-Caveat Lector- [radtimes] # 182 An informally produced compendium of vital irregularities. "We're living in rad times!" ----------------------------------------------------------------------------------------------------------- Send $$ to RadTimes!! --> (See ** at end.) ----------------------------------------------------------------------------------------------------------- Contents: --Temptation for Surveillance on Rise --The Left Rediscovers The First Amendment --Marcos gets rapturous welcome in Mexico City --Hell's Angels 'in sinister political plot' --Easing tattling's taboo --Computers may reveal secrets behind crimes =================================================================== Temptation for Surveillance on Rise http://www.latimes.com/business/cutting/techwr/20010310/tCB00V0795.html By ANICK JESDANUN, AP Internet Writer CAMBRIDGE, Mass.--What if your cable TV converter box can report to marketers the movies, sports and steamy adult shows you like to watch? What if a portable device that measures how far you've run or walked can phone a Web site about your fitness level, and perhaps suggest exercise products for purchase? What if any time you visit an airport or attend a sporting event, you must walk past video cameras that can analyze your face and instantly identify you to authorities? Some of these scenarios are already possible and even happening. Privacy advocates and civil libertarians say the technology is getting so good and cheap that we could be entering an era of surveillance everywhere, privacy nowhere. Privacy erosion on the Internet over the past year offers just a preview. As gadgets beyond the desktop become a part of our everyday lives, the temptation increases for governments and businesses to use them for surveillance. "'1984' was simply a bit premature in estimating when technology would be online," said Barry Steinhardt, associate director of the American Civil Liberties Union. "This may not be as oppressive as what George Orwell had in mind, but nevertheless, it will be very much still a surveillance society." Orwell wrote, back in 1940s, of a futuristic totalitarian society in 1984 where citizens are under the round-the-clock surveillance. Big Brother technology was a main topic this past week at the 11th annual Computers, Freedom and Privacy conference, a gathering of academics, technologists and policymakers. As it happened, this year's conference was held just a few blocks from the Massachusetts Institute of Technology, where the basics of facial character recognition, a branch of biometrics, were developed. Unlike the video security cameras at banks and convenience stores that merely record, biometrics seek to identify. The technology has been used for years in casinos to catch cheaters. It got widespread attention during January's Super Bowl in Tampa, Fla., when law officers matched photos against a computerized police lineup of known criminals. Governments aren't the only spies, of course. Other gadgets spy on behalf of marketers, warned Richard M. Smith, chief technology officer for the Privacy Foundation. "Technology is making it a lot cheaper to build these devices," Smith said. "Five, 10 years from now, where is it going to be used?" He held up for an audience a round, portable gadget that counts your paces as you exercise. When you finish, you attach it to a larger cradle, which plugs into a phone line. You then visit a Web site for your fitness assessment and ads. The gadget, he said, could have been designed to plug directly into a personal computer -and not to report data to a Web site. But the trend among vendors "is to try to get it on the Internet and get a poke at it." And what about the emerging Bluetooth wireless standard, which promises to let devices such as pens and headphones automatically connect to networks? "Are we going to walk into a room and have our pens start talking to somebody?" Smith asked. Smith also showed Web sites that promote services such as a wireless Webcam to monitor children, and a camera that trucking companies can install to record the minutes leading up to accidents, along with data such as brake and turn signal use. He predicted lawyers would try to get such video to show juries. Even the fitness device can be used for surveillance, said Smith. His daughter suggested their dog be outfitted with one so Smith can no longer fib about walking the dog. Meanwhile, companies are gaining the ability to track customers through wireless devices. Imagine being able to e-mail a coupon for coffee as someone walks by a Starbucks. That will soon be possible using location identification that wireless companies are deploying for emergency 911 calls. And digital video recording technologies like TiVo and ReplayTV may one day let marketers customize ads based on television viewers' habits and preferences, warned David Burke, author of "Spy TV." Digital video recorders now automatically call a central office to get updated program guides. Privacy advocates fear they'll one day send back data on households' viewing habits as well. Privacy advocates are also worried about digital music devices, which could be programmed to create profiles of listening