-Caveat Lector- RadTimes # 68 - October, 2000 An informally produced compendium of vital irregularities. "We're living in rad times!" ----------------------------------------------------------------------------------------------------------- QUOTE: "Since trade ignores national boundaries and the manufacturer insists on having the world as a market, the flag of his nation must follow him, and the doors of the nations which are closed against him must be battered down. Concessions obtained by financiers must be safeguarded by ministers of state, even if the sovereignty of unwilling nations be outraged in the process." --Woodrow Wilson, President of the United States, 1907 ----------------------------------------------------------------------------------------------------------- Contents: --------------- --Free Radio Austin 97.1FM Shutdown in FCC Raid --Second pirate radio station in Austin shut down by FCC --Carnivore Details Emerge --French Warn of U.S. Spy Network --Pentagon Introduces High-Tech ID --How to crush oppression without killing justice [book review] --Chem-bio warfare agent detector market assessed --Fear of Contaminated Airplane Cabin Air Linked stories: *NASA Warms to Living on Mars *RIAA: Internet Licenses Coming *Silent Partner [Nader/Buchanan] ----------------------------------------------------------------------------------------------------------- Begin stories: ----------------------------------------------------------------------------------------------------------- Free Radio Austin 97.1FM Shutdown in FCC Raid For Immediate Release: Tuesday, October 10, 2000 Contact: Reckless or Chance at (512) 476-3446 Austin Activists and Community Leaders Link Shutdown to Fortune 500 Protests For the second time in less than a week, a microbroadcasting station in Austin, TX was shutdown by the FCC and law enforcement from various agencies. At around 10:30AM this morning Free Radio Austin, broadcasting at 97.1 FM, was raided by a multi-jurisdictional task force of FCC, Federal Marshals, Austin Police Department, and suspected FBI agents. Lloyd Perry, an agent from the FCC regional office in Houston, personally led the raid and removed the transmitter and other equipment, including 2 CD players, 2 turntables and portable radios. Unlike other such raids in the past, the FCC encountered immediate resistance from community activists. Free Radio Austin had buried it's transmitter several feet underground giving local community and media enough time to make it to the station to cover the event. Several cameras from traditional and independent media were busy recording Mr. Perry as he dug the transmitter from layers of thick clay and mud. Meanwhile, programmers and community began to chant slogans such as "Congress shall make no law to abridge the freedom of press." Unlike raids that have happened with other microbroadcasting stations such in California, Florida, or even when local Radio One was shutdown, FCC agents were not able to quickly seize the equipment. The entire procedure took more than an hour. FCC agents were clearly not in a good mood as a crowd of some 50 or more community gathered around them. Lloyd Perry declined to give comment either to members of Free Radio Austin or to the media. Only last week, Mr. Perry had defiantly posed, cutting a wire on the tower of Radio One, for local media. But he was clearly not laughing or joking with media today. Papers delivered to Free Radio Austin 97.1 indicate that the warrant for seizure of equipment were signed by a federal judge on the same day as those for Radio One. However, members of Free Radio Austin claim they were in dialogue with the FCC and had never ignored or not responded to any correspondence from the FCC. In fact, several programmers claimed that they wanted to pursue microbroadcasting issues in legal proceedings as other stations around the nation have been doing in a burgeoning movement of grassroots radio. Local community activists in Austin cite that both Radio One and Free Radio Austin were shutdown only days before upcoming protests against the Fortune 500 Forum, an annual gathering of CEOs from some of the largest corporations in the world. They believe that these same CEOs, business leaders, and local Austin Mayor Kirk Watson were pressuring for the shutdown of independent media outlets that had planned to cover the protests. Organizers also cite ongoing political pressure from City Hall and the Austin Downtown Business Alliance to deny marchers a permit for an Oct. 13th rally. Police claimed that a permit could not be issued because of traffic issues, but organizers counter that their freedom of speech issues outweigh these concerns. They also point out that other events such as concerts and University of Texas football games often cause traffic problems, but no one is trying to stop those events. The station was in the backyard of a programmer who prefers to simply go by the name Reckless. "They destroyed our equipment. Necessity knows no laws. We will not be silenced. We are ALL speechless today," she said, adding emphasis that free speech itself was the target