[AGL] Fwd: DRANT#181: TELE-RECTAL DATA MINING

Frances Morey frances_morey at yahoo.com
Thu May 11 13:35:04 EDT 2006


I have long feared that the govt will figger out a way to tax this form of communication. The govt rake off from cell phones is about 12%. The habit (addiction?) of govt is taxation. Parking meter fines are 85% of the take, with only 15% coming from coins. The money will be collected by hook or crook, one way or the other. When I read bills for the TLC it was typical for the wording on the bill to be the same as before,  with the only chances being increases in the monetary amounts. 
   
  I am puzzled by the fact that it took four special sessions of our legislature to work out school funding and here on this one it slides quickly through as though warm butter, thick with self congratulatory smiling faces all over the media. How come it got so easy, all of a sudden? Any ideas. 
   
  Hope email "postage" doesn't happen.
  Frances

David Rubinson <rubinson at kab.com> wrote:
  From: David Rubinson <rubinson at kab.com>
Subject: DRANT#181: TELE-RECTAL DATA MINING
Date: Thu, 11 May 2006 09:58:02 -0700

DRANT DAILY
Number 181
May 11, 2006
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Today's DRANT
---Ill-tempered, Iconoclastic, Impatient and Ideologically- 
unpredictable views, comments, and sources about the World, how we 
humans are messing it up, and how we can all DO SOMETHING about it.
For the complete, entire Megillah, please access : http:// 
drrant.blogspot.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HERE IS A short REPRISE OF DRANT #178- PORNO PREDATORS

2) The Government and Big Telecom have co-conspired for years-- but 
under Bush et al, the incest has become epidemic and much much more 
pervasive and dangerous.
In 1998, our friend Bill and his sidekick Al handed the airwaves to 
Major Media.
In 1999, the CIA inaugurated the insidious and largely unremarked 
program called In Q Tel- to provide seed money and initial 
capitalization for fledgling high tech startups, acting as a 
Governmental Venture Capital firm, thus to own and control what has 
now become a huge network of developing cutting edge tech "security- 
oriented" enterprises, all run and operated by The Federal 
Government. (much more about this in a later DRANT).
See:
"In-Q-Tel: A New Partnership Between the CIA and the Private Sector"
Rick Yannuzzi
Defense Intelligence Journal
Winter 2000
And more recently-- You remember 2-3 years back ? When GWBush's 
nephew Mike Powell, and the FCC obliterated the historic limits on 
cross-ownership of media in major markets, finalizing the 
Murdochization of our very lives ? And GiantPimpMedia did a giant 
Jerry Mahoney for The War in Terror ?
Well, this is the next quid pro puke quo Giant Step in the exploding 
Fascist Symbiosis between Government and Business.

It's such a simple deal--
The FCC rules that the Internet is not a public resource, that the 
pipes belong to the pipelayers not the peeps, and re-defines and 
privatizes the Internet, handing over public net access and granting 
control of the net AND the international backbones, to Giant Telcom.
Simultaneously, the aforementioned Congress, those busy little bees, 
are enacting legislation that will destroy net neutrality-- Thus, 
AOL, Yahoo and the rest can CHARGE for each email, and establish 
tiers of service- so the big corporations go 1st class, with much 
faster access and bypass of the spam blockers, and we peasants ride 
in the back of the bus, if we get to ride at all.
And, need we even mention the Supreme Court ? Oooooh baby.
In their gratitude, the Telecoms give it all up to the NSA. Giant 
Telcom gives up all of our email, our web searches, downloads, p2p 
file shares to The CIA, NSA, and whoever else the Government 
decides. All of it- turned over to the Data Mining loonies in the 
big grey concrete buildings.
Everybody wins, right ?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well, if you had any doubts- if you had even a glimmer of 
nowaynothereintheUSA, well -- fuggedabouddit.
This is real, its true, they are looking up every orifice with a 
flashlight they justify with the AlKayeeda Myth, and THIS MEANS YOU.
Today, USA TODAY, America's official journal of record, finally broke 
the story for De Average Joe.
And Av J is pissed.
This is the same week that GENERAL Hayden is being put in charge of 
the CIA. While his ole Buddy Rumsfeld runs OPERATION ROADMAP.
This is the same week that Congress is voting on COPE- the 
Communications Opportunity, Promotion, and Enhancement Act, that 
rapes us in so many lovely little ways:

