-Caveat Lector-

RadTimes # 124 December, 2000

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
QUOTE:
"Every ill we deplore in society...is rooted in the institution of power,
that is, in the state and the institution of private ownership...Man is at
the mercy of these two social afflictions which escape his control: they
make him petty, stingy, and lacking solidarity when he is rich, and cruelly
insensitive to human suffering when he wields power. Poverty degrades, but
wealth perverts."
--Isaac Puente, 'Libertarian Communism'
-----------------------------------------------------------------------------------------------------------
How to assist RadTimes--> (See ** at end.)
-----------------------------------------------------------------------------------------------------------
Contents:
---------------
--When The FBI Knocks, A First-Person Account
--Wireless tracking devices raise privacy concerns
--International Arms Shows -The year in review
--Engaged in an endless pursuit of dissenters
Linked stories:
        *Anti-Hacking Law to take Effect
-----------------------------------------------------------------------------------------------------------
Begin stories:
-----------------------------------------------------------------------------------------------------------
When The FBI Knocks, A First-Person Account

<http://devrandom.net/~dilinger/>

Preamble:

I'm writing this for three reasons:
1) I'm getting tired of explaining it over and over to friends.
2) I wanted to try out mozilla composer.  ;)
3) To make people aware that they're not being paranoid enough.  This
    story should scare you.

Those of you who know me know that I am in no way a script kiddie,
l33t h4x0r, or any other variation.  I'm simply an RPI student, admin,
and programmer (C/perl/whatever) who likes to dabble in cryptography,
kernel hacking, data compression, and whatever else the topic of the
week happens to be.  I also have a short attention span, skipping from
project to project, subject to subject.  I do not claim to be an
expert in any field, but I know my way around.

Story:

Last saturday afternoon (Oct. 28, ~4 PM), the FBI let themselves into
my dorm (good ol' RPI gave them the keys), waking me up.  They showed
me a badge, handed me a warrant, and took me into another room to ask
me questions. They had every intention of seizing all my computer
hardware before even questioning me, which should worry you greatly.
They initially began asking me if I was a baseball fan, which confused
me. After answering with a "no", they explained that I was under
investigation for the break in that had occurred the previous day to
the Yankees website.  I breathed a sigh of relief (my initial reaction
was "oh shit, someone's pissed about my 30 gig mp3 collection"), as I
figured I could simply explain to them what happened, and they'd leave
my stuff alone.  I was wrong.

The previous day, I was doing my usual routine for a friday with no
class; up at 7 AM, catch up on slashdot/k5/lwn/sinfest/etc, do some
coding on the project of the week (mdidentd/avifile/pharmacy/etc), and
do some homework.  Of course, the whole time, I'd be on IRC (EFNet,
OPN), talking with people.  During a conversation about Microsoft's
break in, and how the stolen source code would affect things like
wine, a friend mentioned that Yankees.com had also just been hacked (I
found out later that he got that information from The Register,
specifically here, which in turn found out from here).

Being the curious individual that I am, I went to the webpage, and
discovered that it had, indeed, been cracked (and replaced with a
rather amusing picture, and a "yankees suck!" banner).  I then began a
post-mortem inspection; I always find this to be very interesting, as
several friends have basically handed me linux boxes (not physically
handed, of course), and asked me to rid them of a pesky cracker.  The
last time I did this, I discovered the intruder had gotten in through
a (well-known) wu-ftpd exploit that affected redhat 6.2, and was using
the box as a "zombie" (a daemon was listening for UDP packets, and was
then running a DoS against the IP supplied by the client).

