-Caveat Lector-

RadTimes # 68 - October, 2000

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
QUOTE:
"Since trade ignores national boundaries and the manufacturer insists on having
the world as a market, the flag of his nation must follow him, and the
doors of the
nations which are closed against him must be battered down. Concessions
obtained
by financiers must be safeguarded by ministers of state, even if the
sovereignty
of unwilling nations be outraged in the process."
--Woodrow Wilson, President of the United States, 1907
-----------------------------------------------------------------------------------------------------------
Contents:
---------------
--Free Radio Austin 97.1FM Shutdown in FCC Raid
--Second pirate radio station in Austin shut down by FCC
--Carnivore Details Emerge
--French Warn of U.S. Spy Network
--Pentagon Introduces High-Tech ID
--How to crush oppression without killing justice [book review]
--Chem-bio warfare agent detector market assessed
--Fear of Contaminated Airplane Cabin Air
Linked stories:
         *NASA Warms to Living on Mars
         *RIAA: Internet Licenses Coming
         *Silent Partner [Nader/Buchanan]
-----------------------------------------------------------------------------------------------------------
Begin stories:
-----------------------------------------------------------------------------------------------------------
Free Radio Austin 97.1FM Shutdown in FCC Raid

For Immediate Release:
Tuesday, October 10, 2000

Contact: Reckless or Chance at (512) 476-3446

Austin Activists and Community Leaders Link Shutdown to Fortune 500 Protests

For the second time in less than a week, a microbroadcasting station in Austin,
TX was shutdown by the FCC and law enforcement from various agencies.

At around 10:30AM this morning Free Radio Austin, broadcasting at 97.1 FM, was
raided by a multi-jurisdictional task force of FCC, Federal Marshals, Austin
Police Department, and suspected FBI agents. Lloyd Perry, an agent from the FCC
regional office in Houston, personally led the raid and removed the transmitter
and other equipment, including 2 CD players, 2 turntables and portable radios.
Unlike other such raids in the past, the FCC encountered immediate resistance
from community activists. Free Radio Austin had buried it's transmitter several
feet underground giving local community and media enough time to make it to the
station to cover the event. Several cameras from traditional and independent
media were busy recording Mr. Perry as he dug the transmitter from layers of
thick clay and mud.

Meanwhile, programmers and community began to chant slogans such as "Congress
shall make no law to abridge the freedom of press." Unlike raids that have
happened with other microbroadcasting stations such in California, Florida, or
even when local Radio One was shutdown, FCC agents were not able to quickly
seize the equipment. The entire procedure took more than an hour. FCC agents
were clearly not in a good mood as a crowd of some 50 or more community
gathered around them.

Lloyd Perry declined to give comment either to members of Free Radio Austin or
to the media. Only last week, Mr. Perry had defiantly posed, cutting a wire on
the tower of Radio One, for local media. But he was clearly not laughing or
joking with media today.

Papers delivered to Free Radio Austin 97.1 indicate that the warrant for
seizure of equipment were signed by a federal judge on the same day as those
for Radio One. However, members of Free Radio Austin claim they were in
dialogue with the FCC and had never ignored or not responded to any
correspondence from the FCC. In fact, several programmers claimed that they
wanted to pursue microbroadcasting issues in legal proceedings as other
stations around the nation have been doing in a burgeoning movement of
grassroots radio.

Local community activists in Austin cite that both Radio One and Free Radio
Austin were shutdown only days before upcoming protests against the Fortune 500
Forum, an annual gathering of CEOs from some of the largest corporations in the
world. They believe that these same CEOs, business leaders, and local Austin
Mayor Kirk Watson were pressuring for the shutdown of independent media outlets
that had planned to cover the protests.

Organizers also cite ongoing political pressure from City Hall and the Austin
Downtown Business Alliance to deny marchers a permit for an Oct. 13th rally.
Police claimed that a permit could not be issued because of traffic issues, but
organizers counter that their freedom of speech issues outweigh these concerns.
They also point out that other events such as concerts and University of Texas
football games often cause traffic problems, but no one is trying to stop those
events.

