-Caveat Lector-

RadTimes # 77 - October, 2000

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
QUOTE:
"True, the white man brought great change. But the varied fruits of his
civilization, though highly colored and inviting, are sickening and deadening.
And if it be the part of civilization to maim, rob, and thwart, then what
is progress?"
--Chief Luther Standing Bear, 1933
-----------------------------------------------------------------------------------------------------------
Contents:
---------------
--FBI's Carnivore hunts in a pack
--Critics blast FBI's first release of Carnivore documents
--Bioterrorism: Red Scare For A New Millenium
--National Security Archive Update, October 6, 2000
--140 Native protesters arrested at Denver "Columbus Day" parade
--New Study Shows Alarming Increase in Corporate Cybercrimes
--Army report: Soldier bragged about raping other young girls
--Cash cow [cloning]
--Invest like the pros! [humor?]
Linked stories:
        *The Backlash Against Globalization
        *California High Court Trims Workers' Rights
-----------------------------------------------------------------------------------------------------------
Begin stories:
-----------------------------------------------------------------------------------------------------------
FBI's Carnivore hunts in a pack

<http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2641902%2C00.html>

By Brock Meeks, MSNBC
October 18, 2000 WASHINGTON

Carnivore, the FBI's controversial e-mail snooping program, is part of
covert surveillance triad known inside the bureau as the "DragonWare
Suite," according to recently declassified documents. The documents also
outline how the DragonWare Suite is more than simply an e-mail snooping
program: It's capable of reconstructing the Web surfing trail of someone
under investigation.
According to an analysis of the declassified documents by SecurityFocus, a
California-based computer security firm, the DragonWare Suite can
"reconstruct Web pages exactly as a surveillance target saw them while
surfing the Web."
Besides Carnivore, the DragonWare Suite includes programs called
"Packeteer" and "Coolminer," the documents reveal. These latter programs
are used to reconstruct the raw data scooped up in the initial phase by
Carnivore.
Omnivore came first The FBI was forced to release documents relating to
Carnivore as the result of a lawsuit brought by the Electronic Privacy
Information Center (EPIC). The suit was filed to force the bureau to comply
with a Freedom of Information Act request the Washington-based privacy
watchdog organization filed earlier this year.
The FBI released about 600 pages from its Carnivore files, with most of the
information hidden from view by huge blocks of blacked-out paragraphs. But
by combing through the information left in view, the details of Carnivore's
evolution begin to emerge.
Two other e-mail monitoring programs preceded Carnivore, dating back to at
least January 1996.  Omnivore was Carnivore's immediate predecessor,
developed to run on a Sun Solaris system at a cost of $900,000. But an
earlier program that still remains classified "secret" preceded Omnivore.
Omnivore was pushed into service because the older system was deemed to
have "deficiencies that rendered the design solution unacceptable," a
product review document says.
Omnivore was designed to "sniff" an e-mail stream and print out targeted
e-mails in real time, while storing other data on an 8mm tape drive, the
documents say. The project was conceived in February 1997 and deployed in
October of that year. It was officially retired in June 1999.
The system was apparently pressed into service earlier than planned. While
still in its beta phase, the FBI deployed Omnivore during an investigation,
but technical problems arose that required the program's commercial
developers to support the installation of the program. That situation made
its full development schedule "difficult to maintain," the documents show.
More than it could chew But the Solaris operating system proved unwieldy in
the field, and in September 1998 the bureau devised project "Phiple
Troenix"a bastardization of the phrase "Triple Phoenix"as the upgrade path
that would eventually become Carnivore.
The main objective of Phiple Troenix was to rewrite the Omnivore software
to make it work on a Windows NT platform, according the declassified
documents.
"This will facilitate the miniaturization of the system and support a wider
range of personal computer equipment," the documents say.
This $800,000 project also included funding to train FBI agents and
employees of the National Infrastructure Protection Center.
Carnivore 1.2 was officially unleashed on the world in September 1999. But
that version of the beast apparently scooped up data it wasn't supposed to,
botching an investigation due to digital indigestion, or what the FBI
documents say were "bugs found during a deployment."
'Enhanced Carnivore' Problems with the early version of Carnivore spawned a
project called "Enhanced Carnivore" in November 1999. Meanwhile, a patched
version of the first Carnivore was launched in March of this year.
The FBI has budgeted some $650,000 for Enhanced Carnivore. The current
version of Carnivore is due to be retired in January of next year, the
documents say.
The commercial firm developing Enhanced Carnivore is redacted in the
documents. Scant clues are given as to Carnivore's creators.
"The development contractor ... performed the initial Carnivore development
work," the documents say. "This contractor was selected again based on a
solid track record in this technology area."
Meanwhile, the documents also show that Carnivore 2.0 and 3.0 are already
in the design phase. The documents also underscore an earlier MSNBC.com
report that the FBI is already developing Carnivore-like tools capable of
wiretapping Net-based telephone calls. The FBI calls this technology
"Dragon Net: Voice over IP."
"DragonWare suite? What were they thinking?" House Majority Leader Richard
Armey, R-Texas, asked incredulously. Armey is an outspoken critic of the
Carnivore program and has called on the Justice Department to halt the
program until a full investigation is finished to determine if the program
is open to privacy abuse.
"Until the constitutional questions have been adequately addressed, the
Justice Department should not only stop developing new versions of
cybersnooping software, they should stop using the existing programs,"
Armey said.
The Justice Department recently contracted with an independent research
firm to evaluate the underlying code that makes Carnivore tick in hopes of
once and for all stemming criticisms that the program is a wholesale risk
to privacy.

