24 May 2005
Outsourcing NSA, Stifling Press
Thanks to Wayne Madsen.
Another version is up at
http://www.onlinejournal.com/Special_Reports/052405Madsen/052405madsen.html
THE NEOCON POWER GRAB AT NSA AND AN ATTEMPT TO STIFLE THE PRESS
By Wayne Madsen
In the past year, I have been threatened with a libel suit in London from
a rich Saudi billionaire whose Washington-based law firm just so happens
to have a former Bush-Cheney campaign finance chairman and one of George
W. Bush's closest Texas pals as two of its major partners. I have earned
the attention of an Orwellian Ministry of Truth-like "counter-propaganda"
office at the U.S. Department of State, which maintains a web site that
criticizes my articles. It is against U.S. law for the International Public
Diplomacy unit to directly respond to my counter-arguments, they can only
legally respond to foreign queries and not from U.S. citizen journalists
who they cavalierly attack. Apparently, the White House and some officials
in the U.S. intelligence community have found it necessary to suppress from
publication my book on corruption in the oil industry and defense
contracting community. I have now been threatened by the company CACI
International, which, according to the Taguba Report, was involved in the
prison torture at Abu Ghraib. The threat was based on a very and important
story concerning contract fraud and corruption at the super secret National
Security Agency (NSA) -- America's premier electronic surveillance body.
Unlike Newsweek, CBS News and 60 Minutes, and the Public Broadcasting
System and National Public Radio, I do not intend to allow the friends of
Bush and the globally-despised U.S. military intelligence complex to stymie
my right to report on the graft and corruption and the steady move toward
fascism from my vantage point inside the Washington Beltway. To George W.
Bush, Dick Cheney, Karl Rove, CACI (and its law firm Steptoe & Johnson),
and Akin Gump Strauss Hauer & Feld and its Bush buddies and Saudi paymasters,
I have one simple admonition: "Go to Hell."
And to show that I mean business, I will soon establish a web site called
the Wayne Madsen Report that will expose the bottom dwelling vermin now infesting
our body politic. In the finest tradition of H. L. Mencken, Drew Pearson
and Jack Anderson, Edward R. Murrow and other hard hitting members of the
Fourth Estate, I have a simple warning: if you hold political office or another
responsible position in this three degrees of separation town called Washington
and you steal taxpayer's money, hypocritically proclaim born-again Christianity
and then go out and beat up a female prostitute or call a gay male prostitute
hot line, get busted for public urination on Capitol Hill, or engage in disloyal
behavior against the United States, you can be sure your name and your activities
will be featured on the web site. You will be held accountable -- it's as
simple as that. You may not have to worry about The Washington Post or CNN,
but you will have to contend with me.
And for Federal law enforcement officials who find it proper or exciting
to subpoena journalists' notebooks and require testimony before grand juries,
forget about me. I won't play your political games. I'll gladly go to prison
rather than subject myself and my sources to interrogations from a neocon
fascist regime.
***************
Now more on what is happening at NSA and how it is adversely affecting U.S.
national security. On August 1, 2001, just five and a half weeks before the
911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than
$2 billion, ten-year contract known as GROUNDBREAKER. The contract was never
popular with NSA's career professionals. Although GROUNDBREAKER was limited
to outsourcing NSA's administrative support functions such as telephones,
data networks, distributed computing, and enterprise architecture design,
the contract soon expanded into the operational areas -- a sphere that had
always been carefully restricted to contractors. NSA was once worried about
buying commercial-off-the-shelf computer components such as semiconductors
because they might contain foreign bugs. NSA manufactured its own computer
chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel
are concerned that outsourcing mania at Fort Meade will soon involve foreign
help desk technical maintenance provided from off-shore locations like India.
CSC had originally gained access to NSA through a "buy in" project called
BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted
CSC to operate and maintain NSA computer systems. When General Michael V.
Hayden took over as NSA Director in 1999, the floodgates for outside contractors
were opened and a resulting deluge saw most of NSA's support personnel being
converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed
the "Evil Alliance" by NSA government personnel), a consortium led by CSC.
NSA personnel rosters of support personnel, considered protected information,
were turned over to Eagle, which then made offers of employment to the affected
NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General
Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq,
Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.
In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director
of National Intelligence under John Negroponte, opened NSA up further to
contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280
million, 26 month contract called TRAILBLAZER to develop a demonstration
test bed for a new signals intelligence processing and analysis system. SAIC's
team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and
Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony
before the Senate Select Committee on Intelligence, is now behind schedule
and over budget to the tune of over $600 million.
But that is not the only consequence of these two mega-contracts for NSA's
ability to monitor global communications for the next 911, which could be
a terrorist nuclear strike on the United States.
NSA insiders report that both contract teams have melded into one and that
NSA's operations are being adversely impacted. From simple tasks like phones
being fixed to computers being updated with new software, the Eagle Alliance
has been a disaster. The Eagle Alliance and DNE team members are rife with
former NSA top officials who are reaping handsome bonuses from the contracts
-- and that has many NSA career employees crying conflict of interest and
contract fraud.