The station was in the backyard of a programmer who prefers to simply go by the
name Reckless. "They destroyed our equipment. Necessity knows no laws. We will
not be silenced. We are ALL speechless today," she said, adding emphasis that
free speech itself was the target of the FCC raid. She was adamant that she was
not "in charge" of the station. The station was run by a collective of
community programmers who each had an equal say in how the station was run.
Programmers at Free Radio Austin also pointed out that their battle for freedom
of speech issues would not stop. They vowed to educate and assist others in the
community on how to setup their own microbroadcasting stations. In the words of
one programmer, "Everytime they tear down one station, five more pop up and
replace it."

Related info: Fortune 500 Protest Media Contacts: Bryan at <[EMAIL PROTECTED]> /
512.929.8441 or Ernest at <[EMAIL PROTECTED]> / 512.479.4180.

-----------------------------------------------------------------------------------------------------------
Second pirate radio station in Austin shut down by FCC

By Claire Osborn
American-Statesman Staff
Wednesday, October 11, 2000

It took a shovel and lots of muddy digging, but the Federal Communications
Commission closed another unlicensed radio station Tuesday.

FCC agents, police and a U.S. marshal seized equipment from Free Radio Austin,
which had been broadcasting at 97.1 FM since April 1999. An FCC agent dug four
feet down into the low-power station's yard at 2939 E. 14th St. in Austin to
find the radio transmitter, said Chris Womack, one of the station's founders.

"We feel this is an unreasonable restriction of the rights of free speech,"
said Womack, who was known as "Marmot" on the radio station.

Free Radio Austin broadcast hip hop, reggae and jazz music as well as programs
about animal rights, the erosion of civil rights, the protest against the World
Bank and the International Monetary Fund, and a protest about the upcoming
Fortune 500 forum in Austin.

An FCC spokesman declined to comment on Tuesday's raid, the second this month
against an unlicensed, low-power radio station in Austin. Agents closed Radio
One at 94.3 FM on Oct. 4. It is illegal to operate a radio station without an
FCC license.

Free Radio Austin's supporters said a license was not available until the
spring and operating without one made them ineligible to apply.

Authorities also recently closed KIND, an unlicensed station in San Marcos.
----
You may contact Claire Osborn at [EMAIL PROTECTED] or 445-3630

-----------------------------------------------------------------------------------------------------------
Carnivore Details Emerge

<http://www.securityfocus.com/news/97>

A web spying capability, multi-million dollar price tag, and a secret
Carnivore ancestor are some of the details to poke through heavy FBI editing.

