abonnement Unibet Coolblue Bitvavo
pi_1900103
Speciaal voor ARRYB!

--[Back of Cover]-------------------------------------------------------------
This official seal is your assurance that Nintendo has approved the quality of
this product. Always look for this seal when buying games and accessories with
your Game Boy System.

[Official Nintendo Seal of Quality]

LICENSED BY [Nintendo Logo]

NINTENDO, GAME BOY AND THE OFFICIAL SEALS ARE TRADEMARKS OF NINTENDO OF
AMERICA INC.

------------------------------------------------------------------------------
CAUTIONS DURING USE

1) If you play for long periods, take a 10 to 15 minute break every hour or
so.
2) This equipment is precision-built. Do not use or store it under
conditions of extreme temperature, or subject it to rough handling or
shock. Do not disassemble the unit.
3) Do not touch the connectors or let them come into contact with water, as
this may cause malfunction.
4) Do not wipe this equipment with volatile solvents such as thinner,
benzene or alcohol.
5) Store the Game Pak in its protective case when not in use.

--[Page 1]--------------------------------------------------------------------
CREEPY, KOOKY, OOKY, SPOOKY.

THE ADDAMS FAMILY has been evicted! To save their home from Tully Alford, the
family attorney, who is after the family fortune - Morticia, Lurch, Granny,
Pugsley and Wednesday have gone to the house to reason with him. But when
Gomez arrives, his family is missing!

As Gomez, you must save your loved ones, your home and your loads of wealth.
You'll have to watch out for scary obstacles like falling spikes, frightening
monsters and ghosts, and you'll need to look for clues as you search for your
family.

Get a move on... 'cause you're gonna make a call on THE ADDAMS FAMILY!

--[Page 2]--------------------------------------------------------------------
GETTING STARTED

To start THE ADDAMS FAMILY

1) Make sure that your Game Boy is turned off.
2) Insert THE ADDAMS FAMILY Game Pak into the cartridge slot.
3) Turn on the Game Boy.
4) After the copyright notice appears, press START to begin the game.

--[Page 3]--------------------------------------------------------------------
CONTROLS

[Picture of Game Boy]

START: Press START to begin play. Pressing START during play will pause the
game; press again to resume play.

SELECT: Press SELECT to change item during play (if you have collected any).

--[Page 4]--------------------------------------------------------------------
BUTTON A: Jump.

BUTTON B: Activates/Fires item currently in use.
When swimming, use BUTTON B to breathe and to increase oxygen.

CONTROL PAD UP: Enter doors/Swim up.

CONTROL PAD DOWN: Duck/Descend stairs (indicated by diagonal downward
arrow).

CONTROL PAD LEFT/RIGHT: Walk left/right, swim left/right.

CONTROL PAD UP AND LEFT/RIGHT: Ascend left/right.

DOWN AND BUTTON B: Scroll screen downward to look below.

--[Page 5]--------------------------------------------------------------------
STATUS DISPLAY

Different number points are gained by defeating creatures and collecting
treasures in the form of coins and money bags.

ENERGY: This is displayed as a row of hearts on the bottom left of the
screen. The number of hearts decreases as Gomez is hit.

WEAPON ITEM IN POSSESSION: If you have a weapon or item in your possession,
it is displayed in the window at the bottom center of the screen.

WEAPON/POWER: This is shown as a bar at the bottom right of the screen. This
decreases as Gomez uses the weapon or item in his possession. Each item has
its own power; when all of that power is used, it cannot be reused until it
is replenished by a power capsule.

--[Page 6]--------------------------------------------------------------------
HOW TO PLAY

Gomez must rescue all the members of his family from various locations within
the Addams Family house and the surrounding grounds.

You start outside the Addams Family house at the front door. You must work
your way around the house and the surrounding grounds of the family estate.

You acquire various items along your route that will assist you throughout the
game. These will enable you to negotiate areas that previously appeared to be
impassable.

The game is complete when Tully is defeated and all family members have been
rescued.

--[Page 7]--------------------------------------------------------------------
Potions

Pugsley has left Gomez potions in certain areas of the map, to assist you
during the game. These are as follows:

WOLFMAN POTION: This transforms Gomez into a superhuman Wolfman. This
enables him to travel more quickly and make large jumps while moving.

FRANKIE POTION: This transforms Gomez into a "levelheaded" invincible
character for 10 collisions with enemy creatures.

SEA MONSTER: This transforms Gomez into an amphibious creature that can swim
under water.

DRAC POTION: This transforms Gomez into a flying Vampire. To fly, press
BUTTON A repeatedly.

These potions last until Gomez loses a life (except in the case of the sea
monster).

--[Page 8]--------------------------------------------------------------------
Energy Hearts

These replenish Gomez's energy when collected. There are two types of hearts:

SMALL HEART: Increases Gomez's energy by one unit.

LARGE HEART: Increases Gomez's energy by two units.

Power Vials

These replenish the power of the weapon/item Gomez is currently using. To
replenish an item, select the item (by using select), then collect the vial.

There are two types of power vial:

TEST TUBE: Increases item power by a small amount.

FLASK: Increases item power by a large amount.

--[Page 9]--------------------------------------------------------------------
PLAYING TIPS

- Experiment with all the items to find out what they can do, because you will
have to use the appropriate item to negotiate obstacles.

- There are a few secret surprises hidden in the game - a foolish move may
reveal a shortcut!

- Certain weapons may defeat creatures more efficiently than others.

- Certain baddies can be stunned by jumping on them; others need to be shot
with weapons.

--[Page 10]-------------------------------------------------------------------
GAME SCENES

You start at the fornt door of the house. To the far left is the graveyard; to
the far right are the woods. If you push up in front of the front foor of the
house, you will enter the house.

The House

You enter the house on the ground floor. Use the staircase to move to
different floors. In the basement there is an entrance to the boiler room, and
a secret entrance that will only be revealed when Fester is overcome.

--[Page 11]-------------------------------------------------------------------
The Ground Floor

This is a hallway with stairs leading up and down.

The First Floor

The Kitchen is located to the far right. The entrance to the ice box is here;
to enter, stand in front of the fridge door and push up.

The Second Floor

To the right, the armory is located. There are some items to be collected
here.

--[Page 12]-------------------------------------------------------------------
The Third Floor

To the far left is the entrance to the river. The door to this is closed until
Wednesday is rescued from the Graveyard.

The Fourth Floor

Pugsley's room is located to the far right. The entrance to the toy box is
here. Stand on it and push up to enter. Also on this floor is the door to the
attic. This will only open when four of the family memvers have been rescued.

The Graveyard

You must make your way to the far left of the graveyard and enter the crypt.
You will face a large guardian that must be overcome to rescue Wednesday. To
enter the crypt, push up. To defeat the guardian, shoot it a number of times
in a certain spot.

--[Page 13]-------------------------------------------------------------------
The Woods

The woods are located to the right of the house. Make your way to the far
right, using a certain item that you will obtain during the game when a
particular member of the family has been rescued. The last tree stump on the
far right of the woods is the entrance to the beehive. Stand on top of this
stump and push down to enter. This level contains useful items to collect.

The Boiler Room

This level is a maze of pipes that you must negotiate in order to find the
entrance to the room where a guardian is holding Granny captive. This guardian
can only be overcome by attacking when he stops moving.

--[Page 14]-------------------------------------------------------------------
The Ice Box

This is a slippery ice kingdom, in which you must make your way to the top
right to collect a weapon to help you. You must negotiate icy cold pools of
water - one of the items you have collected will help you.

The River

You must swim to the far right of the level, avoiding fish and watching your
oxygen level. At the end of this level is a door where Lurch is held captive.
You must overcome a large guardian to save him. This guardian has only one
weak point that will flash when you hit the right place.

--[Page 15]-------------------------------------------------------------------
The Toy Box

Make your way to the far right and down to reach the entrance to the guardian
who is holding Pugsley captive. There are collapsing blocks that cannot be
stood on for long and a secret short cut. If you find it, push up and you will
enter a bonus room where you must collect coins for as long as possible. The
guardian holding Pugsley captive has only one weak spot that will flash, but
be warned - you need a lot of weapon power to defeat it.

The Attic

Make your way to the top of the level and out onto the roof to confront Uncle
Fester. Using certain weapons, you must force Fester into the lightning a
number of times, so he can regain his memory and reveal the secret basement
room where Morticia is being held.

--[Page 16]-------------------------------------------------------------------
The Dungeons

To rescue Morticia, you must negotiate the dungeons. You will have to be
careful of hidden traps to enter the room where you must facee Tully to save
the day.

Torture Chamber

Having succesfully negotiated the dungeons, you must enter the torture chamber
where you will face Tully. You must defeat him to rescue Morticia and complete
the game!

--[Front of Cover]------------------------------------------------------------
LIMITED WARRANTY

Ocean of America, Inc. warrants to the original purchaser only that the
cartridge provided with this manual and the software program coded on it will
perform in accordance with the descriptions in this manual when used with the
specified equipment, for a period of 90 days from the date of purchase. If the
program is found defective within 90 days of purchase, it will be replaced.
Simply return the cartridge to Ocean of America, Inc. or its authorized dealer
along with a dated proof of purchase. Replacement of the cartridge, free of
charge to the original purchaser (except for the cost of returning the
cartridge) is the full extent of our liability.

THIS WARRANTY IS IN LIEU OF ALL OTHER WARRANTIES, WHETHER ORAL OR WRITTEN,
EXPRESS OR IMPLIED. ALL IMPLIED WARRANTIES, INCLUDING THOSE OF MERCHANTIBILITY
AND FITNESS FOR A PARTICULAR PURPOSE, IF APPLICABLE, ARE LIMITED IN DURATION
TO 90 DAYS FROM THE DATE OF PURCHASE OF THIS PRODUCT.

Ocean of America, Inc. shall not be liable for incidental and/or consequential
damages for the breach of any express or implied warranty including damage to
property and, to the extent permitted by law, damages for personal injury,
even if Ocean of America, Inc. has been advised of the possibility of such
damages or limitations on how long an implied warranty lasts, so the above
limitations or exclusions may not apply to you.

This warranty shall not be applicable to the extent than any provision of this
warranty is prohibited by any federal, state or municipal law which cannot be
pre-empted. This warranty gives you specific legal rights and you may also
have other rights which vary from state to state.

Ocean of America, Inc. 1855 O'Toole Ave., Suite D-102, San Jose, CA 95131.
(408) 954-0201.

------------------------------------------------------------------------------
[Ocean Logo]

Ocean of America, Inc.
1855 O'Tool Avenue, Suite D-102
San Jose, California 95131

TM & C 1991 Paramount Pictures. All rights reserved.
THE ADDAMS FAMILY logo is a Trademark of Paramount Pictures.
Ocean of America Authorized User.

Printed in Japan.

pi_1900127
euh..
http://www.punksquad.nl - Het eerste Nederlandse online punk magazine - Sinds 2000
pi_1900142
Pfff die jongen komt geeneens in dit forum....
[20:25] [Knut] Een vrouw met een kerst fetish...
[20:26] [Knut] Niet zo letterlijk dat ik haar met baard om moet HOHOHOEN
[20:26] [Knut] maar je snapt het idee wel.
  † In Memoriam † zondag 14 oktober 2001 @ 21:27:29 #4
4036 crew  Cynix ®
Verzuurde hork
pi_1900207
> He Mike wat heb je daar nou?
>
> Ik heb hier iets heel bijzonders.Iets waar heel de wereld al lang op zit te
wachten
>
> Ongelooflijk, vertel ons snel wat het is...
>
> Ik heb hier een wit vierkant materiaal en een stokje.
> U zult zich wel afvragen, wat is dat nu weer.
>
> Ja Mike, laat ons niet in spanning......
>
>Als ik met het stokje over het witte materiaal beweeg, dan verkleurt het op
> de plek waar ik met het stokje over heen ben gegaan.
>
> Ongeloofelijk.....
>
> Ja, maar dat is nog niet alles. Als ik met het stokje, wat trouwens een pen
> heet, een letter, zoals je die normaal op een scherm ziet, op het materiaal
> teken....
>
> Ongeloofelijk, ik begin het te snappen....
> Dus als je meerdere letters neerzet kan je gewoon lezen zonder dat je een
> beeldscherm nodig hebt.
>
> Inderdaad, jij snapt het. Als dat geen amazing discovery is, het materiaal
> heet overigens Papier.
>
> Ongeloofelijk, en je hebt helemaal geen stroom nodig Mike?
>
> Nee, geweldig he, er zitten zelfs geen batterijen of accu in.
>
> Nou, nou, nou zeg. Onvoorstelbaar.
> Ha Mike, je klapt het dicht. Dat kan mijn notebook ook.
>
> Nee, dit is anders, ja kan het zo vaak vouwen als je wilt tot het door jou
> gewenste afmeting heeft.
>
> Oh Mike, je gaat maar door en het wordt kleiner en kleiner.
>
> Ja, nu past het zelfs in mijn portefueille.
>
> Ongeloofelijk, dus ik kan het altijd bij me dragen.
> Kom eens Mike, mag ik het eens vasthouden.
>
> Maar natuurlijk, ga je gang.
>
> Maar dit is ongelooflijk, het weegt bijna niets.
>
> Dat klopt het weegt 100 maal lichter dan het kleinst verkrijgbare
> notebook.
>
> Dat komt natuurlijk omdat er geen accu in zit.
>
> Geen accu, 100 maal lichter. Ongelooflijk ik droom!!!
>
> Nee, nee je droomt niet, knijp maar flink in je arm.....
> Kijk ik vouw het weer uit en....
>
> Maar Mike wat doe je nu? Nee, dat kan niet, je scheurt het papier
> doormidden.
>
> Dit materiaal is zo geweldig. Ik ik houd de helften tegen elkaar aan en je
> kan het gewoon weer lezen.
>
> Ongelooflijk, dat moet je met een diskette niet proberen ha ha ha.
>
> Maar wat doe je nu? Nee, niet doen, niet doen!!!
> Je gaat er zo maar op staan springen.
> Ongelooflijk, en je kan het nog steeds lezen!!!
>
> Stel je voor als je zo op je monitor zou gaan springen.
> Ongelooflijk, wat een discovery!!!
> Zeg Mike, hoe lang kan je papier eigenlijk bewaren?
>
> Nou veel langer dan een diskette of harddisk waarvan de magnetisch
> gevoeligheid op den duur verdwijnt.
>
> Ongelooflijk, wat een amazing discovery!
>
> Maar dat is nog niet alles!
>
> Nee???
>
> Je kan het overal mee naar toenemen, je kan het gebruiken bij hoge en lage
> temperaturen. En als je het niet meer nodig hebt kan je altijd nog je neus
> erin snuiten of op de WC...... je begrijpt wel wat ik bedoel!
>
> Ja Mike ongelooflijk......
> Zeg Mike, maar dat zou kunnen betekenen dat we op een dag helemaal geen
> beeldschermen, computers en notebooks meer nodig hebben.
>
> Inderdaad, is dat niet ongeloooooooooflijk. Wat een amazing
> discovery.....
Vertel het me en ik zal het vergeten. Laat het me zien en ik zal het onthouden. Laat het me ervaren en ik zal het me eigen maken.
De toekomst hangt af van wat je nu aan het doen bent.
pi_1900243
koppie..... peest....
:{
pi_1900296
quote:
Op zondag 14 oktober 2001 21:29 schreef Cora het volgende:
koppie..... peest....
Flauw
pi_1900375
quote:
Op zondag 14 oktober 2001 21:27 schreef Mike een amazing discovery
LOL
pi_1900404
quote:
Op zondag 14 oktober 2001 21:33 schreef calvobbes het volgende:
Flauw
Dank je, dan zit ik in het goede forum
:{
pi_1900505
FOREWORD
On 4 June 1996, the maiden flight of the Ariane 5 launcher ended in a failure. Only about 40 seconds after initiation of the flight sequence, at an altitude of about 3700 m, the launcher veered off its flight path, broke up and exploded. Engineers from the Ariane 5 project teams of CNES and Industry immediately started to investigate the failure. Over the following days, the Director General of ESA and the Chairman of CNES set up an independent Inquiry Board and nominated the following members :

- Prof. Jacques-Louis Lions (Chairman) Academie des Sciences (France)
- Dr. Lennart Lbeck (Vice-Chairman) Swedish Space Corporation (Sweden)
- Mr. Jean-Luc Fauquembergue Delegation Generale pour l'Armement (France)
- Mr. Gilles Kahn Institut National de Recherche en Informatique et en Automatique (INRIA), (France)
- Prof. Dr. Ing. Wolfgang Kubbat Technical University of Darmstadt (Germany)
- Dr. Ing. Stefan Levedag Daimler Benz Aerospace (Germany)
- Dr. Ing. Leonardo Mazzini Alenia Spazio (Italy)
- Mr. Didier Merle Thomson CSF (France)
- Dr. Colin O'Halloran Defence Evaluation and Research Agency (DERA), (U.K.)

The terms of reference assigned to the Board requested it

- to determine the causes of the launch failure,
- to investigate whether the qualification tests and acceptance tests were appropriate in relation to the problem encountered,
- to recommend corrective action to remove the causes of the anomaly and other possible weaknesses of the systems found to be at fault.

The Board started its work on 13 June 1996. It was assisted by a Technical Advisory Committee composed of :

- Dr Mauro Balduccini (BPD)
- Mr Yvan Choquer (Matra Marconi Space)
- Mr Remy Hergott (CNES)
- Mr Bernard Humbert (Aerospatiale)
- Mr Eric Lefort (ESA)

In accordance with its terms of reference, the Board concentrated its investigations on the causes of the failure, the systems supposed to be responsible, any failures of similar nature in similar systems, and events that could be linked to the accident. Consequently, the recommendations made by the Board are limited to the areas examined. The report contains the analysis of the failure, the Board's conclusions and its recommendations for corrective measures, most of which should be undertaken before the next flight of Ariane 5. There is in addition a report for restricted circulation in which the Board's findings are documented in greater technical detail. Although it consulted the telemetry data recorded during the flight, the Board has not undertaken an evaluation of those data. Nor has it made a complete review of the whole launcher and all its systems.

This report is the result of a collective effort by the Commission, assisted by the members of the Technical Advisory Committee.

We have all worked hard to present a very precise explanation of the reasons for the failure and to make a contribution towards the improvement of Ariane 5 software. This improvement is necessary to ensure the success of the programme.

The Board's findings are based on thorough and open presentations from the Ariane 5 project teams, and on documentation which has demonstrated the high quality of the Ariane 5 programme as regards engineering work in general and completeness and traceability of documents.

Chairman of the Board

1. THE FAILURE
1.1 GENERAL DESCRIPTION
On the basis of the documentation made available and the information presented to the Board, the following has been observed:

The weather at the launch site at Kourou on the morning of 4 June 1996 was acceptable for a launch that day, and presented no obstacle to the transfer of the launcher to the launch pad. In particular, there was no risk of lightning since the strength of the electric field measured at the launch site was negligible. The only uncertainty concerned fulfilment of the visibility criteria.

The countdown, which also comprises the filling of the core stage, went smoothly until H0-7 minutes when the launch was put on hold since the visibility criteria were not met at the opening of the launch window (08h35 local time). Visibility conditions improved as forecast and the launch was initiated at H0 = 09h 33mn 59s local time (=12h 33mn 59s UT). Ignition of the Vulcain engine and the two solid boosters was nominal, as was lift-off. The vehicle performed a nominal flight until approximately H0 + 37 seconds. Shortly after that time, it suddenly veered off its flight path, broke up, and exploded. A preliminary investigation of flight data showed:

nominal behaviour of the launcher up to H0 + 36 seconds;
failure of the back-up Inertial Reference System followed immediately by failure of the active Inertial Reference System;
swivelling into the extreme position of the nozzles of the two solid boosters and, slightly later, of the Vulcain engine, causing the launcher to veer abruptly;
self-destruction of the launcher correctly triggered by rupture of the links between the solid boosters and the core stage.
The origin of the failure was thus rapidly narrowed down to the flight control system and more particularly to the Inertial Reference Systems, which obviously ceased to function almost simultaneously at around H0 + 36.7 seconds.

1.2 INFORMATION AVAILABLE
The information available on the launch includes:

- telemetry data received on the ground until H0 + 42 seconds
- trajectory data from radar stations
- optical observations (IR camera, films) - inspection of recovered material.

The whole of the telemetry data received in Kourou was transferred to CNES/Toulouse where the data were converted into parameter over time plots. CNES provided a copy of the data to Aerospatiale, which carried out analyses concentrating mainly on the data concerning the electrical system.

1.3 RECOVERY OF MATERIAL
The self-destruction of the launcher occurred near to the launch pad, at an altitude of approximately 4000 m. Therefore, all the launcher debris fell back onto the ground, scattered over an area of approximately 12 km2 east of the launch pad. Recovery of material proved difficult, however, since this area is nearly all mangrove swamp or savanna.

Nevertheless, it was possible to retrieve from the debris the two Inertial Reference Systems. Of particular interest was the one which had worked in active mode and stopped functioning last, and for which, therefore, certain information was not available in the telemetry data (provision for transmission to ground of this information was confined to whichever of the two units might fail first). The results of the examination of this unit were very helpful to the analysis of the failure sequence.

1.4 UNRELATED ANOMALIES OBSERVED
Post-flight analysis of telemetry has shown a number of anomalies which have been reported to the Board. They are mostly of minor significance and such as to be expected on a demonstration flight.

One anomaly which was brought to the particular attention of the Board was the gradual development, starting at Ho + 22 seconds, of variations in the hydraulic pressure of the actuators of the main engine nozzle. These variations had a frequency of approximately 10 Hz.

There are some preliminary explanations as to the cause of these variations, which are now under investigation.

After consideration, the Board has formed the opinion that this anomaly, while significant, has no bearing on the failure of Ariane 501.

2. ANALYSIS OF THE FAILURE
2.1 CHAIN OF TECHNICAL EVENTS
In general terms, the Flight Control System of the Ariane 5 is of a standard design. The attitude of the launcher and its movements in space are measured by an Inertial Reference System (SRI). It has its own internal computer, in which angles and velocities are calculated on the basis of information from a "strap-down" inertial platform, with laser gyros and accelerometers. The data from the SRI are transmitted through the databus to the On-Board Computer (OBC), which executes the flight program and controls the nozzles of the solid boosters and the Vulcain cryogenic engine, via servovalves and hydraulic actuators.

In order to improve reliability there is considerable redundancy at equipment level. There are two SRIs operating in parallel, with identical hardware and software. One SRI is active and one is in "hot" stand-by, and if the OBC detects that the active SRI has failed it immediately switches to the other one, provided that this unit is functioning properly. Likewise there are two OBCs, and a number of other units in the Flight Control System are also duplicated.

The design of the Ariane 5 SRI is practically the same as that of an SRI which is presently used on Ariane 4, particularly as regards the software.

Based on the extensive documentation and data on the Ariane 501 failure made available to the Board, the following chain of events, their inter-relations and causes have been established, starting with the destruction of the launcher and tracing back in time towards the primary cause.

The launcher started to disintegrate at about H0 + 39 seconds because of high aerodynamic loads due to an angle of attack of more than 20 degrees that led to separation of the boosters from the main stage, in turn triggering the self-destruct system of the launcher.
This angle of attack was caused by full nozzle deflections of the solid boosters and the Vulcain main engine.
These nozzle deflections were commanded by the On-Board Computer (OBC) software on the basis of data transmitted by the active Inertial Reference System (SRI 2). Part of these data at that time did not contain proper flight data, but showed a diagnostic bit pattern of the computer of the SRI 2, which was interpreted as flight data.
The reason why the active SRI 2 did not send correct attitude data was that the unit had declared a failure due to a software exception.
The OBC could not switch to the back-up SRI 1 because that unit had already ceased to function during the previous data cycle (72 milliseconds period) for the same reason as SRI 2.
The internal SRI software exception was caused during execution of a data conversion from 64-bit floating point to 16-bit signed integer value. The floating point number which was converted had a value greater than what could be represented by a 16-bit signed integer. This resulted in an Operand Error. The data conversion instructions (in Ada code) were not protected from causing an Operand Error, although other conversions of comparable variables in the same place in the code were protected.
The error occurred in a part of the software that only performs alignment of the strap-down inertial platform. This software module computes meaningful results only before lift-off. As soon as the launcher lifts off, this function serves no purpose.
The alignment function is operative for 50 seconds after starting of the Flight Mode of the SRIs which occurs at H0 - 3 seconds for Ariane 5. Consequently, when lift-off occurs, the function continues for approx. 40 seconds of flight. This time sequence is based on a requirement of Ariane 4 and is not required for Ariane 5.
The Operand Error occurred due to an unexpected high value of an internal alignment function result called BH, Horizontal Bias, related to the horizontal velocity sensed by the platform. This value is calculated as an indicator for alignment precision over time.
The value of BH was much higher than expected because the early part of the trajectory of Ariane 5 differs from that of Ariane 4 and results in considerably higher horizontal velocity values.
The SRI internal events that led to the failure have been reproduced by simulation calculations. Furthermore, both SRIs were recovered during the Board's investigation and the failure context was precisely determined from memory readouts. In addition, the Board has examined the software code which was shown to be consistent with the failure scenario. The results of these examinations are documented in the Technical Report.

Therefore, it is established beyond reasonable doubt that the chain of events set out above reflects the technical causes of the failure of Ariane 501.

2.2 COMMENTS ON THE FAILURE SCENARIO
In the failure scenario, the primary technical causes are the Operand Error when converting the horizontal bias variable BH, and the lack of protection of this conversion which caused the SRI computer to stop.

It has been stated to the Board that not all the conversions were protected because a maximum workload target of 80% had been set for the SRI computer. To determine the vulnerability of unprotected code, an analysis was performed on every operation which could give rise to an exception, including an Operand Error. In particular, the conversion of floating point values to integers was analysed and operations involving seven variables were at risk of leading to an Operand Error. This led to protection being added to four of the variables, evidence of which appears in the Ada code. However, three of the variables were left unprotected. No reference to justification of this decision was found directly in the source code. Given the large amount of documentation associated with any industrial application, the assumption, although agreed, was essentially obscured, though not deliberately, from any external review.

The reason for the three remaining variables, including the one denoting horizontal bias, being unprotected was that further reasoning indicated that they were either physically limited or that there was a large margin of safety, a reasoning which in the case of the variable BH turned out to be faulty. It is important to note that the decision to protect certain variables but not others was taken jointly by project partners at several contractual levels.

There is no evidence that any trajectory data were used to analyse the behaviour of the unprotected variables, and it is even more important to note that it was jointly agreed not to include the Ariane 5 trajectory data in the SRI requirements and specification.

Although the source of the Operand Error has been identified, this in itself did not cause the mission to fail. The specification of the exception-handling mechanism also contributed to the failure. In the event of any kind of exception, the system specification stated that: the failure should be indicated on the databus, the failure context should be stored in an EEPROM memory (which was recovered and read out for Ariane 501), and finally, the SRI processor should be shut down.

It was the decision to cease the processor operation which finally proved fatal. Restart is not feasible since attitude is too difficult to re-calculate after a processor shutdown; therefore the Inertial Reference System becomes useless. The reason behind this drastic action lies in the culture within the Ariane programme of only addressing random hardware failures. From this point of view exception - or error - handling mechanisms are designed for a random hardware failure which can quite rationally be handled by a backup system.

Although the failure was due to a systematic software design error, mechanisms can be introduced to mitigate this type of problem. For example the computers within the SRIs could have continued to provide their best estimates of the required attitude information. There is reason for concern that a software exception should be allowed, or even required, to cause a processor to halt while handling mission-critical equipment. Indeed, the loss of a proper software function is hazardous because the same software runs in both SRI units. In the case of Ariane 501, this resulted in the switch-off of two still healthy critical units of equipment.

The original requirement acccounting for the continued operation of the alignment software after lift-off was brought forward more than 10 years ago for the earlier models of Ariane, in order to cope with the rather unlikely event of a hold in the count-down e.g. between - 9 seconds, when flight mode starts in the SRI of Ariane 4, and - 5 seconds when certain events are initiated in the launcher which take several hours to reset. The period selected for this continued alignment operation, 50 seconds after the start of flight mode, was based on the time needed for the ground equipment to resume full control of the launcher in the event of a hold.

This special feature made it possible with the earlier versions of Ariane, to restart the count- down without waiting for normal alignment, which takes 45 minutes or more, so that a short launch window could still be used. In fact, this feature was used once, in 1989 on Flight 33.

The same requirement does not apply to Ariane 5, which has a different preparation sequence and it was maintained for commonality reasons, presumably based on the view that, unless proven necessary, it was not wise to make changes in software which worked well on Ariane 4.

Even in those cases where the requirement is found to be still valid, it is questionable for the alignment function to be operating after the launcher has lifted off. Alignment of mechanical and laser strap-down platforms involves complex mathematical filter functions to properly align the x-axis to the gravity axis and to find north direction from Earth rotation sensing. The assumption of preflight alignment is that the launcher is positioned at a known and fixed position. Therefore, the alignment function is totally disrupted when performed during flight, because the measured movements of the launcher are interpreted as sensor offsets and other coefficients characterising sensor behaviour.

Returning to the software error, the Board wishes to point out that software is an expression of a highly detailed design and does not fail in the same sense as a mechanical system. Furthermore software is flexible and expressive and thus encourages highly demanding requirements, which in turn lead to complex implementations which are difficult to assess.

An underlying theme in the development of Ariane 5 is the bias towards the mitigation of random failure. The supplier of the SRI was only following the specification given to it, which stipulated that in the event of any detected exception the processor was to be stopped. The exception which occurred was not due to random failure but a design error. The exception was detected, but inappropriately handled because the view had been taken that software should be considered correct until it is shown to be at fault. The Board has reason to believe that this view is also accepted in other areas of Ariane 5 software design. The Board is in favour of the opposite view, that software should be assumed to be faulty until applying the currently accepted best practice methods can demonstrate that it is correct.

This means that critical software - in the sense that failure of the software puts the mission at risk - must be identified at a very detailed level, that exceptional behaviour must be confined, and that a reasonable back-up policy must take software failures into account.

2.3 THE TESTING AND QUALIFICATION PROCEDURES

The Flight Control System qualification for Ariane 5 follows a standard procedure and is performed at the following levels :

- Equipment qualification
- Software qualification (On-Board Computer software)
- Stage integration
- System validation tests.

The logic applied is to check at each level what could not be achieved at the previous level, thus eventually providing complete test coverage of each sub-system and of the integrated system.

Testing at equipment level was in the case of the SRI conducted rigorously with regard to all environmental factors and in fact beyond what was expected for Ariane 5. However, no test was performed to verify that the SRI would behave correctly when being subjected to the count-down and flight time sequence and the trajectory of Ariane 5.

It should be noted that for reasons of physical law, it is not feasible to test the SRI as a "black box" in the flight environment, unless one makes a completely realistic flight test, but it is possible to do ground testing by injecting simulated accelerometric signals in accordance with predicted flight parameters, while also using a turntable to simulate launcher angular movements. Had such a test been performed by the supplier or as part of the acceptance test, the failure mechanism would have been exposed.

The main explanation for the absence of this test has already been mentioned above, i.e. the SRI specification (which is supposed to be a requirements document for the SRI) does not contain the Ariane 5 trajectory data as a functional requirement.

The Board has also noted that the systems specification of the SRI does not indicate operational restrictions that emerge from the chosen implementation. Such a declaration of limitation, which should be mandatory for every mission-critical device, would have served to identify any non-compliance with the trajectory of Ariane 5.

The other principal opportunity to detect the failure mechanism beforehand was during the numerous tests and simulations carried out at the Functional Simulation Facility ISF, which is at the site of the Industrial Architect. The scope of the ISF testing is to qualify :

- the guidance, navigation and control performance in the whole flight envelope,
- the sensors redundancy operation, - the dedicated functions of the stages,
- the flight software (On-Board Computer) compliance with all equipment of the Flight Control Electrical System.

A large number of closed-loop simulations of the complete flight simulating ground segment operation, telemetry flow and launcher dynamics were run in order to verify :

- the nominal trajectory
- trajectories degraded with respect to internal launcher parameters
- trajectories degraded with respect to atmospheric parameters
- equipment failures and the subsequent failure isolation and recovery

In these tests many equipment items were physically present and exercised but not the two SRIs, which were simulated by specifically developed software modules. Some open-loop tests, to verify compliance of the On-Board Computer and the SRI, were performed with the actual SRI. It is understood that these were just electrical integration tests and "low-level " (bus communication) compliance tests.

It is not mandatory, even if preferable, that all the parts of the subsystem are present in all the tests at a given level. Sometimes this is not physically possible or it is not possible to exercise them completely or in a representative way. In these cases it is logical to replace them with simulators but only after a careful check that the previous test levels have covered the scope completely.

This procedure is especially important for the final system test before the system is operationally used (the tests performed on the 501 launcher itself are not addressed here since they are not specific to the Flight Control Electrical System qualification).

In order to understand the explanations given for the decision not to have the SRIs in the closed-loop simulation, it is necessary to describe the test configurations that might have been used.

Because it is not possible to simulate the large linear accelerations of the launcher in all three axes on a test bench (as discussed above), there are two ways to put the SRI in the loop:

A) To put it on a three-axis dynamic table (to stimulate the Ring Laser Gyros) and to substitute the analog output of the accelerometers (which can not be stimulated mechanically) by simulation via a dedicated test input connector and an electronic board designed for this purpose. This is similar to the method mentioned in connection with possible testing at equipment level.

B) To substitute both, the analog output of the accelerometers and the Ring Laser Gyros via a dedicated test input connector with signals produced by simulation.

The first approach is likely to provide an accurate simulation (within the limits of the three-axis dynamic table bandwidth) and is quite expensive; the second is cheaper and its performance depends essentially on the accuracy of the simulation. In both cases a large part of the electronics and the complete software are tested in the real operating environment.

When the project test philosophy was defined, the importance of having the SRIs in the loop was recognized and a decision was taken to select method B above. At a later stage of the programme (in 1992), this decision was changed. It was decided not to have the actual SRIs in the loop for the following reasons :

The SRIs should be considered to be fully qualified at equipment level
The precision of the navigation software in the On-Board Computer depends critically on the precision of the SRI measurements. In the ISF, this precision could not be achieved by the electronics creating the test signals.
The simulation of failure modes is not possible with real equipment, but only with a model.
The base period of the SRI is 1 millisecond whilst that of the simulation at the ISF is 6 milliseconds. This adds to the complexity of the interfacing electronics and may further reduce the precision of the simulation.
The opinion of the Board is that these arguments were technically valid, but since the purpose of a system simulation test is not only to verify the interfaces but also to verify the system as a whole for the particular application, there was a definite risk in assuming that critical equipment such as the SRI had been validated by qualification on its own, or by previous use on Ariane 4.

While high accuracy of a simulation is desirable, in the ISF system tests it is clearly better to compromise on accuracy but achieve all other objectives, amongst them to prove the proper system integration of equipment such as the SRI. The precision of the guidance system can be effectively demonstrated by analysis and computer simulation.

Under this heading it should be noted finally that the overriding means of preventing failures are the reviews which are an integral part of the design and qualification process, and which are carried out at all levels and involve all major partners in the project (as well as external experts). In a programme of this size, literally thousands of problems and potential failures are successfully handled in the review process and it is obviously not easy to detect software design errors of the type which were the primary technical cause of the 501 failure. Nevertheless, it is evident that the limitations of the SRI software were not fully analysed in the reviews, and it was not realised that the test coverage was inadequate to expose such limitations. Nor were the possible implications of allowing the alignment software to operate during flight realised. In these respects, the review process was a contributory factor in the failure.

2.4 POSSIBLE OTHER WEAKNESSES OF SYSTEMS INVOLVED
In accordance with its termes of reference, the Board has examined possible other weaknesses, primarily in the Flight Control System. No weaknesses were found which were related to the failure, but in spite of the short time available, the Board has conducted an extensive review of the Flight Control System based on experience gained during the failure analysis.

The review has covered the following areas :

- The design of the electrical system,
- Embedded on-board software in subsystems other than the Inertial Reference System,
- The On-Board Computer and the flight program software.

In addition, the Board has made an analysis of methods applied in the development programme, in particular as regards software development methodology.

The results of these efforts have been documented in the Technical Report and it is the hope of the Board that they will contribute to further improvement of the Ariane 5 Flight Control System and its software.

3. CONCLUSIONS
3.1 FINDINGS
The Board reached the following findings:

a) During the launch preparation campaign and the count-down no events occurred which were related to the failure.

b) The meteorological conditions at the time of the launch were acceptable and did not play any part in the failure. No other external factors have been found to be of relevance.

c) Engine ignition and lift-off were essentially nominal and the environmental effects (noise and vibration) on the launcher and the payload were not found to be relevant to the failure. Propulsion performance was within specification.

d) 22 seconds after H0 (command for main cryogenic engine ignition), variations of 10 Hz frequency started to appear in the hydraulic pressure of the actuators which control the nozzle of the main engine. This phenomenon is significant and has not yet been fully explained, but after consideration it has not been found relevant to the failure.

e) At 36.7 seconds after H0 (approx. 30 seconds after lift-off) the computer within the back-up inertial reference system, which was working on stand-by for guidance and attitude control, became inoperative. This was caused by an internal variable related to the horizontal velocity of the launcher exceeding a limit which existed in the software of this computer.

f) Approx. 0.05 seconds later the active inertial reference system, identical to the back-up system in hardware and software, failed for the same reason. Since the back-up inertial system was already inoperative, correct guidance and attitude information could no longer be obtained and loss of the mission was inevitable.

g) As a result of its failure, the active inertial reference system transmitted essentially diagnostic information to the launcher's main computer, where it was interpreted as flight data and used for flight control calculations.

h) On the basis of those calculations the main computer commanded the booster nozzles, and somewhat later the main engine nozzle also, to make a large correction for an attitude deviation that had not occurred.

i) A rapid change of attitude occurred which caused the launcher to disintegrate at 39 seconds after H0 due to aerodynamic forces.

j) Destruction was automatically initiated upon disintegration, as designed, at an altitude of 4 km and a distance of 1 km from the launch pad.

k) The debris was spread over an area of 5 x 2.5 km2. Amongst the equipment recovered were the two inertial reference systems. They have been used for analysis.

l) The post-flight analysis of telemetry data has listed a number of additional anomalies which are being investigated but are not considered significant to the failure.

m) The inertial reference system of Ariane 5 is essentially common to a system which is presently flying on Ariane 4. The part of the software which caused the interruption in the inertial system computers is used before launch to align the inertial reference system and, in Ariane 4, also to enable a rapid realignment of the system in case of a late hold in the countdown. This realignment function, which does not serve any purpose on Ariane 5, was nevertheless retained for commonality reasons and allowed, as in Ariane 4, to operate for approx. 40 seconds after lift-off.

n) During design of the software of the inertial reference system used for Ariane 4 and Ariane 5, a decision was taken that it was not necessary to protect the inertial system computer from being made inoperative by an excessive value of the variable related to the horizontal velocity, a protection which was provided for several other variables of the alignment software. When taking this design decision, it was not analysed or fully understood which values this particular variable might assume when the alignment software was allowed to operate after lift-off.

o) In Ariane 4 flights using the same type of inertial reference system there has been no such failure because the trajectory during the first 40 seconds of flight is such that the particular variable related to horizontal velocity cannot reach, with an adequate operational margin, a value beyond the limit present in the software.

p) Ariane 5 has a high initial acceleration and a trajectory which leads to a build-up of horizontal velocity which is five times more rapid than for Ariane 4. The higher horizontal velocity of Ariane 5 generated, within the 40-second timeframe, the excessive value which caused the inertial system computers to cease operation.

q) The purpose of the review process, which involves all major partners in the Ariane 5 programme, is to validate design decisions and to obtain flight qualification. In this process, the limitations of the alignment software were not fully analysed and the possible implications of allowing it to continue to function during flight were not realised.

r) The specification of the inertial reference system and the tests performed at equipment level did not specifically include the Ariane 5 trajectory data. Consequently the realignment function was not tested under simulated Ariane 5 flight conditions, and the design error was not discovered.

s) It would have been technically feasible to include almost the entire inertial reference system in the overall system simulations which were performed. For a number of reasons it was decided to use the simulated output of the inertial reference system, not the system itself or its detailed simulation. Had the system been included, the failure could have been detected.

t) Post-flight simulations have been carried out on a computer with software of the inertial reference system and with a simulated environment, including the actual trajectory data from the Ariane 501 flight. These simulations have faithfully reproduced the chain of events leading to the failure of the inertial reference systems.

3.2 CAUSE OF THE FAILURE
The failure of the Ariane 501 was caused by the complete loss of guidance and attitude information 37 seconds after start of the main engine ignition sequence (30 seconds after lift- off). This loss of information was due to specification and design errors in the software of the inertial reference system.

The extensive reviews and tests carried out during the Ariane 5 Development Programme did not include adequate analysis and testing of the inertial reference system or of the complete flight control system, which could have detected the potential failure.

4. RECOMMENDATIONS
On the basis of its analyses and conclusions, the Board makes the following recommendations.

R1 Switch off the alignment function of the inertial reference system immediately after lift-off. More generally, no software function should run during flight unless it is needed.

R2 Prepare a test facility including as much real equipment as technically feasible, inject realistic input data, and perform complete, closed-loop, system testing. Complete simulations must take place before any mission. A high test coverage has to be obtained.

R3 Do not allow any sensor, such as the inertial reference system, to stop sending best effort data.

R4 Organize, for each item of equipment incorporating software, a specific software qualification review. The Industrial Architect shall take part in these reviews and report on complete system testing performed with the equipment. All restrictions on use of the equipment shall be made explicit for the Review Board. Make all critical software a Configuration Controlled Item (CCI).

R5 Review all flight software (including embedded software), and in particular :

Identify all implicit assumptions made by the code and its justification documents on the values of quantities provided by the equipment. Check these assumptions against the restrictions on use of the equipment.
Verify the range of values taken by any internal or communication variables in the software.
Solutions to potential problems in the on-board computer software, paying particular attention to on-board computer switch over, shall be proposed by the project team and reviewed by a group of external experts, who shall report to the on-board computer Qualification Board.
R6 Wherever technically feasible, consider confining exceptions to tasks and devise backup capabilities.

R7 Provide more data to the telemetry upon failure of any component, so that recovering equipment will be less essential.

R8 Reconsider the definition of critical components, taking failures of software origin into account (particularly single point failures).

R9 Include external (to the project) participants when reviewing specifications, code and justification documents. Make sure that these reviews consider the substance of arguments, rather than check that verifications have been made.

R10 Include trajectory data in specifications and test requirements.

R11 Review the test coverage of existing equipment and extend it where it is deemed necessary.

R12 Give the justification documents the same attention as code. Improve the technique for keeping code and its justifications consistent.

R13 Set up a team that will prepare the procedure for qualifying software, propose stringent rules for confirming such qualification, and ascertain that specification, verification and testing of software are of a consistently high quality in the Ariane 5 programme. Including external RAMS experts is to be considered.

R14 A more transparent organisation of the cooperation among the partners in the Ariane 5 programme must be considered. Close engineering cooperation, with clear cut authority and responsibility, is needed to achieve system coherence, with simple and clear interfaces between partners.

- END -

pi_1900535
Maarre, wat vind je zelf? Je eigen postings zijn niet een heeeeeel klein beetje flauw?
In ieder geval succes nog met het koppie en peesten, ik hoop dat je je frustraties er in kwijt kunt
:{
  zondag 14 oktober 2001 @ 21:53:30 #11
10119 appelsientje
Het beste onder de zon
pi_1900544
Zoekfunctie op FOK!
Gepost door Danny (FOS4) - zondag 14 oktober 2001 @ 15:05
Na jaren van afwezigheid is er weer een zoekfunctie op FOK!
Je kunt zoeken in nieuwsberichten, in reactie of op usernaam. Binnenkort wordt ook zoeken in reviews en columns mogelijk gemaakt.

Om te zoeken tik je een woord een deel van een zin. Vervolgens selecteer je of je wil zoeken in nieuwsberichten, reacties of op usernaam en uiteindelijk selecteer je het aantal reacties dat je per pagina wil zien.

Bij het zoeken op usernaam krijg je overigens een compleet overzicht van alle reacties van die user, en heeft het veld 'aantal resultaten per pagina' geen functie. Door DazzL - zondag 14 oktober 2001 @ 15:09 (+1 - Normaal)
ehhh.. en waar kunnen wij die search functie vinden?

-edit-
Ok ik zie het al.. thanx
[ Dit bericht is gewijzigd door DazzL ] Door karmel - zondag 14 oktober 2001 @ 15:09 (+1 - Normaal)
Ah, dat is het betere werk. Klasse Door Sike - zondag 14 oktober 2001 @ 15:11 (+1 - Normaal)
Super te gek, bedankt FOK! Door 4]-[ Highlander - zondag 14 oktober 2001 @ 15:17 (+1 - Normaal)

quote:
ehhh.. en waar kunnen wij die search functie vinden?

Dat is een hele goede vraag, ik kan hem ook niet vinden. Logische plek zou bij de dropdownlist van nieuws zijn, maar daar staat die niet bij.
Overigens vind ik dat je goed bezig ben, Danny. Nu alleen nog alle smileys in het reageerveldje

Ondertitel: Het puntensysteem zuigt

[edit]Dazzl, waar staat dat ding dan? Ik moet haast wel blind zijn, want ik zie hem echt niet


[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door appelsientje - zondag 14 oktober 2001 @ 15:20 (+1 - Normaal)

quote:
Na jaren van afwezigheid is er weer een zoekfunctie op FOK!

fok bestaat toch pas 2 jaar ??? hoe kan je dan al van jaren spreken ?? Door Nake - zondag 14 oktober 2001 @ 15:21 (+1 - Normaal)
kan het allmeaal nie meer bijhoude man eerst punten ding, dan weer reacties zoeken per user, nu weer dit..
Fok! ondergaat flinke verbouwing!

Keep up the good work!
What's next?
quote:
fok bestaat toch pas 2 jaar ??? hoe kan je dan al van jaren spreken ??

1 Jaar
2 Jaren.. klopt toch!
[ Dit bericht is gewijzigd door Nake ] Door Northpole - zondag 14 oktober 2001 @ 15:34 (+2 - Relevant)
Zoekfunctie is te vinden op de frontpage. Door Fean_Fan - zondag 14 oktober 2001 @ 15:39 (+1 - Normaal)
ja, ik heb em ook net gevonden (niet gelezen wat Northpole zei)
staat dus direc op de openingspagina, tussen newssubmit etc. Door 4]-[ Highlander - zondag 14 oktober 2001 @ 15:40 (+1 - Normaal)

quote:
Zoekfunctie is te vinden op de frontpage.

Ja, dat begrijp ik....maar waar staat dat ding nou. Ik zie hem echt nog steeds niet. Lachen, je moet eerst zoeken naar de zoekfunctie

Ondertitel: Het puntensysteem zuigt

[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door Raikane - zondag 14 oktober 2001 @ 15:41 (+1 - Normaal)
w000000000000t Door 4]-[ Highlander - zondag 14 oktober 2001 @ 15:47 (+2 - Relevant)

quote:
ja, ik heb em ook net gevonden (niet gelezen wat Northpole zei)
staat dus direc op de openingspagina, tussen newssubmit etc.

Het is gelukt hoor. Ik heb hem inderdaad op de openingspagina gevonden. Danny, zomaar een ideetje hoor, maar kan ie ook bij de dropdownlist van nieuws bij ofzo? Archief staat er ook al tussen, maar daar kun je niet echt zoeken naar bepaalde berichten.

Ondertitel: Het puntensysteem zuigt
[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door gerrie - zondag 14 oktober 2001 @ 15:56 (+2 - Relevant)
Kun je ook zoeken op 'grappige' berichten (+2)? Dat heb ik af en toe wel even nodig als ik sjacho ben... Door merulez - zondag 14 oktober 2001 @ 16:19 (+1 - Normaal)
ga zo door ga zo door Door gerrie - zondag 14 oktober 2001 @ 16:30 (0 - Offtopic)
ik heb een vraagje...ik ben vandaag met 50 punten begonnen en heb een stuk of vier reacties geplaatst. Hiervoor kreeg ik telkens +1 en een keer +2. Nu sta ik nog steeds op 50. Hoe zit dat?? Door Mr_Opel - zondag 14 oktober 2001 @ 16:34 (+1 - Normaal)

quote:
ik heb een vraagje...ik ben vandaag met 50 punten begonnen en heb een stuk of vier reacties geplaatst. Hiervoor kreeg ik telkens +1 en een keer +2. Nu sta ik nog steeds op 50. Hoe zit dat??

Het puntensysteem is nog niet helemaal waterdicht.. Door gerrie - zondag 14 oktober 2001 @ 16:36 (-1 - Onzin)

quote:
Het puntensysteem is nog niet helemaal waterdicht..

Daar gaat weer een kratje bier. Had gewed om voor vanavond 10:00 op 100 punten te komen Door gerrie - zondag 14 oktober 2001 @ 16:54 (0 - Overbodig)
kan het ook zijn dat er iemand onder mijn naam racistische uitspraken post? Nu heb ik nog maar 47 punten terwijl ik er veel meer hoor te hebben

Ik hoop dat dit wel wordt opgelost anders mag ik straks niets meer posten... Door 4]-[ Highlander - zondag 14 oktober 2001 @ 16:56 (+1 - Normaal)
Gerrie, iedere keer als jij een bericht post gaat er 1 punt vanaf. Zodra een mod jouw post heeft gelezen en beoordeeld krijg je dat punt terug, met soms extra punten

Ondertitel: Het puntensysteem zuigt
[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door Ettepet - zondag 14 oktober 2001 @ 17:11 (+1 - Normaal)
Nou, gelijk maar eens aan de slag gegaan om te kijken hoeveel van de 11.000+ topics 'seks' en 'geweld' bevatten:

'seks' : 366 topics
'geweld' : 392 topics

'Drugs' viel al helemaal mee: slechts 263 topics! Door Danny - zondag 14 oktober 2001 @ 17:31 (+1 - Normaal)
Via het pulldownmenu 'nieuws' bovenaan kun je nu ook de zoekfunctie vinden... Door Ettepet - zondag 14 oktober 2001 @ 17:50 (+1 - Normaal)
Fraai opgelost! Als je een deel van een username invoert geeft ie allereerst het lijstje met users die aan jouw zoekterm voldoen. Daarna krijg je van die user zijn lijstje te zien... Cool!!

ps: dat puntensysteem zuigt inderdaad: die arme Danny verdiende met deze reactie net echt wel 'Informatief' (+3)
[ Dit bericht is gewijzigd door Ettepet ] Door witste - zondag 14 oktober 2001 @ 19:08 (+1 - Normaal)
ga ik effe proberen.... Door 4]-[ Highlander - zondag 14 oktober 2001 @ 20:01 (Unmodded)

quote:
Via het pulldownmenu 'nieuws' bovenaan kun je nu ook de zoekfunctie vinden...

Top Danny, blij dat je mijn advies hebt overgenomen.
quote:
ps: dat puntensysteem zuigt inderdaad: die arme Danny verdiende met deze reactie net echt wel 'Informatief' (+3)

En ik, en ik, het was mijn idee hoor

Ondertitel: Het puntensysteem zuigt
[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door ChrisJX - zondag 14 oktober 2001 @ 20:04 (Unmodded)

quote:
Na jaren van afwezigheid is er weer een zoekfunctie op FOK!

Je kunt het ook overdrijven... Maar fijn dattie er weer is

To deny our impulses would deny the very thing that make us human.
pi_1900556
quote:
Op zondag 14 oktober 2001 21:52 schreef Cora het volgende:
Maarre, wat vind je zelf? Je eigen postings zijn niet een heeeeeel klein beetje flauw?
Neeeuuuuuhhh
quote:
In ieder geval succes nog met het koppie en peesten, ik hoop dat je je frustraties er in kwijt kunt
Welke frustraties Dit is toch het onzin topic!?!?
pi_1900599
quote:
Op zondag 14 oktober 2001 21:54 schreef calvobbes het volgende:
Welke frustraties Dit is toch het onzin topic!?!?
Tja, als jij dit onzin wil noemen... Ik zou zeggen neem een gevoel voor humor. Ze schijnen ze tegenwoordig te verkopen bij de Appie Happie, naast de Mora kroketten...
:{
pi_1900651
quote:
Op zondag 14 oktober 2001 21:57 schreef Cora het volgende:

Tja, als jij dit onzin wil noemen...


Wat is onzin?
quote:
Ik zou zeggen neem een gevoel voor humor. Ze schijnen ze tegenwoordig te verkopen bij de Appie Happie, naast de Mora kroketten...
Al zeg ik het zelf, ik heb best wel gevoel voor humor. (anders is je leven zo saai!) Maar gelukkig (en blijkbaar) zijn daar meerdere smaken in!
pi_1900711
quote:
Op zondag 14 oktober 2001 22:01 schreef calvobbes het volgende:
Al zeg ik het zelf, ik heb best wel gevoel voor humor. (anders is je leven zo saai!) Maar gelukkig (en blijkbaar) zijn daar meerdere smaken in!
Vooruit dan:


Stupendous Man

Door calvobbes - zondag 14 oktober 2001 21:19

--------------------------------------------------------------------------------
Speciaal voor ARRYB!
--[Back of Cover]-------------------------------------------------------------
This official seal is your assurance that Nintendo has approved the quality of
this product. Always look for this seal when buying games and accessories with
your Game Boy System.

[Official Nintendo Seal of Quality]

Ik zou zeggen lach ze! Lig je al onder de bank?

:{
  zondag 14 oktober 2001 @ 22:08:28 #16
2738 Knut
Loyal Dog
pi_1900729
index / Onzin voor je leven! / Het grote copy en paste topic


Geplaatst door Topic: Het grote copy en paste topic


calvobbes
Stupendous Man

Door calvobbes - zondag 14 oktober 2001 21:19

--------------------------------------------------------------------------------
Speciaal voor ARRYB!
--[Back of Cover]-------------------------------------------------------------
This official seal is your assurance that Nintendo has approved the quality of
this product. Always look for this seal when buying games and accessories with
your Game Boy System.

[Official Nintendo Seal of Quality]

LICENSED BY [Nintendo Logo]

NINTENDO, GAME BOY AND THE OFFICIAL SEALS ARE TRADEMARKS OF NINTENDO OF
AMERICA INC.

------------------------------------------------------------------------------
CAUTIONS DURING USE

1) If you play for long periods, take a 10 to 15 minute break every hour or
so.
2) This equipment is precision-built. Do not use or store it under
conditions of extreme temperature, or subject it to rough handling or
shock. Do not disassemble the unit.
3) Do not touch the connectors or let them come into contact with water, as
this may cause malfunction.
4) Do not wipe this equipment with volatile solvents such as thinner,
benzene or alcohol.
5) Store the Game Pak in its protective case when not in use.

--[Page 1]--------------------------------------------------------------------
CREEPY, KOOKY, OOKY, SPOOKY.

THE ADDAMS FAMILY has been evicted! To save their home from Tully Alford, the
family attorney, who is after the family fortune - Morticia, Lurch, Granny,
Pugsley and Wednesday have gone to the house to reason with him. But when
Gomez arrives, his family is missing!

As Gomez, you must save your loved ones, your home and your loads of wealth.
You'll have to watch out for scary obstacles like falling spikes, frightening
monsters and ghosts, and you'll need to look for clues as you search for your
family.

Get a move on... 'cause you're gonna make a call on THE ADDAMS FAMILY!

--[Page 2]--------------------------------------------------------------------
GETTING STARTED

To start THE ADDAMS FAMILY

1) Make sure that your Game Boy is turned off.
2) Insert THE ADDAMS FAMILY Game Pak into the cartridge slot.
3) Turn on the Game Boy.
4) After the copyright notice appears, press START to begin the game.

--[Page 3]--------------------------------------------------------------------
CONTROLS

[Picture of Game Boy]

START: Press START to begin play. Pressing START during play will pause the
game; press again to resume play.

SELECT: Press SELECT to change item during play (if you have collected any).

--[Page 4]--------------------------------------------------------------------
BUTTON A: Jump.

BUTTON B: Activates/Fires item currently in use.
When swimming, use BUTTON B to breathe and to increase oxygen.

CONTROL PAD UP: Enter doors/Swim up.

CONTROL PAD DOWN: Duck/Descend stairs (indicated by diagonal downward
arrow).

CONTROL PAD LEFT/RIGHT: Walk left/right, swim left/right.

CONTROL PAD UP AND LEFT/RIGHT: Ascend left/right.

DOWN AND BUTTON B: Scroll screen downward to look below.

--[Page 5]--------------------------------------------------------------------
STATUS DISPLAY

Different number points are gained by defeating creatures and collecting
treasures in the form of coins and money bags.

ENERGY: This is displayed as a row of hearts on the bottom left of the
screen. The number of hearts decreases as Gomez is hit.

WEAPON ITEM IN POSSESSION: If you have a weapon or item in your possession,
it is displayed in the window at the bottom center of the screen.

WEAPON/POWER: This is shown as a bar at the bottom right of the screen. This
decreases as Gomez uses the weapon or item in his possession. Each item has
its own power; when all of that power is used, it cannot be reused until it
is replenished by a power capsule.

--[Page 6]--------------------------------------------------------------------
HOW TO PLAY

Gomez must rescue all the members of his family from various locations within
the Addams Family house and the surrounding grounds.

You start outside the Addams Family house at the front door. You must work
your way around the house and the surrounding grounds of the family estate.

You acquire various items along your route that will assist you throughout the
game. These will enable you to negotiate areas that previously appeared to be
impassable.

The game is complete when Tully is defeated and all family members have been
rescued.

--[Page 7]--------------------------------------------------------------------
Potions

Pugsley has left Gomez potions in certain areas of the map, to assist you
during the game. These are as follows:

WOLFMAN POTION: This transforms Gomez into a superhuman Wolfman. This
enables him to travel more quickly and make large jumps while moving.

FRANKIE POTION: This transforms Gomez into a "levelheaded" invincible
character for 10 collisions with enemy creatures.

SEA MONSTER: This transforms Gomez into an amphibious creature that can swim
under water.

DRAC POTION: This transforms Gomez into a flying Vampire. To fly, press
BUTTON A repeatedly.

These potions last until Gomez loses a life (except in the case of the sea
monster).

--[Page 8]--------------------------------------------------------------------
Energy Hearts

These replenish Gomez's energy when collected. There are two types of hearts:

SMALL HEART: Increases Gomez's energy by one unit.

LARGE HEART: Increases Gomez's energy by two units.

Power Vials

These replenish the power of the weapon/item Gomez is currently using. To
replenish an item, select the item (by using select), then collect the vial.

There are two types of power vial:

TEST TUBE: Increases item power by a small amount.

FLASK: Increases item power by a large amount.

--[Page 9]--------------------------------------------------------------------
PLAYING TIPS

- Experiment with all the items to find out what they can do, because you will
have to use the appropriate item to negotiate obstacles.

- There are a few secret surprises hidden in the game - a foolish move may
reveal a shortcut!

- Certain weapons may defeat creatures more efficiently than others.

- Certain baddies can be stunned by jumping on them; others need to be shot
with weapons.

--[Page 10]-------------------------------------------------------------------
GAME SCENES

You start at the fornt door of the house. To the far left is the graveyard; to
the far right are the woods. If you push up in front of the front foor of the
house, you will enter the house.

The House

You enter the house on the ground floor. Use the staircase to move to
different floors. In the basement there is an entrance to the boiler room, and
a secret entrance that will only be revealed when Fester is overcome.

--[Page 11]-------------------------------------------------------------------
The Ground Floor

This is a hallway with stairs leading up and down.

The First Floor

The Kitchen is located to the far right. The entrance to the ice box is here;
to enter, stand in front of the fridge door and push up.

The Second Floor

To the right, the armory is located. There are some items to be collected
here.

--[Page 12]-------------------------------------------------------------------
The Third Floor

To the far left is the entrance to the river. The door to this is closed until
Wednesday is rescued from the Graveyard.

The Fourth Floor

Pugsley's room is located to the far right. The entrance to the toy box is
here. Stand on it and push up to enter. Also on this floor is the door to the
attic. This will only open when four of the family memvers have been rescued.

The Graveyard

You must make your way to the far left of the graveyard and enter the crypt.
You will face a large guardian that must be overcome to rescue Wednesday. To
enter the crypt, push up. To defeat the guardian, shoot it a number of times
in a certain spot.

--[Page 13]-------------------------------------------------------------------
The Woods

The woods are located to the right of the house. Make your way to the far
right, using a certain item that you will obtain during the game when a
particular member of the family has been rescued. The last tree stump on the
far right of the woods is the entrance to the beehive. Stand on top of this
stump and push down to enter. This level contains useful items to collect.

The Boiler Room

This level is a maze of pipes that you must negotiate in order to find the
entrance to the room where a guardian is holding Granny captive. This guardian
can only be overcome by attacking when he stops moving.

--[Page 14]-------------------------------------------------------------------
The Ice Box

This is a slippery ice kingdom, in which you must make your way to the top
right to collect a weapon to help you. You must negotiate icy cold pools of
water - one of the items you have collected will help you.

The River

You must swim to the far right of the level, avoiding fish and watching your
oxygen level. At the end of this level is a door where Lurch is held captive.
You must overcome a large guardian to save him. This guardian has only one
weak point that will flash when you hit the right place.

--[Page 15]-------------------------------------------------------------------
The Toy Box

Make your way to the far right and down to reach the entrance to the guardian
who is holding Pugsley captive. There are collapsing blocks that cannot be
stood on for long and a secret short cut. If you find it, push up and you will
enter a bonus room where you must collect coins for as long as possible. The
guardian holding Pugsley captive has only one weak spot that will flash, but
be warned - you need a lot of weapon power to defeat it.

The Attic

Make your way to the top of the level and out onto the roof to confront Uncle
Fester. Using certain weapons, you must force Fester into the lightning a
number of times, so he can regain his memory and reveal the secret basement
room where Morticia is being held.

--[Page 16]-------------------------------------------------------------------
The Dungeons

To rescue Morticia, you must negotiate the dungeons. You will have to be
careful of hidden traps to enter the room where you must facee Tully to save
the day.

Torture Chamber

Having succesfully negotiated the dungeons, you must enter the torture chamber
where you will face Tully. You must defeat him to rescue Morticia and complete
the game!

--[Front of Cover]------------------------------------------------------------
LIMITED WARRANTY

Ocean of America, Inc. warrants to the original purchaser only that the
cartridge provided with this manual and the software program coded on it will
perform in accordance with the descriptions in this manual when used with the
specified equipment, for a period of 90 days from the date of purchase. If the
program is found defective within 90 days of purchase, it will be replaced.
Simply return the cartridge to Ocean of America, Inc. or its authorized dealer
along with a dated proof of purchase. Replacement of the cartridge, free of
charge to the original purchaser (except for the cost of returning the
cartridge) is the full extent of our liability.

THIS WARRANTY IS IN LIEU OF ALL OTHER WARRANTIES, WHETHER ORAL OR WRITTEN,
EXPRESS OR IMPLIED. ALL IMPLIED WARRANTIES, INCLUDING THOSE OF MERCHANTIBILITY
AND FITNESS FOR A PARTICULAR PURPOSE, IF APPLICABLE, ARE LIMITED IN DURATION
TO 90 DAYS FROM THE DATE OF PURCHASE OF THIS PRODUCT.

Ocean of America, Inc. shall not be liable for incidental and/or consequential
damages for the breach of any express or implied warranty including damage to
property and, to the extent permitted by law, damages for personal injury,
even if Ocean of America, Inc. has been advised of the possibility of such
damages or limitations on how long an implied warranty lasts, so the above
limitations or exclusions may not apply to you.

This warranty shall not be applicable to the extent than any provision of this
warranty is prohibited by any federal, state or municipal law which cannot be
pre-empted. This warranty gives you specific legal rights and you may also
have other rights which vary from state to state.

Ocean of America, Inc. 1855 O'Toole Ave., Suite D-102, San Jose, CA 95131.
(408) 954-0201.

------------------------------------------------------------------------------
[Ocean Logo]

Ocean of America, Inc.
1855 O'Tool Avenue, Suite D-102
San Jose, California 95131

TM & C 1991 Paramount Pictures. All rights reserved.
THE ADDAMS FAMILY logo is a Trademark of Paramount Pictures.
Ocean of America Authorized User.

Printed in Japan.

_______________________
" ik ben een 'hij' en heet Calvobbes "



iroQuai
vat geen kou, boy

Door iroQuai - zondag 14 oktober 2001 21:21

--------------------------------------------------------------------------------
euh..

_______________________
Koppel op met die wesp
naar de nimonadeklesp
ga maar lekker zoenen bij de bloemen


Knut
Loyal Dog

Door Knut (Moderator) - zondag 14 oktober 2001 21:22

--------------------------------------------------------------------------------
Pfff die jongen komt geeneens in dit forum....

_______________________
en toch zoen je lekker....


Cynix ®
Gaat gewoon door?

Door Cynix ® (Forum admin) - zondag 14 oktober 2001 21:27

--------------------------------------------------------------------------------
> He Mike wat heb je daar nou?
>
> Ik heb hier iets heel bijzonders.Iets waar heel de wereld al lang op zit te
wachten
>
> Ongelooflijk, vertel ons snel wat het is...
>
> Ik heb hier een wit vierkant materiaal en een stokje.
> U zult zich wel afvragen, wat is dat nu weer.
>
> Ja Mike, laat ons niet in spanning......
>
>Als ik met het stokje over het witte materiaal beweeg, dan verkleurt het op
> de plek waar ik met het stokje over heen ben gegaan.
>
> Ongeloofelijk.....
>
> Ja, maar dat is nog niet alles. Als ik met het stokje, wat trouwens een pen
> heet, een letter, zoals je die normaal op een scherm ziet, op het materiaal
> teken....
>
> Ongeloofelijk, ik begin het te snappen....
> Dus als je meerdere letters neerzet kan je gewoon lezen zonder dat je een
> beeldscherm nodig hebt.
>
> Inderdaad, jij snapt het. Als dat geen amazing discovery is, het materiaal
> heet overigens Papier.
>
> Ongeloofelijk, en je hebt helemaal geen stroom nodig Mike?
>
> Nee, geweldig he, er zitten zelfs geen batterijen of accu in.
>
> Nou, nou, nou zeg. Onvoorstelbaar.
> Ha Mike, je klapt het dicht. Dat kan mijn notebook ook.
>
> Nee, dit is anders, ja kan het zo vaak vouwen als je wilt tot het door jou
> gewenste afmeting heeft.
>
> Oh Mike, je gaat maar door en het wordt kleiner en kleiner.
>
> Ja, nu past het zelfs in mijn portefueille.
>
> Ongeloofelijk, dus ik kan het altijd bij me dragen.
> Kom eens Mike, mag ik het eens vasthouden.
>
> Maar natuurlijk, ga je gang.
>
> Maar dit is ongelooflijk, het weegt bijna niets.
>
> Dat klopt het weegt 100 maal lichter dan het kleinst verkrijgbare
> notebook.
>
> Dat komt natuurlijk omdat er geen accu in zit.
>
> Geen accu, 100 maal lichter. Ongelooflijk ik droom!!!
>
> Nee, nee je droomt niet, knijp maar flink in je arm.....
> Kijk ik vouw het weer uit en....
>
> Maar Mike wat doe je nu? Nee, dat kan niet, je scheurt het papier
> doormidden.
>
> Dit materiaal is zo geweldig. Ik ik houd de helften tegen elkaar aan en je
> kan het gewoon weer lezen.
>
> Ongelooflijk, dat moet je met een diskette niet proberen ha ha ha.
>
> Maar wat doe je nu? Nee, niet doen, niet doen!!!
> Je gaat er zo maar op staan springen.
> Ongelooflijk, en je kan het nog steeds lezen!!!
>
> Stel je voor als je zo op je monitor zou gaan springen.
> Ongelooflijk, wat een discovery!!!
> Zeg Mike, hoe lang kan je papier eigenlijk bewaren?
>
> Nou veel langer dan een diskette of harddisk waarvan de magnetisch
> gevoeligheid op den duur verdwijnt.
>
> Ongelooflijk, wat een amazing discovery!
>
> Maar dat is nog niet alles!
>
> Nee???
>
> Je kan het overal mee naar toenemen, je kan het gebruiken bij hoge en lage
> temperaturen. En als je het niet meer nodig hebt kan je altijd nog je neus
> erin snuiten of op de WC...... je begrijpt wel wat ik bedoel!
>
> Ja Mike ongelooflijk......
> Zeg Mike, maar dat zou kunnen betekenen dat we op een dag helemaal geen
> beeldschermen, computers en notebooks meer nodig hebben.
>
> Inderdaad, is dat niet ongeloooooooooflijk. Wat een amazing
> discovery.....

_______________________
Er zijn 2 groepen mensen: zij die iedereen in 2 groepen indelen en zij die dit niet doen


Cora
van Mora

Door Cora - zondag 14 oktober 2001 21:29

--------------------------------------------------------------------------------
koppie..... peest....

_______________________
En doe de groeten aan uw oudste zoon!


calvobbes
Stupendous Man

Door calvobbes - zondag 14 oktober 2001 21:33

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op zondag 14 oktober 2001 21:29 schreef Cora het volgende:
koppie..... peest....
--------------------------------------------------------------------------------

Flauw

_______________________
" ik ben een 'hij' en heet Calvobbes "


ikbenveldmuis
Alizée is liev!

Door ikbenveldmuis (5) - zondag 14 oktober 2001 21:40

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op zondag 14 oktober 2001 21:27 schreef Mike een amazing discovery
--------------------------------------------------------------------------------

LOL

_______________________
DUTCHTONE SUCKS!!!!!!!!!!!!!!!!!!!!!! (maar klantenservies is wel oke )


Nieuwe single van Britney: 15 oktober


Cora
van Mora

Door Cora - zondag 14 oktober 2001 21:42

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op zondag 14 oktober 2001 21:33 schreef calvobbes het volgende:
Flauw
--------------------------------------------------------------------------------

Dank je, dan zit ik in het goede forum

_______________________
En doe de groeten aan uw oudste zoon!


calvobbes
Stupendous Man

Door calvobbes - zondag 14 oktober 2001 21:50

--------------------------------------------------------------------------------
FOREWORD
On 4 June 1996, the maiden flight of the Ariane 5 launcher ended in a failure. Only about 40 seconds after initiation of the flight sequence, at an altitude of about 3700 m, the launcher veered off its flight path, broke up and exploded. Engineers from the Ariane 5 project teams of CNES and Industry immediately started to investigate the failure. Over the following days, the Director General of ESA and the Chairman of CNES set up an independent Inquiry Board and nominated the following members :
- Prof. Jacques-Louis Lions (Chairman) Academie des Sciences (France)
- Dr. Lennart Lbeck (Vice-Chairman) Swedish Space Corporation (Sweden)
- Mr. Jean-Luc Fauquembergue Delegation Generale pour l'Armement (France)
- Mr. Gilles Kahn Institut National de Recherche en Informatique et en Automatique (INRIA), (France)
- Prof. Dr. Ing. Wolfgang Kubbat Technical University of Darmstadt (Germany)
- Dr. Ing. Stefan Levedag Daimler Benz Aerospace (Germany)
- Dr. Ing. Leonardo Mazzini Alenia Spazio (Italy)
- Mr. Didier Merle Thomson CSF (France)
- Dr. Colin O'Halloran Defence Evaluation and Research Agency (DERA), (U.K.)

The terms of reference assigned to the Board requested it

- to determine the causes of the launch failure,
- to investigate whether the qualification tests and acceptance tests were appropriate in relation to the problem encountered,
- to recommend corrective action to remove the causes of the anomaly and other possible weaknesses of the systems found to be at fault.

The Board started its work on 13 June 1996. It was assisted by a Technical Advisory Committee composed of :

- Dr Mauro Balduccini (BPD)
- Mr Yvan Choquer (Matra Marconi Space)
- Mr Remy Hergott (CNES)
- Mr Bernard Humbert (Aerospatiale)
- Mr Eric Lefort (ESA)

In accordance with its terms of reference, the Board concentrated its investigations on the causes of the failure, the systems supposed to be responsible, any failures of similar nature in similar systems, and events that could be linked to the accident. Consequently, the recommendations made by the Board are limited to the areas examined. The report contains the analysis of the failure, the Board's conclusions and its recommendations for corrective measures, most of which should be undertaken before the next flight of Ariane 5. There is in addition a report for restricted circulation in which the Board's findings are documented in greater technical detail. Although it consulted the telemetry data recorded during the flight, the Board has not undertaken an evaluation of those data. Nor has it made a complete review of the whole launcher and all its systems.

This report is the result of a collective effort by the Commission, assisted by the members of the Technical Advisory Committee.

We have all worked hard to present a very precise explanation of the reasons for the failure and to make a contribution towards the improvement of Ariane 5 software. This improvement is necessary to ensure the success of the programme.

The Board's findings are based on thorough and open presentations from the Ariane 5 project teams, and on documentation which has demonstrated the high quality of the Ariane 5 programme as regards engineering work in general and completeness and traceability of documents.

Chairman of the Board

1. THE FAILURE
1.1 GENERAL DESCRIPTION
On the basis of the documentation made available and the information presented to the Board, the following has been observed:

The weather at the launch site at Kourou on the morning of 4 June 1996 was acceptable for a launch that day, and presented no obstacle to the transfer of the launcher to the launch pad. In particular, there was no risk of lightning since the strength of the electric field measured at the launch site was negligible. The only uncertainty concerned fulfilment of the visibility criteria.

The countdown, which also comprises the filling of the core stage, went smoothly until H0-7 minutes when the launch was put on hold since the visibility criteria were not met at the opening of the launch window (08h35 local time). Visibility conditions improved as forecast and the launch was initiated at H0 = 09h 33mn 59s local time (=12h 33mn 59s UT). Ignition of the Vulcain engine and the two solid boosters was nominal, as was lift-off. The vehicle performed a nominal flight until approximately H0 + 37 seconds. Shortly after that time, it suddenly veered off its flight path, broke up, and exploded. A preliminary investigation of flight data showed:

nominal behaviour of the launcher up to H0 + 36 seconds;
failure of the back-up Inertial Reference System followed immediately by failure of the active Inertial Reference System;
swivelling into the extreme position of the nozzles of the two solid boosters and, slightly later, of the Vulcain engine, causing the launcher to veer abruptly;
self-destruction of the launcher correctly triggered by rupture of the links between the solid boosters and the core stage.
The origin of the failure was thus rapidly narrowed down to the flight control system and more particularly to the Inertial Reference Systems, which obviously ceased to function almost simultaneously at around H0 + 36.7 seconds.

1.2 INFORMATION AVAILABLE
The information available on the launch includes:

- telemetry data received on the ground until H0 + 42 seconds
- trajectory data from radar stations
- optical observations (IR camera, films) - inspection of recovered material.

The whole of the telemetry data received in Kourou was transferred to CNES/Toulouse where the data were converted into parameter over time plots. CNES provided a copy of the data to Aerospatiale, which carried out analyses concentrating mainly on the data concerning the electrical system.

1.3 RECOVERY OF MATERIAL
The self-destruction of the launcher occurred near to the launch pad, at an altitude of approximately 4000 m. Therefore, all the launcher debris fell back onto the ground, scattered over an area of approximately 12 km2 east of the launch pad. Recovery of material proved difficult, however, since this area is nearly all mangrove swamp or savanna.

Nevertheless, it was possible to retrieve from the debris the two Inertial Reference Systems. Of particular interest was the one which had worked in active mode and stopped functioning last, and for which, therefore, certain information was not available in the telemetry data (provision for transmission to ground of this information was confined to whichever of the two units might fail first). The results of the examination of this unit were very helpful to the analysis of the failure sequence.

1.4 UNRELATED ANOMALIES OBSERVED
Post-flight analysis of telemetry has shown a number of anomalies which have been reported to the Board. They are mostly of minor significance and such as to be expected on a demonstration flight.

One anomaly which was brought to the particular attention of the Board was the gradual development, starting at Ho + 22 seconds, of variations in the hydraulic pressure of the actuators of the main engine nozzle. These variations had a frequency of approximately 10 Hz.

There are some preliminary explanations as to the cause of these variations, which are now under investigation.

After consideration, the Board has formed the opinion that this anomaly, while significant, has no bearing on the failure of Ariane 501.

2. ANALYSIS OF THE FAILURE
2.1 CHAIN OF TECHNICAL EVENTS
In general terms, the Flight Control System of the Ariane 5 is of a standard design. The attitude of the launcher and its movements in space are measured by an Inertial Reference System (SRI). It has its own internal computer, in which angles and velocities are calculated on the basis of information from a "strap-down" inertial platform, with laser gyros and accelerometers. The data from the SRI are transmitted through the databus to the On-Board Computer (OBC), which executes the flight program and controls the nozzles of the solid boosters and the Vulcain cryogenic engine, via servovalves and hydraulic actuators.

In order to improve reliability there is considerable redundancy at equipment level. There are two SRIs operating in parallel, with identical hardware and software. One SRI is active and one is in "hot" stand-by, and if the OBC detects that the active SRI has failed it immediately switches to the other one, provided that this unit is functioning properly. Likewise there are two OBCs, and a number of other units in the Flight Control System are also duplicated.

The design of the Ariane 5 SRI is practically the same as that of an SRI which is presently used on Ariane 4, particularly as regards the software.

Based on the extensive documentation and data on the Ariane 501 failure made available to the Board, the following chain of events, their inter-relations and causes have been established, starting with the destruction of the launcher and tracing back in time towards the primary cause.

The launcher started to disintegrate at about H0 + 39 seconds because of high aerodynamic loads due to an angle of attack of more than 20 degrees that led to separation of the boosters from the main stage, in turn triggering the self-destruct system of the launcher.
This angle of attack was caused by full nozzle deflections of the solid boosters and the Vulcain main engine.
These nozzle deflections were commanded by the On-Board Computer (OBC) software on the basis of data transmitted by the active Inertial Reference System (SRI 2). Part of these data at that time did not contain proper flight data, but showed a diagnostic bit pattern of the computer of the SRI 2, which was interpreted as flight data.
The reason why the active SRI 2 did not send correct attitude data was that the unit had declared a failure due to a software exception.
The OBC could not switch to the back-up SRI 1 because that unit had already ceased to function during the previous data cycle (72 milliseconds period) for the same reason as SRI 2.
The internal SRI software exception was caused during execution of a data conversion from 64-bit floating point to 16-bit signed integer value. The floating point number which was converted had a value greater than what could be represented by a 16-bit signed integer. This resulted in an Operand Error. The data conversion instructions (in Ada code) were not protected from causing an Operand Error, although other conversions of comparable variables in the same place in the code were protected.
The error occurred in a part of the software that only performs alignment of the strap-down inertial platform. This software module computes meaningful results only before lift-off. As soon as the launcher lifts off, this function serves no purpose.
The alignment function is operative for 50 seconds after starting of the Flight Mode of the SRIs which occurs at H0 - 3 seconds for Ariane 5. Consequently, when lift-off occurs, the function continues for approx. 40 seconds of flight. This time sequence is based on a requirement of Ariane 4 and is not required for Ariane 5.
The Operand Error occurred due to an unexpected high value of an internal alignment function result called BH, Horizontal Bias, related to the horizontal velocity sensed by the platform. This value is calculated as an indicator for alignment precision over time.
The value of BH was much higher than expected because the early part of the trajectory of Ariane 5 differs from that of Ariane 4 and results in considerably higher horizontal velocity values.
The SRI internal events that led to the failure have been reproduced by simulation calculations. Furthermore, both SRIs were recovered during the Board's investigation and the failure context was precisely determined from memory readouts. In addition, the Board has examined the software code which was shown to be consistent with the failure scenario. The results of these examinations are documented in the Technical Report.

Therefore, it is established beyond reasonable doubt that the chain of events set out above reflects the technical causes of the failure of Ariane 501.

2.2 COMMENTS ON THE FAILURE SCENARIO
In the failure scenario, the primary technical causes are the Operand Error when converting the horizontal bias variable BH, and the lack of protection of this conversion which caused the SRI computer to stop.

It has been stated to the Board that not all the conversions were protected because a maximum workload target of 80% had been set for the SRI computer. To determine the vulnerability of unprotected code, an analysis was performed on every operation which could give rise to an exception, including an Operand Error. In particular, the conversion of floating point values to integers was analysed and operations involving seven variables were at risk of leading to an Operand Error. This led to protection being added to four of the variables, evidence of which appears in the Ada code. However, three of the variables were left unprotected. No reference to justification of this decision was found directly in the source code. Given the large amount of documentation associated with any industrial application, the assumption, although agreed, was essentially obscured, though not deliberately, from any external review.

The reason for the three remaining variables, including the one denoting horizontal bias, being unprotected was that further reasoning indicated that they were either physically limited or that there was a large margin of safety, a reasoning which in the case of the variable BH turned out to be faulty. It is important to note that the decision to protect certain variables but not others was taken jointly by project partners at several contractual levels.

There is no evidence that any trajectory data were used to analyse the behaviour of the unprotected variables, and it is even more important to note that it was jointly agreed not to include the Ariane 5 trajectory data in the SRI requirements and specification.

Although the source of the Operand Error has been identified, this in itself did not cause the mission to fail. The specification of the exception-handling mechanism also contributed to the failure. In the event of any kind of exception, the system specification stated that: the failure should be indicated on the databus, the failure context should be stored in an EEPROM memory (which was recovered and read out for Ariane 501), and finally, the SRI processor should be shut down.

It was the decision to cease the processor operation which finally proved fatal. Restart is not feasible since attitude is too difficult to re-calculate after a processor shutdown; therefore the Inertial Reference System becomes useless. The reason behind this drastic action lies in the culture within the Ariane programme of only addressing random hardware failures. From this point of view exception - or error - handling mechanisms are designed for a random hardware failure which can quite rationally be handled by a backup system.

Although the failure was due to a systematic software design error, mechanisms can be introduced to mitigate this type of problem. For example the computers within the SRIs could have continued to provide their best estimates of the required attitude information. There is reason for concern that a software exception should be allowed, or even required, to cause a processor to halt while handling mission-critical equipment. Indeed, the loss of a proper software function is hazardous because the same software runs in both SRI units. In the case of Ariane 501, this resulted in the switch-off of two still healthy critical units of equipment.

The original requirement acccounting for the continued operation of the alignment software after lift-off was brought forward more than 10 years ago for the earlier models of Ariane, in order to cope with the rather unlikely event of a hold in the count-down e.g. between - 9 seconds, when flight mode starts in the SRI of Ariane 4, and - 5 seconds when certain events are initiated in the launcher which take several hours to reset. The period selected for this continued alignment operation, 50 seconds after the start of flight mode, was based on the time needed for the ground equipment to resume full control of the launcher in the event of a hold.

This special feature made it possible with the earlier versions of Ariane, to restart the count- down without waiting for normal alignment, which takes 45 minutes or more, so that a short launch window could still be used. In fact, this feature was used once, in 1989 on Flight 33.

The same requirement does not apply to Ariane 5, which has a different preparation sequence and it was maintained for commonality reasons, presumably based on the view that, unless proven necessary, it was not wise to make changes in software which worked well on Ariane 4.

Even in those cases where the requirement is found to be still valid, it is questionable for the alignment function to be operating after the launcher has lifted off. Alignment of mechanical and laser strap-down platforms involves complex mathematical filter functions to properly align the x-axis to the gravity axis and to find north direction from Earth rotation sensing. The assumption of preflight alignment is that the launcher is positioned at a known and fixed position. Therefore, the alignment function is totally disrupted when performed during flight, because the measured movements of the launcher are interpreted as sensor offsets and other coefficients characterising sensor behaviour.

Returning to the software error, the Board wishes to point out that software is an expression of a highly detailed design and does not fail in the same sense as a mechanical system. Furthermore software is flexible and expressive and thus encourages highly demanding requirements, which in turn lead to complex implementations which are difficult to assess.

An underlying theme in the development of Ariane 5 is the bias towards the mitigation of random failure. The supplier of the SRI was only following the specification given to it, which stipulated that in the event of any detected exception the processor was to be stopped. The exception which occurred was not due to random failure but a design error. The exception was detected, but inappropriately handled because the view had been taken that software should be considered correct until it is shown to be at fault. The Board has reason to believe that this view is also accepted in other areas of Ariane 5 software design. The Board is in favour of the opposite view, that software should be assumed to be faulty until applying the currently accepted best practice methods can demonstrate that it is correct.

This means that critical software - in the sense that failure of the software puts the mission at risk - must be identified at a very detailed level, that exceptional behaviour must be confined, and that a reasonable back-up policy must take software failures into account.

2.3 THE TESTING AND QUALIFICATION PROCEDURES

The Flight Control System qualification for Ariane 5 follows a standard procedure and is performed at the following levels :

- Equipment qualification
- Software qualification (On-Board Computer software)
- Stage integration
- System validation tests.

The logic applied is to check at each level what could not be achieved at the previous level, thus eventually providing complete test coverage of each sub-system and of the integrated system.

Testing at equipment level was in the case of the SRI conducted rigorously with regard to all environmental factors and in fact beyond what was expected for Ariane 5. However, no test was performed to verify that the SRI would behave correctly when being subjected to the count-down and flight time sequence and the trajectory of Ariane 5.

It should be noted that for reasons of physical law, it is not feasible to test the SRI as a "black box" in the flight environment, unless one makes a completely realistic flight test, but it is possible to do ground testing by injecting simulated accelerometric signals in accordance with predicted flight parameters, while also using a turntable to simulate launcher angular movements. Had such a test been performed by the supplier or as part of the acceptance test, the failure mechanism would have been exposed.

The main explanation for the absence of this test has already been mentioned above, i.e. the SRI specification (which is supposed to be a requirements document for the SRI) does not contain the Ariane 5 trajectory data as a functional requirement.

The Board has also noted that the systems specification of the SRI does not indicate operational restrictions that emerge from the chosen implementation. Such a declaration of limitation, which should be mandatory for every mission-critical device, would have served to identify any non-compliance with the trajectory of Ariane 5.

The other principal opportunity to detect the failure mechanism beforehand was during the numerous tests and simulations carried out at the Functional Simulation Facility ISF, which is at the site of the Industrial Architect. The scope of the ISF testing is to qualify :

- the guidance, navigation and control performance in the whole flight envelope,
- the sensors redundancy operation, - the dedicated functions of the stages,
- the flight software (On-Board Computer) compliance with all equipment of the Flight Control Electrical System.

A large number of closed-loop simulations of the complete flight simulating ground segment operation, telemetry flow and launcher dynamics were run in order to verify :

- the nominal trajectory
- trajectories degraded with respect to internal launcher parameters
- trajectories degraded with respect to atmospheric parameters
- equipment failures and the subsequent failure isolation and recovery

In these tests many equipment items were physically present and exercised but not the two SRIs, which were simulated by specifically developed software modules. Some open-loop tests, to verify compliance of the On-Board Computer and the SRI, were performed with the actual SRI. It is understood that these were just electrical integration tests and "low-level " (bus communication) compliance tests.

It is not mandatory, even if preferable, that all the parts of the subsystem are present in all the tests at a given level. Sometimes this is not physically possible or it is not possible to exercise them completely or in a representative way. In these cases it is logical to replace them with simulators but only after a careful check that the previous test levels have covered the scope completely.

This procedure is especially important for the final system test before the system is operationally used (the tests performed on the 501 launcher itself are not addressed here since they are not specific to the Flight Control Electrical System qualification).

In order to understand the explanations given for the decision not to have the SRIs in the closed-loop simulation, it is necessary to describe the test configurations that might have been used.

Because it is not possible to simulate the large linear accelerations of the launcher in all three axes on a test bench (as discussed above), there are two ways to put the SRI in the loop:

A) To put it on a three-axis dynamic table (to stimulate the Ring Laser Gyros) and to substitute the analog output of the accelerometers (which can not be stimulated mechanically) by simulation via a dedicated test input connector and an electronic board designed for this purpose. This is similar to the method mentioned in connection with possible testing at equipment level.

B) To substitute both, the analog output of the accelerometers and the Ring Laser Gyros via a dedicated test input connector with signals produced by simulation.

The first approach is likely to provide an accurate simulation (within the limits of the three-axis dynamic table bandwidth) and is quite expensive; the second is cheaper and its performance depends essentially on the accuracy of the simulation. In both cases a large part of the electronics and the complete software are tested in the real operating environment.

When the project test philosophy was defined, the importance of having the SRIs in the loop was recognized and a decision was taken to select method B above. At a later stage of the programme (in 1992), this decision was changed. It was decided not to have the actual SRIs in the loop for the following reasons :

The SRIs should be considered to be fully qualified at equipment level
The precision of the navigation software in the On-Board Computer depends critically on the precision of the SRI measurements. In the ISF, this precision could not be achieved by the electronics creating the test signals.
The simulation of failure modes is not possible with real equipment, but only with a model.
The base period of the SRI is 1 millisecond whilst that of the simulation at the ISF is 6 milliseconds. This adds to the complexity of the interfacing electronics and may further reduce the precision of the simulation.
The opinion of the Board is that these arguments were technically valid, but since the purpose of a system simulation test is not only to verify the interfaces but also to verify the system as a whole for the particular application, there was a definite risk in assuming that critical equipment such as the SRI had been validated by qualification on its own, or by previous use on Ariane 4.

While high accuracy of a simulation is desirable, in the ISF system tests it is clearly better to compromise on accuracy but achieve all other objectives, amongst them to prove the proper system integration of equipment such as the SRI. The precision of the guidance system can be effectively demonstrated by analysis and computer simulation.

Under this heading it should be noted finally that the overriding means of preventing failures are the reviews which are an integral part of the design and qualification process, and which are carried out at all levels and involve all major partners in the project (as well as external experts). In a programme of this size, literally thousands of problems and potential failures are successfully handled in the review process and it is obviously not easy to detect software design errors of the type which were the primary technical cause of the 501 failure. Nevertheless, it is evident that the limitations of the SRI software were not fully analysed in the reviews, and it was not realised that the test coverage was inadequate to expose such limitations. Nor were the possible implications of allowing the alignment software to operate during flight realised. In these respects, the review process was a contributory factor in the failure.

2.4 POSSIBLE OTHER WEAKNESSES OF SYSTEMS INVOLVED
In accordance with its termes of reference, the Board has examined possible other weaknesses, primarily in the Flight Control System. No weaknesses were found which were related to the failure, but in spite of the short time available, the Board has conducted an extensive review of the Flight Control System based on experience gained during the failure analysis.

The review has covered the following areas :

- The design of the electrical system,
- Embedded on-board software in subsystems other than the Inertial Reference System,
- The On-Board Computer and the flight program software.

In addition, the Board has made an analysis of methods applied in the development programme, in particular as regards software development methodology.

The results of these efforts have been documented in the Technical Report and it is the hope of the Board that they will contribute to further improvement of the Ariane 5 Flight Control System and its software.

3. CONCLUSIONS
3.1 FINDINGS
The Board reached the following findings:

a) During the launch preparation campaign and the count-down no events occurred which were related to the failure.

b) The meteorological conditions at the time of the launch were acceptable and did not play any part in the failure. No other external factors have been found to be of relevance.

c) Engine ignition and lift-off were essentially nominal and the environmental effects (noise and vibration) on the launcher and the payload were not found to be relevant to the failure. Propulsion performance was within specification.

d) 22 seconds after H0 (command for main cryogenic engine ignition), variations of 10 Hz frequency started to appear in the hydraulic pressure of the actuators which control the nozzle of the main engine. This phenomenon is significant and has not yet been fully explained, but after consideration it has not been found relevant to the failure.

e) At 36.7 seconds after H0 (approx. 30 seconds after lift-off) the computer within the back-up inertial reference system, which was working on stand-by for guidance and attitude control, became inoperative. This was caused by an internal variable related to the horizontal velocity of the launcher exceeding a limit which existed in the software of this computer.

f) Approx. 0.05 seconds later the active inertial reference system, identical to the back-up system in hardware and software, failed for the same reason. Since the back-up inertial system was already inoperative, correct guidance and attitude information could no longer be obtained and loss of the mission was inevitable.

g) As a result of its failure, the active inertial reference system transmitted essentially diagnostic information to the launcher's main computer, where it was interpreted as flight data and used for flight control calculations.

h) On the basis of those calculations the main computer commanded the booster nozzles, and somewhat later the main engine nozzle also, to make a large correction for an attitude deviation that had not occurred.

i) A rapid change of attitude occurred which caused the launcher to disintegrate at 39 seconds after H0 due to aerodynamic forces.

j) Destruction was automatically initiated upon disintegration, as designed, at an altitude of 4 km and a distance of 1 km from the launch pad.

k) The debris was spread over an area of 5 x 2.5 km2. Amongst the equipment recovered were the two inertial reference systems. They have been used for analysis.

l) The post-flight analysis of telemetry data has listed a number of additional anomalies which are being investigated but are not considered significant to the failure.

m) The inertial reference system of Ariane 5 is essentially common to a system which is presently flying on Ariane 4. The part of the software which caused the interruption in the inertial system computers is used before launch to align the inertial reference system and, in Ariane 4, also to enable a rapid realignment of the system in case of a late hold in the countdown. This realignment function, which does not serve any purpose on Ariane 5, was nevertheless retained for commonality reasons and allowed, as in Ariane 4, to operate for approx. 40 seconds after lift-off.

n) During design of the software of the inertial reference system used for Ariane 4 and Ariane 5, a decision was taken that it was not necessary to protect the inertial system computer from being made inoperative by an excessive value of the variable related to the horizontal velocity, a protection which was provided for several other variables of the alignment software. When taking this design decision, it was not analysed or fully understood which values this particular variable might assume when the alignment software was allowed to operate after lift-off.

o) In Ariane 4 flights using the same type of inertial reference system there has been no such failure because the trajectory during the first 40 seconds of flight is such that the particular variable related to horizontal velocity cannot reach, with an adequate operational margin, a value beyond the limit present in the software.

p) Ariane 5 has a high initial acceleration and a trajectory which leads to a build-up of horizontal velocity which is five times more rapid than for Ariane 4. The higher horizontal velocity of Ariane 5 generated, within the 40-second timeframe, the excessive value which caused the inertial system computers to cease operation.

q) The purpose of the review process, which involves all major partners in the Ariane 5 programme, is to validate design decisions and to obtain flight qualification. In this process, the limitations of the alignment software were not fully analysed and the possible implications of allowing it to continue to function during flight were not realised.

r) The specification of the inertial reference system and the tests performed at equipment level did not specifically include the Ariane 5 trajectory data. Consequently the realignment function was not tested under simulated Ariane 5 flight conditions, and the design error was not discovered.

s) It would have been technically feasible to include almost the entire inertial reference system in the overall system simulations which were performed. For a number of reasons it was decided to use the simulated output of the inertial reference system, not the system itself or its detailed simulation. Had the system been included, the failure could have been detected.

t) Post-flight simulations have been carried out on a computer with software of the inertial reference system and with a simulated environment, including the actual trajectory data from the Ariane 501 flight. These simulations have faithfully reproduced the chain of events leading to the failure of the inertial reference systems.

3.2 CAUSE OF THE FAILURE
The failure of the Ariane 501 was caused by the complete loss of guidance and attitude information 37 seconds after start of the main engine ignition sequence (30 seconds after lift- off). This loss of information was due to specification and design errors in the software of the inertial reference system.

The extensive reviews and tests carried out during the Ariane 5 Development Programme did not include adequate analysis and testing of the inertial reference system or of the complete flight control system, which could have detected the potential failure.

4. RECOMMENDATIONS
On the basis of its analyses and conclusions, the Board makes the following recommendations.

R1 Switch off the alignment function of the inertial reference system immediately after lift-off. More generally, no software function should run during flight unless it is needed.

R2 Prepare a test facility including as much real equipment as technically feasible, inject realistic input data, and perform complete, closed-loop, system testing. Complete simulations must take place before any mission. A high test coverage has to be obtained.

R3 Do not allow any sensor, such as the inertial reference system, to stop sending best effort data.

R4 Organize, for each item of equipment incorporating software, a specific software qualification review. The Industrial Architect shall take part in these reviews and report on complete system testing performed with the equipment. All restrictions on use of the equipment shall be made explicit for the Review Board. Make all critical software a Configuration Controlled Item (CCI).

R5 Review all flight software (including embedded software), and in particular :

Identify all implicit assumptions made by the code and its justification documents on the values of quantities provided by the equipment. Check these assumptions against the restrictions on use of the equipment.
Verify the range of values taken by any internal or communication variables in the software.
Solutions to potential problems in the on-board computer software, paying particular attention to on-board computer switch over, shall be proposed by the project team and reviewed by a group of external experts, who shall report to the on-board computer Qualification Board.
R6 Wherever technically feasible, consider confining exceptions to tasks and devise backup capabilities.

R7 Provide more data to the telemetry upon failure of any component, so that recovering equipment will be less essential.

R8 Reconsider the definition of critical components, taking failures of software origin into account (particularly single point failures).

R9 Include external (to the project) participants when reviewing specifications, code and justification documents. Make sure that these reviews consider the substance of arguments, rather than check that verifications have been made.

R10 Include trajectory data in specifications and test requirements.

R11 Review the test coverage of existing equipment and extend it where it is deemed necessary.

R12 Give the justification documents the same attention as code. Improve the technique for keeping code and its justifications consistent.

R13 Set up a team that will prepare the procedure for qualifying software, propose stringent rules for confirming such qualification, and ascertain that specification, verification and testing of software are of a consistently high quality in the Ariane 5 programme. Including external RAMS experts is to be considered.

R14 A more transparent organisation of the cooperation among the partners in the Ariane 5 programme must be considered. Close engineering cooperation, with clear cut authority and responsibility, is needed to achieve system coherence, with simple and clear interfaces between partners.

- END -

_______________________
" ik ben een 'hij' en heet Calvobbes "



Cora
van Mora

Door Cora - zondag 14 oktober 2001 21:52

--------------------------------------------------------------------------------
Maarre, wat vind je zelf? Je eigen postings zijn niet een heeeeeel klein beetje flauw?
In ieder geval succes nog met het koppie en peesten, ik hoop dat je je frustraties er in kwijt kunt

_______________________
En doe de groeten aan uw oudste zoon!


appelsientje
Het beste onder de zon

Door appelsientje - zondag 14 oktober 2001 21:53

--------------------------------------------------------------------------------
Zoekfunctie op FOK!
Gepost door Danny (FOS4) - zondag 14 oktober 2001 @ 15:05
Na jaren van afwezigheid is er weer een zoekfunctie op FOK!
Je kunt zoeken in nieuwsberichten, in reactie of op usernaam. Binnenkort wordt ook zoeken in reviews en columns mogelijk gemaakt.
Om te zoeken tik je een woord een deel van een zin. Vervolgens selecteer je of je wil zoeken in nieuwsberichten, reacties of op usernaam en uiteindelijk selecteer je het aantal reacties dat je per pagina wil zien.

Bij het zoeken op usernaam krijg je overigens een compleet overzicht van alle reacties van die user, en heeft het veld 'aantal resultaten per pagina' geen functie. Door DazzL - zondag 14 oktober 2001 @ 15:09 (+1 - Normaal)
ehhh.. en waar kunnen wij die search functie vinden?

-edit-
Ok ik zie het al.. thanx
[ Dit bericht is gewijzigd door DazzL ] Door karmel - zondag 14 oktober 2001 @ 15:09 (+1 - Normaal)
Ah, dat is het betere werk. Klasse Door Sike - zondag 14 oktober 2001 @ 15:11 (+1 - Normaal)
Super te gek, bedankt FOK! Door 4]-[ Highlander - zondag 14 oktober 2001 @ 15:17 (+1 - Normaal)

quote:
ehhh.. en waar kunnen wij die search functie vinden?

Dat is een hele goede vraag, ik kan hem ook niet vinden. Logische plek zou bij de dropdownlist van nieuws zijn, maar daar staat die niet bij.
Overigens vind ik dat je goed bezig ben, Danny. Nu alleen nog alle smileys in het reageerveldje

Ondertitel: Het puntensysteem zuigt

[edit]Dazzl, waar staat dat ding dan? Ik moet haast wel blind zijn, want ik zie hem echt niet


[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door appelsientje - zondag 14 oktober 2001 @ 15:20 (+1 - Normaal)

quote:
Na jaren van afwezigheid is er weer een zoekfunctie op FOK!

fok bestaat toch pas 2 jaar ??? hoe kan je dan al van jaren spreken ?? Door Nake - zondag 14 oktober 2001 @ 15:21 (+1 - Normaal)
kan het allmeaal nie meer bijhoude man eerst punten ding, dan weer reacties zoeken per user, nu weer dit..
Fok! ondergaat flinke verbouwing!

Keep up the good work!
What's next?
quote:
fok bestaat toch pas 2 jaar ??? hoe kan je dan al van jaren spreken ??

1 Jaar
2 Jaren.. klopt toch!
[ Dit bericht is gewijzigd door Nake ] Door Northpole - zondag 14 oktober 2001 @ 15:34 (+2 - Relevant)
Zoekfunctie is te vinden op de frontpage. Door Fean_Fan - zondag 14 oktober 2001 @ 15:39 (+1 - Normaal)
ja, ik heb em ook net gevonden (niet gelezen wat Northpole zei)
staat dus direc op de openingspagina, tussen newssubmit etc. Door 4]-[ Highlander - zondag 14 oktober 2001 @ 15:40 (+1 - Normaal)

quote:
Zoekfunctie is te vinden op de frontpage.

Ja, dat begrijp ik....maar waar staat dat ding nou. Ik zie hem echt nog steeds niet. Lachen, je moet eerst zoeken naar de zoekfunctie

Ondertitel: Het puntensysteem zuigt

[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door Raikane - zondag 14 oktober 2001 @ 15:41 (+1 - Normaal)
w000000000000t Door 4]-[ Highlander - zondag 14 oktober 2001 @ 15:47 (+2 - Relevant)

quote:
ja, ik heb em ook net gevonden (niet gelezen wat Northpole zei)
staat dus direc op de openingspagina, tussen newssubmit etc.

Het is gelukt hoor. Ik heb hem inderdaad op de openingspagina gevonden. Danny, zomaar een ideetje hoor, maar kan ie ook bij de dropdownlist van nieuws bij ofzo? Archief staat er ook al tussen, maar daar kun je niet echt zoeken naar bepaalde berichten.

Ondertitel: Het puntensysteem zuigt
[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door gerrie - zondag 14 oktober 2001 @ 15:56 (+2 - Relevant)
Kun je ook zoeken op 'grappige' berichten (+2)? Dat heb ik af en toe wel even nodig als ik sjacho ben... Door merulez - zondag 14 oktober 2001 @ 16:19 (+1 - Normaal)
ga zo door ga zo door Door gerrie - zondag 14 oktober 2001 @ 16:30 (0 - Offtopic)
ik heb een vraagje...ik ben vandaag met 50 punten begonnen en heb een stuk of vier reacties geplaatst. Hiervoor kreeg ik telkens +1 en een keer +2. Nu sta ik nog steeds op 50. Hoe zit dat?? Door Mr_Opel - zondag 14 oktober 2001 @ 16:34 (+1 - Normaal)

quote:
ik heb een vraagje...ik ben vandaag met 50 punten begonnen en heb een stuk of vier reacties geplaatst. Hiervoor kreeg ik telkens +1 en een keer +2. Nu sta ik nog steeds op 50. Hoe zit dat??

Het puntensysteem is nog niet helemaal waterdicht.. Door gerrie - zondag 14 oktober 2001 @ 16:36 (-1 - Onzin)

quote:
Het puntensysteem is nog niet helemaal waterdicht..

Daar gaat weer een kratje bier. Had gewed om voor vanavond 10:00 op 100 punten te komen Door gerrie - zondag 14 oktober 2001 @ 16:54 (0 - Overbodig)
kan het ook zijn dat er iemand onder mijn naam racistische uitspraken post? Nu heb ik nog maar 47 punten terwijl ik er veel meer hoor te hebben

Ik hoop dat dit wel wordt opgelost anders mag ik straks niets meer posten... Door 4]-[ Highlander - zondag 14 oktober 2001 @ 16:56 (+1 - Normaal)
Gerrie, iedere keer als jij een bericht post gaat er 1 punt vanaf. Zodra een mod jouw post heeft gelezen en beoordeeld krijg je dat punt terug, met soms extra punten

Ondertitel: Het puntensysteem zuigt
[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door Ettepet - zondag 14 oktober 2001 @ 17:11 (+1 - Normaal)
Nou, gelijk maar eens aan de slag gegaan om te kijken hoeveel van de 11.000+ topics 'seks' en 'geweld' bevatten:

'seks' : 366 topics
'geweld' : 392 topics

'Drugs' viel al helemaal mee: slechts 263 topics! Door Danny - zondag 14 oktober 2001 @ 17:31 (+1 - Normaal)
Via het pulldownmenu 'nieuws' bovenaan kun je nu ook de zoekfunctie vinden... Door Ettepet - zondag 14 oktober 2001 @ 17:50 (+1 - Normaal)
Fraai opgelost! Als je een deel van een username invoert geeft ie allereerst het lijstje met users die aan jouw zoekterm voldoen. Daarna krijg je van die user zijn lijstje te zien... Cool!!

ps: dat puntensysteem zuigt inderdaad: die arme Danny verdiende met deze reactie net echt wel 'Informatief' (+3)
[ Dit bericht is gewijzigd door Ettepet ] Door witste - zondag 14 oktober 2001 @ 19:08 (+1 - Normaal)
ga ik effe proberen.... Door 4]-[ Highlander - zondag 14 oktober 2001 @ 20:01 (Unmodded)

quote:
Via het pulldownmenu 'nieuws' bovenaan kun je nu ook de zoekfunctie vinden...

Top Danny, blij dat je mijn advies hebt overgenomen.
quote:
ps: dat puntensysteem zuigt inderdaad: die arme Danny verdiende met deze reactie net echt wel 'Informatief' (+3)

En ik, en ik, het was mijn idee hoor

Ondertitel: Het puntensysteem zuigt
[ Dit bericht is gewijzigd door 4]-[ Highlander ] Door ChrisJX - zondag 14 oktober 2001 @ 20:04 (Unmodded)

quote:
Na jaren van afwezigheid is er weer een zoekfunctie op FOK!

Je kunt het ook overdrijven... Maar fijn dattie er weer is



calvobbes
Stupendous Man

Door calvobbes - zondag 14 oktober 2001 21:54

--------------------------------------------------------------------------------

quote:
-----------------------

[20:25] [Knut] Een vrouw met een kerst fetish...
[20:26] [Knut] Niet zo letterlijk dat ik haar met baard om moet HOHOHOEN
[20:26] [Knut] maar je snapt het idee wel.
pi_1900770
quote:
Op zondag 14 oktober 2001 22:06 schreef Cora het volgende:

[..]

Vooruit dan:

[knip]

[Official Nintendo Seal of Quality]

Ik zou zeggen lach ze! Lig je al onder de bank?


Nee

Hier valt weining om te lachen op deze kleine schaal. Het geheel is een stuk grappiger, maar vooral flauw, en dat brengt bij meestal hooguit een glimlach tevoorschijn!

Humor, flauw en onzin zijn drie totaal verschillende dingen vindt ik die andere reacties oproepen...

* Opassen anders schoppen ze dit topic naar filosofie of zo *

pi_1900797
quote:
Op zondag 14 oktober 2001 22:11 schreef calvobbes het volgende:
* Opassen anders schoppen ze dit topic naar filosofie of zo *
:{
pi_1900859
Het grote copy en knip topic

Topic: overdadig en onzinnig copy en paste'n Dit onderwerp is 3 pagina's lang: 1 2 3


calvobbes
Door calvobbes - zaterdag 13 oktober 2001 13:20

--------------------------------------------------------------------------------
Hoe denken de moderatoren erover!?!?
Ik erger me nu al aan grote lappen (engelse of nederlandse) tekst die klakkeloos in Onzin topics worden geplaats die niet veel tot niks met het onderwerp te maken hebben.

:{
pi_1900944
quote:
Op zondag 14 oktober 2001 22:18 schreef Cora het volgende:
Het grote copy en knip topic

[knip]

Ik erger me nu al aan grote lappen (engelse of nederlandse) tekst die klakkeloos in Onzin topics worden geplaats die niet veel tot niks met het onderwerp te maken hebben.


Da's vervlast bewijsmateriaal officieel luidtdttddtt het:
Ik erger me nu al aan grote lappen (engelse) tekst die klakkeloos in ANM topics woden geplaats die niet veel tot niks met het onderwerp te maken hebben.

overdadig en onzinnig copy en paste'n

Ik EIS vrijspraak

( )

pi_1900964
Onzin voor je Leven

Onzin? Wat een onzin! Wie heeft dat nu weer bedacht?
Welkom in Onzin voor je Leven (aka Onzin), Wij zijn TARAraboemdijee (aka Tara) en Knut (aka Knut), en dit is het gezelligste en rommeligste stukje FOK!. Dit forum is eind januari 2000 opgestart om de leegte van Big Brother op te vullen en de gein die over het hele forum verspreid was wat meer in een hoekje te drijven zodat andere fora een wat serieuzere toon konden krijgen. Onder leiding van Knut groeide dit forum al snel uit tot de grootste van FOK! Een duo-moderatorschap was langzaamaan vereisd (ook doordat Knut ander (drukker) werk kreeg), dus kwam Tara erbij. En toen Knut afgelopen zomer naar London vertrok heeft hij het helemaal van hem overgenomen, maar aangezien ook Tara het drukker krijgt, en onzin maar blijft groeien is er gekozen om een nieuw duo-moderatorschap op onzin te zetten. Tara heeft per 1 mei 2001 dus hulp gekregen van Vork. 11 oktober 2001 nam Vork echter afscheid omdat hij het te druk kreeg met stage en studie en omdat hij naast onzin ook nog muziek modereerde. Hij koos ervoor om Muziek te houden en Onzin in andere handen te geven. Vertrouwde handen echter, want Knut kwam weer terug uit Engeland en heeft zijn oude scepter weer terug. Het oude onzinduo is weer waar het hoort.

Onzin? Dus alles hoef je niet serieus te nemen en alles mag?
Uh-huh, niet dus, had je gedacht. Onzin is geen vrijbrief om flames uit te lokken en uit te vechten, om ruzies uit te knokken en steken onder water te geven. Het is de bedoeling dat je hier gewoon lekker onzinnig zit te posten en lol beleeft.

Ook met het (semi-)serieuze moet je oppassen, mede-onzinners kunnen in je topics hier soms opmerkingen plaatsen die je helemaal niet bevallen of erg flauw qua humor uit de bocht komen. Dat is het risico van dit forum. Dus als iets serieus is, laat het dan alstjeblieft weg uit dit forum, want anders krijgen we misschien misverstanden.

Bij twijfelgevallen kun je ons altijd bereiken natuurlijk (zie onderaan) <http://forum.fok.nl/showtopic.php/53220/1/i/s/smile.gif>

Dingen die verder niet mogen op het forum

* Spam, Het veelvuldig gebruik maken van dezelfde tekens binnen berichten bijvoorbeeld: meters lange posts met allemaal smiley's of het volgooien van een topic met een en dezelfde post worden niet echt op prijs gesteld.
* Het plaatsen van naaktfoto's (of humoristische varianten hiervan) is op Onzin voor je leven ook niet toegestaan. Daarvoor verwijzen we je naar het Babes & Hunks forum.
* Links naar en fotos van sites als rotten.com of iets van dien aard. kom worden ook niet gewaardeerd en zullen derhalve zo snel mogelij kworden verwijderd.
* Persoonlijke aanvallen richting een van de users, beledigingen, steken onder de gordel willen wij hier liever ook niet zien.

Hmmz, en maar denken dat dit de speeltuin van FOK! was, mag er toch van alles niet
Ja en nee, als je je aan bovenstaande houdt is er geen probleem. Wij hanteren hier een zogenaamde 'Free Moderation' en zijn hier alles behalve streng. Offtopic gedrag wordt getolereerd bijvoorbeeld, en je ben hier vrij om zo'n beetje alles te doen en te posten wat je maar wilt <http://forum.fok.nl/showtopic.php/53220/1/i/s/smile.gif>
Fun, plezier, lol, humor, daar gaat het hier om.

Nu las ik over klonen of clones, wat zijn dat nou?
Klonen zijn accounts van bestaande users
Je kan eigenlijk 5 soorten kloons onderscheiden:

* (af)zeikkloons
* crewkloons, zoals de schrijver van deze post bijvoorbeeld
* Kloons Anoniem intiem posten (veel gebruikt in Seksualiteit en Relaties/Psychologie)
* gebande users teruggekomen onder een andere naam
* funkloons


Die laatste zul je hier veel aantreffen.
Dus als je BritneySpears opeens ziet posten, denk dan niet dat de echte hier rondhuppelt, maar bedenk dan dat dat een van je bloedeigen Moderators wel eens kan zijn die lol zit te trappen <http://forum.fok.nl/showtopic.php/53220/1/i/s/wink.gif>

Waah, raar volkje hier, ik word voor wannabe uitgemaakt en ik versta niks van wat ze zeggen
In loop der tijd zijn er verschillende taaltjes, gebruiken en dergelijke onstaan. Van sommige zal je de humor misschien totaal ontgaan terwijl anderen er dubbel om liggen.