I first checked port 21 of www.yankees.com, noticing that it was
running wu-ftpd-2.6.0; the same version that had been exploited in the
aforementioned cleanup.  That didn't sound right to me; it was
www.yankees.com, they had to have better security than that.  So, I
did a zone transfer of yankees.com (host -l -t any yankees.com), and
noticed an old.yankees.com.  Upon going there, I saw what I thought to
be the original site, so I figured this whole "crack" was simply a dns
redirect.  I checked the bind version that yankees.com's primary
nameserver was running (dig @ns1.icsnet.net version.bind chaos txt),
and saw that it was running the latest version (well... patch ;) of
bind.  I figured they wouldn't have broken in through this (at least,
I HOPED not), and checked other ports on ns1 for banners; 21, 25, 110,
143, etc; the most commonly exploited daemons.  I got no where with
this (whether it was due to a firewall, I do not know), so I returned
to my IRC client, said "Looks like a dns hack...", and and the
conversation went elsewhere.  The entire thing lasted possibly five
minutes, and occupied no more than 3 or 4 lines on IRC.

The next day, I was sitting in a chair in the lounge, with an older
FBI agent and another person who had not identified himself (but had a
clue about computer stuff).  I tried to explain the situation as best
as possible; I probably did a horrible job, as they had just woken up
(brutal LAN party the night before :) and really didn't remember many
of the details.  It was a 5 minute segment of my previous day, and I
had spent much time coding and on IRC.  The FBI started grilling me on
IPs; if I had accounts on various machines, etc.  At first, I had no
idea where they were going with this.  I assumed they had RPI's
firewall logs, and saw many, many connections to my machine.. After a
while of this (which was quite exhaustive, and seemed to piss off the
older FBI agent when I answered with "sf.home.com?  I probably know
someone there.. well.. I think.. maybe.. give me a second"), I
realized that they were seeing hits from my webpage, which had such
things as a hacked version of xmms-avi (I posted it in freshmeat's
comments), a hacked version of popwatch (exim authentication through
pop3.  Good stuff ;).  I answered their questions as best I could,
even though I was told I did not have to; I had nothing to hide.

Overall, they were pretty nice.  They took 3 computers, 2 books (ORA's
DNS & Bind, and a book on kernel hacking), and various scraps of
papers, which contained jotted down algorithms, code, and other stuff
I had written while bored or designing.  They let me go through these
notes, and pick out stuff I needed for class; they also (upon my
request) let me keep my "junk box" (cardboard box w/ various pieces of
hardware), as well as 80 cd-r's, which contained MP3's, DIVX's, and
porn (they just wanted to make sure there was no kiddie porn) that
were clearly marked as such.  As you can see, they really only cared
about cracking, which I had nothing to worry about.  Unfortunately,
they took all my backups (jaz disks).

I have not been formally charged yet, nor do I fear I will be.  I'm
worried most about the data on my drives, which is a combination of
source code (much of it not checked into any CVS servers), various
scripts and tweaks I had done to my Debian boxes over the 2 years I've
been running it, and essential data (email addresses of friends,
developers; class projects, some of which I HAVE needed since then;
email itself; etc).

This brings me to the whole point of this: you are not being paranoid
enough.  The FBI managed to get a search warrant based on logs from a
firewall, that showed my IP only connecting, not even logging in,
hours after news of the cracking had appeared on news sites.  If they
can get a search warrant this easily, your data is not safe, sitting
on your hard drive.  For the past two months I've been living in this
dorm, I locked my doors, securified my boxes, and backed up my
essential things.  I never even imagined the federal government would
just let themselves in and take it.

The moral of the story is: encrypting all sessions, through ssh, scp,
and tunnels, is not enough.  Nor is making back ups.  Make off-site
backups. The FBI can arrive at your doorstep, with every intent of
taking your precious data, and not returning it for a loooong time.

To those interested, mozilla composer still has some annoying bugs (I
had to remove a lot of extra spaces afterwards, for example.  No
crashes, though. The formatting is mozilla's.).  Oh well.  :)

Andres Salomon

P.S. Many thanks to people have given me advice (yes, I have talked to
a lawyer, and no, I have not heard back from the FBI yet), lent me
computers (ian, you rock! :), or otherwise helped me through this.

