-Caveat Lector-

from:
http://www.aci.net/kalliste/
<A HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin Grabbe</A>
-----
Today's Lesson From "The Purloined Letter"

by Edgar Allan Poe


"There is a game of puzzles," he resumed, "which is played upon a map.
One party playing requires another to find a given word--the name of a
town, river, state, or empire--any word, in short, upon the motley and
perplexed surface of the chart. A novice in the game generally seeks to
embarrass his opponents by giving them the most minutely lettered names;
but the adept selects such words as stretch, in large characters, from
one end of the chart to the other. These, like the over-largely lettered
signs and placards of the street, escape observation by dint of being
excessively obvious; and here the physical oversight is precisely
analogous with the moral inapprehension by which the intellect suffers
to pass unnoticed those considerations which are too obstrusively and
too palpably self-evident. But this is a point, it appears, somewhat
above or beneath the understanding of the Prefect. He never once thought
it probable, or possible, that the minister had deposited the letter
immediately beneath the nose of the whole world, by way of preventing
any portion of that world from perceiving it."
=====
Nukes R Us

Tracking the Suspicions of China's Nuclear Spying

by Jeff Gerth and Tim Weiner

WASHINGTON -- The congressional investigation into China's suspected
theft of American technology began as a gleam in Newt Gingrich's eye.
Today, a year later, it has become the decade's deepest look into a
realm of cloaks and daggers that lives on after the cold war.
The resulting report, due to be published on Tuesday after a bitter
struggle with the White House over its release, is likely to alter
American national security and foreign policy, slow the export of
technology and thus reshape the Clinton Administration's commercial
diplomacy toward China.

While the House was torn asunder over impeachment, the five Republicans
and four Democrats on the investigating panel, led by Representative
Christopher Cox, secretly and unanimously achieved consensus. They
concluded that China has been systematically stealing information on
American nuclear warheads and missiles from the 1970's until today,
according to officials familiar with their report. Most unusually, they
agreed not to divulge their explosive findings -- and kept their word,
even as Democrats and Republicans fiercely contested the 1998 election.

The Cox committee was never expected to delve so deeply into secrets of
state. The panel was created by Gingrich, then the Speaker of the House,
to look, among other things, for possible impeachable offenses in the
Clinton Administration's policy of encouraging commercial exports to
China, which Gingrich called "a threat to the survival of the United
States."

But last Oct. 15, the investigation took a new turn. The committee was
questioning Donald H. Rumsfeld, a former Secretary of Defense and author
of a highly classified report on missile threats commissioned by
Congress, on the subject of China's missiles.

Cox, a California Republican, asked a crucial question: How had the
Chinese managed to modernize their nuclear weapons program?

The answer was a secret, replied Rumsfeld, so highly classified that the
committee could not be told. So Cox went to the Central Intelligence
Agency, asking for inside information on China's espionage. And he got
it.

"The committee started out going through a door, and we came into a
room, and there was more in that room than we thought there would be,"
said Representative Porter J. Goss, a Florida Republican, chairman of
the House Intelligence Committee and Cox committee member.

In that room, the committee found evidence that relentless espionage,
assiduous research and open exchanges with American scientists had saved
China incalculable time and money in its drive to build a modern nuclear
arsenal, said officials who have been told the contents of the
committee's report.

It learned of thefts of nuclear weapons information in the mid-1990's --
yet another espionage case still under investigation, whose details the
report cannot publicly disclose. It believes that Chinese spying
continues at the nation's weapons laboratories.

And it concluded that China will field a new generation of nuclear
weapons in coming years, based at least in part on stolen information,
that could alter the balance of power in Asia, especially regarding
Taiwan, which China views as a breakaway province.

"This was what Chris Cox stumbled onto as he started peeling the onion
layers back," said William Schneider Jr., a Rumsfeld commission member.
"The chairman had his eyes opened."

The secret files "opened not only Chris's eyes, but all our eyes," said
Representative Curt Weldon, a Pennsylvania Republican and Cox committee
member.

The committee's members do not argue that the United States is
immediately threatened by China's nuclear advances. The American nuclear
arsenal overwhelmingly outmatches China's. And while espionage may have
propelled a great leap toward modern nuclear forces, China has not yet
deployed a weapon based on the stolen data.

