-Caveat Lector- [radtimes] # 163 An informally produced compendium of vital irregularities. "We're living in rad times!" ----------------------------------------------------------------------------------------------------------- How to assist RadTimes--> (See ** at end.) ----------------------------------------------------------------------------------------------------------- Contents: --Hospitals Nurse Workforce Shrinking --Barr would restore U.S. license to kill --The Narrow Separation of Press and State --The Largest Spy Agency Falls Behind --Some practical advice on protecting your identity online --Robots predicted to take over on the battlefield --Far from terrorism, ELF engages in selfless acts to protect future =================================================================== Wednesday, Feb. 14, 2001 Hospitals Nurse Workforce Shrinking <http://news.findlaw.com/ap/o/1110/2-14-2001/20010214091223450.html> WASHINGTON (AP) _ Health experts are warning Congress that the nation's pool of registered nurses will shrink in the next 20 years _ leaving a boom of retirees without skilled caregivers. "When you visit your father after a coronary bypass or your mother in an Alzheimer's unit, you expect a competent nurse to be there," Linda Hodges, a nursing college dean from Arkansas, told the Senate Health, Education, Labor, and Pensions subcommittee on aging issues at a Tuesday hearing. The hearing on how much the federal government should pay for recruiting or keeping nurses came as the Health and Human Services Department prepared to release new figures Wednesday on the nursing work force. Preliminary data show the nursing work force has risen, but it is also growing older. And fewer nurses are entering the profession below the age of 30 and fewer are earning advanced degrees and training. Figures provided by the Senate on Tuesday shows out of 2.7 million licensed registered nurses, 2.2 million were employed as nurses in 2000. That is compared with the 2.5 million licensed to practice, and 2.1 million employed in the 1996 government survey, conducted by the department's Bureau of Health Professions. From 1996 to 2000, the average age of registered nurses has risen from 44.3 to 45.2, the Health Department figures show. Federal officials and nursing groups agree the nation will experience an acute shortage of registered nurses starting in 2010, when today's nurses start to retire. But age isn't the only factor. Experts said at the Senate hearing: Mid-career departures are cutting into the talent pool. Fewer young people are taking up the profession. And the 94 percent of women in nursing are increasingly finding doors opening in business, law and other male-dominated careers. "Nurses tell me they feel undervalued, overworked, and underpaid," said Sen. Barbara Mikulski of Maryland, the top Democrat on the Senate panel. Sen. Tim Hutchinson, R-Ark., who chairs the subcommittee, said senators would introduce a plan in the next few weeks that would include grants for nursing scholarships and training programs. In the meantime, witnesses said, the need for specialized care is already eating into local and state budgets. Last November, nursing shortages forced Johns Hopkins Hospital in Baltimore to leave 10 percent of its surgical beds unfilled, delaying or canceling some surgeries. Health care needs are too unpredictable for hospitals not to be prepared with enough staff, said Brandon Melton, who oversees hiring for the Denver-based Catholic Health Initiatives system of 120 not-for-profit health centers. "We have no control over flu outbreaks, highway accidents, or the scores of other emergencies that erupt on a daily basis," he said. Witnesses called for an increased federal role. ---- On the Net: Senate Health, Education, Labor, and Pensions Committee: <http://www.senate.gov/labor/107Hearings/107hearings.htm> Health Resources and Services Administration: <http://www.hrsa.gov/> =================================================================== Barr would restore U.S. license to kill <http://www.washtimes.com/world/default-200129212114.htm> By Tom Carter THE WASHINGTON TIMES Moammar, Saddam, Fidel: Watch your backs. Rep. Bob Barr, Georgia Republican, has introduced legislation that would restore the president's license to order a hit on a foreign leader, if that individual were deemed a threat to U.S. personnel or national security. "The United States already takes actions clearly designed to remove foreign leaders. In the 1980s, we took actions clearly designed to remove [Libyan President] Moammar Gadhafi," said Mr. Barr, in his office yesterday. "People may pretend that we don't do these things, but these are precisely the type of actions that we sometimes take. It is better policy to be more honest and recognize the president does and should have this authority." Most observers say that Congress is unlikely to do much with Mr. Barr's bill. "The House leadership from both parties will be very reluctant to step into a debate that so clearly involves the