-----------------------------------------------------------------------------------------------------------
Wireless tracking devices raise privacy concerns

By ANICK JESDANUN, Associated Press
NEW YORK (October 29, 2000)

Imagine walking by a Starbucks in an unfamiliar city. Your
mobile phone rings, and a coupon for coffee appears
on its screen, good only at that location.

How did your phone know you were even near that particular Starbucks?
What else does it know about you?

Enter location tracking, coming to a mobile device near you. Features that
one day can pinpoint your whereabouts to within the length of a football field
raise enormous privacy concerns, but they also offer enormous benefits.

The challenge will be determining where to draw the line.

Consider a technology to be unveiled Monday. Called Digital Angel, a
microchip worn close to the body promises to record a person's biological
parameters and send distress signals during medical emergencies.

But misused, these types of capabilities could amount to virtual stalking.

Cell phones, handheld devices, even car navigation systems will soon have
detailed tracking abilities, if they do not already. Services could begin
appearing within a year or so.

Much of the drive will come from a federal law that requires cell phones to
identify callers' locations to speed 911 emergency responses. If the
industry has to install expensive equipment anyway, why not use it also to
make money?

"There's going to be a dramatic increase in the amount of tracking that's
made possible, in part by services they don't know they have," said Daniel
J. Weitzner of the World Wide Web Consortium, which sets technical
standards for the Web.

Such tracking will let someone visit a Web site and automatically get
weather, movie showings or neighborhood restaurants, based on their
current location. If they're lost, they will be able to ask for turn-by-turn
directions. Those short of cash can be pointed to the nearest bank
machine.

But if the information is stored, location tracking could result in a
24-hour-a-day record of a person's whereabouts.

So what if a divorce lawyer wants to check if someone's been cheating, or
if a social service agent wants to know how many times a person has
visited a candy store with his child?

"You have to ask, `Who gets how much information?"' said Jason Catlett,
chief executive of Junkbusters Corp., a non-profit privacy monitoring group
in Green Brook, N.J.

"Telephone records are routinely subpoenaed. They can be very intrusive,
but far more intrusive is a complete log of your physical movement."

Companies looking to gain business from location tracking say that the
worst-case scenarios presented are impractical to implement in reality.

"There's no way a database is large enough or cost effective for Starbucks
to monitor everyone's location on the offchance they can acquire a
customer," said Jason Devitt, chief executive of Vindigo, which offers 11
city guides through Palm organizers.

Lee Hancock, founder and chief executive of go2 Systems Inc., said any
short-term gains from such tactics would be offset by losses if they alienate
customers.

Leading wireless and advertising companies agree that they must tread
carefully because mobile devices are inherently more personal than
desktop computers.

At DoubleClick Inc., whose ad-targeting system generated much of the
Net's privacy complaints, officials won't deliver location-based ads right
away. The company wants to develop privacy standards first, using lessons
from the desktop.

"We've all learned what to do and what not to do, and we can port that over
to the wireless market," said Jamie Byrne, strategic director for emerging
platforms at DoubleClick.

Any such ads will likely target a metropolitan region, rather than a city
block, because audiences for block-by-block ads would be too small, Byrne said.
Ultimately, he said, such targeting will help subsidize wireless services that
customers want.

Jonathan Fox, director of business development at advertising company
Engage Inc., says location-based profiles would not carry names and other
personal information.

TRUSTe, which runs a seal-of-approval program for Internet privacy
policies, is looking to develop guidelines for mobile applications. Details
that remain to be worked out include how to notify customers on a phone's
small screen.

"It's more difficult to retrofit policies if you're already down the road,"
said Robert Lewin, TRUSTe chief executive. "Here, we have the opportunity to
do it right the first time."

In many ways, a person's whereabouts are already being tracked.

Employee security cards record when people enter buildings. Discount
grocery programs track what people buy, where and when. Electronic toll-
payment systems know when someone traverses a tunnel or bridge.

Current phones can pinpoint callers to a few miles by determining the
location of the cell tower used to handle the call.

Palm VII organizers use similar techniques to narrow a user to a particular
zip code, and an optional global-positioning receiver can pinpoint that
person even further.

