-Caveat Lector-

[radtimes] # 182

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
Send $$ to RadTimes!!  -->  (See ** at end.)
-----------------------------------------------------------------------------------------------------------
Contents:

--Temptation for Surveillance on Rise
--The Left Rediscovers The First Amendment
--Marcos gets rapturous welcome in Mexico City
--Hell's Angels 'in sinister political plot'
--Easing tattling's taboo
--Computers may reveal secrets behind crimes

===================================================================

Temptation for Surveillance on Rise

http://www.latimes.com/business/cutting/techwr/20010310/tCB00V0795.html

By ANICK JESDANUN, AP Internet Writer

       CAMBRIDGE, Mass.--What if your cable TV converter box can report to
marketers the movies, sports and steamy adult shows you like to watch?
       What if a portable device that measures how far you've run or walked
can phone a Web site about your fitness level, and perhaps suggest exercise
products for purchase?
       What if any time you visit an airport or attend a sporting event, you
must walk past video cameras that can analyze your face and instantly
identify you to authorities?
       Some of these scenarios are already possible and even happening.
Privacy advocates and civil libertarians say the technology is getting so
good and cheap that we could be entering an era of surveillance everywhere,
privacy nowhere.
       Privacy erosion on the Internet over the past year offers just a
preview. As gadgets beyond the desktop become a part of our everyday lives,
the temptation increases for governments and businesses to use them for
surveillance.
       "'1984' was simply a bit premature in estimating when technology would
be online," said Barry Steinhardt, associate director of the American Civil
Liberties Union. "This may not be as oppressive as what George Orwell had in
mind, but nevertheless, it will be very much still a surveillance society."
       Orwell wrote, back in 1940s, of a futuristic totalitarian society in
1984 where citizens are under the round-the-clock surveillance.
       Big Brother technology was a main topic this past week at the 11th
annual Computers, Freedom and Privacy conference, a gathering of academics,
technologists and policymakers.
       As it happened, this year's conference was held just a few blocks from
the Massachusetts Institute of Technology, where the basics of facial
character recognition, a branch of biometrics, were developed.
       Unlike the video security cameras at banks and convenience stores that
merely record, biometrics seek to identify.
       The technology has been used for years in casinos to catch cheaters. It
got widespread attention during January's Super Bowl in Tampa, Fla., when
law officers matched photos against a computerized police lineup of known
criminals.
       Governments aren't the only spies, of course.
       Other gadgets spy on behalf of marketers, warned Richard M. Smith,
chief technology officer for the Privacy Foundation.
       "Technology is making it a lot cheaper to build these devices," Smith
said. "Five, 10 years from now, where is it going to be used?"
       He held up for an audience a round, portable gadget that counts your
paces as you exercise. When you finish, you attach it to a larger cradle,
which plugs into a phone line. You then visit a Web site for your fitness
assessment and ads.
       The gadget, he said, could have been designed to plug directly into a
personal computer -and not to report data to a Web site. But the trend among
vendors "is to try to get it on the Internet and get a poke at it."
       And what about the emerging Bluetooth wireless standard, which promises
to let devices such as pens and headphones automatically connect to
networks?
       "Are we going to walk into a room and have our pens start talking to
somebody?" Smith asked.
       Smith also showed Web sites that promote services such as a wireless
Webcam to monitor children, and a camera that trucking companies can install
to record the minutes leading up to accidents, along with data such as brake
and turn signal use. He predicted lawyers would try to get such video to
show juries.
       Even the fitness device can be used for surveillance, said Smith. His
daughter suggested their dog be outfitted with one so Smith can no longer
fib about walking the dog.
       Meanwhile, companies are gaining the ability to track customers through
wireless devices.
       Imagine being able to e-mail a coupon for coffee as someone walks by a
Starbucks. That will soon be possible using location identification that
wireless companies are deploying for emergency 911 calls.
       And digital video recording technologies like TiVo and ReplayTV may one
day let marketers customize ads based on television viewers' habits and
preferences, warned David Burke, author of "Spy TV."
       Digital video recorders now automatically call a central office to get
updated program guides. Privacy advocates fear they'll one day send back
data on households' viewing habits as well.
       Privacy advocates are also worried about digital music devices, which
could be programmed to create profiles of listening tastes.
       Whether marketers are actually using all of the capabilities today is
another matter, Smith acknowledged. He fears the potential for tomorrow.
       Supporters of such technologies say the privacy fears are exaggerated,
unfounded or outweighed by public safety imperatives. The facial-recognition
cameras, for instance, are used to help to identify potential terrorists,
law enforcement officials argue.
       Defending data collection by businesses, Jerry Cerasale of the Direct
Marketing Association, a trade group for telemarketers and database
companies, said the devices that collect marketing information do just
that -and no more.
       The data collection occurs solely to help marketers customize
information and ads for the consumers' benefit, and companies know they risk
alienating customers if they trick them, Cerasale said.
       "There is a misconception that if you are purchasing something
remotely, it might be used against you in some places like for approving
mortgages and insurance," he said in a phone interview. "That's not the
case."
       But privacy advocates point out past attempts to link and share data.
       The most widely cited case involves the advertising company
DoubleClick, which drew ire for plans to cross-reference its records of
consumers' online habits with a database that included names. Under
pressure, the company suspended the plans.
       The FBI, meanwhile, has deployed a surveillance tool called Carnivore
to check e-mail going through a network service provider for messages meant
for a specific suspect. Critics say their tests show Carnivore can do much
more.
       Some believe the U.S. Congress must pass legislation to protect
Americans' privacy.
       At minimum, they say, the government should create a national data
protection office to advise agencies and businesses on new technologies.
       Simson Garfinkel, author of "Database Nation: The Death of Privacy in
the 21st Century," said U.S. companies considering new products and new uses
for existing databases should have national guidelines to guide them.
       "It's hard for a lot of companies to do the right thing," he said. "We
can make it easier for them."
----
       On the Net:
       Conference: http://cfp2001.org
       Direct Marketing Association: http://www.the-dma.org
       American Civil Liberties Union: http://www.aclu.org
       Privacy Foundation: http://privacyfoundation.org