-----------------------------------------------------------------------------------------------------------
Critics blast FBI's first release of Carnivore documents

<http://news.cnet.com/news/0-1005-200-2917414.html>

By Cecily Barnes and Rachel Konrad
Staff Writers, CNET News.com
October 2, 2000

Update: The FBI today released documents about its controversial
Carnivore technology, but critics blasted the lack of information
and said they still could not determine whether the email-tapping
program would be an invasion of privacy.

The Electronic Privacy Information Center (EPIC), which sued the
FBI for the information through the Freedom of Information Act
(FOIA), complained that the 565-page release contains little relevant
information. According to a press release issued by the Washington-
based group, nearly 200 pages were withheld in full and about 400
pages were redacted, many completely except for the page numbers.

The FBI also withheld the source code to the Carnivore system--
one of the most coveted pieces of information for privacy
advocates.

"We intend to pursue the litigation until the relevant documents are
disclosed," Marc Rotenberg, EPIC's executive director, said today
in a statement. "We do not dispute the need of law enforcement
to protect public safety or pursue criminals in the online world. But
the use of investigative methods that monitor Internet traffic and
capture the private communications of innocent users raise
enormously important privacy issues that must be subject to public
review and public approval."

According to the documents, the Carnivore program was conceived
under the name "Omnivore" in February 1997. It was proposed
originally for a Solaris X86 computer. Omnivore was replaced by
Carnivore running on a Windows NT-based computer in June 1999.
Other documents include discussion of interception of voice over
IP (VOIP), reviews of performance tests, and recovery from
attacks and crashes for both systems.

EPIC's FOIA request seeks the public release of all FBI records
concerning Carnivore, including the source code, other technical
details and legal analyses addressing the potential privacy
implications of the technology.

At an emergency hearing on August 2, U.S. District Judge James
Robertson ordered the FBI to report back to the court by August 16
and to identify the amount of material at issue and the Bureau's
schedule for releasing it. The FBI subsequently reported that 3,000
pages of material were located, but it refused to commit to a delivery
date.

Today's batch of documents represents the first installment.
The FBI is required to release additional files at regular intervals,
until all 3,000 pages have been delivered to EPIC.

The Carnivore system, which is installed at Internet service
providers, captures "packets" of Internet traffic as they travel
through ISP networks. The program sifts through millions of mail
messages, searching for notes sent by people under investigation.