of the FCC raid. She was adamant that she was not "in charge" of the station. The station was run by a collective of community programmers who each had an equal say in how the station was run. Programmers at Free Radio Austin also pointed out that their battle for freedom of speech issues would not stop. They vowed to educate and assist others in the community on how to setup their own microbroadcasting stations. In the words of one programmer, "Everytime they tear down one station, five more pop up and replace it." Related info: Fortune 500 Protest Media Contacts: Bryan at <[EMAIL PROTECTED]> / 512.929.8441 or Ernest at <[EMAIL PROTECTED]> / 512.479.4180. ----------------------------------------------------------------------------------------------------------- Second pirate radio station in Austin shut down by FCC By Claire Osborn American-Statesman Staff Wednesday, October 11, 2000 It took a shovel and lots of muddy digging, but the Federal Communications Commission closed another unlicensed radio station Tuesday. FCC agents, police and a U.S. marshal seized equipment from Free Radio Austin, which had been broadcasting at 97.1 FM since April 1999. An FCC agent dug four feet down into the low-power station's yard at 2939 E. 14th St. in Austin to find the radio transmitter, said Chris Womack, one of the station's founders. "We feel this is an unreasonable restriction of the rights of free speech," said Womack, who was known as "Marmot" on the radio station. Free Radio Austin broadcast hip hop, reggae and jazz music as well as programs about animal rights, the erosion of civil rights, the protest against the World Bank and the International Monetary Fund, and a protest about the upcoming Fortune 500 forum in Austin. An FCC spokesman declined to comment on Tuesday's raid, the second this month against an unlicensed, low-power radio station in Austin. Agents closed Radio One at 94.3 FM on Oct. 4. It is illegal to operate a radio station without an FCC license. Free Radio Austin's supporters said a license was not available until the spring and operating without one made them ineligible to apply. Authorities also recently closed KIND, an unlicensed station in San Marcos. ---- You may contact Claire Osborn at [EMAIL PROTECTED] or 445-3630 ----------------------------------------------------------------------------------------------------------- Carnivore Details Emerge <http://www.securityfocus.com/news/97> A web spying capability, multi-million dollar price tag, and a secret Carnivore ancestor are some of the details to poke through heavy FBI editing. By Kevin Poulsen October 4, 2000, WASHINGTON The FBI's Carnivore surveillance tool monitors more than just email. Newly declassified documents obtained by Electronic Privacy Information Center (EPIC) under the Freedom of Information Act reveal that Carnivore can monitor all of a target user's Internet traffic, and, in conjunction with other FBI tools, can reconstruct web pages exactly as a surveillance target saw them while surfing the web. The capability is one of the new details to emerge from some six-hundred pages of heavily redacted documents given to the Washington-based nonprofit group this week, and reviewed by SecurityFocus Wednesday. The documents confirm that Carnivore grew from an earlier FBI project called Omnivore, but reveal for the first time that Omnivore itself replaced a still older tool. The name of that project was carefully blacked out of the documents, and remains classified "secret." The older surveillance system had "deficiencies that rendered the design solution unacceptable." The project was eventually shut down. Development of Omnivore began in February 1997, and the first prototypes were delivered on October 31st of that year. The FBI's eagerness to use the system may have slowed its development: one report notes that it became "difficult to maintain the schedule," because the Bureau deployed the nascent surveillance tool for "several emergency situations" while it was still in beta release. "The field deployments used development team personnel to support the technical challenges surrounding the insertion of the OMNIVORE device," reads the report. The 'Phiple Troenix' Project In September 1998, the FBI network surveillance lab in Quantico launched a project to move Omnivore from Sun's Solaris operating system to a Windows NT platform. "This will facilitate the miniaturization of the system and support a wide range of personal computer (PC) equipment," notes the project's Statement of Need. (Other reasons for the switch were redacted from the documents.) The project was called "Phiple Troenix"apparently a spoonerism of "Triple Phoenix," a type of palm tree and its result was dubbed "Carnivore." Phiple Troenix's estimated price tag of $800,000 included training for personnel at the Bureau's Washington-based National Infrastructure Protection Center (NIPC). Meanwhile, the Omnivore project was formally closed down in June 1999, with a final cost of $900,000. Carnivore came out of beta with version 1.2, released in September 1999. As of May 2000, it was in version 