===================================================================

The Left Rediscovers The First Amendment

By PAUL A. GIGOT
WALL STREET JOURNAL
March 9, 2001
Potomac Watch

Let us now praise the AFL-CIO.

I never expected to write those words. But John Sweeney, the most
liberal labor leader since Eugene Debs, may soon deserve kudos for
helping to defeat campaign-finance "reform."

For years the myth has persisted that only a GOP Senate filibuster
stood in the way of truth, justice and Sen. John McCain's obsession
with purging money from politics. The locus of this GOP evil was said
to be Sen. Mitch McConnell, or as his admirers at Common Cause
called him, "Darth Vader."

But now there are 50 Senate Democrats and Mr. McConnell has
promised not to filibuster. This means reform could even pass during
the rare, free-for-all Senate debate planned to start on March 19. So an
amazing thing has happened. Support for the First Amendment is
suddenly busting out all over on the left.

The ACLU showed up with the NRA at a McConnell press conference
last week, the strangest pairing since Lyle Lovett and Julia Roberts.
The Alliance for Justice, notorious for bashing conservative judges,
recently sent a letter to liberals torching the details of the McCain
proposal. Then there's Big Labor, which has released two pages of
arguments that sound remarkably similar to Senator Vader-
McConnell's.

Reformers have tried to dismiss all of this as self-serving cynicism.
The New York Times has called the AFL-CIO "misguided," which
must be a first. McCain aides are griping on background about
turncoats. They realize that this liberal opposition now puts
Democratic support for their Holy Grail in doubt. Look for more nasty
columns next week.

No doubt these folks have a point about liberal self-interest. Mr.
Sweeney somehow never found his critical voice when "reform" was
defined as merely a ban on so-called soft-money. That's because
corporations can afford to hand out more of these large, unregulated
donations to political parties than can unions. Mr. Sweeney also didn't
mind swinging the reform club against Republicans during the last
election.

But just because liberals are self-interested doesn't mean they're always
wrong. So I called up Laurence Gold, the AFL-CIO's expert on
campaign-finance, to hear a case that deserves wider airing.
His first stop is the First Amendment, which is supposed to protect
political speech. Mr. Gold says that the McCain-Feingold proposal
would bar the AFL-CIO and other lobbies from airing a TV ad, "within
60 days of an election, if it mentions a human being who happens to be
a candidate. It's patently unconstitutional."

