-Caveat Lector- RadTimes # 77 - October, 2000 An informally produced compendium of vital irregularities. "We're living in rad times!" ----------------------------------------------------------------------------------------------------------- QUOTE: "True, the white man brought great change. But the varied fruits of his civilization, though highly colored and inviting, are sickening and deadening. And if it be the part of civilization to maim, rob, and thwart, then what is progress?" --Chief Luther Standing Bear, 1933 ----------------------------------------------------------------------------------------------------------- Contents: --------------- --FBI's Carnivore hunts in a pack --Critics blast FBI's first release of Carnivore documents --Bioterrorism: Red Scare For A New Millenium --National Security Archive Update, October 6, 2000 --140 Native protesters arrested at Denver "Columbus Day" parade --New Study Shows Alarming Increase in Corporate Cybercrimes --Army report: Soldier bragged about raping other young girls --Cash cow [cloning] --Invest like the pros! [humor?] Linked stories: *The Backlash Against Globalization *California High Court Trims Workers' Rights ----------------------------------------------------------------------------------------------------------- Begin stories: ----------------------------------------------------------------------------------------------------------- FBI's Carnivore hunts in a pack <http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2641902%2C00.html> By Brock Meeks, MSNBC October 18, 2000 WASHINGTON Carnivore, the FBI's controversial e-mail snooping program, is part of covert surveillance triad known inside the bureau as the "DragonWare Suite," according to recently declassified documents. The documents also outline how the DragonWare Suite is more than simply an e-mail snooping program: It's capable of reconstructing the Web surfing trail of someone under investigation. According to an analysis of the declassified documents by SecurityFocus, a California-based computer security firm, the DragonWare Suite can "reconstruct Web pages exactly as a surveillance target saw them while surfing the Web." Besides Carnivore, the DragonWare Suite includes programs called "Packeteer" and "Coolminer," the documents reveal. These latter programs are used to reconstruct the raw data scooped up in the initial phase by Carnivore. Omnivore came first The FBI was forced to release documents relating to Carnivore as the result of a lawsuit brought by the Electronic Privacy Information Center (EPIC). The suit was filed to force the bureau to comply with a Freedom of Information Act request the Washington-based privacy watchdog organization filed earlier this year. The FBI released about 600 pages from its Carnivore files, with most of the information hidden from view by huge blocks of blacked-out paragraphs. But by combing through the information left in view, the details of Carnivore's evolution begin to emerge. Two other e-mail monitoring programs preceded Carnivore, dating back to at least January 1996. Omnivore was Carnivore's immediate predecessor, developed to run on a Sun Solaris system at a cost of $900,000. But an earlier program that still remains classified "secret" preceded Omnivore. Omnivore was pushed into service because the older system was deemed to have "deficiencies that rendered the design solution unacceptable," a product review document says. Omnivore was designed to "sniff" an e-mail stream and print out targeted e-mails in real time, while storing other data on an 8mm tape drive, the documents say. The project was conceived in February 1997 and deployed in October of that year. It was officially retired in June 1999. The system was apparently pressed into service earlier than planned. While still in its beta phase, the FBI deployed Omnivore during an investigation, but technical problems arose that required the program's commercial developers to support the installation of the program. That situation made its full development schedule "difficult to maintain," the documents show. More than it could chew But the Solaris operating system proved unwieldy in the field, and in September 1998 the bureau devised project "Phiple Troenix"a bastardization of the phrase "Triple Phoenix"as the upgrade path that would eventually become Carnivore. The main objective of Phiple Troenix was to rewrite the Omnivore software to make it work on a Windows NT platform, according the declassified documents. "This will facilitate the miniaturization of the system and support a wider range of personal computer equipment," the documents say. This $800,000 project also included funding to train FBI agents and employees of the National Infrastructure Protection Center. Carnivore 1.2 was officially unleashed on the world in September 1999. But that version of the beast apparently scooped up data it wasn't supposed to, botching an investigation due to digital indigestion, or what the FBI documents say were "bugs found during a deployment." 