Neem nu het Armageddon/zovty/Jarno/blauwe Engels:
'Ai roel bik tijm'
Spreek het eens uit en je krijgt 'I rule big time'
Mensen met dit taalgebruik kunnen nog wel eens Hetbeng (headbang) neigingen krijgen zodra ze RATM (Rage Against The Machine) horen, dus wees gewaarschuwd <http://forum.fok.nl/showtopic.php/53220/1/i/s/smile.gif>

The wannabe's (Scarefreak, Texelonia en anderen)
Zij zijn een soort grondleggers van een bepaalde manier van posten, post jij hier een keer soortgelijk loop je kans zo'n banner in je topic te krijgen. Een soort van stempel zeg maar. Niets van aantrekken en gooi lekker jouwnaam-wannabe-banners in hun topics <http://forum.fok.nl/showtopic.php/53220/1/i/s/puh2.gif>

Nu zie ik dat alle Knut en de andere Moderators blauw zijn, echter is Tara groen, waarom is dit?
Dat klopt, behalve mijn taak als Moderator van onzin ben ik Global Moderator. Dat betekend dat ik voor alle moderators kan invallen als ze afwezig zijn en dus kan moderaten over het hele forum. Dus ook met vragen, tips en verzoekjes over andere fora kun je eventueel bij mij terecht, mits je wel geprobeerd hebt de desbetreffende moderator te bereiken. (aldus Tara)

Tenslotte Tara, waar kan ik liefdesverklaringen, lofuitingen, scheldkanonnades of anders wat achterlaten?
Op vele manieren en vaak ben ik er wel of krijg ik het snel genoeg mee.
Meest effectief is bellen of SMS, maar niet iedereen heeft mijn nummer en niet iedereen krijgt die <http://forum.fok.nl/showtopic.php/53220/1/i/s/puh2.gif>
Dus dan maar naar de andere mogelijkheden
-e-mail: tara@fokzine.net
-ICQ: 48582203
-MSN: brandtsbuys@hotmail.com (nick TARAraboemdijee)
-IRC/Chat: irc.fokzine.net port 6667 | channel #fok #fokeiland

MSN, ICQ en IRC staan altijd aan, dus een bericht achterlaten als ik er niet ben is mogelijk.

En Knut dan? Is die jongen ook nog een beetje bereikbaar?:
Heb ik perongeluk je topic op slot gegooid? Wil je me bedanken voor al het goede <http://forum.fok.nl/showtopic.php/53220/1/i/s/puh2.gif> werk, of is er iets anders? Ik ben redelijk goed bereikbaar intussen.
-e-mail: knut_1979@hotmail.com
-ICQ: 60820617
-IRC/Chat irc.fokzine.net port 6667 | channel #fok, #emel

Een bericht achterlaten kan altijd.

Heel veel plezier op het onzin forum.
Tara & Knut


Dat zal wel lukken jongens, jullie ook veel plezier.
dwerg

I intend to live forever, or die trying.
pi_1900971
Twaalf gevallen van miltvuurbesmetting in VS

Uitgegeven: 14-10-2001 21:40

NEW YORK - In New York blijken nog eens drie mensen te zijn besmetmet de miltvuurbacterie. Dat heeft burgemeester Giuliani zondag bekendgemaakt. Het drietal is niet ziek, zo zei hij. De drie waren betrokken bij onderzoek naar een eerder geval van besmetting.

In totaal zijn er nu twaalf gevallen van miltvuurbesmetting geconstateerd. Acht daarvan werkten bij uitgever American Media Inc. Eén van de medewerkers is overleden, een werd ziek.

Op het verdachte poststuk dat onlangs bij Microsoft aankwam bleken inderdaad sporen van miltvuur te zitten. Mogelijk zijn enkele mensen besmet geraakt.

Reacties op dit bericht? Mail de redactie.
Bezoek ook het terreur katern: NU.nl/terreur
NU.nl homepage

(c) ANP/Nu.nl

Printer versie



Osama bin Bert
Weten de inwoners van Bangladesh wie Pino is? Of Ernie? Sesamstraat of geen Sesamstraat, bij een demonstratie tegen de VS en vóór Osama bin Laden, dook Bert zeer onverwacht op. Een zoekplaatje...



Beeldverslag
Bekijk het beeldverslag van de aanvallen op Afghanistan



Reacties
Lees de reacties van de lezers op de aanval in Afghanistan.



Wat is wat?
Een overzicht van de wapens van de VS vindt u hier.



Wie is wie?
Een overzicht van de belangrijkste personen.




Overig...

Blair en Arafat praten maandag in Londen
'Taliban kunnen geen tegenaanval meer uitvoeren'
Geen miltvuur op poststuk bij The New York Times
Kabul opnieuw doelwit bombardementen (video)
Hevige onlusten in Karachi en Peshawar (video)
Giuliani wijst donatie van Saudische prins af (video)
VS vrezen nieuwe aanslagen
Bush denkt dat al-Qaeda op de vlucht is
Zwaarste aanvallen op Kabul sinds start vergeldingsacties
New York herdenkt aanslagen
Bevolking Kandahar vlucht in paniek (video)
Vrouwenorganisatie toont Taliban-wreedheden
Russen in het geheim Afghanistan binnengetrokken
Duitsers aangevallen in Saudi-Arabië
Amerikaanse militairen arriveren in Pakistan
'Arabische CNN' legt kritiek VS naast zich neer
Amerikanen nemen bunkers onder vuur
Derde geval van miltvuur (video)
Afghanen verbranden voedselpakketten
Witte Huis waarschuwt voor video's van Bin Laden
Kabul en Kandahar voor de vierde nacht onder vuur
Islamitische Conferentie veroordeelt aanslagen in VS
VN-medewerkers in Afghanistan bedreigd en mishandeld
Pakistan laat religieuze leiders arresteren (video)
Alliantie: steeds meer Talibanstrijders lopen over
Cel al-Qaeda ontmanteld in Egypte
VS sturen keurkorps richting Afghanistan
Italiaanse politie pakt mogelijke terroristen op
Taliban: veel slachtoffers door Amerikaanse aanvallen
Blair hoopt op steun met bezoek aan Oman
Pakistaanse generaal betrokken bij aanslagen
Al-Qaeda: storm van gekaapte vliegtuigen gaat niet liggen (video)
Annan verontrust over mogelijke uitbreiding strijd
'Vuurgevecht aan grens Afghanistan en Pakistan'
20.000 Afghanen naar Iran gevlucht
Taliban zoeken steun bij moslimstaten
Anti-VS-demonstratie Jakarta loopt uit op rellen (video)
'Vooral adviseurs drijven topinkomens op'
Kamer schaart zich achter kabinet
'Taliban-deserteurs bezetten strategische weg'
Iran eist onmiddellijk einde aanvallen
Nederlands fregat Van Nes versterkt NAVO-vloot
Taliban: Amerikaanse aanvallen missen doel (video)
Beeldverslag 'Aanval op Afghanistan'
Doden bij anti-Amerikaanse demonstraties in Pakistan
Pentagon stuurt groot aantal nieuwe grondtroepen
Pakistan plaatst Taliban-aanhanger onder huisarrest
VN staan achter aanvallen op Afghanistan
Colombiaan gearresteerd in verband met aanslagen
'Luchtmachtcommandant en generaal van Taliban gedood'
Ruding: Economische gevolgen terreur niet overdrijven
Weinig deelnemers aan vredesbetogingen (video)
Afghaanse familie hoopt op verdrijving Taliban (video)
Soedan veroordeelt aanvallen op Afghanistan
'Spanning aan Afghaans-Oezbeekse grens stijgt'
Taliban: Bin Laden veilig in Afghanistan (video)
'Kans op aanslagen in Nederland groeit'
Aanvallen op Afghanistan gaan door na aanbreken van dageraad (video)
Taliban laten Britse journaliste vrij
VS: 'Wellicht aanvallen op meerdere landen'
Franse geheime dienst is actief in Afghanistan
Tweede geval van miltvuur geconstateerd
Veel bedrijven houden managers aan de grond
Extra beveiliging bij potentiële Nederlandse doelen
Tweede Kamer: 'Wettelijk verbod op terrorisme'
Moslimstaten eisten uitschakeling Bin Laden
'Nederlandse moslims staan achter aanvallen'
VN stoppen met voedselkonvooien Afghanistan
Taliban: niet alleen militaire doelen geraakt
'Hoofddoel aanvallen waarschijnlijk bereikt'
Extra bijeenkomst NAVO-ambassadeurs in Brussel
Tadzjikistan opent luchtruim voor vliegtuigen VS
'Acties in Afghanistan gaan weken duren'
Afghanen in Nederland bezorgd om familie
President Musharraf staat achter aanvallen VS
Beurzen kelderen door vergeldingsacties VS
Duizenden Pakistanen woedend de straat op (video)
Pakistan zuivert strijdkrachten en inlichtingendienst
Doden door aanval op Afghanistan (video)
Indonesiërs roepen op tot beleg Amerikaanse ambassade
Irak veroordeelt aanvallen VS op Afghanistan
Woordvoerder al-Qaeda legt verklaring af
Powell deze week naar India en Pakistan
Pakistan: Taliban hebben aanval over zich afgeroepen
Gemengde gevoelens in New York en Washington (video)
Nieuwe aanvalsgolf op Kabul
Powell licht Kok in over tegenaanvallen
Cheney naar geheime locatie overgebracht
Uitreiking Emmy-awards uitgesteld
Afghaanse oppositie opent aanval
Geen extra maatregelen Schiphol
Israël noemt acties 'moedig besluit'
'Heilige oorlog is begonnen'
Kok: noodzakelijke aanval tegen het terrorisme
Blair: Dit is geen oorlog met de islam (video)
Van Aartsen: Nederland staat achter Bush
Afghanen Nederland: Aanval is geen dappere daad
Demonstratie bij Amerikaans consulaat in Amsterdam
Talibanbewind veroordeelt 'terroristische daad' VS
Bush: Nu zullen ze de prijs betalen (video)
Militaire acties tegen Afghanistan begonnen (video)
Afghanistan verwacht snel aanval VS
Taliban laten Britse journaliste vrij
Afghaanse oppositie verovert Taliban-gebieden
Doden door bomexplosie in Saudi-Arabië (video)
'Pakistan arresteert bondgenoot Osama bin Laden'
1,4 miljard hulp aan Afghanen
Taliban openen vuur op vliegtuig in Kabul
Time: CIA heeft bewijs dat Atta in kamp Bin Laden was
VS installeren nieuwe spionagesatelliet boven Afghanistan
EU wil Pakistan 'belonen'
Kabinet neemt maatregelen tegen terrorisme
Terroristen gebruiken geavanceerde internetcodes
Sporen in Hamburg wijzen naar Osama bin Laden
Taliban willen 'over alles' onderhandelen
Premier Sharon waarschuwt VS (video)
VS sturen elitetroepen naar Oezbekistan (video)
Arabische zender toont beelden Bin Laden (video)
FBI en CIA bang voor meer aanslagen
'Voorbereiding VS op biologische oorlog moet beter'
'De tijd dringt voor veel Afghaanse kinderen'
Charter City Bird failliet verklaard
Bewijsmateriaal vernietigd door aanslagen op WTC (video)
Bin Laden ontsnapte twee keer aan de CIA
Dodelijk virus duikt op in Afghanistan
KLM schrapt 2.500 banen
Burgemeerster Giuliani ziet derde ambtstermijn niet zitten
30 procent minder passagiers luchtvaartmaatschappijen VS
Kamer krijgt bewijs Bin Laden niet te zien (video)
Twee Nederlandse vliegscholen gaven kapers les
Wie is wie?
Doden door buskaping in VS
Reisbranche wil personeel minder laten werken
Perzische kat overleeft aanslag WTC (video)
Aanslagen leveren vele broodjes aap-verhalen op
Bevelhebbers van Taliban lopen over
VS wisten dat er 'iets' ging gebeuren
Testament van kaper Mohammed Atta ontdekt
Zalm blokkeert bankrekeningen
'23 kampen in Afghanistan doelwit' (video)
Azië en Midden-Oosten krijgen details over aanslagen
Nabestaanden slachtoffers krijgen urn met WTC-grond
Berlusconi: islam is een geweldig geloof
Amerika waarschuwt Italië voor terreuraanslagen
Wintersport steeds populairder
Bankrekeningen in Nederland bevroren
Ontslag bij politie na discussie over aanslagen
Iran: VN- mandaat voor aanvallen op Afghanistan
Kapers aanslagen VS vochten in Tsjetsjenië
Steeds meer lichamen onder WTC gevonden
Oezbeekse douaniers krijgen training van VS (video)
'Bin Laden plande aanslag op VS-ambassade Parijs'
'VS stonden op punt Palestijnse staat te steunen'
VS leggen bewijs tegen Bin Laden over aan NAVO
Oezbekistan stelt luchtruim open voor VS
Paniek na vondst van mes in Amerikaans vliegtuig
'Islamitische terroristen' aangehouden in Bosnië
'Vliegtuigen VS boven Iran worden aangevallen'
Nederlandse moslims vaker doelwit van discriminatie
Amerikaanse vliegvelden zetten National Guard in (video)
Politie Turkije ondervraagt Abdullah bin Laden
Annan: Strengere regels tegen biologische wapens
Onderzeeër en vliegdekschip VS uit havens vertrokken
KLM Cargo heft ook antiterreurtoeslag
Taliban en verzet slaags bij grens Tadzjikistan
Bin Laden nog steeds in Afghanistan
Britten leggen beslag op bijna 90 miljoen Talibandollars
Aantal vermisten WTC bijgesteld
Honderden Talibanaanhangers geven de strijd op
Duits terroristisch netwerk groter dan gedacht
Toenemende zorgen om Afghaanse vluchtelingen (video)
'Binnen 48 uur start vergeldingsaanvallen op Afghanistan'
CIA zoekt Bin Laden al drie jaar
Buitenlandse hulpverleners voor Afghaanse rechter
Blair: Keiharde bewijzen tegen Bin Laden
Vredesdemonstratie in Amsterdam drukbezocht
Ashcroft verspreidt brief uit bagage kaper Atta
Taliban ontkennen gevangenneming Amerikanen
CNN: aanslagen VS werden voorbereid in Europa
Eerste Westerse verkenningsacties in Afghanistan
Aanhangers Bin Laden willen onderduiken in Bosnië
Gearresteerde Algerijnse piloot leerde kapers vliegen
Berlusconi: geen verontschuldiging voor islam-uitspraak
Gegevens en foto's van kapers vrijgegeven
Saudi-Arabië biedt Amerika toch hulp aan
Pakistan Airlines gaat met bewakers vliegen
FBI: kapers verbonden met Al-Qaeda van Bin Laden
Slachtoffers worden eervol onderscheiden
Bommelder kan twee jaar cel krijgen
'Terrorist was dit jaar in Nederland'
Kok neemt afstand van uitspraken Berlusconi
Arrestatiegolf: aanslagen in Europa verijdeld
Taliban-leider gaat in op bemiddeling door Jackson
Familie van WTC-slachtoffers geeft hoop op (video)
Pakistanen gaan opnieuw met Taliban praten
Moslims in Indonesië bedreigen Japanners
Arrestatie in verband met aanslag Pentagon
Ruim 500 miljoen nodig voor hulp Afghanistan
Leider Taliban niet bang voor Amerikaanse aanval
Bush belt een kwartier met Kok
Weer 'extremistische moslim' opgepakt in Rotterdam
'Gevaarlijke terroristen opereren vanuit Nederland'
Familieleden Bin Laden ontvluchten VS
Nederlandse mariniers paraat voor inzet Afghanistan
Afghanen bestormen Amerikaanse ambassade (video)
Spanje legt 'terroristische cel' bloot
Consumentenvertrouwen flink gedaald
Schade verzekeraar Lloyd's loopt in de miljarden
Meerderheid Nederlanders voor identificatieplicht
Pakistan verbreekt diplomatieke banden met Kabul niet
Van Boxtel ziet algemene identificatieplicht wel zitten
VS bereiden operatie 'Duurzame Vrijheid' voor
Zalm: Geen handel met voorkennis voor aanslagen
EU zal terroristen alleen onder voorwaarden uitleveren
Rotterdamse haven belangrijk doelwit terroristen
Giuliani: een derde termijn in New York of niet? (video)
Deskundigen temperen angst voor bioterreur (video)
Ook Alitalia ontkomt niet aan malaise
Leerling uit opleiding gezet voor begrip aanslagen
Waterleidingbedrijven onderzoeken veiligheid
Pakistan opent grensovergang voor Afghaanse vluchtelingen
Bush bevriest financiën Bin Laden
'Ook Pakistan verbreekt betrekkingen met Taliban'
Benefietgala brengt ruim 150 miljoen dollar op
Bush bevriest transacties naar terroristen
Egyptische dokter is hoofdverdachte nummer 2
Amerika verbiedt vliegen met sproeivliegtuigen
'Bin Laden roept Pakistani op tot jihad'
Olieprijs zakt verder door vrees voor wraakacties
Pakistan trekt diplomaten uit Kabul terug
Taliban zet 300.000 mannen in voor jihad
VS herdenken massaal doden aanslagen (video)
'Rusland bereidt nieuwe acties in Afghanistan voor' (video)
Nog meer ontslagen bij noodlijdend Swissair
Taliban en oppositie verzoeken Iran grenzen te openen
Vliegen wordt flink duurder
Taliban halen vliegtuig neer
'Ruime meerderheid moslims keurt aanslagen af'
'Bewijzen tegen Bin Laden worden openbaar gemaakt'
Hoop op overlevenden vrijwel vervlogen (video)
Haagse moskee beklad met hakenkruizen
'Osama bin Laden is zoek'
Afghanen ontvluchten hoofdstad Kabul (video)
EU schiet luchtvaartsector te hulp
BVD overspoeld door tips
Taliban blijven uitlevering Bin Laden weigeren
Koopgedrag Nederlanders niet beïnvloed door terreur
Agressie tegen moslims in Amerika neemt toe (video)
Groeiend aantal arrestaties in Europa
Speciale eenheden verzamelen zich bij Afghaanse grens
'Geen reden om voor aanslagen in Nederland te vrezen'
Afghaanse oppositie vraagt Amerika om steun
Emiraten verbreken betrekkingen met Afghanistan
KLM vliegt toch volgende week
Sterren brengen eerbetoon aan slachtoffers ( video)
EU: VN moeten coalitie tegen terrorisme leiden
Anti-Amerikanisme in Indonesië groeit
EU hulp voor luchtvaart
Brits akkoord over vliegverzekering bij aanslagen
Winkels onder WTC vlak na aanslag geplunderd
Doden bij gewelddadige demonstraties in Pakistan (video)
KLM-partner schrapt 10.000 banen
VS heffen sancties tegen India en Pakistan spoedig op
'Kaper Atta was in juli in Spanje'
'KLM houdt maandag vliegtuigen aan de grond'
'Nog tientallen Nederlanders vermist na aanslagen'
'Uitlevering Bin Laden is belediging islam'
Blair zegt Bush steun toe in strijd tegen terrorisme
Amerikaanse luchtvaart krijgt 15 miljard
FBI: Identiteit kapers is mogelijk vals
Bush stelt Taliban hard ultimatum (video)
Saudi-Arabië vroeg tevergeefs om uitlevering Bin Laden
Iran houdt luchtruim gesloten voor VS
VS bevelen landmacht uit te rukken
Beveiligingsbeelden kapers vrijgegeven (video)
Amsterdam vraagt om legersteun bij tegenaanval
Slachtoffers afkomstig uit ruim 60 landen
Bin Laden wil in islamitisch land terechtstaan
Gezondheid hulpverleners New York loopt gevaar
Amerikaanse leger stoomt militairen klaar (video)
ABN Amro blijft huisbankier Bin Laden
Stewardess belde details door tijdens kaping
Horeca New York in grote problemen
Afghaanse oelema's: Bin Laden ga weg (video)
Veel kinderen vrezen voor Derde Wereldoorlog
Bush spreekt Congres toe
Afghaanse schriftgeleerden opnieuw bijeen
Opnieuw massaontslagen in luchtvaartsector
'Verschillende landen betrokken bij aanslagen'
Honderd gevechtsvliegtuigen naar Perzische Golf
Aegon verwacht ruim 100 miljoen aan claims
Musharraf vraagt steun voor zijn beleid
BVD onderzoekt Bin Ladens activiteiten in Nederland
Grote aantallen vluchtelingen zitten klem (video)
Taliban: 'VS willen ons regime omverwerpen'
Radicale moslims Indonesië dreigen met jihad (video)
'Bin Laden is in het zuiden van Afghanistan'
Militaire middelen van Taliban zijn beperkt
Bondsdag bereid VS militair te steunen
KLM schrapt 5 procent capaciteit
Leider Taliban bereid tot gesprek met VS
Spanning in Pakistan loopt op (video)
'Nederlanders kunnen Pakistan beter verlaten'
Berging lijken New York duurt nog zeker zes maanden
Excuses tv-predikant voor uitspraken over wrake Gods
Tweede Kamer solidair met Verenigde Staten
Solana: banden met Arabische landen aanhalen
Drie Arabieren in Detroit gearresteerd door FBI
Stuurgroep terrorisme: weer grenscontroles in Europa
Reisverbod opgeheven
CDA pleit voor Nationale Veiligheidsraad
Geestelijk leiders Taliban vergaderen over Bin Laden
Vliegtuig Northwest aan de grond na vals alarm
Britse diplomaten opgeroepen Pakistan te verlaten
Media VS lopen advertentie-inkomsten mis
Chirac: Frankrijk volledig solidair met VS
Boeing haalt streep door 30.000 banen
Mogelijke handel Bin Laden KLM-opties
Kaper had contact met Iraakse inlichtingendienst
Bush tekent resolutie militaire vergeldingsacties
Veiligheidsraad eist uitlevering Osama bin Laden
Kok: Fundamentalistische uitingen strenger aanpakken
Aanslagen kosten ING circa 50 miljoen euro
Giuliani: 'Kans op overlevenden is zeer klein'
Pakistanen demonstreren tegen Verenigde Staten (video)
Pakistaanse delegatie vertrekt uit Afghanistan
Gevechtsvliegtuigen VS vertrokken naar Turkije
FBI arresteert arts
Helft Nederlandse moslims heeft begrip voor aanslagen
Terrorisme-literatuur vindt gretig aftrek (video)
Afghanen en Iraniër opgepakt in Italië en Frankrijk
Opperbevelhebber NAVO voorspelt doden bij aanval
Kabinet stelt stuurgroep in tegen terrorisme
Iraakse vice-premier Tarek Aziz betuigt medeleven
Bijeenkomst Afghaanse geestelijk leiders uitgesteld
Nederlanders bang voor meer geweld
Taliban verklaren heilige oorlog aan VS
Eerbetoon aan helden van vlucht 93
Aantal vermisten loopt weer op
Blair gaat donderdag naar Verenigde Staten
Powell: 'Alle bewijzen voeren naar Bin Laden'
Luchtvaartmaatschappijen schrappen vluchten op VS
Taliban beslissen dinsdag over Bin Laden
Amerika wil Bin Laden 'dood of levend'
Extra EU-top over terreuraanslagen
Taliban sluiten luchtruim van Afghanistan
'In Nederland gearresteerde moslims beraamden aanslag'
Amerikanen weer aan het werk (video)
'Taliban willen Bin Laden niet uitleveren'
Wall Street weer open
Libië voorziet escalatie bij vergeldingsacties VS (video)
Afghanistan versterkt troepen aan grens met Pakistan
Stormloop op Amerikaanse 'ramp'-domeinnamen
Amerikaanse immigranten doelwit agressie
Kabinet belegt speciaal overleg
Toeristen mijden massaal VS
'Bin Laden handelde met voorkennis'
Arabische interesse in Rotterdamse vliegopleiding
'Kaper' meldt zich
Brand Islamitische school Nijmegen aangestoken
Geen gezamenlijke anti-terrorismeverklaring Korea's
Overleg Pakistaanse delegatie en Taliban gestart
Aangifte tegen Nederlandse Moslimomroep
Beurzen Azië in de ban van Wall Street
FBI op zoek naar meer dan 150 personen
Geen bewijzen voor betrokkenheid Irak
'Cel van Bin Laden plande aanslag Europees Parlement'
Mossad waarschuwde CIA al in augustus voor terroristen
Hervormers Iran willen oorlog voorkomen
Cheney: Bush gaf opdracht toestellen neer te halen
'Terroristen ronselen rekruten in Duitsland'
Ogen financiële wereld maandag gericht op VS
'Mogelijk medeplichtige zit al maand vast' (video)
Blair: Groot-Brittannië in staat van oorlog (video)
Mubarak: VS zetten aan tot haat tegen moslims
'Osama Bin Laden probeerde uranium te kopen'
Amerikaanse mariniers oefenen landingen bij Timor
Laatste buitenlandse hulpverleners weg uit Kabul
India speelt informatie over Taliban door aan VS
Hezbollah leeft mee met slachtoffers Amerika
Pakistan eist uitlevering Bin Laden
United Airlines schrapt vluchten
Tweede arrestatie in verband met aanslagen
Aantal geborgen doden stijgt
Groot deel kantoorruimte Manhattan verdwenen
Pakistan zegt VS volledige steun toe
Zwitserland blokkeert Taliban-tegoeden
Bedrijven evacueren personeel uit Pakistan
Britse marineschepen zakken Suez-kanaal af
Bush: 'We zullen overwinnen'
Hamas-leider ziet 'hand van Israël' in aanslagen
Saddam Hussein roept VS op af te zien van geweld
Duitse politie doorzoekt woningen in Bochum
'Gevechtsvliegtuigen op gekaapte toestellen afgestuurd'
Forse productiebeperkingen Ford na aanslagen VS
Amerikaanse ambassade in Parijs was doelwit
Amerikaanse sport schenkt miljoenen
Zowel KLM als Martinair vliegt weer naar VS
Nederlandse bedrijven zetten hulpacties op
Familie Bin Laden veroordeelt aanslagen
FBI meldt eerste arrestatie in New York
Recorder met cockpitgesprekken bevat geen informatie
Talibanleider roept op tot heilige oorlog (video)
Voicerecorder Pennsylvania gevonden
EU-ministers: strengere controles op vliegveld
President Bush bezoekt New York
Drie Nederlanders onder slachtoffers WTC
Terreur duwt luchtvaart naar rand van afgrond
Driekwart Nederlanders voor hulp bij vergeldingsactie
Luchthavens New York weer open na arrestaties
Bush krijgt volmacht tot militair ingrijpen (video)
Honderden boze telefoontjes over 'feestje' in Ede
Herdenkingsdienst in kathedraal Washington
Nederlandse moslims tonen medeleven
FBI: negentien terroristen betrokken bij kapingen
Ook Rusland zegt Verenigde Staten steun bij aanval toe
Buhrmann stelt notering aan Wall Street uit
Verdachten opgepakt in Texas en Miami
'Geen link arrestaties luchthavens en aanslagen'
Tegenstrijdige berichten over reddingswerk (video)
Moskee in Australië in brand gestoken
Consulaat: Geen Nederlandse slachtoffers
Vier extremistische moslims in Rotterdam opgepakt
Rotje verstoort stilte op station Utrecht (video)
Bedrijven in WTC missen nog veel collega's
Brand in Pentagon laait weer op
FBI krijgt online tips over aanslagen
Clinton troost Newyorkers (video)
Alle vluchten naar de VS toch geannuleerd
Giuliani wil daders valse bommeldingen zwaar straffen
Taliban-leiders verwachten 'massale' aanval
Verdachten in New York en op de Filippijnen gearresteerd
Cheney naar Camp David overgebracht
Zwarte dozen bij Pentagon gevonden
Buitenlanders vertrekken uit Afghanistan
President Pakistan verzekert Powell samenwerking
'Er zijn Nederlanders onder slachtoffers'
Nederlandse moslimorganisaties veroordelen aanslagen
'Canada diende als tussenstop voor aantal daders'
Bommeldingen vergroten nervositeit
Powell bevestigt dat Osama bin Laden verdachte is
Wall Street maandag weer open
Hoofdkantoor American Express op instorten
'NAVO-besluit zuigt Nederland niet in oorlogsspiraal'
'Pentagon-vliegtuig vloog over Congres richting Witte Huis'
FBI sluit neerhalen gekaapt vliegtuig niet uit
Saudi-Arabië biedt volledige samenwerking aan
WTC is meest gezochte trefwoord in zoekmachines
'Verdachte wil meewerken met FBI'
Hopeloze zoektocht naar overlevenden (video)
Beeldverslag 'The Day After'
Nederland bereidt zich voor op Europese rouwdag
New York bestelt 10.000 lijkzakken (video)
Laatste telefoongesprek uit WTC opgenomen (video)
Thorpe overleeft aanslag
'NAVO-aanslag op Afghanistan een optie'
KNVB handhaaft competitieprogramma
Leger VS niet meer in hoogste staat van paraatheid
Luchtvaartmaatschappij waarschuwde voor neppiloten
Bush bezoekt Pentagon (video)
VS vragen Pakistan medewerking
China staat achter VS
NAVO maakt vuist tegen terroristen
Witte Huis en Air Force One waren terreurdoelen
Amerikaans luchtruim weer beperkt opengesteld
Flight Simulator benadert werkelijkheid erg nauw
Taliban waarschuwt VS: geen vergeldingsacties
BVD: geen aanwijzingen voor aanslag in Nederland
Aanslagen kosten verzekeraars miljarden dollars
Passagiers vlucht 93 vochten met kapers
Verdachte telefoongesprekken onderschept
Internet was enige teken van leven
VN-gebouw New York ontruimd na bommelding
Slachtoffers WTC geborgen (video)
Marokkaanse jongeren in Ede vieren aanslagen
Fergie ontsnapt ternauwernood aan de dood bij WTC
Oprichter Akamai gedood bij aanslag op WTC
Ooggetuige: 'Het is alsof je in een film bent beland'
VS vrezen terreur op internet
Nederlanders rouwen mee met Amerikanen (video)
Beeldverslag 'Day of Terror'
Geen winstverwachting Heineken wegens aanslagen VS
Huurauto met Arabische vlieginstructies gevonden
Nederlandse kranten in teken van aanslagen
UEFA schrapt alle Europa Cup-duels
Champions League-wedstrijden afgelast
Sportleven in Amerika ligt plat
Ook eerste aanslag WTC op film vastgelegd (video)
New York verandert in spookstad (video)
Palestijnen vieren feest na aanslagen (video)
Aanslagen VS: 'Dit zijn monsters'
Nederland 1 en 2 omgedoopt tot rampennetten
Taliban geeft persconferentie inzake aanslagen VS
Veel sites plat na aanslagen in VS
Nederlandse vluchten naar VS teruggeroepen
Extra beveiliging Amerikaanse ambassade
Arafat en Europa veroordelen aanslagen scherp
Amerika getroffen door reeks zware aanslagen (video)

.
pi_1901108
quote:
Op zondag 14 oktober 2001 22:25 schreef calvobbes het volgende:
Ik EIS vrijspraak

( )


Nu moet ik wel lachen
:{
pi_1901159
quote:
Op zondag 14 oktober 2001 22:35 schreef Cora het volgende:

[..]

Nu moet ik wel lachen


Dan heb jij vandaag geleefd

Graag gedaan

pi_1901190
quote:
Op zondag 14 oktober 2001 22:39 schreef calvobbes het volgende:
Dan heb jij vandaag geleefd

Graag gedaan


Pfff, was op het nippertje, het is al bijna kwart voor 11
:{
pi_1901235
A página de serviços pretende informar os utilizadores dos serviços existentes e disponíveis na Biblioteca do IST. Consiste, essencialmente, numa breve descrição de cada um deles, contudo, convém relembrar que a especificidade de alguns implica a recolha de informações junto dos funcionários das respectivas Bibliotecas.


Pesquisas utilizando o sistema informático da BIST
- LIBERTAS

Estas pesquisas podem ser efectuadas a partir de qualquer terminal localizado nos diferentes núcleos documentais da BIST ou a partir de qualquer posto de trabalho ligado à Rede do IST (interno ou externo).
Como aceder ao sistema LIBERTAS:
A partir de um terminal existente na Biblioteca da BIST, basta premir RETURN e utilizar o username BIBLIOTECA.
A partir do exterior a máquina BIBLIO é acessível utilizando o endereço TELNET [193.136.132.8 ] ou através da homepage WWW do IST [ http://www.ist.utl.pt ] seguindo as opções : ESTRUTURA INTERNA / UNIDADES DE APOIO / BIBLIOTECA DO IST.
Funcionalidades do sistema:
O catálogo público em linha da BIST contém dados referentes a todos os núcleos documentais e oferece, de momento, as seguintes funcionalidades:

- Consultas no catálogo (com vários chaves de pesquisa);
- Mudar código de língua;
- Informações da Biblioteca (horários, serviços,...);
- Acesso a redes externas (nacionais e internacionais);
- Empréstimo interbibliotecas;
- Dados sobre a sua utilização da Biblioteca (ficha pessoal, empréstimos, reservas,...).

Para uma melhor utilização destas opções, encontram-se junto dos terminais de pesquisa, em cada núcleo documental, guias para utilização do catálogo.

Pesquisa em bases de dados online - Dialog

SERVIÇOS PROVISÓRIAMENTE INACTIVOS
MOTIVO: REESTRUTURAÇÃO DOS SERVIÇOS DIALOG


Local de consulta:
Biblioteca Central
Tipo de acesso:
- Marcação de pesquisa através da extensão 1813;
- Preparação prévia da pesquisa.
Apoio ao utilizador:
- Por telefone, através da extensão acima citada;
- A pesquisa será sempre efectuada por um funcionário da
Biblioteca, com o apoio do utilizador interessado e após a
preparação prévia.
Custos:
- Os custos de pesquisa serão suportados pelo utilizador
ou pela respectiva Organização/Departamento/Secção;
- Este pagamento destina-se às despesas de acesso à base e às telecomunicações.

Pesquisas em bases de dados - Disquetes / CD-ROM

Local de consulta:
Biblioteca Central, Biblioteca do Dep. de Eng.ª Química e Biblioteca do Dep. de Eng.ª Civil
Tipo de acesso:
- Pesquisa efectuada directamente pelo utilizador;
- Marcação de pesquisa na recepção ou pelo telefone;
Apoio ao utilizador:
- Por telefone;
- No local, contactar os funcionários da recepção;
- Sempre que necessário a pesquisa poderá ter o apoio de
um funcionário da Biblioteca.
Custos:
- Este tipo de pesquisa é gratuito para os utilizadores da
Biblioteca do IST.

Serviços de empréstimos e reservas

Um dos serviços mais utilizados na Biblioteca é o Serviço de Empréstimo Domiciliário.
O serviço de empréstimos informatizados foi disponibilizado , em diferentes núcleos bibliográficos, a partir de Dezembro de 1996.
Está também disponível para todos os utilizadores o serviço de reservas em linha.

Serviço de empréstimos interbibliotecas

Este serviço está também disponível através do sistema informático da BIST. Para qualquer dúvida ou apoio é favor contactar a Biblioteca Central (ext. 1231).
Através da mesma opção do sistema informático e/ou extensão pode também solicitar pedidos de artigos nacionais e/ou estrangeiros, assim como sugerir novas aquisições (científicas ou outras).

Difusão de informação

- Existem Regulamento e Guias para utilização da BIST,em
papel e em linha;
- Faz-se exposição sistemática das novas aquisições de
Livros e Revistas;
- Efectuam-se acções de formação para funcionários;
- Espera-se para um futuro próximo a realização de
acções de formação para utilizadores (Docentes e
Alunos);
- À medida em que o novo sistema informático é disponi-
bilizado são fornecidos novos Guias de Utilização dos
diferentes serviços a dois níveis (Utilizadores e Funcio-
nários);
- É fornecida, de forma sistemática, a todos os utilizadores
, informação sobre a informatização da Biblioteca do IST.

Serviço de fotocópias - Self-Service

Funciona, em todos os núcleos documentais (com excepção de Minas), em sistema de "self-service" e com preços reduzidos para quem tenha cartão de leitor.

Leitura de fotocópias de microfichas

Este serviço funciona na Biblioteca Central.

© 2001 - Biblioteca do IST. Todos os direitos reservados
Resolução recomendada 800x600

  † In Memoriam † zondag 14 oktober 2001 @ 22:44:06 #27
13819 Loedertje
Trotse GILF.
  † In Memoriam † zondag 14 oktober 2001 @ 22:45:57 #28
13819 Loedertje
Trotse GILF.
pi_1901260
39 END-OF-THE-WORLD PREDICTIONS TO COME IN OUR FUTURE
No need duck for cover.
None of these will come true.


Predictions have been made of several events that some Christians believe are related: the second coming of Jesus, the war of Armageddon, the arrival on earth of the Antichrist, the Tribulation, the Rapture, some horrendous natural disaster, etc. Meanwhile, Jewish, Islamic, psychic and occult predictions have also been offered as well. 18

We have listed over 6 dozen past predictions of the end of the world which have one factor in common: none ever came true. There is every likelihood that most (perhaps all) future predictions will not materialize either.

We have been criticized by some of our readers for whipping up hysteria about the end of the world. Our intent is the exact opposite: we want to dampen the millennial panic. We hope that by listing many dozens of past predictions which have failed, that people will realize that some very important individuals have been dead wrong when they predicted the end of the world (Jesus, Paul, various popes, etc.) End of the world predictions have been a Christian industry for almost 2000 years. Just as none of the past predictions actually happened, we do not expect any of the future ones to occur either. We fully expect that the year 2000 will come and pass with just the usual number of natural disasters and none of the supernatural events listed above.

Disclaimer: We offer no guarantees that the prophets listed below actually made these predictions. We have described their alleged predictions as they were reported on the Web, in newspapers, books, etc. We do not have the resources to track down original source material.

Predictions of TEOTWAWKI (The end of the world as we know it):
Near future: The American Traditional Catholic Church predicts that "the three days of darkness" will envelop the earth shortly. As a warning sign, a cross will appear in the heavens so that all can see. The family and society will fall apart. "...the gates of Hell will be opened and satan and his demons shall be released and given authority to roam the earth without limitation. There will be complete darkness for three days. " It will be as if time has come to a stand still. The only source of light will be from candles blessed according to the traditional Rites of the Church Catholic." 23
1999 to 2001: Stewart Best predicts that a small polar shift may occur. The polar inclination would increase from its present 23.5 degrees to about 22 to 45 degrees. An even larger shift will happen circa 2003 to 2007. See: http://www.truinsight.com/
1999 to 2009: Jerry Falwell predicted in 1999-JAN that Jesus could return within ten years. But before that can happen, he said that the Antichrist must appear. Referring to the Antichrist, Falwell said: "Is he alive and here today? Probably. Because when he appears during the Tribulation period he will be a full-grown counterfeit of Christ. Of course he'll be Jewish. Of course he'll pretend to be Christ. And if in fact the Lord is coming soon, and he'll be an adult at the presentation of himself, he must be alive somewhere today." Rabbi James Rudin of the American Jewish Committee suggested that Christians should be careful about making such comments. His said that Falwell's statement "plays into some latent and historical anti-Semitism from the past." 2 Rev. Falwell later apologized for his comment.
1999-OCT-10 to 2003-APR-22: "The prophet" predicts that somewhere in this interval of time, the rapture will occur. He expects it in 2001 or later.
About 2000: Jack van Impe once predicted that tumultuous events will happen about this time. The Antichrist will appear, and cause a 7 year period of worldwide distress called the Tribulation. This will be followed by the Battle of Armageddon and the second coming of Christ.
21st century: Thomas Chase 11 predicts that when the world's population reaches 6.66 billion, the war of Armageddon may occur. As of early 1999, it is close to 6.0 billion.
Sometime in 2001: The Unarius Society has received interstellar thought messages from a Pleiadean starship. They will land in the year 2001 on Atlantis, which will have risen from the depths of the earth in the Bermuda Triangle. Earth will join an alignment of 33 planets to form "Interplanetary Confederation for the Spiritual Renaissance of Humankind on Earth!"
Jack Van Impe Ministries sponsors the largest Evangelical Christian program devoted to end-time prophecy. In his home page, he discusses his book "On the Edge of Eternity" in which he predicts that the year 2001 will "usher in international chaos such as we've never seen in our history." He predicts that in 2001, and the years following, the world will experience "drought, war, malaria, and hunger afflicting entire populations throughout the [African] continent...By the year 2001, there will be global chaos." Islam will become much larger than Christianity. (That would take a sudden growth spurt; Islam is currently followed by 19% of the world's population vs. 33% for Christianity). A one-world church will emerge; it will be "controlled by demonic hosts." Temple rituals (presumably including ritual animal sacrifice) will resume in Israel.
Elohim City is located in the Cookson Hills of eastern Oklahoma. Its 100 heavily armed inhabitants live under the leadership of Robert Millar, a former Mennonite preacher. They expect an invasion of the U.S. by Asians. He believes that a series of natural disasters will occur probably soon after the year 2000. The wicked and unworthy will be purged from the earth at that time.

2001-JUL-7: According to the Weekly world News for 2001-FEB-13, Professor Philippe Garoche, head of a team studying a newly unearthed scroll in Athens, Greece, predicts that Jesus Christ will return to Earth on this day. He will appear simultaneously to people all over the world at 7:07 AM, presumably Jerusalem time.
2001-DEC-12: According to the Weekly World News for 2000-AUG-8, the Federal Government is suppressing information about the end of the world. They are aware that China and Iraq will attack Israel on this date and that the Battle of Armageddon will start -- an all-out nuclear war. The "end of all things" will occur on DEC-22. The News suggests that everyone who says "My life belongs to God" will be saved; everyone else will presumably be lost. If that is true, then my investment of $1.59 to buy a copy of the News is the best investment that I have ever made!
Circa 2001: Charles Spiegel, a retired psychology professor, preaches from a small town near San Diego CA that the ancient land of Atlantis will emerge from the Caribbean circa 2001 CE. Shortly thereafter, 1000 extra-terrestrials from "Myton" in 33 spaceships will land there and bring new knowledge to humanity.
2002?: The Last Adam, the only person "who knows how to have telepatich-contact [sic]" with UFO people who come from the sun predicts that the earth will be destroyed after the year 2001 by God. See: http://www.thelastadam.myweb.nl/
2003: Sree Vishiva Karma Veera Narayana Murthy, an avatar of Krishna will arrive to establish a 108 year reign of dharma (righteousness). This will be preceded by four years of: a rain of blood in towns and villages, circulation of poor quality coins, the appearance of male goats and oxen with mammary glands that can be milked, and the appearance of many incurable diseases.
2003-Late spring/early summer: Space aliens called Zetas are communicating through their earthly contact, Nancy. They describe how a comet visits earth every 3657 years. During this pass, the earth will pass through its tail. This will stop the earth's rotation for a few days. There will be "gigantic Lightning Bolts occur in the upper atmosphere, Violent Winds occur, and petrochemicals formed in the skies rain down in Firestorms; then, as the core of the Earth attempts to align magnetically with the giant comet, there is a Pole Shift with Continental Rip and Sinking and Rising land; how gigantic Tidal Waves assault the coasts, though Water Movement began when rotation stopped, and an Ocean Vortex can form; how plate shifts can result in a Sinking Atlantic floor, affecting the surrounding shorelines; but how the Other Planets will be little affected." The earth will start rotating again, but with new poles, equator, geography and climate. The ice caps will melt and the ocean will put shorelines under water. Sounds like a wild ride. 4
Late 2004: Arnie Stanton noted on 1997-SEP-16 that that evening was the fourth Jewish festival since 1996-APR-3 on which a lunar eclipse occurred. 5 He quotes Luke 21:25-26 which mentions "signs in the sun, in the moon and in the stars and on the earth distress of nations" He believes that "these recent lunar eclipses are the last known astronomical signs that will precede a 7 year (360 day/year) countdown to Armageddon/Christ's return to the Earth." He expects that Christ's return will occur within a few months of 2004-SEP-29 when Asteroid Toutatis will make a very close approach to the Earth - perhaps even a collision!
2006: Annie Stanton predicts that a 14.4 mile long asteroid will collide with the earth. Jesus will arrive and a 1000 year period of peace starts.
2006: According to the Sunday Times in England, a religious group called "The Family" anticipates the end of the world in 2006. "Members are said to be stockpiling food and planning to hide in caves in India."
2006: According to the Weekly world News for 2001-FEB-13, hydrogen bombs hidden in London, Washington and Tel Aviv will be detonated. This will be the start of the war of Armageddon
2007: According to the Weekly world News for 2001-FEB-13, the rapture will occur on the 7th hour of the 7th day of the 7th month of the Hebrew calendar year that corresponds to 2007 CE. Jesus will appear simultaneously in Jerusalem, Baghdad, Washington, Moscow and in every other capital city of the world.
2008-MAR-21: After a lengthy calculation based on the Bible, a British group, The Lord's Witnesses, has concluded that the start of Armageddon will happen on this day. Three quarters of the world's population will die during the subsequent war. This will be preceded by the United Nations taking over complete rulership of the world in the lunar month preceding 2001-APR-24. This is exactly 666 Hebrew months after the founding of the United Nations in 1945. 22
2008-APR-6: Philip B. Brown incorrectly predicted that the Great Tribulation would start on 2001-APR-7, with the appearance of the the two witnesses described in Revelation. He also predicted that the start of Jesus' millennial reign would be on 2008-APR-6. 27
2012: Michael Drosnin, author of "The Bible Code," found a hidden message in the Pentateuch (the first five books in the Bible) that predicts that a comet will crash into the earth in 2012 and annihilate all life
2012-DEC-21: Terence McKenna predicts that at "the moment of the solstice and the heliacal rising of the galactic center, levels of planetary novelty will exponentially increase." The results of this "ultranovel event" are difficult to predict, but may include "Hyperspatial Breakthrough, Planetesimal Impact, Alien Contact, Historical Metamorphosis,
Metamorphosis of Natural Law, Solar Explosion, Quasar Ignition at the
Galactic Core." Some of these don't sound too healthy for life on earth. 17
2012-DEC-22: The Mayan calendar expressed a date in the form: 6.19.18.1.5 This means: 6 Baktun, an interval of 144,000 days,
19 Katun (generations) of 7200 days,
18 Tun (years) of 360 days,
1 Uinal (month) of 20 days,
5 Kin (days)

for a total of 1,007,305 days. J. Eric Thompson determined that the first day of their calendar (0.0.0.0.0) was on 3114-AUG-11 BCE according to the Gregorian calendar. 5 This was when they believed that Venus was born. Another source says that this happened on AUG-13 of the same year. Mayans also had a "Great Cycle of the Long Count" of 13 Baktuns or 5,125.36 years. Many interpreters believe that the Mayans expected that the universe would last exactly that length of time. That is, they anticipated the end of the world at the Winter Solstice. 2012-DEC-21 or 13.0.0.0.0 in their notation. 6 John Jenkins has determined that on this date, there will be "an extremely close conjunction of the winter solstice sun with the crossing point of Galactic Equator and the ecliptic." This is an event that will not be repeated for thousands of years. Author Carl Johan Calleman disagrees that the Mayan calendar predicts the end of the world. He writes that "the Mayan calendar is about the progress of evolution, not about the end of the world." 25

2012-DEC-24: A visitor to our web site predicts that on this day, one third of the Ort cloud will rain down on the earth. The Ort cloud is a incredibly large collection of comets that encircle the solar system. Devastation would be total.
2014: According to Sun magazine for 1999-DEC-21, Pope Leo IX (1513-1522) wrote on 1514: "I will not see the end of the world, nor will you my brethren, for its time is long in the future, 500 years hence."
2016: An article in Weekly World News describes a find by a Professor Lloyd Cunningdale of Salt Lake City who was excavating with his students at the site of the famous Donner party disaster of 1847. The latter were a group of settlers bound for California who became trapped by snow in the Sierra Nevada Mountains. Cunningdale and students have found a time capsule left by the settlers which contains many predictions for the future. They predict that nations will abandon traditional methods of conflict and resort to the use of biological warfare. In 2016, one such disease will spread and kill all of the humans on the planet. 7
2017: The "Sword of God Brotherhood" believes that Armageddon will occur in 2017. The Prophet Gabriel has told them this. Only their own members will survive to repopulate the world. All of the others (including you and me) will "perish in hellfire." 8
Before 2018: The web site "A Nightmare for Everyone and the Countdown to 2000," predicts that an asteroid and comet will hit the earth, sometime between the re-creation of Israel in 1948 and 2018. See: http://www.geocities.com/Athens/Forum/8990/
2020s or 2030s: Bill Joy, co-founder and chief scientist of Sun Microsystems predicted the end of humanity in within 20 or 30 years, in an article in the 2000-APR issue of Wired Magazine. He wrote that leading-edge technologies such as robotics, genetic engineering and nano-tech may soon lead to the extinction of human society. 24
Before 2024: A web site titled "Fire from the sky: Meteors and Biblical Prophecy," predicts that a meteor (actually a meteorite) "could" hit the earth in the next 25 years. This would cause fireballs of debris, tidal waves, supher [sic] dioxide, a "red tide" in the oceans, and a dust cloud.
2028-OCT: Asteroid "1997 XF11" will approach close to earth. At first, scientists were concerned that there was a small probability that it might impact earth. However, data from 1990 has indicated that it will miss earth by about 600,000 miles. 21 Still, this is a near miss, as astronomical distances go.
Before 2038: Greenpeace predicts massive starvation due to population growth. Global warning will melt the polar ice caps and cause massive coastal flooding. Thousands of plant and animal species become extinct.
2038: The book "The Bible and the Future" predicts that "large percentage of the world's population will die in a series of severe punishments from God" at this time. See: http://www.alltheearth.com/future/summary.htm
2047-SEP-14: According to The Church of !BLAIR!, the human race will probably be terminated at 3:28 AM (Soho, England time). The church teaches, with tongue firmly in cheek, that if the human race does not discard their plastic conformity, then the Gods will withdraw their protection. The Gods don't want us to worship them; they don't want sacrifices or even offerings. They just want us to rid itself of our excessive "Normalcy". At that point, Astro-Lemurs (extra-terrestrials similar in shape to lemurs, but with rainbow colored bodies) will attack the entire human race and beat them to death with gigantic burritos. You have been warned. ;-)
2076: Bede the Venerable, an 8th century Christian theologian computed Jesus birth as 3,942 years after the world's creation. The 6,000 year millennial week will thus end in this year.
2076: Some Sufi sects expect the end of the world in this year, which is the year 1,500 in the Muslim calendar.

Related essays:
Will the world end in the near future?
Approaching the end of the Millennium: The Y2K Problems: Social, Economic, and Spiritual Aspects
Past end-of-the-world scenarios which have failed
Premillennialism and other competing Christian theories about the end of the world.

References:
Peter Henderson, "Russians Advocate Armageddon Evacuation to Siberia," Reuters, 1997-SEP-7. Viewable at: http://home.sprynet.com/sprynet/astanton/Siberia.htm
Religion Today news summary for 1999-JAN-18.
"Apparitions: appearances of Jesus and the Virgin Mary" at: http://www.concentric.net/~stambros/app.html
Zeta Talk is at http://www.zetatalk2.com/poleshft/p00.htm
John Jenkins, "The How and Why of the Mayan End Date in 2012 A.D.," at: http://www.levity.com/eschaton/Why2012.html
Adrian Gilbert and Maurice Cotterell, "The Mayan Prophecies" Element Books, ISBN 1 85230 692 0. The Watchtower magazine, Watchtower Bible and Tract Society, 1958-OCT-15, P. 613
Mike Foster, "Chilling Prophecies found in 1847 Time Capsule", Weekly World News, 1997-MAY-20, P. 8-9
"The Sword of God Brotherhood: Warriors of the Apocalypse," is at: http://www.putpeel.net/peel/SWORDOFGOD.html
P.B. Brown, "Timeline of the great Tribulation," at: http://www.newwine.org/#Timeline
David Van Meter, "Digest of Marian Apparitions & Catholic Apocalypticism," at: http://members.aol.com/UticaCW/Mary-App.html
Thomas Chase, "Astrology for the New Age, prophecies of the future, economic predictions, comets, plane crash patterns," at: http://www.geocities.com/Athens/Oracle/2360/
Theprophet, "Bible Code Arrays Concerning The Beginning Date Of Daniel's Seventieth Week (Commonly Called The Tribulation Period)," at: http://www.integrityonline30.com/theprophetspage/endtimes/
Paul Vallely, "The second coming of the curse of David Koresh," The Independent, 1999-MAY-21
"Its the end of the world as we know it...again," at: http://www.geocities.com/Athens/Oracle/9941/
"Fatima judgment day warning!," Sun magazine, 1999-JUL-13, Pages 20, 21.
Chris Nelson, "A brief history of the apocalypse," at: http://www.chrisnelson.net This web site contains many references to end-of-the-world predictions in our future.
Terence McKenna, "The Final Illusion," at http://www.levity.com/eschaton/finalillusion.html
Tom McIver, "The end of the world: An annotated bibliography," McFarland & Company, (1999) You can read a review and perhaps buy this book from amazon.com online bookstore. "This bibliography contains careful and bias-free annotations of close to 3,500 works written over many centuries about the end of the world." It mainly lists Christian sources, but also includes some Jewish, Islamic, psychic and occult predictions. An Amazon.com reader regards this book as "Indispensable for serious researchers."
"The Ark," at: http://www.endsville.com/doofs/ark.html
Robert Gehike, " Polygamist sect pulls kids out of school, perhaps to await apocalypse," at: http://citizen-times.com/cgi-bin/
Asteroid 1997 XF11 has its own web page at: http://ssd.jpl.nasa.gov/ca_97xf11.html
"The date of Armageddon without using the code," The Lord's Witnesses, at: http://www.bibledecoded.com/understanding16.html
"The three days of darkness: The mercy and justice of God," at: http://www.atcc.com/3daysof.htm
Bill Joy, "Why the future doesn't need us," Wired Magazine, 2000-APR. Online at: http://www.wired.com/wired/archive/
Carl Johan Calleman, "The Mayaonics: Where science and spirituality meet," at: http://www.ioon.net/mayaonics/main.htm

  † In Memoriam † zondag 14 oktober 2001 @ 22:46:38 #29
13819 Loedertje
Trotse GILF.
pi_1901269
Cosma-Shiva, wat vind jij daar nu van?
pi_1901298
1. Bureau

Trois séances du Bureau se sont tenues en 1999.

La première séance du 26 janvier 1999 a été principalement consacrée à la préparation de l'Assemblée générale du 18 mars 1999. Les résultats comptables 1998 ont été discutés et le projet de budget 1999 a été établi. Les propositions du bureau pour les nominations à la Commission technique et à la fonction de Secrétaire-trésorier ont été arrêtées. Le point a été fait sur l'entretien du 16 décembre 1998 avec le Directeur de l'Office fédérale de l'économie des eaux Dr Furrer, qui portait sur différents points d'actualité relatifs aux barrages en Suisse. Enfin, la situation du Fonds de recherche du CNSGB a été discutée.

La seconde séance du 27 avril 1999 a principalement été consacrée à la préparation des diverses manifestations du Comité national (Journées d'étude du groupe de travail pour lobservation des barrages, excursion annuelle, participation à la réunion annuelle de l'ICOLD). Par ailleurs, la procédure de prise de position du Comité national sur 5 projets de bulletins ICOLD a été définie.

La séance du 9 novembre 1999 a eu pour objet principal la préparation des élections à l'Assemblée générale du 16 mars 2000. Le point a également été fait sur les résultats de la réunion annuelle de l'ICOLD à Antalya et l'agenda 2000 a été fixé.

Le Bureau a eu le regret d'apprendre le décès de 11 avril 1999 de M. Walter Indermaur, membre de la Commission technique depuis de nombreuses années et membre actif du groupe de travail pour lobservation des barrages.

2. Commission technique

Deux réunions de la Commission technique se sont tenues en 1999.

La première a eu lieu le 11 mai 1999. Le point a été fait sur les activités des différents groupes de travail, ainsi que sur la composition de ces groupes. Les délégués du Comité national dans les groupes de rédaction des directives d'application de l'Ordonnance sur la sécurité des ouvrages d'accumulation ont été désignés. Enfin, la participation du Comité suisse aux groupes de travail internationaux (comités techniques ICOLD et groupes de travail européens) a été passée en revue. Les projets de bulletins ICOLD soumis à prise de position ont été brièvement discutés. La liste des contributions proposées pour le congrès de Beijing 2000 a été adoptée.

La seconde séance s'est tenue le 23 novembre 1999. Elle s'est penchée sur l'avancement des groupes de travail et la discussion s'est engagée en particulier sur le thème des perspectives de recherche et développement. Le projet de site internet préparé par le groupe de travail relations publiques est brièvement présenté. Le point a été fait sur la composition du Bureau et de la Commission technique après l'Assemblée générale 2000. Le projet de loi sur les ouvrages d'accumulation a été mis en circulation par le département fédéral de l'environnement, des transports, de l'énergie et de la communication. Un groupe ad hoc a été composé pour préparer la prise de position officielle du Comité national sur ce projet. Enfin, le compte rendu de la réunion annuelle d'Antalya de l'ICOLD a été présenté.

3. Assemblée générale du 18 mars 1999

La 50ème Assemblée générale du CNSGB s'est tenue le 18 mars 1999 à l'hôtel Bern à Berne. 56 membres individuels ou représentants de membres collectifs étaient présents.

L'Assemblée a adopté les résultats 1998, qui se sont soldés par un gain de CHF 953.85, ainsi que le budget 1999.

L'Assemblée a admis un nouveau membre collectif ainsi que 4 nouveaux membres individuels. Elle a aussi pris connaissance du retrait de 5 membres collectifs et de 3 membres individuels.

L'Assemblée a désigné M. L. Mouvet pour succéder au Dr W. Hauenstein à la fonction de Secrétaire-trésorier. Elle a également élu comme membres de la Commission technique MM. Dr C. Bossoney, G. Collet et C.A. de Smet en remplacement de MM. W. Indermaur, F. Benelli et W. Studer.

L'Assemblée a aussi adopté la constitution du nouveau groupe de travail "Relations publiques/Oeffentlichkeitsarbeit", présidé par le professeur A. Schleiss. Elle a également adopté une modification des statuts touchant la composition de la Commission technique.

Enfin, l'Assemblée générale s'est conclue par les exposés de

· Mme B. Schlaffer-Bruchez, intitulé "Assistance financière du BAWI dans le domaine des intrastructures de production d'énergie à l'étranger";

· Dr C. Bossoney, intitulé "Sanierung der Staumauer Inguri in Georgien - Überwachung".

4. Activités des groupes de travail

Les activités des groupes de travail pour l'année 1999 sont résumées dans les rapports annuels d'activité établis par les Présidents de chaque groupe de travail. Ces rapports sont joints au présent rapport annuel.

5. Directives d'application de l'Ordonnance sur la sécurité des ouvrages d'accumulation

La nouvelle Ordonnance sur la sécurité des ouvrages d'accumulation (OSOA-Stauanlagenverordnung-StAV) est entrée en vigueur le 1.01.1999. Elle précise à l'art. 26 que l'Office fédéral compétant peut établir des directives en collaboration avec les représentants des autorités cantonales, des milieux scientifiques, des organisations professionnelles et de l'économie. Dans ce cadre, le Comité national a été invité à déléguer un représentant dans chacun des 5 groupes de travail constitués. Les délégués ont été désignés par la Commission technique lors de la séance du 11 mai 1999.

· Dr W. Hauenstein, groupe "Critères de soumission" ;

· E. Ammann, "Plans sécurité et exploitation" ;

· Prof. R. Lafitte, "Cas de crues" ;

· Dr C. Bossoney, "Cas de séisme";

· G. Collet,"Alarme eau".

L'activité de ces groupes a commencé mi-1999 et devrait durer jusqu'au 2ème trimestre 2000.

6. Site WEB du Comité national

Lors de la 50ème Assemblée générale du 18 mars 1999, le groupe de travail "relations publiques" a été constitué. Un des thèmes de son cahier des charges est la mise en place et le maintien d'un site WEB sur le Comité national.

Ce site WEB a été développée par le Laboratoire de constructions hydrauliques de l'EPFL à Lausanne au cours du dernier trimestre 1999. Il est constitué d'une partie décrivant le Comité national, ses organes, ses membres, ses activités et ses publications. La seconde partie constitue une base de données des barrages en Suisse. Outre les données, chiffrées, la "fiche" de chaque barrage comporte également une photo, un plan et des coupes, ainsi qu'une remarque sur l'ouvrage. Les propriétaires d'ouvrages sont invités à consulter les "fiches" de leurs barrages et, le cas échéant, compléter ces fiches par l'envoi de photos, plans, textes. Dans son état final, le site sera dans les 3 langues nationales ainsi quen anglais.

7. Relations publiques

Le groupe de travail relations publiques s'est constitué sous la forme d'un petit comité opérationnel visant à surveiller l'information distribuée au grand public (revue de presse) et à se tenir prêt à réagir en cas de "crise". Tous les membres du Comité national sont invités à communiquer toute information touchant à l'image des barrages au Président de ce groupe de travail (Prof. A. Schleiss, fax 021-6932264).

8. Préparation du Congrès de Beijing 2000

Onze contributions ont été présentés par le Comité national pour le congrès de Beijing en septembre 2000, dont la liste a été adoptée par la Commission technique. La liste de ces contributions est diffusée par lettre circulaire. Dr H. Kreuzer a été désigné par l'ICOLD comme rapporteur général de la question 76, concernant lutilisation de lanalyse de risques dans le processus de décision relatif à la sûreté des barrages et à leur gestion.

Un groupe de membres collectifs du Comité national a décidé de préparer et d'organiser un stand suisse pour l'exposition accompagnant le congrès. Ce groupe est piloté par M. Eduard. Ammann.

9. Réunion ICOLD 1999 à Antalya

La réunion annuelle 1999 et le 67ème réunion exécutive de l'ICOLD se sont tenues du 19 au 25 septembre 1999 à Antalya. Un compte rendu détaillé de ces journées a été distribué à tous les membres avec la lettre circulaire 4/99 du 30 novembre 1999. Le Comité national était représenté par le Président et le Secrétaire-trésorier.. La délégation suisse était composée d'une quinzaine de membres, chiffre relativement important dû à la forte activité des bureaux d'études suisses en Turquie. Sept publications ont été définitivement adoptées et seront prochainement éditées (bulletins ICOLD).

10. Fonds de recherche du 15ème congrès de Lausanne

La situation financière du fonds au 31.12.1999 sera présentée dans le détail lors de l'Assemblée générale. En 1999, aucun soutien financier n'a été accordé. En janvier 1999, le travail du Dr R. Gunn a été considéré comme terminé et la contribution promise versée.

11. Journées d'étude des 10 et 11 juin 1999 à Soleure

Les journées d'étude du groupe de travail "Observation des barrages" se sont déroulées à Soleure les 10 et 11 juin 1999. Le thème en était: "Des barrages mobiles: sécurité, confortement, renouvellement". 137 participants se sont inscrits à ces journées. Les chantiers du nouvel ensemble barrage mobile et centrale de Ruppoldingen et de la réhabilitation de la centrale de Gösgen ont été visités, sous la conduite de collaborateurs d'ATEL et de Colenco Power Engineering.

12. Excursion annuelle

L'excursion annuelle traditionnelle du Comité national s'est déroulée les 3 et 4 septembre 1999 dans le Lötschental. Les quelque 30 participants ont pu se rendre compte de visu des dommages causés par l'avalanche du 23 février 1999 sur le barrage de Ferden. Sur le couronnement du barrage, MM. Dirren, Alusuisse Lonza Energie, et Rudin, KW Lötschen, ont présenté les installations de production d'électricité du groupe en Suisse, et plus spécifiquement l'aménagement de Lötschen. MM. Salzberger, ALE, et R. Bremen, Bureau Lombardi, ont ensuite présenté de manière détaillée l'incident, les mesures d'urgence qui ont été prises, les dommages et le projet de réfection des équipements du barrage. Il faut noter que si certains équipements ont été endommagés (galerie d'accès, équipements de mesure), le barrage lui-même s'est parfaitement comporté. Après l'apéritif, et un repas offert par Alusuisse Lonza Energie, Deux brefs exposés ont été présentés : lun portait sur le projet de tunnel de base du Lötschberg, lautre sur l'étude qui a été menée à propos dAlptransit et la sécurité des barrages. Le groupe a ensuite visité les installations de chantier ainsi que la galerie d'accès de Ferden (descenderie au tunnel de base du Lötschberg).

La journée s'est terminée par une raclette à Kippel. Le lendemain matin, un groupe de participants a pu visiter le musée du Lötschental à Kippel qui montre toute l'originalité de cette vallée qui était il y quelques décennies encore totalement coupée du monde plusieurs mois par an.

13. Secrétariat

Suite à l'élection lors de l'Assemblée générale du 18 mars 1999 du nouveau Secrétaire-trésorier, les dossiers et les comptes du Comité national ont été transmis par M. W. Hauenstein. Les archives du Comité national ont également été déménagées de Baden à Lausanne.

Le secrétariat a informé les membres par les envois suivants:

15 février 1999: lettre circulaire 99/1, à laquelle étaient joints:

· documents de préparation de l'Assemblée générale 1999

· annonce du cours postgrade en constructions hydrauliques 1999-2001 au LCH-EPFL.

· Tiré-à-part de la publication "Talsperren und Hochwasserschutz in der Schweiz", W. Hauenstein.

26 mai 1999: Lettre circulaire 99/2, à laquelle étaient joints

· procès-verbal de l'Assemblée générale 1999

· annonce des bulletins ICOLD 113 et du CD-ROM "Leçons tirées des accidents de barrages".

15 juillet 1999: Lettre circulaire 99/3, à laquelle étaient joints

· invitation à l'excursion annuelle 1999

· liste des membres 1999 et liste des publications

· annonce des bulletins ICOLD 114 et 115

30 novembre 1999: Lettre circulaire 99/4, à laquelle étaient joints

· étiquette pour modification des statuts

· invitation à la journée "Sécurité et risque" du 10 février 2000

· compte rendu de la réunion annuelle 1999 de l'ICOLD à Antalya

· agenda 2000

16 décembre 1999: Lettre circulaire sur les élections qui se dérouleront lors de l'Assemblée générale du 16 mars 2000.

14. Publications

3 publications ICOLD ont été éditées en 1999:

Bulletin 113: Seismic Observation of Dams Guidelines and case - Observation sismique des barrages Recommandations et exemples

Bulletin 114: Embankment dams with Bituminous Concrete Facing Review and recommendations - Barrages en remblai avec masque en béton bitumineux Synthèse et recommandations

Bulletin 115: Dealing with Reservoir Sedimentation Guidelines and case studies - Gestion de l'alluvionnement des retenues recommandations et exemples.

De plus, l'ICOLD a réédité sous forme de CD-ROM le livre "Leçons tirées des accidents de barrages / Lessons from Dam incidents".

Une brève description du contenu de ces publications a été distribuée avec les lettres circulaires.

Aucune publication du Comité national n'a été éditée en 1999. Le rapport final du groupe de travail "Béton de barrages" a été finalisé en tenant compte des remarques formulées par la Commission technique. Il sera édité dans sa version originale en 2000. L'accent a été mis sur la rédaction d'un texte de synthèse sur ce même thème, qui sera diffusé à l'occasion du Congrès de Beijing en septembre 2000.

  † In Memoriam † zondag 14 oktober 2001 @ 22:51:02 #31
13819 Loedertje
Trotse GILF.
pi_1901316
"De ouders kunnen in de thuissituatie een stuk ontlasting krijgen." (Een Directeur van een thuiszorginstelling op Radio 1)
  † In Memoriam † zondag 14 oktober 2001 @ 22:53:04 #32
13819 Loedertje
Trotse GILF.
pi_1901342
VERBOD OP SPAM IS LANGE HINDERNISSENRACE

Europa worstelt al jaren met een verbod op spam. Ook in Nederland blijft de verwarring groot als gevolg van een wispelturige overheid, initiatieven tot zelfregulering en onduidelijkheid over de interpretatie van de Wet bescherming persoonsgegevens. Een overzicht van alle ontwikkelingen:

Spam staat al jaren op de politieke agenda, zowel in Nederland als in Europa. Wat de discussie op Europees niveau extra verwarrend maakt, is dat er verschillende richtlijnen zijn waarin het ongevraagd benaderen van consumenten aan de orde komt. In de media worden ze regelmatig door elkaar gehaald.

Koop op afstand voor niet-financiële producten
Al van 1997 dateert de Europese richtlijn Koop op afstand uit 1997. Deze richtlijn is in 2000 van kracht geworden. Spam komt hier niet als zodanig aan de orde, maar wel ongevraagde telefoontjes en faxen. De richtlijn kan men daardoor wel beschouwen als een prelude voor een verbod op ongevraagde e-mail.

De richtlijn uit 1997 regelt echter niet alle producten. Omdat men meende dat financiële zaken aparte regels behoefden, werden deze uitgesloten en in een aparte richtlijn ondergebracht.

Koop op afstand voor financiële producten
Vorige week donderdag stemde de Europese ministerraad in met een verbod op ongevraagde e-mails, telefoontjes en faxen die financiële diensten promoten. De ministers zijn eveneens tegen 'inertia-verkoop'. Dat betekent dat consumenten geen rekening mogen ontvangen voor ongevraagd toegestuurde financiële producten of diensten, zolang ze nog niet hebben besloten om die ook daadwerkelijk te kopen.

Dit alles vloeit voort uit de concept-richtlijn Koop op afstand van financiële diensten, zeg maar het complement van de eerdere richtlijn uit 1997. De nieuwe richtlijn regelt de marketing van financiële producten, zoals creditcards, verzekeringen en pensioenregelingen.

Het opstellen van de richtlijn was vooral het werk van de Europese Commissie, het uitvoerend orgaan van de Europese Unie. De goedkeuring van de Europese ministerraad betekent echter nog niet dat de richtlijn er al is. Eerst moet de tekst voor een 'tweede lezing' naar het Europees Parlement. Dat zal nog enkele maanden gaan duren.

Omdat de kans niet groot dat het parlement de concept-richtlijn alsnog verwerpt, werd deze week alom geconcludeerd dat de Europese Unie zich eindelijk tegen spam zou hebben uitgesproken. Behalve ietwat voorbarig is dat ook onzorgvuldig. Het gaat hier tenslotte nog steeds slechts om ongevraagde telefoontjes en faxen, niet om ongevraagde e-mails.

Richtlijn tegen ongevraagde e-mail
De derde richtlijn behandelt wel spam en betreft verwerking van persoonsgegevens en de bescherming van de persoonlijke levenssfeer in de sector elektronische communicatie, daterend van 12 juli 2000. Terwijl de invoering van de eerste twee richtlijnen traag maar toch zonder grote problemen is verlopen, leidt deze richtlijn wel tot veel politieke controverses.

De Europese Commissie is fel tegenstander van spam. Dat is vooral om economische redenen: de commissie becijferde eerder dit jaar dat Europese internetgebruikers jaarlijks 22 miljard gulden kwijt zijn aan telefoonkosten om spamberichten binnen te halen. Naar verwachting zullen die kosten nog verder stijgen als burgers straks massaal e-mail via de mobiele telefoon ontvangen.

De commissie ziet daarom graag een 'opt in'-systeem: internetgebruikers ontvangen pas reclame als ze daarmee vooraf hebben ingestemd. De commissie krijgt hierbij steun van vijf Europese lidstaten (Duitsland, Italië, Oostenrijk, Denemarken en Finland), die in hun eigen land al voor 'opt in' hebben gekozen.

Andere leden van het Europese Parlement kiezen juist voor industriële belangen en pleiten daarom voor 'opt out': opzeggen van ongevraagde reclame is wel mogelijk, maar pas achteraf.

Door de aanhoudende verdeeldheid binnen het parlement besloot het onlangs om een nader onderzoek in te stellen. Dat gaat enkele maanden duren. Pas daarna wordt een nieuwe poging ondernomen om een besluit over deze richtlijn te nemen. De Europese strijd tegen spam is dus nog lang niet gestreden. Zelfs over de uitkomst valt nu nog weinig te zeggen.

Nederland
In Nederland is de verwarring minstens zo groot als op Europees niveau. De Nederlandse Associatie voor Direct Marketing (DMSA) is groot voorstander van 'opt out'. In oktober 2000 introduceerde de DMSA haar Code verspreiding ongevraagde reclame via e-mail. Kern van de DMSA-code is dat bedrijven spam mogen versturen, tenzij de ontvanger vooraf via een antwoordnummer heeft aangegeven dat niet te willen.

De code leidde direct tot kamervragen van Tweede-Kamerlid Bakker (D66). In antwoord hierop schreef minister Jorritsma (Economische Zaken) dat ook het kabinet koos voor 'opt out', zij het voorlopig. De minister sloot niet uit dat later alsnog voor 'opt in' zou worden gekozen. Ze haalde zich daarmee veel kritiek op de hals.

Sindsdien voert de regering een draaierig beleid, zo meent internetjurist Christiaan Alberdingk Thijm: 'Staatssecretaris De Vries heeft naderhand weer haar voorkeur voor opt-in uitgesproken. Dat deed ze namens het hele kabinet. Ook de Wet bescherming persoonsgegevens is niet duidelijk over spam.'

De jurist licht toe: 'De wet staat het (secundair) gebruik van e-mail adressen alleen toe als dit verenigbaar is met de doeleinden waarvoor de adressen in eerste instantie zijn verkregen. Volgens de Memorie van Toelichting van de Wbp is vooral het verwachtingspatroon van de consument een belangrijke leidraad. Een Postbank-klant zal waarschijnlijk wel reclame voor bijvoorbeeld creditcards accepteren, maar niet voor totaal andere producten, simpelweg omdat dat buiten zijn verwachtingspatroon valt.'

Alberdingk Thijm noemt de Help India-actie, eerder dit jaar, als voorbeeld. Toen verzochten hulporganisaties providers om een oproep naar al hun klanten te sturen. 'Dat is erg twijfelachtig. Een klant van een provider verwacht wel reclame over bijvoorbeeld nieuwe breedband-mogelijkheden, maar geen oproep voor een goed doel.'

'Toch keurde zelfs het College Bescherming Persoonsgegevens deze actie goed, terwijl een e-mail adres duidelijk een persoonsgegeven is en de gegevens in dit geval duidelijk voor heel andere doeleinden dan liefdadigheid zijn verkregen. Dit lijkt dus wel degelijk in strijd met de Wbp.'

Thuiswinkel
Nu blijkt dat de Nederlandse wetgeving geen afdoende remedie vormt, is de hoop weer gevestigd op zelfregulering. Vorige week kwam de Nederlandse Thuiswinkel Organisatie met de Consumentenbond overeen om klanten voortaan expliciet om toestemming te vragen voor het versturen van commerciële boodschappen per e-mail, lees: opt in.

Thuiswinkel is een belangenorganisatie van zo'n 70 postorderbedrijven en webwinkels, die samen meer dan 80 procent van de omzet in de branche vertegenwoordigen. De aangesloten bedrijven gaan via hun sites bezoekers de mogelijkheid bieden om ja of nee tegen reclame te zeggen.

pi_1901344
quote:
Op zondag 14 oktober 2001 22:51 schreef Loedertje het volgende:
"De ouders kunnen in de thuissituatie een stuk ontlasting krijgen." (Een Directeur van een thuiszorginstelling op Radio 1)
Offtopic!!!

Bannen graag

  † In Memoriam † zondag 14 oktober 2001 @ 22:56:31 #34
13819 Loedertje
Trotse GILF.
pi_1901382
quote:
Op zondag 14 oktober 2001 22:53 schreef calvobbes het volgende:

[..]

Bannen graag


Het Meldpunt Politieke Correctheid

'Mensen hebben steeds meer het idee dat je op Internet alles mag en kan zeggen'
R. Eissens - Medewerker Meldpunt Discriminatie Internet (Volkskrant, 19-06-99)

Wat is het Meldpunt Politieke Correctheid ?

Artikelen / Uitspraken

De Opstand der incorrecten
Voor de rechter ermee!
Wacht u voor de discriminatiepolitie
H.J. Schoo - Repressieve intolerantie van links
Sabine Gieben - Front tegen discriminatie
De geweigerde column van Bart Croughs over Amnesty International
Libertarisme en extreem-rechts
Vuilnisbak als teken van racisme
Bolkestein weer bang voor Islam
Gerry van der List - Een Amsterdamse orgie
Gerry van der List - Gemengde gevoelens
Wladimir van Kiel - Rechters op hellend vlak
Korthals gaat racisme op internet te lijf
Peter Sloterdijk en het filosofische rumoer
Dossier Multiculturele Samenleving (NRC Handelsblad)

Top ten reasons to be politically correct !
PC Primer: What is political correctness ?

Politiek Incorrecte Links

Nederland

De Homepage van Bart Croughs
Homepage over C.W. Rietdijk
De gezonde roker: Theo van Gogh
PC-Beschutting: Matthias E. Storme's Opiniepagina
Multiculturele samenleving of multiculturele chaos ?
Multicul - Flauwekul !


Internationaal

Upstream
Stalking the wild taboo
The crisis in radical thought
Accuracy in academia
Media Bypass
Council of Conservatieve Citizens
American Renaissance
The Camilla Paglia homepage
Che Guevara's dubious legacy
Critiques of feminism
The domain of patriarchy
The Martin Luther King Jr. Plagiarism page
Multiculturalism & Diversity: The new Racism

Overige Links:

Libertarian.nl: De homepage voor libertarisme en klassiek liberalisme
De Vrijbrief: Libertarisch tijdschrift
De Libertarisme FAQ: Veel gestelde vragen over het libertarisme
Anarcho-kapitalisme
Het Conservatisme Web: Nederlandse webpagina over conservatisme

pi_1901410
HSDL InterLov. trial repport No. 1: Nov. `96
1996.11.8
@¬i¤ºigrckj@ã\ÌÜ\Å·B
@FlÉÍ_oïaE¤xƒf[ƒ^ƒoƒƒNÆÖ̲x²ððíèܵÄA èªÆ¤²´¢Ü·B
@xêιȪçA³ÝµoµƒCƒƒ^[ƒlƒbƒg[Ì^pJnÉí¹ÜµÄA_oïaE¤xƒf[ƒ^ƒoƒƒNÆÉ¢ÄA»µð²ñ³¹Ä¸«Ü·B

--------------------------------------------------------------------------------

1.@ƒTƒ}ƒ[
*_oïaƒf[ƒ^ƒoƒƒNÍ­]¿³êAnæÅÌÀHIpÉæègñŢܷ
@_oïaE¤x̽ßÌApÒÌÝÉæé³îñƒT[ƒrƒXƒVƒXƒeƒ€uƒCƒƒ^[ƒƒ{vÍA1996N1æè^pðJn¢½µÜµ½B»ÝAE_oïaÉ¢ÄÌTàÐî@Eîñf¦/ÈÕõƒVƒXƒeƒ€i¶£Eƒlƒbƒgƒ[ƒNã̃ƒ\[ƒXEƒgƒsƒbƒNƒXEƒP[ƒXƒoƒƒNE¶Êó]Ò¼ëEÃ{¶îñEÓ©ÈÇeLÙ©j@E_oïaƒhƒLƒƒƒƒg@yÑÉAƒ[ƒƒƒOƒƒXƒgðƒCƒƒ^[ƒlƒbƒgãÅ^pµÄ¢Ü·B
@ƒJƒEƒƒgÅ«½ƒAƒNƒZƒXÍAêNãE1-11nßÅñ6800Å·B½¾µAƒ^ƒCƒgƒƒy[ƒWÖ̃AƒNƒZƒX̃JƒEƒƒgÌÝÅ èAeƒy[ƒWÖ̼ڃAƒNƒZƒXðl¶·éÆAÀÍàÁƽ¢Æl¦çêÜ·B @ƒTƒCƒgJÝÈAgrckƒTƒCƒgƻ̮ÍAYoV·ðn߯·é½ƒƒfƒBƒAÉæèñ¹³êA¢]¿ðó¯Ä¢Ü·BªAcOȪçA7æè¬i¤ºÌoÏóÔ«»ÉæèAîñXVªâ~µÄ¢Ü·B
@±Ì96/10/26úðàÁÄA²ñ¸¢½ÞEƒAƒJƒEƒƒgÉæéAÝîÃ{Ì_oïa³ÒEưÖ̃Cƒƒ^[ƒlƒbƒg[̳ݵoµðJnµÜµ½B»ÝA¡lsìæÅêäªÒ­Å èAìæÌ³ÒïLuÉæè¤¯pÌ\èÅ·B
@®A12ÉÍAgrckƒTƒCƒgÌimasy.or.jpÖÌÚ]ÆA»êÉÆàȤƒƒjƒ[ƒAƒ+îñXVð\èµÄ¢Ü·B±ÌÛAîñð¬Ì­»Ì½ßAbfhÈ¢µi`u`ÉæéeÌ©®«Ý@\ÈÇðÝè·é\èÅ·B

*ƒf[ƒ^ƒoƒƒN^cÍà­IÉ¢ïÅ·

@»ÝA¬i¤ºÍã\/ݧÒÌÂlIàñÆA²xÌFlû̲¦ÍAêÌLuÌû̲ñtÉæèAh¤¶Ä®ð۵ĢܷB
@{A¬i¤ºÍ»ÌJ­µ½ZpEƒmƒEƒnƒEðêÊü¯ÉÌEƒƒCƒZƒƒX·éûvÆÅ®àð©È²B·é\èŵ½ªAcOȪçAcÆÍÌs«ÉæèAÙÆñÇûvðã°Ä¢Ü¹ñB»Ì½ßAà­IÉÍÉßÄ¢ïÈóµÉ èÜ·BÀ¿IÉAgrckÌà­Æ^cÍAã\/ݧÒÉÙÚ®SÉ˶µÄ¢Ü·B

*grckÍA©§à­m§ÖÌwÍð±¯Ä¢Ü·

@ãLƒCƒƒ^[ƒƒ{ÌpƵÄAnæZ¯ÉηéãÃîñƒVƒXƒeƒ€ÆµÄÌp̤෷ßĢܷB±êÍA«IÉ̓Cƒƒ^[ƒƒ{ÆÌÉâ©ÈƒƒƒNÉæèAÐïÉïaÉ¢ÄÌ[Öð}ézÎÆµÄÌÓ`ª èÜ·B¯É»ÌƒmƒEƒnƒE̤i»ÉæèAƒf[ƒ^ƒoƒƒNÆðx¦éÈÇÌúÒª èÜ·B
@ܽA«ÉnèÀèµmÀÈîñ݃VƒXƒeƒ€ðÛ·é½ßAæÊð©Âß龯Ńpƒ\ƒRƒ€ìEüͪūéAüü̓VƒXƒeƒ€ÈÇÌJ­EƒƒCƒZƒƒXAܽƒCƒƒ^[ƒlƒbƒg±üƒVƒXƒeƒ€ÈÇÌÌÉæéA©§à­îÕm§ðÚwµÜ·B

--------------------------------------------------------------------------------


2.@²ñ¸¢½ÞÈÇÆgpóµ
@*Macintosh LC575@3ä
@*Macintosh PowerBook 165c@1ä
@*LaserWriter Pro@1ä
@---Èã@ƒAƒbƒvƒƒRƒƒsƒ[ƒ^®ïÐLuÌFlæè
@³Ò³Ýµoµi¡lsìæjÉLC575ð1
@@næãÃîñ¤piÍ´jÉLC575ð1APB165cð1iÕj
@@cèÍÛÇEÒ@@Ûƒ[ƒgÅÌ³ÒÆ°ÖÌݵoµð\è


3.@²ñ¸¢Ä¢éƒCƒƒ^[ƒlƒbƒgEƒAƒJƒEƒƒgÈÇÆgpóµ
@*imasy.or.jpiƒCƒƒ^[ƒlƒbƒgÝï¡llæèj
@@vvvƒAƒJƒEƒƒgp@2
@@ƒ[ƒpƒAƒJƒEƒƒg@2

@@grckÉ1¸Â
@@@³ÒÂlƒ[ƒƒAƒJƒEƒƒgÉ1
@@@vvv¤pƒAƒJƒEƒƒgÉ1

@*sagami.or.jpimdsPU³ªÝlæèj
@@ƒAƒJƒEƒƒg@3

@@grckÉ1
@@@næãÃîñ¤pÉ1iÕj
@@@cèÍÒ@@Ûƒ[ƒgÅÌ³ÒÆ°ÖÌݵoµð\è

@*ƒ[ƒƒƒOƒƒXƒg@interlov@imasy.or.jp@iƒCƒƒ^[ƒlƒbƒgÝï¡llæèj
@7{æè^p@_oïaÉÖ·é çäébèðµÁĢܷ

@û̽ßAgrck©çÍܾ¨ÍðØèÅ«¸É¨èÜ·ªA¼ÉದĮ́\µoð¸ÕµÄ¨èÜ·B


4.@²Ý^¸¢Ä¢é@ÞÈÇ
@@Macintosh PowerBook Duo 270c@1@ƒAƒbƒvƒƒRƒƒsƒ[ƒ^Ð-Rèlæè
@@@ƒfƒ/ڮƱp
@@14.4Kƒƒfƒ€@1@hl`rx-ºìlæè
@@@³Ýµoµ[i¡lsìæj
@@14.4Kƒƒfƒ€@1@hl`rx-àVlæè
@@@næãÃîñƒVƒXƒeƒ€¤p[iÍ´j
@@14.4Kƒƒfƒ€@1@hl`rx-læè@@ÛÇEÒ@
@@14.4Kƒƒfƒ€@1@hl`rx-Ølæè@ÛÇEÒ@

5.@²ñt
@z@6~@i2¼læèj
@SzâsÌgrckêpûÀÉaàBÅ«Ìà­óÔÅ̃AƒJƒEƒƒg/ƒTƒCƒgÛÉõ¦A´¥ÆµÄxo¹¸A·¶µÜ·B

6.@_oïaƒ[ƒƒƒOƒƒXƒginterlov@imasy.or.jp^póµ
@*QÁlÆàóF
*QÁlÆàóF
@³ÒEư@@@@@11
@»êãÃÒ@@@@@6
@åwEãw@@@@9@@iåwa@®ãÃÒÜÞj
@¤ÒEÆ@Ö@@5
@êÊ@@@@@@@@24@i®s¾ÜÞj

@---v@55@l
@kÍkC¹©çìͪÜÅACOÅÍħq¶¤mhgÜÅAƒCƒƒ^[ƒlƒbƒgÌ´£E´gDI«¿ð@½È­­öµA³Ü´ÜÈêEgDÌûª²QÁ³êĢܷB

*ƒgƒƒtƒBƒbƒNF
@ÊZe124@e1.18Ê/ú@zM67.31Ê/ú

@@@i96.11.3»Ýj

@ÈãA»µ²ñ\µã°Ü·B

--------------------------------------------------------------------------------

@¬i¤ºÍA_oïa¨æÑÉgÌáQðÈwZpÌpÉæèµAaßéÒêµÞÒÉó]ÆKðà½ç·½ßA_oïaxƒf[ƒ^ƒoƒƒNÆðAïðrµÄi¢½µÜ·B

@¡ãÆàø«±«½²æëµ­²w±²ÍíèÜ·æ¤A¨è¢\µã°Ü·B

@MȪçAdËÄFl̲úÓÉASæèäç\µã°Ü·B

X

&#12288;&#39640;&#36895;&#25512;&#36914;&#30740;&#31350;&#23460;&#65288;&#65320;&#65331;&#65316;&#65324;&#65289;&#12288;&#20195;&#34920;/&#20445;&#20581;&#22763;&#12398;&#20116;&#21313;&#23888;&#12391;&#12377;&#12290;
&#12288;&#24179;&#32032;&#12424;&#12426;&#31070;&#32076;&#38627;&#30149;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12539;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12408;&#12372;&#25903;&#25588;&#12356;&#12383;&#12384;&#12365;&#12414;&#12375;&#12390;&#12289;&#12354;&#12426;&#12364;&#12392;&#12358;&#12372;&#12374;&#12356;&#12414;&#12377;&#12290;
&#12288;&#31070;&#32076;&#38627;&#30149;&#20811;&#26381;&#30740;&#31350;&#25903;&#25588;&#20107;&#26989;&#12398;&#36914;&#34892;&#29366;&#27841;&#12434;&#12372;&#22577;&#21578;&#30003;&#12375;&#19978;&#12370;&#12414;&#12377;&#12290;

--------------------------------------------------------------------------------

&#12469;&#12510;&#12522;&#12540;
*&#31070;&#32076;&#38627;&#30149;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12399;&#31471;&#26411;&#36024;&#20986;&#12539;&#65335;&#65335;&#65335;&#12471;&#12473;&#12486;&#12512;&#38283;&#30330;&#12364;&#36933;&#12428;&#12390;&#12356;&#12414;&#12377;&#12364;&#12289;&#31070;&#32076;&#38627;&#30149;&#38306;&#36899;&#12513;&#12540;&#12522;&#12531;&#12464;&#12522;&#12473;&#12488;&#12399;&#38918;&#35519;&#12391;&#12377;
&#12288;&#31070;&#32076;&#38627;&#30149;&#20811;&#26381;&#12539;&#30740;&#31350;&#25903;&#25588;&#12398;&#12383;&#12417;&#12398;&#12289;&#21033;&#29992;&#32773;&#12398;&#20114;&#21161;&#12395;&#12424;&#12427;&#28961;&#20767;&#32207;&#21512;&#24773;&#22577;&#12469;&#12540;&#12499;&#12473;&#12471;&#12473;&#12486;&#12512;&#12300;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12301;&#12399;&#12289;1996&#24180;1&#26376;&#12424;&#12426;&#36939;&#29992;&#12434;&#38283;&#22987;&#12356;&#12383;&#12375;&#12414;&#12375;&#12383;&#12290;&#29694;&#22312;&#12289;&#12539;&#31070;&#32076;&#38627;&#30149;&#12395;&#12388;&#12356;&#12390;&#12398;&#27010;&#35500;/&#31563;&#33806;&#32302;&#24615;&#20596;&#32034;&#30828;&#21270;&#30151;&#12539;&#33034;&#39620;&#23567;&#33075;&#22793;&#24615;&#30151;&#35299;&#35500;&#12288;&#12539;&#31070;&#32076;&#38627;&#30149;&#12489;&#12461;&#12517;&#12513;&#12531;&#12488;&#12288;&#12364;imasy.or.jp/~hsdl/&#12288;&#12391;&#31292;&#20685;&#12375;&#12390;&#12356;&#12414;&#12377;&#12290;
&#12288;&#12414;&#12383;&#31070;&#32076;&#38627;&#30149;&#38306;&#36899;&#12513;&#12540;&#12522;&#12531;&#12464;&#12522;&#12473;&#12488;interlov-ml&#12399;&#12289;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#20114;&#21161;&#20250;&#27178;&#27996;&#65321;&#65325;&#65313;&#65331;&#65337;&#27096;&#12398;&#12372;&#21402;&#24847;&#12395;&#12424;&#12426;1996&#24180;7&#26376;&#12395;&#36939;&#29992;&#12434;&#38283;&#22987;&#12289;&#21033;&#29992;&#12399;&#30528;&#23455;&#12395;&#22679;&#21152;&#12375;&#12390;&#12356;&#12414;&#12377;&#12290;
&#12288;&#12375;&#12363;&#12375;&#12394;&#12364;&#12425;&#12289;&#65335;&#65335;&#65335;&#12395;&#12424;&#12427;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12399;&#12471;&#12473;&#12486;&#12512;&#38283;&#30330;&#12364;&#36933;&#12428;&#12289;&#12414;&#12383;&#31471;&#26411;&#36024;&#20986;&#12418;&#22320;&#22495;&#12398;&#24739;&#32773;&#12373;&#12435;&#12408;&#12398;&#12450;&#12463;&#12475;&#12473;&#22256;&#38627;&#12392;&#12469;&#12509;&#12540;&#12488;&#20307;&#21046;&#19981;&#20633;&#12398;&#12383;&#12417;&#36933;&#12428;&#12390;&#12356;&#12414;&#12377;&#12290;

*&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#36939;&#21942;&#12399;&#36001;&#25919;&#30340;&#12395;&#20302;&#12524;&#12505;&#12523;&#23433;&#23450;&#12391;&#12377;&#12364;&#12289;&#25913;&#21892;&#12364;&#24517;&#35201;&#12391;&#12354;&#12426;&#12289;&#39640;&#36895;&#25512;&#36914;&#30740;&#31350;&#23460;&#12399;&#33258;&#31435;&#25505;&#31639;&#21162;&#21147;&#12434;&#32154;&#12369;&#12390;&#12356;&#12414;&#12377;

&#12288;&#31070;&#32076;&#38627;&#30149;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12539;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12399;&#29694;&#22312;&#12289;&#36001;&#25919;&#30340;&#12395;&#12399;&#39640;&#36895;&#25512;&#36914;&#30740;&#31350;&#23460;&#12288;&#20195;&#34920;/&#35373;&#31435;&#32773;&#12398;&#20491;&#20154;&#30340;&#36039;&#37329;&#12395;&#38972;&#12387;&#12390;&#12356;&#12414;&#12377;&#12290;&#12381;&#12398;&#12383;&#12417;&#20195;&#34920;&#12398;&#20491;&#20154;&#30340;&#21454;&#20837;&#12395;&#23558;&#26469;&#12434;&#24433;&#38911;&#12373;&#12428;&#12414;&#12377;&#12364;&#12289;&#29694;&#22312;&#12398;&#12392;&#12371;&#12429;&#20302;&#21454;&#20837;&#12394;&#12364;&#12425;&#12354;&#12427;&#31243;&#24230;&#23433;&#23450;&#12434;&#24471;&#12390;&#12356;&#12414;&#12377;&#12290;
&#12288;&#12375;&#12363;&#12375;&#12394;&#12364;&#12425;&#12289;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12398;&#27963;&#21205;&#12398;&#23433;&#23450;&#21270;&#12289;&#24773;&#22577;&#20805;&#23455;&#12395;&#12399;&#36039;&#37329;&#30340;&#12496;&#12483;&#12463;&#12450;&#12483;&#12503;&#12399;&#12414;&#12384;&#12414;&#12384;&#24517;&#35201;&#12391;&#12377;&#12290;&#39640;&#36895;&#25512;&#36914;&#30740;&#31350;&#23460;&#12391;&#12399;&#12289;&#29694;&#22312;&#38283;&#30330;&#20013;&#12398;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12471;&#12473;&#12486;&#12512;&#12434;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12398;&#12415;&#12394;&#12425;&#12378;&#12289;&#20182;&#20998;&#37326;&#65288;&#29305;&#12395;&#21307;&#30274;&#65289;&#12395;&#24540;&#29992;&#12539;&#36009;&#22770;&#12377;&#12427;&#12371;&#12392;&#12391;&#12398;&#33258;&#20027;&#36001;&#25919;&#22522;&#30436;&#12398;&#30906;&#31435;&#12434;&#30446;&#25351;&#12375;&#12390;&#12356;&#12390;&#12414;&#12377;&#12290;

*&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12399;&#25104;&#38263;&#12434;&#32154;&#12369;&#12388;&#12388;&#12289;&#23558;&#26469;&#12399;&#29366;&#27841;&#12395;&#24540;&#12376;&#12390;&#20844;&#30340;&#27231;&#38306;&#12408;&#12398;&#31227;&#31649;&#12418;&#21547;&#12417;&#36939;&#21942;&#20307;&#21046;&#12398;&#24375;&#21270;&#12434;&#22259;&#12426;&#12414;&#12377;

&#12288;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12399;&#38283;&#35373;&#24403;&#26178;&#12289;&#24739;&#32773;&#12539;&#30740;&#31350;&#32773;&#12392;&#12418;&#12395;&#24076;&#23569;&#12391;&#25955;&#36920;&#12375;&#30740;&#31350;&#12539;&#27835;&#30274;&#12539;&#30274;&#39178;&#12364;&#22256;&#38627;&#12394;&#29366;&#27841;&#12395;&#12362;&#12356;&#12390;&#12289;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#12398;&#36229;&#36317;&#38626;&#12539;&#36229;&#32068;&#32340;&#24615;&#12434;&#27963;&#12363;&#12375;&#12390;&#21839;&#38988;&#35299;&#27770;&#12434;&#22259;&#12427;&#25163;&#27573;&#12392;&#12375;&#12390;&#20808;&#38829;&#12434;&#12388;&#12369;&#12289;&#27231;&#33021;&#24375;&#21270;&#12539;&#20449;&#38972;&#24615;&#21521;&#19978;&#12408;&#12398;&#21162;&#21147;&#12434;&#32154;&#12369;&#12390;&#21442;&#12426;&#12414;&#12375;&#12383;&#12290;&#29694;&#22312;&#12395;&#12362;&#12356;&#12390;&#12418;&#12289;&#24369;&#23567;&#12394;&#36939;&#21942;&#20307;&#21046;&#12394;&#12364;&#12425;&#12289;&#12381;&#12398;&#23384;&#22312;&#24847;&#32681;&#12399;&#30906;&#22266;&#12383;&#12427;&#12418;&#12398;&#12364;&#12354;&#12426;&#12414;&#12377;&#12290;
&#12288;&#12375;&#12363;&#12375;&#12394;&#12364;&#12425;&#12289;&#12424;&#12358;&#12420;&#12367;&#25919;&#24220;&#38306;&#36899;&#27231;&#38306;&#12395;&#12424;&#12427;&#20284;&#12383;&#12424;&#12358;&#12394;&#35430;&#12415;&#12418;&#22987;&#12414;&#12426;&#12289;&#12420;&#12364;&#12390;&#12399;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12392;&#21516;&#27096;&#12398;&#27083;&#24819;&#12395;&#12383;&#12393;&#12426;&#30528;&#12367;&#12392;&#32771;&#12360;&#12425;&#12428;&#12414;&#12377;&#12290;
&#12288;&#12371;&#12398;&#29366;&#27841;&#12395;&#12362;&#12356;&#12390;&#12289;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12398;&#23558;&#26469;&#12398;&#30330;&#23637;&#12394;&#12395;&#12424;&#12426;&#24739;&#32773;&#12372;&#23478;&#26063;&#12362;&#12424;&#12403;&#30740;&#31350;&#32773;&#21307;&#30274;&#32773;&#12398;&#21033;&#30410;&#12434;&#32771;&#12360;&#12414;&#12377;&#12392;&#12289;&#12424;&#12426;&#23433;&#23450;&#12363;&#12388;&#24375;&#21147;&#12394;&#36939;&#21942;&#27231;&#38306;&#12364;&#26395;&#12414;&#12428;&#12414;&#12377;&#12290;&#12375;&#12383;&#12364;&#12387;&#12390;&#12289;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#12399;&#23558;&#26469;&#12289;&#24739;&#32773;&#23478;&#26063;&#12539;&#30740;&#31350;&#32773;&#12539;&#21307;&#30274;&#32773;&#12395;&#23550;&#12375;&#20013;&#31435;&#30340;&#31435;&#22580;&#12391;&#26395;&#12415;&#12363;&#12388;&#23433;&#23450;&#12375;&#12383;&#22522;&#30436;&#12434;&#30906;&#20445;&#12375;&#12289;&#21516;&#26178;&#12395;&#12493;&#12483;&#12488;&#12527;&#12540;&#12463;&#25216;&#34899;&#12539;&#21307;&#30274;&#38306;&#36899;&#30693;&#35672;&#12505;&#12540;&#12473;&#12381;&#12375;&#12390;&#24535;&#12434;&#12377;&#12409;&#12390;&#20633;&#12360;&#12427;&#29702;&#24819;&#30340;&#12394;&#27231;&#38306;&#12364;&#29694;&#12431;&#12428;&#12383;&#22580;&#21512;&#12289;&#31227;&#31649;&#12418;&#32771;&#24942;&#12375;&#12383;&#12356;&#12392;&#32771;&#12360;&#12390;&#12356;&#12414;&#12377;&#12290;
&#12288;&#39640;&#36895;&#25512;&#36914;&#30740;&#31350;&#23460;&#33258;&#20307;&#12399;&#12289;&#12371;&#12398;&#20998;&#37326;&#12395;&#35207;&#27177;&#12434;&#27714;&#12417;&#12427;&#12418;&#12398;&#12391;&#12399;&#12394;&#12367;&#12289;&#24120;&#12395;&#31070;&#32076;&#38627;&#30149;&#20811;&#26381;&#12434;&#21807;&#19968;&#32118;&#23550;&#12398;&#30446;&#30340;&#12392;&#12375;&#12390;&#12289;&#26368;&#21892;&#12398;&#36939;&#21942;&#26041;&#27861;&#12434;&#26908;&#35342;&#12375;&#12390;&#12422;&#12365;&#12414;&#12377;&#12290;

--------------------------------------------------------------------------------

1.&#31070;&#32076;&#38627;&#30149;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12539;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;
&#12288;&#29694;&#22312;&#12289;&#24773;&#22577;&#30331;&#37682;&#12539;&#25522;&#36617;&#20966;&#29702;&#12539;&#26908;&#32034;&#12398;&#20840;&#33258;&#21205;&#21270;&#23455;&#29694;&#12398;&#12383;&#12417;&#12289;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#12471;&#12473;&#12486;&#12512;&#38283;&#30330;&#20013;&#12391;&#12354;&#12426;&#12289;&#24773;&#22577;&#30331;&#37682;&#12399;&#20572;&#27490;&#12375;&#12390;&#12356;&#12414;&#12377;&#12290;&#20182;&#26989;&#21209;&#12398;&#21106;&#12426;&#36796;&#12415;&#12395;&#12424;&#12426;&#35336;&#30011;&#26085;&#31243;&#12399;&#38750;&#24120;&#12395;&#36933;&#12428;&#12390;&#12356;&#12414;&#12377;&#12364;&#12289;&#65321;&#65325;&#65313;&#65331;&#65337;&#12398;&#30342;&#27096;&#12398;&#12372;&#21332;&#21147;&#12395;&#12424;&#12426;&#12475;&#12461;&#12517;&#12522;&#12486;&#12451;&#12398;&#21839;&#38988;&#12399;&#35299;&#27770;&#12398;&#35211;&#36796;&#12415;&#12364;&#31435;&#12385;&#12289;&#25080;&#26696;&#12398;&#12487;&#12540;&#12479;&#12501;&#12457;&#12540;&#12510;&#12483;&#12488;&#12418;&#22266;&#12414;&#12426;&#12414;&#12375;&#12383;&#12398;&#12391;&#12289;&#36817;&#26085;&#20013;&#12398;&#31292;&#20685;&#12434;&#30446;&#25351;&#12375;&#12414;&#12377;&#12290;&#24773;&#22577;&#21454;&#38598;&#12399;&#32154;&#12369;&#12390;&#12356;&#12414;&#12377;&#12290;
&#12288;&#65335;&#65335;&#65335;&#12507;&#12540;&#12512;&#12506;&#12540;&#12472;&#12395;&#12424;&#12427;&#24773;&#22577;&#25552;&#20379;&#12399;&#12289;4&#26376;&#12414;&#12391;&#12395;&#38918;&#27425;&#31227;&#36578;&#12434;&#34892;&#12356;&#12414;&#12375;&#12383;&#12290;&#29694;&#22312;&#12289;&#20027;&#35201;&#12394;&#37096;&#20998;&#12399;&#65321;&#65325;&#65313;&#65331;&#65337;&#12395;&#31227;&#36578;&#12289;&#31292;&#20685;&#12375;&#12390;&#12356;&#12414;&#12377;&#12290;&#21322;&#24180;&#12398;&#38291;&#12289;&#31070;&#32076;&#38627;&#30149;&#38306;&#36899;&#12513;&#12540;&#12522;&#12531;&#12464;&#12522;&#12473;&#12488;interlov-ml&#36939;&#21942;&#12395;&#25163;&#12434;&#12392;&#12425;&#12428;&#12377;&#12366;&#12289;&#24773;&#22577;&#21454;&#38598;&#12539;&#26356;&#26032;&#12434;&#20572;&#27490;&#12375;&#12390;&#12375;&#12414;&#12387;&#12383;&#28857;&#12434;&#21453;&#30465;&#12375;&#12289;&#12371;&#12414;&#12417;&#12394;&#24773;&#22577;&#21454;&#38598;&#12539;&#26356;&#26032;&#12434;&#30446;&#25351;&#12375;&#12414;&#12377;&#12290;
2.&#12288;&#12372;&#25552;&#20379;&#38914;&#12356;&#12383;&#36039;&#26448;&#12394;&#12393;&#12392;&#20351;&#29992;&#29366;&#27841;
*&#12372;&#23492;&#20184;
&#12288;*Macintosh LC575&#12288;3&#21488;&#12288;&#65310;&#24739;&#32773;&#28961;&#20767;&#36024;&#20986;&#65288;&#27178;&#27996;&#24066;&#21335;&#21306;&#65289;&#12395;1&#21488;&#12288;&#20182;&#20445;&#31649;&#12539;&#24453;&#27231;&#20013;
&#12288;*Macintosh PowerBook 165c&#12288;1&#21488;&#12288;&#65310;&#20445;&#31649;&#12539;&#24453;&#27231;&#20013;
&#12288;*LaserWriter Pro&#12288;1&#21488;&#12288;&#65310;&#20445;&#31649;&#12539;&#24453;&#27231;&#20013;
&#12288;---&#20197;&#19978;&#12450;&#12483;&#12503;&#12523;&#12467;&#12531;&#12500;&#12517;&#12540;&#12479;&#26666;&#24335;&#20250;&#31038;&#26377;&#24535;&#12398;&#30342;&#27096;&#12424;&#12426;
&#12288;*14.4K&#12514;&#12487;&#12512;&#12288;1&#21488;&#12288;&#65310;&#28961;&#20767;&#36024;&#12375;&#20986;&#12375;&#31471;&#26411;&#65288;&#27178;&#27996;&#24066;&#21335;&#21306;&#65289;
&#12288;---&#20197;&#19978;&#65321;&#65325;&#65313;&#65331;&#65337;-&#19979;&#24029;&#27096;&#12424;&#12426;

*&#12372;&#36024;&#19982;
&#12288;*Macintosh PowerBook Duo270c&#12288;1&#21488;&#12288;&#65310;&#12487;&#12514;/&#31227;&#21205;&#26989;&#21209;&#29992;
&#12288;---&#20197;&#19978;&#12450;&#12483;&#12503;&#12523;&#12467;&#12531;&#12500;&#12517;&#12540;&#12479;&#26666;&#24335;&#20250;&#31038;&#23665;&#23822;&#27096;&#12424;&#12426;
&#12288;*14.4K&#12514;&#12487;&#12512;&#12288;1&#12288;&#65321;&#65325;&#65313;&#65331;&#65337;-&#26441;&#28580;&#27096;&#12289;&#26806;&#27096;&#12289;&#26441;&#26408;&#27096;&#12424;&#12426;&#12288;&#65310;&#20445;&#31649;&#12539;&#24453;&#27231;&#20013;

&#12288;&#12288;&#20445;&#31649;&#12539;&#24453;&#27231;&#20013;&#12398;&#22120;&#26448;&#12399;&#12289;&#24739;&#32773;&#23478;&#26063;&#12408;&#12398;&#28961;&#20767;&#36024;&#12375;&#20986;&#12375;&#12434;&#20104;&#23450;&#12375;&#12390;&#12356;&#12414;&#12377;

3.&#12288;&#12372;&#25552;&#20379;&#38914;&#12356;&#12390;&#12356;&#12427;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#12539;&#12450;&#12459;&#12454;&#12531;&#12488;&#12394;&#12393;&#12392;&#20351;&#29992;&#29366;&#27841;
&#12288;*imasy.or.jp&#65288;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#20114;&#21161;&#20250;&#27178;&#27996;&#27096;&#12424;&#12426;&#65289;
&#12288;&#12288;&#65335;&#65335;&#65335;&#12450;&#12459;&#12454;&#12531;&#12488;&#29992;&#12288;2
&#12288;&#12288;&#12513;&#12540;&#12523;&#29992;&#12450;&#12459;&#12454;&#12531;&#12488;&#12288;2
&#12288;&#12288;&#65310;&#65320;&#65331;&#65316;&#65324;&#12395;1&#12378;&#12388;
&#12288;&#12288;&#12288;&#24739;&#32773;&#20491;&#20154;&#12513;&#12540;&#12523;&#12450;&#12459;&#12454;&#12531;&#12488;&#12395;1
&#12288;&#12288;&#12288;&#65335;&#65335;&#65335;&#20849;&#29992;&#12450;&#12459;&#12454;&#12531;&#12488;&#12395;1
&#12288;*sagami.or.jp&#65288;&#65326;&#65317;&#65332;&#65297;&#65302;&#12373;&#12364;&#12415;&#27096;&#12424;&#12426;&#65289;
&#12288;&#12288;&#12450;&#12459;&#12454;&#12531;&#12488;&#12288;3
&#12288;&#12288;&#65310;&#65320;&#65331;&#65316;&#65324;&#12395;1
&#12288;&#12288;&#12288;&#27531;&#12426;&#12399;&#24453;&#27231;&#20013;&#12288;&#24739;&#32773;&#23478;&#26063;&#12408;&#12398;&#36024;&#12375;&#20986;&#12375;&#12434;&#20104;&#23450;

&#12288;*&#12513;&#12540;&#12522;&#12531;&#12464;&#12522;&#12473;&#12488;&#12288;interlov@imasy.or.jp&#12288;&#65288;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#20114;&#21161;&#20250;&#27178;&#27996;&#27096;&#12424;&#12426;&#65289;
&#12288;&#65310;7&#26376;&#20013;&#26092;&#12424;&#12426;&#36939;&#29992;&#20013;

&#12288;&#36960;&#26041;&#12398;&#12383;&#12417;&#12414;&#12384;&#12362;&#21147;&#12434;&#20511;&#12426;&#12391;&#12365;&#12378;&#12395;&#12362;&#12426;&#12414;&#12377;&#12364;&#12289;CISnet&#27096;&#12289;&#23431;&#37117;&#23470;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#27096;&#12363;&#12425;&#12418;&#12372;&#21332;&#21147;&#12398;&#12362;&#30003;&#12375;&#20986;&#12434;&#38914;&#25140;&#12375;&#12390;&#12362;&#12426;&#12414;&#12377;&#12290;&#20170;&#24460;&#12452;&#12531;&#12479;&#12540;&#12521;&#12508;&#27963;&#21205;&#25313;&#22823;&#12395;&#38555;&#12375;&#12289;&#12380;&#12402;&#12362;&#21147;&#28155;&#12360;&#12362;&#39000;&#12356;&#30003;&#12375;&#19978;&#12370;&#12414;&#12377;&#12290;


4.&#12288;&#12372;&#23492;&#20184;
&#12288;&#32207;&#38989;&#12288;6&#19975;&#20870;&#12288;&#65288;2&#21517;&#27096;&#12424;&#12426;&#65289;&#12434;&#12289;&#12381;&#12428;&#12382;&#12428;&#12372;&#25552;&#20379;&#12398;&#26041;&#12395;&#36820;&#21364;&#12356;&#12383;&#12375;&#12414;&#12375;&#12383;&#12290;
5.&#12288;&#31070;&#32076;&#38627;&#30149;&#12513;&#12540;&#12522;&#12531;&#12464;&#12522;&#12473;&#12488;interlov@imasy.or.jp&#36939;&#29992;&#29366;&#27841;
&#12288;*&#21442;&#21152;&#20154;&#25968;&#12392;&#20869;&#35379;&#65306;
&#12288;&#12288;&#24739;&#32773;&#12539;&#23478;&#26063;&#12288;&#12288;&#12288;&#12288;&#12288;29
&#12288;&#65288;&#31563;&#33806;&#32302;&#24615;&#20596;&#32034;&#30828;&#21270;&#30151;9,&#33034;&#39620;&#23567;&#33075;&#22793;&#24615;&#30151;7,&#12497;&#12540;&#12461;&#12531;&#12477;&#12531;&#30149;5,&#12381;&#12398;&#20182;9&#65289;
&#12288;&#12288;&#29694;&#22580;&#21307;&#30274;&#32773;&#12288;&#12288;&#12288;&#12288;&#12288;17
&#12288;&#12288;&#65288;&#21307;&#24107;7,&#12490;&#12540;&#12473;4,&#29702;&#23398;&#30274;&#27861;&#22763;4,&#12381;&#12398;&#20182;2&#65289;
&#12288;&#12288;&#21307;&#23398;&#37096;&#12539;&#22823;&#23398;&#30149;&#38498;&#12288;&#12288;7
&#12288;&#12288;&#30740;&#31350;&#32773;&#12539;&#22269;&#23478;&#27231;&#38306;&#12288;&#12288;4
&#12288;&#12288;&#19968;&#33324;&#12288;&#12288;&#12288;&#12288;&#12288;&#12288;&#12288;&#12288;14
&#12288;&#12288;&#25152;&#23646;&#19981;&#26126;&#12288;&#12288;&#12288;&#12288;&#12288;&#12288;6
&#12288;&#12288;---&#35336;&#12288;76&#12288;&#20154;&#65288;&#21069;&#22238;55&#65289;

&#12288;&#21271;&#12399;&#21271;&#28023;&#36947;&#12363;&#12425;&#21335;&#12399;&#31119;&#23713;&#12414;&#12391;&#12289;&#28023;&#22806;&#12391;&#12399;&#31859;&#22269;&#31435;&#34907;&#29983;&#30740;&#31350;&#25152;&#65326;&#65321;&#65320;&#12414;&#12391;&#12289;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#12398;&#36229;&#36317;&#38626;&#12539;&#36229;&#32068;&#32340;&#30340;&#24615;&#36074;&#12434;&#22914;&#20309;&#12394;&#12367;&#30330;&#25582;&#12375;&#12289;&#12373;&#12414;&#12374;&#12414;&#12394;&#22580;&#25152;&#12539;&#32068;&#32340;&#12398;&#26041;&#12364;&#12372;&#21442;&#21152;&#12373;&#12428;&#12390;&#12356;&#12414;&#12377;&#12290;&#21442;&#21152;&#32773;&#12289;&#25237;&#31295;&#12392;&#12418;&#12395;&#21069;&#22238;&#12398;&#20493;&#12392;&#12394;&#12387;&#12390;&#12362;&#12426;&#12289;&#27963;&#21205;&#12364;&#27963;&#30330;&#21270;&#12375;&#12390;&#12356;&#12414;&#12377;&#12290;

&#12288;*&#12488;&#12521;&#12501;&#12451;&#12483;&#12463;&#65306;
&#12288;&#36890;&#31639;&#25237;&#31295;&#25968;675&#36890;&#12288;&#25237;&#31295;&#32004;2&#36890;/&#26085;&#12288;&#37197;&#20449;&#32004;150&#36890;/&#26085;
&#12288;&#65288;&#21069;&#22238;124&#36890;,&#32004;1.2&#36890;/&#26085;,&#32004;67&#36890;/&#26085;&#65289;

&#12288;*&#20869;&#23481;
&#12288;interlov-ml&#12399;&#12289;&#31070;&#32076;&#38627;&#30149;&#12395;&#38306;&#12377;&#12427;&#12371;&#12392;&#12394;&#12425;&#12289;&#23554;&#38272;&#24773;&#22577;&#12363;&#12425;&#29983;&#27963;&#24773;&#22577;&#12289;&#24745;&#12415;&#20107;&#12414;&#12391;&#12289;&#12354;&#12425;&#12422;&#12427;&#24773;&#22577;&#12539;&#24847;&#35211;&#12434;&#25201;&#12356;&#12414;&#12377;&#12290;&#12371;&#12428;&#12414;&#12391;&#12398;&#20027;&#12394;&#35441;&#38988;&#12399;&#12289;&#20197;&#19979;&#12398;&#12424;&#12358;&#12394;&#12418;&#12398;&#12391;&#12375;&#12383;&#12290;
&#12288;&#12539;&#20154;&#24037;&#21628;&#21560;&#22120;&#12398;&#22312;&#23429;&#36024;&#20986;
&#12288;&#12539;&#31070;&#32076;&#38627;&#30149;&#12398;&#12522;&#12495;&#12499;&#12522;
&#12288;&#12539;&#31563;&#33806;&#32302;&#24615;&#20596;&#32034;&#30828;&#21270;&#30151;&#37325;&#30151;&#24739;&#32773;&#12408;&#12398;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#23566;&#20837;
&#12288;&#12539;&#24847;&#24605;&#20253;&#36948;&#35013;&#32622;&#65288;&#37325;&#24230;&#38556;&#23475;&#23550;&#24540;&#24773;&#22577;&#27231;&#22120;&#65289;&#12398;&#32102;&#20184;&#12395;&#12388;&#12356;&#12390;
&#12288;&#12539;&#31563;&#33806;&#32302;&#24615;&#20596;&#32034;&#30828;&#21270;&#30151;&#24739;&#32773;&#12398;&#28023;&#22806;&#26053;&#34892;
&#12288;&#12539;&#31070;&#32076;&#38627;&#30149;&#12398;&#36986;&#20253;&#23376;&#27835;&#30274;
&#12288;&#12539;&#38627;&#30149;&#24739;&#32773;&#12392;&#31038;&#20250;&#12398;&#38306;&#12431;&#12426;
&#12288;&#12539;&#65320;&#65331;&#65316;&#65324;&#12398;&#12496;&#12522;&#12450;&#12501;&#12522;&#12540;&#12497;&#12477;&#12467;&#12531;&#38283;&#30330;&#29366;&#27841;
&#12288;&#12539;&#12496;&#12522;&#12450;&#12501;&#12522;&#12540;&#20303;&#23429;
&#12288;&#12539;&#38627;&#30149;&#27835;&#30274;&#25312;&#28857;&#12398;&#29031;&#20250;
&#12288;&#12539;&#29305;&#23450;&#30142;&#24739;&#35469;&#23450;&#12395;&#12388;&#12356;&#12390;
&#12288;&#65288;97.6.15&#29694;&#22312;&#65289;

&#12288;&#20197;&#19978;&#12289;&#29694;&#27841;&#12372;&#22577;&#21578;&#30003;&#12375;&#19978;&#12370;&#12414;&#12377;&#12290;

--------------------------------------------------------------------------------

&#12288;&#39640;&#36895;&#25512;&#36914;&#30740;&#31350;&#23460;&#12399;&#12289;&#31070;&#32076;&#38627;&#30149;&#12362;&#12424;&#12403;&#12395;&#36523;&#20307;&#38556;&#23475;&#12434;&#31185;&#23398;&#25216;&#34899;&#12398;&#27963;&#29992;&#12395;&#12424;&#12426;&#20811;&#26381;&#12375;&#12289;&#30149;&#12417;&#12427;&#32773;&#33510;&#12375;&#12416;&#32773;&#12395;&#24076;&#26395;&#12392;&#24184;&#31119;&#12434;&#12418;&#12383;&#12425;&#12377;&#12383;&#12417;&#12289;&#31070;&#32076;&#38627;&#30149;&#20811;&#26381;&#25903;&#25588;&#12487;&#12540;&#12479;&#12496;&#12531;&#12463;&#20107;&#26989;&#12434;&#12289;&#19975;&#38627;&#12434;&#25490;&#12375;&#12390;&#25512;&#36914;&#12356;&#12383;&#12375;&#12414;&#12377;&#12290;

&#12288;&#20170;&#24460;&#12392;&#12418;&#24341;&#12365;&#32154;&#12365;&#20309;&#21330;&#12424;&#12429;&#12375;&#12367;&#12372;&#25351;&#23566;&#12372;&#21161;&#21147;&#36060;&#12431;&#12426;&#12414;&#12377;&#12424;&#12358;&#12289;&#12362;&#39000;&#12356;&#30003;&#12375;&#19978;&#12370;&#12414;&#12377;&#12290;

&#12288;&#26411;&#31558;&#12394;&#12364;&#12425;&#12289;&#37325;&#12397;&#12390;&#30342;&#27096;&#12398;&#12372;&#21402;&#24847;&#12395;&#12289;&#24515;&#12424;&#12426;&#24481;&#31036;&#30003;&#12375;&#19978;&#12370;&#12414;&#12377;&#12290;

&#33609;&#12293;

--------------------------------------------------------------------------------

&#12288;&#36861;&#35036;

&#12288;&#20808;&#12395;&#12362;&#36865;&#12426;&#12356;&#12383;&#12375;&#12414;&#12375;&#12383;&#12372;&#22577;&#21578;&#12395;&#19968;&#37096;&#35330;&#27491;&#12364;&#12354;&#12426;&#12414;&#12377;&#12290;

>3.&#12288;&#12372;&#25552;&#20379;&#38914;&#12356;&#12390;&#12356;&#12427;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#12539;&#12450;&#12459;&#12454;&#12531;&#12488;&#12394;&#12393;&#12392;&#20351;&#29992;&#29366;&#27841;
>&#12288;*imasy.or.jp&#65288;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#20114;&#21161;&#20250;&#27178;&#27996;&#27096;&#12424;&#12426;&#65289;
>&#12288;&#12288;&#65335;&#65335;&#65335;&#12450;&#12459;&#12454;&#12531;&#12488;&#29992;&#12288;2
>&#12288;&#12288;&#12513;&#12540;&#12523;&#29992;&#12450;&#12459;&#12454;&#12531;&#12488;&#12288;2
>&#12288;&#12288;&#65310;&#65320;&#65331;&#65316;&#65324;&#12395;1&#12378;&#12388;
>&#12288;&#12288;&#12288;&#24739;&#32773;&#20491;&#20154;&#12513;&#12540;&#12523;&#12450;&#12459;&#12454;&#12531;&#12488;&#12395;1
>&#12288;&#12288;&#12288;&#65335;&#65335;&#65335;&#20849;&#29992;&#12450;&#12459;&#12454;&#12531;&#12488;&#12395;1


&#12288;&#20197;&#19978;&#12399;&#27491;&#12375;&#12367;&#12399;

&#12288;&#12288;&#65335;&#65335;&#65335;&#12450;&#12459;&#12454;&#12531;&#12488;&#29992;&#12288;1
&#12288;&#12288;&#12513;&#12540;&#12523;&#29992;&#12450;&#12459;&#12454;&#12531;&#12488;&#12288;1
&#12288;&#12288;&#65310;&#24739;&#32773;&#20491;&#20154;&#12513;&#12540;&#12523;&#12450;&#12459;&#12454;&#12531;&#12488;&#12395;1
&#12288;&#12288;&#12288;&#65335;&#65335;&#65335;&#20849;&#29992;&#12450;&#12459;&#12454;&#12531;&#12488;&#12395;1


&#12288;&#12392;&#12394;&#12426;&#12414;&#12377;&#12290;&#65320;&#65331;&#65316;&#65324;&#29992;&#12395;&#12452;&#12531;&#12479;&#12540;&#12493;&#12483;&#12488;&#20114;&#21161;&#20250;&#27178;&#27996;&#27096;&#12424;&#12426;&#12372;&#25552;&#20379;&#38914;&#12356;&#12390;&#12356;&#12383;&#12450;&#12459;&#12454;&#12531;&#12488;&#12399;&#12289;&#20170;&#24180;1&#26376;&#12424;&#12426;&#20250;&#36027;&#12434;&#12362;&#25903;&#25173;&#12356;&#12375;&#12390;&#27491;&#35215;&#20250;&#21729;&#12392;&#12375;&#12390;&#12398;&#25201;&#12356;&#12392;&#12394;&#12426;&#12414;&#12375;&#12383;&#12290;&#23578;96&#24180;6&#26376;&#12424;&#12426;12&#26376;&#12414;&#12391;&#12398;&#20998;&#12398;&#20250;&#36027;&#12395;&#12388;&#12356;&#12390;&#12399;&#12289;&#65320;&#65331;&#65316;&#65324;&#36001;&#25919;&#31406;&#29366;&#12395;&#12388;&#12365;&#29305;&#21029;&#12398;&#12362;&#21462;&#12426;&#35336;&#12425;&#12356;&#12434;&#38914;&#12365;&#25903;&#25173;&#12356;&#20813;&#38500;&#38914;&#12365;&#12414;&#12375;&#12383;&#12290;&#12371;&#12398;&#22580;&#12434;&#12362;&#20511;&#12426;&#12356;&#12383;&#12375;&#12414;&#12375;&#12390;&#12289;&#12372;&#39640;&#37197;&#12395;&#21402;&#12367;&#24481;&#31036;&#30003;&#12375;&#19978;&#12370;&#12414;&#12377;&#12290;

--------------------------------------------------------------------------------
£ßé
Copyright & Designed by: High-Speed Drive Lab. 1997

pi_1901434
quote:
Op zondag 14 oktober 2001 22:58 schreef calvobbes het volgende:
HSDL InterLov. trial repport No. 1: Nov. `96
1996.11.8

[knip]

Copyright & Designed by: High-Speed Drive Lab. 1997


Oops... Kijk zo gaat die goed
  † In Memoriam † zondag 14 oktober 2001 @ 23:07:05 #38
13819 Loedertje
Trotse GILF.
pi_1901514
ÇáãÛÑÈ | ÇáÌÒÇÆÑ | ÊæäÓ | áíÈíÇ | ãæÑíØäíÇ

&#1575;&#1604;&#1582;&#1591;&#1576;&#1577; &#1593;&#1606; &#1605;&#1608;&#1590;&#1608;&#1593; &#1575;&#1604;&#1587;&#1575;&#1593;&#1577; &#1593;&#1606; &#1575;&#1604;&#1590;&#1585;&#1576;&#1577; &#1575;&#1604;&#1571;&#1605;&#1585;&#1610;&#1603;&#1610;&#1577; &#1604;&#1571;&#1601;&#1594;&#1575;&#1606;&#1587;&#1578;&#1575;&#1606;&#1548; &#1608;&#1602;&#1575;&#1604; &#1571;&#1606;&#1607; &#1610;&#1580;&#1576; &#1571;&#1606; &#1606;&#1615;&#1593;&#1585;&#1614;&#1601; &#1575;&#1604;&#1573;&#1585;&#1607;&#1575;&#1576; &#1571;&#1608;&#1604;&#1575;&#1611;&#1548; &#1608;&#1571;&#1593;&#1604;&#1606; &#1571;&#1606; &#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1578;&#1581;&#1575;&#1585;&#1576; &#1575;&#1604;&#1573;&#1585;&#1607;&#1575;&#1576; &#1576;&#1573;&#1585;&#1607;&#1575;&#1576; &#1605;&#1579;&#1604;&#1607;&#1548; &#1608;&#1576;&#1610;&#1606; &#1571;&#1606; &#1587;&#1576;&#1576; &#1575;&#1604;&#1573;&#1585;&#1607;&#1575;&#1576; &#1601;&#1610; &#1575;&#1604;&#1593;&#1575;&#1604;&#1605; &#1607;&#1608; &#1575;&#1604;&#1592;&#1604;&#1605; &#1575;&#1604;&#1584;&#1610; &#1610;&#1602;&#1593; &#1593;&#1604;&#1609; &#1575;&#1604;&#1576;&#1588;&#1585;&#1548; &#1608;&#1578;&#1581;&#1583;&#1579; &#1601;&#1610; &#1575;&#1604;&#1576;&#1583;&#1575;&#1610;&#1577; &#1593;&#1606; &#1605;&#1588;&#1575;&#1585;&#1603;&#1578;&#1607; &#1601;&#1610; &#1575;&#1604;&#1605;&#1572;&#1578;&#1605;&#1585; &#1575;&#1604;&#1605;&#1587;&#1610;&#1581;&#1610; &#1575;&#1604;&#1573;&#1587;&#1604;&#1575;&#1605;&#1610; &#1608;&#1571;&#1606; &#1575;&#1604;&#1607;&#1583;&#1601; &#1605;&#1606; &#1575;&#1604;&#1581;&#1608;&#1575;&#1585; &#1571;&#1604;&#1575; &#1578;&#1603;&#1608;&#1606; &#1607;&#1606;&#1575;&#1603; &#1605;&#1608;&#1575;&#1580;&#1607;&#1577; &#1576;&#1610;&#1606; &#1575;&#1604;&#1573;&#1587;&#1604;&#1575;&#1605; &#1608;&#1575;&#1604;&#1605;&#1587;&#1610;&#1581;&#1610;&#1577;&#1548; &#1608;&#1578;&#1587;&#1575;&#1574;&#1604; &#1605;&#1606; &#1575;&#1604;&#1584;&#1610; &#1606;&#1589;&#1576; &#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1588;&#1585;&#1591;&#1610;&#1575;&#1615; &#1593;&#1604;&#1609; &#1575;&#1604;&#1593;&#1575;&#1604;&#1605;&#1548; &#1608;&#1584;&#1603;&#1585; &#1571;&#1606;&#1607; &#1590;&#1583; &#1582;&#1591;&#1601; &#1575;&#1604;&#1591;&#1575;&#1574;&#1585;&#1575;&#1578; &#1608;&#1578;&#1585;&#1608;&#1610;&#1593; &#1575;&#1604;&#1570;&#1605;&#1606;&#1610;&#1606; &#1575;&#1604;&#1605;&#1583;&#1606;&#1610;&#1610;&#1606;&#1548; &#1603;&#1605;&#1575; &#1578;&#1606;&#1575;&#1608;&#1604; &#1605;&#1575; &#1571;&#1579;&#1575;&#1585;&#1578;&#1607; &#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1578;&#1580;&#1575;&#1607; &#1602;&#1606;&#1575;&#1577; &#1575;&#1604;&#1580;&#1586;&#1610;&#1585;&#1577; &#1604;&#1605;&#1580;&#1585;&#1583; &#1603;&#1604;&#1605;&#1577; &#1604;&#1576;&#1606; &#1604;&#1575;&#1583;&#1606;&#1548; &#1608;&#1602;&#1583;&#1605; &#1575;&#1604;&#1606;&#1589;&#1581; &#1604;&#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1604;&#1578;&#1585;&#1575;&#1580;&#1593; &#1587;&#1610;&#1575;&#1587;&#1578;&#1607;&#1575; &#1575;&#1604;&#1582;&#1575;&#1585;&#1580;&#1610;&#1577;&#1548; &#1608;&#1602;&#1575;&#1604; &#1573;&#1606; &#1602;&#1604;&#1608;&#1576;&#1606;&#1575; &#1605;&#1593; &#1575;&#1604;&#1588;&#1593;&#1576; &#1575;&#1604;&#1571;&#1601;&#1594;&#1575;&#1606;&#1610;&#1548; &#1583;&#1575;&#1593;&#1610;&#1575; &#1575;&#1604;&#1605;&#1587;&#1604;&#1605;&#1610;&#1606; &#1573;&#1604;&#1609; &#1578;&#1602;&#1583;&#1610;&#1605; &#1575;&#1604;&#1593;&#1608;&#1606; &#1604;&#1607; .