Let's say Congress decides to vote on raising the minimum wage after
Labor Day of 2002. Labor might want to influence the debate by
advertising in the districts of undecided members. That sure sounds
like democracy. But McCain-Feingold restricts the money that can be
spent on such ads. Imagine the gall of trying to influence politicians
close to . . . Election Day.

In private, reformers will admit that this may be unconstitutional. But
they're willing to jump off this cliff anyway because they know a soft-
money ban by itself won't accomplish much.

That's because they know that purging money from politics is like
trying to stop water rushing downhill. Dam one stream and another
quickly forms. Ban soft money to political parties, for example, and
donors will look for other ways to influence politicians.
They might donate to the NRA, Planned Parenthood or the Sierra
Club. This is how small contributors can pool their resources to buy a
bigger megaphone. Advertising by such ideological, non-party groups
has increased in recent years, but pass the McCain bill and it will
explode. So the reformers have to scramble to close this river that their
own reform would unleash.

The other labor beef is over McCain-Feingold's new rules on
"coordinating" with politicians. If labor had even token contact with a
candidate in the past, any future aid -- even nonpartisan voter
registration -- would be barred. "This can criminalize all kinds of
politics," says Mr. Gold.

All of this means that the Senate debate won't be the free pass that
McCainiacs once thought. Supporters might even have to defend the
merits of their bill, instead of throwing general smears about the
"corrupting" influence of money.

GOP opponents, led by Mr. McConnell, will have the advantage of
consistency. They can use the same arguments they always have,
backed up by new liberal allies. (The Kentucky senator has shown his
bona fides to labor by supporting two Teamsters accused by a
Democratic attorney general of breaking campaign rules of dubious
constitutionality in his state.)

Democrats, on the other hand, are going to be entertaining to watch.
Most are on record voting for reform. But that was before they caught
up to Republicans in raising soft money, which they did last year.
Democrats wouldn't have won as many Senate seats without it.
So they're insisting that any reform must go beyond soft-money to
include McCain-Feingold's limits on other advertising too. But that
puts them at odds with Big Labor and the rest of their own liberal base.
No wonder so many Democrats are squirming behind the scenes.
"We can't sit idly by and let some of these things sail through," says
the AFL-CIO's Mr. Gold.

No you can't. Let the fun begin.

===================================================================

Marcos gets rapturous welcome in Mexico City

By Elizabeth Fullerton

MEXICO CITY, March 11 (Reuters) - Zapatista rebel leader Subcommander Marcos
made a triumphal entry to the capital's packed main square on Sunday in the
crowning moment of a 15-day journey through Mexico and appealed for a new
deal for the nation's downtrodden Indians.

"Don't let there be another dawn (in Mexico) without the flag having a place
for us, those who are the color of the earth," Marcos said, referring to 10
million darker-skinned indigenous Mexicans whose cause he has championed.

Most of the nation's 100 million people are of mixed Spanish and Indian
blood.

Under a blazing sun, Marcos earlier rode into the square teeming with
well-wishers to cries of "Long live the Zapatistas." He arrived on a
truck-drawn trailer decked out with a banner reading "March for Indian
Dignity."

A huge Mexican flag flew high in the center of the square as helicopters
hovered overhead. Organizers said up to 200,000 were present but police said
the turnout was much lower.

"Mexico, we are not coming to tell you what to do, we are not coming to lead
you anywhere, we are coming to ask you humbly, respectfully, to help us," the
masked guerrilla leader told thousands of rapturous supporters.

He spoke from a large platform on one side of the giant square. Large banners
hung from buildings overlooking the square, one bearing the slogan: "We Are
All Indians of the World." Others were spray-painted with images of masked
Zapatistas and jungle landscapes.

MARCOS ATTACKS MONEYED CLASSES

"It is time for this country to stop being an object of shame dressed in the
color of money," said Marcos, a virulent critic of unrestrained global
capitalism who has accused the country's business elite of being selfish and
short-sighted in a nation where millions live in acute poverty.

Marcos, who led an Indian uprising in the state of Chiapas in 1994, left his
jungle stronghold 15 days ago to lead a caravan of rebel commanders and
supporters through 12 states to champion Indian rights.

The masked rebel leader reached out to shake hands of sympathizers as he
entered the square, known as the Zocalo, which is flanked by the National
Palace, the seat of government since Spanish colonial times.