"...The COPE bill would permit phone and cable companies to operate 
Internet and other digital communications service as private 
networks, free of policy safeguards or governmental oversight. The 
bill would effectively end what is known as "net neutrality" which is 
the concept that that everyone, everywhere, should have free, 
universal and non-discriminatory access to all the Internet has to 
offer. The COPE bill would permit Internet service providers like AOL 
to charge fees for almost every online transaction and to prioritize 
emails based on the senders' willingness to pay.
Another provision of the bill would cut back the obligation of cable 
TV companies to devote channels to public access and fund the 
facilities to run them. And the COPE bill would replace local cable 
franchises with national franchises. The companies contend that this 
will create competition and lower fees but consumer groups and 
activists are concerned that it will take control and oversight away 
from local government as well as cut channel capacity for public, 
educational and governmental access channels or PEGs. The COPE Act 
would also permit providers to not provide service to low-income 
communities that they believe would be less profitable to serve..."

* Robert McChesney, professor at the University of Illinois at 
Urbana-Champaign and co-founder of Free Press
http://www.democracynow.org/article.pl?sid=06/05/08/1352255

COPE
Ends regulation and hands the Internet to ATT, Verizon, Clear 
Comcast, BellSouth. Do these names sound umm familiar ?
Destroys local community access to TV ? Hmmm now that's Democracy.
Turns the net into a tiered access structure, whereby dose dat pays 
da most, gets da most. Just like CONGRESS.
RED-LINEs net access, so the 37% of Americans below the poverty line, 
not to mention those damn immigrants, would not have internet.

Don't this sound cozy ?

McChesney says, and most Save The Internet folks say, that Congress 
is doing this because they are being PAID-- by the enormous telcom 
lobbyists - hundreds of millions of dollars.
Well, maybe - we know a pimp when we see one. Or 400.
But the Government is doing this because they get to perform TELE- 
rectal data mining with no lube on all of US, all the time.
They are pushing this to create the biggest goddam spying operation 
in history, and they have already started.
So if the words Net Neutrality don't get your little ticker booming, 
how about the fact that George Bush, and that incredible mealy- 
mouthed Putz Hayden, and Negroponte del Salvador, are listening to 
every goddam phone call you make, or get ?
Does that pluck your magic twanger ?
Wake up, I'm talking to YOU !
When exactly will you have had enough ?
When will you finally take to the streets from pure self-interest if 
nothing else ?
Anyway, if all this don't get you raging, then just do nothing.
They're counting on it.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
USA Today: NSA building massive database of phone records

Thursday, May 11, 2006 Posted: 1609 GMT (0009 HKT)
http://edition.cnn.com/2006/POLITICS/05/11/nsa.phonerecords.ap/

WASHINGTON (AP) -- President Bush said Thursday that the government 
does not troll the personal lives of Americans, but did not directly 
refer to newspaper reports the National Security Agency has gathered 
millions of Americans' phone records.

Congressional Democrats had demanded answers from the Bush 
administration about a report that the government secretly collected 
records of ordinary Americans' phone calls to build a database of 
every call made within the country.

"It is our government, it's not one party's government. It's 
America's government. Those entrusted with great power have a duty to 
answer to Americans what they are doing," said Sen. Patrick Leahy of 
Vermont, the ranking Democrat on the Senate Judiciary Committee.

AT&T, Verizon and BellSouth telephone companies began turning over 
records of tens of millions of their customers' phone calls to the 
NSA program shortly after the September 11, 2001, terrorist attacks, 
USA Today reported, citing anonymous sources it said had direct 
knowledge of the arrangement.

