Author Topic: Remember those 2 Entergy nuke plants that shut down? Guess who runs their IT  (Read 8133 times)

0 Members and 1 Guest are viewing this topic.


  • Guest
"Complete coincidence" 2 nuke plants by same company shut down in 1 hr
Entergy and SAIC Sign $400 Million Information Technology Services Agreement.

Article from:    Business Wire
Article date:    August 31, 1999

 NEW ORLEANS--(BUSINESS WIRE)--Aug. 31, 1999--

Entergy (NYSE: ETR) and Science Applications International Corporation (SAIC) today announced the signing of an estimated $400 million, five-year information technology services agreement.

The agreement between Entergy and SAIC allows Entergy to: increase its flexibility to respond to changing business needs, leverage technology to improve customer service, improve unit cost for information technology and provide maximum flexibility and opportunity for Entergy IT employees.

"This alliance is part of our 'control, not own' philosophy," said J. Wayne Leonard, Entergy's Chief Executive Officer. "No company can expect to be premier in all aspects of the value chain, particularly in an area like information technology where the change is exponential.

"This alliance with a world-class partner allows us to achieve the benefits of scale and specialization without adding physical mass or making substantial financial investments in an area that is not core to the energy supply and delivery business.

"SAIC's established track record as a world class technology company along with their unique system of employee ownership will provide greater career opportunities for our IT employees and bring substantial value to Entergy and its customers; value that we were not likely to create on our own. We are also very pleased to be part of attracting SAIC to the greater New Orleans area."

SAIC is the nation's largest employee-owned research and engineering company, providing information technology and systems integration products and services to government and commercial customers.

An element unique to the Entergy-SAIC agreement is a provision that allows Entergy information technology service delivery employees to remain Entergy employees or to join SAIC. Employees who join SAIC will transfer on January 1, 2000.

Under the terms of the agreement, SAIC will assume Entergy's information technology service delivery function in early October. SAIC will handle Entergy's information technology application development and maintenance, data center management and operations, mid-range and desktop support services, infrastructure management, and most infrastructure services.

Projects also will be initiated to establish an Integrated Services Management Center(SM), SAIC's proprietary methodology for integrated service delivery, and to obtain SEI CMM Level 2 certification, an industry benchmark signifying excellence. All work will continue to be performed within the Entergy service area.

"Through this agreement, we are officially establishing an information technology partnership with Entergy," said Joe Walkush, SAIC sector vice president.

"Our experience in information technology service delivery and in the electric utility industry will contribute significantly to increasing Entergy's efficiency and improving costs and usability." Walkush said SAIC plans to open a New Orleans office and seek additional customers beyond Entergy.

"This services agreement is a major step by Entergy toward successful competition in the deregulated electric utilities industry," said Senior Vice President Owens Alexander, manager of SAIC's Utilities Practice.

Some Entergy information technology employees will be retained by Entergy. This group will have responsibility for providing the company with a strategic vision and competitive edge in information technology.

Headquartered in New Orleans, Entergy is a major U.S.-based global energy company with power production, distribution operations, and related diversified services.

Entergy owns, manages, or invests in power plants generating nearly 30,000 megawatts of electricity domestically and internationally, and delivers electricity to about 2.5 million franchise customers in portions of Arkansas, Louisiana, Mississippi, and Texas. It also is a leading provider of wholesale energy marketing and trading services.

Based in San Diego, SAIC is the nation's largest employee-owned research and engineering company, providing information technology and systems integration products and services to government and commercial customers.

SAIC scientists and engineers work to solve complex technical problems in telecommunications, national security, health care, transportation, energy, environmental, and financial services. With annual revenues of $4.7 billion, SAIC and its subsidiaries, including Telcordia Technologies (formerly Bellcore), have more than 38,000 employees at offices in more than 150 cities worldwide.

Entergy Corporation's on-line address is

SAIC's on-line address is

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny

A little bit of background for those unfamiliar with SAIC.

Apr 14 2007, 06:40 AM
“Is this real-world or exercise?”: Cyber-PsyOps Warfare & 9/11

Part IV: Ptech, the OODA Loop and SAIC

    "By 8:56 a.m., it was evident that Flight 77 [which hit the Pentagon] was lost. The Federal Aviation Administration, already in contact with the Pentagon about the hijackings out of Boston, notified the North American Aerospace Defense Command, or NORAD, of American 77 at 9:24, 28 minutes later."