tastes. Whether marketers are actually using all of the capabilities today is another matter, Smith acknowledged. He fears the potential for tomorrow. Supporters of such technologies say the privacy fears are exaggerated, unfounded or outweighed by public safety imperatives. The facial-recognition cameras, for instance, are used to help to identify potential terrorists, law enforcement officials argue. Defending data collection by businesses, Jerry Cerasale of the Direct Marketing Association, a trade group for telemarketers and database companies, said the devices that collect marketing information do just that -and no more. The data collection occurs solely to help marketers customize information and ads for the consumers' benefit, and companies know they risk alienating customers if they trick them, Cerasale said. "There is a misconception that if you are purchasing something remotely, it might be used against you in some places like for approving mortgages and insurance," he said in a phone interview. "That's not the case." But privacy advocates point out past attempts to link and share data. The most widely cited case involves the advertising company DoubleClick, which drew ire for plans to cross-reference its records of consumers' online habits with a database that included names. Under pressure, the company suspended the plans. The FBI, meanwhile, has deployed a surveillance tool called Carnivore to check e-mail going through a network service provider for messages meant for a specific suspect. Critics say their tests show Carnivore can do much more. Some believe the U.S. Congress must pass legislation to protect Americans' privacy. At minimum, they say, the government should create a national data protection office to advise agencies and businesses on new technologies. Simson Garfinkel, author of "Database Nation: The Death of Privacy in the 21st Century," said U.S. companies considering new products and new uses for existing databases should have national guidelines to guide them. "It's hard for a lot of companies to do the right thing," he said. "We can make it easier for them." ---- On the Net: Conference: http://cfp2001.org Direct Marketing Association: http://www.the-dma.org American Civil Liberties Union: http://www.aclu.org Privacy Foundation: http://privacyfoundation.org =================================================================== The Left Rediscovers The First Amendment By PAUL A. GIGOT WALL STREET JOURNAL March 9, 2001 Potomac Watch Let us now praise the AFL-CIO. I never expected to write those words. But John Sweeney, the most liberal labor leader since Eugene Debs, may soon deserve kudos for helping to defeat campaign-finance "reform." For years the myth has persisted that only a GOP Senate filibuster stood in the way of truth, justice and Sen. John McCain's obsession with purging money from politics. The locus of this GOP evil was said to be Sen. Mitch McConnell, or as his admirers at Common Cause called him, "Darth Vader." But now there are 50 Senate Democrats and Mr. McConnell has promised not to filibuster. This means reform could even pass during the rare, free-for-all Senate debate planned to start on March 19. So an amazing thing has happened. Support for the First Amendment is suddenly busting out all over on the left. The ACLU showed up with the NRA at a McConnell press conference last week, the strangest pairing since Lyle Lovett and Julia Roberts. The Alliance for Justice, notorious for bashing conservative judges, recently sent a letter to liberals torching the details of the McCain proposal. Then there's Big Labor, which has released two pages of arguments that sound remarkably similar to Senator Vader- McConnell's. Reformers have tried to dismiss all of this as self-serving cynicism. The New York Times has called the AFL-CIO "misguided," which must be a first. McCain aides are griping on background about turncoats. They realize that this liberal opposition now puts Democratic support for their Holy Grail in doubt. Look for more nasty columns next week. No doubt these folks have a point about liberal self-interest. Mr. Sweeney somehow never found his critical voice when "reform" was defined as merely a ban on so-called soft-money. That's because corporations can afford to hand out more of these large, unregulated donations to political parties than can unions. Mr. Sweeney also didn't mind swinging the reform club against Republicans during the last election. But just because liberals are self-interested doesn't mean they're always wrong. So I called up Laurence Gold, the AFL-CIO's expert on campaign-finance, to hear a case that deserves wider airing. His first stop is the First Amendment, which is supposed to protect political speech. Mr. Gold says that the McCain-Feingold proposal would bar the AFL-CIO and other lobbies from airing a TV ad, "within 60 days of an election, if it mentions a human being who happens to be a candidate. It's patently unconstitutional." Let's say Congress decides to vote on raising the minimum wage after Labor Day of 2002. Labor might want to influence the debate by advertising in the districts of undecided members. That sure sounds like democracy. But