--------------------------------------------------------------------------------


&#1606;&#1583;&#1608;&#1575;&#1578; &#1608;&#1605;&#1572;&#1578;&#1605;&#1585;&#1575;&#1578; : &#1575;&#1604;&#1602;&#1585;&#1590;&#1575;&#1608;&#1610; &#1601;&#1610; &#1605;&#1572;&#1578;&#1605;&#1585; &#1589;&#1581;&#1601;&#1610; &#1604;&#1573;&#1604;&#1602;&#1575;&#1569; &#1575;&#1604;&#1590;&#1608;&#1569; &#1593;&#1604;&#1609;&#1575;&#1604;&#1571;&#1581;&#1583;&#1575;&#1579; &#1575;&#1604;&#1605;&#1572;&#1587;&#1601;&#1577; &#1575;&#1604;&#1578;&#1610; &#1578;&#1602;&#1593; &#1601;&#1610; &#1593;&#1575;&#1604;&#1605;&#1606;&#1575; &#1575;&#1604;&#1610;&#1608;&#1605;
&#1576;&#1610;&#1606; &#1601;&#1590;&#1610;&#1604;&#1578;&#1607; &#1571;&#1606; &#1575;&#1604;&#1605;&#1602;&#1589;&#1608;&#1583; &#1605;&#1606; &#1607;&#1584;&#1575; &#1575;&#1604;&#1605;&#1572;&#1578;&#1605;&#1585; &#1607;&#1608; &#1573;&#1604;&#1602;&#1575;&#1569; &#1590;&#1608;&#1569; &#1593;&#1604;&#1609; &#1575;&#1604;&#1571;&#1581;&#1583;&#1575;&#1579; &#1575;&#1604;&#1605;&#1572;&#1587;&#1601;&#1577; &#1575;&#1604;&#1578;&#1610; &#1578;&#1602;&#1593; &#1601;&#1610; &#1593;&#1575;&#1604;&#1605;&#1606;&#1575; &#1607;&#1584;&#1575;&#1548; &#1608;&#1575;&#1604;&#1573;&#1588;&#1575;&#1585;&#1577; &#1573;&#1604;&#1609; &#1605;&#1576;&#1575;&#1583;&#1585;&#1578;&#1607; &#1604;&#1573;&#1583;&#1575;&#1606;&#1577; &#1575;&#1604;&#1578;&#1601;&#1580;&#1610;&#1585;&#1575;&#1578; &#1575;&#1604;&#1578;&#1610; &#1581;&#1583;&#1579;&#1578; &#1601;&#1610; &#1606;&#1610;&#1608;&#1610;&#1608;&#1585;&#1603; &#1605;&#1606;&#1584; &#1575;&#1604;&#1610;&#1608;&#1605; &#1575;&#1604;&#1571;&#1608;&#1604;&#1548; &#1608;&#1605;&#1591;&#1575;&#1604;&#1576;&#1577; &#1575;&#1604;&#1580;&#1607;&#1575;&#1578; &#1575;&#1604;&#1605;&#1587;&#1572;&#1608;&#1604;&#1577; &#1601;&#1610; &#1571;&#1605;&#1610;&#1585;&#1603;&#1575; &#1571;&#1604;&#1575; &#1578;&#1580;&#1585;&#1610; &#1608;&#1585;&#1575;&#1569; &#1583;&#1608;&#1575;&#1601;&#1593; &#1575;&#1604;&#1594;&#1590;&#1576; &#1604;&#1573;&#1585;&#1590;&#1575;&#1569; &#1575;&#1604;&#1585;&#1571;&#1610; &#1575;&#1604;&#1593;&#1575;&#1605;&#1548; &#1608;&#1571;&#1604;&#1575; &#1610;&#1578;&#1585;&#1603; &#1571;&#1605;&#1585; &#1578;&#1581;&#1583;&#1610;&#1583; &#1575;&#1604;&#1605;&#1606;&#1592;&#1605;&#1575;&#1578; &#1575;&#1604;&#1573;&#1585;&#1607;&#1575;&#1576;&#1610;&#1577; &#1604;&#1604;&#1607;&#1608;&#1609;&#1548; &#1576;&#1604; &#1576;&#1575;&#1604;&#1581;&#1602; &#1608;&#1575;&#1604;&#1583;&#1604;&#1610;&#1604;&#1548; &#1579;&#1605; &#1601;&#1578;&#1581; &#1576;&#1575;&#1576; &#1575;&#1604;&#1571;&#1587;&#1574;&#1604;&#1577; &#1604;&#1604;&#1605;&#1585;&#1575;&#1587;&#1604;&#1610;&#1606; &#1608;&#1575;&#1604;&#1589;&#1581;&#1601;&#1610;&#1610;&#1606;

--------------------------------------------------------------------------------


&#1576;&#1585;&#1575;&#1605;&#1580; &#1608;&#1604;&#1602;&#1575;&#1569;&#1575;&#1578; &#1575;&#1604;&#1588;&#1585;&#1610;&#1593;&#1577; &#1608;&#1575;&#1604;&#1581;&#1610;&#1575;&#1577; : &#1605;&#1608;&#1602;&#1601; &#1575;&#1604;&#1594;&#1585;&#1576; &#1605;&#1606; &#1575;&#1604;&#1593;&#1585;&#1576; &#1608;&#1575;&#1604;&#1605;&#1587;&#1604;&#1605;&#1610;&#1606;
&#1605;&#1608;&#1590;&#1608;&#1593; &#1607;&#1584;&#1607; &#1575;&#1604;&#1581;&#1604;&#1602;&#1577; &#1605;&#1606; &#1575;&#1604;&#1588;&#1585;&#1610;&#1593;&#1577; &#1608;&#1575;&#1604;&#1581;&#1610;&#1575;&#1577; &#1607;&#1608; &#1575;&#1587;&#1578;&#1605;&#1585;&#1575;&#1585; &#1604;&#1605;&#1575; &#1578;&#1605; &#1575;&#1604;&#1578;&#1606;&#1575;&#1602;&#1588; &#1581;&#1608;&#1604;&#1607; &#1601;&#1610; &#1575;&#1604;&#1581;&#1604;&#1602;&#1578;&#1610;&#1606; &#1575;&#1604;&#1605;&#1575;&#1590;&#1610;&#1578;&#1610;&#1606; &#1578;&#1583;&#1575;&#1593;&#1610;&#1575;&#1578; &#1575;&#1604;&#1593;&#1605;&#1604;&#1610;&#1577; &#1575;&#1604;&#1573;&#1585;&#1607;&#1575;&#1576;&#1610;&#1577; &#1575;&#1604;&#1578;&#1610; &#1590;&#1585;&#1576;&#1578; &#1606;&#1610;&#1608;&#1610;&#1608;&#1585;&#1603; &#1608;&#1608;&#1575;&#1588;&#1606;&#1591;&#1606;&#1548; &#1605;&#1593; &#1575;&#1604;&#1578;&#1585;&#1603;&#1610;&#1586; &#1593;&#1604;&#1609; &#1605;&#1608;&#1602;&#1601; &#1575;&#1604;&#1573;&#1587;&#1604;&#1575;&#1605; &#1608;&#1605;&#1608;&#1602;&#1601;&#1606;&#1575; &#1603;&#1571;&#1605;&#1577; &#1605;&#1587;&#1604;&#1605;&#1577; &#1605;&#1606; &#1605;&#1575; &#1610;&#1602;&#1575;&#1604; &#1593;&#1606; &#1578;&#1587;&#1575;&#1605;&#1581; &#1575;&#1604;&#1581;&#1590;&#1575;&#1585;&#1577; &#1575;&#1604;&#1594;&#1585;&#1576;&#1610;&#1577; &#1608;&#1593;&#1606; &#1605;&#1602;&#1583;&#1585;&#1578;&#1607;&#1575; &#1593;&#1604;&#1609; &#1575;&#1587;&#1578;&#1610;&#1593;&#1575;&#1576; &#1575;&#1604;&#1605;&#1582;&#1575;&#1604;&#1601;&#1610;&#1606; &#1604;&#1607;&#1575; &#1601;&#1610; &#1575;&#1604;&#1585;&#1571;&#1610;&#1548; &#1608;&#1605;&#1575; &#1610;&#1602;&#1575;&#1576;&#1604;&#1607; &#1605;&#1606; &#1575;&#1593;&#1578;&#1583;&#1575;&#1569;&#1575;&#1578; &#1605;&#1606;&#1607;&#1575;.

--------------------------------------------------------------------------------


&#1593;&#1606;&#1575;&#1608;&#1610;&#1606; &#1571;&#1582;&#1585;&#1609;:
&#1606;&#1583;&#1608;&#1575;&#1578; &#1608;&#1605;&#1572;&#1578;&#1605;&#1585;&#1575;&#1578; : &#1571;&#1606;&#1603;&#1585;&#1606;&#1575; &#1575;&#1604;&#1578;&#1601;&#1580;&#1610;&#1585;&#1575;&#1578; &#1608;&#1606;&#1606;&#1603;&#1585; &#1581;&#1605;&#1604;&#1575;&#1578; &#1575;&#1604;&#1578;&#1581;&#1585;&#1610;&#1590; &#1590;&#1583; &#1575;&#1604;&#1605;&#1587;&#1604;&#1605;&#1610;&#1606;

&#1601;&#1578;&#1575;&#1608;&#1609; &#1608; &#1571;&#1581;&#1603;&#1575;&#1605; : &#1575;&#1604;&#1605;&#1588;&#1575;&#1585;&#1603;&#1577; &#1601;&#1610; &#1575;&#1604;&#1578;&#1581;&#1575;&#1604;&#1601; &#1605;&#1593; &#1608;&#1575;&#1588;&#1606;&#1591;&#1606; &#1590;&#1583; &#1571;&#1601;&#1594;&#1575;&#1606;&#1587;&#1578;&#1575;&#1606; &#1581;&#1585;&#1575;&#1605;

&#1601;&#1578;&#1575;&#1608;&#1609; &#1608; &#1571;&#1581;&#1603;&#1575;&#1605; : &#1583;. &#1575;&#1604;&#1602;&#1585;&#1590;&#1575;&#1608;&#1610; &#1610;&#1583;&#1610;&#1606; &#1575;&#1604;&#1607;&#1580;&#1605;&#1575;&#1578; &#1575;&#1604;&#1573;&#1585;&#1607;&#1575;&#1576;&#1610;&#1577;

&#1606;&#1583;&#1608;&#1575;&#1578; &#1608;&#1605;&#1572;&#1578;&#1605;&#1585;&#1575;&#1578; : &#1580;&#1607;&#1608;&#1583; &#1605;&#1576;&#1575;&#1585;&#1603;&#1577; &#1604;&#1604;&#1605;&#1580;&#1604;&#1587; &#1575;&#1604;&#1571;&#1608;&#1585;&#1608;&#1576;&#1610; &#1604;&#1604;&#1573;&#1601;&#1578;&#1575;&#1569; &#1608;&#1575;&#1604;&#1576;&#1581;&#1608;&#1579; &#1604;&#1581;&#1604; &#1605;&#1588;&#1575;&#1603;&#1604; &#1575;&#1604;&#1605;&#1587;&#1604;&#1605;&#1610;&#1606; &#1601;&#1610; &#1571;&#1608;&#1585;&#1608;&#1576;&#1575;

&#1603;&#1578;&#1576; : &#1575;&#1604;&#1581;&#1604;&#1575;&#1604; &#1608;&#1575;&#1604;&#1581;&#1585;&#1575;&#1605; &#1601;&#1610; &#1575;&#1604;&#1573;&#1587;

  † In Memoriam † zondag 14 oktober 2001 @ 23:07:57 #39
13819 Loedertje
Trotse GILF.
pi_1901547


&#1605;&#1606; &#1575;&#1604;&#1581;&#1608;&#1575;&#1585; &#1571;&#1604;&#1575; &#1578;&#1603;&#1608;&#1606; &#1607;&#1606;&#1575;&#1603; &#1605;&#1608;&#1575;&#1580;&#1607;&#1577; &#1576;&#1610;&#1606; &#1575;&#1604;&#1573;&#1587;&#1604;&#1575;&#1605; &#1608;&#1575;&#1604;&#1605;&#1587;&#1610;&#1581;&#1610;&#1577;&#1548; &#1608;&#1578;&#1587;&#1575;&#1574;&#1604; &#1605;&#1606; &#1575;&#1604;&#1584;&#1610; &#1606;&#1589;&#1576; &#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1588;&#1585;&#1591;&#1610;&#1575;&#1615; &#1593;&#1604;&#1609; &#1575;&#1604;&#1593;&#1575;&#1604;&#1605;&#1548; &#1608;&#1584;&#1603;&#1585; &#1571;&#1606;&#1607; &#1590;&#1583; &#1582;&#1591;&#1601; &#1575;&#1604;&#1591;&#1575;&#1574;&#1585;&#1575;&#1578; &#1608;&#1578;&#1585;&#1608;&#1610;&#1593; &#1575;&#1604;&#1570;&#1605;&#1606;&#1610;&#1606; &#1575;&#1604;&#1605;&#1583;&#1606;&#1610;&#1610;&#1606;&#1548; &#1603;&#1605;&#1575; &#1578;&#1606;&#1575;&#1608;&#1604; &#1605;&#1575; &#1571;&#1579;&#1575;&#1585;&#1578;&#1607; &#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1578;&#1580;&#1575;&#1607; &#1602;&#1606;&#1575;&#1577; &#1575;&#1604;&#1580;&#1586;&#1610;&#1585;&#1577; &#1604;&#1605;&#1580;&#1585;&#1583; &#1603;&#1604;&#1605;&#1577; &#1604;&#1576;&#1606; &#1604;&#1575;&#1583;&#1606;&#1548; &#1608;&#1602;&#1583;&#1605; &#1575;&#1604;&#1606;&#1589;&#1581; &#1604;&#1571;&#1605;&#1585;&#1610;&#1603;&#1575; &#1604;&#1578;&#1585;&#1575;&#1580;&#1593; &#1587;&#1610;&#1575;&#1587;&#1578;&#1607;&#1575; &#1575;&#1604;&#1582;&#1575;&#1585;&#1580;&#1610;&#1577;&#1548; &#1608;&#1602;&#1575;&#1604; &#1573;&#1606; &#1602;&#1604;&#1608;&#1576;&#1606;&#1575; &#1605;&#1593; &#1575;&#1604;&#1588;&#1593;&#1576; &#1575;&#1604;&#1571;&#1601;&#1594;&#1575;&#1606;&#1610;&#1548; &#1583;&#1575;&#1593;&#1610;&#1575; &#1575;&#1604;&#1605;&#1587;&#1604;&#1605;&#1610;&#1606; &#1573;&#1604;&#1609; &#1578;&#1602;&#1583;&#1610;&#1605; &#1575;&#1604;&#1593;&#1608;&#1606; &#1604;&#1607; .

:{
pi_1901571
quote:
Op zondag 14 oktober 2001 23:07 schreef Loedertje het volgende:
huh

zie : http://www.qaradawi.net/xml/topics/index.xml


Da's zekere HUH
  † In Memoriam † zondag 14 oktober 2001 @ 23:11:45 #42
13819 Loedertje
Trotse GILF.
pi_1901574
Women, children die in US strikes say Taliban


Thursday, October 11, 2001 at 18:30 JST
ISLAMABAD &#8212; At least 15 people, many of them women and children, were killed in the southern Afghan city of Kandahar in the fiercest night of U.S. raids since the bombardment began, a Taliban commander said on Thursday.

Mullah Muhammad Akhtar Usmani, a local Taliban commander in Kandahar, told Reuters that no military personnel were among the 15 killed.

"They were all civilians," he said.

The bombardment, which began on Sunday, continued through the night and into the day, striking targets across the city that is the stronghold of the ruling Taliban.

"They bombed the entire vicinity of the city."

The airport was hit, but he said he was unable to give an assessment of the damage.

Usmani dismissed reports people were fleeing the city that is the powerbase of Taliban supreme leader Mullah Muhammad Omar in the wake of the relentless U.S. strikes.

"People are not leaving the city. They are going about their daily business," he said. "Life is normal, the markets are open."

A Taliban official in the eastern town of Jalalabad said a mosque was hit in the overnight strikes on the outskirts of the city. However, he was unable to give more details.

Jalalabad has been surrounded by training camps of Osama bin Laden, a prime target of the U.S. strikes on Afghanistan and accused by Washington of masterminding last month's attacks on the United States. (Reuters News)

  † In Memoriam † zondag 14 oktober 2001 @ 23:14:26 #43
13819 Loedertje
Trotse GILF.
pi_1901607
Japan's enemies? China, America, and post-war democracy.
Kyoto University Professor Terumasa Nakanishi (Shukan Bunshun)

Friday, October 12, 2001 at 18:30 JST

Makiko Tanaka says bureaucrats in the Foreign Ministry have no ambition. I would like to add they are negative, apathetic and careless.
TV scriptwriter Mihoko Yamada, who has served on several citizen omsbudsmen groups. (Shukan Shincho)

Thursday, October 11, 2001 at 18:30 JST

America is our true enemy.
Palestinians in the aftermath of the World Trade Center attack. (AERA)

Wednesday, October 10, 2001 at 18:30 JST

I heard Kiyohara was a car lover.
Nissan boss Carlos Ghorn giving the Giants slugger a Skyline 300 for hitting the Nissan sign in the Tokyo Dome. (Shukan Bunshun)

Tuesday, October 9, 2001 at 18:30 JST

This is no time to be feminine.
Aiko Uemura, Japan's gold medal hope, on preparing for the mogul ski run in the next Winter Olympics. (AERA)

Sunday, October 7, 2001 at 20:00 JST

Operation 'Kill 'em all' is the name of Bush's campaign for revenge.
Headline in Shukan Gendai (Shukan Gendai)

Saturday, October 6, 2001 at 20:30 JST

It's more difficult to get a hit in Koshien Stadium.
New York Mets outfielder Tsuyoshi Shinjo on playing in the majors. (Shukan Bunshun)

Friday, October 5, 2001 at 18:00 JST

I had tea with her on three different occasions.
Dietman and former pro wrestler Atsushi Onita on a Kyushu woman who says she had sex with him all three times. (Shukan Shincho)

Thursday, October 4, 2001 at 18:00 JST

Oh, I'm good. But so are some others. Like Shizuka Kudo (Takuya Kimura's wife).
Actress Natsue Okamoto on her sexual prowess. (Shukan Gendai)

Wednesday, October 3, 2001 at 18:30 JST

I like young girls. Especially 5th and 6th graders.
Ken Fukumoto, accused of handcuffing 12-year-old Noriko Kamiie and allowing her to jump from his car on the expressway. A truck hit and killed her. The truck driver committed suicide. (Shukan Post)

Tuesday, October 2, 2001 at 09:30 JST

People fell from the sky. People!
New York rescue worker (Shukan Bunshun)

Monday, October 1, 2001 at 09:30 JST

There's a 29-year-old Japanese woman named Masumi in bin Laden's camp.
Irish journalist who watches terrorist organizations (Shukan Shincho)

Saturday, September 29, 2001 at 18:30 JST

Americans think Bin Laden should die. But not just an ordinary execution. I wouldn't be surprised if they hung him upside down and beat him to death.
Journalist Yoshio Horita, who lives in Washington, DC. (Shukan Gendai)

Friday, September 28, 2001 at 18:30 JST

As an adult. As a human. I was incredibly immature.
SMAP member Goro Inagaki apologizing for driving away from a parking violation and hitting a policewoman. (Shukan Bunshun)

Thursday, September 27, 2001 at 18:30 JST

I think it's best if you get married as soon as you get pregnant.
Anna Umemiya annoucing her engagement to a businessman. (AERA)

  † In Memoriam † zondag 14 oktober 2001 @ 23:15:30 #44
13819 Loedertje
Trotse GILF.
pi_1901626
Dutch police arrest man over Spice Girl threats


Sunday, October 14, 2001 at 18:30 JST
LONDON &#8212; A man has been arrested in the Netherlands on suspicion of sending indecent mail to Spice Girl Mel C, British police said on Saturday.

The singer was reported to have received a tape-recorded death threat last week, along with sexually explicit letters.

The Mirror newspaper said the tape carried the message, "This is the day we are both going to die."

A British police spokeswoman told Reuters that the man was being questioned by Dutch police.

"Following a joint operation with the Dutch authorities, a man was arrested in Holland on suspicion of sending indecent mail," she said. No further details were immediately available.

A spokesman for the Spice Girl, real name Melanie Chisholm, told reporters last week: "It's been a very worrying time."

pi_1901645
quote:
Op zondag 14 oktober 2001 23:01 schreef Cora het volgende:
Copy and Paste
LOL

Hoe (en waarom) heb je dat zo snel gemaakt

die ( is ook leuk trouwens! )

[Dit bericht is gewijzigd door calvobbes op 14-10-2001 23:20]

  † In Memoriam † zondag 14 oktober 2001 @ 23:17:22 #46
13819 Loedertje
Trotse GILF.
pi_1901650
Woman arrested for beating son to death
Saturday, October 13, 2001 at 20:00 JST
TOKYO &#8212; Police arrested a 34-year-old woman on Saturday on suspicion of beating her 7-year-old son to death at their home in Tokyo's Edogawa Ward.

Shizuko Mizumura is suspected of fatally beating Tomonori, a first-grader, all over his body with a 68-centimeter plastic massage instrument from around 5:30 p.m. to 6 p.m. Friday, the police said. (Kyodo News)

  † In Memoriam † zondag 14 oktober 2001 @ 23:17:58 #47
13819 Loedertje
Trotse GILF.
pi_1901654
Woman arrested for stealing, tearing Koran
Saturday, October 13, 2001 at 20:00 JST
TOYAMA &#8212; A jobless woman has been arrested on suspicion of theft in connection with a torn Koran in Toyama Prefecture on the Sea of Japan coast, police said Saturday.

According to police investigations, the damaged Islamic holy book and leaflets slandering Muslims were found in front of a secondhand car dealership run by Ahmed Imtiaz Gondal, a Pakistani, in the town of Kosugi in May. (Kyodo News)

  † In Memoriam † zondag 14 oktober 2001 @ 23:19:29 #48
13819 Loedertje
Trotse GILF.
pi_1901666
Dutch POWs suit tossed out
Thursday, October 11, 2001 at 18:30 JST
TOKYO &#8212; The Tokyo High Court on Thursday rejected a damages suit filed against the Japanese government by eight Dutch nationals claiming their ill treatment at Japanese prison camps during World War II violated international law.

The suit was filed by seven soldiers who were taken prisoner of war, including Sjoerd Albert Lapre, who died in February 1999 at the age of 78, and a woman forced into sexual slavery. (Kyodo News)

  † In Memoriam † zondag 14 oktober 2001 @ 23:21:45 #49
13819 Loedertje
Trotse GILF.
pi_1901691
20 Nigerians killed in anti-U.S. protests


Emeka Madu

Sunday, October 14, 2001 at 18:30 JST
KANO, Nigeria &#8212; Nigerian authorities clamped a night curfew on the northern city of Kano and issued a shoot on sight order after at least 20 people were killed in anti-American riots on Saturday, officials and residents said.

The latest toll included four people shot by soldiers enforcing the shoot on sight measure, witnesses said.

Army tanks raced through the streets of the largest city in mainly Muslim northern Nigeria to quell some of the most violent anti-American protests in Africa since U.S. air strikes on Afghanistan began last Sunday.

Although the violence was linked to the bombardment of Afghanistan, it followed a familiar pattern of deadly religious clashes that have rocked Nigeria over the past two years, killing thousands.

A senior government official told Reuters soldiers opened fire on a group of suspected rioters, killing some of them.

"Up to four people have been killed since they gave the order," a witness said, identifying one as the son of the owner of a petrol station in the city centre who was standing outside.

Community leaders said earlier that rioters killed at least six female secondary school students who were on their way to sit university entrance exams.

Police said they had found two bodies in the street, one of them hacked by a machete, and a resident sheltering in a police station said he saw eight other bodies brought in.

"There is rampant shooting in the streets," said resident Jibrin Idris, who said he was trapped in a building with scores of people in the commercial district. "Churches, mosques and shops are on fire. There is smoke everywhere," he said by phone.

As law and order broke down in the sprawling city, Governor Rabiu Musa Kwankwaso announced a 7 p.m. to 6 a.m. curfew and issued an appeal for calm.

Armoured cars patrolled the streets as night fell, and an officer at police headquarters said security forces had restored order to the city. "The situation is calming," he said.

Police earlier banned all vehicles from the streets on the second day of protests against U.S. military action against the Afghanistan's ruling Taliban for refusing to hand over Saudi-born fugitive Osama bin Laden.

Nigeria's population of over 110 million is divided almost evenly between Christians and Muslims. The introduction of Islamic sharia law in some northern states triggered Muslim-Christian fighting in some cities in the region.

Witnesses said five churches, a major city mosque and 15 smaller mosques were among the torched buildings.

Kano police commissioner Yakubu Bello Uba confirmed the order to shoot on sight rioters and other troublemakers. "I have given an order that any rioter or anybody found perpetrating trouble should be shot on sight," Uba told Reuters.

"Non-indigenes or non-Muslims who are in Sabon Gari should conduct themselves in an orderly manner. We have moved in anti-riot police and tanks to ensure adequate protection."

Mike Idika, a leader of the predominantly Christian Igbo community, which accounts for most of the city's merchants, said more than 200 people had been injured and sent to hospital.

The protests, which began after Friday prayers, were intended to be peaceful, but local residents said they were hijacked by hoodlums from the city's army of unemployed youth.

The protesters chanted "May God destroy America!" and "Americans are terrorists."

Witnesses said Christian Igbo merchants armed with guns, knives and bows and arrows were battling rioters, trying to defend their shops. Many residents fled to seek refuge in army barracks.

Protesters brandishing posters of bin Laden burned American flags and effigies of U.S. President George W Bush and Nigerian Foreign Minister Sule Lamido, who has backed the U.S. attacks.

A military guard was posted in front of Lamido's home in Kano overnight after reports that the protesters planned to burn it down. Lamido's staff told Reuters he was out of the country.

Relations between Kano's Christian minority and Muslim majority have been on a knife-edge for months since the Kano state government began a crackdown on violations of Sharia law, the strict Muslim legal code.

pi_1901724
quote:
Op zondag 14 oktober 2001 23:17 schreef calvobbes het volgende:
LOL

Hoe (en waarom) heb je dat zo snel gemaakt


Ach, je moet iets als je je verveelt Is zo gebeurd hoor trouwens...
:{
pi_1901725
Loedertje slaat door

Ga door, Ga door!

pi_1901739
quote:
Op zondag 14 oktober 2001 23:24 schreef calvobbes het volgende:
Loedertje slaat door

Ga door, Ga door!


:{
pi_1901748
Tís nog best een gezellig topic geworden he?

Ow effe ontopic:

[Peeeeeest] text [/Peeeeeest]

:{
  † In Memoriam † zondag 14 oktober 2001 @ 23:28:22 #54
13819 Loedertje
Trotse GILF.
pi_1901755
Piccolo manuale di occupazione di Amsterdam

--------------------------------------------------------------------------------


Traduzione del piccolo manuale di occupazione dei centri informativi per l`occupazione (c.i.s.)

PICCOLO MANUALE DI OCCUPAZIONE

INTRODUZIONE

Ti presentiamo il P.M.O. di tutti i centri di occupazione di Amsterdam. Questo manuale e` un piccolo riassunto di alcune parti del manuale di occupazione del 96/97 aggiornato e con informazioni piu` recenti I gruppi di consulta per l'occupazione (Kraakspreekuur) sono organizzati per quartieri. Questi gruppi vogliono portare alla luce case del quartiere vuote (non affitate); inoltre questi gruppi vogliono conoscere come sta la situazione di rinnovazione e riurbanizzazione della citta`. Daltra parte si fanno queste consulte per spiegare ai potenziali occupanti come trovare le case occupate. Dopo aver letto questo manuale, avrai sicuramente delle domande, puoi andare da questi gruppi per avere altre notizie. Se una persona e` intenzionata ad occupare e vuole continuare allora puo` selezionre alcune case potenziali; poi i gruppi possono aiutarti a ottenere altre informazioni sulle case. I gruppi ti possono anche aiutare nella mobilitazione di gente che sara` presente al momento dell' occupazione. In piu` nella consulta si decidera` chi va a rompere la porta e chi va a parlre con la polizia. Affinche la consulta venga ad aiutarti nell' occupazione devi dimostrare interesse e fare tutto quello che puoi autonomamente. Per esempio e` importante la ricerca di case vuote. Inoltre le consulte servono anche dopo l'occupazione per aiutarti nei problemi che incontrerai. In caso di vandalismo legalizzazione e possibili sgomberi puoi chiedere ai gruppi aiuto e consiglio. Se occupi senza l'aiuto dei gruppi e` gradito che per prima cosa ti tenga informato se c`e` altra gente interessata ad occupare la stessa casa. Le consulte sono anche uno spazio per scambiare esperienze con altre persone con le quali pensare ad altre possibili occupazioni.

1) INFORMAZIONI SULLE CASE VUOTE

La prima cosa che devi fare e` una lista di case vuote che soddisfano le tue necessita`. In questo paragrafo troverai alcuni cosigli utili per sapere se una casa e` realmente vuota. Il primo controllo comincia nella maggior parte dei casi con un giro per la citta`; il momento migliore e` di giorno perche la notte tutte le case sembrano vuote. Scriviti gli indirizzi e il giorno in cui le hai selezionate. Dopo questo primo controllo avrai una quantita` di case che potrebbero essere occupate. Le informazioni piu` importanti che devi ottenere (rivolgiti ai Kraakspreekuur) sono:

1- e` la casa dichiarata sfitta
2- se si da quanto tempo
3- e` ritirato il permesso di residenza
4- se si in che giorno

In Amsterdam esiste l'SWD (Stedeljk Woning Dienst), che ti puo` dire da quanto tempo la casa e` sfitta; (non e` detto che questo ufficio ti possa informare su tutte le case della citta`; esso opera solo in alcuni quartieri, devi informarti). L'informazione importante che l'SWD ti potrebbe dare riguarda il valore del sussidio di affitto della casa, se questo sta` al disotto del limite di f-1100, la casa rientra nel settore sociale; quando l'abitazione sta al di sopra del limite di affitto questa appartiene al settore privato. Se l'SWD non ti puo` dare l'informazione ai altre possibilita` per sapere da quanto tempo la casa e vuota: guarda bene attraverso le finestre, porte e buche delle lettere, guarda se c`e` molta posta o delle tende alle finestre. Suona i campanelli della porta e ascolta se funzionano; stai attento a non richiamare l'attenzione e metti a lato della porta un fiammifero e ripassa per vedere se e` caduto. Altra possibilita` e` domandare ai vicini, naturalmente non devi dire che vuoi occupare la casa; ma ti devi informare su chi e` il proprietario della casa e se e` in affitto. In caso che sia un impresa puoi chiedere dove ha la sede; questa informazione la puoi ottenere dalla camera di commercio. Un ultimo modo di informarsi e` mediante il Bouw Woning Toezicht; qui` puoi chiedere se e` stato dato qualche permesso di costruzione, fai questo appena prima di occupare la casa per evitare che il proprieario venga avvisato all'ultimo momento. Se in questo modo scopri che la casa e` veramente sfitta, hai altre cose da sapere: chi e` il proprietario, lo puoi chiedere al Rijkkadaster (Catasto) pagando 10 fiorini. Qui` inoltre puoi ottenere altre informazioni (affitti, costruzioni,....)

Prova ad ottenere tutto cio` che e` possibilele circa la casa; cio` va a tuo vantaggio, infatti molte occupazioni non hanno avuto buon esito a causa di una errata ricerca. Di seguito trovi un piccolo riassunto di quello che devi sapere e dove chiederlo:

1) da quanto tempo la casa e` sfitta (SWD e vicini)
2) grandezza della casa (Woningkarthotheek, Kadaster, vicini)
3) affitto (SWD, Huuradvieskomissie, Woningkarthotheek, vicini)
4) tipo di abitazione (SWD e vicini)
5) ristrutturazione, demolizioni, permessi di costruzione (SWD, Wijkcentrum, Monumentenzorg, vicini)
6) nome del proprietario (Kadaster, camera di commercio, vicini)
7) stato finanziario del proprietario (registro delle ipoteche)
8) tipo di proprietario (Wijkcentrum, SPOK, vicini)

2) PREPARATIVI

Terminata la fase investigativa se hai trovato qualcosa di occupabile, puoi cominciare con i preparativi. Si raccomanda che per prima cosa, tu vada alle consulte di occupazione, Kraakspreekuur, loro hanno esperienza con la polizia e hanno anche gli strumenti necessari e si possono mobilizzare ampiamente. Inoltre hai la possibilita` di trovare qualcun altro interessato alla tua medesima casa; con i quali puoi collaborare in caso di interessi comuni, altrimenti sapendo si possono evitare occupazioni conflittuali. I gruppi (Kraakspreekuur), se ne avrai bisogno ti possono aiutare anche dopo l'occupazione, e` interessante mantenere i contatti con loro. Di cosa hai bisogno se vuoi occupare? Per prima cosa necessiti del set di occupazione: una sedia, un tavolo e un letto, questo ti serve per dichiarare che tu vivi nella casa. Inoltre hai bisogno di una serratura per sostituire quella vecchia; puo` accadere che la casa abbia piu` porte e quindi avrai bisogno di piu` serrature. Se decidi di occupare senza l'aiuto dei Kraakspreekuur avrai bisogno di certi strumenti come leve, cacciaviti, viti, lime, martelli, etc per rompere la porta e sostituire la serratura. In caso che per occupare la casa trovi aiuto nei vicini sarebbe gradito preparare una riunione con loro; generalmente per mantenere buoni rapporti, questo lo avrebbe potuto preparare il Kraakspreekuur.

3) OCCUPAZIONE

Al momento che hai preparato tutto si puo` cominciare con l'occupazione. Organizzati per tempo con chi ti ha aiutato e sii chiaro su tutte le informazioni che hai conseguito; generalmente si decide prima chi rompera` la porta e chi parlera` con la polizia. Prima dell' entrata effettiva, accertati che la casa sia realmente vuota allora puoi mettere il tuo set di occupazione; inizialmente nascondi gli stumenti di scasso affinche` la polizia non te li confischi. Dopo l'occupazione e` importante che venga la polizia per accertare che tu vivi nella casa; se non viene la devi chiamare. Mentre aspetti sostituisci la serratura. Al momento del loro arrivo fai in modo che non entrino piu` di due agenti, molti polizziotti vogliono spesso infastidirti con la scusa di appoggiarti. Essi sono interessati a sapere chi sei come e quando sei entrato e da quanto tempo quell'edificio stava sfitto. Ricordati che non sei obbligato a dare il tuo nome, se hai occupato con un gruppo di Kraakspreekuur dai il loro nome (per esempio gruppo di occupazione di Pijp). Questi ultimi possono informare la polizia da quanto tempo la casa era sfitta e dare il nome del proprietario.

4) COSA PUO` ACCADERE DOPO L'OCCUPAZIONE?

E` impossibile prevedere cosa puo` accadere dopo l'occupazione, ogni sqatt ha la sua propria storia. E` normale che il proprietario non sia contento che la sua proprieta` sia stata squattata. Ricordati che nessuno, compreso il proprietario puo` entrare nella casa senza il tuo consenso dopo che la polizia ha constatato che tu stai vivendo nella casa; queste sono le regole legali. Anche la polizia non puo` entrare senza un mandato, nel caso arrivi, tu hai il diritto di farti mostrare il medesimo. Puo` accadere che il proprietario non prenda sul serio le leggi e cominci ad agire con proprie azioni come porre delle barricate. In questo caso rivolgiti allo SPOK (Spekulatie Onderzoeks Kollektief). Questo collettivo e` un gruppo di occupazione che ricerca ed archivia informazioni sul mercato delle case ad Amsterdam. E` basato sull' esperienza che occorre con affittuari e proprietari e ha molto materiale storico riguardante ordini di disoccupazione e casi giuridici. Quando ti rechi allo SPOK ti vengono subito fornite informazioni e spiegazioni per esempio su come trovare il proprietario e cosa poter guardare nel registro civile dell'Olanda; sapere sullo stato finanziario della casa guardando il contratto di compra vendita e scoprire eventuali ipoteche. Puo` anche succedere che il prezzo della casa possa subire variazioni prima dell'occupazione. In caso che il proprietario della tua casa sia una societa`, fondazione o impresa e` importante che tu vada alla camera di commercio per conoscere la sua categoria. Chiedi inoltre se ci sono altre societa` che sono iscritte allo stesso indirizzo.

N.B. Di seguito riportiamo tre regole che pensiamo siano fondamentali:

1) Occupare con i Kraakspeerkuur e` la maniera migliore

2) Mantieni i contatti con loro, ricordati che sqatt vuol dire occupare un posto dove vivere, ma la collaborazione puo portare anche a costruire altre cose (CONTROINFORMA)

3) Se vuoi trovare collaborazione nei vicini, guarda bene sempre a chi ti rivolgi.

INDIRIZZI Kraakspreekuren in Amsterdam

"DE PIJP" Molli van Ostadestraat 55 huis, lunedi` dalle 19.00 alle 20.30.
"WEST" Ratjetoe, Frederik Hendrikstraat 111, lunedi` dalle 20.00 alle 21.00.
"CENTRUM" Vrankrijk, Spuistraat 216, mercoledi` dalle 20.00 alle 21.00
"OOSTELIJKE BINNENSTAD" Kalenderpander, Entrepotdok 96, lunedi` dalle 20.00 alle 21.00
"SCHINKELBUURT" Binnenpret 1e Schinkelstraat 14-16 martedi` dalle 19.30 alle 21.30

  † In Memoriam † zondag 14 oktober 2001 @ 23:29:41 #55
13819 Loedertje
Trotse GILF.
pi_1901770
quote:
Op zondag 14 oktober 2001 23:28 schreef Cora het volgende:
Tís nog best een gezellig topic geworden he?

Ow effe ontopic:

[Peeeeeest] text [/Peeeeeest]


Yeppppp

De rechtspositie van krakers jegens de overheid.

De bevoegdheden van de overheid tegen krakers in theorie en in de praktijk.


Scriptie van Marcel Schuckink Kool, als afsluiting van de studie Nederlands recht aan de Open Universiteit

Begeleider: Dick van Ekelenburg


Den Haag, juli 2001

Deze scriptie is opgedragen aan hen die vervolgd worden wegens hun strijd voor een rechtvaardigere, vrijere en gelukkigere samenleving, alsmede aan degenen die hen in hun strijd ondersteunen.

In de Verenigde Staten zit Mumia Abu Jamal na een showproces al sinds 1982 op death row op beschuldiging van de moord op een politieagent. De hiervoor aangedragen &#8216;bewijzen' zijn stuk voor stuk door de verdediging ontkracht. Mumia was voor zijn arrestatie een gevierd journalist die opkwam voor de, in de jaren &#8216;70 met extreem politiegeweld geconfronteerde, uit de Black Panther-movement voorgekomen Move-organisatie. Ook vanuit zijn dodencel blijft Mumia zijn strijd voor een rechtvaardigere samenleving voortzetten. Wereldwijd is er protest tegen zijn vonnis. Binnenkort is voor hem de laatste juridische mogelijkheid om het vonnis aan te vechten. Op deze dag, day X genoemd, wordt iedereen in de gehele wereld opgeroepen tot protest bij ambassades of consulaten van de Verenigde Staten.
http://www.mumia.nl en http://www.xs4all.nl/~tank/spg/mumia-nl/mumianl.htm

Carlo Giuliani werd op 21 juli 2001 vermoord door de politie bij protesten tegen de G7-conferentie in Genua. Dagenlang was de binnenstad afgegrendeld voor demonstranten, om de op deze conferentie aanwezige wereldleiders van alle demonstraties te vrijwaren. Bij het verzet tegen de politieterreur die zich alhier manifesteerde, werd Giuliani door een agent neergeschoten en daarna door een politiebusje meerdere malen overreden. Over wat er aan het schot van de agent voorafging, bestaan verschillende lezingen ...

Anarchist Black Cross is een organisatie die wereldwijd opkomt voor politieke gevangenen, onder andere door hen te schrijven en op andere manieren een hart onder de riem te steken, en door het organiseren van internationale campagnes om hun lot bekend te maken en te pleiten voor vrijlating en betere behandeling.
http://www.chez.com/maloka/ABC/index.htm

Hun strijd toont aan dat het juridische systeem in veel situaties een farce is en slechts de status quo ondersteunt. Desondanks ben ik van mening dat ook de juridische middelen voor deze strijd maximaal benut moeten worden.

  † In Memoriam † zondag 14 oktober 2001 @ 23:30:23 #56
13819 Loedertje
Trotse GILF.
pi_1901794
quote:
Op zondag 14 oktober 2001 23:29 schreef Loedertje het volgende:
Yeppppp

[Mega Knip]


Heb jij al die teksten ook gelezen Loedertje? ik ben nog bezig
:{
  † In Memoriam † zondag 14 oktober 2001 @ 23:33:28 #58
13819 Loedertje
Trotse GILF.
pi_1901808
The Spanish Revolution (1936)


--------------------------------------------------------------------------------
The role of anarchism in the Spanish Revolution or Spanish Civil War of 1936 is too often absent from histories of this struggle against fascism. Alongside the war millions of workers collectivised the land and took over industry to pursue their vision of a new society. This page tells their story and the story of those who fought alongside them.

--------------------------------------------------------------------------------
As of March 2000 this page was receiving 5000 visits a month

Contents
Introductions
Prelude to Revolution
The Revolution
Eyewitness accounts
Spain and the world
Organisations of the Spanish revolution
Collectives
Women
The May Days
Individual people
Original documents
Songs
Online books
Book Reviews
Interpretations
After the revolution
Introductions
Anarchism and the Spanish Civil War
an excellant overview of the role the anarchists played and their acheivements
Glossary of terms
Chronology of the major events
The PDF file of this pamphlet
A summary of the achivements of the Spanish revolution
The People Armed and the People's Army : A film review of Land and Freedom
An overview of the military history of the civil war
The anti-fascist camp in the Spanish revolution
A New World In Their Hearts

Prelude to Revolution
Francisco Ferrer and the Modern School [1901]
The formation of the anarchist unions and the Tragic Week [1909]
Birth of the FAI - Edgar Rodrigues On The Origins Of The Iberian Anarchist Federation (FAI) [1926]
An unexpected dash through Spain, Emma Goldman on conditions under Rivera [1929] *
The Barcelona rent strike of [1931]
Prison letter from Durruti the year before the revolution about CNT tactics [1935]
Daniel Guerin on the anarchist tradition in Spain *
How were the anarchists able to obtain mass popular support in Spain?*
Miners strikes in Asturies - 1890 to 1998
A history of the Spanish libertarian youth paper 'Ruta'



The international
'Anarchist Platform'

We invite you to look at the 'Anarchist Platform' points and if you agree with them to subscribe to this international anarchist mailing list


Read the 'Anarchist Platform'


The Revolution

Durruti's funeral in Barcelona was attended by 500,000 people

The first days of the Revolution
from El Acratador #54
The first two weeks
by Andrew Flood
The first two years
by the Friends of Durruti
The organisation of the anarchist militia
Anarchist rural Collectives
About the Iron Column
from Jose Peirats
Some quotes from 'Blood of Spain'
about the Spanish Revolution
Durruti's interview with Pierre van Paasen
Jack White's first Spanish impressions
What Spanish anarchism must do to win - Camillo Berneri - October. 1936
A Study of the Revolution in Spain
by Stuart Christie
Why the CNT entered government
The Militia's in the revolution


Eyewitness accounts and studies of the Revolution
The CNT as I Saw It
by Fenner Brockway
The Collectives in Aragon
by Gaston Leval
Collectives in Spain
by Gaston Leval & others
George Orwell
on the Spanish revolution.
First Spanish impressions
by Jack White
Camillo Berneri's writings from Spain
Interview on militarisation of the militias
War and Revolution
Open letter to comrade Federica Montseny
Madrid, sublime city
Beware, Dangerous Corner!
Counter Revolution on the March
The May Days in Barcelona, 1937
by Augustin Souchy
Emma Goldman
on Spain, 1937
Durruti Is Dead, Yet Living
By Emma Goldman
With the Peasants of Aragon
by Augustin Souchy
Towards a fresh revolution
by the Friends of Durruti
Anarchist rural Collectives
by Deidre Hogan (also in Spanish as El triunfo de la libertad)
The Tragedy of Spain
Rudolf Rocker's
The Collectives in Revolutionary Spain
by Lucien
Stalin's Foreign Policy in the Spanish Civil War and the Barcelona Uprising of May, 1937
by Jason Wehling
About the Iron Column
from Jose Peirats
A day Mournful and Overcast...
by an "uncontrollable" from the Iron Column.
A soldier returns
letter from a US member of the Durruti Column
Durruti Is Dead, Yet Living
by Emma Goldman
Living Utopia
English transcript of Televisión Española documentary
CNT Newsreel stills
framegrabs from CNT newsreel shot during the Spanish Civil War
A Study of the Revolution in Spain
by Stuart Christie


The above photo is assembled from framegrabs of CNT newsreel of the Durruti Column, I believe this is the International section

--------------------------------------------------------------------------------

Anarchism and the Spanish revolution discussion list

For ongoing discussion about
Anarchism and the Spanish revolution


More details


PDF file for you to print out and distribute:
Anarchism in Action: The Spanish Civil War

--------------------------------------------------------------------------------
Organisations
Birth of the FAI
by Edgar Rodrigues
A study of the Iberian Anarchist Federation
review of Stuart Christie book
The CNT as I Saw It
by Fenner Brockway
Why the CNT entered government
The Friends of Durruti.
The revolutionary message of the 'Friends of Durruti' (BOOK- includes sections of their paper)
Introduction to Friends of Durruti
Their pamphlet Towards a fresh revolution
The Friends of Durruti - A Chronology by Paul Sharkey
Jaime Balius and the Friends of Durruti
Rebuttal of accusations of Marxism
Agustin Guillamon's history of the FOD
Guillamons flawed history of FoD
another review of Guillamon
Mujeres Libres - anarchist womens organisation
Free Women of Spain
Text of a talk on the Mujeres Libres
The Mujeres Libres Anthem
The organisation of the anarchist militia
Review of Antony Beevan on Militias
About the Iron Column
from Jose Peirats
The Iron Column
quotes from A Study of the Revolution
A day Mournful and Overcast...
by an "uncontrollable" from the Iron Column.
'Revolutionary War? A Contribution to the Debate about the Spanish Revolution
The role of the Spanish Communist Party
The Spanish libertarian youth paper 'Ruta'


The Collectives
The economy of the revolution in Spain
Kevin Doyle
Collectives in the Spanish Revolution
a WSM article
The Anarchist Collectives in the Countryside during the Spanish Civil War
by Deidre Hogan
The Collectives in Revolutionary Spain
by Lucien
Anarchist rural Collectives
by Deirdre Hogan
Collectives in Spain
by Gaston Leval
With the Peasants of Aragon
by Augustin Souchy
The Collectives in Aragon
by Gaston Leval
Innovation in the collectives
from Sam Dolgoff
Collectivization in Catalonia
Augustin Souchy on collectivization in Barcelona during the Spanish Revolution
How were Spanish industrial collectives organized?
from the Anarchist FAQ
How were the Spanish agricultural cooperatives organized
from the Anarchist FAQ
Eyewitness quotes on
the collectives in the Spanish Revolution


--------------------------------------------------------------------------------


Spain and the world
Anarchist Revolution in Spain: a Victim of International Politics
What did non-intervention actually mean
Non - intervention and international involvement in the Spanish Civil War

Anarchist Women Militia in Spain Women in the Revolution
Conditions for the vast majority of people in Spain in the 1920s and 1930s were appalling. For women they were especially bad. In the two years before the 1936 revolution, two groups of anarchist women in Barcelona and Madrid had begun organising

Mujeres Libres - anarchist womens organisation
Free Women of Spain
Women in The Spanish Revolution - S. African article
Womens liberation & the revolution
Women in the Spanish Revolution
A talk on the Mujeres Libres (Free Women)
The Mujeres Libres Anthem
Federica Montseny Mañé
CNT activist and Minister of Health in 1936

Anarchism and Womens liberation

The May Days in Barcelona (1937)
The May Days in Barcelona, 1937
by Augustin Souchy
The Friends of Durruti.
The revolutionary message of the 'Friends of Durruti' translated for this site by Chekov Feeney
A Spanish translation El Mensaje Revolucionario de "Los Amigos de Durruti"
Their pamphlet Towards a fresh revolution
Jaime Balius' rebuttal of accusations of Marxism
Pablo Ruiz, FoD member on the May days and the Friends of Durruti
Stalin's Foreign Policy in the Spanish Civil War and the Barcelona Uprising of May, 1937
by Jason Wehling
A brief biography of Camillo Berneri - Italian anarchist murdered by the Stalinists in Barcelona during the May Days
Luigi Camillo Berneri
Berneri's writings
Social democracy and communism betrays the revolution
Counter Revolution on the March
The USSR and the CNT: an unconscionable stance
Fragment on post-May opposition to collaboration
A soldier returns - a US member of the Durruti Column on the Stalinist terror
Review of non-anarchist writings on the May Days

People
Buenaventura Durruti
Durruti Is Dead, Yet Living by Emma Goldman
Buenaventura Durruti by Peter E Newell
Buenaventura Durruti by Correo@, Venezula
a prison letter from Durruti about CNT tactics in 1935
Durruti's interview with Pierre van Paasen
Federica Montseny Mañé
CNT activists and Minister of Health in 1936
Francisco Ferrer
a photo of Ferrer
Emma Goldman on Francisco Ferrer
Ferrer was executed in the aftermath of the Tragic Week
Major General Miguel Garcia Vivancos
Captain Jack White
who formed the Irish Citizen Army and later fought with the CNT militia
Jack White's first Spanish impressions
The anarchist views of Captain Jack White
Jaime Balius - secretary of the 'Friends of Durruti'
Jaime Balius' rebuttal of accusations of Marxism
Camillo Berneri - Italian anarchist murdered by the Stalinists in Barcelona during the May Days
A brief biography of Camillo Berneri
Luigi Camillo Berneri
Berneri's writings
Francisco Barbieri - murdered alongside Berneri

Find out when new pages are added to this site

Subscribe to an announcement list that will tell you when I add new pages anywhere in the Revolt collection. There will be no more then 3 posts a month to this list.


How to subscribe


Documents
Libertarian Communism
Isaac Puente's
Towards a fresh revolution
Friends of Durruti
After the Revolution
by Diego Abad de Santillan
Interview with Buenaventura Durruti
by Pierre Van Paasen
Berneri's writings
articles published 1936 - May '37

Songs of the Revolution
Lyrics of 'Sons of the People' in English and 'Spanish' (ca)
Lyrics of 'A las Barricadas' in English and 'Spanish' (ca)
Lyrics of the Mujeres Libres anthem in English and 'Spanish' (ca)
Lyrics of Los moros que trajo Franco in English and 'Spanish' (ca)


Find out when new pages are added to this site

Subscribe to an announcement list that will tell you when I add new pages anywhere in the Revolt collection. There will be no more then 3 posts a month to this list.

On-line books/pamphlets on Spain
Anarchism in Action: The Spanish Civil War
by Eddie Conlon
The revolutionary message of the 'Friends of Durruti'
George Fontenis, preface by Daniel Guerin
translated for this site by Chekov Feeney
Daniel Guerin's history of the Spanish Civil War
Towards a fresh revolution
by the Friends of Durruti
A day Mournful and Overcast...
by an "uncontrollable" from the Iron Column.
A Study of the Revolution in Spain
by Stuart Christie
The Friends of Durruti - A Chronology
by Paul Sharkey
Book Reviews

The Spanish Civil War by Antony Beevan
The Spanish Anarchists - The heroic years; 1868 - 1936
The Friends of Durruti.and Guillamon's 'history'
Agustin Guillamon's history of the FoD
Arms For Spain
The story of the Moscow gold: How the Spanish war was lost
Review of non-anarchist writings on the May Days
Recent Books on Spanish Anarchism - Reviewed by Jon Bekken
We, the Anarchists! A study of the Iberian Anarchist Federation (FAI) 1927-1937, by Stuart Christie.

Check out the Anarchist History page

pages of Anarchist History including the Russian, Spanish and Mexican revolutions, the Paris commune, historical texts and famous individual anarchists. Check out the anarchist history page and discussion list


The meaning of the Spanish Revolution for anarchism today
Does revolutionary Spain show that libertarian socialism can work in practice? from the Anarchist FAQ
The lessons of the Spanish Revolution
Murry Bookchins essays To Remember Spain
Trotskyist Lies on Anarchism a review of Felix Morrow's 'Revolution and Counter-Revolution in Spain
The WSA (US section of the IWA) answers criticism of the CNT from a trotskyist group.
Spain and it's Relevance Today -- Part 1and Part 2
Anarchists in the Spanish Revolution, by Sam Dolgoff

After the war: Anarchism undefeatedForgotten heros, the role Spanish anarchists played in fighting fascism in France in WWII
The resistence to Franco after the Civil War
This acoount of the making of Behold a Pale Horse includes several references to exiled Spanish anarchists
The Spanish libertarian youth paper 'Ruta' continued to be published in exile
Spanish anarchism and international revolutionary action, 1961-75


Images
CNT Newsreel stills
framegrabs from CNT newsreel shot during the Spanish Civil War
A page of texts and pictures from the Spanish revolution.
A collection of posters from the Spanish revolution.
The Southworth poster collection includes detailed explanations of the images

The Anarchist Movement in Spain today

Anarcho-syndicalism in Spain


Articles in English

The CNT since Franco by Andrew Rothman

Organisations on the web

The Confederacion National del Trabajo (CNT)
The Confederacion General del Trabajo (CGT)
The Catalan CNT paper Solidaridad Obrera
El Kiosko Libertario
Bienvenida a FEEL
Centre Ascaso Durutti: A Center devoted to the life, times, and philosophy of Francisco Ascaso and Buenaventura Durruti.

Links to anarchists all over the world


Essays

If you have written an essay connected with anarchism and the Spanish revolution email it to me and I'll add it here

The CNT, anarchism and Spain: Challenging State and Class Power
Does Spanish anarchism prove that state and class control is fundamentally inessential?
Links to other SCW web pages
Dana Wards Spanish Civil War page
Anti-Fascist Action No 15 has several articles on Spain
Eugene W. Plawiuk's excellant site on the Spanish Civil War.
Ireland and the Spanish Civil War


Write for this page
There are quite a lot of issues about anarchism and the Spanish Revolution not covered in this page, if you would like to write an article for it here are some topics that I would like articles on

the lyrics in English or Spanish of any revolutionary songs from that period
The anarchist militas in the early days of the war
The militias before, during and after militirization
What the 'anarchist' ministers did in power
A biography of Camillo Berneri [Done]
The role of anarchists from outside Spain in Spain
The role of anarchists from outside Spain in supporting the revolution in Spain
A biography of Francisco Ascaso
A biography of Garcia Oliver
A biography of Federica Montseny [Done]
Any other biographys
The takeover and running of industry in Barcelona
Or indeed any topic that you think is suitable, email me for advice on writing an article or with anything you think is suitable. Anyone writing a piece will be credited at the bottom of it if they wish.


The international
'Anarchist Platform'

We invite you to look at the 'Anarchist Platform' points and if you agree with them to subscribe to this international anarchist mailing list


Read the 'Anarchist Platform'

PDF file of this text for you to print out and distribute:
Anarchism in Action: The Spanish Civil War

Part of the
International Anarchism
web pages


[Main Index][Anarchist history]
[The Platform][Email lists][Organisations]

This page is part of the Struggle collection

pi_1901813
Jean Piaget (1896-1980)
Jean Piaget was born in Neuchâtel (Switzerland) on August 9, 1896. He died in Geneva on September 16, 1980. He was the oldest child of Arthur Piaget, professor of medieval literature at the University, and of Rebecca Jackson. At age 11, while he was a pupil at Neuchâtel Latin high school, he wrote a short notice on an albino sparrow. This short paper is generally considered as the start of a brilliant scientific career made of over sixty books and several hundred articles.
His interest for mollusks was developed during his late adolescence to the point that he became a well-known malacologist by finishing school. He published many papers in the field that remained of interest for him all along his life.

After high school graduation, he studied natural sciences at the University of Neuchâtel where he obtained a Ph.D. During this period, he published two philosophical essays which he considered as "adolescence work" but were important for the general orientation of his thinking.

After a semester spent at the University of Zürich where he developed an interest for psychoanalysis, he left Switzerland for France. He spent one year working at the Ecole de la rue de la Grange-aux-Belles a boys' institution created by Alfred Binet and then directed by De Simon who had developed with Binet a test for the measurement of intelligence. There, he standardized Burt's test of intelligence and did his first experimental studies of the growing mind.

In 1921, he became director of studies at the J.-J. Rousseau Institute in Geneva at the request of Sir Ed. Claparède and P. Bovet.

In 1923, he and Valentine Châtenay were married. The couple had three children, Jacqueline, Lucienne and Laurent whose intellectual development from infancy to language was studied by Piaget.

Successively or simultaneously, Piaget occupied several chairs: psychology, sociology and history of science at Neuchâtel from 1925 to 1929; history of scientific thinking at Geneva from 1929 to 1939; the International Bureau of Education from 1929 to 1967; psychology and sociology at Lausanne from 1938 to 1951; sociology at Geneva from 1939 to 1952, then genetic and experimental psychology from 1940 to 1971. He was, reportedly, the only Swiss to be invited at the Sorbonne from 1952 to 1963. In 1955, he created and directed until his death the International Center for Genetic Epistemology.

His researches in developmental psychology and genetic epistemology had one unique goal: how does knowledge grow? His answer is that the growth of knowledge is a progressive construction of logically embedded structures superseding one another by a process of inclusion of lower less powerful logical means into higher and more powerful ones up to adulthood. Therefore, children's logic and modes of thinking are initially entirely different from those of adults.

Piaget's oeuvre is known all over the world and is still an inspiration in fields like psychology, sociology, education, epistemology, economics and law as witnessed in the annual catalogues of the Jean Piaget Archives. He was awarded numerous prizes and honorary degrees all over the world.

pi_1901819
*hopa*


Introduction
A. General
B. Users
C. Authors
D. Developers
Appendixes
The XML FAQ
Editor: Peter Flynn (pflynn@ucc.ie)
Originally maintained on behalf of the World Wide Web Consortium's XML Special Interest Group
v. 2.01 (2001-06-19) Frequently Asked Questions about the Extensible Markup Language
Introduction
This is the list of Frequently-Asked Questions about the Extensible Markup Language. It is restricted to questions about XML: if you are seeking answers to questions about HTML, scripts, Java, databases, or penguins, you may find some pointers, but you should probably look elsewhere as well. It is intended as a first resource for users, developers, and the interested reader, and does not form part of the XML Specification.

Thanks
The following people have helped with contributions:

Terry Allen, Tom Borgman, Tim Bray, Robin Cover, Bob DuCharme, Christopher Maden, Eve Maler, Makoto Murata, Peter Murray-Rust, Liam Quin, Michael Sperberg-McQueen, Joel Weber

...plus many other members of the SIG as well as FAQ readers around the world. Please mail any corrections or additions to the editor. Sadly, the form for comments found at the end of previous versions has had to be discontinued due to abuse. Please post questions to the relevant mailing list or newsgroup, not to the editor.

Recent changes
2.0 June 2001 DTD changed from DocBook SGML to QAML XML; removed query form; most questions revised and in some cases rewritten; updated references to new versions of associated standards, recommendations, and working drafts; added pointer to Jon Noring's Unicode test page and NIST's XSLT/XPath test suite; updated Eve Maler's links to the DTD for the spec; added warnings on speling and punk chew asian; added question on namespaces; fixed bug in question on stylesheets; inserted explanation of `document' vs `data' software; added new mailing list on XSL:FO; updated Robin Cover's URL throughout; updated the question on media types for RFC 3023; Extended question of graphics to cover SVG. For 2.01 there were minor typos, some updated links (to recent versions of the standards, and in the section on More Information), and a few wording changes. Thanks to James Cummings for a very thorough proofread.

History
Organisation
The FAQ is divided into four sections: General, User, Author, and Developer. The questions are numbered independently within each section. As the numbering may change with each version, comments and suggestions should refer to the version number (see above) as well as the Section and Question Number.

Please submit bug reports, suggestions for improvement, and other comments relating to this FAQ only to the maintainer at pflynn@ucc.ie. Comments about the XML Specification itself and related specifications should be directed to the W3C.

Availability
This is the first entirely XML version: it was delayed due to (human) difficulties about which DTD was most suitable. I finally picked QAML for its simplicity over DocBook, but it has meant a few changes in the internal subset (see the XML file) and a change in the content model for span to allow embedded links.

The XML master is at http://www.ucc.ie/xml/faq.xml. You can download it in text-mode as well;
The HTML version is at http://www.ucc.ie/xml/index.html;
A plaintext (ASCII) version is at http://www.ucc.ie/xml/faq.txt. A notification of the plaintext version is occasionally posted to comp.text.xml for the archives.
For printed copies there are versions for A4 PostScript, A4 PDF, Letter PostScript and Letter PDF configurations available. Viewers can be downloaded for PostScript and PDF formats.
WAP (if anyone's still using it), OEB (eBook) and cHTML versions are in development for your handheld devices.
The FAQ is also available in carbon-based toner on flattened dead trees by sending US$10 (or equivalent) to the editor (email first to check currency and postal address).
Translations (those I know about) are at:

Japanese: http://www.fxis.co.jp/DMS/sgml/cafe/library/etc/xmlfaq.html [Murata Makoto];
Spanish: http://slug.ctv.es/~olea/sgml-esp/xfaq15.html [Jaime Sagarduy];
Korean: http://xml.t2000.co.kr/faq/index.html [Kangchan Lee];
Chinese: http://zxd.webjump.com/xml.html [Neko] and http://weblab.crema.unimi.it/xmlzh/XML_FAQ.htm; [Jiang Luqin]
French: http://www.gutenberg.eu.org/pub/GUTenberg/publications/HTML/FAQXML/faqxml-fr.html [Jacques André];
Czech: http://zvon.vscht.cz/ZvonHTML/Translations/xmlFAQ/front_all.html [Miloslav Nic];
You can download the XML logo as a GIF, JPG, or EPS file; and an icon for your file system in ICO (Microsoft Windows), Mac, or XPM (X Window system) format.
List of Questions

A.1. What is XML?
A.2. What is XML for?
A.3. What is SGML?
A.4. What is HTML?
A.5. Aren't XML, SGML, and HTML all the same thing?
A.6. Who is responsible for XML?
A.7. Why is XML such an important development?
A.8. Why not just carry on extending HTML?
A.9. Why do we need all this SGML stuff? Why not just use Word or Notes?
A.10. Where do I find more information about XML?
A.11. Where can I discuss implementation and development of XML?
A.12. What is the difference between XML and C or C++?

B.1. What do I have to do to use XML?
B.2. Why should I use XML instead of HTML?
B.3. Where can I get an XML browser?
B.4. Do I have to switch from SGML or HTML to XML?

C.1. Does XML replace HTML?
C.2. Do I have to know HTML or SGML before I learn XML?
C.3. What does an XML document look like inside?
C.4. How does XML handle white-space in my documents?
C.5. Which parts of an XML document are case-sensitive?
C.6. How can I make my existing HTML files work in XML?
C.7. Is there an XML version of HTML?
C.8. If XML is just a subset of SGML, can I use XML files directly with existing SGML tools?
C.9. I'm used to authoring and serving HTML. Can I learn XML easily?
C.10. Can XML use non-Latin characters?
C.11. What's a Document Type Definition (DTD) and where do I get one?
C.12. How do I create my own DTD?
C.13. Does XML let me make up my own tags?
C.14. I keep hearing about alternatives to DTDs. What's a schema?
C.15. How do I upload or download XML to/from a database?
C.16. How will XML affect my document links?
C.17. Can I do mathematics using XML?
C.18. How does XML handle metadata?
C.19. Can I use Java, ActiveX, etc in XML files?
C.20. Can I use Java to create or manage XML files?
C.21. How do I execute or run an XML file?
C.22. How do I control appearance?
C.23. How do I use graphics in XML?

D.1. Where's the spec?
D.2. What are these terms DTDless, valid, and well-formed?
D.3. Which should I use in my DTD, attributes or elements?
D.4. What else has changed between SGML and XML?
D.5. What's a namespace?
D.6. What XML software can I use today?
D.7. Do I have to change any of my server software to work with XML?
D.8. Can I still use server-side inclusions?
D.9. Can I (and my authors) still use client-side inclusions?
D.10. I'm trying to understand the XML Spec: why does XML have such difficult terminology?
D.11. Is there a Developer's API kit for XML?
D.12. How does XML fit with the DOM?
D.13. Is there a conformance test suite for XML processors?
D.14. How do I include one DTD (or fragment) in another?
D.15. I've already got SGML DTDs: how do I convert them for use with XML?
D.16. What's the story on XML and EDI?

A. General questions
A.1 What is XML?
XML is the Extensible Markup Language. It is designed to improve the functionality of the Web by providing more flexible and adaptable information identification.

It is called extensible because it is not a fixed format like HTML (a single, predefined markup language). Instead, XML is actually a `metalanguage' -- a language for describing other languages -- which lets you design your own customized markup languages for limitless different types of documents. XML can do this because it's written in SGML, the international standard metalanguage for text markup systems (ISO 8879).

Back to Index

A.2 What is XML for?
XML is intended `to make it easy and straightforward to use SGML on the Web: easy to define document types, easy to author and manage SGML-defined documents, and easy to transmit and share them across the Web.'

It defines `an extremely simple dialect of SGML which is completely described in the XML Specification. The goal is to enable generic SGML to be served, received, and processed on the Web in the way that is now possible with HTML.'

`For this reason, XML has been designed for ease of implementation, and for interoperability with both SGML and HTML'

[Quotes are from the XML specification]. XML is not just for Web pages: it can be used to store any kind of structured information, and to enclose or encapsulate information in order to pass it between different computing systems which would otherwise be unable to communicate.

Back to Index

A.3 What is SGML?
SGML is the Standard Generalized Markup Language (ISO 8879:1985), the international standard for defining descriptions of the structure of different types of electronic document. There is an SGML FAQ at http://www.infosys.utas.edu.au/info/sgmlfaq.txt which is posted every month to the comp.text.sgml newsgroup, and the SGML Web pages are at http://xml.coverpages.org/.

SGML is very large, powerful, and complex. It has been in heavy industrial and commercial use for over a decade, and there is a significant body of expertise and software to go with it. XML is a lightweight cut-down version of SGML which keeps enough of its functionality to make it useful but removes all the optional features which make SGML too complex to program for in a Web environment.

ISO standards like SGML are governed by the International Organization for Standardization in Geneva, Switzerland, and voted into or out of existence by representatives from every country's national standards body.

If you have a query about an international standard, you should contact your national standards body for the name of your country's representative on the relevant ISO committee or working group.

If you have a query about your country's representation in Geneva or about the conduct of your national standards body, you should contact the relevant government department in your country, or speak to your public representative.

The representation of countries at the ISO is not a matter for this FAQ. Please do not submit queries to the editor about how or why your ISO representatives have or have not voted on a specific standard.

Back to Index

A.4 What is HTML?
HTML is the HyperText Markup Language (RFC 1866), a small application of SGML used on the Web.

It defines a very simple class of report-style documents, with section headings, paragraphs, lists, tables, and illustrations, with a few informational and presentational items, and some hypertext and multimedia. See the question on extending HTML. There is also an XML version of HTML.

Back to Index

A.5 Aren't XML, SGML, and HTML all the same thing?
Not quite; SGML is the mother tongue, and has been used for describing thousands of different document types in many fields of human activity, from transcriptions of ancient Irish manuscripts to the technical documentation for stealth bombers, and from patients' clinical records to musical notation. SGML is very large and complex, however, and probably overkill for most common applications.

XML is an abbreviated version of SGML, to make it easier for you to define your own document types, and to make it easier for programmers to write programs to handle them. It omits all the options, and most of the more complex and less-used parts of SGML in return for the benefits of being easier to write applications for, easier to understand, and more suited to delivery and interoperability over the Web. But it is still SGML, and XML files may still be processed in the same way as any other SGML file (see the question on XML software).

HTML is just one of the SGML or XML applications, the one most frequently used in the Web.

Technical readers may find it more useful to think of XML as being SGML-- rather than HTML++.

Back to Index

A.6 Who is responsible for XML?
XML is a project of the World Wide Web Consortium (W3C), and the development of the specification is being supervised by their XML Working Group. A Special Interest Group of co-opted contributors and experts from various fields contributed comments and reviews by email.

XML is a public format: it is not a proprietary development of any company. The v1.0 specification was accepted by the W3C as Recommendation on Feb 10, 1998.

Back to Index

A.7 Why is XML such an important development?
It removes two constraints which were holding back Web developments:

dependence on a single, inflexible document type (HTML);
the complexity of full SGML, whose syntax allows many powerful but hard-to-program options.
XML simplifies the levels of optionality in SGML, and allows the development of user-defined document types on the Web.

Back to Index

A.8 Why not just carry on extending HTML?
HTML is already overburdened with dozens of interesting but incompatible inventions from different manufacturers, because it provides only one way of describing your information.

XML allows groups of people or organizations to create their own customized markup applications for exchanging information in their domain (music, chemistry, electronics, hill-walking, finance, surfing, petroleum geology, linguistics, cooking, knitting, stellar cartography, history, engineering, rabbit-keeping, mathematics, genealogy, etc).

HTML is at the limit of its usefulness as a way of describing information, and while it will continue to play an important role for the content it currently represents, many new applications require a more robust and flexible infrastructure.

Back to Index

A.9 Why do we need all this SGML stuff? Why not just use Word or Notes?
Information on a network which connects many different types of computer has to be usable on all of them. Public information cannot afford to be restricted to one make or model or manufacturer, or to cede control of its data format to private hands. It is also helpful for such information to be in a form that can be reused in many different ways, as this can minimize wasted time and effort. Proprietary data formats, no matter how well documented or publicized, are simply not an option: their control still resides in private hands and they can be changed or withdrawn arbitrarily without notice.

SGML is the international standard for defining this kind of application, but those who need an alternative based on different software for other purposes are entirely free to implement similar services using such a system, especially if they are for private use.

Back to Index

A.10 Where do I find more information about XML?
Online, there's the XML Specification and ancillary documentation available from the W3C; Robin Cover's SGML/XML Web pages with an extensive list of online reference material and links to software; and a summary and condensed FAQ from Tim Bray.

The items listed below are the ones I have been told about. Please mail me if you come across others.

An annual XML Conference is run by the Graphic Communications Association. XML 2001 is in Orlando, Florida, on December 9-14. See the GCA's Web site for details.
The Extreme Markup Languages 2001 conference takes place on 12-17 August at Le Centre Sheraton, Montréal, Canada.
The annual XML Summer School takes place in Oxford on 20-25 July 2001.
There are many other XML events around the world: most of them announced on the mailing lists and newsgroups.

There are lists of books, articles, and software for XML in Robin Cover's SGML and XML Web pages. That site should always be your first port of call: please look there first before using the form in this FAQ to ask about software or documentation.

Back to Index

A.11 Where can I discuss implementation and development of XML?
The two principal online media are the Usenet newsgroups and the mailing lists. The newsgroups are comp.text.xml and to a certain extent comp.text.sgml. Ask your Internet Provider how to access these, or use a Web interface like Google.

The general-purpose mailing list for public discussion is XML-L: to subscribe, visit the Web site and click on the link to join. You can also access the XML-L archives from the same URL.
For those developing components for XML there is an xml-dev mailing list. You can subscribe by sending a 1-line mail message to xml-dev-request@lists.xml.org saying just SUBSCRIBE. The xml-dev archives are at OASIS http://lists.xml.org/archives/xml-dev/. Note that this list is for those people actively involved in developing resources for XML. It is not for general information about XML (see this FAQ and other sources) or for general discussion about XML implementation and resources (see below).
There is a list for discussing XSL, the stylesheet language: XSL-List. For details of how to subscribe, see http://www.mulberrytech.com/xsl/xsl-list.
Andrew Watt writes that there is a mailing list specifically for XSL-FO only, on eGroups.com. You can subscribe by sending a message to XSL-FO-subscribe@egroups.com.
When you join a mailing list you will be sent details of how to use it. Please Read The Fine Documentation because it contains important information, particularly about what to do if your company or ISP changes your email address.

Please note that there is a lot of inaccurate and misleading information published in print and on the Web about subscribing to mailing lists. Don't guess: read the documentation.

Mailing lists in other languages
Gianni Rubagotti writes: A new Italian mailing list about XML is born: to subscribe, send a mail message without a subject line but with text saying subscribe XML-IT to majordomo@ananas.usr.dsi.unimi.it. Everyone, Italian or not, who wants to debate about XML in our tongue is welcome.
JP Theberge writes: A French mailing list about XML has been created. To subscribe, send subscribe to xml-request@trisome.com.
Jarno Elovirta writes: a Finnish mailing list about XML has been set up. To subscribe, send an email to majordomo@evitech.fi with subscribe XML-Fin in the message body. The list is also hypermailed for online reference at http://users.evitech.fi/lists/xml-fin/.
Back to Index

A.12 What is the difference between XML and C or C++?
C and C++ (and other languages like FORTRAN, or Pascal, or BASIC, or Java or dozens more) are programming languages with which you specify calculations, actions, and decisions to be carried out in order:

mod curconfig[if left(date,6) = "01-Apr", t.put "April Fool!",
f.put days('31102001','DDMMYYYY')-days(sdate,'DDMMYYYY')
" shopping days to Samhain"];
XML is a markup specification language with which you can design ways of describing information (text or data), usually for storage, transmission, or processing by a program: it says nothing about what you should do with the data (although your choice of element names may hint at what they are for):

<part num="DA42" models="LS AR DF HG KJ" update="2001-11-22">
<name>Camshaft end bearing retention circlip</name>
<image drawing="RR98-dh37" type="SVG" x="476" y="226"/>
<maker id="RQ778">Ringtown Fasteners Ltd</maker>
<notes>Angle-nosed insertion tool <tool id="GH25"/> is
required for the removal and replacement of this item.</notes>
</part>
On its own, an SGML or XML file (and HTML) doesn't do anything. It's a data format which just sits there until you run a program which does something with it. See also the question about how to run or execute XML files.

Back to Index

B. Existing users of SGML (including HTML: everyone who browses the Web)
B.1 What do I have to do to use XML?
For the average user of the Web, nothing except use a browser which works with XML (see the question about browsers). Remember some XML components are still being implemented, so some features are still either undefined or have yet to be written. Don't expect everything to work yet!

You can use XML browsers to look at some of the stable XML material, such as Jon Bosak's Shakespeare plays and the molecular experiments of the Chemical Markup Language (CML). There are some more example sources listed at http://xml.coverpages.org/xml.html#examples, and you will find XML (particularly in the disguise of XHTML) being introduced in places where it won't break older browsers.

If you want to start preparations for creating your own XML files, see the questions in the Authors' Section and the Developers' Section.

Back to Index

B.2 Why should I use XML instead of HTML?
Authors and providers can design their own document types using XML, instead of being stuck with HTML. Document types can be explicitly tailored to an audience, so the cumbersome fudging that has to take place with HTML can become a thing of the past: authors and designers are free to invent their own markup elements;
Information content can be richer and easier to use, because the descriptive and hypertext linking abilities of XML are much greater than those of HTML.
XML can provide more and better facilities for browser presentation and performance, using CSS and XSL stylesheets;
It removes many of the underlying complexities of SGML in favor of a more flexible model, so writing programs to handle XML is much easier than doing the same for full SGML.
Information will be more accessible and reusable, because the more flexible markup of XML can be used by any XML software instead of being restricted to specific manufacturers as has become the case with HTML.
Valid XML files are kosher SGML, so they can be used outside the Web as well, in existing SGML environments.
Back to Index

B.3 Where can I get an XML browser?
Remember the XML specification is still relatively new, so a lot of what you see now is experimental, and because the potential number of different XML applications is unlimited, no single browser can be expected to handle 100% of everything.

Some of the generic parts of XML (eg parsing, tree management, searching, formatting, etc) are being combined into general-purpose libraries or toolkits to make it easier for developers to take a consistent line when writing XML applications. Such applications can then be customized by adding semantics for specific markets, or using languages like Java to develop plugins for generic browsers and have the specialist modules delivered transparently over the Web.

MSIE5.5 handles XML but currently still renders it via the HTML model. Microsoft were also the architects of a hybrid (invalid) solution (islands) in which you could embed fragments of XML in HTML files because current HTML-only browsers simply ignored element markup which they didn't recognize, but his has now been superseded by XHTML. MSIE includes an implementation of an obsolete draft of XSLT (WD-xsl): you need to upgrade it and replace the parser (see http://www.netcrucible.com/ for details).
The publicly-released Netscape code (Mozilla) and the almost indistinguishable Netscape 6 (there is no v5) have XML/CSS support, based on James Clark's expat XML parser, and this seems to be more robust, if less slick, than MSIE. Mozilla 0.9 is reported to have some XSLT capability.
The authors of the former MultiDoc Pro SGML browser, CITEC, joined forces with Mozilla to produce a multi-everything browser called DocZilla, which reads HTML, XML, and SGML, with XSL and CSS stylesheets. This runs under NT and Linux and is currently still in the alpha stage. See http://www.doczilla.com for details. This is by far the most ambitious browser project, and is backed by solid SGML expertise, but seems to be rather a long time coming.
Opera now supports XML and CSS on MS-Windows and Linux and is the most complete implementation so far. The browser size is tiny by comparison with the others, but features are good and the speed is excellent, although the earlier slavish insistence on mimicking everything Netscape did, especially the bugs, still shows through in places.
See also the notes on software for authors and developers, and the more detailed list on the XML pages in the SGML Web site at http://xml.coverpages.org/.

Back to Index

B.4 Do I have to switch from SGML or HTML to XML?
No, existing SGML and HTML applications software will continue to work with existing files. But as with any enhanced facility, if you want to view or download and use XML files, you will need to use XML-aware software. There is much more being developed for XML than there ever was for SGML, so a lot of users are moving.

Back to Index

C. Authors of SGML (including writers of HTML: Web page owners)
C.1 Does XML replace HTML?
No. XML itself does not replace HTML: instead, it provides an alternative which allows you to define your own set of markup elements. HTML is expected to remain in common use for some time to come, and a Document Type Definition for HTML is available in XML syntax as well as in original SGML. XML is designed to make the writing of DTDs much simpler than with full SGML. (See the question on DTDs for what one is and why you might want one.)

Back to Index

C.2 Do I have to know HTML or SGML before I learn XML?
No, although it's useful because a lot of XML terminology and practice derives from 15 years' experience of SGML.

Be aware that `knowing HTML' is not the same as `understanding SGML' . Although HTML was written as an SGML application, browsers ignore most of it (which is why so many useful things don't work), so just because something is done a certain way in HTML browsers does not mean it's correct, least of all in XML.

Back to Index

C.3 What does an XML document look like inside?
The basic structure is very similar to most other applications of SGML, including HTML. XML documents can be very simple, with no document type declaration (DTD), and straightforward nested markup of your own design:

<?xml version="1.0" standalone="yes"?>
<conversation>
<greeting>Hello, world!</greeting>
<response>Stop the planet, I want to get off!</response>
</conversation>
Or they can be more complicated, with a DTD specified (see the question on document types), and maybe an internal subset (local DTD changes in [square brackets]), and a more complex structure:

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE titlepage SYSTEM "http://www.foo.bar/dtds/typo.dtd"
[<!ENTITY % active.links "INCLUDE">]>
<titlepage id="BG12273624">
<white-space type="vertical" amount="36"/>
<title font="Baskerville" size="24/30"
alignment="centered">Hello, world!</title>
<white-space type="vertical" amount="12"/>
<!-- In some copies the following decoration is
hand-colored, presumably by the author -->
<image location="http://www.foo.bar/fleuron.eps"
type="URL" alignment="centered"/>
<white-space type="vertical" amount="24"/>
<author font="Baskerville" size="18/22"
style="italic">Vitam capias</author>
<white-space type="vertical" class="filler"/>
</titlepage>
Or they can be anywhere between: a lot will depend on how you want to define your document type (or whose you use) and what it will be used for.

Back to Index

C.4 How does XML handle white-space in my documents?
The SGML rules regarding white-space have been changed for XML. All white-space, including linebreaks, TAB characters, and regular spaces, even between those elements where no text can ever appear, is passed by the parser unchanged to the application (browser, formatter, viewer, converter, etc), identifying the context in which the white-space was found (element content, data content, or mixed content). This means it is the application's responsibility to decide what to do with such space, not the parser's:

insignificant white-space between structural elements (space which occurs where only element content is allowed, ie between other elements, where text data never occurs) will get passed to the application (in SGML this white-space gets suppressed, which is why you can put all that extra space in HTML documents and not worry about it. This is not so in XML);
significant white-space (space which occurs within elements which can contain text and markup mixed together, usually mixed content or PCDATA) will still get passed to the application exactly as under SGML. It is the application's responsibility to handle it correctly.
<chapter>
<title>
My title for Section
1.
</title>
<p>
text
</p>
</chapter>
The parser must inform the application that white-space has occurred in element content, if it can detect it. (Users of SGML will recognize that this information is not in the ESIS, but it is in the grove.) In the above example, the application will receive all the pretty-printing linebreaks, TABs, and spaces between the elements as well as those embedded in the chapter title. It is the function of the application, not the parser, to decide which type of white-space to discard and which to retain.

Back to Index

C.5 Which parts of an XML document are case-sensitive?
All of it, both markup and text. This is significantly different from HTML and most other SGML applications. It was done to allow markup in non-Latin-alphabet languages and to obviate problems with case-folding in scripts which are caseless.

Element type names are case-sensitive: you must stick with whatever combination of upper- or lower-case you use to define them (either by first usage or in a DTD). So you can't say <BODY>...<body>: upper- and lower-case must match; thus <IMG/> and <img/> are two different element types;
For well-formed files with no DTD, the first occurrence of an element type name defines the casing;
Attribute names are also case-sensitive, on a per-element basis: for example <PIC width="7in"/> and <PIC WIDTH="6in"/> in the same file exhibit two separate attributes, because the different casings of width and WIDTH distinguish them;
Attribute values are also case-sensitive. CDATA values (eg HRef="MyFile.SGML") always have been, but ID and IDREF attributes are now case-sensitive as well;
All entity names (&Aacute;), and your data content (text), are case-sensitive as always.
Back to Index

C.6 How can I make my existing HTML files work in XML?
Either convert them to conform to some new document type (with or without a DTD) and write a stylesheet to go with them; or edit them to conform to XHTML.

It is necessary to convert existing HTML files because XML does not permit end-tag minimization (missing </p>, etc), unquoted attribute values, and a number of other shortcuts which are normal in most HTML DTDs. However, many HTML authoring tools already produce almost (but not quite) well-formed XML. As a preparation for XML, the W3C's HTML Tidy program can clean up some of the formatting mess left behind by inadequate HTML editors, and even separate out some of the formatting to a stylesheet, but there is usually still some hand-editing to do.

Back to Index

Converting to a new document type
If you want to move your files out of HTML into some other DTD entirely, there are already many native XML application DTDs, and several XML versions of popular SGML DTDs like TEI and DocBook to choose from. There is a pilot site run by CommerceNet (http://www.xmlx.com/) for the exchange of XML DTDs.

Alternatively you could just make up your own markup: so long as it makes sense and you create a well-formed file, you should be able to write a CSS or XSLT stylesheet and have your document displayed in a browser.

Back to Index

Converting valid HTML to XHTML
If your HTML files are valid (full formal validation with an SGML parser, not just a simple syntax check), then try validating them as XHTML. If you have been creating clean HTML without embedded formatting then this process should throw up only mismatches in upper/lowercase element and attribute names, and empty elements (plus perhaps the odd non-standard element type name if you use them). Simple hand-editing or a short script should be enough to fix these changes.

If your HTML validly uses end-tag omission, this can be fixed automatically by a normalizer program like sgmlnorm (part of SP) or by the sgml-normalize function in an editor like Emacs/psgml (don't be put off by the names, they both do XML).

If you have a lot of valid HTML files, could write a script to do this in a programming language which understands SGML/XML markup (such as Omnimark, Balise, SGMLC, or a system using one of the SGML libraries for Perl, Python, or Tcl), or you could even use editor macros if you know what you're doing.

Back to Index

Converting invalid HTML to well-formed XHTML
If your files are invalid HTML (95% of the Web) they can be converted to well-formed DTDless files as follows:

replace the DOCTYPE Declaration with the XML Declaration <?xml version="1.0" standalone="yes" encoding="iso-8859-1"?>. If there was no DOCTYPE Declaration, just prepend the XML Declaration.
change any EMPTY elements (eg every <ISINDEX>, <BASE>, <META>, <LINK>, <NEXTID> and <RANGE> in the header, and every <IMG>, <BR>, <HR>, <FRAME>, <WBR>, <BASEFONT>, <SPACER>, <AUDIOSCOPE>, <AREA>, <PARAM>, <KEYGEN>, <COL>, <LIMITTEXT>, <SPOT>, <TAB>, <OVER>, <RIGHT>, <LEFT>, <CHOOSE>, <ATOP>, and <OF> in the body of the document) so that they end with /> instead, for example <img src="mypic.gif" alt="Picture"/>;
make all element names and attribute names lowercase;
ensure there are correctly-matched explicit end-tags for all non-empty elements; eg every <p> must have a </p>, etc;
escape all < and & non-markup (ie literal text) characters as &lt; and &amp; respectively (there shouldn't be any isolated &lt; characters to start with);
ensure all attribute values are in quotes.
Be aware that many HTML browsers may not accept XML-style EMPTY elements with the trailing slash, so the above changes may not be backwards-compatible. An alternative is to add a dummy end-tag to all EMPTY elements, so <IMG src="foo.gif"/> becomes <img src="foo.gif"></img>. This is still valid XML provided you guarantee never to put any text content in such elements. Adding a space before the slash (eg <img src="foo.gif" />) may also fool older browsers into accepting XHTML as HTML.

If your HTML files fall into this category (HTML created by some WYSIWYG editors is frequently invalid) then they will almost certainly have to be converted manually, although if the deformities are regular and carefully constructed, the files may actually be almost well-formed, and you could write a program or script to do as described above. The oddities you may need to check for include:

do the files contain markup syntax errors? For example, are there any missing angle-brackets, backslashes instead of forward slashes on end-tags, or elements which nest incorrectly (eg <B>an element starting <I>inside another</B> but ending outside</I>)?
are there any URLs (eg in hrefs or srcs) which use backslashes instead of forward slashes?
do the files contain markup which conflicts with HTML DTDs, such as headings or lists inside paragraphs, list items outside list environments, header elements like <base>preceding the first <html>, etc?
do the files use imaginary elements which are not in any known HTML DTD? (large amounts of these are used in proprietary markup systems masquerading as HTML). Although this is easy to transform to a DTDless well-formed file (because you don't have to define elements in advance) most proprietary or browser-specific extensions have never been formally defined, so it is often impossible to work out meaningfully where the element types can be used.
Are there any non-ISO Latin-1 (8859-1) characters or wrongly-coded characters in your files? Look especially for native Apple Mac characters left by careless designers, or any of the illegal characters (the 32 characters at decimal codes 128-159 inclusive) inserted by MS-Windows editors. These need to be converted to the correct characters in ISO 8859-1 or the relevant plane of Unicode (and the XML Declaration should show iso-8859-1 encoding unless you specifically know otherwise).
Do your files contain malformed (Mosaic/Netscape-style) comments? Comments must look <!-- like this --> with double-dashes each end and no double dashes in between (safest: no multiple dashes in between).
If you answer Yes to any of these, you can save yourself a lot of grief by fixing those problems first before doing anything else. You will likely then be getting close to having well-formed files.

Markup which is syntactically correct but semantically meaningless or void should be edited out before conversion. Examples are spacing devices such as repeated empty paragraphs or linebreaks, empty tables, invisible spacing GIFs etc: XML uses stylesheets, so you won't need any of these.

Unfortunately there is rather a lot of work to do if your files are invalid: this is why many professional Webmasters will always insist that only valid or well-formed files are used (and why you should instruct designers to do the same), in order to avoid unnecessary manual maintenance and conversion costs later.

Back to Index

C.7 Is there an XML version of HTML?
The W3C has released XHTML as `a reformulation of HTML 4 in XML 1.0' . This specification defines HTML as an XML application, and provides three DTDs corresponding to the ones defined by HTML 4.0. The semantics of the elements and their attributes are as defined in the W3C Recommendation for HTML 4.0. These semantics provide the foundation for future extensibility of XHTML. Compatibility with existing HTML user agents is possible by following a small set of guidelines.

Back to Index

C.8 If XML is just a subset of SGML, can I use XML files directly with existing SGML tools?
Yes, provided you use up-to-date SGML software which knows about the WebSGML Adaptations to ISO 8879 (the features needed to support XML, such as the variant form for EMPTY elements; some aspects of the SGML Declaration such as NAMECASE GENERAL NO; multiple attribute token list declarations, etc).

An alternative is to use an SGML DTD to let you create a fully-normalised SGML file, but one which does not use empty elements; and then remove the DocType Declaration so it becomes a well-formed DTDless XML file.

Most SGML tools now handle XML files well, and provide an option switch between the two standards. (see the pointers in the question on software).

Back to Index

C.9 I'm used to authoring and serving HTML. Can I learn XML easily?
Yes, very easily, but at the moment there is still a need for tutorials, simpler tools, and more examples of XML documents. Well-formed XML documents may look similar to HTML except for some small but very important points of syntax.

The big practical difference is that XML has to stick to the rules. HTML browsers let you serve them broken or corrupt HTML because they don't do a formal parse but elide all the broken bits instead. With XML your files have to be correct or they simply won't work at all. One outstanding problem is that some browsers claiming XML conformance are also broken. Try yours on the test file at http://www.ucc.ie/test.xml.

Back to Index

C.10 Can XML use non-Latin characters?
Yes, the XML Specification explicitly says XML uses ISO 10646, the international standard 31-bit character repertoire which covers most human (and some non-human) languages. This is currently congruent with Unicode and is planned to be superset of Unicode.

The spec says (2.2): `All XML processors must accept the UTF-8 and UTF-16 encodings of ISO 10646...' . UTF-8 is an encoding of Unicode into 8-bit characters: the first 128 are the same as ASCII, the rest are used to encode the rest of Unicode into sequences of between 2 and 6 bytes. UTF-8 in its single-octet form is therefore the same as ISO 646 IRV (ASCII), so you can continue to use ASCII for English or other unaccented languages using the Latin alphabet. Note that UTF-8 is incompatible with ISO 8859-1 (ISO Latin-1) after code point 126 decimal (the end of ASCII). UTF-16 is an encoding of Unicode into 16-bit characters, which lets it represent the next two planes. UTF-16 is incompatible with ASCII because it uses two 8-bit bytes per character.

`...the mechanisms for signalling which of the two are in use, and for bringing other encodings into play, are [...] in the discussion of character encodings.' The XML Specification explains how to specify in your XML file which coded character set you are using.

Use of UCS-4 can only legally be specified in SGML or XML when the WebSGML Adaptations to ISO 8879 are implemented: this enables numbers longer than eight digits to be used in the SGML Declaration.

`Regardless of the specific encoding used, any character in the ISO 10646 character set may be referred to by the decimal or hexadecimal equivalent of its bit string' : so no matter which character set you personally use, you can still refer to specific individual characters from elsewhere in the encoded repertoire by using &#dddd; (decimal character code) or &#xHHHH; (hexadecimal character code, in uppercase). The terminology can get confusing, as can the numbers: see the ISO 10646 Concept Dictionary. Rick Jelliffe has XML-ized the ISO character entity sets. Mike Brown's encoding information at http://skew.org/xml/tutorial/ is a very useful explanation of the need for correct encoding. There is an excellent online database of glyphs and characters in many encodings from the Estonian Language Institute server at http://www.eki.ee/letter/.

Back to Index

C.11 What's a Document Type Definition (DTD) and where do I get one?
A DTD is a formal description in XML Declaration Syntax of a particular type of document. It sets out what names are to be used for the different types of element, where they may occur, and how they all fit together. For example, if you want a document type to be able to describe Lists which contain Items, the relevant part of your DTD might contain something like this:

<!ELEMENT List (Item)+>
<!ELEMENT Item (#PCDATA)>
This defines a list as an element type containing one or more items (that's the plus sign); and it defines items as element types containing just plain text (Parsed Character Data or PCDATA). Validating parsers read the DTD before they read your document so that they can identify where every element type ought to come and how each relates to the other, so that applications which need to know this in advance (most editors, search engines, navigators, databases) can set themselves up correctly. The example above lets you create lists like:

<List><Item>Chocolate</Item><Item>Music</Item><Item>Surfing</Item></List>
How the list appears in print or on the screen depends on your stylesheet: you do not normally put anything in the XML to control formatting like you had to do with HTML before stylesheets. This way you can change style easily without ever having to edit the document itself.

A DTD provides applications with advance notice of what names and structures can be used in a particular document type. Using a DTD when editing files means you can be certain that all documents which belong to a particular type will be constructed and named in a consistent and conformant manner. DTDs are less important for processing documents already known to be well-formed, but they are still needed if you want to take advantage of XML's special attribute types like the built-in ID/IDREF cross-reference mechanism.

There are thousands of DTDs already in existence in all kinds of areas (see the SGML/XML Web pages for pointers). Many of them can be downloaded and used freely; or you can write your own (see the question on creating your own DTD. Existing SGML DTDs need to be converted to XML for use with XML systems: read the question on converting SGML DTDs to XML, and expect to see announcements of popular DTDs becoming available in XML format.

Back to Index

C.12 How do I create my own DTD?
You need to use the XML Declaration Syntax (very simple: declaration keywords begin with <! rather than just the open angle bracket, and the way the declarations are formed also differs slightly). Here's an example of a DTD for a shopping list, based on the fragment used in an earlier question:

<!ELEMENT Shopping-List (Item)+>
<!ELEMENT Item (#PCDATA)>
It says that there shall be an element called Shopping-List and that it shall contain elements called Item: there must be at least one (that's the plus sign) but there may be more than one. It also says that the Item element may contain parsed character data (PCDATA, ie text).

Because there is no other element which contains Shopping-List, that element is assumed to be the `root' element, which encloses everything else in the document. You can now use it to create an XML file: give your editor the declarations:

<?xml version="1.0"?>
<!DOCTYPE Shopping-List SYSTEM "shoplist.dtd">
(assuming you put the DTD in that file). Now your editor will let you create files according to the pattern:

<Shopping-List>
<Item>Chocolate</Item>
<Item>Sugar</Item>
<Item>Butter</Item>
</Shopping-List>
It is possible to develop complex and powerful DTDs of great subtlety, but for any significant use you should learn more about document systems analysis and document type design. See for example Developing SGML DTDs by Maler and el Andaloussi, Prentice Hall, 1997, 0-13-309881-8, which was written for SGML, but perhaps 95% of it applies to XML as well, as XML is much simpler than full SGML -- see the list of restrictions which shows what has been cut out.

Back to Index

C.13 Does XML let me make up my own tags?
No, it lets you make up names for your own elements. If you think tags and elements are the same thing you are already in trouble: read the rest of this question carefully.

Before we start this one, Bob DuCharme notes: Don't confuse the term `tag' with the term `element' . They are not interchangeable. An element usually contains two different kinds of tag: a start-tag and an end-tag, with text or more markup between them.

XML lets you decide which elements you want in your document and then indicate your element boundaries using the appropriate start- and end-tags for those elements. Each <!ELEMENT... declaration defines a class of elements that may or may not be used in a document conforming to that DTD. We call this class of elements an `element type' . Just as the HTML DTD includes the H1 and P element types, your document can have color and price element types.

Non-empty elements are made up of a start-tag, the element's content, and an end-tag. <color>red</color> is a complete instance of the color element. <color> is only the start-tag of the element, showing where it begins; it is not the element itself.

Empty elements are a special case that may be represented either as a pair of start- and end-tags with nothing between them (eg <price retail="123"></price>) or as a single empty element start-tag that has a closing slash to tell the parser `don't go looking for an end-tag to match this' (eg <price retail="123"/>). [Bob DuCharme]

Back to Index

C.14 I keep hearing about alternatives to DTDs. What's a schema?
A DTD is for specifying the structure (only) of an XML file: it gives the names of the elements, attributes, and entities that can be used, and how they fit together. Because DTDs were designed for use with traditional text documents, they have no mechanism for defining the content of elements in terms of data types, because XML has no data types: text is just text. A DTD therefore cannot be used to specify numeric ranges or to define limitations or checks on the text content, only on the markup that surrounds it.

The XML Schema recommendation provides a means of specifying element content in terms of data types, so that document type designers can provide criteria for validating the content of elements as well as the markup itself. Schemas are written as XML files, thus avoiding the need for processing software to be able to read XML Declaration Syntax, which is different from XML Instance Syntax.

Schemas are now a formal Recommendation, and a number of sites are serving useful applications as both DTDs and Schemas, eg http://www.schema.net and http://www.dtd.com. There is a separate Schema FAQ at http://www.schemavalid.com. The term `vocabulary' is sometimes used to refer to `DTDs and Schemas' together.

Authors and publishers should note that the plural of Schema is Schemas: the use of the singular to do duty for the plural is a foible dear to the semi-literate; the use of the old (Greek) plural schemata is now unnecessary didacticism. Writers should also note that the plural of DTD is DTDs: there is no apostrophe.

Bob DuCharme adds: Many XML developers were dissatisfied with the syntax of the markup declarations described in the XML spec for two reasons. First, they felt that if XML documents were so good at describing structured information, then the description of a document type's own structure (its schema) should be in an XML document instead of written with its own special syntax. In addition to being more consistent, this would make it easier to edit and manipulate the schema with regular document manipulation tools. Secondly, they felt that traditional DTD notation didn't allow document type designers the power to impose enough constraints on the data -- for example, the ability to say that a certain element type must always have a positive integer value, that it may not be empty, or that it must be one of a list of possible choices. This eases the development of software using that data because the developer has less error-checking code to write.

Back to Index

C.15 How do I upload or download XML to/from a database?
Ask your database manufacturer: they all provide XML import and export modules. In some trivial cases there will be a 1:1 match between field and element types; in most cases some programming is required to establish the matches, but this can usually be stored as a procedure so that subsequent uses are simply commands or calls with the relevant parameters.

