|
$230-Billion Offshore Bank Hughes Vault? |
by ShoreLines |
| $230-billion offshore bank hides assets from CIA in Howard Hughes Nevada storage vault. |
|
1977 Senate Hearing on MKULTRA |
by U.S. Senate |
| Perhaps most disturbing of all was the fact that the extent of experimentation on human subjects was unknown. The records of all these activities were destroyed in January 1973, at the instruction of then CIA Director Richard Helms. In spite of persistent inquiries by both the Health Subcommittee and the Intelligence Committee, no additional records or information were forthcoming. And no one -- no single individual -- could be found who remembered the details, not the Director of the CIA, who ordered the documents destroyed, not the official responsible for the program, nor any of his associates. |
|
A Study of Assassination: A CIA Manual |
by CIA |
| Assassination is a term thought to be derived from "Hashish", a drug similar to marijuana, said to have been used by Hasan-Dan-Sabah to induce motivation in his followers, who were assigned to carry out political and other murders, usually at the cost of their lives. |
|
Admissions and Omissions: The CIA in Guatemala |
by Linda Haugaard |
| The president's advisory Intelligence Oversight Board (IOB) report on human rights cases and the ClA's role in Guatemala, released on June 28, shows that the CIA knowingly hired paid informants who were involved in assassinations, kidnappings and torture. The report also asserts that U.S. support was "vital" to the Guatemalan intelligence services. |
|
An Overview of the Political and Paramilitary Operations of the CIA |
| The purpose of this work will be to survey the covert
operations that have been undertaken by the CIA in the past
forty years and to assess the effectiveness of a number of
these activities. |
|
BCCI, The CIA and Foreign Intelligence |
| The relationships involving BCCI, the CIA, and members of the United States and foreign intelligence communities have been among the most perplexing aspects of understanding the rise and fall of BCCI. The CIA's and BCCI's mutual environments of secrecy have been one obvious obstacle. |
|
Born in the CIA |
by Amjad Hussain |
| How a religious school located along the North Western Frontier of Pakistan came to be the training ground for the likes of Taliban of Afghanistan and their supporters in Pakistan is an interesting question. The answer lies in Langley, Virginia, the home of America's Central Intelligence Agency. |
|
Bush, Clinton, and the CIA |
by By Paul DeRienzo |
| An independent group of researchers in Arkansas are charging that Governor Bill Clinton is covering up an airport used by the CIA and major cocaine smugglers in a remote corner of the Ozark mountains. |
|
CIA - Nicaraguan Contra Cocaine Smuggling |
by Jack Blum |
| I will review briefly the history of the relationship between drug trafficking and intelligence operations and finally, I will make some suggestions for further investigation oversight and reform. |
|
CIA Death Squad Timeline |
by Ralph McGehee |
| CIA set up Ansesal and other networks of terror in El Salvador, Guatemala (Ansegat) and pre-Sandinista Nicaragua (Ansenic). The CIA created, structured and trained secret police in South Korea, Iran, Chile and Uruguay, and elsewhere - organizations responsible for untold thousands of tortures, disappearances, and deaths. |
|
CIA Documents Seized in Iran Continue to be Published |
| The CIA's destruction of records concerning the 1953 covert action in Iran, first reported in the New York Times on May 29, 1997, provides an occasion in the following three articles to recall a forgotten episode in the history of the CIA collection |
|
CIA Exec. Director Managed Firm That Handled "Put" Options on UAL |
by Michael C. Ruppert |
| There is abundant and clear evidence that a number of transactions in financial markets indicated specific foreknowledge of the September 11 attacks. In the case of at least one of these trades, the firm used to place the "put options" on United Airlines stock was, until 1998, managed by the man who is now in the number three Executive Director position at the Central Intelligence Agency. |
|
CIA Experiments with Mind Control on Children |
by Jon Rappoport |
| In unpublicized sessions, New Orleans therapist Valerie Wolf introduced two of her patients who had uncovered memories of being part of extensive CIA brainwashing programs as young children (in one case, starting at age seven). Their brainwashing included torture, rape, electroshock, powerful drugs, hypnosis and death threats. |
|
CIA Front Companies |
by JJ |
| The following companies, corporations and organizations are used by The Central Intelligence Agency as "Front Companies"
This "leaked" list shows the "front companies" that even most people
in the CIA don't even know about.
