-Caveat Lector-

[radtimes] # 205

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
Send $$ to RadTimes!!  -->  (See ** at end.)
-----------------------------------------------------------------------------------------------------------
Contents:

--Eighteen months for 'White Hat' Hacker
--Brave new babies
--14 Illegal Immigrants Die in Desert
--Human trafficking on the rise
--White House site crippled by DoS attack
--Sensitive E-mails 'Being Read By Spy Network'
--Those Seattle WTO riots? It's just a game now, folks
--China Clones Scores of Plants, Pigs, Sheep, Rabbits, Cows
--Spies hang on our every word
--U.S. 'Impediment' to Human Rights, Report Declares
--You are being watched

===================================================================

Eighteen months for 'White Hat' Hacker

http://www.securityfocus.com/news/207

By Kevin Poulsen
May 21, 2001 7:00 PM PT

San Jose, Calf.--Computer security researcher and former FBI informant
Max Butler was sentenced Monday to 18 months in prison for launching
an Internet worm that crawled through hundreds of military and defense
contractor computers over a few days in 1998.

In handing down the sentence, federal judge James Ware rejected
defense attorney Jennifer Granick's argument that the Air Force, and
other victims of the worm, improperly calculated their financial
losses from the hack. The judge also declined to give Butler credit
for his brief stint as an undercover FBI informant, during which he
infiltrated a gang of hackers that had penetrated 3Com's corporate
phone network.

But the judge refused prosecutor Ross Nadel's request that Butler be
immediately taken into custody in the courtroom, and allowed the
hacker to remain free on bail until June 25th, when he's scheduled to
report to prison. With credit for good behavior, Butler will be
eligible for assignment to a community halfway house as early as April
of next year, and will be released in mid-October 2002. He'll then
serve three years of supervised release during which, under a special
order, Butler will be barred from accessing the Internet without
permission of his probation officer. Ware also ordered Butler to pay
$60,000 in restitution.

A consultant who specializes in performing penetration tests on
corporate networks, the 28-year-old remained well regarded in computer
security circles even after his March, 2000 indictment. Butler is
known for his expertise in intrusion detection: the science of
automatically analyzing Internet traffic for "signatures" indicative
of an attack, and he created arachnids, a popular open source catalog
of attack signatures that forms part of an overall public resource at
WhiteHats.com

Butler, known as "Max Vision" to friends and associates, crossed the
line in June of 1998, at a time when much of the Internet was still
vulnerable to a hole that had been discovered months earlier in a
ubiquitous piece of software called the BIND "named" domain server.
The hacker group ADM published a computer program capable of spreading
through vulnerable systems automatically. Butler launched a special
strain of the worm that penetrated systems, but also automatically
closed the BIND hole as it spread, forestalling attacks from other
hackers.

Tall and soft-spoken, wearing a blazer and rumpled cargo pants, the
hacker apologetically told Judge Ware that he got caught up in the
need to close a serious security hole.

"I got swept up," said Butler. "It's hard to explain the feelings of
someone who's gotten caught up in the computer security field... I
felt at the time that I was in a race. That if I went in and closed
the holes quickly, I could do it before people with more malicious
intentions could use them."

Butler did not address why he left malevolent features from the ADM
worm in his own program, including one that created a secret back door
on every system it penetrated.

"What I did was reprehensible," Butler told the court. "I've hurt my
reputation in the computer security field. I've hurt my family and
friends."

Judge Ware emphasized the need to deter other hackers. "There's a need
for those who would follow your footsteps to know that this can result
in incarceration," said Ware.

===================================================================

Brave new babies

http://www.newscientist.com/newsletter/news.jsp?id=ns229228

An automated IVF chip could lead to production-line embryos

by Anil Ananthaswamy
  From New Scientist magazine, 26 May 2001.

THE children of the future may be conceived and spend their first few days
of development on a computer-controlled chip.

In a move recalling Aldous Huxley's famous production lines for making
babies in Brave New World, researchers in the US are building a "chip" that
can automatically carry out all the steps involved in IVF, from fertilising
eggs to preparing embryos for implantation. Ultimately, such devices--which
amount to artificial reproductive tracts--may even be able to sort and test
embryos for genetic flaws.

So far researchers David Beebe and Matthew Wheeler have built prototypes
that can carry out the major steps involved in IVF, though not all on the
same chip. Far more mouse embryos develop successfully on these devices than
by traditional methods.