"Does it make them less dangerous? More dangerous? I don't know," Goss
said.

Cox said the report "ought not to chill relations" between Beijing and
Washington, "for the simple reason that the underlying facts were known
to both Governments beforehand." But he said "it should provide the
basis for a reassessment of U.S. policy" toward China.

The report already has ignited a debate on the balance between science
and security at the national laboratories, not to mention spawning 10
more Congressional investigations. Its publication, after a five-month
struggle over its declassification, will cap an unusual effort to pierce
the shield of secrecy.


Overcoming Suspicions and Political Nature


In a city where secrets are hard to keep, the committee kept them. They
did not leak until after its report was completed and the committee
began battling the Clinton Administration over its declassification and
release.

"We had a sworn pact among the nine of us that we would not divulge
information, and for the first time in my career in Congress, that
worked," Weldon said.

The committee began work in July with a seemingly narrow focus: how
American commercial satellite technology leaked to China under export
licenses approved by President Clinton and President Bush. It weighed,
then dropped, explosive but unproven charges that Chinese military and
intelligence officials tried to sway the 1996 elections for the
Democrats by buying access to politicians.

In the beginning, "Democrats were suspicious because the Republicans had
made it clear there were going to be impeachable offenses here," said
Representative Norm Dicks of Washington, the committee's ranking
Democrat.

But those suspicions subsided.

Schneider, a State Department official in the Reagan Administration,
said: "Cox was seen by the Democrats as a fair guy who was undertaking a
narrow investigation into satellite launches. The committee had a fixed
life of six months, and Congress would be out of session over much of
that time, so they would not be around to do the heavy lifting of
reading documents."

Cox's staff included some who had served on the Rumsfeld commission,
which had uncovered at least one crucial file pointing to Chinese
nuclear espionage. The staff went to work in a windowless bunker with 36
cubicles, "burn bags" for classified litter and alarm systems to ward
off visitors.

Their heavy lifting began in October, when Cox won access to the secret
intelligence files.

The Director of Central Intelligence, George J. Tenet, "was willing to
give us access and to open the doors of the C.I.A.," said Weldon. "That
was a sea change, when George offered that openness."

The committee was less successful on another front. Cox repeatedly asked
the Justice Department for information from Federal grand jury
investigations of American companies' exports of satellites, computers
and machine tools to China. He was rebuffed.


Evidence Begins to Surface


In late October, days before the 1998 elections, the committee made its
most important discovery.

In early 1995, scientists at the Los Alamos nuclear laboratory had told
Notra Trulock, then intelligence director at the Energy Department,
which oversees the national labs, of their fears that China had achieved
a remarkable breakthrough in its nuclear tests.

At about the same time that those fears were raised, the intelligence
files showed, a Chinese agent had handed over a secret document to
American officials. The document contained evidence that China had
stolen design data on American nuclear warheads and missiles.

In 1996, the C.I.A. decided that the agent had been planted by the
Chinese intelligence service, to send a message whose meaning is debated
to this day. But the agency determined that the document he had
delivered contained at least a measure of truth -- that American secrets
had been stolen.

This should have set off alarm bells at the national weapons
laboratories. But that didn't happen, said Trulock, who became the Cox
committee's star witness.

He secretly testified that he had tried to raise warnings about
espionage at the labs, but had been thwarted by his superiors at the
Energy Department.

In late October, at a White House meeting, Bill Richardson, the new
Energy Secretary, pulled aside Samuel R. Berger, the national security
adviser, said a senior Administration official. Richardson said, in so
many words: We're starting to get requests for information from the Cox
committee, and this China stuff is a problem, the official said.

The White House knew what the committee wanted to know. President
Clinton had been told about the problems at the weapons laboratories,
but no earlier than July 1997 and possibly as late as February 1998,
according to the varied recollections of Berger.

The Democrats said they feared the information about the Chinese
espionage would leak and damage them politically on the eve of the
November 1998 elections.

It did not.