By Kevin Poulsen
October 4, 2000, WASHINGTON

The FBI's Carnivore surveillance tool monitors more than just email.
Newly declassified documents obtained by Electronic Privacy Information
Center (EPIC) under the Freedom of Information Act reveal that Carnivore
can monitor all of a target user's Internet traffic, and, in conjunction
with other FBI tools, can reconstruct web pages exactly as a surveillance
target saw them while surfing the web.
The capability is one of the new details to emerge from some six-hundred
pages of heavily redacted documents given to the Washington-based nonprofit
group this week, and reviewed by SecurityFocus Wednesday.
The documents confirm that Carnivore grew from an earlier FBI project
called Omnivore, but reveal for the first time that Omnivore itself
replaced a still older tool. The name of that project was carefully blacked
out of the documents, and remains classified "secret."
The older surveillance system had "deficiencies that rendered the design
solution unacceptable." The project was eventually shut down.
Development of Omnivore began in February 1997, and the first prototypes
were delivered on October 31st of that year. The FBI's eagerness to use the
system may have slowed its development: one report notes that it became
"difficult to maintain the schedule," because the Bureau deployed the
nascent surveillance tool for "several emergency situations" while it was
still in beta release. "The field deployments used development team
personnel to support the technical challenges surrounding the insertion of
the OMNIVORE device," reads the report.
The 'Phiple Troenix' Project
In September 1998, the FBI network surveillance lab in Quantico launched a
project to move Omnivore
from Sun's Solaris operating system to a Windows NT platform. "This will
facilitate the miniaturization of
the system and support a wide range of personal computer (PC) equipment,"
notes the project's Statement of Need. (Other reasons for the switch were
redacted from the documents.) The project was called "Phiple
Troenix"apparently a spoonerism of "Triple Phoenix," a type of palm tree
and its result was dubbed "Carnivore."
Phiple Troenix's estimated price tag of $800,000 included training for
personnel at the Bureau's
Washington-based National Infrastructure Protection Center
(NIPC).  Meanwhile, the Omnivore project was formally closed down in June
1999, with a final cost of $900,000.
Carnivore came out of beta with version 1.2, released in September 1999. As
of May 2000, it was in version 1.3.4. At that time it underwent an
exhaustive series of carefully prescribed tests under a variety of
conditions. The results, according to a memo from the FBI lab, were
positive. "Carnivore is remarkably tolerant of network aberration, such a
speed change, data corruption and targeted smurf type attacks.
The FBI can configure the tool to store all traffic to or from a particular
Internet IP address, while monitoring DHCP and RADIUS protocols to track a
particular user.
In "pen mode," in which it implements a limited type of surveillance not
requiring a wiretap warrant, Carnivore can capture all packet header
information for a targeted user, or zero in email addresses or FTP login data.
Web Surveillance
Version 2.0 will include the ability to display captured Internet traffic
directly from Carnivore. For now, the tool only stores data as raw packets,
and another application called "Packeteer" is later used to process those
packets.  A third program called "CoolMiner" uses Packeteer's output to
display and organize the intercepted data.
Collectively, the three applications, Carnivore, Packeteer and CoolMiner,
are referred to by the FBI lab as the "DragonWare suite."
The documents show that in tests, CoolMiner was able to reconstruct HTTP
traffic captured by Carnivore into coherent web pages, a capability that
would allow FBI agents to see the pages exactly as the user saw them while
surfing the web.
Justice Department and FBI officials have testified that Carnivore is used
almost exclusively to monitor email, but noted that it was capable of
monitoring messages sent over web-based email services like Hotmail.
An "Enhanced Carnivore" contract began in November 1999, the papers show,
and will run out in January of next year at a total cost of $650,000. Some
of the documents show that the FBI plans to add yet more features to
version 2.0 and 3.0 of the surveillance tool, but the details are almost
entirely redacted.
A document subject to particularly heavy editing shows that the FBI was
interested in voice over IP technology, and was in particular looking at
protocols used by Net2Phone and FreeTel.
EPIC attorney David Sobel said the organization intends to challenge the
FBI's editing of the released documents. In the meantime, EPIC is hurriedly
scanning in the pages and putting them on the web, "so that the official
technical review is not the only one," explained Sobel. "We want an
unofficial review with as wide a range of participants as possible."
The FBI's next release of documents is scheduled for mid-November.

-----------------------------------------------------------------------------------------------------------
French Warn of U.S. Spy Network

Wednesday October 11, 2000  Guardian

PARIS (AP) - A parliamentary report published Wednesday urged France to
protect itself from an alleged U.S.-led eavesdropping network, which it
claims Washington is using to snoop on the businesses of its European
allies.
The 80-page report by the National Assembly's defense commission alleged
that no form of communication, from fax to e-mail to cable, is safe from the
so-called Echelon spy network. It said that businesses, particularly
European companies with American competitors, were the principal targets of
the alleged electronic snooping ring.
Lawmaker Arthur Paecht said the network has at least 120 spy satellites that
intercept ''180 million messages every hour.''
``These serious attacks oblige us to protect ourselves,'' said Paecht.
In February, a European Parliament set up a special probe into Echelon in
July. Denmark, like France, set up a national inquiry. The network allegedly
includes Britain, Canada, Australia and New Zealand.
Last month, an EU committee said it wants U.S. intelligence chiefs to
testify on whether Echelon spies on the businesses of its European allies.
U.S. intelligence officials have never publicly confirmed the existence of
such a system. In testimony before the U.S. House Intelligence Committee in
April, top intelligence officials, including U.S. National Security Agency
head, Air Force Lt. Gen. Michael V. Hayden, denied reports the United States
was involved in spying on Europeans and Americans as part of a snooping
network.
The National Assembly study alleged that the Echelon system developed
rapidly in the 1970s and 1980s thanks to technology advances, diverging from
its initial military objectives.
The parliamentary study said it was ``not impossible that certain
information gathered could be used for political or economic ends.''

-----------------------------------------------------------------------------------------------------------
Pentagon Introduces High-Tech ID

<http://dailynews.yahoo.com/h/ap/20001010/pl/pentagon_access_1.html>

Tuesday October 10

WASHINGTON (AP) - The Pentagon plans to issue 4 million
or more high-tech identification cards to soldiers and other personnel
worldwide, hoping to provide better security for access to bases, buildings
and computer systems.