separation of powers and what is clearly a matter of presidential decision-making," said a senior Republican staff member who spoke on the condition of anonymity. Called the Terrorist Elimination Act of 2001, the bill would nullify several executive orders that prohibit political assassinations by U.S. employees. So far the bill has no co-sponsors and Mr. Barr said that he had "no idea" if the legislation would win approval. "I've introduced it this year, just like I did last year, because these executive orders arbitrarily limit the options available to the president when dealing with terrorists," he said. President Ford first signed an executive order on Feb. 18, 1976, which contained a clause prohibiting employees of the U.S. government from political assassinations. "No employee of the United States government shall engage in, or conspire to engage in political assassination," reads the "Prohibition of Assassination" section of Executive Order 11905. President Reagan added clauses to tighten the restrictions and to clarify that the restrictions also pertained to the intelligence community. Mr. Barr said he had no specific foreign leader in mind when writing the bill. The measure has been referred to the International Relations Committee. The president has the authority to rescind the executive orders of his predecessors without any act of Congress, Mr. Barr noted. And he said he has written to President Bush urging him to do so. "Executive orders currently prohibit our military from deliberately removing a terrorist leader. . . . I respectfully request that you rescind" the specific sections that "limit the United States from dealing with international terrorist threats," said the Jan. 31 letter. But if he is unwilling to do so, Mr. Barr said, Congress should do it for him as a matter of principle. Neither the White House nor the House International Relations Committee had comment yesterday. Official U.S. attempts to shorten a political leader's career were not unknown in the past. President Kennedy ordered assassination attempts on Cuban President Fidel Castro, employing failed hit squads and poisoned cigars. Since Mr. Ford's order, and the subsequent provisions to tighten the restrictions, presidents have had to resort to less-direct methods, like aerial bombing raids, in hopes the collateral damage might eliminate hostile leaders." =================================================================== The Narrow Separation of Press and State http://www.alternet.org/story.html?StoryID=10416 by Norman Solomon January 30, 2001 It was a remarkable comment that passed without notice. After interviewing the new White House chief of staff, a network anchor bade him farewell. "All right, Andy Card," said CNN's Judy Woodruff, "we look forward to working with you, to covering your administration." If major news outlets were committed to independent journalism, Woodruff's statement on national television Jan.19 would have caused quite a media stir -- as a sign of undue coziness with power brokers in Washington. But it was far from conspicuous. Woodruff's remark was matter-of-fact. Warm collaboration is routine. Many reporters work closely with each new crew of top government officials. Leading journalists and spinners in high places are accustomed to mutual reliance. That's good for professional advancement. But the public's right to know is another matter. "The first fact of American journalism is its overwhelming dependence on sources, mostly official, usually powerful," Walter Karp pointed out in Harper's Magazine a dozen years ago. Since then, the problem has grown even more acute. A multitude of journalists advance their careers by (in Woodruff's words) "working with" movers and shakers in government. Reporters with outsized reputations for investigative vigor -- Bob Woodward, for example -- may be the most compromised. Behind the scenes, the tacitly understood tradeoffs amount to quid pro quos. Officials dispense leaks to reporters with track records of proven willingness to stay within bounds. "It is a bitter irony of source journalism," Karp observed, "that the most esteemed journalists are precisely the most servile. For it is by making themselves useful to the powerful that they gain access to the 'best' sources." While some fine journalism, assertive and carefully researched, gets into print and onto airwaves every day, the islands of such reporting are drowned in oceans of glorified leaks and institutional handouts. But democracy is only served when journalists keep searching for information that officials hide. On the surface, concerns about scant separation of press and state might seem to be misplaced. After all, don't we see network correspondents firing tough questions at politicians? Isn't the press filled with criticism of policymakers? Well, kind of. We're encouraged to confuse partisan wrangles with ample debate, or -- in the case of certain TV shows -- high decibels with wide diversity. To a great extent, mainstream media outlets provide big