-Caveat Lector-

[radtimes] # 190

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
Send $$ to RadTimes!!  -->  (See ** at end.)
-----------------------------------------------------------------------------------------------------------
Contents:

--U.S. Cyber-Chief Warns of Weaknesses
--Carnivore and Net censorship will save the children
--Darpa mobile project preps 'soldier's radio'
--Concealed-Carry States Have Reduced Crime Rates
--Supersecret NSA said to be falling behind in tech advances
--Summit police to get plastic bullets
--Canada Cracks Down On Hell's Angels
--Fingerprint May Soon Be Needed to Buy Groceries

===================================================================

Wednesday March 21, 2001

U.S. Cyber-Chief Warns of Weaknesses

<http://dailynews.yahoo.com/h/nf/20010321/tc/8348_1.html>

By Robyn Weisman, www.NewsFactor.com

The new director of the National Infrastructure Protection Center (NIPC)
told news sources Tuesday that online terrorism and other types of
cybercrime could gravely affect the U.S. economy unless federal agencies
and corporations work together more closely than they have in the past.

Ronald L. Dick, who was appointed Tuesday to the top post of the
multi-agency organization, said that most sections of what he termed the
United States' critical infrastructure, including electric power plants,
federal offices and vital computer systems, are susceptible to everyone
from rogue nations to disgruntled employees.

As he introduced his new NIPC colleagues -- many of whom were culled from
the CIA and the U.S. Department of Defense (DOD) -- Dick said that there
are approximately 1,400 open cybercrime investigations and that the number
is increasing daily. He also disclosed that, on average, 50 new computer
viruses are generated each week, all of which have the potential to cause
damage.

Information Warfare

"Information warfare is obviously something the United States, the National
Security Council, the Department of Defense, the CIA, the FBI and our
private-sector partners are very concerned with," said NIPC's Leslie G.
Wiser Jr., who, like Dick, is an FBI veteran. "We are picking up signs that
terrorist organizations are looking at the use of technology" as a means of
causing future economic destruction.

While agreeing with Wiser, Dick stressed that the most pressing problem
facing both the public and private sectors is a dearth of effective safety
measures to prevent former employees from assaulting computer networks that
are critical to trade.

Said Dick: "The biggest threat is the disgruntled employee, who can do
tremendous damage."

Charles Kolodgy, a research manager at Massachusetts-based IDC, concurred
with Dick's assessment.

"We need to raise the bar on what are accepted security practices within
industry," Kolodgy told NewsFactor Network, adding that sometimes those
practices are as simple as warning employees not to open suspicious e-mails.

Internal NIPC Dissension

Despite the pressing need to protect the national infrastructure, friction
between the federal outfits that comprise the NIPC has thus far hobbled the
agency's pursuit of that objective. In particular, the relationship between
the DOD and the FBI has caused a great deal of dissension.

Kolodgy told NewsFactor that much of the discordance between the FBI and
the DOD stems from budgetary issues. Since both agencies contribute
manpower and resources to the NIPC, differences of opinion have arisen over
who picks up what percentage of the tab for the agency and who has the most
power.

"This friction exists between the DOD and the FBI because of the
differences in their respective missions," Kolodgy said. "The DOD's most
immediate concern is national security, and they distrust the FBI's agenda.
Is it [the formerly-named] Carnivore, or monitoring for criminal activity?"

Added Kolodgy: "The DOD is more apt to stay behind the scenes, whereas the
FBI, whose primary role is prosecution, tends to be out in the public space."

Working Together

Dick admitted that cooperation between U.S. agencies must improve in order
for the NIPC to succeed.

"Any time that you create something new, there are problems getting the
right people on board," Dick said. "I want to instill a new sense of
ownership and urgency.

Added Dick: "The true success in being able to deal with these issues is
building partnerships."

The decision to hire Rear Admiral James B. Plehal, a DOD operative, as
Dick's deputy director appears to be a step in that direction.

"All of what we do concerns relationships," Plehal said. "We at DOD need to
better demonstrate our commitment."

Relationships Can Succeed

IDC's Kolodgy believes that though the NIPC "still has a long way to go,"
the various agencies involved will be able to work out their differences.

"These things do work," said Kolodgy, "because outside the cyber-realm
there has been tremendous cooperation between the DOD, the FBI and
corporations against terrorist threats. The airline industry is a prime
example."

===================================================================

Carnivore and Net censorship will save the children

http://www.theregister.co.uk/content/6/17822.html

23/03/2001

This is the second in a series of stories examining firsthand how
pedophiles use the Internet.

