. . . inspecting the global underbelly: privacy, money laundering, espionage.
Login to DMT Network
Vol 2 No 8 February 24, 2003
The War for Oil, Israel, and Empire . . .
But not to worry. We're eager to protect Saudi's oil along with Iraq's . . .
Gee, go ahead. Make my day . . .
Picasso's "Face of Peace" recreated at Santa Monica beach.
The Sun Sets Across the World. Notice how the
lights have come on in Rome
|Two articles explaining how to do your own financial investigations of politicians, government officials, judges, and law enforcement people. The first part, a motivational piece, is my introduction to a Jim Norman article explaining the efforts of a group of Fifth Column hackers who do just that. I don't agree with everything in Norman's article, but it's a good intro to the second article, which explains the basics of detecting unexplained sources of wealth (which often as not may be bribes, kickbacks, or payoffs from the Cali cartel). The second article appeared (without my permission) in Media Bypass (March 1996) under the title "Hackers vs. Politicians."|
|America's Dreyfus Affair: The Case of the Death of Vince Foster||Parts 1-6. Essay by David Martin.|
|Waco Holocaust Electronic Museum||An investigation put together by an inquisitive citizen, Carol Valentine, without benefit of subpoenas and wiretaps. After you visit the Museum, reflect on the shabby "investigation" conducted by the House of Representatives in 1995.|
|The John Doe Times||Info on the Oklahoma City bombing.|
|Softwar||Charles R. Smith follows the money trail of U.S. crypto policy.|
|John Young Architect's Cryptome||Document collection on privacy, cryptology, military technology.|
|Interim Report on the Crash of TWA Flight 800 and the Actions of the NTSB and the FBI||The report of Commander William S. Donaldson, USN Ret. in cooperation with Associated Retired Aviation Professionals.|