megaphones for those who already have plenty of clout. That suits wealthy owners and large advertisers. But what about democratic discourse? In general, news coverage of political issues is about as varied as the array of views propounded by the hierarchies of the Democratic and Republican parties. When there's bipartisan agreement on particular topics -- such as the wisdom of keeping 2 million Americans behind bars or the value of corporate globalization -- the media space for debate tends to be very limited. Consensus among major-party leaders has a way of circumscribing the mass-media arena. With huge conglomerates more enmeshed in media ownership and advertising than ever, news operations are under heightened pressure to promote corporate outlooks, dovetailing with rightward trends in governance. It's true that business has always dominated government policymaking. But in recent times, mitigating interests -- often known in mediaspeak as "special interests" -- have been increasingly expunged from serious consideration. "What is new about the situation today is that a seemingly irreversible mutation in the American system has occurred," syndicated columnist William Pfaff wrote in mid-January. "At some point, quantitative change does become qualitative change. The point when that change took place was probably 1976, when the U.S. Supreme Court ruled that money spent in support of a political candidate is a form of constitutionally protected free speech. Moneyed interests now finance not only the winners of national elections but also most of the losers." Pfaff's column appears most prominently in the International Herald Tribune. Based in Paris, he has a clear-eyed view of big money's leverage over U.S. politics: "This is part of the enlarging domination of American life by business corporations and their values, which are those of material aggrandizement, a phenomenon accompanied and promoted by the circuses and gladiatorial contests provided by the most important U.S. industry of all, entertainment, which now showcases elections and even wars as entertainments." We need wide-ranging news media. And that's unlikely as long as most "journalism" resembles stenography for the powerful -- and very few eyebrows get raised when a network anchor tells a key official of an incoming administration that "we look forward to working with you." =================================================================== National Security Nightmare http://cbsnews.com/now/story/0,1597,266857-412,00.shtml The Largest Spy Agency Falls Behind Secret Operation Opens Up About Its Needs To Advance Soviets' Technology Was Easier To Crack Than Bin Laden's (CBS) The National Security Agency is the largest spy agency in the United States, and perhaps the world. Twice as big as the CIA, the NSA eavesdrops on communications all over the world. News cameras have never been allowed inside - until now: Correspondent David Martin provides a look at America's most secret spy agency, which is located on 350 acres, south of Baltimore, studded with giant antennas and protected by barbed wire and guard dogs. A phone call intercepted by the NSA is often the first warning that a terrorist like Osama bin Laden is planning an attack against Americans. To find that threatening phone call, email or radio transmission among the billions made daily, the NSA relies on rooms of supercomputers. But the NSA has fallen on difficult times. In January 2000, General Mike Hayden, the director of the NSA, got a call from the agency's watch officer alerting him that all of its computers had crashed. "He told me that our computers were down," Hayden recalls. "We were dark. Our ability to process information was gone." As much of the East Coast dug out from a surprise snowstorm, Hayden went on closed circuit television to warn his work force what was at stake. "I said, 'This is secret. This can't be the second half of a sentence that begins, 'Honey, you won't believe what happened to me at work today,'" Hayden says. "NSA headquarters was brain dead. We had some residual ability at our locations around the world, but I don't want to trivialize this. This was really bad," Hayden remembers. The computers were back up in three and a half days, but there was no denying the enormity of what had happened. The NSA's problems went beyond overworked computers. But almost none of this was understood outside the highly secretive organization. Does the NSA eavesdrop? "We're involved in signals intelligence," explains Hayden, the NSA director. Signals intelligence means operating listening posts all over the world to intercept billions of radio transmissions, phone calls, emails and faxes and to uncover terrorist plots and other foreign threats to the United States. But the NSA will never reveal what all these antennas are listening to. "If the target didn't think he or she was communicating privately, they wouldn't communicate," Hayden says. "The key to this business is actually doing what your adversary believed to be