The new ``common access card'' contains a tiny computer chip, using ``smart
card'' technology to store and processes a myriad of information. Similar
technology has been used by smaller governments, including Spain and
Finland, and in commercial operations.

``I'd view this chip as a small computer without a monitor or power
supply,'' said Paul Brubaker, Defense Department information officer,
unveiling the new card at a news conference Tuesday.

The Pentagon is developing plans to use the card for everything from
processing food service charges in military mess halls to keeping track of
manifests and deployments and guaranteeing restricted access to secure
buildings and computers.

The card has the capability of being linked to either personal codes or
fingerprints to enhance security throughout the military, Brubaker said. It
is expected to take several years for the cards to be issued throughout the
services.

-----------------------------------------------------------------------------------------------------------
How to crush oppression without killing justice [book review]

<http://www.csmonitor.com/durable/2000/10/12/p21s1.htm>

By Joshua Rubenstein

'A Force More Powerful" challenges a longstanding myth that lies at the
heart of much of the turmoil
of the 20th century: that power comes from the barrel of a gun. Beginning
with Lenin - whose
successful coup d'état in Russia became the standard model for would-be
revolutionaries - through
Mao in China, Franz Fanon in Algeria, and Fidel Castro in Cuba, an idea was
increasingly glorified
that violent revolution was not only effective and legitimate, but would
also prove to be psychologically liberating for the oppressed.
"A Force More Powerful" makes clear that revolutionary violence undermines
chances to create a
genuine, workable democracy, while nonviolent movements can confront
oppression more effectively and lead to more democratic results.
Peter Ackerman and Jack Duvall examine two dozen episodes of "political
struggle, social upheaval,
and military action" on five continents.
Their most vivid accounts cover Gandhi's movement in India, the struggle to
integrate lunch counters
in Nashville, Tenn., the behavior of Danish citizens during the German
occupation, and the rise and
eventual triumph of Solidarity in Poland.
At each moment in the history of these struggles, activists had to make
difficult choices - how to
organize reluctant and wary citizens, what to demand, and how far to go
before retreating or accepting a compromise.
Gandhi's campaign of satyagraha (a combination of the Hindu words for
"truth" and "holding firmly") has long been regarded as the model for
nonviolent resistance. His fundamental realization was that the British
could not rule India "without the cooperation of the ruled."
Once masses of Indians refused to obey unjust laws, like the tax on salt,
or to serve as civil servants, they compelled the British to invest more
resources in controlling the colony, making the entire investment so costly
that it could not be sustained.
The Danes faced a more brutal enemy. Armed struggle in Denmark during the
German occupation would
only have insured a harsh military response. But non-cooperation and
selected acts of sabotage deprived the Germans of the full economic
benefits they wanted without provoking overwhelming violence. At the same
time, the decision to rescue the country's Jews by smuggling thousands to
safety in neutral Sweden was made possible by this broader movement of
resistance, which included King Christian himself.
In Poland, Solidarity activists had studied the failure of earlier
protests. When they took over shipyards and factories in 1980 and 1981,
their leaders insisted on restraint, lending their struggle greater dignity
and depriving the regime of the excuse it needed to respond with force.
It was only after Soviet leaders insisted on a crackdown that the Polish
military declared martial law and interned thousands of people.
Even then, the workers' movement soon responded by organizing "flying
universities" and an underground press, creating an alternative civic
culture that could not be suppressed. Within a few years, in the wake of
Gorbachev's reforms in Moscow,
Solidarity was ready to openly contest for power against General Jaruzelski.
The lessons of nonviolent resistance can be applied in different cultures
and against a broad range of repressive regimes. It is important to recall
that Gandhi developed a correspondence with the great Russian novelist (and
pacifist) Leo Tolstoy, who had himself studied the writings of Henry David
Thoreau.
Once Gandhi became famous, African-American leaders visited India in the
1930s and brought back ideas that later shaped the civil rights movement.
This American struggle inspired activists in Eastern Europe who were
determined to reform communist regimes. But they also knew Lenin's
handiwork. As the Polish dissident Adam Michnik once observed, "By using
force to storm the existing Bastilles we shall unwittingly build new ones."
Based on convincing detail, Ackerman and Duvall dare to claim that
nonviolent movements lead to more secure democracies.
You only have to think about the 20th century to know they are right.
----
Joshua Rubenstein is the Northeast regional director of Amnesty
International USA and the author of 'Tangled Loyalties: The Life and Times
of Ilya Ehrenburg' (University of Alabama Press).