Users from a database or computer science background should be aware that XML is not a database management system: it is a text markup system. While there are many similarities, some of the concepts of one are simply non-existent in the other: XML does not possess some database-like features in the same way that databases do not possess markup-like ones. It is a common error to believe that XML is a DBMS like Oracle or Access and therefore possesses the same facilities. It doesn't. [PF]

Back to Index

C.16 How will XML affect my document links?
The linking abilities of XML systems are much more powerful than those of HTML, so you'll be able to do much more with them. Existing HREF-style links will remain usable, but the new linking technology is based on the lessons learned in the development of other standards involving hypertext, such as TEI and HyTime, which let you manage bidirectional and multi-way links, as well as links to a span of text (within your own or other documents) rather than to a single point. These features have been available to SGML users for many years, so there is considerable experience and expertise available in using them.

The XML Linking Specification (XLink) and XML Extended Pointer Specification (XPointer) documents contain a detailed draft specification. An XML link can be either a URL or a TEI-style Extended Pointer (XPointer), or both. A URL on its own is assumed to be a resource; if an XPointer or XLink follows it, it is assumed to be a sub-resource of that URL; an XPointer on its own is assumed to apply to the current document (all exactly as with HTML).

An XLink is always preceded by one of #, ?, or |. The # and ? mean the same as in HTML applications; the | means the sub-resource can be found by applying the link to the resource, but the method of doing this is left to the application. An XPointer can only follow a #.

The TEI Extended Pointer Notation (EPN) is much more powerful than the fragment address on the end of some URLs, as it allows you to specify the location of a link end using the structure of the document as well as (or in addition to) known, fixed points like IDs. For example, the linked second occurrence of the word `XPointer' two paragraphs back could be referred to as http://www.ucc.ie/xml/faq.sgml#ID(hypertext).child(2,*).child(2,#element,'p').child(3,#element,'link'), meaning the third link element within the second paragraph within the second object in the element whose ID is hypertext (this question). Count the objects from the start of this question in the XML source (which has the ID hypertext):

the first child object is the title of the question (<q>);
the second child object is the answer (the <a> element);
within the <a> element go to the second paragraph;
count to the third link.
David Megginson has produced an xpointer function for Emacs/psgml which will deduce an XPointer for any location in an XML document.

Back to Index

C.17 Can I do mathematics using XML?
Yes, if the document type you use provides for math. The mathematics-using community is developing software, and there is a MathML Recommendation at the W3C, which is a native XML application. It would also be possible to make XML fragments from other DTDs, such as the long-expired HTML3, the near-obsolete HTML Pro, or ISO 12083 Math, or OpenMath, or one of your own making. Browsers which display some math embedded in SGML already exist (eg DynaText, Panorama, Multidoc Pro).

Back to Index

C.18 How does XML handle metadata?
Because XML lets you define your own markup language, you can make full use of the extended hypertext features (see the question on Links) of XML to store or link to metadata in any format (eg ISO 11179, Dublin Core, Warwick Framework, Resource Description Framework (RDF), and Platform for Internet Content Selection (PICS)).

There are no predefined elements in XML, because it is an architecture, not an application, so it is not part of XML's job to specify how or if authors should or should not implement metadata. You are therefore free to use any suitable method from simple attributes to the embedding of entire Dublin Core/Warwick Framework metadata records. Browser makers may also have their own architectural recommendations or methods to propose.

Back to Index

C.19 Can I use Java, ActiveX, etc in XML files?
This will depend on what facilities the browser makers implement. XML is about describing information; scripting languages and languages for embedded functionality are software which enables the information to be manipulated at the user's end, so these languages do not have any place in an XML file, but in stylesheets like XSL and CSS.

XML itself provides a way to define the markup needed to implement scripting languages: as a neutral standard it neither encourages not discourages their use, and does not favour one language over another, so the field is wide open.

Back to Index

C.20 Can I use Java to create or manage XML files?
Yes, any programming language can be used to output data from any source in XML format. There is a growing number of front-ends and back-ends for programming environments and data management environments to automate this.

There is a large body of `middleware' written in Java and other languages for managing data either in XML or with XML output. There is a suite of Java tutorials (with source code and explanation) available at http://developerlife.com.

Please do not mail the FAQ editor with questions about your Java programming bugs. Ask one of the Java newsgroups instead.
Back to Index

C.21 How do I execute or run an XML file?
You can't and you don't. XML is not a programming language, so XML files don't `run' or `execute' . XML is a markup specification language and XML files are data: they just sit there until you run a program which displays them (like a browser) or does some work with them (like a converter which writes the data in another format, or a database which reads the data), or modifies them (like an editor).

Back to Index

C.22 How do I control appearance?
In HTML, default styling is built into the browsers because the tagset of HTML is predefined and hardwired into browsers. IN XML, where you can define your own tagset, browsers cannot know what names you are going to use and what they will mean, so you need a stylesheet if you want to display the formatted text.

Browsers which read XML will accept and use a CSS stylesheet at a minimum, but you can also use the more powerful XSLT stylesheet language to transform your XML into HTML -- which browsers, of course, already know how to display (and that HTML can still use a CSS stylesheet).

As with any system where files can be viewed at random by arbitrary users, the author cannot know what resources (such as fonts) are on the user's system, so the same care is needed as with HTML using fonts. To invoke a stylesheet from an XML file, include one of the stylesheet declarations:

<?xml-stylesheet href="foo.xsl" type="text/xsl"?>
<?xml-stylesheet href="foo.css" type="text/css"?>
The Cascading Stylesheet Specification (CSS) provides a simple syntax for assigning styles to elements, and has been implemented in most browsers.

The Extensible Stylesheet Language (XSL) has been created for use specifically with XML. Dave Pawson maintains a comprehensive FAQ at http://www.dpawson.co.uk/xsl/xslfaq.html. XSL uses XML syntax (an XSL stylesheet is an XML file) and has widespread support from several major vendors (see the questions on browsers and other software) although current browser support is limited. XSL comes in two flavours:

XSL itself, which is a pure formatting language, and which needs a text formatter like FOP or PassiveTeX to create printable output (both can produce PDF). Currently I am not aware of any Web browsers which support XSL rendering;
XSLT (T for Transformation), which is a language to specify transformations of XML into HTML either inside the browser or at the server before transmission. It can also specify transformations from one vocabulary of XML to another, and from XML to plaintext.
Currently only MS Internet Explorer 5.5 handles XSLT inside the browser (and even that needs some post-installation surgery to remove the obsolete WD-xsl and replace it with the current XSL-Transform processor). But there is a growing use of server-side processors like Cocoon, which let you store your information in XML but serve it auto-converted to HTML, thus allowing the output to be used by any browser. XSLT is also widely used to transform XML into non-SGML formats for input to other systems (for example to transform XML into LaTeX for typesetting.

Back to Index

C.23 How do I use graphics in XML?
Graphics have traditionally just been links which happen to have a picture file at the end rather than another piece of text. They can therefore be implemented in any way supported by the XLink and XPointer specifications (see earlier question), including using similar syntax to existing HTML images. They can also be referenced using XML's built-in NOTATION and ENTITY mechanism in a similar way to standard SGML, as external unparsed entities.

The linking specifications, however, give you much better control over the traversal and activation of links, so an author can specify, for example, whether or not to have an image appear when the page is loaded, or on a click from the user, or in a separate window, without having to resort to scripting.

XML itself doesn't predict or restrict graphic file formats: GIF, JPG, TIFF, PNG, CGM, and SVG at a minimum would seem to make sense; however, vector formats are normally preferred for non-photographic images.

Back to Index

Using entities for images
You cannot embed a raw graphics file (or any other binary [non-text] data) directly into an XML file because any bytes happening to resemble markup would get misinterpreted: you must refer to it by linking (see below). It would, however, in theory be possible to include a text-encoded transformation of a binary file as a CDATA marked section, using something like UUencode with the markup characters ] and > removed from the map so that they could not occur and be misinterpreted, or even simple hexadecimal encoding as used in PostScript. For vector graphics, however, the solution is to use SVG (see below).

Bob DuCharme adds: All the data in an XML document entity must be parseable XML. You can define an external entity as either a parsed entity (parseable XML) or an unparsed entity (anything else). Unparsed entities can be used for picture files, sound files, movie files, or whatever you like. They can only be referenced from within a document as the value of an attribute (much like a bitmap picture on an HTML Web page is the value of the img element's src attribute) and not part of the actual document. In an XML document, this attribute must be declared to be of type ENTITY, and the entity's declaration must specify a declared NOTATION, because if the entity isn't XML, the XML processor needs to know what it is. For example, in the following document, the colliepic entity is declared to have a JPEG notation, and it's used as the value of the empty dog element's picfile attribute.

<?xml version="1.0"?>
<!DOCTYPE dog [
<!NOTATION JPEG SYSTEM "Joint Photographic Experts Group">
<!ENTITY colliepic SYSTEM "lassie.jpg" NDATA JPEG>
<!ELEMENT dog EMPTY>
<!ATTLIST dog picfile ENTITY #REQUIRED>
]>
<dog picfile="colliepic"/>
The XLink and XPointer linking specifications describe other ways to point to a non-XML file such as a graphic. These offer more sophisticated control over the external entity's position, handling, and appearance within the XML document

pi_1901843
*goh, dit topic laatdtdt steeds traget *

The Net Abuse FAQ
Last changed $Date: 1998/12/23 19:28:32 $, making this $Revision: 3.2 $.
NOTE: Parts of this FAQ may be out of date. Please send me any suggestions or corrections.

The most frequently asked question is always "Who do I complain to about this?"
Please see sections 3.8 through 3.12 for answers.

If you read no other part of this FAQ, read section 3.21.
POLITICS
1.1) What are the news.admin.net-abuse groups, and why were they created?
1.2) (this section has been merged into 1.1)
1.3) What is net-abuse?
1.4) What is the purpose of this FAQ?
1.5) What questions does it leave unanswered?
1.6) Who's responsible for this FAQ?
1.7) Where can I get it?
1.8) Is this the only Net Abuse FAQ?
1.9) I don't understand a word of this.


SPAM, SPAMMERS, and MOOSES
2.1) What is Spam?
2.2) What is Excessive Multi-Posting (EMP)?
2.3) What about cross-posting?
2.4) Where did the term come from?
2.5) Tell me about the Great Spammers.
2.6) Who were Canter and Siegel?
2.7) Where can I get more info on them?
2.8) What should we do about the book?
2.9) Who is Cancelmoose
2.10) Who are the current spam cancellers?
2.11) Has this problem really been going on for FOUR YEARS?!


NITTY-GRITTY
3.1) Yeah, but how many times is 'X'?
3.2) What is the Breidbart Index (BI)?
3.3) What is NoCeM?
3.4) Is there a blacklist of net-abusers?
3.5) How can I tell if a post is forged?
3.6) How do I know when I've got spam on my hands?
3.7) My group is full of crap. Why isn't it being cancelled?
3.8) OK, I think I've spotted a spam. Who should I mail-bomb?
3.9) OK, I think I've spotted a spam. What should I do?
3.10) What about e-mail spam?
3.11) I e-mailed a complaint to {so-and-so} about their {e-mail, post} and now they're threatening to complain to my system administrator. What should I do?
3.12) List of Basic Adminstrative Addresses
3.13) What's a cancel-bot?
3.14) Where can I get me one?
3.15) How do spam-cancellers cancel spam?
3.16) Can I sic The Man on these MAKE.MONEY.FAST losers (or other types of net abusers)?
3.17) What is a killfile, and how do I use one?
3.18) How do I killfile all crossposted messages?
3.19) What is the Usenet Death Penalty (UDP)?
3.20) Do all hierarchies have the same rules?
3.21) How about we start a campaign to stop all the spammers?


GROAN
4.1) Why are you net-abuse people such net-cops?
4.2) Isn't cyberporn a bigger issue than spamming?
4.3) Hey, I think my newsgroup is being invaded by alt.syntax.tactical!
4.4) Hey, I think my newsgroup is being invaded by the Usenet Freedom Council!
4.5) Hey, somebody posted an ad in {newsgroup}!
4.6) Hey, so-and-so's not being nice in {newsgroup}!
4.7) Hey, the Good Times virus--
4.8) Hey, there's this (AT&T, Jerry Garcia, whatever) banner message in the newsgroup descriptions!
4.9) Hey, one of those net.cops posted an ad for {something}! Haw! Haw!

--------------------------------------------------------------------------------

POLITICS
1.1) What are the news.admin.net-abuse groups, and why were they created?
Originally, news.admin.net-abuse.misc was created to replace alt.current-events.net-abuse and news.admin.policy. The former was one of the most widely read and respectable alt.* groups, while the latter had become largely a mess of messages cross-posted from a.c-e.n-a and news.admin.misc.
news.admin.net-abuse.misc was then, not surprisingly, for discussions of net-abuse (see "What is net-abuse", below): definitions, occurances, objections, complaints, battle plans, peace plans, etcetera.

As you can guess, that generated amazing amounts of traffic. By early 1996, it had gotten to the point where it was impossible to keep up with the group without investing hours and hours of time.

In November of 1996, after many months of hard work from Tim Skirvin and others, the news.admin.net-abuse.* groups were reorganized. The charters are stored at:


http://www.uiuc.edu/ph/www/tskirvin/nana

1.3) What is net-abuse?
Since the first net-abuse newsgroup, many curious forms of Usenet behavior have been discussed. Of these, spam is the one most universally accepted as 'net-abuse', which is why it gets its own section below. Other Frequently Aired Complaints are discussed throughout the FAQ.
However, as Neil Pawson says, "it's for abuse *of* the net, NOT abuse *on* the net." Just because somebody does something vile doesn't mean we can do anything about it on n.a.n-a. To qualify as true panic-inspiring net-abuse, an act must interfere with the net-use of a large number of people. Examples of this: newsgroup flooding, widespread or organized forgery campaigns, widespread or organized account hackery, widespread or organized censorship attempts, etcetera.


1.4) What is the purpose of this FAQ?
This FAQ is *not* intended as a comprehensive guide to netiquette. That is covered in RFC 1855. Many things that this FAQ appears to treat lightly are, in fact, extreme breaches of netiquette. The FAQ primarily attempts to answer: are these situations "net-abuse", in the sense that the whole world should hear about them?

1.5) What questions does the FAQ leave unanswered?
Probably quite a few. If you have questions that you think should be added to the FAQ, feel free to contact me -- especially if you also have the answers.

I'd also love to have a section on network/address tracking and informational tools (telnet, traceroute, nslookup, etc.) a la "The Spam-tracker's Handbook". Whatever happened to that?

Anyways, feel free to contribute whole new entries.

1.6) Who's responsible for this FAQ?
It's currently maintained by J.D. Falk (jdfalk@cybernothing.org), and was originally maintained by by Scott Southwick (scotty@bluemarble.net). The information has been gleaned from various Usenet sources --primarily posts to the net-abuse groups made by a wide variety of authors-- and so the maintainer must actively disclaim all responsibilty for the veracity, advisability and/or legality of anything contained in the FAQ. Thanks to the following people who have contributed to it, or at least discussed its contents in a non-threatening manner:
Arthur Byrne, Pekka Pirinen, Keith "Justified and Ancient" Cochran, Lamont Granquist, Victoria Fike, Steve Patlan, Wilf Leblanc, Seth Cohn, Neil Pawson, Bram Cohen, Mitchell Golden, Rahul Dhesi, Stephen Boursy, Mary Branscombe, David Cortesi, Alexander Lehmann, Greg Lindahl, Jack Hamilton, Morten Welinder, Axel Boldt, Richard Lee, an48985, Phil Pfeiffer, John van Essen, Pierre Beyssac, Michael Shields, Travis Corcoran, Tim Skirvin, Chris Lewis, Daniel J. Barrett, Ricardo H. Gonzalez, Dave Hayes, Ed Falk (no relation), Nathan J. Mehl (Nathan says hi), Peter Kappesser, Robert Braver, Loy Ellen Gross, booter, Johann Beda, Shaun Davis-Gluyas, John R. Birch, Penn Hackney, David Grabiner, Brendan O'Sullivan-Hale, Bob Allisat, John Moreno, and many others we have undoubtedly missed over the years.

Contributions are always warmly welcomed, as are suggestions, corrections and criticism. However, you know where to shove the flames.


1.6.1) What are the big changes made in 1998?
After letting this FAQ languish for a while, I realized that it was time to go through and clean stuff up, as well as adding new information. To tell you the truth, I'm quite dismayed at how little has changed.

This Net Abuse FAQ will continue, however, to focus on usenet. There are a lot of other good documents about e-mail abuse, and that's an area which changes way too often.

1.7) Where can I get it?
This FAQ will be posted thrice monthly (on the 1st, 11th, and 21st) to the following newsgroups:

news.admin.net-abuse.usenet
news.admin.net-abuse.misc
news.admin.net-abuse.bulletins
news.admin.misc
news.groups.questions
news.answers
It will also be available at the various public FAQ archives, including rtfm.mit.edu and its mirror sites. The master hypertext version is available at:

http://www.cybernothing.org/faqs/net-abuse-faq.html

1.8) Is this the only Net Abuse FAQ?
Unfortunately, the topic of Net Abuse is so vast and so controversial that it cannot be covered completely in one document.
Of course, that didn't stop Daniel Barrett from trying, and doing a very good job. He wrote a book (published by O'Reilly Publishing) with the unfortunate but fitting title of Bandits on the Information Superhighway. More information is available at:


http://www.ora.com/item/bandits.html

I've removed much of the rest of this list, because Stan Kalisch III is doing a much better job of keeping his list of news.admin.net-abuse.* Newsgroups' Documents updated. You can view it at:

http://www.crl.com/~sjkiii/news-admin-net-abuse.html, or ftp://ftp.crl.com/users/sj/sjkiii/pub/usenet/news-admin-net-abuse.txt
For an almost totally different viewpoint, see Dave Hayes's long-awaited document, "An Alternative Primer on Net Abuse, Free Speech, and Usenet," which at first denied the existence of this FAQ. You can find it and some related documents at:

http://www.jetcafe.org/~dave/usenet/

My answer to Dave's Alternative Primer is also worth reading:

http://www.cybernothing.org/faqs/dave-hayes.html

There are a number of very good indices of net abuse-related documents:

Fight Spam on the Internet! (Scott Hazen Mueller)
http://spam.abuse.net/

news.admin.net-abuse.* homepage (Tim Skirvin)
http://www.math.uiuc.edu/~tskirvin/home/nana/

1.9) I don't understand a single word of this.
One of the best starting places for learning about Usenet has historically always been Indiana University's Usenet Resources page, which is now at:

http://kb.indiana.edu/menu/usenet.html
It has links to most Usenet primers, netiquette documents and news FAQs, Son-of-RFC-1036, some charters, newsreader man pages, etcetera. Also, perhaps one of the following resources will help:


http://www.landfield.com/usenet/
http://sunsite.unc.edu/usenet-i/
http://www.geocities.com/ResearchTriangle/8211/

--------------------------------------------------------------------------------

SPAM, SPAMMERS, and MOOSES
2.1) What is Spam?
It's a luncheon meat, kinda pink, comes in a can, made by Hormel. Most Americans intuitively, viscerally associate "Spam" with "no nutritive or aesthetic value," though it is still relatively popular (especially in Hawaii) and can be found in almost any grocery store.) The canned luncheon meat has its own newsgroup, alt.spam.
The term "spam," as used on this newsgroup, means "the same article (or essentially the same article) posted an unacceptably high number of times to one or more newsgroups." CONTENT IS IRRELEVANT. 'Spam' doesn't mean "ads." It doesn't mean "abuse." It doesn't mean "posts whose content I object to." Spam is a funky name for a phenomenon that can be measured pretty objectively: did that post appear X times? (See 3.1, "Yeah, but how many is X?')

There have been "customized" spams where each post made some effort to apply to each individual newsgroup, but the general thrust of each article was the same. A huge straw poll on news.admin.policy, news.admin.misc, and alt.current-events.net-abuse (December 1994) showed that as many of 90% of the readers felt that cancellations for these posts were justified. So, simply put: if you plan to post the same or extremely similar messages to dozens of newsgroups, the posts are probably going to get cancelled.

If you feel that a massive multi-post you are planning constitutes an exception, you are more than welcome to run the idea past the readers of news.admin.net-abuse.usenet for feedback first.


2.2) What is Excessive Multi-Posting (EMP)?
Spam (and spam by any other name still stinks.)
Some people feel that "spam" is an inappropriately misleading name for messages of this type. Others feel that "EMP" is misleading. Since spam is the most widely recognized term, that's what we use in this FAQ.


2.3) What about cross-posting?
Here's the difference between cross-posting and multi-posting: cross-posting is where you list all the groups on the Newsgroups: line of a single post. Multi-posting is where you have some idiotic program fire an individual copy of the post to each group. (If you do it manually, that's even more idiotic.) A cross-post only takes up the space of 1 post (one on every newsserver in the world), no matter how many groups; multi-posting takes up the space of dozens or hundreds of posts (on every newsserver in the world), which is why it infuriates so many people.
So, cross-posting is better than multi-posting. It's still very often a bad idea, and if you get carried away it'll still get cancelled (see 3.2, "What is the Breidbart Index (BI)?") This is often called Excessive Cross-Posting, or ECP. Some folks still call it "velveeta" because they like cutesy names.

If you *must* cross-post, set the followups to a single appropriate group by adding a header line like:


Followup-to: group.name.here

This prevents the readers of all the groups from having to deal with the thread for weeks afterwards if the readers of only one or two of the groups take an interest in it.
You can also add Followup-to: poster, which will (in most newsreaders) ask anybody who tries to follow up to e-mail you directly instead.


2.4) Where did the term 'Spam' come from?
The prevailing theory is that it is from the song in Monty Python's famous spam-loving vikings sketch that goes, roughly, "Spam spam spam spam, spam spam spam spam, spam spam spam spam..." The vikings, who were sitting in a restaraunt whose menu only included dishes made with spam, would sing this refrain over and over, rising in volume until it was impossible for the other characters in the sketch to converse (which was, of course, a large part of the joke.)
The term is rumored to have originated, as far as the Internet is concerned, from the MUD/MUSH community. Blue-haired former newsadmin Nathan J. Mehl tells the most reliable story known to date...


Well, briefly summarized:
My friend-who-shall-remain-nameless was, ah, a younger and callower man, circa 1985 or so, and happened onto one of the original Pern MUSHes during their most Sacred Event -- a hatching. After trying to converse sanely with two or three of the denizens, he came quickly to the conclusion that they area all of bunch of obsessive-compulsive nitwits with no life and less literary taste. (Probably true.)

Editors' Note: another source tells me that this actually happend in the summer of 1991.

So, as the 'eggs' were 'hatching', he assigned a keyboard macro to echo the line:

SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM

...and proceeded to invoke it once every couple of seconds, until one of the wizards finally booted him off.

...which would have probably been that last that anyone ever heard or thought of it, except that it apparently ingrained itself into the memory of the PernMUSHers, and forever after there was the legend of 'that asshole who spammed us.'

Every once in a while, this story makes it back to my friend, and he tries very hard to keep a straight face...


Another theory is related to throwing a "brick" of the luncheon meat at a rotating metal fan. However, none of the long-time "spam watchers" have any idea where that theory was from before it showed up in a Time magazine article.
The term wasn't first used to describe mass news posting, however. See the Hacker's Jargon File for previous uses of the word.


2.5) Tell me about the Great Spammers.
To paraphrase Yoda, spam does not make one great. However, a surprising number of people prefer infamy to obscurity, and would rather be hated than unknown. Some of those people take up spamming as a way to gain the notoriety that their warped psyches crave.
So as not to duplicate effort, here's an excellent archive devoted to the various bug- and honey-bears of the Net:


The Kook of the Month site (particularly the Net.Legends FAQ)
http://www.ews.uiuc.edu/~tskirvin/faqs/legends.html

Not all of the kooks and legends discussed there are spammers, or even villains. Spam fans should pay particular attention to the entries on Serdar Argic, the spiritual ancestor of today's spammers. In fact, any would-be spammers should try to be more like him. At least he was kinda interesting. Today's kooks are just sociopaths.


2.6) Who were Canter and Siegel?
They were lawyers, authors, and Usenet newbies _par excellence_. Super-newbies. Honorary Permanent Newbies. When they sit around the net, they sit *around the net*...

C+S weren't the first spammers, but they were so gothically clumsy about it, and so intent on making a buck, that people were terrified and infuriated into starting alt.current-events.net-abuse (which has since been replaced by the news.admin.net-abuse.* groups.

Since then, they've parted ways (rumour has it they were married when they spammed, and have since gotten a divorce.) Lawrence Canter was permanently disbarred, in part because of his history of net abuse. Martha Siegel was last heard from a few years ago, when she was trying to go on a lecture tour promoting her new, revised version of the book she and Canter wrote together on how to abuse the net.

2.7) Where can I get more information about them?
The best known source is Thomas Leavitt's "The Canter & Siegel Report," available via anonymous ftp from:


ftp://ftp.armory.com/pub/user/leavitt/
Those files are zipped. Users with access to 1990s technology should check out the WWW versions at:


ftp://ftp.armory.com/pub/user/leavitt/html/cands.report.html
ftp://ftp.armory.com/pub/user/leavitt/html/candsrpt.two.html
ftp://ftp.armory.com/pub/user/leavitt/html/candsrpt.three.html
There's also a wonderful article on the pair available at:


http://www.eye.net/Howling/Kooks/Kreeps/CS2.htm (apparently now an invalid link; anybody know where it went?)
Many, many more docs are available, but I'll stop there, because there's really no reason to dwell on the past. In fact, Canter & Siegel have both posted to news.admin.net-abuse.misc and other groups from time to time (always multiposted -- they seem genetically unable to crosspost), and it has always been quite obvious that all they wanted was to generate more publicity for themselves.


2.8) What should we do about the book?
What book?

2.9) Who is Cancelmoose[tm]?
Cancelmoose[tm] is, to misquote some wise poster, "the greatest public servant the net has seen in quite some time." Once upon a time, the 'Moose would send out spam-cancels and then post notice anonymously to news.admin.policy, news.admin.misc, and alt.current-events.net-abuse. The 'Moose stepped to the fore on its own initiative, at a time (mid 1994) when spam-cancels were irregular and disorganized, and behaved altogether admirably-- fair, even-handed, and quick to respond to comments and criticism, all without self-aggrandizement or martyrdom. Cancelmoose[tm] quickly gained near-unanimous support from the readership of all three above-mentioned groups.
Nobody knows who Cancelmoose[tm] really is, and there aren't even any good rumors. However, the 'Moose now has an e-mail address (moose@cm.org) and a web site (http://www.cm.org.)

By early 1995, several others had stepped into the spam-cancel business, and appeared to be comporting themselves well, after the Moose's manner. The moose has now gotten out of the business, and is more interested in ending spam (and cancels) entirely (see "What is NoCeM?")


2.10) Who are the current spam cancellers?"
Chris Lewis and Robert Braver take care of most of the spam (John Milburn has retired from the spam-cancelling biz), while Richard Depew cleans up spews from horribly misconfigured news servers, large misplaced binaries, and the like. Somebody calling himself The Unknown News Administrator has been helping as well, and so have a few others. Michael Scheidell and others deal with problems (usually out-of-area postings) in various local hierarchies.

Overall, Chris Lewis is considered to be the expert on spam cancelling, and one of the experts on Usenet in general.

For a good overview of who's doing what right now, hop over to news.admin.net-abuse.bulletins and check headers. It changes every few months.

2.11) Has this problem really been going on for FOUR YEARS?!
Yes.

The obvious next question is "why hasn't everybody just given up?" Well, some have. Many others have confined their reading to a small, selected set of groups, usually from behind a mass of killfiles and other filtering methods. Some folks even went as far as starting a new, "parallel" usenet alternative, called Usenet2, which you can read about at:

http://www.usenet2.org/
But I think Stanford newsadmin Russ Allbery explained it best in a post to Usenet2's net.subculture.usenet in March of 1998:

http://www.cybernothing.org/cno/docs/russ-usenet.txt

--------------------------------------------------------------------------------

NITTY-GRITTY
3.1) Yeah, but how many times is 'X'?
How many posts does it take to push the spam envelope? To use up all your spam charity points? For a bare-bones spam? To trigger the raging-spam-cancellers-from-Hell?
Among those who agree that spam should be defined solely by quantity,


-----------------> 20 <--------------------
appears to be the magic number, or at least a number so middle-of-the-road that it provokes very little passionate dissent in either direction. Notably, Cancelmoose[tm] refused to set a firm number, in the belief that people would simply post [X-1] messages. It's safe to say that a couple incidents of 19-post spams would cause the magic number to plummet. Thus, 20 should be considered a vague approximation only.
Passionately dissenting note: Rahul Dhesi [dhesi@rahul.net], one of the fathers of the cancel-bot movement, sticks by the following definition:


More than five physically distinct postings with substantially identical content posted within a period of ten days.

The most reliable document describing current spam thresholds and guidelines is a draft FAQ posted weekly to news.admin.net-abuse.misc by Chris Lewis. It also describes the Breidbart Index (see below) in greater detail. That FAQ is not now available on the web at:

http://spam.abuse.net/spam/others/thresholds.html
It is important to note that some ISP's set different limits on what their users may or may not do, so if you try to push the envelope with the Briedbart Index it's still quite possible that you'll lose your account.

3.2) What is the Breidbart Index (BI)?
The Breidbart Index (BI) is a measure of the breadth of any multi-posting, cross-posting, or combination of the two. BI is defined as the sum of the square roots of how many newsgroups each article was posted to. If that number approaches 20, then the posts will probably be cancelled by somebody.
For instance, four identical posts to nine newsgroups each (4 times 3) has a BI of 12. However, nine identical posts to four newsgroups each (9 times 2) has a BI of 18.


3.3) What is NoCeM?
NoCeM is an end to all this spam, and an end to all this cancelling. With NoCeM (pronounced "No See 'Em"), your newsreader goes out and gets certain posts (from trusted parties) that contain lists of junk articles (ECP, spam, etc.) Your newsreader then hides those articles from you.
Note that right now most NoCeM newsreaders are only for Unix. The only exception is Gnus, the newsreader for EMACS, which will work on any platform that supports a fully functioning version of GNU EMACS.

The move to NoCeM is headed by the Cancelmoose[tm] (moose@cm.org), and the moose's web site has all the info you might want about NoCeM:


http://www.cm.org/

Also check out the newsgroup alt.nocem.misc, which will degenerate into a Big 7 newsgroup (news.lists.nocem?) one of these days.

3.4) Is there a blacklist of net-abusers?
Yes, Axel Boldt maintains the world-renowned "Blacklist of Internet Advertisers" at:

http://math-www.uni-paderborn.de/~axel/BL/blacklist.html

Now, before you get really worried about McCarthyism and such, go and look at Axel's self-imposed rules for maintaining the blacklist. He's much fairer than most of those people deserve.

3.5) How can I tell if a post is forged?
Gandalf (gandalf@digital.net) has written the alt.spam FAQ, or "Figuring out fake E-Mail & Posts," which focuses on how to track spam. It is available at:

http://digital.net/~gandalf/spamfaq.html

For a rough article on forgery, originally constructed for this FAQ out of information contributed by Robert Bonomi, Arthur Byrne, Emma Pease, and Alan Bostick, see:

http://sckb.ucssc.indiana.edu/kb/data/all.afco.html

For more information on headers, see RFC-1036, "Standard for Interchange of Usenet Messages," at:

http://www.cis.ohio-state.edu/htbin/rfc/rfc1036.html

3.6) How can I tell how many newsgroups an article was posted to?
For people who can't use the classic "grepping the newsspool" method, nn or nngrab may be able to help. (The following is adapted from a posting by Lee Rudolph--thanks.)
You can force the Unix newsreader nn to ignore your .newsrc and create a "merged newsgroup" consisting only of articles containing a certain word in their subject line. For instance, to gather all articles at your site containing the word "spam" in their subject line, use this command:


% nngrab spam
That's basically a faster version of


% nn -i -s"spam" -mXx
Caution: this latter method can be a long, tedious process. See the nn man page for more details.


3.7) My group is full of crap. Why isn't it being cancelled?
Lots of groups are full of inappropriate posts, widely crossposted advertising, and so forth -- just pop into misc.misc or alt.sex for as many examples as you can possibly handle.
As annoying as it may be, these posts may not be cancellable spam. Keep in mind that the cancel thresholds err in the favor of the excessive poster, and still leave *lots* of room to post in a manner that most people find inappropriate.

A single, excessively crossposted post can not be cancellable in and of itself. In order for a single post to be cancelled, it would have to be posted to 400 groups (sqrt(400) = 20). This is not possible due to limits of news software.

Robert Braver reports "When checking for spam, I often must pass over groups of messages that are likely considered off-topic intrusions in each of the newsgroups it is posted to, but it doesn't hit the cancel threshold."

One good solution here would be for the newsadmins of a particular locality to come to a consensus for more stringent thresholds for their respective local hierarchies, as has been done in the atl.* and fl.* hierarchies.

Of course, the messages may actually be cancellable spam, especially when you consider the current 45-day window. But, this type can be harder for the automatic spam detectors to find.

Once a slow spam is detected and posted to news.admin.net-abuse.announce, it makes it easier to keep tabs on a particular poster or series of messages in the future. This kind of spam is probably where "field reports" to news.admin.net-abuse.misc are the most useful.


3.8) OK, I'm certain it's spam. Who should I mail-bomb?
Don't mail-bomb anybody. Harrassment is illegal everywhere. If somebody's done something truly evil, they'll get enough single responses from individuals to achieve the same effect.

3.9) OK, I'm certain it's spam. What should I do?
Check n.a.n-a.sightings. If somebody's already made a definitive spotting, there's no sense in an "I've seen it, too" post.

Include a *complete* header from one copy of the spam in your post to n.a.n-a.sightings. Set followups to n.a.n-a.misc.

Say how many newsgroups at your site it was posted to; list 20 or more of them. (See "How do I know how many newsgroups an article was posted to?")

Complain politely to the spammer and the Usenet administrator at the spammer's site (whose address should be "usenet@site.name" or "news@site.name"; if that fails, try "abuse" or "postmaster".) Request that the Usenet administrator post a response to n.a.n-a.announce, detailing what actions have been taken. Again, remember to be polite -- it is rare that the administrators are in any way responsible for the message.

3.10) What about e-mail spam?
You can always complain about unsolicited e-mail to both the bozo that sent it to you and the bozo's postmaster. To write to a postmaster, just substitute the perp's username in their address (e.g., bozo@otherwise.lovely.com) with "postmaster" (i.e., postmaster@otherwise.lovely.com.) Please be brief and polite with the postmasters, include a copy of the e-mail you received, and leave the subject-line intact (in case the postmaster wants to set up an auto-responder.)

Be sure to include all the headers (not just From, To, Date, and Subject, which is the default in most mail programs) in your reply, just in case the e-mail was cleverly forged. That way, the postmaster can trace it back to its source if necessary.

For more information, see:

http://spam.abuse.net/
3.11) I e-mailed a complaint to so-and-so about their {post, mail}, and now they're threatening to complain to my system administrator. What should I do?
Let your sys-admin know right away what's happening. Tell them the story, briefly. Offer to supply the post(s) in question, so that your admin doesn't have to go searching. Then keep them updated on any further threats.
If you're brief, polite, and on the right side, you can usually find an ally in your sys-admin.


3.12) List of Basic Administrative Addresses
The search for the best person to complain to at any site has led to much speculation and arguments, even among admins at the same site. However, if a message to the original poster doesn't get you anywhere, somebody at one of the following addresses might be able to help.

abuse
A lot of ISP's and network backbones have created 'abuse' addresses for complaints about net-abuse. That's usually the best place to start.

usenet or news
For Usenet abuse, you can usually reach a news administrator through one or both of these addresses. A notable exception is Compuserve, which utilizes the address <usemail@csi.compuserve.com> (this may change now that AOL has purchased Compuserve.)

postmaster
RFC 822, the document which set most of the current standards for Internet e-mail back in 1982, makes it mandatory for all sites which pass e-mail to have a postmaster address so that problems can be reported. The purpose of postmaster has expanded at many sites to include net-abuse, both e-mail and otherwise.

Administrative or Technical Contacts
If you have access to the whois command, you can type (for example) 'whois example.com' to find out who the administrative and technical contacts are for a domain. This will list their e-mail address, and often their phone and FAX numbers (but remember, be polite, because the contacts aren't usually responsible for their users' misbehavior, and harassment is illegal everywhere.)

Upstream Providers
If none of the above get you anywhere, you can try going to a site's upstream providers. For news, check the Path: header of the original message. To the right, you'll see the originating site. Each site between you and them is separated by an exclamation point, as in the partial example below:

!dummy-host.example.com!nohost.mydomain.com!not-for-mail

As you can see, the message originated at the machine foobar.mydomain.com. The next news hop is dummy-host.example.com, so you'd complain to news@example.com if the admins at mydomain.com were uncooperative.
For e-mail, determining who's upstream can often be confusing -- many people get it wrong. Unless you're familiar with the whois and traceroute tools, I'd suggest not even bothering.


If you don't have the time or resources to do this research, you can send mail to domain.name@abuse.net, and it will (probably) be sent to the appropriate contact(s) for that domain. You'll need to register with abuse.net the first time you send mail through it.

3.13) What is a cancel-bot?
First off, "cancel-bot" is an unfortunate misnomer, and one that the conventional media have understandably misunderstood. "Bot" implies that something is out there, running unattended, cancelling whatever meets its nefarious qualifications...but that is quite rare, and is only done when both the user and their administrators are completely unwilling to stop spamming. For the most part, all spam-cancels are sent out manually and deliberately by actual human beings. (They happen to use a program that is commonly referred to as a "cancel-bot".)
A cancel-bot, misnomer aside, is a program that sends out cancel messages; you feed it the message-IDs of posts, and it sends out a cancel message for each one (see RFC 1036.) Cancel messages are normally sent out by a newsreader in response to a user's request to cancel a message, using a newsreader command, *if* the user was also the original poster of the message. Sites will ignore cancel messages that don't appear to come from the original poster. Cancel-bots work around this restriction by using header lines that make it look like the original poster sent out the cancel; they'll usually add something like a "Cancelled-By" header line as well, to keep things nominally above-board.

Use of a cancel-bot against anything besides 'consensus spam' outrages people, as it should. See alt.religion.scientology for sample discussions.

For more information on cancels (especially in regards to net abuse), Tim Skirvin has written a very good FAQ, which used to be avaliable at:


http://www.uiuc.edu/ph/www/tskirvin/cancel.faq

3.14) Where can I get me a cancel-bot?
If you have to ask, you should probably wait a while.
3.15) How do the spam-cancellers cancel spam?
They make bloody sure they know how to use their cancel-bot;
They confirm the spam themselves;
They announce their action to n.a.n-a.announce. This prevents everyone from waiting around and wondering whether anyone's done anything.

Here's a standard section from an old cancel-notification post by the beloved Cancelmoose(TM):

The $alz cancel. and Path: cyberspam conventions were followed. [The $alz convention is to create your cancel message-ID by prepending 'cancel.' to the original one. The cyberspam convention is to use- 'Path: cyberspam!usenet' so that sites that do not want your cancels can easily opt out. Please use these when cancelling spam.]
Many more disclaimers are commonly added by modern spam cancellers, in an attempt to reduce confusion and misplaced anger.

3.16) Can I sic The Man on these MAKE.MONEY.FAST losers (or other types of net abusers)?
You can complain about e-mail or Usenet pyramid schemes (at least those involving Americans somehow) to the Federal Trade Commission:

STAFF CONTACT: Bureau of Consumer Protection
Ms. Broder
bbroder@ftc.gov

Before doing so, consider seriously whether you actually want to encourage government intervention. The number of 'net cases the FTC has been involved in is very low at this point; in an ideal world, it would probably remain that way.
But if you really want to go after MMF lusers (or anybody spammy any type of tax fraud scheme), you can complain to the IRS:


] Subject: Reporting MMF to the IRS [long]
] Date: 11 Mar 1997 09:26:20 -0500
] Reply-To: Inspector Andrew Fried
]
] Over the past six months, my email address has appeared in the "fraud
] killer list", a list of agency contacts used to report potential tax
] fraud violations by the "make money fast" (MMF) Usenet spammers. Since
] complaints such as those don't fall under my specific area of
] jurisdiction, I have been manually forwarding all such messages to the
] appropriate department within my agency.
]
] In order to facilitate routing complaints to the IRS via email, I have
] established two special mailboxes. Email sent to those addresses will
] be automatically forwarded to the correct organizations within the
] Service. This will assure faster delivery and reduce congestion on
] my personal email account. The addresses are as follows:
]
] net-abuse@nocs.insp.irs.gov
] Use this address to report make money fast (MMF) schemes. Mail sent to
] this address will be forwarded to the Criminal Investigation Division
] (CID) for appropriate action.
]
] hotline@nocs.insp.irs.gov
] Mail sent to this address will be forwarded to Internal Security
] (Inspection), the IRS's "internal affairs" type organization. Internal
] Security is responsible for investigating criminal acts which attempt to
] corrupt our tax system. Internal Security is also responsible for the
] protection of all Service employees. Use this address to report
] attempted bribery of IRS employees, conspiracy to defraud the tax
] system, threats against the IRS or IRS employees or any other suspected
] criminal acts affecting the integrity of our tax system. Please don't
] forward the infamous "IRS Abuse" reports here.
]
] Reports of tax fraud should be sent directly to your regional IRS
] Service Center; there is currently no Internet email address for
] reporting those suspected offenses.
]
] Please distribute this message to newsgroup moderators and members of
] your newsgroups. Should you have any other non-tax related questions,
] feel free to write to me directly at:
] afried@nocs.insp.irs.gov
]
] --
] Inspector Andrew Fried IRS Internal Security
] Voice: (202) 622-3535 1111 Constitution Ave, NW
] Fax: (202) 622-8681 Washington, DC 20224

A non-governmental organization which deals in such things (and more) is the National Fraud Information Center, which is funded by grants from major corporations and works in cooperation with federal, state, local and international law enforcement agencies. Their purpose is organize, classify, and forward "stuff" to the appropriate body: state's a.g, FTC, FBI, Secret Service, wherever.
Thus they are not "law enforcement" and the problems of inaction by local district attorneys, etc. persist (d.a's have "too much work to do" to go after an individual posting a chain letter). You can e-mail them at <nfic@internetmci.com>, or get information from their web page, which is at:


http://www.fraud.org/

For stock fraud and the like, some people have been complaining to the Securities and Exchange Commission at the address <enforcement@sec.gov>. And, they've started prosecuting. Please only send them reports of stock fraud, however -- they don't have the authority to deal with anything else.

3.17) What is a killfile, and how do I use one?
A killfile enables you to permanently avoid reading posts by certain people, or from a certain site, or whose Subject: lines contain particular words... Check out the RN killfile FAQ at:

http://www.cis.ohio-state.edu/hypertext/faq/usenet/killfile-faq/faq.html
If your newsreader doesn't allow killfiling (some news clients call 'em "filters"), write the author of the software and ask them to add support for killfiles. 'The "Good Net-Keeping Seal of Approval" for Usenet Software', which recommends that filtering be included in all news clients, can be viewed at:


http://www.xs4all.nl/%7Ejs/gnksa/
for more information on what makes a good newsreader.

And, for good advice on who to ignore, see the Global Killfile:


http://www.uiuc.edu/ph/www/tskirvin/global/

3.18) How do I killfile all crossposted messages?
It's becoming quite common for people to killfile all messages crossposted to more than X newsgroups, because this cuts down on the amount of blatantly off-topic crap they have to read.
This is simplest to do in the rn family (rn, trn, strn, etcetera) using a killfile entry like the following:


/^Newsgroups: .*,.*,.*,.*,.*,./h:,
That one kills anything posted to more than six groups, plus all of the followups in that thread (that's what the comma at the end means.) For less groups, use less .* entries -- for more groups, use more.
Peter Kappesser suggests a somewhat more efficient form for servers which support the Xref extension to the News Overview database file (if you aren't sure if your server supports it, just check and see if there's an Xref: header in the messages you see. If there is, it does.):


/:.*:.*:.*:.*:.*:/HXref:,
In this, the number of colons equals the threshold number of groups. This is more efficient because the Xref header line is transferred with the NOV file when you enter the group, so trn can process it quickly. If you kill on the Newsgroups line, trn has to fetch from the server at least the header for every article in the group in order to examine it for the kill.
One slight difference is that Xref contains only those groups carried by the server, which may not necessarily be all those listed in Newsgroups. However, this isn't often a problem -- most ECP's are to a dozen or more groups, so it doesn't matter that Newsgroups lists 27 groups while Xrefs only has 18, it's still greater than 6!


3.19) What is the Usenet Death Penalty (UDP)
There are two different things commonly referred to as "UDP."
The one least argued about could be called "shunning" or "aliasing," in which a newsadmin (running INN unoff3 or above, or using the 'shun' patch to earlier versions of INN) can add a site's pathhost to their ME line. They simply won't get any messages from that site. Some may consider this censorship, but it fits quite well with the simple but often forgotten concept that a newsadmin can do whatever they want on their own machine so long as it doesn't cause any problems for other newsadmins.

The other Usenet Death Penalty is automatic cancellation of all messages from a site, or from a person, or based on a regular expression. This is sometimes done when a spam (or spew) continues unabated even after the spam cancellers and other net-abuse activists have attempted to contact somebody and ask them to stop. As you can guess, there are arguments about this which have literally been going on for years.

Currently, the general consensus among news.admin.net-abuse.misc participants is that UDP of either type should only be employed after every other method has been tried and failed.

In the useless trivia column, the term "Usenet Death Penalty" was first coined by Eliot Lear. The first software to perform it was written three years earlier by Karl Kleinpaste in 1990, and was 28 lines long. Karl is also known as being the author of the anonymous server software.

The second (previous versions of the FAQ referred to it as the first) was written by Rich $alz (the inventor of INN) in Perl in April, 1993. It was 76 lines long, including instructions for use.


3.20) Do all hierarchies have the same rules?
Nope. This FAQ mainly deals with what's considered net abuse in the "Big 8" (comp.*, humanities.*, misc.*, news.*, rec.*, sci.*, soc.*, and talk.*) and alt.* (we also touch on biz.* a little bit.) But there are many hierarchies -- especially regional and local -- which have begun to adopt much stricter policies on net abuse.
The main reason behind this is that the local hierarchies usually have a smaller target audience. For example, dc.* exists for the Washington, D.C. metropolitian area, fl.* for the state of Florida, and so forth. Long ago in the history of Usenet (okay, it was only two or three years ago) all the news hosts in Florida traded fl.* with each other, and it didn't leak too far out-of-state -- but now, with so many national news providers, you can read fl.* pretty much anywhere in the world.

The point, however, is that just because you have /access/ to a heirarchy doesn't mean your message is appropriate for it. Many locally oriented groups, especially *.forsale and *.jobs groups, are deluged with non-local messages, which are often crossposted to a large number of different, incongruent local heirarchies. While these don't individually set off alarms on the world's spam-watching software, they can make a group become useless for local postings because it's so hard to wade through all the misplaced stuff.

So, most local hierarchies now have people (or, more often, groups of people) watching over them, sending copies of the FAQ or Charter to people who post inappropriately, and -- in extreme situations -- cancelling the misplaced messages. Cancellation after the fact is commonly referred to as "retromoderation," and is still a topic of hot debate.

For more specific information, the Regional Guidelines and Periodic Postings Database can be viewed at:


http://www.unicom.com/regional/

Or, watch the group itself for a while to see if there're rules of any type. Remember that in this case, "a while" means at least two weeks, since FAQs don't get posted every day, and "but I saw other people advertising their thigh cream here!" is a really lame excuse.
There is also a mailing list dedicated to discussing the mechanics and policies that regional FAQ maintainers and retromoderators follow. For more information, contact <us-region-request@megalith.miami.fl.us>.


3.21) How about we start a campaign to stop all the spammers?
We already did -- and it's about time!

http://spam.abuse.net/


--------------------------------------------------------------------------------

GROAN
4.1) I hate net-cops like you people.
Who will watch the watchmen? net-cop.cops like this, apparently. ;} Anyways, anyone who wanted to police the net would be a pig-headed, unrealistic fool. Thankfully, we (the regular participants in news.admin.net-abuse.*) just want to stop spam.

Anyways, if you don't like spam being cancelled at your site, you can alias your site to "cyberspam". (Actually, you can only do that if you're the newsadmin -- but users are subject to the whim of their newsadmin anyway, and if you don't like your newsadmin's policies, you can always just build your own server and get a feed from someplace else.)


4.2) Isn't cyberporn a bigger problem than spamming?
No matter what the more sensationalistic media outlets may try to tell you, "cyberporn" is not a real problem. For more information, see cyberNOTHING's Cyberporn Report, at:

http://www.cybernothing.org/cno/reports/cyberporn.html

As for illegal stuff, like child pornography -- there are existing laws against that in most countries, so those people will go to jail, and good riddance.

Net abuse, as described in this document, is a big problem, and will continue to be a problem unless Something Is Done.

Nevertheless, a case could be made that other issues (Government-imposed censorship, loss of natural resources, etcetera) are more or equally important. But that's not what this FAQ, or the net-abuse newsgroups, are about.

4.3) Hey, I think my group's being invaded by alt.syntax.tactical!
I'm sorry to hear that. Please don't bring that subject up again here. Good luck... Keith "Justified and Ancient" Cochran, who has been wrongfully accused of a.s.t involvement himself, adds: "I would suggest the first thing you do is take a chill pill." (Note that there is no second thing to do. However, you may want to pass the time reading the alt.bigfoot FAQ:

http://www.cis.ohio-state.edu/hypertext/faq/usenet/bigfoot/top.html
--particularly the part about cats.)

See also 3.17, "What is a killfile, and how do I use one?"


4.4) Hey, I think my group's being invaded by the "Usenet Freedom Council!"
The abusive "Usenet Freedom Council" seems to be made up of a number of accounts all owned & operated by Dr. John Grubor, a.k.a. Manus, a.k.a. DrG, a.k.a DrGodFuck, ad nausea infinitum. It used to include former Kook of the Month Steve Boursy, and former Kook of the Month Nominee Vladimir Fomin (who also no longer has access to the net under that pseudonym.)
Now that news.admin.* people have pretty much unanimously killfiled him, he's started going to other newsgroups and attempting to get outraged responses from people by posting what can only be described as patent bullshit.

The best thing to do is ignore him. This, of course, made easier with a good killfile (see 3.15, "What is a killfile, and how do I use one?") The REAL "Usenet Freedom Council" was dreamt up by Dave Hayes. The best way to understand it is to view his "Freedom Knights" home page, at:

http://www.jetcafe.org/~dave/usenet/

Afterwards, I'd suggest reading "Dave Hayes / Freedom Knights: An Alternative View," which some feel is a little more realistic (and there are even those who say it's being too nice.)
http://www.cybernothing.org/faqs/dave-hayes.html

4.5) Hey, somebody posted an ad in {newsgroup}!
So?
All right, all right: first, check to see if the post was obviously forged (see 3.5, "How can I tell if a post is forged?")

Then check to see if it's spam (see 2.1, "What is Spam?" It's probably not. We only want to hear about it if it's spam.

If the ad is off-topic, and you really can't let it go, check out the advice in 4.6, "Hey, so-and-so's not being nice in {newsgroup}!"


4.6) Hey, so-and-so's not being nice in {newsgroup}!
Happens all the time. We don't want to hear about it. However, here are some things you can do (written by Keith "Justified and Ancient" Cochran):

"The first thing to do is take it up with user@some.site. If you can't achieve a mutual understanding, then you _MIGHT_ (note, not WILL, _MIGHT_) want to mail postmaster@some.site with your complaint. If you are going to write to postmaster@some.site, be sure to include the full, unedited post you have a problem with, a short but descriptive summary of why you have a problem with it, and a short, but descriptive explanation of what you would like to have happen. "Note that this does not apply to MAKE.MONEY.FAST. If you see a copy of M.M.F, just e-mail postmaster@some.site, including the article ID, and the first paragraph of the post."
Of course, the descriptive explanation of what you would like to have happen must also be realistic. Since most ISP's have a policy regarding commercial posts, it's common to ask the postmaster to reiterate or reinforce whatever policy they may have on hand, rather than asking right away for the user to be nuked. It's not nice to tell system administrators what to do -- especially if you don't know the entire situation yourself.

See also 3.15, "What is a killfile, and how do I use one?"


4.7) Hey, the "Good Times" virus--
...is a total, 100%, long-proven hoax. For the complete story, see:

http://www.nsm.smcm.edu/News/GTHoax.html

4.8) Hey, there's this (AT&T, Jerry Garcia, whatever) banner message in the newsgroup descriptions!
We know, we know... It's a fairly common prank to add bunches of newsgroups whose descriptions spell something out. Ask your local news adminstrator to remove the whole lot.

4.9) Hey, one of those net.cops posted an ad for {something}! Haw! Haw!
"Ad" does not equal "spam".
"Ad" does not equal "net-abuse".

--------------------------------------------------------------------------------
This document is Copyright 1994, 1995, 1996, 1997, and 1998 by Scott Southwick and J.D. Falk. Permission is granted for it to be reproduced electronically on any system connected to the various networks which make up the Internet, USENET, and FidoNet so long as it is reproduced in its entirety, unedited, and with this copyright notice intact.

  zondag 14 oktober 2001 @ 23:39:32 #62
16972 Davilex
haak me dan!!!
pi_1901878
[23:31:59] <Appie`> chips van de Gamma? YUCK!
http://homocultuur.startkabel.nl
  † In Memoriam † zondag 14 oktober 2001 @ 23:43:27 #63
13819 Loedertje
Trotse GILF.
pi_1901920
Kun je dat misschien uitleggen, ik snap er geen fuck van
quote:
Op zondag 14 oktober 2001 23:34 schreef calvobbes het volgende:
*hopa*


Introduction
A. General
B. Users
C. Authors
D. Developers
Appendixes
The XML FAQ
Editor: Peter Flynn (pflynn@ucc.ie)
Originally maintained on behalf of the World Wide Web Consortium's XML Special Interest Group
v. 2.01 (2001-06-19) Frequently Asked Questions about the Extensible Markup Language
Introduction
This is the list of Frequently-Asked Questions about the Extensible Markup Language. It is restricted to questions about XML: if you are seeking answers to questions about HTML, scripts, Java, databases, or penguins, you may find some pointers, but you should probably look elsewhere as well. It is intended as a first resource for users, developers, and the interested reader, and does not form part of the XML Specification.

Thanks
The following people have helped with contributions:

Terry Allen, Tom Borgman, Tim Bray, Robin Cover, Bob DuCharme, Christopher Maden, Eve Maler, Makoto Murata, Peter Murray-Rust, Liam Quin, Michael Sperberg-McQueen, Joel Weber

...plus many other members of the SIG as well as FAQ readers around the world. Please mail any corrections or additions to the editor. Sadly, the form for comments found at the end of previous versions has had to be discontinued due to abuse. Please post questions to the relevant mailing list or newsgroup, not to the editor.

Recent changes
2.0 June 2001 DTD changed from DocBook SGML to QAML XML; removed query form; most questions revised and in some cases rewritten; updated references to new versions of associated standards, recommendations, and working drafts; added pointer to Jon Noring's Unicode test page and NIST's XSLT/XPath test suite; updated Eve Maler's links to the DTD for the spec; added warnings on speling and punk chew asian; added question on namespaces; fixed bug in question on stylesheets; inserted explanation of `document' vs `data' software; added new mailing list on XSL:FO; updated Robin Cover's URL throughout; updated the question on media types for RFC 3023; Extended question of graphics to cover SVG. For 2.01 there were minor typos, some updated links (to recent versions of the standards, and in the section on More Information), and a few wording changes. Thanks to James Cummings for a very thorough proofread.

History
Organisation
The FAQ is divided into four sections: General, User, Author, and Developer. The questions are numbered independently within each section. As the numbering may change with each version, comments and suggestions should refer to the version number (see above) as well as the Section and Question Number.

Please submit bug reports, suggestions for improvement, and other comments relating to this FAQ only to the maintainer at pflynn@ucc.ie. Comments about the XML Specification itself and related specifications should be directed to the W3C.

Availability
This is the first entirely XML version: it was delayed due to (human) difficulties about which DTD was most suitable. I finally picked QAML for its simplicity over DocBook, but it has meant a few changes in the internal subset (see the XML file) and a change in the content model for span to allow embedded links.

The XML master is at http://www.ucc.ie/xml/faq.xml. You can download it in text-mode as well;
The HTML version is at http://www.ucc.ie/xml/index.html;
A plaintext (ASCII) version is at http://www.ucc.ie/xml/faq.txt. A notification of the plaintext version is occasionally posted to comp.text.xml for the archives.
For printed copies there are versions for A4 PostScript, A4 PDF, Letter PostScript and Letter PDF configurations available. Viewers can be downloaded for PostScript and PDF formats.
WAP (if anyone's still using it), OEB (eBook) and cHTML versions are in development for your handheld devices.
The FAQ is also available in carbon-based toner on flattened dead trees by sending US$10 (or equivalent) to the editor (email first to check currency and postal address).
Translations (those I know about) are at:

Japanese: http://www.fxis.co.jp/DMS/sgml/cafe/library/etc/xmlfaq.html [Murata Makoto];
Spanish: http://slug.ctv.es/~olea/sgml-esp/xfaq15.html [Jaime Sagarduy];
Korean: http://xml.t2000.co.kr/faq/index.html [Kangchan Lee];
Chinese: http://zxd.webjump.com/xml.html [Neko] and http://weblab.crema.unimi.it/xmlzh/XML_FAQ.htm; [Jiang Luqin]
French: http://www.gutenberg.eu.org/pub/GUTenberg/publications/HTML/FAQXML/faqxml-fr.html [Jacques André];
Czech: http://zvon.vscht.cz/ZvonHTML/Translations/xmlFAQ/front_all.html [Miloslav Nic];
You can download the XML logo as a GIF, JPG, or EPS file; and an icon for your file system in ICO (Microsoft Windows), Mac, or XPM (X Window system) format.
List of Questions

A.1. What is XML?
A.2. What is XML for?
A.3. What is SGML?
A.4. What is HTML?
A.5. Aren't XML, SGML, and HTML all the same thing?
A.6. Who is responsible for XML?
A.7. Why is XML such an important development?
A.8. Why not just carry on extending HTML?
A.9. Why do we need all this SGML stuff? Why not just use Word or Notes?
A.10. Where do I find more information about XML?
A.11. Where can I discuss implementation and development of XML?
A.12. What is the difference between XML and C or C++?

B.1. What do I have to do to use XML?
B.2. Why should I use XML instead of HTML?
B.3. Where can I get an XML browser?
B.4. Do I have to switch from SGML or HTML to XML?

C.1. Does XML replace HTML?
C.2. Do I have to know HTML or SGML before I learn XML?
C.3. What does an XML document look like inside?
C.4. How does XML handle white-space in my documents?
C.5. Which parts of an XML document are case-sensitive?
C.6. How can I make my existing HTML files work in XML?
C.7. Is there an XML version of HTML?
C.8. If XML is just a subset of SGML, can I use XML files directly with existing SGML tools?
C.9. I'm used to authoring and serving HTML. Can I learn XML easily?
C.10. Can XML use non-Latin characters?
C.11. What's a Document Type Definition (DTD) and where do I get one?
C.12. How do I create my own DTD?
C.13. Does XML let me make up my own tags?
C.14. I keep hearing about alternatives to DTDs. What's a schema?
C.15. How do I upload or download XML to/from a database?
C.16. How will XML affect my document links?
C.17. Can I do mathematics using XML?
C.18. How does XML handle metadata?
C.19. Can I use Java, ActiveX, etc in XML files?
C.20. Can I use Java to create or manage XML files?
C.21. How do I execute or run an XML file?
C.22. How do I control appearance?
C.23. How do I use graphics in XML?

D.1. Where's the spec?
D.2. What are these terms DTDless, valid, and well-formed?
D.3. Which should I use in my DTD, attributes or elements?
D.4. What else has changed between SGML and XML?
D.5. What's a namespace?
D.6. What XML software can I use today?
D.7. Do I have to change any of my server software to work with XML?
D.8. Can I still use server-side inclusions?
D.9. Can I (and my authors) still use client-side inclusions?
D.10. I'm trying to understand the XML Spec: why does XML have such difficult terminology?
D.11. Is there a Developer's API kit for XML?
D.12. How does XML fit with the DOM?
D.13. Is there a conformance test suite for XML processors?
D.14. How do I include one DTD (or fragment) in another?
D.15. I've already got SGML DTDs: how do I convert them for use with XML?
D.16. What's the story on XML and EDI?

A. General questions
A.1 What is XML?
XML is the Extensible Markup Language. It is designed to improve the functionality of the Web by providing more flexible and adaptable information identification.

It is called extensible because it is not a fixed format like HTML (a single, predefined markup language). Instead, XML is actually a `metalanguage' -- a language for describing other languages -- which lets you design your own customized markup languages for limitless different types of documents. XML can do this because it's written in SGML, the international standard metalanguage for text markup systems (ISO 8879).

Back to Index

A.2 What is XML for?
XML is intended `to make it easy and straightforward to use SGML on the Web: easy to define document types, easy to author and manage SGML-defined documents, and easy to transmit and share them across the Web.'

It defines `an extremely simple dialect of SGML which is completely described in the XML Specification. The goal is to enable generic SGML to be served, received, and processed on the Web in the way that is now possible with HTML.'

`For this reason, XML has been designed for ease of implementation, and for interoperability with both SGML and HTML'

[Quotes are from the XML specification]. XML is not just for Web pages: it can be used to store any kind of structured information, and to enclose or encapsulate information in order to pass it between different computing systems which would otherwise be unable to communicate.

Back to Index

A.3 What is SGML?
SGML is the Standard Generalized Markup Language (ISO 8879:1985), the international standard for defining descriptions of the structure of different types of electronic document. There is an SGML FAQ at http://www.infosys.utas.edu.au/info/sgmlfaq.txt which is posted every month to the comp.text.sgml newsgroup, and the SGML Web pages are at http://xml.coverpages.org/.

SGML is very large, powerful, and complex. It has been in heavy industrial and commercial use for over a decade, and there is a significant body of expertise and software to go with it. XML is a lightweight cut-down version of SGML which keeps enough of its functionality to make it useful but removes all the optional features which make SGML too complex to program for in a Web environment.

ISO standards like SGML are governed by the International Organization for Standardization in Geneva, Switzerland, and voted into or out of existence by representatives from every country's national standards body.

If you have a query about an international standard, you should contact your national standards body for the name of your country's representative on the relevant ISO committee or working group.

If you have a query about your country's representation in Geneva or about the conduct of your national standards body, you should contact the relevant government department in your country, or speak to your public representative.

The representation of countries at the ISO is not a matter for this FAQ. Please do not submit queries to the editor about how or why your ISO representatives have or have not voted on a specific standard.

Back to Index

A.4 What is HTML?
HTML is the HyperText Markup Language (RFC 1866), a small application of SGML used on the Web.

It defines a very simple class of report-style documents, with section headings, paragraphs, lists, tables, and illustrations, with a few informational and presentational items, and some hypertext and multimedia. See the question on extending HTML. There is also an XML version of HTML.

Back to Index

A.5 Aren't XML, SGML, and HTML all the same thing?
Not quite; SGML is the mother tongue, and has been used for describing thousands of different document types in many fields of human activity, from transcriptions of ancient Irish manuscripts to the technical documentation for stealth bombers, and from patients' clinical records to musical notation. SGML is very large and complex, however, and probably overkill for most common applications.

XML is an abbreviated version of SGML, to make it easier for you to define your own document types, and to make it easier for programmers to write programs to handle them. It omits all the options, and most of the more complex and less-used parts of SGML in return for the benefits of being easier to write applications for, easier to understand, and more suited to delivery and interoperability over the Web. But it is still SGML, and XML files may still be processed in the same way as any other SGML file (see the question on XML software).

HTML is just one of the SGML or XML applications, the one most frequently used in the Web.

Technical readers may find it more useful to think of XML as being SGML-- rather than HTML++.

Back to Index

A.6 Who is responsible for XML?
XML is a project of the World Wide Web Consortium (W3C), and the development of the specification is being supervised by their XML Working Group. A Special Interest Group of co-opted contributors and experts from various fields contributed comments and reviews by email.

XML is a public format: it is not a proprietary development of any company. The v1.0 specification was accepted by the W3C as Recommendation on Feb 10, 1998.

Back to Index

A.7 Why is XML such an important development?
It removes two constraints which were holding back Web developments:

dependence on a single, inflexible document type (HTML);
the complexity of full SGML, whose syntax allows many powerful but hard-to-program options.
XML simplifies the levels of optionality in SGML, and allows the development of user-defined document types on the Web.

Back to Index

A.8 Why not just carry on extending HTML?
HTML is already overburdened with dozens of interesting but incompatible inventions from different manufacturers, because it provides only one way of describing your information.

XML allows groups of people or organizations to create their own customized markup applications for exchanging information in their domain (music, chemistry, electronics, hill-walking, finance, surfing, petroleum geology, linguistics, cooking, knitting, stellar cartography, history, engineering, rabbit-keeping, mathematics, genealogy, etc).

HTML is at the limit of its usefulness as a way of describing information, and while it will continue to play an important role for the content it currently represents, many new applications require a more robust and flexible infrastructure.

Back to Index

A.9 Why do we need all this SGML stuff? Why not just use Word or Notes?
Information on a network which connects many different types of computer has to be usable on all of them. Public information cannot afford to be restricted to one make or model or manufacturer, or to cede control of its data format to private hands. It is also helpful for such information to be in a form that can be reused in many different ways, as this can minimize wasted time and effort. Proprietary data formats, no matter how well documented or publicized, are simply not an option: their control still resides in private hands and they can be changed or withdrawn arbitrarily without notice.

SGML is the international standard for defining this kind of application, but those who need an alternative based on different software for other purposes are entirely free to implement similar services using such a system, especially if they are for private use.

Back to Index

A.10 Where do I find more information about XML?
Online, there's the XML Specification and ancillary documentation available from the W3C; Robin Cover's SGML/XML Web pages with an extensive list of online reference material and links to software; and a summary and condensed FAQ from Tim Bray.

The items listed below are the ones I have been told about. Please mail me if you come across others.

An annual XML Conference is run by the Graphic Communications Association. XML 2001 is in Orlando, Florida, on December 9-14. See the GCA's Web site for details.
The Extreme Markup Languages 2001 conference takes place on 12-17 August at Le Centre Sheraton, Montréal, Canada.
The annual XML Summer School takes place in Oxford on 20-25 July 2001.
There are many other XML events around the world: most of them announced on the mailing lists and newsgroups.

There are lists of books, articles, and software for XML in Robin Cover's SGML and XML Web pages. That site should always be your first port of call: please look there first before using the form in this FAQ to ask about software or documentation.

Back to Index

A.11 Where can I discuss implementation and development of XML?
The two principal online media are the Usenet newsgroups and the mailing lists. The newsgroups are comp.text.xml and to a certain extent comp.text.sgml. Ask your Internet Provider how to access these, or use a Web interface like Google.

The general-purpose mailing list for public discussion is XML-L: to subscribe, visit the Web site and click on the link to join. You can also access the XML-L archives from the same URL.
For those developing components for XML there is an xml-dev mailing list. You can subscribe by sending a 1-line mail message to xml-dev-request@lists.xml.org saying just SUBSCRIBE. The xml-dev archives are at OASIS http://lists.xml.org/archives/xml-dev/. Note that this list is for those people actively involved in developing resources for XML. It is not for general information about XML (see this FAQ and other sources) or for general discussion about XML implementation and resources (see below).
There is a list for discussing XSL, the stylesheet language: XSL-List. For details of how to subscribe, see http://www.mulberrytech.com/xsl/xsl-list.
Andrew Watt writes that there is a mailing list specifically for XSL-FO only, on eGroups.com. You can subscribe by sending a message to XSL-FO-subscribe@egroups.com.
When you join a mailing list you will be sent details of how to use it. Please Read The Fine Documentation because it contains important information, particularly about what to do if your company or ISP changes your email address.

Please note that there is a lot of inaccurate and misleading information published in print and on the Web about subscribing to mailing lists. Don't guess: read the documentation.

Mailing lists in other languages
Gianni Rubagotti writes: A new Italian mailing list about XML is born: to subscribe, send a mail message without a subject line but with text saying subscribe XML-IT to majordomo@ananas.usr.dsi.unimi.it. Everyone, Italian or not, who wants to debate about XML in our tongue is welcome.
JP Theberge writes: A French mailing list about XML has been created. To subscribe, send subscribe to xml-request@trisome.com.
Jarno Elovirta writes: a Finnish mailing list about XML has been set up. To subscribe, send an email to majordomo@evitech.fi with subscribe XML-Fin in the message body. The list is also hypermailed for online reference at http://users.evitech.fi/lists/xml-fin/.
Back to Index

A.12 What is the difference between XML and C or C++?
C and C++ (and other languages like FORTRAN, or Pascal, or BASIC, or Java or dozens more) are programming languages with which you specify calculations, actions, and decisions to be carried out in order:

mod curconfig[if left(date,6) = "01-Apr", t.put "April Fool!",
f.put days('31102001','DDMMYYYY')-days(sdate,'DDMMYYYY')
" shopping days to Samhain"];
XML is a markup specification language with which you can design ways of describing information (text or data), usually for storage, transmission, or processing by a program: it says nothing about what you should do with the data (although your choice of element names may hint at what they are for):

<part num="DA42" models="LS AR DF HG KJ" update="2001-11-22">
<name>Camshaft end bearing retention circlip</name>
<image drawing="RR98-dh37" type="SVG" x="476" y="226"/>
<maker id="RQ778">Ringtown Fasteners Ltd</maker>
<notes>Angle-nosed insertion tool <tool id="GH25"/> is
required for the removal and replacement of this item.</notes>
</part>
On its own, an SGML or XML file (and HTML) doesn't do anything. It's a data format which just sits there until you run a program which does something with it. See also the question about how to run or execute XML files.

Back to Index

B. Existing users of SGML (including HTML: everyone who browses the Web)
B.1 What do I have to do to use XML?
For the average user of the Web, nothing except use a browser which works with XML (see the question about browsers). Remember some XML components are still being implemented, so some features are still either undefined or have yet to be written. Don't expect everything to work yet!

You can use XML browsers to look at some of the stable XML material, such as Jon Bosak's Shakespeare plays and the molecular experiments of the Chemical Markup Language (CML). There are some more example sources listed at http://xml.coverpages.org/xml.html#examples, and you will find XML (particularly in the disguise of XHTML) being introduced in places where it won't break older browsers.

If you want to start preparations for creating your own XML files, see the questions in the Authors' Section and the Developers' Section.

Back to Index

B.2 Why should I use XML instead of HTML?
Authors and providers can design their own document types using XML, instead of being stuck with HTML. Document types can be explicitly tailored to an audience, so the cumbersome fudging that has to take place with HTML can become a thing of the past: authors and designers are free to invent their own markup elements;
Information content can be richer and easier to use, because the descriptive and hypertext linking abilities of XML are much greater than those of HTML.
XML can provide more and better facilities for browser presentation and performance, using CSS and XSL stylesheets;
It removes many of the underlying complexities of SGML in favor of a more flexible model, so writing programs to handle XML is much easier than doing the same for full SGML.
Information will be more accessible and reusable, because the more flexible markup of XML can be used by any XML software instead of being restricted to specific manufacturers as has become the case with HTML.
Valid XML files are kosher SGML, so they can be used outside the Web as well, in existing SGML environments.
Back to Index

B.3 Where can I get an XML browser?
Remember the XML specification is still relatively new, so a lot of what you see now is experimental, and because the potential number of different XML applications is unlimited, no single browser can be expected to handle 100% of everything.

Some of the generic parts of XML (eg parsing, tree management, searching, formatting, etc) are being combined into general-purpose libraries or toolkits to make it easier for developers to take a consistent line when writing XML applications. Such applications can then be customized by adding semantics for specific markets, or using languages like Java to develop plugins for generic browsers and have the specialist modules delivered transparently over the Web.

MSIE5.5 handles XML but currently still renders it via the HTML model. Microsoft were also the architects of a hybrid (invalid) solution (islands) in which you could embed fragments of XML in HTML files because current HTML-only browsers simply ignored element markup which they didn't recognize, but his has now been superseded by XHTML. MSIE includes an implementation of an obsolete draft of XSLT (WD-xsl): you need to upgrade it and replace the parser (see http://www.netcrucible.com/ for details).
The publicly-released Netscape code (Mozilla) and the almost indistinguishable Netscape 6 (there is no v5) have XML/CSS support, based on James Clark's expat XML parser, and this seems to be more robust, if less slick, than MSIE. Mozilla 0.9 is reported to have some XSLT capability.
The authors of the former MultiDoc Pro SGML browser, CITEC, joined forces with Mozilla to produce a multi-everything browser called DocZilla, which reads HTML, XML, and SGML, with XSL and CSS stylesheets. This runs under NT and Linux and is currently still in the alpha stage. See http://www.doczilla.com for details. This is by far the most ambitious browser project, and is backed by solid SGML expertise, but seems to be rather a long time coming.
Opera now supports XML and CSS on MS-Windows and Linux and is the most complete implementation so far. The browser size is tiny by comparison with the others, but features are good and the speed is excellent, although the earlier slavish insistence on mimicking everything Netscape did, especially the bugs, still shows through in places.
See also the notes on software for authors and developers, and the more detailed list on the XML pages in the SGML Web site at http://xml.coverpages.org/.

Back to Index

B.4 Do I have to switch from SGML or HTML to XML?
No, existing SGML and HTML applications software will continue to work with existing files. But as with any enhanced facility, if you want to view or download and use XML files, you will need to use XML-aware software. There is much more being developed for XML than there ever was for SGML, so a lot of users are moving.

Back to Index

C. Authors of SGML (including writers of HTML: Web page owners)
C.1 Does XML replace HTML?
No. XML itself does not replace HTML: instead, it provides an alternative which allows you to define your own set of markup elements. HTML is expected to remain in common use for some time to come, and a Document Type Definition for HTML is available in XML syntax as well as in original SGML. XML is designed to make the writing of DTDs much simpler than with full SGML. (See the question on DTDs for what one is and why you might want one.)

Back to Index

C.2 Do I have to know HTML or SGML before I learn XML?
No, although it's useful because a lot of XML terminology and practice derives from 15 years' experience of SGML.

Be aware that `knowing HTML' is not the same as `understanding SGML' . Although HTML was written as an SGML application, browsers ignore most of it (which is why so many useful things don't work), so just because something is done a certain way in HTML browsers does not mean it's correct, least of all in XML.

Back to Index

C.3 What does an XML document look like inside?
The basic structure is very similar to most other applications of SGML, including HTML. XML documents can be very simple, with no document type declaration (DTD), and straightforward nested markup of your own design:

<?xml version="1.0" standalone="yes"?>
<conversation>
<greeting>Hello, world!</greeting>
<response>Stop the planet, I want to get off!</response>
</conversation>
Or they can be more complicated, with a DTD specified (see the question on document types), and maybe an internal subset (local DTD changes in [square brackets]), and a more complex structure:

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE titlepage SYSTEM "http://www.foo.bar/dtds/typo.dtd"
[<!ENTITY % active.links "INCLUDE">]>
<titlepage id="BG12273624">
<white-space type="vertical" amount="36"/>
<title font="Baskerville" size="24/30"
alignment="centered">Hello, world!</title>
<white-space type="vertical" amount="12"/>
<!-- In some copies the following decoration is
hand-colored, presumably by the author -->
<image location="http://www.foo.bar/fleuron.eps"
type="URL" alignment="centered"/>
<white-space type="vertical" amount="24"/>
<author font="Baskerville" size="18/22"
style="italic">Vitam capias</author>
<white-space type="vertical" class="filler"/>
</titlepage>
Or they can be anywhere between: a lot will depend on how you want to define your document type (or whose you use) and what it will be used for.

Back to Index

C.4 How does XML handle white-space in my documents?
The SGML rules regarding white-space have been changed for XML. All white-space, including linebreaks, TAB characters, and regular spaces, even between those elements where no text can ever appear, is passed by the parser unchanged to the application (browser, formatter, viewer, converter, etc), identifying the context in which the white-space was found (element content, data content, or mixed content). This means it is the application's responsibility to decide what to do with such space, not the parser's:

insignificant white-space between structural elements (space which occurs where only element content is allowed, ie between other elements, where text data never occurs) will get passed to the application (in SGML this white-space gets suppressed, which is why you can put all that extra space in HTML documents and not worry about it. This is not so in XML);
significant white-space (space which occurs within elements which can contain text and markup mixed together, usually mixed content or PCDATA) will still get passed to the application exactly as under SGML. It is the application's responsibility to handle it correctly.
<chapter>
<title>
My title for Section
1.
</title>
<p>
text
</p>
</chapter>
The parser must inform the application that white-space has occurred in element content, if it can detect it. (Users of SGML will recognize that this information is not in the ESIS, but it is in the grove.) In the above example, the application will receive all the pretty-printing linebreaks, TABs, and spaces between the elements as well as those embedded in the chapter title. It is the function of the application, not the parser, to decide which type of white-space to discard and which to retain.

Back to Index

C.5 Which parts of an XML document are case-sensitive?
All of it, both markup and text. This is significantly different from HTML and most other SGML applications. It was done to allow markup in non-Latin-alphabet languages and to obviate problems with case-folding in scripts which are caseless.

Element type names are case-sensitive: you must stick with whatever combination of upper- or lower-case you use to define them (either by first usage or in a DTD). So you can't say <BODY>...<body>: upper- and lower-case must match; thus <IMG/> and <img/> are two different element types;
For well-formed files with no DTD, the first occurrence of an element type name defines the casing;
Attribute names are also case-sensitive, on a per-element basis: for example <PIC width="7in"/> and <PIC WIDTH="6in"/> in the same file exhibit two separate attributes, because the different casings of width and WIDTH distinguish them;
Attribute values are also case-sensitive. CDATA values (eg HRef="MyFile.SGML") always have been, but ID and IDREF attributes are now case-sensitive as well;
All entity names (&Aacute;), and your data content (text), are case-sensitive as always.
Back to Index

C.6 How can I make my existing HTML files work in XML?
Either convert them to conform to some new document type (with or without a DTD) and write a stylesheet to go with them; or edit them to conform to XHTML.

It is necessary to convert existing HTML files because XML does not permit end-tag minimization (missing </p>, etc), unquoted attribute values, and a number of other shortcuts which are normal in most HTML DTDs. However, many HTML authoring tools already produce almost (but not quite) well-formed XML. As a preparation for XML, the W3C's HTML Tidy program can clean up some of the formatting mess left behind by inadequate HTML editors, and even separate out some of the formatting to a stylesheet, but there is usually still some hand-editing to do.

Back to Index

Converting to a new document type
If you want to move your files out of HTML into some other DTD entirely, there are already many native XML application DTDs, and several XML versions of popular SGML DTDs like TEI and DocBook to choose from. There is a pilot site run by CommerceNet (http://www.xmlx.com/) for the exchange of XML DTDs.

Alternatively you could just make up your own markup: so long as it makes sense and you create a well-formed file, you should be able to write a CSS or XSLT stylesheet and have your document displayed in a browser.

Back to Index

Converting valid HTML to XHTML
If your HTML files are valid (full formal validation with an SGML parser, not just a simple syntax check), then try validating them as XHTML. If you have been creating clean HTML without embedded formatting then this process should throw up only mismatches in upper/lowercase element and attribute names, and empty elements (plus perhaps the odd non-standard element type name if you use them). Simple hand-editing or a short script should be enough to fix these changes.

If your HTML validly uses end-tag omission, this can be fixed automatically by a normalizer program like sgmlnorm (part of SP) or by the sgml-normalize function in an editor like Emacs/psgml (don't be put off by the names, they both do XML).

If you have a lot of valid HTML files, could write a script to do this in a programming language which understands SGML/XML markup (such as Omnimark, Balise, SGMLC, or a system using one of the SGML libraries for Perl, Python, or Tcl), or you could even use editor macros if you know what you're doing.

Back to Index

Converting invalid HTML to well-formed XHTML
If your files are invalid HTML (95% of the Web) they can be converted to well-formed DTDless files as follows:

replace the DOCTYPE Declaration with the XML Declaration <?xml version="1.0" standalone="yes" encoding="iso-8859-1"?>. If there was no DOCTYPE Declaration, just prepend the XML Declaration.
change any EMPTY elements (eg every <ISINDEX>, <BASE>, <META>, <LINK>, <NEXTID> and <RANGE> in the header, and every <IMG>, <BR>, <HR>, <FRAME>, <WBR>, <BASEFONT>, <SPACER>, <AUDIOSCOPE>, <AREA>, <PARAM>, <KEYGEN>, <COL>, <LIMITTEXT>, <SPOT>, <TAB>, <OVER>, <RIGHT>, <LEFT>, <CHOOSE>, <ATOP>, and <OF> in the body of the document) so that they end with /> instead, for example <img src="mypic.gif" alt="Picture"/>;
make all element names and attribute names lowercase;
ensure there are correctly-matched explicit end-tags for all non-empty elements; eg every <p> must have a </p>, etc;
escape all < and & non-markup (ie literal text) characters as &lt; and &amp; respectively (there shouldn't be any isolated &lt; characters to start with);
ensure all attribute values are in quotes.
Be aware that many HTML browsers may not accept XML-style EMPTY elements with the trailing slash, so the above changes may not be backwards-compatible. An alternative is to add a dummy end-tag to all EMPTY elements, so <IMG src="foo.gif"/> becomes <img src="foo.gif"></img>. This is still valid XML provided you guarantee never to put any text content in such elements. Adding a space before the slash (eg <img src="foo.gif" />) may also fool older browsers into accepting XHTML as HTML.

If your HTML files fall into this category (HTML created by some WYSIWYG editors is frequently invalid) then they will almost certainly have to be converted manually, although if the deformities are regular and carefully constructed, the files may actually be almost well-formed, and you could write a program or script to do as described above. The oddities you may need to check for include:

do the files contain markup syntax errors? For example, are there any missing angle-brackets, backslashes instead of forward slashes on end-tags, or elements which nest incorrectly (eg <B>an element starting <I>inside another</B> but ending outside</I>)?
are there any URLs (eg in hrefs or srcs) which use backslashes instead of forward slashes?
do the files contain markup which conflicts with HTML DTDs, such as headings or lists inside paragraphs, list items outside list environments, header elements like <base>preceding the first <html>, etc?
do the files use imaginary elements which are not in any known HTML DTD? (large amounts of these are used in proprietary markup systems masquerading as HTML). Although this is easy to transform to a DTDless well-formed file (because you don't have to define elements in advance) most proprietary or browser-specific extensions have never been formally defined, so it is often impossible to work out meaningfully where the element types can be used.
Are there any non-ISO Latin-1 (8859-1) characters or wrongly-coded characters in your files? Look especially for native Apple Mac characters left by careless designers, or any of the illegal characters (the 32 characters at decimal codes 128-159 inclusive) inserted by MS-Windows editors. These need to be converted to the correct characters in ISO 8859-1 or the relevant plane of Unicode (and the XML Declaration should show iso-8859-1 encoding unless you specifically know otherwise).
Do your files contain malformed (Mosaic/Netscape-style) comments? Comments must look <!-- like this --> with double-dashes each end and no double dashes in between (safest: no multiple dashes in between).
If you answer Yes to any of these, you can save yourself a lot of grief by fixing those problems first before doing anything else. You will likely then be getting close to having well-formed files.

Markup which is syntactically correct but semantically meaningless or void should be edited out before conversion. Examples are spacing devices such as repeated empty paragraphs or linebreaks, empty tables, invisible spacing GIFs etc: XML uses stylesheets, so you won't need any of these.

Unfortunately there is rather a lot of work to do if your files are invalid: this is why many professional Webmasters will always insist that only valid or well-formed files are used (and why you should instruct designers to do the same), in order to avoid unnecessary manual maintenance and conversion costs later.

Back to Index

C.7 Is there an XML version of HTML?
The W3C has released XHTML as `a reformulation of HTML 4 in XML 1.0' . This specification defines HTML as an XML application, and provides three DTDs corresponding to the ones defined by HTML 4.0. The semantics of the elements and their attributes are as defined in the W3C Recommendation for HTML 4.0. These semantics provide the foundation for future extensibility of XHTML. Compatibility with existing HTML user agents is possible by following a small set of guidelines.

Back to Index

C.8 If XML is just a subset of SGML, can I use XML files directly with existing SGML tools?
Yes, provided you use up-to-date SGML software which knows about the WebSGML Adaptations to ISO 8879 (the features needed to support XML, such as the variant form for EMPTY elements; some aspects of the SGML Declaration such as NAMECASE GENERAL NO; multiple attribute token list declarations, etc).

An alternative is to use an SGML DTD to let you create a fully-normalised SGML file, but one which does not use empty elements; and then remove the DocType Declaration so it becomes a well-formed DTDless XML file.

Most SGML tools now handle XML files well, and provide an option switch between the two standards. (see the pointers in the question on software).

Back to Index

C.9 I'm used to authoring and serving HTML. Can I learn XML easily?
Yes, very easily, but at the moment there is still a need for tutorials, simpler tools, and more examples of XML documents. Well-formed XML documents may look similar to HTML except for some small but very important points of syntax.

The big practical difference is that XML has to stick to the rules. HTML browsers let you serve them broken or corrupt HTML because they don't do a formal parse but elide all the broken bits instead. With XML your files have to be correct or they simply won't work at all. One outstanding problem is that some browsers claiming XML conformance are also broken. Try yours on the test file at http://www.ucc.ie/test.xml.

Back to Index

C.10 Can XML use non-Latin characters?
Yes, the XML Specification explicitly says XML uses ISO 10646, the international standard 31-bit character repertoire which covers most human (and some non-human) languages. This is currently congruent with Unicode and is planned to be superset of Unicode.

The spec says (2.2): `All XML processors must accept the UTF-8 and UTF-16 encodings of ISO 10646...' . UTF-8 is an encoding of Unicode into 8-bit characters: the first 128 are the same as ASCII, the rest are used to encode the rest of Unicode into sequences of between 2 and 6 bytes. UTF-8 in its single-octet form is therefore the same as ISO 646 IRV (ASCII), so you can continue to use ASCII for English or other unaccented languages using the Latin alphabet. Note that UTF-8 is incompatible with ISO 8859-1 (ISO Latin-1) after code point 126 decimal (the end of ASCII). UTF-16 is an encoding of Unicode into 16-bit characters, which lets it represent the next two planes. UTF-16 is incompatible with ASCII because it uses two 8-bit bytes per character.

`...the mechanisms for signalling which of the two are in use, and for bringing other encodings into play, are [...] in the discussion of character encodings.' The XML Specification explains how to specify in your XML file which coded character set you are using.

Use of UCS-4 can only legally be specified in SGML or XML when the WebSGML Adaptations to ISO 8879 are implemented: this enables numbers longer than eight digits to be used in the SGML Declaration.

`Regardless of the specific encoding used, any character in the ISO 10646 character set may be referred to by the decimal or hexadecimal equivalent of its bit string' : so no matter which character set you personally use, you can still refer to specific individual characters from elsewhere in the encoded repertoire by using &#dddd; (decimal character code) or &#xHHHH; (hexadecimal character code, in uppercase). The terminology can get confusing, as can the numbers: see the ISO 10646 Concept Dictionary. Rick Jelliffe has XML-ized the ISO character entity sets. Mike Brown's encoding information at http://skew.org/xml/tutorial/ is a very useful explanation of the need for correct encoding. There is an excellent online database of glyphs and characters in many encodings from the Estonian Language Institute server at http://www.eki.ee/letter/.

Back to Index

C.11 What's a Document Type Definition (DTD) and where do I get one?
A DTD is a formal description in XML Declaration Syntax of a particular type of document. It sets out what names are to be used for the different types of element, where they may occur, and how they all fit together. For example, if you want a document type to be able to describe Lists which contain Items, the relevant part of your DTD might contain something like this:

<!ELEMENT List (Item)+>
<!ELEMENT Item (#PCDATA)>
This defines a list as an element type containing one or more items (that's the plus sign); and it defines items as element types containing just plain text (Parsed Character Data or PCDATA). Validating parsers read the DTD before they read your document so that they can identify where every element type ought to come and how each relates to the other, so that applications which need to know this in advance (most editors, search engines, navigators, databases) can set themselves up correctly. The example above lets you create lists like:

<List><Item>Chocolate</Item><Item>Music</Item><Item>Surfing</Item></List>
How the list appears in print or on the screen depends on your stylesheet: you do not normally put anything in the XML to control formatting like you had to do with HTML before stylesheets. This way you can change style easily without ever having to edit the document itself.

A DTD provides applications with advance notice of what names and structures can be used in a particular document type. Using a DTD when editing files means you can be certain that all documents which belong to a particular type will be constructed and named in a consistent and conformant manner. DTDs are less important for processing documents already known to be well-formed, but they are still needed if you want to take advantage of XML's special attribute types like the built-in ID/IDREF cross-reference mechanism.

There are thousands of DTDs already in existence in all kinds of areas (see the SGML/XML Web pages for pointers). Many of them can be downloaded and used freely; or you can write your own (see the question on creating your own DTD. Existing SGML DTDs need to be converted to XML for use with XML systems: read the question on converting SGML DTDs to XML, and expect to see announcements of popular DTDs becoming available in XML format.

Back to Index

C.12 How do I create my own DTD?
You need to use the XML Declaration Syntax (very simple: declaration keywords begin with <! rather than just the open angle bracket, and the way the declarations are formed also differs slightly). Here's an example of a DTD for a shopping list, based on the fragment used in an earlier question:

<!ELEMENT Shopping-List (Item)+>
<!ELEMENT Item (#PCDATA)>
It says that there shall be an element called Shopping-List and that it shall contain elements called Item: there must be at least one (that's the plus sign) but there may be more than one. It also says that the Item element may contain parsed character data (PCDATA, ie text).

Because there is no other element which contains Shopping-List, that element is assumed to be the `root' element, which encloses everything else in the document. You can now use it to create an XML file: give your editor the declarations:

<?xml version="1.0"?>
<!DOCTYPE Shopping-List SYSTEM "shoplist.dtd">
(assuming you put the DTD in that file). Now your editor will let you create files according to the pattern:

<Shopping-List>
<Item>Chocolate</Item>
<Item>Sugar</Item>
<Item>Butter</Item>
</Shopping-List>
It is possible to develop complex and powerful DTDs of great subtlety, but for any significant use you should learn more about document systems analysis and document type design. See for example Developing SGML DTDs by Maler and el Andaloussi, Prentice Hall, 1997, 0-13-309881-8, which was written for SGML, but perhaps 95% of it applies to XML as well, as XML is much simpler than full SGML -- see the list of restrictions which shows what has been cut out.

Back to Index

C.13 Does XML let me make up my own tags?
No, it lets you make up names for your own elements. If you think tags and elements are the same thing you are already in trouble: read the rest of this question carefully.

Before we start this one, Bob DuCharme notes: Don't confuse the term `tag' with the term `element' . They are not interchangeable. An element usually contains two different kinds of tag: a start-tag and an end-tag, with text or more markup between them.

XML lets you decide which elements you want in your document and then indicate your element boundaries using the appropriate start- and end-tags for those elements. Each <!ELEMENT... declaration defines a class of elements that may or may not be used in a document conforming to that DTD. We call this class of elements an `element type' . Just as the HTML DTD includes the H1 and P element types, your document can have color and price element types.

Non-empty elements are made up of a start-tag, the element's content, and an end-tag. <color>red</color> is a complete instance of the color element. <color> is only the start-tag of the element, showing where it begins; it is not the element itself.

Empty elements are a special case that may be represented either as a pair of start- and end-tags with nothing between them (eg <price retail="123"></price>) or as a single empty element start-tag that has a closing slash to tell the parser `don't go looking for an end-tag to match this' (eg <price retail="123"/>). [Bob DuCharme]

Back to Index

C.14 I keep hearing about alternatives to DTDs. What's a schema?
A DTD is for specifying the structure (only) of an XML file: it gives the names of the elements, attributes, and entities that can be used, and how they fit together. Because DTDs were designed for use with traditional text documents, they have no mechanism for defining the content of elements in terms of data types, because XML has no data types: text is just text. A DTD therefore cannot be used to specify numeric ranges or to define limitations or checks on the text content, only on the markup that surrounds it.

The XML Schema recommendation provides a means of specifying element content in terms of data types, so that document type designers can provide criteria for validating the content of elements as well as the markup itself. Schemas are written as XML files, thus avoiding the need for processing software to be able to read XML Declaration Syntax, which is different from XML Instance Syntax.

Schemas are now a formal Recommendation, and a number of sites are serving useful applications as both DTDs and Schemas, eg http://www.schema.net and http://www.dtd.com. There is a separate Schema FAQ at http://www.schemavalid.com. The term `vocabulary' is sometimes used to refer to `DTDs and Schemas' together.

Authors and publishers should note that the plural of Schema is Schemas: the use of the singular to do duty for the plural is a foible dear to the semi-literate; the use of the old (Greek) plural schemata is now unnecessary didacticism. Writers should also note that the plural of DTD is DTDs: there is no apostrophe.

Bob DuCharme adds: Many XML developers were dissatisfied with the syntax of the markup declarations described in the XML spec for two reasons. First, they felt that if XML documents were so good at describing structured information, then the description of a document type's own structure (its schema) should be in an XML document instead of written with its own special syntax. In addition to being more consistent, this would make it easier to edit and manipulate the schema with regular document manipulation tools. Secondly, they felt that traditional DTD notation didn't allow document type designers the power to impose enough constraints on the data -- for example, the ability to say that a certain element type must always have a positive integer value, that it may not be empty, or that it must be one of a list of possible choices. This eases the development of software using that data because the developer has less error-checking code to write.

Back to Index

C.15 How do I upload or download XML to/from a database?
Ask your database manufacturer: they all provide XML import and export modules. In some trivial cases there will be a 1:1 match between field and element types; in most cases some programming is required to establish the matches, but this can usually be stored as a procedure so that subsequent uses are simply commands or calls with the relevant parameters.

Users from a database or computer science background should be aware that XML is not a database management system: it is a text markup system. While there are many similarities, some of the concepts of one are simply non-existent in the other: XML does not possess some database-like features in the same way that databases do not possess markup-like ones. It is a common error to believe that XML is a DBMS like Oracle or Access and therefore possesses the same facilities. It doesn't. [PF]

Back to Index

C.16 How will XML affect my document links?
The linking abilities of XML systems are much more powerful than those of HTML, so you'll be able to do much more with them. Existing HREF-style links will remain usable, but the new linking technology is based on the lessons learned in the development of other standards involving hypertext, such as TEI and HyTime, which let you manage bidirectional and multi-way links, as well as links to a span of text (within your own or other documents) rather than to a single point. These features have been available to SGML users for many years, so there is considerable experience and expertise available in using them.

The XML Linking Specification (XLink) and XML Extended Pointer Specification (XPointer) documents contain a detailed draft specification. An XML link can be either a URL or a TEI-style Extended Pointer (XPointer), or both. A URL on its own is assumed to be a resource; if an XPointer or XLink follows it, it is assumed to be a sub-resource of that URL; an XPointer on its own is assumed to apply to the current document (all exactly as with HTML).

An XLink is always preceded by one of #, ?, or |. The # and ? mean the same as in HTML applications; the | means the sub-resource can be found by applying the link to the resource, but the method of doing this is left to the application. An XPointer can only follow a #.

The TEI Extended Pointer Notation (EPN) is much more powerful than the fragment address on the end of some URLs, as it allows you to specify the location of a link end using the structure of the document as well as (or in addition to) known, fixed points like IDs. For example, the linked second occurrence of the word `XPointer' two paragraphs back could be referred to as http://www.ucc.ie/xml/faq.sgml#ID(hypertext).child(2,*).child(2,#element,'p').child(3,#element,'link'), meaning the third link element within the second paragraph within the second object in the element whose ID is hypertext (this question). Count the objects from the start of this question in the XML source (which has the ID hypertext):

the first child object is the title of the question (<q>);
the second child object is the answer (the <a> element);
within the <a> element go to the second paragraph;
count to the third link.
David Megginson has produced an xpointer function for Emacs/psgml which will deduce an XPointer for any location in an XML document.

Back to Index

C.17 Can I do mathematics using XML?
Yes, if the document type you use provides for math. The mathematics-using community is developing software, and there is a MathML Recommendation at the W3C, which is a native XML application. It would also be possible to make XML fragments from other DTDs, such as the long-expired HTML3, the near-obsolete HTML Pro, or ISO 12083 Math, or OpenMath, or one of your own making. Browsers which display some math embedded in SGML already exist (eg DynaText, Panorama, Multidoc Pro).

Back to Index

C.18 How does XML handle metadata?
Because XML lets you define your own markup language, you can make full use of the extended hypertext features (see the question on Links) of XML to store or link to metadata in any format (eg ISO 11179, Dublin Core, Warwick Framework, Resource Description Framework (RDF), and Platform for Internet Content Selection (PICS)).

There are no predefined elements in XML, because it is an architecture, not an application, so it is not part of XML's job to specify how or if authors should or should not implement metadata. You are therefore free to use any suitable method from simple attributes to the embedding of entire Dublin Core/Warwick Framework metadata records. Browser makers may also have their own architectural recommendations or methods to propose.

Back to Index

C.19 Can I use Java, ActiveX, etc in XML files?
This will depend on what facilities the browser makers implement. XML is about describing information; scripting languages and languages for embedded functionality are software which enables the information to be manipulated at the user's end, so these languages do not have any place in an XML file, but in stylesheets like XSL and CSS.

XML itself provides a way to define the markup needed to implement scripting languages: as a neutral standard it neither encourages not discourages their use, and does not favour one language over another, so the field is wide open.

Back to Index

C.20 Can I use Java to create or manage XML files?
Yes, any programming language can be used to output data from any source in XML format. There is a growing number of front-ends and back-ends for programming environments and data management environments to automate this.

There is a large body of `middleware' written in Java and other languages for managing data either in XML or with XML output. There is a suite of Java tutorials (with source code and explanation) available at http://developerlife.com.

Please do not mail the FAQ editor with questions about your Java programming bugs. Ask one of the Java newsgroups instead.
Back to Index

C.21 How do I execute or run an XML file?
You can't and you don't. XML is not a programming language, so XML files don't `run' or `execute' . XML is a markup specification language and XML files are data: they just sit there until you run a program which displays them (like a browser) or does some work with them (like a converter which writes the data in another format, or a database which reads the data), or modifies them (like an editor).

Back to Index

C.22 How do I control appearance?
In HTML, default styling is built into the browsers because the tagset of HTML is predefined and hardwired into browsers. IN XML, where you can define your own tagset, browsers cannot know what names you are going to use and what they will mean, so you need a stylesheet if you want to display the formatted text.

Browsers which read XML will accept and use a CSS stylesheet at a minimum, but you can also use the more powerful XSLT stylesheet language to transform your XML into HTML -- which browsers, of course, already know how to display (and that HTML can still use a CSS stylesheet).

As with any system where files can be viewed at random by arbitrary users, the author cannot know what resources (such as fonts) are on the user's system, so the same care is needed as with HTML using fonts. To invoke a stylesheet from an XML file, include one of the stylesheet declarations:

<?xml-stylesheet href="foo.xsl" type="text/xsl"?>
<?xml-stylesheet href="foo.css" type="text/css"?>
The Cascading Stylesheet Specification (CSS) provides a simple syntax for assigning styles to elements, and has been implemented in most browsers.

The Extensible Stylesheet Language (XSL) has been created for use specifically with XML. Dave Pawson maintains a comprehensive FAQ at http://www.dpawson.co.uk/xsl/xslfaq.html. XSL uses XML syntax (an XSL stylesheet is an XML file) and has widespread support from several major vendors (see the questions on browsers and other software) although current browser support is limited. XSL comes in two flavours:

XSL itself, which is a pure formatting language, and which needs a text formatter like FOP or PassiveTeX to create printable output (both can produce PDF). Currently I am not aware of any Web browsers which support XSL rendering;
XSLT (T for Transformation), which is a language to specify transformations of XML into HTML either inside the browser or at the server before transmission. It can also specify transformations from one vocabulary of XML to another, and from XML to plaintext.
Currently only MS Internet Explorer 5.5 handles XSLT inside the browser (and even that needs some post-installation surgery to remove the obsolete WD-xsl and replace it with the current XSL-Transform processor). But there is a growing use of server-side processors like Cocoon, which let you store your information in XML but serve it auto-converted to HTML, thus allowing the output to be used by any browser. XSLT is also widely used to transform XML into non-SGML formats for input to other systems (for example to transform XML into LaTeX for typesetting.

Back to Index

C.23 How do I use graphics in XML?
Graphics have traditionally just been links which happen to have a picture file at the end rather than another piece of text. They can therefore be implemented in any way supported by the XLink and XPointer specifications (see earlier question), including using similar syntax to existing HTML images. They can also be referenced using XML's built-in NOTATION and ENTITY mechanism in a similar way to standard SGML, as external unparsed entities.

The linking specifications, however, give you much better control over the traversal and activation of links, so an author can specify, for example, whether or not to have an image appear when the page is loaded, or on a click from the user, or in a separate window, without having to resort to scripting.

XML itself doesn't predict or restrict graphic file formats: GIF, JPG, TIFF, PNG, CGM, and SVG at a minimum would seem to make sense; however, vector formats are normally preferred for non-photographic images.

Back to Index

Using entities for images
You cannot embed a raw graphics file (or any other binary [non-text] data) directly into an XML file because any bytes happening to resemble markup would get misinterpreted: you must refer to it by linking (see below). It would, however, in theory be possible to include a text-encoded transformation of a binary file as a CDATA marked section, using something like UUencode with the markup characters ] and > removed from the map so that they could not occur and be misinterpreted, or even simple hexadecimal encoding as used in PostScript. For vector graphics, however, the solution is to use SVG (see below).

Bob DuCharme adds: All the data in an XML document entity must be parseable XML. You can define an external entity as either a parsed entity (parseable XML) or an unparsed entity (anything else). Unparsed entities can be used for picture files, sound files, movie files, or whatever you like. They can only be referenced from within a document as the value of an attribute (much like a bitmap picture on an HTML Web page is the value of the img element's src attribute) and not part of the actual document. In an XML document, this attribute must be declared to be of type ENTITY, and the entity's declaration must specify a declared NOTATION, because if the entity isn't XML, the XML processor needs to know what it is. For example, in the following document, the colliepic entity is declared to have a JPEG notation, and it's used as the value of the empty dog element's picfile attribute.

<?xml version="1.0"?>
<!DOCTYPE dog [
<!NOTATION JPEG SYSTEM "Joint Photographic Experts Group">
<!ENTITY colliepic SYSTEM "lassie.jpg" NDATA JPEG>
<!ELEMENT dog EMPTY>
<!ATTLIST dog picfile ENTITY #REQUIRED>
]>
<dog p

  † In Memoriam † zondag 14 oktober 2001 @ 23:45:04 #64
13819 Loedertje
Trotse GILF.
pi_1901944
Anton Constandse: "Leven tegen de stroom in"


Bert Gasenbeek, Rudolf de Jong, Pieter Edelman (redactie) "Anton Constandse &#8211; Leven tegen de stroom in" &#8211; Uitgeverij Papieren Tijger, Breda, en Het Humanistisch Archief, Utrecht, 1999 &#8211; 268 blz. ISBN 90 6728 099 2 &#8211; NLG 30,00 - EURO 13,61

Sommige mensen vergeet ik nooit. Anton Constandse (1899-1985) is een van die onvergetelijke persoonlijkheden. Ik bewaar goede herinneringen aan de keren dat ik hem mocht ontmoeten. Een markante, briljante, bescheiden "ambachtsman van het vrije woord".

Individualisme

Constandse was weliswaar anarchist, maar zag al in 1938 in dat dit ideaal niet te verwerkelijken is en nam afscheid van het (politieke) radicaalanarchisme. We kunnen, met hem, &#8216;het anarchisme&#8217; echter ook opvatten als een (in allerlei vormen en varianten optredende) vrijheidlievende geestelijke stroming die een &#8216;sociaal individualisme&#8217; nastreeft. Als we de maatschappelijke betrekkelijkheid én de sociale betrokkenheid ervan op hun juiste waarde schatten, blijkt dit individualisme een inspirerende levenshouding en zelfs een onmisbare factor in de maatschappelijke evolutie te zijn. Kropotkin (1842-1921), de anarchistische Russische prins, noemde dit verschijnsel &#8216;wederkerig dienstbetoon&#8217;, dat hij even onontkoombaar achtte als &#8216;de strijd om het bestaan&#8217;. Constandse's &#8216;anarchisme&#8217; werd na 1938 dan ook meer cultureel en literair dan &#8216;politiek&#8217; van inhoud. Kunst en literatuur zijn in wezen &#8216;anarchistisch&#8217; (individualistisch). Op talloze manieren beelden kunstenaars dit vrijheidsstreven uit of brengen het onder woorden. Kunst: een daad van verzet. Constandse heeft hier belangwekkende dingen over gezegd en geschreven.

Over het individualisme als geestelijke houding en maatschappelijke stroming schreef hij:

"Geestelijk was het individualisme van grote betekenis voor de evolutie. Maar zijn denkbeelden en idealen konden slechts worden bevorderd voorzover collectiviteiten daartoe bereidheid en vermogen toonden te bezitten. En aldus is individuele vrijheid toch een sociaal ideaal." (Cursief van mij, JB)

Dit citaat uit "Het souvereine ik - Het individualisme van Lao-tse tot Friedrich Nietzsche" (Uitg. Meulenhoff, 1983) is, zoals de schrijvers van dit boek terecht stellen, "&#8230; het credo van Constandse's atheïsme en anarchisme. En is de laatste zin ook niet het credo van elke vrijdenker en elke humanist?" De juiste dynamische balans vinden tussen individu en samenleving: Constandse&#8217;s levenshouding in een notendop.

Atheïsme, humanisme

Voor Constandse waren atheïsme en humanisme synoniemen. Tegenwoordig is dit geen vanzelfsprekendheid meer. Ook Anton begreep dit. Hoewel enkele opvattingen niet veranderen, evolueerden ook zijn opvattingen in de loop der jaren. Zo zag hij het hedendaagse humanisme en "het Humanistisch Verbond als de erfgenaam van drie geestelijke stromingen, die elk op hun eigen wijze tot een bovengodsdienstige ethiek waren gekomen: naast de vrijdenkers waren dat de socialisten en de vrijzinnig-protestanten." (In het blad "Rekenschap, Driemaandelijks tijdschrift voor wetenschap en cultuur", 1966). Zo vertegenwoordigde de VPRO in zijn ogen een uitermate belangrijke culturele rol. En dat met socialisme niet het zitvleessocialisme wordt bedoeld maar het historisch diep gewortelde emancipatiestreven van de werkende klasse(n) in sociale, politieke, geestelijke en culturele zin, moge duidelijk zijn. Het zitvleessocialisme is van deze emancipatie helaas een bijverschijnsel.

Constandse schreef meer dan honderd boeken en vele duizenden artikelen over evenzoveel onderwerpen. Een greep: anarchisme, seksuele hervorming, de dichter Herman Gorter, de wijsgeer Spinoza, Spaanse literatuur, Dada, het &#8216;sociale individualisme&#8217; en het asociale iktijdperk, Vietnam, Latijns-Amerika, de tweede wereldoorlog, de koude oorlog, imperialisme, neokolonialisme. Hij leverde zowel bijdragen aan de Groene Amsterdammer en Vrij Nederland als aan de Vrije Gedachte. Voor het Handelsblad (het latere NRC Handelsblad) schreef hij zijn vaste rubriek en voor de VPRO radio las hij zijn commentaren. Het mooie van Constandse was, dat ook als je het niet met hem eens was, hij je toch wist te boeien.

Een onvermijdelijk zeer uitgebreide &#8216;beredeneerde bibliografie&#8217; en een (evenzeer onvermijdelijk) uitermate beknopte biografie, alsmede een bijzonder handig register, besluiten dit boek. Iedereen wil ik dit boek aanbevelen. Nu 'ayatollahs' van diverse pluimage hun kans schoon zien om hun enge en benauwende ideeën opnieuw op te leggen, kan een stem als die van Constandse niet luid en duidelijk genoeg klinken. Constandse&#8217;s denken noopt niet tot na-apen, wel tot nadenken.

© Jan Bontje 2001


pi_1901953
quote:
Op zondag 14 oktober 2001 23:43 schreef Loedertje het volgende:
[b]Kun je dat misschien uitleggen, ik snap er geen fuck van
Ik ook niet, shoot me
  † In Memoriam † zondag 14 oktober 2001 @ 23:47:22 #66
13819 Loedertje
Trotse GILF.
pi_1901967
Dichter-columnist-tekstschrijver uit Spijkenisse"
1947, Rotterdam



Genre: "bontjes" (op haiku gebaseerde korte gedichten die op geheel eigen wijze als voertuig voor zijn poëzie-uitingen dienen) - verder "light verse", kwatrijnen, aforismen, columns, songteksten, korte verhalen, essays, boekrecensies. Dit alles zowel uit eigen behoefte als in opdracht.

pi_1902020
*paste*

Section 1: Basic Questions
This section aims to deal with basic questions, addressing the role and
nature of CGI, and its place in Web programming. Questions/answers which
just don't appear to 'fit' under any other section may also be included
here.


1.1: What is CGI?
[ from the CGI reference http://hoohoo.ncsa.uiuc.edu/cgi/overview.html ]

The Common Gateway Interface, or CGI, is a standard for external
gateway programs to interface with information servers such as HTTP servers.
A plain HTML document that the Web daemon retrieves is static,
which means it exists in a constant state: a text file that doesn't change.
A CGI program, on the other hand, is executed in real-time, so that it
can output dynamic information.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.2: Is it a script or a program?
The distinction is semantic. Traditionally, compiled executables
(binaries) are called programs, and interpreted programs are usually
called scripts. In the context of CGI, the distinction has become
even more blurred than before. The words are often used interchangably
(including in this document). Current usage favours the word "scripts"
for CGI programs.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.3: When do I need to use CGI?
There are innumerable caveats to this answer, but basically any
Webpage containing a form will require a CGI script or program
to process the form inputs.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.4: Should I use CGI or JAVA?
[answer to this non-question hopes to try and reduce the noise level of
the recurrent "CGI vs JAVA" threads].

CGI and JAVA are fundamentally different, and for most applications
are NOT interchangable.

CGI is a protocol for running programs on a WWW server. Whilst JAVA
can also be used for that, and even has a standardised API (the servlet,
which is indeed an alternative to CGI), the major role of JAVA on the
Web is for clientside programming (the applet).

In certain instances the two may be combined in a single application:
for example a JAVA applet to define a region of interest from a
geographical map, together with a CGI script to process a query
for the area defined.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.5: Should I use CGI or SSI or ... { PHP/ASP/... }
CGI and SSI (Server-Side Includes) are often interchangable, and it may
be no more than a matter of personal preference. Here are a few
guidelines:
1) CGI is a common standard agreed and supported by all major HTTPDs.
SSI is NOT a common standard, but an innovation of NCSA's HTTPD
which has been widely adopted in later servers. CGI has the
greatest portability, if this is an issue.
2) If your requirement is sufficiently simple that it can be done
by SSI without invoking an exec, then SSI will probably be
more efficient. A typical application would be to include
sitewide 'house styles', such as toolbars, netscapeised <body>
tags or embedded CSS stylesheets.
3) For more complex applications - like processing a form -
where you need to exec (run) a program in any case, CGI
is usually the best choice.
4) If your transaction returns a response that is not an HTML page,
SSI is not an option at all.

Many more recent variants on the theme of SSI are now available.
Probably the best-known are PHP which embeds server-side scripting
in a pre-html page, and ASP which is Microsoft's version of a
similar interface.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.6: Should I use CGI or an API?
APIs are proprietary programming interfaces supported by particular
platforms. By using an API, you lose all portability. If you know
your application will only ever run on one platform (OS and HTTPD),
and it has a suitable API, go ahead and use it. Otherwise stick to CGI.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.7: So what are in a nutshell the options for webserver programming?
Too many to enumerate - but I'll try and summarise. Briefly, there
are several decisions you have to make, including:
* Power. Is it up to a complex task?
* Complexity. How much programming manpower is it worth?
* Portability. Might you want to run your program on another system?

So here's an overview of the main options. It's inevitably subjective,
but may be helpful to someone:

Basic SSI:Simple interface for basic dynamic content.
Non-standard - read your server docs.
Enhanced SSI[1]:Suitable for more complex tasks within
an HTML page.
CGI:The standardised, portable general-purpose API,
not limited to working with HTML pages.
Enhanced CGI-like[2]:Typically gain efficiency but lose portability
compared to standard CGI.
Servlets:An alternative API for JAVA, that overcomes
the limitation of JAVA not supporting
environment variables.
Server API:Generally the most powerful and most complex option.

[1] For example, PHP, ASP.
[2] For example, CGI adapted to mod_perl or fastcgi.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.8: What do I absolutely need to know?
If you're already a programmer, CGI is extremely straightforward, and just
three resources should get you up to speed in the time it takes to read them:
1) Installation notes for your HTTPD. Is it configured to run CGI
scripts, and if so how does it identify that a URL should be executed?
(Check your manuals, READMEs, ISP webpages/FAQS, and if you still can't
find it ask your server administrator).
2) The CGI specification at NCSA tells you all you need to know
to get your programs running as CGI applications.
http://hoohoo.ncsa.uiuc.edu/cgi/interface.html
3) WWW Security FAQ. This is not required to 'get it working', but
is essential reading if you want to KEEP it working!
http://www.w3.org/Security/Faq/www-security-faq.html

If you're NOT already a programmer, you'll have to learn. If you would
find it hard to write, say, a 'grep' or 'cat' utility to run from the
commandline, then you will probably have a hard time with CGI. Make
sure your programs work from the commandline BEFORE trying them with CGI,
so that at least one possible source of errors has been dealt with.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.9: Does CGI create new security risks?
Yes. Period.
There is a lot you can do to minimise these. The most important thing
to do is read and understand Lincoln Stein's excellent WWW security
FAQ, at http://www.w3.org/Security/Faq/www-security-faq.html


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.10: Do I need to be on Unix?
No, but it helps. The Web, along with the Internet itself, C, Perl,
and almost every other Good Thing in the last 20 years of computing,
originated in Unix. At the time of writing, this is still the
most mature and best-supported platform for Web applications.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.11: Do I have to use Perl?
No - you can use any programming language you please. Perl is simply
today's most popular choice for CGI applications. Some other widely-
used languages are C, C++, TCL, BASIC and - for simple tasks -
even shell scripts.