The telephone companies on Thursday declined to comment on national 
security matters, and would say only that they are assisting 
government agencies in accordance with the law.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NSA has massive database of Americans' phone calls
Updated 5/11/2006 10:38 AM ET
http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm

By Leslie Cauley, USA TODAY
The National Security Agency has been secretly collecting the phone 
call records of tens of millions of Americans, using data provided by 
AT&T, Verizon and BellSouth, people with direct knowledge of the 
arrangement told USA TODAY.
The NSA program reaches into homes and businesses across the nation 
by amassing information about the calls of ordinary Americans — most 
of whom aren't suspected of any crime. This program does not involve 
the NSA listening to or recording conversations. But the spy agency 
is using the data to analyze calling patterns in an effort to detect 
terrorist activity, sources said in separate interviews.
QUESTIONS AND ANSWERS: The NSA record collection program
"It's the largest database ever assembled in the world," said one 
person, who, like the others who agreed to talk about the NSA's 
activities, declined to be identified by name or affiliation. The 
agency's goal is "to create a database of every call ever made" 
within the nation's borders, this person added.
For the customers of these companies, it means that the government 
has detailed records of calls they made — across town or across the 
country — to family members, co-workers, business contacts and others.
The three telecommunications companies are working under contract 
with the NSA, which launched the program in 2001 shortly after the 
Sept. 11 terrorist attacks, the sources said. The program is aimed at 
identifying and tracking suspected terrorists, they said.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taking Snooping Further; Government Looks at Ways To Mine Databases

By JOHN MARKOFF; SCOTT SHANE CONTRIBUTED REPORTING FROM WASHINGTON 
FOR THIS ARTICLE. (NYT) 2023 words
Published: February 25, 2006
http://select.nytimes.com/search/restricted/article? 
res=F70C16F8345A0C768EDDAB0894DE404482

PALO ALTO, Calif., Feb. 23 - A small group of National Security 
Agency officials slipped into Silicon Valley on one of the agency's 
periodic technology shopping expeditions this month. On the wish 
list, according to several venture capitalists who met with the 
officials, were an array of technologies that underlie the fierce 
debate over the Bush administration's anti-terrorist eavesdropping 
program: computerized systems that reveal connections between 
seemingly innocuous and unrelated pieces of information.
The tools they were looking for are new, but their application would 
fall under the well-established practice of data mining: using 
mathematical and statistical techniques to scan for hidden 
relationships in streams of digital data or large databases.
Supercomputer companies looking for commercial markets have used the 
practice for decades. Now intelligence agencies, hardly newcomers to 
data mining, are using new technologies to take the practice to 
another level.
But by fundamentally changing the nature of surveillance, high-tech 
data mining raises privacy concerns that are only beginning to be 
debated widely. That is because to find illicit activities it is 
necessary to turn loose software sentinels to examine all digital 
behavior whether it is innocent or not.
''The theory is that the automated tool that is conducting the search 
is not violating the law,'' said Mark D. Rasch, the former head of 
computer-crime investigations for the Justice Department and now the 
senior vice president of Solutionary, a computer security company. 
But ''anytime a tool or a human is looking at the content of your 
communication, it invades your privacy.''
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Information Operations Roadmap

http://www.sourcewatch.org/index.php? 
title=Special:Categories&limit=500&offset=0)



John Rendon, President of the Rendon Group, "insists that information 
is terrain and someone will occupy it, either the adversary, a third 
party, or US." [1] (http://www.iwar.org.uk/iwar/resources/usaf/ 
maxwell/students/2002/urrutia.pdf)
"Information is an instrument of national power, just as military, 
economic and political. Like any weapon or tool, the United States 
Government needs to use it or cede the 'battlefield' to someone 
else." [2] (http://www.iwar.org.uk/iwar/resources/usaf/maxwell/ 
students/2002/urrutia.pdf)
Table of contents
1 The "Roadmap"
2 Perception Management
3 Related Documents & Reports
4 SourceWatch Resources
5 External Links

The "Roadmap"
On October 30, 2003, Secretary of Defense Donald Rumsfeld signed a 
secret order for the classified 74-page directive the Information 
Operations Roadmap. [3] (http://www.capitolhillblue.com/cgi-bin/ 
artman/exec/view.cgi?archive=38&num=5847&printer=1)