Angelica Aragon, a television soap opera star, following the Zapatista
caravan, said: "I am happy, we are changing our country, we are putting
prejudice behind us."

One bystander said she was proud to witness Marcos' arrival. "I feel very
fortunate to be able to witness this occasion. For those of us with children
we want to leave them a better, more democratic country," said Isaura Villa,
26, a psychologist accompanied by nine members of her family.

The rebels are due to meet a congressional peace commission on Monday and
have pledged not to leave the city until a bill giving more autonomy to
Indian communities is passed. The bill is backed by Mexican President Vicente
Fox in a bid to meet rebel conditions for reviving peace talks, which have
been stalled since 1996.

THOUSANDS PACK MEXICO CITY'S MAIN SQUARE

The Zocalo, which lies close to Aztec ruins, was transformed into a massive
bazaar with scores of stalls selling Zapatista memorabilia and Indian
handicrafts. Many people wore T-shirts stamped with the words "Ya basta"
(Enough).

"We believe in the ideals of the Zapatistas of freedom, equality and
justice," said Alejandra Ramirez Morales, a 23-year-old lawyer who had an
image of guerrilla legend Che Guevara painted on her cheek.

A man wearing a rubber mask of Fox walked on stilts around a giant effigy of
an Indian Zapatista rebel.

Fox, who ended 71 years of uninterrupted rule by the Institutional
Revolutionary Party (PRI) when he took power in December, was upbeat about
the prospects for peace in a radio broadcast on Saturday, his 100th day in
office.

"This is the start of the dialogue that all Mexicans have sought," said Fox.

The president, who openly supports the peaceful march, has invited Marcos for
talks at his official residence and said he is open to freeing all Zapatista
prisoners -- a move that would meet one of the rebels' conditions for peace.

Taking steps toward peace in Chiapas was one of Fox's first initiatives as
president.

MARCOS ACCUSES GOVERNMENT OF NOT HEEDING HIM

But Marcos, in a fresh sign that he is suspicious of Fox, accused the
government on Saturday of not heeding his calls for lasting peace in Chiapas.

"We are trying to convince the ... federal government, that we are willing to
resolve this and to do it quickly but we need signals. We have given one but
they don't see it," he told the Televisa television network.

Marcos said by naming fellow Zapatista commander, Fernando Yanez, to
negotiate with Congress, the rebels had sent a conciliatory signal which the
government had ignored.

As the mood of expectation intensified, newspapers carried faded pictures of
the historic march on the capital in December 1914 led by the Zapatistas'
namesake -- legendary revolutionary leader Emiliano Zapata.

Marcos led a 10-day armed uprising against the government on Jan. 1, 1994,
the same day the North American Free Trade Agreement (NAFTA) between Mexico,
Canada and the United States went into effect. The uprising in support of
indigenous rights left 200 army and rebel soldiers dead. There has been no
major fighting for years.

===================================================================

Hell's Angels 'in sinister political plot'

<http://www.ananova.com/news/story/sm_239755.html>

Mon, 12 Mar 2001

A retired Canadian police chief says Hell's Angels are trying to sabotage
the country's political system.

Yves Duguay is so concerned he thinks the police are now losing the battle
with organised crime.

He says bikers even have a secure intranet and use electronic eavesdropping
to stay ahead of the law.

Mr Duguay is a former inspector with 25 years of experience in the Mounties.

He said: "They have members who are responsible for gathering information
on people working in the criminal justice system.

"The Hell's Angels have also tried and will try once again to infiltrate
the government and political parties."

He told the National Post: "They have exploited the weaknesses in our
system with surgical precision, using leading-edge technologies."