Marketers can also get clues from the items people search for or the sites
they visit - a city guide, for instance, tells in what city a person is likely
located or where they plan to visit.

But for the most part, marketers have yet to take full advantage of such
knowledge, and consumers have yet to complain.

"We're providing value," Palm spokesman Ted Ladd said. "Mobile users
are inherently in a hurry."

Wireless providers are not likely to have a use for storing location
information, except perhaps for applications that help with driving
directions.

Paul Reddick, vice president of product management and development
with Sprint PCS, said such storage is not practical, necessary or even
desirable.

"It takes years to build a brand and build trust," he said, "and you can blow
it pretty fast."

-----------------------------------------------------------------------------------------------------------
International Arms Shows -The year in review

October 27, 2000

MP staff editors Oleg Kustov · Yuri Babushkin, Mark Ivtushok,
Anatoly Ilyin, Alexander Mozgovoi, Yuri Churyanov

A series of international exhibitions of armaments and military equipment
were held in May and June. At each of the exhibitions Military Parade Ltd.
had a stand of its own, featuring the Military Parade magazine. This article
offers a summary of this year's arms shows and the participation of Russian
exhibitors in them.

Hemus 2000
 From May 30 to June 3, Bulgaria's Plovdiv hosted the 4th International
Exhibition of Defense Equipment, Hemus 2000. The Russian Government named
the Promexport company the organizer of the Russian exposition at the show.

Hemus exhibitions are of much interest to Russia as they can help it restore
the broken ties with other East European countries. The Russian defense
industry can offer these countries its services in modernizing their
armaments and combat vehicles and in supplying spare parts.

The interest in the Russian exposition at Hemus 2000 manifested a change in
the views of East European countries in favor of Russia's return to their
markets. Right were the analysts who predicted that the West would provide
only token financial aid to East European countries, wishing to join NATO,
for modernizing their armies and only at the stage of the Soviet bloc's
self-destruction. It became apparent soon that the economies of these
countries were too weak to support the re-armament of their armies according
to NATO standards.

Combat equipment in service with their armed forces now needs to be
modernized. As most of it was bought from Russia, its modernization can be
carried out only by Russian companies. This idea was repeatedly voiced in
Plovdiv. The need to cast aside old grudges was expressed particularly often
by Bulgarian business people.

Special interest in this connection was displayed in Promexport which can
supply the Bulgarian Army with spare parts and set up a series of joint
ventures to repair and modernize Bulgarian armaments and military equipment.
The Bulgarians expressed their interest in spare parts for the T-55, T-62
and T-72 tanks and in ammunition for the RPG-7 hand-held antitank grenade
launcher, Osa air defense missile system, and Gvozdika self-propelled
howitzer.

Promexport's exposition showed the company's extensive capacity for
modernizing armaments by using the latest technological achievements.

In particular, the Signal All-Russia Research Institute, based in the town
of Kovrov, offered a unique method for considerably increasing fire
effectiveness of artillery systems made decades ago. The method provides for
comprehensive fire control automation, from target reconnaissance to
automatic guidance and aiming.

The Novosibirsk Instrument-Making Plant showed night sights for small arms,
grenade launchers and artillery, which are easy to use and which are highly
resistant to light interference.

The Rosvertol company's helicopters remained in the focus of public
attention throughout the exhibition. They included the Mil Mi-26 heavy
transport helicopters which have no counterparts in the world, and the
Mi-24/35 multitask helicopters. Rosvertol offered a program for their
comprehensive modernization.

Bulgarian specialists also showed much interest in modernized projectiles
for the Grad multiple launch rocket system produced by the Splav State
Research and Production Enterprise.

The Plovdiv exhibition demonstrated that relations between Russia and its
former East European allies are slowly yet steadily developing. This factor
alone makes Russia's participation in the exhibition successful.

