001, just five and a half
weeks before the 911 attacks, NSA awarded Computer Sciences Corporation
(CSC) a more than $2 billion, 10-year contract known as GROUNDBREAKER.
The contract was never popular with NSA's career professionals.
-
- Although GROUNDBREAKER was limited to outsourcing NSA's
administrative support functions such as telephones, data networks, distributed
computing, and enterprise architecture design, the contract soon expanded
into the operational areas"a sphere that had always been carefully
restricted to contractors. NSA was once worried about buying commercial-off-the-shelf
computer components such as semiconductors because they might contain foreign
bugs. NSA manufactured its own computer chips at its own semiconductor
factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing
mania at Fort Meade will soon involve foreign help desk technical maintenance
provided from offshore locations like India.
-
- CSC had originally gained access to NSA through a "buy
in" project called BREAKTHROUGH, a mere $20 million contract awarded
in 1998 that permitted CSC to operate and maintain NSA computer systems.
When General Michael V. Hayden took over as NSA director in 1999, the floodgates
for outside contractors were opened and a resulting deluge saw most of
NSA's support personnel being converted to contractors working for GROUNDBREAKER's
Eagle Alliance (nicknamed the "Evil Alliance" by NSA government
personnel), a consortium led by CSC.
-
- NSA personnel rosters of support personnel, considered
protected information, were turned over to Eagle, which then made offers
of employment to the affected NSA workers. The Eagle Alliance consists
of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal
Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications,
TRW (Raytheon), Verizon, and Windemere.
-
- In October 2002, Hayden, who has now been promoted by
Bush to be deputy director of National Intelligence under John Negroponte,
opened NSA up further to contractors. A Digital Network Enterprise (DNE)
team led by SAIC won a $280 million, 26-month contract called TRAILBLAZER
to develop a demonstration test bed for a new signals intelligence processing
and analysis system. SAIC's team members included Booz Allen Hamilton,
Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER,
according to Hayden's own testimony before the Senate Select Committee
on Intelligence, is now behind schedule and over budget to the tune of
over $600 million.
-
- But that is not the only consequence of these two mega-contracts
for NSA's ability to monitor global communications for the next 911, which
could be a terrorist nuclear strike on the United States.
-
- NSA insiders report that both contract teams have melded
into one and that NSA's operations are being adversely impacted. From simple
tasks like phones being fixed to computers being updated with new software,
the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team
members are rife with former NSA top officials who are reaping handsome
bonuses from the contracts"and that has many NSA career employees
crying conflict of interest and contract fraud.
-
- CACI, called "Colonels and Captains, Inc."
by critics who cite the revolving door from the Pentagon to its corporate
office suites, counts former NSA Deputy Director Barbara McNamara as a
member of its board of directors. CACI alumni include Thomas McDermott,
a former NSA Deputy Director for Information Systems Security. Former NSA
Director Adm. Mike McConnell is a Senior Vice President of Booz Allen.
Former NSA Director General Ken Minihan is president of the Security Affairs
Support Association (SASA), an intelligence business development association
that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General
Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER
and TRAILBLAZER contractors, among its membership. SASA's board of directors
(surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished
advisers is none other than General Hayden.
-
- Although contractors are required to have the same high
level security clearances as government personnel at NSA, there are close
connections between some NSA contractors and countries with hostile intelligence
services. For example, CACI's president and CEO visited Israel in early
2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem
attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony
honoring CACI's president was sponsored by the Aish HaTorah yeshiva fund.
The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski,
was also in attendance. The U.S. delegation included a number of homeland
security officials and businessmen.
-
- CACI has also received research grants from U.S.-Israeli
bi-national foundations. A few months after the award ceremony for CACI's
president, the Taguba Report cited two CACI employees as being involved
in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander
for the Iraqi prisons, General Janis Karpinski, reported that she witnessed
Israeli interrogators working alongside those from CACI and another contractor,
Titan.
-
- When the Taguba Report was leaked, the office of Deputy
Defense Secretary for Policy Douglas Feith issued an order to Pentagon
employees not to download the report from the Internet. Feith is a well-known
hard-line supporter of Israel's Likud Party.
-
- According to the Jewish Telegraph Agency, some six months
before the Abu Ghraib torture scandal was first uncovered, one of Feith's
assistants, Larry Franklin, met with two officials of the American Israel
Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington,
Virginia. According to FBI surveillance tapes, Franklin relayed top secret
information to Steve Rosen, AIPAC's then policy director, and Keith Weissman,
a senior Iran analyst with AIPAC. Franklin has been indicted for passing
classified information to AIPAC. In addition, three Israeli citizens have
been identified as possible participants in the spy scandal. They are Naor
Gilon, the political officer at the Israeli embassy in Washington; Uzi
Arad, an analyst with the Institute for Policy and Strategy in Herzliya
(the northern Tel Aviv suburb where the headquarters of Mossad is located);
and Eran Lerman, a former Mossad official who is now with the American
Jewish Committee.
