-Caveat Lector-

[radtimes] # 177

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
Send $$ to RadTimes!!  -->  (See ** at end.)
-----------------------------------------------------------------------------------------------------------
Contents:

--Terrorists Taking Up Cyberspace
--U.S. Congressman Censored At WBAI
--Corporate Spooks
--Intel Chief Addresses Longer-Range Threats to U.S.
--CIA patching ECHELON shortcomings
--Ghana's trapped women slaves

===================================================================

Terrorists Taking Up Cyberspace

   Web sites have become inexpensive, easily accessible tools for giving
instructions to operatives and raising funds. The service providers for
some of these sites are based in the United States.

By CHARLES PILLER, Times Staff Writer
Los Angeles Times [02/2001]

       A car bomb shattered storefronts in Netanya, a seaside resort town in
northern Israel, and wounded 60 diners and shoppers on the evening of Jan.
1. There was one fatality--the bomber himself.

       The group behind this blast didn't call a TV station to claim credit.
Instead Hamas, the Palestinian organization that sponsors acts of terror
against Israel, posted a note on its Web site.

       It turns out that the Internet--inexpensive, open and accessible at
any time from anywhere--is an ideal tool for terrorists.

       Scores of guerrilla armies and political factions locked in holy wars
and liberation struggles flock to the Net to send messages undiluted by the
press and untouched by government censors. Hezbollah and Hamas in the
Middle East, guerrillas with the Maoist group Shining Path of Peru and
revolutionaries across Europe and Asia operate their own Internet sites.
The most popular terrorist sites draw tens of thousands of
visitors each month.

       Hamas' Web site presents political cartoons, streaming video clips
and photo montages depicting the violent deaths of Palestinian children.
The Armed Islamic Group, a fundamentalist sect warring with the Algerian
government, posted a detailed bomb-making manual. The online home of the
Tamil Tigers, a liberation army in Sri Lanka best known for the 1991
assassination of former Indian Prime Minister Rajiv Gandhi, offers position
papers, daily news and peddles free e-mail services. Other terrorist sites
post electronic bulletin boards, tips on smuggling money to finance their
operations and automated registration for e-mail alerts to foment revolt.

       "This is almost a revolutionary change in terrorism," said Bruce
Hoffman, director of the Washington office of Rand Corp., a Santa
Monica-based policy research firm. "In the past, terrorists had to
communicate through an act of violence and hope that the communique would
effectively explain their ideological justification or their fundamental
position," Hoffman said.

       Experts still are unclear whether the ability to communicate online
worldwide is prompting an increase or a decrease in terrorist acts. But
they agree that online activities substantially improve the ability of such
terrorist groups to raise funds, lure new faithful and reach a mass audience.

       "There is a tendency to think that these people are not computer
savvy, that they run around with [AK-47s] and that's about it," said Ben
Venzke, an intelligence researcher at IDefense, a Fairfax, Va., computer
security company. But the Internet "is the perfect vehicle for them to
generate support."

       Yet the federal government has lagged in responding to this surge of
terror groups online. "I give us a 'C-minus' in following these issues,"
said a U.S. counter-terrorism official who requested anonymity. "We're
still trying to get our arms around exactly what we're dealing with."

       Terrorists rarely rely on their Web sites to communicate within their
groups. More commonly, they use encrypted--or digitally scrambled--e-mail,
according to the FBI. But even that method is widely distrusted.

       "The FBI has developed a system to intercept [and read e-mail]. The
British intelligence [agency] MI-5 and Scotland Yard have developed similar
programs," said Isaac Velazco Fuertes, Web manager for Peru's Tupac Amaru
Revolutionary Movement, in an interview from Germany, where the group's
main Web site is based.

"We believe that to communicate among members using [our Web sites or
e-mail] is to be exposed."

       To solve the problem, some terrorists place seemingly innocuous
messages that contain coded instructions on outsiders' Web site bulletin
boards. Others hide messages within digital images. Islamic extremists,
including some connected to Osama bin Laden--the accused mastermind of the
deadly bombings of U.S. embassies in Tanzania and Kenya in 1998--embed
encrypted messages within pornography, then post such images on public Web
sites. The intended recipients download the images, then extract and
decrypt the messages.