Border 2000
In late May, Moscow's All-Russia Exhibition Center hosted the 2nd Border
International Specialized Exhibition and the 2nd conference and workshop on
criminal law. The coincidence of the two events in time and venue was very
felicitous. It enabled specialists of the Federal Border Guard Service and
law enforcement bodies to get acquainted with the latest achievements in the
development of facilities for guarding borders, obtaining reliable
information and providing it promptly to border guard units.

The Border 2000 organizers - the Federal Border Guard Service and the
Bizon-95ST company - invited enterprises of Russia and the Commonwealth of
Independent States whose products cover all aspects of the border guard
service.

The border guard equipment displayed at the exhibition included technical
border control facilities; alarm systems; optical instruments (sights,
binoculars, night vision devices, target designation devices); devices for
detecting optronic instruments; video surveillance systems; communications
and navigation systems; uniforms  outfit; armored vests; paper authenticity
identitification equipment; identification systems; etc.

Military attaches of many countries and representatives of foreign companies
displayed keen interest in the exhibition, which indicated the invariably
high quality of Russian-made armaments and equipment.

ILA 2000
 From June 6 to 12, Schoenefeld, near Berlin, hosted the 5th International
Aerospace Exhibition, ILA 2000. This prestigious exhibition involved 941
companies from 38 countries, including Russia which participated in it for
the fourth time.

This year, the Russian Government named the Rosvoorouzhenie State
Corporation and the Russian Aerospace Agency co-organizers of the Russian
exposition.

Eleven enterprises and organizations of the Russian defense industry
displayed their products under Rosvoorouzhenie's aegis. The exposition was
aimed at maintaining the Russian defense industry's positions in Central and
East European countries which still use a large number of
Soviet/Russian-made armaments and military equipment.

The latest modification of the MiG-29 aircraft - the MiG-29SMT-2 fighter -
was the centerpiece of the exposition. The fighter, presented by
Rosvoorouzhenie jointly with the MiG Aircraft Corporation, had made a
nonstop flight from Russia to Germany.

A Russian-German joint venture, MAPS (MiG Aircraft Product Support GmbH),
offers various modernization packages of MiG-29 to Central and Eastern
Europe which bring the aircraft into line with NATO standards. MAPS was
founded in 1993 by Rosvoorouzhenie, MiG and Germany's DASA (DaimlerChrysler
Aerospace) for authorized modernization of Soviet-made aircraft. MAPS has
modernized 23 MiG-29 aircraft in service with the German Air Force, making
them into modern multitask planes that will remain in line with European Air
Force requirements for at least another 15 to 20 years.

The Sukhoi Design Bureau displayed at ILA 2000 its modern Su-30MK, Su-32 and
Su-33 aircraft, and programs for modernizing the Su-24MK bomber and the
Su-22M4 fighter-bomber.

The Nizhni Novgorod-based Sokol Aircraft Plant showed models of its main
products - the MiG-31 interceptor fighter and MiG-21-93 fighter which is a
modernized version of the MiG-21, the most widespread fighter in the world.
The Moscow Chernyshev Machine-Building Enterprise and the Ufa
Engine-Building Industrial Association displayed several types of engines
for MiG and Sukhoi aircraft.

The Urals Opto-Mechanical Plant displayed its optronic sighting systems,
laser rangefinders and some other optronic devices for Sukhoi and MiG
aircraft and helicopters.

The Tranzas company showed simulators for helicopter crews, and the Kamov
company displayed models of all its helicopters, which evoked great interest
among specialists.

The Myasishchev Electromechanical Plant demonstrated a unique electronic
surveillance aircraft, M55RTK, derived from the M-55 Geofizika high-altitude
plane.

The Directorate for the Overhaul of the Russian Armed Forces Aircraft
offered its overhaul programs to potential customers.

The Smolensk Aircraft Plant displayed the SM-92 Finist, and Yak-18T aircraft
and offered a program for re-equipping the Yak-40 aircraft.