As the storm of impeachment gathered over the Capitol, the nine members
of the committee struggled to finish their report, which was approaching
the length of a Russian novel. On Dec. 16, they took their last
testimony from Trulock, a self-described whistle-blower. On Dec. 19, the
House impeached the President.

The Cox committee report was completed on Dec. 30, after less than six
months of intense work. It would take nearly five months more to
declassify it.

In consultation with the committee, the White House declassified the
panel's 32 recommendations, including tightening security at the labs,
toughening export controls and sharing intelligence information between
Government agencies. The White House, without consulting the committee,
released the Cox recommendations, along with its own responses, to
selected reporters on Feb. 1.

"They were hoping to spin the report," Weldon said.

A few days later, Cox and Dicks asked to meet with President Clinton to
discuss their findings. The White House did not respond for weeks. For
more than a month, President Clinton did not have much to say in public
about the report's findings; some had already appeared in The New York
Times, The Wall Street Journal and other publications.

On March 19, at a press conference, Clinton assured the public that
"there has been no espionage at the labs since I have been President"
and "no one has reported to me that they suspect such a thing has
occurred."


Assessing Damage From Espionage


Throughout March and April, the White House and the committee fought
over how to declassify the report. Nearly a third of its findings will
remain secret at the behest of American intelligence and law-enforcement
agencies, Cox said.

As the fight dragged on, the C.I.A., at the committee's recommendation,
pulled together an analysis of the impact of the spying, reflecting the
consensus of American intelligence officials.

On April 21, the C.I.A. published its findings. It did not highlight
espionage as a critical element of China's effort to improve its nuclear
capabilities. It could not determine the relative importance of
espionage, openly available information and home-grown Chinese know-how.


"The bottom line," said a senior intelligence official, "is we don't
know."

Neither did they know, the official said, "whether any weapon design
documentation or blueprints were stolen." The Cox committee said China
may have obtained such documents, officials said.

Nevertheless, the C.I.A. report agreed with the Cox committee's central
conclusion: Stolen American nuclear secrets had accelerated the Chinese
drive toward a modern arsenal.

On April 22, the day after the C.I.A. report was published, Cox and
Dicks got their meeting with the President and discussed the findings of
their report.

Ever since, Clinton has not repeated his earlier statements that he was
unaware of suspicions of Chinese espionage on his watch.

The New York Times, May 23, 1999


Der Fuhrer Invades Yugoslavia

NATO Gets a Clue! Bombs KLA! Way to Go NATO!

Kill 'em ALL. Let CNN sort 'em out.

NATO yesterday admitted hitting a Kosovo Liberation Army base in one of
the worst blunders of the two-month bombing campaign. Even more
embarrassingly, the rebels claimed to have been providing regular
intelligence to Nato from the base.
The KLA captured the barracks in the vilage of Kosare from the Yugoslav
Army more than a month ago and it had been visited by a series of
British journalists and television crews, including a team from the
BBC's Nine O'Clock News who were told the base was in regular satellite
phone contact with Nato.

Jamie Shea, the Nato spokesman, said: "The target Focus: War in the
Balkans which was struck by Nato was done so on the assumption that it
was still in the hands of the Yugoslav army. Subsequently it appears to
have been taken over by the KLA." Asked about the KLA's claims to have
been furnishing information about Serb positions, he replied: "You're
ahead of me on this."

Mr Shea suggested the raid may have been the result of a spelling
mistake. He admitted that military commanders identified the target as
Kosani rather than Kosare.

The blunder overshadowed the announcement that President Clinton is
backing the doubling of the Nato force massing on the borders of Kosovo
to 50,000 in a move which could pave the way for the eventual use of
ground troops.

KLA officials in Albania said last night that seven of their men were
killed and 25 wounded in the Nato attack on Kosare, a former Yugoslav
border post on a hilltop near the northern Albanian town of Tropoja. The
barracks is a key staging point in a logistics route opened by KLA
guerrillas last month, used for smuggling fighters and weapons into
Kosovo.

It appeared on the BBC news on Wednesday night with fighters assembling,
resting and cooking at the base, while Serb gunfire echoed in the
valley. Although Nato does not officially support the KLA, the rebels
are thought to have been working closely with the alliance. However, the
attack raises questions about the extent of this collaboration.