'Enhanced Carnivore' Problems with the early version of Carnivore spawned a project called "Enhanced Carnivore" in November 1999. Meanwhile, a patched version of the first Carnivore was launched in March of this year. The FBI has budgeted some $650,000 for Enhanced Carnivore. The current version of Carnivore is due to be retired in January of next year, the documents say. The commercial firm developing Enhanced Carnivore is redacted in the documents. Scant clues are given as to Carnivore's creators. "The development contractor ... performed the initial Carnivore development work," the documents say. "This contractor was selected again based on a solid track record in this technology area." Meanwhile, the documents also show that Carnivore 2.0 and 3.0 are already in the design phase. The documents also underscore an earlier MSNBC.com report that the FBI is already developing Carnivore-like tools capable of wiretapping Net-based telephone calls. The FBI calls this technology "Dragon Net: Voice over IP." "DragonWare suite? What were they thinking?" House Majority Leader Richard Armey, R-Texas, asked incredulously. Armey is an outspoken critic of the Carnivore program and has called on the Justice Department to halt the program until a full investigation is finished to determine if the program is open to privacy abuse. "Until the constitutional questions have been adequately addressed, the Justice Department should not only stop developing new versions of cybersnooping software, they should stop using the existing programs," Armey said. The Justice Department recently contracted with an independent research firm to evaluate the underlying code that makes Carnivore tick in hopes of once and for all stemming criticisms that the program is a wholesale risk to privacy. ----------------------------------------------------------------------------------------------------------- Critics blast FBI's first release of Carnivore documents <http://news.cnet.com/news/0-1005-200-2917414.html> By Cecily Barnes and Rachel Konrad Staff Writers, CNET News.com October 2, 2000 Update: The FBI today released documents about its controversial Carnivore technology, but critics blasted the lack of information and said they still could not determine whether the email-tapping program would be an invasion of privacy. The Electronic Privacy Information Center (EPIC), which sued the FBI for the information through the Freedom of Information Act (FOIA), complained that the 565-page release contains little relevant information. According to a press release issued by the Washington- based group, nearly 200 pages were withheld in full and about 400 pages were redacted, many completely except for the page numbers. The FBI also withheld the source code to the Carnivore system-- one of the most coveted pieces of information for privacy advocates. "We intend to pursue the litigation until the relevant documents are disclosed," Marc Rotenberg, EPIC's executive director, said today in a statement. "We do not dispute the need of law enforcement to protect public safety or pursue criminals in the online world. But the use of investigative methods that monitor Internet traffic and capture the private communications of innocent users raise enormously important privacy issues that must be subject to public review and public approval." According to the documents, the Carnivore program was conceived under the name "Omnivore" in February 1997. It was proposed originally for a Solaris X86 computer. Omnivore was replaced by Carnivore running on a Windows NT-based computer in June 1999. Other documents include discussion of interception of voice over IP (VOIP), reviews of performance tests, and recovery from attacks and crashes for both systems. EPIC's FOIA request seeks the public release of all FBI records concerning Carnivore, including the source code, other technical details and legal analyses addressing the potential privacy implications of the technology. At an emergency hearing on August 2, U.S. District Judge James Robertson ordered the FBI to report back to the court by August 16 and to identify the amount of material at issue and the Bureau's schedule for releasing it. The FBI subsequently reported that 3,000 pages of material were located, but it refused to commit to a delivery date. Today's batch of documents represents the first installment. The FBI is required to release additional files at regular intervals, until all 3,000 pages have been delivered to EPIC. The Carnivore system, which is installed at Internet service providers, captures "packets" of Internet traffic as