|
|
CIA General Counsel Nomination Hearing |
| Today's hearing of the Select Committee on Intelligence is for the single purpose of receiving testimony from the President's nominee for the position of General Counsel of the Central Intelligence Agency, Mr. Scott W. Muller.
|
|
CIA Intelligence Networks |
| The Central Intelligence Agency, like many revoluntionary organizations(including the Russian KGB), organize their agent networks on a "cell" system, with small groups who meet and carry out specific activities. |
|
CIA Mind Control Experiments: Building the Manchurian Candidate |
by Dr. Colin Ross |
| Lecture given at 9th Annual Western Clinical Conference on
Trauma and Dissociation, April 18, 1996, Orange County,
California. |
|
CIA Proprietaries, CIA Infiltrated or Influenced Organizations, and CIA Contractors |
by Michael Sweeney |
| This is a mere outdated sampler of the (approximately 400, mostly older) infrastructure of CIA, which has now likely morphed to become the infrastructure of Shadow (an entity described below) and, on an unnofficial basis, CIA proper. |
|
CIA Report on Communist Brainwashing |
| Brainwashing, as a technique, has been used for centuries and is no mystery to psychologists. In this sense, brainwashing means involuntary re-education of basic beliefs and values. All people are being re-educated continually. |
|
CIA facts of all nations #2 |
|
CIA facts of all nations #3 |
|
CIA's Abstract of the Ames Affair, by the Inspector General |
| In the spring and summer of 1985, Aldrich H. Ames began his espionage activities on behalf of the Soviet Union. In 1985 and 1986, it became increasingly clear to officials within CIA that the Agency was faced with a major CI problem. |
|
CIA's METC Explosives |
| The chief difference in METC unit (Multiple Explosives Transitional Container) design over traditional explosive devices moves away from a densely packed explosive core towards a large volume of highly explosive but low-density mass in the form of a gaseous cloud. |
|
CIA's Report on the Contras and Cocaine |
by Frederick P. Hitz, IG CIA |
| October 23, 1996 - The Select Committee on Intelligence, United States Senate - Regarding Investigation of Alleged Connections Between CIA, the Nicaraguan Contras and Cocaine Trafficking in the 1980s. |
|
CIA-Initiated Remote Viewing At Stanford Research Institute |
by H. E. Puthoff, Ph.D. |
| In July 1995 the CIA declassified, and approved for release, documents revealing its sponsorship in the 1970s of a program at Stanford Research Institute in Menlo Park, CA, to determine whether such phenomena as remote viewing "might have any utility for intelligence collection" [1]. Thus began disclosure to the public of a two-decade-plus involvement of the intelligence community in the investigation of so-called parapsychological or psi phenomena. |
|
CIA: Out of Control |
by Russ W. Baker |
| In the Post-Soviet Era, Congress Slumbers and the Intelligence Community Creates New Bogeymen to Vanquish |
|
CIABASE |
by Ralph McGehee |
| Ralph McGehee's Database, CIABASE, Prompts Harrassment |
|
Clay L. Shaw's Trial and the CIA |
by Lawrence R. Houston |
| The investigation of District Attorney Garrison of New Orleans into the assassination of President Kennedy, and his attack on the Warren Commission report, now focuses on one facet--the trial of Clay L. Shaw, who has been indicted for conspiracy to assassinate the President. In his public announcements Garrison has been careful not to reveal his theory of the trial. |
|
Congress to Probe Contra Cocaine Link: Mission Impeachable? |
by Rob Koenig |
| In the midst of a sanctimonious and self-serving "War on Drugs," the Costa Rica branch of the Contra support operation has been shipping cocaine into the USA with the apparent blessings of the White House. |
|
Counterintelligence Challenges in a Changing World |
by William S. Sessions |
| There can be no doubt that important changes are taking place in the world today. However, improved diplomatic relations do not necessarily decrease the foreign intelligence threat to U.S. national security. The truth remains: That threat still exists, as it did in the past and as it will in the future.