-
- What has some NSA officials worried is that with pro-Israeli
neocons now engrained within the CIA, Defense Intelligence Agency (DIA),
State Department, and National Security Council, NSA is ripe for penetration
by Israeli intelligence.
-
- NSA has a troubled past with Israel. In 1967, Israeli
warplanes launched a premeditated attack on the NSA surveillance ship,
the USS Liberty, killing and wounding a number of U.S. sailors and NSA
civilian personnel. Convicted Israeli spy Jonathan Pollard compromised
a number of NSA sensitive sources and methods when he provided a garage
full of classified documents to Israel.
-
- But NSA is also aware of an incident where Israelis used
a contractor, RCA, to gain access to yet additional NSA sources and methods.
In the 1980s, against the wishes of NSA, the Reagan administration forced
NSA to permit RCA, one of its major contractors, to develop a tethered
aerostat (balloon) signals intelligence and direction finding system for
the Israeli Defense Force. According to NSA officials, the Israeli-NSA
joint project, codenamed DINDI, was established at a separate facility
in Mount Laurel, New Jersey, and apart from the main NSA developmental
center at RCA's facility in Camden, New Jersey. Although NSA and RCA set
up a strict firewall between the contractors national intelligence contract
work and the separate DINDI contract, Israeli engineers, who were working
for Mossad, soon broke down the security firewall with the assistance of
a few American Jewish engineers assigned to the DINDI project. The security
breach resulted in a number of national intelligence developmental systems
being compromised to the Israelis, including those code named PIEREX and
MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding
the American Jewish engineers, the Reagan Justice Department avoided bringing
espionage charges. There were some forced retirements and transfers, but
little more. But for NSA, the duplicity of the Israelis added to the enmity
between Fort Meade and Israeli intelligence.
-
- With outside contractors now permeating NSA and a major
Israeli espionage operation being discovered inside the Pentagon, once
again there is a fear within NSA that foreign intelligence services such
as the Mossad could make another attempt to penetrate America's virtual
"Fort Knox" of intelligence treasures and secrets.
-
- Thanks to some very patriotic and loyal Americans inside
NSA, this author is now in possession of an internal NSA contract document
from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed
the Eagle Alliance and other contractors to gain access to and even virtual
control over some of the most sensitive systems within the U.S. intelligence
community. One suspect in this unchecked outsourcing is the person Hayden
hired from the outside to act as special adviser to his Executive Leadership
Team, Beverly Wright, who had been the chief financial officer Legg Mason
Wood Walker in Baltimore. Before that, Wright had been the chief financial
officer for Alex Brown, the investment firm at which George W. Bush's grandfather,
Prescott Bush, once served as a board member. As one senior NSA official
sarcastically put it, "She's highly qualified to work in intelligence!"
-
- According to the document, the future of some 10,000
Windows NT and UNIX workstations and servers that handle some of NSA's
most sensitive signals intelligence (SIGINT)"the Signals Intelligence
Directorate workstation upgrade is code named BEANSTALK"and electronics
intelligence (ELINT) applications, including databases that contain communications
intercepts, are now firmly in the grasp of the Eagle Alliance. Operational
workstations are being migrated to a less-than-reliable Windows/Intel or
"WINTEL" environment. The document boldly calls for the Eagle
Alliance to establish a SIGINT Service Applications Office (SASO) to "provide
and maintain Information Technology services, tools, and capabilities for
all [emphasis added] SIGINT mission applications at the NSA." This
is a far cry from the non-operational administrative support functions
originally specified in the GROUNDBREAKER contract.
-
- The document also calls for NSA to provide extremely
sensitive information on SIGINT users to the contractors: "Identification
of target sets of users in order to successfully coordinate with the Eagle
Alliance modernization program."
-
- The Eagle Alliance is involved in a number of systems
that impact on other members of the U.S. intelligence community, foreign
SIGINT partners, and national command authorities. These systems include
INTELINK, Common Remoted Systems, National SIGINT Requirements Process,
Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center)
Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network
Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing
Services, Automatic Message Handling System, CRITIC Alert, Cross Agency
Multimedia Database Querying, Message Format Converter, Central Strategic
Processing and Reporting, Collection Knowledge Base, Language Knowledge
Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services,
Speech Information Extraction, Dominant Facsimile Processing System and
DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding
(HFDF) Database, Satellite database, Protocol Analysis Terminal, Global
Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems
Utilities, Message Server, Extended Tether Program, Language Knowledge
Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY
Support (SIGINT Analysis and Reporting), and the SIGINT interception database
ANCHORY and the ELINT database WRANGLER. In fact, the document states that
the contractors' plans foresee the inclusion of NSA's intelligence community
partners (foreign and domestic) in the contractors' revamping of NSA's
operational systems.