impossible." At the epicenter of the NSA, intercepted communications are continually funneled through an operations center directed by Richard Beraradino. The NSA hears what some of our adversaries are saying as they say it, or as Beraradino puts it, "intelligence that's flowing from the horse's mouth." Conversations of air defense gunners preparing to take a shot at an American plane over Iraq are monitored and warnings are sent out via a top-secret chat room. The NSA has a gamut of security devices to protect its secrets. There is a finger identification system and scanners that can recognize eyeballs. Office keys are never taken home; they're issued by machine each morning. Some of what goes on here is straight out of a James Bond movie. Dave Murley is working on a computer that can recognize a face. It would only allow access for authorized users. At the NSA even the trash is a government secret. The NSA gets rid of 40,000 pounds of classified documents each day, by recycling them into pulp shipped off to become pizza boxes. Until recently NSA employees were forbidden to tell their neighbors or families their profession. On any given day, the majority of intelligence that shows up in the president's morning briefing comes from NSA, considered by many to be the cornerstone of American intelligence. Some might therefore be alarmed to read a report by a team of NSA insiders concluding that the "NSA is in great peril." "We're behind the curve in keeping up with the global telecommunications revolution," Hayden declares. The NSA is now trying to play catch-up to Silicon Valley and the cell phones and computers that have proliferated all over the world. "In the previous world order, our primary adversary was the Soviet Union," Hayden explains. "Technologically we had to keep pace with an oligarchic, resource-poor, technologically inferior, overbureaucratized, slow-moving nation-state." "Our adversary communications are now based upon the developmental cycle of a global industry that is literally moving at the speed of light,...cell phones, encryption, fiber optic communications, digital communications," he adds. Documents introduced at the trial of the four men accused of blowing up two American embassies in Africa indicate that the NSA was monitoring Osama bin Laden's satellite phone as he allegedly directed preparations for the attack from his hiding place in Afghanistan. Even so the NSA was unable to collect enough intelligence to stop it. "Osama bin Laden has at his disposal the wealth of a $3 trillion-a-year telecommunications industry," Hayden says. The NSA's nightmare is terrorists like Osama bin Laden using technology developed in the United States to hide their plans to attack Americans. One way they can do it is via a software program to make messages unreadable. An independent computer programmer, Phil Zimmermann, developed the program, which he calls Pretty Good Privacy. He distributes it for free on the Internet as a protest against government surveillance. "We don't want to leave behind the privacy that we enjoyed before all this new technology came in," Zimmerman says. This is cryptography for the masses. "I can't think of a way of making it available to the good guys without also making it available to the bad guys," Zimmerman says. So a person who wants to protect their credit card number has the same access to Pretty Good Privacy as a terrorist. "It bothers me a great deal but I don't know how to solve that problem," he says. And that's a big problem for the NSA. "There are a lot of unbreakable (codes), and we keep working on them to change them into the breakable category," says Bob Bogart, who teaches a beginner's code-breaking class at the NSA, but computer-generated codes like Pretty Good Privacy are light-years beyond that. It can be very frustrating to work on a code that is theoretically unbreakable, Bogart says. "I know people that have worked on codes...and ciphers, for decades." Is Zimmermann's Pretty Good Privacy unbreakable? "It may be unbreakable, but we may be able to break it, who knows," he says. "The longer they think that, the more they'll use it, and then...the more of a chance we have to break it," Zimmerman says. The best code breakers tend to be people with musical aptitude, which explains all the bands at the NSA. But it also takes supercomputers - some of them capable of performing more than 1 trillion operations per second - to help decipher unreadable jumbles of letters and numbers. When he became director two years ago, Hayden commissioned two studies of the organization and received a scathing indictment of a stagnant and unwieldy government bureaucracy: There is "confusion and paralysis," the reports said. "We have run out of time." Instead of hiding the problems, Hayden made sure those scathing reports were circulated inside and outside the NSA. Hayden is working to tear down some of the NSA's high walls of secrecy. Those walls kept the NSA's secrets safe but they also kept out the ideas and innovations the agency