-Caveat Lector-

Dave Hartley
http://www.Asheville-Computer.com
http://www.ioa.com/~davehart


Guardian (London) Thursday October 14, 1999

Is Big Brother watching you?
        Neil McIntosh on the backlash against electronic espionage
A group of cyber activists is calling on internet users worldwide to help
them "trip up" a mysterious global spy system managed by the US National
Security Agency, and operated in part by Britain's GCHQ.

An increasing number of activists and politicians claim to have evidence
that the system, called Echelon, monitors much of the world's email, web
traffic, telephone conversation and other communications in an effort to
uncover terrorists and enemies.

The monitoring system is said to be "routine and indiscriminate", and
triggered by certain keywords in the traffic, like "terrorism", "bomb",
"MI5" and "revolution". The Hacktivism mailing list community has called
on concerned net users to include the trigger words in their
communications on <date corrected> Friday, Oct. 21, and so overwhelm the
system.

The event coincides with an attempt by activists to get the US congress to
look into the affair.

After years of claims about the system, there is increasing mainstream
willingness to accept that a global electronic snooping network exists.
The British and US governments refuse to comment on the system.

The acceptance is largely thanks to charges raised in the European
parliament last year, when it was alleged that the system was used by the
US to get European government and industrial secrets.

Investigative reporter Duncan Campbell was commissioned by the
parliament's Science and Technology Options Assessment Panel (STOA) to
look into the network. In his Interception Capabilities 2000 report, which
was accepted by the committee in May, Campbell said he found "the first
ever documentary evidence of the Echelon system".

He also uncovered an attempt by a secret organisation - the International
Law Enforcement Telecommunications Seminar - to have "back door" wiretap
capabilities built into technology, including popular software packages
and communication systems.

Australia's Defence Signals Directorate,which has been accused of
involvement with Echelon, has admitted that the UK-USA agreement, which is
reported to govern the system, did exist.

Such reports have fueled fears that the system is monitoring all internet
communications - despite suggestions that the technology to cope with such
a huge operation does not exist. Campaigning groups in the US, and some
members of congress, are now calling for public accountability for the US
part of the network.

Shari Steele, director of legal services for the online rights
organisation, the Electronic Frontier Foundation, said she had heard that
Echelon monitors "all of our communications"; if so, the governments
involved had gone too far.

"The government does not have the legal right to snoop on law abiding
citizens, even in its pursuit of criminals," she said. "If it exists, and
if it is as pervasive as it appears to be, the government has way
overstepped its bounds in the interests of protecting us citizens."

US congressman Bob Barr is pushing for congress to look into Echelon.
There could be a debate this autumn, says Lisa Dean of the
Washington-based civil liberties group, the Free Congress Foundation.

She said there was disquiet in the US that communications could be open to
prying by the governement. "A growing number of people do believe that
their communications - wireless, email or land phones - are not secure,"
she said.

"The government would say it is the conservatives who believe the 'vast
rightwing conspiracy' as Hillary Clinton has called it, but I think it's
more widespread than that. Conservatives and liberals all believe the same
thing - they all have this concern.

"Congressman Bob Barr of Georgia has taken this very seriously and has
called for hearings in the House Government and Oversight community. To
our knowledge, there will be hearings this fall [autumn]." Dean says that
congress is taking an interest in the capability of this system. House
leader Dick Armey has sent a letter to attorney general Janet Reno asking
what technological capabilities the intelligence community and law
enforcement has.

"She has not answered the letter," says Dean, "and the intelligence
community has effectively told congress to go play in traffic because
they're not giving any information.

"There's a battle - and the big question here is: if hearings are held,
will intelligence testify? It could get rather ugly. But I don't think
congress is going to give up so easily."


=================================


http://www.wodip.opole.pl/~laslo/Echelon-links.html

STAND UP FOR THE FREEDOM TO EXCHANGE INFORMATION!

We the monitored have decided to stand up against the very real, very
intrusive, and ultimately oppressive global surveillance system known as
Echelon.  Echelon is a vast mainframe set up by the New World Disorder in
order to monitor the world's electronic communications for subversive
keywords.  Every time you send someone an email with keywords like
"revolution" and "hacktivism" [for instance], Echelon's computers make a
note of it.  If you forward emails with regularity with words on Echelon's
extensive keyword list, you may be marked for human "hands-on" monitoring.

On October 21, 1999 , netizens around the globe are implored to send out
at least one email with at about 50 keyword words. Please do not send
hundreds of keywords in one e-mail, as the systems can be programmed to
ignore communications with too high (or too low) a reading / score. There
isn't any need to write a cohesive paragraph or sentence. Echelon's
computers does not understand language. It only knows to look for certain
words. By doing this we can at least temporarily jam the global
surveillance system.