There is perhaps no group more universally despised than pedophiles, and
with good reason, we'll add freely. No sensible person would dispute that
children are by nature defenseless relative to adults, both physically and
mentally, and therefore entitled to greater civil protections.

That said, responsible citizens may well be alarmed by efforts to
exaggerate the danger of on-line sexual exploitation and contamination of
children as a pretext to justify increased government surveillance and
censorship on the Internet.

Indeed, an extremely complex struggle over Internet privacy and content
restrictions is underway in courts and legislatures around the globe; and
make no mistake, child-protective rhetoric echoes loud throughout.

Because the United States possesses the most loudly self-proclaimed
'tradition' (many would say 'myth') of individual liberty, along with some
of the most Draconian, anti-libertarian initiatives pending in its courts
and Congress, it serves handily to illustrate the almost schizophrenic
battle between two universal human instincts: our natural tendency to
protect children, and our natural tendency to seek privacy and to confront
un-edited information and evaluate its significance for ourselves -- along
with the cynical ways that governments and 'family-values' advocates are
using the former as currency to bribe us into surrendering our rights to
the latter.

Terrorists, drug lords and....pedos?
History will remember the Clinton Administration for Monica, certainly; but
it will remember it as well for doing more damage to individual civil
liberties than any administration prior to the shocking revelations of the
Church Committee back in the mid-1970's. Former US Attorney General Janet
Reno's wiretap-happy Department of Justice (DoJ) in particular sought
relentlessly to secure ever-broader authority to monitor Internet activity.

Reno sought, for example, to circumvent the Privacy Protection Act of 1980
(PPA), which protects publishers and journalists, researchers, authors and
academicians, by forbidding the Feds from seizing, or even examining, data
meant for publication along with its supporting documentary information
such as notes, transcripts and related research materials.

"Because computers now commonly contain enormous data storage devices,
wrongdoers can use them to store material for publication that the PPA
protects while simultaneously storing child pornography, stolen classified
documents, or other contraband or evidence of crime," a White House
committee chaired by Reno concluded last year in a contemptible report
typical of this inclination.

"Features of the Internet that make it different from prior technologies
may justify the need for changes in laws and procedures that govern the
detection and investigation of computer crimes," the Reno committee said
chillingly.

We know what "changes in laws and procedures" means. It means that the
Internet and its presumably vast population of pedos justify streamlining
warrant procedures and expanding government intrusion to save the tender
sprouts we all, quite rightly, love and wish to protect.

Also last year, White House Chief of Staff John Podesta insisted that
government surveillance of citizens suspected of 'computer crimes' must be
made easier for federal law enforcement agents, whole speaking at the
National Press Club in Washington.

Blanket trap and trace orders should be permitted without prior court
approval during an 'emergency', Podesta cheerfully recommended.

Back in mid-1999, Reno was touting a draft proposal for what she called a
"Cyberspace Electronic Security Act", expanding a little-used law enabling
the Feds to obtain warrants to sneak into private premises and install
hidden recording devices. In this case, the black-bag job would be done on
a suspect's computer.

Assistant Attorney General Jon Jennings' letter to House Speaker Dennis
Hastert, entreating him to drum up congressional support for the scheme,
was a classic piece of Clinton/Reno child-protective drivel appealing to
the need for rapid action in such emergencies as "stopping a terrorist
attack or seeking to recover a kidnapped child, [where] time is of the
essence and may mean the difference between success and catastrophic failure."

One man's terrorist may be another man's patriot; but no one admires a
pedo. This is why Reno and her minions never dared open their mouths to
advocate her pet Orwellian projects without cynically appealing to the
protection of children.

Congress loves pedos too
In mid-2000, child-protective hysteric and US Representative Robert Franks
(Republican, New Jersey) introduced a House bill requiring mandatory prison
sentences for 'cyber-molesters' who use the Internet to find underage
sexual partners. His bill would hamstring judges by imposing a minimum of
five years' incarceration for those found guilty.

The proposed legislation would apply to defendants who "establish a
relationship with a child over the Internet and then travel across state
lines for the purpose of engaging in illegal sex."

Not surprisingly, the FBI dutifully reported a 550 per cent increase in
"high-tech child molesters" since 1998, which dovetailed beautifully into
Franks' self-serving reckoning.

"Even when law enforcement is successful in catching these criminals, they
are often given lenient sentences," he lamented. "The average sentence for
the crime is just 18 months in jail."

He fretted that judges have been "ignoring the seriousness of the offence"
when a convict is otherwise law-abiding, and concluded that it's necessary
for Congress to choose sentences for them. "Those sick criminals who
terrorize our children, destroy their innocence and leave them scarred for
life deserve to be locked away for a long time," he said.