    "'We Have Some Planes,' Hijacker Told Controller", New York Times, 16 October 2001


    "I want to get though to the White House to reiterate that we need air cover."

    New York Mayor Rudolph Giuliani to Police Commissioner Bernard Kerik
    at the World Trade Center just after the second attack on the World Trade Center
    Time Magazine, 7 January 2002

Indira Singh describes the software she sought, the search for which brought her to PTECH:

“The job of this software was to think about all the information that represented what was going in the enterprise at any given time…. For example, it would, it would be a surveillance software that would look at trading patterns that indicated someone was up to no good and then do something about it, send a message somewhere, send a transaction information somewhere, perhaps shut their system down, perhaps shut another system down, perhaps start something up elsewhere… I asked all my colleagues who were industry gurus what would they recommend for this. My buddies recommended PTECH…. it has an artificial intelligence core…. “

“… the networks were going to run the Ptech story on the first year anniversary. However, the White House got wind of the investigation – I have proof of that – and shut the story down in late August.”
Bob Ruppert: p. 90 ff Indira Singh: p. 126 ff

A transcript of a radio interview with Indira Singh Audio here

Mr.John Pike,

    When you look at all of the different military security agencies that [Ptech has] as customers, it's very difficult to imagine how they would not be encountering sensitive information, classified information.

“The company, once known as PTech (now GoAgile), has been contracted to provide sophisticated computer software to several government agencies, including the Army, the Air Force, Naval Air Command, Congress, the Department of Energy, the Department of Justice, Customs, the FAA, the IRS, NATO, the FBI, the Secret Service, and the White House.

Shortly after 9/11, the company’s primary investor, Yassin al-Qadi (al-Kadi), was identified by the US government as a specially designated global terrorist. Officials describe al-Qadi as one of Osama bin Laden’s "chief money launderers," and allege he transferred as much as $3 billion to al-Qaeda during the 1990s.

Al-Qadi is a wealthy Saudi with connections to banking, diamonds, chemicals, construction, transportation, and real estate. He once headed Muwafaq, an Islamic charity the US Treasury Department described as an “al Qaeda front that receives funding from wealthy Saudi businessmen.” Al-Qadi also maintained an unusually close relationship with notable US politicians. While attempting to defend Ptech, the American Arab Anti-Discrimination Committee of Massachusetts (ADCMA) revealed the fact that al-Qadi “was prominent in Washington circles and even showed President Jimmy Carter and Dick Cheney around during their visits to Saudi Arabia.”

Al-Qadi told an Arab newspaper in October of 2001 that he “spoke to [Dick Cheney] at length” and they “even became friends.” Similarly, while speaking with Computer World Magazine, Ptech cofounder Oussama Ziade said that al-Qadi “talked very highly of his relationship with [former President] Jimmy Carter and [Vice President] Dick Cheney."

Ptech, under al-Qadi’s ownership, supplied the US government with what is known as enterprise architecture. According to Glenn Watt of Backbone Security, "Enterprise architecture is really the design, the layout, the blueprint if you will for the computer networks and computer systems that are going to go into an organization." In regard to Ptech, he said, “The software they put on your system could be collecting every key stroke that you type while you are on the computer. It could be establishing a connection to the outside terrorist organization through all of your security measures." John Zachman, who is considered the “father” of enterprise architecture, said, "You would know where the access points are, you'd know how to get in, you would know where the weaknesses are, you'd know how to destroy it."

Former FBI counterterrorism analyst Matthew Levitt has said, “For someone like [al-Qadi] to be involved in a capacity in an organization, a company, that has access to classified information, that has access to government open or classified computer systems would be of grave concern.”
Please read the entire article at the link above…

as well as this one:

See also (and read in their entirety) the Cooperative Research notes on Ptech which note:

“Ptech will help build “the Military Information Architecture Framework, a software tool used by the Department of Defense to link data networks from various military computer systems and databases.”


Mike Ruppert:

“Whoever plotted 9/11 definitely viewed the FAA as an enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful. To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House & Secret Service had the same software on their systems - likely a superior modified version capable of "surveillance and intervention" functions…. Enterprise architecture software is designed with the express purpose of knowing everything that is going on throughout the entirety of the enterprise in real-time.” [Doesn’t that sound like having good situation awareness?]