The Kazan Helicopter Plant showed models of the Mi-38, ANSAD and Mi-17
helicopters.
The space section of the exposition featured developments by the
Mashinostroyenie Research and Production Association, the Kometa Central
Research Institute, the Khrunichev State Research and Production Space
Center, the Progress Central Specialized Design Bureau, and other companies
and organizations.

The exhibition revealed that Russia has everything it needs to feel
confident on the market of aerospace equipment, which has always been the
focus of Military Parade publications.

EUROSATORY 2000
The 5th International Land Defense Equipment Exhibition, Eurosatory 2000,
was held at Le Bourget, near Paris, in June. More than 830 companies from 38
countries participated in this most prestigious arms show.

Russia, which participated in Eurosatory for the third time, was represented
by Rosvoorouzhenie which mounted an exposition of small arms and mockups of
advanced weapon systems made by 16 Russian defense industry enterprises.

The exposition featured the latest and modernized versions of armored
personnel carriers and infantry combat vehicles (BTR-90 and BMP-3), and
missile/gun and antitank weapons (Iskander-E, Smerch, Uragan and Grad
multiple launch rocket systems, Khrizantema antitank guided missile system,
and others).

Air defense missile systems (Igla, Pechora-2, S-300PMU2 Favorit and S-300VM)
occupied a traditionally prominent place at the exhibition.

Small arms displayed at the exhibition included the 7.62mm Pecheneg
machine-gun, SPP-1M pistol and APS underwater assault rifle, Kashtan
submachine gun, and the new 30mm AGS-30 grenade launcher.

At Eurosatory, Military Parade Ltd. introduced its catalog Russia's Arms
2000. The catalog evoked great interest among Russian and foreign
specialists. Military Parade Ltd. has already begun work on an updated
version of the catalog, Russia's Arms 2001, which is due to come out next
March and be introduced at the IDEX International Defense Exhibition in Abu
Dhabi, the United Arab Emirates.

UDT EUROPE 2000
In late June, London hosted the UDT Europe 2000 exhibition of undersea
defense technologies, which involved over 60 companies.

This year, the exhibition focused on mine detection and demolition
facilities. Sonars and remotely controlled underwater vehicles, displayed by
French, U.S., British, Dutch and German companies, are intended to ensure
antimine defense at a large range.

Much to the disappointment of visitors to the exhibition, Russia's
participation in UDT Europe 2000 was far too modest. The Military Parade
magazine helped, to some extent, meet the high demand for information on
Russian undersea technologies. Its articles about the modernization of
Kilo-class submarines, mine-search sonars made by the Taganrog-based Priboi
plant, a portable hydroacoustic range developed by the Marine Heat
Engineering Research Institute, and other equipment evoked much interest
among visitors to the exhibition and participants in a conference held
within the exhibition's framework.

Balt-Military-Expo 2000
A stroke of a ship's bell marked the opening of the 3rd Baltic Defense
Exhibition in Poland's Gdansk in late June. The exhibition traditionally
featured naval armaments and military equipment.

Naturally, the largest exposition at Balt-Military-Expo 2000 was mounted by
Polish companies. Foreign companies that are particularly active on this
market include Germany's Lurssen, and Blohm & Voss, and the Swedish-German
HDW group which includes Germany's Howaldtswerke-Deutsche Werft AG and
Sweden's Kockums AB. These companies displayed their capacities for
designing, building, modernizing and repairing ships and training their
crews.

The U.S. Raytheon offered missile systems for the Navy, Air Force and Air
Defense Forces, which can be used from various carriers.

The French-Italian Eurotorp concern has been actively promoting its torpedo
technologies. In former years, Russia held a leading position in this field.
However, Russian torpedoes were not displayed at Balt-Military-Expo 2000.

The Military Parade representatives at the exhibition were often asked about
the exposition of Russian producers. Much to our visitors' regret, the
Russian shipbuilding industry was not represented at the show. Russian
producers of naval armaments and military equipment seem to be yielding this
market without even trying to retain their positions, although Russia's
neighbors still display interest in its products.