Reasons for choosing Perl include its powerful text manipulation
capabilities (in particular the 'regular' expression) and the fantastic
WWW support modules available.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.12: What languages should I know/use?
It isn't really that important. Use what you're comfortable with,
or what you're constrained (eg by your manager) to use.

If you're just dabbling with programming, Perl is a good choice, simply
because of the wealth of ready-to-run Perl/CGI resources available.

If you're serious about programming, you should be at home in a
range of languages. C, the industry standard, is a must (at least to
the level of comfortably reading other people's code). You'll
certainly want at least one scripting language such as Perl, Python
or Tcl. C++ is also a good idea.

In response to a Usenet newbie question:
> I am seriously wanting to learn some CGI programming languages

J.M. Ivler wrote some eloquent words of wisdom:
> If you want to learn a programming language, learn a programming language.
> If you want to learn how to do CGI programming, learn a programming
> language first.
>
> My book is one of the few that tackles two languages at the same time.
> Why? because it's not about languages (which are just syntax for logic).
> CGI programming is about programming, and how to leverage the experience
> for the person coming to the site, or maintaining the site, or in some way
> meeting some requirements. Language is just a tool to do so.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.13: Do I have to put it in cgi-bin?
see next question


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.14: Do I have to call it *.cgi? *.pl?
Maybe. It depends on your server installation.

These types of filenames are commonly used conventions - no more.
It is up to the server administrator whether or not CGI scripts are
enabled, and (if so) what conventions tell the server to run or
to print them.

If you are running your own server, read the manual.
If you're on ISP or other rented webspace, check their webpages for
information or FAQs. As a last resort, ask the server administrator.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.15: What is the "CGI Overhead", and should I be worried about it?
The CGI Overhead is a consequence of HTTP being a stateless protocol.
This means that a CGI process must be initialised for every "hit"
from a browser.

In the first instance, this usually means the server forking a
new process. This in itself is a modest overhead, but it can
become important on a heavily-used server if the number of
processes grows to problem levels.

In the second place, the CGI program must initialise. In the
case of a compiled language such as C or C++ this is negligible,
but there is a small penalty to pay for scripting languages such as Perl.

Thirdly, CGI is often used as 'glue' to a backend program, such as
a database, which may take some considerable time to initialise.
This represents a major overhead, which must be avoided in any
serious application. The most usual solution is for the backend
program to run as a separate server doing most of the work, while
the actual CGI simply carries messages.

Fourthly, some CGI scripts are just plain inefficient, and may
take hundreds of times the resources they need. Programs using
system() or `backtick` notation often fall into this category.

Note that there are ways to reduce or eliminate all these overheads,
but these tend to be system- or server-specific. The best-supported
server is probably Apache, as commercial server-vendors may prefer to
push their proprietary solutions in preference to CGI.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.16: What do I need to know about file permissions and "chmod"?
Unix systems are designed for multiple users, and include provision
for protecting your work from unauthorised access by other users
of the system. The file permissions determine who is permitted
to do what with your programs, data, and directories. The command
that sets file permissions is chmod.

Web servers typically run as user "nobody". That means that, setting
aside serious bugs (such as those in certain versions of the Frontpage
extensions), your files are absolutely secure from damage through the
webserver. It also means that you may have to make explicit changes to
enable the server to access them in a CGI context.

There are two ways to run CGI:
- by default they run as the webserver user (nobody)
For most purposes this is safest, as your programs and data
are protected by the operating system from unauthorised access
through possible bugs in your CGI. However, when the CGI has
to write to a file, that file must be writable to every web
user on the system, and is therefore completely unprotected.
- setuid, they run under your own userid.
This means that files written by your CGI can be secure.
On the other hand, any bugs in your CGI could now compromise
*all* your programs and data on the server.
As an elementary security precaution, scripts (e.g. Perl) are
prevented from running setuid by most OSs. The "cgiwrap"
program offers a workaround for this.

A third way you should *never* permit CGI to be run is:
- as root or setuid root, they can run as any user.
This is extremely dangerous, as any bugs could compromise the
entire server, including every user's files. Fortunately only
the system administrator can install setuid root programs. If
you are *at all* concerned about security, make sure that no such
programs (in particular Frontpage extensions) are installed,
regardless of whether you use them yourself.

For a proper overview, "man chmod". Some modes that may be useful
in a typical CGI context are:

* CGI programs, 0755
* data files to be readable by CGI, 0644
* directories for data used by CGI, 0755
* data files to be writable by CGI, 0666 (data has absolutely no security)
* directories for data used by CGI with write access, 0777 (no security)
* CGI programs to run setuid, 4755
* data files for setuid CGI programs, 0600 or 0644
* directories for data used by setuid CGI programs, 0700 or 0755
* For a typical backend server process, 4750

Finally, if this answer tells you anything you didn't already know,
don't even think about trying to set up a secure server!


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.17: What is CGIWrap, and how does it affect my program?
[ quoted from http://www.umr.edu/~cgiwrap/intro.html ]

> CGIWrap is a gateway program that allows general users to use CGI scripts
> and HTML forms without compromising the security of the http server.
> Scripts are run with the permissions of the user who owns the script. In
> addition, several security checks are performed on the script, which will not
> be executed if any checks fail.
>
> CGIWrap is used via a URL in an HTML document. As distributed, cgiwrap
> is configured to run user scripts which are located in the
> ~/public_html/cgi-bin/ directory.

See http://www.umr.edu/~cgiwrap/


[Table of Contents] [Index]
--------------------------------------------------------------------------------

1.18: How do I decode the data in my Form?
The normal format for data in HTTP requests is URLencoded. All Form data
is encoded in a string, of the form
param1=value1&param2=value2&...paramn=valuen
Many non-alphanumeric characters are "escaped" in the encoding:
the character whose hexadecimal number is "XY" will be represented by
the character string "%XY".

Decoding this string is a fundamental function of every CGI library.

Another format is "multipart/form-data", also known as "file upload".
You will get this from the HTML markup
<form method="POST" enctype="multipart/form-data">

(but note you must accept URLencoded input in any case, since not all
browsers support multipart forms).

Most(?) CGI libraries will handle this transparently.

Section 2: HTTP Headers and NPH Scripts
This is a fairly technical section dealing with HTTP, the protocol of
the Web. It also includes NPH, the mechanism by which CGI programs can
return HTTP header information directly to the Client.


2.1: What is HTTP (HyperText Transfer Protocol)?
HTTP is the protocol of the Web, by which Servers and Clients (typically
browsers) communicate. An HTTP transaction comprises a Request sent by
the Client to the Server, and a Response returned from the Server to
the Client.
Every HTTP request and response includes a message header, describing
the message. These are processed by the HTTPD, and may often be
mostly ignored by CGI applications (but see below).
A message body may also be included:
1) A HEAD or GET request sends only a header. Any form data is encoded
in an HTTP_QUERY_STRING header field, which is available to the CGI
program as an environment variable QUERY_STRING.
2) A POST request sends both header and body. The body typically
comprises data entered by a user in a form.
3) A HEAD request does not expect a body in the response.
4) A GET or POST request will accept a response with or without a body,
according to the header. The body of a response is typically an
HTML document.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.2: What HTTP request headers can I use?
Most HTTP request headers are passed to the CGI script as environment
variables. Some are guaranteed by the CGI spec. Others are server,
browser and/or application dependent.

To see what _your_ browser and server are telling each other, just use
a trivial little CGI script to print out the environment. In Unix:
#!/bin/sh
echo "Content-type: text/plain"
echo
set

(Just call it "env.cgi" or something, and put it where your server
will execute it. Then point your browser at
http://your.server/path/to/env.cgi ).

This enables you to see at-a-glance what useful server variables are set.
Note that dumping the environment like this within a more complex
script can be a useful debugging technique.

For details, see the CGI Environment Variables specification at
http://hoohoo.ncsa.uiuc.edu/cgi/env.html
(which also includes a version of the above script - somewhat more
nicely formatted - online).


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.3: What Environment variables are available to my application?
See previous question. Those you can rely on are documented in NCSA's
pages; those associated with your particular server and browser can
be determined using the above script.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.4: Why doesn't my script get REMOTE_USER? My page is password-protected.
You will get REMOTE_USER if the _script_ is password protected.
That's all. The page the user is coming from has nothing to do with it.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.5: What HTTP response headers do I need to know about?
Unless you are using NPH, the HTTPD will insert necessary response
headers on your behalf, always provided it is configured to do so.

However, it is conventional for servers to insert the Content-Type header
based on a page's filename, and CGI scripts cannot rely on this. Hence
the usual advice is to print an explicit Content-Type header.
At least one of "Content-Type", "Status" and "Location" is almost
always required.

A few other headers you may wish to use explicitly are:
Status(to set HTTP return code explicitly. Caveats:
(1) Behaviour is undefined if it conflicts with
another header. (2) This is NOT an HTTP header.)
Location(to redirect the user to another URI, which may or may
not be on your own server)
Set-cookie(Netscape/Nonstandard) Set a cookie
Refresh(Netscape/Nonstandard) Clientpull

You can also use general MIME headers: eg "Keywords" for the benefit of
indexers (although in this instance some major search robots have
regrettably introduced a new protocol to do the same thing).

For a detailed reference, see RFC1945 (HTTP/1.0) or RFC2068 (HTTP/1.1).


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.6: What is NPH?
NPH = No Parsed Headers. The script undertakes to print the entire
HTTP response including all necessary header fields. The HTTPD
is thereby instructed not to parse the headers (as it would normally do)
nor add any which are missing.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.7: Must/should/can I write nph scripts?
Generally, no. It is usually better to save yourself hassle by letting
the HTTPD produce the headers for you.

If you are going to use NPH, be sure to read and understand the HTTP spec at
http://www.w3.org/pub/WWW/Protocols/

Your headers should be complete and accurate, because you're instructing
the HTTPD not to correct them or insert what's missing.

Possible circumstances where the use of NPH is appropriate are:
* When your headers are sufficiently unusal that they might be
differently parsed by different HTTPDs (eg combining "Location:"
with a "Status:" other than 302).
* When returning output over a period of time (eg displaying
unbuffered results of a slow operation in 'real' time).
See RFC1945 (HTTP/1.0) or RFC2068 (HTTP/1.1) for detail


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.8: Do I have to call it nph-*
According to NCSA's reference pages, this is the standard for telling
the server that your script is NPH, so this should be a fully portable
convention.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

2.9: What is the difference between GET and POST?
Firstly, the the HTTP protocol specifies differing usages for the two
methods. GET requests should always be idempotent on the server.
This means that whereas one GET request might (rarely) change some state
on the Server, two or more identical requests will have no further effect.

This is a theoretical point which is also good advice in practice.
If a user hits "reload" on his/her browser, an identical request will be
sent to the server, potentially resulting in two identical database or
guestbook entries, counter increments, etc. Browsers may reload a
GET URL automatically, particularly if cacheing is disabled (as is usually
the case with CGI output), but will typically prompt the user before
re-submitting a POST request. This means you're far less likely to get
inadvertently-repeated entries from POST.

GET is (in theory) the preferred method for idempotent operations, such
as querying a database, though it matters little if you're using a form.
There is a further practical constraint that many systems have builtin
limits to the length of a GET request they can handle: when the total size
of a request (URL+params) approaches or exceeds 1Kb, you are well-advised
to use POST in any case.

In terms of mechanics, they differ in how parameters are passed to the
CGI script. In the case of a POST request, form data is passed on
STDIN, so the script should read from there (the number of bytes to be
read is given by the Content-length header). In the case of GET, the
data is passed in the environment variable QUERY_STRING. The content-type
(application/x-www-form-urlencoded) is identical for GET and POST requests.

Section 3: Techniques: "How do I..."
This section comprises programming hints and tips for a number of popular
tasks. Also included are a number of common questions to which the answer
is "you can't", with the reasons why.


3.1: Can I get information about who is visiting?
*sigh*
Many people keep mailing me questions or suggested hacks to get
visitor information, particularly email addresses. It seems they
won't take "NO" for an answer.

The bottom line is that whatever information is available to _you_
is _equally_ available to every spammer on the net. Therefore when
a browser bug _does_ permit personal data to be collected, it gets
reported and fixed very quickly (one short-lived Netscape 2.0.x
release reportedly had such a bug in its Javascript engine).

You can get some limited information from the environment variables
passed to you by the browser. Relatively few of these are guaranteed
to be available, and some may be misleading. For particular types
of information, see below. For full details, see NCSA's reference pages.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.2: Can I get the email of visitors?
Why do you want to do this?

The best information available is the REMOTE_ADDR and REMOTE_HOST,
which tell you nothing about the user. Techniques such as "finger@"
are not reliable, are widely disliked, and generally serve only to
introduce long delays in your CGI. Better - as well as more polite -
just to ask your users to fill in a form.

BTW: the "From:" header line (HTTP_FROM variable) is usually only set
by robots, since human visitors to your webpage will not normally want
their addresses collected without permission, and browsers respect this.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.3: "But I saw some.kool.site display my email address..."
Some sites will play party tricks, which can get *some users* email
addresses. Possible tell-tale signs of this are inordinate delays
loading a page (fingering @REMOTE_HOST - doesn't often work but
probably can't be detected from the webpage), or a submit button that
appears to do nothing at all (a mailto: form - works well with some
browsers but trivially detectable). As a "snoop" party trick that's
fine, but if you find someone abusing these facilities (eg they send
you junkmail), alert their service provider!


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.4: Can I verify the email addresses people enter in my Form?
Unfortunately people will sometimes enter an incorrect or invalid
email address in your Form. Worse, they may enter a valid but
incorrect email address that will deliver to someone who doesn't
want your mail.

Proposed regexps to match email addresses are sometimes posted.
Most of these will fail against perfectly valid email addresses,
like "S=N.OTHER/OU1=X12345A/RECIPNUM=1/MTA-BASIC@attmail.com"
(which is what your address looks like if you are connected to
the Internet via X400 - and if you think that example is too easy,
check the ones at the end of Eli the Bearded's Email Addressing FAQ).

Probably the most complete parser and checker available for download
is Tom Christiansen's, at
http://www.perl.com/CPAN/authors/Tom_Christiansen/scripts/ckaddr.gz
Of course, this still says nothing about deliverability.

A frequently-suggested hack that doesn't work is to use
SMTP EXPN or VRFY commands. Modern versions of sendmail permit
administrators to disable these commands, and many sites take
advantage of this facility to protect their users' privacy.

Probably the best way to verify an email address is to send mail to
it, asking the user to respond. Include a clause like "if you have
received this mail in error, please accept our apologies..."


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.5: Subject: How can I get the hostname of the remote user?
You can't. Well, not always.

IF it is available, you'll find it in the REMOTE_HOST environment
variable. However, this will more often than not contain the numerical
IP address rather than the IP name of the remote host. Remember that
not all IP addresses have a hostname associated with them; this is the
case of most IP addresses assigned to dialup users, for example. Your
web server may also not perform a reverse lookup on incoming
connections, in which case REMOTE_HOST will contain the IP address even
if it has a corresponding IP name. In the second case, you can do a
reverse lookup yourself in your script, but this is expensive and
should probably be avoided unless absolutely necessary.

Even if you do manage to obtain a hostname, you should be aware that it
may not correspond to the hostname the user is accessing your page
from. It may instead be that of an intervening proxy host.

The short answer is therefore that there is no reliable way of finding
out what the remote user's hostname is.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.6: Can I get browser details and return different pages?
Why do you want to do this?

Well-written HTML will display correctly in any browser, so the correct
answer to this question is to design a template for your output in good
HTML, and make sure your output is correct.

If you insist on a different answer, you can use the HTTP_USER_AGENT
environment variable. This requires care, and can lead to unexpected
results. For example, checking for "Mozilla" and serving a frameset
to it ensures that you *also* serve the frameset to early (Non-Frame)
Netscapes, me-too browsers (notably Microsoft[1]) and others who have
chosen to lie to you about their browser.

Note also that not every User Agent is a browser. Your page may be
read by a user agent you've never heard of, and then displayed by
100 different browsers. Or retrieved by different browsers from
a cache. Another reason to write good HTML, and not try to
devise a clever or koool substitute.

[1] At the time of writing, only Netscape 2+ supported frames, and
some authors considered them koool. That's changed, but the same
general principle still holds.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.7: Can I trace where a user has come from/is going to?
HTTP_REFERER might or might not tell you anything. By all means
use it to collect partial statistics if you participate in (say)
an advertising banner scheme. But it is not always set, and may
be meaningless (eg if a user has accessed your page from a bookmark,
and the browser is too dumb to cope with this).

The HTTP protocol forbids relying on Referer information for functionality
in your programs, so don't try it.

You cannot trace outgoing links at all. If you really must try,
point all the external links to your HTTPD and use its redirection
facility (which gives you generally-reliable logs). This is much
less inefficient than using a CGI script.

BTW: don't even think about asking Javascript to send you information
on some event: it's a violation of privacy which Netscape fixed as
soon as complaints about its abuse started coming in. If it works
with *your* browser, you should upgrade!


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.8: Can I launch a long process and return a page before it's finished?
[UNIX]
You have to fork/spawn the long-running process.
The important thing to remember is to close all its file descriptors;
otherwise nothing will be returned to the browser until it's finished.
The standard trick to accomplish this is redirection to/from /dev/null:

"long_process < /dev/null > /dev/null 2>&1 &"
print HTML page as usual


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.9: Can I launch a long process which the user interacts with?
This does not fit well with the basic mechanics of the Web, in which
each transaction comprises a single request and response.
If your processing can be done on the Client machine, you can use
a clientside application; for example a Java applet.

For processing on the server, one trick that works well for Clients
running an X server (and far more efficient than a JAVA solution) is:
if ( fork() ) {
print HTML page explaining what's going on and advising about xhost
} else {
exec ("xterm -display THEIR_DISPLAY -title MY_APP -e MY_PROG ARGS
< /dev/null > /dev/null 2>&1 &") ;
}
NOTE: THEIR_DISPLAY is not necessarily the same as REMOTE_HOST or REMOTE_ADDR.
You have to ask users to supply their display (set REMOTE_HOST as default).

A JAVA terminal program will accomplish something similar for the many
users with platforms that support JAVA but not X.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.10: Can I password-protect my pages?
Yes. Use your HTTPD's authentication, just as you would a basic HTML page.
Now you'll have the identity of every visitor in REMOTE_USER.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.11: Can I do HTTP authentication using CGI?
It depends on which version of the question you asked.

Yes, you can use CGI to trigger the browser's standard Username/Password
dialogue. Send a response code 401, together with a "WWW-authenticate"
header including details of the the authentication scheme and realm:
e.g. (in a non-NPH script)

Status: 401 Unauthorized to access the document
WWW-authenticate: Basic realm="foobar"
Content-type: text/plain

Unauthorised to access this document

The use you can make of this is server-dependent, and harder,
since most servers expect to deal with authentication before ever
reaching the CGI (eg through .www_acl or .htaccess).
Thus it cannot usefully replace the standard login sequence, although
it can be applied to other situations, such as re-validating a user -
e.g after a certain timeout period or if the same person may need to
login under more than one userid.

What you can never get in CGI is the credentials returned by the user.
The HTTPD takes care of this, and simply sets REMOTE_USER to the
username if the correct password was entered.

For a much longer but outdated discussion of this question,
see my discussion at http://www.webthing.com/tutorials/login.html


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.12: Can I identify users/sessions without password protection?
The most usual (but browser-dependent) way to do this is to set a cookie.
If you do this, you are accepting that not all users will have a 'session'.

An alternative is to pass a session ID in every GET URL, and in hidden
fields of POST requests. This can be a big overhead unless _every_ page
requires CGI in any case.

Another alternative is the Hyper-G[1] solution of encoding a session-id in
the URLs of pages returned:
http://hyper-g.server/session_id/real/path/to/page
This has the drawback of making the URLs very confusing, and causes any
bookmarked pages to generate old session_ids.

Note that a session ID based solely on REMOTE_HOST (or REMOTE_ADDR)
will NOT work, as multiple users may access your pages concurrently
from the same machine.

[1] Actually I don't think that's been true of Hyper-G since sometime
in '96. However, general advances in web server technology, such as
Apache's mod_alias or mod_rewrite, make it straightforward without
the need for CGI.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.13: Can I redirect users to another page?
For permanent and simple redirection, use the HTTPD configuration file:
it's much more efficient than doing it yourself. Some servers enable
you to do this using a file in your own directory (eg Apache) whereas
others use a single configuration file (eg CERN).

For more complicated cases (eg process form inputs and conditionally
redirect the user), use the "Location:" response header.
If the redirection is itself a CGI script, it is easy to URLencode
parameters to it in a GET request, but don't forget to escape the URL!


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.14: Can I run a CGI script without returning a new page to the browser?
Yes, but think carefully first: How are your readers going to know
that their "submit" has succeeded? They may hit 'submit' many times!

The correct solution according to the HTTP specification is to
return HTTP status code 204. As an NPH script, this would be:

#!/bin/sh
# do processing (or launch it as background job)
echo "HTTP/1.0 204 No Change"
echo

(as non-NPH, you'd simply replace HTTP/1.0 with the Status: CGI header).

Alan J Flavell has pointed out that this will fail with certain
popular browsers, and suggests a workaround to accommodate them:

[ May 1998 update[1]: I'm deleting Alan's suggestion, because the problem
is mainly of historical interest, and the workaround is no longer
recommended. See his page for a a detailed survey and recommendations.
]

His survey is at
http://ppewww.ph.gla.ac.uk/%7Eflavell/status204/results.html

[1] With apologies to Alan for having left it in so long.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.15: Can I write output to a different Netscape frame?
Yep. The fact you're using CGI makes no difference: use
"target=" in your links as usual. Alternatively, the script
can print a "Window-target:" header. Read Netscape's pages
for detail: these answer all the questions about things like
"getting rid of" or "breaking out of" frames, too.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.16: Can I write output to several frames at once?
A single CGI script can only ever print to one frame.

However, this limitation may be overcome by using more than one script.
The first script (the URL of the "submit" button) prints a frameset,
typically to a "_parent" or "_top" target. The sources for one or
more of the frames thus generated may also be CGI scripts, to which
you can easily pass parameters (eg encoded in URLs with method GET).
This hack is definitely not recommended. If you find yourself wanting
to update several frames from a single user event, it probably means
you should review the design of your application at a higher level.

Warnings:
1. Don't forget to escape your URLs.
2. This technique results in your server being hit by multiple
concurrent CGI requests. You'll need LOTS of memory, especially
if you use a memory-hog like Perl. It can be a good recipe
for bringing a server to its knees.

Javascript is often a valid alternative here, but note just how silly
it can (and often does) look in a different browser.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.17: Can I use a CGI script to generate both text and inline images?
Not directly. One script generates one response to one request.

If you want to generate a dynamic page including dynamic images
(say, a report including graphs, all of which depend on user input)
then your primary script will print the usual
<img src="[script-to-generate-image]" alt="[what you asked for]">
and, just as in the multiple frames case, you can pass data to the
image-generating program encoded in a GET URL. Of course, the same
caveats apply: see above.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.18: How can I use Caches to make CGI scripts faster and more Net-friendly?
This is currently beyond the scope of this FAQ. However,
there is an excellent introduction to net-friendly webpages, including
CGI pages, at http://vancouver-webpages.com/CacheNow/

A sample cacheing perl/cgi script by Andrew Daviel is available at
http://vancouver-webpages.com/proxy/log-tail.pl


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.19: How can I avoid users hitting "submit" twice?
You can't. You just have to deal with it when they do.

You can avoid re-processing a submission by embedding a unique ID in your
Form each time it is displayed. When you process the form, you enter
the ID in a database. Or, if it's already there, you don't repeat the
processing.

You probably want to expire your database entries after a little time:
an hour should be fine in a typical situation.

If you're already using cookies (e.g. a shoppingcart), an alternative is
to use the cookie as a unique identifier. This means you also have to
handle the situation where a user deliberately "goes round twice" and
submits the same form with different contents.

If your script may take some time to process, you should also consider
running it as a background job, and returning an immediate
acknowledgement to the user (see above if your "immediate" response
gets delayed until processing is complete in any case).


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.20: How can I stop my CGI script reading and writing files as "nobody"?
CGI scripts are run by the HTTPD, and therefore by the UID of the HTTPD
process, which is (by convention) usually a special user "nobody".

There are two basic ways to run a script under your own userid:
(1) The direct approach: use a setuid program.
(2) The double-server approach: have your CGI script communicate
with a second process (e.g. a daemon) running under your userid,
which is responsible for the actual file management.

The direct approach is usually faster, but the client-server architecture
may help with other problems, such as maintaining integrity of a database.

When running a compiled CGI program (e.g. C, C++), you can make it
setuid by simply setting the setuid bit:
e.g. "chmod 4755 myprog.cgi"

For security reasons, this is not possible with scripting languages
(eg Perl, Tcl, shell). A workaround is to run them from a setuid
program, such as cgiwrap.

In most cases where you'd want to use the client-server approach,
the server is a finished product (such as an SQL server) with its
own CGI interface.
A lightweight alternative to this is Don Libes' "expect" package.

Note that any program running under your userid has access to all your
files, and could do serious damage if hacked. Take care!


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.21: How can I prevent my CGI results being cached by the browser?
Firstly, we need to debunk a myth. People asking this question usually
add that they tried "Pragma: no-cache". Whilst this is not actively
wrong, there is no requirement on browsers to take any notice of it,
and most of them don't.

The "Pragma: no-cache" header (now superseded by HTTP/1.1 Cache-Control)
is a directive to proxies. The browser sends it with an HTTP request
to indicate that it wants the request to be dealt with by the original
server and will not accept a proxy's cached document (e.g. when you
use a reload button). The server may send it to tell a proxy not to
cache the document.

Having said all that, a practical hack to get round cacheing is
to use a different URL for your CGI script each time it's called.
This can easily be accomplished by adding a unique identifier such
as current time in the QUERY_STRING or PATH_INFO. The browser will
see a different URL, but the script can just ignore it. Note that
this can be very inefficient, and should be avoided where possible.


[Table of Contents] [Index]
--------------------------------------------------------------------------------

3.22: How can I control the default filename when downloading a file via CGI?
(from a newsgroup post by Matthew Healy)

One option, assuming you aren't already using the PATH_INFO
environment variable, is just to call your CGI script with extra
path information.

For example, suppose the URL to your script is actually

http://server.com/scriptname?name1=value1&name2=value2

Instead, try calling it as

http://server.com/scriptname/filename.ext?name1=value1&name2=value2

and note that you need to escape the URL if it's in an HTML page:

http://server.com/scriptname/filename.ext?name1=value1&amp;name2=value2

And probably the browser will assign the name given in the last chunk
as the suggested filename for downloading.

This works because the http server looks for the program file to run,
then passes any extra path to the program as PATH_INFO variable; the
browser cannot tell where the SCRIPT_NAME part ends and the PATH_INFO
part begins.

This can also be very useful if you want one script to generate more
than one filename -- the script can check the PATH_INFO value and
alter its response accordingly...


[Table of Contents] [Index]

  † In Memoriam † zondag 14 oktober 2001 @ 23:53:54 #68
13819 Loedertje
Trotse GILF.
pi_1902022
Maden

Er is nog heel wat leven ondergronds,

als wij tot slot voorgoed de ogen sluiten:

de maden lusten wel gehakt van ons,

zij kennen ons van binnen en van buiten.

  † In Memoriam † zondag 14 oktober 2001 @ 23:56:41 #69
13819 Loedertje
Trotse GILF.
pi_1902044
quote:
Op zondag 14 oktober 2001 23:45 schreef calvobbes het volgende:

[..]

Ik ook niet, shoot me



(mooi he?)

pi_1902060
Acda & De Munnik - Naar huis
.
pi_1902067
quote:
Op zondag 14 oktober 2001 23:56 schreef Loedertje het volgende:

[..]

[afbeelding]


(mooi he?)


  † In Memoriam † maandag 15 oktober 2001 @ 00:02:31 #72
13819 Loedertje
Trotse GILF.
pi_1902096
The Mother of Punk, so what the funk!

Nina Hagen was born in the Eastern sector of Berlin on March 11, 1955, to actress Eva Marie Hagen and writer Hans Hagen. Her parents divorced when she was two; eight years later her mother remarried. Nina's new step-father was the dissident poet-songwriter Wolf Biermann. Throughout her childhood Nina joined various East German youth organizations, although the presence of protester Biermann in her life proved to be a bit of a problem.

When she was 17, she failed her examination of the government-controlled East German Actors School in Berlin-Schonweide. Instead, she went to Poland for several months where she sang with a band for the first time. The following year, upon returning to East Germany, she enrolled at the Studio fur Unterhaltungsmusik (Studio for Popular Music) and graduated a year later with outstanding honours. As part of her training she toured East Germany for two months.

She spent several more years touring East Germany with the Alfons Wonneberg Orchestra, but, eventually tiring of this, she started her own band, Automobil. From then on she did full-scale concerts, often performing for eight hours straight, and working so hard that she was ordered by her doctor to take a break. She did, but then re-emerged a few months later with another group, Fritzens Dampferband. Tiring of this as well, Nina took the opportunity to leave to country when her step-father was expelled from East Germany in 1976 (in fact, she was practically begged to leave by the authorities at this point). She arrived in the Federal Republic of Germany (that is, West Germany) and soon secured a recording contract.

A year or so later, Nina flew to London to see what the music scene was over in the UK. She didn't waste any time meeting the Slits and writing a few songs with that group's vocalist, Ari Up. Back in West Berlin in mid-1977, she met up with the members of her future group, the Nina Hagen Band: guitarist Bernard Potschka, bassist Manfred Praeka, drummer Herwig Mitteregger and keyboardist Reinhold Heil.

Nina recorded her initial albums in German. The first one, called simply The Nina Hagen Band (1978), was more reminicient of the American new wave sound than of English punk. Her frenetic, gutteral voice and wide vocal range were distinctive on songs such as TV Glotzer (a reworking of the Tubes' "White Punks on Dope"), Gott Im Himmel (a cover of Norman Greenbaum's "Spirit in the Sky") and the powerful, anthemic Auf'm Friedhof. Her second LP Unbehagan, released in 1979, spawned the single African Reggae, which received a considerable amount of airplay on alternative radio stations.

In 1979, her appearance in the film Cha Cha (HERMAN BROOD!!!)captured the impact of new wave on the Amsterdam underground scene. The soundtrack for this film featured the first of several collaborations with new wave diva Lene Lovich, whom Nina met on the set of the film. They have since maintained a personal friendship and professional relationship. In fact, Nina included a German-language version of Lovich's new wave hit "Lucky Number" (Wir Leben Immer Noch) on Unbehagan; and in 1986 the two of them sang together in on "Don't Kill the Animals", an animal-rights song that has since appeared on various compilations.

Nina dissolved her band after the release of their second album in 1979, deciding instead to pursue a solo career. She went on to achieve a certain level of infamy, if not exactly fame, in her home country, as her decidedly anti-establishment lyrics resulted in a high level of press condemnation.

"From 1978 to 1985, the musical career of Nina Hagen flourished throughout the galaxy by virtue of her rigorous intercontinental touring schedules and the availability of her five albums on CBS Records... No matter that Nina Hagen - actress, chanteuse, political firebrand, doting mother, animal rights activist - was an anomaly in the era of punk rock and disco divas: Marlene Dietrich meets Emma Goldman on stage at the Ritz. No matter that awestruck critics in America were at a genuine loss to categorize her and that radio reeled in horror. No matter that her lifestyle went beyond conventional limits of women's liberation more than a decade ago. At the end of the day, as with every great musical artist, the recordings are the true chronicle of events...." (excerpt from liner notes)

Nina continues to enjoy a rock'n'roll lifestyle as well as a certain level of fame and notoriety, especially back home in Germany. In 1985, her concert in Tokyo was accompanied by the Japanese Philharmonic Orchestra and directed by Eberhard Schoener; also in 1985, Nina played live for more than a million fans at "Rock in Rio". More recently, Nina completed the "Brecht" Tour together with German actress Meret Becker. She has also continued to appear in films, such as Portrait Of A Woman Drinker and Pedro Almodovar's Pepi, Luci, Bom. For a more complete listing Nina's cinematic accomplishments, please check out The Internet Movie Database.

B-live it or not: Nina Hagen has two children: daughter Cosma Shiva (born in 1981, who is becoming somewhat of an accomplished actress herself) and son Otis (born in 1990).

  † In Memoriam † maandag 15 oktober 2001 @ 00:11:15 #73
13819 Loedertje
Trotse GILF.
pi_1902175
Straight-Edge - een subcultuur!?
(1/4/1997)

Straight-edge, de dingetjes niet waard. Straight-edge, de stroming is oud nieuws, en is dan ook meer Stray-edge: een dwaling op het randje. En de jeugd tuint er massaal in.

Straight-edge, de onthouding van drank, drugs, sex, en in veel gevallen ook vlees, is als tegenbeweging natuurlijk helemaal zo gek nog niet. Ik vind het alleen jammer dat de argumenten van de straight-edgers die ik tot nog toe heb gehoord zo adembenemend zwak zijn dat ze hun stroming bij voorbaat reeds de nek omdraaien. Natuurlijk hoeft de doelstelling of visie van een beweging niet 100% rationeel te zijn; sterker nog, om in beweging te komen heeft de mens natuurlijk toch altijd nog tegenstrijdigheden nodig. Toch zijn de motieven bij straight-edge dusdanig in tegenspraak met de methodes, dat ik er eigenlijk alleen nog maar om kan lachen.

Straight-edge, controle over jezelf hebben door je geest niet te laten beinvloeden door substanties van buitenaf. Gelukkig zijn velen nog net consequent genoeg om ook caffeine-houdende dranken daarbij mee te rekenen, maar uitlaatgassen, verontreinigingen in het water, babyvoeding, tastbare media, of kleding gemaakt uit andere stoffen dan die uit het eigen lichaam, DAAR hoor je niemand over. Ah, jij bent straight-edger? Goed hee, dat jij al voor je geboorte genoeg controle had over je eigen bewustzijn om je tijdens je kinderjaren niet meer te laten vormen door je omgeving zeg! Andere mensen zullen je wel benijden; zij zijn immers de slaaf van hun neurale netwerk, en de dingen die ze willen ontspruiten aan een brein dat is gevormd door de buitenwereld. Hun streven naar controle is een zielig en bovenal zinloos verzet tegen de wetten van de natuur. Okay, als je dan wilt praten over controle voor zover die illusie een werkelijkheid kan zijn, dan ben je naar mijn mening zowiezo als een mongool wanneer je je hele levensvisie ophangt aan 1 of 2 stoffen van buitenaf. Alcoholisten of heroinejunkies hoeven helemaal niet out-of-control te zijn, tenzij ze hun leven door hun drug laten bepalen. Wie zo handelt kiest zelf voor een leven van afhankelijkheid, en zolang afhankelijkheid zelfgekozen is biedt deze meer vrijheid dan de meeste mensen ooit zullen ervaren. Echte vrijheid zit in dat neurale netwerkje van je, niet in de (bio)chemische balans daarbinnen.

Straight-edge, als manier om gezonder te leven, is heel zinnig. Mits je gelooft in relatieve begrippen zoals gezondheid. Als je daarin gelooft zul je wel het een en ander hebben aangenomen van wat je ouders je hebben verteld. Loser! Hoe kun je je lifestyle nou nog verdedigen!? Had het nou maar gelaten bij live & let live, geen sex, geen drugs, geen vlees, en er geen politiek statement van gemaakt. Alleen al door te beweren dat iets een tegenbeweging is benadruk je toch al dat iets het gevolg is van een invloed van buitenaf? Had nou maar gewoon gezegd dat JIJ je gewoon lekker voelde bij een dergelijke geheelonthouding, en je niet aan irrationele beschuldigingen aan het adres van de punk-beweging bezondigd. Ik lees hier zojuist weer een artikel over straight-edge in de Nieuwe Revu, waarin de zoveelste aanhanger van deze sekte letterlijk over punk zegt: "Het anarchisme waar ze het altijd over hebben, het vrij zijn. Maar hoe kun je vrij zijn als je leven door alcohol en drugs wordt beheerst? Dan ben je naar mijn mening helemaal niet vrij. Dat klopt gewoon niet. Wat punkers pretenderen, zijn ze helemaal niet. Daarom zie ik straight-edge eigenlijk ook als de enige echte vorm van punk. De ultieme vorm van punk". Maar punkers haalden politiek en wetenschap ook niet door elkaar. De vrijheid die ze nastreefden had niets te maken met het ontkennen van de natuurwetten waaraan ons multiversum voldoet. In dit opzicht is straight-edge nog hypocrieter dan van die debiele actiegroepen die zogenaamd een beter milieu nastreven door andermans eigendommen te vernietigen.

Straight-edge, da's niks voor mij. Ik laat mij niet als hersenloze marionet meeslepen door de eerste de beste tegenbeweging (ik laat mij slechts als hersenloze marionet meeslepen door de chemische reacties in mijn brein die uit de confrontatie met deze tegenbeweging voortvloeien). Straight-edgers zijn dom (uitzonderingen kunnen thans de regel enkel nog bevestigen) en staren zich blind op hun eigen statements. Realistisch is anders, maar misschien moeten ze gewoon nog een andere invulling voor hun leven vinden dan sex en drugs, omdat dat het enige was waar hun leven voorheen uit bestond. Tja, dan ben je nog triester dan dat je dom bent. Maar genoeg theater voor nu. Schelden zoals ik hier nu doe wordt zelden in perspectief gezien, en dus zie ik me bij voorbaat maar weer genoodzaakt om te vermelden dat ik absoluut niks tegen geheelonthouders heb, tenzij ze gaan opscheppen over hun prestaties en valse motieven vastplakken aan hun nobele streven. Je moet leven op de manier waar je jezelf het beste bij voelt, maar pretendeer niet meteen te weten hoe de dingen zijn. Als er IETS is wat laat zien dat de enige vijand die we nog hebben onze eigen hypocrisie en onwetendheid is (en we in feite alleen nog tegen onszelf aan het vechten zijn), dan is dit het wel.

  † In Memoriam † maandag 15 oktober 2001 @ 00:14:46 #74
13819 Loedertje
Trotse GILF.
pi_1902216
Justice Tonight/Kick it Over

STAY AROUND DON'T PLAY AROUND
THIS OLD TOWN AND ALL
SEEMS LIKE I GOT TO TRAVEL ON
A LOT OF PEOPLE WON'T GET NO SUPPER TONIGHT
JUSTICE TONIGHT
RUNNIN AND A HIDING TONIGHT
JUSTICE TONIGHT
REMEMBER TO KICK IT OVER
NO ONE WILL GUIDE YOU THROUGH ARMEGIDEON TIME
IT'S ARMAGIDEON
IT'S NOT CHRISTMAS TIME
A LOT OF PEOPLE
A LOT OF PEOPLE USE A CALCULATOR
A LOT OF PEOPLE WON'T GET NO SUPPER TONIGHT
A LOT OF PEOPLE SITTIN' DOWN BY THE LIGHT
THE BATTLE IS GETTIN HOTTER
ARMAGIDEON TIME
ARMAGIDEON
REMEMBER TO KICK IT OVER
ARMAGIDEON TIME
A LOT OF PEOPLE AIN'T GOT NO SUPPER TONIGHT
A LOT OF PEOPLE GOT TO STAND OUT BACK


(The Clash)

  † In Memoriam † maandag 15 oktober 2001 @ 00:20:33 #75
13819 Loedertje
Trotse GILF.
pi_1902265
European youth win their climate bet against the EU
Contributed on Wednesday September 12, @ 12:56PM
EU Commissioner Margot Wallström: "This is a bet that I like to lose"

European youth win their climate bet against the EU

Remerschen, Luxemburg, September 7th &#8211; Today the European Environment Agency (EEA) announced that European youth have won their climate bet against EU Environment Commissioner Wallström. Within eight months, young people from 16 European countries managed to reduce their CO2 emissions by 8% in their schools and at home. About 52.000 so-called &#8216;Betties&#8217; participated in this climate campaign. EU Commissioner Wallström: "I am impressed about the work of the Betties. I love to lose this bet".

--------------------------------------------------------------------------------


The European Betties have been working hard on their CO2 emissions since the climate summit in The Hague in November last year. In The Hague, they bet they would beat the EU target of reducing its emissions by 8% in eight years &#8211; the Betties said they would do it in 8 months. EU Commissioner Wallström took up the bet, and said the Betties wouldn&#8217;t make it. In case the Betties would lose, they would have to bike Mrs. Wallström in a rickshaw for a week to all her meetings in Brussels. Now that the Betties won, Mrs. Wallström will ride her bike instead for a month, from her home in Brussels to work.

In total about 90 schools from all over Europe managed to reduce their emissions by 8%. This part of The BET was won by the young Europeans. In total, the Betties managed to save about 4 million kilograms instead. The Betties admit that they wanted to reach 8 million kilograms, but still feel like winners. Henrike Wegener, one of the activists from the coordination office of the campaign in Berlin: &#8216;We proved that CO2 emission reducing can be done easily, fast and cheap. All it takes is your own will and creativity.&#8217;

Through the BET campaign, thousands of young Europeans became interested in climate politics, an otherwise rather dull theme for people aged from 16 to 25. The Betties reduced their emissions with simple measures: turning down the heating, installing energy-saving light bulbs, insulating rooms, repairing leaking water taps, setting up recycling systems for water and paper. Wegener: &#8216;One would think that these steps are already well known to people, but apparently they are not. There is still a lot of educational work to do&#8217;.

The Betties celebrated their winning of the campaign with a so-called climate week in Remerschen, Luxemburg. After the announcement of the winner, Margot Wallström had an informal meeting with the about 50 present Betties. Luxemburg&#8217;s State Secretary for Environment Berger attended the press conference as well.

--------------------------------------------------------------------------------
For further information:
Jeroen Kuiper (European coordinator) 0049 30 7970 6610

  † In Memoriam † maandag 15 oktober 2001 @ 00:23:41 #76
13819 Loedertje
Trotse GILF.
pi_1902304
--------------------------------------------------------------------------------
Friedrich Nietsche asks us not to read his books "like a looting soldiers," choosing appealing passages at random from his aphorisms; instead, we are to read ourselves into "a passionate mood" in order to perceive the short rays of light that will lead us onward and upward. .
  † In Memoriam † maandag 15 oktober 2001 @ 00:26:23 #77
13819 Loedertje
Trotse GILF.
pi_1902329
400 System Capacity Exceeded (Typhoon v1.2.3)

Configuratie:
Account: news
Server: news
Protocol: NNTP
Poort: 119
Beveiligd(SSL): 0
Foutnummer: 400
CODE: 800ccca0


kut

  † In Memoriam † maandag 15 oktober 2001 @ 00:28:08 #78
13819 Loedertje
Trotse GILF.
pi_1902341
Why is noone discussing the war? Any been mailed powder yet?
  † In Memoriam † maandag 15 oktober 2001 @ 00:30:48 #80
13819 Loedertje
Trotse GILF.
pi_1902366
The hijack-bombings of September 11 were politically criminal attacks on
innocent civilians. Whoever perpetrated this crime must be condemned as
enemies of the American and international working class. The fact that no
one has claimed responsibility only underscores the profoundly reactionary
character of these attacks.

But while the events of September 11 have served as the catalyst for the
assault on Afghanistan, the cause is far deeper. The nature of this or any
war, its progressive or reactionary character, is determined not by the
immediate events that preceded it, but rather by the class structures,
economic foundations and international roles of the states that are
involved. From this decisive standpoint, the present action by the United
States is an imperialist war.

The US government initiated the war in pursuit of far-reaching international
interests of the American ruling elite. What is the main purpose of the war?
The collapse of the Soviet Union a decade ago created a political vacuum in
Central Asia, which is home to the second largest deposit of proven reserves
of petroleum and natural gas in the world.

The Caspian Sea region, to which Afghanistan provides strategic access,
harbors approximately 270 billion barrels of oil, some 20 percent of the
world's proven reserves. It also contains 665 trillion cubic feet of natural
gas, approximately one-eighth of the planet's gas reserves.

These critical resources are located in the world's most politically
unstable region. By attacking Afghanistan, setting up a client regime and
moving vast military forces into the region, the US aims to establish a new
political framework within which it will exert hegemonic control.

These are the real considerations that motivate the present war. The
official version, that the entire American military has been mobilized
because of one individual, Osama bin Laden, is ludicrous. Bin Laden's brand
of ultra-nationalist and religious obscurantist politics is utterly
reactionary, a fact that is underscored by his glorification of the
destruction of the World Trade Center and murder of nearly 6,000 civilians.
But the US government's depiction of bin Laden as an evil demiurge serves a
cynical purpose-to conceal the actual aims and significance of the present
war.

The demonization of bin Laden is of a piece with the modus operandi of every
war waged by the US over the past two decades, in each of which-whether
against the Panamanian "drug lord" Manuel Noriega, the Somalian "war lord"
Mohamed Farrah Aidid, or the modern-day "Hitlers" Saddam Hussein and
Slobodan Milosevic-the American government and the media have sought to
manipulate public opinion by portraying the targeted leader as the
personification of evil.

In an October 8 op-ed column in the New York Times, Fawaz A. Gerges, a
professor at Sarah Lawrence College, pointed to the real aims that motivate
the US war drive. Describing a conference of Arab and Muslim organizations
held a week ago in Beirut, Gerges wrote:

"Most participants claimed that the United States aims at far more than
destroying Osama bin Laden's Al Qaeda organization and toppling the Taliban
regime. These representatives of the Muslim world were almost unanimously
suspicious of America's intentions, believing that the United States has an
overarching strategy which includes control of the oil and gas resources in
Central Asia, encroachment on Chinese and Russian spheres of influence,
destruction of the Iraqi regime, and consolidation of America's grip on the
oil-producing Persian Gulf regimes.

"Many Muslims suspected the Bush administration of hoping to exploit this
tragedy to settle old scores and assert American hegemony in the world."

These suspicions are entirely legitimate. Were the US to oust the Taliban,
capture or kill bin Laden and wipe out what Washington calls his terrorist
training camps, the realization of these aims would not be followed by the
withdrawal of American forces. Rather, the outcome would be the permanent
placement of US military forces to establish the US as the exclusive arbiter
of the region's natural resources. In these strategic aims lie the seeds of
future and even more bloody conflicts.

This warning is substantiated by a review of recent history. America's wars
of the past 20 years have invariably arisen from the consequences of
previous US policies. There is a chain of continuity, in which yesterday's
US ally has become today's enemy.

The list includes the one-time CIA asset Noriega, the former Persian Gulf
ally Saddam Hussein, and yesterday's American protégé Milosevic. Bin Laden
and the Taliban are the latest in the chain of US assets transformed into
targets for destruction.

In the case of Iraq, the US supported Saddam Hussein in the 1980s as an ally
against the Khomeini regime in Iran. But when the Iraqi regime threatened US
oil interests in the Persian Gulf, Saddam Hussein was transformed into a
demon and war was launched against Baghdad. The main purpose of the Gulf War
was to establish a permanent US military presence in the Persian Gulf, a
presence that remains in place more than a decade later.

Even more tragic is the outcome of US sponsorship of bin Laden and the
Taliban. They are products of the US policy, begun in the late 1970s and
continued throughout the 1980s, of inciting Islamic fundamentalism to weaken
the Soviet Union and undermine its influence in Central Asia. Bin Laden and
other Islamic fundamentalists were recruited by the CIA to wage war against
the USSR and destabilize Central Asia.

In the chaos and mass destruction that followed, the Taliban was helped
along and brought to power with the blessings of the American government.
Those who make US policy believed the Taliban would be useful in stabilizing
Afghanistan after nearly two decades of civil war.

American policy-makers saw in this ultra-reactionary sect an instrument for
furthering US aims in the Caspian basin and Persian Gulf, and placing
increasing pressure on China and Russia. If, as the Bush administration
claims, the hijack-bombing of the World Trade Center was the work of bin
Laden and his Taliban protectors, then, in the most profound and direct
sense, the political responsibility for this terrible loss of life rests
with the American ruling elite itself.

The rise of Islamic fundamentalist movements, infused with anti-American
passions, can be traced not only to US support for the Mujahedin in
Afghanistan and Pakistan, but also to American assaults on the Arab world.
At the same time that the CIA was arming the fundamentalists in Afghanistan,
it was supporting the Israeli invasion of Lebanon. This was followed in 1983
by the US bombing of Beirut, in which the battleship New Jersey lobbed
2,000-pound shells into civilian neighborhoods. This criminal action led
directly to retribution in the form of the bombing of the US barracks in
Beirut, which took the lives of 242 American soldiers.

The entire phenomenon associated with the figure of Osama bin Laden has its
roots, moreover, in Washington's alliance with Saudi Arabia. The US has for
decades propped up this feudalist autocracy, which has promoted its own
brand of Islamic fundamentalism as a means of maintaining its grip on power.

All of these twists and turns, with their disastrous repercussions, arise
from the nature of US foreign policy, which is not determined on the basis
of democratic principles or formulated in open discussion and public debate.
Rather, it is drawn up in pursuit of economic interests that are concealed
from the American people.

When the US government speaks of a war against terrorism, it is thoroughly
hypocritical, not only because yesterday's terrorist is today's ally, and
vice versa, but because American policy has produced a social catastrophe
that provides the breeding ground for recruits to terrorist organizations.
Nowhere are the results of American imperialism's predatory role more
evident than in the indescribable poverty and backwardness that afflict the
people of Afghanistan.

What are the future prospects arising from the latest eruption of American
militarism? Even if the US achieves its immediate objectives, there is no
reason to believe that the social and political tinderbox in Central Asia
will be any less explosive.

US talk of "nation-building" in Afghanistan is predicated on its alliance
with the anti-Taliban Northern Alliance, with whom the Pentagon is
coordinating its military strikes. Just as Washington used the Albanian
terrorist Kosovo Liberation Army as its proxy in Kosovo, so now it utilizes
the gang of war lords centered in the northeast of Afghanistan as its cat's
paw in Central Asia.

Since the Northern Alliance will now be portrayed as the champion of freedom
and humanitarianism, it is instructive to note recent articles in the New
York Times and elsewhere reporting that the vast bulk of the Afghan opium
trade comes from the meager territory controlled by the Alliance. The
military satraps of the Northern Alliance are, moreover, notorious for
killing thousands of civilians by indiscriminately firing rockets into Kabul
in the early 1990s.

The sordid and illusory basis upon which the US proposes to "rebuild"
Afghanistan, once it is finished pummeling the country, was suggested in a
New York Times article on the onset of the war. "The Pentagon's hope," wrote
the Times, "is that the combination of the psychological shock of the air
strike, bribes to anti-Taliban forces in Afghanistan covertly supported by
Washington and sheer opportunism will lead many of the Taliban's fighters to
put down their arms and defect."

Given the nature of the region, with its vast stores of critical resources,
it is self-evident that none of the powers in Central Asia will long accept
a settlement in which the US is the sole arbiter. Russia, Iran, China,
Pakistan and India all have their own interests, and they will seek to
pursue them. Furthermore, the US presence will inevitably conflict with the
interests of the emerging bourgeois regimes in the lesser states in the
region that have been carved out of the former Soviet Union.

At each stage in the eruption of American militarism, the scale of the
resulting disasters becomes greater and greater. Now the US has embarked on
an adventure in a region that has long been the focus of intrigue between
the Great Powers, a part of the world, moreover, that is bristling with
nuclear weapons and riven by social, political, ethnic and religious
tensions that are compounded by abject poverty.

The New York Times, in a rare moment of lucidity, described the dangers
implicit in the US war drive in an October 2 article headlined "In Pakistan,
a Shaky Ally." The author wrote: "By drafting this fragile and fractious
nation into a central role in the 'war on terrorism,' America runs the
danger of setting off a cataclysm in a place where civil violence is a
likely bet and nuclear weapons exist."

Neither in the proclamations of the US government, nor in the reportage of
the media, is there any serious examination of the real economic and
geo-strategic aims motivating the military assault. Nor is there any
indication that the US political establishment has seriously considered the
far-reaching and potentially catastrophic consequences of the course upon
which it has embarked.

Despite a relentless media campaign to whip up chauvinism and militarism,
the mood of the American people is not one of gung-ho support for the war.
At most, it is a passive acceptance that war is the only means to fight
terrorism, a mood that owes a great deal to the efforts of a thoroughly
dishonest media which serves as an arm of the state. Beneath the reluctant
endorsement of military action is a profound sense of unease and skepticism.
Tens of millions sense that nothing good can come of this latest eruption of
American militarism.

The United States stands at a turning point. The government admits it has
embarked on a war of indefinite scale and duration. What is taking place is
the militarization of American society under conditions of a deepening
social crisis.

The war will profoundly affect the conditions of the American and
international working class. Imperialism threatens mankind at the beginning
of the twenty-first century with a repetition on a more horrific scale of
the tragedies of the twentieth. More than ever, imperialism and its
depredations raise the necessity for the international unity of the working
class and the struggle for socialism.

--
PaRaDoX
Le Quebec aux Quebecois
(en tout cas,pas aux amaricains)

pi_1902396
--------------------------------------------------------------------------------

SCRIBE
Home | Presentation | Teams | Publications | SCRIBE by CompAct

--------------------------------------------------------------------------------

SCRIBE PUBLICATIONS (1997-2000)
1997 1998 1999 2000


SCIENTIFIC PUBLICATIONS FOR 1997
Journal articles or published proceeding
Journal articles with reviewing comitee
Articles in published proceedings
Reviews
Chapter in a book
Book
Published proceedings

TRANSFERT PUBLICATIONS
Personal communications
Journal articles without reviewing comitee
Repports (including licences, expert evaluation)
Other writtings supervised by the author
Thesis
Dissertations

SCIENTIFIC PUBLICATIONS FOR 1997

--------------------------------------------------------------------------------


SCIENTIFIC PUBLICATIONS


--------------------------------------------------------------------------------


Journal articles or published proceeding


Journal articles with reviewing comitee


Alami-Durante H., Fauconneau B., Rouel M., Escaffre A.M., Bergot P., 1997. Growth and multiplication of white skeletal muscle fibres in carp larvae in relation to somatic growth rate. J. of Fish. Biology, 50, 1285-1302.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of confinement stress on circulating levels of Growth hormone and two prolactins in freshwater-adapted Tilapia Oreochromis niloticus. Gen. Comp. Endocrinol., 108, 35-44.

Blaise O., Le Bail P.Y., Weil C., 1997. Permissive effect of insulin-like growth factor I (IGF-I) on gonadotropin releasing-hormone action on in vitro growth hormone release in rainbow trout Oncorhynchus mykiss. Comp. Biochem. Physiol., 116 (1), 75-81.

Breton B., Sambroni E., Govoroun M., Weil C., 1997. Effets des steroides sur les concentrations plasmatique et hypophysaire des gonadotropines GTH I et GTH II chez la truite arc en-ciel immature, Academie des sciences Elsevier Paris. C.R. Acad. Sci. Paris Sciences de la vie, 320, 783-789.

Cauty, C.,1997. Apport d'une résine acrylique, l'unicryl à l'étude histologique et histochimique des gonades de poisson. Rev. Fr. Histotechnol, 10 (1), 65-73

Chereguini O., Cal R.M., Dreanno C., Ogier de Baulny B., Suquet M., Maisse G., 1997. Short term storage and cryopreservation of turbot sperm. Aquat. Living Resour., 10, 251-255.

Clergeau P., Burel F., 1997. The role of spatio-temporal patch connectivity at landscape level: an example in bird distribution. Landscape and Urban Planning, 38, 37-43.

Clergeau P, Sauvage A., Lemoine A., Marchand J.-P., Dubs F., Mennechez G., 1997. Quels oiseaux dans la ville ? Une étude pluridisciplinaire d'un même gradient urbain. Annales de la Recherche Urbaine, 74, 119-130.

Devaux A., Pesonen M., Monod G., 1997. Alkaline comet assay in rainbow trout hepatocytes. Toxicology in vitro, 11, 71-79.

Fauconneau B., Andre S., Chmaitilly J., Le Bail P.Y., Krieg F., Kaushik J., 1997. Control of skeletal muscle fibres and adipose cells size in the flesh of rainbow trout. J. Fish Biol., 50, 296-314.

Gomez J.M., Boujard T., Boeuf G., Solari A., Le Bail P.Y., 1997. Individual diurnal plasma profiles of thyroid hormones in rainbow trout (Oncorhynchus mykiss) in relation to cortisol GH and growth rate. Gen. Comp. Endocrinol., 107, 74-83.

Govoroun M., Huet J.C., Pernollet J.C., Breton B., 1997. Use of immobilized metal ion affinity chromatography and dye-ligand chromatography for the separation and purification of rainbow trout pituitary gonadotropins GTH I and GTH II. J. Chrom. Biomed. App., 698, 35-46.

Hogasen H.R., Prunet P., 1997. Plasma levels of thyroxine prolactin and cortisol in migrating and resident wild arctic char (Salvelinus alpinus). Can. J. Fish. Aquat. Sci., 54, 2947-2954.

Labbe C., Crowe L.M., Crowe J.H., 1997. Stability of the lipid component of trout sperm plasma membrane during freeze-thawing. Cryobiology, 34, 176-182.

Le Bail P.Y., Boeuf G., 1997. What hormones may regulate food intake in fish. Aquatic living ressources, 10, 371-379.

Mennechez G., Clergeau P. 1997. Analyse de la sélection du site de nid par l'étourneau Sturnus vulgaris au niveau du paysage. Ecologia Mediterranea, 23, 37-45.

Mugnier C., Gaignon J.L., Fostier A., 1997. In vitro synthesis of 1720 beta 21-trihydroxy-4-pregnen-3-one by ovaries of Turbot (Scophthalmus maximus L.) during oocyte maturation. Gen. Comp. Endocrinol., 107, 63-73.

Noel O, Le Bail P.Y, 1997. Does cyclicity of growth rate in rainbow trout exist ?. J.of Fish Biology, 51, 634-642.

Ogier de Baulny B., Le Vern Y., Kerboeuf D., Maisse G., 1997. Flow cytometric evaluation of mitochondrial activity and membrane integrity in fresh and cryopreserved rainbow trout (Oncorhynchus mykiss) spermatozoa. Cryobiology, 34, 141-149.

Rescan P.Y, 1997. Identification in a fish species of two Id (inhibitor of DNA binding/differentiation)-related helix-loop-helix factors expressed in the slow oxidative muscle fibers. Eur. J. Biochem, 247, 870-876.

Toguyeni A., Fauconneau B., Boujard T., Fostier A., Kuhn E.R., Mol K.A., Baroiller J.F., 1997. Feeding behaviour and food utilisation in tilapia Oreochromis niloticus: effect of sex ratio and relationship with the endocrine status. Physiology and Behavior, 62 (2), 273-279.


Articles in published proceedings


Auperin B, Goardon L, Quéméneur A, Thomas J.L, Aubin J, Valotaire C, Rouger Y, Maisse G, 1997. Effet d'un nouvel anesthésique sur differents parametres physiologiques de la truite arc-en-ciel suite a un stress lié au transport. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes (France), resumé

Baroiller J.F., Clota F., 1997. Interactions between temperature effects and genotype on Oreochromis niloticus sex determination. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds), resumé

Baroiller J.F., Guiguen Y., Iseki K., Fostier A., 1997. Physiological role of androgens on gonadal sex differentiation in two teleost fish Oncorhynchus mykiss and Oreochromis niloticus. Proceedings of the first international symposium on the biology of vertebrate sex determination . April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds.), résumé

Bennetau-Pelissero C., Kaushik S., Sumpter J., Fostier A., Le Gac F., Davail-Cuisset B., Le Menn F., 1997. Effet du soja et des phyto-oestrogènes sur la vitellogénèse et l'endocrinologie stéroidienne de la truite arc en ciel et de l' esturgeon sibérien, Approche in vivo et in vitro. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume.

Bonnet S., Haffray P., Blanc J.M., Vallee F., Vauchez C., Fauconneau B., 1997. Genetic variation in morphology carcass traits and fat content in diploid and triploid rainbow trout (Oncorhynchus mykiss) at two commercial sizes 300g and 900g. Sixth international Symposium on genetics in Aquaculture, 24-28 June 1997 Stirling (SCOTLAND), resume.

Bonnet S., Haffray P., Fauconneau B, 1997. Sex and triploidy effects on growth allometry of external morphology in rainbow trout. 5 th International Congress of Vertebrate Morphology 12-17 July 1997 Bristol (U.K). J. Morphology, 232 (3) 237.

Breton B., Roelants Y., Ollevier F., Epler P., Mikolajczyk T., 1997. Oral delivery systems in teleost fish for peptides and polypeptides : exemple for gonadoliberin (GnRH) and growth hormone (GH). International workshop : aquaculture application of controlled drug and vaccine delivery, communication.

Breton B., Gillet C., Jalabert B., 1997. Relations entre la température le blocage de la maturation ovocytaire et le fonctionnement de l'axe gonadotrope chez l'omble chevalier. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume

Breton B., Roelants I., Mikolajczyk T., Epler P., Ollevier F., 1997. Oral delivery systems in Teleost fish for peptides and polypeptides: example for gonadoliberin (GnRH) and growth hormone (GH). International workshop : Aquaculture application of controlled drug and vaccine delivery 21-23 may Villa Manin di Passariano (Italie) resume

Canario A.V.M., Pavlidis M., Mylonas C., Breton B., Kentouri M., Divanach P., 1997. Hormonal spawning induction of Pagrus pagrus. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Ao-t 1997 Barcelone (Espagne), resume.

Clergeau P., Mennechez G., Savard Jpl & Falardeau G., 1997. Biological exchanges between rural and urban areas: bird diversity and landscape structure. 25th congress of IALE, " Landscape Ecology: things to do ", Amsterdam, october 1997.

Duval H., Elies G., Pellerin I., Chesnel F., Le Bail P.Y., Boeuf G., Boujard D. D., 1997. L'IGF-I recombinant de turbot (Scophthalmus maximus): production purification et caractérisation. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Fauconneau B., Bobe J., Pereira V., Vallod D., 1997. External morphology of common carp at commercial size and its relationship with dressing yield. 5 th International Congress of Vertebrate morphology 12-17 July 1997 Bristol (U.K). J. of Morphology, 232 (3), 253. resume

Fauconneau B., Paboeuf G., Le Bail P.Y., Guttierez J., Castejon C., 1997. Preliminary data on binding and effects of IGFs on in vitro muscle satellite cells in rainbow trout. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne) resume

Gillet C., Rideau I., Breton B., 1997. Effets du conditionnement en jours longs sur la sécrétion gonadotrope (GtH2) et sur la période de reproduction chez l'omble chevalier (Salvelinus alpinus L). 1er Colloque IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (FRANCE), resume

Guiguen Y., Ricordel M.J., Fostier A., 1997. Involvment of estrogens in the process of sex differentiation in rainbow trout Oncorhynchus mykiss : in vivo treatments, aromatase activity and aromatase gene expression. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Ed.), resume

Herraez M.P., Labbe C., 1997. Sperm membrane regionalization in rainbow trout : a lectin binding study. CRYO'97 34th Annual of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 370 resume

Keith P., Jegu M., Le Bail P.Y., 1997. Inventories and distribution of french guiana fishes/. 9 th annual meeting of neotropical ichtyological association 20-26 juillet 1997 Porto Alegro Brasil, affiche.

Latonnelle K., Maisse G., Labbe C., 1997. Lipid modification of trout sperm plasma membrane in vitro : effect on membrane stability after cryopreservation . Cryo'97 34 th meeting of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 371 affiche

Leguen I., Prunet P., 1997. Effet d'un choc hyposmotique sur la régulation du volume et sur la mobilisation du calcium intracellulaire des cellules branchiales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Leveroni Calvi S., Maisse G., 1997. Cryopreservation of rainbow trout blastomeres. Cryo'97 34th meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 340 resume

Linard B., Breton B., Bailhache T., Mananos E., Govoroun M., Kah O., Jego P., Saligaut C., 1997. Contr"le dopaminergique central de la libération des hormones gonadotropes (GtH1, GtH2) chez la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Loir M., 1997. Etude de l'effet de xenobiotiques sur la prolifération des spermatogonides de truite présentes dans des cultures de cellules testiculaires totales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G. Billard R., Cosson J., Labbe C., Loir M., Le Gac F., 1997. Influence du maintien en mer des mâles de saumon atlantique (Salmo salar) pendant la période de reproduction sur la qualité du sperme. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G., Noel O, Breton B., Goardon L., Jalabert B., Le Bail P.Y., Mourot B., 1997. Influence d'une période d'éclairement continu sur la première maturation sexuelle de la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Massa F., Prunet P., Grimaldi C., Baglinière J.L., 1997. Premiers éléments de caractérisation de l'impact des sédiments sur la survie embryo-larvaire de la truite (Salmo trutta) en milieu naturel, Etude sur deux petits ruisseaux de Basse Normandie. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Ogier de Beaulny B., Le Vern Y., Labbe C., Maisse G., 1997. Cryopreservation of fish semen : why does the most effective cryoprotectant differ from one species to another. Cryo'97 34th annual meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 342 resume

Perez-Sanchez J, Le Bail P.Y, 1997. Endocrine and metabolic parameters as markers of growth performance and flesh quality. Third International Symposium on Research for Aquaculture fundamental and applied aspects 24-27 aout 1997 Barcelone (Espagne), p 81 resume

Rouger Y., Aubin J., Breton B., Fauconneau B., Fostier A., Le Bail P.Y., Loir M., Prunet P., Maisse G., 1997. Stress induit par le transport chez la truite Arc-en-ciel (Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes (France), resume

Saligaut C., Linard B., Breton B., Anglade I, Bailhache T, Kah O, Jego P, 1997. Brain aminergic systems in salmonids and other teleosts in relation with steroid feedback and gonadotropin release. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne), resume

Sandra O., Lerouzic P., Cauty C., Prunet P., 1997. Influence de la salinité sur l'expression du recepteur de la prolactine(TIR-PRL) dans les organes osmorégulateurs chez le tilapia (Oreochromis niloticus). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Valente L., Saglio P., Fauconneau B., 1997. Ontogénèse du comportement alimentaire chez deux souches à croissance lente et rapide de truite arc-en-ciel. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes(France), resume

Reviews


Chapter in a book


Clergeau P. La gestion des oiseaux à risques in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " INRA Ed., Coll. "Un point sur", 7-24.

Clergeau P. Evolution numérique et comportementale des étourneaux; problèmes agricoles in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 27-42.

Clergeau P.,Mennechez G. L'étourneau sansonnet dans les villes in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 85-100

Clergeau P. Le concept de gestion intégrée appliqué aux oiseaux in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations: " : INRA Ed., Coll. "Un point sur", 363-374

Flammarion P., Garric J., Monod G., 1997. Utilisation de l'activité enzymatique EROD chez les poissons des hydrosystèmes continentaux, Lagadic L., Caquet T., Amaird J.C., Ramade F in "utilisation des biomarqueurs pour la surveillance de la qualité de l'environnement ", 57-75.

Hochereau-De-Reviers M.T., Loir M., De Reviers M., 1997. Controle gonadotrope des cellules somatiques et de la spermatogenèse des vertébrés, Combarnous Y et Volland-Nail (Eds) Editions INRA. in " Les Gonadotropines ", 255-267.

Lagadic L., Caquet T., Amiard J.C., 1997. Intéret d'une approche multiparamétrique pour le suivi de la qualité de l'environnement, ( Lagadic L., Caquet T., Amiard J.C., Ramade F.Eds.). in " Biomarqueurs en ecotoxicologie ", 393-401.

Lagadic L., Caquet T., Amiard J.C., 1997. Biomarqueurs en ecotoxicologie : principes et définitions, Lagadic L., Caquet T., Amiard J.C., Ramade F.(Eds.).in " Biomarqueurs en ecotoxicologie ", 1-9.

Le Gal Y., Lagadic L., Le Bras S., Caquet T., 1997. Charge énergétique en adénylates (CEA) et autres biomarqueurs associés au métabolisme énergétique, MASSON in " Biomarqueurs en écotoxicologie ", 242-285.

Monod G., 1997. L'induction du cytochrome P4501A1, (Lagadic L., Caquet T., Amaird J.C., Ramade F (eds.).. " Biomarqueurs en ecotoxicologie-Aspects fondamentaux ", 33-54.

Pascal M., 1997. Echec à la colonisation : ce n'est pas faute d'avoir essayé !. In : Îles, vivre entre ciel et mer. Exposition Paris " D'îles en îles ", MNHN & Nathan Paris Ed. , 27.

Pascal M., Pisanu B., Beaucournu J.-C. 1997. Faunes parasitaires (Siphonaptères, Helminthes) des îles de la Mer d'Iroise. Colloque CEFE - CNRS Montpellier les 4 & 5 XII 1997 : 8 pp, 6 cartes, 2 tableaux, 1 figure

Rether B., Masfaraud J.F., Keith G., Devaux A., Monod G., 1997. Biomarqueurs de génotoxicité chez les végétaux et les animaux, (Lagadic L., Caquet T. Amiard J.C., Ramade F Eds.). Biomarqueurs en ecotoxicologie-Aspects fondamentaux, 185-208.


Book


Boujard T., Pascal M., Meunier F., P.-Y. Le Bail, 1997 : Poissons de Guyane - Guide écologique de l'Approuague et de la réserve des Nouragues. Edition INRA Paris : 219 pp.

Published proceedings


Alhassane M., Mikolasek O., Lazard J., Baroiller J.F., 1997. Intensification of nile tilapia oreochromis niloticus fry production in the african sahel - example of niger J.F.. Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), 294-304.

Amoros C., Uzbekova S., Hourrout D., Hew C.L., Prunet P., 1997. Transgenic rainbow trout as a model to study cell-specific gene expression driven by a salmon Prolactin promotor. Proceedings of the XIII th International Congress of Comparative Endocrinology, 17-21 Novembre 1997, Yokohama (Japon), MONDUZZI EDITORE. Advances in Comparative Endocrinology, 963-968.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of social interactions and confinement stress on circulating levels of cortisol growth hormone and two prolactins in fresh water-adapted tilapia (Orecochromis niloticus). In Proceedings of the fourth International symposium on Tilapia in aquaculture 9-12 November 1997 Orlando (USA), K. Fitzsimmons (Ed.), 653-661.

Baroiller, J.F. 1997. Modalités des déterminismes du sexe chez les poissons téléostéens . Proceedings of the fourth workshop on sex determination and gonadal sex differentiation, 9-10 octobre 1997, Rennes (France). In. J. Dev. Biol., 14-15.

Baroiller J.F., Desprez D., Carteret Y., Tacon P., Hoareau M.C., Melard C., Jalabert B., 1997. Influence of environmental and social factors on the reproductive efficiency in three tilapia species Oreochromis niloticus, O.aureus and the red tilapia (red florida strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 238-252.

Desprez D., Briand C., Hoareau M.C., Malard C., Bosc P., Baroiller J.F., 1997. Sex determinism in red tilapia ("Red Florida" strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), F. Fitzsimmons (Ed.), 760-771.

Desprez D., Geraz E., Hoareau M.C., Melard C., Bosc P., Baroiller J.F., 1997. Optimisation of hormonal sex-reversal in red-tilapia ("Red Florida" strain) through the use of a natural androgen. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 719-728.

Fauconneau B., Toguyeni A., Fostier A., Le Bail P.Y., Baroiller J.F., 1997. New insigths on feedings and growth of tilapia (Oreochromis niloticus). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA) Orlando Florida.USA, K. Fitzsimmons (Ed.), 151-168.

Guiguen Y., Baroiller J.F., Ricordel M.J., Iseki K., Jalabert B., Fostier A., 1997. Stéroidogénèse et différentiation sexuelle chez deux modèles de poissons : la truite arc-en-ciel Oncorhynchus mykiss et le tilapia Oreochromis noloticus. Proceedings of the fourth workshop on sex determination and gonadal sex differentiation 9-10 octobre 1997 Rennes (France). Int. J. Dev. Biol., 12-13.

Le Bail P.Y., 1997. Hormone and food intake in fish. First cost 827 workshop on voluntary food intake in fish 4 april 1997 Aberdeen UK, presentation

Lefevre, Fl., 1997. La qualite de la chair des poissons d'élevage. VII congresso de zootecnia, 25,26,27 de setembro, 1997, Braganca. Producao, qualidade e ambiente, resume

Toguyeni A. Fauconneau B. Melard C., Fostier A., Lazard J., Barras E., Kuhn E.R. Van der Geyten S., Baroiller J.F., 1997. Sexual dimorphism studies in tilapia using two pure species Oreochromis niloticus and Sarotherodon melanotheron and their inter-generic hybrids (S. melanotheranon x O. niloticus and S. melanotheron x O. niloticus ).. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida(USA), K. Fitzsimmons (Ed.), 200-212.

Toguyeni A., Fauconneau B., Fostier A., Abucay J., Mair G.C., Baroiller J.F., 1997. Influence of genotype and social behaviour on growth performance in tilapia O. niloticus. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida (USA), K. Fitzsimmons (Ed.). Int. J. Dev. Biol., 141-150.

--------------------------------------------------------------------------------


Transfert publications


--------------------------------------------------------------------------------


Personal communications


Journal articles without reviewing comitee


Clergeau P., 1997. De l'étourneau des champs à l'étourneau des villes. INRA mensuel 90, 8-9.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 1ere partie : les îles, des sites privilégiés. RESEAU, 130, 3.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 2eme partie : L'éradication du Surmulot. RESEAU, 131, 3.

Pascal M., 1997. Dératisation de Trielen. Ar Skreo (Bul. Amicale Molenaise), 56, 14-18.


Repports (including licences, expert evaluation)


Roelants I., Breton B., Mikolajczyk T., Ollevier , 1997. Oral delivery from having a high absorption efficiency and method for making the same., brevet.

Other writtings supervised by the author


Thesis


Leguen I., 1997, Mobilisation du calcium et des canaux mécano sensibles dans la régulation du volume des cellules épithéliales : lignée cellulaire de rein d'amphibien (cellule A6) et culture primaire de branchies de poissons. THESE DE DOCTORAT DE L'UNIVERSITE DE RENNES 1, Sciences Biologiques.

Lefevre F., 1997. Propriétés thermogélifiantes des myofibrilles et texture de la chair de truite. THESE DE DOCTORAT DE L'UNIVERSITE BLAISE PASCAL.

Ogier de Beaulny B., 1997. Cryoconservation du sperme de poissons (truite arc en ciel Oncorhynchus mykiss, Turbot (Scophtalmus maximus), Silure glane (Silurus Glanis) et Tilapia (Oreochromis niloticus).Evaluation des dommages cellulaires, amélioration de la technique de congélation, perméabilité membranaire aux cryoprotecteurs. THESE DE DOCTORAT DE L'ENSAR.

Sandra O., 1997. Caractérisation du récepteur de la prolactine (R-PRL) chez la truite arc-en-ciel (Oncorhynchus mykiss) et le Tilapia (Oreochromis niloticus) : clonage d'un ADN complémentaire codant pour le R-PRL et expression in vivo du gène codant pour ce R-PRL. THESE DE DOCTORAT DE L'UNIVERSITE PARIS VI.


Dissertations


Bobe J., 1997. Effet de la température sur le développement musculaire précoce des poissons. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bobe J, 1997. Effet de la température sur le développement musculaire précoce de la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Le collagène de poisson et son rôle dans la qualité de la chair. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Collagène texture de la chair de truite fario (Salmo trutta) : effet de vitesse de croissance et de la vitamine C. MEMOIRE DE DEA Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Colombe L, 1997. Clonage et caractérisation de récepteurs stéroidiens chez la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE présenté pour l'obtention du Diplôme d'Ingénieur C.N.A.M en Biologie en vue des Applications

Guillou Y., Manifacier G., 1997. Impact du Ragondin et de la faune mammalienne fouisseuse sur les levées de la Loire en Maine-et-Loire Elaboration d'outils destinés l'expertise de l'impact du comportement fouisseur de mammifères sauvages sur un ouvrage d'art : la levée de la Loire. Mémoire d'Ingénieur ENITHP Angers, 52 pp + 58pp annexes

Latonnelle K., 1997. Rôles et effets du cholestérol membranaire et différentes méthodes pour modifier le cholestérol membranaire. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Latonnelle K, 1997. Modifications in vitro du rapport molaire cholestérol/phospholipides des spermatozoides et des erythrocytes de truite arc-en -ciel (Oncorhynchus mykiss) , Mises au point de techniques d'évaluation des propriétés mécaniques et biophysiques de la membrane plasmique des spermatozoides de truite. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Les gonadotropines et le contrôle gonadotrope de la reproduction des poissons. (facteurs de régulations endogènes). RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Nouvelles données sur la régulation de la fonction gonadotrope hypophysaire chez la truite arc-en-ciel (Oncorhynchus mykiss) par mesure spécifique des GthI et GthII. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

  † In Memoriam † maandag 15 oktober 2001 @ 00:38:40 #82
13819 Loedertje
Trotse GILF.
pi_1902444
I was almost shocked at reading this article in Norways largest national
newspaper (Dagbladet) today, but then, I've lived here for over thirty
years, so I've become accustomed to immediate support for the USA followed
by a stab in the back.

This politician is the equivalent of a congressman. His name is Olav Gunnar
Ballo, and his party is the Socialistic Left (Sosialistisk Venstre). His
party has supported his views, and they hold sway over 13% of the Norwegian
Congress.

I have nothing against his party, or at least I did'nt, in fact I kind of
liked them during the election when they really took a lot more votes than
expected.

He says that Americans are Satans murderers (no, he's not a muslim...), and
that the USA is a terrorist nation who have commited terrorist acts against
the world for decades! Furthermore, he says Americans have NO morals, that
they are now murdering hundreds of innocents and dropping care packaged
deliberately into mindfields! He also calls all countries and people who
support the USA hypocrites.

I can't go on. It's too much!

I ask EVERYONE who reads this to PLEASE!!!!! send him a short note and let
him know how you feel about his statements. I allready have, but I don't
think one e-mail will get his attention.

send it to sv.postmottak@stortinget.no

Mark it Olav Gunnar Ballo, or TO: Olav Gunnar Ballo, or else it will be
perceived as a message to the whole party (which might not be such a bad
Idea, either).

In cases like this, it doesn't cost much to be a patriot - just a short
email...

This is NOT a hoax!

I only ask what you are all already prepared to give: your reaction towards
anyone who thinks Americans don't have the right to defend themselves.


Sincerely,
M. Walsh
An American in Norway

  † In Memoriam † maandag 15 oktober 2001 @ 00:40:33 #83
13819 Loedertje
Trotse GILF.
pi_1902459
quote:
Op maandag 15 oktober 2001 00:34 schreef calvobbes het volgende:


Zullen we gaan slapen en dit topic morgen volplakken?



Is goed, ben ook moe
pi_1902479
IV.1 Spatial Patterns and Biodiversity - James Quinn, Alan Jassby, Peter Moyle

Goal:

To manage a large variety of GIS and biodiversity databases. This allows for a number of unique analyses that can be closely coupled with other modeling and ecosystem projects to help determine such things as species composition, habitat availability, population estimates, risks of toxic substances to wildlife, and non-point source loading to rivers.

Current Status:

The Cores computer center, created de novo at the beginning of the grant, has developed into a statewide center for GIS and environmental database design and dissemination. Work done in the core has proven of considerable value to a number of agencies, and the Core has attracted over 40 additional grants and contracts to extend Center work, including nine from EPA Region IX. In a cooperative agreement with the California EPA, we are developing a database of known toxic effects of chemical stressors on California vertebrate species. In addition, the Center houses and provides Internet access to biodiversity data covering a wide variety of protected lands, including state and national parks, UNESCO Biosphere Reserves, and Nature Conservancy preserves, and is taking the lead on developing Department of the Interior strategies for international data exchange on non-indigenous species.

See http://www.nbii.gov/iabin/meetings/invs_fr.htm and http://www.nbii.gov/iabin/meetings/tech_fr.htm.

Geographic Information System (GIS). A sophisticated GIS facility, supporting 11 graduate students, with 8 GIS-specialist staff, about 20 ArcInfo workstations, and a variety of peripheral equipment, is now well established. The facility has about 120 statewide GIS layers of environmental themes, especially land forms, land use, biodiversity and water quality, mostly online, and has become the most active California university GIS program in interagency GIS development (under the aegis of the California Biodiversity Council, the California Geographic Information Association, and the National Biological Information Infrastructure) . The Center is the major developer and repository in the state for the National Hydrography Database (the successor to the EPA River Reach Files), the EPA Waterbody system, and other systems used by EPA and collaborating state agencies in managing water quality, water supply, biodiversity issues, and ecological risk assessment. Many of the techniques developed by the Center and its collaborators in the Department of Fish and Game have now been adopted for national implementation.

Clean Water Act Repports. The Center recently completed a project with EPA Region IX to update, modernize, and disseminate the water body reports required under Sections 303(d) and 305(b) of the Clean Water Act for California. We installed the new ArcView-based system, Geo-WBS, in the Regional Water Quality Control Boards in March, and trained analysts to use the GIS to evaluate beneficial uses, sources of impairment, and TMDL issues. The State Water Board is now using the software to prepare Clean Water Act 303(d) (non-point source pollution) reports, and the results will be on-line for professional and public access. We now have new cooperative programs with Region 9, the California Department of Forestry, the California Department of Transportation and the SWRCB to make their non-point-source and stormwater assessment data interoperable.

World Wide Web. The Core facility has established a World Wide Web server to disseminate data and model results to collaborators, managers, and the general public. The Internet activities have been incorporated into a number of electronic data access initiatives, including CERES in California, and the National Biological Information Infrastructure and the Government Information Locator Service at the national level, and the Smithsonian and the UNESCO Man and the Biosphere program internationally.

Future Plans:

As a result of the variety of GIS and biodiversity databases managed by the Core, we have the ability to do a number of unique analyses, which will be closely coupled with and complementary to the other Core models and the ecosystem projects.

While occurrences of both indicator taxa and rare and endangered species are increasingly critical to environmental policy, most areas have not been adequately surveyed to document occurrences and populations of important species. As a result, Wildlife Habitat Relations (WHR) and Gap Analysis models are increasingly being used to infer the presence of species of concern on at least 90% of the landscape where biological surveys are lacking or inadequate. We have submitted a manuscript testing these predictions against either existing data on species in protected areas, or with respect to landscape characteristics, including the size or degree of isolation of "patches" of suitable habitat for rare species. Standard models prove very useful for large conservation areas and "charismatic" taxa such as large mammals and birds, and are in need of revision for urban fringe, riparian, and patchy habitats, and for "less popular" taxa.
In California, Wildlife Habitat Relations, Gap Analysis, and comparable models have only been developed and tested for terrestrial vertebrates. We believe we can develop formal models following the work of Moyle, Ellison, and colleagues, which will accurately predict the species composition and critical habitats for fish, amphibians, and some indicator invertebrates, in rivers and streams that have not been surveyed. Our growing databases of aquatic and riparian species occurrences (some 220,000 records to date) will allow us to both estimate the parameters of an "aquatic WHR" model and to test its accuracy. (Preliminary studies in three northern California watersheds suggest that the accuracy of pilot analyses exceeds 80%). We have just received funding to extensively test the results of the first generation of fish occurrence models in the Cosumnes River Watershed (the last major undammed river draining the Sierra Nevada into San Francisco Bay.)
Invasive species are increasingly being recognized as threats to biodiversity and ecosystem processes. The Core is coordinating data issues in California on the distributions of invasive plants and non-native fish. We have also just begun a partnership with the Department of Interior to develop strategies for assessing invasive species issues in the Western Hemisphere under the Inter-Americas Biodiversity Information Network (IABIN), an initiative begun under the Summit of the Americas, and are awaiting World Bank funds to develop a prototype for a data system. We recently organized an international workshop to plan this initiative at the National Center for Ecological Analysis and Synthesis, and will conduct two follow-up international workshops in the winter of 2000.
We recently completed a second phase of a cooperative study with CalEPA to develop a database and management models for risk analyses of the effects of toxic substances on California wildlife population responses. These have the potential to couple the exposure and effects data with the GIS-based distributional data described above, potentially allowing managers to identify risk elements and potential wildlife responses at particular sites (using the biodiversity databases and models) or for particular releases.
Understanding the impact of land use patterns on runoff has been a major uncertainty in constructing mass balance analyses at the watershed level for a variety of important waterborne constituents, including nitrogen, some pesticides and metals, and sediment load. These, in turn, are thought to be the major causes (other than dams) for declines in anadromous fish -- declines which have driven much of the habitat conservation planning efforts and TMDL (total maximum daily load) actions in Northern California. We are working with investigators in other projects (Mount, Schladow, Fogg) to integrate our spatial data with mechanistic models. We have completed a year of field work to test these assessments in two ambitious watershed-scale field tests, one in the Navarro River watershed (north coast, funded by CalTrans) and the other in the Cosumnes watershed (Sierra Nevada and Delta, funded by the Packard Foundation and CALFED). Data analysis for the first seasons is still underway.
These efforts are tightly interwoven with other Center projects. The runoff modeling provides inputs for the toxicological studies in the Clear Lake and Bay-Delta projects. Conversely, the chemical analysis of spatial sources of sediment load in the Clear Lake basin (Project IV.2) permits a refinement of the geography of non-point source inputs into the Sacramento River and Delta system. On another front, biomarker data from several other projects provides the most powerful test of the models. The predicted spatial extent of species effects studied in most of the Center projects can be mapped using the biodiversity GIS layers. Land cover and land forms affect all of the transport processes studied in both the Decision Support and the Fate and Transport Cores, and transport in many cases is essential to predicting species occurrences.

pi_1902518
* laatste, hierna *

Privacy Act


CHAPTER P-21

An Act to extend the present laws of Canada that protect the privacy of individuals and that provide individuals with a right of access to personal information about themselves

SHORT TITLE

Short title
1. This Act may be cited as the Privacy Act.

1980-81-82-83, c. 111, Sch. II "1".

PURPOSE OF ACT

Purpose
2. The purpose of this Act is to extend the present laws of Canada that protect the privacy of individuals with respect to personal information about themselves held by a government institution and that provide individuals with a right of access to that information.

1980-81-82-83, c. 111, Sch. II "2".

INTERPRETATION

Definitions
3. In this Act,

"administrative purpose" «fins administratives»
"administrative purpose", in relation to the use of personal information about an individual, means the use of that information in a decision making process that directly affects that individual;

"alternative format" « support de substitution »
"alternative format", with respect to personal information, means a format that allows a person with a sensory disability to read or listen to the personal information;

"Court" «Cour»
"Court" means the Federal Court--Trial Division;

"designated Minister" «ministre désigné»
"designated Minister", in relation to any provision of this Act, means such member of the Queen's Privy Council for Canada as is designated by the Governor in Council as the Minister for the purposes of that provision;

"government institution" «institution fédérale»
"government institution" means any department or ministry of state of the Government of Canada listed in the schedule or any body or office listed in the schedule;

"head" «responsable d'institution fédérale»
"head", in respect of a government institution, means

(a) in the case of a department or ministry of state, the member of the Queen's Privy Council for Canada presiding over that institution, or

(b) in any other case, the person designated by order in council pursuant to this paragraph and for the purposes of this Act to be the head of that institution;

"personal information" «renseignements personnels»
"personal information" means information about an identifiable individual that is recorded in any form including, without restricting the generality of the foregoing,

(a) information relating to the race, national or ethnic origin, colour, religion, age or marital status of the individual,

(b) information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved,

(c) any identifying number, symbol or other particular assigned to the individual,

(d) the address, fingerprints or blood type of the individual,

(e) the personal opinions or views of the individual except where they are about another individual or about a proposal for a grant, an award or a prize to be made to another individual by a government institution or a part of a government institution specified in the regulations,

(f) correspondence sent to a government institution by the individual that is implicitly or explicitly of a private or confidential nature, and replies to such correspondence that would reveal the contents of the original correspondence,

(g) the views or opinions of another individual about the individual,

(h) the views or opinions of another individual about a proposal for a grant, an award or a prize to be made to the individual by an institution or a part of an institution referred to in paragraph (e), but excluding the name of the other individual where it appears with the views or opinions of the other individual, and

(i) the name of the individual where it appears with other personal information relating to the individual or where the disclosure of the name itself would reveal information about the individual,

but, for the purposes of sections 7, 8 and 26 and section 19 of the Access to Information Act, does not include

(j) information about an individual who is or was an officer or employee of a government institution that relates to the position or functions of the individual including,

(i) the fact that the individual is or was an officer or employee of the government institution,

(ii) the title, business address and telephone number of the individual,

(iii) the classification, salary range and responsibilities of the position held by the individual,

(iv) the name of the individual on a document prepared by the individual in the course of employment, and

(v) the personal opinions or views of the individual given in the course of employment,

(k) information about an individual who is or was performing services under contract for a government institution that relates to the services performed, including the terms of the contract, the name of the individual and the opinions or views of the individual given in the course of the performance of those services,

(l) information relating to any discretionary benefit of a financial nature, including the granting of a licence or permit, conferred on an individual, including the name of the individual and the exact nature of the benefit, and

(m) information about an individual who has been dead for more than twenty years;

"personal information bank" «fichier de renseignements personnels»
"personal information bank" means a collection or grouping of personal information described in section 10;

"Privacy Commissioner" «Commissaire à la protection de la vie privée»
"Privacy Commissioner" means the Commissioner appointed under section 53;

"sensory disability" « déficience sensorielle »
"sensory disability" means a disability that relates to sight or hearing.

R.S., 1985, c. P-21, s. 3; 1992, c. 1, s. 144(F), c. 21, s. 34.

COLLECTION, RETENTION AND DISPOSAL OF PERSONAL INFORMATION

Collection of personal information
4. No personal information shall be collected by a government institution unless it relates directly to an operating program or activity of the institution.

1980-81-82-83, c. 111, Sch. II "4".

Personal information to be collected directly
5. (1) A government institution shall, wherever possible, collect personal information that is intended to be used for an administrative purpose directly from the individual to whom it relates except where the individual authorizes otherwise or where personal information may be disclosed to the institution under subsection 8(2).

Individual to be informed of purpose
(2) A government institution shall inform any individual from whom the institution collects personal information about the individual of the purpose for which the information is being collected.

Exception
(3) Subsections (1) and (2) do not apply where compliance therewith might

(a) result in the collection of inaccurate information; or

(b) defeat the purpose or prejudice the use for which information is collected.

1980-81-82-83, c. 111, Sch. II "5".

Retention of personal information used for an administrative purpose
6. (1) Personal information that has been used by a government institution for an administrative purpose shall be retained by the institution for such period of time after it is so used as may be prescribed by regulation in order to ensure that the individual to whom it relates has a reasonable opportunity to obtain access to the information.

Accuracy of personal information
(2) A government institution shall take all reasonable steps to ensure that personal information that is used for an administrative purpose by the institution is as accurate, up-to-date and complete as possible.

Disposal of personal information
(3) A government institution shall dispose of personal information under the control of the institution in accordance with the regulations and in accordance with any directives or guidelines issued by the designated minister in relation to the disposal of that information.

1980-81-82-83, c. 111, Sch. II "6".

PROTECTION OF PERSONAL INFORMATION

Use of personal information
7. Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be used by the institution except

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose; or

(b) for a purpose for which the information may be disclosed to the institution under subsection 8(2).

1980-81-82-83, c. 111, Sch. II "7".

Disclosure of personal information
8. (1) Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be disclosed by the institution except in accordance with this section.

Where personal information may be disclosed
(2) Subject to any other Act of Parliament, personal information under the control of a government institution may be disclosed

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose;

(b) for any purpose in accordance with any Act of Parliament or any regulation made thereunder that authorizes its disclosure;

(c) for the purpose of complying with a subpoena or warrant issued or order made by a court, person or body with jurisdiction to compel the production of information or for the purpose of complying with rules of court relating to the production of information;

(d) to the Attorney General of Canada for use in legal proceedings involving the Crown in right of Canada or the Government of Canada;

(e) to an investigative body specified in the regulations, on the written request of the body, for the purpose of enforcing any law of Canada or a province or carrying out a lawful investigation, if the request specifies the purpose and describes the information to be disclosed;

(f) under an agreement or arrangement between the Government of Canada or an institution thereof and the government of a province, the government of a foreign state, an international organization of states or an international organization established by the governments of states, or any institution of any such government or organization, for the purpose of administering or enforcing any law or carrying out a lawful investigation;

(g) to a member of Parliament for the purpose of assisting the individual to whom the information relates in resolving a problem;

(h) to officers or employees of the institution for internal audit purposes, or to the office of the Comptroller General or any other person or body specified in the regulations for audit purposes;

(i) to the National Archives of Canada for archival purposes;

(j) to any person or body for research or statistical purposes if the head of the government institution

(i) is satisfied that the purpose for which the information is disclosed cannot reasonably be accomplished unless the information is provided in a form that would identify the individual to whom it relates, and

(ii) obtains from the person or body a written undertaking that no subsequent disclosure of the information will be made in a form that could reasonably be expected to identify the individual to whom it relates;

(k) to any aboriginal government, association of aboriginal people, Indian band, government institution or part thereof, or to any person acting on behalf of such government, association, band, institution or part thereof, for the purpose of researching or validating the claims, disputes or grievances of any of the aboriginal peoples of Canada;

(l) to any government institution for the purpose of locating an individual in order to collect a debt owing to Her Majesty in right of Canada by that individual or make a payment owing to that individual by Her Majesty in right of Canada; and

(m) for any purpose where, in the opinion of the head of the institution,

(i) the public interest in disclosure clearly outweighs any invasion of privacy that could result from the disclosure, or

(ii) disclosure would clearly benefit the individual to whom the information relates.

Personal information disclosed by National Archives
(3) Subject to any other Act of Parliament, personal information under the custody or control of the National Archivist of Canada that has been transferred to the National Archivist by a government institution for archival or historical purposes may be disclosed in accordance with the regulations to any person or body for research or statistical purposes.

Copies of requests under paragraph (2)(e) to be retained
(4) The head of a government institution shall retain a copy of every request received by the government institution under paragraph (2)(e) for such period of time as may be prescribed by regulation, shall keep a record of any information disclosed pursuant to the request for such period of time as may be prescribed by regulation and shall, on the request of the Privacy Commissioner, make those copies and records available to the Privacy Commissioner.

Notice of disclosure under paragraph (2)(m)
(5) The head of a government institution shall notify the Privacy Commissioner in writing of any disclosure of personal information under paragraph (2)(m) prior to the disclosure where reasonably practicable or in any other case forthwith on the disclosure, and the Privacy Commissioner may, if the Commissioner deems it appropriate, notify the individual to whom the information relates of the disclosure.

Definition of "Indian band"
(6) In paragraph (2)(k), "Indian band" means

(a) a band, as defined in the Indian Act;

(b) a band, as defined in the Cree-Naskapi (of Quebec) Act, chapter 18 of the Statutes of Canada, 1984;

(c) the Band, as defined in the Sechelt Indian Band Self-Government Act, chapter 27 of the Statutes of Canada, 1986; or

(d) a first nation named in Schedule II to the Yukon First Nations Self-Government Act.

Definition of "aboriginal government"
(7) The expression "aboriginal government" in paragraph (2)(k) means Nisga'a Government, as defined in the Nisga'a Final Agreement given effect by the Nisga'a Final Agreement Act.

R.S., 1985, c. P-21, s. 8; R.S., 1985, c. 20 (2nd Supp.), s. 13, c. 1 (3rd Supp.), s. 12; 1994, c. 35, s. 39; 2000, c. 7, s. 26.

Record of disclosures to be retained
9. (1) The head of a government institution shall retain a record of any use by the institution of personal information contained in a personal information bank or any use or purpose for which that information is disclosed by the institution where the use or purpose is not included in the statements of uses and purposes set forth pursuant to subparagraph 11(1)(a)(iv) and subsection 11(2) in the index referred to in section 11, and shall attach the record to the personal information.

Limitation
(2) Subsection (1) does not apply in respect of information disclosed pursuant to paragraph 8(2)(e).

Record forms part of personal information
(3) For the purposes of this Act, a record retained under subsection (1) shall be deemed to form part of the personal information to which it is attached.

Consistent uses
(4) Where personal information in a personal information bank under the control of a government institution is used or disclosed for a use consistent with the purpose for which the information was obtained or compiled by the institution but the use is not included in the statement of consistent uses set forth pursuant to subparagraph 11(1)(a)(iv) in the index referred to in section 11, the head of the government institution shall

(a) forthwith notify the Privacy Commissioner of the use for which the information was used or disclosed; and

(b) ensure that the use is included in the next statement of consistent uses set forth in the index.

1980-81-82-83, c. 111, Sch. II "9"; 1984, c. 21, s. 89.

PERSONAL INFORMATION BANKS

Personal information to be included in personal information banks
10. (1) The head of a government institution shall cause to be included in personal information banks all personal information under the control of the government institution that

(a) has been used, is being used or is available for use for an administrative purpose; or

(b) is organized or intended to be retrieved by the name of an individual or by an identifying number, symbol or other particular assigned to an individual.

Exception for National Archives
(2) Subsection (1) does not apply in respect of personal information under the custody or control of the National Archivist of Canada that has been transferred to the National Archivist of Canada by a government institution for archival or historical purposes.

R.S., 1985, c. P-21, s. 10; R.S., 1985, c. 1 (3rd Supp.), s. 12.

PERSONAL INFORMATION INDEX

Index of personal information
11. (1) The designated Minister shall cause to be published on a periodic basis not less frequently than once each year, an index of

(a) all personal information banks setting forth, in respect of each bank,

(i) the identification and a description of the bank, the registration number assigned to it by the designated Minister pursuant to paragraph 71(1)(b) and a description of the class of individuals to whom personal information contained in the bank relates,

(ii) the name of the government institution that has control of the bank,

(iii) the title and address of the appropriate officer to whom requests relating to personal information contained in the bank should be sent,

(iv) a statement of the purposes for which personal information in the bank was obtained or compiled and a statement of the uses consistent with those purposes for which the information is used or disclosed,

(v) a statement of the retention and disposal standards applied to personal information in the bank, and

(vi) an indication, where applicable, that the bank was designated as an exempt bank by an order under section 18 and the provision of section 21 or 22 on the basis of which the order was made; and

(b) all classes of personal information under the control of a government institution that are not contained in personal information banks, setting forth in respect of each class

(i) a description of the class in sufficient detail to facilitate the right of access under this Act, and

(ii) the title and address of the appropriate officer for each government institution to whom requests relating to personal information within the class should be sent.

Statement of uses and purposes
(2) The designated Minister may set forth in the index referred to in subsection (1) a statement of any of the uses and purposes, not included in the statements made pursuant to subparagraph (1)(a)(iv), for which personal information contained in any of the personal information banks referred to in the index is used or disclosed on a regular basis.

Index to be made available
(3) The designated Minister shall cause the index referred to in subsection (1) to be made available throughout Canada in conformity with the principle that every person is entitled to reasonable access to the index.

1980-81-82-83, c. 111, Sch. II "11".

ACCESS TO PERSONAL INFORMATION

Right of Access

Right of access
12. (1) Subject to this Act, every individual who is a Canadian citizen or a permanent resident within the meaning of the Immigration Act has a right to and shall, on request, be given access to

(a) any personal information about the individual contained in a personal information bank; and

(b) any other personal information about the individual under the control of a government institution with respect to which the individual is able to provide sufficiently specific information on the location of the information as to render it reasonably retrievable by the government institution.

Other rights relating to personal information
(2) Every individual who is given access under paragraph (1)(a) to personal information that has been used, is being used or is available for use for an administrative purpose is entitled to

(a) request correction of the personal information where the individual believes there is an error or omission therein;

(b) require that a notation be attached to the information reflecting any correction requested but not made; and

(c) require that any person or body to whom that information has been disclosed for use for an administrative purpose within two years prior to the time a correction is requested or a notation is required under this subsection in respect of that information

(i) be notified of the correction or notation, and

(ii) where the disclosure is to a government institution, the institution make the correction or notation on any copy of the information under its control.

Extension of right of access by order
(3) The Governor in Council may, by order, extend the right to be given access to personal information under subsection (1) to include individuals not referred to in that subsection and may set such conditions as the Governor in Council deems appropriate.

1980-81-82-83, c. 111, Sch. II "12".

Requests for Access

Request for access under paragraph 12(1)(a)
13. (1) A request for access to personal information under paragraph 12(1)(a) shall be made in writing to the government institution that has control of the personal information bank that contains the information and shall identify the bank.

Request for access under 12(1)(b)
(2) A request for access to personal information under paragraph 12(1)(b) shall be made in writing to the government institution that has control of the information and shall provide sufficiently specific information on the location of the information as to render it reasonably retrievable by the government institution.

1980-81-82-83, c. 111, Sch. II "13".

Notice where access requested
14. Where access to personal information is requested under subsection 12(1), the head of the government institution to which the request is made shall, subject to section 15, within thirty days after the request is received,

(a) give written notice to the individual who made the request as to whether or not access to the information or a part thereof will be given; and

(b) if access is to be given, give the individual who made the request access to the information or the part thereof.

1980-81-82-83, c. 111, Sch. II "14".

Extension of time limits
15. The head of a government institution may extend the time limit set out in section 14 in respect of a request for

(a) a maximum of thirty days if

(i) meeting the original time limit would unreasonably interfere with the operations of the government institution, or

(ii) consultations are necessary to comply with the request that cannot reasonably be completed within the original time limit, or

(b) such period of time as is reasonable, if additional time is necessary for translation purposes or for the purposes of converting the personal information into an alternative format,

by giving notice of the extension and the length of the extension to the individual who made the request within thirty days after the request is received, which notice shall contain a statement that the individual has a right to make a complaint to the Privacy Commissioner about the extension.

R.S., 1985, c. P-21, s. 15; 1992, c. 21, s. 35.

Where access is refused
16. (1) Where the head of a government institution refuses to give access to any personal information requested under subsection 12(1), the head of the institution shall state in the notice given under paragraph 14(a)

(a) that the personal information does not exist, or

(b) the specific provision of this Act on which the refusal was based or the provision on which a refusal could reasonably be expected to be based if the information existed,

and shall state in the notice that the individual who made the request has a right to make a complaint to the Privacy Commissioner about the refusal.

Existence not required to be disclosed
(2) The head of a government institution may but is not required to indicate under subsection (1) whether personal information exists.

Deemed refusal to give access
(3) Where the head of a government institution fails to give access to any personal information requested under subsection 12(1) within the time limits set out in this Act, the head of the institution shall, for the purposes of this Act, be deemed to have refused to give access.

1980-81-82-83, c. 111, Sch. II "16".

Access

Form of access
17. (1) Subject to any regulations made under paragraph 77(1)(o), where an individual is to be given access to personal information requested under subsection 12(1), the government institution shall

(a) permit the individual to examine the information in accordance with the regulations; or

(b) provide the individual with a copy thereof.

Language of access
(2) Where access to personal information is to be given under this Act and the individual to whom access is to be given requests that access be given in a particular one of the official languages of Canada,

(a) access shall be given in that language, if the personal information already exists under the control of a government institution in that language; and

(b) where the personal information does not exist in that language, the head of the government institution that has control of the personal information shall cause it to be translated or interpreted for the individual if the head of the institution considers a translation or interpretation to be necessary to enable the individual to understand the information.

Access to personal information in alternative format
(3) Where access to personal information is to be given under this Act and the individual to whom access is to be given has a sensory disability and requests that access be given in an alternative format, access shall be given in an alternative format if

(a) the personal information already exists under the control of a government institution in an alternative format that is acceptable to the individual; or

(b) the head of the government institution that has control of the personal information considers the giving of access in an alternative format to be necessary to enable the individual to exercise the individual's right of access under this Act and considers it reasonable to cause the personal information to be converted.

R.S., 1985, c. P-21, s. 17; 1992, c. 21, s. 36.

EXEMPTIONS

Exempt Banks

Governor in Council may designate exempt banks
18. (1) The Governor in Council may, by order, designate as exempt banks certain personal information banks that contain files all of which consist predominantly of personal information described in section 2l or 22.

Disclosure may be refused
(2) The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) that is contained in a personal information bank designated as an exempt bank under subsection (1).

Contents of order
(3) An order made under subsection (1) shall specify

(a) the section on the basis of which the order is made; and

(b) where a personal information bank is designated that contains files that consist predominantly of personal information described in subparagraph 22(1)(a)(ii), the law concerned.

1980-81-82-83, c. 111, Sch. II "18".

Responsibilities of Government

Personal information obtained in confidence
19. (1) Subject to subsection (2), the head of a government institution shall refuse to disclose any personal information requested under subsection 12(1) that was obtained in confidence from

(a) the government of a foreign state or an institution thereof;

(b) an international organization of states or an institution thereof;

(c) the government of a province or an institution thereof; or

(d) a municipal or regional government established by or pursuant to an Act of the legislature of a province or an institution of such a government.

Where disclosure authorized
(2) The head of a government institution may disclose any personal information requested under subsection 12(1) that was obtained from any government, organization or institution described in subsection (1) if the government, organization or institution from which the information was obtained

(a) consents to the disclosure; or

(b) makes the information public.

1980-81-82-83, c. 111, Sch. II "19".

Federal-provincial affairs
20. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) the disclosure of which could reasonably be expected to be injurious to the conduct by the Government of Canada of federal-provincial affairs.

1980-81-82-83, c. 111, Sch. II "20".

International affairs and defence
21. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) the disclosure of which could reasonably be expected to be injurious to the conduct of international affairs, the defence of Canada or any state allied or associated with Canada, as defined in subsection 15(2) of the Access to Information Act, or the efforts of Canada toward detecting, preventing or suppressing subversive or hostile activities, as defined in subsection 15(2) of the Access to Information Act, including, without restricting the generality of the foregoing, any such information listed in paragraphs 15(1)(a) to (i) of the Access to Information Act.

1980-81-82-83, c. 111, Sch. II "21".

Law enforcement and investigation
22. (1) The head of a government institution may refuse to disclose any personal information requested under subsection 12(1)

(a) that was obtained or prepared by any government institution, or part of any government institution, that is an investigative body specified in the regulations in the course of lawful investigations pertaining to

(i) the detection, prevention or suppression of crime,

(ii) the enforcement of any law of Canada or a province, or

(iii) activities suspected of constituting threats to the security of Canada within the meaning of the Canadian Security Intelligence Service Act,

if the information came into existence less than twenty years prior to the request;

(b) the disclosure of which could reasonably be expected to be injurious to the enforcement of any law of Canada or a province or the conduct of lawful investigations, including, without restricting the generality of the foregoing, any such information

(i) relating to the existence or nature of a particular investigation,

(ii) that would reveal the identity of a confidential source of information, or

(iii) that was obtained or prepared in the course of an investigation; or

(c) the disclosure of which could reasonably be expected to be injurious to the security of penal institutions.

Policing services for provinces or municipalities
(2) The head of a government institution shall refuse to disclose any personal information requested under subsection 12(1) that was obtained or prepared by the Royal Canadian Mounted Police while performing policing services for a province or municipality pursuant to an arrangement made under section 20 of the Royal Canadian Mounted Police Act, where the Government of Canada has, on the request of the province or municipality, agreed not to disclose such information.

Definition of "investigation"
(3) For the purposes of paragraph (1)(b), "investigation" means an investigation that

(a) pertains to the administration or enforcement of an Act of Parliament;

(b) is authorized by or pursuant to an Act of Parliament; or

(c) is within a class of investigations specified in the regulations.

1980-81-82-83, c. 111, Sch. II "22"; 1984, c. 21, s. 90, c. 40, s. 79.

Security clearances
23. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) that was obtained or prepared by an investigative body specified in the regulations for the purpose of determining whether to grant security clearances

(a) required by the Government of Canada or a government institution in respect of individuals employed by or performing services for the Government of Canada or a government institution, individuals employed by or performing services for a person or body performing services for the Government of Canada or a government institution, individuals seeking to be so employed or seeking to perform those services, or

(b) required by the government of a province or a foreign state or an institution thereof,

if disclosure of the information could reasonably be expected to reveal the identity of the individual who furnished the investigative body with the information.

1980-81-82-83, c. 111, Sch. II "23".

Individuals sentenced for an offence
24. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) that was collected or obtained by the Correctional Service of Canada or the National Parole Board while the individual who made the request was under sentence for an offence against any Act of Parliament, if the disclosure could reasonably be expected to

(a) lead to a serious disruption of the individual's institutional, parole or statutory release program; or

(b) reveal information about the individual originally obtained on a promise of confidentiality, express or implied.

R.S., 1985, c. P-21, s. 24; 1994, c. 26, s. 56.

Safety of individuals
25. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) the disclosure of which could reasonably be expected to threaten the safety of individuals.

1980-81-82-83, c. 111, Sch. II "25".

Personal Information

Information about another individual
26. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) about an individual other than the individual who made the request, and shall refuse to disclose such information where the disclosure is prohibited under section 8.

1980-81-82-83, c. 111, Sch. II "26".

Solicitor-Client Privilege

Solicitor-client privilege
27. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) that is subject to solicitor-client privilege.

1980-81-82-83, c. 111, Sch. II "27".

Medical Records

Medical record
28. The head of a government institution may refuse to disclose any personal information requested under subsection 12(1) that relates to the physical or mental health of the individual who requested it where the examination of the information by the individual would be contrary to the best interests of the individual.

1980-81-82-83, c. 111, Sch. II "28".

COMPLAINTS

Receipt and investigation of complaints
29. (1) Subject to this Act, the Privacy Commissioner shall receive and investigate complaints

(a) from individuals who allege that personal information about themselves held by a government institution has been used or disclosed otherwise than in accordance with section 7 or 8;

(b) from individuals who have been refused access to personal information requested under subsection 12(1);

(c) from individuals who allege that they are not being accorded the rights to which they are entitled under subsection 12(2) or that corrections of personal information requested under paragraph 12(2)(a) are being refused without justification;

(d) from individuals who have requested access to personal information in respect of which a time limit has been extended pursuant to section 15 where they consider the extension unreasonable;

(e) from individuals who have not been given access to personal information in the official language requested by the individuals under subsection 17(2);

(e.1) from individuals who have not been given access to personal information in an alternative format pursuant to a request made under subsection 17(3);

(f) from individuals who have been required to pay a fee that they consider inappropriate;

(g) in respect of the index referred to in subsection 11(1); or

(h) in respect of any other matter relating to

(i) the collection, retention or disposal of personal information by a government institution,

(ii) the use or disclosure of personal information under the control of a government institution, or

(iii) requesting or obtaining access under subsection 12(1) to personal information.

Complaints submitted on behalf of complainants
(2) Nothing in this Act precludes the Privacy Commissioner from receiving and investigating complaints of a nature described in subsection (1) that are submitted by a person authorized by the complainant to act on behalf of the complainant, and a reference to a complainant in any other section includes a reference to a person so authorized.

Privacy Commissioner may initiate complaint
(3) Where the Privacy Commissioner is satisfied that there are reasonable grounds to investigate a matter under this Act, the Commissioner may initiate a complaint in respect thereof.

R.S., 1985, c. P-21, s. 29; 1992, c. 21, s. 37.

Written complaint
30. A complaint under this Act shall be made to the Privacy Commissioner in writing unless the Commissioner authorizes otherwise.

1980-81-82-83, c. 111, Sch. II "30".

INVESTIGATIONS

Notice of intention to investigate
31. Before commencing an investigation of a complaint under this Act, the Privacy Commissioner shall notify the head of the government institution concerned of the intention to carry out the investigation and shall inform the head of the institution of the substance of the complaint.

1980-81-82-83, c. 111, Sch. II "31".

Regulation of procedure
32. Subject to this Act, the Privacy Commissioner may determine the procedure to be followed in the performance of any duty or function of the Commissioner under this Act.

1980-81-82-83, c. 111, Sch. II "32".

Investigations in private
33. (1) Every investigation of a complaint under this Act by the Privacy Commissioner shall be conducted in private.

Right to make representation
(2) In the course of an investigation of a complaint under this Act by the Privacy Commissioner, the person who made the complaint and the head of the government institution concerned shall be given an opportunity to make representations to the Commissioner, but no one is entitled as of right to be present during, to have access to or to comment on representations made to the Commissioner by any other person.

1980-81-82-83, c. 111, Sch. II "33".

Powers of Privacy Commissioner in carrying out investigations
34. (1) The Privacy Commissioner has, in relation to the carrying out of the investigation of any complaint under this Act, power

(a) to summon and enforce the appearance of persons before the Privacy Commissioner and compel them to give oral or written evidence on oath and to produce such documents and things as the Commissioner deems requisite to the full investigation and consideration of the complaint, in the same manner and to the same extent as a superior court of record;

(b) to administer oaths;

(c) to receive and accept such evidence and other information, whether on oath or by affidavit or otherwise, as the Privacy Commissioner sees fit, whether or not the evidence or information is or would be admissible in a court of law;

(d) to enter any premises occupied by any government institution on satisfying any security requirements of the institution relating to the premises;

(e) to converse in private with any person in any premises entered pursuant to paragraph (d) and otherwise carry out therein such inquiries within the authority of the Privacy Commissioner under this Act as the Commissioner sees fit; and

(f) to examine or obtain copies of or extracts from books or other records found in any premises entered pursuant to paragraph (d) containing any matter relevant to the investigation.

Access to information
(2) Notwithstanding any other Act of Parliament or any privilege under the law of evidence, the Privacy Commissioner may, during the investigation of any complaint under this Act, examine any information recorded in any form under the control of a government institution, other than a confidence of the Queen's Privy Council for Canada to which subsection 70(1) applies, and no information that the Commissioner may examine under this subsection may be withheld from the Commissioner on any grounds.

Evidence in other proceedings
(3) Except in a prosecution of a person for an offence under section 131 of the Criminal Code (perjury) in respect of a statement made under this Act, in a prosecution for an offence under this Act or in a review before the Court under this Act or an appeal therefrom, evidence given by a person in proceedings under this Act and evidence of the existence of the proceedings is inadmissible against that person in a court or in any other proceedings.

Witness fees
(4) Any person summoned to appear before the Privacy Commissioner pursuant to this section is entitled in the discretion of the Commissioner to receive the like fees and allowances for so doing as if summoned to attend before the Federal Court.