Ptech Inc. Confidential Business Plan: Page 37 of 46 11/7/2001:

    “The FAA recognized the need for leveraging its IT investment, with a means of centralizing activities and introducing consistency and compatibility within the operating systems environment. A Ptech consulting team was organized to use activity modeling to identify key functions that could be examined for improvement in network management, network security, configuration management, fault management, performance management, application administration, network accounting management, and user help desk operations.”

Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Mitre knew the FAA's technological enterprise inside and out, including any simulation-and-testing (war game) technology operated by the FAA.


According to Ruppert:

    “ Ptech is Total Information Awareness . . .“Programs based on datamining are powerful analytical tools; finding meaningful patterns in an ocean of information is very useful. But when such a tool is driven by a high-caliber artificial intelligence core [P-tech], its power gets spooky. The datamining capability becomes a smart search tool of the AI [Artificial Intelligence] program, and the system begins to learn. . . . ’Neural Network’ programming is modeled on the computational techniques used by the human brain - an electrochemical computer that uses neurons instead of semiconductors; the firing or non-firing of neurons instead of ones and zeros. With neural networking, software has become much smarter than it had been . . .

    “ . . . Ptech's Framework can exploit the patterns it detects and extrapolate future probabilities. Then it can integrate itself with the computers from which it's getting the information and intervene in their functioning. The result is a tool for surveillance and intervention. The program can identify suspect streams of cash in a banking network and allow a bank officer to freeze the suspect assets. Of course, a user could direct the same program to prevent detection. It can discover salient anomalies in a person's movements through a city and either flag those anomalies for further scrutiny, or erase them from the record. And it can find errant flights in an air traffic map and initiate an intercept response. Or not.”

Read about the DOJ and FBI investigations of Ptech here.

Note also that Chertoff was minority counsel in the first Senate investigation related to the death of Vincent Foster and majority special counsel in the second such Senate investigation. See .

Neither Indira Singh, nor Ptech, warrant a mention
in the official 9/11 Commission report.


The OODA loop is used to create “the fog of war”.

According to Col John Boyd's observation-orientation-decision-action (OODA) loop theory, this kind of offensive effort can "enmesh [the] adversary in a world of uncertainty, doubt, mistrust, confusion, disorder, fear, panic, chaos . . . and/or fold [him] back inside himself so that he cannot cope with events/efforts as they unfold."

If someone truly understands how to create menace and uncertainty and mistrust, then how to exploit and magnify the presence of these disconcerting elements, the Loop can be vicious, a terribly destructive force, virtually unstoppable in causing panic and confusion and – Boyd’s phrase is best – “unraveling the competition”.

The most amazing aspect of the OODA Loop is that the losing side rarely understands what happened.”

    “Gingrich had been out of the House for nearly 3 years, but he was an ally of Rumsfeld and a member of his Defense Policy Board, an influential advisory group. Gingrich was also one of a number of military theorists in the nineteen-eighties who tried to imagine a new American military suited to a world beyond the Cold War. Their intellectual patron was the late Air Force Colonel John Boyd, whose cardinal tenet was a concept that he called the “OODA loop”. (From

In addition to the use of the OODA loop in strategic management and operations with multiple war game scenarios, the OODA loop also has widely accepted application within computer programming circles, especially as it pertains to cybersecurity. Some examples:

    Wood, Bradley and Schudel, Gregg, Modeling Behavior of the Cyber Terrorist, (pre-publication draft presented at various 1999 DARPA Workshops). This paper identifies an adversary cycle that leads to such a “packet of death”. This cycle consist of an Adversary Orient, Observe, Decide and Act (OODA) loop consisting of intelligence gathering, preparation, and development, live network discovery, test-practice-replan, attack and damage assessment processes.

    “Information warfare, in its essence, is about…the way humans think and, more important, the way humans make decisions.” (Stein, 1996)

    ”Effective information operations entail some of the most extreme warfighter demands ever encountered. This is especially true for information operations, where the prospects include the fastest, most numerous, most anonymous, and most rapidly reconstitutable attackers in military history. The information operations mission must be accomplished in an environment (“cyberspace”) where “fog” is common and routine access can become pure “friction.” Moreover, the operations tempo is marked in milliseconds, and this makes information operations the warfighting effort most reflective of Col. John Boyd’s (1987) analysis in terms of adversaries’ OODA (Observe-Orient-Decide-Act) Loops.