The researchers say they expect the technology will first be used for
livestock production, but their eventual aim is to use it for human embryos.
The work could be the first step towards a future in which IVF becomes the
norm, says George Seidel, a reproductive physiologist at Colorado State
University in Fort Collins. "Fifty or 100 years from now, our in vitro
procedures for parts or even all of pregnancy may end up being safer than
dealing with the various things that occur in the body--in terms of viruses
that the mother comes across, toxins, and so on."

In conventional IVF, sperm and eggs are dumped into a Petri dish where the
fertilised eggs grow until they're ready to be implanted. As embryos need
different culture media at different stages, embryologists transfer them
from one dish to another via a pipette. "It's like being plucked out of the
Atlantic Ocean and stuck into the Pacific Ocean," says Beebe, a biomedical
engineer at the University of Wisconsin, Madison.

So Beebe and Wheeler, an embryologist at the University of Illinois at
Urbana-Champaign, designed a device to mimic conditions inside a female's
reproductive tract. The device, made of a transparent elastomer, resembles a
small glass slide and contains a network of tiny channels, each around 0.2
millimetres in depth and width. The researchers connect the channels to
programmable syringe pumps, which can move embryos around and add or remove
fluids.

To test the device, the team cultured mouse embryos to see how many
developed to the "blastocyst" stage, ready to be implanted. "In 48 hours, in
the traditional Petri dish, none of them made it to the blastocyst stage. In
our channels, about 75 per cent made it," says Beebe. "The embryos were
transplanted into hosts and live pups were born. So there doesn't appear to
be any detrimental effect."

The researchers also used the device to remove the "zona pellucida" shell
that encases early embryos. In human IVF, this "assisted hatching" can be
used to encourage implantation. Traditionally, the embryo is put into an
acid medium and quickly removed when the embryologist sees the zona break
up.

But waiting this long may damage the embryos. By washing acid over mouse
embryos "parked" in a microchannel on a chip (see Graphic), the team found
even with a brief exposure, the zona broke up after the acid was removed.
"People have been leaving embryos in the acid too long," says Beebe.

In a separate experiment, the team matured mouse eggs inside the channels,
then fertilised them by squirting sperm over them. Eventually they hope to
integrate all the steps into a single artificial reproductive tract.

Crucially, the chip-like device not only allows many embryos to be cultured
at once, it allows each one to be individually manipulated and tracked in
separate channels. That should make it easier to weed out poor-quality
embryos before implantation. Embryologists already inspect embryos under the
microscope, and some IVF clinics also measure their consumption of oxygen
and glucose and the amount of carbon dioxide they release. All this could be
done more routinely on a reproductive chip, says Beebe.

In time, the device could even make it easier to carry out pre-implantation
genetic diagnosis, where a few cells are removed to screen embryos for
genetic disorders. "That involves more sophisticated manipulation than our
current devices can do. But it is something we are working on," says Beebe.

But quality control raises ethical issues, says Tom Shakespeare of the
Policy, Ethics and Life Sciences Research Institute in Newcastle. "If we are
talking about maximising the chances of becoming pregnant and carrying to
term, then there's less argument. But if we are talking about either
reducing genetic diversity or indeed enhancing selection then there are
major questions."

More at: IEEE Transactions on Biomedical Engineering (vol 48, p 570)

===================================================================

Thursday May 24, 2001

14 Illegal Immigrants Die in Desert

By GIOVANNA DELL'ORTO, Associated Press Writer

WELLTON, Ariz. (AP) - Fourteen illegal immigrants have died and at least
two others were missing Thursday, five days after smugglers abandoned them
in the blistering heat of the Arizona desert.

The death toll was a record for immigrant smuggling in Arizona.

Rescuers using helicopters and four-wheel-drive vehicles found one survivor
early Thursday and, based on footprints, believed two Mexican immigrants
remained missing. They had earlier found 11 survivors, some unconscious,
who were hospitalized for heat exhaustion and severe dehydration.

Searchers had found 11 bodies Wednesday, and one immigrant died en route to
a hospital. Two more bodies were found overnight, Border Patrol spokesman
Maurice Moore said in Yuma.

``We intend to work this until we've made sure that there's no one left out
there,'' Moore said. ``It's in the middle of nowhere there.''