===================================================================

Easing tattling's taboo

<http://www.dallasnews.com/national/307517_tattle_10nat.A.html>

School shooting leads to more tips
03/10/2001
Associated Press

NEW YORK - Snitching. Squealing. Ratting. Whatever term is in vogue, the
taboo against informing on schoolmates endures  even when silence has
deadly consequences.
Educators see a few signs of change, however, as they try to persuade
America's students to take the lead in making schools less vulnerable to
violence.
Since Monday's shooting in Santee, Calif., authorities nationwide have
investigated a wave of threats at other schools, often acting on tips from
students. Experts hope a lesson emerged from Santee, where friends of
suspect Charles Andrew Williams heard his threats but sounded no alarm.
"If that's an outcome of these tragic events  a greater willingness to
report  it's something positive coming out of a very sad chapter," said Ted
Feinberg, assistant executive director of the National Association of
School Psychologists.
One such case occurred this week in Davenport, Iowa, where a girl from
Assumption High School reported that a ninth-grader had threatened to shoot
everyone at school. The boy was arrested, and the girl was
commended  anonymously  at an assembly.
"The right thing was done," principal Thomas Sunderbruch said. "We've made
every effort to let students know that some of these things such as
Columbine wouldn't have happened if someone had reported ahead of time."
The campaign to encourage student informers took shape after the April 1999
massacre at Columbine High School in Littleton, Colo. Several states and
many school districts established hotlines so students could phone in
security tips anonymously; schools deployed "confidential counselors" to
whom students could turn with assurances of discretion.
But the decision to inform can still be wrenching.
Jim Holloman, principal of Royal Valley High School in Hoyt, Kan.,
encouraged a sophomore girl to take some time away from school after she
alerted staff members last month to a possible Columbine-style plot.
"I know she had to struggle to determine whether it should be reported," he
said. The girl had been close friends with one of the three arrested
boys.  She has since returned to school, and her role is known among the
school's 265 students.
"She got a lot of attention, some of it pretty inconvenient," he said. "But
in the long run we need to let kids know that this was the right thing and
may have saved some people's lives."
Bill Bond, a safety expert with the National Association of Secondary
School Principals, learned the consequences of student silence
firsthand.  He was principal at Heath High School in West Paducah, Ky.,
when a 14-year-old killed three students in 1997.
"At least a dozen kids knew that boy had a gun, but they didn't want to get
him in trouble," he said. "Now there are three kids dead, and the boy is
jailed for life. That's not being a good friend."
Adults need students' help, he said. "The kids are going to know about guns
going into school much better than any metal detector."
But sometimes young people may stay quiet because they are worried about
what will happen to suspected wrongdoers.
The key step, said Mr. Feinberg of the school psychologists association, is
to convince students that their tips will be well-handled.
"To break down the conspiracy of silence, kids need to understand that
there are trusted adults who will handle the information discreetly, calmly
and appropriately," he said.

===================================================================

Computers may reveal secrets behind crimes

By Kathryn Balint
March 12, 2001, Monday
Copley News Service

As the community groped for answers to the shooting rampage at Santana High
School, investigators in an elite FBI laboratory here turned to the one
piece of evidence that so often harbors a suspect's innermost secrets: his
computer.

Just after sundown on the day Charles ''Andy'' Williams shot 15 people,
killing two, sheriff's deputies and FBI agents searched for evidence in the
two-bedroom apartment Williams shared with his father. They emerged with
seven rifles and the family's computer.

Seizing computers as evidence has become routine in almost every serious
crime, not just those involving computer hacking or Internet fraud.

''Whenever we do a crime scene search, we plan on a computer being there,''
said FBI Special Agent Jeffrey Thurman.

And when a computer is seized, at least in San Diego or Imperial counties,
it often ends up at the only regional computer forensics laboratory in the
country, an FBI office in Serra Mesa.

That's where Williams' computer went.

Behind the mirrored windows of the lab's office building, 18 investigators
from local, state and federal law enforcement agencies, ranging from the
Drug Enforcement Administration to the Chula Vista Police Department, daily
comb through reams of data stored in computers tied to crimes.

These investigators have become as proficient at computer science as at
police science.

They ferret out e-mail, photos, address books, any kind of digital tidbit
that might help solve a crime or explain why it happened.

Since opening 14 months ago, the lab has examined computers in almost every
type of case, from homicides to bank robberies to credit-card theft.

A killer's diary, a bank robber's demand note or a thief's list of stolen
credit cards is just as likely to be recorded on a computer as on paper.

And finding that kind of evidence is for a prosecutor like unearthing a
gold mine.

''Computers are playing a pivotal role in every type of case that we see,''
said Deputy District Attorney Michael Groch. ''There's a whole new category
of crimes made possible by technology, but there are also traditional
crimes murder, bomb threats, drugs all of which technology has a role in.''