(Well, of course they do; but we remain convinced that judges are in a far
better position to determine what's appropriate from the bench than members
of Congress are from Capitol Hill. Call us old-fashioned....)

Also last year, the Children's Internet Protection Act (CIPA), regrettably,
was signed into law. Sponsored by US Senator John McCain (Republican,
Arizona) and US Representative Ernest Istook (Republican, Oklahoma), the
Act imposes Internet filtering requirements on public schools and libraries
which accept money from Uncle Sam. Naughty pictures, inappropriate
chatrooms and blue prose are to be rendered inaccessible to tender sprouts,
and failure to comply results in the money spigot being shut off.

The legitimate fear among perfectly reasonable and law-abiding adults,
naturally, is that public libraries will be cowed into filtering all their
computer terminals on fears of government retaliation if some brat should
get his or her hands on an open one, and thereby restrict adult research
opportunities to those appropriate for children.

An equally perverse Congressional gift is the Children's Online Protection
Act (COPA), which, among other things, makes it a crime to create,
distribute or possess any material which 'appears to depict' a child in a
sexual context.

This language, being so vague that anything the Feds dislike might be
outlawed -- morphed pics of kids where no sexual exploitation has occurred
but which nevertheless appear sexual, movies such as "Endless Love", "Fast
Times at Ridgemont High" and even the recent "Traffic" (in which,
ironically, conservative US Senator Orrin Hatch appears as himself in a
brief cameo) -- has wisely been shot down by the Third and Ninth US Circuit
Courts of Appeals.

But the DoJ is pursuing reinstatement of this imbecility before the US
Supreme Court this year. Their thin justification is that images whose
production involve no actual, real-world harm to children still cause
irreparable social ruin by satisfying the unhealthy desires of pedophiles.
Thus the innocent interests of the many have got to be sacrificed to
frustrate the perverse interests of the few. Sorry, mate, but we know best
what you ought to see.

The prude bandwagon
Public libraries are a hotbed of on-line pedo activity and must therefore
be forced to install Internet filtering software on their public computers,
pedophile psychotherapist Mary Anne Layden told a Congressional Committee
on Children and Families which convened last year to consider measures for
protecting children from Internet predators.

"What is happening in our public libraries is a national scandal," she said
gravely. After a few hours' perusal "pedophiles can...leave the library
with toxic messages and become carriers back to their jobs, their homes,
onto the streets and into the schoolyard," she claimed.

Layden said that permission-giving myths, dear to pedos, such as their
twisted notions that children actually enjoy being raped by adults, or that
such perverse relations are in fact natural and healthy, are being
propagated with unprecedented virulence via the Net. As a result,
thirty-eight percent of American girls are sexually molested before they
reach age eighteen, she claimed, citing a figure that strikes The Register
as grotesquely overstated in spite of our well-known inclination towards
pessimism regarding the darker regions of human nature.

The American Library Association (ALA), Layden says, is solely responsible
for all this savagery. The professional organization belligerently rejects
all efforts to censor content at public libraries, and proudly snubs its
nose at the idea of Internet filtering.

But the ALA has its own reading of the tea leaves. "The use in libraries of
software filters which block constitutionally protected speech is
inconsistent with the United States Constitution and federal law, and may
lead to legal exposure for the library and its governing authorities," the
organization warns.

Therefore, "the American Library Association affirms that the use of
filtering software by libraries to block access to constitutionally
protected speech violates the Library Bill of Rights."

Layden nevertheless excoriated the organization for its stubborn stance,
and for encouraging continual efforts to obstruct prudish ambitions by the
American Civil Liberties Union (ACLU). She noted that on its Web site, the
ALA even has the audacity to publish links to step-by-step instructions for
teens on how to disable filtering software.

"Libraries have become the new red-light districts," she cried.

Worse, this irresponsible atmosphere of intellectual permissiveness makes
it impossible for her to treat her pedo patients effectively, she lamented;
but she offered not one shred of factual data establishing a causal
relationship between access to library computers and crimes committed in
the real world, or any data on the frequency of such outrages.

It was pure prude Fear, Uncertainty and Doubt (FUD), but it worked on a
Congress terrified to appear soft on pedos whatever the cost in civil
liberties might be. The CIPA, as we noted above, made it into law a few
months later.

Puritanical alarmists sitting on the Child Online Protection Act (COPA)
Commission argued before Congress in mid-2000 that the US government should
forcibly defend our tender sprouts from on-line filth by imprisoning the
purveyors of electronic obscenity.