During the exhibition, the United States presented to Poland a missile
frigate which had been in service with the U.S. Navy for 20 years. The
official ceremony was attended by U.S. Secretary of State Madeleine
Albright. Commenting on this event in private conversations, Poles said
jokingly that the frigate's utilization at a U.S. shipyard would apparently
have cost the U.S.A. more.

-----------------------------------------------------------------------------------------------------------
Engaged in an endless pursuit of dissenters

Thursday, October 26, 2000

His findings helped Phila. police get a warrant for a key
convention-protest raid.

By Craig R. McCoy <[EMAIL PROTECTED]>
and Linda K. Harris [PHILADELPHIA] INQUIRER STAFF WRITERS

BALTIMORE - Sipping tea, surrounded by jammed bookcases
filled with weighty nonfiction and spy thrillers, John H.
Rees lays out a dizzying tale.

He talks of millions of missing rubles, riches that
disappeared when the Soviet Union collapsed. Of how that
money resurfaced to bankroll a new anticapitalist movement.

He talks of his network of informants, of his prodigious
research, and of the naivete of those who think the
communist threat is gone.

It is a threat, he says, that recently manifested itself in
Philadelphia.

"I believe that elements of communism still exist and are
advanced internationally and in America by groups such as
those that tried to disrupt the GOP convention."

Though his critics see Rees as an imaginative latter-day Joe
McCarthy, Pennsylvania State Police used Rees' findings in
seeking a warrant to raid a West Philadelphia warehouse that
protesters used as a puppet-making factory and as a staging
area. On Aug. 1, the second day of the Republican National
Convention and the day of the most intense protests, more
than 75 people at the warehouse were arrested and charged
with misdemeanors.

In hearings today and in coming weeks, defense lawyers hope
to convince a judge to dismiss those prosecutions and
others, on grounds that the use of Rees' information by
police shows the political nature of the arrests.

"With a warrant that reads like a political tract, the
Philadelphia Police entered the Haverford Avenue workshop
and arrested everyone who happened to be present," declares
one motion filed by the Defender Association of
Philadelphia, whose lawyers represent dozens of protesters.

The motion derided the affidavits as being "replete with
McCarthyite allegations. Such statements have no role in a
probable-cause affidavit, except to smear the defendants as
subversives."

In court last week, Municipal Court Judge James M. DeLeon
questioned the use of Rees' allegations. "Who are these
people who gave you this information and what makes it so
reliable?" he asked prosecutors.

Who, indeed, is John Rees?

For four decades, Rees, 74, onetime Washington editor for
the John Birch Society, has tracked protest and dissent -
from antiwar demonstrators in the 1960s to today's
anti-globalization movement.

He feeds his research to a special audience -
law-enforcement agencies - publishing his findings in a
series of obscure periodicals. His alliances in the past
with police in Washington, New York state, and Los Angeles
have left behind a trail of outrage.

Sometimes, Rees has infiltrated groups himself, using a
false name on occasion. He also says he has many sources.

"We have stringers," Rees said in an interview at his home
and office here. "We don't do what the FBI does, which is to
go to an unemployment line, give them $10, and ask them to
go to the meetings."

Rees says that much of the time he draws upon
already-published information from newspapers or public
petitions and the like. Of late, he has been relying heavily
on the Internet.

Since 1985, the Maldon Institute - relying on nearly
$2million from Pittsburgh philanthropist Richard Mellon
Scaife - has churned out monographs on everything from
protests against the World Bank to rebel movements in
Colombia and Uzbekistan.

In the search-warrant affidavits, the state police quoted
from a recent Maldon Institute report, citing unnamed
sources, that linked protesters to Communist money.

"Funds allegedly originate with Communist and leftist
parties and from sympathetic trade unions," the police
declared in the affidavits.

Rees said he was surprised that state police had used his
information, but he seemed delighted that they had.

"The material in the report was, in my opinion, accurate and
in the public domain," he said.

Moreover, he said, the radical protesters who have torn up
property last year in Seattle, and more recently in Prague,
were well-deserving of scrutiny.