The Roadmap is a "detailed plan being implemented by the Pentagon," 
Christopher J. Lamb, a senior fellow in the Institute for National 
Security Studies at the National Defense University and former Deputy 
Assistant Secretary of Defense, Resources and Plans, wrote (http:// 
www.ndu.edu/inss/press/jfq_pages/1536.pdf) First Quarter 2005 in the 
Joint Force Quarterly. "The roadmap charts a course for developing IO 
into a mature warfighting capability and a core joint competency. It 
is designed to enable capabilities to keep pace with threats and 
exploit opportunities afforded by innovation and information 
technologies. Lessons learned from Iraqi Freedom underscore the 
validity of its recommendations."

"The key assumption underlying the IO roadmap is that exploiting 
information for decisionmaking has become critical for military 
success. Accordingly, it must be treated on a par with ground, 
maritime, air, and special operations," Lamb wrote.

The Roadmap "represents 18 months of effort to determine IO issues 
and makes 57 recommendations for implementation. Execution of these 
57 recommendations has begun," Allen W. Batschelet wrote (http:// 
www.findarticles.com/p/articles/mi_m0IAU/is_3_9/ai_n6181373/pg_2) in 
the July/August 2004 FA Journal. "Setting the course for IO's future 
as a DoD core competency, the roadmap provides a common framework and 
definition for understanding IO, empowers combatant commanders with 
the authority to plan and integrate IO, and improves education and 
training opportunities designed to strengthen IO efforts."

"Noting the complexities and risks, Mr. Rumsfeld ordered studies to 
clarify the appropriate relationship between Pentagon and military 
public affairs - whose job is to educate and inform the public with 
accurate and timely information - and the practitioners of secret 
psychological operations and information campaigns to influence, 
deter or confuse adversaries," Thom Shanker and Eric Schmitt reported 
(http://www.nytimes.com/2004/12/13/politics/13info.html? 
pagewanted=1&ei=5089&en=89b177f07cc24678&ex=1260680400&partner=rssyahoo) 
in the December 13, 2004, New York Times.

Perception Management
"'In the battle of perception management, where the enemy is clearly 
using the media to help manage perceptions of the general public, our 
job is not perception management but to counter the enemy's 
perception management,' said the chief Pentagon spokesman, Lawrence 
Di Rita" in December 2004. [

Related Documents & Reports
>From "Information Operations Roadmap," (http://www.iwar.org.uk/ 
iwar/) Information Warfare Site:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The End of the Internet?
http://www.thenation.com/doc/20060213/chester

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


The Coming Tug of War Over the Internet
By Christopher Stern
Sunday, January 22, 2006; B01

http://www.washingtonpost.com/wp-dyn/content/article/2006/01/21/AR

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hands Off Our Internet!