"One well-placed prosecution could send a message to the providers of this
material that it's not acceptable," COPA Commissioner and former Gary Hart
squeeze turned anti-porn crusader Donna Rice Hughes, whose more than
half-decent pair of tits may be evaluated here, recommended.

Former 'model' Rice has clearly seen The Light and accepted Jesus Christ as
her Personal Savior since her days of soft-core posing and her scandalous
overnight liaison with the then married former Colorado Senator, which
scuppered his bid for the US presidency in 1987.

She has since cast out the demons by writing a book, Kids Online:
Protecting Your Children in Cyberspace, which advocates a "more aggressive
enforcement of cyber-crime laws," and urges citizens to "remember [that]
public opinion drives public policy and law enforcement!"

And that it does, sadly.

The mainstream press swallows (the bait)
"The Web's Dark Secret" Newsweek Magazine emblazoned on its cover last
week, along with a picture of a prepubescent child. "The Web has fed a
shocking increase in the sexual exploitation of children," the subhead
confidently claimed.

Open the story and you'll be confronted with this (unsubstantiated) claim:
"before the Internet came along, pedophiles were lonely and hunted
individuals. Authorities had child pornography under control. Today,
networks of child abusers are proliferating worldwide."

The Internet accomplished it all, we're urged to believe. "Child
pornography was pretty much eradicated in the 1980's. With the advent of
the Internet, it exploded," the magazine quotes US Customs Service Cyber
Smuggling Center chief Kevin Delli-Colli as saying.

We're told of an imminent "wide sweep" against pedos (no numbers,
naturally) involving customers of a kiddie porn Web site called Blue
Orchid, which has, apparently, been infiltrated in some manner by the Feds.

Good on them for nailing a cluster of abusive sickos. But shame on them for
exploiting mainstream journos who lack the technical background to evaluate
their claims, thereby using them as a mouthpiece to spread their propaganda.

The fact is, all that can be proven thus far is that the Internet has led
to a greater awareness of pedophilia and child porn, as the diseased
bastards who trade in this filth avail themselves of its many obvious
conveniences.

Surely common sense argues that pedophilia was merely harder to track and
assess before the Internet, because doing so relied on inefficient,
difficult methods of investigation involving old-fashioned, tiring gumshoe
detective work, for which only a limited number of people are actually
qualified. Today, any fool can fire up a search engine, and with a modicum
of cleverness in forming his queries, come up with heaps of pedophilia.

The Internet clearly makes it easier to find this garbage. As to whether
more of it is actually in circulation, and whether, consequently, more
children are being raped and abused, there simply is no reliable data.

But there is rhetoric, and plenty of it, urging us to make a leap of faith
that easier access to evidence of pedophilia equates with increased
incidence of pedo activity. And the purpose behind this rhetoric, clearly,
is to justify both more convenient access by law enforcement to Net
surveillance, and censorship of anything the family-values lobby should
deem inappropriate.

The battle, however complex and nuanced in its details, can ultimately be
reduced to a single, fairly simple observation: a large number of
influential people are desperately trying to impose values on the Internet
and its users. On the other side are those who see it as essentially a
research tool, a mechanism for adult communication and not a playground for
children, best maintained permanently as value-neutral space.

We remain persuaded that what can be lost through an onerous
law-enforcement presence and mandatory censorship outweighs any advantages
to society in the name of exploited children who we doubt can trace their
heartbreaking misfortunes directly to the Net.

With this in mind the pedo lobby itself has gone to pains to portray itself
as more the victim of a witch hunt than an actual threat, and we will
therefore examine the Internet's role in pedo advocacy in our next segment.

===================================================================

Darpa mobile project preps 'soldier's radio'

http://www.eet.com/story/OEG20010321S0049

By George Leopold
EE Times
03/21/01

WASHINGTON The Pentagon's research agency is preparing to demonstrate
a "soldier's radio" next year designed to provide mobile
communications among individual troops anywhere on the battlefield.
The "infrastructure-free" radio network will be based on the Linux
operating system and will support multiple StrongARM processors,
program officials said.

The Defense Advanced Research Projects Agency (Darpa; Arlington, Va.)
said it plans to demonstrate the infantry radio concept in the field
as early as the summer of 2002. The mobile-radio program, which seeks
to provide each soldier with a high-data-rate cell phone, would rely
on "extreme frequency agility" and a new networking approach to link
infantry units spread out over a wide area.

The "soldier's radio" is being developed by a contractor team led by
ITT Aerospace and Communications (Fort Wayne, Ind.). ITT is working
with MontaVista Software Inc. (Sunnyvale, Calif.) to port embedded
Linux to StrongARM processors. Darpa has adopted Linux as part of an
open-systems approach to technology development.