Gen Charles Ward, the Pentagon's Director of Strategic Planning,
insisted last night, "there is no coordination militarily with the KLA
that I know of". The mistake came on the heaviest night of Nato bombing
and amid growing criticism of its targeting strategy following the
strike on the Chinese embassy. Nato admitted it was using outdated maps
when it hit the embassy, killing three people.

Joschka Fischer, Germany's Foreign Minister, led new calls for Nato to
re-evaluate its tactics after an attack on Thursday night on Belgrade
damaged residences of the Norwegian, Swedish, Spanish, Hungarian and
Swiss ambassadors.

Washington's announcement of extra troops will increase pressure on
Slobodan Milosevic to cave in to the alliance's key demands. Mr Clinton
will this week urge Nato's European members, including Britain, to
deploy quickly the extra units needed to bring the total to 50,000.
Although their role is described as peacekeeping, both the President and
the Pentagon have indicated over the past few days that the US is
willing to contemplate ordering troops into Kosovo before a formal deal
with Belgrade - implying the possibility of combat against pockets of
Serb resistance.

The unexpectedly swift American endorsement of a plan which only cleared
Nato's military committee on Friday is a sign that Washington's resolve
has stiffened under pressure from Gen Wesley Clark, the alliance's
supreme commander in Europe, and from Britain.

Meanwhile Kosovar refugees continued to stream across the border,
including a group arriving in Macedonia claiming to have been herded
into a field and told to "wait for Nato" to bomb them.

The London Telegraph, May 23, 1999


Digital Society

The Five Worst Predictions of the Internet Age

by Evan Schwartz

As long as we're now so many years into our fascination with the Web
(which hit most people's radar screens all the way back in, oh, 1995),
the editors at Context decided to pull together a list of the five
dumbest ideas of the Internet Age. To be at least slightly politic,
let's call them the Five Worst Predictions. We don't mean to be cruel
about this—oh, maybe a little. We mainly wanted to make the point that,
as the great Yogi Berra once said, an accurate prediction is very
difficult to make, especially when it's about the future.
Predictions about technology have always been especially ticklish. Why,
Bill Gates himself once assured us that 640 kilobytes of random-access
memory was all that PC users would ever require—many PCs now have 200
times that much memory. The prediction business has become tougher since
the Web burst on the scene. The half-life of prophecies has become so
short that some of the boldest predictions go awry almost as soon as
they are uttered.

It'd be nice to be able to just sit around and laugh at the gurus, and
sometimes we do. But the unpredictability of the Web is a serious
problem for anyone trying to do business on-line—which, these days,
means just about everybody. How can you build a long-term business plan
when the generally accepted "truths" about the Internet are overthrown
so rapidly in favor of new ones? You can't, at least not with any
certainty.

But how can you avoid trying? It seems to us that you have to try. But
if our Worst Predictions are any guide, you should rely less on the
pundits and more on your own experience. You have to test all the ideas,
all the technologies, and all the business models for yourself so you're
ready if they hit—while spending carefully enough that you don't look
silly if they bust.

Let's get started. We'll begin with:

No. 5: Digital cash, whose proponents helped to convince the world that
consumers wouldn't use credit cards to buy over the Internet because of
fears about security.

With fear of hackers widespread in 1995 and 1996, companies rushed to
develop complex, highly secure payment systems. Companies with names
such as Cybercash, First Virtual, and DigiCash sprang up with solutions.
Some required all shoppers to download special "wallet" software that
would store specially encrypted digital money. Others required merchants
to install special storefront applications that would know how to
translate these digital debits into dollars and cents.

For a while, these digital cash systems were treated as a given, as a
necessity if electronic commerce were to ever reach critical mass. In
1996, MasterCard Senior Vice President Edward Hogan said that electronic
cash "will be a multibillion-dollar market" by the turn of the century.
A January 1997 report from consulting firm Killen & Associates forecast
eight billion e-cash transactions on the Internet in the year 2000.