While a useful tool for monitoring specific individuals, the program
has caused an uproar in Congress and among privacy advocates who
fear the FBI's ability to retrieve email belonging to people who are
not under investigation. Senate Judiciary Committee Chairman Orrin
Hatch, R-Utah, and Sen. Patrick Leahy, D-Vt., are among the
elected officials who have publicly criticized the program and called
for an independent investigation.

Under mounting pressure, Attorney General Janet Reno said in July
that she would look into the program. Last week, the U.S. Justice
Department tapped the IIT Research Institute, an arm of the Illinois
Institute of Technology, to perform an independent review of
Carnivore.

The review, however, also has been criticized. Several prominent
universities, including the Massachusetts Institute of Technology
(MIT), backed out of the application process, saying restrictions
placed on the scope of the review took away from its independence.

Meanwhile, other steps are in the works to tame the Carnivore
program. Last week, the House Judiciary Committee approved in a
20-1 vote a bill by Rep. Charles Canady, R-Fla., that would severely
restrict the FBI's operation of Carnivore.

The bill would give email the same protection awarded to voice
conversations under federal wiretap law. A House vote hasn't been
scheduled for the bill, but it could be attached to one of the
spending bills that must pass before Congress adjourns this year.

-----------------------------------------------------------------------------------------------------------
Bioterrorism: Red Scare For A New Millenium

By Hillel W. Cohen
Oct. 12, 2000, Workers World newspaper

Soldiers and cops gown up in decontamination suits. With
guns, flashlights and electronic sensors they move carefully
through smoke-filled streets, stepping over bodies on the
ground. Ambulances and helicopters drown out the crackling
of walkie-talkies.

It is not a movie. It is a bioterrorism drill in the United
States. According to a program currently underway, this
scene will be played out in at least 120 cities. In
Wisconsin last year, one cop taking part accidentally set
off his pepper-spray canister. With irritated eyes and
lungs, some of the participants panicked, thinking that the
scenario they were following had become real.

These Pentagon-led drills are just one part of a multi-
billion-dollar program known as "bioterrorism initiatives."
Research labs are studying exotic toxins and diseases that
"might" be used in an attack. City and county health
departments have set up bioterrorism units to handle
emergencies that no one really expects to happen. A lot of
resources that might otherwise have been used for public
health are being diverted to "protect" the public from
bioterrorism.

What is bioterrorism? This new word has come to mean the use
of biological or chemical--sometimes even nuclear--weapons
in a terrorist attack. Since 1997, bioterrorism has become a
major topic in public health institutions on the federal,
state and local level.

IT BEATS OUT FOOD AND BLOOD SAFETY

The Surgeon General's office puts bioterrorism third on a
list of four areas of global concern--after polio
eradication and emerging and re-emerging infectious
diseases, which include HIV/AIDS, tuberculosis and malaria.
Bioterrorism is ranked ahead of food and blood safety.

The Centers for Disease Control and Prevention, based in
Atlanta, have launched a national health alert network in
order to coordinate responses to bioterrorist attacks. The
Association of Schools of Public Health is trying to make
bioterrorism a core item in the education programs for all
public health students. Medical journals have regular
articles about the need to train doctors to recognize the
symptoms of anthrax and smallpox in the emergency rooms of
local hospitals.

With all this attention and money, you might think that
bioterrorism has taken a huge toll in lives in the United
States and other countries.

Think again.

In the United States, the number of people who have died due
to bioterrorism attacks in the last 100 years is exactly--
zero. And in the whole world, there have been only three
documented incidents.

The most widely known was in Tokyo in 1995. Members of a
religious cult released a chemical agent in a subway,
killing 12 people. The same group had killed seven in an
incident several months earlier in a Tokyo suburb.

The only other case took place in Oregon in 1984, when a
religious cult purposely contaminated several salad bars
with salmonella bacteria. Over 700 people were sickened, but
none died or were even sick enough to be hospitalized.