1.3.4. At that time it underwent an exhaustive series of carefully prescribed tests under a variety of conditions. The results, according to a memo from the FBI lab, were positive. "Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks. The FBI can configure the tool to store all traffic to or from a particular Internet IP address, while monitoring DHCP and RADIUS protocols to track a particular user. In "pen mode," in which it implements a limited type of surveillance not requiring a wiretap warrant, Carnivore can capture all packet header information for a targeted user, or zero in email addresses or FTP login data. Web Surveillance Version 2.0 will include the ability to display captured Internet traffic directly from Carnivore. For now, the tool only stores data as raw packets, and another application called "Packeteer" is later used to process those packets. A third program called "CoolMiner" uses Packeteer's output to display and organize the intercepted data. Collectively, the three applications, Carnivore, Packeteer and CoolMiner, are referred to by the FBI lab as the "DragonWare suite." The documents show that in tests, CoolMiner was able to reconstruct HTTP traffic captured by Carnivore into coherent web pages, a capability that would allow FBI agents to see the pages exactly as the user saw them while surfing the web. Justice Department and FBI officials have testified that Carnivore is used almost exclusively to monitor email, but noted that it was capable of monitoring messages sent over web-based email services like Hotmail. An "Enhanced Carnivore" contract began in November 1999, the papers show, and will run out in January of next year at a total cost of $650,000. Some of the documents show that the FBI plans to add yet more features to version 2.0 and 3.0 of the surveillance tool, but the details are almost entirely redacted. A document subject to particularly heavy editing shows that the FBI was interested in voice over IP technology, and was in particular looking at protocols used by Net2Phone and FreeTel. EPIC attorney David Sobel said the organization intends to challenge the FBI's editing of the released documents. In the meantime, EPIC is hurriedly scanning in the pages and putting them on the web, "so that the official technical review is not the only one," explained Sobel. "We want an unofficial review with as wide a range of participants as possible." The FBI's next release of documents is scheduled for mid-November. ----------------------------------------------------------------------------------------------------------- French Warn of U.S. Spy Network Wednesday October 11, 2000 Guardian PARIS (AP) - A parliamentary report published Wednesday urged France to protect itself from an alleged U.S.-led eavesdropping network, which it claims Washington is using to snoop on the businesses of its European allies. The 80-page report by the National Assembly's defense commission alleged that no form of communication, from fax to e-mail to cable, is safe from the so-called Echelon spy network. It said that businesses, particularly European companies with American competitors, were the principal targets of the alleged electronic snooping ring. Lawmaker Arthur Paecht said the network has at least 120 spy satellites that intercept ''180 million messages every hour.'' ``These serious attacks oblige us to protect ourselves,'' said Paecht. In February, a European Parliament set up a special probe into Echelon in July. Denmark, like France, set up a national inquiry. The network allegedly includes Britain, Canada, Australia and New Zealand. Last month, an EU committee said it wants U.S. intelligence chiefs to testify on whether Echelon spies on the businesses of its European allies. U.S. intelligence officials have never publicly confirmed the existence of such a system. In testimony before the U.S. House Intelligence Committee in April, top intelligence officials, including U.S. National Security Agency head, Air Force Lt. Gen. Michael V. Hayden, denied reports the United States was involved in spying on Europeans and Americans as part of a snooping network. The National Assembly study alleged that the Echelon system developed rapidly in the 1970s and 1980s thanks to technology advances, diverging from its initial military objectives. The parliamentary study said it was ``not impossible that certain information gathered could be used for political or economic ends.'' ----------------------------------------------------------------------------------------------------------- Pentagon Introduces High-Tech ID <http://dailynews.yahoo.com/h/ap/20001010/pl/pentagon_access_1.html> Tuesday October 10 WASHINGTON (AP) - The Pentagon plans to issue 4 million or more high-tech identification cards to soldiers and other personnel worldwide, hoping to provide better security for access to bases, buildings and computer systems. The new ``common access card'' contains a tiny computer chip, using ``smart card'' technology to store and processes a myriad of information. Similar technology has been used by smaller governments, including Spain and