|
|
Cults, Anti-Cultists, and the Cult of Intelligence |
by Daniel Brandt |
| Modern secret services not only mimic the cult leader's cynicism, but
intelligence professionals themselves are locked into a self-perpetuating
mind-set. |
|
Dead-Letter Boxes |
by Lee Adams |
| DLB is an acronym for dead-letter box. It is also called a dead drop. A DLB is a physical location where material is covertly placed for another person to collect without direct contact between the parties. |
|
Declassified Army and CIA Manuals Used in Latin America |
by Lisa Haugaard |
| The unstated aim of the manuals is to train Latin American militaries to identify and suppress anti-government movements. The manuals provide detailed techniques for infiltrating social movements, interrogating suspects, surveillance, maintaining military secrecy, recruiting and retaining spies, and controlling the population. |
|
Domestic Surveillance: The History of Operation CHAOS |
by Verne Lyon |
| For over fifteen years, the CIA, with assistance from numerous government agencies, conducted a massive illegal domestic covert operation called Operation CHAOS. It was one of the largest and most pervasive domestic surveillance programs in the history of this country. |
|
Ex-CIA Director Orders Hit on His Own Agent |
by Daniel Hopsicker |
| Three Colombians were convicted of gunning him down, and they may have had cartel connections, but speculation has long been that Seal was assassinated at the behest of the CIA. |
|
Ex-CIA Offical Speaks Out |
| Victor Marchetti on the difficulty of writing about the CIA |
|
Fooling America: A Talk by Robert Parry |
by Robert Parry |
| They had to create the impression the Contras were better than they were, so people wouldn't get tired of supporting them in Congress. So they decided the CIA would have to start sending in its OWN people, its own specially-trained Latino assets to begin doing attacks which the Contras could then claim credit for. |
|
Funny CIA Story |
by Craig |
| So what does the CIA a cat and surveillance have to do with each other,find out here. |
|
HR 611: The Bill to Close the School of the Americas |
| Not later than 30 days after the date of the enactment of this Act, the Secretary of the Army shall close the military education and training facility known as the United States Army School of the Americas at Fort Benning, Georgia. |
|
Handling of Sources |
by U.S. Army |
| The term Special Counterintelligence Agent (SA) refers to all those persons who convey or contribute in to counteract the collection of information of the multidisciplinary intelligence of hostile services. This booklet is primarily
directed to those persons involved in the control or execution of CI operations. |
|
How DOD Code Names are Assigned |
by Paul McGinnis |
| We tend to use code-names such as SENIOR CITIZEN or MERIDIAN without understanding how these are assigned. I've done some research on this and here's what I've found. |
|
ICML Common Object Element Types |
by IC Sub-Working Group |
| The column headings of this table have the following meanings: Name: The identifier of a specific element type. Must be unique within the class of documents defined by a DTD or schema. It is the tag name.
|
|
ICML Technical Addendum |
by IC Metadata Sub-Working Group |
| This Technical Addendum is provided to supplement the evaluators of ICML v0.5 during their evaluation. It covers some background material and documents some of the research and perspectives that affected key decisions made in the ICML development. This addendum along with the release notes will be expanded in the future to become formal ICML documentation. |
|
Inside the Shadow CIA |
by John Connolly |
| It is not possible to overstate the special relationship Wackenhut enjoys with the federal government. It is close. When it comes to security matters, Wackenhut in many respects *is* the government. |
|
Intelligence Community Markup Language (ICML) Release Notes |
by IC Metadata Sub-Working Group |
| The first focus of ICML is to aid finished intelligence production. Since a majority of the intelligence content being produced within the IC takes the form of documents, it was felt by the MSWG that limiting the scope of the initial ICML release to this type of intelligence content would yield the most benefits in the shortest period of time. The ICML standard as written is incorporates key writing styles, metadata, and structure requirements of typical IC products. |
|
Intelligence Memo 05MAY04 |
by AnExCIA |
| Five (5) of the seven (7) people killed, Al-Kabariti Jumah and Zuluaga-Ochoa along with their two (2) bodyguards and Zuluaga-Ochoa's relative were travelling in a late-model armored 4X4 Sports Utility Vehicle, one Toyota Land Cruiser, at the time of their deaths. There were no shots fired or explosions that may have otherwise been instrumental for having been able to overtake the vehicle or any of its occupants. |