needs to stay vital, he says. So far, his transformation is still a work in progress: "This is about an agency that's grown up in one world, learned a way to succeed within that world and now finds itself in another world, and it's got to change if it hopes to succeed in that universe," Hayden says. =================================================================== Some practical advice on protecting your identity online <http://www.csmonitor.com/durable/2001/02/15/p18s1.htm> It's possible to conduct personal and business matters on the Internet - and still maintain your privacy. By Tom Regan Staff writer of The Christian Science Monitor THURSDAY, FEBRUARY 15, 2001 You are being watched. Followed. Tracked. Your every move is monitored. "They" know many things about you - the places you visit, where you shop, what kind of ice cream you like to eat, how much money you make in a year, your Social Security number, your favorite musician. The list goes on. No, this isn't a promo for an episode of "The X-Files." Nor is it something from the realm of makebelieve. If you're on the Internet, and if you're not being vigilant, it is possible for governments and companies to compile all sorts of information about you and your family. Occasionally, you'll hear someone (normally someone defending the questionable habits of a company caught snooping on people) say that trying to keep our personal information safe online is useless, because with a little effort, most of the information can be found through other methods. Perhaps that is true. But if you're interested in making an effort to preserve your privacy online, there are several things you can do. Turn off your cookies Simple and effective, but it can be annoying. Cookies are small text files placed on your computer by Web sites. In some cases, they allow you to come and go from a Web site without having to enter a username or password each time. (The New York Times site works this way.) Other sites use them to track your movements when you visit their Web pages. Whatever the reason, cookies provide companies with information on your Web surfing habits. Newer versions of Microsoft Internet Explorer and Netscape's Communicator browsers allow easy deletion of cookies. Or you can just turn them off completely, although this means you won't be able to visit some sites. If you want to know how to disable your cookies, use any good search engine and enter the words (without the quotes) "cookies AND disable," and you'll find lots of information on how to do it. Develop an alter-ego Many Internet Service Providers and commercial online companies allow you to create more than one account. For instance, AOL allows you to create up to seven accounts on one main subscription to their service. This allows you to have one account for personal e-mail, and another for commercial purposes. Even better, AOL allows you to turn off the "receive e-mail" function. So you can give companies a legit e-mail address, but not receive any e-mail from them or any of the companies to which they will sell your e-mail address. Surf or buy anonymously If you are really concerned about your privacy, this option may be your best bet. There are now online privacy protection companies that will allow you to surf and shop on the Web anonymously, sometimes for a fee. Two examples of this trend are eCognito.com and Freedom.net. eCognito.com acts as a broker between merchants and online users. When you register for the eCognito service (which is free), you download software that allows you to shop anonymously with participating merchants. The merchant is provided only with an identifier from eCognito that allows you to make your purchase without sharing your creditcard number, e-mail address, etc. The merchant can still personalize services or contact you by e-mail, but only if you have opted for that feature. Plus, eCognito provides a different identifier to each merchant you visit, so they can't get together and 'compare notes' on your shopping habits. Freedom.net is a Canadian company that offers a program that enables you to surf the Web anonymously. Their free software allows you to protect your PC from being hacked, removes ads from your Web browser and manages your cookies so that you can delete them at will. For $49.95 a year, you can purchase their high-end services, which allow you to send and receive untraceable, encrypted e-mail (using your regular e-mail account), and to anonymously browse and chat. Buy a Mac and avoid using Microsoft Outlook for e-mail If you worry about being hacked, buy a Mac. It's not that crackers (bad-guy hackers) couldn't burn Mac users, but the larger number of PC users make them a much more attractive target. So, most crackers spend their time working on ways to crack PCs. Mac is also a more secure platform, primarily because it doesn't have a command shell or allow remote logins (unless you force it to do so). The same is true of Outlook. It's a great program, with great features, but almost every e-mail