Untitled Document
May 24, 2005—In the past year, I have been threatened with a libel suit
in London from a rich Saudi billionaire whose Washington-based law firm that just
so happens to have a former Bush-Cheney campaign finance chairman and one of George
W. Bush's closest Texas pals as two of its major partners.
In addition, I have earned the attention of an Orwellian Ministry of Truth-like
"counter-propaganda" office at the U.S. Department of State, which
maintains a web site that criticizes my articles. It is against U.S. law for
the International Public Diplomacy unit to directly respond to my counter-arguments,
they can only legally respond to foreign queries and not from U.S. citizen journalists
whom they cavalierly attack.
Plus, the White House and some officials in the U.S. intelligence community
apparently have found it necessary to suppress from publication my book on corruption
in the oil industry and defense contracting community.
And I have now been threatened by the company CACI International, which, according
to the Taguba Report, was involved in the prison torture at Abu Ghraib. The
threat was based on a very important story concerning contract fraud and corruption
at the super secret National Security Agency (NSA)—America's premier electronic
surveillance body.
Unlike Newsweek, CBS News and 60 Minutes, and the Public Broadcasting System
and National Public Radio, I do not intend to allow the friends of Bush and
the globally-despised U.S. military intelligence complex to stymie my right
to report on the graft and corruption and the steady move toward fascism from
my vantage point inside the Washington Beltway. To George W. Bush, Dick Cheney,
Karl Rove, CACI (and its law firm Steptoe & Johnson), and Akin Gump Strauss
Hauer & Feld and its Bush buddies and Saudi paymasters, I have one simple
admonition: "Go to Hell!"
And to show that I mean business, I will soon establish a website called the
Wayne Madsen Report that will expose the bottom dwelling vermin now infesting
our body politic. In the finest tradition of H. L. Mencken, Drew Pearson and
Jack Anderson, Edward R. Murrow and other hard hitting members of the Fourth
Estate, I have a simple warning: if you hold political office or another responsible
position in this three degrees of separation town called Washington and you
steal taxpayer's money, hypocritically proclaim born-again Christianity and
then go out and beat up a female prostitute or call a gay male prostitute hot
line, get busted for publicly urinating on Capitol Hill, or engage in disloyal
behavior against the United States, you can be sure your name and your activities
will be featured on the website. You will be held accountable—it's as
simple as that. You may not have to worry about The Washington Post or CNN,
but you will have to contend with me.
And for federal law enforcement officials who find it proper or exciting to
subpoena journalists' notebooks and require testimony before grand juries, forget
about me. I won't play your political games. I'll gladly go to prison rather
than subject myself and my sources to interrogations from a neocon fascist regime.
The Neocon Power Grab at the NSA
Now more on what is happening at NSA and how it is adversely affecting U.S.
national security. On August 1, 2001, just five and a half weeks before the
9–11 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than
$2 billion, 10-year contract known as GROUNDBREAKER. The contract was never
popular with NSA's career professionals.
Although GROUNDBREAKER was limited to outsourcing NSA's administrative support
functions such as telephones, data networks, distributed computing, and enterprise
architecture design, the contract soon expanded into the operational areas—a
sphere that had always been carefully restricted to contractors. NSA was once
worried about buying commercial-off-the-shelf computer components such as semiconductors
because they might contain foreign bugs. NSA manufactured its own computer chips
at its own semiconductor factory at Fort Meade. Currently, NSA personnel are
concerned that outsourcing mania at Fort Meade will soon involve foreign help
desk technical maintenance provided from offshore locations like India.
CSC had originally gained access to NSA through a "buy in" project
called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted
CSC to operate and maintain NSA computer systems. When General Michael V. Hayden
took over as NSA director in 1999, the floodgates for outside contractors were
opened and a resulting deluge saw most of NSA's support personnel being converted
to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil
Alliance" by NSA government personnel), a consortium led by CSC.
NSA personnel rosters of support personnel, considered protected information,
were turned over to Eagle, which then made offers of employment to the affected
NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics,
CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus,
Superior Communications, TRW (Raytheon), Verizon, and Windemere.
In October 2002, Hayden, who has now been promoted by Bush to be deputy director
of National Intelligence under John Negroponte, opened NSA up further to contractors.
A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26-month
contract called TRAILBLAZER to develop a demonstration test bed for a new signals
intelligence processing and analysis system. SAIC's team members included Booz
Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC.
TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee
on Intelligence, is now behind schedule and over budget to the tune of over
$600 million.
But that is not the only consequence of these two mega-contracts for NSA's
ability to monitor global communications for the next 9–11, which could
be a terrorist nuclear strike on the United States.
NSA insiders report that both contract teams have melded into one and that
NSA's operations are being adversely impacted. From simple tasks like phones
being fixed to computers being updated with new software, the Eagle Alliance
has been a disaster. The Eagle Alliance and DNE team members are rife with former
NSA top officials who are reaping handsome bonuses from the contracts—and
that has many NSA career employees crying conflict of interest and contract
fraud.