they travel through ISP networks. The program sifts through millions of mail messages, searching for notes sent by people under investigation. While a useful tool for monitoring specific individuals, the program has caused an uproar in Congress and among privacy advocates who fear the FBI's ability to retrieve email belonging to people who are not under investigation. Senate Judiciary Committee Chairman Orrin Hatch, R-Utah, and Sen. Patrick Leahy, D-Vt., are among the elected officials who have publicly criticized the program and called for an independent investigation. Under mounting pressure, Attorney General Janet Reno said in July that she would look into the program. Last week, the U.S. Justice Department tapped the IIT Research Institute, an arm of the Illinois Institute of Technology, to perform an independent review of Carnivore. The review, however, also has been criticized. Several prominent universities, including the Massachusetts Institute of Technology (MIT), backed out of the application process, saying restrictions placed on the scope of the review took away from its independence. Meanwhile, other steps are in the works to tame the Carnivore program. Last week, the House Judiciary Committee approved in a 20-1 vote a bill by Rep. Charles Canady, R-Fla., that would severely restrict the FBI's operation of Carnivore. The bill would give email the same protection awarded to voice conversations under federal wiretap law. A House vote hasn't been scheduled for the bill, but it could be attached to one of the spending bills that must pass before Congress adjourns this year. ----------------------------------------------------------------------------------------------------------- Bioterrorism: Red Scare For A New Millenium By Hillel W. Cohen Oct. 12, 2000, Workers World newspaper Soldiers and cops gown up in decontamination suits. With guns, flashlights and electronic sensors they move carefully through smoke-filled streets, stepping over bodies on the ground. Ambulances and helicopters drown out the crackling of walkie-talkies. It is not a movie. It is a bioterrorism drill in the United States. According to a program currently underway, this scene will be played out in at least 120 cities. In Wisconsin last year, one cop taking part accidentally set off his pepper-spray canister. With irritated eyes and lungs, some of the participants panicked, thinking that the scenario they were following had become real. These Pentagon-led drills are just one part of a multi- billion-dollar program known as "bioterrorism initiatives." Research labs are studying exotic toxins and diseases that "might" be used in an attack. City and county health departments have set up bioterrorism units to handle emergencies that no one really expects to happen. A lot of resources that might otherwise have been used for public health are being diverted to "protect" the public from bioterrorism. What is bioterrorism? This new word has come to mean the use of biological or chemical--sometimes even nuclear--weapons in a terrorist attack. Since 1997, bioterrorism has become a major topic in public health institutions on the federal, state and local level. IT BEATS OUT FOOD AND BLOOD SAFETY The Surgeon General's office puts bioterrorism third on a list of four areas of global concern--after polio eradication and emerging and re-emerging infectious diseases, which include HIV/AIDS, tuberculosis and malaria. Bioterrorism is ranked ahead of food and blood safety. The Centers for Disease Control and Prevention, based in Atlanta, have launched a national health alert network in order to coordinate responses to bioterrorist attacks. The Association of Schools of Public Health is trying to make bioterrorism a core item in the education programs for all public health students. Medical journals have regular articles about the need to train doctors to recognize the symptoms of anthrax and smallpox in the emergency rooms of local hospitals. With all this attention and money, you might think that bioterrorism has taken a huge toll in lives in the United States and other countries. Think again. In the United States, the number of people who have died due to bioterrorism attacks in the last 100 years is exactly-- zero. And in the whole world, there have been only three documented incidents. The most widely known was in Tokyo in 1995. Members of a religious cult released a chemical agent in a subway, killing 12 people. The same group had killed seven in an incident several months earlier in a Tokyo suburb. The only other case took place in Oregon in 1984, when a religious cult purposely contaminated several salad bars with salmonella bacteria. Over 700 people were sickened, but none died or were even sick enough to be hospitalized. Yet in news reports, press releases and conferences on