       "The value of this technique [is that] much like a classified ad,"
Venzke said, "the sender doesn't even need to know who the recipient is."

       Terrorist Web sites have become important enough to become targets.
Since the Palestinian uprising last fall, Israeli hackers have repeatedly
struck the Web sites of Hezbollah, a Lebanese-based Islamic group behind
the 1983 suicide truck bombing of the U.S. Embassy and military barracks in
Beirut.

       Hackers replaced Hezbollah's Web logo, a raised fist clenched around
an automatic weapon, with photos of Israelis captured by Hezbollah set
against a field of waving Israeli flags.

       "You can see logically why [the Internet is] important to us--the
other side is trying to do everything to stop our efforts," said Malik
Hussein, a Hezbollah member who founded the group's collection of Web sites
five years ago. Speaking by phone from Beirut, Hussein noted that Israeli
hackers knocked his service offline for 16 hours in December and wiped
clean the host computers' storage drives.

       For their part, pro-Palestinian hackers temporarily overwhelmed the
Web sites of Israel's army, foreign ministry and parliament with a torrent
of electronic demands. Scores of Israeli and Palestinian Web sites have
been vandalized.

       Pakistani and Indian computer hackers have done the same in response
to the bloody conflict between those nations over Kashmir.

       "When tensions arise on the ground, you see a parallel rise of
activity in cyberspace," said Venzke, who recently completed a report on
the Web wars for commercial clients.

       And no matter how much a group may revile the United States, most
factions translate their sites into English, the Web's lingua franca.

       "You can't work on the Internet if you don't know English very well,"
said Hezbollah's Hussein, who was educated in Europe and is fluent in English.

       American firms also play a significant role in back-office support
for some terrorist sites, according to Internet-address registration records.

       At least a dozen terrorist sites use American Internet providers,
such as Trumbull, Conn.-based OLM (Hamas and the Tamil Tigers); and
LanMinds in Berkeley (Mojahedin-e Khalq, an Iranian leftist group involved
in the 1979 takeover of the U.S. Embassy there and which now fights the
nation's clerical regime).

       A UC San Diego student group maintains the "Burn!" Web site that
hosts offerings from a wide range of radical-left organizations, including
an English-language version of the Tupac Amaru site. The Peruvian
guerrillas are one of 29 groups officially designated on the U.S. State
Department's foreign terrorist list. Tupac Amaru seized the Japanese
Embassy in Lima in 1996, taking more than 400 hostages. A UCSD spokesperson
said the university neither endorses nor censors the site, which operates
on UC computers.

       And until recently Interland Inc., a medium-size Internet service
provider in Atlanta, hosted several Hezbollah Web sites. The company said
it terminated contracts with three Hezbollah sites in December and January
for unspecified violations of its usage agreement. Hezbollah then switched
to a Lebanese provider.

       The company also hosts the Web site for the U.N. mission addressing
the Taliban regime, Islamic fundamentalists who rule most of Afghanistan.
The Taliban was severely sanctioned in January by the U.N. for harboring
terrorists, including Bin Laden.

       Many terrorist sites seem to preach to the converted, but others
build surprisingly diverse audiences. Hezbollah claims 40,000 visitors per
month to its sites--a paltry showing compared with the 50-million-plus on
Yahoo or America Online. But they have proved influential. In one case,
Hezbollah forced the Israeli military to recant its story about a commando
disaster. After 11 Israeli soldiers were killed by Hezbollah in Lebanon in
1997, Israel negotiated a bodies-for-prisoners swap. Israel only reported
the return of one soldier's body, although the remains of two others also
were returned. The army secretly buried the remains.

       "Only after Israel learned that the Hezbollah planned to [and
ultimately did] post the information on its Internet site did [the Israeli
military] decide to pass the information on to the two families," the
Israeli newspaper Ha'aretz reported. A scandal ensued.

       Last summer, Israelis seeking information on the fighting in southern
Lebanon looked to Hezbollah Web sites for news or images of casualties that
may not have appeared in the Israeli press due to military censorship,
Hoffman said.

       Given the violence by many national governments against political
opponents, the definition of "terrorist" can be murky. In the United
States, Web sites are protected by the 1st Amendment. The FBI does not
track visitors to the sites or monitor content unless it is investigating a
specific illegal activity, a spokesman said. But U.S. law does prohibit
fund-raising by groups on the State Department list of foreign terrorists.