"Do you think it's McCarthyite to criticize people who broke
up small businesses?" Rees said.
[Note: the Black Bloc specifically avoided attacking small
businesses -- their targets were giant, multinational
corporations. -- DC]

After Rees moved to the United States from England, his
career as an anticommunist began in the late 1960s. He had a
rocky start.

Though Rees has been invited by the FBI to speak at
antiterrorism conferences and has addressed one as recently
as April, a confidential FBI memo written in 1968, made
public later through a civil lawsuit, urged agents not to
deal with him.

"Rees is an unscrupulous unethical individual and an
opportunist who operates with a self-serving interest.
Information from him cannot be considered reliable," the
memo stated.

One of his earliest publications was the mimeographed
Information Digest. Rees gathered some of its material by
posing as a leftist himself. Among other things, it
contained lists of license plates of cars at a Black Panther
rally.

His activity went largely unnoticed until a scandal broke in
New York state as legislators learned that state police had
kept files with information on a million citizens. A
legislative committee conducted an inquiry.

"What was reported by Information Digest was casually used
to create dossiers on a wide spectrum of Americans whose
only crime was to dissent," the committee's 1976 report
found.

"Information Digest was the string that held together a
network of hidden informants whose information was recorded
by police departments throughout the nation without the
individual involved knowing of the process and without
independent checking by the police as to the validity and
source of this derogatory information."

The New York State Police abandoned that system of
intelligence gathering. In the next decade, a new furor
flared involving Rees - this time in Los Angeles. Police
officials there disclosed that a detective with the
"public-disorder intelligence division" had leaked
information to a private intelligence organization called
Western Goals, whose editor was Rees. The officer, Detective
Paul Jay, had a $30,000 contract with Western Goals to
create a data bank of suspected Communists and left-wing
groups.

The American Civil Liberties Union sued Western Goals in
1984 and won a court order forbidding it to disseminate the
information.

Undeterred, Rees, in 1985, founded the Maldon Institute -
the most polished undertaking of his long career. While the
ACLU and others criticized him in those years, he also
forged the relationship with the arch-conservative Scaife
and met with President Reagan, as memorialized in
photographs in Rees' home.

The institute, named after an obscure English battle,
publishes 10 bound monographs a year and a twice-monthly
newsletter called Early Warning.

Its board has been made up of conservative journalists,
clergy and lawyers. A board chairman in the early 1990s,
Michael G. Flanagan, pleaded guilty in 1996 to grand larceny
and was sent to prison after the Manhattan District
Attorney's Office charged him with stealing $1million from
clients in his private practice.

Rees still likes to gather information firsthand. In
Philadelphia for the convention, Rees said, he toured the
puppet warehouse the day before the raid - one more bit of
surveillance for an aging agent.

To get inside, Rees used media credentials from a previous
protest march and he knew how to dress.

"Obviously, I don't wear a collar or tie," he said.

Rees said he was surprised, however, at the inadequate
security at the door.

"I just walked in," he said, speaking as a man who clearly
enjoys his work. "It's something I'll do."

His tour produced little fodder for publishing.

"I saw nothing extraordinary," Rees recalled. "Nothing to
write about. Not at all."

-----------------------------------------------------------------------------------------------------------
Linked stories:
                        ********************
Anti-Hacking Law to take Effect
<http://securityfocus.com/templates/article.html?id=107>
Under the anti-circumvention provision of the Digital Millennium Copyright
Act (DMCA), it will be unlawful for anyone to "circumvent a technological
measure that effectively controls access" to a copyrighted work. To do so
for commercial advantage or personal profit will be a felony carrying up
to five years in prison.

                        ********************
======================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________
**How to assist RadTimes:
An account is available at <www.paypal.com> which enables direct donations.
If you are a current PayPal user, use this email address:
<[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this
link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up
and contribute. The only information passed on to me via this process is
your email address and the amount you transfer.
Thanks!
______________________________________________________________

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to