McCain-Feingold restricts the money that can be spent on such ads. Imagine the gall of trying to influence politicians close to . . . Election Day. In private, reformers will admit that this may be unconstitutional. But they're willing to jump off this cliff anyway because they know a soft- money ban by itself won't accomplish much. That's because they know that purging money from politics is like trying to stop water rushing downhill. Dam one stream and another quickly forms. Ban soft money to political parties, for example, and donors will look for other ways to influence politicians. They might donate to the NRA, Planned Parenthood or the Sierra Club. This is how small contributors can pool their resources to buy a bigger megaphone. Advertising by such ideological, non-party groups has increased in recent years, but pass the McCain bill and it will explode. So the reformers have to scramble to close this river that their own reform would unleash. The other labor beef is over McCain-Feingold's new rules on "coordinating" with politicians. If labor had even token contact with a candidate in the past, any future aid -- even nonpartisan voter registration -- would be barred. "This can criminalize all kinds of politics," says Mr. Gold. All of this means that the Senate debate won't be the free pass that McCainiacs once thought. Supporters might even have to defend the merits of their bill, instead of throwing general smears about the "corrupting" influence of money. GOP opponents, led by Mr. McConnell, will have the advantage of consistency. They can use the same arguments they always have, backed up by new liberal allies. (The Kentucky senator has shown his bona fides to labor by supporting two Teamsters accused by a Democratic attorney general of breaking campaign rules of dubious constitutionality in his state.) Democrats, on the other hand, are going to be entertaining to watch. Most are on record voting for reform. But that was before they caught up to Republicans in raising soft money, which they did last year. Democrats wouldn't have won as many Senate seats without it. So they're insisting that any reform must go beyond soft-money to include McCain-Feingold's limits on other advertising too. But that puts them at odds with Big Labor and the rest of their own liberal base. No wonder so many Democrats are squirming behind the scenes. "We can't sit idly by and let some of these things sail through," says the AFL-CIO's Mr. Gold. No you can't. Let the fun begin. =================================================================== Marcos gets rapturous welcome in Mexico City By Elizabeth Fullerton MEXICO CITY, March 11 (Reuters) - Zapatista rebel leader Subcommander Marcos made a triumphal entry to the capital's packed main square on Sunday in the crowning moment of a 15-day journey through Mexico and appealed for a new deal for the nation's downtrodden Indians. "Don't let there be another dawn (in Mexico) without the flag having a place for us, those who are the color of the earth," Marcos said, referring to 10 million darker-skinned indigenous Mexicans whose cause he has championed. Most of the nation's 100 million people are of mixed Spanish and Indian blood. Under a blazing sun, Marcos earlier rode into the square teeming with well-wishers to cries of "Long live the Zapatistas." He arrived on a truck-drawn trailer decked out with a banner reading "March for Indian Dignity." A huge Mexican flag flew high in the center of the square as helicopters hovered overhead. Organizers said up to 200,000 were present but police said the turnout was much lower. "Mexico, we are not coming to tell you what to do, we are not coming to lead you anywhere, we are coming to ask you humbly, respectfully, to help us," the masked guerrilla leader told thousands of rapturous supporters. He spoke from a large platform on one side of the giant square. Large banners hung from buildings overlooking the square, one bearing the slogan: "We Are All Indians of the World." Others were spray-painted with images of masked Zapatistas and jungle landscapes. MARCOS ATTACKS MONEYED CLASSES "It is time for this country to stop being an object of shame dressed in the color of money," said Marcos, a virulent critic of unrestrained global capitalism who has accused the country's business elite of being selfish and short-sighted in a nation where millions live in acute poverty. Marcos, who led an Indian uprising in the state of Chiapas in 1994, left his jungle stronghold 15 days ago to lead a caravan of rebel commanders and supporters through 12 states to champion Indian rights. The masked rebel leader reached out to shake hands of sympathizers as he entered the square, known as the Zocalo, which is flanked by the National Palace, the seat of government since Spanish colonial times. Angelica Aragon, a television soap opera star, following the Zapatista caravan, said: "I am happy, we are changing our country, we are putting prejudice behind us." One bystander said she was proud to witness Marcos' arrival. "I feel very fortunate to be able to witness this occasion. For those of us with children we want to leave them a better, more democratic country," said Isaura Villa, 