bioterrorism, these incidents are mentioned over and over again to convince the public that bioterrorism is a real threat. REAL HAZARDS DOWNPLAYED In 1984, the same year as the salmonella attack, an industrial accident in Bhopal, India, in a factory owned by the U.S. corporation Union Carbide, killed thousands of people--so many that an accurate count was never accomplished. Many more were blinded or otherwise permanently disabled. Every year in the United States, according to testimony at congressional hearings, there are approximately 60,000 chemical spills, leaks and explosions, of which about 8,000 are considered "serious." Together, they are responsible for some 300 to 400 deaths. In addition, an estimated 76 million illnesses from food-borne disease occur each year, leading to 325,000 hospitalizations and about 5,000 deaths. Compared to these staggering numbers, the alleged threat from bioterrorism is just about zero. There's a much, much greater risk of being hit by lightning than being a victim of bioterrorism. In fact, the dangers from the "anti-terrorism" campaign are much greater than the virtually non-existent danger from bioterrorism. So why do the Clinton administration and so many federal, state and local health agencies put bioterrorism at the top of their agendas? DIVERTING PUBLIC HEALTH DOLLARS A major reason is that terrorism in general and bioterrorism in particular are useful for justifying bigger budgets for the Pentagon and Federal Bureau of Investigation. Bioterrorism is also a handy excuse for all sorts of nasty business lumped in the budget under "defense." For example, the U.S. government claimed that a medicine factory in the Sudan was making bioterrorism materials. The Pentagon destroyed the factory on Aug. 20, 1998, with two cruise missiles. Within days, the allegations were shown to be false. It is apparent now that the Pentagon and CIA never had any real evidence for their claim. Yet a factory that supplied half the medicines for North Africa and parts of the Middle East was wiped out. How many people have died or suffered needlessly for lack of these medicines? The U.S. government also continues to claim that the government of Iraq makes or stockpiles biological and chemical weapons, thus justifying economic sanctions that have already led to the deaths of over a million Iraqi people. But it is the United States that has the largest stockpile of chemical weapons in the world, even though Washington pledged to destroy these stocks. The Pentagon spends more each year than the next 10 biggest military powers combined. The U.S. stockpiles more "weapons of mass destruction," including nuclear weapons, than the rest of the world added together. For decades the anti-communist red scare was used to justify the enormous waste of military spending. With the fall of the Soviet Union, it is hard for the capitalists and their politicians to explain why hundreds of billions more are needed every year. Bioterrorism could become the phantom menace of the new millennium. ----------------------------------------------------------------------------------------------------------- National Security Archive Update, October 6, 2000 *Archive Publishes Secret Directive Governing Interception of Communications Involving "U.S. Persons"* On Friday, October 6, the National Security Archive at The George Washington University published a newly declassified United States Signals Intelligence Directive (USSID). This version of USSID 18, issued in July 1993, currently governs the National Security Agency's interception of communications involving U.S. persons. Until publication of the directive, which was obtained under the Freedom of Information Act on September 20, 2000, the only version of USSID 18 available to the public dated back to 1980. With an annual budget of approximately $3.5 billion, the National Security Agency oversees the interception, processing, storage and dissemination of foreign radio, wire and other electromagnetic communications for intelligence purposes. The document specifies the circumstances under which the agency may intercept, process, retain and disseminate information pertaining to U.S. citizens, resident aliens and U.S. corporations. The document is available as part of an updated Archive "Electronic Briefing Book" by Dr. Jeffrey T. Richelson, entitled, "The National Security Agency Declassified: History, Organization and Operations," and is available here: <http://www.nsarchive.org/NSAEBB/NSAEBB23/> ----------------------------------------------------------------------------------------------------------- 140 Native protesters arrested at Denver "Columbus Day" parade Colorado Parade Goes On Amid Protests By P. Solomon Banda, ASSOCIATED PRESS 07 Oct 2000 DENVER — More than 140 American Indian activists were arrested while