Much of the impetus for the tactical radio program stems from the
explosion of mobile communications in the commercial world. "People
always ask why there are no cell phones in the field," said Paul
Kolodzy, a program manager in Darpa's Advanced Technology Office. The
reason, of course, is that there are no relay towers or basestations
on the battlefield.

The Darpa mobile-communications program, also know as the "situational
awareness system," would use high-capacity, low-power radios linked
together by a "self-configuring" network to keep soldiers connected
with each other at frequencies ranging from 20 MHz to 2.5 GHz. Kolodzy
called the architecture a "mobile, ad-hoc, peer-to-peer network" that
uses frequency-hopping technology to avoid communication intercepts
and location-finding capability in other words, situational awareness
on the battlefield but little power.

If deployed, the system could be scaled up to as many as 10,000
network nodes. The reconfigurable network would have to perform
geographical routing of mobile communications via network gateways.
"How you do the geo-routing is the biggest deal," Kolodzy said.

The planned technology demonstration next year would link 70 prototype
radios over a network utilizing MontaVista's Hard Hat version of the
standard Linux kernel and other open-source components, as well as
StrongARM processors, DSPs and FPGAs. All hardware was chosen to
reduce power consumption in the field.

The first beta version of the soldier's radio is expected to be ready
by the end of the year, program officials said.

The field tests will help determine whether the radios can avoid enemy
jamming, estimate a soldier's position when the global positioning
system isn't available and provide a link between soldiers and
battlefield sensors. Moreover, developers will determine whether they
can keep the network operating in battlefield scenarios ranging from
jungles to congested urban areas.

Potential users of the soldier's radio include the Army, Marine Corps
and U.S. Special Operations Forces, Darpa said.

Program officials and contractors are also touting the
mobile-communications program as an example of how commercial
equipment based on open-source systems can be used to get new systems
to the field faster and at lower cost. For example, ITT and MontaVista
said they were able to speed technology development by porting Linux
to StrongARM processors.

===================================================================

Concealed-Carry States Have Reduced Crime Rates

<http://www.timesdispatch.com/editorial/MGB3D0TUIKC.html>

by A. BARTON HINKLE
TIMES-DISPATCH COLUMNIST
Mar 20, 2001

Six years ago the state passed a measure making it easier for residents to
obtain permits to carry concealed weapons. State Senator Virgil Goode's
bill required circuit court judges to issue such permits unless the appli-
cant had been convicted of a felony, was a foreign national, or had been
involuntarily committed.  At the time, critics predicted blood would flow
like a river.

        - "This bill will make our streets infinitely more dangerous. This bill
will imperil our police officers. This bill is scary," said Delegate
Kenneth Melvin.
        - "This means the carnage we've seen over the past decade will continue,"
predicted State Senator Henry Marsh.
        - The bill would put guns in the hands of "every nutcake in Virginia,"
warned State Senator Richard Saslaw.
        - "You pass this bill and you'll let a whole bunch of Rambos feel
self-important and wander around back home with concealed weapons," said
State Senator Madison Marye.