MORE THAN GAMES In its first year, the computer forensics lab handled
almost 400 cases. So far this year, it's taken on 140 cases, representing
about a 40 percent increase in caseload.

John Gunn, director of the lab, attributes the increase to the
proliferation of computers and to a change in attitude by law enforcement.

''Officers are starting to recognize that good information is being found
on computers,'' Gunn said. ''They don't see them anymore as just something
that someone plays computer games on.''

He can't say exactly how many computers the lab has examined. That's
because in half the cases, more than one machine is involved. One recent
case involved 63 computers.

The crimes the lab sees most? Child pornography, followed by fraud and
computer crimes, such as hacking.

Cases in which the lab has uncovered digital evidence include:

The case against biotech executive Michael Craig Dickman, nicknamed ''The
Gap-Toothed Bandit,'' who was sentenced last month to nine years in prison
for robbing six banks in San Diego County. Copies of his demand notes were
found in a laptop computer he had asked his sister to remove from his
Cardiff apartment.

The conviction of an Oceanside couple, Arthur Gerardo and Valerie Beidler,
in October for the murder and torture of a roommate who helped them make
fake identification cards and forge checks. A computer seized from their
house contained pictures of checks and drivers licenses that had been
scanned and then altered.

Operation Bullpen, an investigation into a sports memorabilia scam in which
millions of dollars worth of baseballs, posters, trading cards and other
items bearing fake autographs were sold by a ring operating out of
Escondido. Federal prosecutors announced last month that six people had
pleaded guilty in the case.

HIDDEN SECRETS When a computer is sent to the regional lab, its case is
dismantled, its hard drive removed and its data copied.

Digital information can be copied perfectly, unlike a photocopied note. The
forensics exam is then done on the digital copy to preserve the original.

It's all but impossible to pore over every file on a computer, especially
in an era of hard drives that can hold 30 gigabytes or more of information.
Twelve gigabytes of text, for example, would stack 24 stories high if
printed out.

What the forensic investigator looks for first on a seized computer is
dictated by the nature of the crime.

In a child pornography case, for instance, the investigator may search for
photo files first. In a homicide, the investigator may look for written
documents.

Investigators often hit pay dirt by resurrecting deleted computer files.

Many computer users don't realize that deleting a file doesn't wipe it
clean from the hard drive. Computer forensics investigators are able to
track down those files.

Depending on the sophistication of the computer's owner, investigators
occasionally have to crack encrypted files and passwords.

Sometimes, files are concealed in secret places on the hard drive.

Other times, they're hidden within other files. Photos, for instance, can
be hidden within text files.

An examination may take weeks, or just a day or two, as was the case with
Williams' computer.

MINDSETS BETRAYED

Nicolle DePriest is the Chula Vista police officer and the computer
forensics investigator who removed Williams' computer from his home Monday.
She completed her examination by Thursday but would not reveal what she found.

Among the things she might have seen are e-mail exchanges between Williams
and his ex-girlfriend, Kathleen Seek, who lives in Maryland.

Kathleen said last week that Williams wrote e-mails to her about how
miserable he was after moving from Maryland to Southern California. She
said he mentioned suicide in several messages.

Former Florida law enforcement officer D. Douglas Rehman, a computer
forensics expert who is not involved in the Williams case, said anyone
examining the teen's computer would likely start by looking at Web pages he
had visited and e-mails he had sent, information that is generally stored
in a computer.

''You're looking for who he exchanged e-mail with, what kinds of Web sites
he was looking at,'' Rehman said. ''You're looking for any computer
activity that's going to help show his mindset.''

No matter what Williams' computer revealed about his motive, if anything,
DePriest sees computers increasingly betraying their owners.

''People put everything on their computers these days,'' she said.

===================================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
======================================================
"The world is my country, all mankind my brethren,
and to do good is my religion."
        -Thomas Paine
======================================================
" . . . it does not require a majority to prevail, but rather an irate,
tireless minority keen to set brush fires in people's minds . . . "
        -Samuel Adams
======================================================
"You may never know what results come from your action.
But if you do nothing, there will be no results."
        -Gandhi
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________
**How to assist RadTimes:
An account is available at <www.paypal.com> which enables direct donations.
If you are a current PayPal user, use this email address:
<[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this
link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up
and contribute. The only information passed on to me via this process is
your email address and the amount you transfer.
Thanks!

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to