       One organization that apparently fell afoul of that rule recently was
the Brooklyn, N.Y.-based Hatikva Jewish Identity Center. That group
operates www.kahane.org, named for the anti-Arab extremist Rabbi Meir
Kahane, who was slain a decade ago. Two organizations Kahane or his
supporters founded, Kach and Kahane Chai, were placed on the State
Department list after a Kach member massacred 48 worshipers at a West Bank
mosque in 1994. Kahane.org calls for the expulsion of all Arabs from Israel
and solicits donations for its work.

       On Jan. 4, the FBI raided Hatikva and carried away computers and
documents. Hatikva views the raid as an effort to establish links between
it and Kach and Kahane Chai. "I can tell from the search warrant . . . that
they are clearly trying to frighten anyone from contributing funds," said
Mike Guzovsky, a Hatikva official, in a recording posted on the Web site.

       Some terrorist groups rely on supporters to raise funds online.

       One such fund-raiser is Azzam Publications in London. Azzam operates
a site dedicated to worldwide jihad and its site steers funds to the
Taliban in Afghanistan and to allied guerrillas fighting the Russians in
Chechnya.

       Taliban's assets abroad have been frozen by U.N. mandate. But the
Azzam site states, "An appeal for cash donations is especially urgent" and
advises the personal delivery of U.S. currency to the Taliban
consul-general in Karachi, Pakistan, and suggests a $20,000 minimum donation.

       "It is probably advisable to send one or two trustworthy, young,
strong, fit Muslims with the delegation for protection of the money and the
delegation," the instructions caution, suggesting ways to dodge nosy
airport officials. "Under no circumstances should you hand over the money
to anyone at the consulate other than the consul-general."

       Possibly the most accomplished Internet fund-raiser is
Lashkar-e-Taiba ("Army of the Pure"), a Taliban ally that maintains a
guerrilla army battling the Indian military for control over the Kashmir
region bordering Pakistan.

       Lashkar-e-Taiba's sophisticated Web site offers Arabic, Urdu and
English versions, attractive illustrations and easy pull-down menus that
resemble Microsoft Windows.

       The site describes how the Mujahideen-e-Lashkar-e-Taiba is fighting
the "oppressive Hindu Army in the snow covered valleys, mountains and
jungles of Kashmir. These Mujahideen best deserve your [charity]." The site
directs donations to a bank in Pakistan; the bank's phone and the account
number are conveniently provided for wire transfers.

       Their effort has been so successful that Lashkar-e-Taiba may soon
become the envy of like-minded groups that have discovered the Internet.
Lashkar-e-Taiba is reportedly planning to open its own bank.

===================================================================

FOR IMMEDIATE RELEASE:
MARCH 5, 2001

Contact:  Concerned Friends of WBAI: John Riley (917) 653-7267;
www.wbaiaction.org
Pacifica Campaign, (646) 230-9588
Background: www.savepacifica.net

U.S. CONGRESSMAN CENSORED AT WBAI

Rep. Major Owens (D. New York) to Make Statement on House
Floor; Long-time WBAI Program Cancelled

New York:  Congressman Major Owens (Brooklyn, 11th District)
was interrupted without warning and pulled off the air today when
he called in as a guest on Pacifica radio station WBAI (99.5 FM).
Speaking on "Building Bridges: Your Community and Labor
Report," Owens was several minutes into a discussion on recent
changes at the listener-sponsored station when WBAI's interim
general manager Utrice Leid came into the master control studio
and seized the mic.

Leid then told listeners that the information broadcast by co-host
Ken Nash and Congressman Owens was untrue.  Later,
Congressman Owens said he was "outraged, and caught without
any explanation or apology."  He said he was hoping to talk about
independent media when the interim general manager took control.
"I intend to make the statement I was going to make today on
WBAI, on the floor of the House of Representatives and put it into
the congressional record," Owens stated.

Owens, who has been an outspoken critic of what is now dubbed
the "Christmas Coup" at WBAI,  said he was "amazed" by today's
on-air events. "It's like something in a totalitarian country with the
fuhrer intervening," Owens added.

