By Wayne Madsen
Online Journal Contributing Writer
– In the past year, I have been threatened with a libel suit in London from a rich Saudi billionaire whose Washington-based law firm that just so happens to have a former Bush-Cheney campaign
finance chairman and one of George W. Bush’s closest Texas pals as two of its major partners.In addition, I have earned the attention of an
Orwellian Ministry of Truth-like “counter-propaganda” office
at the U.S. Department of State, which maintains a web site
that criticizes my articles. It is against U.S. law for the
International Public Diplomacy unit to directly respond
to my counter-arguments, they can only legally respond
to foreign queries and not from U.S. citizen journalists
whom they cavalierly attack.Plus, the White House and some officials in the U.S. intelligence
community apparently have found it necessary to suppress
from publication my book on corruption in the oil industry
and defense contracting community.And I have now been threatened by the company CACI International,
which, according to the Taguba Report, was involved in the prison
torture at Abu Ghraib. The threat was based on a very important story
concerning contract fraud and corruption at the super secret
National Security Agency
(NSA)�America’s premier electronic surveillance body.Unlike Newsweek, CBS News and 60 Minutes, and the
Public Broadcasting System and National Public Radio,
I do not intend to allow the friends of Bush and the globally-despised
U.S. military intelligence complex to stymie my right to report
on the graft and corruption and the steady move toward fascism
from my vantage point inside the Washington Beltway.
To George W. Bush, Dick Cheney, Karl Rove, CACI (and its law firm
Steptoe & Johnson), and Akin Gump Strauss Hauer & Feld
and its Bush buddies and Saudi paymasters,
I have one simple admonition:�”Go to Hell!”And to show that I mean business, I will soon establish a website
called the Wayne Madsen Report that will expose the bottom dwelling
vermin now infesting our body politic. In the finest tradition of
H. L. Mencken, Drew Pearson and Jack Anderson, Edward R. Murrow
and other hard hitting members of the Fourth Estate,
I have a simple warning: if you hold political office or another
responsible position in this three degrees of separation town
called Washington and you steal taxpayer’s money, hypocritically
proclaim born-again Christianity and then go out and beat up
a female prostitute or call a gay male prostitute hot line,
get busted for publicly urinating on Capitol Hill, or engage in
disloyal behavior against the United States, you can be sure
your name and your activities will be featured on the website.
You will be held accountable – it’s as simple as that.
You may not have to worry about The Washington Post or CNN,
but you will have to contend with me.And for federal law enforcement officials who find it proper
or exciting to subpoena journalists’ notebooks and require testimony
before grand juries, forget about me. I won’t play your political games.
I’ll gladly go to prison rather than subject myself and my sources
to interrogations from a neocon fascist regime.The Neocon Power Grab at the NSANow more on what is happening at NSA and how it is adversely
affecting U.S. national security. On August 1, 2001, just five
and a half weeks before the 9�11 attacks, NSA awarded
Computer Sciences Corporation (CSC) a more than $2 billion,
10-year contract known as GROUNDBREAKER.
The contract was never popular with NSA’s career professionals.Although GROUNDBREAKER was limited to outsourcing NSA’s
administrative support functions such as telephones, data networks,
distributed computing, and enterprise architecture design,
the contract soon expanded into the operational areas –
– a sphere that had always been carefully restricted to contractors.
NSA was once worried about buying commercial-off-the-shelf
computer components such as semiconductors
because they might contain foreign bugs. NSA manufactured
its own computer chips at its own semiconductor factory
at Fort Meade. Currently, NSA personnel are concerned that
outsourcing mania at Fort Meade will soon involve foreign help desk
technical maintenance provided from offshore locations like India.CSC had originally gained access to NSA through a “buy in” project
called BREAKTHROUGH, a mere $20 million contract awarded in 1998
that permitted CSC to operate and maintain NSA computer systems.
When General Michael V. Hayden took over as NSA director in 1999,
the floodgates for outside contractors were opened and a resulting deluge
saw most of NSA’s support personnel being converted
to contractors working for GROUNDBREAKER’s Eagle Alliance
(nicknamed the “Evil Alliance” by NSA government personnel),
a consortium led by CSC.NSA personnel rosters of support personnel, considered protected
information, were turned over to Eagle, which then made offers of
employment to the affected NSA workers.
The Eagle Alliance consists of -�CSC, Northrop Grumman,
General Dynamics, CACI, Omen, Inc., Keane Federal Systems,
ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications,
TRW (Raytheon), Verizon, and Windemere.In October 2002, Hayden, who has now been promoted by Bush
to be deputy director of National Intelligence under John Negroponte,
opened NSA up further to contractors. A Digital Network Enterprise
(DNE) team led by SAIC won a $280 million, 26-month contract
called TRAILBLAZER to develop a demonstration test bed
for a new signals intelligence processing and analysis system.