Survivors said the immigrants, including some said to be from the Mexican
state of Veracruz, were smuggled into the United States on Saturday east of
Yuma, in the rugged terrain of the Cabeza Prieta National Wildlife Refuge.

The smugglers left them there, promising to return with water and
instructing them to walk for ``a couple of hours'' to a highway. But they
never came back. The highway was more than 50 miles from where they were
abandoned.

The Border Patrol began its search Wednesday after five sunburned survivors
found agents and sought help. Temperatures climbed as high as 115 degrees.

Search teams were operating out of Wellton, 130 miles southwest of Phoenix.
The bodies were discovered about 25 miles from the Mexican border.

The 14 immigrants who succumbed to exposure made up the largest group of
border crossers ever to die in Arizona, Border Patrol spokesman Rene
Noriega said in Tucson. He didn't know what the worst death toll in other
states was. In July 1980, 13 Salvadorans died in the desert Organ Pipe
Cactus National Monument, 50 miles east of where the current group died.

``This is evidence of the callousness and the ruthlessness of these
smugglers who have now taken human lives to turn them into a commodity,''
Noriega said.

Arizona became a popular crossing point for illegal immigrants in the
1990s, after crackdowns in California and Texas pushed more people to try
to enter the country through remote and dangerous areas.

The Border Patrol said 106 people died while crossing southern Arizona's
deserts during the 12-month period that ended on Sept. 30, 2000. Many of
them died from exposure.

``What's causing it is the deadly strategy of the Border Patrol that has
forced people into the most hazardous areas of the desert,'' said the Rev.
John Fife, a Tucson pastor who supports a program that built a watering
station for immigrants in Arizona.

In August 1997, eight Mexican illegal immigrants drowned after being swept
away by a 15-foot high wall of water in a normally dry wash a few yards
inside Arizona. In June 1996, five illegal immigrants from Mexico died of
exposure in the desert 30 miles south of Casa Grande.

``People are very, very ill-prepared to understand the distances and the
dangers and threats to their lives,'' said the Rev. Robin Hoover, a Tucson
pastor who sets up water stations for border crossers. ``For many of the
people who cross, they have no idea what they are encountering.''
-------------
On the Net:

Border Patrol: http://www.ins.usdoj.gov/graphics/lawenfor/bpatrol/

===================================================================

Human trafficking on the rise

http://www.cnn.com/2001/WORLD/europe/05/24/labour/index.html

May 25, 2001

GENEVA, Switzerland -- Forced labour and human trafficking is increasing
across the world, a United Nations study says.

Women, children and migrants were most at risk, with demand for domestic
staff and workers in the sex industry responsible for fuelling the trade.

"The growth of forced labour worldwide is deeply disturbing," said Juan
Somavia, director general of the U.N. International Labour Organisation.

"The emerging picture is one where slavery, oppression and exploitation of
society's most vulnerable members have by no means been consigned to the
past."

He called on the world to "re-examine its conscience and instigate action to
abolish forced labour and the often terrible living and working conditions
that accompany it."

Most countries in the world were either sending countries, transit countries
or receiving countries, the United Nations body said in the 128-page report.

Although the Geneva-based ILO gave no overall figures, it said the United
States was believed to be the destination for 50,000 trafficked women and
children each year alone, with New York and California the main entry
points.

The report said slavery was increasingly rare but still found in a few
countries.

"The wholesale abduction of individuals and communities in such
conflict-torn societies as Liberia, Mauritania, Sierra Leone and Sudan is
not uncommon," the report said.

According to the ILO, domestic workers in many countries were trapped into
forced labour -- prevented from leaving employers' homes -- through tactics
such as withholding pay or identity documents.

In many countries in South Asia and Central and South America, millions are
living in conditions of debt bondage -- tied to their employers by unpayable
debts.

In the sex industry, workers were also forced to stay in the job through
debt.

"The person may enter into an agreement with the recruiting agent on an
apparently voluntary basis ... but conditions at the destination point are
likely to involve coercion, including physical restrictions on freedom of
movement, abuse or violence, and fraud," it said.

"Victims frequently find themselves trapped in debt bondage and other
slavery-like conditions."

Europe has seen an explosion of trafficking since the break-up of the former
Soviet Union, with men and women from eastern Europe and the Balkans
constituting the vast majority of those on the move, according to the ILO.