SO WHAT happened? Crime decreased. Violent offenses across the state fell
to 316 per 100,000 residents in 1998 - the lowest rate in 10 years - from a
peak of 380. In Richmond, the homicide rate declined 42 percent from 1995
(the year after the city set a new record for murder), to the lowest level
in 20 years. Overall crime in the state declined 24 percent from 1991, to
the lowest level since 1975.
None of this should be terribly surprising. Individuals seeking
concealed-weapons permits must tender their applications to a judge and
submit to criminal-background checks. Somehow, it seems unlikely a fellow
planning to rob a bank would subject himself to such scrutiny. Indeed, the
Bureau of Alcohol, Tobacco, and Firearms says 93 percent of the pistols
used in crimes were obtained illegally. Those seeking permits are
law-abiding citizens.
Florida, for example, has issued more than 380,000 permits since it relaxed
its concealed-weapons law in 1987. Nine years later, only 72 permits had
been revoked because of crimes committed by license-holders, and few of
those crimes involved pistols. Here in the Commonwealth, the courts have
issued 96,506 concealed-weapons permits. Only 274 - less than three
hundredths of 1 percent - have been revoked, and of those, 17 have been
reinstated.
If anything, passage of the concealed-weapons law has made crime less
prevalent. University of Chicago
economist John Lott has researched the issue and published his findings in
More Guns, Less Crime. Even after controlling for factors such as the
cyclical decline in crime nationwide, he found that states permitting
citizens to carry concealed weapons have reduced murder by 8.5 percent,
rape by 5 percent, and severe assault by 7 percent. (A few years ago
Orlando, Florida, was suffering a rash of rapes. In response, the police
offered women a weapons-training seminar. About 2,500 showed up the first
day. Within a short time, rapes fell 80 percent.)
Lott explains the decline as a function of deterrence: Criminals prey on
the weak and defenseless. Permitting citizens to carry concealed weapons
makes the criminal's job far riskier - he never can be sure who might be
packing heat. As one felon said after Morton Grove, Illinois, banned
pistols: "When a thief breaks into someone's house or property, the first
thing to worry about is getting shot by the owner." Lott writes:
Convicted American felons reveal in surveys that they are much more worried
about armed victims than about running into the police . . . .Felons
frequently comment in interviews that they avoid late-night burglaries
because "that's the way to get shot."
The criminals' fear is well-grounded. Estimates on the use of firearms for
self-defense vary wildly, because many incidents go unreported. But even
the lowest estimate, by the Department of Justice's National Crime
Victimization Survey, reports that guns are used 110,000 times a year for
defensive purposes.
LOTT'S CRITICS have leveled ad hominem attacks against him. They point out
that he received an Olin
fellowship, and the Olin Corporation manufactures - among other things -
ammunition. Hence (they reason)
Lott's work is tainted and, therefore, invalid. The Olin Foundation's
president, the late William Simon, refuted the charge in a letter: The John
M. Olin Foundation has supported for many years a program in law and
economics at the University of Chicago Law School. This program is
administered and directed by a committee of faculty members . . . .We at
the foundation had no knowledge of who applied for these
fellowships, nor did we ever suggest that Mr. Lott should be awarded one of
them. We did not commission his study, nor, indeed, did we even know of it
until last month, when Mr. Lott presented his findings at a conference
sponsored by a Washington think tank.
The critics have resorted to personal attacks because they have so little
ground on which to challenge Lott's findings. But let's say they are right
- let's say even that Lott is a full-time employee of Smith & Wesson.
Does that in any way alter the facts in his book? Of course not. The data
are what matter, not who presented them.
And certain gun-control advocates are willing to admit as much, at least in
a dark basement with nobody else around. Among those who have permits to
carry concealed firearms are former New York Times publisher Arthur
Sulzburger and a bodyguard employed by Rosie O'Donnell - she who has said,
"There should be a law - and I know this is extreme - that no one can have
a gun in the U.S. If you have a gun, you go to jail." Better to get mugged
by reality, it seems, than by a thug in the street.

===================================================================

Supersecret NSA said to be falling behind in tech advances

http://www.siliconvalley.com/docs/news/tech/050194.htm

WASHINGTON (Reuters) - The U.S. National Security Agency, which uses
satellites and electronic listening posts to gather intelligence globally,
is falling behind in technology, causing deep concern in the spy community,
the chairman of the House Intelligence Committee said Thursday.

Rep. Porter Goss, the Florida Republican who chairs the panel, said the NSA,
once a leader in technology, is now lagging behind the fast pace of advances
and is unable to cover all necessary targets for gathering information and
data.

``NSA is the number one concern in the intelligence community right now in
terms of capability,'' Goss told the Defense Writers Group.

``It is true that there are targets that we cannot cover today that we used
to be able to enjoy coverage on, because of technology.''

NSA, probably the most secretive of the U.S. intelligence agencies, uses an
array of technology to monitor communications around the globe.

It had an edge during the Cold War because it had computer power that no one
else could match, Goss said.

``NSA is an agency that has served the country brilliantly. It is now out of
date.''

However, he added that there were ongoing efforts to turn the agency around
and bring it up to speed technologically, including through some ties with
the private sector.

``So yes there is a huge effort to create the equivalent of the new
800-pound gorilla,'' he said.

The United States also is underinvested in spies with good language
capabilities, Goss said, noting that the Central Intelligence Agency reduced
its presence in Africa and closed stations there in the early 1990s.

``Africa is a place that needs all the attention it can get,'' he said. ``To
have a reduced flow of good accurate information coming out of the continent
of Africa over the past 10 years I think has reaped a bitter harvest.''

===================================================================

Summit police to get plastic bullets

Martin Patriquin
STAFF REPORTER
www.thestar.com

``Less lethal'' guns that fire plastic bullets have been added to the
RCMP arsenal to deal with protesters at the upcoming Summit of the
Americas in  Quebec city.

But those weapons are powerful enough to crack ribs and cause extreme
pain,  according to those who have used them.