According to Nash, Leid came into the master studio
unexpectedly.  "She tried to talk to my guest without warning or
invitation," he said. "I reminded her that the producer is in charge of
the program. I asked her to leave the studio. Leid then permanently
cancelled the program."  "Building Bridges" is WBAI's only labor
show.

The 52-year-old listener-sponsored Pacifica radio network has been
embroiled in censorship battles in recent years. The Washington
Post has described Pacifica management's actions as "cowardly
radio" and "Soviet-style journalism," while dozens of journalists
from around the world struck the Pacifica Network News one year
ago to protest rampant censorship.

The late-December, midnight take-over of WBAI by the parent
foundation created a storm of controversy. Locks were changed,
veteran staffers were fired and banned and security guards have
been installed at the station.  A gag rule has been imposed, and
access to the station is restricted.  Critics say the New York take-
over represents Pacifica management's continuing effort to alter the
political content of the entire network.

===================================================================

Corporate Spooks

By Russell Mokhiber and Robert Weissman

Corporate espionage is the dirty little secret of big business in America
today.

Corporations spy on other corporations. They spy on citizen groups. They
spy on governments.

To protect their reputations, corporations don't admit to spying. But they
do it.

Corporate spies call themselves "competitive intelligence professionals."

There is even a professional association of corporate spies -- the Society
for Competitive Intelligence Professionals (SCIP).

SCIP denies that "competitive intelligence" is espionage and denies that
"competitive intelligence professionals" are spies.

"Espionage is the use of illegal means to gather information," says the
SCIP web site (www.scip.org).

And SCIP says its members do not practice espionage.

SCIP says that its members gather their information legally from public
sources and are bound by a strict code of ethics, which requires
compliance with all laws and disclosure of "all relevant information,
including one's identity and organization, prior to all interviews."

Marc Barry is out to upend SCIP's apple cart.

Barry is a corporate spy. He's not a member of SCIP, because he says he's
not a hypocrite.

Of course corporations spy, he says.

Of course SCIP's members spy, he says.

In fact, they hire him when they don't want to get caught doing a
company's dirty work.

In the business, he's known as a kite.

"A kite is somebody who is essentially expendable, somebody who is flown
out there, and if it hits the fan, the controller can cut the string, deny
knowledge and let the kite fly off on its own," Barry told us last week.

"I provide my clients with actionable intelligence that they either don't
know how to get themselves, or they don't want to get caught collecting
themselves," Barry said. "I provide plausible deniability to my clients.
In the event that an operation is blown and there is litigation or worse
-- a criminal charge -- they can deny all responsibility by denying
knowledge."

With plausible deniability, Barry's corporate clients "can claim ignorance
by demonstrating in court that I am in fact a consultant, that I signed
documents saying that I would abide by all ethical rules, and that they
had no idea what I was doing," he says.

Barry runs about 40 capers a year.

"I do very well for myself," Barry said. "All of my clients are Fortune
500 companies. I deal at the executive level. I'm either dealing at the
chief executive officer, or the chief operating officer level. The very
lowest would be vice president of marketing."

Recently, a SCIP board member hired Barry to run an operation against
Kraft Foods on behalf of Schwan's Sales Enterprises.

In the winter of 1997, Kraft had developed a new "rising crust" pizza
under the brand name DiGiorno. Schwan's was moving a similar pizza under
the name Tony's.

Kraft, a unit of Phillip Morris, was planning a massive advertising
campaign to position DiGiorno's as the only frozen pizza to taste like
pizza-parlor pizza.

The SCIP member phoned Barry.

He knew Barry could quickly get information on the Kraft operation.

Posing as a reporter for the Wall Street Journal, as an environmentalist,
and as a graduate student, Barry collected the information Schwan's wanted
in less than two days. Job completed. Barry wrote about the operation in
a Spooked: Corporate Espionage in America (Perseus, 2000, co-authored by
Adam Penenberg).

Someone at Kraft read the book, ordered an internal investigation, and
tripped across a second espionage operation. Last month, Kraft sued
Schwan's for theft of trade secrets.

Isn't Barry concerned about the ethics of lying?

"To my knowledge, in all 50 states, it is not illegal to lie," he says.
"The only people I listen to are the United States Department of Justice
and state and local law enforcement officials."

What about dumpster diving -- going through someone's garbage?