"Poverty, unemployment, civil disorder, political repression and gender and
racial discrimination make for an all too propitious environment for
traffickers' exploitation of vulnerable people."

Authorities had difficulty detecting the trade as it is often carried out by
international gangs who find it less dangerous than drug smuggling.

People smugglers have rarely been caught and the punishments handed down
were usually lighter than for drug smuggling, the ILO said.

Main destinations were the large cities of Western Europe, Israel, Japan and
the U.S., the report said.

The report pointed to Myanmar, or Burma, as the "prime instance of an
extreme case of forced labour."

The country is subject to ILO sanctions following revelations of widespread
use of forced labour for infrastructure projects or by the military.

In a recent high-profile incident of trafficking, 43 children and young
adults were set adrift in a ship off the Benin coast.

The accounts of children removed from the ship when it docked confirmed the
ship was involved in child trafficking, the U.N. children's fund and an aid
group concluded.

But both organisations stopped short of alleging that any of the 43 children
and young adults aboard was destined for slavery.

===================================================================

White House site crippled by DoS attack

http://news.cnet.com/news/0-1003-200-6044030.html?tag=mn_hd

By CNET News.com Staff
May 25, 2001

The White House Web site has been hit by its third denial of service
attack this month, rendering the site inaccessible for more than six
hours on Tuesday.

The hacker attempt on the whitehouse.gov domain, which crashed the
site, lasted from 11 a.m. until after 5 p.m. PDT Tuesday. The White
House confirmed that the barrage of page requests created through the
attack was "heavy enough to block most legitimate users."

On May 4, the White House.gov site was down for more than three hours
due to a similar attack, purported to be linked to a string of Web
site hacks and defacements organized by Chinese and pro-Chinese
Internet vandals during the first week of May.

The Hackers Union of China admitted responsibility for numerous
attacks on U.S. government and commercial sites at the start of May.
It has not been confirmed whether the same group was behind Tuesday's
attack.

===================================================================

Sensitive E-mails 'Being Read By Spy Network'

Computer users were today urged to encrypt their emails in a bid to
protect themselves against a worldwide electronic spy network which
does not officially exist. The danger comes from Echelon, the
Anglo-American intelligence operation, say Euro-MPs in a report at
the end of a year-long inquiry. Their report warns the government
that Britain could be in breach of the European convention on human
rights because of its participation in the global spying operation.

Full story - Washington Post
(http://www.washingtonpost.com/wp-dyn/articles/A89250-2001May28.html)
Background: Echelon explained - Guardian Unlimited
(http://www.guardianunlimited.co.uk/theissues/article/0,6512,498147,00.html)
Key player: Echelon temporary committee - European Parliament (
http://www.europarl.eu.int/committees/echelon_home.htm)
Background: Echelon watch - Cyber-rights and Cyber-liberties (UK)
(http://www.cyber-rights.org/interception/echelon/)

===================================================================

Those Seattle WTO riots? It's just a game now, folks

http://seattletimes.nwsource.com/html/localnews/134300484_wtogame29m.html

Associated Press
Tuesday, May 29, 2001

TACOMA - If you missed the riots and protests at the World Trade
Organization meeting in Seattle a year and a half ago, you may soon get
another chance.

Video-game players can march down the middle of a city street to the beat of
loud music, launch a rocket or brick into a storefront window, even punch
out an officer in riot gear while playing "State of Emergency."

Rockstar Games revealed the game - due in October for Sony PlayStation 2 -
earlier this month at the Electronic Entertainment Expo in Los Angeles.

No coincidence

A spokesman for Rockstar has acknowledged that the game has strong ties to
the WTO riots in late 1999. Take-Two Interactive Software, parent company
for Rockstar Games, was unavailable for comment yesterday, a holiday.

Some 50,000 people marched through Seattle, disrupting the WTO meeting and
downtown business in protesting global issues such as human rights, labor
issues and the environment.

Most were peaceful, but conflicts surrounding the WTO meeting resulted in
the arrests of 600 people and property damage of $3 million.

"State of Emergency" is billed as an "urban riot game set in the near
future, where the oppressive American Trade Organization (ATO) has declared
a state of emergency. ... It is up to you to smash up everything and
everyone in order to destabilize the ATO."

