-Caveat Lector- from: http://www.aci.net/kalliste/ <A HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin Grabbe</A> ----- Year 2000 US Cities Building Secret Y2K Bunkers Gotta protect government officials AMERICA'S major cities are preparing secret command centres and making plans to mobilise armed troops in the event of a possible breakdown of social order if there is widespread computer failure on the eve of 2000. City fathers are known to be concerned that the so-called Y2K bug could cause widespread power failures, the breakdown of traffic management and difficulties in running everything from airports to ambulances. The result is a revival of the bunker mentality not seen since the end of the Cold War. Last week New York revealed that its new $12 million emergency command centre was: "Ninety per cent complete but fully operational." The 23rd-floor, 46,000 sq ft complex, near the World Trade Centre in Manhattan, can house up to 100 of the city's most senior employees and is protected behind a wall of bullet-proof glass. It was built above ground because of the risk of flooding from broken water mains. Mayor Rudi Giuliani ordered the construction of the new control room only last year. While it is designed to deal with any emergency from a terrorist attack to a hurricane, the speed of its construction suggests that New York's planning for possible Y2K chaos is at an advanced stage. It was used for the first time during a snow storm in February. Other areas are taking similar precaution. State officials in Ohio announced last month that they were ready to move government operations into a $13-million bunker eight miles outside downtown Columbus on Dec 29. The command centre will be manned 24 hours a day from New Year's Eve until it is no longer needed. It is surrounded by barbed wire, with underground dormitories, a filtered air supply, food and water. The Ohio state officials say that it will be used to co-ordinate relief efforts if there is a major failure of public utilities. The centre's director of operations is James Williams, a retired Army National Guard general who insists that the decision to man the centre for the end of the Millennium is "not a panic situation. If nothing happens, we can go home and watch football." Los Angeles, which experienced serious rioting following the Rodney King trial in 1992, is understood to be preparing an operations centre five floors beneath a federal building in the centre of the city. The Automated Traffic Signal and Control Centre (ATSAC) is normally used to manage traffic in the notoriously congested Los Angeles area but has the advantage of dozens of remote-control cameras at strategic road junctions which could become the eyes and ears of emergency planners. The ATSAC command centre is also designed to be proof against earthquakes and nuclear explosions, and is protected by four vault doors similar to those used in banks. It has its own power system and can be reached only by a secret lift. American government officials have admitted that they have no idea of the possible disruption that the Y2K bug could potentially cause on the most technologically dependent nation in the world. As in Britain, government bodies as well as private companies have been racing against time to ensure that the computers which run everything from nuclear missiles to air traffic control are reprogrammed to work normally from January 1. The Y2K computer problem is caused by some computer chips reading the year 2000 as 1900 because they only recognise the last two digits, and therefore either malfunctioning or shutting off the system they are controlling. Washington has been playing down fears of disruption caused by Y2K computer crashes. Tens of thousands of Americans are less confident, however, and are actively preparing for the worst. Stocks of oil lamps and wood stoves are almost exhausted in many areas, along with supplies of dried foods in quantities which would allow a family to survive for a year. The US Treasury is also preparing to print hundreds of millions of extra dollars because it believes huge numbers of people will take out extra cash before the New Year as a precaution against cash machines failing to work. The question of civil disorder is more sensitive. Responsibility for keeping law and order will rest with the National Guard, a part-time force which has access to guns, tanks and even fighter aircraft. Secret discussions are understood to have taken place at the Army Readiness Centre in Washington last summer to prepare for Y2K-related problems. National Guard units are organised by state but are said to be co-ordinating with Federal agencies on a new command and control system with high-frequency radios, emergency power backup and command centres to be ready by the end of the year. A full recall of all 370,000 and 110,000 army and air National Guard members can only be authorised by Congress and has not taken place since 1940. An initial step would be the cancellation of all armed forces leave on Dec 31. Canada, which has created a task force of 14,500 military personnel to be mobilised from January 1, as part of Operation Abacus, is a step ahead. It has already put all its 60,000 troops and reservists, with the exception of those on overseas duty, on alert for the Millennium. The London Telegraph, April 18, 1999 Der Fuhrer Invades Yugoslavia British & American Special Forces Help Drug-Dealing Maoists SAS teams will help KLA "rise from the ashes" BRITISH and American special forces teams are working undercover in Kosovo with the rebel Kosovo Liberation Army to identify Serbian targets for Nato bombing raids. SAS soldiers fluent in Albanian and Serbian have dodged minefields and Serbian patrols around the torched villages along Kosovo's border with Albania and Macedonia to enter the war-battered province on surveillance missions. One of their priorities is to pinpoint the location of Serbian tanks and weapons which - as The Telegraph revealed last week - have been hidden in garages, buildings and even mosques in villages "ethnically cleansed" of their Albanian populations. Nato later admitted that it was frustrated by the success of the