Finland, and in commercial operations. ``I'd view this chip as a small computer without a monitor or power supply,'' said Paul Brubaker, Defense Department information officer, unveiling the new card at a news conference Tuesday. The Pentagon is developing plans to use the card for everything from processing food service charges in military mess halls to keeping track of manifests and deployments and guaranteeing restricted access to secure buildings and computers. The card has the capability of being linked to either personal codes or fingerprints to enhance security throughout the military, Brubaker said. It is expected to take several years for the cards to be issued throughout the services. ----------------------------------------------------------------------------------------------------------- How to crush oppression without killing justice [book review] <http://www.csmonitor.com/durable/2000/10/12/p21s1.htm> By Joshua Rubenstein 'A Force More Powerful" challenges a longstanding myth that lies at the heart of much of the turmoil of the 20th century: that power comes from the barrel of a gun. Beginning with Lenin - whose successful coup d'état in Russia became the standard model for would-be revolutionaries - through Mao in China, Franz Fanon in Algeria, and Fidel Castro in Cuba, an idea was increasingly glorified that violent revolution was not only effective and legitimate, but would also prove to be psychologically liberating for the oppressed. "A Force More Powerful" makes clear that revolutionary violence undermines chances to create a genuine, workable democracy, while nonviolent movements can confront oppression more effectively and lead to more democratic results. Peter Ackerman and Jack Duvall examine two dozen episodes of "political struggle, social upheaval, and military action" on five continents. Their most vivid accounts cover Gandhi's movement in India, the struggle to integrate lunch counters in Nashville, Tenn., the behavior of Danish citizens during the German occupation, and the rise and eventual triumph of Solidarity in Poland. At each moment in the history of these struggles, activists had to make difficult choices - how to organize reluctant and wary citizens, what to demand, and how far to go before retreating or accepting a compromise. Gandhi's campaign of satyagraha (a combination of the Hindu words for "truth" and "holding firmly") has long been regarded as the model for nonviolent resistance. His fundamental realization was that the British could not rule India "without the cooperation of the ruled." Once masses of Indians refused to obey unjust laws, like the tax on salt, or to serve as civil servants, they compelled the British to invest more resources in controlling the colony, making the entire investment so costly that it could not be sustained. The Danes faced a more brutal enemy. Armed struggle in Denmark during the German occupation would only have insured a harsh military response. But non-cooperation and selected acts of sabotage deprived the Germans of the full economic benefits they wanted without provoking overwhelming violence. At the same time, the decision to rescue the country's Jews by smuggling thousands to safety in neutral Sweden was made possible by this broader movement of resistance, which included King Christian himself. In Poland, Solidarity activists had studied the failure of earlier protests. When they took over shipyards and factories in 1980 and 1981, their leaders insisted on restraint, lending their struggle greater dignity and depriving the regime of the excuse it needed to respond with force. It was only after Soviet leaders insisted on a crackdown that the Polish military declared martial law and interned thousands of people. Even then, the workers' movement soon responded by organizing "flying universities" and an underground press, creating an alternative civic culture that could not be suppressed. Within a few years, in the wake of Gorbachev's reforms in Moscow, Solidarity was ready to openly contest for power against General Jaruzelski. The lessons of nonviolent resistance can be applied in different cultures and against a broad range of repressive regimes. It is important to recall that Gandhi developed a correspondence with the great Russian novelist (and pacifist) Leo Tolstoy, who had himself studied the writings of Henry David Thoreau. Once Gandhi became famous, African-American leaders visited India in the 1930s and brought back ideas that later shaped the civil rights movement. This American struggle inspired activists in Eastern Europe who were determined to reform communist regimes. But they also knew Lenin's handiwork. As the Polish dissident Adam Michnik once observed, "By using force to storm the existing Bastilles we shall unwittingly build new ones." Based on convincing detail, Ackerman and Duvall dare to claim that nonviolent movements lead to more secure democracies. You only have to think about the 20th century to know they are right. ---- Joshua Rubenstein is the Northeast regional director of Amnesty International USA and the author of 'Tangled Loyalties: The Life and Times of Ilya Ehrenburg' (University of Alabama Press). ----------------------------------------------------------------------------------------------------------- Chem-bio warfare agent detector market assessed <http://defence-data.com/current/page8736.htm> 12 October 2000 Multiple factors have led to some fundamental changes in the competitive nature of the world chemical and biological warfare agent detector market. However, these changes have not come independently, rather they have fed off one another. Sequential changes have altered the nature of the market. Frost & Sullivan's recent report World Chemical and Biological Warfare Agent Detector Markets addresses these changes and offers forecasts for the market's growth through 2006 and an analysis of the chemical and biological detection segments of the market. In the early 1990s, the threat of chemical and biological warfare became more apparent and the need to develop defensive systems to counter this menacing form of warfare became more of a priority for the United States and the members of the multi-national force that were allied against Iraq in the Gulf War. A number of companies with budding technologies that would aid in the detection of chemical and biological warfare agents received research grants from the United States (US) Department of Defense (DoD) and the United Kingdom's (UK.) Ministry of Defence (MoD). These grants have been used to develop chemical and biological detection technologies for a number of applications, including point detection and standoff detection in the battlefield, detection for chem/bio weapons demilitarisation and detection equipment for civilian use for hazard materials (hazmat) accidents and against chemical or biological terrorist attacks. An original producer of chemical agent monitors (CAMs), Graseby Dynamics, developed and utilised ion mobility spectrometry (IMS) technology to produce CAMs to counter terrorist attacks in Northern Ireland. By the mid-1980s Graseby Dynamics was supplying the UK MoD with CAMs for all of its armed forces. During the Gulf War, Graseby Dynamics' CAMs were used by allied troops. However, following the war it was apparent that more sophisticated detection technologies were needed for both point detection and standoff detection in the battlefield. In addition, the development of biological warfare agent detection was still in its infancy. Therefore, R&D dollars were made available for technological research and advancement in chemical and biological warfare agent detection. As detection technologies matured from the early- to mid-1990s, workable detection units were prototyped and produced on a small scale for clients mainly in North America and Europe. By the mid-1990s, Graseby Dynamics was producing and supplying CAMs and detectors to military clients in 34 countries around the globe. Beginning in the mid-1990s the first large scale production contracts were tendered. In 1995, Intellitec won a contract with the United States Army to produce 458 improved chemical agent monitors (ICAMs) under a contract worth $14.3 million. Into the late 1990s, larger and larger R&D, prototype and production contracts for chemical and biological warfare agent were tendered with dollar amounts on multi-year contracts entering the tens of millions of dollars. As a result, the late 1990s saw a shift in the competitive atmosphere of the market for chem/bio detectors due to three main factors. First, companies like Graseby Dynamics and Intellitec were smaller firms who would pour more and more of their resources into R&D to develop improved and competitive products. At times, the R&D staff would number upward of one-third to one half of the total company's staff. This became rather expensive to maintain and limited the companies' ability to produce their products on a large scale. Second, other companies in the market who did not spend as much on R&D were falling behind technologically. They needed to find faster modes of acquiring technologies that would improve their market positions. Third, contracts for chem/bio detector development and production were large in scale, but few in number. Therefore, competitors needed to establish geo-physical positions in the market in order to maximize the ability to penetrate markets across national borders. As a result, such competitors in the markets looked to partnerships and mergers and acquisitions to solve production capacity problems and fill technological gaps. The following partnerships and M&As were initiated in response to these market forces within the past two years. Smiths Industries acquired Graseby Dynamics in October 1997 as a wholly owned subsidiary, which injected Graseby Dynamics with the financing to further improve its R&D capabilities and brought Smiths Industries into the chem/bio detection market. Sawtek Incorporated acquired Microsensor Systems, Inc. in February 1998 in order to improve its chemical detection equipment product line and expand its customer base. GEC-Marconi acquired Tracor Aerospace in April 1998 which enable Tracor to more easily penetrate