protesting Saturday's Columbus Day Parade, the first in the city since 1991. American Indians assert that Christopher Columbus was a slave trader who committed genocide against their ancestors. Their clashes with Italian-Americans during the city's 1991 parade had forced the parade's cancelation for the remainder of the decade. This year, Indian activists and Italian-Americans had reached an agreement that there would be no protests if the parade was limited to an Italian pride parade with no mention of Columbus, but several representatives of the Italian community later disavowed the deal. On Saturday, police cut down a section of a fence that had been erected to block protests, and permitted demonstrators to take up spots on the street used for the parade. But after a brief demonstration, police moved back in, giving the Indians the choice of leaving or being arrested. No one resisted, said police spokeswoman Mary Thomas. They were arrested on misdemeanor charges including loitering and failure to obey a lawful order, which can bring penalties of up to a year in jail and fines up to $1,000. Among the 147 people arrested was American Indian Movement activist Russell Means, who said the protesters would ask for individual jury trials. "We broke no law today," said fellow AIM activist Glenn Morris. In 1989, Means and three others were arrested after throwing fake blood on a Columbus statue. The next year, protesters shouted anti-Columbus slogans during the Columbus Day parade. The 1992 parade was canceled moments before it was to start because of concerns about violence. ----------------------------------------------------------------------------------------------------------- New Study Shows Alarming Increase in Corporate Cybercrimes NORWOOD, Mass. Oct. 5, 2000 --Threats From Hacking and Cybersabotage on the Rise Despite Increased Security Spending-- According to a survey published recently in Information Security magazine, the number of companies spending more than $1 million annually on computer security nearly doubled in the past year. Security budgets are up 188 percent over the last two years. Nevertheless, security breaches originating from both inside and outside corporations continues to grow as the threat of hackers and careless employees increases. "The 2000 Information Security Industry Survey" appears in the September 2000 issue of Information Security <www.infosecuritymag.com>, an independent magazine published by ICSA.net <www.icsa.net> the Reston-,Va.-based Internet security assurance company. The survey was completed by 1,897 high-tech and infosecurity professionals. Co-sponsored by ICSA and Global Integrity Corp., the study also reveals statistics on the relationship between e-commerce and security risk, security software use, and the effectiveness of information security policies in mitigating threats and cyberattacks. Andy Briney, editor-in-chief of Information Security and lead analyst on the survey, believes companies need to spend more time thinking about security solutions, not just spend more money. "Results of this survey prove that spending millions of dollars adopting security practices doesn't guarantee effectiveness," said Briney. "CEOs and CIOs need to focus on security solutions that fit their specific network needs. A large dollar amount alone will never guarantee network safety." On the heels of this year's LOVEBUG and Life Stages viruses, the Information Security survey confirms that viruses and malware attacks are on the rise. Eight out of 10 companies were hit with a destructive virus this year. According to the survey, companies will also need to pay more attention cybersabotage. Compared to 1999, nearly twice as many companies experienced insider attacks related to the theft, sabotage or intentional destruction of computing equipment this year. Meanwhile, the number of organizations in which employees intentionally disclosed or destroyed proprietary corporate information increased by 41 percent. Companies conducting B2B or B2C e-commerce are at higher risk of attack, according to the survey. "E-commerce sites experienced more attacks in 15 out of 16 categories we measured," Briney said. For instance, companies conducting e-commerce were twice as likely to have their Web servers attacked by hackers. The study also shows that the best defense against security attacks and incidents is a layered defense: the use of overlapping computer technologies to detect and react to security breaches and incidents. Companies deploying multiple computer security tools detect a far greater number of attacks than those using fewer security controls. "The lesson is, you can't fight cybercrime if you don't even know it's happening," says Briney. ---- For complete survey results, visit Information Security's Web site at <www.infosecuritymag.com>. ----------------------------------------------------------------------------------------------------------- Army report: Soldier bragged about raping other young girls FORT BRAGG, N.C. (AP) _ A U.S. soldier who raped and killed an 11-year-old girl in Albania repeatedly bragged to his comrades about assaulting girls in other countries, but no one told a commanding officer, an Army report said. The soldiers said they kept quiet in part because Staff Sgt. Frank Ronghi threatened to kill them, The Fayetteville Observer reported, quoting Army findings on abuses by peacekeeping forces in Kosovo. Ronghi pleaded guilty to premeditated murder and forcible sodomy of Merita Shabiu in January, while his unit was on a six-month peacekeeping duty in Kosovo. Ronghi, a weapons squad leader for the 82nd Airborne Division, is serving a life sentence without parole. A month before Merita was killed and her body hidden in the woods, Ronghi took his squad to that spot and told them it was a good place to dump a body, the Army report said. "Anybody could scream at the top of their lungs without anybody hearing," a sergeant said, recounting Ronghi"s words. Soldiers told investigators that Ronghi had bragged about raping two sisters, making the older girl watch first and then forcing them to trade places. Ronghi also told a soldier he raped a 9-year-old Haitian girl, saying "this was his greatest sexual accomplishment because she was so young." Soldiers kept quiet about the boasts, saying Ronghi liked to say, "What happens in the squad stays in the squad, or your body will never be found." Leaders of the 82nd Airborne Division have condemned Ronghi"s crimes, saying no one could have known what he was capable of. ----------------------------------------------------------------------------------------------------------- Cash cow <http://www.newscientist.com/dailynews/news.jsp?id=ns999950> 7 October 2000 by Emma Young New Scientist Online News The first auction of a cloned animal raises $82,000 for an unborn calf A clone of Mandy, a prize dairy cow, raised $82,000 at an auction on Friday at the World Dairy Expo in Madison, Wisconsin. It was the first time a clone had been offered for commercial sale, says biotechnology company Infigen. Infigen is so confident in its techniques that the clone has not yet been created. But the promised exact genetic copy fetched nearly seven times the price of Mandy's normal calves. As a two-year-old Mandy was valued at $100,000. Infigen thinks commercial cloning of cattle is now viable. But not all experts agree. "At this stage of the development of the technology, this is probably a publicity issue rather than the start of a genuine commercial service," says Harry Griffin of the Roslin Institute in Edinburgh, where Dolly the sheep was cloned. Techniques for cloning cattle are more advanced than for any other species, Griffin says. But he thinks there are important welfare issues to consider. Cloned cow embryos often don't develop properly. Some grow larger than normal, creating health risks for the mother and calf during birth. The clones may also die prematurely. "A 1998 report by the UK Farm Animal Welfare Council recommended that the problem of large calf syndrome should be solved before cloning becomes a commercial reality here," Griffin says. Price to drop Mandy will be cloned in December, says Infigen spokesman Peter Steinerman. The heifer will be due nine months later. It will be produced using nuclear transfer, the technique that created Dolly. Infigen technicians will fuse an unfertilised egg with a cell taken from the cow's ear. The embryo will be grown in the laboratory and then implanted in surrogate mothers. Infigen is claiming only a 5 per cent success rate in developing viable embryos from fused cells. But it thinks this will be sufficient for the process to be commercially successful. It hopes soon to be selling cloned calves for $25,000, and expects this price to fall as the technique is improved. Public concern In Britain, there is no law against farmers buying cloned cattle, says Griffin. But Phil Hudson of the National Farmers Union thinks many will be wary. "If farmers in Britain wanted to buy these animals, they'd have to consider the implications. There would be a number of issues to consider, including animal welfare and public perceptions. Perceptions carry a lot of weight." In Japan, there was widespread public concern in April following a newspaper report that unlabelled "cloned" beef had been on sale for four years. The beef had in fact been produced using embryo splitting, which doesn't involve cloning an adult animal. Early embryos are surgically split and the separated cells go on to develop into identical calves. Milking profits The cloned calves are expensive, possibly too expensive for most