Let their own words condemn them

An explosive insider tape represents incontrovertible evidence that the U.S. Army is stealing technology developments from small businesses

Wes Schneider used to be a small business entrepreneur until a band of corrupt Army officers, their civilian employees, and contractors colluded to steal Schneider’s life-saving technology, reverse engineer it and duplicate it, to drive him out of business.  However, the process of stealing, reverse engineering and duplicating the technology without getting caught took time.  In the meantime, the war profiteers put their own profits ahead of the safety of the American warfighter.

The tape you are about to hear is the first time that anyone has been able to capture in real life how corrupt government officials, including the military and their civilian employees and contractors, were able to come up with a systematic scheme to steal the intellectual property of small businesses and reverse engineer and duplicate it to make money off the backs of the real entrepreneurs.

The first voice you will hear on the tape is that of Wesley Schneider, the inventor of a revolutionary new way for soldiers to drink water on the move in a way that protects them from chemical and biological poisoning on the battlefield. The second voice you will hear is that of a very highly placed official at the U.S. Army’s Natick Laboratories.  We are withholding his name to protect him from possible retaliation.

In the first segment of the tape you will hear how Wes Schneider came forward with the idea for using a “dual hose” technology approach for a closed drinking system as part of an unsolicited proposal presented to the U.S. Army at Natick Laboratories.  However, it wasn’t long before the Army’s principal contractor, Battelle Memorial Institute, stole Wes’s ideas under the guise of a so-called “research study” paid for by the U.S. Army.

Later, Army officials realized that the use of the “dual hose” concept first brought to their attention by Wes Schneider would require retrofitting of thousands of gas masks and canteens that were already being used by soldiers all over the world.  They needed another solution.  So again, they went back to one of Wes’s earlier proposals where he suggested the use of a collapsible bladder inside canteens that would accomplish the same objective of a closed drinking system without having to retrofit thousands of units of protective gear already out in the field.  The Army and their contractors simply helped themselves to Wes’s technology that they knew they did not own.

Then Army officials and their contractors took Wes’s technology “in-house” proclaiming, as part of the cover-up, that they “had a better idea.”  They simply publicly rejected Wes’s idea of using a bladder and then they stole it for themselves.  Doing things “in-house” has the added advantage of making sure that the Army civilians involved would be able to justify their own salaries.  Just listen to how the Army’s workaround scheme works.

Now the question becomes, is stealing technology from small businesses a once in a while affair, or is it something that happens all of the time?  Listen as we are told that it is, in fact, a systemic problem where U.S. Army employees steal technology from small businesses to do work “in-house” as a way to justify their own existence.

So you may be asking yourself, how do they do it?  Well, requirements for new equipment in the military originate with what is called a “requirements document.” Requirements for making or upgrading military equipment are supposed to be based on inputs from military users whose ideas are consolidated at what are called military schoolhouses.  But listen as we are told that instead the ideas are often stolen from small businesses who engage in the Small Business Innovative Research (SBIR) program, or who submit proprietary unsolicited proposals the way Wes Schneider did.

By the time you, as a small business entrepreneur, come up with your new gizmo, the requirements document has already been generated by the Army and allotted a pot of government money to go with it.  Then the Army laboratory simply procures what it wants (if they don’t know anything about it) from a pet contractor, or they move the reverse engineering and duplication of the stolen idea in-house to do it themselves.

By now you are certainly asking yourself, how can they possibly get away with it?  Well, as we hear from our senior official at the Army’s Natick Laboratories, “the Army does not play fair.”  The Army shares the unsolicited proposals of small businesses with other contractors.  And, the trail of evidence quickly becomes cold when the evidence simply disappears.  In the words of our Natick Laboratories official, “It doesn’t surprise me that they can’t find them [the documents] or are not coming forward with them”

Sign Petition

Related Stories


Let their own words condemn them

Investigating Complex Issues