|
Iraqi Embassy Raid Staged By CIA? |
by Anonymous |
| The agreement focused on obtaining records from the Iraqi embassy (and consular offices in particular) in Berlin, either covertly or overtly before November. It appears that the latter was selected (perhaps as a result of a subsequent agreement with the BND and/or others in the Shroeder administration). |
|
John Stockwell on the Secret Wars of the CIA |
| The Inner Workings of the National Security Council and the
CIA's Covert Actions in Angola, Central America and Vietnam |
|
KUBARK Counter-Intelligence Interrogations |
by CIA |
| This manual cannot teach anyone how to be, or become, a good interrogator. Its purpose is to provide guidelines for KUBARK interrogation, and particularly the counterintelligence interrogation of resistant sources. Designed as an aid for interrogators and others immediately concerned, it is based largely upon the published results of extensive research, including scientific inquiries conducted by specialists in closely related subjects. |
|
National Security Council Directive on Covert Operations |
| NSC 5412, "National Security Council Directive on Covert Operations," continued to be the U.S. Government's basic directive on covert activities until the Nixon administration's NSC 40 in 1970. |
|
New Government Software |
by -@OsiriS@- |
| New Programs the G-Men are using. |
|
Open Source Intelligence Resources for the Intelligence Professional |
by The 434th Military Intelligence Detachment |
| The purpose of this handbook is to enhance the capabilities of MI Officers by incorporating Open Source Information (OSI) into their thinking, training and war-fighting agenda. |
|
Organizational Culture's Contributions to Security Failures |
by Troy M. Mouton |
| A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Arts in The Interdepartmental Program in Liberal Arts by Troy M. Mouton B.A., University of Southwestern Louisiana, 1996 May 2002 |
|
Oversight Hearings on Wackenhut Covert Operations at the Alyeska Pipeline |
| This is the first of two days of hearings before the House Interior Committee on the subject of covert surveillance authorized by the Alyeska Pipeline Service Company and conducted by The Wackenhut Corporation.
|
|
Paranoid Shift |
by Michael Hasty |
| The transformation of James Jesus Angleton from an enthusiastic, Ivy League cold warrior, to a bitter old man, is an extreme example of a phenomenon I call a paranoid shift. I recognize the phenomenon, because something similar happened to me. |
|
Profiles of the U.S. Intelligence Community |
| Profiles of most of the agencies involved with collection and dissemination of intelligence for the United States. |
|
Propaganda in Theory and Practice |
| "If you give a man the correct information for seven years,
he may believe the incorrect information on the first day of the
eighth year when it is necessary, from your point of view, that he should do
so. Your first job is to build the credibility and authenticity of your
propaganda, and persuade the enemy to trust you although you are his enemy." |
|
Psychological Operations in Guerrilla Warfare |
by CIA |
| This book is a manual for the training of guerrillas in psychological
operations, and its application to the concrete case of the Christian and
democratic crusade being waged in Nicaragua by the Freedom Commandos.
|
|
Reading List on Intelligence Agencies and Political Repression |
by Chip Berlet & Linda Lotz |
| This is the reading list circulated by Phil Agee at his Speakout lectures. |
|
Review of the Book SECRET AGENDA |
by Anthony Marro |
| His account goes well beyond, to include a prostitution ring,
heavy CIA involvement, spying on the White House as well as
on the Democrats, and plots within plots, with McCord
scheming at the end to sabotage his own break-in. |
|
School of the Americas Report |
| The CIA confirmed at a hearing before the Senate Select Intelligence Committee in 1988 that it provided intelligence and counterintelligence training to Honduran military groups. At the hearing, Richard Stolz, Deputy Director for Operations at the CIA, testified that from February 8 to March 13, 1983, the CIA trained Caballero, Maro Turo Regalatta, and other Hondurans in interrogations. |
|
School of the Americas: GAO Report (1996) |
|
School of the Americas: Report of the Latin Americ |
|
Secrecy and Accountability in U.S. Intelligence |
by Steven Aftergood |
| While U.S. intelligence agencies have done an astonishingly poor job of protecting the nation's secrets from foreign adversaries, they have been more successful in blocking access by American citizens to the most basic categories of intelligence information. |