virus, bug, worm, Web bug, etc., is designed to bring Outlook down. An alternative is Eudora, a good e-mail program that doesn't seem to suffer from as many problems. Pay attention There is a wealth of information about your privacy and how to protect it on the Web. Two great websites to put on your bookmark list are www.privacyfoundation.org and www.epic.org (the Electronic Privacy Information Center). The Privacy Foundation is part of the Privacy Center at the University of Denver. The site's chief technology officer is Richard Smith, the man most responsible for media focus on Internet privacy. You can subscribe to his free e-mail tip sheet, which keeps you up to date on the latest attempts to invade your privacy and what you can do to protect yourself. EPIC is a public interest research center based in Washington. It offers a great collection of online resources about privacy and also provides information on how you can act politically to motivate your government representatives to protect your privacy. As I said earlier, it may be impossible to totally protect privacy online. But there's no need to throw up your hands and give up. If you use the methods listed above, you'll go a long way toward making your online experience a more private, less intrusive one. -- Top 12 Ways to Protect Your Online Privacy <http://www.eff.org/pub/Privacy/eff_privacy_top_12.html> =================================================================== Robots predicted to take over on the battlefield <http://www.thetimes.co.uk/article/0,,2-80569,00.html> BY MICHAEL EVANS THURSDAY FEBRUARY 08 2001 ROBOTIC power on the battlefield could replace manpower by the year 2030, according to the new Ministry of Defence report. "Unmanned systems might be used for operations deemed too risky for humans," it said. There is no specific reference to America's proposed "Son of Star Wars" national missile defence system, under which ground-based interceptors would be guided by space-based sensors and satellites to knock out any rogue state's ballistic missiles. The report, however, did acknowledge that measures would be needed to counter the whole range of new threats arising in the future. There was no stopping technological advance, and although arms control measures could "significantly reduce risks or make them more predictable" some adversaries would not be party to the international agreements and would not be operating under the same restrictions. The report says that by 2030 machines would be developed with artificial intelligence. They would be able to gather information about the battlefield and, acting autonomously, make "intelligent judgments" about what action to pursue and what kind of risks were involved. These machines could "improve our ability to remove personnel from the front line", the report said. The MoD also envisaged "long-endurance remotely deployed systems" and micro unmanned airborne vehicles over the battlefield. However, the dramatic advances in technology between now and 2030 would also increase the range of military options that were available to potential enemies. Vastly superior computers, using quantum processing, would make a "staggering" difference to weapon power. The report gave a warning that Russia, China, Israel and North Korea were all expected to continue developing their weapon export business, and said that "such sales may lead to a said narrowing of the technological gap between Nato and some potential adversaries". =================================================================== Far from terrorism, ELF engages in selfless acts to protect future Hoosier Times <www.hoosiertimes.com> 02/08/01 Guest Column David Haberman is an associate professor of Religious Studies at Indiana University who teaches on the subject of religion and ecology. On Nov. 8, 1986, members of the Sea Shepherds, a radical environmental group, targeted three ships anchored in the Reykjavik harbor in Iceland that were still used for whaling in clear violation of International Whaling Commission regulations. Before boarding the ships the Sea Shepherds took an oath not to injure a living being in any way (Sea Shepherds also take an oath not to use weapons or explosives). A night watchman was discovered sleeping on one of the ships; this ship was left afloat. Valves on the other two ships were opened and soon the ships rested ruined on the harbor floor, at a cost later estimated at $2.8 million. The Sea Shepherds then left the country; if caught they would have been prosecuted severely by Icelandic law. Why would people risk imprisonment to save whales at no economic gain to themselves? A growing number of individuals are risking their lives in order to defend nonhumans and ecosystems by destroying physical property that threatens these life forms. These groups include the Sea Shepherds, the Earth Liberation Front (ELF), and the Animal Liberation Front. More fruitful public debate would be gained through a better understanding of these groups. A sharp line of distinction must be