SAIC’s team members included Booz Allen Hamilton, Boeing,
Northrop Grumman, and Eagle Alliance team leader CSC.
TRAILBLAZER, according to Hayden’s own testimony
before the Senate Select Committee on Intelligence, is now
behind schedule and over budget to the tune of over $600 million.But that is not the only consequence of these two mega-contracts
for NSA’s ability to monitor global communications for the next 9�11,
which could be a terrorist nuclear strike on the United States.NSA insiders report that both contract teams have melded into
one and that NSA’s operations are being adversely impacted.
From simple tasks like phones being fixed to computers being
updated with new software, the Eagle Alliance has been a disaster.
The Eagle Alliance and DNE team members are rife
with former NSA top officials who are reaping handsome bonuses
from the contracts – and that has many NSA career employees
crying conflict of interest and contract fraud.CACI, called “Colonels and Captains, Inc.”
by critics who cite the revolving door from the Pentagon
to its corporate office suites, counts former NSA Deputy Director
Barbara McNamara as a member of its board of directors.
CACI alumni include Thomas McDermott, a former NSA Deputy Director
for Information Systems Security. Former NSA Director Adm.
Mike McConnell is a Senior Vice President of Booz Allen.
Former NSA Director General Ken Minihan is president of the
Security Affairs Support Association (SASA), an intelligence
business development association that includes Boeing, Booz Allen,
CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman,
Raytheon, SAIC, and Windemere, all GROUNDBREAKER and
TRAILBLAZER contractors, among its membership.
SASA’s board of directors (surprise, surprise) includes
CACI’s Barbara McNamara. One of SASA’s
distinguished advisers is none other than General Hayden.Although contractors are required to have the same high level security
clearances as government personnel at NSA, there are close
connections between some NSA contractors and countries
with hostile intelligence services. For example, CACI’s president
and CEO visited Israel in early 2004 and received the
Albert Einstein Technology Award at ceremony in Jerusalem
attended by Likud Party Defense Minister Shaul Mofaz.
The special ceremony honoring CACI’s president was sponsored
by the Aish HaTorah yeshiva fund. The ultra-Orthodox United Torah
Judaism Party’s Jerusalem Mayor, Uri Lupolianski, was also in attendance.
The U.S. delegation included a number of homeland security officials
�and businessmen.CACI has also received research grants from U.S.-Israeli bi-national
foundations. A few months after the award ceremony for CACI’s
president, the Taguba Report cited two CACI employees as being
involved in the prison torture at Abu Ghraib prison in Iraq.
The U.S. military commander for the Iraqi prisons, General
Janis Karpinski, reported that she witnessed Israeli interrogators
working alongside those from CACI and another contractor, Titan.When the Taguba Report was leaked, the office of Deputy Defense
Secretary for Policy Douglas Feith issued an order to Pentagon
employees not to download the report from the Internet.
Feith is a well-known hard-line supporter of Israel’s Likud Party.According to the Jewish Telegraph Agency, some six months before the
Abu Ghraib torture scandal was first uncovered, one of Feith’s assistants,
Larry Franklin, met with two officials of the American Israel Public Affairs
Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia.
According to FBI surveillance tapes, Franklin relayed top secret
information to Steve Rosen, AIPAC’s then policy director,
and Keith Weissman, a senior Iran analyst with AIPAC.
Franklin has been indicted for passing classified information to AIPAC.
In addition, three Israeli citizens have been identified as possible
participants in the spy scandal. They are
Naor Gilon, the political officer at the Israeli embassy in Washington;
Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya
(the northern Tel Aviv suburb where the headquarters of Mossad is located);
and Eran Lerman, a former Mossad official who is now with the
American Jewish Committee.What has some NSA officials worried is that with pro-Israeli neocons
now engrained within the CIA, Defense Intelligence Agency (DIA),
State Department, and National Security Council, NSA is ripe
for penetration by Israeli intelligence.NSA has a troubled past with Israel. In 1967, Israeli warplanes launched
a premeditated attack on the NSA surveillance ship, the USS Liberty,
killing and wounding a number of U.S. sailors and NSA civilian personnel.
Convicted Israeli spy Jonathan Pollard compromised a number of NSA
sensitive sources and methods when he provided a garage full
of classified documents to Israel.But NSA is also aware of an incident where Israelis used a contractor,
RCA, to gain access to yet additional NSA sources and methods.