    High performance information operations entail global situation awareness (SA), efficient threat identification, and effective attack assessment. To achieve these ends watch center staff must monitor, manage, and manipulate data streams and information artifacts large in number, high in complexity, and dynamic in the extreme.”



SAIC has been involved in military simulation.

SAIC was one of four contractors selected to provide support for Phase I of the U.S. Air Force Distributed Mission Training Operations and Integration program. See

“SAIC has unique experience in information security, Internet-based video networks, video search and indexing. SAIC’s government services expertise, specifically its reputation in supplying security solutions for the DOD, NSA and FBI, provides Onstream Media and its customers with top-notch engineers and the highest DOD-level security infrastructure.”

In 1998-1999, SAIC was also involved in a study of functional system performance parameters and decomposition of air traffic control/air traffic management. See (See especially page 15).

According to SourceWatch:

    “Christopher Ryan Henry, SAIC's corporate vice president for strategic assessment and development, previously worked at the the Pentagon as deputy undersecretary of defense for policy, serving with Under Secretary of Defense for Policy Douglas Feith." In 2006, they were dropped from an Iraq war psy-ops project.

According to Mark Lewellen-Biddle in his December 2003 article Voting Machines Gone Wild!,

    “… Diebold hired Scientific Applications International Corporation (SAIC) of San Diego, to assess the security of the company’s voting software.... Many SAIC officers are current or former government and military officials. Retired Army Gen. Wayne Downing, who until last summer served as chief counter-terrorism expert on the National Security Council, is a member of SAIC’s board. Also on the board is former CIA Director Bobby Ray Inman, who served as director of the National Security Agency, deputy director of the CIA and vice director of the Defense Intelligence Agency. During the first Bush administration and while on the board of SAIC, Inman was a member of the National Foreign Intelligence Board, an advisory group that reports to the president and to the director of Central Intelligence.

    Retired Adm. William Owens, a former vice chairman of the Joint Chiefs of Staff who sits on Defense Secretary Donald Rumsfeld’s Defense Policy Board, served as SAIC’s president and CEO and until recently was its vice chairman. He now is chairman of the board of VoteHere, which seeks to provide cryptography and computer software security for the electronic election industry. Robert Gates, ex-CIA director, former SAIC board member and a veteran of the Iran-Contra scandal, also is on the board of VoteHere.”

Non-Linear Dynamics of War

It was previously noted that war and the events of 9/11 were dynamic. There is an additional factor of such dynamism, that of non-linear dynamism. Dr. Linda Beckerman of SAIC wrote a paper in 1999 entitled 'The Non-Linear Dynamics of War". Interestingly, she references the OODA loop several times:

    The Boydian approach tracks extremely well with the nonlinear dynamics of war. He advocates that we "Operate inside adversary's observation-orientation-decision-action loops to enmesh adversary in a world of uncertainty, doubt, mistrust, confusion, disorder, fear, panic, chaos,..and/or fold adversary back inside himself so that he cannot cope with events/efforts as they unfold." He refers to the Strategic Game as "A game in which we must be able to diminish adversary's ability to communicate or interact with his environment while sustaining or improving ours".

    "Generate many non-cooperative centers of gravity, as well as disorient, disrupt, or overload those that adversary depends on, in order to magnify friction, shatter cohesion, produce paralysis, and bring about his collapse."

    … At the same time, we deny the adversary the same ability by disrupting his interactions to create non-cooperative centers....

    It is interesting to view Boyd's legacy to us in light of the role that new technology plays in our ability to wage war. It has become very vogue in some circles to invoke Boyd's OODA Loop as justification for new, superior technology to win "the information war". The idea is that we can be almost omniscient with regards to situational awareness, and become capable of replan and redirection at ever increasing speeds.

That article is hosted at a web site run by folks whose “methods closely follow the ideas of the late American strategist, Col John R. Boyd, USAF, particularly his concepts for dislocating competitors before engaging in decisive actions. We bring over 30 years of experience in this area, including several years working directly with Col. Boyd on applications of his strategy to business competition. Our services include training, consulting, and preparation of business plans and strategies. We also built and operate Defense and the National Interest which retains Col Boyd's original focus on military applications. This site specializes in the emerging "fourth generation" of warfare such as we experienced on September 11, 2001.”