Yet in news reports, press releases and conferences on
bioterrorism, these incidents are mentioned over and over
again to convince the public that bioterrorism is a real
threat.

REAL HAZARDS DOWNPLAYED

In 1984, the same year as the salmonella attack, an
industrial accident in Bhopal, India, in a factory owned by
the U.S. corporation Union Carbide, killed thousands of
people--so many that an accurate count was never
accomplished. Many more were blinded or otherwise
permanently disabled.

Every year in the United States, according to testimony at
congressional hearings, there are approximately 60,000
chemical spills, leaks and explosions, of which about 8,000
are considered "serious." Together, they are responsible for
some 300 to 400 deaths. In addition, an estimated 76 million
illnesses from food-borne disease occur each year, leading
to 325,000 hospitalizations and about 5,000 deaths.

Compared to these staggering numbers, the alleged threat
from bioterrorism is just about zero. There's a much, much
greater risk of being hit by lightning than being a victim
of bioterrorism.

In fact, the dangers from the "anti-terrorism" campaign are
much greater than the virtually non-existent danger from
bioterrorism.

So why do the Clinton administration and so many federal,
state and local health agencies put bioterrorism at the top
of their agendas?

DIVERTING PUBLIC HEALTH DOLLARS

A major reason is that terrorism in general and bioterrorism
in particular are useful for justifying bigger budgets for
the Pentagon and Federal Bureau of Investigation.
Bioterrorism is also a handy excuse for all sorts of nasty
business lumped in the budget under "defense."

For example, the U.S. government claimed that a medicine
factory in the Sudan was making bioterrorism materials. The
Pentagon destroyed the factory on Aug. 20, 1998, with two
cruise missiles. Within days, the allegations were shown to
be false. It is apparent now that the Pentagon and CIA never
had any real evidence for their claim. Yet a factory that
supplied half the medicines for North Africa and parts of
the Middle East was wiped out. How many people have died or
suffered needlessly for lack of these medicines?

The U.S. government also continues to claim that the
government of Iraq makes or stockpiles biological and
chemical weapons, thus justifying economic sanctions that
have already led to the deaths of over a million Iraqi
people. But it is the United States that has the largest
stockpile of chemical weapons in the world, even though
Washington pledged to destroy these stocks.

The Pentagon spends more each year than the next 10 biggest
military powers combined. The U.S. stockpiles more "weapons
of mass destruction," including nuclear weapons, than the
rest of the world added together.

For decades the anti-communist red scare was used to justify
the enormous waste of military spending. With the fall of
the Soviet Union, it is hard for the capitalists and their
politicians to explain why hundreds of billions more are
needed every year. Bioterrorism could become the phantom
menace of the new millennium.

-----------------------------------------------------------------------------------------------------------
National Security Archive Update, October 6, 2000

*Archive Publishes Secret Directive Governing Interception of Communications
Involving "U.S. Persons"*

On Friday, October 6, the National Security Archive at The George Washington
University published a newly declassified United States Signals Intelligence
Directive (USSID).  This version of USSID 18, issued in July 1993, currently
governs the National Security Agency's interception of communications
involving U.S. persons.  Until publication of the directive, which was
obtained under the Freedom of Information Act on September 20, 2000, the only
version of USSID 18 available to the public dated back to 1980.

With an annual budget of approximately $3.5 billion, the National Security
Agency oversees the interception, processing, storage and dissemination of
foreign radio, wire and other electromagnetic communications for intelligence
purposes.  The document specifies the circumstances under which the agency may
intercept, process, retain and disseminate information pertaining to U.S.
citizens, resident aliens and U.S. corporations.