In the 1980s, against the wishes of NSA, the Reagan administration
forced NSA to permit RCA, one of its major contractors, to develop
a tethered aerostat (balloon) signals intelligence and direction
finding system for the Israeli Defense Force.
According to NSA officials, the Israeli-NSA joint project,
codenamed DINDI, was established at a separate facility
in Mount Laurel, New Jersey, and apart from the main NSA
developmental center at RCA’s facility in Camden, New Jersey.
Although NSA and RCA set up a strict firewall between
the contractors national intelligence contract work and the separate
DINDI contract, Israeli engineers, who were working for Mossad,
soon broke down the security firewall with the assistance of a few
American Jewish engineers assigned to the DINDI project.
The security breach resulted in a number of national intelligence
developmental systems being compromised to the Israelis,
including those code named PIEREX and MAROON SHIELD.
DINDI was quickly cancelled but due to the sensitivity surrounding
the American Jewish engineers, the Reagan Justice Department
avoided bringing espionage charges.
There were some forced retirements and transfers, but little more.
But for NSA, the duplicity of the Israelis added to the enmity
between Fort Meade and Israeli intelligence.With outside contractors now permeating NSA and a major Israeli
espionage operation being discovered inside the Pentagon,
once again there is a fear within NSA that foreign intelligence services
such as the Mossad could make another attempt to penetrate
America’s virtual “Fort Knox” of intelligence treasures and secrets.Thanks to some very patriotic and loyal Americans inside NSA,
this author is now in possession of an internal NSA contract
document from November 2002 that shows how GROUNDBREAKER
and TRAILBLAZER have allowed the Eagle Alliance and other
contractors to gain access to and even virtual control over some of the
most sensitive systems within the U.S. intelligence community.
One suspect in this unchecked outsourcing is the person Hayden
hired from the outside to act as special adviser to his Executive
Leadership Team, Beverly Wright, who had been the chief
financial officer Legg Mason Wood Walker in Baltimore.
Before that, Wright had been the chief financial officer for Alex Brown,
the investment firm at which George W. Bush’s grandfather,
Prescott Bush, once served as a board member.
As one senior NSA official sarcastically put it,
“She’s highly qualified to work in intelligence!”According to the document, the future of some 10,000 Windows NT
and UNIX workstations and servers that handle some of NSA’s
most sensitive signals intelligence (SIGINT) –
– the Signals Intelligence Directorate workstation upgrade
is code named BEANSTALK – and electronics intelligence (ELINT)
applications, including databases that contain communications
intercepts, are now firmly in the grasp of the Eagle Alliance.
Operational workstations are being migrated to a less-than-reliable
Windows/Intel or “WINTEL” environment. The document boldly calls
for the Eagle Alliance to establish a SIGINT Service Applications Office
(SASO) to “provide and maintain Information Technology services,
tools, and capabilities for all [emphasis added] SIGINT mission
applications at the NSA.”
This is a far cry from the non-operational administrative support
functions originally specified in the GROUNDBREAKER contract.The document also calls for NSA to provide extremely
sensitive information on SIGINT users to the contractors:
“Identification of target sets of users in order to successfully
coordinate with the Eagle Alliance modernization program.”The Eagle Alliance is involved in a number of systems
that impact on other members of the U.S. intelligence community,
foreign SIGINT�partners, and national command authorities.
These systems include INTELINK, Common Remoted Systems,
National SIGINT Requirements Process, Overhead Tasking Distribution,
RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC
Modeling Tool, Speech Activity Detection, Network Analysis Tools,
Network Reconstruction Tools, Advanced Speech Processing Services,
Automatic Message Handling System, CRITIC Alert, Cross Agency
Multimedia Database Querying, Message Format Converter,
Central Strategic Processing and Reporting, Collection Knowledge Base,
Language Knowledge Base and Capabilities, K2000 Advanced ELINT
Signals, Speech Content Services, Speech Information Extraction,
Dominant Facsimile Processing System and DEFSMAC Support,
Data Delivery (TINMAN), High Frequency Direction Finding (HFDF)
Database, Satellite database, Protocol Analysis Terminal,
Global Numbering Database, Intercept Tasking Databases,
DEFSMAC Space Systems Utilities, Message Server,
Extended Tether Program, Language Knowledge Services,
Trend Analysis in Data Streams, Signal Related Database,
SANDKEY Support (SIGINT Analysis and Reporting),
and the SIGINT interception database ANCHORY and the
ELINT database WRANGLER. In fact, the document states
that the contractors’ plans foresee the inclusion of NSA’s
intelligence community partners (foreign and domestic)
in the contractors’ revamping of NSA’s operational systems.The servers include those that support mission-critical National Time
Sensitive Systems (NTSS). These National Time Sensitive System
servers have been assigned various cover terms: CANUCKS, DOLLAR,
EASTCAKE, HEALYCUFF, MUDDYSWELT, NEEDYWHAT, RIMTITLE,
RISKDIME, ROWLOAD, SEAWATER, CURACAO, HALF, HEALYMINK,
LEARNGILT, LINEFURL, MOBLOOSE, SPELLBEAK, and THOSEHOT.A number of SIGINT applications are also impacted by the outsourcing
mania. They are also assigned cover terms: ADVERSARY,
ADVERSARY GOLD, CHECKMATE, FANBELT, FANBELT II,
FIREBLAZE, GALE-LITE (the primary owner of which is DIA),
GALLEYMAN, GALLEYPROOF, JAGUAR, KAFFS, MAGNIFORM,
MAINCHANCE, OILSTOCK, PATHSETTER, PINSETTER,
SIGDASYS FILE II, III, and KL, TEXTA, and SPOT.In fact, the document indicates that literally hundreds of NSA
intelligence appl. are now subject to the whims of outside contractors.