|
Secrecy and Accountability in U.S. Intelligence |
by Steven Aftergood |
| Questions of secrecy and accountability have figured prominently in the most important intelligence controversies of the last several years. While U.S. intelligence agencies have done an astonishingly poor job of protecting the nation's secrets from foreign adversaries, they have been more successful in blocking access by American citizens to the most basic categories of intelligence information. |
|
Silent Weapons For Quiet Wars |
| A REAL CIA Manual. This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. |
|
South Central CIA Transcript |
by Charles Overbeck |
| The following is a transcript of a Town Hall meeting between residents of South Central and other areas of Los Angeles and CIA Director John Deutch. The intense question-and-answer session was hosted by Rep. Juanita M. McDonald (D-California, 37th District) on the evening of Friday, November 15, 1996, at Locke High School in Los Angeles. The first part of McDonald's opening remarks was omitted for brevity, but otherwise, this transcript is a continuous verbatim record of the event. Transcription by Charles Overbeck, [email protected], for ParaScope, http://www.parascope.com/ |
|
Statements by the DCI and the NSA Director on Economic Spying |
by George J. Tenet and Michael V. Hayden |
| I am here today to discuss allegations about SIGINT activities and the so-called Echelon program of the National Security Agency with a very specific objective: To assure this Committee, the Congress, and the American public that the Intelligence Community is unequivocally committed to conducting its activities in accordance with US law and due regard for the rights of Americans. |
|
Suffering and Despair: Humanitarian Crisis in the Congo |
by Wayne Madsen |
| The covert programs involving the use of private military training firms and logistics support contractors that are immune to Freedom of Information Act requests is particularly troubling for researchers and journalists. These U.S. contractor support programs have reportedly involved covert assistance to the Rwandan and Ugandan militaries. |
|
The C.I.A. 500 |
| The following is a list of alledged and/or suspected C.I.A. "front" companies, corporations, or organizations. |
|
The CIA |
| On January 22, 1946, President Harry S. Truman issued an executive order setting up a National Intelligence Authority, and under it, a Central Intelligence Group, which was the forerunner of the Central Intelligence Agency. |
|
The CIA & LSD |
| The following examines the development of the CIA's interest in the mysterious new drug, LSD. It is alternately funny, disgusting, and horrific.
|
|
The CIA's Regulations and Guidelines on the FOIA |
| The CIA's regulations and guidelines on the Freedom of Information Act as recorded in the Federal Register. Guess what? They don't have to tell you anything. |
|
The CIA's Role in the Study of UFOs Between 1947 and 1990 |
by Gerald K. Haines |
| An extraordinary 95 percent of all Americans have at least heard or read
something about Unidentified Flying Objects (UFOs), and 57 percent believe
they are real. (1) Former US Presidents Carter and Reagan claim to have
seen a UFO. UFOlogists--a neologism for UFO buffs--and private UFO
organizations are found throughout the United States. Many are convinced
that the US Government, and particularly CIA, are engaged in a massive
conspiracy and coverup of the issue. |
|
The CIA's Secret Weapons Systems |
by Andrew Stark |
| The CIA has spent a great deal of its time, and your money, developing countless bizarre weapons for assassination, sabotage, and mass destruction.The information about CIA weapons that you will read in this article generally has not been made public before. It was not intended to be. |
|
The CIA's Use of Clergy, Journalists and Peace Corps |
| Notes from July 17, 1996 hearing of the Senate Intelligence Committee. Not verbatim, the gist. |
|
The CIA, LSD, and The 60's Rebellion |
by Beatrice Devereaux |
| A review of the book "Acid Dreams" by Martin A. Lee and Bruce Shlain, publisher, Grove Press. |
|
The Central Intelligence Agency: A Short Primer |
| The Central Intelligence Agency of the United States (CIA)is one of several organizations responsible for gathering and evaluating foreign intelligence information vital to the security of the United States. |
|
The Intelligence Underground: The Spookiest of the Spooks |
by Jim Beetel |
| America's funniest CIA expose. |
|
The Napa Secret Installation |
by Harry V. Martin |
| The Sentinel has obtained over 200 pages of unclassified and secret documents which outline the purpose of a special communications and government continuity base in the Napa Hills.