"Dumpster diving is perfectly legal, providing there is not a sign
posted," Barry says. "The courts have held that if it is left to be
accessed by commercial carters, then it is no longer private property. It
is only private property if there is a 'no trespassing' sign and you had
to trespass to get into the dumpster."

What about using an answering machine pick -- a device used to remotely
grab someone else's message off the target's answering machine?

"That's probably a gray area," Barry says.

"Do you use picks?" we ask.

"Fine, and you?" Barry answers.

Barry wonders whether SCIP members are adhering to the organization's
"code of ethics."

"If you go to one of their functions, it looks like a sixth grade dance --
where you had all the boys on one side and all the girls on the other side
and no one would talk to each other," he says.

"At a SCIP function, on one side you have all the spooks who came out of
Defense Intelligence Agency, the Central Intelligence Agency and the
National Security Agency. And they are all backslapping and hanging with
each other."

"And on the other side you have the librarians, the Lexis-Nexis types, the
software people. So, the white hats are on one side, and the black hats
are on the other."

Barry sees a big business in corporate espionage. His Manhattan-based
company -- C3I Analytics -- is in a joint venture with Raytheon that is
dumping $12 million to build a state-of-the art corporate espionage war
room in New York City.

The new company, to be called Intelogix, will sell services to other
corporations "intent on studying the enemy's every move."

Could it be that, as you are reading this, some Fortune 500 company is
picking the telephone messages off your answering machine?

Fine, and you?
-----------------------------------------------
Russell Mokhiber <[EMAIL PROTECTED]> is editor of the Washington,
D.C.-based Corporate Crime Reporter. Robert Weissman <[EMAIL PROTECTED]> is
editor of the Washington,  D.C.-based Multinational Monitor. They are
co-authors of Corporate Predators: The
Hunt for MegaProfits and the Attack on Democracy (Monroe, Maine: Common
Courage Press, 1999).

===================================================================

Intel Chief Addresses Longer-Range Threats to U.S.

By Jim Garamone
American Forces Press Service

WASHINGTON, March 6, 2001 -- The United States is the
world's sole remaining super power. America faces
challenges and threats that span the spectrum of warfare,
said Vice Adm. Thomas Wilson, director of the Defense
Intelligence Agency.

Wilson, testifying before the Senate Select Committee on
Intelligence, said the turbulence the world has experienced
in the past decade would probably continue. "This
turbulence could spawn a spectrum of potential conflict
ranging from larger-scale combat contingencies, through
containment deployments, peace operations and humanitarian
relief operations," he said.

Each threat alone poses no real danger to the United
States, Wilson said, but "collectively, they form a
significant barrier to our goals for the future."

While the United States must be prepared for all
contingencies, the 1991 Gulf War taught potential opponents
to forgo conventional warfare, Defense Secretary Donald
Rumsfeld said in January.

The most likely threats, Wilson said, are foes whose
challenges render U.S. military power indecisive or
irrelevant to their operations and objectives.

Foes will pursue asymmetric warfare -- a variety of low-
cost strategies they hope will achieve disproportionate
results. A classic example is Somalia. After the "Day of
the Rangers," when Somali warlords killed 18 U.S. soldiers
and wounded 73 in the capital of Mogadishu in 1992, the
United States changed its policies and eventually withdrew.

"(Foes) seek capabilities that we are either unwilling or
unable to counter, thereby either denying our leadership
the 'military option' or forcing us to 'disengage' before
they are defeated," Wilson said.

Wilson said enemies would likely use asymmetric approaches
that will fit generally into five broad, overlapping
categories: counter will, counter access, counter precision
strike, counter protection and counter information.

Counter will approaches are designed to intimidate the
United States into not deploying or into leaving before the
mission is accomplished.

Counter access strategies are designed to deny U.S. forces
access to seaports or airports. It could include use of sea
mines or forces to close sea lanes or air forces to close
air routes.

Counter precision strike is designed to defeat or degrade
U.S. precision intelligence and attack capabilities.

Counter protection is designed to increase U.S. casualties
and, in some cases, directly threaten the United States.

Counter information is designed to prevent the United
States from attaining information and decision superiority.

The means to attack the United States asymmetrically are
everyone's bad dream. It includes terrorism, cyberwarfare
and information warfare, and attacks using weapons of mass
destruction, and operations directed against U.S. space-
based systems.