farmers says Griffin. "The average cow costs £800 to £1000. It's very much touch and go whether the costs can be brought down so the average farmer can benefit." Many scientists think the future of cattle cloning lies in pharmaceutical production, rather than in making copies of prize farm animals. Infigen is also developing cloned herds of cows genetically engineered to produce therapeutic proteins in their milk. ----------------------------------------------------------------------------------------------------------- Invest like the pros! A NEW INVESTMENT SCHEME Now, for the first time, the average investor can take part in the nation's most lucrative industry by purchasing shares in our mutually-held LOBBYING FIRM. If you're like most of us, you're always looking for higher returns on your investments. And while you may be familiar with stocks and bonds, currency speculation, IPOs, and all the rest, there's a new investment arena you should be aware of -- LEGISLATION. If a mutual fund returns 20% a year, that's considered quite good. But in the low-risk, high return world of legislation, a 20% return is positively lousy. There's no reason why your investment dollar can't RETURN 100,000% OR MORE ! Too good to be true? Don't worry, it's all COMPLETELY LEGAL. HERE'S HOW IT WORKS: With the help of a professional legislation broker (called a Lobbyist), you place your investment (called a Campaign Contribution) with a carefully selected list of legislation manufacturers (called Members of Congress). These manufacturers then go to work writing legislation: crafting industry-specific subsidies, inserting tax breaks into the tax code, extending patents, or giving away public property for free. In an assembly-line process that would make Henry Ford proud, the legislation is produced, and you (and your favorite industry) reap the benefits! The effect on your bottom line is immediate and huge. JUST CHECK OUT THESE RESULTS: The Timber Industry spent $8 million in campaign contributions to preserve the logging-road subsidy, worth $458 million -- the return on their investment was 5,725%! GlaxoWellcome invested $1.2 million in campaign contributions to get a 19 month Patent Extension on Zantac worth $1 billion -- their net return: 83,333%! The Tobacco Industry spent $30 million in campaign contributions for a tax break worth $50 billion -- the return on their investment: 167,000%! For a paltry $5 million in campaign contributions, the Broadcasting Industry was able to secure free digital TV licenses, a give-away of public property worth $70 billion -- that's an incredible 1,400,000% return on their investment! If you can get this kind of return when you buy a bunch of congressmen, just imagine what you get when you BUY THE PRESIDENT. Don't wait. Invest now and let the paybacks roll in for the next four years. Apply today! FOR FREE, DO-IT-YOURSELF ADVICE on these and other investment strategies, CONTACT: <http://www.billionairesforbushorgore.com> ----------------------------------------------------------------------------------------------------------- Linked stories: ******************** The Backlash Against Globalization <http://www.trilateral.org/annmtgs/trialog/trlgtxts/t54/ber.htm> Remarks made by C. Fred Bergsten to the 2000 annual meeting of the Trilateral Commission in Tokyo. C. Fred Bergsten is Director of the Institute for International Economics and a former U.S. Assistant Secretary of the Treasury for International Affairs. ******************** California High Court Trims Workers' Rights <http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/10/06/MN114888.DTL> The California Supreme Court ruled that an employer can fire an employee if the company has a legitimate business reason to do so. The decision is widely regarded as the most important workplace ruling in a dozen years, establishing guidelines for when an employer can fire an employee. Employers say the ruling will give them more leeway in firing employees as a legitimate means of cutting costs and increasing profits. ******************** ====================================================== "Anarchy doesn't mean out of control. It means out of 'their' control." -Jim Dodge ====================================================== "Communications without intelligence is noise; intelligence without communications is irrelevant." -Gen. Alfred. M. Gray, USMC ====================================================== "It is not a sign of good health to be well adjusted to a sick society." -J. Krishnamurti ______________________________________________________________ To subscribe/unsubscribe or for a sample copy or a list of back issues, send appropriate email to <[EMAIL PROTECTED]>. ______________________________________________________________ <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om