26, a psychologist accompanied by nine members of her family. The rebels are due to meet a congressional peace commission on Monday and have pledged not to leave the city until a bill giving more autonomy to Indian communities is passed. The bill is backed by Mexican President Vicente Fox in a bid to meet rebel conditions for reviving peace talks, which have been stalled since 1996. THOUSANDS PACK MEXICO CITY'S MAIN SQUARE The Zocalo, which lies close to Aztec ruins, was transformed into a massive bazaar with scores of stalls selling Zapatista memorabilia and Indian handicrafts. Many people wore T-shirts stamped with the words "Ya basta" (Enough). "We believe in the ideals of the Zapatistas of freedom, equality and justice," said Alejandra Ramirez Morales, a 23-year-old lawyer who had an image of guerrilla legend Che Guevara painted on her cheek. A man wearing a rubber mask of Fox walked on stilts around a giant effigy of an Indian Zapatista rebel. Fox, who ended 71 years of uninterrupted rule by the Institutional Revolutionary Party (PRI) when he took power in December, was upbeat about the prospects for peace in a radio broadcast on Saturday, his 100th day in office. "This is the start of the dialogue that all Mexicans have sought," said Fox. The president, who openly supports the peaceful march, has invited Marcos for talks at his official residence and said he is open to freeing all Zapatista prisoners -- a move that would meet one of the rebels' conditions for peace. Taking steps toward peace in Chiapas was one of Fox's first initiatives as president. MARCOS ACCUSES GOVERNMENT OF NOT HEEDING HIM But Marcos, in a fresh sign that he is suspicious of Fox, accused the government on Saturday of not heeding his calls for lasting peace in Chiapas. "We are trying to convince the ... federal government, that we are willing to resolve this and to do it quickly but we need signals. We have given one but they don't see it," he told the Televisa television network. Marcos said by naming fellow Zapatista commander, Fernando Yanez, to negotiate with Congress, the rebels had sent a conciliatory signal which the government had ignored. As the mood of expectation intensified, newspapers carried faded pictures of the historic march on the capital in December 1914 led by the Zapatistas' namesake -- legendary revolutionary leader Emiliano Zapata. Marcos led a 10-day armed uprising against the government on Jan. 1, 1994, the same day the North American Free Trade Agreement (NAFTA) between Mexico, Canada and the United States went into effect. The uprising in support of indigenous rights left 200 army and rebel soldiers dead. There has been no major fighting for years. =================================================================== Hell's Angels 'in sinister political plot' <http://www.ananova.com/news/story/sm_239755.html> Mon, 12 Mar 2001 A retired Canadian police chief says Hell's Angels are trying to sabotage the country's political system. Yves Duguay is so concerned he thinks the police are now losing the battle with organised crime. He says bikers even have a secure intranet and use electronic eavesdropping to stay ahead of the law. Mr Duguay is a former inspector with 25 years of experience in the Mounties. He said: "They have members who are responsible for gathering information on people working in the criminal justice system. "The Hell's Angels have also tried and will try once again to infiltrate the government and political parties." He told the National Post: "They have exploited the weaknesses in our system with surgical precision, using leading-edge technologies." =================================================================== Easing tattling's taboo <http://www.dallasnews.com/national/307517_tattle_10nat.A.html> School shooting leads to more tips 03/10/2001 Associated Press NEW YORK - Snitching. Squealing. Ratting. Whatever term is in vogue, the taboo against informing on schoolmates endures even when silence has deadly consequences. Educators see a few signs of change, however, as they try to persuade America's students to take the lead in making schools less vulnerable to violence. Since Monday's shooting in Santee, Calif., authorities nationwide have investigated a wave of threats at other schools, often acting on tips from students. Experts hope a lesson emerged from Santee, where friends of suspect Charles Andrew Williams heard his threats but sounded no alarm. "If that's an outcome of these tragic events a greater willingness to report it's something positive coming out of a very sad chapter," said Ted Feinberg, assistant executive director of the National Association of School Psychologists. One such case occurred this week in Davenport, Iowa, where a girl from Assumption High School reported that a ninth-grader had threatened to shoot everyone at school. The boy was arrested, and the girl was commended anonymously at an assembly. "The right thing was done," principal Thomas Sunderbruch said. "We've made every effort to let students know that some of these things such as Columbine wouldn't have happened if someone had reported ahead of time." The campaign to encourage student informers took shape after the