The document is available as part of an updated Archive "Electronic Briefing
Book" by Dr. Jeffrey T. Richelson, entitled, "The National Security Agency
Declassified: History, Organization and Operations," and is available here:

<http://www.nsarchive.org/NSAEBB/NSAEBB23/>

-----------------------------------------------------------------------------------------------------------
140 Native protesters arrested at Denver "Columbus Day" parade

Colorado Parade Goes On Amid Protests
By P. Solomon Banda, ASSOCIATED PRESS
07 Oct 2000

DENVER — More than 140 American Indian activists were arrested while
protesting Saturday's Columbus Day Parade, the first in the city since 1991.
American Indians assert that Christopher Columbus was a slave trader who
committed genocide against their ancestors. Their clashes with
Italian-Americans during the city's 1991 parade had forced the parade's
cancelation for the remainder of the decade.
This year, Indian activists and Italian-Americans had reached an agreement
that there would be no protests if the parade was limited to an Italian
pride parade with no mention of Columbus, but several representatives of
the Italian community later disavowed the deal.
On Saturday, police cut down a section of a fence that had been erected to
block protests, and permitted demonstrators to take up spots on the street
used for the parade. But after a brief demonstration, police moved back in,
giving the Indians the choice of leaving or being arrested.
No one resisted, said police spokeswoman Mary Thomas. They were arrested on
misdemeanor charges including loitering and failure to obey a lawful order,
which can bring penalties of up to a year in jail and fines up to $1,000.
Among the 147 people arrested was American Indian Movement activist Russell
Means, who said the protesters would ask for individual jury trials.
"We broke no law today," said fellow AIM activist Glenn Morris.
In 1989, Means and three others were arrested after throwing fake blood on
a Columbus statue. The next year, protesters shouted anti-Columbus slogans
during the Columbus Day parade.
The 1992 parade was canceled moments before it was to start because of
concerns about violence.

-----------------------------------------------------------------------------------------------------------
New Study Shows Alarming Increase in Corporate Cybercrimes

NORWOOD, Mass.
Oct. 5, 2000

--Threats From Hacking and Cybersabotage on the Rise Despite Increased
Security Spending--

According to a survey published recently in Information Security
magazine, the number of companies spending
more than $1 million annually on computer security nearly doubled in
the past year. Security budgets are up 188 percent over the last two
years. Nevertheless, security breaches originating from both inside
and outside corporations continues to grow as the threat of hackers
and careless employees increases.

"The 2000 Information Security Industry Survey" appears in the
September 2000 issue of Information Security
<www.infosecuritymag.com>, an independent magazine published by
ICSA.net <www.icsa.net> the Reston-,Va.-based Internet security
assurance company. The survey was completed by 1,897 high-tech and
infosecurity professionals. Co-sponsored by ICSA and Global Integrity
Corp., the study also reveals statistics on the relationship between
e-commerce and security risk, security software use, and the
effectiveness of information security policies in mitigating threats
and cyberattacks.

Andy Briney, editor-in-chief of Information Security and lead
analyst on the survey, believes companies need to spend more time
thinking about security solutions, not just spend more money.

"Results of this survey prove that spending millions of dollars
adopting security practices doesn't guarantee effectiveness," said
Briney. "CEOs and CIOs need to focus on security solutions that fit
their specific network needs. A large dollar amount alone will never
guarantee network safety."

On the heels of this year's LOVEBUG and Life Stages viruses, the
Information Security survey confirms that viruses and malware attacks
are on the rise. Eight out of 10 companies were hit with a destructive
virus this year.

According to the survey, companies will also need to pay more
attention cybersabotage. Compared to 1999, nearly twice as many
companies experienced insider attacks related to the theft, sabotage
or intentional destruction of computing equipment this year.
Meanwhile, the number of organizations in which employees
intentionally disclosed or destroyed proprietary corporate information
increased by 41 percent.

Companies conducting B2B or B2C e-commerce are at higher risk of
attack, according to the survey. "E-commerce sites experienced more
attacks in 15 out of 16 categories we measured," Briney said. For
instance, companies conducting e-commerce were twice as likely to have
their Web servers attacked by hackers.

The study also shows that the best defense against security
attacks and incidents is a layered defense: the use of overlapping
computer technologies to detect and react to security breaches and
incidents. Companies deploying multiple computer security tools detect
a far greater number of attacks than those using fewer security
controls. "The lesson is, you can't fight cybercrime if you don't even
know it's happening," says Briney.
----
For complete survey results, visit Information Security's Web site
at <www.infosecuritymag.com>.