CACI, called "Colonels and Captains, Inc." by critics who cite the
revolving door from the Pentagon to its corporate office suites, counts former
NSA Deputy Director Barbara McNamara as a member of its board of directors.
CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information
Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President
of Booz Allen. Former NSA Director General Ken Minihan is president of the Security
Affairs Support Association (SASA), an intelligence business development association
that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics,
Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER
contractors, among its membership. SASA's board of directors (surprise, surprise)
includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none
other than General Hayden.
Although contractors are required to have the same high level security clearances
as government personnel at NSA, there are close connections between some NSA
contractors and countries with hostile intelligence services. For example, CACI's
president and CEO visited Israel in early 2004 and received the Albert Einstein
Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister
Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by
the Aish HaTorah yeshiva fund. The ultra-Orthodox United Torah Judaism Party's
Jerusalem Mayor, Uri Lupolianski, was also in attendance. The U.S. delegation
included a number of homeland security officials and businessmen.
CACI has also received research grants from U.S.-Israeli bi-national foundations.
A few months after the award ceremony for CACI's president, the Taguba Report
cited two CACI employees as being involved in the prison torture at Abu Ghraib
prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis
Karpinski, reported that she witnessed Israeli interrogators working alongside
those from CACI and another contractor, Titan.
When the Taguba Report was leaked, the office of Deputy Defense Secretary for
Policy Douglas Feith issued an order to Pentagon employees not to download the
report from the Internet. Feith is a well-known hard-line supporter of Israel's
Likud Party.
According to the Jewish Telegraph Agency, some six months before the Abu Ghraib
torture scandal was first uncovered, one of Feith's assistants, Larry Franklin,
met with two officials of the American Israel Public Affairs Committee (AIPAC)
at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance
tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then
policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin
has been indicted for passing classified information to AIPAC. In addition,
three Israeli citizens have been identified as possible participants in the
spy scandal. They are Naor Gilon, the political officer at the Israeli embassy
in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy
in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is
located); and Eran Lerman, a former Mossad official who is now with the American
Jewish Committee.
What has some NSA officials worried is that with pro-Israeli neocons now engrained
within the CIA, Defense Intelligence Agency (DIA), State Department, and National
Security Council, NSA is ripe for penetration by Israeli intelligence.
NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a
premeditated attack on the NSA surveillance ship, the USS Liberty, killing and
wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli
spy Jonathan Pollard compromised a number of NSA sensitive sources and methods
when he provided a garage full of classified documents to Israel.
But NSA is also aware of an incident where Israelis used a contractor, RCA,
to gain access to yet additional NSA sources and methods. In the 1980s, against
the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of
its major contractors, to develop a tethered aerostat (balloon) signals intelligence
and direction finding system for the Israeli Defense Force. According to NSA
officials, the Israeli-NSA joint project, codenamed DINDI, was established at
a separate facility in Mount Laurel, New Jersey, and apart from the main NSA
developmental center at RCA's facility in Camden, New Jersey. Although NSA and
RCA set up a strict firewall between the contractors national intelligence contract
work and the separate DINDI contract, Israeli engineers, who were working for
Mossad, soon broke down the security firewall with the assistance of a few American
Jewish engineers assigned to the DINDI project. The security breach resulted
in a number of national intelligence developmental systems being compromised
to the Israelis, including those code named PIEREX and MAROON SHIELD. DINDI
was quickly cancelled but due to the sensitivity surrounding the American Jewish
engineers, the Reagan Justice Department avoided bringing espionage charges.
There were some forced retirements and transfers, but little more. But for NSA,
the duplicity of the Israelis added to the enmity between Fort Meade and Israeli
intelligence.
With outside contractors now permeating NSA and a major Israeli espionage operation
being discovered inside the Pentagon, once again there is a fear within NSA
that foreign intelligence services such as the Mossad could make another attempt
to penetrate America's virtual "Fort Knox" of intelligence treasures
and secrets.
Thanks to some very patriotic and loyal Americans inside NSA, this author is
now in possession of an internal NSA contract document from November 2002 that
shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and
other contractors to gain access to and even virtual control over some of the
most sensitive systems within the U.S. intelligence community. One suspect in
this unchecked outsourcing is the person Hayden hired from the outside to act
as special adviser to his Executive Leadership Team, Beverly Wright, who had
been the chief financial officer Legg Mason Wood Walker in Baltimore. Before
that, Wright had been the chief financial officer for Alex Brown, the investment
firm at which George W. Bush's grandfather, Prescott Bush, once served as a
board member. As one senior NSA official sarcastically put it, "She's highly
qualified to work in intelligence!"
According to the document, the future of some 10,000 Windows NT and UNIX workstations
and servers that handle some of NSA's most sensitive signals intelligence (SIGINT)—the
Signals Intelligence Directorate workstation upgrade is code named BEANSTALK—and
electronics intelligence (ELINT) applications, including databases that contain
communications intercepts, are now firmly in the grasp of the Eagle Alliance.