Serbian tactics. The SAS is also advising the rebels at their strongholds in northern Albania, where the KLA has launched a major recruitment and training operation. According to high-ranking KLA officials, the SAS is using two camps near Tirana, the Albanian capital, and another on the Kosovan border to teach KLA officers how to conduct intelligence-gathering operations on Serbian positions. In a major coup for the KLA, the rebels captured a Yugoslav army officer during skirmishes inside Kosovo near the Albanian border and handed him over to Nato. The alliance is holding the man in Albania as a prisoner of war. It is the latest evidence of the growing co-operation between Nato and the KLA, a movement once denounced by the West's leaders as "terrorists" and dismissed by its military strategists as a ragtag force. In the clearest indication that Nato has reassessed the role and value of the once-derided force, the alliance spokesman James Shea enthusiastically predicted that the KLA would "rise from the ashes" and play an increasingly important role in the current campaign. The alliance is now quietly drafting the KLA into its war against Slobodan Milosevic, the Serbian leader. It is even considering plans to train them and ease the arms embargo on Yugoslavia to supply them with weapons such as mortars and rocket-propelled grenades. KLA commanders who gained their military experience as officers in the old and once-respected Yugoslav People's Army know that training is a priority if they are to convert their enthusiastic but raw recruits - many of them young Kosovars who have returned from western Europe - into a strong fighting force. The rebels have been contacted by several private military consultants but fear they may have links with the Serbian secret services, a senior KLA figure told The Sunday Telegraph. They are negotiating for a long-term training deal with Military and Professional Resources International, a mercenary company run by former American officers who operate with semi-official approval from the Pentagon and played a key role in building up Croatia's armed forces. >From their remaining enclaves within Kosovo and reconnaissance missions staged from Albania, the rebels already use satellite and cellular telephones to provide Nato with details on Serbian targets. Their information supplements the surveillance picture constructed from satellite photography and Awacs aircraft. The KLA has no shortage of Kalashnikovs after the Albanian army's arsenal was looted in the 1997 uprising. But Western assistance would be limited and there seems little prospect of the KLA receiving the sort of heavy weapons, such as artillery and tanks, for which it has been lobbying. Nato remains wary of the KLA's politics - which has its roots in the hard Left - its discipline and its military potential. At the headquarters in the northern Albanian town of Krume, Gani Syla, a KLA spokesman, said: "We think it would be a very good idea if Nato provided us with arms. If they had done it earlier, our people would not have had to flee our land as we could have protected them inside Kosovo." Just as important as weapons, however, would be the training that Nato could provide. Although the KLA has been doing its best to look professional as it prepares for war at its bases dotted around northern Albania, the reality is very different. "The KLA is a mixture of good officers and ill-trained volunteers," said a Western defence analyst. "But a big plus is that they have the popular sentiment of the population on their side. That is an important start. The Croats and Bosnian Muslims did not start off in much better shape and look at them now." In Krume, Kukes and Bajram Curri, which resemble KLA garrison towns, there is no resentment from local people as rebel soldiers and military policemen wander openly through the streets. Outside the KLA office in Krume, nine-year-old Ardi wears a rebel cap and carries a bullet. It is, he says unprompted, "for Slobodan Milosevic". The London Telegraph, April 18, 1999 Privacy on the Internet Anonymity NOT by Peter H. Lewis Last week in this column, I described the promise of anonymity on the Net, and some services and products that provide it. But skepticism and the impetus to challenge any product or program reign in cyberspace. So when Richard M. Smith, president of Phar Lap Software of Cambridge, Mass., read the column and saw the claims of the service providers, he could not resist seeing just how good the anonymity provided was. Smith reports that he attacked and easily defeated several of the services. The flaws he reports finding could enable a Web site operator to disable the privacy protections used by the services offering anonymity or trick the operator into passing along information that could be used to identify visitors to the site. Smith is the programmer and amateur sleuth who last month came across a previously obscure identifying code in Microsoft Office documents that investigators used to help link the Melissa computer virus to a computer in New Jersey. The operators of the compromised anonymity services -- Anonymizer.com, the Naval Research Laboratory's Onion Router, the Lucent Personalized Web Assistant service and a fourth service not mentioned in the article, Aixs.Net -- were scrambling this week to patch the security holes. While many of their customers use the anonymity services as a shield against being pestered by marketers and bombarded with unsolicited e-mail, others, like political dissidents, could face much graver consequences if their identities were divulged. The revelation of the anonymity services' bugs is the latest blow in what has already been a dismal year for Internet privacy, a year in which it was learned that Intel had embedded a trackable serial number in its Pentium III chips and Microsoft had put a sneaky "globally unique identifier," or G.U.I.D., in the registration software for Windows 98 and in every document created with Microsoft Office. Both companies say they have backed off, but doubts linger. According to a report last week in The Seattle Weekly, Microsoft has also embedded the G.U.I.D. into its Windows Media Player, which