-----------------------------------------------------------------------------------------------------------
Army report: Soldier bragged about raping other young girls

    FORT BRAGG, N.C. (AP) _ A U.S. soldier who raped and killed an
11-year-old girl in Albania repeatedly bragged to his comrades about
assaulting girls in other countries, but no one told a commanding officer,
an Army report said. The soldiers said they kept quiet in part because Staff
Sgt. Frank Ronghi threatened to kill them, The Fayetteville Observer
reported, quoting Army findings on abuses by peacekeeping forces in Kosovo.
Ronghi pleaded guilty to premeditated murder and forcible sodomy of Merita
Shabiu in January, while his unit was on a six-month peacekeeping duty in
Kosovo. Ronghi, a weapons squad leader for the 82nd Airborne Division, is
serving a life sentence without parole. A month before Merita was killed and
her body hidden in the woods, Ronghi took his squad to that spot and told
them it was a good place to dump a body, the Army report said. "Anybody
could scream at the top of their lungs without anybody hearing," a sergeant
said, recounting Ronghi"s words. Soldiers told investigators that Ronghi had
bragged about raping two sisters, making the older girl watch first and then
forcing them to trade places. Ronghi also told a soldier he raped a
9-year-old Haitian girl, saying "this was his greatest sexual accomplishment
because she was so young." Soldiers kept quiet about the boasts, saying
Ronghi liked to say, "What happens in the squad stays in the squad, or your
body will never be found." Leaders of the 82nd Airborne Division have
condemned Ronghi"s crimes, saying no one could have known what he was
capable of.

-----------------------------------------------------------------------------------------------------------
Cash cow

<http://www.newscientist.com/dailynews/news.jsp?id=ns999950>

7 October 2000
by Emma Young
New Scientist Online News

The first auction of a cloned animal raises $82,000 for an unborn calf

A clone of Mandy, a prize dairy cow, raised $82,000 at an auction on Friday
at the World Dairy Expo in Madison, Wisconsin. It was the first time a
clone had been offered for commercial sale, says biotechnology company
Infigen.
Infigen is so confident in its techniques that the clone has not yet been
created. But the promised exact genetic copy fetched nearly seven times the
price of Mandy's normal calves.  As a two-year-old Mandy was valued at
$100,000.
Infigen thinks commercial cloning of cattle is now viable. But not all
experts agree. "At this stage of the development of the technology, this is
probably a publicity issue rather than the start of a genuine commercial
service," says Harry Griffin of the Roslin Institute in Edinburgh, where
Dolly the sheep was cloned.
Techniques for cloning cattle are more advanced than for any other species,
Griffin says. But he thinks there are important welfare issues to consider.
Cloned cow embryos often don't develop properly. Some grow larger than
normal, creating health risks for the mother and calf during birth. The
clones may also die prematurely.
"A 1998 report by the UK Farm Animal Welfare Council recommended that the
problem of large calf syndrome should be solved before cloning becomes a
commercial reality here," Griffin says.
                               Price to drop
Mandy will be cloned in December, says Infigen spokesman Peter Steinerman.
The heifer will be due nine months later.
It will be produced using nuclear transfer, the technique that created
Dolly. Infigen technicians will fuse an unfertilised egg with a cell taken
from the cow's ear. The embryo will be grown in the laboratory and then
implanted in surrogate mothers.
Infigen is claiming only a 5 per cent success rate in developing viable
embryos from fused cells. But it thinks this will be sufficient for the
process to be commercially successful. It hopes soon to be selling cloned
calves for $25,000, and expects this price to fall as the technique is
improved.
                               Public concern
In Britain, there is no law against farmers buying cloned cattle, says
Griffin. But Phil Hudson of the National Farmers Union thinks many will be
wary.
"If farmers in Britain wanted to buy these animals, they'd have to consider
the implications. There would be a number of issues to consider, including
animal welfare and public perceptions. Perceptions carry a lot of weight."
In Japan, there was widespread public concern in April following a
newspaper report that unlabelled "cloned" beef had been on sale for four
years. The beef had in fact been produced using embryo splitting, which
doesn't involve cloning an adult animal. Early embryos are surgically split
and the separated cells go on to develop into identical calves.
                               Milking profits
The cloned calves are expensive, possibly too expensive for most farmers
says Griffin.
"The average cow costs £800 to £1000. It's very much touch and go whether
the costs can be brought down so the average farmer can benefit."
Many scientists think the future of cattle cloning lies in pharmaceutical
production, rather than in making copies of prize farm animals. Infigen is
also developing cloned herds of cows genetically engineered to produce
therapeutic proteins in their milk.