Scoring points

A player can overturn vehicles, incite rumbles between rival groups and
attack bystanders. Extra points can be made by punching out an ATO officer
in riot gear, knocking him to the ground and jumping on him.

The game already has drawn criticism.

"If you want your child to become a violent anarchist, this is a great
training game," said state Rep. Mary Lou Dickerson, D-Seattle. Dickerson,
who joined the ranks of peaceful WTO demonstrators, called the game "a slap
in the face of the peaceful ideals of 40,000 protesters."

After watching a video clip on the publisher's Web site, she said the game
seems to show anarchists whose violent actions all but obscured the message
of the peaceful demonstrations in Seattle.

State Rep. John Lovick, D-Mill Creek, a state trooper who was on duty in
Seattle during the WTO meetings, also found fault with the game's premise.

"To re-enact things like that in a digital arena sends a very strong
message," he said. "It's just better to try to heal a community."

Dick Lilly, spokesman for Seattle Mayor Paul Schell, said the game will
never show up in any city-run community center.

"I think research has raised enough serious questions about these kinds of
violent games that people should be very skeptical and critical of this kind
of content," he said.

It's not child's play

The Rockstar spokesman said the company is being careful to follow
advertising guidelines set by the Entertainment Software Rating Board to
ensure that "State of Emergency" isn't marketed to children.

Arthur Pober, president of the ratings board, refused to comment on the
game, which has not yet been rated. The vast majority of games fall into the
E (Everyone) and T (Teen) categories. Most of the M (Mature) games are aimed
at older players..

===================================================================

Tuesday, May 29, 2001

China Clones Scores of Plants, Pigs, Sheep, Rabbits, Cows

<http://english.peopledaily.com.cn/200105/29/eng20010529_71313.html>

China has already developed 47 transgenic plant species, cloned goats and
transplanted genes into pigs, rabbits, sheep and cows, according to an
official report released Tuesday.
According to the report released by the Ministry of Science and Technology
at a press conference in Beijing, that by the end of 1996, the transgenic
plant species on which China had been researching reached 47, concerning
103 kinds of genes.
The report said that China has been successful to clone goats by adopting
the fetus somatic cell of the transgenic goat and adult somatic cell. "The
rate of success is 10-20 times as many as Sheep Doly," the report said.
China has also bred pigs, rabbits and sheep of growth hormone (GH)
transfer. According to the report, the general rate of external source gene
introduction into the animals was 2.1 percent, reaching the world's
advanced level. "China has obtained remarkable achievement in animal
cloning and transgenic animals," said the report, entitled "Present Status
of the Chinese Hi-Tech Agriculture and Its Goal during the Tenth Five-Year
Plan (2001-2005). "
The report said that through efforts in the past decade, China has made
remarkable achievements in pest and disease resistance, quality
improvement, herbicide resistance and security control in genetic
engineering of plants.
According to the report, China has reached the world's advanced level in
the research field of improving crops with radiation and of the application
of nucleon tracing technique to agricultural chemicals. Among the mutation
breeds which have been cultivated, ten have won national invention awards.

===================================================================

Spies hang on our every word

http://news.com.au/common/story_page/0,4057,2057540%255E1683,00.html

By CHARLES MIRANDA
31may01

IN SYDNEY'S western suburbs, a mother e-mails her son in mainland China to
ask about the weather and his new job with an international aid agency.

About the same time, a senior executive from a high-profile Japanese coal
and ore trader holds a telephone conference with partners about a sensitive
multimillion-dollar South American tender.

Both conversations are personal and important in their own right.

But, according to a European Parliamentary investigation, both types of call
are being monitored by a global electronic spying network involving
Australia.

A draft report released in Brussels yesterday warned governments and
companies to encrypt all sensitive electronic messages to protect them from
eavesdropping.

This includes e-mails, telephone conversations from landline and mobile,
faxes and electronic banking.

For more than a year there have been rumours worldwide that the secretive US
National Security Agency (NSA) was networking with "defence club" allies
Australia, Britain, Canada and New Zealand to intercept millions of
communications.

The existence of the operation, codenamed Echelon, has never been confirmed
nor denied but is said to utilise more than 120 satellites left over from
anti-Soviet Cold War days to indiscriminately intercept communications 24
hours a day, seven days a week.