The Anti Riot Weapon Enfield, or Arwen 37, is described as ``the
first  multi-purpose, multi-shot weapon system to combine
lightweight, high accuracy and the ability to fire up to five shots
before reloading'' by its Canadian distributor, Police Ordnance
Company.

The weapon was approved for use by the force last summer, and the
RCMP has placed ``a very substantial order'' for the guns several
months ago according to Police Ordnance president Brian Kirkey. The
force would not divulge exactly how many of the guns were ordered.

The RCMP tactical force and its SWAT team will be equipped with the
Arwen 37 at the Quebec City Summit in April, said a spokesperson for
the Mounties.  Although several Canadian police emergency task forces
already use the  Arwen, it is believed this is the first time the
RCMP will be equipped with the weapon.

``The Arwen 37 was approved for our emergency response teams in our
continuing effort to resolve confrontational situations with a
minimal amount  of force,'' RCMP Sergeant Paul Marsh said.

``It is a tool at the disposal of our tactical team and I would
imagine they will  have them (in Quebec city),'' he added.

RCMP tactical squads from across the country, along with other police
forces,  will converge on Quebec City. The Quebec provincial police
force also has  bought new Arwens and 2,000 rounds of ammunition in
preparation for the  summit.

The Arwen 37 relies on severe pain to subdue a target. It is
classified as a ``less lethal'' weapon that ``has less potential for
causing death than conventional police weapons,'' said Marsh.

And it gets the job done.

``If it hits someone in a rib, it is meant to crack a rib and put
them in a lot of pain,'' said Toronto police Constable Bob Leighton,
who helps train the force's Emergency Task Force.

Tactical squads are usually required to test such less-lethal weapons
- such as  Tasers, which deliver electric shocks - on themselves. But
Leighton said it  would be ``too dangerous'' to do so with the Arwen.

`It is meant to cracka rib and put them in a  lot of pain'

The Arwen 37 fires a round 15 centimetres (six inches) in length and
3.7 cm  (1* inches) wide. The plastic slug emerges from the muzzle at
74 metres per  second, or about 160 miles per hour.

``It is equivalent to getting hit by a fastball,'' Kirkey said.

The Arwen 37 can also fire tear gas and smoke rounds, and has the
ability to five rounds in four seconds with what's considered 100 per
cent accuracy from 20 metres.

The gun can also fire special penetrating ammunition that will go
through car windshields, double-pane windows and doors.

``It will hit an adult-size torso at 100 metres with an accuracy
appropriate for its size and use,'' Kirkey said.

Designed by Royal Ordnance, a division of British Aerospace, in the
late 1960s, the weapon was meant to subdue rioters in Northern
Ireland without killing them. Officers using them are trained to aim
for the torso, though the hit can be disastrous if they miss their
mark.

A 19-year-old man was critically injured during the 1994 Stanley Cup
hockey  riots in Vancouver when he was hit in the head by a plastic
bullet fired from an Arwen 37.

Police Ordnance Company, based in Markham, will be North America's
sole  producer and manufacturer of the Arwen 37 by the fall.


===================================================================

March 29, 2001

Canada Cracks Down On Hell's Angels

By PHIL COUVRETTE
Associated Press Writer

MONTREAL (AP) _ Police raided homes and suspected Hell's Angels
hangouts across Quebec on Wednesday, arresting more than 100
suspects in a major crackdown on alleged organized crime by biker
gangs.

The raids began around dawn and continued though the day. Police
in Quebec had taken 118 people into custody by mid-afternoon, said
provincial police spokesman Andre Durocher. Two other suspects were
arrested as a result of three raids in Ontario and British
Columbia, police said.

One of the sites raided was the home of Maurice ``Mom'' Boucher,
the Hell's Angels leader in Quebec who is in custody awaiting trial
on two first-degree murder charges involving the deaths of two
prison guards.

Warrants issued in connection with the raids leveled 13 more
murder charges against Boucher and three charges of attempted
murder. Another warrant charged his son, Francois Boucher, with
murder in eight of the same deaths. It was unclear whether Francois
Boucher was in custody.

Durocher said other suspects faced a range of charges.

``We're looking at conspiracy to commit murder, murder, drug
trafficking as well as gangsterism charges and infractions related
to the proceeds of crime,'' he said.

The Quebec raids could have further repercussions for affiliated
biker operations in Ontario and Western Canada, said Cpl. Leo
Monbourquette of the Royal Canadian Mounted Police.

``Given the nature of organized crime, the Hell's Angels have
ties elsewhere in Canada,'' Monbourquette claimed. ``So, we think
today's operation will affect their operations elsewhere.''