http://www.commoncause.org/site/pp.asp?c=dkLNK1MQIwG&b=1386967

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sunday Herald -
http://www.sundayherald.com/print54975
02 April 2006
America's war on the web
While the US remains committed to hunting down al-Qaeda operatives, 
it is now taking the battle to new fronts. Deep within the Pentagon, 
technologies are being deployed to wage the war on terror on the 
internet, in newspapers and even through mobile phones. 
Investigations editor Neil Mackay reports.
IMAGINE a world where wars are fought over the internet; where TV 
broadcasts and newspaper reports are designed by the military to 
confuse the population; and where a foreign armed power can shut down 
your computer, phone, radio or TV at will.
In 2006, we are just about to enter such a world. This is the age of 
information warfare, and details of how this new military doctrine 
will affect everyone on the planet are contained in a report, 
entitled The Information Operations Roadmap, commissioned and 
approved by US secretary of defence Donald Rumsfeld and seen by the 
Sunday Herald.
The Pentagon has already signed off $383 million to force through the 
document’s recommendations by 2009. Military and intelligence 
sources in the US talk of “a revolution in the concept of 
warfare”. The report orders three new developments in America’s 
approach to warfare:
lFirstly, the Pentagon says it will wage war against the internet in 
order to dominate the realm of communications, prevent digital 
attacks on the US and its allies, and to have the upper hand when 
launching cyber-attacks against enemies.
lSecondly, psychological military operations, known as psyops, will 
be at the heart of future military action. Psyops involve using any 
media – from newspapers, books and posters to the internet, music, 
Blackberrys and personal digital assistants (PDAs) – to put out 
black propaganda to assist government and military strategy. Psyops 
involve the dissemination of lies and fake stories and releasing 
information to wrong-foot the enemy.
lThirdly, the US wants to take control of the Earth’s 
electromagnetic spectrum, allowing US war planners to dominate mobile 
phones, PDAs, the web, radio, TV and other forms of modern 
communication. That could see entire countries denied access to 
telecommunications at the flick of a switch by America.
Freedom of speech advocates are horrified at this new doctrine, but 
military planners and members of the intelligence community embrace 
the idea as a necessary development in modern combat...
...In September 2000, the now notorious document Rebuilding 
America’s Defences – written by the Project for the New American 
Century (PNAC), a think-tank staffed by some of the Bush 
presidency’s leading lights – said that America needed a 
“blueprint for maintaining US global pre-eminence, precluding the 
rise of a great power-rival, and shaping the international security 
order in line with American principles and interests”.
The PNAC was founded by Dick Cheney, the vice-president; Donald 
Rumsfeld, the defence secretary; Bush’s younger brother, Jeb; Paul 
Wolfowitz, once Rumsfeld’s deputy and now head of the World Bank; 
and Lewis Libby, Cheney’s former chief of staff, now indicted for 
perjury in America.

Rebuilding America’s Defences also spoke of taking control of the 
internet. A heavily censored version of the document was released 
under Freedom of Information legislation to the National Security 
Archive at George Washington University in the US.

The report admits the US is vulnerable to electronic warfare. 
“Networks are growing faster than we can defend them,” the report 
notes. “The sophistication and capability of … nation states to 
degrade system and network operations are rapidly increasing.”

T he report says the US military’s first priority is that the 
“department [of defence] must be prepared to ‘fight the net’”. 
The internet is seen in much the same way as an enemy state by the 
Pentagon because of the way it can be used to propagandise, organise 
and mount electronic attacks on crucial US targets. Under the 
heading “offensive cyber operations”, two pages outlining possible 
operations are blacked out.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


BIFURCATE IN THE ROAD

http://kmilyun.com/?P=143

We are sacrificing our privacy and freedoms for the cause of National 
Security while our President demands extraordinary powers (see post 
here) The legal protections that are essential to our democratic 
society; due process, presumption of innocence and rights against 
unreasonable search and seizure, arbitrary detention and punishment, 
interception of personal communications without warrant are being 
ignored. (example link to for each) Infrastructures for strategic 
mass surveillance and dissemination of propaganda are in place to 
support governmental agendas. (See Govt. pdf docs: Information 
Operations Roadmap, Information Operations: Doctrine, Tactics, 
Techniques, and Procedures)

InfraGuard is Federal Bureau of Investigation program “that began in 
the Cleveland Field Office in 1996. It was a local effort to gain 
support from the information technology industry and academia for the 
FBI’s investigative efforts in the cyber arena. The program expanded 
to other FBI Field Offices, and in 1998 the FBI assigned national 
program responsibility for InfraGuard to the former National 
Infrastructure Protection Center (NIPC) and to the Cyber Division in 
2003. InfraGard and the FBI have developed a relationship of trust 
and credibility in the exchange of information concerning various 
terrorism, intelligence, criminal, and security matters.” Info 
Businesses are surrendering their databases to government agencies. 
Among them are commercial airlines, Universities, driving schools, 
Double Click, and Choice Point. Major Internet companies have started 
to deal with this problem also.

CALEA gives law enforcement officials a back door that can be used to 
wiretap systems. Read my previous post on this subject here.