CACI, called "Colonels and Captains, Inc." by critics who cite the revolving
door from the Pentagon to its corporate office suites, counts former NSA
Deputy Director Barbara McNamara as a member of its board of directors. CACI
alumni include Thomas McDermott, a former NSA Deputy Director for Information
Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice
President of Booz Allen. Former NSA Director General Ken Minihan is President
of the Security Affairs Support Association (SASA), an intelligence business
development association that includes Boeing, Booz Allen, CACI, CSC, the
Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and
Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership.
SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara.
One of SASA's distinguished advisers is none other than General Hayden.
Although contractors are required to have the same high level security clearances
as government personnel at NSA, there are close connections between some
NSA contractors and countries with hostile intelligence services. For example,
CACI's president and CEO visited Israel in early 2004 and received the Albert
Einstein Technology Award at ceremony in Jerusalem attended by Likud Party
Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president
was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United
Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance.
According to Lebanon's Daily Star, CACI's president also met with
notorious racist Israeli retired General Effie Eitam who advocates expelling
Palestinians from their lands. The U.S. delegation also included a number
of homeland security officials, politicians, and businessmen. CACI has also
received research grants from U.S.-Israeli bi-national foundations. A few
months after the award ceremony for CACI's president, the Taguba Report cited
two CACI employees as being involved in the prison torture at Abu Ghraib
prison in Iraq. The U.S. military commander for the Iraqi prisons, General
Janis Karpinski, reported that she witnessed Israeli interrogators working
alongside those from CACI and another contractor, Titan.
When the Taguba Report was leaked, the office of Deputy Defense Secretary
for Policy Douglas Feith issued an order to Pentagon employees not to download
the report from the Internet. Feith is a well-known hard line supporter of
Israel's Likud Party and, according to U.S. government insiders, his name
has come up in FBI wiretaps of individuals involved in the proliferation
of nuclear weapons material to Israel via Turkish (including Turkish Jewish)
intermediaries. These wiretaps are the subject of a Federal probe of who
compromised a sensitive CIA counter-proliferation global operation that used
a carve out company called Brewster Jennings & Associates to penetrate
nuclear weapons smuggling networks with tentacles extending from Secaucus,
New Jersey to South Africa and Pakistan and Turkey to Israel.
According to the Jewish Telegraph Agency, some six months before the Abu
Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry
Franklin, met with two officials of the American Israel Public Affairs Committee
(AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI
surveillance tapes, Franklin relayed top secret information to Steve Rosen,
AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with
AIPAC. Franklin has been indicted for passing classified information to AIPAC.
In addition, three Israeli citizens have been identified as possible participants
in the spy scandal. They are Naor Gilon, the political officer at the Israeli
embassy in Washington; Uzi Arad, an analyst with the Institute for Policy
and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters
of Mossad is located); and Eran Lerman, a former Mossad official who is now
with the American Jewish Committee.
What has some NSA officials worried is that with pro-Israeli neocons now
engrained within the CIA, Defense Intelligence Agency (DIA), State Department,
and National Security Council, NSA is ripe for penetration by Israeli
intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes
launched a premeditated attack on the NSA surveillance ship, the USS
Liberty, killing and wounding a number of U.S. sailors and NSA civilian
personnel. Convicted Israeli spy Jonathan Pollard compromised a number of
NSA sensitive sources and methods when he provided a garage full of classified
documents to Israel. But NSA is also aware of an incident where Israelis
used a contractor, RCA, to gain access to yet additional NSA sources and
methods. In the 1980s, against the wishes of NSA, the Reagan administration
forced NSA to permit RCA, one of its major contractors, to develop a tethered
aerostat (balloon) signals intelligence and direction finding system for
the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint
project, codenamed DINDI, was established at a separate facility in Mount
Laurel, New Jersey and apart from the main NSA developmental center at RCA's
facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall
between the contractor's national intelligence contract work and the separate
DINDI contract, Israeli engineers, who were working for Mossad, soon broke
down the security firewall with the assistance of a few American
Jewish engineers assigned to the DINDI project. The security breach resulted
in a number of national intelligence developmental systems being compromised
to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON
SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding
the American Jewish engineers, the Reagan Justice Department avoided bringing
espionage charges. There were some forced retirements and transfers, but
little more. But for NSA, the duplicity of the Israelis added to the enmity
between Fort Meade and Israeli intelligence.
With outside contractors now permeating NSA and a major Israeli espionage
operation being discovered inside the Pentagon, once again there is a fear
within NSA that foreign intelligence services such as the Mossad could make
another attempt to penetrate America's virtual "Fort Knox" of intelligence
treasures and secrets.
Thanks to some very patriotic and loyal Americans inside NSA, this author
is now in possession of an internal NSA contract document from November 2002
that shows how GROUNDBREAKER and TRAILBLAZER have allowed the
Eagle Alliance and other contractors to gain access to and even virtual control
over some of the most sensitive systems within the U.S. intelligence community.