Microsoft is allegedly collaborating by placing a secret "back door" access
in its Windows software, used by nine out of 10 PCs.

It is a conspiracy theorist's dream. But a much-anticipated investigation
has ended speculation about the existence of Echelon, with the Euro
committee of MPs yesterday concluding "there is no more doubt" the global
spy ring is operating.

Echelon has been credited with causing French firm Thomson to lose a radar
contract in Brazil, a European Airbus consortium to lose a $9.6 billion
airline contract in Saudi Arabia, and causing the failure of several
European tenders for contracts in South-East Asia.

The draft report -- which will be submitted for a vote by committee members
at the end of June before being discussed and voted on by the European
Parliament -- has warned all EU government institutions, agencies and
companies to "systematically" encrypt communications, particularly e-mails.

It said Echelon, in the process of industrial spying, was eavesdropping on
millions of daily communications between ordinary people.

Australia's involvement is centred on operations in a small basement at the
Defence Signals Directorate (DSD) facility in Geraldton in Western
Australia, DSD headquarters at Russell Hill in Canberra and the Office of
National Assessments (ONA). The network of spy bases acts as a giant vacuum,
sucking in millions of e-mails.

While it is largely indiscriminate, a super computer analyses can focus in
on sensitive information using a dictionary of key words to flag certain
communications.

These selected communications are then examined closely for information
which may be relevant to a government or industry.

According to some reports, the system has recorded conversations involving
Diana, Princess of Wales, the Pope, Greenpeace, Amnesty International and
other international aid agencies.

Echelon also took an interest in Mark Thatcher, son of former UK prime
minister Margaret Thatcher, because of his involvement with arms deals with
Saudi Arabia.

International aid agencies have been a particular target because of the
intelligence that can be gained from their work with foreign regimes, some
of which are deemed hostile.

Australia's spying has been on South-East Asia, the Pacific Rim and parts of
the Indian Ocean, with particular focus on Japan, China and Indonesia.

Industrial espionage is nothing new but never before has a global consortium
of nations had such an technological advantage.

Australia's Inspector-General of Intelligence and Security, Bill Blick,
yesterday declined to buy into the debate.

"My position has fundamentally not changed and that is I can neither confirm
nor deny the existence of the Echelon network," he said.

"My duty as inspector general is to ensure our intelligence and security
agencies operate properly and comply with our laws ... and in my view they
do so."

Royal Melbourne Institute of Technology (RMIT) security expert Dr Serdar
Boztas said yesterday all Australians should be wary of conveying sensitive
information electronically.

"The technical capabilities of Echelon are real ... it is definitely a
privacy issue which applies to e-mail and fax traffic as well," he said.

Echelon has its genesis in the UKUSA Treaty signed in 1947. Australia has
long been considered geographically ideal for spying and, under Operation
Reprieve, has for years used its embassies to spy on host nations.

For the past 12 months British spy agencies have maintained they operate
within the law but the EU warned the UK it could be violating EU rules on
competition, privacy and human rights by being involved in a system that
provides a competitive edge for its companies.

===================================================================

U.S. 'Impediment' to Human Rights, Report Declares

http://www.latimes.com/news/nation/20010530/t000045214.html

        Justice: Amnesty International cites opposition
        to ban on land mines and abuse of female prisoners
        as examples of backsliding

By NORMAN KEMPSTER, Times Staff Writer
    Wednesday, May 30, 2001

        WASHINGTON--The United States set the international standard for
   freedom and democracy decades ago but recently has fallen far short of
   the mark, often becoming an "impediment" to the sort of human rights that
   it once championed, Amnesty International says in a report to be issued
   today.

        The organization, which won the Nobel Peace Prize in 1977, put
   Washington's recent record at the top of a list of "the five greatest
   disappointments" in the field of human rights in the past 40 years.

        "Twenty-five years ago, [President] Jimmy Carter made human rights a
   central tenet of his foreign policy," the report says. "Today, however,
   the United States is as frequently an impediment to human rights as it is
   an advocate."

        The report says Carter's successors in the White House, both
   Democrat and Republican, "have ignored or opposed several key human
   rights treaties."

        It cites specifically the Clinton administration's opposition to
   pacts banning the use of land mines and establishing an international
   criminal court. The Bush administration also opposes the measures.