|
|
The Secret Team, Part 1 |
by L. Fletcher Prouty |
| At the heart of the Team, of course, are a handful of top executives of the CIA and of the National Security Council (NSC), most notably the chief White House adviser to the President on foreign policy affairs. Around them revolves a sort of inner ring of Presidential officials, civilians, and military men from the Pentagon, and career professionals of the intelligence community. It is often quite difficult to tell exactly who many of these men really are, because some may wear a uniform and the rank of general and really be with the CIA and others may be as inconspicuous as the executive assistant to some Cabinet officer's chief deputy. |
|
The Secret Team, Part 2 |
by L. Fletcher Prouty |
| Intelligence professionals become so accustomed to using and living with cover stories, cover language, and code terms that they use them interchangeably with their normal, or dictionary, usage. Thus the outsider has little opportunity to break through this fabric to get to the real thing. |
|
The Secret Team, Part 3 |
by L. Fletcher Prouty |
| The CIA as an intelligence agency offers no unusual elements on most counts. It is pretty much what it seems to be. Special operations has been exposed one way or another so many times that there is not too much guesswork about its role. But researchers have been unable to work their way into what it really is that makes the Agency what it is today. This distinctive characteristic is its superior logistics support. |
|
The Secret Team, Part 4 |
by L. Fletcher Prouty |
| BY THE SUMMER OF 1955 THE CIA had grown to the point where it was ready to flex its wings in areas in which it had never before been able to operate and in ways that would test its intragovernmental potential. The first wave of Army Special Forces support of CIA war-planning initiatives and of U.S. Air Force Air Resupply and Communications activity had waned following the Korean War |
|
The Use of Covert Paramilitary Activity as a Policy Tool |
by Major D. H. Berger |
| From a pure cost-benefit analysis point of view, covert paramilitary operations conducted by the US between the end of World War II and the Korean conflict were a dismal failure. Manpower and money were allocated in tremendous amounts to the various operations, yet in every case the objectives of creating and expanding a viable anti-Communist resistance effort were not met. |
|
Transcript of House Debate on Covert Operations |
| The following excerpts from the debate Oct. 17 in the House of
Representatives on the Boxer Amendment, which would have required the President
to seek the approval of the Congressional intelligence committees before
initiating most covert operations, with the exception of operations to save
American lives or rescue American hostages. |
|
Transcript of Tenet's Resignation as CIA Chief |
| CIA director George Tenet announced his resignation Thursday, speaking to CIA employees hours after President Bush made the first official announcement. Following is a transcript of his remarks: |
|
Treason 101 |
| Espionage is a high-risk criminal offense. The traitor must fear arrest for the rest of his or her life, as the statute of limitations does not apply to espionage. Former National Security Agency employee Robert Lipka was arrested in 1996 -- 30 years after he left NSA and 22 years after his last contact with Soviet intelligence. There are four principal ways by which spies are detected. |
|
UN Report on El Salvador and the FMLN |
| It's very purpose and function have been to seek, find and make public the truth about the acts of violence committed by both sides in El Salvador during a civil war in which more than 75,000 Salvadorans were killed. |
|
US Intelligence Objectives and Programs in Guatemala |
| On March 30, 1995, the President directed the Intelligence
Oversight Board (IOB) to conduct a government-wide review
concerning allegations regarding the l990 death of US citizen
Michael DeVine, the 1992 disappearance of Guatemalan guerrilla
leader Efrain Bamaca Velasquez, and related matters. Under terms
of reference issued on April 7, 1995, the scope of this inquiry
covers any existing intelligence bearing on the torture,
disappearance, or death of US citizens in Guatemala since 1984,
including the cases of Dianna Ortiz, Griffith Davis and Nicholas
Blake. |
|
What The CIA Won't Declassify: Old Secrets and New |
by Deirdre Griswold |
| There are a few things the CIA doesn't want you to know. Like how it organized the 1961 Bay of Pigs invasion of Cuba. How it overthrew the elected government of Guatemala in 1954, setting off a long and bloody struggle that continues to this day. |
|
What is a Security Clearance |
| Certain federal employees and certain employees in the private sector are required to have security clearances because their job requires them to have access to classified documents. The occupant of any such job is said to hold a "sensitive" position, defined as "any position, by virtue of its nature, could bring about a material adverse effect on national security". |
|
Who's keeping the U.S. Domain Name System |
by Frank X. Sowa |
| In March 1995, NSI was purchased by the largest employee-owned research and engineering company in the United States, a little-known company with $2 billion in annual sales and more than 20,500 employees world-wide, whose Board of Directors reads like a Who's Who list of former intelligence, federal laboratory, defense industry, and military operatives |