-----------------------------------------------------------------------------------------------------------
Chem-bio warfare agent detector market assessed

<http://defence-data.com/current/page8736.htm>

12 October 2000

Multiple factors have led to some fundamental changes in the competitive
nature of the world chemical and
biological warfare agent detector market. However, these changes have not
come independently, rather they have fed off one another. Sequential
changes have altered the nature of the market.
Frost & Sullivan's recent report World Chemical and Biological Warfare
Agent Detector Markets addresses these changes and offers forecasts for the
market's growth through 2006 and an analysis of the chemical and biological
detection segments of the market.
In the early 1990s, the threat of chemical and biological warfare became
more apparent and the need to develop defensive systems to counter this
menacing form of warfare became more of a priority for the United States
and the members of the multi-national force that were allied against Iraq
in the Gulf War.
A number of companies with budding technologies that would aid in the
detection of chemical and
biological warfare agents received research grants from the United States
(US) Department of
Defense (DoD) and the United Kingdom's (UK.) Ministry of Defence (MoD).
These grants have been
used to develop chemical and biological detection technologies for a number
of applications, including point detection and standoff detection in the
battlefield, detection for chem/bio weapons demilitarisation and detection
equipment for civilian use for hazard materials (hazmat) accidents and
against chemical or biological terrorist attacks.
An original producer of chemical agent monitors (CAMs), Graseby Dynamics,
developed and utilised
ion mobility spectrometry (IMS) technology to produce CAMs to counter
terrorist attacks in
Northern Ireland. By the mid-1980s Graseby Dynamics was supplying the UK
MoD with CAMs for all
of its armed forces. During the Gulf War, Graseby Dynamics' CAMs were used
by allied troops.
However, following the war it was apparent that more sophisticated
detection technologies were
needed for both point detection and standoff detection in the battlefield.
In addition, the
development of biological warfare agent detection was still in its infancy.
Therefore, R&D dollars
were made available for technological research and advancement in chemical
and biological warfare
agent detection.
As detection technologies matured from the early- to mid-1990s, workable
detection units were prototyped and produced on a small scale for clients
mainly in North America and Europe. By the mid-1990s, Graseby Dynamics was
producing and supplying CAMs and detectors to military clients in 34
countries around the globe.
Beginning in the mid-1990s the first large scale production contracts were
tendered. In 1995, Intellitec won a contract with the United States Army to
produce 458 improved chemical agent monitors (ICAMs) under a contract worth
$14.3 million. Into the late 1990s, larger and larger R&D, prototype and
production contracts for chemical and biological warfare agent were
tendered with dollar amounts on multi-year contracts entering the tens of
millions of dollars.
As a result, the late 1990s saw a shift in the competitive atmosphere of
the market for chem/bio detectors due to three main factors. First,
companies like Graseby Dynamics and Intellitec were smaller firms who would
pour more and more of their resources into R&D to develop improved and
competitive products. At times, the R&D staff would number upward of
one-third to one half of the total company's staff. This became rather
expensive to maintain and limited the companies' ability to produce their
products on a large scale.
Second, other companies in the market who did not spend as much on R&D were
falling behind technologically. They needed to find faster modes of
acquiring technologies that would improve their market positions.
Third, contracts for chem/bio detector development and production were
large in scale, but few in number. Therefore, competitors needed to
establish geo-physical positions in the market in order to maximize the
ability to penetrate markets across national borders.
As a result, such competitors in the markets looked to partnerships and
mergers and acquisitions to solve production capacity problems and fill
technological gaps. The following partnerships and M&As were initiated in
response to these market forces within the past two years.
Smiths Industries acquired Graseby Dynamics in October 1997 as a wholly
owned subsidiary, which
injected Graseby Dynamics with the financing to further improve its R&D
capabilities and brought Smiths Industries into the chem/bio detection market.
Sawtek Incorporated acquired Microsensor Systems, Inc. in February 1998 in
order to improve its chemical detection equipment product line and expand
its customer base.
GEC-Marconi acquired Tracor Aerospace in April 1998 which enable Tracor to
more easily penetrate
European markets and GEC-Marconi to gain a toe-hold in the US market.
Hunting Engineering partnered with Graseby Dynamics and EDS Defence through
subcontracts
combining Hunting's manufacturing capabilities with Graseby's technological
expertise and EDS's
integration specialisation to successfully win key biological detection
systems contracts with from
the UK Smiths Industries acquired Environmental Technologies Group, Inc. in
June 1999 as a wholly owned subsidiary to broaden its involvement in the
chem/bio detection market and gain a presence in the lucrative US market.
TSI, Incorporated acquired Environmental Systems Corporation in June 1999
to expand its presence and leverage key technologies in the outdoor
environmental monitoring market.
GEC-Marconi merged with British Aerospace in November 1999 to form BAE
Systems which strengthened the original Tracor division's (now BAE Systems
Integrated Defense Solutions) position geo-strategically and financially.
Over the next five to ten years, more large scale production contracts for
chemical and biological warfare agent detectors will be tendered by various
countries, some of which will be worth hundreds of millions of dollars.
Competitors in the market who have positioned themselves through
partnership and M&A activity over the past few years should prove to be the
winners of these few but lucrative long-term contracts.
----
(For a comprehensive view of the World Chemical and Biological Warfare
Agent Detector Markets please contact Rolf Gatlin at 210.348.1017 or
[EMAIL PROTECTED] and reference Frost & Sullivan report #7259-16)