Terrorism remains the most likely attack at home and
abroad. "This threat will grow as disgruntled groups and
individuals focus on America as the source of their
troubles," Wilson said. "Most anti-U.S. terrorism will be
regional and based on perceived racial, ethnic or religious
grievances."

He said terrorism would likely occur in urban centers,
often capitals. U.S. service members will be obvious
targets. "Our overseas military presence and our military's
status as a symbol of U.S. power, interests and influence
can make it a target," he said.

Military force protection measures may drive terrorists to
attack softer targets such as private citizens or
commercial interests. "Middle East-based terrorist groups
will remain the most important threat, but our citizens,
facilities and interests will be targeted worldwide,"
Wilson said. "State sponsors -- primarily Iran -- and
individuals with the financial means -- such as Osama bin
Ladin -- will continue to provide much of the economic and
technological support needed by terrorists.

More destructive attacks are likely if terrorist
organizations gain access to more destructive conventional
weapons technologies and weapons of mass destruction, he
said.

The news media call information operations "cyberwar." High
profile hacker attacks such as the Love Bug show how
vulnerable an information society can be. But information
operations are more than just computer warfare. It can
include electronic warfare, psychological operations,
physical attack, denial and deception, computer network
attack and the use of more exotic technologies such as
directed energy weapons or electromagnetic pulse weapons.

"Adversaries recognize our civilian and military reliance
on advanced information technologies and systems and
understand that information superiority provides the United
States with unique capability advantages," Wilson said.
Adversaries also recognize that by using information
operations to attack the U.S. infrastructure they may
change U.S. support for operations.

"Software tools for network intrusion and disruption are
becoming globally available over the Internet, providing
almost any interested U.S. adversary a basic computer
network exploitation or attack capability," Wilson said.
"To date, however, the skills and effort needed for
adversaries to use tools and technology effectively, such
as intensive reconnaissance of U.S. target networks, for
example, remain important limits on foreign cyber attack
capabilities."

Many states see weapons of mass destruction as their only
hope of countering U.S. conventional military prominence.
Former Indian army Chief of Staff Gen. K. Sundarji
allegedly said the principal lesson of the Gulf War is that
if a state intends to fight the United States, it should
avoid doing so until and unless it possesses nuclear
weapons.

"The pressure to acquire weapons of mass destruction and
missiles is high, and, unfortunately, globalization creates
an environment more amenable to proliferation activities,"
Wilson said. Twenty-five countries now possess or are
acquiring and developing weapons of mass destruction or
missiles.

He said Russia, China and North Korea remain the suppliers
of WMD technology. Russia, he said, has shipped ballistic
missile and nuclear technology to Iran. China has provided
missile and other assistance to Iran and Pakistan. North
Korea remains a key source for ballistic missiles and
related components and materials.

Wilson said Iran and Iraq could acquire nuclear weapons
during the next decade. He said India and Pakistan would
undoubtedly increase their nuclear capabilities and
inventories.

The United States relies on satellites for much of its
information dominance. Enemies know this and look for ways
to negate this advantage. Many are attempting to reduce
this advantage by developing capabilities to threaten US
space assets, in particular through denial and deception,
signal jamming, and ground segment attack.

A number of countries are interested in or experimenting
with a variety of technologies that could be used to
develop counter-space capabilities. These efforts could
result in improved systems for space object tracking,
electronic warfare or jamming and directed-energy weapons.
Wilson said that by 2015, future adversaries would be able
to employ a wide variety of means to disrupt, degrade or
defeat portions of the U.S. space support system.

===================================================================

CIA patching ECHELON shortcomings

http://www.theregister.co.uk/content/8/17361.html

Thomas C. Greene in Washington
06/03/2001

A core objection to paranoid rants regarding the US National Security Agency
(NSA) electronic eavesdropping apparatus called ECHELON is the simple
observation that spooks trying to use it are literally buried in an
avalanche of white noise from which it's quite difficult to extract anything
pertinent.

But now the US Central Intelligence Agency (CIA), no doubt with some
assistance and guidance from NSA, is making strides towards cracking that
little inconvenience.

The CIA's Office of Advanced Information Technology is developing a number
of data-mining enhancements to make life easy for those who would eavesdrop
on electronic communications, Reuters reports.