April 1999 massacre at Columbine High School in Littleton, Colo. Several states and many school districts established hotlines so students could phone in security tips anonymously; schools deployed "confidential counselors" to whom students could turn with assurances of discretion. But the decision to inform can still be wrenching. Jim Holloman, principal of Royal Valley High School in Hoyt, Kan., encouraged a sophomore girl to take some time away from school after she alerted staff members last month to a possible Columbine-style plot. "I know she had to struggle to determine whether it should be reported," he said. The girl had been close friends with one of the three arrested boys. She has since returned to school, and her role is known among the school's 265 students. "She got a lot of attention, some of it pretty inconvenient," he said. "But in the long run we need to let kids know that this was the right thing and may have saved some people's lives." Bill Bond, a safety expert with the National Association of Secondary School Principals, learned the consequences of student silence firsthand. He was principal at Heath High School in West Paducah, Ky., when a 14-year-old killed three students in 1997. "At least a dozen kids knew that boy had a gun, but they didn't want to get him in trouble," he said. "Now there are three kids dead, and the boy is jailed for life. That's not being a good friend." Adults need students' help, he said. "The kids are going to know about guns going into school much better than any metal detector." But sometimes young people may stay quiet because they are worried about what will happen to suspected wrongdoers. The key step, said Mr. Feinberg of the school psychologists association, is to convince students that their tips will be well-handled. "To break down the conspiracy of silence, kids need to understand that there are trusted adults who will handle the information discreetly, calmly and appropriately," he said. =================================================================== Computers may reveal secrets behind crimes By Kathryn Balint March 12, 2001, Monday Copley News Service As the community groped for answers to the shooting rampage at Santana High School, investigators in an elite FBI laboratory here turned to the one piece of evidence that so often harbors a suspect's innermost secrets: his computer. Just after sundown on the day Charles ''Andy'' Williams shot 15 people, killing two, sheriff's deputies and FBI agents searched for evidence in the two-bedroom apartment Williams shared with his father. They emerged with seven rifles and the family's computer. Seizing computers as evidence has become routine in almost every serious crime, not just those involving computer hacking or Internet fraud. ''Whenever we do a crime scene search, we plan on a computer being there,'' said FBI Special Agent Jeffrey Thurman. And when a computer is seized, at least in San Diego or Imperial counties, it often ends up at the only regional computer forensics laboratory in the country, an FBI office in Serra Mesa. That's where Williams' computer went. Behind the mirrored windows of the lab's office building, 18 investigators from local, state and federal law enforcement agencies, ranging from the Drug Enforcement Administration to the Chula Vista Police Department, daily comb through reams of data stored in computers tied to crimes. These investigators have become as proficient at computer science as at police science. They ferret out e-mail, photos, address books, any kind of digital tidbit that might help solve a crime or explain why it happened. Since opening 14 months ago, the lab has examined computers in almost every type of case, from homicides to bank robberies to credit-card theft. A killer's diary, a bank robber's demand note or a thief's list of stolen credit cards is just as likely to be recorded on a computer as on paper. And finding that kind of evidence is for a prosecutor like unearthing a gold mine. ''Computers are playing a pivotal role in every type of case that we see,'' said Deputy District Attorney Michael Groch. ''There's a whole new category of crimes made possible by technology, but there are also traditional crimes murder, bomb threats, drugs all of which technology has a role in.'' MORE THAN GAMES In its first year, the computer forensics lab handled almost 400 cases. So far this year, it's taken on 140 cases, representing about a 40 percent increase in caseload. John Gunn, director of the lab, attributes the increase to the proliferation of computers and to a change in attitude by law enforcement. ''Officers are starting to recognize that good information is being found on computers,'' Gunn said. ''They don't see them anymore as just something that someone plays computer games on.'' He can't say exactly how many computers the lab has examined. That's because in half the cases, more than one machine is involved. One recent case involved 63 computers. The crimes the lab sees most? Child pornography, followed by fraud and computer crimes, such as hacking. Cases in which the lab has uncovered digital evidence include: The case against biotech executive Michael Craig