Return of documents, etc.
(5) Any document or thing produced pursuant to this section by any person or government institution shall be returned by the Privacy Commissioner within ten days after a request is made to the Commissioner by that person or government institution, but nothing in this subsection precludes the Commissioner from again requiring its production in accordance with this section.

R.S., 1985, c. P-21, s. 34; R.S., 1985, c. 27 (1st Supp.), s. 187.

Findings and recommendations of Privacy Commissioner
35. (1) If, on investigating a complaint under this Act in respect of personal information, the Privacy Commissioner finds that the complaint is well-founded, the Commissioner shall provide the head of the government institution that has control of the personal information with a report containing

(a) the findings of the investigation and any recommendations that the Commissioner considers appropriate; and

(b) where appropriate, a request that, within a time specified therein, notice be given to the Commissioner of any action taken or proposed to be taken to implement the recommendations contained in the report or reasons why no such action has been or is proposed to be taken.

Report to complainant
(2) The Privacy Commissioner shall, after investigating a complaint under this Act, report to the complainant the results of the investigation, but where a notice has been requested under paragraph (1)(b) no report shall be made under this subsection until the expiration of the time within which the notice is to be given to the Commissioner.

Matter to be included in report to complainant
(3) Where a notice has been requested under paragraph (1)(b) but no such notice is received by the Commissioner within the time specified therefor or the action described in the notice is, in the opinion of the Commissioner, inadequate or inappropriate or will not be taken in a reasonable time, the Commissioner shall so advise the complainant in his report under subsection (2) and may include in the report such comments on the matter as he thinks fit.

Access to be given
(4) Where, pursuant to a request under paragraph (1)(b), the head of a government institution gives notice to the Privacy Commissioner that access to personal information will be given to a complainant, the head of the institution shall give the complainant access to the information forthwith on giving the notice.

Right of review
(5) Where, following the investigation of a complaint relating to a refusal to give access to personal information under this Act, access is not given to the complainant, the Privacy Commissioner shall inform the complainant that the complainant has the right to apply to the Court for a review of the matter investigated.

1980-81-82-83, c. 111, Sch. II "35".

REVIEW OF EXEMPT BANKS

Investigation of exempt banks
36. (1) The Privacy Commissioner may, from time to time at the discretion of the Commissioner, carry out investigations of the files contained in personal information banks designated as exempt banks under section 18.

Sections 31 to 34 apply
(2) Sections 31 to 34 apply, where appropriate and with such modifications as the circumstances require, in respect of investigations carried out under subsection (1).

Report of findings and recommendations
(3) If, following an investigation under subsection (1), the Privacy Commissioner considers that any file contained in a personal information bank should not be contained therein within the terms of the order designating the bank as an exempt bank, the Commissioner shall provide the head of the government institution that has control of the bank with a report containing

(a) the findings of the Commissioner and any recommendations that the Commissioner considers appropriate; and

(b) where appropriate, a request that, within a time specified therein, notice be given to the Commissioner of any action taken or proposed to be taken to implement the recommendations or reasons why no such action has been or is proposed to be taken.

Reports to be included in annual or special reports to Parliament
(4) Any report made by the Privacy Commissioner under subsection (3), together with any notice given to the Commissioner in response thereto, may be included in a report made pursuant to section 38 or 39.

Review of exempt banks by Court
(5) Where the Privacy Commissioner requests a notice under paragraph (3)(b) in respect of any file contained in a personal information bank designated under section 18 as an exempt bank and no notice is received within the time specified therefor or the action described in the notice is, in the opinion of the Commissioner, inadequate or inappropriate or will not be taken in a reasonable time, the Privacy Commissioner may make an application to the Court under section 43.

1980-81-82-83, c. 111, Sch. II "36".

REVIEW OF COMPLIANCE WITH SECTIONS 4 TO 8

Investigation in respect of sections 4 to 8
37. (1) The Privacy Commissioner may, from time to time at the discretion of the Commissioner, carry out investigations in respect of personal information under the control of government institutions to ensure compliance with sections 4 to 8.

Sections 31 to 34 apply
(2) Sections 31 to 34 apply, where appropriate and with such modifications as the circumstances require, in respect of investigations carried out under subsection (1).

Report of findings and recommendations
(3) If, following an investigation under subsection (1), the Privacy Commissioner considers that a government institution has not complied with sections 4 to 8, the Commissioner shall provide the head of the institution with a report containing the findings of the investigation and any recommendations that the Commissioner considers appropriate.

Reports to be included in annual or special reports
(4) Any report made by the Privacy Commissioner under subsection (3) may be included in a report made pursuant to section 38 or 39.

1980-81-82-83, c. 111, Sch. II "37".

REPORTS TO PARLIAMENT

Annual report
38. The Privacy Commissioner shall, within three months after the termination of each financial year, submit an annual report to Parliament on the activities of the office during that financial year.

1980-81-82-83, c. 111, Sch. II "38".

Special reports
39. (1) The Privacy Commissioner may, at any time, make a special report to Parliament referring to and commenting on any matter within the scope of the powers, duties and functions of the Commissioner where, in the opinion of the Commissioner, the matter is of such urgency or importance that a report thereon should not be deferred until the time provided for transmission of the next annual report of the Commissioner under section 38.

Where investigation made
(2) Any report made pursuant to subsection (1) that relates to an investigation under this Act shall be made only after the procedures set out in section 35, 36 or 37 have been followed in respect of the investigation.

1980-81-82-83, c. 111, Sch. II "39".

Transmission of reports
40. (1) Every report to Parliament made by the Privacy Commissioner under section 38 or 39 shall be made by being transmitted to the Speaker of the Senate and to the Speaker of the House of Commons for tabling in those Houses.

Reference to Parliamentary committee
(2) Every report referred to in subsection (1) shall, after it is transmitted for tabling pursuant to that subsection, be referred to the committee designated or established by Parliament for the purpose of subsection 75(1).

1980-81-82-83, c. 111, Sch. II "40".

REVIEW BY THE FEDERAL COURT

Review by Federal Court where access refused
41. Any individual who has been refused access to personal information requested under subsection 12(1) may, if a complaint has been made to the Privacy Commissioner in respect of the refusal, apply to the Court for a review of the matter within forty-five days after the time the results of an investigation of the complaint by the Privacy Commissioner are reported to the complainant under subsection 35(2) or within such further time as the Court may, either before or after the expiration of those forty-five days, fix or allow.

1980-81-82-83, c. 111, Sch. II "41".

Privacy Commissioner may apply or appear
42. The Privacy Commissioner may

(a) apply to the Court, within the time limits prescribed by section 41, for a review of any refusal to disclose personal information requested under subsection 12(1) in respect of which an investigation has been carried out by the Privacy Commissioner, if the Commissioner has the consent of the individual who requested access to the information;

(b) appear before the Court on behalf of any individual who has applied for a review under section 41; or

(c) with leave of the Court, appear as a party to any review applied for under section 41.

1980-81-82-83, c. 111, Sch. II "42".

Application respecting files in exempt banks
43. In the circumstances described in subsection 36(5), the Privacy Commissioner may apply to the Court for a review of any file contained in a personal information bank designated as an exempt bank under section 18.

1980-81-82-83, c. 111, Sch. II "43".

Hearing in summary way
44. An application made under section 41, 42 or 43 shall be heard and determined in a summary way in accordance with any special rules made in respect of such applications pursuant to section 46 of the Federal Court Act.

1980-81-82-83, c. 111, Sch. II "44".

Access to information
45. Notwithstanding any other Act of Parliament or any privilege under the law of evidence, the Court may, in the course of any proceedings before the Court arising from an application under section 41, 42 or 43, examine any information recorded in any form under the control of a government institution, other than a confidence of the Queen's Privy Council for Canada to which subsection 70(1) applies, and no information that the Court may examine under this section may be withheld from the Court on any grounds.

1980-81-82-83, c. 111, Sch. II "45".

Court to take precautions against disclosing
46. (1) In any proceedings before the Court arising from an application under section 41, 42 or 43, the Court shall take every reasonable precaution, including, when appropriate, receiving representations ex parte and conducting hearings in camera, to avoid the disclosure by the Court or any person of

(a) any information or other material that the head of a government institution would be authorized to refuse to disclose if it were requested under subsection 12(1) or contained in a record requested under the Access to Information Act; or

(b) any information as to whether personal information exists where the head of a government institution, in refusing to disclose the personal information under this Act, does not indicate whether it exists.

Disclosure of offence authorized
(2) The Court may disclose to the appropriate authority information relating to the commission of an offence against any law of Canada or a province on the part of any officer or employee of a government institution, if in the opinion of the Court there is evidence thereof.

1980-81-82-83, c. 111, Sch. II "46".

Burden of proof
47. In any proceedings before the Court arising from an application under section 41, 42 or 43, the burden of establishing that the head of a government institution is authorized to refuse to disclose personal information requested under subsection 12(1) or that a file should be included in a personal information bank designated as an exempt bank under section 18 shall be on the government institution concerned.

1980-81-82-83, c. 111, Sch. II "47".

Order of Court where no authorization to refuse disclosure found
48. Where the head of a government institution refuses to disclose personal information requested under subsection 12(1) on the basis of a provision of this Act not referred to in section 49, the Court shall, if it determines that the head of the institution is not authorized under this Act to refuse to disclose the personal information, order the head of the institution to disclose the personal information, subject to such conditions as the Court deems appropriate, to the individual who requested access thereto, or shall make such other order as the Court deems appropriate.

1980-81-82-83, c. 111, Sch. II "48".

Order of Court where reasonable grounds of injury not found
49. Where the head of a government institution refuses to disclose personal information requested under subsection 12(1) on the basis of section 20 or 21 or paragraph 22(1)(b) or (c) or 24(a), the Court shall, if it determines that the head of the institution did not have reasonable grounds on which to refuse to disclose the personal information, order the head of the institution to disclose the personal information, subject to such conditions as the Court deems appropriate, to the individual who requested access thereto, or shall make such other order as the Court deems appropriate.

1980-81-82-83, c. 111, Sch. II "49".

Order to remove file from exempt bank
50. Where the Privacy Commissioner makes an application to the Court under section 43 for a review of a file contained in a personal information bank designated as an exempt bank under section 18, the Court shall, if it determines

(a) in the case of a file contained in the bank on the basis of personal information described in paragraph 22(1)(a) or subsection 22(2), that the file should not be included therein, or

(b) in the case of a file contained in the bank on the basis of personal information described in section 21 or paragraph 22(1)(b) or (c), that reasonable grounds do not exist on which to include the file in the bank,

order the head of the government institution that has control of the bank to remove the file from the bank or make such other order as the Court deems appropriate.

1980-81-82-83, c. 111, Sch. II "50"; 1984, c. 40, s. 60.

Actions relating to international affairs and defence
51. (1) Any application under section 41 or 42 relating to personal information that the head of a government institution has refused to disclose by reason of paragraph 19(1)(a) or (b) or section 21, and any application under section 43 in respect of a file contained in a personal information bank designated as an exempt bank under section 18 to contain files all of which consist predominantly of personal information described in section 21, shall be heard and determined by the Associate Chief Justice of the Federal Court or by such other judge of the Court as the Associate Chief Justice may designate to hear the applications.

Special rules for hearings
(2) An application referred to in subsection (1) or an appeal brought in respect of such application shall

(a) be heard in camera; and

(b) on the request of the head of the government institution concerned, be heard and determined in the National Capital Region described in the schedule to the National Capital Act.

Ex parte representations
(3) During the hearing of an application referred to in subsection (1) or an appeal brought in respect of such application, the head of the government institution concerned shall, on the request of the head of the institution, be given the opportunity to make representations ex parte.

1980-81-82-83, c. 111, Sch. II "51".

Costs
52. (1) Subject to subsection (2), the costs of and incidental to all proceedings in the Court under this Act shall be in the discretion of the Court and shall follow the event unless the Court orders otherwise.

Idem
(2) Where the Court is of the opinion that an application for review under section 41 or 42 has raised an important new principle in relation to this Act, the Court shall order that costs be awarded to the applicant even if the applicant has not been successful in the result.

1980-81-82-83, c. 111, Sch. II "52".

OFFICE OF THE PRIVACY COMMISSIONER

Privacy Commissioner

Privacy Commissioner
53. (1) The Governor in Council shall, by commission under the Great Seal, appoint a Privacy Commissioner after approval of the appointment by resolution of the Senate and House of Commons.

Tenure of office and removal
(2) Subject to this section, the Privacy Commissioner holds office during good behaviour for a term of seven years, but may be removed by the Governor in Council at any time on address of the Senate and House of Commons.

Further terms
(3) The Privacy Commissioner, on the expiration of a first or any subsequent term of office, is eligible to be re-appointed for a further term not exceeding seven years.

Absence or incapacity
(4) In the event of the absence or incapacity of the Privacy Commissioner, or if the office of Privacy Commissioner is vacant, the Governor in Council may appoint another qualified person to hold office instead of the Commissioner for a term not exceeding six months, and that person shall, while holding that office, have all of the powers, duties and functions of the Privacy Commissioner under this Act or any other Act of Parliament and be paid such salary or other remuneration and expenses as may be fixed by the Governor in Council.

1980-81-82-83, c. 111, Sch. II "53".

Rank, powers and duties generally
54. (1) The Privacy Commissioner shall rank as and have all the powers of a deputy head of a department, shall engage exclusively in the duties of the office of Privacy Commissioner under this Act or any other Act of Parliament and shall not hold any other office under Her Majesty for reward or engage in any other employment for reward.

Salary and expenses
(2) The Privacy Commissioner shall be paid a salary equal to the salary of a judge of the Federal Court, other than the Chief Justice or the Associate Chief Justice of that Court, and is entitled to be paid reasonable travel and living expenses incurred in the performance of duties under this Act or any other Act of Parliament.

Pension benefits
(3) The provisions of the Public Service Superannuation Act, other than those relating to tenure of office, apply to the Privacy Commissioner, except that a person appointed as Privacy Commissioner from outside the Public Service, as defined in the Public Service Superannuation Act, may, by notice in writing given to the President of the Treasury Board not more than sixty days after the date of appointment, elect to participate in the pension plan provided in the Diplomatic Service (Special) Superannuation Act, in which case the provisions of that Act, other than those relating to tenure of office, apply to the Privacy Commissioner from the date of appointment and the provisions of the Public Service Superannuation Act do not apply.

Other benefits
(4) The Privacy Commissioner is deemed to be employed in the public service of Canada for the purposes of the Government Employees Compensation Act and any regulations made under section 9 of the Aeronautics Act.

1980-81-82-83, c. 111, Sch. II "54".

Information Commissioner may be appointed as Privacy Commissioner
55. (1) The Governor in Council may appoint as Privacy Commissioner under section 53 the Information Commissioner appointed under the Access to Information Act.

Salary
(2) In the event that the Information Commissioner is appointed in accordance with subsection (1) as Privacy Commissioner, the Privacy Commissioner shall, notwithstanding subsection 54(2), be paid the salary of the Information Commissioner but not the salary of the Privacy Commissioner.

1980-81-82-83, c. 111, Sch. II "55".

Assistant Privacy Commissioner

Appointment of Assistant Privacy Commissioner
56. (1) The Governor in Council may, on the recommendation of the Privacy Commissioner, appoint one or more Assistant Privacy Commissioners.

Tenure of office and removal of Assistant Privacy Commissioner
(2) Subject to this section, an Assistant Privacy Commissioner holds office during good behaviour for a term not exceeding five years.

Further terms
(3) An Assistant Privacy Commissioner, on the expiration of a first or any subsequent term of office, is eligible to be re-appointed for a further term not exceeding five years.

1980-81-82-83, c. 111, Sch. II "56"; 1984, c. 40, s. 79.

Duties generally
57. (1) An Assistant Privacy Commissioner shall engage exclusively in such duties or functions of the office of the Privacy Commissioner under this Act or any other Act of Parliament as are delegated by the Privacy Commissioner to that Assistant Privacy Commissioner and shall not hold any other office under Her Majesty for reward or engage in any other employment for reward.

Salary and expenses
(2) An Assistant Privacy Commissioner is entitled to be paid a salary to be fixed by the Governor in Council and such travel and living expenses incurred in the performance of duties under this Act or any other Act of Parliament as the Privacy Commissioner considers reasonable.

Pension benefits
(3) The provisions of the Public Service Superannuation Act, other than those relating to tenure of office, apply to an Assistant Privacy Commissioner.

Other benefits
(4) An Assistant Privacy Commissioner is deemed to be employed in the public service of Canada for the purposes of the Government Employees Compensation Act and any regulations made under section 9 of the Aeronautics Act.

1980-81-82-83, c. 111, Sch. II "57".

Staff

Staff of the Privacy Commissioner
58. (1) Such officers and employees as are necessary to enable the Privacy Commissioner to perform the duties and functions of the Commissioner under this Act or any other Act of Parliament shall be appointed in accordance with the Public Service Employment Act.

Technical assistance
(2) The Privacy Commissioner may engage on a temporary basis the services of persons having technical or specialized knowledge of any matter relating to the work of the Commissioner to advise and assist the Commissioner in the performance of the duties and functions of the Commissioner under this Act or any other Act of Parliament and, with the approval of the Treasury Board, may fix and pay the remuneration and expenses of such persons.

1980-81-82-83, c. 111, Sch. II "58".

Delegation

Delegation by Privacy Commissioner
59. (1) Subject to subsection (2), the Privacy Commissioner may authorize any person to exercise or perform, subject to such restrictions or limitations as the Commissioner may specify, any of the powers, duties or functions of the Commissioner under this Act except

(a) in any case other than a delegation to an Assistant Privacy Commissioner, the power to delegate under

  † In Memoriam † maandag 15 oktober 2001 @ 01:00:16 #86
13819 Loedertje
Trotse GILF.
  maandag 15 oktober 2001 @ 01:00:26 #87
15098 El-Lupe
Sick of you!
pi_1902645
Abbot, Francis Ellingwood, 1836-1903
Adams, Alvin, 1804-1877
Adams, Harriet A. [married to John S. Adams], -1885
Adams, John Quincy, 1767-1848
Adams, John Stowell, -1893
Adare, Lord [aka, Third Earl of Dunraven], 1812-1871
Africa, John Simpson, 1832-1900
Agassiz, Jean Louis Rudolphe, 1807-1873
Aksakov, Aleksandr Nikolaevich, 1832-1903
Albro, Stephen G.
Alcott, Amos Bronson, 1799-1888
Alcott, William Andrus, 1798-1859
Alger, Horatio, Jr., 1834-1899
Allen, Ellen Lazarus, [sister of M. E. Lazarus; m. to John Allen]
Allen, John, 1814-1858
Allyn, John, 1820-1899
Ambler, Russell Perkins, 1827-
Anderson, L. Pet
Anderson, Wella P.
Andrew, John Albion, 1818-1867
Andrews, Esther Hussey Bartlet Jones [m. to S. Pearl Andrews], 1808-1871
Andrews, Lewis Feuilleteau Wilson, 1802-1875
Andrews, Stephen Pearl, 1812-1886
Anthony, Susan Brownell, 1820-1906
Arnold, Edwin, 1832-1904
Arthur, Timothy Shay, 1809-1885
Ashburner, John, 1793-1878
Astor, John Jacob, 1864-1912
Atkinson, William Walker, 1862-1932
Atwood, Anson Seth, 1790-1866
Augustus, John, 1785-1859
Austin, Benjamin Fish, 1850-
Austin, John Mather, 1805-1880
Averill, Elihu Baxter, 1810-1887
Averill, Justin Parsons, 1821-
Ayer, Marcellus Seth, 1839-1921
Babbitt, Edwin Dwight, 1828-1905
Bacon, George Allen, 1830-1910
Bagley Durno, Sarah George, 1806-
Bailey, Alice Anne La Trobe-Bateman, 1880-1949
Bailey, Gamaliel, 1807-1859
Bakunin, Michael, 1814-1876
Baldwin, James Mark, 1861-1934
Balfour, Arthur James, 1848-1930
Balfour, Clara Lucas Liddell, 1808-1878
Ballou, Addie Lucia, 1837-1916
Ballou, Adin Augustus, 1833-1852
Ballou, Adin, 1803-1890
Ballou, Daniel
Ballou, Eli, 1808-1883
Ballou, Hosea 2nd, 1796-1861
Ballou, Hosea, 1771-1852
Ballou, Moses, 1811-1879
Bancroft, George, 1800-1891
Baner, Martha H. F.
Baner, William J., 1848-1863
Bangs Gausden, Mary Eunice, 1862-
Bangs Paul, Elizabeth Snow, 1859-
Barlow, Warren Sumner, 1820-1889
Barnard, George L.
Barrett, Harrison Delivan, 1863-1911
Barrett, Joseph Osgood, 1823-1898
Barrett, William Fletcher, 1844-1925
Barron, Henry Danforth, 1833-1882
Barry, Cordelia Benshoter [married to Francis Barry]
Barry, Francis Marion
Barthet, Joseph
Bartlett, William Alvin, 1832-
Barton, Clara, 1821-1912
Baudelaire, Charles Pierre, 1821-1867
Bayley, Weston D.
Beals, Bishop A., 1832-
Bean, Jonathan, 1788-
Bean, Nathan Pierce, 1811-
Beard, George Miller, 1839-1883
Beckwith, George, 1810-1880
Beebe Wilbour, Charlotte M., 1833-1914
Beecher, Catharine Esther, 1800-1878
Beecher, Charles, 1815-1900
Beecher, Henry Ward, 1813-1887
Beecher, Lyman, 1775-1863
Beggs, Thomas, 1808-1896
Beighle, Helen Craib, 1851-
Bell, Luther Vose, 1806-1862
Bellamy, Edward, 1850-1898
Bellows, Henry Whitney, 1814-1882
Belrose, Louis, 1845-1896
Benedict, Daniel D. T. [married to Eliza Ann], ca. 1814-
Benedict, Eliza Ann Sherman, ca. 1815-
Bennett, De Robigne Mortimer, 1818-1882
Bennett, Emerson, 1822-1905
Benning, Thomas Cobb, 1799-1874
Bentham, Jeremy, 1748-1832
Besant, Annie Wood, 1847-1933
Bierce, Ambrose, 1842-ca. 1914
Bingham, Albert
Blackwell, Alice Stone, 1857-1950
Blackwell, Antoinette Louisa Brown, 1825-1894
Blackwell, Henry Browne, 1825-1909
Blair, Lucie Marie Curtis
Blanchard, Calvin, 1808-1868
Blanchard, Edward Litt Laman, 1820-1889
Blanchard, Joshua Pollard, 1782-1868
Bland, Peter E.
Blatch, Harriet Eaton Stanton, 1856-1940
Blavatsky, Helena Petrovna, 1831-1891
Blinn, Henry Clay, 1824-1905
Bliss, Harrison, 1812-1882
Bliss, James Albert
Blood, James Harvey, 1833-1885
Bloomer, Amelia Jenks, 1818-1894
Boirac, Émile, 1851-1917
Booth, Mary H. C., 1831-1865
Boudet, Amélie Gabrielle [married to Allan Kardec], 1795-1883
Bovee, Marvin Henry, 1827-1888
Bowditch, Henry Ingersoll, 1808-1892
Bowditch, Henry Pickering, 1840-1911
Boyle, Augustus French, 1818-
Boynton, Charles Brandon, 1806-1883
Boynton, Warren, 1819-
Brace, Charles Loring, 1826-1890
Brackett, Edward Augustus, 1818-1908
Bradburn, George, 1806-1880
Bradlaugh, Charles, 1833-1891
Branch, Julia
Breed, [Mrs. S. F.] Hathaway, 1836-1885
Bremer, Fredrika, 1801-1865
Brewster, David, 1781-1868
Brigham, Helen ["Nellie"] Juliette Temple, 1853-
Bright, John, 1811-1889
Brisbane, Albert, 1809-1890
Bristol, Cyrenius Chapin, 1811-1884
Brittan, Eliza Lyon [married to Samuel B. Brittan]
Brittan, Samuel Byron, 1815-1883
Britten, Emma Floyd Hardinge, 1823-1899
Britten, William, 1822-1894
Brown, Elbridge Gerry, 1848-1928
Brown, Hannah Frances Morrill, 1816-1879
Brown, Henry Harrison, 1840-1918
Brown, J. Seymour
Brown, John, 1800-1859
Brown, John, Jr. [son of John Brown of Ossawatomie], 1821-
Brown, John, Sr., 1817-1899
Brown, Jonathan, Jr.
Brown, Mrs. Mary F.
Brown, Olympia, 1835-1926
Brown, William Wells, 1815-1884
Browne, Rufus King
Browning, Elizabeth Barrett, 1806-1861
Brownson, Orestes Augustus, 1803-1876
Bruce Kirby, Georgiana, 1818-1887
Bryant, William Cullen, 1794-1878
Buchanan, Joseph Rodes, 1814-1899
Budington, Henry Aaron, 1831-
Buffum, Arnold, 1782-1859
Buffum, Hannah Breed [married to Jonathan Buffum], 1797-1890
Buffum, James Needham, 1807-1887
Buffum, Jonathan, 1793-1880
Buguet, Edouard-Isidore, 1840-
Bullard, Edward Fitch, 1821-
Bullene, Emma Frances Jay
Bulwer-Lytton, Edward George Earle Lytton, 1803-1873
Bundy, John Curtis, 1841-1892
Bungay, George Washington, 1818-1882
Bunyan, John, 1628-1688
Burleigh, Charles Calistus, 1810-1878
Burleigh, George Shepherd, 1821-1903
Burleigh, Gertrude Kimber, 1816-1869
Burleigh, William Henry, 1812-1871
Burnett, Charles Mountford, 1807-1866
Burns, Jabez, 1805-1876
Burr, Charles Chauncey, 1817-1883
Burr, Enoch Fitch, 1818-
Burritt, Elihu, 1810-1879
Burtis, Lewis, 1792-1867
Burtis, Sarah Anthony
Burton, Richard, 1821-1890
Bush Young, Caroline D. Filkins, 1828-
Bush, Abigail Norton, 1810-
Bush, Belle [pseud.]
Bush, George, 1796-1859
Bushnell, Horace, 1802-1876
Butler, Benjamin Franklin, 1818-1893
Butler, Nicholas Murray, 1862-1947
Butler, Samuel, 1835-1902
Butler, Sophronia Spear, 1833-1856
Butts, Bryan J., 1826-

Cagliostro, Alessandro Conte Di [aka Giuseppe Balsamo], 1743-1795
Cahagnet, Louis Alphonse, 1809-1885
Cantagral, Félix François Jean, 1810-1887
Capron, Eliab Wilkinson, 1804-
Carpenter, Albert Emerson, 1840-1915
Carpenter, Mary, 1807-1877
Carpenter, William Benjamin, 1813-1885
Carrington, Hereward, 1880-1959
Cary, Alice, 1820-1871
Cary, Phebe, 1839-1871
Cassell, John, 1817-1865
Cathcart, Charles William, 1809-1888
Cayce, Edgar, 1877-1945
Chaapal, Jay, 1829-1902
Chace, Elizabeth Buffum, 1806-1899
Chamberlain, Anna Eliza Lord, 1842-
Chamberlain, Belle A.
Chambers, Robert, 1802-1871
Champion, Henry B., ca. 1822-
Chandler, Lucinda Banister, 1828-1911
Channing, Walter, 1786-1876
Channing, William Ellery, 1780-1842
Channing, William Francis, 1820-1901
Channing, William Henry, 1810-1884
Chapin, Edwin Hubbell, 1814-1880
Chapman Catt, Carrie Clinton Lane, 1859-1947
Chapman, Maria Weston [married to Henry Grafton Chapman], 1806-1885
Chase, Salmon Portland, 1808-1873
Chase, Warren, 1813-1891
Chavannes, Albert, 1836-1903
Cheever, George Barrell, 1807-1890
Cheney, Ward, 1813-1870
Chevalier, Michel, 1806-1879
Child, Asaph Bemis, 1813-1879
Child, Ellen M. Hancock [married to Henry T. Child], 1832-
Child, Henry Teas, 1816-
Child, Lydia Maria Francis, 1802-1880
Choate, Rufus, 1799-1859
Claflin Cook, Tennessee Celeste, 1845-1923
Clark, Eliza C. [married to Uriah Clark]
Clark, James Gowdy, 1830-1897
Clark, Uriah, 1818-
Clarke, Edward Hammond, 1820-1877
Clarke, James Freeman, 1810-1888
Clay, Cassius Marcellus, 1810-1903
Clay, Henry, 1777-1852
Clay, James Arrington, 1814-
Clemens, Samuel Langhorne [pseud. Mark Twain], 1835-1910
Cleveland, Charles Dexter, 1802-1869
Clisby, Harriett, 1830-
Close, Francis, 1797-1882
Clymer, Reuben Swinburne, 1878-
Cobb, Sylvanus, 1798-1866
Cobden, Richard, 1804-1865
Coffin, Levi, 1798-1877
Coggeshall, William Turner, 1824-1867
Colby, Luther, 1814-1894
Colchester, Charles J., 1840-1867
Coleman, Benjamin
Coleman, William Emmette, 1843-
Coles, John F.
Collins, John Anderson, 1810-1890
Collyer, Robert Hanham
Collyer, Robert, 1823-1912
Colman, Lucy Newhall Danforth, 1817-1906
Colville, William Juvenal, 1862-1917
Combe, George, 1788-1858
Comstock, Andrew, 1795-1864
Comstock, Anthony, 1844-1915
Comstock, William Charles, 1847-1924
Comte, Auguste, 1798-1857
Conant, Frances [Fannie] Ann Crowell [Mrs. John H.], 1831-1870
Conklin, John Benjamin, 1820-1870
Considérant, Victor Prosper, 1808-1893
Conway, Moncure Daniel, 1832-1907
Cook, Florence, 1856-1904
Coonley Ward, Lydia Arms Avery, 1845-1924
Coonley, Levi K.
Cooper, James Fenimore, 1789-1851
Cooper, Margaretta E. Sunderland [daughter of La Roy Sunderland], 1829-1898
Cooper, Robert, 1844-1903
Corson, Hiram, 1828-1911
Cotton, Thomas H. B.
Coues, Elliot, 1842-1899
Coues, Samuel Elliott, 1797-1867
Courtney, Wilshire S.
Cowles, Alpheus
Cowles, Betsey Mix, 1810-1876
Cowper, Lady [aka Emily Mary Lamb Temple Palmerston], 1787-1869
Cragin, Charles Hartwell, 1817-1887
Craig Knox, Isa, 1831-1903
Cridge, Alfred ["Fred"] Denton [son of Alfred and Annie Cridge], ca. 1860-
Cridge, Alfred, 1824-1902
Cridge, Annie Denton [sister of William Denton], 1825-1875
Crittenden, Newton E., 1804-1873
Crookes, William, 1832-1919
Crosland, Camilla Dufour Toulmin [married to Newton Crosland], 1812-1895
Crosland, Newton, ca. 1819-1899
Crowe, Catherine Stevens, ca. 1800-1876
Crowell, Eugene, 1817-1894
Crumbaugh, Elizabeth Jane Wiley, 1840-1906
Crumbaugh, James Thomas, 1832-1905
Culver [aka Colver], Nathaniel, 1794-1870
Culver, Erastus Dean, ca. 1802-1889
Currier, Mrs. Augusta A.
Curtis Lyman Lord, 1822-1888
Curtis, George William, 1824-1892
Cutting, Henry Partridge, 1823-

DEsperance, Elizabeth, 1849-1918
Dall, Caroline Wells Healey, 1822-1912
Dana, Charles Anderson, 1819-1897
Dana, Richard Henry, Jr., 1815-1882
Daniels, Cora Linn Morrison, 1852-
Danskin, Sarah A. Ridgeway [married to Washington Danskin]
Danskin, Washington A.,
Darwin, Charles, 1809-1882
Davenport, Ira Erastus, 1839-1911
Davenport, William Henry, 1841-1877
Davies, Charles Maurice, 1828-1910
Davis, Andrew Jackson, 1826-1910
Davis, Catherine H. ("Silona") DeWolf Dodge [married to A. J. Davis], 1806-1853
Davis, Delphine ("Della") Elizabeth Markham Youngs Dake Davis [married to A. J. Davis], 1839-1928
Davis, Fanny
Davis, Ira Benjamin, 1838-
Davis, Mary Fenn Robinson Love [married to A. J. Davis], 1824-1886
Davis, Minnie S., 1835-
Davis, Paulina Kellogg Wright, 1813-1876
Davis, Richard David, 1799-1871
Day, Horace H., 1813-1878
Day, John Warren, 1838-1900
De Benneville, George, 1703-1793
De Cleyre, Voltairine, 1866-1912
De Force Gordon, Laura, 1838-1907
De Laurence, Lauron William, 1868-
De Morgan, Augustus, 1806-1871
De Tocqueville, Alexis Charles Henry Maurice Cléral, 1805-1859
De Vere, Clair R.
Dean, Clarke, 1806-
Debs, Eugene Victor, 1855-1926
DeGarmo, Elias, 1788-1876
DeGarmo, Rhoda Rogers [married to Elias De Garmo], 1803-
Delavan, Edward Cornelius, 1793-1871
Deleon, Daniel, 1852-1914
Dennett, Lydia S. Neal [married to Oliver Dennett]
Dennett, Oliver, 1799-1851
Densmore, David C., 1813-1881
Denton, Elizabeth M. Foote [m. to William Denton; sister of Edward Bliss Foote]
Denton, William, 1823-1883
Deslandes, Léopold, 1797-1852
Dexter, George T.
Dickinson, Anna Elizabeth, 1842-1932
Dille, Israel, 1802-1873
Dix, Dorothea Lynde, 1802-1887
Dodge, Mary Mapes, 1838-1905
Dods, Amelia Jane ["Jennie"] [daughter of John Bovee Dods]
Dods, John Bovee, 1795-1872
Dohoney, Ebenezer Lafayette, 1832-1919
Doten, Elizabeth ["Lizzie"], 1827-1913
Doubleday, Abner, 1819-1893
Douglass, Frederick, 1817-1895
Douglass, Sarah Mapps, 1806-1882
Dow, Lorenzo, 1777-1834
Dow, Neal, 1804-1897
Dowd, Freeman Benjamin, 1812-
Doyle, Arthur Conan, 1859-1930
Draper, Anna Thwing, 1814-1870
Draper, Ebenezer Daggott, 1813-1887
Dresser, Horace, 1803-1877
Dresser, Horatio Willis, 1857-
Driggs, Seth
Du Bois, William Edward Burghardt, 1868-1963
Du Potet de Sennevoy, Jules, 1796-1881
Duganne, Augustine Joseph Hickey, 1823-1884
Dugdale, Joseph Anesley, 1800-1896
Dugdale, Ruth Townsend [married to Joseph Dugdale], 1802-
Duguid, David, 1832-1907
Dumas, Alexandre, 1802-1870
Duniway, Abigail Scott, 1834-1915
Dwight, John Sullivan, 1813-1893
Dwight, Louis, 1793-1854
Dyott, Mary Jane Grime [married to Michael Dyott], 1824-
Dyott, Michael B.

Earle, William, 1850-1902
Eddy, Caleb, 1784-1859
Eddy, Eliza Jackson [daughter of Francis Jackson]
Eddy, Horatio G. [son of Julia Eddy], ca. 1842-1922
Eddy, Ira B., 1807-
Eddy, Julia Ann Macombs, 1812-1872
Eddy, Maranda D. [daughter of Julia Eddy], ca. 1836-1871
Eddy, Mary Baker Glover Patterson, 1821-1910
Eddy, William H. [son of Julia Eddy], ca. 1838-ca. 1923
Edger, Henry, 1820-1888
Edmonds, John Worth, 1799-1874
Edmonds, Laura [daughter of John W. Edmonds]
Edmunds, Alvah C.
Eglinton, William, 1857-
Elkins, Hervey
Elliotson, John, 1791-1868
Ellis, Havelock, 1859-1939
Ellis, John
Elmer, Rufus, ca. 1807-
Emerson, Ralph Waldo, 1803-1882
Engels, Friedrich, 1820-1895
Espy, James Pollard, 1785-1860
Estlin, John Bishop, 1785-1855
Etzler, John Adolphus
Eva C. [aka Marthe Béraud], 1890-1943
Evans, Frederick William, 1808-1893
Everett, Edward, 1794-1865
Everett, Linus Smith, 1795-1870
Ewbank, Thomas, 1792-1870
Ewing, Thomas Maskell, 1830-1909

Fahnestock, William B., 1804-
Fairfield, Horace Porter, ca. 1831-1891
Faraday, Michael, 1791-1867
Farnham, Eliza Woodson Burhans, 1815-1864
Farnsworth, Joseph Burrage
Farnsworth, Lorenzo L.
Farnsworth, Parker Elisha, 1818-
Fawcett, Henry Augustus, 1791-
Fay, Annie Eva
Fay, Bertha Meisch Flinn [Mrs. Heman B. Fay]
Fenno, Augustus W.
Fenton, Horace, 1804-
Ferguson Harrison, Virginia C. [daughter of Jesse B. Ferguson], ca. 1842-
Ferguson, Jesse Babcock, 1819-1870
Ferguson, Lucinda Vance Mark [married to Jesse B. Ferguson], 1820-1886
Fernald, Woodbury Melcher, 1813-1875
Findlay, James Arthur, 1883-1964
Finney, Charles Grandison, 1792-1875
Finney, Selden J., 1795-
Fish, J. G.
Fish, Sarah D.
Fish, William Henry, 1812-
Fishback, Alexis J.
Fishbough, William, 1814-1881
Flammarion, Nicolas Camille, 1842-1925
Flanders, George Truesdell, 1820-1897
Flournoy, Théodore, 1854-1920
Follen, Charles Theodore Christian, 1796-1840
Follen, Eliza Lee Cabot [married to Charles Follen], 1786-1860
Folsom, Abigail H., 1792-1867
Foote, Edward Bliss, 1829-1906
Foote, Edward Bond [E. B., Jr.], 1854-1906
Forster, Thomas Gales, 1816-1886
Forten, Charlotte L., 1837-1914
Forten, James, Sr., 1766-1842
Foss, Andrew Twombly, 1803-
Foster, Abigail ["Abby"] Kelley [married to Stephen S. Foster], 1810-1887
Foster, Charles Henry, 1833-1885
Foster, Stephen Symonds, 1809-1881
Fourier, François Marie Charles, 1772-1837
Fowler Ormsbee Breakspear, Almira L. [sister of Samuel and Edward Fowler]
Fowler, Edward Payson, 1833-1914
Fowler, Horace N. [son of Samuel T. Fowler], 1848-
Fowler, Lorenzo Niles, 1811-1896
Fowler, Lydia Folger Nora [married to Lorenzo Fowler], 1823-1879
Fowler, Orson Squire [brother of Lorenzo N. Fowler], 1809-1887
Fowler, Samuel Theron [nephew of Orson and Lorenzo Fowler], 1821-1883
Fowler, Susan Pecker, 1823-
Fox Fish Brown Underhill, Ann Leah, 1814-1890
Fox Jencken, Catherine ["Katie"], 1839-1892
Fox Kane, Margaretta ["Maggie"], 1836-1893
Fox, Dorus Morton, 1817-1901
Foye, Ada Lenora Hoyt Coan, ca. 1833-
Frémont, John Charles, 1813-1890
French, Almon Bruce, 1838-
French, Elizabeth J.
French, Mary Louise
Frothingham, Octavius Brooks, 1822-1895
Fry, Elizabeth Gurney, 1780-1845
Fuller Ossoli, Sarah Margaret, 1810-1850
Furness, William Henry, 1802-1896

Gage, Frances Dana Barker, 1808-1884
Gage, George Washington
Gage, John Portius
Gage, Joseph D.
Gage, Matilda E. Joslyn, 1826-1898
Gage, Portia [married to John P. Gage]
Galton, Francis, 1822-1911
Gano, Daniel, 1794-1873
Gano, Rebecca Hunt Lawrence [married to Daniel Gano], 1796-1873
Gardner, Henry Francis, 1812-1878
Garibaldi, Giuseppe, 1807-1882
Garland, Hamlin, 1860-1940
Garnet, Henry Highland, 1815-1882
Garrison, William Lloyd, 1805-1879
Gay, Phineas Ellis
Gay, Sidney Howard, 1814-1888
Gay, Susan Elizabeth
George, Henry, 1827-1897
Gibson, Ella Elvira, 1821-1901
Giddings, Joshua Reed, 1795-1864
Giles, Alfred Ellenwood, 1820-
Gilman, Charlotte Perkins Stetson, 1860-1935
Gladstone, William Ewart, 1809-1898
Godbe Kirby, Charlotte Ives Cobb [married to William Godbe]
Godbe, William Samuel, 1833-1902
Goddard, Daniel F., 1827-
Godwin, Parke, 1816-1904
Goldman, Emma, 1869-1940
Gompers, Samuel, 1850-1924
Goodell, William, 1792-1878
Gordon, Henry Clay, 1835-
Gordon, William Robert, 1811-1897
Gough, John Bartholomew, 1817-1886
Goulard, Madame Adolphe [pseud. Mme. Dorval]
Graham, Andrew Jackson, 1830-1894
Graham, Sylvester, 1794-1851
Grant, Julia Dent [married to U. S. Grant], 1826-1902
Grant, Ulysses Simpson, 1822-1885
Graves, Kersey, 1813-1883
Gray, John Franklin, 1804-1879
Greaves, James P.
Greeley, Horace, 1811-1872
Green, Beriah, 1795-1874
Green, Frances Harriet Whipple, 1805-1878
Greene Butts, Harriet Newell, 1819-1881
Greenwood, Grace [pseud.], [aka Sara Jane Clarke Lippincott], 1823-1904
Griffing, Josephine Sophie White, 1814-1872
Grimes, Caroline A., ca. 1828-
Grimes, James Stanley, 1807-1903
Grimké Weld, Angelina Emily, 1805-1879
Grimké, Sarah Moore, 1792-1873
Griswold, Rufus Wilmot, 1815-1857
Güldenstubbé, Louis, Baron de, 1822-
Gulley, James, M., -1903
Guppy, Agnes Elisabeth Nichol [married to Samuel Guppy]
Guppy, Samuel
Gurdjieff, Georges Ivanovitch, 1872-1949
Gurney, Edmund, 1847-1888
Guthrie, Thomas, 1803-1873

Hahnemann, Samuel, 1755-1843
Hall, Samuel Carter, 1800-1889
Hall, Spencer Timothy, 1812-1885
Hall, Thomas Bartlett
Hallock, Robert Titus, 1806-1879
Hallowell Willis, Sarah Kirby, ca. 1820-
Hammond, Charles, ca. 1805-1859
Hammond, Sybil [married to Charles Hammond]
Hardinge Britten, Emma Floyd [married to William Britten], 1823-1899
Hare, Robert, 1781-1858
Harman Walker OBrien, Lillian Susan [daughter of Moses Harman], ca. 1870-
Harman, Moses, 1830-1911
Harper, Ida A. Husted, 1851-1931
Harris, Thomas Lake, 1823-1906
Harter, Jacob Henry, 1820-1883
Hartmann, Franz, 1838-1912
Haskell, George, -1876
Hatch, Benjamin Franklin [married to Cora L. V. Scott], ca. 1803-
Hatch, Chester Payne, 1814-
Havington, Alonzo LeBaron
Hawkins, John Henry Willis, 1797-1858
Hawthorne, Nathaniel, 1804-1864
Hayden, Lewis, ca. 1815-1889
Hayden, Maria B. Trenholm [married to William R. Hayden], 1826-1883
Hayden, William Benjamin, 1816-1893
Haywood, William Dudley, 1869-1928
Hazard, Thomas Robinson, 1797-1886
Hebard, Charles Wesley, 1821-1895
Hendee-Rogers, Mary Jane Upham
Henslow, George, 1835-1925
Hewitt Fowler, Delight R. Peck [married to Simon C. Hewitt], 1823-
Hewitt, Simon Crosby, 1816-
Heywood, Abigail ["Abbie"] Sayles Ballou [daughter of Adin Ballou], 1829-
Heywood, Angela Fiducia Tilton [married to Ezra Heywood], 1840-1935
Heywood, Ezra Hervey, 1829-1893
Heywood, William Sweetzer [married to Abbie Ballou], 1824-1905
Hibbard, John Randolph, ca. 1815-
Hicks, Elias, 1748-1830
Higginson, Thomas Wentworth, 1823-1911
Hinckley, Thacher, 1810-
Hine, Lucius Alonzo, -1906
Hinshaw, Seth, 1818-1906
Hitchcock, Edward, 1793-1864
Hitchcock, Ethan Allen, 1798-1870
Hitchcock, Ira Irvine, 1793-1868
Hitchcock, Ira Spaulding, 1804-
Hobbs, Benjamin Scovil
Hodgson, Richard, 1855-1905
Hoëne-Wronski, Joseph Maria, 1776-1853
Hoisington, Rachel
Hoisington, William H. W.
Holbrook, Josiah, 1788-1854
Holcombe, Amasa, 1785-1875
Holley, Myron, 1779-1841
Holley, Sallie, 1818-1893
Holmes, Nelson
Holmes, Oliver Wendell, 1809-1894
Holt, Henry, 1840-1926
Home [aka Hume], Daniel Dunglas, 1833-1886
Hooker, Isabella Beecher, 1822-1907
Hooper, Edward James, 1803-
Hopper, Isaac Tatem, 1771-1852
Horton, Sarah A.
Hough, Lewis Sylvester, 1819-
Houghton, Georgiana, 1814-1884
Houston, Emeline, 1811-
Houts, Margaret Jane, 1838-
Hovey, Charles Fox, 1807-1859
Howard, John, 1726-1790
Howe, Elias, 1819-1867
Howe, Julia Ward, 1819-1910
Howe, Lyman Camp, 1806-ca. 1878
Howe, Samuel Gridley, 1801-1876
Howells, William Dean, 1837-1920
Howitt, Godfrey, 1800-1873
Howitt, Mary Botham [married to William Howitt], 1799-1888
Howitt, William, 1792-1879
Hudson, Frederick Augustus, 1818-
Hudson, Henry James, 1821-
Hudson, Thomas Jay, 1834-1903
Hugo, Victor, 1802-1885
Hulett Krekel, Mattie H., 1840-
Hulett, Alta Q.
Hull, Daniel W.
Hull, Elvira
Hull, Martha ["Mattie"] E. Browne Sawyer, 1842- [married to Moses Hull]
Hull, Moses, 1835-1906
Hunt, Harriot Kezia, 1805-1875
Huntley, Mrs. Hattie
Hurst, Lulu, 1869-
Hutchinson Patton, Abigail Jemima, 1829-1892
Hutchinson, Jesse, Jr., 1813-1853
Hutchinson, Judson Joseph, 1817-1859
Hutchinson, Laura Wright [married to Caleb Hutchinson], 1816-
Hutchinson, Luna
Hyer, Frances E., -1889
Hyer, Nathaniel F. [married to Frances Hyer]
Hyslop, James Hervey, 1854-1920
Hyzer, Mrs. Frances O.

Ingalls, Joshua King, 1816-1898
Ingersoll, Robert Green, 1833-1899
Irish, Sarah Jane, 1832-
Isham, Charles Edmund, 1819-1903

Jackson, Francis, 1789-1861
Jackson, James Caleb, 1811-1895
Jackson, Rebecca Cox, 1795-1871
James, Henry, 1811-1882
James, Thomas, 1804-1891
James, William, 1797-1868
James, William, 1842-1910
Jamieson, William F., 1837-
Jennings, Hargrave, 1817-1890
Jewett, Milo Parker, 1808-1882
Johnson, Cave, 1793-1866
Johnson, Nathan, -ca. 1880
Johnson, Oliver, 1809-1889
Johnson, William Melanchthon, 1834-1910
Jones, Amanda Theodosia, 1835-1914
Jones, Jane Elizabeth Hitchcock, 1813-1896
Jones, Stephens Sanborn, 1813-1877
Judah, Hagar I.
Judge, William Quan, 1851-1896
Judson, Abby Ann, 1835-1902

Kane, Elisha Kent, 1820-1857
Kardec, Allan [pseud.] [aka Hippolyte Léon Denizard Rivail], 1804-1869
Kase, Simon Peter
Keely, John Ernest Worrell, 1827-1898
Keizer, Elizabeth ["Lizzie"]
Kellner, Karl, 1850-1905
Kellogg, John Harvey, 1852-1943
Kemble Butler, Frances ["Fanny"] Ann, 1809-1893
Kenney, Eliza Jerusha, 1812-
Kent, Austin, ca. 1810-
Kerner, Justinus Andreas Christian, 1786-1862
Kiddle, Henry, 1824-1891
Kilgore, Caroline Sylvester Burnham, 1838-1909
Kilgore, Damon Young, 1827-1888
King, Maria M.
King, Thomas Starr, 1824-1864
Kingsbury, Benjamin, Jr., 1813-1886
Kingsbury, Elizabeth Annie
Kinney, John Fitch, 1816-1902
Kirke, Edmund [pseud.] [aka James Roberts Gilmore], 1822-1903
Kirkup, Seymour Stocker, 1788-1880
Kneeland, Abner, 1774-1844
Knowlton, Charles, 1800-1850
Koons, Jonathan, 1811-
Kossuth, Louis [aka Lajos], 1802-1894
Kropotkin, Peter, 1842-1921

Ladd, William, 1748-1841
Lambdin, William H.
Lamson, Silas, 1778-1855
Landis, Charles Kline, 1835-1900
Lane, Lunsford, 1803-ca. 1863
Lanning, Joshua Furman, 1814-
Larrabee, Charles Hathaway, 1820-1883
Latham, Mrs. A. C.
Lathrop, George Abbott, 1822-
Laurie, Cranstoun
Lazarus, Marx Edgeworth, 1822-1896
Leadbeater, Charles Webster, 1847-1934
Leavitt, Joshua, 1794-1873
Lee, Ann, 1736-1784
Lee, Jarena, 1783-
Leeds, Mrs. Helen
Lees, Thomas, 1832-
Levi, Eliphas, 1810-1875
Lewis, Caroline Samantha Ensign, 1818-1879
Lewis, Dioclesian, 1823-1886
Lewis, Gleason Filmore [married to Caroline Lewis], 1822-1903
Lewis, Sinclair, 1885-1951
Leymarie, Pierre-Gaètan, 1827-1901
Lincoln, Abraham, 1809-1865
Lincoln, Mary Todd [married to Abraham Lincoln], 1818-1882
Linton, Charles
Litchfield, Beals Ensin, 1823-
Livermore, Mary Ashton Rice, 1820-1905
Lloyd, Henry Demerest, 1847-1903
Lloyd, John William, 1857-
Lockwood, Belva Ann Bennett McNall, 1830-1917
Lodge, Oliver Joseph, 1851-1940
Logan, Frances Armatt, -1898
Lombroso, Cesare, 1835-1909
Longfellow, Henry Wadsworth, 1807-1882
Longfellow, Samuel, 1819-1892
Longley, Chalmers Payson
Loring, Ellis Gray, 1803-1858
Louden, Elmer, 1807-
Love, Alfred Harry, 1830-1913
Love, Samuel Gurley [married to Mary Fenn Robinson], 1821-1893
Lovejoy, Elijah Parish, 1802-1837
Lovejoy, Owen Reed, 1811-1864
Loveland, James Stevens, 1818-
Lowell, James Russell, 1819-1891
Ludlow, Fitz Hugh, 1836-1870
Lum, Dyer Daniel, 1840-1893
Lyman, Darius, 1821-1892
Lynn, Cephas B., 1849-
Lyon, Silas Smith

Maccall, William, 1812-1888
Mackdougall Gregory, Mrs.
Mackenzie, Kenneth Robert Henderson, 1833-1886
Magoun, Sarah Adams, 1843-
Mahan, Asa, 1799-1889
Main, Charles, 1815-
Malthus, Thomas Robert, 1766-1834
Mandell, David J., 1813-1884
Mann, Horace, 1796-1859
Mansfield, Edward Deering, 1801-1880
Mansfield, James V.
Mapes, Isaiah Vail, 1805-
Mapes, James Jay, 1806-1866
Marble, Edwin [son of Hiram Marble], 1831-1880
Marble, Hiram Shepcott, 1811-1891
Marble, Hiram, 1803-1868
Margery [aka Mina Stinson Crandon; m. to Le Roi Goddard Crandon], 1887-1941
Marryat Church Lean, Florence, 1837-1899
Marsh, Bela, 1797-1869
Marsh, Luther Rawson, 1813-1902
Martineau, Harriet, 1802-1876
Martineau, James [brother of Harriet Martineau], 1805-1900
Marvin, Frederic Rowland, 1847-1918
Marx, Karl, 1818-1883
Maskelyne, John Nevil, 1839-1917
Massey, Gerald, 1828-1907
Mattison, Hiram, 1811-1868
Maurice, Frederick Denison, 1805-1872
May, Samuel Joseph, 1797-1871
Mayhew, John
Maynard, Averil C.
Maynard, Henrietta ["Nettie"] Sturdevant Colburn, 1841-1892
Mayo, Amory Dwight, 1823-1907
Mazzini, Giuseppe, 1805-1872
McCabe, Joseph, 1867-1955
McClintock, Mary Ann Wilson, 1800-1884
McClintock, Thomas [married to Mary Ann McClintock], 1792-1876
McDougall, Frances Harriet Whipple Greene, 1805-1878
McFarland, Samuel Gamble, 1830-1897
McKellips, David C., 1806-1873
McRae, Colin John, 1812-1877
Mendum, Josiah Paine, 1811-1891
Mesmer, Franz Antoine, 1766-1815
Metternich, Clemens Lothar Wenzel Furst Von, 1773-1859
Mettler, Catherine [daughter of Semantha Mettler]
Mettler, Semantha Beers [married to Johnson R. Mettler], 1818-
Meyers, Frederic William Henry, 1843-1901
Mill, John Stuart, 1806-1873
Miller, George Noyes, 1845-1904
Miller, Leo
Miller, William, 1782-1849
Mills, Charles De Berard, 1821-1900
Milner-Gibson Lavy-Charré, Annie Dixon Stocken
Miltenberger, Anthony
Miner, Alonzo Ames, 1855-1939
Moody, Loring, 1818-1884
Morris, Thomas
Morse, James Johnson, 1848-1919
Morse, Samuel Finley Breese, 1791-1872
Morton, Albert, 1832-
Moses, Schuyler, 1798-1889
Moses, William Stainton, 1840-1892
Mott, James [married to Lucretia Mott], 1788-1868
Mott, Lucretia Coffin, 1793-1880
Mumler, Hannah Frances Green Turner [married to William Mumler], 1832-1912
Mumler, William Howard, 1832-1884
Munn, Angeline [sister of Apollos Munn], 1817-
Munn, Apollos, 1816-
Munson Webber, Marietta
Murchison, Roderick Impey, 1792-1871
Murray, John, 1741-1815
Murray, Orson S., 1806-1885

Napier, Charles
Nation, Carry Amelia, 1846-1911
Neal, James, 1793-1876
Nell, William Cooper, 1816-1874
Newbrough, John Ballou, 1828-1891
Newcomer, John
Newton, Alonzo Eliot, 1821-1889
Newton, James Rogers, 1810-1879
Newton, Sarah Jane Emery [married to Alonzo E. Newton], 1820-1893
Nichols, Clarinda Irene Howard, 1810-1885
Nichols, Mary Sergeant Neal Gove [married to Thomas L. Nichols], 1810-1884
Nichols, Thomas Low, 1815-1901
Nicholson, Valentine, 1809-1904
Nightingale, Florence, 1820-1910
Noyes, George Freeman, 1824-1868
Noyes, John Humphrey, 1811-1886

OConnell, Daniel, 1775-1847
OSullivan, John Louis, 1813-1895
Olcott, James S.
Olcott, Henry Steel, 1832-1907
Oliphant, Laurence, 1829-1888
Olmstead, Frederick Law, 1822-1903
Orton, Jason Rockwood, 1806-1867
Orvis, John, 1816-1897
Orvis, Marianne Dwight [dau. of Theodore Dwight; m. to John Orvis], 1816-1901
Osgood, Frances Sargent Locke, 1813-1850
Osgood, Hiram P.
Ouspensky [aka Uspenskii], Petr Demianovich, 1878-1947
Overton, Charles Morse, 1824-
Owen, David Dale [son of Robert Owen], 1807-1860
Owen, Richard [son of Robert Owen], 1810-1890
Owen, Robert Dale [son of Robert Owen], 1801-1877
Owen, Robert, 1771-1858

Paine, Seth
Palgrave, William Gifford, 1826-1888
Palladino, Eusapia, 1854-1918
Palmer, Phoebe Worrell, 1807-1874
Pancoast, Seth, 1823-1889
Pardee, Theodore Levi Judd, 1804-
Parkehurst, Henry Martyn, 1825-1908
Parker, Joseph
Parker, Theodore, 1810-1860
Parks, H. Luther, 1823-1886
Partridge, Charles
Payne, Mahala Garner Green, 1823-1885
Payson Willis, Sarah E.
Peabody, Elizabeth Palmer, 1804-1894
Pease Fox, Nettie M.
Pease Nichol, Elizabeth, 1807-1897
Peebles, James Martin, 1822-1922
Pennington, James W. C., 1807-1870
Perkins Stetson Gilman, Charlotte Anna, 1860-1935
Perkins, Selah G., 1795-1862
Perot, Rebecca [aka Rebecca Jackson]
Pestalozzi, Johann Heinrich, 1746-1827
Pettis, Olive G., -1884
Phelps Ward, Elizabeth Stuart, 1844-1911
Phillips, Wendell, 1811-1884
Pierpont, John, 1785-1866
Pike, Albert, 1809-1891
Pike, William C.
Pike, William Spillard, 1831-
Pilkington, John Blakey, 1834-
Pillsbury, Parker, 1809-1898
Pinkham, Lydia Estes, 1819-1883
Piper, Leonore Evelina Simonds, 1859-1950
Pitman, Frederick, 1828-1886
Pitman, Isaac, 1813-1897
Platt, Jane Sherman [married to Lorin L. Platt]
Platt, Lorin L.
Plimpton, Florus Beardsley, 1830-1886
Plumb, Charles Mason, 1816-
Podmore, Frank, 1856-1910
Post, Amy Kirby [married to Isaac Post], 1802-1889
Post, Isaac, 1798-1872
Poston, Elias Cheshire, 1804-1876
Potts, Anna M. Longshore, 1829-
Powderly, Terence Vincent, 1849-1924
Powell, Aaron Macy, 1832-1899
Powell, William Byrd, 1799-1866
Powers, Hiram, 1805-1873
Poyen Saint-Sauveur, Charles
Pratt, Morris, 1820-1902
Prescott Spofford, Harriet Elizabeth, 1835-1921
Prescott, James S., 1803-
Price, Abigail Foote, 1806-
Prince, John
Proudhon, Pierre-Joseph, 1809-1865
Purvis, Robert, Jr., 1810-1898
Putnam, Allen J., 1802-1887

Quimby, Phineas Parkhurst, 1802-1866
Quincy, Edmund, 1808-1877

Raines, George W.
Ramsdell, Sarah A.
Rand, Luke Prescott, 1816-
Randall, Edward Caleb, 1860-1935
Randall, Henry Stephens, 1811-1876
Randall, Marenda Bigelow, 1799-
Randolph, Paschal Beverly, 1825-1874
Rantoul, Robert, 1778-1858
Rantoul, Robert, Jr., 1805-1852
Rasputin [aka Gregori Efimovich], 1872-1916
Rawson, Albert Leighton, 1829-1902
Ray, Isaiah Coffin, 1804-
Reason, Charles Lewis, 18181-1898
Redfield, James Wilcox, 1789-1855
Redman, George A., 1835-
Redpath, James, 1833-1891
Reed, Thomas Allen, 1826-1899
Rehn, Abigail Francis Zelley [married to Isaac Rehn]
Rehn, Isaac A., 1815-1883
Reichenbach, Karl von, 1788-1869
Remond, Charles Lenox, 1810-1873
Restelle, Madame [aka Ann Trow Lohman], 1812-1878
Rhine, Joseph Banks, 1895-1980
Rhys Davids, Caroline Augusta Foley, 1857-1942
Rice, William Edwards, 1828-
Richard, Henry, 1812-1888
Richards, Lysander Salmon, 1835-
Richmond, Almon Benson, 1825-1906
Richmond, Cora Linn Victoria Scott Hatch Tappan Daniels, 1840-1923
Richmond, Cora Lodencia Veronica Scott Hatch Tappan Daniels, 1840-1923
Richmond, Helen D.
Richmond, Thomas, 1796-
Rimbaud, Arthur, 1854-1891
Ripley, George, 1802-1880
Ripley, Sophia Willard Dana, 1803-1861
Roberts, Jonathan Manning, 1821-1888
Robinson, Amasa C., 1828-
Robinson, Horatio Nelson, 1806-1867
Robinson, John Hovey, 1825-
Robinson, Rachel Gilpin, 1799-1862
Robinson, Rowland Thomas, 1796-1879
Robinson, Solon, 1803-1880
Rodman, Benjamin [brother of Samuel Rodman, Jr.], 1794-1876
Rodman, Samuel, Jr., 1792-1876
Rogers, Edward Coit, 1826-1860
Rogers, John S.
Rogers, Nathaniel Peabody, 1794-1846
Rose, Ernestine Louise Sismondi Potowski, 1810-1892
Ruggles, David, 1810-1849
Rush, Benjamin, 1746-1813
Ruskin, John, 1819-1900
Rye, Maria Susan, 1829-1903

Saint-Simon, Claude-Henri, 1760-1825
Samson, George Whitefield, 1819-1896
Sanborn, Franklin Benjamin, 1831-1917
Sanger, Margaret, 1883-1966
Sangster, Margaret Elizabeth Munson, 1838-1912
Sargent, Epes, 1813-1880
Sartain, John, 1808-1897
Savage, Minot Judson, 1841-1918
Sawyer, Caroline Mehetabel, 1812-1894
Saxon, Elizabeth Lyle, 1832-1915
Schindler, Mary Dana
Schlesinger, Julia
Schlesinger, Louis [married to Julia Schlesinger], 1832-1921
Schrenck-Notzing, Albert Philibert Franz, 1862-1929
Schufeldt, George A.
Schurz, Carl, 1829-1906
Scott, James
Scougall, Isabella, 1859-
Seaver, Horace, 1810-1889
Seaver, Jay Webber
Severance, A. B.
Severance, Caroline Maria Seymour, 1820-1914
Severance, Juliet H. Worth Stillman, 1833-
Severance, Sarah M., 1835-ca. 1929
Sewall, Mary Eliza Wright, 1797-1884
Sewell, Samuel Edmund, 1799-1888
Shaftsbury, Edmund, 1852-1926
Shaw, Anna Howard, 1847-1919
Shehane, Charles Francis Rollin, 1803-1857
Sheldon, Thaddeus Spencer, 1818-1868
Shelhamer Longley, Mary Theresa [married to C. Payton Longley], 1853-
Shew, Joel, 1816-1855
Shillaber, Benjamin Penhallow, 1814-1890
Shindler, Mary Stanley Bunce Palmer Dana, 1810-1883
Shorter, Thomas, 1823-1899
Sidgewick, Henry, 1838-1900
Sidgwick, Eleanor Mildred Balfour, 1845-1936
Sigourney, Lydia Howard Huntley, 1791-1865
Silliman, Benjamin, 1779-1864
Silliman, Benjamin, Jr., 1816-1885
Simmons, Austin E., 1827-1909
Simmons, James Fowler, 1795-1864
Simms, William Gilmore, 1806-1870
Sinclair, Catherine, 1800-1864
Sinnett, Alfred Percy, 1840-1921
Sizer, Nelson, 1812-1897
Slade, Harvey
Slade, Henry, 1835-1905
Slater, John
Slenker, Elizabeth ["Elmina"] Drake, 1827-1908
Smith Kendrick, Laura A. McAlpine Cuppy
Smith Miller, Elizabeth, 1822-1911
Smith, Alfred Holland, 1869-1924
Smith, Elizabeth Oakes Prince, 1806-1893
Smith, Gerrit, 1797-1874
Smith, Gibson
Smith, Henry, 1815-
Smith, Jerome Van Crowningshield, 1800-1879
Smith, Joseph, 1805-1844
Smith, Julia Ann Norcross Crafts, 1830-
Smith, Thomas Jefferson, -1856
Smolnikar, Andrew Bernard [aka Andreas Bernardus], 1795-
Snow, Herman, 1812-1905
Soule, Caroline Augusta White, 1824-1903
Spear, Caroline Hinckley [married to John M. Spear], 1829-
Spear, Catherine Swan Brown [married to Charles Spear], 1814-1903
Spear, Charles, 1803-1863
Spear, John Murray, 1804-1887
Spence, Amanda Marble Westbrook Kimbell Britt [m. to Payton Spence]
Spence, Payton
Spencer, Herbert, 1820-1903
Spettigue, John
Spooner, Lysander, 1808-1887
Sprague, Achsa White, 1827-1862
Spurgin, John, 1798-1866
Spurzheim, Johann Gaspar, 1776-1832
St. John, John Pierce, 1833-1916
Stanton, Elizabeth Cady, 1815-1902
Staples, Carleton Albert, 1827-1904
Starr, N. B., -1880
Stead, William Thomas, 1849-1912
Stearns, George
Stearns, George Luther, 1809-1869
Stebbins, Catherine Ann Fish
Stebbins, Giles Badger, 1817-1900
Steiner, Rudolf, 1861-1925
Stephen, George Milner, 1812-1894
Sterling, John Montgomery, 1801-1880
Stetson, Caleb, 1793-1870
Stevens, E. Winchester, ca. 1822-1885
Stevenson, Robert Louis, 1850-1894
Stewart, Philemon, 1804-1875
Stifel, George Elias [son of John L. Stifel], 1849-
Stifel, John Louis, 1807-1881
Stiles, Joseph Clay, 1795-1875
Stockham, Alice Bunker, 1833-1912
Stone, Lucy, 1818-1893
Storer, Heman B.
Storrs, Richard Salter, Jr., 1821-1900
Stowe, Clora Murdock
Stowe, Harriet Beecher, 1811-1896
Streeter, Russell, 1791-1880
Strickland Miller, Martha ["Mattie"], 1853-
Strutt, Robert John [aka Lord Rayleigh], 1842-1919
Sumner, Charles, 1811-1874
Sunderland, LaRoy, 1803-1885
Sutliff, Oliver Levi, 1819-
Swain, Mary P.
Swedenborg, Emanuel, 1688-1772
Sweet, Elizabeth
Sweet, Gilbert
Swinton, Alan Archibald Campbell, 1863-1930
Swisshelm, Jane Grey Cannon, 1815-1884
Symmes, John Cleves, 1742-1814

Taber, Charlotte F.
Taber, Isaac Congdon, 1815-1862
Tabor, Stephen James Wilson, 1815-1883
Taft, Augustine Calvin, 1817-
Tallmadge, Nathaniel Pitcher, 1795-1864
Tappan, Arthur [brother of Lewis Tappan], 1786-1865
Tappan, Lewis, 1788-1873
Taylor, Harriet Newell Whitnah, 1838-1932
Taylor, Isaac, 1829-1901
Taylor, Theodore K., 1810-
Tebb, William Scott, 1830-1918
Tennyson, Alfred, 1809-1892
Thackeray, William Makepeace, 1811-1863
Thomas, Allen Clapp, 1846-1920
Thompson, George, 1804-1878
Thompson, Joseph Parrish, 1819-1879
Thomson, Samuel, 1769-1843
Thoreau, Henry David, 1817-1862
Tiffany, Joel, 1811-1893
Tillotson, Mary Ella, 1816-
Tilton, Elizabeth M. Richards, 1834-
Tilton, Theodore, 1835-1907
Tingley, Katherine Augusta Westcott, 1847-1929
Tippie, Joseph, 1809-1894
Tissot, Samuel Auguste Andre David, 1728-1797
Tolstoy, Leo Graf, 1828-1910
Toohey, John Henry Watson, ca. 1802-
Towner, James William, 1823-1913
Townsend, Milo Adams, 1816-1877
Townsend, Tappen, 1816-1885
Townshend, Chauncey Hare, 1798-1868
Train, George Francis, 1829-1904
Trall, Russell Thacher, 1812-1877
Trask, George, 1798-1875
Trask, Henry P.
Trask, Mary Peabody Kenney [sister Eliza J. Kenney; m. to Henry P. Trask], 1818-
Treat, Joseph
Treat, Mary Lua Adelia Davis Allen [married to Joseph Treat], 1835-1923
Treat, Samuel Willis, 1801-
Trevelyan, Walter H., 1840-1884
Trollope, Frances Milton, 1780-1863
Trowbridge, John Townsend, 1827-1916
Truth, Sojourner, ca. 1797-1883
Tubman, Harriet, ca. 1820-1913
Tucker, Benjamin Ricketson, 1854-1939
Tucker, Mary R.
Tuttle, Charlotte M.,
Tuttle, Emma Dianis Rood [married to Hudson Tuttle], 1837-1916
Tuttle, Hudson, 1836-1910
Tuttle, Lucina M., 1818-1879
Twining, Louisa, 1820-1912
Tyng, Stephen Higginson, 1800-1885

Underhill, Abel, 1804-1887
Underhill, Ann Leah Fox Fish Brown, 1814-1890
Underwood, Sara A. Francis, 1838-1911
Upham, Thomas Cogswell, 1799-1872
Urner, Benjamin, ca. 1795-1857

Van Sickle, Selah, 1812-ca. 1880
Van Sickle, Silas
Vashon, George Boyer, 1824-1878
Vennum Binning, Mary Lurancy, 1864-
Verne, Jules, 1828-1905
Villard, Frances Garrison [daughter of Wm. Lloyd Garrison], 1844-1928

Wade, Benjamin Franklin, 1800-1878
Wadsworth, Frank L.
Waisbrooker, Lois [pseud.] Adeline Eliza Nichols Fuller, 1826-1909
Waite, Arthur Edward, 1857-1942
Walker, Amasa, 1799-1875
Walker, Edwin Cox, 1849-1931
Walker, Mary Edwards, 1832-1919
Wallace, Alfred Russel, 1823-1913
Wallace, William Ross, 1819-1881
Ward, Lester Frank, 1841-1911
Ward, Samuel Ringgold, 1817-ca. 1866
Warner Smith, Abby
Warren, Josiah, 1798-1874
Warren, Owen Greenliffe
Washington, Booker Taliaferro, 1856-1915
Wasson, David Atwood, 1823-1887
Waters, Elisha, -1904
Watson, Elizabeth Lowe, 1843-1927
Watson, Samuel, 1813-
Wattles, Augustus [brother of John O. Wattles], 1796-
Wattles, John Otis, 1809-1859
Watts, Anna Mary Howitt, 1824-1884
Weatherhead, David W., -1882
Webster, Daniel, 1782-1852
Weeks, Newman, 1824-1910
Weeks, Rebecca Melvina French [married to Newman Weeks]
Weiss, John, 1818-1879
Weld, Theodore Dwight, 1803-1895
Wellington, Oliver Hastings, 1813-1893
Wells, Charlotte Fowler [sister of L. N. Fowler; m. to Samuel Wells], 1814-1901
Wells, Samuel Roberts, 1820-1875
Wells-Barnett, Ida Bell, 1862-1931
Westcott, William Wynn, 1848-1925
Weston, Anne Warren [sister of Maria Weston Chapman],
Weston, Caroline [sister of Anne Warren Weston], 1808-1882
Wheeler, Edward Smith, 1834-1883
Whipper, William, 1805-1885
Whipple, Charles King, 1808-1900
Whipple, Edwin Percy, 1819-1886
White, Ellen Gould Harmon, 1827-1915
White, George, 1802-1887
White, Nathan Francis, 1827-
White, William B., 1803-1873
Whiting, Albert Bennet, 1835-1871
Whiting, Lilian, 1859-1942
Whiting, Rachel Augusta, 1844-
Whitman, Sarah Helen Power, 1803-1878
Whitman, Walt, 1819-1892
Whittemore, Thomas, 1800-1861
Whittier, John Greenleaf, 1807-1892
Widstrand, Franz Herman, 1824-1891
Wiggin, Amanda D. Chase, 1830-
Wilberforce, William, 1759-1833
Wilbor, Mary Hull, 1831-
Wilburn, Cora
Wilcox, Ella Wheeler, 1850-1919
Wilcoxsen, Mrs. Mary J.
Wilder, Alexander, 1823-1908
Wilhelm, Mrs. Alcinda
Wilkinson, James John Garth, 1812-1899
Wilkinson, William Henry Whiteway
Willard, Elizabeth Osgood Goodrich, -1873
Willard, Emma Hart, 1787-1870
Willard, Frances Elizabeth Caroline, 1839-1898
Willets, George
Williams, John Shoebridge, 1790-1878
Willis, Frederick Llewellyn Hovey, 1830-1914
Willis, Love Maria, 1824-1908
Willis, Nathaniel Parker, 1806-1867
Willis, Sarah E. Payson [Fanny Fern, pseud.], 1811-1872
Wilson, Ebenezer Vespasian, -1880
Wilson, Robert P.
Wiltsie [aka Wilsey] Bronson Palmer, Nellie L.
Winchester, Elhanan, 1751-1797
Winslow, Caroline Brown, 1822-
Wittig, Gregor Konstantin, 1834-1908
Wixon, Susan Helen, 1847-1912
Wolcott, Josiah, -1885
Wolfe, Napoleon Bonaparte, 1823-
Wolff, Rev. John B.
Wollstonecraft Godwin, Mary, 1759-1797
Wood, John George, 1827-1889
Wood, Melvine Townsend
Woodhull Martin, Victoria Claflin, 1838-1927
Woodman, Jabez Cushman, 1804-1869
Wreidt, Etta, 1860-
Wright DArusmont, Frances ["Fanny"], 1795-1852
Wright, Elizur, Jr., 1804-1885
Wright, Henry Clarke, 1797-1870
Wright, Martha Coffin Pelham, 1806-1875

Yerrinton, James Manning Winchell, -1893

Zöllner, Johann Karl Friedrich, 1834-1882

Geef mijn taartpunt maar aan Pim!
  † In Memoriam † maandag 15 oktober 2001 @ 01:02:19 #88
13819 Loedertje
Trotse GILF.
  † In Memoriam † maandag 15 oktober 2001 @ 01:04:57 #89
13819 Loedertje
Trotse GILF.
pi_1902700
quote:
Op maandag 15 oktober 2001 00:46 schreef calvobbes het volgende:
* laatste, hierna *
http://www.sheepgame.co.uk/launch.htm

pi_1902719
Peeeeeeeeeeeeest!
:{
  † In Memoriam † maandag 15 oktober 2001 @ 01:09:30 #91
13819 Loedertje
Trotse GILF.
pi_1902862
quote:
Op maandag 15 oktober 2001 01:09 schreef Loedertje het volgende:
[afbeelding]

zzzzzzzzzzzzzzzzzzzzzzzzzzzzz


Slapert! PEEEEEESSSSSTTT!
:{
  maandag 15 oktober 2001 @ 01:27:15 #93
15098 El-Lupe
Sick of you!
pi_1902912
The KYBALION : a Study of the Hermetic Philosophy of Ancient Egypt and Greece
by The Three Initiates

Unto Thee I Grant
by S. Ramatherio

From the Caves and Jungles of Hindostan : Collected Writings

H. P. Blavatsky Collected Writings 1874-1878 Vol 1

H. P. Blavatsky Collected Writings 1879-1880 Vol 2

H. P. Blavatsky Collected Writings 1881-1882 Vol 3

H. P. Blavatsky Collected Writings 1882-1883 Vol 4

H. P. Blavatsky Collected Writings 1883 Vol 5

H. P. Blavatsky Collected Writings 1883-1884-1885 Vol 6

Collected Writings of H. P. Blavatsky 1886-1887 Vol 7

H. P. Blavatsky Collected Writings 1887 Vol 8

H. P. Blavatsky Collected Writings 1888 Vol 9

H. P. Blavatsky Collected Writings 1888-1889 Vol 10

H. P. Blavatsky Collected Writings 1889 Vol 11

H. P. Blavatsky Collected Writings 1889-1890 Vol 12

H. P. Blavatsky Collected Writings 1890-1891 Vol 13

H. P. Blavatsky Collected Writings : Miscellaneous Vol 14

H. P. Blavatsky Collected Writings : Cumulative Index Vol 15

Initiates of the Theosophical Masters
(Suny Series in Western Esoteric Traditions)

An Invitation to the Secret Doctrine

Isis Unveiled

Isis Unveiled : Collected Writings/Boxed Set

Isis Unveiled : Secrets of the Ancient Wisdom Tradition,
Madame Blavatsky's First Work

Key to Theosophy

Madame Blavatsky's Baboon : A History of the Mystics, Mediums, and Misfits
Who Brought Spiritualism to America

The Masters Revealed : Madam Blavatsky and the Myth of the Great White Lodge
(Suny Series in Western Esoteric Traditions)

The Millennium Book of Prophecy : 777 Visions and
Predictions from Nostradamus, Edgar Cayce, Gurdjieff,
Tamo-San, Madame Blavatsky, Old and New testament

Reminiscences of H.P. Blavatsky and the Secret Doctrine

The Secret Doctrine :
The Synthesis of Science, Religion and Philosophy
(2 volume facsimile edition)

Studies in Occultism

Voice of Silence

When Daylight Comes; A Biography of
Helena Petrovna Blavatsky (Quest Book)
Howard Murphet

An Abridgment of H. P. Blavatsky's Secret Doctrine

Blavatsky and the Secret Doctrine

Combined Chronology for Use With the Mahatma Letters
to A. P. Sinnett and the Letters of H. P. Blavatsky to A. P. Sinnett
Margaret Conger

The Inner Group Teachings of H. P. Blavatsky : To Her Personal Pupils (1890-91)
Henk J. Spierenburg

Isis Unveiled : A Master-Key to the Mysteries of Ancient and Modern Science and Theology (2 Vols in 1)

Madame Blavatsky on How to Study Theosophy

Modern Panarion : A Collection of Fugitive Fragments from the Pen of H. P. Blavatsky

Nightmare Tales
H. P. Blavatsky

Occult Tales
H. P. Blavatsky, W. Q. Judge

The Secret Doctrine, the Synthesis of Science ,Religion, and Philosophy,
by H. P. Blavatsky
John P. Van Mater / Hardcover / Published
1997 (Not Yet Published)

Two Books of the Stanzas of Dzyan
H. P. Blavatsky

The Voice of the Silence
H. P. Blavatsky

Dynamics of the Psychic World : Comments by H.P. Blavatsky
on Magic, Mediumship, Psychism and the Powers of the Spirit
(Quest Book Original)
H. P. Blavatsky

An Introduction to Dream Interpretation
Manly P. Hall

Orders of the Great Work-Alchemy
(Adept Series)
Manly P. Hall /

The Adepts in the Eastern Esoteric Tradition : The Arhats of Buddhism
(Adept Series)
Manly Palmer Hall

Adventures in Understanding
Manly Palmer Hall

Americas Assignment With Destiny
Manly P. Hall

Apocalypse Attributed to St. John
Manly P. Hall /

Astrological Keywords
Manly P. Hall

Atlantis, an Interpretation
Manly Palmer Hall

Basic Fears & How to Correct Them
Manly P. Hall

The Blessed Angels
Manly P. Hall

Cabalistic Keys to the Lord's Prayer
Manly P. Hall

Codex Rosae Crucis-Doma
Manly P. Hall

Death & After
Manly P. Hall

Culture of the Mind
Manly P. Hall

Death to Rebirth
Manly P. Hall

Dream Symbolism
Manly P. Hall

First Principles of Philosophy :
Metaphysics, Logic, Ethics, Psychology, Epistemology, Esthetics and Theurgy
Manly Palmer Hall

Four Seasons of the Spirit and Achieving the Miracle of Contentment
Manly P. Hall

The Guru, by His Disciple
Manly P. Hall

Healing : Divine Art
Manly P. Hall

The Hermetic Marriage
(Adept Series)
Manly P. Hall

How Belief in Rebirth Enriches Your Life
Manly P. Hall

The Initiates of Greece & Rome
(Adept Series)
Manly P. Hall

Initiation of Plato
Manly P. Hall

Inner Lives of Minerals, Plants & Animals
Manly P. Hall

Invisible Records of Thought and Action :
A Practical Guide to Subtle Vibrations, Their Causes & Effects :
Four Essays Included : The Theory & Practice
Manly P. Hall

Is Each Individual Born With a Purpose
Manly P. Hall

Journey in Truth
Manly P. Hall

Light of Vedas
Manly Hall

Magic, a Treatise on Esoteric Ethics : a Treatise on Esoteric Ethics
Manly P. Hall

Man, the Grand Symbol of the Mysteries
Manly P. Hall

Masonic Orders of Fraternity : The Adepts in the Western Esoteric Tradition
(Adept Series)
Manly P. Hall

Medicine of the Sun & Moon
Manly P. Hall

Meditation Disciplines & Personal Integration
Manly P. Hall

Meditation Symbols in Eastern and Western Mysticism : Mysteries of the Mandala
Manly Palmer Hall

Mystery of the Holy Spirit
Manly P. Hall

The Mystical Christ : Religion As a Personal Spiritual Experience
Manly P. Hall

Mysticism & Mental Healing
Manly P. Hall

Mystics and Mysteries of Alexandria
(Adepts in the Esoteric Classical Tradition) Vol 2
Manly P. Hall

The Mystics of Islam
(Adept Series)
Manly P. Hall

Noble Eightfold Path
Manly P. Hall

Nordic, Gothic, and Finnish Rites
(Adepts Series)
Manly P. Hall

Old Testament Wisdom : Keys to Bible Interpretation
Manly P. Hall

Orders of the Quest : The Holy Grail
(Adept Series)
Manly P. Hall

Orders of the Universal Reformation-Utopias
(Adept Series)
Manly P. Hall

Past Lives and Present Problems
Manly P. Hall

Pathways of Philosophy
Manly P. Hall

Philosophy of Astrology
Manly Palmer Hall

Phoenix : An Illustrated Review of Occultism and Philosophy
Manly Palmer Hall

Positive Uses of Psychic Energy
Manly P. Hall

The Psychology of Religious Ritual
Manly P. Hall

Questions and Answers : Fundamentals of the Esoteric Sciences
Manly P. Hall

The Quiet Way
Manly P. Hall

Reincarnation : The Cycle of Necessity
Manly P. Hall

The Riddle of the Rosicrucians
Manly P. Hall

Right Thinking, the Royal Road to Health
Manly P. Hall

The Rosicrucians & Magister Christoph Schlegel : Hermetic Roots of America
Manly P. Hall

Sages & Seers
Manly P. Hall

The Sages of China
(Adept Series)
Manly P. Hall

Science & Immortality
Manly P. Hall

The Secret of the Untroubled Mind
Manly P. Hall

The Secret Teachings of All Age: An Encyclopedic Outline
of Masonic, Hermetic, Qabalistic & Rosicrucian Symbolical Philosophy - Reduced Size Color
Manly Palmer Hall

Self-Unfoldment by Disciplines of Realization :
Releasing and Developing Inward Perceptions, Practical Instructions in
Manly Palmer Hall

The Sermon on the Mount
Manly P. Hall

Shadow Forms : A Collection of Occult Stories
Manly P. Hall

Short Talks on Many Subjects
Manly P. Hall

The Soul in Egyptian Metaphysics
Manly P. Hall

The Space Born : Mystical Poetry
Manly P. Hall

Spiritual Centers in Man
Manly P. Hall

Studies in Character Analysis
Manly P. Hall

Super Faculties & Their Culture
Manly P. Hall

Symbolism of Light and Color
Manly Hall

Symbolic Essays
Manly P. Hall

The Tarot an Essay
M. P. Hall

Venerated Teachers of the Jains, Sikhs and Parsis
(Adepts in the Eastern Esoteric Tradition, Vol 5)
Manly Palmer Hall

Visions and Metaphysical Experiences
Manly P. Hall

The Way of Heaven : And Other Fantasies Told in the Manner of the Chinese
Manly P. Hall

What the Ancient Wisdom Expects of Its Disciples
Manly P. Hall

The White Bird of Tao
Manly P. Hall

Wisdom Beyond the Mind
(Search for Reality, Part 3)
Manly P. Hall

Wit and Wisdom of the Immortals
Manly P. Hall

Woman, the Mother of All Living
Manly P. Hall

Words to the Wise : A Practical Guide to the Esoteric Sciences
Manly Palmer Hall

Zen of the Bright Virtue
Manly P. Hall

Consciousness of the Atom
Alice Bailey

Death the Great Adventure
Alice A. Bailey

The Destiny of the Nations
Alice A. Bailey

Discipleship in the New Age Vol 1
Alice A. Bailey

Discipleship in the New Age Vol 2
Alice A. Bailey

Education in the New Age
Alice A. Bailey

Esoteric Healing Vol 4
Alice A. Bailey

Esoteric Psychology : A Treatise on the 7 Rays Vol 1
Alice A. Bailey

Esoteric Psychology : A Treatise on the 7 Rays Vol 2
Alice A. Bailey

Externalization of the Hierarchy
Alice A. Bailey

From Bethlehem to Calvary
Alice A. Bailey

From Intellect to Intuition
Alice A. Bailey

Glamour : A World Problem
Alice A. Bailey

The Harlem Hospital Story : 100 Years of Struggle Against Illness, Racism and Genocide
Alice A. Bailey

Initiation Human and Solar
Alice A. Bailey

Labors of Hercules
Alice A. Bailey

Letters on Occult Meditation
Alice A. Bailey

Letters on Occult Meditation
Alice A. Bailey Paperback

Light of the Soul
Alice A. Bailey

Master Index to the Tibetan and Alice a Bailey Books


Ponder on This : A Compilation
Alice A. Bailey

Problems of Humanity
Alice A. Bailey

Rays and Esoteric Psychology
Zachary R. Lansdowne


Reappearance of the Christ
Alice A. Bailey

Reappearance of the Christ
Alice A. Bailey Paperback

Serving Humanity
Alice A. Bailey

Rays and the Initiations : A Treatise on the Seven Rays Vol 5
Alice A. Bailey

The Seven Rays Made Visual : An Illustrated Introduction to the Teaching on the Seven Rays
Helen S. Burmester

The Seven Rays of Life
Alice A. Bailey

The Seventh Ray : Revealer of the Age
Alice A. Bailey

Soul and Its Mechanism
Alice A. Bailey

A Treatise on White Magic or the Way of the Disciple
Alice A. Bailey

Treatise on the Seven Rays Vol 1
Alice A. Bailey

Telepathy and the Etheric Vehicle
Alice A. Bailey

The Stanzas of Dzyan :
Notes for Study on Cosmogenesis and Antropogenesis
/Study Series : Number Five
Elsie Benjamin

Two Books of the Stanzas of Dzyan
H. P. Blavatsky

Catalogue of Books on Hermetic Philosophy :
The E A Hitchcock Collection
M Bangs

Giordano Bruno and the Hermetic Tradition

Henry Vaughan and the Hermetic Philosophy
(English Literature Series, No 33)
Elizabeth Holmes

Hermetic and Alchemical Writings of Paracelsus
Arthur Edward Waite

Hermetic Fundamentals Revealed
A. S. Raleigh

Hermetic Masonry
Frank C. Higgins

Hermetic Triumph and the Ancient War of the Knights - 1740 :
Being an Alchemistical Dialogue Between Our Stone, Gold & Mercury, of the True Matter

Life Is Real Only Then, When "I Am"
(All and Everything Series, Vol. 3)
G. I. Gurdjieff (Publisher Out Of Stock)

The Secret Science
(Hermetic Philosophy, Book 1)
John Baines

The Stellar Man
(Hermetic Philosophy, Book 2)
John Baines, Judith Hipskind (Hard to Find)

The Golden Cauldron : Shamanic Journeys on the Path of Wisdom
Nicki Scully, Angela Werneke

Scroll Of Thoth;
Tales Of Simon Magus And The Great Old Ones
Robert M. Price

Thoth Tarot Deck : Ordo Templi Orientis
Aleister Crowley

Book of Thoth

Genesis : The Children of Thoth
Eugene E. Whitworth

Hermes to His Son Thoth : Joyce's Use of Giordano Bruno in Finnegan's Wake
Frances M. Boldereff

Thoth-The Hermes of Egypt
P. Boyland

The Ascended Masters Light the Way : Beacons of Ascension
(The Ascension Series)
Joshua David, Phd Stone

The Inner Door : Channeled Discourses from the Ascended Masters on Self-Mastery and Ascension Vol 1
Eric Klein

The Inner Door : Channeled Discourses from the Ascended Masters on Self-Mastery and Ascension Vol 2
Eric Klein

Jewels on the Path; Transformational Teachings of the Ascended Masters
Eric Klein

Living Mastery : The Expression of Your Divinity
Joanna Cherry

Ancient wisdom : invoking the power of your soul star
Dan Dupuis (Hard to Find)

Sacred Journey to Atlantis
Norma J. Milanovich, et al

The Masters Revealed : Madam Blavatsky and the Myth of the Great White Lodge
(Suny Series in Western Esoteric Traditions)
K. Paul Johnson

Pyramid Power : The Millennium Science
G. Patrick Flanagan

Pyramid Power : The Secret Energy of the Ancients Revealed
Max Toth

Anti-Gravity and the World Grid
(Lost Science Series)
David Hatcher Childress

Architects of the Underworld :
Un-riddling Atlantis, Anomalies of Mars, and the Mystery of the Sphinx
Bruce Rux

Beyond the Big Bang :
Ancient Myth and the Science of Continuous Creation
Paul A. LaViolette

Edgar Cayce on Atlantis
Edgar Evans Cayce

The Fall of Atlantis
Marion Zimmer Bradley

From Atlantis to the Sphinx
Colin Wilson

The History of Atlantis
Lewis Spence

Ideal Commonwealths : Comprising, More's Utopia,
Bacon's New Atlantis, Campanella's City of the Sun
and Harrinton's Oceana (Dedalus Classic)
Thomas, Sir More

Legends of Atlantis and Lost Lemuria
W. Scott-Elliot

Lost Cities of Atlantis Ancient Europe & the Mediterranean
(Lost Cities Series)
David Hatcher Childress

The Mayan Factor : Path Beyond Technology
Jose Arguelles

Mysteries of Atlantis Revisited
(Edgar Cayce Guides)
Edgar Evans Cayce, et al

Signet of Atlantis : War in Heaven Bypass
(The Mind Chronicles)
Barbara Hand Clow

Vimana Aircraft of Ancient India and Atlantis
(Lost Science Series)
David Hatcher Childress

Yeti : Abominable Snowman of the Himalayas
(Mysteries of Science)
Elaine Landau

Atlantis : The Seven Seals
Zoltan Simon

Atlantis Magic
Jenny James

The Legend of Altazar a Fragment of the True History of Planet Earth
Hermit of the Crystal Mountain

Lost Teachings of Atlantis
Jon Peniel

New Atlantis
Francis Bacon

New Atlantis : Begun by the Lord Verulam, Viscount St. Alban's and Continued by R. H. Esquire
Francis Bacon

The Occult Sciences in Atlantis
Lewis Spence

Revelations of the Metatron
Gary Sornson, John Rossner

The Ancient Egyptian Book of the Dead
Raymond O. Faulkner, Carol Andrews (Editor)

Awakening Osiris : The Egyptian Book of the Dead
Normandi Ellis (Translator)

The Book of the Dead :
The Hieroglyphic Transcript of the Papyrus of Ani,
the Translation into English and an Introduction
by E.A. Wallis Budge,
Wallis Budge

Celtic Book of the Dead :
A Guide for Your Voyage to the Celtic Otherworld
(Cards/Spread-Cloth)
Caitlin Mathews, Caitlin Matthews

Tibetan Book of the Dead
Walter Evans-Wentz

The Tibetan Book of the Dead
Padma Sambhava, Robert A. Thurman (Translator)

The Tibetan Book of the Dead :
The Great Liberation Through Hearing in the Bardo
Francesca Fremantle, et al

The Tibetan Book of the Dead :
The Great Liberation Through Hearing in the Bardo
Guru Rinpoche, et al

Beyond the Essene Hypothesis :
The Parting of the Ways Between Qumran and Enochic Judaism
Gabriele Boccaccini (Not Yet Published)

The Books of Enoch : Aramaic Fragments of Qumran Cave 4
Josef Tadeusz, Milik (Hard to Find)

Geef mijn taartpunt maar aan Pim!
pi_1903155
Pingen naar www.fokforum.nl [213.239.154.13] met 32 byte gegevens:

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=80 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=40 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=30 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=30 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=40 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=40 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=61 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=11 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=30 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=80 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd=20 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

Antwoord van 213.239.154.13: bytes=32 tijd<10 ms TTL=247

inu-oniichan : "The dog-eared bro"
  maandag 15 oktober 2001 @ 02:12:53 #95
12891 nomis
There can be only one
pi_1903171
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla.
Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die da die da die da. Bla bla bla. Bla die d
Welcome, to the desert, of the real
  maandag 15 oktober 2001 @ 02:12:57 #96
2890 Zanderrr
A Face Made For Radio
pi_1903172
Alsjeblieft, iets leerzaams:

Modern music, derived from the music of the European Rennaissance, is based on a 12-note scale that is formed logarithmically. Each octave doubles the pitch (or frequency) of the previous octave. It is the way in which we hear the sounds with our ears, so naturally our music reflects the same 'logarithmic' pattern. Each note in the scale can therefore be formed by increasing the pitch (multiplying its frequency) of the previous note by the 12th root of 2, and the difference between 2 notes in the 12-note scale is referred to as a 'half step'. OK, in English: The standard 12-note scale defines 'A' at 440Hz, or 440 cycles per second. 'A' at the next octave up would be 880Hz, and the next octave up would be 1760 Hz. About half-way (in pitch) between 'A' and the next 'A' is 'E', which happens to be the '5' note in the scale, and is also the 8th 'half step' (more on this later). It's frequency is approximately 660Hz (though not exactly). These two notes, 'A' and 'E', form the basis of most of the 'A' chords, because the mixture of the two tones of 'A' (440 Hz) and 'E' (660 Hz) form a 'sum' and 'difference' set of frequencies at 220Hz (also an 'A'), and 1100Hz (5 times the 'A' one octave below), both of which are frequency multiples of 'A'. It should be worth noting that it is the relationship between the frequencies of the various notes which give each chord its tonal qualities, and those notes which form sum and difference frequencies that are multiples of the 'fundamental' note for the chord are considered to be most pleasing to the ear.
Fortunately, nobody is going to make you sit down with a calculator and determine which notes form pleasant frequency combinations. Rather, let's rely on the work done by centuries of musicians (some famous, some not) and music theoreticians, and provide a list of these valid combinations.

Of important note: though other scales exist, such as that used by Chinese classical music, or Middle-Eastern music, the focus of this page is on the 'European Rennaissance' 12-note scales. I have already received one e-mail reminding me of this, so I have taken the effort to distinguish which scale I am referring to, while at the same time edifying others who may not be aware that other musical scales exist.


The 12-note MAJOR scale follows the pattern indicated below:
whole step, whole step, half step, whole step, whole step, whole step, half step
This forms a full 8-note "octave", consisting of 7 notes plus the first note at the next highest pitch. An example of this is the 'C' scale, which consists of 'C, D, E, F, G, A, and B', plus 'C' again at the next highest octave. By convention, each note in the scale is referred to by number, such that the 'C' would be the '1' note in the 'C' scale, the 'D' the '2' note, the 'E' the '3' note, and so on. This is how various chords are named, so that a 6th chord contains the '6' note, and so forth. For some chords this continues on into the next octave, such as a '9' or a '13' chord, and by convention some extra notes may be thrown in to make it sound nice (as with the '9' chord), generally a flatted (or dominant) 7.
Other scales also exist (minor, whole-tone, etc.) but can usually be expressed in terms of one of the major scales, with sharps or flats added in appropriate places. The major scale, though, corresponds with the 'do re mi' notes that we are all so familiar with, and forms the basis of the other scales.
Incidentally, if you are not already aware, a 'sharp' note merely adds a half step to a note. The notes in the 'C' scale have no sharps or flats in their names, and correspond to the white keys on a modern piano (some really old pianos have mostly black keys, contrary to modern ones). Other scales, beginning with notes other than 'C', can be formed by starting on the appropriate note, and using the 'whole step whole step half step whole step whole step whole step half step' pattern to form the scale, thus adding a 'sharp' or 'flat' to the appropriate notes to form the scale, according to a few rules (indicated below):

Each letter (A through G) must be represented once, and once only, in the scale
All sharped or flatted notes must either be all sharped, or all flatted
Double-flats and double-sharps are assigned when necessary, as with the 'F flat' scale.
Each major scale has a unique number of sharps/flats assigned to it, and the order of the sharps or flats follows the cycle of 5th's (more on this later).
OK - those of you who already know something about music theory: Since F has one flat, and B-flat has two flats, and F-flat has 8 flats (the 'B' is double-flat), what has 17 flats?

Answer: An 18-wheeler with one good tire....

In a nutshell, the following is a list of each major scale, and the appropriate number of sharps or flats that it uses, in their appropriate 'cycle of 5th' order:

C - none
C# - 7 sharps: F#, C#, G#, D#, A#, E#, B#
Db - 5 flats: Bb, Eb, Ab, Db, Gb (same note as C#, incidentally)
D - 2 sharps: F#, C# (note D has 2 sharps, Db has 5 flats, 5 + 2 = 7)
D# - 9 sharps: F##, C##, G#, D#, A#, E#, B# (note 'D' has 2 sharps, plus 7 sharps = 9 sharps, and it's the same note as Eb for all practical purposes)
Eb - 3 flats: Bb, Eb, Ab (note that 'E' is a 3 reversed, for 3 flats)
E - 4 sharps: F#, C#, G#, D# (note that 'E' has 4 lines in it, for 4 sharps)
F - 1 flat: Bb
F# - 6 sharps: F#, C#, G#, D#, A#, E# (6 sharps for F# plus 1 flat for F = 7 ... see the pattern?)
Gb - 6 flats: Bb, Eb, Ab, Db, Gb, Cb
G - 1 sharp: F# (for G#, just sharp everything once and double-sharp the F)
Ab - 4 flats: Bb, Eb, Ab, Db (the 'A' looks a little like a 4)
A - 3 sharps: F#, C#, G# (the 'A' has 3 lines in it)
Bb - 2 flats: Bb, Eb
B - 5 sharps: F#, C#, G#, D#, A#
Incidentally, some musicians will denote a key (major scale) by indicating the number of sharps or flats that it has with the number of fingers pointed up (sharps) or down (flats). In other words, 3 fingers down means key of Eb, a really nice key for alto sax players. So, next time you see a piano player or band leader point 3 fingers at the floor right before beginning a song, you'll know why...

Minor Scales
Minor scales are essentially a major scale applied for the '3b' chord in the scale. In other words, the key of C minor uses the Eb notation (3 flats). Minor scales themselves are formed in one of 3 ways:

Harmonic minor: flat the 3rd and 6th notes in the scale. Note that the key signature flats the 3rd, 6th, and 7th notes (see 'Natural minor', below).
Natural minor: Similar to harmonic minor, but the 7th note in the scale is also flatted.
Melodic minor: flat the 3rd note in the scale on the way UP (increasing pitch), but flat the 7th, 6th, and 3rd on the way DOWN (decreasing).
A discussion of minor scales and major scales, leads us right into CHORD FORMATION. The following is a brief list of all of the basic chords, and the notes that form them.

Major chord: 1st, 3rd, 5th note in the scale. Example: C major: C, E, G
Minor chord: 1st, flat 3rd, 5th note in scale. Example: C minor: C, Eb, G
Minor 7 chord: 1, 3b, 5, 7b notes in scale. Example: C minor 7: C, Eb, G, Bb
Major 7 chord: 1, 3, 5, 7 notes in scale. Example: C major 7: C, E, G, B
Dominant 7 chord: 1, 3, 5, 7b notes in scale. Example C Dom 7 (or C7): C, E, G, Bb
Diminished chord: 1, 3b, 5b, 6 notes in scale. Example: C Dim: C, Eb, Gb, A
Augmented chord: 1, 3, 5# notes in scale. Example: C Aug: C, E, G#
Major 9 chord: 1, 3, 5, 7, 9 (or 2) notes. Example: C Maj 9: C, D, E, G, B
Minor 9 chord: 1, 3b, 5, 7b, 9 (or 2) notes. Example: C Minor 9: C, D, Eb, G, Bb
NOTE: to voice this in a 'blues' style, the 'D' should be in the next octave. To voice this as a 'cluster chord' (dissonance), the 'D' should be in the same octave. Each has its own effect on the sound, which is dramatic in the case of the minor 9. Voicing of chords will be discussed later on...

Dominant 9 chord: 1, 3, 5, 7b, 9 (or 2) notes. Example: C Dom 9 (or C9): C, D, E, G, Bb
'2' chord: 1, 2, 3, 5 notes. Example: C2: C, D, E, G
6th chord: 1, 3, 5, 6 notes. Example: C6: C, E, G, A
6-9 chord: 1, 3, 5, 6, 9 (or 2) notes. Example: C 6-9: C, D, E, G, A
suspended chord (or 4 chord): 1, 4, 5 notes. Example: C sus: C, F, G
Dominant 11th chord: 1, 3, 5, 7b, 11 (or 4) notes. Example: C Dom 11 (or C11): C, E, F, G, Bb
Major 11 chord: 1, 3, 5, 7, 11 (or 4) notes. Example: C Maj 11: C, E, F, G, B
NOTE: With regard to voicing, chords like this are best spread over several octaves

Minor 11 chord: 1, 3b, 5, 7b, 11 (or 4) notes. Example: C Minor 11: C, Eb, F, G, Bb
13th chords: Like the '7' chords (above), but add a '6' note. Example: C13: C, E, G, A, Bb
Other chords also exist, and follow some simple rules. Basically, any numbers following the letter indicate additional notes other than the standard ones. A 'Maj' in front of a number indicates that the 7 is not flatted for this chord. A 'Dom' (or no 'Maj') indicates that the 7 *is* flatted. A 'Minor' chord has a flatted 3 note, and always a flatted 7 (when present). 'Sus' chords use a 4 in place of the 3, 'Dim' chords use a flatted 3 and flatted 5, and 'Aug' chords use a sharped 5.

Confused yet? Wait... there's more! Go get a soda, sit down, relax, and then come back if your brain is hurting right now. Let some of this stuff get absorbed, because it gets better. Trust me.

Chords within the major scale, or Diatonic Harmony
Normally, when playing a song in a particular scale (or key), you will find that certain chords are nearly always used. Not always, but nearly always. The notes within the key form certain chords without the need to add extra sharps or flats. Below is a list of the chords, the relative position within the key, and the technical term (for those who want to know). This example will be using the key of 'C', because it's simpler to see on a piano keyboard. NOTE: Roman numerals are used to denote the chords, as opposed to Arabic numerals for notes.


I - Tonic - C Major, C Major 6, C Major 7
II - Supertonic - D minor, D minor 7
III - Mediant - E minor, E minor 7
IV - Subdominant - F Major (often an F6, occasionally an F major 7)
V - Dominant - G or G 7 (almost always a G7)
VI - Submediant - A minor or A minor 7 (usually A minor 7)
VII - Leading Tone - B diminished

Occasionally, you'll hear songs referred to by their chord progression. Many "straight ahead" Jazz 'jam sessions' can be formed around a '2, 5, 1' progression, when you include substitute chords and some occasional 'fill in the blank' bridges, usually formed by a 'cycle of 5ths'.
A What?
A 'cycle of 5ths' represents the natural progression of a major chord to its '4' chord, like 'C' to 'F'. It just so happens that the '4' note is the '5th' half-step in the scale, which is only mildly confusing once you realize why the naming convention is '5th' and not '4th'. In any case, the order of the cycle of 5ths follows the same order I specified in the way I described the flats for each of the major keys. I did it that way on purpose, because it helps ME to remember them. In any case, the cycle of 5ths looks something like this:
Bb, Eb, Ab, Db, Gb, Cb (or B), E, A, D, G, C, F, Bb, etc.

For sharps, it's similar:
B, E, A, D, G, C (or B#), F (or E#), A#, D#, G#, C#, F#, B, etc.

As an exercise, on YOUR instrument try playing these notes as major chords, in the 'cycle of 5ths' order, and you will probably get a better perspective on where the cycle of 5ths comes from and why it exists. Essentially, the chords represent a natural progression from one chord to another, that you can find in many many places. In fact, one of my favorite 'bridges' within a blues or jazz song goes something like this (in the key of 'C'):

F6, F minor 7, E minor 7, A minor 7, D minor 7 (or D minor 9), G7, C6

The F6 to F minor 7 is a half-step alteration of 2 notes, the 3 to a 3b, and the 6 to a 7b. The E minor 7 just happens to contain the same notes as a C major 9, minus the 'C', which (essentially) means that a shift from an F minor 7 to to an E minor 7 is similar to a shift from 'F' back to 'C' (cycle of 5ths). Then, using the E minor 7, the next chord FORWARD in the cycle of 5ths would be 'A something', or in this case an A minor 7, followed by D minor 7 (next in cycle of 5ths), G 7 (next in cycle of 5ths), and finally C6 (the 'I' chord, or Tonic). Since the E minor 7 is really a substitue for C6 (more on this later) you can really keep this going indefinitely, or until the audience gets tired of hearing it, by going from the G7 back to an E minor 7, and continuing something like this:

F6, F minor 7, |: E minor 7, A minor 7, D minor 7 (or D minor 9), G7 :|, C6
(the '|:' represents opening repeat, and ':|' ending repeat for this example)

And, if you wish to make an entire song out of this (in blues style), use chords something like THIS in the key of 'C':

C6, F6, C6, C13, F6, F minor 7, E minor 7, A minor 7, D minor 9, G7, C6, Bb 9, F6, F minor 7, E minor 7, A minor 7, D minor 9, G7, E minor 7, A minor 7, D minor 9, G7, C major 9

(now doesn't that beat a 3-chord special, with C, F, and G?)

On a 'Jazzier' note, there's also the '2,5,1' straight-ahead progression. Using chord substition (hinted at in the previous section), this can become rather complex. Basically, a substitute chord will contain 2 or more notes from another chord that defines the sound of the chord you are substituting for. Even though certain notes have been omitted, or substituted with notes belonging to the substitute chord, the basic sound still remains. This is especially useful if you are trying to follow a 'cycle of 5ths' while remaining within the key (as in the example above). But, often the chord substitution is used to add 'color' to a song, while not deviating from a particular pattern of chords, such as the '2,5,1' progression. As an example:


D minor 7, G7, E minor 7, A minor 7, D minor 7, G7, C major 7, A minor 7, D minor 7, G7, E minor 7, A minor 7, F major 7, F minor 9, E minor 7, A minor 7, D minor 7, G7, C major 7
(The 'A Flat Jam' is an example of a song that uses the 2,5,1 progression)

The II chord in the '2,5,1' progression is the D minor 7, the V chord is the G7, and the I chord is the C major 7. Alternate to the 'I' chord is E minor 7, and A minor 7 (which together follow the cycle of fifths back to the II chord). By substituting these 2 chords for the C major 7, a definite variety and sense of "progression" is added that wouldn't have been there before. In addition, I went ahead and added an F major 7, which (by the way) substitutes for the D minor 7 'II' chord. The F major 7 to F minor 9 progression leads into the E minor 7 (as before), then follows the cycle of fifths back to the 'I' chord. Elementary, my dear Thelonias!

Typical substitute chords
The following is a 'short list' of possible substitute chords. The basic principle is that certain notes in common to both form the sound, and I'll try to indicate which notes are common in each case (but please bear with me in case of error).


C major, major 7, or C2: E minor or E minor 7 (III chord); common E, G
C6, C13: A minor 7 (VI chord); common A, C, E, G (exact same notes as C6)
Because the C6 and A minor 7 share the same notes, the chord change depends upon the note which has been placed on the bass (see 'chord voicing', below). Therefore, an A minor 7 is like a C6 with an 'A' as its lowest note, or C6/A. Many songs use a C6 to A minor 7 transition (50's rock & roll 'ballads' being a prime example).
C7 or C9: Bb 9 (common Bb, C, combined with 'Dom 7' sound; adds 'suspense')
C7: Gb7 (common E and Bb) - connects well from C6 to an 'F' (I to IV transition)
C9: G minor 6 (common G, Bb, D) - works well in reverse, also
C minor 6: F9 (like above, but reversed) (common G, C, Eb)
C minor 9: Eb major 7 (common D, Eb, G, Bb). Eb maj 7 with 'C' on bass plays as a C minor 9
C 11 or C sus: Bb 9 (common Bb, C, F). Bb 9 with 'C' on the bass plays as a C11 or C sus 4 with color


Chord Voicing
Often times chords will sound rather boring when played with their fundamental note as the lowest note in the chord, or when all notes of a chord are played within the same octave. A completely different "color" can be obtained for a chord, or a slight "mood change", by altering the note that appears on the 'bass' of the chord (not necessarily played in bass clef, or on a bass, though often it can be). As an example, construct the 'C' chord in the following manner, increasing in pitch from left to right:

standard form: C, E, G
1st inversion: E, G, C
2nd inversion: G, C, E
Note the difference in "color" or "mood" of each. The 'standard form' tends to form a basic framework of a song, and remains somewhat 'neutral'. The 1st inversion adds a sense of "progression" to a song - you expect the next chord to be the 'F' (up the cycle of 5ths), or the D minor (down a whole step). And, the 2nd inversion adds a slight "suspense", without actually implying a chord change. It carries itself as 'the change'. So, you could play a song that switches from 'C' chord to an 'F' chord by voicing your chords as follows:

C major: C, E, G ('C' on bass one octave below)
C major: C, E, G ('E' on bass one octave below) (can be written as C/E)
F major: C, F, A ('F' on the bass one octave below).

The chord change itself left one note the same (the low 'C' in the chord). On a piano, the left hand might 'octave' the bass note for this example, adding a great emphasis to its effect on the chords. (I am intentionally NOT placing a score here, because I'm trying to help you think of the chord formation in terms of the theory, and NOT in terms of the mechanics). By leaving one note the same, playing a 2nd inversion on the chord, you not only add the 'suspense' following the chord change, but you minimize the amount of change required to play the new chord. 2 notes change by one whole step, one does not change. The bass line progresses from C to E to F, a natural 'upward moving' change. Aside from its use in Jazz, Tchaikovsky often used progressive changes like this (as well as the use of 2nd inversion to create suspense) in his music. Listen carefully to the 'Waltz' from Swan Lake for a perfect example - how long does he hold that V chord??? Just long enough to put you on the edge of your seat!

Additional concepts in voicing involve the use of 'cluster' chords (chords in which all of the notes appear close together), which often creates a sense of dissonance, and is often used in Jazz music, or the 'spreading' of a chord across several octaves (either on a piano, or in an orchestra). Often, the bass clef is far too low to place notes like 1, 3, and 5 close to one another. However, you CAN create an 'octaving' effect (essentially, 1 and 8), or use 1 and 5, or 3 and 8 together. Playing a 'C' chord on the left hand on a piano ('standard form') can therefore use C and G and still sound ok, or use an E and the 'C' above it (1st inversion) and sound 'ok'. The remainder of the chord can then be spread across 3 octaves by doing a 'stretch' between the left and right hands. Incidentally, this works very well for a minor 9 chord, which tends to sound rather 'cluttered' when played within a single octave; however, playing the 'D' note as the HIGHEST note in a C minor 9 (across 3 octaves) adds a real 'jazzy' sound, and makes a nice ending chord for a blues song (as in the Windows 95 Blues).


Transitions and 'Bridges'
Often time, to avoid repetition and boredom in an otherwise 'hit' song, you can add a 'bridge' somewhere in the middle of it that differs significantly enough from the rest of the song, though similar enough as not to detract from the continuity provided in the rest of it. A good example of this is found in The 80's Forever, where I repeat the main section twice, do one 'bridge', go back to the main section, another bridge, and a final repeat of the main section again. Though a lot of repeating occurs, it no longer sounds 'repetitious' due to the existence of the 'bridge'.
Typicall, a 'bridge' section involves some kind of key change, though not so dramatic that you need to change the key signature on the score (if you even bother to write it down on sheet music... "Hey, look everyone, this guy can actually read the notes"). Typically, you'll just run up the cycle of fifths to the 'IV' chord in the current scale (example: if you WERE in 'C', then the bridge is (effectively) in 'F'). Naturally you'll need a "cool" way of transitioning back to the I chord (generally a cycle of 5ths transition). It always helps me to consider what this chord is before I write the 'bridge'; that way, I can plan how to 'get back' before I get to the point where I have to 'get back'.
So, if you are in the key of 'C', you'll need the 'V' chord in the scale (or a substitute of it) to get back to the 'C' again. This means you'll here a 'G', or a substitute of a 'G' chord, at the end of your bridge. In this case, a G Minor is adequate, though not preferred. A typical substitute of a G Minor 7, however, would be a Bb6 or Bb6-9, as they have the common Bb, D, and F... in fact, you could also substitute a Bb6-9 chord for an F11, making it possible to transition TO the Bb6-9 from the C using the same cycle of 5ths. Incidentally, this idea makes it possible to alternate between 2 chords that are 1 whole step apart, an effective echnique to employ in a bridge if you lack any particular ideas. So, for a song in 'C', you might have a bridge like THIS:

F, Eb, F, Eb, F, Eb, F, G, C

And, to avoid repition, use substitute chords, like this:

F, Eb, D Minor 7, G Minor, A Minor, Bb, F, G, C (so I cheated a little on the Bb - whatever)

Of all of the possible 'bridge' sequences, though, the one I like the best is what I would call the "How High The Moon" progression. Those of you who've ever heard this song probably know what I'm talking about. The song "How High The Moon" is a Jazz standard that employs a set of chromatic key changes (each time going down by a whole step) by a rather creative use of the cycle of 5th's. The chord progression goes something like this (beginning in the key of 'E'):

E, E Minor, A, D, D Minor, G, C ...