-----------------------------------------------------------------------------------------------------------
Invest like the pros!

A NEW INVESTMENT SCHEME

Now, for the first time, the average investor can take part in the
nation's most lucrative industry by purchasing shares in our
mutually-held LOBBYING FIRM.

If you're like most of us, you're always looking for higher returns on
your investments. And while you may be familiar with stocks and bonds,
currency speculation, IPOs, and all the rest, there's a new investment
arena you should be aware of -- LEGISLATION.

If a mutual fund returns 20% a year, that's considered quite good.
But in the low-risk, high return world of legislation, a 20% return is
positively lousy. There's no reason why your investment dollar can't
RETURN 100,000% OR MORE !

Too good to be true? Don't worry, it's all COMPLETELY LEGAL.

HERE'S HOW IT WORKS:

With the help of a professional legislation broker (called a Lobbyist),
you place your investment (called a Campaign Contribution) with a
carefully selected list of legislation manufacturers (called Members of
Congress). These manufacturers then go to work writing legislation:
crafting industry-specific subsidies, inserting tax breaks into the tax
code, extending patents, or giving away public property for free. In an
assembly-line process that would make Henry Ford proud, the legislation
is produced, and you (and your favorite industry) reap the benefits!
The effect on your bottom line is immediate and huge.

JUST CHECK OUT THESE RESULTS:

The Timber Industry spent $8 million in campaign contributions to
preserve the logging-road subsidy, worth $458 million -- the return on
their investment was 5,725%!

GlaxoWellcome invested $1.2 million in campaign contributions to get a
19 month Patent Extension on Zantac worth $1 billion -- their net
return: 83,333%!

The Tobacco Industry spent $30 million in campaign contributions for a
tax break worth $50 billion -- the return on their investment: 167,000%!

For a paltry $5 million in campaign contributions, the Broadcasting
Industry was able to secure free digital TV licenses, a give-away of
public property worth $70 billion -- that's an incredible 1,400,000%
return on their investment!

If you can get this kind of return when you buy a bunch of congressmen,
just imagine what you get when you BUY THE PRESIDENT. Don't wait. Invest
now and let the paybacks roll in for the next four years. Apply today!

FOR FREE, DO-IT-YOURSELF ADVICE on these and other investment strategies,
CONTACT: <http://www.billionairesforbushorgore.com>

-----------------------------------------------------------------------------------------------------------
Linked stories:
                        ********************
The Backlash Against Globalization
<http://www.trilateral.org/annmtgs/trialog/trlgtxts/t54/ber.htm>
Remarks made by C. Fred Bergsten to the 2000 annual
meeting of the Trilateral Commission in Tokyo. C. Fred Bergsten is Director
of the Institute for International Economics and a former U.S. Assistant
Secretary of the Treasury for International Affairs.

                        ********************
California High Court Trims Workers' Rights
<http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/10/06/MN114888.DTL>

The California Supreme Court ruled that an employer can fire an employee if
the company has a legitimate business reason to do so. The decision is
widely regarded as the most important workplace ruling in a dozen years,
establishing guidelines for when an employer can fire an employee.
Employers say the ruling will give them more leeway in firing employees as
a legitimate means of cutting costs and increasing profits.

                        ********************
======================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to