        Other nongovernmental human rights organizations have criticized the
   U.S. in the past, but the Amnesty International report is one of the most
   scalding. And it comes just weeks after Washington lost its seat on the
   U.N. Human Rights Commission, an incident that generated a wave of anger
   on Capitol Hill and produced a defensive U.S. response to any sort of
   human rights criticism.

        Opening a hearing on the U.N. vote last week, Sen. George Allen
   (R-Va.), chairman of the international operations subcommittee, said it
   may be time to reorganize a U.N. commission that excludes the U.S. but
   includes Sudan, widely criticized here for its human rights record.

        Allen added that the European Union--which holds three seats on the
   U.N. panel--may have to assume the leading role that had been played by
   the United States. Previously, he said, Europe "tended to treat
   dictatorial governments like Cuba, Libya and Sudan as ordinary countries"
   with which profitable business could be done.

        The Amnesty International report levels a similar criticism at the
   United States: "Ten years after the end of the Cold War, the U.S.
   continues to support--through aid, military training and arms sales--many
   of the world's most egregious human rights abusers."

        The report gives no examples, but William F. Schulz, executive
   director of the U.S. branch of the London-based organization, cited U.S.
   aid to the Colombian military, a force frequently accused of human rights
   violations.

        Schulz conceded that the U.S. is not in the same league with
   countries such as Sudan when it comes to repression. But he charged that
   U.S. hypocrisy and a failure to live up to its own standards merited the
   spot at the top of the list of disappointments.

        "The U.S. is a model and has always seen itself as a model of
   democracy," Schulz said in a telephone interview. "When you are a model .
   . . you set the rules and decide which ones to play by."

        The State Department issues an annual report rating the human rights
   practices of every nation except for one--the United States. But Schulz
   suggested several U.S. practices that might merit criticism in the report
   if they occurred elsewhere.

        "The United States is the leading producer of equipment that can be
   used for torture, such as electric shock batons and handcuffs with
   serrated edges," Schulz said. "We have seen growing examples of sexual
   mistreatment of women prisoners by guards and prison officials. And the
   treatment of political asylum seekers is deplorable. When they come here,
   instead of having their cases adjudicated quickly, they are often thrown
   into county jails."

        Other matters on Amnesty International's list of disappointments
   include the failure of the fall of communism in Europe to produce a
   genuine democratic revolution; continued acts of "genocide" in nations
   such as Cambodia, Rwanda and Sudan, despite the world's vow of "never
   again" following the Holocaust; continued impediments to universal human
   rights; and the failure of international institutions to support and
   promote human rights.

        In a contrasting list of human rights advances since Amnesty
   International was established in 1961, the report cites a
   "democratization of information" produced by the spread of computers and
   access to the Internet.

        Schulz said the cyber-revolution means that governments can no
   longer hide repression and persecution.

        Moreover, he said, repressed populations have a way of discovering
   what their rights are, sometimes a first step toward asserting those
   rights.

        Other advances cited by the report include the growth of
   institutions of accountability, such as the international tribunals
   adjudicating war crimes committed in the former Yugoslav federation and
   Rwanda, the development of local human rights organizations, and growing
   recognition that human rights should be universal.

===================================================================

You are being watched

http://www.theage.com.au/news/national/2001/06/02/FFXN4R7UENC.html

By GARRY BARKER
TECHNOLOGY EDITOR
Saturday 2 June 2001

Rights net to widen

Technically speaking, you now stand naked in the world. People you have
never met may know more about you than you can remember yourself. It's all
down to advancing technology and our continuing love-hate relationship with
computers, networking, automatic processing and customer relations
management.

Tougher laws protecting individual privacy rights come into force in
September but, says Federal Privacy Commissioner Malcolm Crompton, few
Australian companies are truly ready with privacy policies to cover the
information they collect as byproducts of their enterprise. Yet breaches
will be rigorously prosecuted and restitution exacted for failure to protect
private rights, he says.

The risk to individual privacy has arisen almost unnoticed. Video
surveillance, telephonic tracking, data mining and a host of other
technologies, collecting, collating and hoarding every detail of yourself
and your life are now proliferating faster than Mallee rabbits.

Big Brother is bigger in some countries than others but, wherever there are
computers, Eftpos, electronic banking, closed circuit cameras, e-mail,
electronic tollway billing and the Internet you're being watched. Britain,
which now has more than 1.5 million closed-circuit television cameras in its
streets, parks and buildings is the most-watched country on Earth, although
Germany and the US are catching up fast. So, for that matter, is Australia.