First up is a computer program called Oasis, which automatically converts
audio signals into conveniently readable, and searchable, text.

And it distinguishes voices, cleverly enough, so that the transcript of an
intercepted 'broadcast' (a conference call via mobile phones?) will show
each speaker automatically identified as Male 1, Female 1; Male 2, Female 2;
and so on.

If the transcript seems implausible at any point, or disappointingly
mundane, the operator can easily listen to relevant parts of the broadcast
to check the machine's accuracy, and determine that "recognize speech"
actually was "wreck a nice beach," and send in the appropriate goon squads
to prevent it.

Oasis also references search terms and keywords automatically. Thus text
containing the phrase "truck bomb" would pop up in a query for "terror*".

The CIA is planning to develop Oasis for spy-useful foreign languages such
as Arabic and Chinese, the wire service says.

Next comes a software tool called FLUENT, which enables an operator to
search stored documents in a language s/he doesn't understand by using his
or her own language for queries.

So, imagine an uneducated, highly-trained Anglophone with a PhD in some
anti-intellectual pseudo-'discipline' like medicine, education, women's
studies, engineering, creative writing, economics or computer science,
naturally poorly acquainted with languages, but charged with grave national
security responsibilities.

Say this person needs to know what the Chinese have been publishing about
nuclear warheads.

Salvation: FLUENT allows them to search on "nuclear warhead" in English, and
still dredge up Chinese (or whatever) documents for people with actual
language skills to translate and evaluate for them. Is that cool or what?

Presently, FLUENT can translate Chinese, Korean, Portuguese, Russian,
Serbo-Croatian and Ukrainian, Reuters says.

The omissions are almost as telling as the languages included. What, no
Japanese, no Arabic, no Spanish, no Hebrew, no French? Laotian and Navajo we
can understand, but what have we here? Laziness, discrimination, or
misplaced trust?

You make the call.

===================================================================

Ghana's trapped women slaves

http://www.jamaica-gleaner.com/gleaner/20010305/cleisure/cleisure3.html

by Cecil Gutzmore
The Daily Gleaner
Commentary
Monday, 5 March,2001

THE WOMAN let her bright green cloth slip down to reveal her breasts. But
she did not care. Hutealor Wede does not know how old she is, nor can she
remember how long she has been in the village of Fato Avendrpedo in eastern
Ghana. All she knows is that she is a slave and likely to die there. "My
grandfather had illegal sex with a women" (sic), she says, expressionless.
"The gods punished our family. I was the virgin daughter, so I was brought
to this village and given to the priest to stop the disasters happening..."

Hutealor Wede is a victim of Trokosi, which literally means slavery to the
gods. It is part of a traditional religion. Three years ago a law was passed
specifically to ban it, with a minimum punishment of three years in jail.
But no woman has been freed because of it and no-one has been arrested. The
village's septuagenarian priest was called Togbe Adzimashi Adukpu. He was
the slave master... "Yes, the girls are my slaves. They are the property of
my shrine. They are brought here as virgins to be married to the gods, so if
a man from the village wants one for himself, I have the power to give her
to him." Trokosi is an eternal penance. When one woman dies, her family has
to bring a new girl.

There are about 3,000 women known to still be in slavery in Ghana. And
there is a strong lobby within the Ghanaian establishment, which says the
campaign against Trokosi is a campaign against African culture. That story
was posted to me via Gleaner. The sender has a colour printer: and so it
included a lovely colour photo of two strong-faced Africans. It is
down-loaded from the BBC HOMEPAGE
<http://news.bbc.co.uk/hi/english/world/from_our_own_correspondent/newsid_1158000/1158115.stm>.

Read it in full for yourself.

Scrawled over page 1 was: TRADITIONAL AFRICAN VALUES. BET YOU WON'T
PUBLISH THIS IN BLACK HISTORY MONTH (BHM)! Damn, missed it. Why is it so
widely believed that for anyone to value the African heritage is to be
unable to deal with facts that highlight its negative facets? Some half a
dozen challenges based on this assumption arrived during BHM. The one
above ­ not yet further explored by me ­ outlines one of the oppressions all
progressive Africans oppose. That it involves a religio-cultural dimension
is not supporting evidence.