One suspect in this unchecked outsourcing is the person Hayden hired from
the outside to act as Special Adviser to his Executive Leadership Team, Beverly
Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker
in Baltimore. Before that, Wright had been the Chief Financial Officer for
Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott
Bush, once served as a board member. As one senior NSA official sarcastically
put it, "She's highly qualified to work in intelligence!"
According to the document, the future of some 10,000 Windows NT and UNIX
workstations and servers that handle some of NSA's most sensitive signals
intelligence (SIGINT) (the Signals Intelligence Directorate workstation
upgrade is code named BEANSTALK) and electronics intelligence (ELINT)
applications, including databases that contain communications intercepts,
are now firmly in the grasp of the Eagle Alliance. Operational
workstations are being migrated to a less-than-reliable Windows/Intel
or "WINTEL" environment. The document boldly calls for the Eagle Alliance
to establish a SIGINT Service Applications Office (SASO) to "provide and
maintain Information Technology services, tools, and capabilities for all
[emphasis added] SIGINT mission applications at the NSA." This is a far
cry from the non-operational administrative support functions originally
specified in the GROUNDBREAKER contract.
The document also calls for NSA to provide extremely sensitive information
on SIGINT users to the contractors: "Identification of target sets of users
in order to successfully coordinate with the Eagle Alliance modernization
program." The Eagle Alliance is involved in a number of systems that impact
on other members of the U.S. intelligence community, foreign SIGINT partners,
and national command authorities. These systems include INTELINK, Common
Remoted Systems, National SIGINT Requirements Process, Overhead Tasking
Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC
Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network
Reconstruction Tools, Advanced Speech Processing Services, Automatic Message
Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying,
Message Format Converter, Central Strategic Processing and Reporting, Collection
Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced
ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant
Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN),
High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol
Analysis Terminal, Global Numbering Database, Intercept Tasking Databases,
DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program,
Language Knowledge Services, Trend Analysis in Data Streams, Signal Related
Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT
interception database ANCHORY and the ELINT database WRANGLER. In fact, the
document states that the contractors' plans foresee the inclusion of NSA's
intelligence community partners (foreign and domestic) in the contractors'
revamping of NSA's operational systems.
The servers include those that support mission-critical National Time Sensitive
Systems (NTSS). These National Time Sensitive System servers have been assigned
various cover terms:
CANUCKS
DOLLAR
EASTCAKE
HEALYCUFF
MUDDYSWELT
NEEDYWHAT
RIMTITLE
RISKDIME
ROWLOAD
SEAWATER
CURACAO
HALF
HEALYMINK
LEARNGILT
LINEFURL
MOBLOOSE
SPELLBEAK
THOSEHOT
A number of SIGINT applications are also impacted by the outsourcing mania.
They are also assigned cover terms:
ADVERSARY
ADVERSARY GOLD
CHECKMATE
FANBELT
FANBELT II
FIREBLAZE
GALE-LITE (the primary owner of which is DIA)
GALLEYMAN
GALLEYPROOF
JAGUAR
KAFFS
MAGNIFORM
MAINCHANCE
OILSTOCK
PATHSETTER
PINSETTER
SIGDASYS FILE II, III, and KL
TEXTA SPOT
In fact, the document indicates that literally hundreds of NSA intelligence
applications are now subject to the whims of outside contractors. These systems
include
ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT,
ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD,
ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR,
AXIOMATIC
BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW,
BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK,
BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK,
BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM,
BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY,
BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK,
BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER
CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK,
CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC
II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS,
CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU,
CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA,
CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST,
CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT,
CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER,
CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY,
CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS
DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA,
DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP,
DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE,
DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST
EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR,
EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER,
EXTENDER, EXTRACTOR, EUREKA, EYELET
FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II,
FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE,
FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST
(OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART,
FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE,
FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL
GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE,
GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE,
GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE,
GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER,
GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG,
GUIDETOWER
HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME,
HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND,
HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE,
HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT,
HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE
ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION,
INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY
ROSE, IVORY SNOW
JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH,
JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER
KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE
WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE
LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME,
LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN,
LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR,
LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY
MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY,
MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL,
MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI,
MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR,
MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE,
MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL,
MUSTANG, MYTHOLOGY
NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH,
NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST,
NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC
OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD,
ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID,
ORIANA, OUTERBANKS, OUTFLASH, OUTREACH
PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II,
PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON,
PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE,
PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM
PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE,
POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG,
PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER,
PROTOVIEW, PUFFERFISH, PYTHON II
QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER
RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT,
RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON,
RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA,
REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA,
ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY
SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION,
SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE,
SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE,
SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR,
SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE,
SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER,
SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT,
SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN,
SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE,
SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM,
SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG,
STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER,
STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY,
SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT
TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS,
TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY,
THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER,
TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN
II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE,
TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE,
TRYSTER, TSUNAMI, TWILIGHT, TWOBIT
UMORPH, UNLIMITED
VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON,
VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL,
VOIP SEED
WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER,
WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL,
WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED,
WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP
XVTUBA
YELLOWSTONE, YETLING
ZENTOOLS, ZIGZAG, and ZIRCON
|