The raids were part of an escalating battle by Canadian police
against biker gangs that police say have become networks involved
in drug trafficking and other crime.

Police say drug-trade turf wars between the Hell's Angels and a
rival group, the Rock Machine, are blamed for at least 158 murders,
169 attempted murders and the disappearances of 16 other people.

Federal laws that make it illegal to belong to an organized
crime gang have been used to convict four Rock Machine members, and
13 members of the Hell's Angels are on trial in a similar case.

The Rock Machine recently joined the Texas-based Bandidos,
expanding Canada's biker rivalry.

Police believe the Hell's Angels have about 80 members in six
Quebec chapters and the Bandidos 30 members in two chapters. In
addition, less powerful gangs working with the Hell's Angels or
Bandidos handle tasks such as collecting money from drug dealers,
according to police.

Bikers from the puppet gangs become Angels or Bandidos only
after several years of earning trust and building drug rings of
their own, police say.

===================================================================

Fingerprint May Soon Be Needed to Buy Groceries

<http://www.newsmax.com/archives/articles/2001/3/30/172528.shtml>

by David M. Bresnahan
Saturday, March 31, 2001

The day will come when you put your finger on a scanning device to prove
who you are before you engage in transactions at retail stores, ATMs, banks
and even when you buy groceries. One company making such a device is
engaged in a pilot project with the nation's largest grocery chain.
Biometric Access Corp. has teamed up with four Kroeger stores in the
Houston area to test a point-of-sale finger scanning device for retail
transactions. The pilot project has been under way for just over a year and
is working well, even though some customers don't like it, according to
Kroger spokesman Gary Huddleston.
The Kroeger stores are using the device to provide positive identification
for payroll check cashing, not for actual sales.  Huddleston says customer
acceptance is one of the challenges that must be overcome if the device is
to be used for all transactions.
"Many customers have seen the value of the security in the system.  The
finger image is positive identification," Huddleston told NewsMax.com in a
phone interview. He said a personal identification number was not very secure.
Will the finger image scanner become common in all retail stores in the future?
"I'm sure it will," said Huddleston. "Customer acceptance is one challenge,
and cost is the other challenge. As soon as we overcome those."
Use of the finger image for check cashing at the four pilot Kroger stores
is optional, but Huddleston said most customers use it once they understand
how it works and that they can get their check cashed faster if they submit
to the finger image scan.
The finger image scanner can easily be used for all point-of-sale
transactions, including the use of checks, credit cards, and debit cards,
according to Biometric Access Corp. spokesman Hal Jennings. The system is
also used for computer security and for clocking workers in and out of
work, replacing old-fashioned time cards.
The use of finger image scans is hailed by some and highly criticized by
others.
"My primary objection is to government surveillance of citizens, more so
than that of private businesses. However, the trend by retailers and
employers to use biometrics to screen customers and employees is alarming,"
said activist Scott McDonald, who has a Web site
(www.networkusa.org/fingerprint.shtml) that fights the use of fingerprints.
                     Conditioning the Public
He says the use of finger image scans by retail stores is one way the
government can "condition" the public to "accept the same kind of perpetual
scrutiny by government using the same technologies."
McDonald told NewsMax.com that he was concerned about an increase in the
number of government and business partnerships.
"It is likely the information generated by private biometric scanning by
banks, businesses, and employers will eventually be linked to, or
accessible by, government computers," explained McDonald.
Biometric Access Corp. has also established a contract with H.E. Butt
Grocery Co. in Texas "which will result in a large-scale implementation of
the SecureTouch On-Time=99 time and attendance system," Jennings said.
More than 700 units will be installed in stores using biometric fingerprint
readers to keep track of 50,000 employees as they clock in and out of work.
Biometric Access Corp. also sold 6,000 similar readers to the state of New
York for the Office of Mental Health to be used to protect highly
confidential files.
------------
David M. Bresnahan ([EMAIL PROTECTED]) is an independent journalist. An
archive of his work is available at http://InvestigativeJournal.com.

===================================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
======================================================
"The world is my country, all mankind my brethren,
and to do good is my religion."
        -Thomas Paine
======================================================
" . . . it does not require a majority to prevail, but rather an irate,
tireless minority keen to set brush fires in people's minds . . . "
        -Samuel Adams
======================================================
"You may never know what results come from your action.
But if you do nothing, there will be no results."
        -Gandhi
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________
**How to assist RadTimes:
An account is available at <www.paypal.com> which enables direct donations.
If you are a current PayPal user, use this email address:
<[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this
link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up
and contribute. The only information passed on to me via this process is
your email address and the amount you transfer.
Thanks!

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to