Without displaying the entire song (or enduring the criticism should I get one or more chords wrong while attempting to transcribe from memory) I think the above example is sufficient in illustrating what I mean by a "How High The Moon" progression. Basically, starting with the I chord in the current key, you transition to the VIIb using the following sequence:

I, I Minor, IV, VIIb

The VIIb now becomes the 'I' chord in the next series. Typically, as a 'bridge', the progression will actually start from the IV chord in the original key, so that if your song is in 'C', the 'I' chord for this progression would begin with the 'IV' chord in the key of 'C', in this case an 'F'. You can then repeat this basic progression a couple of times, then transition back to the original key using the 'V' chord in the original key as the final transition chord (in this case, a 'G'). Now that you've been completely confused, I'll give you an example, starting with a simple song in the key of 'C':

C, F, G, C, C7, F, F Minor, Bb, Eb, Eb Minor, Ab, Db, Db Minor, Gb, G, C

Although there are probably BETTER and more creative ways of getting back to a 'G' from somewhere within this progression, a half-step upward progression is acceptable, going from the Gb to the G. Ideally, though you'd use some kind of substitute chord that did a cycle of 5th's transition to the G. Since 'D' transitions to G, a substitute of D (including minors) might be: F, F# Minor (or Gb Minor), Bb, B Minor, and so on.


In Space Thriller I did a sequence similar to this for the bridge, ending up on the V chord for 2 measures, and not enough space to do anything else. So, I ended up doing my transition as a set of chord inversions, which gave the impression of an increasing pitch, since the highest pitched note in a chord makes the 'melody' sound that you often hear when only chords are played. Basically, I did a 2nd inversion Gb chord (3 note is highest note), followed by a G4 (same inversion) (4 note is highest note), followed by a 'Standard Form' Gb (5 note is highest note), followed by a Gb Augmented chord (which sharps the 5 note, increasing its pitch by a half step). This caused the effective melody to progress as 3, 4, 5, 5#, which then took 2 measures of the same chord and built a 'suspense' effect into it. A Gb4 chord is like a 'Gb suspended' chord except that it typically also contains the 3 note, for a different effect on the sound. As well, Gb is also the V chord in the Bb scale, which creates a suspense effect in and of itself (as in Swan Lake, example noted above). Also, a chromatic upward progression causes a 'suspense' effect, and the final 'augmented' version of Gb is 'suspense' implying progression to the next chord. So, instead of having 2 measures of Gb sound 'boring', it effectively puts you in a state of 'suspense', building a nice progression back into the main 'movement' (after all, it IS a classical piece).


Shorthand chord notations
Often times a chord will be denoted using a 'shorthand' form. I have avoided using this form up until now because its use tends to make the writing more confusing, and people would likely be referring back to the shorthand, rather than just reading the long descriptions of the chords. So, I'll summarize the shorthand usage below:

Major: letter by itself, as in 'C' for C major
Minor: letter followed by '-', as in 'C-' for C minor
Major 7: Letter followed by 'maj7' or a 7 with a line through it, or a triangle as 'C maj7'
Minor 7: letter followed by '-7', as in 'C-7' (this also extends to other chords)
Augment: letter followed by a '+', as in C+ for C augmented
Suspended: letter followed by '4' or 'sus' or 'sus4', as in 'C sus'
Diminished: letter followed by 'dim' or a circle, as in 'C dim'
Therefore, a chord progression as follows

D minor 7, G7, E minor 7, A minor 7, D minor 7, G7, C major 7, A minor 7, D minor 7, G7, E minor 7, A minor 7, F major 7, F minor 9, E minor 7, A minor 7, D minor 7, G7, C major 7

could also be expressed as follows:

D-7, G7, E-7, A-7, D-7, G7, Cmaj7, A-7, D-7, G7, E-7, A-7, Fmaj7, F-9, E-7, A-7, D-7, G7, Cmaj7

MIDI Issues
Often times, when I compose MIDI music on my computer, I run into some issues that aren't normally seen, things that make a large difference in the overall sound of the resulting composition. One of the major issues is the sometimes significant difference in the way various MIDI sound systems reproduce the actual music, with respect to instrument voices, and the effect of 'velocity' and 'volume' on the resulting sound. In the case of FM cards, I've noticed that note velocity seems to have little effect, whereas with a wave table card it is VERY significant, both in actual volume and in actual sound quality. The results can therefore differ greatly when I choose a particular sound volume/velocity combination, for even though it may sound fine on an FM card, it sounds badly mixed on a wavetable card. Similarly, when a song sounds correct on a wavetable card, some instruments may even 'blast' and others sound 'weak' when reproduced on an FM card. Typically, piano and saxophone patches (commonly used by me) seem to be the worst offenders in this area.

But, one of the greatest obstacles to overcome is the fact that computerized music often sounds "too perfect". It is an interesting paradox that music that is 'perfect' (i.e. all instruments perfectly in tune, all in perfect time sequence with each other and the musical score) sounds less appealing than music that has slight imperfections. This is especially true with large orchestras, for it is the IMPERFECTIONS that give it the characteristic "large orchestra" sound. It is the same with human voices, where the 'choir' sound differs greatly from that of a soloist, even if the choir is singing the exact same note! Some of the MIDI patches have attempted to compensate (certain string and brass patches), but the overall effect isn't always what is desired.

So, within a couple of the MIDI files that I've created, I've 'de-tuned' some of the instruments, and played them in unison. The results have been very effective in creating a 'big band' or 'orchestra' sound, where without 'de-tuning' any instruments, all voices play exactly the same frequency, and you cannot tell the difference between 1 instrument and 5 instruments playing the same note. The 'de-tuning' effectively inserts an 'imperfection' into the music, but the music sounds better as a result of it. In my case, I used a static de-tuning, specified by a constant 'pitch bend' factor, some sharp and some flat, with approximately equal numbers of instruments on either side of 'zero'. Additionally, in one of them I effectively inserted very short (1/128th, 1/64th, 3/128th, etc.) rests at the beginning of certain tracks (each having a slightly different 'initial rest') to delay its starting slightly, and thereby simulate the natural timing imperfections of multiple musicians in a large orchestra (I could have also appropriately lengthened or shortened certain notes, but it would make the scores look ugly).
As an example, two MIDI version of the Stan Kenton Orchestra's "Intermission Riff" use varying degrees of the above techniques. The first version uses de-tuning on 5 different woodwind tracks to help create an orchestra effect. This works well, but doesn't sound all that "natural", so in the second version I added "random timing imperfections", small enough to go unnoticed (normally), but enough to make a difference in the overall sound.

Obviously, an orchestra sounds VERY BAD when the 'imperfections' are too great. One or more instruments grossly out of time, or grossly out of tune, sticks out like a sore thumb and severely detracts from the remainder of the orchestra. I certainly wouldn't want to be THAT musician (even though woodwind players can always blame a 'cracked reed' if they want to). Yet, unless an infinitesimally small imperfection is present, the orchestra won't sound right either. Fortunately, the physics of the instruments themselves, and the inability of people to tune them PERFECTLY within 6 decimal places of accuracy, automatically cause the necessary imperfections to occur.

"You fear Jazz. You fear the lack of rules, the lack of boundaries"
pi_1903178
quote:
Op maandag 15 oktober 2001 02:12 schreef Zanderrr het volgende:
Alsjeblieft, iets leerzaams:

Modern music, derived from the music of the European Rennaissance, is based on a 12-note scale that is formed logarithmically. Each octave doubles the pitch (or frequency) of the previous octave. It is the way in which we hear the sounds with our ears, so naturally our music reflects the same 'logarithmic' pattern. Each note in the scale can therefore be formed by increasing the pitch (multiplying its frequency) of the previous note by the 12th root of 2, and the difference between 2 notes in the 12-note scale is referred to as a 'half step'. OK, in English: The standard 12-note scale defines 'A' at 440Hz, or 440 cycles per second. 'A' at the next octave up would be 880Hz, and the next octave up would be 1760 Hz. About half-way (in pitch) between 'A' and the next 'A' is 'E', which happens to be the '5' note in the scale, and is also the 8th 'half step' (more on this later). It's frequency is approximately 660Hz (though not exactly). These two notes, 'A' and 'E', form the basis of most of the 'A' chords, because the mixture of the two tones of 'A' (440 Hz) and 'E' (660 Hz) form a 'sum' and 'difference' set of frequencies at 220Hz (also an 'A'), and 1100Hz (5 times the 'A' one octave below), both of which are frequency multiples of 'A'. It should be worth noting that it is the relationship between the frequencies of the various notes which give each chord its tonal qualities, and those notes which form sum and difference frequencies that are multiples of the 'fundamental' note for the chord are considered to be most pleasing to the ear.
Fortunately, nobody is going to make you sit down with a calculator and determine which notes form pleasant frequency combinations. Rather, let's rely on the work done by centuries of musicians (some famous, some not) and music theoreticians, and provide a list of these valid combinations.

Of important note: though other scales exist, such as that used by Chinese classical music, or Middle-Eastern music, the focus of this page is on the 'European Rennaissance' 12-note scales. I have already received one e-mail reminding me of this, so I have taken the effort to distinguish which scale I am referring to, while at the same time edifying others who may not be aware that other musical scales exist.


The 12-note MAJOR scale follows the pattern indicated below:
whole step, whole step, half step, whole step, whole step, whole step, half step
This forms a full 8-note "octave", consisting of 7 notes plus the first note at the next highest pitch. An example of this is the 'C' scale, which consists of 'C, D, E, F, G, A, and B', plus 'C' again at the next highest octave. By convention, each note in the scale is referred to by number, such that the 'C' would be the '1' note in the 'C' scale, the 'D' the '2' note, the 'E' the '3' note, and so on. This is how various chords are named, so that a 6th chord contains the '6' note, and so forth. For some chords this continues on into the next octave, such as a '9' or a '13' chord, and by convention some extra notes may be thrown in to make it sound nice (as with the '9' chord), generally a flatted (or dominant) 7.
Other scales also exist (minor, whole-tone, etc.) but can usually be expressed in terms of one of the major scales, with sharps or flats added in appropriate places. The major scale, though, corresponds with the 'do re mi' notes that we are all so familiar with, and forms the basis of the other scales.
Incidentally, if you are not already aware, a 'sharp' note merely adds a half step to a note. The notes in the 'C' scale have no sharps or flats in their names, and correspond to the white keys on a modern piano (some really old pianos have mostly black keys, contrary to modern ones). Other scales, beginning with notes other than 'C', can be formed by starting on the appropriate note, and using the 'whole step whole step half step whole step whole step whole step half step' pattern to form the scale, thus adding a 'sharp' or 'flat' to the appropriate notes to form the scale, according to a few rules (indicated below):

Each letter (A through G) must be represented once, and once only, in the scale
All sharped or flatted notes must either be all sharped, or all flatted
Double-flats and double-sharps are assigned when necessary, as with the 'F flat' scale.
Each major scale has a unique number of sharps/flats assigned to it, and the order of the sharps or flats follows the cycle of 5th's (more on this later).
OK - those of you who already know something about music theory: Since F has one flat, and B-flat has two flats, and F-flat has 8 flats (the 'B' is double-flat), what has 17 flats?

Answer: An 18-wheeler with one good tire....

In a nutshell, the following is a list of each major scale, and the appropriate number of sharps or flats that it uses, in their appropriate 'cycle of 5th' order:

C - none
C# - 7 sharps: F#, C#, G#, D#, A#, E#, B#
Db - 5 flats: Bb, Eb, Ab, Db, Gb (same note as C#, incidentally)
D - 2 sharps: F#, C# (note D has 2 sharps, Db has 5 flats, 5 + 2 = 7)
D# - 9 sharps: F##, C##, G#, D#, A#, E#, B# (note 'D' has 2 sharps, plus 7 sharps = 9 sharps, and it's the same note as Eb for all practical purposes)
Eb - 3 flats: Bb, Eb, Ab (note that 'E' is a 3 reversed, for 3 flats)
E - 4 sharps: F#, C#, G#, D# (note that 'E' has 4 lines in it, for 4 sharps)
F - 1 flat: Bb
F# - 6 sharps: F#, C#, G#, D#, A#, E# (6 sharps for F# plus 1 flat for F = 7 ... see the pattern?)
Gb - 6 flats: Bb, Eb, Ab, Db, Gb, Cb
G - 1 sharp: F# (for G#, just sharp everything once and double-sharp the F)
Ab - 4 flats: Bb, Eb, Ab, Db (the 'A' looks a little like a 4)
A - 3 sharps: F#, C#, G# (the 'A' has 3 lines in it)
Bb - 2 flats: Bb, Eb
B - 5 sharps: F#, C#, G#, D#, A#
Incidentally, some musicians will denote a key (major scale) by indicating the number of sharps or flats that it has with the number of fingers pointed up (sharps) or down (flats). In other words, 3 fingers down means key of Eb, a really nice key for alto sax players. So, next time you see a piano player or band leader point 3 fingers at the floor right before beginning a song, you'll know why...

Minor Scales
Minor scales are essentially a major scale applied for the '3b' chord in the scale. In other words, the key of C minor uses the Eb notation (3 flats). Minor scales themselves are formed in one of 3 ways:

Harmonic minor: flat the 3rd and 6th notes in the scale. Note that the key signature flats the 3rd, 6th, and 7th notes (see 'Natural minor', below).
Natural minor: Similar to harmonic minor, but the 7th note in the scale is also flatted.
Melodic minor: flat the 3rd note in the scale on the way UP (increasing pitch), but flat the 7th, 6th, and 3rd on the way DOWN (decreasing).
A discussion of minor scales and major scales, leads us right into CHORD FORMATION. The following is a brief list of all of the basic chords, and the notes that form them.

Major chord: 1st, 3rd, 5th note in the scale. Example: C major: C, E, G
Minor chord: 1st, flat 3rd, 5th note in scale. Example: C minor: C, Eb, G
Minor 7 chord: 1, 3b, 5, 7b notes in scale. Example: C minor 7: C, Eb, G, Bb
Major 7 chord: 1, 3, 5, 7 notes in scale. Example: C major 7: C, E, G, B
Dominant 7 chord: 1, 3, 5, 7b notes in scale. Example C Dom 7 (or C7): C, E, G, Bb
Diminished chord: 1, 3b, 5b, 6 notes in scale. Example: C Dim: C, Eb, Gb, A
Augmented chord: 1, 3, 5# notes in scale. Example: C Aug: C, E, G#
Major 9 chord: 1, 3, 5, 7, 9 (or 2) notes. Example: C Maj 9: C, D, E, G, B
Minor 9 chord: 1, 3b, 5, 7b, 9 (or 2) notes. Example: C Minor 9: C, D, Eb, G, Bb
NOTE: to voice this in a 'blues' style, the 'D' should be in the next octave. To voice this as a 'cluster chord' (dissonance), the 'D' should be in the same octave. Each has its own effect on the sound, which is dramatic in the case of the minor 9. Voicing of chords will be discussed later on...

Dominant 9 chord: 1, 3, 5, 7b, 9 (or 2) notes. Example: C Dom 9 (or C9): C, D, E, G, Bb
'2' chord: 1, 2, 3, 5 notes. Example: C2: C, D, E, G
6th chord: 1, 3, 5, 6 notes. Example: C6: C, E, G, A
6-9 chord: 1, 3, 5, 6, 9 (or 2) notes. Example: C 6-9: C, D, E, G, A
suspended chord (or 4 chord): 1, 4, 5 notes. Example: C sus: C, F, G
Dominant 11th chord: 1, 3, 5, 7b, 11 (or 4) notes. Example: C Dom 11 (or C11): C, E, F, G, Bb
Major 11 chord: 1, 3, 5, 7, 11 (or 4) notes. Example: C Maj 11: C, E, F, G, B
NOTE: With regard to voicing, chords like this are best spread over several octaves

Minor 11 chord: 1, 3b, 5, 7b, 11 (or 4) notes. Example: C Minor 11: C, Eb, F, G, Bb
13th chords: Like the '7' chords (above), but add a '6' note. Example: C13: C, E, G, A, Bb
Other chords also exist, and follow some simple rules. Basically, any numbers following the letter indicate additional notes other than the standard ones. A 'Maj' in front of a number indicates that the 7 is not flatted for this chord. A 'Dom' (or no 'Maj') indicates that the 7 *is* flatted. A 'Minor' chord has a flatted 3 note, and always a flatted 7 (when present). 'Sus' chords use a 4 in place of the 3, 'Dim' chords use a flatted 3 and flatted 5, and 'Aug' chords use a sharped 5.

Confused yet? Wait... there's more! Go get a soda, sit down, relax, and then come back if your brain is hurting right now. Let some of this stuff get absorbed, because it gets better. Trust me.

Chords within the major scale, or Diatonic Harmony
Normally, when playing a song in a particular scale (or key), you will find that certain chords are nearly always used. Not always, but nearly always. The notes within the key form certain chords without the need to add extra sharps or flats. Below is a list of the chords, the relative position within the key, and the technical term (for those who want to know). This example will be using the key of 'C', because it's simpler to see on a piano keyboard. NOTE: Roman numerals are used to denote the chords, as opposed to Arabic numerals for notes.


I - Tonic - C Major, C Major 6, C Major 7
II - Supertonic - D minor, D minor 7
III - Mediant - E minor, E minor 7
IV - Subdominant - F Major (often an F6, occasionally an F major 7)
V - Dominant - G or G 7 (almost always a G7)
VI - Submediant - A minor or A minor 7 (usually A minor 7)
VII - Leading Tone - B diminished

Occasionally, you'll hear songs referred to by their chord progression. Many "straight ahead" Jazz 'jam sessions' can be formed around a '2, 5, 1' progression, when you include substitute chords and some occasional 'fill in the blank' bridges, usually formed by a 'cycle of 5ths'.
A What?
A 'cycle of 5ths' represents the natural progression of a major chord to its '4' chord, like 'C' to 'F'. It just so happens that the '4' note is the '5th' half-step in the scale, which is only mildly confusing once you realize why the naming convention is '5th' and not '4th'. In any case, the order of the cycle of 5ths follows the same order I specified in the way I described the flats for each of the major keys. I did it that way on purpose, because it helps ME to remember them. In any case, the cycle of 5ths looks something like this:
Bb, Eb, Ab, Db, Gb, Cb (or B), E, A, D, G, C, F, Bb, etc.

For sharps, it's similar:
B, E, A, D, G, C (or B#), F (or E#), A#, D#, G#, C#, F#, B, etc.

As an exercise, on YOUR instrument try playing these notes as major chords, in the 'cycle of 5ths' order, and you will probably get a better perspective on where the cycle of 5ths comes from and why it exists. Essentially, the chords represent a natural progression from one chord to another, that you can find in many many places. In fact, one of my favorite 'bridges' within a blues or jazz song goes something like this (in the key of 'C'):

F6, F minor 7, E minor 7, A minor 7, D minor 7 (or D minor 9), G7, C6

The F6 to F minor 7 is a half-step alteration of 2 notes, the 3 to a 3b, and the 6 to a 7b. The E minor 7 just happens to contain the same notes as a C major 9, minus the 'C', which (essentially) means that a shift from an F minor 7 to to an E minor 7 is similar to a shift from 'F' back to 'C' (cycle of 5ths). Then, using the E minor 7, the next chord FORWARD in the cycle of 5ths would be 'A something', or in this case an A minor 7, followed by D minor 7 (next in cycle of 5ths), G 7 (next in cycle of 5ths), and finally C6 (the 'I' chord, or Tonic). Since the E minor 7 is really a substitue for C6 (more on this later) you can really keep this going indefinitely, or until the audience gets tired of hearing it, by going from the G7 back to an E minor 7, and continuing something like this:

F6, F minor 7, |: E minor 7, A minor 7, D minor 7 (or D minor 9), G7 :|, C6
(the '|:' represents opening repeat, and ':|' ending repeat for this example)

And, if you wish to make an entire song out of this (in blues style), use chords something like THIS in the key of 'C':

C6, F6, C6, C13, F6, F minor 7, E minor 7, A minor 7, D minor 9, G7, C6, Bb 9, F6, F minor 7, E minor 7, A minor 7, D minor 9, G7, E minor 7, A minor 7, D minor 9, G7, C major 9

(now doesn't that beat a 3-chord special, with C, F, and G?)

On a 'Jazzier' note, there's also the '2,5,1' straight-ahead progression. Using chord substition (hinted at in the previous section), this can become rather complex. Basically, a substitute chord will contain 2 or more notes from another chord that defines the sound of the chord you are substituting for. Even though certain notes have been omitted, or substituted with notes belonging to the substitute chord, the basic sound still remains. This is especially useful if you are trying to follow a 'cycle of 5ths' while remaining within the key (as in the example above). But, often the chord substitution is used to add 'color' to a song, while not deviating from a particular pattern of chords, such as the '2,5,1' progression. As an example:


D minor 7, G7, E minor 7, A minor 7, D minor 7, G7, C major 7, A minor 7, D minor 7, G7, E minor 7, A minor 7, F major 7, F minor 9, E minor 7, A minor 7, D minor 7, G7, C major 7
(The 'A Flat Jam' is an example of a song that uses the 2,5,1 progression)

The II chord in the '2,5,1' progression is the D minor 7, the V chord is the G7, and the I chord is the C major 7. Alternate to the 'I' chord is E minor 7, and A minor 7 (which together follow the cycle of fifths back to the II chord). By substituting these 2 chords for the C major 7, a definite variety and sense of "progression" is added that wouldn't have been there before. In addition, I went ahead and added an F major 7, which (by the way) substitutes for the D minor 7 'II' chord. The F major 7 to F minor 9 progression leads into the E minor 7 (as before), then follows the cycle of fifths back to the 'I' chord. Elementary, my dear Thelonias!

Typical substitute chords
The following is a 'short list' of possible substitute chords. The basic principle is that certain notes in common to both form the sound, and I'll try to indicate which notes are common in each case (but please bear with me in case of error).


C major, major 7, or C2: E minor or E minor 7 (III chord); common E, G
C6, C13: A minor 7 (VI chord); common A, C, E, G (exact same notes as C6)
Because the C6 and A minor 7 share the same notes, the chord change depends upon the note which has been placed on the bass (see 'chord voicing', below). Therefore, an A minor 7 is like a C6 with an 'A' as its lowest note, or C6/A. Many songs use a C6 to A minor 7 transition (50's rock & roll 'ballads' being a prime example).
C7 or C9: Bb 9 (common Bb, C, combined with 'Dom 7' sound; adds 'suspense')
C7: Gb7 (common E and Bb) - connects well from C6 to an 'F' (I to IV transition)
C9: G minor 6 (common G, Bb, D) - works well in reverse, also
C minor 6: F9 (like above, but reversed) (common G, C, Eb)
C minor 9: Eb major 7 (common D, Eb, G, Bb). Eb maj 7 with 'C' on bass plays as a C minor 9
C 11 or C sus: Bb 9 (common Bb, C, F). Bb 9 with 'C' on the bass plays as a C11 or C sus 4 with color


Chord Voicing
Often times chords will sound rather boring when played with their fundamental note as the lowest note in the chord, or when all notes of a chord are played within the same octave. A completely different "color" can be obtained for a chord, or a slight "mood change", by altering the note that appears on the 'bass' of the chord (not necessarily played in bass clef, or on a bass, though often it can be). As an example, construct the 'C' chord in the following manner, increasing in pitch from left to right:

standard form: C, E, G
1st inversion: E, G, C
2nd inversion: G, C, E
Note the difference in "color" or "mood" of each. The 'standard form' tends to form a basic framework of a song, and remains somewhat 'neutral'. The 1st inversion adds a sense of "progression" to a song - you expect the next chord to be the 'F' (up the cycle of 5ths), or the D minor (down a whole step). And, the 2nd inversion adds a slight "suspense", without actually implying a chord change. It carries itself as 'the change'. So, you could play a song that switches from 'C' chord to an 'F' chord by voicing your chords as follows:

C major: C, E, G ('C' on bass one octave below)
C major: C, E, G ('E' on bass one octave below) (can be written as C/E)
F major: C, F, A ('F' on the bass one octave below).

The chord change itself left one note the same (the low 'C' in the chord). On a piano, the left hand might 'octave' the bass note for this example, adding a great emphasis to its effect on the chords. (I am intentionally NOT placing a score here, because I'm trying to help you think of the chord formation in terms of the theory, and NOT in terms of the mechanics). By leaving one note the same, playing a 2nd inversion on the chord, you not only add the 'suspense' following the chord change, but you minimize the amount of change required to play the new chord. 2 notes change by one whole step, one does not change. The bass line progresses from C to E to F, a natural 'upward moving' change. Aside from its use in Jazz, Tchaikovsky often used progressive changes like this (as well as the use of 2nd inversion to create suspense) in his music. Listen carefully to the 'Waltz' from Swan Lake for a perfect example - how long does he hold that V chord??? Just long enough to put you on the edge of your seat!

Additional concepts in voicing involve the use of 'cluster' chords (chords in which all of the notes appear close together), which often creates a sense of dissonance, and is often used in Jazz music, or the 'spreading' of a chord across several octaves (either on a piano, or in an orchestra). Often, the bass clef is far too low to place notes like 1, 3, and 5 close to one another. However, you CAN create an 'octaving' effect (essentially, 1 and 8), or use 1 and 5, or 3 and 8 together. Playing a 'C' chord on the left hand on a piano ('standard form') can therefore use C and G and still sound ok, or use an E and the 'C' above it (1st inversion) and sound 'ok'. The remainder of the chord can then be spread across 3 octaves by doing a 'stretch' between the left and right hands. Incidentally, this works very well for a minor 9 chord, which tends to sound rather 'cluttered' when played within a single octave; however, playing the 'D' note as the HIGHEST note in a C minor 9 (across 3 octaves) adds a real 'jazzy' sound, and makes a nice ending chord for a blues song (as in the Windows 95 Blues).


Transitions and 'Bridges'
Often time, to avoid repetition and boredom in an otherwise 'hit' song, you can add a 'bridge' somewhere in the middle of it that differs significantly enough from the rest of the song, though similar enough as not to detract from the continuity provided in the rest of it. A good example of this is found in The 80's Forever, where I repeat the main section twice, do one 'bridge', go back to the main section, another bridge, and a final repeat of the main section again. Though a lot of repeating occurs, it no longer sounds 'repetitious' due to the existence of the 'bridge'.
Typicall, a 'bridge' section involves some kind of key change, though not so dramatic that you need to change the key signature on the score (if you even bother to write it down on sheet music... "Hey, look everyone, this guy can actually read the notes"). Typically, you'll just run up the cycle of fifths to the 'IV' chord in the current scale (example: if you WERE in 'C', then the bridge is (effectively) in 'F'). Naturally you'll need a "cool" way of transitioning back to the I chord (generally a cycle of 5ths transition). It always helps me to consider what this chord is before I write the 'bridge'; that way, I can plan how to 'get back' before I get to the point where I have to 'get back'.
So, if you are in the key of 'C', you'll need the 'V' chord in the scale (or a substitute of it) to get back to the 'C' again. This means you'll here a 'G', or a substitute of a 'G' chord, at the end of your bridge. In this case, a G Minor is adequate, though not preferred. A typical substitute of a G Minor 7, however, would be a Bb6 or Bb6-9, as they have the common Bb, D, and F... in fact, you could also substitute a Bb6-9 chord for an F11, making it possible to transition TO the Bb6-9 from the C using the same cycle of 5ths. Incidentally, this idea makes it possible to alternate between 2 chords that are 1 whole step apart, an effective echnique to employ in a bridge if you lack any particular ideas. So, for a song in 'C', you might have a bridge like THIS:

F, Eb, F, Eb, F, Eb, F, G, C

And, to avoid repition, use substitute chords, like this:

F, Eb, D Minor 7, G Minor, A Minor, Bb, F, G, C (so I cheated a little on the Bb - whatever)

Of all of the possible 'bridge' sequences, though, the one I like the best is what I would call the "How High The Moon" progression. Those of you who've ever heard this song probably know what I'm talking about. The song "How High The Moon" is a Jazz standard that employs a set of chromatic key changes (each time going down by a whole step) by a rather creative use of the cycle of 5th's. The chord progression goes something like this (beginning in the key of 'E'):

E, E Minor, A, D, D Minor, G, C ...

Without displaying the entire song (or enduring the criticism should I get one or more chords wrong while attempting to transcribe from memory) I think the above example is sufficient in illustrating what I mean by a "How High The Moon" progression. Basically, starting with the I chord in the current key, you transition to the VIIb using the following sequence:

I, I Minor, IV, VIIb

The VIIb now becomes the 'I' chord in the next series. Typically, as a 'bridge', the progression will actually start from the IV chord in the original key, so that if your song is in 'C', the 'I' chord for this progression would begin with the 'IV' chord in the key of 'C', in this case an 'F'. You can then repeat this basic progression a couple of times, then transition back to the original key using the 'V' chord in the original key as the final transition chord (in this case, a 'G'). Now that you've been completely confused, I'll give you an example, starting with a simple song in the key of 'C':

C, F, G, C, C7, F, F Minor, Bb, Eb, Eb Minor, Ab, Db, Db Minor, Gb, G, C

Although there are probably BETTER and more creative ways of getting back to a 'G' from somewhere within this progression, a half-step upward progression is acceptable, going from the Gb to the G. Ideally, though you'd use some kind of substitute chord that did a cycle of 5th's transition to the G. Since 'D' transitions to G, a substitute of D (including minors) might be: F, F# Minor (or Gb Minor), Bb, B Minor, and so on.


In Space Thriller I did a sequence similar to this for the bridge, ending up on the V chord for 2 measures, and not enough space to do anything else. So, I ended up doing my transition as a set of chord inversions, which gave the impression of an increasing pitch, since the highest pitched note in a chord makes the 'melody' sound that you often hear when only chords are played. Basically, I did a 2nd inversion Gb chord (3 note is highest note), followed by a G4 (same inversion) (4 note is highest note), followed by a 'Standard Form' Gb (5 note is highest note), followed by a Gb Augmented chord (which sharps the 5 note, increasing its pitch by a half step). This caused the effective melody to progress as 3, 4, 5, 5#, which then took 2 measures of the same chord and built a 'suspense' effect into it. A Gb4 chord is like a 'Gb suspended' chord except that it typically also contains the 3 note, for a different effect on the sound. As well, Gb is also the V chord in the Bb scale, which creates a suspense effect in and of itself (as in Swan Lake, example noted above). Also, a chromatic upward progression causes a 'suspense' effect, and the final 'augmented' version of Gb is 'suspense' implying progression to the next chord. So, instead of having 2 measures of Gb sound 'boring', it effectively puts you in a state of 'suspense', building a nice progression back into the main 'movement' (after all, it IS a classical piece).


Shorthand chord notations
Often times a chord will be denoted using a 'shorthand' form. I have avoided using this form up until now because its use tends to make the writing more confusing, and people would likely be referring back to the shorthand, rather than just reading the long descriptions of the chords. So, I'll summarize the shorthand usage below:

Major: letter by itself, as in 'C' for C major
Minor: letter followed by '-', as in 'C-' for C minor
Major 7: Letter followed by 'maj7' or a 7 with a line through it, or a triangle as 'C maj7'
Minor 7: letter followed by '-7', as in 'C-7' (this also extends to other chords)
Augment: letter followed by a '+', as in C+ for C augmented
Suspended: letter followed by '4' or 'sus' or 'sus4', as in 'C sus'
Diminished: letter followed by 'dim' or a circle, as in 'C dim'
Therefore, a chord progression as follows

D minor 7, G7, E minor 7, A minor 7, D minor 7, G7, C major 7, A minor 7, D minor 7, G7, E minor 7, A minor 7, F major 7, F minor 9, E minor 7, A minor 7, D minor 7, G7, C major 7

could also be expressed as follows:

D-7, G7, E-7, A-7, D-7, G7, Cmaj7, A-7, D-7, G7, E-7, A-7, Fmaj7, F-9, E-7, A-7, D-7, G7, Cmaj7

MIDI Issues
Often times, when I compose MIDI music on my computer, I run into some issues that aren't normally seen, things that make a large difference in the overall sound of the resulting composition. One of the major issues is the sometimes significant difference in the way various MIDI sound systems reproduce the actual music, with respect to instrument voices, and the effect of 'velocity' and 'volume' on the resulting sound. In the case of FM cards, I've noticed that note velocity seems to have little effect, whereas with a wave table card it is VERY significant, both in actual volume and in actual sound quality. The results can therefore differ greatly when I choose a particular sound volume/velocity combination, for even though it may sound fine on an FM card, it sounds badly mixed on a wavetable card. Similarly, when a song sounds correct on a wavetable card, some instruments may even 'blast' and others sound 'weak' when reproduced on an FM card. Typically, piano and saxophone patches (commonly used by me) seem to be the worst offenders in this area.

But, one of the greatest obstacles to overcome is the fact that computerized music often sounds "too perfect". It is an interesting paradox that music that is 'perfect' (i.e. all instruments perfectly in tune, all in perfect time sequence with each other and the musical score) sounds less appealing than music that has slight imperfections. This is especially true with large orchestras, for it is the IMPERFECTIONS that give it the characteristic "large orchestra" sound. It is the same with human voices, where the 'choir' sound differs greatly from that of a soloist, even if the choir is singing the exact same note! Some of the MIDI patches have attempted to compensate (certain string and brass patches), but the overall effect isn't always what is desired.

So, within a couple of the MIDI files that I've created, I've 'de-tuned' some of the instruments, and played them in unison. The results have been very effective in creating a 'big band' or 'orchestra' sound, where without 'de-tuning' any instruments, all voices play exactly the same frequency, and you cannot tell the difference between 1 instrument and 5 instruments playing the same note. The 'de-tuning' effectively inserts an 'imperfection' into the music, but the music sounds better as a result of it. In my case, I used a static de-tuning, specified by a constant 'pitch bend' factor, some sharp and some flat, with approximately equal numbers of instruments on either side of 'zero'. Additionally, in one of them I effectively inserted very short (1/128th, 1/64th, 3/128th, etc.) rests at the beginning of certain tracks (each having a slightly different 'initial rest') to delay its starting slightly, and thereby simulate the natural timing imperfections of multiple musicians in a large orchestra (I could have also appropriately lengthened or shortened certain notes, but it would make the scores look ugly).
As an example, two MIDI version of the Stan Kenton Orchestra's "Intermission Riff" use varying degrees of the above techniques. The first version uses de-tuning on 5 different woodwind tracks to help create an orchestra effect. This works well, but doesn't sound all that "natural", so in the second version I added "random timing imperfections", small enough to go unnoticed (normally), but enough to make a difference in the overall sound.

Obviously, an orchestra sounds VERY BAD when the 'imperfections' are too great. One or more instruments grossly out of time, or grossly out of tune, sticks out like a sore thumb and severely detracts from the remainder of the orchestra. I certainly wouldn't want to be THAT musician (even though woodwind players can always blame a 'cracked reed' if they want to). Yet, unless an infinitesimally small imperfection is present, the orchestra won't sound right either. Fortunately, the physics of the instruments themselves, and the inability of people to tune them PERFECTLY within 6 decimal places of accuracy, automatically cause the necessary imperfections to occur.


bla bla...
inu-oniichan : "The dog-eared bro"
  maandag 15 oktober 2001 @ 02:19:17 #98
12891 nomis
There can be only one
pi_1903185
DE OVERTREFFENDE POST!






index / Onzin voor je leven! / Het grote copy en paste topic


Geplaatst door Topic: Het grote copy en paste topic Dit onderwerp is 4 pagina's lang: 1 2 3 4


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:23

--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Friedrich Nietsche asks us not to read his books "like a looting soldiers," choosing appealing passages at random from his aphorisms; instead, we are to read ourselves into "a passionate mood" in order to perceive the short rays of light that will lead us onward and upward. .


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:26

--------------------------------------------------------------------------------
400 System Capacity Exceeded (Typhoon v1.2.3)
Configuratie:
Account: news
Server: news
Protocol: NNTP
Poort: 119
Beveiligd(SSL): 0
Foutnummer: 400
CODE: 800ccca0


kut



Loedertje


Door Loedertje - maandag 15 oktober 2001 00:28

--------------------------------------------------------------------------------
Why is noone discussing the war? Any been mailed powder yet?


Tackleberry
F1 - love it & live it!

Door Tackleberry - maandag 15 oktober 2001 00:28

--------------------------------------------------------------------------------
CUB meeting DWHN style

_______________________
Het leven is wat je gebeurt ... terwijl je andere plannen maakt.


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:30

--------------------------------------------------------------------------------
The hijack-bombings of September 11 were politically criminal attacks on
innocent civilians. Whoever perpetrated this crime must be condemned as
enemies of the American and international working class. The fact that no
one has claimed responsibility only underscores the profoundly reactionary
character of these attacks.
But while the events of September 11 have served as the catalyst for the
assault on Afghanistan, the cause is far deeper. The nature of this or any
war, its progressive or reactionary character, is determined not by the
immediate events that preceded it, but rather by the class structures,
economic foundations and international roles of the states that are
involved. From this decisive standpoint, the present action by the United
States is an imperialist war.

The US government initiated the war in pursuit of far-reaching international
interests of the American ruling elite. What is the main purpose of the war?
The collapse of the Soviet Union a decade ago created a political vacuum in
Central Asia, which is home to the second largest deposit of proven reserves
of petroleum and natural gas in the world.

The Caspian Sea region, to which Afghanistan provides strategic access,
harbors approximately 270 billion barrels of oil, some 20 percent of the
world's proven reserves. It also contains 665 trillion cubic feet of natural
gas, approximately one-eighth of the planet's gas reserves.

These critical resources are located in the world's most politically
unstable region. By attacking Afghanistan, setting up a client regime and
moving vast military forces into the region, the US aims to establish a new
political framework within which it will exert hegemonic control.

These are the real considerations that motivate the present war. The
official version, that the entire American military has been mobilized
because of one individual, Osama bin Laden, is ludicrous. Bin Laden's brand
of ultra-nationalist and religious obscurantist politics is utterly
reactionary, a fact that is underscored by his glorification of the
destruction of the World Trade Center and murder of nearly 6,000 civilians.
But the US government's depiction of bin Laden as an evil demiurge serves a
cynical purpose-to conceal the actual aims and significance of the present
war.

The demonization of bin Laden is of a piece with the modus operandi of every
war waged by the US over the past two decades, in each of which-whether
against the Panamanian "drug lord" Manuel Noriega, the Somalian "war lord"
Mohamed Farrah Aidid, or the modern-day "Hitlers" Saddam Hussein and
Slobodan Milosevic-the American government and the media have sought to
manipulate public opinion by portraying the targeted leader as the
personification of evil.

In an October 8 op-ed column in the New York Times, Fawaz A. Gerges, a
professor at Sarah Lawrence College, pointed to the real aims that motivate
the US war drive. Describing a conference of Arab and Muslim organizations
held a week ago in Beirut, Gerges wrote:

"Most participants claimed that the United States aims at far more than
destroying Osama bin Laden's Al Qaeda organization and toppling the Taliban
regime. These representatives of the Muslim world were almost unanimously
suspicious of America's intentions, believing that the United States has an
overarching strategy which includes control of the oil and gas resources in
Central Asia, encroachment on Chinese and Russian spheres of influence,
destruction of the Iraqi regime, and consolidation of America's grip on the
oil-producing Persian Gulf regimes.

"Many Muslims suspected the Bush administration of hoping to exploit this
tragedy to settle old scores and assert American hegemony in the world."

These suspicions are entirely legitimate. Were the US to oust the Taliban,
capture or kill bin Laden and wipe out what Washington calls his terrorist
training camps, the realization of these aims would not be followed by the
withdrawal of American forces. Rather, the outcome would be the permanent
placement of US military forces to establish the US as the exclusive arbiter
of the region's natural resources. In these strategic aims lie the seeds of
future and even more bloody conflicts.

This warning is substantiated by a review of recent history. America's wars
of the past 20 years have invariably arisen from the consequences of
previous US policies. There is a chain of continuity, in which yesterday's
US ally has become today's enemy.

The list includes the one-time CIA asset Noriega, the former Persian Gulf
ally Saddam Hussein, and yesterday's American protégé Milosevic. Bin Laden
and the Taliban are the latest in the chain of US assets transformed into
targets for destruction.

In the case of Iraq, the US supported Saddam Hussein in the 1980s as an ally
against the Khomeini regime in Iran. But when the Iraqi regime threatened US
oil interests in the Persian Gulf, Saddam Hussein was transformed into a
demon and war was launched against Baghdad. The main purpose of the Gulf War
was to establish a permanent US military presence in the Persian Gulf, a
presence that remains in place more than a decade later.

Even more tragic is the outcome of US sponsorship of bin Laden and the
Taliban. They are products of the US policy, begun in the late 1970s and
continued throughout the 1980s, of inciting Islamic fundamentalism to weaken
the Soviet Union and undermine its influence in Central Asia. Bin Laden and
other Islamic fundamentalists were recruited by the CIA to wage war against
the USSR and destabilize Central Asia.

In the chaos and mass destruction that followed, the Taliban was helped
along and brought to power with the blessings of the American government.
Those who make US policy believed the Taliban would be useful in stabilizing
Afghanistan after nearly two decades of civil war.

American policy-makers saw in this ultra-reactionary sect an instrument for
furthering US aims in the Caspian basin and Persian Gulf, and placing
increasing pressure on China and Russia. If, as the Bush administration
claims, the hijack-bombing of the World Trade Center was the work of bin
Laden and his Taliban protectors, then, in the most profound and direct
sense, the political responsibility for this terrible loss of life rests
with the American ruling elite itself.

The rise of Islamic fundamentalist movements, infused with anti-American
passions, can be traced not only to US support for the Mujahedin in
Afghanistan and Pakistan, but also to American assaults on the Arab world.
At the same time that the CIA was arming the fundamentalists in Afghanistan,
it was supporting the Israeli invasion of Lebanon. This was followed in 1983
by the US bombing of Beirut, in which the battleship New Jersey lobbed
2,000-pound shells into civilian neighborhoods. This criminal action led
directly to retribution in the form of the bombing of the US barracks in
Beirut, which took the lives of 242 American soldiers.

The entire phenomenon associated with the figure of Osama bin Laden has its
roots, moreover, in Washington's alliance with Saudi Arabia. The US has for
decades propped up this feudalist autocracy, which has promoted its own
brand of Islamic fundamentalism as a means of maintaining its grip on power.

All of these twists and turns, with their disastrous repercussions, arise
from the nature of US foreign policy, which is not determined on the basis
of democratic principles or formulated in open discussion and public debate.
Rather, it is drawn up in pursuit of economic interests that are concealed
from the American people.

When the US government speaks of a war against terrorism, it is thoroughly
hypocritical, not only because yesterday's terrorist is today's ally, and
vice versa, but because American policy has produced a social catastrophe
that provides the breeding ground for recruits to terrorist organizations.
Nowhere are the results of American imperialism's predatory role more
evident than in the indescribable poverty and backwardness that afflict the
people of Afghanistan.

What are the future prospects arising from the latest eruption of American
militarism? Even if the US achieves its immediate objectives, there is no
reason to believe that the social and political tinderbox in Central Asia
will be any less explosive.

US talk of "nation-building" in Afghanistan is predicated on its alliance
with the anti-Taliban Northern Alliance, with whom the Pentagon is
coordinating its military strikes. Just as Washington used the Albanian
terrorist Kosovo Liberation Army as its proxy in Kosovo, so now it utilizes
the gang of war lords centered in the northeast of Afghanistan as its cat's
paw in Central Asia.

Since the Northern Alliance will now be portrayed as the champion of freedom
and humanitarianism, it is instructive to note recent articles in the New
York Times and elsewhere reporting that the vast bulk of the Afghan opium
trade comes from the meager territory controlled by the Alliance. The
military satraps of the Northern Alliance are, moreover, notorious for
killing thousands of civilians by indiscriminately firing rockets into Kabul
in the early 1990s.

The sordid and illusory basis upon which the US proposes to "rebuild"
Afghanistan, once it is finished pummeling the country, was suggested in a
New York Times article on the onset of the war. "The Pentagon's hope," wrote
the Times, "is that the combination of the psychological shock of the air
strike, bribes to anti-Taliban forces in Afghanistan covertly supported by
Washington and sheer opportunism will lead many of the Taliban's fighters to
put down their arms and defect."

Given the nature of the region, with its vast stores of critical resources,
it is self-evident that none of the powers in Central Asia will long accept
a settlement in which the US is the sole arbiter. Russia, Iran, China,
Pakistan and India all have their own interests, and they will seek to
pursue them. Furthermore, the US presence will inevitably conflict with the
interests of the emerging bourgeois regimes in the lesser states in the
region that have been carved out of the former Soviet Union.

At each stage in the eruption of American militarism, the scale of the
resulting disasters becomes greater and greater. Now the US has embarked on
an adventure in a region that has long been the focus of intrigue between
the Great Powers, a part of the world, moreover, that is bristling with
nuclear weapons and riven by social, political, ethnic and religious
tensions that are compounded by abject poverty.

The New York Times, in a rare moment of lucidity, described the dangers
implicit in the US war drive in an October 2 article headlined "In Pakistan,
a Shaky Ally." The author wrote: "By drafting this fragile and fractious
nation into a central role in the 'war on terrorism,' America runs the
danger of setting off a cataclysm in a place where civil violence is a
likely bet and nuclear weapons exist."

Neither in the proclamations of the US government, nor in the reportage of
the media, is there any serious examination of the real economic and
geo-strategic aims motivating the military assault. Nor is there any
indication that the US political establishment has seriously considered the
far-reaching and potentially catastrophic consequences of the course upon
which it has embarked.

Despite a relentless media campaign to whip up chauvinism and militarism,
the mood of the American people is not one of gung-ho support for the war.
At most, it is a passive acceptance that war is the only means to fight
terrorism, a mood that owes a great deal to the efforts of a thoroughly
dishonest media which serves as an arm of the state. Beneath the reluctant
endorsement of military action is a profound sense of unease and skepticism.
Tens of millions sense that nothing good can come of this latest eruption of
American militarism.

The United States stands at a turning point. The government admits it has
embarked on a war of indefinite scale and duration. What is taking place is
the militarization of American society under conditions of a deepening
social crisis.

The war will profoundly affect the conditions of the American and
international working class. Imperialism threatens mankind at the beginning
of the twenty-first century with a repetition on a more horrific scale of
the tragedies of the twentieth. More than ever, imperialism and its
depredations raise the necessity for the international unity of the working
class and the struggle for socialism.


--
PaRaDoX
Le Quebec aux Quebecois
(en tout cas,pas aux amaricains)



calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:34

--------------------------------------------------------------------------------
--------------------------------------------------------------------------------


SCRIBE
Home | Presentation | Teams | Publications | SCRIBE by CompAct

--------------------------------------------------------------------------------


SCRIBE PUBLICATIONS (1997-2000)
1997 1998 1999 2000


SCIENTIFIC PUBLICATIONS FOR 1997
Journal articles or published proceeding
Journal articles with reviewing comitee
Articles in published proceedings
Reviews
Chapter in a book
Book
Published proceedings

TRANSFERT PUBLICATIONS
Personal communications
Journal articles without reviewing comitee
Repports (including licences, expert evaluation)
Other writtings supervised by the author
Thesis
Dissertations

SCIENTIFIC PUBLICATIONS FOR 1997


--------------------------------------------------------------------------------


SCIENTIFIC PUBLICATIONS


--------------------------------------------------------------------------------


Journal articles or published proceeding

Journal articles with reviewing comitee


Alami-Durante H., Fauconneau B., Rouel M., Escaffre A.M., Bergot P., 1997. Growth and multiplication of white skeletal muscle fibres in carp larvae in relation to somatic growth rate. J. of Fish. Biology, 50, 1285-1302.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of confinement stress on circulating levels of Growth hormone and two prolactins in freshwater-adapted Tilapia Oreochromis niloticus. Gen. Comp. Endocrinol., 108, 35-44.

Blaise O., Le Bail P.Y., Weil C., 1997. Permissive effect of insulin-like growth factor I (IGF-I) on gonadotropin releasing-hormone action on in vitro growth hormone release in rainbow trout Oncorhynchus mykiss. Comp. Biochem. Physiol., 116 (1), 75-81.

Breton B., Sambroni E., Govoroun M., Weil C., 1997. Effets des steroides sur les concentrations plasmatique et hypophysaire des gonadotropines GTH I et GTH II chez la truite arc en-ciel immature, Academie des sciences Elsevier Paris. C.R. Acad. Sci. Paris Sciences de la vie, 320, 783-789.

Cauty, C.,1997. Apport d'une résine acrylique, l'unicryl à l'étude histologique et histochimique des gonades de poisson. Rev. Fr. Histotechnol, 10 (1), 65-73

Chereguini O., Cal R.M., Dreanno C., Ogier de Baulny B., Suquet M., Maisse G., 1997. Short term storage and cryopreservation of turbot sperm. Aquat. Living Resour., 10, 251-255.

Clergeau P., Burel F., 1997. The role of spatio-temporal patch connectivity at landscape level: an example in bird distribution. Landscape and Urban Planning, 38, 37-43.

Clergeau P, Sauvage A., Lemoine A., Marchand J.-P., Dubs F., Mennechez G., 1997. Quels oiseaux dans la ville ? Une étude pluridisciplinaire d'un même gradient urbain. Annales de la Recherche Urbaine, 74, 119-130.

Devaux A., Pesonen M., Monod G., 1997. Alkaline comet assay in rainbow trout hepatocytes. Toxicology in vitro, 11, 71-79.

Fauconneau B., Andre S., Chmaitilly J., Le Bail P.Y., Krieg F., Kaushik J., 1997. Control of skeletal muscle fibres and adipose cells size in the flesh of rainbow trout. J. Fish Biol., 50, 296-314.

Gomez J.M., Boujard T., Boeuf G., Solari A., Le Bail P.Y., 1997. Individual diurnal plasma profiles of thyroid hormones in rainbow trout (Oncorhynchus mykiss) in relation to cortisol GH and growth rate. Gen. Comp. Endocrinol., 107, 74-83.

Govoroun M., Huet J.C., Pernollet J.C., Breton B., 1997. Use of immobilized metal ion affinity chromatography and dye-ligand chromatography for the separation and purification of rainbow trout pituitary gonadotropins GTH I and GTH II. J. Chrom. Biomed. App., 698, 35-46.

Hogasen H.R., Prunet P., 1997. Plasma levels of thyroxine prolactin and cortisol in migrating and resident wild arctic char (Salvelinus alpinus). Can. J. Fish. Aquat. Sci., 54, 2947-2954.

Labbe C., Crowe L.M., Crowe J.H., 1997. Stability of the lipid component of trout sperm plasma membrane during freeze-thawing. Cryobiology, 34, 176-182.

Le Bail P.Y., Boeuf G., 1997. What hormones may regulate food intake in fish. Aquatic living ressources, 10, 371-379.

Mennechez G., Clergeau P. 1997. Analyse de la sélection du site de nid par l'étourneau Sturnus vulgaris au niveau du paysage. Ecologia Mediterranea, 23, 37-45.

Mugnier C., Gaignon J.L., Fostier A., 1997. In vitro synthesis of 1720 beta 21-trihydroxy-4-pregnen-3-one by ovaries of Turbot (Scophthalmus maximus L.) during oocyte maturation. Gen. Comp. Endocrinol., 107, 63-73.

Noel O, Le Bail P.Y, 1997. Does cyclicity of growth rate in rainbow trout exist ?. J.of Fish Biology, 51, 634-642.

Ogier de Baulny B., Le Vern Y., Kerboeuf D., Maisse G., 1997. Flow cytometric evaluation of mitochondrial activity and membrane integrity in fresh and cryopreserved rainbow trout (Oncorhynchus mykiss) spermatozoa. Cryobiology, 34, 141-149.

Rescan P.Y, 1997. Identification in a fish species of two Id (inhibitor of DNA binding/differentiation)-related helix-loop-helix factors expressed in the slow oxidative muscle fibers. Eur. J. Biochem, 247, 870-876.

Toguyeni A., Fauconneau B., Boujard T., Fostier A., Kuhn E.R., Mol K.A., Baroiller J.F., 1997. Feeding behaviour and food utilisation in tilapia Oreochromis niloticus: effect of sex ratio and relationship with the endocrine status. Physiology and Behavior, 62 (2), 273-279.

Articles in published proceedings


Auperin B, Goardon L, Quéméneur A, Thomas J.L, Aubin J, Valotaire C, Rouger Y, Maisse G, 1997. Effet d'un nouvel anesthésique sur differents parametres physiologiques de la truite arc-en-ciel suite a un stress lié au transport. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes (France), resumé

Baroiller J.F., Clota F., 1997. Interactions between temperature effects and genotype on Oreochromis niloticus sex determination. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds), resumé

Baroiller J.F., Guiguen Y., Iseki K., Fostier A., 1997. Physiological role of androgens on gonadal sex differentiation in two teleost fish Oncorhynchus mykiss and Oreochromis niloticus. Proceedings of the first international symposium on the biology of vertebrate sex determination . April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds.), résumé

Bennetau-Pelissero C., Kaushik S., Sumpter J., Fostier A., Le Gac F., Davail-Cuisset B., Le Menn F., 1997. Effet du soja et des phyto-oestrogènes sur la vitellogénèse et l'endocrinologie stéroidienne de la truite arc en ciel et de l' esturgeon sibérien, Approche in vivo et in vitro. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume.

Bonnet S., Haffray P., Blanc J.M., Vallee F., Vauchez C., Fauconneau B., 1997. Genetic variation in morphology carcass traits and fat content in diploid and triploid rainbow trout (Oncorhynchus mykiss) at two commercial sizes 300g and 900g. Sixth international Symposium on genetics in Aquaculture, 24-28 June 1997 Stirling (SCOTLAND), resume.

Bonnet S., Haffray P., Fauconneau B, 1997. Sex and triploidy effects on growth allometry of external morphology in rainbow trout. 5 th International Congress of Vertebrate Morphology 12-17 July 1997 Bristol (U.K). J. Morphology, 232 (3) 237.

Breton B., Roelants Y., Ollevier F., Epler P., Mikolajczyk T., 1997. Oral delivery systems in teleost fish for peptides and polypeptides : exemple for gonadoliberin (GnRH) and growth hormone (GH). International workshop : aquaculture application of controlled drug and vaccine delivery, communication.

Breton B., Gillet C., Jalabert B., 1997. Relations entre la température le blocage de la maturation ovocytaire et le fonctionnement de l'axe gonadotrope chez l'omble chevalier. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume

Breton B., Roelants I., Mikolajczyk T., Epler P., Ollevier F., 1997. Oral delivery systems in Teleost fish for peptides and polypeptides: example for gonadoliberin (GnRH) and growth hormone (GH). International workshop : Aquaculture application of controlled drug and vaccine delivery 21-23 may Villa Manin di Passariano (Italie) resume

Canario A.V.M., Pavlidis M., Mylonas C., Breton B., Kentouri M., Divanach P., 1997. Hormonal spawning induction of Pagrus pagrus. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Ao-t 1997 Barcelone (Espagne), resume.

Clergeau P., Mennechez G., Savard Jpl & Falardeau G., 1997. Biological exchanges between rural and urban areas: bird diversity and landscape structure. 25th congress of IALE, " Landscape Ecology: things to do ", Amsterdam, october 1997.

Duval H., Elies G., Pellerin I., Chesnel F., Le Bail P.Y., Boeuf G., Boujard D. D., 1997. L'IGF-I recombinant de turbot (Scophthalmus maximus): production purification et caractérisation. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Fauconneau B., Bobe J., Pereira V., Vallod D., 1997. External morphology of common carp at commercial size and its relationship with dressing yield. 5 th International Congress of Vertebrate morphology 12-17 July 1997 Bristol (U.K). J. of Morphology, 232 (3), 253. resume

Fauconneau B., Paboeuf G., Le Bail P.Y., Guttierez J., Castejon C., 1997. Preliminary data on binding and effects of IGFs on in vitro muscle satellite cells in rainbow trout. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne) resume

Gillet C., Rideau I., Breton B., 1997. Effets du conditionnement en jours longs sur la sécrétion gonadotrope (GtH2) et sur la période de reproduction chez l'omble chevalier (Salvelinus alpinus L). 1er Colloque IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (FRANCE), resume

Guiguen Y., Ricordel M.J., Fostier A., 1997. Involvment of estrogens in the process of sex differentiation in rainbow trout Oncorhynchus mykiss : in vivo treatments, aromatase activity and aromatase gene expression. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Ed.), resume

Herraez M.P., Labbe C., 1997. Sperm membrane regionalization in rainbow trout : a lectin binding study. CRYO'97 34th Annual of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 370 resume

Keith P., Jegu M., Le Bail P.Y., 1997. Inventories and distribution of french guiana fishes/. 9 th annual meeting of neotropical ichtyological association 20-26 juillet 1997 Porto Alegro Brasil, affiche.

Latonnelle K., Maisse G., Labbe C., 1997. Lipid modification of trout sperm plasma membrane in vitro : effect on membrane stability after cryopreservation . Cryo'97 34 th meeting of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 371 affiche

Leguen I., Prunet P., 1997. Effet d'un choc hyposmotique sur la régulation du volume et sur la mobilisation du calcium intracellulaire des cellules branchiales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Leveroni Calvi S., Maisse G., 1997. Cryopreservation of rainbow trout blastomeres. Cryo'97 34th meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 340 resume

Linard B., Breton B., Bailhache T., Mananos E., Govoroun M., Kah O., Jego P., Saligaut C., 1997. Contr"le dopaminergique central de la libération des hormones gonadotropes (GtH1, GtH2) chez la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Loir M., 1997. Etude de l'effet de xenobiotiques sur la prolifération des spermatogonides de truite présentes dans des cultures de cellules testiculaires totales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G. Billard R., Cosson J., Labbe C., Loir M., Le Gac F., 1997. Influence du maintien en mer des mâles de saumon atlantique (Salmo salar) pendant la période de reproduction sur la qualité du sperme. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G., Noel O, Breton B., Goardon L., Jalabert B., Le Bail P.Y., Mourot B., 1997. Influence d'une période d'éclairement continu sur la première maturation sexuelle de la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Massa F., Prunet P., Grimaldi C., Baglinière J.L., 1997. Premiers éléments de caractérisation de l'impact des sédiments sur la survie embryo-larvaire de la truite (Salmo trutta) en milieu naturel, Etude sur deux petits ruisseaux de Basse Normandie. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Ogier de Beaulny B., Le Vern Y., Labbe C., Maisse G., 1997. Cryopreservation of fish semen : why does the most effective cryoprotectant differ from one species to another. Cryo'97 34th annual meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 342 resume

Perez-Sanchez J, Le Bail P.Y, 1997. Endocrine and metabolic parameters as markers of growth performance and flesh quality. Third International Symposium on Research for Aquaculture fundamental and applied aspects 24-27 aout 1997 Barcelone (Espagne), p 81 resume

Rouger Y., Aubin J., Breton B., Fauconneau B., Fostier A., Le Bail P.Y., Loir M., Prunet P., Maisse G., 1997. Stress induit par le transport chez la truite Arc-en-ciel (Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes (France), resume

Saligaut C., Linard B., Breton B., Anglade I, Bailhache T, Kah O, Jego P, 1997. Brain aminergic systems in salmonids and other teleosts in relation with steroid feedback and gonadotropin release. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne), resume

Sandra O., Lerouzic P., Cauty C., Prunet P., 1997. Influence de la salinité sur l'expression du recepteur de la prolactine(TIR-PRL) dans les organes osmorégulateurs chez le tilapia (Oreochromis niloticus). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Valente L., Saglio P., Fauconneau B., 1997. Ontogénèse du comportement alimentaire chez deux souches à croissance lente et rapide de truite arc-en-ciel. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes(France), resume


Reviews

Chapter in a book


Clergeau P. La gestion des oiseaux à risques in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " INRA Ed., Coll. "Un point sur", 7-24.

Clergeau P. Evolution numérique et comportementale des étourneaux; problèmes agricoles in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 27-42.

Clergeau P.,Mennechez G. L'étourneau sansonnet dans les villes in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 85-100

Clergeau P. Le concept de gestion intégrée appliqué aux oiseaux in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations: " : INRA Ed., Coll. "Un point sur", 363-374

Flammarion P., Garric J., Monod G., 1997. Utilisation de l'activité enzymatique EROD chez les poissons des hydrosystèmes continentaux, Lagadic L., Caquet T., Amaird J.C., Ramade F in "utilisation des biomarqueurs pour la surveillance de la qualité de l'environnement ", 57-75.

Hochereau-De-Reviers M.T., Loir M., De Reviers M., 1997. Controle gonadotrope des cellules somatiques et de la spermatogenèse des vertébrés, Combarnous Y et Volland-Nail (Eds) Editions INRA. in " Les Gonadotropines ", 255-267.

Lagadic L., Caquet T., Amiard J.C., 1997. Intéret d'une approche multiparamétrique pour le suivi de la qualité de l'environnement, ( Lagadic L., Caquet T., Amiard J.C., Ramade F.Eds.). in " Biomarqueurs en ecotoxicologie ", 393-401.

Lagadic L., Caquet T., Amiard J.C., 1997. Biomarqueurs en ecotoxicologie : principes et définitions, Lagadic L., Caquet T., Amiard J.C., Ramade F.(Eds.).in " Biomarqueurs en ecotoxicologie ", 1-9.

Le Gal Y., Lagadic L., Le Bras S., Caquet T., 1997. Charge énergétique en adénylates (CEA) et autres biomarqueurs associés au métabolisme énergétique, MASSON in " Biomarqueurs en écotoxicologie ", 242-285.

Monod G., 1997. L'induction du cytochrome P4501A1, (Lagadic L., Caquet T., Amaird J.C., Ramade F (eds.).. " Biomarqueurs en ecotoxicologie-Aspects fondamentaux ", 33-54.

Pascal M., 1997. Echec à la colonisation : ce n'est pas faute d'avoir essayé !. In : Îles, vivre entre ciel et mer. Exposition Paris " D'îles en îles ", MNHN & Nathan Paris Ed. , 27.

Pascal M., Pisanu B., Beaucournu J.-C. 1997. Faunes parasitaires (Siphonaptères, Helminthes) des îles de la Mer d'Iroise. Colloque CEFE - CNRS Montpellier les 4 & 5 XII 1997 : 8 pp, 6 cartes, 2 tableaux, 1 figure

Rether B., Masfaraud J.F., Keith G., Devaux A., Monod G., 1997. Biomarqueurs de génotoxicité chez les végétaux et les animaux, (Lagadic L., Caquet T. Amiard J.C., Ramade F Eds.). Biomarqueurs en ecotoxicologie-Aspects fondamentaux, 185-208.

Book


Boujard T., Pascal M., Meunier F., P.-Y. Le Bail, 1997 : Poissons de Guyane - Guide écologique de l'Approuague et de la réserve des Nouragues. Edition INRA Paris : 219 pp.

Published proceedings


Alhassane M., Mikolasek O., Lazard J., Baroiller J.F., 1997. Intensification of nile tilapia oreochromis niloticus fry production in the african sahel - example of niger J.F.. Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), 294-304.

Amoros C., Uzbekova S., Hourrout D., Hew C.L., Prunet P., 1997. Transgenic rainbow trout as a model to study cell-specific gene expression driven by a salmon Prolactin promotor. Proceedings of the XIII th International Congress of Comparative Endocrinology, 17-21 Novembre 1997, Yokohama (Japon), MONDUZZI EDITORE. Advances in Comparative Endocrinology, 963-968.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of social interactions and confinement stress on circulating levels of cortisol growth hormone and two prolactins in fresh water-adapted tilapia (Orecochromis niloticus). In Proceedings of the fourth International symposium on Tilapia in aquaculture 9-12 November 1997 Orlando (USA), K. Fitzsimmons (Ed.), 653-661.

Baroiller, J.F. 1997. Modalités des déterminismes du sexe chez les poissons téléostéens . Proceedings of the fourth workshop on sex determination and gonadal sex differentiation, 9-10 octobre 1997, Rennes (France). In. J. Dev. Biol., 14-15.

Baroiller J.F., Desprez D., Carteret Y., Tacon P., Hoareau M.C., Melard C., Jalabert B., 1997. Influence of environmental and social factors on the reproductive efficiency in three tilapia species Oreochromis niloticus, O.aureus and the red tilapia (red florida strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 238-252.

Desprez D., Briand C., Hoareau M.C., Malard C., Bosc P., Baroiller J.F., 1997. Sex determinism in red tilapia ("Red Florida" strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), F. Fitzsimmons (Ed.), 760-771.

Desprez D., Geraz E., Hoareau M.C., Melard C., Bosc P., Baroiller J.F., 1997. Optimisation of hormonal sex-reversal in red-tilapia ("Red Florida" strain) through the use of a natural androgen. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 719-728.

Fauconneau B., Toguyeni A., Fostier A., Le Bail P.Y., Baroiller J.F., 1997. New insigths on feedings and growth of tilapia (Oreochromis niloticus). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA) Orlando Florida.USA, K. Fitzsimmons (Ed.), 151-168.

Guiguen Y., Baroiller J.F., Ricordel M.J., Iseki K., Jalabert B., Fostier A., 1997. Stéroidogénèse et différentiation sexuelle chez deux modèles de poissons : la truite arc-en-ciel Oncorhynchus mykiss et le tilapia Oreochromis noloticus. Proceedings of the fourth workshop on sex determination and gonadal sex differentiation 9-10 octobre 1997 Rennes (France). Int. J. Dev. Biol., 12-13.

Le Bail P.Y., 1997. Hormone and food intake in fish. First cost 827 workshop on voluntary food intake in fish 4 april 1997 Aberdeen UK, presentation

Lefevre, Fl., 1997. La qualite de la chair des poissons d'élevage. VII congresso de zootecnia, 25,26,27 de setembro, 1997, Braganca. Producao, qualidade e ambiente, resume

Toguyeni A. Fauconneau B. Melard C., Fostier A., Lazard J., Barras E., Kuhn E.R. Van der Geyten S., Baroiller J.F., 1997. Sexual dimorphism studies in tilapia using two pure species Oreochromis niloticus and Sarotherodon melanotheron and their inter-generic hybrids (S. melanotheranon x O. niloticus and S. melanotheron x O. niloticus ).. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida(USA), K. Fitzsimmons (Ed.), 200-212.

Toguyeni A., Fauconneau B., Fostier A., Abucay J., Mair G.C., Baroiller J.F., 1997. Influence of genotype and social behaviour on growth performance in tilapia O. niloticus. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida (USA), K. Fitzsimmons (Ed.). Int. J. Dev. Biol., 141-150.


--------------------------------------------------------------------------------


Transfert publications


--------------------------------------------------------------------------------


Personal communications

Journal articles without reviewing comitee


Clergeau P., 1997. De l'étourneau des champs à l'étourneau des villes. INRA mensuel 90, 8-9.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 1ere partie : les îles, des sites privilégiés. RESEAU, 130, 3.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 2eme partie : L'éradication du Surmulot. RESEAU, 131, 3.

Pascal M., 1997. Dératisation de Trielen. Ar Skreo (Bul. Amicale Molenaise), 56, 14-18.

Repports (including licences, expert evaluation)


Roelants I., Breton B., Mikolajczyk T., Ollevier , 1997. Oral delivery from having a high absorption efficiency and method for making the same., brevet.


Other writtings supervised by the author

Thesis


Leguen I., 1997, Mobilisation du calcium et des canaux mécano sensibles dans la régulation du volume des cellules épithéliales : lignée cellulaire de rein d'amphibien (cellule A6) et culture primaire de branchies de poissons. THESE DE DOCTORAT DE L'UNIVERSITE DE RENNES 1, Sciences Biologiques.

Lefevre F., 1997. Propriétés thermogélifiantes des myofibrilles et texture de la chair de truite. THESE DE DOCTORAT DE L'UNIVERSITE BLAISE PASCAL.

Ogier de Beaulny B., 1997. Cryoconservation du sperme de poissons (truite arc en ciel Oncorhynchus mykiss, Turbot (Scophtalmus maximus), Silure glane (Silurus Glanis) et Tilapia (Oreochromis niloticus).Evaluation des dommages cellulaires, amélioration de la technique de congélation, perméabilité membranaire aux cryoprotecteurs. THESE DE DOCTORAT DE L'ENSAR.

Sandra O., 1997. Caractérisation du récepteur de la prolactine (R-PRL) chez la truite arc-en-ciel (Oncorhynchus mykiss) et le Tilapia (Oreochromis niloticus) : clonage d'un ADN complémentaire codant pour le R-PRL et expression in vivo du gène codant pour ce R-PRL. THESE DE DOCTORAT DE L'UNIVERSITE PARIS VI.

Dissertations


Bobe J., 1997. Effet de la température sur le développement musculaire précoce des poissons. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bobe J, 1997. Effet de la température sur le développement musculaire précoce de la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Le collagène de poisson et son rôle dans la qualité de la chair. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Collagène texture de la chair de truite fario (Salmo trutta) : effet de vitesse de croissance et de la vitamine C. MEMOIRE DE DEA Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Colombe L, 1997. Clonage et caractérisation de récepteurs stéroidiens chez la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE présenté pour l'obtention du Diplôme d'Ingénieur C.N.A.M en Biologie en vue des Applications

Guillou Y., Manifacier G., 1997. Impact du Ragondin et de la faune mammalienne fouisseuse sur les levées de la Loire en Maine-et-Loire Elaboration d'outils destinés l'expertise de l'impact du comportement fouisseur de mammifères sauvages sur un ouvrage d'art : la levée de la Loire. Mémoire d'Ingénieur ENITHP Angers, 52 pp + 58pp annexes

Latonnelle K., 1997. Rôles et effets du cholestérol membranaire et différentes méthodes pour modifier le cholestérol membranaire. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Latonnelle K, 1997. Modifications in vitro du rapport molaire cholestérol/phospholipides des spermatozoides et des erythrocytes de truite arc-en -ciel (Oncorhynchus mykiss) , Mises au point de techniques d'évaluation des propriétés mécaniques et biophysiques de la membrane plasmique des spermatozoides de truite. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Les gonadotropines et le contrôle gonadotrope de la reproduction des poissons. (facteurs de régulations endogènes). RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Nouvelles données sur la régulation de la fonction gonadotrope hypophysaire chez la truite arc-en-ciel (Oncorhynchus mykiss) par mesure spécifique des GthI et GthII. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

_______________________
" ik ben een 'hij' en heet Calvobbes "



Loedertje


Door Loedertje - maandag 15 oktober 2001 00:38

--------------------------------------------------------------------------------
I was almost shocked at reading this article in Norways largest national
newspaper (Dagbladet) today, but then, I've lived here for over thirty
years, so I've become accustomed to immediate support for the USA followed
by a stab in the back.
This politician is the equivalent of a congressman. His name is Olav Gunnar
Ballo, and his party is the Socialistic Left (Sosialistisk Venstre). His
party has supported his views, and they hold sway over 13% of the Norwegian
Congress.

I have nothing against his party, or at least I did'nt, in fact I kind of
liked them during the election when they really took a lot more votes than
expected.

He says that Americans are Satans murderers (no, he's not a muslim...), and
that the USA is a terrorist nation who have commited terrorist acts against
the world for decades! Furthermore, he says Americans have NO morals, that
they are now murdering hundreds of innocents and dropping care packaged
deliberately into mindfields! He also calls all countries and people who
support the USA hypocrites.

I can't go on. It's too much!

I ask EVERYONE who reads this to PLEASE!!!!! send him a short note and let
him know how you feel about his statements. I allready have, but I don't
think one e-mail will get his attention.

send it to sv.postmottak@stortinget.no

Mark it Olav Gunnar Ballo, or TO: Olav Gunnar Ballo, or else it will be
perceived as a message to the whole party (which might not be such a bad
Idea, either).

In cases like this, it doesn't cost much to be a patriot - just a short
email...

This is NOT a hoax!

I only ask what you are all already prepared to give: your reaction towards
anyone who thinks Americans don't have the right to defend themselves.


Sincerely,
M. Walsh
An American in Norway



Loedertje


Door Loedertje - maandag 15 oktober 2001 00:40

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op maandag 15 oktober 2001 00:34 schreef calvobbes het volgende:

Zullen we gaan slapen en dit topic morgen volplakken?


--------------------------------------------------------------------------------


Is goed, ben ook moe


calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:42

--------------------------------------------------------------------------------
IV.1 Spatial Patterns and Biodiversity - James Quinn, Alan Jassby, Peter Moyle
Goal:

To manage a large variety of GIS and biodiversity databases. This allows for a number of unique analyses that can be closely coupled with other modeling and ecosystem projects to help determine such things as species composition, habitat availability, population estimates, risks of toxic substances to wildlife, and non-point source loading to rivers.

Current Status:

The Cores computer center, created de novo at the beginning of the grant, has developed into a statewide center for GIS and environmental database design and dissemination. Work done in the core has proven of considerable value to a number of agencies, and the Core has attracted over 40 additional grants and contracts to extend Center work, including nine from EPA Region IX. In a cooperative agreement with the California EPA, we are developing a database of known toxic effects of chemical stressors on California vertebrate species. In addition, the Center houses and provides Internet access to biodiversity data covering a wide variety of protected lands, including state and national parks, UNESCO Biosphere Reserves, and Nature Conservancy preserves, and is taking the lead on developing Department of the Interior strategies for international data exchange on non-indigenous species.

See http://www.nbii.gov/iabin/meetings/invs_fr.htm and http://www.nbii.gov/iabin/meetings/tech_fr.htm.

Geographic Information System (GIS). A sophisticated GIS facility, supporting 11 graduate students, with 8 GIS-specialist staff, about 20 ArcInfo workstations, and a variety of peripheral equipment, is now well established. The facility has about 120 statewide GIS layers of environmental themes, especially land forms, land use, biodiversity and water quality, mostly online, and has become the most active California university GIS program in interagency GIS development (under the aegis of the California Biodiversity Council, the California Geographic Information Association, and the National Biological Information Infrastructure) . The Center is the major developer and repository in the state for the National Hydrography Database (the successor to the EPA River Reach Files), the EPA Waterbody system, and other systems used by EPA and collaborating state agencies in managing water quality, water supply, biodiversity issues, and ecological risk assessment. Many of the techniques developed by the Center and its collaborators in the Department of Fish and Game have now been adopted for national implementation.

Clean Water Act Repports. The Center recently completed a project with EPA Region IX to update, modernize, and disseminate the water body reports required under Sections 303(d) and 305(b) of the Clean Water Act for California. We installed the new ArcView-based system, Geo-WBS, in the Regional Water Quality Control Boards in March, and trained analysts to use the GIS to evaluate beneficial uses, sources of impairment, and TMDL issues. The State Water Board is now using the software to prepare Clean Water Act 303(d) (non-point source pollution) reports, and the results will be on-line for professional and public access. We now have new cooperative programs with Region 9, the California Department of Forestry, the California Department of Transportation and the SWRCB to make their non-point-source and stormwater assessment data interoperable.

World Wide Web. The Core facility has established a World Wide Web server to disseminate data and model results to collaborators, managers, and the general public. The Internet activities have been incorporated into a number of electronic data access initiatives, including CERES in California, and the National Biological Information Infrastructure and the Government Information Locator Service at the national level, and the Smithsonian and the UNESCO Man and the Biosphere program internationally.

Future Plans:

As a result of the variety of GIS and biodiversity databases managed by the Core, we have the ability to do a number of unique analyses, which will be closely coupled with and complementary to the other Core models and the ecosystem projects.

While occurrences of both indicator taxa and rare and endangered species are increasingly critical to environmental policy, most areas have not been adequately surveyed to document occurrences and populations of important species. As a result, Wildlife Habitat Relations (WHR) and Gap Analysis models are increasingly being used to infer the presence of species of concern on at least 90% of the landscape where biological surveys are lacking or inadequate. We have submitted a manuscript testing these predictions against either existing data on species in protected areas, or with respect to landscape characteristics, including the size or degree of isolation of "patches" of suitable habitat for rare species. Standard models prove very useful for large conservation areas and "charismatic" taxa such as large mammals and birds, and are in need of revision for urban fringe, riparian, and patchy habitats, and for "less popular" taxa.
In California, Wildlife Habitat Relations, Gap Analysis, and comparable models have only been developed and tested for terrestrial vertebrates. We believe we can develop formal models following the work of Moyle, Ellison, and colleagues, which will accurately predict the species composition and critical habitats for fish, amphibians, and some indicator invertebrates, in rivers and streams that have not been surveyed. Our growing databases of aquatic and riparian species occurrences (some 220,000 records to date) will allow us to both estimate the parameters of an "aquatic WHR" model and to test its accuracy. (Preliminary studies in three northern California watersheds suggest that the accuracy of pilot analyses exceeds 80%). We have just received funding to extensively test the results of the first generation of fish occurrence models in the Cosumnes River Watershed (the last major undammed river draining the Sierra Nevada into San Francisco Bay.)
Invasive species are increasingly being recognized as threats to biodiversity and ecosystem processes. The Core is coordinating data issues in California on the distributions of invasive plants and non-native fish. We have also just begun a partnership with the Department of Interior to develop strategies for assessing invasive species issues in the Western Hemisphere under the Inter-Americas Biodiversity Information Network (IABIN), an initiative begun under the Summit of the Americas, and are awaiting World Bank funds to develop a prototype for a data system. We recently organized an international workshop to plan this initiative at the National Center for Ecological Analysis and Synthesis, and will conduct two follow-up international workshops in the winter of 2000.
We recently completed a second phase of a cooperative study with CalEPA to develop a database and management models for risk analyses of the effects of toxic substances on California wildlife population responses. These have the potential to couple the exposure and effects data with the GIS-based distributional data described above, potentially allowing managers to identify risk elements and potential wildlife responses at particular sites (using the biodiversity databases and models) or for particular releases.
Understanding the impact of land use patterns on runoff has been a major uncertainty in constructing mass balance analyses at the watershed level for a variety of important waterborne constituents, including nitrogen, some pesticides and metals, and sediment load. These, in turn, are thought to be the major causes (other than dams) for declines in anadromous fish -- declines which have driven much of the habitat conservation planning efforts and TMDL (total maximum daily load) actions in Northern California. We are working with investigators in other projects (Mount, Schladow, Fogg) to integrate our spatial data with mechanistic models. We have completed a year of field work to test these assessments in two ambitious watershed-scale field tests, one in the Navarro River watershed (north coast, funded by CalTrans) and the other in the Cosumnes watershed (Sierra Nevada and Delta, funded by the Packard Foundation and CALFED). Data analysis for the first seasons is still underway.
These efforts are tightly interwoven with other Center projects. The runoff modeling provides inputs for the toxicological studies in the Clear Lake and Bay-Delta projects. Conversely, the chemical analysis of spatial sources of sediment load in the Clear Lake basin (Project IV.2) permits a refinement of the geography of non-point source inputs into the Sacramento River and Delta system. On another front, biomarker data from several other projects provides the most powerful test of the models. The predicted spatial extent of species effects studied in most of the Center projects can be mapped using the biodiversity GIS layers. Land cover and land forms affect all of the transport processes studied in both the Decision Support and the Fate and Transport Cores, and transport in many cases is essential to predicting species occurrences.

_______________________
" ik ben een 'hij' en heet Calvobbes "



calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:46

--------------------------------------------------------------------------------
* laatste, hierna *
Privacy Act


CHAPTER P-21

An Act to extend the present laws of Canada that protect the privacy of individuals and that provide individuals with a right of access to personal information about themselves

SHORT TITLE

Short title
1. This Act may be cited as the Privacy Act.

1980-81-82-83, c. 111, Sch. II "1".

PURPOSE OF ACT

Purpose
2. The purpose of this Act is to extend the present laws of Canada that protect the privacy of individuals with respect to personal information about themselves held by a government institution and that provide individuals with a right of access to that information.

1980-81-82-83, c. 111, Sch. II "2".

INTERPRETATION

Definitions
3. In this Act,

"administrative purpose" «fins administratives»
"administrative purpose", in relation to the use of personal information about an individual, means the use of that information in a decision making process that directly affects that individual;

"alternative format" « support de substitution »
"alternative format", with respect to personal information, means a format that allows a person with a sensory disability to read or listen to the personal information;

"Court" «Cour»
"Court" means the Federal Court--Trial Division;

"designated Minister" «ministre désigné»
"designated Minister", in relation to any provision of this Act, means such member of the Queen's Privy Council for Canada as is designated by the Governor in Council as the Minister for the purposes of that provision;

"government institution" «institution fédérale»
"government institution" means any department or ministry of state of the Government of Canada listed in the schedule or any body or office listed in the schedule;

"head" «responsable d'institution fédérale»
"head", in respect of a government institution, means

(a) in the case of a department or ministry of state, the member of the Queen's Privy Council for Canada presiding over that institution, or

(b) in any other case, the person designated by order in council pursuant to this paragraph and for the purposes of this Act to be the head of that institution;

"personal information" «renseignements personnels»
"personal information" means information about an identifiable individual that is recorded in any form including, without restricting the generality of the foregoing,

(a) information relating to the race, national or ethnic origin, colour, religion, age or marital status of the individual,

(b) information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved,

(c) any identifying number, symbol or other particular assigned to the individual,

(d) the address, fingerprints or blood type of the individual,

(e) the personal opinions or views of the individual except where they are about another individual or about a proposal for a grant, an award or a prize to be made to another individual by a government institution or a part of a government institution specified in the regulations,

(f) correspondence sent to a government institution by the individual that is implicitly or explicitly of a private or confidential nature, and replies to such correspondence that would reveal the contents of the original correspondence,

(g) the views or opinions of another individual about the individual,

(h) the views or opinions of another individual about a proposal for a grant, an award or a prize to be made to the individual by an institution or a part of an institution referred to in paragraph (e), but excluding the name of the other individual where it appears with the views or opinions of the other individual, and

(i) the name of the individual where it appears with other personal information relating to the individual or where the disclosure of the name itself would reveal information about the individual,

but, for the purposes of sections 7, 8 and 26 and section 19 of the Access to Information Act, does not include

(j) information about an individual who is or was an officer or employee of a government institution that relates to the position or functions of the individual including,

(i) the fact that the individual is or was an officer or employee of the government institution,

(ii) the title, business address and telephone number of the individual,

(iii) the classification, salary range and responsibilities of the position held by the individual,

(iv) the name of the individual on a document prepared by the individual in the course of employment, and

(v) the personal opinions or views of the individual given in the course of employment,

(k) information about an individual who is or was performing services under contract for a government institution that relates to the services performed, including the terms of the contract, the name of the individual and the opinions or views of the individual given in the course of the performance of those services,

(l) information relating to any discretionary benefit of a financial nature, including the granting of a licence or permit, conferred on an individual, including the name of the individual and the exact nature of the benefit, and

(m) information about an individual who has been dead for more than twenty years;

"personal information bank" «fichier de renseignements personnels»
"personal information bank" means a collection or grouping of personal information described in section 10;

"Privacy Commissioner" «Commissaire à la protection de la vie privée»
"Privacy Commissioner" means the Commissioner appointed under section 53;

"sensory disability" « déficience sensorielle »
"sensory disability" means a disability that relates to sight or hearing.

R.S., 1985, c. P-21, s. 3; 1992, c. 1, s. 144(F), c. 21, s. 34.

COLLECTION, RETENTION AND DISPOSAL OF PERSONAL INFORMATION

Collection of personal information
4. No personal information shall be collected by a government institution unless it relates directly to an operating program or activity of the institution.

1980-81-82-83, c. 111, Sch. II "4".

Personal information to be collected directly
5. (1) A government institution shall, wherever possible, collect personal information that is intended to be used for an administrative purpose directly from the individual to whom it relates except where the individual authorizes otherwise or where personal information may be disclosed to the institution under subsection 8(2).

Individual to be informed of purpose
(2) A government institution shall inform any individual from whom the institution collects personal information about the individual of the purpose for which the information is being collected.

Exception
(3) Subsections (1) and (2) do not apply where compliance therewith might

(a) result in the collection of inaccurate information; or

(b) defeat the purpose or prejudice the use for which information is collected.

1980-81-82-83, c. 111, Sch. II "5".

Retention of personal information used for an administrative purpose
6. (1) Personal information that has been used by a government institution for an administrative purpose shall be retained by the institution for such period of time after it is so used as may be prescribed by regulation in order to ensure that the individual to whom it relates has a reasonable opportunity to obtain access to the information.

Accuracy of personal information
(2) A government institution shall take all reasonable steps to ensure that personal information that is used for an administrative purpose by the institution is as accurate, up-to-date and complete as possible.

Disposal of personal information
(3) A government institution shall dispose of personal information under the control of the institution in accordance with the regulations and in accordance with any directives or guidelines issued by the designated minister in relation to the disposal of that information.

1980-81-82-83, c. 111, Sch. II "6".

PROTECTION OF PERSONAL INFORMATION

Use of personal information
7. Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be used by the institution except

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose; or

(b) for a purpose for which the information may be disclosed to the institution under subsection 8(2).

1980-81-82-83, c. 111, Sch. II "7".

Disclosure of personal information
8. (1) Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be disclosed by the institution except in accordance with this section.

Where personal information may be disclosed
(2) Subject to any other Act of Parliament, personal information under the control of a government institution may be disclosed

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose;

(b) for any purpose in accordance with any Act of Parliament or any regulation made thereunder that authorizes its disclosure;

(c) for the purpose of complying with a subpoena or warrant issued or order made by a court, person or body with jurisdiction to compel the production of information or for the purpose of complying with rules of court relating to the production of information;

(d) to the Attorney General of Canada for use in legal proceedings involving the Crown in right of Canada or the Government of Canada;

(e) to an investigative body specified in the regulations, on the written request of the body, for the purpose of enforcing any law of Canada or a province or carrying out a lawful investigation, if the request specifies the purpose and describes the information to be disclosed;

(f) under an agreement or arrangement between the Government of Canada or an institution thereof and the government of a province, the government of a foreign state, an international organization of states or an international organization established by the governments of states, or any institution of any such government or organization, for the purpose of administering or enforcing any law or carrying out a lawful investigation;

(g) to a member of Parliament for the purpose of assisting the individual to whom the information relates in resolving a problem;

(h) to

Welcome, to the desert, of the real
  maandag 15 oktober 2001 @ 02:20:19 #99
12891 nomis
There can be only one
pi_1903187
He! dat is lang niet alles!
Welcome, to the desert, of the real
pi_1903191
quote:
Op maandag 15 oktober 2001 02:20 schreef nomis het volgende:
He! dat is lang niet alles!
Tja, aan alles komt een eind
:{
pi_1903193
quote:
Op maandag 15 oktober 2001 02:19 schreef nomis het volgende:
DE OVERTREFFENDE POST!






index / Onzin voor je leven! / Het grote copy en paste topic


Geplaatst door Topic: Het grote copy en paste topic Dit onderwerp is 4 pagina's lang: 1 2 3 4


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:23

--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Friedrich Nietsche asks us not to read his books "like a looting soldiers," choosing appealing passages at random from his aphorisms; instead, we are to read ourselves into "a passionate mood" in order to perceive the short rays of light that will lead us onward and upward. .


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:26

--------------------------------------------------------------------------------
400 System Capacity Exceeded (Typhoon v1.2.3)
Configuratie:
Account: news
Server: news
Protocol: NNTP
Poort: 119
Beveiligd(SSL): 0
Foutnummer: 400
CODE: 800ccca0


kut



Loedertje


Door Loedertje - maandag 15 oktober 2001 00:28

--------------------------------------------------------------------------------
Why is noone discussing the war? Any been mailed powder yet?


Tackleberry
F1 - love it & live it!

Door Tackleberry - maandag 15 oktober 2001 00:28

--------------------------------------------------------------------------------
CUB meeting DWHN style

_______________________
Het leven is wat je gebeurt ... terwijl je andere plannen maakt.


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:30

--------------------------------------------------------------------------------
The hijack-bombings of September 11 were politically criminal attacks on
innocent civilians. Whoever perpetrated this crime must be condemned as
enemies of the American and international working class. The fact that no
one has claimed responsibility only underscores the profoundly reactionary
character of these attacks.
But while the events of September 11 have served as the catalyst for the
assault on Afghanistan, the cause is far deeper. The nature of this or any
war, its progressive or reactionary character, is determined not by the
immediate events that preceded it, but rather by the class structures,
economic foundations and international roles of the states that are
involved. From this decisive standpoint, the present action by the United
States is an imperialist war.

The US government initiated the war in pursuit of far-reaching international
interests of the American ruling elite. What is the main purpose of the war?
The collapse of the Soviet Union a decade ago created a political vacuum in
Central Asia, which is home to the second largest deposit of proven reserves
of petroleum and natural gas in the world.

The Caspian Sea region, to which Afghanistan provides strategic access,
harbors approximately 270 billion barrels of oil, some 20 percent of the
world's proven reserves. It also contains 665 trillion cubic feet of natural
gas, approximately one-eighth of the planet's gas reserves.

These critical resources are located in the world's most politically
unstable region. By attacking Afghanistan, setting up a client regime and
moving vast military forces into the region, the US aims to establish a new
political framework within which it will exert hegemonic control.

These are the real considerations that motivate the present war. The
official version, that the entire American military has been mobilized
because of one individual, Osama bin Laden, is ludicrous. Bin Laden's brand
of ultra-nationalist and religious obscurantist politics is utterly
reactionary, a fact that is underscored by his glorification of the
destruction of the World Trade Center and murder of nearly 6,000 civilians.
But the US government's depiction of bin Laden as an evil demiurge serves a
cynical purpose-to conceal the actual aims and significance of the present
war.

The demonization of bin Laden is of a piece with the modus operandi of every
war waged by the US over the past two decades, in each of which-whether
against the Panamanian "drug lord" Manuel Noriega, the Somalian "war lord"
Mohamed Farrah Aidid, or the modern-day "Hitlers" Saddam Hussein and
Slobodan Milosevic-the American government and the media have sought to
manipulate public opinion by portraying the targeted leader as the
personification of evil.

In an October 8 op-ed column in the New York Times, Fawaz A. Gerges, a
professor at Sarah Lawrence College, pointed to the real aims that motivate
the US war drive. Describing a conference of Arab and Muslim organizations
held a week ago in Beirut, Gerges wrote:

"Most participants claimed that the United States aims at far more than
destroying Osama bin Laden's Al Qaeda organization and toppling the Taliban
regime. These representatives of the Muslim world were almost unanimously
suspicious of America's intentions, believing that the United States has an
overarching strategy which includes control of the oil and gas resources in
Central Asia, encroachment on Chinese and Russian spheres of influence,
destruction of the Iraqi regime, and consolidation of America's grip on the
oil-producing Persian Gulf regimes.

"Many Muslims suspected the Bush administration of hoping to exploit this
tragedy to settle old scores and assert American hegemony in the world."

These suspicions are entirely legitimate. Were the US to oust the Taliban,
capture or kill bin Laden and wipe out what Washington calls his terrorist
training camps, the realization of these aims would not be followed by the
withdrawal of American forces. Rather, the outcome would be the permanent
placement of US military forces to establish the US as the exclusive arbiter
of the region's natural resources. In these strategic aims lie the seeds of
future and even more bloody conflicts.

This warning is substantiated by a review of recent history. America's wars
of the past 20 years have invariably arisen from the consequences of
previous US policies. There is a chain of continuity, in which yesterday's
US ally has become today's enemy.

The list includes the one-time CIA asset Noriega, the former Persian Gulf
ally Saddam Hussein, and yesterday's American protégé Milosevic. Bin Laden
and the Taliban are the latest in the chain of US assets transformed into
targets for destruction.

In the case of Iraq, the US supported Saddam Hussein in the 1980s as an ally
against the Khomeini regime in Iran. But when the Iraqi regime threatened US
oil interests in the Persian Gulf, Saddam Hussein was transformed into a
demon and war was launched against Baghdad. The main purpose of the Gulf War
was to establish a permanent US military presence in the Persian Gulf, a
presence that remains in place more than a decade later.

Even more tragic is the outcome of US sponsorship of bin Laden and the
Taliban. They are products of the US policy, begun in the late 1970s and
continued throughout the 1980s, of inciting Islamic fundamentalism to weaken
the Soviet Union and undermine its influence in Central Asia. Bin Laden and
other Islamic fundamentalists were recruited by the CIA to wage war against
the USSR and destabilize Central Asia.

In the chaos and mass destruction that followed, the Taliban was helped
along and brought to power with the blessings of the American government.
Those who make US policy believed the Taliban would be useful in stabilizing
Afghanistan after nearly two decades of civil war.

American policy-makers saw in this ultra-reactionary sect an instrument for
furthering US aims in the Caspian basin and Persian Gulf, and placing
increasing pressure on China and Russia. If, as the Bush administration
claims, the hijack-bombing of the World Trade Center was the work of bin
Laden and his Taliban protectors, then, in the most profound and direct
sense, the political responsibility for this terrible loss of life rests
with the American ruling elite itself.

The rise of Islamic fundamentalist movements, infused with anti-American
passions, can be traced not only to US support for the Mujahedin in
Afghanistan and Pakistan, but also to American assaults on the Arab world.
At the same time that the CIA was arming the fundamentalists in Afghanistan,
it was supporting the Israeli invasion of Lebanon. This was followed in 1983
by the US bombing of Beirut, in which the battleship New Jersey lobbed
2,000-pound shells into civilian neighborhoods. This criminal action led
directly to retribution in the form of the bombing of the US barracks in
Beirut, which took the lives of 242 American soldiers.

The entire phenomenon associated with the figure of Osama bin Laden has its
roots, moreover, in Washington's alliance with Saudi Arabia. The US has for
decades propped up this feudalist autocracy, which has promoted its own
brand of Islamic fundamentalism as a means of maintaining its grip on power.

All of these twists and turns, with their disastrous repercussions, arise
from the nature of US foreign policy, which is not determined on the basis
of democratic principles or formulated in open discussion and public debate.
Rather, it is drawn up in pursuit of economic interests that are concealed
from the American people.

When the US government speaks of a war against terrorism, it is thoroughly
hypocritical, not only because yesterday's terrorist is today's ally, and
vice versa, but because American policy has produced a social catastrophe
that provides the breeding ground for recruits to terrorist organizations.
Nowhere are the results of American imperialism's predatory role more
evident than in the indescribable poverty and backwardness that afflict the
people of Afghanistan.

What are the future prospects arising from the latest eruption of American
militarism? Even if the US achieves its immediate objectives, there is no
reason to believe that the social and political tinderbox in Central Asia
will be any less explosive.

US talk of "nation-building" in Afghanistan is predicated on its alliance
with the anti-Taliban Northern Alliance, with whom the Pentagon is
coordinating its military strikes. Just as Washington used the Albanian
terrorist Kosovo Liberation Army as its proxy in Kosovo, so now it utilizes
the gang of war lords centered in the northeast of Afghanistan as its cat's
paw in Central Asia.

Since the Northern Alliance will now be portrayed as the champion of freedom
and humanitarianism, it is instructive to note recent articles in the New
York Times and elsewhere reporting that the vast bulk of the Afghan opium
trade comes from the meager territory controlled by the Alliance. The
military satraps of the Northern Alliance are, moreover, notorious for
killing thousands of civilians by indiscriminately firing rockets into Kabul
in the early 1990s.

The sordid and illusory basis upon which the US proposes to "rebuild"
Afghanistan, once it is finished pummeling the country, was suggested in a
New York Times article on the onset of the war. "The Pentagon's hope," wrote
the Times, "is that the combination of the psychological shock of the air
strike, bribes to anti-Taliban forces in Afghanistan covertly supported by
Washington and sheer opportunism will lead many of the Taliban's fighters to
put down their arms and defect."

Given the nature of the region, with its vast stores of critical resources,
it is self-evident that none of the powers in Central Asia will long accept
a settlement in which the US is the sole arbiter. Russia, Iran, China,
Pakistan and India all have their own interests, and they will seek to
pursue them. Furthermore, the US presence will inevitably conflict with the
interests of the emerging bourgeois regimes in the lesser states in the
region that have been carved out of the former Soviet Union.

At each stage in the eruption of American militarism, the scale of the
resulting disasters becomes greater and greater. Now the US has embarked on
an adventure in a region that has long been the focus of intrigue between
the Great Powers, a part of the world, moreover, that is bristling with
nuclear weapons and riven by social, political, ethnic and religious
tensions that are compounded by abject poverty.

The New York Times, in a rare moment of lucidity, described the dangers
implicit in the US war drive in an October 2 article headlined "In Pakistan,
a Shaky Ally." The author wrote: "By drafting this fragile and fractious
nation into a central role in the 'war on terrorism,' America runs the
danger of setting off a cataclysm in a place where civil violence is a
likely bet and nuclear weapons exist."

Neither in the proclamations of the US government, nor in the reportage of
the media, is there any serious examination of the real economic and
geo-strategic aims motivating the military assault. Nor is there any
indication that the US political establishment has seriously considered the
far-reaching and potentially catastrophic consequences of the course upon
which it has embarked.

Despite a relentless media campaign to whip up chauvinism and militarism,
the mood of the American people is not one of gung-ho support for the war.
At most, it is a passive acceptance that war is the only means to fight
terrorism, a mood that owes a great deal to the efforts of a thoroughly
dishonest media which serves as an arm of the state. Beneath the reluctant
endorsement of military action is a profound sense of unease and skepticism.
Tens of millions sense that nothing good can come of this latest eruption of
American militarism.

The United States stands at a turning point. The government admits it has
embarked on a war of indefinite scale and duration. What is taking place is
the militarization of American society under conditions of a deepening
social crisis.

The war will profoundly affect the conditions of the American and
international working class. Imperialism threatens mankind at the beginning
of the twenty-first century with a repetition on a more horrific scale of
the tragedies of the twentieth. More than ever, imperialism and its
depredations raise the necessity for the international unity of the working
class and the struggle for socialism.


--
PaRaDoX
Le Quebec aux Quebecois
(en tout cas,pas aux amaricains)



calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:34

--------------------------------------------------------------------------------
--------------------------------------------------------------------------------


SCRIBE
Home | Presentation | Teams | Publications | SCRIBE by CompAct

--------------------------------------------------------------------------------


SCRIBE PUBLICATIONS (1997-2000)
1997 1998 1999 2000


SCIENTIFIC PUBLICATIONS FOR 1997
Journal articles or published proceeding
Journal articles with reviewing comitee
Articles in published proceedings
Reviews
Chapter in a book
Book
Published proceedings

TRANSFERT PUBLICATIONS
Personal communications
Journal articles without reviewing comitee
Repports (including licences, expert evaluation)
Other writtings supervised by the author
Thesis
Dissertations

SCIENTIFIC PUBLICATIONS FOR 1997


--------------------------------------------------------------------------------


SCIENTIFIC PUBLICATIONS


--------------------------------------------------------------------------------


Journal articles or published proceeding

Journal articles with reviewing comitee


Alami-Durante H., Fauconneau B., Rouel M., Escaffre A.M., Bergot P., 1997. Growth and multiplication of white skeletal muscle fibres in carp larvae in relation to somatic growth rate. J. of Fish. Biology, 50, 1285-1302.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of confinement stress on circulating levels of Growth hormone and two prolactins in freshwater-adapted Tilapia Oreochromis niloticus. Gen. Comp. Endocrinol., 108, 35-44.

Blaise O., Le Bail P.Y., Weil C., 1997. Permissive effect of insulin-like growth factor I (IGF-I) on gonadotropin releasing-hormone action on in vitro growth hormone release in rainbow trout Oncorhynchus mykiss. Comp. Biochem. Physiol., 116 (1), 75-81.

Breton B., Sambroni E., Govoroun M., Weil C., 1997. Effets des steroides sur les concentrations plasmatique et hypophysaire des gonadotropines GTH I et GTH II chez la truite arc en-ciel immature, Academie des sciences Elsevier Paris. C.R. Acad. Sci. Paris Sciences de la vie, 320, 783-789.

Cauty, C.,1997. Apport d'une résine acrylique, l'unicryl à l'étude histologique et histochimique des gonades de poisson. Rev. Fr. Histotechnol, 10 (1), 65-73

Chereguini O., Cal R.M., Dreanno C., Ogier de Baulny B., Suquet M., Maisse G., 1997. Short term storage and cryopreservation of turbot sperm. Aquat. Living Resour., 10, 251-255.

Clergeau P., Burel F., 1997. The role of spatio-temporal patch connectivity at landscape level: an example in bird distribution. Landscape and Urban Planning, 38, 37-43.

Clergeau P, Sauvage A., Lemoine A., Marchand J.-P., Dubs F., Mennechez G., 1997. Quels oiseaux dans la ville ? Une étude pluridisciplinaire d'un même gradient urbain. Annales de la Recherche Urbaine, 74, 119-130.

Devaux A., Pesonen M., Monod G., 1997. Alkaline comet assay in rainbow trout hepatocytes. Toxicology in vitro, 11, 71-79.

Fauconneau B., Andre S., Chmaitilly J., Le Bail P.Y., Krieg F., Kaushik J., 1997. Control of skeletal muscle fibres and adipose cells size in the flesh of rainbow trout. J. Fish Biol., 50, 296-314.

Gomez J.M., Boujard T., Boeuf G., Solari A., Le Bail P.Y., 1997. Individual diurnal plasma profiles of thyroid hormones in rainbow trout (Oncorhynchus mykiss) in relation to cortisol GH and growth rate. Gen. Comp. Endocrinol., 107, 74-83.

Govoroun M., Huet J.C., Pernollet J.C., Breton B., 1997. Use of immobilized metal ion affinity chromatography and dye-ligand chromatography for the separation and purification of rainbow trout pituitary gonadotropins GTH I and GTH II. J. Chrom. Biomed. App., 698, 35-46.

Hogasen H.R., Prunet P., 1997. Plasma levels of thyroxine prolactin and cortisol in migrating and resident wild arctic char (Salvelinus alpinus). Can. J. Fish. Aquat. Sci., 54, 2947-2954.

Labbe C., Crowe L.M., Crowe J.H., 1997. Stability of the lipid component of trout sperm plasma membrane during freeze-thawing. Cryobiology, 34, 176-182.

Le Bail P.Y., Boeuf G., 1997. What hormones may regulate food intake in fish. Aquatic living ressources, 10, 371-379.

Mennechez G., Clergeau P. 1997. Analyse de la sélection du site de nid par l'étourneau Sturnus vulgaris au niveau du paysage. Ecologia Mediterranea, 23, 37-45.

Mugnier C., Gaignon J.L., Fostier A., 1997. In vitro synthesis of 1720 beta 21-trihydroxy-4-pregnen-3-one by ovaries of Turbot (Scophthalmus maximus L.) during oocyte maturation. Gen. Comp. Endocrinol., 107, 63-73.

Noel O, Le Bail P.Y, 1997. Does cyclicity of growth rate in rainbow trout exist ?. J.of Fish Biology, 51, 634-642.

Ogier de Baulny B., Le Vern Y., Kerboeuf D., Maisse G., 1997. Flow cytometric evaluation of mitochondrial activity and membrane integrity in fresh and cryopreserved rainbow trout (Oncorhynchus mykiss) spermatozoa. Cryobiology, 34, 141-149.

Rescan P.Y, 1997. Identification in a fish species of two Id (inhibitor of DNA binding/differentiation)-related helix-loop-helix factors expressed in the slow oxidative muscle fibers. Eur. J. Biochem, 247, 870-876.

Toguyeni A., Fauconneau B., Boujard T., Fostier A., Kuhn E.R., Mol K.A., Baroiller J.F., 1997. Feeding behaviour and food utilisation in tilapia Oreochromis niloticus: effect of sex ratio and relationship with the endocrine status. Physiology and Behavior, 62 (2), 273-279.

Articles in published proceedings


Auperin B, Goardon L, Quéméneur A, Thomas J.L, Aubin J, Valotaire C, Rouger Y, Maisse G, 1997. Effet d'un nouvel anesthésique sur differents parametres physiologiques de la truite arc-en-ciel suite a un stress lié au transport. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes (France), resumé

Baroiller J.F., Clota F., 1997. Interactions between temperature effects and genotype on Oreochromis niloticus sex determination. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds), resumé

Baroiller J.F., Guiguen Y., Iseki K., Fostier A., 1997. Physiological role of androgens on gonadal sex differentiation in two teleost fish Oncorhynchus mykiss and Oreochromis niloticus. Proceedings of the first international symposium on the biology of vertebrate sex determination . April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds.), résumé

Bennetau-Pelissero C., Kaushik S., Sumpter J., Fostier A., Le Gac F., Davail-Cuisset B., Le Menn F., 1997. Effet du soja et des phyto-oestrogènes sur la vitellogénèse et l'endocrinologie stéroidienne de la truite arc en ciel et de l' esturgeon sibérien, Approche in vivo et in vitro. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume.

Bonnet S., Haffray P., Blanc J.M., Vallee F., Vauchez C., Fauconneau B., 1997. Genetic variation in morphology carcass traits and fat content in diploid and triploid rainbow trout (Oncorhynchus mykiss) at two commercial sizes 300g and 900g. Sixth international Symposium on genetics in Aquaculture, 24-28 June 1997 Stirling (SCOTLAND), resume.

Bonnet S., Haffray P., Fauconneau B, 1997. Sex and triploidy effects on growth allometry of external morphology in rainbow trout. 5 th International Congress of Vertebrate Morphology 12-17 July 1997 Bristol (U.K). J. Morphology, 232 (3) 237.

Breton B., Roelants Y., Ollevier F., Epler P., Mikolajczyk T., 1997. Oral delivery systems in teleost fish for peptides and polypeptides : exemple for gonadoliberin (GnRH) and growth hormone (GH). International workshop : aquaculture application of controlled drug and vaccine delivery, communication.

Breton B., Gillet C., Jalabert B., 1997. Relations entre la température le blocage de la maturation ovocytaire et le fonctionnement de l'axe gonadotrope chez l'omble chevalier. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume

Breton B., Roelants I., Mikolajczyk T., Epler P., Ollevier F., 1997. Oral delivery systems in Teleost fish for peptides and polypeptides: example for gonadoliberin (GnRH) and growth hormone (GH). International workshop : Aquaculture application of controlled drug and vaccine delivery 21-23 may Villa Manin di Passariano (Italie) resume

Canario A.V.M., Pavlidis M., Mylonas C., Breton B., Kentouri M., Divanach P., 1997. Hormonal spawning induction of Pagrus pagrus. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Ao-t 1997 Barcelone (Espagne), resume.

Clergeau P., Mennechez G., Savard Jpl & Falardeau G., 1997. Biological exchanges between rural and urban areas: bird diversity and landscape structure. 25th congress of IALE, " Landscape Ecology: things to do ", Amsterdam, october 1997.

Duval H., Elies G., Pellerin I., Chesnel F., Le Bail P.Y., Boeuf G., Boujard D. D., 1997. L'IGF-I recombinant de turbot (Scophthalmus maximus): production purification et caractérisation. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Fauconneau B., Bobe J., Pereira V., Vallod D., 1997. External morphology of common carp at commercial size and its relationship with dressing yield. 5 th International Congress of Vertebrate morphology 12-17 July 1997 Bristol (U.K). J. of Morphology, 232 (3), 253. resume

Fauconneau B., Paboeuf G., Le Bail P.Y., Guttierez J., Castejon C., 1997. Preliminary data on binding and effects of IGFs on in vitro muscle satellite cells in rainbow trout. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne) resume

Gillet C., Rideau I., Breton B., 1997. Effets du conditionnement en jours longs sur la sécrétion gonadotrope (GtH2) et sur la période de reproduction chez l'omble chevalier (Salvelinus alpinus L). 1er Colloque IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (FRANCE), resume

Guiguen Y., Ricordel M.J., Fostier A., 1997. Involvment of estrogens in the process of sex differentiation in rainbow trout Oncorhynchus mykiss : in vivo treatments, aromatase activity and aromatase gene expression. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Ed.), resume

Herraez M.P., Labbe C., 1997. Sperm membrane regionalization in rainbow trout : a lectin binding study. CRYO'97 34th Annual of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 370 resume

Keith P., Jegu M., Le Bail P.Y., 1997. Inventories and distribution of french guiana fishes/. 9 th annual meeting of neotropical ichtyological association 20-26 juillet 1997 Porto Alegro Brasil, affiche.

Latonnelle K., Maisse G., Labbe C., 1997. Lipid modification of trout sperm plasma membrane in vitro : effect on membrane stability after cryopreservation . Cryo'97 34 th meeting of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 371 affiche

Leguen I., Prunet P., 1997. Effet d'un choc hyposmotique sur la régulation du volume et sur la mobilisation du calcium intracellulaire des cellules branchiales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Leveroni Calvi S., Maisse G., 1997. Cryopreservation of rainbow trout blastomeres. Cryo'97 34th meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 340 resume

Linard B., Breton B., Bailhache T., Mananos E., Govoroun M., Kah O., Jego P., Saligaut C., 1997. Contr"le dopaminergique central de la libération des hormones gonadotropes (GtH1, GtH2) chez la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Loir M., 1997. Etude de l'effet de xenobiotiques sur la prolifération des spermatogonides de truite présentes dans des cultures de cellules testiculaires totales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G. Billard R., Cosson J., Labbe C., Loir M., Le Gac F., 1997. Influence du maintien en mer des mâles de saumon atlantique (Salmo salar) pendant la période de reproduction sur la qualité du sperme. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G., Noel O, Breton B., Goardon L., Jalabert B., Le Bail P.Y., Mourot B., 1997. Influence d'une période d'éclairement continu sur la première maturation sexuelle de la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Massa F., Prunet P., Grimaldi C., Baglinière J.L., 1997. Premiers éléments de caractérisation de l'impact des sédiments sur la survie embryo-larvaire de la truite (Salmo trutta) en milieu naturel, Etude sur deux petits ruisseaux de Basse Normandie. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Ogier de Beaulny B., Le Vern Y., Labbe C., Maisse G., 1997. Cryopreservation of fish semen : why does the most effective cryoprotectant differ from one species to another. Cryo'97 34th annual meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 342 resume

Perez-Sanchez J, Le Bail P.Y, 1997. Endocrine and metabolic parameters as markers of growth performance and flesh quality. Third International Symposium on Research for Aquaculture fundamental and applied aspects 24-27 aout 1997 Barcelone (Espagne), p 81 resume

Rouger Y., Aubin J., Breton B., Fauconneau B., Fostier A., Le Bail P.Y., Loir M., Prunet P., Maisse G., 1997. Stress induit par le transport chez la truite Arc-en-ciel (Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes (France), resume

Saligaut C., Linard B., Breton B., Anglade I, Bailhache T, Kah O, Jego P, 1997. Brain aminergic systems in salmonids and other teleosts in relation with steroid feedback and gonadotropin release. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne), resume

Sandra O., Lerouzic P., Cauty C., Prunet P., 1997. Influence de la salinité sur l'expression du recepteur de la prolactine(TIR-PRL) dans les organes osmorégulateurs chez le tilapia (Oreochromis niloticus). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Valente L., Saglio P., Fauconneau B., 1997. Ontogénèse du comportement alimentaire chez deux souches à croissance lente et rapide de truite arc-en-ciel. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes(France), resume


Reviews

Chapter in a book


Clergeau P. La gestion des oiseaux à risques in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " INRA Ed., Coll. "Un point sur", 7-24.

Clergeau P. Evolution numérique et comportementale des étourneaux; problèmes agricoles in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 27-42.

Clergeau P.,Mennechez G. L'étourneau sansonnet dans les villes in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 85-100

Clergeau P. Le concept de gestion intégrée appliqué aux oiseaux in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations: " : INRA Ed., Coll. "Un point sur", 363-374

Flammarion P., Garric J., Monod G., 1997. Utilisation de l'activité enzymatique EROD chez les poissons des hydrosystèmes continentaux, Lagadic L., Caquet T., Amaird J.C., Ramade F in "utilisation des biomarqueurs pour la surveillance de la qualité de l'environnement ", 57-75.

Hochereau-De-Reviers M.T., Loir M., De Reviers M., 1997. Controle gonadotrope des cellules somatiques et de la spermatogenèse des vertébrés, Combarnous Y et Volland-Nail (Eds) Editions INRA. in " Les Gonadotropines ", 255-267.

Lagadic L., Caquet T., Amiard J.C., 1997. Intéret d'une approche multiparamétrique pour le suivi de la qualité de l'environnement, ( Lagadic L., Caquet T., Amiard J.C., Ramade F.Eds.). in " Biomarqueurs en ecotoxicologie ", 393-401.

Lagadic L., Caquet T., Amiard J.C., 1997. Biomarqueurs en ecotoxicologie : principes et définitions, Lagadic L., Caquet T., Amiard J.C., Ramade F.(Eds.).in " Biomarqueurs en ecotoxicologie ", 1-9.

Le Gal Y., Lagadic L., Le Bras S., Caquet T., 1997. Charge énergétique en adénylates (CEA) et autres biomarqueurs associés au métabolisme énergétique, MASSON in " Biomarqueurs en écotoxicologie ", 242-285.

Monod G., 1997. L'induction du cytochrome P4501A1, (Lagadic L., Caquet T., Amaird J.C., Ramade F (eds.).. " Biomarqueurs en ecotoxicologie-Aspects fondamentaux ", 33-54.

Pascal M., 1997. Echec à la colonisation : ce n'est pas faute d'avoir essayé !. In : Îles, vivre entre ciel et mer. Exposition Paris " D'îles en îles ", MNHN & Nathan Paris Ed. , 27.

Pascal M., Pisanu B., Beaucournu J.-C. 1997. Faunes parasitaires (Siphonaptères, Helminthes) des îles de la Mer d'Iroise. Colloque CEFE - CNRS Montpellier les 4 & 5 XII 1997 : 8 pp, 6 cartes, 2 tableaux, 1 figure

Rether B., Masfaraud J.F., Keith G., Devaux A., Monod G., 1997. Biomarqueurs de génotoxicité chez les végétaux et les animaux, (Lagadic L., Caquet T. Amiard J.C., Ramade F Eds.). Biomarqueurs en ecotoxicologie-Aspects fondamentaux, 185-208.

Book


Boujard T., Pascal M., Meunier F., P.-Y. Le Bail, 1997 : Poissons de Guyane - Guide écologique de l'Approuague et de la réserve des Nouragues. Edition INRA Paris : 219 pp.

Published proceedings


Alhassane M., Mikolasek O., Lazard J., Baroiller J.F., 1997. Intensification of nile tilapia oreochromis niloticus fry production in the african sahel - example of niger J.F.. Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), 294-304.