This day of action will be timed to precede Stop Police Brutality Day by
one day so that emails about actions can be sent out with little scrutiny
due to what will already be an enormous workload for Echelon.

Now is a chance for anyone, regardless of computer expertise, to become an
instant hacktivist - best of all, no software is needed [other than your
regular email program].

Of course, feel free to conduct such subversiveness any time. The larger
Echelon's workload, the more free our speech!

After October 21, we ask global netizens to carry on sending lists of
Echelon keywords with all your normal, regular, innocent? e-mails.
http://www.angelfire.com/mi/smilinks/thirdeye.html


Here is a list of code words apparently used by 'security forces'
[specifically it seems the US National Security Agency who operate Menwith
Hill (in England)] to sift out messages which they think they might find
interesting. It seems they identify individuals and addresses they are
interested in and filter messages to and from these particular targets
rather than sifting through vast amounts of any old national and
international communications. So unless you are a target you presumably
won't be spied on. However, you might consider adding some of these words
to your e-mails, faxes and even phone calls on the off chance that you
might be helping to clog up Big Brothers machinery.

If you're looking for Richard Tomlinson's list of 116 MI6 agents go to
http://jya.com/mi6-list.htm

This information was  gathered from
http://www.dis.org/erehwon/spookwords.html where the words are set into
the HTML code which makes up the pages and can be viewed by looking up the
source code via your browser menu controls.
http://www.dis.org/erehwon/echelon.html

Here's text from the site followed by the "spookwords".

I started collecting 'spook words' after hearing about a rumour that the
major intelligence agencies would scan messages floating around on the
Internet looking for something interesting, This is why some paranoid
folks say the Internet is so slow, The NSA says that they don't, but
that's what the NSA would say. Another rumour to the story is that the NSA
and all those other three lettered agencies just don't have the bandwidth
to look at all those messages, and that it is all those people farting
around watching Bugs Bunny on Real Audio from work sucking down all that
bandwidth.

There may be some truth to the rumours, digital wiretaps have been done on
the Internet before looking for particular words used by criminal hackers
and industrial spies with a few messages that weren't related to the case
were captured and disseminated. Also back in the late 1980's, New
Zealand's largest intelligence agency, and the GCSB joined in with other
Western allies to spy on most of the world's telephone, telex, and e-mail
communications, with the ECHELON system.

All of these words have been collected using open sources, (books, online,
seminars, conventions, broadcasts, movies, etc...) I recently found a new
source for possible spook words at the http://www.acronymfinder.com
Acronym Finder, and you can also find out the meanings for most of these
words, But I am always looking for more. Mail me if you have any [check
the site for the address].

Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI,
Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism
Defensive Information, Defense Information Warfare, Offensive Information,
Offensive Information Warfare, The Artful Dodger, NAIA, SAPM, ASU, ASTS,
National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS,
Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF,
Ermes, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, CUN,
CISU, CUSI, M.A.R.E., MARE, UFO, IFO, Pacini, Angela, Espionage, USDOJ,
NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White
House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA,
MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, SAMU,
COSMOS, DATTA, Furbys, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC,
ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877,
NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X,
Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL,
Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN,
monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS,
STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, Europol, SARL, Military
Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh,
Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA,
ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed,
ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse,  lashbangs,
HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC,
BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC,
ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE,
SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, LLNL, bemd,
SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT,
BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM,
HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, benelux, SAS,
SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT,
GIGN, Exon Shell, radint, MB, CQB, TECS, CONUS, CTU, RCMP, GRU, SASR,
GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2,
MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN,
SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS,
Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, DF, ZARK,
SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DSD, FDM,
GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM.
SUKLO, Schengen, SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, Mafia, JASSM,
CALCM, TLAM, Wipeout, GII, SIW, MEII, C2W, Burns, Tomlinson, Ufologico
Nazionale, Centro, CICAP, MIR, Belknap, Tac, rebels, BLU-97 A/B, 007,
nowhere.ch, bronze, Rubin, Arnett, BLU, SIGS, VHF, Recon, peapod,
PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, The Hague, SHF,
ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200,
15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park,
Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism
Security, Enemy of the State, SARA, Rapid Reaction, JSOFC3IP, Corporate
Security, 192.47.242.7, Baldwin, Wilma, ie.org, cospo.osis.gov, Police,
Dateline, Tyrell, KMI, 1ee, Pod, 9705 Samford Road, 20755-6000, sniper,
PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, High
Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS,
Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS,
interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside,
Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC,
.tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Tony
Poe, MJ-12, JASON, Society, Hmong, Majic, evil, zipgun, tax, bootleg,
warez, TRV, ERV, rednoise, mindwar, nailbomb, VLF, ULF, Paperclip,
Chatter, MKULTRA, MKDELTA, Bluebird, MKNAOMI, White Yankee, MKSEARCH, 355
ML, Adriatic, Goldman, Ionosphere, Mole, Keyhole, NABS, Kilderkin,
Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS,
CFD, BLU-114/B, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock,
Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke,
Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t,
lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine,
JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA,
B61-11, Alouette, executive, Event Security, Mace, Cap-Stun, stakeout,
ninja, ASIS, ISA, EOD, Oscor, Tarawa, COSMOS-2224, COSTIND, hit word,
hitword, Hitwords, Regli, VBS, Leuken-Baden, number key, Zimmerwald, DDPS,
GRS, AGT. AMME, ANDVT, Type I, Type II, VFCT, VGPL, WHCA, WSA, WSP,
WWABNCP, ZNI1, FSK, FTS2000, GOSIP, GOTS, SACS STU-III, PRF, PMSP, CMT,
I&A, JRSC, ITSDN, Keyer, KG-84C, KWT-46, KWR-46, KY-75, KYV-5, LHR,
PARKHILL, LDMX, LEASAT, SNS, SVN, TACSAT, TRANSEC, DONCAF, EAM, DSCS,
DSNET1, DSNET2, DSNET3, ECCM, EIP, EKMS, EKMC, DDN, DDP, Merlin, NTT,
SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time,
MSEE, Cable &amp; Wireless, CSE, SUW, J2, Embassy, ETA, Porno, Fax, finks,
Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain,
tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG,
Macintosh Security, Macintosh Internet Security, OC3, Macintosh Firewalls,
Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping,
SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite
imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers,
replay, redheads, RX-7, explicit, FLAME, J-6, Pornstars, AVN, Playboy,
ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP,
toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche,
DES, 1*, N-ISDN, NLSP, OTAR, OTAT, OTCIXS, MISSI, MOSAIC, NAVCOMPARS,
NCTS, NESP, MILSATCOM, AUTODIN, BLACKER, C3I, C4I, CMS, CMW, CP, SBU,
SCCN, SITOR, SHF/DOD, Finksburg MD, Link 16, LATA, NATIA, NATOA, sneakers,
UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT,
gtegsc, nowhere, .ch, hope, emc, industrial espionage, SUPIR, PI, TSCI,
spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class
Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics,
sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met,
CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo
Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d,
Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone,
SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr,
Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET,
cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL,
NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA,
Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet
Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA,
Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition, cards, mania,
701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, beanpole, spook,
keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World
Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft.
Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer, e-cash,
Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE,
crypto-anarchy, AT&amp;T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman,
KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort
Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :,
Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, Jiang
Zemin, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, Yucca
Mountain, FARC, Toth, Xu Yongyue, Bach, Razor, AC, cryptanalysis, nuclear,
52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI,
Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS,
WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement,
ISWG, $@, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID,
MD5, IDEA, garbage, market, beef, Stego, ISAF, unclassified, Sayeret
Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG,
orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama,
Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF,
Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy,
Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus,
NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD,
BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust,
e95, DR&amp;E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3,
Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro,
ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM,
Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA,
Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump,
joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax,
Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani,
Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn,
Defcon VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $, imapct,
Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assasinate, virus,
ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD,
York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas,
IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp,
SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server,
Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche,
ISEP, ISEC, 51, H&amp;K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red
Cell, NSOF, DC7, Glock 26, snuffle, Patel, package, ISI, INR, INS, GRU,
RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB,
BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI,
ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors,
SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess,
rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu,
Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim,
Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws,
SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &amp;, Loin, PGP
5.53, meta, Faber, SFPD, EG&amp;G, ISEP, blackjack, Fox, Aum, AIEWS, AMW,
RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti,
WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN,
JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF,
J-Star, PRIME, SURVIAC, telex, Analyzer, embassy, Golf, B61-7, Maple,
Tokyo, ERR, SBU, Threat, JPL, Tess, SE, Alex, EPL, SPINTCOM, FOUO,
ISS-ADP, Merv, Mexico, SUR, blocks, SO13, Rojdykarna, RSOC, USS Banner,
S511, 20755, airframe, jya.com, Furby, PECSENC, football, Agfa, 3210,
Crowell, moore, 510, OADR, Smith, toffee, FIS, N5P6, EuroFed, SP4,
shelter, Crypto AG

===========================

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to