Dickman, nicknamed ''The Gap-Toothed Bandit,'' who was sentenced last month to nine years in prison for robbing six banks in San Diego County. Copies of his demand notes were found in a laptop computer he had asked his sister to remove from his Cardiff apartment. The conviction of an Oceanside couple, Arthur Gerardo and Valerie Beidler, in October for the murder and torture of a roommate who helped them make fake identification cards and forge checks. A computer seized from their house contained pictures of checks and drivers licenses that had been scanned and then altered. Operation Bullpen, an investigation into a sports memorabilia scam in which millions of dollars worth of baseballs, posters, trading cards and other items bearing fake autographs were sold by a ring operating out of Escondido. Federal prosecutors announced last month that six people had pleaded guilty in the case. HIDDEN SECRETS When a computer is sent to the regional lab, its case is dismantled, its hard drive removed and its data copied. Digital information can be copied perfectly, unlike a photocopied note. The forensics exam is then done on the digital copy to preserve the original. It's all but impossible to pore over every file on a computer, especially in an era of hard drives that can hold 30 gigabytes or more of information. Twelve gigabytes of text, for example, would stack 24 stories high if printed out. What the forensic investigator looks for first on a seized computer is dictated by the nature of the crime. In a child pornography case, for instance, the investigator may search for photo files first. In a homicide, the investigator may look for written documents. Investigators often hit pay dirt by resurrecting deleted computer files. Many computer users don't realize that deleting a file doesn't wipe it clean from the hard drive. Computer forensics investigators are able to track down those files. Depending on the sophistication of the computer's owner, investigators occasionally have to crack encrypted files and passwords. Sometimes, files are concealed in secret places on the hard drive. Other times, they're hidden within other files. Photos, for instance, can be hidden within text files. An examination may take weeks, or just a day or two, as was the case with Williams' computer. MINDSETS BETRAYED Nicolle DePriest is the Chula Vista police officer and the computer forensics investigator who removed Williams' computer from his home Monday. She completed her examination by Thursday but would not reveal what she found. Among the things she might have seen are e-mail exchanges between Williams and his ex-girlfriend, Kathleen Seek, who lives in Maryland. Kathleen said last week that Williams wrote e-mails to her about how miserable he was after moving from Maryland to Southern California. She said he mentioned suicide in several messages. Former Florida law enforcement officer D. Douglas Rehman, a computer forensics expert who is not involved in the Williams case, said anyone examining the teen's computer would likely start by looking at Web pages he had visited and e-mails he had sent, information that is generally stored in a computer. ''You're looking for who he exchanged e-mail with, what kinds of Web sites he was looking at,'' Rehman said. ''You're looking for any computer activity that's going to help show his mindset.'' No matter what Williams' computer revealed about his motive, if anything, DePriest sees computers increasingly betraying their owners. ''People put everything on their computers these days,'' she said. =================================================================== "Anarchy doesn't mean out of control. It means out of 'their' control." -Jim Dodge ====================================================== "Communications without intelligence is noise; intelligence without communications is irrelevant." -Gen. Alfred. M. Gray, USMC ====================================================== "It is not a sign of good health to be well adjusted to a sick society." -J. Krishnamurti ====================================================== "The world is my country, all mankind my brethren, and to do good is my religion." -Thomas Paine ====================================================== " . . . it does not require a majority to prevail, but rather an irate, tireless minority keen to set brush fires in people's minds . . . " -Samuel Adams ====================================================== "You may never know what results come from your action. But if you do nothing, there will be no results." -Gandhi ______________________________________________________________ To subscribe/unsubscribe or for a sample copy or a list of back issues, send appropriate email to <[EMAIL PROTECTED]>. ______________________________________________________________ **How to assist RadTimes: An account is available at <www.paypal.com> which enables direct donations. If you are a current PayPal user, use this email address: <[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up and contribute. The only information passed on to me via this process is your email address and the amount you transfer. Thanks! <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om