-
- The servers include those that support mission-critical
National Time Sensitive Systems (NTSS). These National Time Sensitive System
servers have been assigned various cover terms: CANUCKS, DOLLAR, EASTCAKE,
HEALYCUFF, MUDDYSWELT, NEEDYWHAT, RIMTITLE, RISKDIME, ROWLOAD, SEAWATER,
CURACAO, HALF, HEALYMINK, LEARNGILT, LINEFURL, MOBLOOSE, SPELLBEAK, and
THOSEHOT.
-
- A number of SIGINT applications are also impacted by
the outsourcing mania. They are also assigned cover terms: ADVERSARY, ADVERSARY
GOLD, CHECKMATE, FANBELT, FANBELT II, FIREBLAZE, GALE-LITE (the primary
owner of which is DIA), GALLEYMAN, GALLEYPROOF, JAGUAR, KAFFS, MAGNIFORM,
MAINCHANCE, OILSTOCK, PATHSETTER, PINSETTER, SIGDASYS FILE II, III, and
KL, TEXTA, and SPOT.
-
- In fact, the document indicates that literally hundreds
of NSA intelligence applications are now subject to the whims of outside
contractors. These systems include: ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE,
AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER,
ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT,
ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC, BABBLEQUEST, BACKSAW, BANYAN,
BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD,
BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX,
BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER,
BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD,
BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER,
BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE,
BULK, BUMPER, CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER,
CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE,
CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT,
CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER,
CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF,
CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS,
CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE,
COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR,
CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE,
CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE,
CYBERENGINE, CYGNUS, DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER,
DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO,
DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO,
DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST, EAGERNESS,
EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR,
EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER,
EXTENDER, EXTRACTOR, EUREKA, EYELET, FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT,
FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT,
FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN,
FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX,
FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR,
FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA,
FREESTONE, FRENZY/GRANULE, FUSEDPULL, GALAXYDUST, GARDENVIEW, GATCHWORK,
GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE,
GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS,
GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM,
GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE,
GREMLIN, GUARDDOG, GUIDETOWER, HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING,
HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II,
HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN,
HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON,
HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE, ICARUS, ICICLE,
IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA,
INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE,
IVORY SNOW, JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ,
JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER,
KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS,
KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS,
KRYPTONITE, LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME,
LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN,
LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR,
LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY, MACEMAN, MACHISMO,
MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK,
MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS,
MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM,
MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON),
MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX,
MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY,
NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH,
NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST,
NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC, OAKSMITH, OBLIGATOR,
OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD
2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS,
OUTFLASH, OUTREACH, PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON,
PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER,
PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE,
PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM
PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE,
POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE
DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER,
PROTOVIEW, PUFFERFISH, PYTHON II, RAP, RAPPEL, QUARTERBACK, QUASAR, QUEST,
QUICKER, QUICKSILVER, RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET,
RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY,
RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT,
REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR,
RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER,
ROSEVINE, RUTLEY, SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA,
SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT,
SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY,
SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER,
SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK,
SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL,
SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER,
SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH
II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY,
SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER,
SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE,
STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE,
STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL,
SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT,
TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS,
TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY,
THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE,
TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II,
TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED,
TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER,
TSUNAMI, TWILIGHT, TWOBIT, UMORPH, UNLIMITED, VIEWEXCHANGE, VEILED DATABASE,
VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION,
VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED, WARGODDESS, WARSTOCK,
WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER"ACCESS
TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE
SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART,
WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP, XVTUBA, YELLOWSTONE, YETLING,
ZENTOOLS, ZIGZAG, and ZIRCON.
-
- Wayne Madsen is a Washington, DC-based investigative
journalist and nationally-distributed columnist.
-
-
-
- Comment
- From Ted Twietmeyer
- 5-24-5
-
- In my former 20+ year life as a DoD and NASA contractor,
even back in the 80's and 90's Computer Sciences Corp (CSC) already had
infested the technical positions all through the government. I reviewed
many RFP documents (Request For Proposal) that had the CSC logo down in
the lower right corner on each page. Many of these documents were hundreds
of pages long. Even back in the 90's, there were about as many CSC employees
at NASA as regular NASA govt. employees. Therefore, the NSA "takeover"
is far from surprising.
-
- And who said the government itself is immune to NAFTA
and GATT ?
|