Here are some of the snoops you may encounter on an average day around
town.:

Eftpos, credit cards and loyalty schemes: Loyalty cards, such as Fly Buys,
are not there to get you to Sydney. They are aimed mostly at keeping your
custom at member companies' shops, but they can be linked to what you
bought, and where and when, and used to either push products to you (since
they also know your mail and e-mail addresses, your phone number and often
much else, perhaps even your income bracket. Similarly, whatever you bought
is, or can be, linked to your credit card, which can then give a picture of
your spending habits, tastes, weaknesses and financial strength.

e-tags: Cars moving along the City Link tollways are all logged, which means
someone knows they are there and in which direction they are headed. The
e-tag on the windscreen links with the computer system operated by the
private company that owns the highways. Cars without e-tags are photographed
and that image is stored. It might, therefore, be possible to identify
someone in the car, though probably the angle of view would preclude that.

Mobile phones: Whenever a handset is turned on the radio transceiver inside
it immediately begins to search for and connect to the nearest antenna. Each
antenna inhabits, and is identified by, a cell covering a certain area. As
you move across the landscape, the phone in your hand switches from one cell
to the next, thus effectively charting your movements. This information has
been used in court cases in many countries.

Closed-circuit television (CCTV) cameras on streets: VicRoads operates an
extensive network of video cameras used to manage traffic flow on our
highways, mainly by giving controllers in the Hawthorn operations centre a
view of traffic density that allows them to change the on-off patterns of
traffic lights.

Such cameras are all over the metropolitan area. One of the most prominent
is at the intersection of Victoria and Hoddle Streets. It sits up high above
the traffic, peering down upon the passing parade. Others hide under dark
plastic domes on street corners in the CBD.

CCTV cameras in buildings: Hundreds of shops, supermarkets and buildings all
over Melbourne use closed-circuit video technology to watch their customers
and staff. All of these images can be, and usually are, recorded by
videotape recorders. Use of such images in identifying criminals in
incidents such as hold-ups in banks is now standard practice. But they also
record everyone.

Face recognition systems: In Crown Casino, Colonial Stadium and,
increasingly, even shops and business premises, there is increasing use of
face recognition technology. Images taken by CCTV cameras scanning an area
are sent to computers where software compares every face with photographs
stored on a database. Thus, not only can individuals' whereabouts be
established by time and place, but also the company they are keeping.

Cookies on the Web: Almost every website into which you log will, generally
without your knowledge, insert a tiny piece of software into your computer
that identifies you to the site's owners. That's how e-mail spammers, those
pesky people who keep sending you mail, get your address.

Computer operating systems: Intel and Microsoft, among a few others, have
been criticised several times for hiding identification codes in their
microprocessors, operating systems and applications. The codes allow
individual computers to be identified when they go online, making it
possible to track their progress around the Internet.

Echelon: Echelon is said to be operated by the military and intelligence
agencies of the US, Britain, Canada, Australia and New Zealand. No
government will talk about it. It is believed to monitor e-mails, telephone
calls and other communications flowing over the world's cable and satellite
systems looking for words that might alert intelligence organisations,
police, customs, immigration officers, military and security services to
pending crimes. The concern is not that someone is watching for terrorists
but that innocent people might get caught in the net.

===================================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
======================================================
"The world is my country, all mankind my brethren,
and to do good is my religion."
        -Thomas Paine
======================================================
" . . . it does not require a majority to prevail, but rather an irate,
tireless minority keen to set brush fires in people's minds . . . "
        -Samuel Adams
======================================================
"You may never know what results come from your action.
But if you do nothing, there will be no results."
        -Gandhi
======================================================
"The most dangerous man to any government is the man
who is able to think things out for himself, without regard
to the prevailing superstitions and taboos.  Almost inevitably
he comes to the conclusion that the government he lives under
is dishonest, insane, and intolerable."
        -H.L. Mencken
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________
**How to assist RadTimes:
An account is available at <www.paypal.com> which enables direct donations.
If you are a current PayPal user, use this email address:
<[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this
link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up
and contribute. The only information passed on to me via this process is
your email address and the amount you transfer.
Thanks!

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to