-----------------------------------------------------------------------------------------------------------
Fear of Contaminated Airplane Cabin Air
         Has Health-Conscious Travelers Bringing Their Own Supply

October 11, 2000
SANTA BARBARA, Calif., Oct. 10 /PRNewswire/

It appears "sick building syndrome" has taken to the skies.
An air quality study published in The Wall
Street Journal this summer left many travelers holding their breath after
sampled flights were found teeming with mold, bacteria, and other contaminants
("How Safe is Airplane Air?" The Wall Street Journal 8 June, 2000: W1).  The
biggest concern: "stale" air, and a controversial proposal by the airline
industry to drop the ventilation rates on planes even further.

As mentioned in the article, the wearable Air Supply(R) personal air
purifier offered by Magellan's (item ##EP223, $95) provides travelers with an
alternative to overly re-circulated air by streaming clean, purified air
toward the mouth, nose, and eyes at over 75 feet/minute.  Their new Ultra-Mini
Air Supply (item ##EP225, $145), while barely larger than a pack of chewing
gum, offers the most powerful output available from any wearable air purifier,
produces a refreshing 120 feet/minute of clean air. Both models use patented
corona discharge chamber technology to destroy impurities more effectively
than ionization or particle filtration.

Air Supply, Ultra-Mini Air Supply, and dozens more ways to stay healthy on
the road can be found online now at <www.magellans.com>.  Magellan's is
America's leading source of travel supplies.  The current Magellan's catalog
is available FREE by calling (800) 962-4943 or by requesting one online at
<www.magellans.com>.
----
CONTACT:  Jack Kotowski of Magellan's Catalog, 805-568-5400,
<[EMAIL PROTECTED]> Web site:  <http://www.magellans.com>

-----------------------------------------------------------------------------------------------------------
Linked stories:
                         ********************
  NASA Warms to Living on Mars
<http://www.wired.com/news/technology/0,1282,39318,00.html?tw=wn20001011>
  Scientists say we have the technology to establish a positive
atmosphere on the Red Planet. For example, we already know how to
initiate global warming. Leander Kahney reports from Mountain View,
California.
                         ********************
RIAA: Internet Licenses Coming
< http://www.wired.com/news/business/0,1367,39380,00.html?tw=wn20001011>
The recording industry and music publishers have reached an agreement
that will allow companies to license music.

                         ********************
Silent Partner
<http://www.thenewrepublic.com/011000/lizza011000.html>
Why is right-wing billionaire Roger Milliken, who is pouring money into
Pat Buchanan's presidential campaign, also financing Ralph Nader's?

                         ********************
======================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
         -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
         -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
         -J. Krishnamurti
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to