drawn between the actions of these groups and "violent terrorist" groups that use guns and bombs to promote their agendas. As a professor of religious studies I am committed to the idea that judgment should follow understanding; judgment that precedes understanding is called prejudice. I am interested in neither condoning nor condemning the actions of these groups, but am concerned that an important distinction has been lost in recent public debate. All of the groups mentioned above are committed to nonviolence; many individuals associated with these groups undergo strict training in the discipline of nonviolence. However, ELF, the group that has supposedly claimed responsibility for the destruction of property in our area, has been labeled as a "violent terrorist" group by some of our local leaders. >From an impassioned position of moral outrage, it has even been suggested that they have used guns. This is a dangerous accusation that may lead to unjust prosecution. ELF members may have been known to throw a pie in the face of individuals they believe responsible for actions destructive to the environment, but the distinction between a pie and a gun should not be lost. To be sure, some radical environmentalists have maintained that respect for life takes precedence over respect for property which is used to take lives, and have asked: If a person were coming after you or a helpless being with a weapon, would it be acceptable to destroy the weapon, even if this involved the destruction of property? However one answers, it must be conceded that the destruction of property is not the same as the destruction of life. What, then, motivates such radical environmentalists? The answers surely must be complex and varied, but a general position can be identified from their publications. Some take very seriously what contemporary scientists are telling us: that all life forms are radically interrelated. This means that by protecting a forest one is in effect protecting oneself. Others believe that healthy old-growth forests must be maintained. Harvard University biologist E. O. Wilson argues publicly and persistently that healthy old-growth forests are essential to a healthy human future. Polls indicate that most Americans, including the people of Indiana, want commercial logging on our public lands to stop. Yet it continues. The world's leading scientists have announced repeatedly that we are heading rapidly toward environmental collapse. This adds up to such great frustration for some individuals that they are driven to actions declared illegal. Years ago, tree spiking was an effective means to preserve a forest. A forest was spiked (relatively harmless to the tree) and an obvious sign stating this was posted. Removing the spikes cut too far into the profits of a commercial logging operation, so the forest remained standing. The intention was clearly to protect the forest, not to injure loggers. Today, however, logging companies are willing to risk the lives of their workers by cutting a forest even after it has been spiked. For this reason, recent articles in radical environmental publications, such as Earth First! Journal, have called for a national halt to tree-spiking. It simply is no longer effective in today's economic climate. An act such as theft results in economic gain for the individual who performs the act. But what is the economic gain here? Individuals engaged in such acts, whether misguided or not, are following a commitment to a vision of human responsibility that transcends individual self-interest. They often act out of a deep sense of connectedness to all life. They are not terrorists as the word is commonly defined, but see themselves as protectors of life with a vision beyond economics. =================================================================== "Anarchy doesn't mean out of control. It means out of 'their' control." -Jim Dodge ====================================================== "Communications without intelligence is noise; intelligence without communications is irrelevant." -Gen. Alfred. M. Gray, USMC ====================================================== "It is not a sign of good health to be well adjusted to a sick society." -J. Krishnamurti ====================================================== "The world is my country, all mankind my brethren, and to do good is my religion." -Thomas Paine ______________________________________________________________ To subscribe/unsubscribe or for a sample copy or a list of back issues, send appropriate email to <[EMAIL PROTECTED]>. ______________________________________________________________ **How to assist RadTimes: An account is available at <www.paypal.com> which enables direct donations. If you are a current PayPal user, use this email address: <[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up and contribute. The only information passed on to me via this process is your email address and the amount you transfer. Thanks! <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om