It was not to be. Hordes of consumers began ordering books, CDs, airline
tickets, computers, and the like over the Web, paying simply by typing
in their credit-card numbers. Encryption programs bundled right into Web
browser programs scrambled the card numbers as they traveled in packets
over the Internet. In the process, the stocks of First Virtual and
Cybercash lost more than 80% of their value. The marketers of the
digital cash concept ended up burning through tens of millions of
dollars before they phased out their products and began searching for
Plan B, an entirely different business to enter.

No. 4: The doomsaying about America Online, which, again, was wildly far
off. The predictions carried consequences because many marketers, at
their peril, ignored it as a way of reaching customers and didn't
foresee the potential for reaching customers through high-traffic
"portal" sites like AOL.

In 1995, industry analysts sounded the death knell for America Online
because, the thinking went, the explosion in use of the World Wide Web
meant that people would no longer need to pay AOL for its information
services or even its chat capabilities. "All of the proprietary on-line
services are really on a march to extinction," Forrester Research
analyst Mary Modahl said.

Sure enough, in the fall of 1996, after AOL surpassed five million
members, the company seemed to hit a wall. While the number of users of
the Web grew exponentially, AOL couldn't seem to keep up. Busy signals
greeted users who dialed into the network. Anyone who managed to get
on-line encountered painfully slow response times. Ms. Modahl foresaw
consumers deserting.

But within a year, AOL's membership more than doubled, to 12 million
customers, and it has continued to rise. Nowadays, AOL is often cited by
analysts as the media empire to beat in the 21st century and the only
company with the market clout and staying power to challenge Microsoft's
dominance in the digital economy. "I was completely wrong," Ms. Modahl
has said of her 1995 prediction.

No. 3: The "network PC," which made it seem that the Internet's success
depended on the coming of a technology breakthrough that, in fact,
wasn't necessary.

Back in 1995, Larry Ellison, the billionaire chairman of Oracle,
declared that the Wintel (Windows/Intel) personal computer was
"ridiculous"—too complicated to use and too expensive for the average
user. "The price of PCs has been constant for 15 years because Microsoft
insists on sticking more and more junk in them," Mr. Ellison said.
Instead of $2,500 machines with huge hard drives and bloated software
applications, his new, disk-less "network computers," or Net PCs, would
sell for less than $500 and run simple "applets"—small applications
written in the Java language from Sun Microsystems.

The new Network PCs didn't hit the market until 1997, and by then there
was little demand for them. Even as PCs had become more powerful, prices
had fallen to around $1,200, closing the price gap. Prices soon headed
well below $1,000. Besides, people were so accustomed to the familiar
design that switching to a Net PC was out of the question. Oracle soon
disbanded its Net PC division and took a big write-down.

No. 2: The various predictions on the number of users of the Internet,
which have consistently underestimated the speed with which the new
medium would gather steam. Now, we acknowledge that predictions about
violent change are treacherous. But estimates are supposed to be high.
Everybody knows that technology forecasters get overly optimistic about
the speed of change. Because, with the Internet, the estimates were so
low, they allowed many companies to think they could afford to wait to
form on-line strategies.

In 1995, for instance, Forrester Research projected that the Internet
would have a worldwide user population of 34.9 million people by 1998.
Notice the precision. Not 35 million, but 34.9 million. The real number
ended up being in excess of 100 million users.

Researchers also grossly underestimated the size of the electronic
commerce marketplace. In 1995, Jupiter Communications projected $3.1
billion in annual business-to-consumer revenue for e-commerce by 1998.
Forrester predicted $2.3 billion. The real number turned out to be more
than $13 billion.

No. 1: Drum roll, please. We made "push" technology No. 1 on our list of
Worst Predictions partly because its proponents confused so many people
into thinking that the Web would be a broadcast medium, much like
television—but mainly because the hype was so deliciously flagrant.

The idea got rolling back in late 1996, when the start-up PointCast
reported that more than one million users had downloaded its free "push"
software. The media saw a crystal-clear vision of the future. Instead of
having to troll the Web and retrieve, or pull, news and information,
people could use software from PointCast and others that would push to
their screens exactly what they wanted—accompanied, of course, by paid
advertisements.