European markets and GEC-Marconi to gain a toe-hold in the US market. Hunting Engineering partnered with Graseby Dynamics and EDS Defence through subcontracts combining Hunting's manufacturing capabilities with Graseby's technological expertise and EDS's integration specialisation to successfully win key biological detection systems contracts with from the UK Smiths Industries acquired Environmental Technologies Group, Inc. in June 1999 as a wholly owned subsidiary to broaden its involvement in the chem/bio detection market and gain a presence in the lucrative US market. TSI, Incorporated acquired Environmental Systems Corporation in June 1999 to expand its presence and leverage key technologies in the outdoor environmental monitoring market. GEC-Marconi merged with British Aerospace in November 1999 to form BAE Systems which strengthened the original Tracor division's (now BAE Systems Integrated Defense Solutions) position geo-strategically and financially. Over the next five to ten years, more large scale production contracts for chemical and biological warfare agent detectors will be tendered by various countries, some of which will be worth hundreds of millions of dollars. Competitors in the market who have positioned themselves through partnership and M&A activity over the past few years should prove to be the winners of these few but lucrative long-term contracts. ---- (For a comprehensive view of the World Chemical and Biological Warfare Agent Detector Markets please contact Rolf Gatlin at 210.348.1017 or [EMAIL PROTECTED] and reference Frost & Sullivan report #7259-16) ----------------------------------------------------------------------------------------------------------- Fear of Contaminated Airplane Cabin Air Has Health-Conscious Travelers Bringing Their Own Supply October 11, 2000 SANTA BARBARA, Calif., Oct. 10 /PRNewswire/ It appears "sick building syndrome" has taken to the skies. An air quality study published in The Wall Street Journal this summer left many travelers holding their breath after sampled flights were found teeming with mold, bacteria, and other contaminants ("How Safe is Airplane Air?" The Wall Street Journal 8 June, 2000: W1). The biggest concern: "stale" air, and a controversial proposal by the airline industry to drop the ventilation rates on planes even further. As mentioned in the article, the wearable Air Supply(R) personal air purifier offered by Magellan's (item ##EP223, $95) provides travelers with an alternative to overly re-circulated air by streaming clean, purified air toward the mouth, nose, and eyes at over 75 feet/minute. Their new Ultra-Mini Air Supply (item ##EP225, $145), while barely larger than a pack of chewing gum, offers the most powerful output available from any wearable air purifier, produces a refreshing 120 feet/minute of clean air. Both models use patented corona discharge chamber technology to destroy impurities more effectively than ionization or particle filtration. Air Supply, Ultra-Mini Air Supply, and dozens more ways to stay healthy on the road can be found online now at <www.magellans.com>. Magellan's is America's leading source of travel supplies. The current Magellan's catalog is available FREE by calling (800) 962-4943 or by requesting one online at <www.magellans.com>. ---- CONTACT: Jack Kotowski of Magellan's Catalog, 805-568-5400, <[EMAIL PROTECTED]> Web site: <http://www.magellans.com> ----------------------------------------------------------------------------------------------------------- Linked stories: ******************** NASA Warms to Living on Mars <http://www.wired.com/news/technology/0,1282,39318,00.html?tw=wn20001011> Scientists say we have the technology to establish a positive atmosphere on the Red Planet. For example, we already know how to initiate global warming. Leander Kahney reports from Mountain View, California. ******************** RIAA: Internet Licenses Coming < http://www.wired.com/news/business/0,1367,39380,00.html?tw=wn20001011> The recording industry and music publishers have reached an agreement that will allow companies to license music. ******************** Silent Partner <http://www.thenewrepublic.com/011000/lizza011000.html> Why is right-wing billionaire Roger Milliken, who is pouring money into Pat Buchanan's presidential campaign, also financing Ralph Nader's? ******************** ====================================================== "Anarchy doesn't mean out of control. It means out of 'their' control." -Jim Dodge ====================================================== "Communications without intelligence is noise; intelligence without communications is irrelevant." -Gen. Alfred. M. Gray, USMC ====================================================== "It is not a sign of good health to be well adjusted to a sick society." -J. Krishnamurti ______________________________________________________________ To subscribe/unsubscribe or for a sample copy or a list of back issues, send appropriate email to <[EMAIL PROTECTED]>. ______________________________________________________________ <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om