Operational workstations are being migrated to a less-than-reliable Windows/Intel
or "WINTEL" environment. The document boldly calls for the Eagle Alliance
to establish a SIGINT Service Applications Office (SASO) to "provide and
maintain Information Technology services, tools, and capabilities for all [emphasis
added] SIGINT mission applications at the NSA." This is a far cry from
the non-operational administrative support functions originally specified in
the GROUNDBREAKER contract.
The document also calls for NSA to provide extremely sensitive information
on SIGINT users to the contractors: "Identification of target sets of users
in order to successfully coordinate with the Eagle Alliance modernization program."
The Eagle Alliance is involved in a number of systems that impact on other
members of the U.S. intelligence community, foreign SIGINT partners, and national
command authorities. These systems include INTELINK, Common Remoted Systems,
National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional
SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity
Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech
Processing Services, Automatic Message Handling System, CRITIC Alert, Cross
Agency Multimedia Database Querying, Message Format Converter, Central Strategic
Processing and Reporting, Collection Knowledge Base, Language Knowledge Base
and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech
Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support,
Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite
database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking
Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether
Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal
Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT
interception database ANCHORY and the ELINT database WRANGLER. In fact, the
document states that the contractors' plans foresee the inclusion of NSA's intelligence
community partners (foreign and domestic) in the contractors' revamping of NSA's
operational systems.
The servers include those that support mission-critical National Time Sensitive
Systems (NTSS). These National Time Sensitive System servers have been assigned
various cover terms: CANUCKS, DOLLAR, EASTCAKE, HEALYCUFF, MUDDYSWELT, NEEDYWHAT,
RIMTITLE, RISKDIME, ROWLOAD, SEAWATER, CURACAO, HALF, HEALYMINK, LEARNGILT,
LINEFURL, MOBLOOSE, SPELLBEAK, and THOSEHOT.
A number of SIGINT applications are also impacted by the outsourcing mania.
They are also assigned cover terms: ADVERSARY, ADVERSARY GOLD, CHECKMATE, FANBELT,
FANBELT II, FIREBLAZE, GALE-LITE (the primary owner of which is DIA), GALLEYMAN,
GALLEYPROOF, JAGUAR, KAFFS, MAGNIFORM, MAINCHANCE, OILSTOCK, PATHSETTER, PINSETTER,
SIGDASYS FILE II, III, and KL, TEXTA, and SPOT.
In fact, the document indicates that literally hundreds of NSA intelligence
applications are now subject to the whims of outside contractors. These systems
include: ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL,
ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD,
ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC,
BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST,
BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC,
BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE,
BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER,
BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT,
BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE,
BULK, BUMPER, CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER,
CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK,
CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS,
CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU,
CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA,
CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST,
CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT,
CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER,
CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY,
CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS, DAFIF,
DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING,
DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION,
DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION,
DRAGONMAKER, DUALIST, EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION,
ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE,
EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET, FAIRHILL, FAIRVIEW,
FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA,
FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW,
FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX,
FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA
GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE,
FRENZY/GRANULE, FUSEDPULL, GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET,
GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE
B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART,
GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER,
GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG,
GUIDETOWER, HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME,
HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER,
HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER,
HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE,
HYPERWIDE, ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD,
INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER,
IVORY ROSE, IVORY SNOW, JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED,
JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER,
KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE
WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE, LADYSHIP,
LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT,
LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING,
LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK,
LOGBOOK, LONGROOT, LUMINARY, MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II,
MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE,
MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING,
MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE,
MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG,
MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE
III, MUSICHALL, MUSTANG, MYTHOLOGY, NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT,
NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL
32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON,
NUMERIC, OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT,
OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA,
ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH, PADDOCK, PACESETTER, PALINDROME,
PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER,
PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE,
PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST,
PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE,
POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE
DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER,
PROTOVIEW, PUFFERFISH, PYTHON II, RAP, RAPPEL, QUARTERBACK, QUASAR, QUEST, QUICKER,
QUICKSILVER, RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAUCOVER, REACTANT,
RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED
ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA,
REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED,
ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY, SAGACITY, SANDSAILOR,
SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK,
SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER,
SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH,
SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH,
SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC,
SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE,
SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH
II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH
MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER,
SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE,
STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH,
STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL,
SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT, TABLELAMP,
TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL,
TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD,
THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER,
TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER,
TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK,
TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT, UMORPH, UNLIMITED,
VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON,
VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP
SEED, WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER,
WEBSPINNER—ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL,
WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED,
WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP, XVTUBA, YELLOWSTONE,
YETLING, ZENTOOLS, ZIGZAG, and ZIRCON.
Wayne Madsen is a Washington, DC-based investigative journalist and nationally-distributed
columnist.
Go to Original Article >>>
The views expressed herein are the writers' own and do not necessarily reflect those of Looking Glass News. Click the disclaimer link below for more information.
Email: editor@lookingglassnews.org.
|