The media went into hysterics. Business Week heralded an age of
"Webcasting" in a February 1997 cover story. "I see push creating almost
a second Internet," said Halsey Minor, chief executive officer of C/Net,
a leading Web news service. "We're huge believers," said Bruce Judson,
then Time Inc.'s chief of new media. "Kiss your browser goodbye," the
editors of Wired magazine wrote in a cover story, titled "PUSH!"

Based on nothing more than press releases and early product demos, the
media anointed a former midlevel Sun Microsystems executive named Kim
Polese of Marimba as the "queen of push" and the Web's new "It Girl."
For a start-up with few real customers, Marimba received perhaps an
unprecedented flurry of press coverage. She became part of a small group
that advises Vice President Al Gore on technology policy. The delirium
culminated when Time magazine named Ms. Polese one of the 25 most
influential people in America for 1997.

We all know what happened next. PointCast users found the visual
presentation annoying, and corporations realized that all the pushed
content clogged their networks. Users disabled or deleted the software.
Less than a year after the push hype reached its zenith, companies such
as Marimba disassociated themselves from the very concept of push and
began looking for new applications for their software.

Several predictions that didn't make our list deserve honorable
mentions:

•There was the talk of Apple's demise, which, while not all that
significant a factor for companies setting Internet strategies, was just
so far off....In 1997, a Business Week cover featured the Apple logo on
a black background, speaking about Apple in a wistful past tense. But
when co-founder Steve Jobs returned as chief executive, he orchestrated
a remarkable return to profitability.
•There was also the speculation that Yahoo and Amazon.com, among others,
would flame out. Yahoo was supposed to face many of the same pressures
as AOL. Amazon was supposed to have trouble sustaining its phenomenal
growth. In fact, we at Context share some of the skepticism about
Amazon. But, as of this writing, Amazon carried a $17 billion stock
market value, Yahoo a $31 billion value. Not bad for a couple of
failures.

•There was all the talk about how the Java programming language would
remove the need for operating systems such as Windows and could put
Microsoft out of business. George Gilder, for instance, wrote in a 1997
column in the Wall Street Journal that "Java has the power to break
Microsoft's lockin of applications profits and lockout of rival
operating systems." Java's claim to fame was that programs written in
that language would be able to run unaltered on every computer. But the
last we checked, any given Java applet would run on about half the
computers in the world. And Microsoft had added more than $200 billion
in market capitalization since the Gilder column ran, making it the most
valuable company in the world.


There are some lessons to be learned by looking at the common threads
running through many of the predictions that turned out to be off the
money. The ones that cause their makers to look back and wince seemed
mainly to underestimate the twin forces of inertia and simplicity. The
sheer fact that lots of people use a certain technology creates momentum
that is extremely difficult to stop. In addition, the history of
technology shows that, when faced with two choices, customers will
almost always opt for the simpler solution.

AOL, for instance, had both forces going for it: the inertia of the
largest on-line user population, plus the fact that AOL was the simplest
way for novices to get on the Internet. Push, meanwhile, was fighting
 both forces. It faced complex technology and business issues; plus, it
required breaking the surfing habits of tens of millions of Web users.
Likewise, while Net PCs seemed to have simplicity on their side, they
actually had some complex technology issues to overcome. The
infrastructure necessary to serve software to millions of users and to
store gigabytes of data on far-flung networks was quite troublesome. Net
PCs were also fighting the inertia of years of PC purchases.

The real lesson, though, is that predictions are hard—something to keep
in mind when experts say that they have now seen the future and it
is...portals.

Perhaps we should pay less attention to the actual predictions and just
focus on their entertainment value. Push technology? "It will be
replaced by Poke technology, allowing users to play Three Stooges with
people at remote locations," says cartoonist and amateur futurist Scott
Adams. He was also among the first to foresee Intel's collapse into
bankruptcy. "I give them two months, tops," Mr. Adams said not long ago.
Now that's a good prediction.

Mr. Schwartz is the author of Webonomics and of the forthcoming Digital
Darwinism, to be published in June. He can be reached at
[EMAIL PROTECTED]

Context, May 23, 1999
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
Omnia Bona Bonis,
All My Relations.
Adieu, Adios, Aloha.
Amen.
Roads End
Kris

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to