-Caveat Lector-

Subject: New books
Date: Sunday, October 10, 1999 9:33 AM

From: http://www.atomicbooks.com

BOOKS

Dark Alliance: The Cia, the Contras, and the Crack Cocaine
Explosion

by Gary Webb, Maxine Waters

Dark Alliance shows how the L.A. crack market flourished through
a breathtaking combination of government negligence, greed, and
criminal conduct. In its final chapters, Dark Alliance also
reveals Gary Webb's personal account of the behind-the-scenes
conflict that led to his newspaper's repudiation of its own
groundbreaking series. The career-damning allegations leveled at
Webb have now been joined by glowing reviews of the first
edition of Dark Alliance, and the core findings of this
courageous investigative reporter's work - once fiercely denied
- are now matters of public record. This revised and updated
edition of Dark Alliance adds yet another layer of damning
evidence culled from hundreds of newly declassified CIA cables,
and FBI and DEA reports, none of which were available at the
time of the first edition. Among other revelations, these
long-secret documents expose how the CIA and the NSC worked with
dozens of drug dealers and their companies to secretly fund
right-wing Latin American guerrillas; the decade-long U.S.
government coverup of the CIA-Contra drug trafficking and
illegal gun-running network; one DEA agent's investigation into
allegations of drug trafficking at a military airbase in El
Salvador, and how the CIA and State Department shut it down; and
how the DEA undermined a criminal investigation by the FBI in
order to shield a massive L.A. drug ring and protect the drug
ring's boss from arrest and exposure.
(1998, 574pp, 6x9, photo section) $18.95



Inside the Gemstone File

by Kenn Thomas and David Hatcher Childress

It's the most notorious rant in the history of conspiracy
theories! The Gemstone File consists of hundreds of letters
handwritten in many segments over a number of years by Bruce
Roberts, the creator of synthetic rubies. Hughes Aircraft stole
Roberts' rubies in 1960 for use in laser weapons research. His
subsequent investigation of the theft inspired Roberts to write
the Gemstone letters, tracking the secret history of the
international mob and industrial espionage, and their role in
political intrigue. In 1975, a 24-page chronology known as the
Skeleton Key to The Gemstone File began to circulate and has now
become a legendary classic of conspiracy literature.
Aristotle Onassis Versus Howard Hughes: Gemstone tells the story
of internecine warfare between Aristotle Onassis and Howard
Hughes. According to the Gemstone, Onassis and the International
Mafia kidnapped and held Hughes as a drugged-up prisoner for ten
years. As sole controller of Hughes Aircraft and related
industries, the Mafia could exploit Hughes' empire without a
company board meeting ever taking place.
Conspiracy Around The World: The Gemstone File became the
prelude to a down-under counterpart, the Kiwi Gemstone,
detailing secret power machinations from the 1980s-the Nugan
Hand bank scandal, Iran-contra, BCCI-to the present, providing
an essential outline of events surrounding the famous Octopus
research of martyred writer Danny Casolaro.
Inside The Gemstone File also includes for first time previously
unseen Gemstone artifacts, including an actual Bruce Roberts
letter. It also provides commentary on Gemstone by such noted
researchers as Robin Ramsay and Jim Hougan, a new a essay on
connections to the James Bond movies by popular author David
Hatcher Childress, plus interviews, Onassis and Hughes bios, and
a chapter on the mysterious deaths of conspiracy researchers.
Assembled by Kenn Thomas, the vaunted publisher of the
conspiracy magazine Steamshovel Press, Inside the Gemstone File
brings the reader closer than ever to the Gemstone intrigue,
some of the wildest, most controversial material in the history
of conspiracy.
(1999, 250pp, 6x9, photos) $16.00



Net Spies: Who's Watching You on the Web?

by Andrew Gauntlett

Do you have a private life? If you think you do, you may have to
think again. The World Wide Web poses a threat to the personal
privacy and rights of all of us—whether or not we use a
computer. Our financial and confidential details are stored on
hundreds of computers and most are vulnerable to being hacked
via the phone line, Corporations monitor our online activity,
building consumer profiles so they can manipulate our spending.
Governments are currently spying on our emails, telephone
conversations and faxes, using the latest technology. Even our
most intimate moments are vulnerable—hidden webcams broadcast
from public toilets and changing rooms to Internet pay sites,
catering to the dubious needs of "cyber-voyeurs." In this book,
Andrew Gauntlett shows how the Internet is a double-edged sword;
offering untold benefits, and posing dangers that have yet to be
addressed by companies, the media or governments. Net Spies
assumes no knowledge of computers, but offers hints and tips on
how to safeguard your privacy in the Information Age.
(1999, 170pp, 6x9) $14.95

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to