Sylvia Wynter is the only major progressive Caribbean thinker who would
seriously argue otherwise. Some other such challenges focused on genocides
for which black people are responsible. Another came from a Mr Cole (Jamaica
and the Afro-European legacy, Gleaner Tuesday, 13th February 2001) who
re-raised what Walter Rodney called the very painful fact that there were
Africans who partnered the Europeans in enslaving other Africans. Mr Cole
and others think that if it is true that Africans acted in this manner no
African-Jamaican today is entitled to speak the truth about modern Europe
and Atlantic slavery, nor about the myriad other negative aspects of
Europe's past, present or future.

The simple question is: Did such negative African behaviour occur and,
since it did, what explains it? It has long been possible to be
Pan-Africanist or Afri-centrist without idealising either all Africans or
the African historical experience in its entirety. Rodney's historical work
offers a viable understanding of African collaboration with the slave trade.
What has to be done is to take a cool, hard look ­ through eyes guided by
the combined politics of race, class and gender ­ at the history of the
societies of Western Africa. But only after acknowledging the larger
historical truth that: The Atlantic slave trade was organised and financed
by Europeans, who had reached the capitalist stage of development.

Africans had absolutely no control over the European side or the American
side of the slave trade. Only European capitalists had such world-wide power
and they used Africans for their own purposes. In the process Africa was
catastrophically underdeveloped, while certain African rulers who benefited
were themselves swept away by the forces of colonialism. The Good Nigger is,
after all, forever expendable. The evidence is that the first European
extraction of Africans into Atlantic slavery involved direct raiding and
some trading. Their first local partners in trading Black Africans/Ethiops
were what the English at the time termed Tawny Moors, i.e., fair-skinned
Arabic types, confirming that Muslim slavery in Africa intersected with its
newer European/Christian counterpart on the North-west African littoral.

Later on and further south, that initial pattern of slave-raiding and
trading was repeated, as Sir John Hawkins account of his second voyage to
the Guinea Coast establishes. But who were the African collaborators with
the European in these newer ­ and still largely Islam-free ­ parts of
Africa? Numerous instances of un-free labour did exist in Africa and many
complex factors pre-disposed some Africans to be comfortable with the
saleability, and actual selling, of their fellows. No wonder, as Rodney
says, that: for nearly the whole of the period of the Atlantic slave-trade
there were many Africans who were prepared to sell their fellowmen in
exchange for European manufactures such as cloth, pots and pans, beads and
fire-arms.

Rodney attempted to pick out those Africans who were in partnership with
the European slave-buyers. But he deals first with the effect of tribal and
clan division in Africa, with the wars these produced and how the Europeans
exploited them to obtain captives. Europeans often managed to gain prisoners
of war from both sides because [both] wanted guns and there were several
European nations competing with each other.

The Fon state of Dahomey and, to a lesser extent, the Asante Kingdom, as
well as the Mande and Fulani, are examples of states and peoples that grew
fat on slavery. But when were any of these held up as ideal African
societies? The European slavers themselves acted on the basis of a kind of
class analysis. They treated as their natural allies the great men of West
Africa: they meant the kings, chiefs, sub-chiefs, headmen, nobles, priests,
clan leaders and individuals of that sort. Their traditional role, to rule
in the interest of the people as a whole, was betrayed. African kings and
queens who resisted collaboration were destroyed by the Portuguese and other
Europeans.

Rodney says this African ruling class perverted African law, custom,
religion and even warfare to produce persons for sale, not exempting those
within their own tribes. The neo-colonial rulers of today are the heirs of
the African collaborators with slavery.
-----
Cecil Gutzmore is a research student and lecturer at the University of the
West Indies. E-mail: [EMAIL PROTECTED]

===================================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
======================================================
"The world is my country, all mankind my brethren,
and to do good is my religion."
        -Thomas Paine
======================================================
" . . . it does not require a majority to prevail, but rather an irate,
tireless
minority keen to set brush fires in people's minds . . . "
        -Samuel Adams
======================================================
"You may never know what results come from your action.
But if you do nothing, there will be no results."
        -Gandhi
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________
**How to assist RadTimes:
An account is available at <www.paypal.com> which enables direct donations.
If you are a current PayPal user, use this email address:
<[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this
link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up
and contribute. The only information passed on to me via this process is
your email address and the amount you transfer.
Thanks!

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to