In its May 2004 report on federal data mining efforts, Federal 
Efforts Cover a Wide Range of Uses, GAO-04-548,May 2004. . The U.S. 
General Accounting Office(now called the Government Accountability 
Office) revealed projects that use personal information from the 
private sector. The Defense Intelligence Agency, mines data “to 
identify foreign terrorists or U.S. citizens connected to foreign 
terrorism activities”. The National Security Agency program called 
Novel Intelligence from Massive Data, extracts information from 
databases including text, audio, video, graphs, images, maps, 
equations, and chemical formulas. The C.I.A. reportedly has a data- 
mining program called “Quantum Leap” which “enables an analyst 
to get quick access to all the information available – classified 
and unclassified – about virtually anyone”.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Citizens for Legitimate Government

http://news.com.com/ISP+snooping+gaining+support/ 
2100-1028_3-6061187.html

"The 'department [of defence] must be prepared to 'fight the net'". 
America's war on the web 02 Apr 2006 By Neil Mackay "...[Details] are 
contained in a report, entitled The Information Operations Roadmap, 
commissioned and approved by US secretary of defence Donald Rumsfeld 
and seen by the Sunday Herald. The Pentagon has already signed off 
$383 million to force through the document’s recommendations by 
2009. Military and intelligence sources in the US talk of 'a 
revolution in the concept of warfare'... Firstly, the Pentagon says 
it will wage war against the internet in order to dominate the realm 
of communications, prevent digital attacks on the US and its allies, 
and to have the upper hand when launching cyber-attacks against 
enemies. Secondly, psychological military operations, known as 
psyops, will be at the heart of future military action... Thirdly, 
the US wants to take control of the Earth's electromagnetic spectrum, 
allowing US war planners to dominate mobile phones, PDAs, the web, 
radio, TV and other forms of modern communication. That could see 
entire countries denied access to telecommunications at the flick of 
a switch by America... The report says the US military’s first 
priority is that the 'department [of defence] must be prepared to 
'fight the net'. The internet is seen in much the same way as an 
enemy state by the Pentagon because of the way it can be used to 
propagandise, organise and mount electronic attacks on crucial US 
targets. Under the heading 'offensive cyber operations', two pages 
outlining possible operations are blacked out."
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Part I: The End of the Internet? Net Neutrality Threatened by 
Cable, Telecom Interests

http://www.democracynow.org/print.pl?sid=06/04/13/146201


Part II: The End of the Internet? Net Neutrality Threatened by Cable, 
Telecom Interests
http://www.democracynow.org/print.pl?sid=06/04/14/147241
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Now, as for the other Them of The Month campaigns, we will continue 
in the next DRANT:

The Big Sell #2
GLOBAL YADA YADA:
This is a little more tricky.
But it seems clear to me that this is really about
1) OIL
2) COAL
Which is to say, more money for Bush and, of course, his daddy and 
Cheney's pals.
It has to be seen in context with the otherwise inexplicable 
Bushifying of our Oil Dependence in the State of The Union address. 
Now what the hell ? Why did he stick that in ? As the cartoon 
character always says: "what the ?"


And finally:
The Big Sell #3
The PARADE OF THE GENERALS:
And now, I'm really scared.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DRANT http://drrant.blogspot.com · POB 411197 · San Francisco · 
CA · 94141 1197
If you wish to UNSUBSCRIBE, please just reply to this email, and put 
UNSUBSCRIBE in the Subject line of your email.
Thanks.

David Rubinson
,,,, ,,,,
\\\ ///
~~~~~~~~~~{ô¿ô}~~~~~~~~~~~~~~~~~
~~~~~~~~~~( . ) ~~~~~~~~~~~~~~~~~
::::::::::::::ooo:::ooo :::::::::::::::::::::::::::::::::::::::::::::
::::::::::::::( ) ::: 
( )::::::::::::::::::::::::::::::::::::::::::::
( ) ( )


in J A M A I C A
YAH !! MON !!

Quote of the day:

"To live as if our choices make any real difference in the long
run may be the act of a fool, but to live as if they do not,
that is the act of a coward."

--Albert Camus



-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.pairlist.net/pipermail/austin-ghetto-list/attachments/20060511/51ea6fd8/attachment-0001.html


More information about the Austin-ghetto-list mailing list