These systems include: ABEYANCE, ACROPOLIS, ADROIT,
ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST,
ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS,
ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT,ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC, BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER,
BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD,
BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA,
BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE,
BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE,
BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY,BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE,
BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER,
BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK,
BUMPER, CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL,
CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK,
CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL,
CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON,
CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS,
CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC,
CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD,
CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF
I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN,
COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA,
CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE,
COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK,
COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP,
CRYSTALLIZE, CYBERENGINE, CYGNUS, DAFIF, DANCEHALL,
DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY,
DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO,
DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE,
DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST, EAGERNESS,
EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY,
ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT,
ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER,
EXTRACTOR, EUREKA, EYELET, FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE,
FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE,
FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW,
FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS),
FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP,
FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE,
FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE,
FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL, GALAXYDUST, GARDENVIEW,
GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE,
GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE,
GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN,
GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX,GOLDENPERCH, GOLDMINE, GOMBROON,
GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE,
GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE,
GREMLIN, GUARDDOG, GUIDETOWER, HACKER, HABANERO,
HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE,
HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER,
HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE,
HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE, ICARUS,
ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR,
INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW,
JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN,
JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL,
JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER, KAHALA,
KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD,
KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS,
KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE,
LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK,
LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK,
LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART,
LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK,
LONGROOT, LUMINARY, MACEMAN, MACHISMO, MADONNA,
MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND,
MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE,
MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP,
MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA,
MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE,
MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH,
MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE,
MOONDANCE, MOONFOX, MOORHAWK, MORETOWN,
MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG,
MYTHOLOGY, NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT,
NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK,
NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32,
NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC
SHIFTER, NUCLEON, NUMERIC, OAKSMITH, OBLIGATOR,
OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT,
OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION,
OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA,
OUTERBANKS, OUTFLASH, OUTREACH, PADDOCK,
PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON,
PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER,
PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE,
PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST,
PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS,
PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP,
PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG,
POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR,
PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER,
PROTOVIEW, PUFFERFISH, PYTHON II, RAP, RAPPEL,
QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER,
RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET,
RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY,
RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER,
RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS,
REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER,
RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED,
ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE,
RUTLEY, SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD,
SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS,
SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS,
SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER,
SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE,
SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH,
SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT,
SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST,
SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE,
SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT,
SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL,
SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING,
SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD,
SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER,
SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY,
STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG,
STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE,
STELLAH, STONEGATE, STORMCHASER, STORMPEAK,
STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL,
SUPERCODING, SURREY, SWEETDREAM, SWEETTALK,
SWEEPINGCHANGE, SWITCHPOINT, TABLELAMP, TALION,
TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER,
TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE,
TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD,
THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE,
TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE,
TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER,
TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA,
TRINFO,TRINIAN, TROLLEYTRACK, TROLLEYMASTER,
TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT,
UMORPH, UNLIMITED, VIEWEXCHANGE, VEILED DATABASE,
VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON,
VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST,
VOICECAST, VOICESAIL, VOIP SEED, WARGODDESS,
WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND,
WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER –
ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA,
WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL,
WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED,
WREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK,
WRAPUP, XVTUBA, YELLOWSTONE, YETLING,
ZENTOOLS, ZIGZAG, and ZIRCON.
READ  2013: NSA stores metadata of millions of web users for up to a year, secret files show

Leave a Reply