in theory would allow Web site operators to track everyone who downloads a streaming audio or video file. The newspaper also disclosed that Real Networks, whose Real Player software is the main rival to Windows' Media Player, also packs a G.U.I.D. (Real Networks did not respond to repeated requests for comment.) A Bulgarian bug sleuth, Georgi Guninski, reported on his Web site that Microsoft's new Internet Explorer 5.0 had some unpatched holes that might allow an unscrupulous hacker to rig Web pages so they could snatch files from a visitor's hard disk through the Internet Explorer 5.0 Web browser. A computer security consultant in Spain, Juan Carlos García Cuartango, found an array of similar holes in Internet Explorer 4.0, holes that Microsoft says have been patched. Smith's attacks on the services promising anonymity were conducted using Netscape Communicator 4.5, which also has a long history of security bugs and patches. In general, the attacks exploited some relatively obscure features of Java and Javascript, which, along with Microsoft's ActiveX, are increasingly popular software tools that Web site operators employ to create features like updated stock quotes that crawl across the browser screen. If Java, Javascript or ActiveX are running inside a user's Web-browsing software, the Web site can actually load small programs into the visitor's computer. In the case of the privacy services, a booby-trapped Web page could stealthily invoke Javascript to redirect the browser automatically to an unsecured Web page, bypassing a service's protections and allowing the site to grab the visiting computer's Internet, or I.P., address and its cookies -- programs that keep detailed records of a computer's visits to a particular site. Or the booby-trapped site could exploit another bug in the Netscape browser, also through Javascript, to cough up the visitor's hidden Internet address. "That these systems were so easy to break is a little surprising to me," Smith said. He said it had taken him less than an hour to find and exploit the services' bugs. "If you are a user of any of these services," Smith said, "I highly recommend that you turn off Javascript, Java and ActiveX controls in your browser before surfing the Web. This simple precaution will prevent any leaks of your I.P. address or cookies." Lance Cottrell, president of Anonymizer.com, said the success of his popular service depended in part on its ability to disable Java and Javascript. But today's software is so complex, he said, that it is extremely difficult to find every vulnerability. The important thing, he said, is to hope that the person who discovers a bug reports it responsibly and that software makers patch the holes. "There is no such thing as a perfectly secure system, unless it is welded shut in a box and not connected to a network," Cottrell said. The security holes exploited by Smith were first described in a technical paper last year by Aviel D. Rubin, the principal member of the technical staff at AT&T Labs-Research in New Jersey, and Mike Reiter. Rubin and Reiter developed the Crowds anonymity service. Smith said he had not tried to find potential vulnerabilities in Crowds. Rubin, a co-author of "The Web Security Sourcebook" (Wiley Computer Publishing, 1997), said he believed that Crowds was not vulnerable to these kinds of attacks. "Hmm, sounds like a challenge," Smith said when informed of Rubin's comment. Lorrie Faith Cranor, a privacy expert at AT&T Labs-Research, said the discovery of security holes in the privacy services did not mean that anyone's privacy had been compromised. "I would say someone should feel reasonably secure using these services anyway, especially if the developers are prompt in patching holes when they emerge," she said. Microsoft promises that the notorious G.U.I.D. is not included in the Office 2000 upgrade that it began shipping last week to its largest corporate customers. Hackers will have eight weeks to verify the claim before retail versions of the popular application suite go on sale on June 10. Office 2000 will come in four versions. The Standard version (the upgrade price will be $209 after a rebate for registered Office users) consists of Word, Excel, Outlook and Powerpoint. The Small Business version (also $209) has those four applications plus the Publisher desktop publishing program and some small business tools. The Professional version (a $309 upgrade) has all those and the Access database program. The Premium version (a $399 upgrade) tosses in Frontpage for Web page design and Photodraw for photo editing and graphics. Woe unto those who are not upgrading from Office 97 or a competing suite because the price of Office 2000 for new users ranges from a low of $499 for the Standard version to (choke!) $799 for the full version. I've been playing around with the final code of Office 2000 for the past week, and it has lots of nice new features for both corporate users and individuals. Microsoft's main goal in this upgrade appears to have been to make it easier to create and share documents on the World Wide Web. Also, all of the toolbar and command menus have been simplified and made smarter. Beginning users who need just a few commands can hide all the extra junk, which is nice. My favorite new feature, however -- besides the absence of the spooky G.U.I.D. -- is the "Die, Clippy, Die" command (what it ought to be called), which lets the user permanently get rid of the rude and obnoxious little animated paper clip character from Office 97 who butts his way onto the screen in what is usually a misguided effort to offer help or advice. That in itself is worth a few bucks. Whether the entire package is worth $209 to $399 for an upgrade depends on how important Web publishing is to you or how unhappy you are with Office 97. I'm tempted to wait and just get Office 2000 installed when I buy my next computer. The New York Times, April 17, 1999 ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, Omnia Bona Bonis, All My Relations. Adieu, Adios, Aloha. Amen. Roads End Kris DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance—not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om