Amoros C., Uzbekova S., Hourrout D., Hew C.L., Prunet P., 1997. Transgenic rainbow trout as a model to study cell-specific gene expression driven by a salmon Prolactin promotor. Proceedings of the XIII th International Congress of Comparative Endocrinology, 17-21 Novembre 1997, Yokohama (Japon), MONDUZZI EDITORE. Advances in Comparative Endocrinology, 963-968.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of social interactions and confinement stress on circulating levels of cortisol growth hormone and two prolactins in fresh water-adapted tilapia (Orecochromis niloticus). In Proceedings of the fourth International symposium on Tilapia in aquaculture 9-12 November 1997 Orlando (USA), K. Fitzsimmons (Ed.), 653-661.

Baroiller, J.F. 1997. Modalités des déterminismes du sexe chez les poissons téléostéens . Proceedings of the fourth workshop on sex determination and gonadal sex differentiation, 9-10 octobre 1997, Rennes (France). In. J. Dev. Biol., 14-15.

Baroiller J.F., Desprez D., Carteret Y., Tacon P., Hoareau M.C., Melard C., Jalabert B., 1997. Influence of environmental and social factors on the reproductive efficiency in three tilapia species Oreochromis niloticus, O.aureus and the red tilapia (red florida strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 238-252.

Desprez D., Briand C., Hoareau M.C., Malard C., Bosc P., Baroiller J.F., 1997. Sex determinism in red tilapia ("Red Florida" strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), F. Fitzsimmons (Ed.), 760-771.

Desprez D., Geraz E., Hoareau M.C., Melard C., Bosc P., Baroiller J.F., 1997. Optimisation of hormonal sex-reversal in red-tilapia ("Red Florida" strain) through the use of a natural androgen. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 719-728.

Fauconneau B., Toguyeni A., Fostier A., Le Bail P.Y., Baroiller J.F., 1997. New insigths on feedings and growth of tilapia (Oreochromis niloticus). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA) Orlando Florida.USA, K. Fitzsimmons (Ed.), 151-168.

Guiguen Y., Baroiller J.F., Ricordel M.J., Iseki K., Jalabert B., Fostier A., 1997. Stéroidogénèse et différentiation sexuelle chez deux modèles de poissons : la truite arc-en-ciel Oncorhynchus mykiss et le tilapia Oreochromis noloticus. Proceedings of the fourth workshop on sex determination and gonadal sex differentiation 9-10 octobre 1997 Rennes (France). Int. J. Dev. Biol., 12-13.

Le Bail P.Y., 1997. Hormone and food intake in fish. First cost 827 workshop on voluntary food intake in fish 4 april 1997 Aberdeen UK, presentation

Lefevre, Fl., 1997. La qualite de la chair des poissons d'élevage. VII congresso de zootecnia, 25,26,27 de setembro, 1997, Braganca. Producao, qualidade e ambiente, resume

Toguyeni A. Fauconneau B. Melard C., Fostier A., Lazard J., Barras E., Kuhn E.R. Van der Geyten S., Baroiller J.F., 1997. Sexual dimorphism studies in tilapia using two pure species Oreochromis niloticus and Sarotherodon melanotheron and their inter-generic hybrids (S. melanotheranon x O. niloticus and S. melanotheron x O. niloticus ).. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida(USA), K. Fitzsimmons (Ed.), 200-212.

Toguyeni A., Fauconneau B., Fostier A., Abucay J., Mair G.C., Baroiller J.F., 1997. Influence of genotype and social behaviour on growth performance in tilapia O. niloticus. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida (USA), K. Fitzsimmons (Ed.). Int. J. Dev. Biol., 141-150.


--------------------------------------------------------------------------------


Transfert publications


--------------------------------------------------------------------------------


Personal communications

Journal articles without reviewing comitee


Clergeau P., 1997. De l'étourneau des champs à l'étourneau des villes. INRA mensuel 90, 8-9.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 1ere partie : les îles, des sites privilégiés. RESEAU, 130, 3.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 2eme partie : L'éradication du Surmulot. RESEAU, 131, 3.

Pascal M., 1997. Dératisation de Trielen. Ar Skreo (Bul. Amicale Molenaise), 56, 14-18.

Repports (including licences, expert evaluation)


Roelants I., Breton B., Mikolajczyk T., Ollevier , 1997. Oral delivery from having a high absorption efficiency and method for making the same., brevet.


Other writtings supervised by the author

Thesis


Leguen I., 1997, Mobilisation du calcium et des canaux mécano sensibles dans la régulation du volume des cellules épithéliales : lignée cellulaire de rein d'amphibien (cellule A6) et culture primaire de branchies de poissons. THESE DE DOCTORAT DE L'UNIVERSITE DE RENNES 1, Sciences Biologiques.

Lefevre F., 1997. Propriétés thermogélifiantes des myofibrilles et texture de la chair de truite. THESE DE DOCTORAT DE L'UNIVERSITE BLAISE PASCAL.

Ogier de Beaulny B., 1997. Cryoconservation du sperme de poissons (truite arc en ciel Oncorhynchus mykiss, Turbot (Scophtalmus maximus), Silure glane (Silurus Glanis) et Tilapia (Oreochromis niloticus).Evaluation des dommages cellulaires, amélioration de la technique de congélation, perméabilité membranaire aux cryoprotecteurs. THESE DE DOCTORAT DE L'ENSAR.

Sandra O., 1997. Caractérisation du récepteur de la prolactine (R-PRL) chez la truite arc-en-ciel (Oncorhynchus mykiss) et le Tilapia (Oreochromis niloticus) : clonage d'un ADN complémentaire codant pour le R-PRL et expression in vivo du gène codant pour ce R-PRL. THESE DE DOCTORAT DE L'UNIVERSITE PARIS VI.

Dissertations


Bobe J., 1997. Effet de la température sur le développement musculaire précoce des poissons. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bobe J, 1997. Effet de la température sur le développement musculaire précoce de la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Le collagène de poisson et son rôle dans la qualité de la chair. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Collagène texture de la chair de truite fario (Salmo trutta) : effet de vitesse de croissance et de la vitamine C. MEMOIRE DE DEA Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Colombe L, 1997. Clonage et caractérisation de récepteurs stéroidiens chez la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE présenté pour l'obtention du Diplôme d'Ingénieur C.N.A.M en Biologie en vue des Applications

Guillou Y., Manifacier G., 1997. Impact du Ragondin et de la faune mammalienne fouisseuse sur les levées de la Loire en Maine-et-Loire Elaboration d'outils destinés l'expertise de l'impact du comportement fouisseur de mammifères sauvages sur un ouvrage d'art : la levée de la Loire. Mémoire d'Ingénieur ENITHP Angers, 52 pp + 58pp annexes

Latonnelle K., 1997. Rôles et effets du cholestérol membranaire et différentes méthodes pour modifier le cholestérol membranaire. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Latonnelle K, 1997. Modifications in vitro du rapport molaire cholestérol/phospholipides des spermatozoides et des erythrocytes de truite arc-en -ciel (Oncorhynchus mykiss) , Mises au point de techniques d'évaluation des propriétés mécaniques et biophysiques de la membrane plasmique des spermatozoides de truite. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Les gonadotropines et le contrôle gonadotrope de la reproduction des poissons. (facteurs de régulations endogènes). RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Nouvelles données sur la régulation de la fonction gonadotrope hypophysaire chez la truite arc-en-ciel (Oncorhynchus mykiss) par mesure spécifique des GthI et GthII. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

_______________________
" ik ben een 'hij' en heet Calvobbes "



Loedertje


Door Loedertje - maandag 15 oktober 2001 00:38

--------------------------------------------------------------------------------
I was almost shocked at reading this article in Norways largest national
newspaper (Dagbladet) today, but then, I've lived here for over thirty
years, so I've become accustomed to immediate support for the USA followed
by a stab in the back.
This politician is the equivalent of a congressman. His name is Olav Gunnar
Ballo, and his party is the Socialistic Left (Sosialistisk Venstre). His
party has supported his views, and they hold sway over 13% of the Norwegian
Congress.

I have nothing against his party, or at least I did'nt, in fact I kind of
liked them during the election when they really took a lot more votes than
expected.

He says that Americans are Satans murderers (no, he's not a muslim...), and
that the USA is a terrorist nation who have commited terrorist acts against
the world for decades! Furthermore, he says Americans have NO morals, that
they are now murdering hundreds of innocents and dropping care packaged
deliberately into mindfields! He also calls all countries and people who
support the USA hypocrites.

I can't go on. It's too much!

I ask EVERYONE who reads this to PLEASE!!!!! send him a short note and let
him know how you feel about his statements. I allready have, but I don't
think one e-mail will get his attention.

send it to sv.postmottak@stortinget.no

Mark it Olav Gunnar Ballo, or TO: Olav Gunnar Ballo, or else it will be
perceived as a message to the whole party (which might not be such a bad
Idea, either).

In cases like this, it doesn't cost much to be a patriot - just a short
email...

This is NOT a hoax!

I only ask what you are all already prepared to give: your reaction towards
anyone who thinks Americans don't have the right to defend themselves.


Sincerely,
M. Walsh
An American in Norway



Loedertje


Door Loedertje - maandag 15 oktober 2001 00:40

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op maandag 15 oktober 2001 00:34 schreef calvobbes het volgende:

Zullen we gaan slapen en dit topic morgen volplakken?


--------------------------------------------------------------------------------


Is goed, ben ook moe


calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:42

--------------------------------------------------------------------------------
IV.1 Spatial Patterns and Biodiversity - James Quinn, Alan Jassby, Peter Moyle
Goal:

To manage a large variety of GIS and biodiversity databases. This allows for a number of unique analyses that can be closely coupled with other modeling and ecosystem projects to help determine such things as species composition, habitat availability, population estimates, risks of toxic substances to wildlife, and non-point source loading to rivers.

Current Status:

The Cores computer center, created de novo at the beginning of the grant, has developed into a statewide center for GIS and environmental database design and dissemination. Work done in the core has proven of considerable value to a number of agencies, and the Core has attracted over 40 additional grants and contracts to extend Center work, including nine from EPA Region IX. In a cooperative agreement with the California EPA, we are developing a database of known toxic effects of chemical stressors on California vertebrate species. In addition, the Center houses and provides Internet access to biodiversity data covering a wide variety of protected lands, including state and national parks, UNESCO Biosphere Reserves, and Nature Conservancy preserves, and is taking the lead on developing Department of the Interior strategies for international data exchange on non-indigenous species.

See http://www.nbii.gov/iabin/meetings/invs_fr.htm and http://www.nbii.gov/iabin/meetings/tech_fr.htm.

Geographic Information System (GIS). A sophisticated GIS facility, supporting 11 graduate students, with 8 GIS-specialist staff, about 20 ArcInfo workstations, and a variety of peripheral equipment, is now well established. The facility has about 120 statewide GIS layers of environmental themes, especially land forms, land use, biodiversity and water quality, mostly online, and has become the most active California university GIS program in interagency GIS development (under the aegis of the California Biodiversity Council, the California Geographic Information Association, and the National Biological Information Infrastructure) . The Center is the major developer and repository in the state for the National Hydrography Database (the successor to the EPA River Reach Files), the EPA Waterbody system, and other systems used by EPA and collaborating state agencies in managing water quality, water supply, biodiversity issues, and ecological risk assessment. Many of the techniques developed by the Center and its collaborators in the Department of Fish and Game have now been adopted for national implementation.

Clean Water Act Repports. The Center recently completed a project with EPA Region IX to update, modernize, and disseminate the water body reports required under Sections 303(d) and 305(b) of the Clean Water Act for California. We installed the new ArcView-based system, Geo-WBS, in the Regional Water Quality Control Boards in March, and trained analysts to use the GIS to evaluate beneficial uses, sources of impairment, and TMDL issues. The State Water Board is now using the software to prepare Clean Water Act 303(d) (non-point source pollution) reports, and the results will be on-line for professional and public access. We now have new cooperative programs with Region 9, the California Department of Forestry, the California Department of Transportation and the SWRCB to make their non-point-source and stormwater assessment data interoperable.

World Wide Web. The Core facility has established a World Wide Web server to disseminate data and model results to collaborators, managers, and the general public. The Internet activities have been incorporated into a number of electronic data access initiatives, including CERES in California, and the National Biological Information Infrastructure and the Government Information Locator Service at the national level, and the Smithsonian and the UNESCO Man and the Biosphere program internationally.

Future Plans:

As a result of the variety of GIS and biodiversity databases managed by the Core, we have the ability to do a number of unique analyses, which will be closely coupled with and complementary to the other Core models and the ecosystem projects.

While occurrences of both indicator taxa and rare and endangered species are increasingly critical to environmental policy, most areas have not been adequately surveyed to document occurrences and populations of important species. As a result, Wildlife Habitat Relations (WHR) and Gap Analysis models are increasingly being used to infer the presence of species of concern on at least 90% of the landscape where biological surveys are lacking or inadequate. We have submitted a manuscript testing these predictions against either existing data on species in protected areas, or with respect to landscape characteristics, including the size or degree of isolation of "patches" of suitable habitat for rare species. Standard models prove very useful for large conservation areas and "charismatic" taxa such as large mammals and birds, and are in need of revision for urban fringe, riparian, and patchy habitats, and for "less popular" taxa.
In California, Wildlife Habitat Relations, Gap Analysis, and comparable models have only been developed and tested for terrestrial vertebrates. We believe we can develop formal models following the work of Moyle, Ellison, and colleagues, which will accurately predict the species composition and critical habitats for fish, amphibians, and some indicator invertebrates, in rivers and streams that have not been surveyed. Our growing databases of aquatic and riparian species occurrences (some 220,000 records to date) will allow us to both estimate the parameters of an "aquatic WHR" model and to test its accuracy. (Preliminary studies in three northern California watersheds suggest that the accuracy of pilot analyses exceeds 80%). We have just received funding to extensively test the results of the first generation of fish occurrence models in the Cosumnes River Watershed (the last major undammed river draining the Sierra Nevada into San Francisco Bay.)
Invasive species are increasingly being recognized as threats to biodiversity and ecosystem processes. The Core is coordinating data issues in California on the distributions of invasive plants and non-native fish. We have also just begun a partnership with the Department of Interior to develop strategies for assessing invasive species issues in the Western Hemisphere under the Inter-Americas Biodiversity Information Network (IABIN), an initiative begun under the Summit of the Americas, and are awaiting World Bank funds to develop a prototype for a data system. We recently organized an international workshop to plan this initiative at the National Center for Ecological Analysis and Synthesis, and will conduct two follow-up international workshops in the winter of 2000.
We recently completed a second phase of a cooperative study with CalEPA to develop a database and management models for risk analyses of the effects of toxic substances on California wildlife population responses. These have the potential to couple the exposure and effects data with the GIS-based distributional data described above, potentially allowing managers to identify risk elements and potential wildlife responses at particular sites (using the biodiversity databases and models) or for particular releases.
Understanding the impact of land use patterns on runoff has been a major uncertainty in constructing mass balance analyses at the watershed level for a variety of important waterborne constituents, including nitrogen, some pesticides and metals, and sediment load. These, in turn, are thought to be the major causes (other than dams) for declines in anadromous fish -- declines which have driven much of the habitat conservation planning efforts and TMDL (total maximum daily load) actions in Northern California. We are working with investigators in other projects (Mount, Schladow, Fogg) to integrate our spatial data with mechanistic models. We have completed a year of field work to test these assessments in two ambitious watershed-scale field tests, one in the Navarro River watershed (north coast, funded by CalTrans) and the other in the Cosumnes watershed (Sierra Nevada and Delta, funded by the Packard Foundation and CALFED). Data analysis for the first seasons is still underway.
These efforts are tightly interwoven with other Center projects. The runoff modeling provides inputs for the toxicological studies in the Clear Lake and Bay-Delta projects. Conversely, the chemical analysis of spatial sources of sediment load in the Clear Lake basin (Project IV.2) permits a refinement of the geography of non-point source inputs into the Sacramento River and Delta system. On another front, biomarker data from several other projects provides the most powerful test of the models. The predicted spatial extent of species effects studied in most of the Center projects can be mapped using the biodiversity GIS layers. Land cover and land forms affect all of the transport processes studied in both the Decision Support and the Fate and Transport Cores, and transport in many cases is essential to predicting species occurrences.

_______________________
" ik ben een 'hij' en heet Calvobbes "



calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:46

--------------------------------------------------------------------------------
* laatste, hierna *
Privacy Act


CHAPTER P-21

An Act to extend the present laws of Canada that protect the privacy of individuals and that provide individuals with a right of access to personal information about themselves

SHORT TITLE

Short title
1. This Act may be cited as the Privacy Act.

1980-81-82-83, c. 111, Sch. II "1".

PURPOSE OF ACT

Purpose
2. The purpose of this Act is to extend the present laws of Canada that protect the privacy of individuals with respect to personal information about themselves held by a government institution and that provide individuals with a right of access to that information.

1980-81-82-83, c. 111, Sch. II "2".

INTERPRETATION

Definitions
3. In this Act,

"administrative purpose" «fins administratives»
"administrative purpose", in relation to the use of personal information about an individual, means the use of that information in a decision making process that directly affects that individual;

"alternative format" « support de substitution »
"alternative format", with respect to personal information, means a format that allows a person with a sensory disability to read or listen to the personal information;

"Court" «Cour»
"Court" means the Federal Court--Trial Division;

"designated Minister" «ministre désigné»
"designated Minister", in relation to any provision of this Act, means such member of the Queen's Privy Council for Canada as is designated by the Governor in Council as the Minister for the purposes of that provision;

"government institution" «institution fédérale»
"government institution" means any department or ministry of state of the Government of Canada listed in the schedule or any body or office listed in the schedule;

"head" «responsable d'institution fédérale»
"head", in respect of a government institution, means

(a) in the case of a department or ministry of state, the member of the Queen's Privy Council for Canada presiding over that institution, or

(b) in any other case, the person designated by order in council pursuant to this paragraph and for the purposes of this Act to be the head of that institution;

"personal information" «renseignements personnels»
"personal information" means information about an identifiable individual that is recorded in any form including, without restricting the generality of the foregoing,

(a) information relating to the race, national or ethnic origin, colour, religion, age or marital status of the individual,

(b) information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved,

(c) any identifying number, symbol or other particular assigned to the individual,

(d) the address, fingerprints or blood type of the individual,

(e) the personal opinions or views of the individual except where they are about another individual or about a proposal for a grant, an award or a prize to be made to another individual by a government institution or a part of a government institution specified in the regulations,

(f) correspondence sent to a government institution by the individual that is implicitly or explicitly of a private or confidential nature, and replies to such correspondence that would reveal the contents of the original correspondence,

(g) the views or opinions of another individual about the individual,

(h) the views or opinions of another individual about a proposal for a grant, an award or a prize to be made to the individual by an institution or a part of an institution referred to in paragraph (e), but excluding the name of the other individual where it appears with the views or opinions of the other individual, and

(i) the name of the individual where it appears with other personal information relating to the individual or where the disclosure of the name itself would reveal information about the individual,

but, for the purposes of sections 7, 8 and 26 and section 19 of the Access to Information Act, does not include

(j) information about an individual who is or was an officer or employee of a government institution that relates to the position or functions of the individual including,

(i) the fact that the individual is or was an officer or employee of the government institution,

(ii) the title, business address and telephone number of the individual,

(iii) the classification, salary range and responsibilities of the position held by the individual,

(iv) the name of the individual on a document prepared by the individual in the course of employment, and

(v) the personal opinions or views of the individual given in the course of employment,

(k) information about an individual who is or was performing services under contract for a government institution that relates to the services performed, including the terms of the contract, the name of the individual and the opinions or views of the individual given in the course of the performance of those services,

(l) information relating to any discretionary benefit of a financial nature, including the granting of a licence or permit, conferred on an individual, including the name of the individual and the exact nature of the benefit, and

(m) information about an individual who has been dead for more than twenty years;

"personal information bank" «fichier de renseignements personnels»
"personal information bank" means a collection or grouping of personal information described in section 10;

"Privacy Commissioner" «Commissaire à la protection de la vie privée»
"Privacy Commissioner" means the Commissioner appointed under section 53;

"sensory disability" « déficience sensorielle »
"sensory disability" means a disability that relates to sight or hearing.

R.S., 1985, c. P-21, s. 3; 1992, c. 1, s. 144(F), c. 21, s. 34.

COLLECTION, RETENTION AND DISPOSAL OF PERSONAL INFORMATION

Collection of personal information
4. No personal information shall be collected by a government institution unless it relates directly to an operating program or activity of the institution.

1980-81-82-83, c. 111, Sch. II "4".

Personal information to be collected directly
5. (1) A government institution shall, wherever possible, collect personal information that is intended to be used for an administrative purpose directly from the individual to whom it relates except where the individual authorizes otherwise or where personal information may be disclosed to the institution under subsection 8(2).

Individual to be informed of purpose
(2) A government institution shall inform any individual from whom the institution collects personal information about the individual of the purpose for which the information is being collected.

Exception
(3) Subsections (1) and (2) do not apply where compliance therewith might

(a) result in the collection of inaccurate information; or

(b) defeat the purpose or prejudice the use for which information is collected.

1980-81-82-83, c. 111, Sch. II "5".

Retention of personal information used for an administrative purpose
6. (1) Personal information that has been used by a government institution for an administrative purpose shall be retained by the institution for such period of time after it is so used as may be prescribed by regulation in order to ensure that the individual to whom it relates has a reasonable opportunity to obtain access to the information.

Accuracy of personal information
(2) A government institution shall take all reasonable steps to ensure that personal information that is used for an administrative purpose by the institution is as accurate, up-to-date and complete as possible.

Disposal of personal information
(3) A government institution shall dispose of personal information under the control of the institution in accordance with the regulations and in accordance with any directives or guidelines issued by the designated minister in relation to the disposal of that information.

1980-81-82-83, c. 111, Sch. II "6".

PROTECTION OF PERSONAL INFORMATION

Use of personal information
7. Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be used by the institution except

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose; or

(b) for a purpose for which the information may be disclosed to the institution under subsection 8(2).

1980-81-82-83, c. 111, Sch. II "7".

Disclosure of personal information
8. (1) Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be disclosed by the institution except in accordance with this section.

Where personal information may be disclosed
(2) Subject to any other Act of Parliament, personal information under the control of a government institution may be disclosed

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose;

(b) for any purpose in accordance with any Act of Parliament or any regulation made thereunder that authorizes its disclosure;

(c) for the purpose of complying with a subpoena or warrant issued or order made by a court, person or body with jurisdiction to compel the production of information or for the purpose of complying with rules of court relating to the production of information;

(d) to the Attorney General of Canada for use in legal proceedings involving the Crown in right of Canada or the Government of Canada;

(e) to an investigative body specified in the regulations, on the written request of the body, for the purpose of enforcing any law of Canada or a province or carrying out a lawful investigation, if the request specifies the purpose and describes the information to be disclosed;

(f) under an agreement or arrangement between the Government of Canada or an institution thereof and the government of a province, the government of a foreign state, an international organization of states or an international organization established by the governments of states, or any institution of any such government or organization, for the purpose of administering or enforcing any law or carrying out a lawful investiga

inu-oniichan : "The dog-eared bro"
  † In Memoriam † maandag 15 oktober 2001 @ 07:29:02 #102
13819 Loedertje
Trotse GILF.
pi_1903351
quote:
Op maandag 15 oktober 2001 02:12 schreef Zanderrr het volgende:
Alsjeblieft, iets leerzaams:

.


http://www.infinitydog.com/technicalvirgin/boys.html
  maandag 15 oktober 2001 @ 07:59:39 #103
15098 El-Lupe
Sick of you!
pi_1903372
Geef mijn taartpunt maar aan Pim!
pi_1903442
Ja hehe, het moeten wel nieuwe teksten zijn en geen quote's of kopie en peest van dit topic... Mopper
pi_1903446
Consolidated Statutes and Regulations
Main page on: Privacy Act
Disclaimer: These documents are not the official versions (more).
Source: http://laws.justice.gc.ca/en/P-21/81684.html
Updated to April 30, 2001


[Previous]


Act does not apply to certain materials
69. (1) This Act does not apply to

(a) library or museum material preserved solely for public reference or exhibition purposes; or

(b) material placed in the National Archives of Canada, the National Library, the National Gallery of Canada, the Canadian Museum of Civilization, the Canadian Museum of Nature or the National Museum of Science and Technology by or on behalf of persons or organizations other than government institutions.

Sections 7 and 8 do not apply to certain information
(2) Sections 7 and 8 do not apply to personal information that is publicly available.

R.S., 1985, c. P-21, s. 69; R.S., 1985, c. 1 (3rd Supp.), s. 12; 1990, c. 3, s. 32; 1992, c. 1, s. 143(E).

Confidences of the Queen's Privy Council for Canada
70. (1) This Act does not apply to confidences of the Queen's Privy Council for Canada, including, without restricting the generality of the foregoing, any information contained in

(a) memoranda the purpose of which is to present proposals or recommendations to Council;

(b) discussion papers the purpose of which is to present background explanations, analyses of problems or policy options to Council for consideration by Council in making decisions;

(c) agenda of Council or records recording deliberations or decisions of Council;

(d) records used for or reflecting communications or discussions between ministers of the Crown on matters relating to the making of government decisions or the formulation of government policy;

(e) records the purpose of which is to brief ministers of the Crown in relation to matters that are before, or are proposed to be brought before, Council or that are the subject of communications or discussions referred to in paragraph (d); and

(f) draft legislation.

Definition of "Council"
(2) For the purposes of subsection (1), "Council" means the Queen's Privy Council for Canada, committees of the Queen's Privy Council for Canada, Cabinet and committees of Cabinet.

Exception
(3) Subsection (1) does not apply to

(a) confidences of the Queen's Privy Council for Canada that have been in existence for more than twenty years; or

(b) discussion papers described in paragraph (1)(b)

(i) if the decisions to which the discussion papers relate have been made public, or

(ii) where the decisions have not been made public, if four years have passed since the decisions were made.

R.S., 1985, c. P-21, s. 70; 1992, c. 1, s. 144(F).

Duties and functions of designated Minister
71. (1) Subject to subsection (2), the designated Minister shall

(a) cause to be kept under review the manner in which personal information banks are maintained and managed to ensure compliance with the provisions of this Act and the regulations relating to access by individuals to personal information contained therein;

(b) assign or cause to be assigned a registration number to each personal information bank;

(c) prescribe such forms as may be required for the operation of this Act and the regulations;

(d) cause to be prepared and distributed to government institutions directives and guidelines concerning the operation of this Act and the regulations; and

(e) prescribe the form of, and what information is to be included in, reports made to Parliament under section 72.

Exception for Bank of Canada
(2) Anything that is required to be done by the designated Minister under paragraph (1)(a) or (d) shall be done in respect of the Bank of Canada by the Governor of the Bank of Canada.

Review of existing and proposed personal information banks
(3) Subject to subsection (5), the designated Minister shall cause to be kept under review the utilization of existing personal information banks and proposals for the creation of new banks, and shall make such recommendations as he considers appropriate to the heads of the appropriate government institutions with regard to personal information banks that, in the opinion of the designated Minister, are under-utilized or the existence of which can be terminated.

Establishment and modification of personal information banks
(4) Subject to subsection (5), no new personal information bank shall be established and no existing personal information banks shall be substantially modified without approval of the designated Minister or otherwise than in accordance with any term or condition on which such approval is given.

Application of subsections (3) and (4)
(5) Subsections (3) and (4) apply only in respect of personal information banks under the control of government institutions that are departments as defined in section 2 of the Financial Administration Act.

Delegation to head of government institution
(6) The designated Minister may authorize the head of a government institution to exercise and perform, in such manner and subject to such terms and conditions as the designated Minister directs, any of the powers, functions and duties of the designated Minister under subsection (3) or (4).

1980-81-82-83, c. 111, Sch. II "71".

Report to Parliament
72. (1) The head of every government institution shall prepare for submission to Parliament an annual report on the administration of this Act within the institution during each financial year.

Tabling of report
(2) Every report prepared under subsection (1) shall be laid before each House of Parliament within three months after the financial year in respect of which it is made or, if that House is not then sitting, on any of the first fifteen days next thereafter that it is sitting.

Reference to Parliamentary committee
(3) Every report prepared under subsection (1) shall, after it is laid before the Senate and the House of Commons, under subsection (2), be referred to the committee designated or established by Parliament for the purpose of subsection 75(1).

1980-81-82-83, c. 111, Sch. II "72".

Delegation by the head of a government institution
73. The head of a government institution may, by order, designate one or more officers or employees of that institution to exercise or perform any of the powers, duties or functions of the head of the institution under this Act that are specified in the order.

1980-81-82-83, c. 111, Sch. II "73".

Protection from civil proceeding or from prosecution
74. Notwithstanding any other Act of Parliament, no civil or criminal proceedings lie against the head of any government institution, or against any person acting on behalf or under the direction of the head of a government institution, and no proceedings lie against the Crown or any government institution, for the disclosure in good faith of any personal information pursuant to this Act, for any consequences that flow from that disclosure, or for the failure to give any notice required under this Act if reasonable care is taken to give the required notice.

1980-81-82-83, c. 111, Sch. II "74".

Permanent review of this Act by Parliamentary committee
75. (1) The administration of this Act shall be reviewed on a permanent basis by such committee of the House of Commons, of the Senate or of both Houses of Parliament as may be designated or established by Parliament for that purpose.

Review and report to Parliament
(2) The committee designated or established by Parliament for the purpose of subsection (1) shall, not later than July 1, 1986, undertake a comprehensive review of the provisions and operation of this Act, and shall, within a year after the review is undertaken or within such further time as the House of Commons may authorize, submit a report to Parliament thereon including a statement of any changes the committee would recommend.

1980-81-82-83, c. 111, Sch. II "75".

Binding on Crown
76. This Act is binding on Her Majesty in right of Canada.

1980-81-82-83, c. 111, Sch. II "76".

Regulations
77. (1) The Governor in Council may make regulations

(a) specifying government institutions or parts of government institutions for the purpose of paragraph (e) of the definition "personal information" in section 3;

(b) prescribing the period of time for which any class of personal information is to be retained under subsection 6(1);

(c) prescribing the circumstances and the manner in which personal information under the control of a government institution is to be disposed of under subsection 6(3);

(d) specifying investigative bodies for the purposes of paragraph 8(2)(e) and sections 22 and 23;

(e) prescribing the circumstances in which and the conditions under which personal information may be disclosed under subsection 8(3);

(f) prescribing the period of time for which copies of requests received under paragraph 8(2)(e) and records of information disclosed pursuant to the requests are to be retained under subsection 8(4);

(g) specifying persons or bodies for the purpose of paragraph 8(2)(h);

(h) prescribing procedures to be followed in making and responding to a request for access to personal information under paragraph 12(1)(a) or (b);

(i) prescribing procedures to be followed by an individual or a government institution where the individual requests under subsection 12(2) a correction of personal information or a notation of a correction requested, including the period of time within which the correction or notation must be made;

(j) prescribing any fees, or the manner of calculating any fees, to be paid for being given access to personal information requested under subsection 12(1) or for the making of copies of such personal information;

(k) prescribing the procedures to be followed by the Privacy Commissioner and any person acting on behalf or under the direction of the Privacy Commissioner in examining or obtaining copies of records relevant to an investigation of a complaint in respect of a refusal to disclose personal information under paragraph 19(1)(a) or (b) or section 21;

(l) specifying classes of investigations for the purpose of paragraph 22(3)(c);

(m) prescribing the class of individuals who may act on behalf of minors, incompetents, deceased persons or any other individuals under this Act and regulating the manner in which any rights or actions of individuals under this Act may be exercised or performed on their behalf;

(n) authorizing the disclosure of information relating to the physical or mental health of individuals to duly qualified medical practitioners or psychologists in order to determine whether disclosure of the information would be contrary to the best interests of the individuals, and prescribing any procedures to be followed or restrictions deemed necessary with regard to the disclosure and examination of the information; and

(o) prescribing special procedures for giving individuals access under subsection 12(1) to personal information relating to their physical or mental health and regulating the way in which that access is given.

Additions to schedule
(2) The Governor in Council may, by order, amend the schedule by adding thereto any department, ministry of state, body or office of the Government of Canada.

1980-81-82-83, c. 111, Sch. II "77".

SCHEDULE

(Section 3)

GOVERNMENT INSTITUTIONS

Departments and Ministries of State

Department of Agriculture and Agri-Food

Ministère de l'Agriculture et de l'Agroalimentaire

Department of Canadian Heritage

Ministère du Patrimoine canadien

Department of Citizenship and Immigration

Ministère de la Citoyenneté et de l'Immigration

Department of the Environment

Ministère de l'Environnement

Department of Finance

Ministère des Finances

Department of Fisheries and Oceans

Ministère des Pêches et des Océans

Department of Foreign Affairs and International Trade

Ministère des Affaires étrangères et du Commerce international

Department of Health

Ministère de la Santé

Department of Human Resources Development

Ministère du Développement des ressources humaines

Department of Indian Affairs and Northern Development

Ministère des Affaires indiennes et du Nord canadien

Department of Industry

Ministère de l'Industrie

Department of Justice

Ministère de la Justice

Department of National Defence (including the Canadian Forces)

Ministère de la Défense nationale (y compris les Forces canadiennes)

Department of Natural Resources

Ministère des Ressources naturelles

Department of Public Works and Government Services

Ministère des Travaux publics et des Services gouvernementaux

Department of the Solicitor General

Ministère du Solliciteur général

Department of Transport

Ministère des Transports

Department of Veterans Affairs

Ministère des Anciens Combattants

Department of Western Economic Diversification

Ministère de la Diversification de l'économie de l'Ouest canadien

Other Government Institutions

Atlantic Canada Opportunities Agency

Agence de promotion économique du Canada atlantique

Atlantic Pilotage Authority

Administration de pilotage de l'Atlantique

Bank of Canada

Banque du Canada

Belledune Port Authority

Administration portuaire de Belledune

British Columbia Treaty Commission

Commission des traités de la Colombie-Britannique

Business Development Bank of Canada

Banque de développement du Canada

Canada Council

Conseil des Arts du Canada

Canada Customs and Revenue Agency

Agence des douanes et du revenu du Canada

Canada Deposit Insurance Corporation

Société d'assurance-dépôts du Canada

Canada Employment Insurance Commission

Commission de l'assurance-emploi du Canada

Canada Industrial Relations Board

Conseil canadien des relations industrielles

Canada Information Office

Bureau d'information du Canada

Canada Lands Company Limited

Société immobilière du Canada limitée

Canada Mortgage and Housing Corporation

Société canadienne d'hypothèques et de logement

Canada-Newfoundland Offshore Petroleum Board

Office Canada -- Terre-Neuve des hydrocarbures extracôtiers

Canada-Nova Scotia Offshore Petroleum Board

Office Canada -- Nouvelle-Écosse des hydrocarbures extracôtiers

Canada Post Corporation

Société canadienne des postes

Canadian Advisory Council on the Status of Women

Conseil consultatif canadien de la situation de la femme

Canadian Artists and Producers Professional Relations Tribunal

Tribunal canadien des relations professionnelles artistes-producteurs

Canadian Centre for Management Development

Centre canadien de gestion

Canadian Centre for Occupational Health and Safety

Centre canadien d'hygiène et de sécurité au travail

Canadian Commercial Corporation

Corporation commerciale canadienne

Canadian Cultural Property Export Review Board

Commission canadienne d'examen des exportations de biens culturels

Canadian Dairy Commission

Commission canadienne du lait

Canadian Environmental Assessment Agency

Agence canadienne d'évaluation environnementale

Canadian Film Development Corporation

Société de développement de l'industrie cinématographique canadienne

Canadian Food Inspection Agency

Agence canadienne d'inspection des aliments

Canadian Forces Grievance Board

Comité des griefs des Forces canadiennes

Canadian Government Specifications Board

Office des normes du gouvernement canadien

Canadian Grain Commission

Commission canadienne des grains

Canadian Human Rights Commission

Commission canadienne des droits de la personne

Canadian Human Rights Tribunal

Tribunal canadien des droits de la personne

Canadian Institutes of Health Research

Instituts de recherche en santé du Canada

Canadian International Development Agency

Agence canadienne de développement international

Canadian International Trade Tribunal

Tribunal canadien du commerce extérieur

Canadian Museum of Civilization

Musée canadien des civilisations

Canadian Museum of Nature

Musée canadien de la nature

Canadian Nuclear Safety Commission

Commission canadienne de sûreté nucléaire

Canadian Polar Commission

Commission canadienne des affaires polaires

Canadian Radio-television and Telecommunications Commission

Conseil de la radiodiffusion et des télécommunications canadiennes

Canadian Security Intelligence Service

Service canadien du renseignement de sécurité

Canadian Space Agency

Agence spatiale canadienne

Canadian Tourism Commission

Commission canadienne du tourisme

Canadian Transportation Accident Investigation and Safety Board

Bureau canadien d'enquête sur les accidents de transport et de la sécurité des transports

Canadian Transportation Agency

Office des transports du Canada

Canadian Wheat Board

Commission canadienne du blé

Copyright Board

Commission du droit d'auteur

Correctional Service of Canada

Service correctionnel du Canada

Defence Construction (1951) Limited

Construction de défense (1951) Limitée

Director of Soldier Settlement

Directeur de l'établissement de soldats

The Director, The Veterans' Land Act

Directeur des terres destinées aux anciens combattants

Economic Development Agency of Canada for the Regions of Quebec

Agence de développement économique du Canada pour les régions du Québec

Energy Supplies Allocation Board

Office de répartition des approvisionnements d'énergie

Ethics Counsellor

Conseiller en éthique

Export Development Corporation

Société pour l'expansion des exportations

Farm Credit Corporation

Société du crédit agricole

The Federal Bridge Corporation Limited

La Société des ponts fédéraux Limitée

Federal-Provincial Relations Office

Secrétariat des relations fédérales-provinciales

Financial Transactions and Reports Analysis Centre of Canada

Centre d'analyse des opérations et déclarations financières du Canada

Fisheries Prices Support Board

Office des prix des produits de la pêche

Fraser River Port Authority

Administration portuaire du fleuve Fraser

Freshwater Fish Marketing Corporation

Office de commercialisation du poisson d'eau douce

Grain Transportation Agency Administrator

Administrateur de l'Office du transport du grain

Great Lakes Pilotage Authority

Administration de pilotage des Grands Lacs

Gwich'in Land and Water Board

Office gwich'in des terres et des eaux

Gwich'in Land Use Planning Board

Office gwich'in d'aménagement territorial

Halifax Port Authority

Administration portuaire de Halifax

Hazardous Materials Information Review Commission

Conseil de contrôle des renseignements relatifs aux matières dangereuses

Historic Sites and Monuments Board of Canada

Commission des lieux et monuments historiques du Canada

Immigration and Refugee Board

Commission de l'immigration et du statut de réfugié

International Centre for Human Rights and Democratic Development

Centre international des droits de la personne et du développement démocratique

International Development Research Centre

Centre de recherches pour le développement international

The Jacques-Cartier and Champlain Bridges Inc.

Les Ponts Jacques-Cartier et Champlain Inc.

Laurentian Pilotage Authority

Administration de pilotage des Laurentides

Law Commission of Canada

Commission du droit du Canada

Mackenzie Valley Environmental Impact Review Board

Office d'examen des répercussions environnementales de la vallée du Mackenzie

Mackenzie Valley Land and Water Board

Office des terres et des eaux de la vallée du Mackenzie

Medical Research Council

Conseil de recherches médicales

Merchant Seamen Compensation Board

Commission d'indemnisation des marins marchands

Military Police Complaints Commission

Commission d'examen des plaintes concernant la police militaire

Millennium Bureau of Canada

Bureau du Canada pour le millénaire

Montreal Port Authority

Administration portuaire de Montréal

Nanaimo Port Authority

Administration portuaire de Nanaïmo

National Archives of Canada

Archives nationales du Canada

National Arts Centre Corporation

Corporation du Centre national des Arts

The National Battlefields Commission

Commission des champs de bataille nationaux

National Capital Commission

Commission de la capitale nationale

National Energy Board

Office national de l'énergie

National Farm Products Council

Conseil national des produits agricoles

National Film Board

Office national du film

National Gallery of Canada

Musée des beaux-arts du Canada

National Library

Bibliothèque nationale

National Museum of Science and Technology

Musée national des sciences et de la technologie

National Parole Board

Commission nationale des libérations conditionnelles

National Research Council of Canada

Conseil national de recherches du Canada

National Round Table on the Environment and the Economy

Table ronde nationale sur l'environnement et l'économie

Natural Sciences and Engineering Research Council

Conseil de recherches en sciences naturelles et en génie

Northern Pipeline Agency

Administration du pipe-line du Nord

North Fraser Port Authority

Administration portuaire du North-Fraser

Northwest Territories Water Board

Office des eaux des Territoires du Nord-Ouest

Office of Privatization and Regulatory Affairs

Bureau de privatisation et des affaires réglementaires

Office of the Auditor General of Canada

Bureau du vérificateur général du Canada

Office of the Chief Electoral Officer

Bureau du directeur général des élections

Office of the Commissioner of Official Languages

Commissariat aux langues officielles

Office of the Comptroller General

Bureau du contrôleur général

Office of the Co-ordinator, Status of Women

Bureau de la coordonnatrice de la situation de la femme

Office of the Correctional Investigator of Canada

Bureau de l'enquêteur correctionnel du Canada

Office of the Inspector General of the Canadian Security Intelligence Service

Bureau de l'Inspecteur général du service canadien du renseignement de sécurité

Office of the Superintendent of Financial Institutions

Bureau du surintendant des institutions financières

Pacific Pilotage Authority

Administration de pilotage du Pacifique

Parks Canada Agency

Agence Parcs Canada

Patented Medicine Prices Review Board

Conseil d'examen du prix des médicaments brevetés

Pension Appeals Board

Commission d'appel des pensions

Petroleum Compensation Board

Office des indemnisations pétrolières

Petroleum Monitoring Agency

Agence de surveillance du secteur pétrolier

Port Alberni Port Authority

Administration portuaire de Port-Alberni

Prairie Farm Rehabilitation Administration

Administration du rétablissement agricole des Prairies

Prince Rupert Port Authority

Administration portuaire de Prince-Rupert

Privy Council Office

Bureau du Conseil privé

Public Service Commission

Commission de la fonction publique

Public Service Staff Relations Board

Commission des relations de travail dans la fonction publique

Quebec Port Authority

Administration portuaire de Québec

Regional Development Incentives Board

Conseil des subventions au développement régional

Royal Canadian Mint

Monnaie royale canadienne

Royal Canadian Mounted Police

Gendarmerie royale du Canada

Royal Canadian Mounted Police External Review Committee

Comité externe d'examen de la Gendarmerie royale du Canada

Royal Canadian Mounted Police Public Complaints Commission

Commission des plaintes du public contre la Gendarmerie royale du Canada

Saguenay Port Authority

Administration portuaire du Saguenay

Sahtu Land and Water Board

Office des terres et des eaux du Sahtu

Sahtu Land Use Planning Board

Office d'aménagement territorial du Sahtu

Saint John Port Authority

Administration portuaire de Saint-Jean

The Seaway International Bridge Corporation, Ltd.

La Corporation du Pont international de la voie maritime, Ltée

Security Intelligence Review Committee

Comité de surveillance des activités de renseignement de sécurité

Sept-Îles Port Authority

Administration portuaire de Sept-Îles

Social Sciences and Humanities Research Council

Conseil de recherches en sciences humaines

Standards Council of Canada

Conseil canadien des normes

Statistics Canada

Statistique Canada

Statute Revision Commission

Commission de révision des lois

St. John's Port Authority

Administration portuaire de St. John's

Thunder Bay Port Authority

Administration portuaire de Thunder Bay

Toronto Port Authority

Administration portuaire de Toronto

Treasury Board Secretariat

Secrétariat du Conseil du Trésor

Trois-Rivières Port Authority

Administration portuaire de Trois-Rivières

Vancouver Port Authority

Administration portuaire de Vancouver

Veterans Review and Appeal Board

Tribunal des anciens combattants (révision et appel)

Windsor Port Authority

Administration portuaire de Windsor

Yukon Surface Rights Board

Office des droits de surface du Yukon

Yukon Territory Water Board

Office des eaux du territoire du Yukon

R.S., 1985, c. P-21, Sch.; R.S., 1985, c. 22 (1st Supp.), s. 11, c. 44 (1st Supp.), s. 5, c. 46 (1st Supp.), s. 9; SOR/85-612; R.S., 1985, c. 8 (2nd Supp.), s. 27, c. 19 (2nd Supp.), s. 52; SOR/86-136; R.S., 1985, c. 1 (3rd Supp.), s. 12, c. 3 (3rd Supp.), s. 2, c. 18 (3rd Supp.), s. 39, c. 20 (3rd Supp.), s. 39, c. 24 (3rd Supp.), s. 53, c. 28 (3rd Supp.), s. 308, c. 1 (4th Supp.), s. 48, c. 7 (4th Supp.), s. 7, c. 10 (4th Supp.), s. 22, c. 11 (4th Supp.), s. 15, c. 21 (4th Supp.), s. 5, c. 28 (4th Supp.), s. 36, c. 31 (4th Supp.), s. 101, c. 41 (4th Supp.), s. 53, c. 47 (4th Supp.), s. 52; SOR/88-110; 1989, c. 3, s. 47, c. 27, s. 22; 1990, c. 1, s. 31, c. 3, s. 32, c. 13, s. 25; SOR/90-326, 345; 1991, c. 3, s. 12, c. 6, s. 24, c. 16, s. 23, c. 38, ss. 29, 38; SOR/91-592; 1992, c. 1, ss. 114, 145(F), 155, c. 33, s. 70, c. 37, s. 78; SOR/92-97, 99; 1993, c. 1, ss. 10, 20, 32, 42, c. 3, ss. 17, 18, c. 28, s. 78, c. 31, s. 26, c. 34, ss. 104, 148; 1994, c. 26, ss. 57, 58, c. 31, s. 20, c. 38, ss. 21, 22, c. 41, ss. 29, 30, c. 43, s. 91; 1995, c. 1, ss. 54 to 56, c. 5, ss. 20, 21, c. 11, ss. 31, 32, c. 12, s. 11, c. 18, ss. 89, 90, c. 28, ss. 54, 55, c. 29, ss. 15, 31, 35, 75, 84, c. 45, s. 24; 1996, c. 8, ss. 27, 28, c. 9, s. 28, c. 10, ss. 253, 254, c. 11, ss. 77 to 80, c. 16, ss. 46 to 48; SOR/96-357, 539; 1997, c. 6, s. 84, c. 9, ss. 112, 113, c. 20, s. 55; 1998, c. 9, ss. 44, 45, c. 10, ss. 190 to 194, c. 25, s. 167, c. 26, ss. 77, 78, c. 31, s. 57, c. 35, s. 123; SOR/98-119, 150; SOR/98-321, s. 1; SOR/98-567; 1999, c. 17, ss. 174, 175, c. 31, ss. 177, 178; 2000, c. 6, s. 46, c. 17, s. 90, c. 28, s. 50, c. 34, s. 94(F); SOR/2000-176; SOR/2001-144, s. 1.

  maandag 15 oktober 2001 @ 08:47:41 #106
15098 El-Lupe
Sick of you!
pi_1903494
A.T. Factor: Advanced Time- Piece For A Jigsaw Part 3
Cramp, Leonard G. Trade Paper ISBN: 0932813925

Abcs Of Chakra Therapy: A Workbook
Diemer, Deedre Trade Paper ISBN: 1578630215

Abduction Enigma: An Investigation Of The Alien Abduction Phenomenon
Randle, Kevin D. Trade Cloth ISBN: 0312867085

Abduction Enigma: The Truth Behind The Mass Alien Abductions Of The Late 20th Century
Randle, D. Kevin Trade Paper ISBN: 0312872704

Abduction In My Life: A Novel Of Alien Encounters
Maccabee, Bruce Trade Paper ISBN: 1893183289

Abduction In My Life: A Novel Of Alien Encounters
Maccabee, Bruce Trade Paper ISBN: 0926524542

Aboriginal Men Of High Degree: Initiation And Sorcery In The Worlds Oldest Tradition
Elkin, A. P. Trade Paper ISBN: 0892814217

Above Black : Project Preserve Destiny Insider Account of Alien Contact & Government Cover-Up
Sherman, Dan Paperback ISBN: 0966097807

Above the Zodiac : Astrology in Jewish Thought
Glazerson, Matityahu Trade Paper ISBN: 1568219350

Above Top Secret: The Worldwide Ufo Cover-Up
Good, Timothy Audio Product ~ Analog Audio Cassette ISBN: 1574530658

Abraham: The Initiator On Spirit, Will And Ego
Sutherland, Judith Ann Trade Paper ISBN: 0962524107

Abu Ma'Sar on Historical Astrology : The Book of Religions and Dynasties on Great Conjunctions (Islamic Philosophy, Theology and Science, Texts and st
Yamamoto, Keiji (Edt)/ Burnett, Charles/ Yamamoto, Keiji/ Burnett, cha Hardcover ISBN: 9004117334

Abundance And Right Livelihood: Applications For Living
Walsch, Neale Donald Trade Cloth ISBN: 157174164X

Accept This Gift: Selections From A Course In Miracles
Editor Vaughan, Frances Trade Paper ISBN: 0874777216

Access The Power Of Your Higher Self: Your Source Of Inner Guidance And Spiritual Transformation
Prophet, Elizabeth Clare Trade Paper ISBN: 0922729360

Access To Western Esotericism
Faivre, Antoine Trade Paper ISBN: 0791421783

Access Your Brains Joy Center: The Free Soul Method
Sanders, Pete A., Jr. Trade Paper ISBN: 0964191121

According To Luke: The Gospel Of Compassion And Love Revealed
Steiner, Rudolf Trade Paper ISBN: 0880104880

Acoustic And Elastic Wave Scattering Using Boundary Elements
Silva, J.J. Do Rego -Hardback- ISBN: 1853122939

Acrobats Of The Gods: Dance And Transformation
Blackmer, Joan Trade Paper ISBN: 0919123384

Across Centuries: Nostradamus: Apocalypse, Destiny, And The Great Millenniium
Lee, Mcclaine Trade Paper ISBN: 1581127731

Across The Universe With John Lennon
Keen, Linda Trade Paper ISBN: 1571741372

Across The Unknown
White, Stuart Edward Trade Paper ISBN: 0898041503

Across Time And Death: A Mothers Search For Her Past Life Children
Cockell, Jenny Trade Paper ISBN: 0671889869

Act Of Creation
Koestler, Arthur Trade Paper ISBN: 0140191917

Act Of Meditation
Leichtman, Robert R. Trade Paper ISBN: 0898048303

Activation Of The Sacred Seals
Ellen, Virginia Trade Paper ISBN: 1583486186

Active Meditation: The Western Tradition
Leichtman, Robert R. Trade Paper ISBN: 0898040418

Acupressure For Lovers: Secrets Of Touch For Increasing Intimacy
Gach, Michael Reed Trade Paper ISBN: 055337401X

Acupressure For The Soul: Biological Spirituality And The Gifts Of The Emotions
Fallon, Nancy Trade Paper ISBN: 0929385497

Acupuncture Energetics: A Workbook For Diagnostics And Treatment
Seem, Mark D. Trade Paper ISBN: 0892814357

Acupuncture Imaging: Perceiving The Energy Pathways Of The Body: A Guide For Practitioners And Their Patients
Seem, Mark D. Trade Cloth ISBN: 089281375X

Acupuncture Treatment Of Pain: Safe And Effective Methods For Using Acupuncture In Pain Relief
Chaitow, Leon Trade Paper ISBN: 0892813830

Addicted To Life
Meyer, Monica Trade Paper ISBN: 0595186491

Adenauer : The Father of the New Germany
Williams, Charles Hardcover ISBN: 0316852988

Adepts of the Five Elements
Anrias, David Paperback ISBN: 1578632048

Adirondack Ghosts : Stories of Spirits in New York State's North Country
MacKen, Lynda Lee Paperback ISBN: 0970071817

Adobe Angels
Garcez, Antonio R. Trade Paper ISBN: 0963402935

Adobe Angels
Garcez, Antonio R. Trade Paper ISBN: 0963402927

Adobe Angels: The Ghosts Of Las Cruces & Southern New Mexico
Garcez, Antonio R. Trade Paper ISBN: 0963402943

Adornment Of Hearts
Ozak, Sheikh Muzaffer Trade Paper ISBN: 1879708019

Adrian Tarot
Koehli, Adrian B. Hardcover ISBN: 1572810564

Advanced Candle Magick: More Spells And Rituals For Every Purpose
Buckland, Raymond Trade Paper ISBN: 1567181031

Advanced Interplanetary Civilizations; The Role Of Highly Evolved Beings; Love, Hate, And Marriage: Vol. 3, Book 3
Walsch, Neale Donald Audio Product ~ Analog Audio Cassette ISBN: 1574532960

Advanced Pranic Healing: A Practical Manual On Color Pranic Healing
Sui, Chao Kok Trade Paper ISBN: 1577330927

Advanced Wicca: Exploring Deeper Levels Of Spiritual Skills And Masterful Magick
Telesco, Patricia J. Trade Paper ISBN: 0806521376

Adventuras De Una Psiquica: La Vida Fascinante E Inspiradora De Una De Las Clarividentes Mas Exitosas De America
Browne, Sylvia Trade Paper Spanish ISBN: 1561708003

Adventure in Meditation : Spirituality for the 21st Century
Harra, Carol E. Parrish, Rev., Ph.D. Paperback ISBN: 0945027206

Adventurers Quest: Discovering The Inner Powers Of Hawaiian Healing
Waters, Paul Trade Paper ISBN: 1890850144

Adventures Beyond The Body: How To Experience Out-Of-Body Travel
Buhlman, William Trade Paper ISBN: 0062513710

Adventures In Consciousness: An Introduciton To Aspect Psychology
Roberts, Jane Trade Paper ISBN: 0966132734

Affinity: Reclaiming The Divine Flow Of Creation
Yin, Amorah Quan Trade Paper ISBN: 1879181649

Afirmaciones Cientificas Para La Curacion
Yogananda, Paramahansa Trade Paper Spanish ISBN: 0876121466

African Cosmology Of The Bantu-Kongo: Tying The Spiritual Knot- Principles Of Life & Living
Fu-Kiau Bunseki, Kimbwandende Kia Trade Paper ISBN: 1890157287

African Oracles In Ten Minutes
Kaser, R. T. Trade Paper ISBN: 0380781328

African Spirits Speak: A White Womans Journey Into The Healing Tradition Of The Sangoma
Arden, Nicky Trade Paper ISBN: 0892817526

African Witchcraft and Otherness : A Philosophical and Theological Critique of Intersubjective Relations
Bongmba, Elias Kifon Trade Cloth ISBN: 0791449890

African Witchcraft And Otherness: A Philosophical And Theological Critique Of Intersubjective Relations
Bongmba, Elias Kifon Trade Paper ISBN: 0791449904

Afrikan Alkhemy: Spiritual And Soul Transformation In America
Dismukes, Gwynelle Trade Paper ISBN: 1555237142

After Contact: The Human Response To Extraterrestrial Life
Harrison, Albert A. Trade Cloth ISBN: 0306456214

After Death Communication: Final Farewells
Lagrand, Louis E. Trade Paper ISBN: 1567184057

After Death?: Past Beliefs And Real Possibilities
Edwards, David L. Trade Paper ISBN: 030470458X

After God Is Dibia: Vol. 1
Umeh, Anenechukwu Trade Paper ISBN: 0907015557

After Life, What?: A Post-Death Quest
Pinansky, Robert Trade Paper ISBN: 1885395124

After Postmodernism : Austrian Literature and Film in Transition (Studies in Austrian Literature, Culture, and Thought)
Riemer, Willy (Edt) Paperback ISBN: 1572410914

After The Ecstasy, The Laundry: How The Heart Grows Wise On The Spiritual Path
Kornfield, Jack Trade Paper ISBN: 0553378295

After We Die, What Then?: Evidence You Will Live Forever!
Meek, George W. Trade Paper ISBN: 089804099X

Afterlife Codes: Searching For Evidence Of The Survival Of The Human Soul
Smith, Suzy Trade Paper ISBN: 1571741917

Afternotes Goes to Graduate School : Lectures on Advanced Numerical Analysis
Stewart, G. W./ Stewart, G.W. Paperback ISBN: 0898714044

Afternotes on Numerical Analysis : A Series of Lectures on Elementary Numerical Analysis Presented at the University of Maryland at College Park and r
Stewart, G. W. Paperback ISBN: 0898713625

Afterwards, Youre A Genius: Faith, Medicine, And The Metaphysics Of Healing
Brown, Chip Trade Paper ISBN: 1573227765

Against Relativism: A Philosophical Defense Of Method
Harris, James F. Trade Paper ISBN: 0812692020

Agartha: A Journey To The Stars
Young-Sowers, Meredith L. Trade Paper ISBN: 1883478049

Agathas Journey: 1828-1998
Penrose, Sandra E. Trade Paper ISBN: 0966459008

Ageless Body, Timeless Mind: The Quantum Alternative To Growing Old
Chopra, Deepak Trade Paper ISBN: 0517882124

Ageless Wisdom
Saraydarian, Torkom Paperback ISBN: 0929874137

Aghora II: Kundalini
Svoboda, Robert E. Trade Paper ISBN: 0914732315

Aghora III: The Law Of Karma
Svoboda, Robert E. Trade Paper ISBN: 0914732374

Aghora: At The Left Hand Of God
Svoboda, Robert E. Trade Paper ISBN: 0914732218

Aha!
Crowley, Aleister Trade Paper ISBN: 1561840351

Aha! The Realization Book
Vywamus Trade Paper ISBN: 0929385616

Aham Da Asmi: (Beloved, I Am Da) Book One
Finch, Henry Le Roy Trade Paper ISBN: 1570971137

Aikido For Self Discovery: Blueprint For An Enlightened Life
Wrobel, Stan Trade Paper ISBN: 0738700606

Aikido Sketch Diary: Dojo 365 Days
Homma, Gaku Trade Paper ISBN: 1883319226

Aikido: An Introduction To Tomiki Style
Clapton, M. J. Trade Paper ISBN: 090176423X

Al Azif: The Necronomicon
Alhazred, Abdul Trade Paper Semitic (Other) ISBN: 1587150433

Al-Kemi: A Memoir: Hermetic, Occult, Political, And Private Aspects Of R.A. Schwaller De Lubicz
Vandenbroeck, Andre Trade Cloth ISBN: 0940262304

Alan Okens Complete Astrology
Oken, Alan Trade Paper ISBN: 0553345370

Alas, Poor Ghost!: Traditions Of Belief In Story And Discourse
Bennett, Gillian Trade Paper ISBN: 0874212774

Alas, Poor Ghost!: Traditions Of Belief In Story And Discourse
Bennett, Gillian Trade Cloth ISBN: 0874212782

Albano Waite Miniature Tarot Deck
Hardcover ISBN: 0880793333

Albano-Waite Tarot Deck
Paperback ISBN: 0880794666

Albertus Magnus : Egyptian Secrets, White & Black Art for Man & Beast
De Laurence, L.W. Paperback ISBN: 0787302643

Alchemical Tarot
Guiley, Rosemary Ellen Trade Paper ISBN: 1855383012

Alchemists Handbook
Albertus, Frater Trade Paper ISBN: 0877286558

Alchemists Handbook
Price, John Randolph Trade Paper ISBN: 1561707473

Alchemy
Narrated by Hall, Manly P. Audio Product ~ Analog Audio Cassette ISBN: 0893140023

Alchemy
Holmyard, E. J. Trade Paper ISBN: 0486262987

Alchemy and Alchemists
Martin, Sean Paperback ISBN: 1903047528

Alchemy of Awareness
Sinkler, Lorraine Paperback ISBN: 0962911933

Alchemy Of Happiness
Al-Ghazali Trade Cloth ISBN: 0900860715

Alchemy Of Love
Manufactured by Andrews Mcmeel Publishing Trade Cloth ISBN: 0740700944

Alchemy Of Opposites
Scarfalloto, Rodolfo Trade Paper ISBN: 1561840858

Alchemy Of Possibility: Reinventing Your Personal Mythology
Kleefeld, Carolyn Trade Paper ISBN: 1886708037

Alchemy Of Prayer: Rekindling Our Inner Life
Taylor, Terry Lynn Trade Cloth ISBN: 0915811707

Alchemy Of Sacred Living: Creating A Culture Of Light
Michael, Emory John Trade Paper ISBN: 0964214725

Alchemy Of The Heart: How To Give And Receive More Love
Prophet, Elizabeth Clare Trade Paper ISBN: 0922729603

Alchemy Of The Human Spirit
Carroll, Lee Audio Product ~ Analog Audio Cassette ISBN: 1574531700

Alchemy of the Human Spirit : A Guide to Human Transition into the New Age (Kryon Book 3)
Carroll, Lee Paperback ISBN: 0963630482

Alchemy Rediscovered And Restored
Cockren, A. Trade Paper ISBN: 158509028X

Alchemy The Golden Art: The Secrets Of The Oldest Enigma
De Pascalis, Andrea Trade Cloth ISBN: 8873010253

Alchemy, Comprehensive Bibliography Of The Manly P. Hall Collection Of Books And Manuscripts: Including Related Material On Rosicrucianism And The Wri
Editor Hogart, Ron C. Trade Cloth ISBN: 0893145424

Alchemy: The Art Of Transformation
Ramsay, Jay Trade Paper ISBN: 1855385090

Aleister Crowleys Illustrated Goetia : Sexual Evocation
Duquette, Lon M. Paperback ISBN: 1561840483

Alerta Ovni
Giron Spanish Book Distributors Trade Paper Spanish ISBN: 9684096038

Alexander Technique : How to Use Your Body Without Stress
Barlow, Wilfred Paperback ISBN: 0892813857

Alexandrian And Gardnerian Book Of Shadows
Gardner, Athena Trade Paper ISBN: 0595128459

Algonquin Legends
Leland, Charles G. Trade Paper ISBN: 0486269442

Alien Abduction Reference Guide: 100 Alien Encounters Explored
Lavigne-Wedel, Michelle Trade Paper ISBN: 0970263031

Alien Abduction Survival Guide: How To Cope With Your Et Experience
Lavigne-Wedel, Michelle Trade Paper ISBN: 0970263015

Alien Abductions
Hough, Peter Trade Paper ISBN: 0713727977

Alien Abductions
Netzley, Patricia D. Paper Text ISBN: 1560067675

Alien Abductions
Netzley, Patricia D. Library Binding ISBN: 1565103521

Alien Abductions: Creating A Modern Phenomenon
Matheson, Terry Trade Cloth ISBN: 1573922447

Alien Agenda: Investigating The Extraterrestrial Presence Among Us
Marrs, Jim Mass Market Paperbound ISBN: 0061096865

Alien Agenda: Investigating The Extraterrestrial Presence Among Us
Marrs, Jim Trade Paper ISBN: 0060955368

Alien Alert!
Revere, Paul Trade Paper ISBN: 1585009962

Alien Among Us : A Diversity Game
Powers, Richard B. Paperback ISBN: 1877864749

Alien Apocalypse 2006
Glass, Kathy Trade Paper ISBN: 1883319633

Alien Base : The Evidence for Extraterrestiral Colonization of Earth
Good, Timothy Paperback ISBN: 0380804492

Alien Contact
Spencer, John Trade Paper ISBN: 1575000237

Alien Contact : Top-Secret Ufo Files Revealed
Good, Timothy Hardcover ISBN: 068812223X

Alien Contact: The First Fifty Years
Randles, Jenny Trade Paper ISBN: 0806904763

Alien Contacts And Abductions: The Real Story From The Other Side
Randles, Jenny Trade Paper ISBN: 0806907517

Alien Dawn : An Investigation into the Contact Experience
Wilson, Colin Paperback ISBN: 0880642599

Alien Encounters
Hepplewhite, Peter Trade Paper ISBN: 0806938714

Alien Files: The Secret Of Extra-Terrestrial Encounters And Abductions
Van Dyk, Gregory Trade Cloth ISBN: 1862041350

Alien Intervention: The Spiritual Mission Of The Ufos
Christopher, Paul Trade Paper ISBN: 1563841487

Alien Liaison
Good, Timothy B-Paperback-178 x 110 ISBN: 0099859203

Alien Life: The Search For Extraterrestrials And Beyond
Parker, Barry Trade Cloth ISBN: 0306457954

Alien Rapture : The Chosen
Fouche, Edgar Rothschild/ Fouche, Ed/ Steiger, Brad Paperback ISBN: 1880090503

Alien Tide
Dongo, Thomas A. Trade Paper ISBN: 096227481X

Alienated: A Quest To Understand Contact
Robinson, Jenne Marie Trade Paper ISBN: 188372905X

Aliens
Kenworthy, Christopher Trade Cloth ISBN: 1840720484

Aliens Among Us
Montgomery, Ruth Mass Market Paperbound ISBN: 0449208095

Aliens Amongst Us : A Beginner's Guide
Morris, Peter J. Paperback ISBN: 0340758333

Aliens In America: Conspiracy Cultures From Outerspace To Cyberspace
Dean, Jodi Trade Paper ISBN: 0801484685

Aliens In The Bible
Milor, John W. Trade Cloth ISBN: 0738808164

Aliens In The Bible
Milor, John W. Trade Paper ISBN: 0738808172

Aliens Over America: Twelve Fantastic Books Reviewed Including Interviews With Authors
Guy, Timothy Trade Paper ISBN: 0967563208

Aliens: Encounters With The Unexplained
Day, Marcus Trade Paper ISBN: 0809227703

Aliens: Hay Vida Extaterrestre?
Translator Echevarria, Aurora Trade Paper Spanish ISBN: 8401540488

Alignment To Light
Soskin, Julie Trade Paper ISBN: 1853980749

Alive And Well With Neptune: Transits Of Heart And Soul
Tierney, Bil Trade Paper ISBN: 1567187153

Alive And Well With Pluto: Transits Of Power And Renewal
Tierney, Bil Trade Paper ISBN: 1567187145

Alive And Well With Uranus: Transits Of Self-Awakening
Tierney, Bil Trade Paper ISBN: 1567187137

All About Crystals
Islin, Connie Trade Paper ISBN: 9654941112

All About Dreams
Goldberg, Eili Trade Paper ISBN: 9654940612

All About God: A Dialogue Between Neale Donald Walsch And Deepak Chopra, M.D.
Walsch, Neale Donald Audio Product ~ Analog Audio Cassette ISBN: 156170735X

All About Numerology
Robin, Lia Trade Paper ISBN: 9654941090

All About Palmistry
Shorek, Batia Trade Paper ISBN: 9654940949

All About Tarot
Morag, Hali Trade Paper ISBN: 9654940620

All About The Wicca Of Love
Jennings, Tabatha Trade Paper ISBN: 9654941104

All Around The Zodiac: Exploring Astrologys Twelve Signs
Tierney, Bil Trade Paper ISBN: 0738701114

All Else Is Bondage : Non-Volutionary Living
Wei, Wei Wu Paperback ISBN: 1886656347

All Love: A Guidebook For Healing With Sekhem-Seichim-Reiki And SKHM
Shewmaker, Diane Ruth Trade Paper ISBN: 0967413516

All That You Are: Your True Identity
Angel, Janet Trade Cloth ISBN: 0759606072

All That You Are: Your True Identity
Angel, Janet Trade Paper ISBN: 0759606064

All The Joy You Can Stand: 101 Sacred Power Principles For Making Joy Real In Your Life
Gandy, Debrena Jackson Trade Paper ISBN: 0609807080

All The Joy You Can Stand: 101 Sacred Power Principles For Making Joy Real In Your Life
Gandy, Debrena Jackson Trade Cloth ISBN: 0609605984

All the Secrets of Palmistry for Profession & Popularity
Dayanand Paperback ISBN: 0836428579

All the World Is a Stage
Weaver, Dennis Hardcover ISBN: 1571742875

All Things Are Possible
Harrell, David Edwin Trade Paper ISBN: 0253202213

All Women Are Healers : A Comprehensive Guide to Natural Healing
Stein, Diane, Trade Paper ISBN: 089594409X

All Women Are Psychics: Language Of The Spirit
Bowater, Margaret M. Trade Paper ISBN: 0895949792

Allies Of Humanity: An Urgent Message About The Extraterrestrial Presence In The World Today
Summers, Marshall Vian Trade Paper ISBN: 1884238335


Almanac Of Alien Encounters
Elfman, Eric Trade Paper ISBN: 0679872884

Almanac Of Alien Encounters
Footnotes by Elfman, Eric Library Binding ISBN: 0679972889

Almas Gemelas
Webster, Richard Trade Paper Spanish ISBN: 0738700630

Almas Gemelas: Aprendiendo A Identificar El Amor De Su Vida
Buonfiglio, Monica Trade Paper Spanish ISBN: 9589614434

Alone In The Universe?: The X-Files, Aliens And God
Wilkinson, David Trade Paper ISBN: 083081938X

Along The Path Of Enlightenment
Massey, Sheilana Trade Paper ISBN: 1882897552

Alphonsus Liguori - The Redeeming Love Of Christ: Selected Spiritual Writings
Editor Oppitz, Joseph Trade Paper ISBN: 1565480457

Alternative Realities: The Paranormal, The Mystic, And The Transcendent In Human Experience
George, Leonard Trade Cloth ISBN: 0816028281

Alternative Science: Challenging The Myths Of The Scientific Establishment
Milton, Richard Trade Paper ISBN: 0892816317

Amazing Book Of Tarot
Moore, Joan -Hardback-277 x 245 ISBN: 1858338921

Amazing Book of the Tarot
Moore, John Hardcover ISBN: 0785805672

Amazing Prophecies of the Bible
Dailey, Timothy J. Paperback ISBN: 0451199022

Ambassadors Of Light
Jasmuheen Trade Paper ISBN: 392951270X

Ambikas Guide To Healing And Wholness
Ambika Trade Paper ISBN: 0749912901

Ambrose Bierce Is Missing And Other Historical Mysteries: And Other Historical Mysteries
Nickell, Joe Trade Cloth ISBN: 0813117666

America Here I Come: A Spiritual Journey
Nwokogba, Isaac E. Trade Paper ISBN: 158820104X

American Book Of The Dead
Gold, E. J. Trade Paper ISBN: 0895560518

American Ephemeris 2001-2010
Pottenger, Rique (Com) Paperback ISBN: 0935127518

American Ephemeris for the 20th Century : 1900 to 2000 at Midnight/5th Revised
Michelsen, Neil F. Paperback ISBN: 0935127194

American Ephemeris for the 21st Century : 2000 to 2050 at Noon
Michelsen, Neil F. (Com)/ Pottenger, Rique Paperback ISBN: 0935127585

American Folk Magick: Charms, Spells & Herbals
Ravenwolf, Silver Trade Paper ISBN: 156718720X

American Indian Ghost Stories Of The Southwest
Garcez, Antonio R. Trade Paper ISBN: 0963402978

American Indian Healing Arts: Herbs, Rituals, & Remedies For Every Season Of Life
Kavasch, E. Barrie Trade Paper ISBN: 0553378813

American Indian Secrets Of Crystal Healing
Bourgault, Luc Trade Paper ISBN: 0572022638

American Midpoint Ephemeris 1991-1995
Michelsen, Neil F. Smyth Sewn ISBN: 0935127178

American Midpoint Ephemeris 1996-2000
Michelsen, Neil F. Trade Paper ISBN: 093512747X

Americas Loch Ness Monsters
Rife, Philip L. Trade Paper ISBN: 0595123201

Americas Most Haunted Places
Jones, Jim Trade Paper ISBN: 0878440747

Americas Nightmare Monsters
Rife, Philip L. Trade Paper ISBN: 0595194133

Among All These Dreamers: Essays On Dreaming And Modern Society
Editor Bulkeley, Kelly Trade Paper ISBN: 079142930X

Amorous Initiation: A Novel Of Sacred And Profane Love: An Excerpt From The Memoirs Of The Chevalier Waldemar De L--
Milosz, O. V. De L. Trade Cloth ISBN: 0892814187

Amuletos Y Talismanes
Gonzalez-Wippler, Migene Trade Paper Spanish ISBN: 1567182690

Amulets And Superstitions
Budge, E. A. Wallis Trade Paper ISBN: 0486235734

Amulets and Talismans
Budge, E.A. Wallis, Sir Paperback ISBN: 0806513233

Amulets Of Ancient Egypt
Andrews, Carol Trade Paper ISBN: 029270464X

Amulets Of The Goddess: Oracle Of Womens Wisdom With Other
Blair, Nancy Trade Cloth ISBN: 0914728806

An Abridgement Of The Secret Doctrine
Editor Preston, Elizabeth Trade Paper ISBN: 0835600092

An Alien Harvest: Further Evidence Linking Animal Mutilations And Human Abductions To Alien Life Forms
Howe, Linda Moulton Trade Paper ISBN: 0962057010

An Arrow Through Chaos: How We See Into The Future
Loye, David Trade Paper ISBN: 0892818492

An Arthur Ford Anthology: Writings By And About Americas Sensitive Of The Century
Editor Tribbe, Frank Trade Paper ISBN: 1577330366

An Astrologer Looks At Murder And Violence: A Study Of Murder, Rape, Suicide, And 4th House Endings
Eakins, Pamela Trade Cloth ISBN: 0877287635

An Astrological Diary Of The Seventeenth Century: Samuel Jeake Of Rye, 1652-1699
Jeake, Samuel Trade Cloth ISBN: 0198229623

An Astrological Guide To Self Awareness
Cunningham, Donna Trade Paper ISBN: 0916360571

An Astrological Mandala: The Cycle Of Transformations And Its 360 Symbolic Phases
Rudhyar, Dane Trade Paper ISBN: 0394719921

An Astrological Study Of The Bach Flower Remedies
Damian, Peter -Paperback- ISBN: 0854351957

An Awakening Soul: The Practical Nature Of Spirituality
Sarath, E. Noah Trade Paper ISBN: 1887472444

An Easy Guide To Ayurveda: The Natural Way To Wholeness
Davis, Roy Eugene Trade Paper ISBN: 0877072493

An Edgar Cayce Home Medicine Guide
Turner, Gladys Davis Trade Paper ISBN: 087604139X

An Egyptian Book Of Shadows
Almond, Jocelyn Trade Paper ISBN: 0722538936

An Egyptian Hieroglyphic Reading Book For Beginners
Budge, E. A. Wallis Trade Paper ISBN: 0486274861

An Enchanted Life: An Adepts Guide To Masterful Magick
Telesco, Patricia J. Trade Paper ISBN: 1564145662

An Ethic For The Age Of Space
Leshan, Lawrence Trade Paper ISBN: 0877288542

An Experiment With Time
Dunne, J. W. Trade Paper ISBN: 1571742344

An Herbal Guide To Stress Relief: Gentle Remedies And Techniques For Healing And Calming The Nervous System
Hoffmann, David Trade Paper ISBN: 0892814268

An Illustrated Guide To Angel Therapy
N a Trade Cloth ISBN: 0517163977

An Illustrated Guide To Dream Meanings
N a Trade Cloth ISBN: 0517163993

An Illustrated Guide To Runes
N a Trade Cloth ISBN: 0517163969

An Illustrated Guide To The Tarot
Dee Trade Cloth ISBN: 0517163985

An Illustrated Guide To The Tarot
McCormack, Kathleen -Paperback-280 x 215 ISBN: 1854105930

An Inquiry Into The Existence Of Guardian Angels: A Journalists Investigative Report
Jovanovic, Pierre Trade Paper ISBN: 0871318369

An Inspirational Companion
Williamson, Marianne Audio Product ~ Analog Audio Cassette ISBN: 0694517674

An Introduction To Computational Physics
Pang, Tao Trade Paper ISBN: 0521485924

An Introduction To Numerical Analysis
Atkinson, Kendall E. Trade Cloth ISBN: 0471624896

An Introduction To Real Analysis
Stoll, Manfred -Hardback-248 x 203 ISBN: 0673995895

An Introduction To The Golden Dawn Tarot: Including The Original Documents On Tarot From The Order Of The Golden Dawn With Explanatory Notes
Wang, Robert Trade Paper ISBN: 0877283702

An Invitation To Practice Zen
Low, Albert Trade Paper ISBN: 0804815984

Analisis De La Mano
Myrah, Lawrence Trade Paper Spanish ISBN: 9681300181

Analysis Of Ideology
Boudon, Raymond Trade Cloth ISBN: 0226067300

Analysis Of Numerical Methods
Isaacson, Eugene Trade Paper ISBN: 0486680290

Anam Cara: A Book Of Celtic Wisdom
O'Donohue, John Trade Cloth ISBN: 0060182792

Anatomy Of Miracles: Practical Teachings For Developing Your Capacity To Heal
Khalsa, Subagh Singh Trade Cloth ISBN: 188520373X

Anatomy Of The Spirit: The Seven Stages Of Power And Healing
Myss, Caroline Smyth Sewn ISBN: 0609800140

Anatomy Of The Spirit: The Seven Stages Of Power And Healing
Myss, Caroline Audio Product ~ Analog Audio Cassette ISBN: 1564554074

Ancestors: Hidden Hands, Healing, Spirits For Your Use & Empowerment
Babalawo, Min Ra Ifagbemi Trade Paper ISBN: 1890157112

Ancestral Path Tarot
Hoover, Tracey Trade Paper ISBN: 0880791764

Ancestral Path Tarot Deck
Created by Cuccia-Watts, Julie Other ~ Other ISBN: 0880791411

Ancestral Path Tarot Deck With Book
Hoover, Tracey Other ~ Other ISBN: 0880791101

Ancient Astrology (Sciences of Antiquity Series)
Barton, Tamsyn Trade Paper ISBN: 0415110297

Ancient Astronauts, Cosmic Collisions: And Other Popular Theories About Mans Past
Stiebing, William H. Trade Paper ISBN: 0879752858

Ancient Chinese Prophecies: Till The End Of The World
Am-Chi Trade Paper ISBN: 1585009776

Ancient Echoes: The Anasazi Book Of Chants
Summer Rain, Mary Trade Paper ISBN: 1878901877

Ancient Egyptain Religion
Quirke, Stephen Trade Paper ISBN: 0486274276

Ancient Egyptian Book Of The Dead
Faulkner, Raymond O. Trade Paper ISBN: 0292704259

Ancient Egyptian Divination And Magic
Harris, Eleanor L. Trade Paper ISBN: 1578630363

Ancient Egyptian Magic: Spells, Incantations, Potions, Stories, And Rituals
Brier, Bob Trade Paper ISBN: 0688007961

Ancient Egyptian Mysticism And Its Relevance Today
Van Auken, John Trade Paper ISBN: 0876044224

Ancient Egyptian Oracle: The Cards Of Ra-Maat With Cards
Plaskett, Norman Trade Paper ISBN: 1885203756

Ancient Egyptian Tarot (An Aquarian Book)
Barrett, Clive Paperback ISBN: 0850309689

Ancient Engineers
De Camp, L. Sprague Mass Market Paperbound ISBN: 0345320298

Ancient Enlightened Tarot With Book
Sola-Busca Other ~ Other ISBN: 0738700185

Ancient Greek Love Magic
Faraone, Christopher A. Trade Cloth ISBN: 0674033205

Ancient Hindu Astrology for the Modern Western Astrologer
Braha, James T. Paperback ISBN: 0935895043

Ancient Italian Tarots: 1880
Manufactured by Lo Scarabeo Other ~ Other ISBN: 0738700266

Ancient Minchiate Etruria: 1725 With Other
Manufactured by Lo Scarabeo Other ~ Other ISBN: 073870024X

Ancient Mystic Rites
Leadbeater, C. W. Trade Paper ISBN: 0835606090

Ancient Myths And The New Isis Mystery
Steiner, Rudolf Trade Paper ISBN: 0880103779

Ancient Operative Masonry And The Mysteries Of Antiquity
Parchment, S.R. -Paperback- ISBN: 1564597911

Ancient Secret Of The Flower Of Life
Melchizedek, Drunvalo Trade Paper ISBN: 189182421X

Ancient Secret Of The Flower Of Life
Melchizedek, Drunvalo Trade Paper ISBN: 1891824171

Ancient Signs Of Deception
Ford, Kelly Don Trade Paper ISBN: 1585002062

Ancient Spellcraft: From The Hymns Of The Hittites To The Carvings Of The Celts
Perry, Laura Trade Paper ISBN: 156414576X

Ancient Tarots Of Liguria-Piedmont: 1860
Di Giovanbattista Guala Other ~ Other ISBN: 0738700274

Ancient Tarots Of Lombardy: 1810 With Cards
Di Ferdinando Gumppenberg Other ~ Other ISBN: 0738700282

Ancient Tarots Of Marseilles: 1760 With Cards
Conver, Nicolas Other ~ Other ISBN: 0738700142

Ancient Teachings For Beginners: Auras, Chakras, Angels, Rebirth, Astral Projection
Delong, Douglas Trade Paper ISBN: 1567182143

Ancient Ways: Reclaiming Pagan Traditions
Campanelli, Pauline Trade Paper ISBN: 0875420907

Ancient Wisdom
Besant, Annie Wood Trade Cloth ISBN: 8170592038

Ancient Wisdom For The New Age: Ancient Egypt: The Secrets Of The Sphinx
New Holland LTD Trade Cloth ISBN: 1853689491

Ancient Wisdom For The New Age: Chinese Astrology: The Secrets Of The Stars
New Holland LTD Trade Cloth ISBN: 1853689505

Ancient Wisdom For The New Age: Runes: The Secrets Of The Stones
New Holland LTD Trade Cloth ISBN: 1853689483

Ancient Wisdom For The New Age: Tarot: The Secrets Of The Cards
New Holland LTD Trade Cloth ISBN: 1853689475

Ancient Wisdom Of Egypt
Hope, Murry Trade Paper ISBN: 0722535821

Ancient Wisdom Of The Celts
Hope, Murry Trade Paper ISBN: 0722535864

Ancient Wisdom: Earth Traditions In The Twenty-First Century
Crowley, Vivianne Trade Cloth ISBN: 1858689872

And Now, And Here: On Death, Dying And Past Lives
Rajneesh, Osho Trade Paper ISBN: 0852072864

Andreasson Affair Phase Two : The Continuing Investigation of a Womans Abduction by Alien Beings
Fowler, Raymond E. Paperback ISBN: 0926524283

Andreasson Legacy
Fowler, Raymond Trade Cloth ISBN: 1569247544

Angel Answers: A Joyful Guide To Creating Heaven On Earth
Ramer, Andrew Trade Paper ISBN: 0671525891

Angel Blessings : Cards of Sacred Guidance & Inspiration
Marooney, Kimberly Trade Paper ISBN: 1931412553

Angel Courage: 365 Meditations And Insights To Get Us Through Hard Times
Taylor, Terry Lynn Trade Paper ISBN: 0062515837

Angel Energy: How To Harness The Power Of Angels In Your Everyday Life
Price, John Randolph Trade Paper ISBN: 0449909832

Angel First Aid, RX For Miracles: A Guide To Personal And Professional Development
Storm, Sue Trade Paper ISBN: 0967529107

Angel Letters
Burnham, Sophy Trade Paper ISBN: 0345378660

Angel Meditation Cards
Created by Cafe, Sonia Other ~ Other ISBN: 0880797797

Angel On My Shoulder
Martin, Timothy L. Trade Cloth ISBN: 1888683678

Angel Oracle
Sulfing, Sulamith Trade Paper ISBN: 1885394209

Angel Oracle
Wauters, Ambika Trade Cloth ISBN: 0312133014

Angel Oracle
Wauters, Ambika Hardcover ISBN: 0880797916

Angel Pack: With CD
Wulfing, Sulamith Trade Paper ISBN: 1885394292

Angel Power
Connell, Janice T. Trade Paper ISBN: 0345391233

Angel Power Cards
Created by Von Rohr, Wulfing Other ~ Other ISBN: 0880797711

Angel Tarot
Paperback ISBN: 0913866989

Angel Tech: A Modern Shamans Guide To Reality Selection
Alli, Antero Trade Paper ISBN: 1561840092

Angel Therapy: Healing Messages For Every Area Of Your Life
Virtue, Doreen Trade Paper ISBN: 1561703974

Angel To Watch Over Me: True Stories Of Childrens Encounters With Angels
Anderson, Joan Wester Trade Paper ISBN: 0345397738

Angel Told Me To Tell You Good-Bye: A Little Boys Experience With Death
Stinnett, Leia Trade Paper ISBN: 0929385845

Angel Trails
Davis, Audrey Craft Trade Paper ISBN: 1588511138

Angel Treasury
Womack, Belinda Audio Product ~ Analog Audio Cassette ISBN: 0965985016

Angel Watch: Goosebumps, Signs, Dreams And Divine Nudges
Lanigan, Catherine Trade Paper ISBN: 1558748199

Angeles Crest: A Memoir
Modzelewski, Michael Trade Cloth ISBN: 0966062590

Angeles Guardianes Y Guias Espirituales: Contacte La Ayuda Celestial
Webster, Richard Trade Paper Spanish ISBN: 1567187862

Angelettes And Cosmic Sex
Pusser Trade Paper ISBN: 0941404862

Angelic Healing: Working With Your Angels To Heal Your Life
Freeman, Eileen Elias Trade Paper ISBN: 0446671460

Angelic Messenger Cards: A Divination System For Spiritual Discovery
Young-Sowers, Meredith L. Trade Cloth ISBN: 0913299952

Angelic Wisdom: Celestial Beings And Their Spiritual Powers
Dolfyn Trade Paper ISBN: 0929268199

Angelic Year
Wauters, Ambika Trade Cloth ISBN: 0688174892

Angelorum: El Libro De Los Angeles
Gonzalez-Wippler, Migene Trade Paper Spanish ISBN: 1567183956

Angels
Wulfing, Sulamith Trade Cloth ISBN: 188539442X

Angels : A Beginners Guide
Palmer, Lynn Paperback ISBN: 0340737719

Angels A To Z: A Whos Who Of The Heavenly Host
Bunson, Matthew E. Trade Paper ISBN: 0517885379

Angels Among Us
Fearheiley, Don Demco Turtleback ISBN: 0606061142

Angels And Apparitions: True Ghost Stories From The South
Duffey, Barbara Trade Paper ISBN: 096594770X

Angels And Spirit Guides: How To Call Upon Your Angels And Spirit Guide For Help
Browne, Sylvia Audio Product ~ Analog Audio Cassette ISBN: 1561706914

Angels Around The World
Steiger, Brad Trade Paper ISBN: 0449983692

Angels Guides & Other Spirits: Incredible Events From The Unseen World Around Us As Told By A Spirit Release Therapist
Petrak, Joyce Trade Paper ISBN: 0963317717

Angels Message To Humanity: Ascension To Divine Union: Powerful Enochian Magic
Schueler, Gerald Trade Paper ISBN: 156718605X

Angels Of Cokeville: And Other True Stories Of Heavenly Intervention
Ronner, John Trade Paper ISBN: 0932945430

Angels Of The Rays
Johanna, Mary Trade Paper ISBN: 1880666340

Angels Speak: About The Bible, Jesus, The Jews, The Muslims And The Doctrines Of The Christian Churches
Hathaway, Raymond Trade Paper ISBN: 0595179568

Angels Speak: An Inspirational True Story
Warner, Ann Trade Paper ISBN: 1885003730

Angels Tarot
Guiley, Rosemary Ellen Trade Paper ISBN: 0062511939

Angels We Have Heard On High: A Book Of Seasonal Blessings
Anderson, Joan Wester Trade Cloth ISBN: 0345412036

Angels Within Us
Price, John Randolph Trade Paper ISBN: 0449907848

Angels, A To Z
Lewis, James R. Trade Cloth ISBN: 0787604895

Angels, Demons, & Gods Of The New Millennium: Musings On Modern Magick
Duquette, Lon Milo Trade Paper ISBN: 157863010X

Angels, Einstein and You : A Healers Journey
Mamas, Michael, Dr Paperback ISBN: 1581510357

Angels: The Lifting Of The Veil
Keller, Thomas Trade Paper ISBN: 1878901966

Angelspeake How To Talk With Your Angels
Mark, Barbara Audio Product ~ Analog Audio Cassette ISBN: 1575110008

Animal Healing And Vibrational Medicine
Holloway, Sage Trade Paper ISBN: 1577330781

Animal Magick: The Art Of Recognizing And Working With Familiars
Conway, D. J. Trade Paper ISBN: 1567181686

Animal Medicine: A Guide To Claiming Your Spirit Allies
Sams, Jamie Audio Product ~ Analog Audio Cassette ISBN: 1564555658

Animal Wisdom: Communications With Animals
Curtis, Anita Trade Paper ISBN: 0595180221

Animal Wisdom: The Definitive Guide To The Myth, Folklore And Medicine Power Of Animals
Palmer, Jessica Dawn Trade Paper ISBN: 0007102186

Animal Wise Tarot With Cards
Andrews, Ted Trade Paper ISBN: 1888767359

Animal-Speak: The Spiritual And Magical Powers Of Creatures Great And Small
Andrews, Ted Trade Paper ISBN: 0875420281

Animals As Teachers & Healers: True Stories & Reflections
Mcelroy, Susan Chernak Trade Paper ISBN: 0345421175

Animals Guides For The Soul: Stories Of Life-Changing Encounters
Mcelroy, Susan C. Trade Paper ISBN: 0345424042

Animals of the Chinese Zodiac
Whitfield, Susan Demco Turtleback ISBN: 0606172297

Animals Speak!
Lewis, Betty Trade Paper ISBN: 0759621721

Animated Earth: The Whistling Jugs Of Pre-Columbian Peru
Stat, Daniel Trade Paper ISBN: 1556430000

Anomalistic Psychology: A Study Of Magical Thinking
Editor Zusne, Leonard Trade Paper ISBN: 0805805087

Another Planet?: Or Future Earth
Georges, D. Patrick Trade Cloth ISBN: 0738802832

Answer In The Sky...Almost: Confessions Of An Astrologer
Omarr, Sydney Trade Paper ISBN: 1571740287

Answers Revealed: With Collected Works
Anderson, Kenneth Trade Paper ISBN: 0738849472

Answers: A Divine Connection
Albanese, Yvonne Trade Paper ISBN: 1571741925

Anthroposophy And Astrology: The Astronomical Letters Of Elizabeth Vreede
Vreede, Elisabeth Paper Text ISBN: 0880104902

Anti-Gravity & The Unified Field
Childress, David Hatcher Trade Paper ISBN: 0932813100

Anti-Gravity And The World Grid
Editor Childress, David H. Trade Paper ISBN: 0932813038

Antilles Incident
Todd, Donald Trade Paper ISBN: 1881542378

Aora Gemstone Oracle: Cards To Explore The Crystal Realms
Mckeon, James Trade Paper ISBN: 0966449207

Aphorisms on Spiritual Method : The 'Yoga Sutras of Pantanjali' in the Light of Mystical Experience
Whiteman, J. H. Hardcover ISBN: 0861403541

Aphrodites Daughters: Womens Sexual Stories And The Journey Of The Soul
Bonheim, Jalaja Trade Paper ISBN: 0684830809

Apocalypse 2000: The Future
Heron, Patrick Trade Paper ISBN: 1898256764

Apocalypse Wow!
Garner, James Finn Trade Cloth ISBN: 0783882262

Apocatastasis
Chilton, Pamela Trade Paper ISBN: 0965989100

Apocrypha For The Royal Christ
Pae, William S. Trade Paper ISBN: 0595192122

Apology: A New Age Meditation
Arias, Robert Trade Paper ISBN: 073880911X

Apparitions In Late Medieval And Renaissance Spain
Christian, William A., Jr. Trade Paper ISBN: 0691008264

Applied Astrology
Hone, M. -Paperback- ISBN: 0852430736

Applied Magic
Fortune, Dion Trade Cloth ISBN: 1578631858

Applied Pa-Kua And Lo Shu Feng Shui: In Collaboration With Feng Shui Master Yap Cheng Hai
Too, Lillian Trade Paper ISBN: 0958711305

Appointment With Destiny: Real Life Case Histories
De Jersey, Katherine Trade Cloth ISBN: 1885142145

Apprentice To A Death Defier: Part 1: Scales Of The Dragon
Avendar Dragon Trade Paper ISBN: 1585003670

Apprentice To Power: A Wiccan Odyssey To Spiritual Awakening
Roderick, Timothy Trade Paper ISBN: 1580910777

Aprenda Astrologia
March Trade Paper Spanish ISBN: 8427013442

Aprenda Como Leer El Tarot: Una Guia Practica
Louis, Anthony Trade Paper Spanish ISBN: 1567184022

Aquarian Gospel Of Jesus The Christ: The Philosophic And Practical Basis Of The Religion Of The Aquarian Age Of The World And Of The Church Univer
Dowling, Levi H. Trade Paper ISBN: 0875161685

Aquarian Tarot Deck
Palladini, David Other ~ Other ISBN: 0913866695

Aquarian Tarot Deck With Book
Junjulas, Craig Other ~ Other ISBN: 0880795921

Aquarius
Manufactured by Berkley Trade Paper ISBN: 0425174611

Aquarius
Manufactured by Berkley Publishing Group Trade Paper ISBN: 042517980X

Aquarius
-Paperback- ISBN: 0711711046

Aquarius
Ariel Trade Cloth ISBN: 0836278798

Aquarius
Manufactured by Workman Publishing Calendar ~ Other ISBN: 076112425X

Aquarius
Jove Mass Market Paperbound ISBN: 0515128252

Aquarius
King, Teri Trade Paper ISBN: 0007121385

Aquarius : January 21-February 18
Parker, Julia Hardcover ISBN: 1564580946

Aquarius Woman: January 21-February 19 With Bookmark
Mars, Julie Trade Cloth ISBN: 0740714279

Aquarius: A Little Book Of Zodiac Wisdom, A Pop-Up Book
Running Press Book Publishers Trade Cloth ISBN: 0762400358

Aquarius: January 20-February 18
Manufactured by Jove Mass Market Paperbound ISBN: 051513077X

Aquarius: January 21 To February 19
Hill, Brian Audio Product ~ Analog Audio Cassette ISBN: 192943510X

Aquarius: January 21-February 19
Adams, Jessica Trade Paper ISBN: 0451409507

Aquarius: January 21-February 19
Editor Fox, Jennifer Trade Cloth ISBN: 0740710699

Aquarius: Little Birth Sign
Andrews Mcmeel Publishing Trade Cloth ISBN: 0836230698

Aquarius: Your Astrological Profile And The Songs That Define You
Hodges, Jane Trade Cloth ISBN: 0811830543

Aquarius: Your Personal Horoscope
American Astroanalysts Institute Trade Paper ISBN: 0425175685

Aquarius: Your Sun-And-Moon Guide To Love And Life
Rice, Patty Trade Paper ISBN: 0836235525

Arabic Parts In Astrology: The Lost Key To Prediction
Zoller, Robert Trade Paper ISBN: 0892812508

Aradia : Gospel of the Witches
Leland, Charles G./ Pazzaglini, Mario Paperback ISBN: 0919345344

Aradia: Gospel Of The Witches
Leland, Charles Audio Product ~ Analog Audio Cassette ISBN: 1574530399

Arc Of The Arrow: Writing Your Spiritual Autobiography
Erickson, Carolly Trade Paper ISBN: 0671017454

Arcana Mundi: Magic And The Occult In The Greek And Roman Worlds; A Collection Of Ancient Texts
Luck, Georg Trade Paper ISBN: 0801825482

Arcana Of Freemasonry
Churchward, Albert -Paperback- ISBN: 1564591069

Archaic Revival: Speculations On Psychedelic Mushrooms, The Amazon, Virtual Reality, Ufos, Evolution, Shamanism, The Rebirth Of The God
Mckenna, Terence Trade Paper ISBN: 0062506137

Archetypal Chakras: Meditations And Exercises For Opening Your Chakras
Bittlinger, Arnold Trade Paper ISBN: 1578632102

Archetypal Kingdom
Colton, Ann Ree Hardcover ISBN: 0917189078

Archetypal Reiki: Spiritual, Emotional & Physical Healing With Cards
May, Dorothy Smyth Sewn ISBN: 188520390X

Archetype Of Initiation: Sacred Space, Ritual Process, And Personal Transformation
Essay by Moore, Robert L. Trade Cloth ISBN: 0738847658

Archetype Of Initiation: Sacred Space, Ritual Process, And Personal Transformation
Essay by Moore, Robert L. Trade Paper ISBN: 073884764X

Archetypes Of The Zodiac
Burt, Kathleen Trade Paper ISBN: 0875420885

Arching Backward: The Mystical Initiation Of A Contemporary Woman
Adler, Janet Trade Paper ISBN: 0892815469

Architects Of The Underworld: Unriddling Atlantis, Anomalies Of Mars, And The Mystery Of The Sphinx
Rux, Bruce Trade Paper ISBN: 1883319463

Arcturian Songs Of The Masters Of Light: Acturian Star Chronicles, Vol. 4
Pereira, Patricia L. Trade Paper ISBN: 1885223692

Arcturus Probe: Tales And Reports Of An Ongoing Investigation
Arguelles, Jose Trade Paper ISBN: 0929385756

Are We Alone In The Cosmos?: The Search For Alien Contact In The New Millennium
Editor Bova, Ben Trade Paper ISBN: 0671038923

Are We Listening To The Angels?: The Next Step In Understanding Angels In Our Lives
Grant, Robert J. Trade Paper ISBN: 0876043279

Are You Getting Enlightened or Losing Your Mind? : A Spiritual Program for Mental Fitness
Gersten, Dennis, MD Hardcover ISBN: 051770725X

Are You Psychic?: A Guide To Developing And Using Your Natural Psychic Abilities
Holzer, Hans Trade Paper ISBN: 0895297884

Are You Ready For A Miracle?...With Angels: A Practical Guide To Understanding Angels In Everyday Life
Wagner, Angelica Eberle Trade Paper ISBN: 1896375006

Are You Really Too Sensitive?: How To Understand And Develop Your Sensitivity As The Strength It Is
Calhoun, Marcy Trade Paper ISBN: 0931892104

Area 51: The Dreamland Chronicles
Darlington, David Trade Cloth ISBN: 0805047778

Area 51: The Dreamland Chronicles
Darlington, David Trade Paper ISBN: 0805060405

Ariadnes Book Of Dreams: A Dictionary Of Ancient And Contemporary Symbols
Green, Ariadne Trade Paper ISBN: 0446677523

Ariadnes Thread: A Workbook Of Goddess Magic
Mountainwater, Shekhinah Trade Paper ISBN: 0895944758

Aries
Goodman, Linda Audio Product ~ Analog Audio Cassette ISBN: 157453243X

Aries
Omarr, Sydney Mass Market Paperbound ISBN: 0451193075

Aries
Manufactured by Berkley Publishing Group Trade Paper ISBN: 0425179702

Aries
Manufactured by Berkley Trade Paper ISBN: 0425174514

Aries
-Paperback- ISBN: 0711711062

Aries
Ariel Trade Cloth ISBN: 0836278801

Aries
Manufactured by Workman Calendar ~ Other ISBN: 0761124268

Aries
Jove Mass Market Paperbound ISBN: 0515128155

Aries
King, Teri Trade Paper ISBN: 1852309776

Aries
King, Teri Trade Paper ISBN: 0007121393

Aries (Reach Your Potential Series)
Moorey, Teresa Paperback ISBN: 0340697091

Aries Woman: March 21-April 20 With Bookmark
Mars, Julie Trade Cloth ISBN: 0740714287

Aries: A Little Book Of Zodiac Wisdom, A Pop-Up Book
Running Press Book Publishers Trade Cloth ISBN: 0762400307

Aries: March 21 To April 20
Hill, Brian Audio Product ~ Analog Audio Cassette ISBN: 1929435002

Aries: March 21-April 20
Adams, Jessica Trade Paper ISBN: 0451409523

Aries: March 21-April 20
Editor Fox, Jennifer Trade Cloth ISBN: 0740710702

Aries: March 21-April 20
American Astroanalysts Institute Trade Paper ISBN: 0425175588

Aries: March 21-April 20
Manufactured by Jove Mass Market Paperbound ISBN: 0515130672

Aries: Your Astrological Profile And The Songs That Define You
Hodges, Jane Trade Cloth ISBN: 0811830578

Aries: Your Sun-And-Moon Guide To Love And Life
Rice, Patty Trade Paper ISBN: 0836235533

Ark Of The Covenant, The Holy Grail: Message For The New Millennium
Bernstein, Henrietta Trade Paper ISBN: 0875167225

Arktos : The Polar Myth in Science, Symbolism, and Nazi Survival
Godwin, Joscelyn Trade Paper ISBN: 0932813356

Armageddon 2000
Johnson, Kenneth Rayner Trade Paper ISBN: 1871592275

Aromaterapia: Descubra Los Usos Terapeuticos De Los Aceites Ensenciales
Berwick, Ann Trade Paper Spanish ISBN: 1567180663

Aromatherapy For Practitioners
Grace, Ulla-Maija Trade Paper ISBN: 0852072937

Aromatherapy Handbook
Ryman, Daniele Trade Paper ISBN: 0852072155

Aromatherapy Workshop
Perez Paperback ISBN: 1861262566

Aromatherapy: Scent And Psyche: Using Essential Oils For Physical And Emotional Well-Being
Damian, Peter Trade Paper ISBN: 0892815302

Arrival Of The Gods: Revealing The Alien Landing Sites Of Nazca
Von Daniken, Erich Trade Paper ISBN: 1862047480

Art & Practice of Creative Visualization
Ophiel Paperback ISBN: 1578630010

Art And Practice Of Astral Projection
Ophiel Trade Paper ISBN: 0877282463

Art And Symbols Of The Occult: Images Of Power And Wisdom
Wasserman, James Trade Paper ISBN: 0892814152

Art Nouveau Tarot Deck
Created by Myers, Matt Other ~ Other ISBN: 0880793759

Art Of Becoming: A Blend Of Science With Spirituality, A Theoretical And Practical Guide To Personal Transformation
Basin, Gene Trade Paper ISBN: 1583485406

Art Of Becoming: A Blend Of Science With Spirituality, A Theoretical And Practical Guide To Personal Transformation; Book 2-Practice
Basin, Gene Trade Paper ISBN: 0595088740

Art Of Chart Interpretation: A Step-By-Step Method Of Analyzing, Synthesizing And Understanding The Birth Chart
Marks, Tracy Trade Paper ISBN: 0916360296

Art Of Creative Thinking
Peterson, Wilfred A. Trade Paper ISBN: 1561700045

Art Of Dowsing
Webster, Richard Trade Cloth ISBN: 0785814302

Art Of Dreaming
Castaneda, Carlos Trade Paper ISBN: 006092554X

Art Of Effortless Living: Simple Techniques For Healing Mind, Body And Spirit
Bacci, Ingrid Trade Cloth ISBN: 0967850711

Art Of Everyday Ecstasy
Anand, Margot Trade Paper ISBN: 0767901991

Art Of Hand Analysis
Bashir, Mir Trade Paper ISBN: 1853981028

Art Of Hand Reading
Dorling Kindersley Publishing Trade Paper ISBN: 0789448378

Art of Happiness : A Handbook for Living
Cutler, Howard Paperback ISBN: 0340750154

Art Of Inner Listening
Crum, Jessie K. Trade Paper ISBN: 0835603032

Art Of Living
Leichtman, Robert R. Trade Paper ISBN: 0898040345

Art Of Living
Leichtman, Robert R. Trade Paper ISBN: 0898040760

Art Of Living: A Collection Of Six Essays
Leichtman, Robert R. Trade Paper ISBN: 0898040337

Art Of Meditation
Goldsmith, Joel S. Trade Paper ISBN: 0062503790

Art Of Meditation
Wilde, Stuart Audio Product ~ Compact Disk ISBN: 1561705306

Art Of Mehndi
Batra, Sumita; Wilde, Liz -Paperback-231 x 254 ISBN: 1858686555

Art Of Practical Spirituality: How To Bring More Passion, Creativity And Balance Into Everyday Life
Prophet, Elizabeth Clare Trade Paper ISBN: 0922729557

Art Of Psychic Protection
Hall, Judy Trade Paper ISBN: 1578630266

Art of Relationships : Harmony Within Change - Using Astrology to Understand Human Nature
Pond, David Paperback ISBN: 0935127704

Art Of Ritual: A Guide To Creating And Performing Your Own Rituals For Growth And Change
Beck, Renee Trade Paper ISBN: 0890875820

Art Of Spiritual Dreaming: How Dreams Can Make You Find More Love And Happiness
Klemp, Harold Trade Paper ISBN: 1570431493

Art Of Spiritual Healing
Goldsmith, Joel S. Trade Paper ISBN: 0062503642

Art Of Spiritual Healing
Goldsmith, Joel S. Trade Cloth ISBN: 1889051128

Art Of Tarot
Olsen, Christina Trade Paper ISBN: 0789200163

Art Of Tea: Meditations To Awaken Your Spirit
Osho Paper Text ISBN: 0312286570

Art Of Technique: An Aesthetic Approach To Film And Video Production
Douglass, John S. Trade Paper ISBN: 0205142486

Art Of True Healing: Prayer And The Law Of Attraction Classic Wisdom Collection
Regardie, Israel Trade Paper ISBN: 1577310128

Arthur C. Clarkes Mysteries
Fairley, John Trade Cloth ISBN: 157392833X

Arthurian Tarot
Matthews, Caitlin Trade Paper ISBN: 0850308437

Arthurian Tradition : A Beginner's Guide
Hamilton, Claire Paperback ISBN: 0340781467

Articulating Reasons: An Introduction To Inferentialism
Brandom, Robert B. Trade Cloth ISBN: 0674001583

Artists of the Spirit : New Prophets in Art and Mysticism
Nelson, Mary Carroll Paperback ISBN: 0916955141

Arts Of Divination
Adcock, William Trade Paper ISBN: 184215463X

As Chance Would Have It: A Study In Coincidences
Moolenburgh, Hans C. Trade Paper ISBN: 0852073178

As It Is: The Open Secret To Living An Awakened Life
Parsons, Tony Trade Paper ISBN: 1878019104

As They Walk Among Us: An Amazing Look At Nature-Within-Nature
Ruman, Jeannie Madelyn Trade Paper ISBN: 1570779708

As You Think
Allen, James Trade Paper ISBN: 1577310748

Ascendant: Your Karmic Doorway
Schulman, Martin Trade Paper ISBN: 0877285071

Ascension & Romantic Relationships (The Easy-To-Read Encyclopedia of the Spiritual Path Series No. Xiii)
Stone, Joshua David/ Parker, Janna Shelley Paperback ISBN: 1891824163

Ascension Activation Meditations Of The Spiritual Hierarchy: A Compilation
Stone, Joshua David Trade Paper ISBN: 0595177603

Ascension Index And Glossary
Stone, Joshua David Trade Paper ISBN: 189182418X

Ascension Names And Terms Glossary
Stone, Joshua David Trade Paper ISBN: 0595187870

Ascension Through The Veil: Communicating With The Recent And Soon To Be Born. A Sharing Of Wisdom To Assist And Guide Humanity Into The New Mille
Hoeben, Ingrid Trade Paper ISBN: 1581127618

Ash Wednesday Supper/LA Cena De Le Ceneri : LA Cena De Le Ceneri (Renaissance Society of America Reprint Texts, 4)
Bruno, Giordano/ Lerner, Lawrence S./ Gosselin, Edward A./ renaissance Trade Paper ISBN: 0802074693

Ashkis Divan
Ozak, Sheikh Muzaffer Trade Paper ISBN: 1879708027

Asian Animal Zodiac
Sun, Ruth Q. Trade Cloth ISBN: 0785811214

Asian Animal Zodiac
Sun, Ruth Q. Trade Paper ISBN: 0804820821

Ask Your Angels
Daniel, Alma Audio Product ~ Analog Audio Cassette ISBN: 1574532049

Ask Your Angels
Daniel, Alma Trade Paper ISBN: 0345363582

Aspects And Personality
Hamaker-Zondag, Karen Trade Paper ISBN: 0877286507

Aspects In Astrology
Tompkins, Sue -Paperback-236 x 156 ISBN: 0712611045

Aspects Of Occultism
Fortune, Dion Trade Cloth ISBN: 1578631866

Aspects of Reason
Grice, H. P./ Warner, Richard (Edt)/ Grice, Paul Hardcover ISBN: 0198242522

Aspiring Mystic: Practical Steps For Spiritual Seekers
Mccolman, Carl Trade Paper ISBN: 1580624162

Assaulting With Words: Popular Discourse And The Bridle Of Shariah
Ibrahim, Abduliahi Ali Trade Cloth ISBN: 0810110814

Asteroid Ephemeris 1900-2050
Michelsen, Neil F. Paperback ISBN: 0935127666

Astral Body And Other Astral Phenomena
Powell, Arthur E. Trade Paper ISBN: 0835604381

Astral Dynamics: A New Approach To Out-Of-Body Experience
Bruce, Robert Trade Paper ISBN: 1571741437

Astral Odyssey: Exploring Out-Of-Body Experiences
Eby, Carol Trade Paper ISBN: 0877288607

Astral Projection : A Beginner's Guide (Headway Guides for Beginners)
Craze, Richard Paperback ISBN: 0340737557

Astral Projection a Record of Out of the Body Experiences
Crookall, Robert Trade Paper ISBN: 0806504633

Astral Projection And Psychic Empowerment: Techniques For Mastering The Out-Of-Body Experience
Slate, Joe H. Trade Paper ISBN: 156718636X

Astral Projection For Beginners: Learn Several Techniques To Gain A Broad Awareness Of Other Realms Of Existence
Mccoy, Edain Trade Paper ISBN: 1567186254

Astral Projection Kit With Cassette(S)
Denning, Melita Boxed Set/Slip Case/Casebound ISBN: 0875421997

Astral Projection Workbook: How To Achieve Out-Of-Body Experiences
Brennan, James H. Trade Paper ISBN: 0806973064

Astral Projection: A Beginners Guide
Craze, Richard Trade Paper ISBN: 0340674180

Astral Travel For Beginners: Transcend Time And Space With Out-Of-Body Experiences
Webster, Richard Trade Paper ISBN: 156718796X

Astral Travel: Your Guide To The Secrets Of Out-Of-The-Body Experiences
Frost, Gavin Trade Paper ISBN: 0877283362

Astral Voyages: Mastering The Art Of Interdimensional Travel
Goldberg, Bruce Trade Paper ISBN: 1567183085

Astral World: Its Scenes, Dwellers, And Phenomena
Panchadasi, Swami Trade Paper ISBN: 1585090719

Astro Star Kards: Astrological Study Aid & Divination Cards For The New Millennium
Asin, Arlene Other ~ Other ISBN: 0966389603

Astro-Cycles: The Traders Viewpoint
Pesavento, Larry Trade Paper ISBN: 0934380317

Astro-Theology: How Astrology Has Influenced Mankind
Narrated by Hall, Manly P. Audio Product ~ Analog Audio Cassette ISBN: 0893140112

Astrolabe World Ephemeris: 2001-2050 At Midnight
Hand, Robert -Paperback-280 x 215 ISBN: 0924608226

Astrolabe World Ephemeris: 2001-2050 At Noon
Hand, Robert -Paperback-280 x 215 ISBN: 0924608234

Astrolocality Astrology
Davis, Martin -Paperback-234 x 156 ISBN: 1902405056

Astrologers Guide
Bonatus, Guideo (Trn)/ Coley, Henry (Trn) Paperback ISBN: 0787301159

Astrologers Handbook
Sakoian, Frances Trade Paper ISBN: 006272004X

Astrologers Handbook: Your Guide To Life
Parker, Julia Trade Paper ISBN: 0916360598

Astrologers Node Book
Van Toen, Donna Trade Paper ISBN: 0877285217

Astrologia Dinamica
Townley, John Trade Paper Spanish ISBN: 0892815876

Astrologia Espiritual
Spiller, Jan Trade Paper Spanish ISBN: 0684813297

Astrologia Para Principiantes: Interprete Su Carta Natal
Hewitt, William W. Trade Paper Spanish ISBN: 1567183492

Astrologia, Numerolgia Y Feng-Shui
Koppel, Monica Trade Paper Spanish ISBN: 9681908058

Astrological
Manufactured by Llewellyn Calendar ~ Wall ISBN: 0738700355

Astrological Gardening: The Ancient Wisdom Of Successful Planting And Harvesting By The Stars
Riotte, Louise Trade Paper ISBN: 0882665618

Astrological Guide For You In 2000
Omarr, Sydney Mass Market Paperbound ISBN: 0451193547

Astrological Guide To Seduction And Romance: How To Love A Libra, Turn On A Taurus, And Seduce A Sagittarius
Sheppard, Susan Trade Paper ISBN: 0806520841

Astrological Guide to Your Child
Parmer, Leticia Hardcover ISBN: 0735101159

Astrological Guide to Your Child : A Handbook for Parents
Parmer, Leticia Paperback ISBN: 0806519126

Astrological Healing: The History And Practice Of Astromedicine
Ebertin, Reinhold Trade Paper ISBN: 0877287112

Astrological Houses: A Psychological View Of Man And His World
Huber, Bruno Trade Paper ISBN: 087728587X

Astrological Houses: The Spectrum Of Individual Experience
Rudhyar, Dane Trade Paper ISBN: 0916360245

Astrological Insights into Personality
Lundsted, Betty Paperback ISBN: 0917086228

Astrological Intelligence: A Practical Guide To Navigating Lifes Everyday Decisions
Valeria, Andrea Trade Paper ISBN: 0609801619

Astrological Keywords
Hall, Manly P. Trade Paper ISBN: 0893145033

Astrological Keywords
Hall, Manly P. Trade Paper ISBN: 0893148377

Astrological Keywords
Hall, Manly Palmer Paperback ISBN: 0822602997

Astrological Moon: Aspects, Signs, Cycles, And The Mythology Of The Goddess In Your Chart
Paul, Haydn Trade Paper ISBN: 1578630320

Astrological Neptune And The Quest For Redemption
Greene, Liz Trade Cloth ISBN: 0877288577

Astrological Neptune And The Quest For Redemption
Greene, Liz Trade Paper ISBN: 1578631971

Astrological Passages : The Planetary Pattern of Growth
Ruperti, Alexander Paperback ISBN: 0935127755


Astrological Pocket Planner
Manufactured by Llewellyn Calendar ~ Other ISBN: 073870041X

Astrological Psychosynthesis: The Integration Of Personality, Love And Intelligence In The Horoscope
Huber, Bruno Trade Paper ISBN: 0877288666

Astrological Revelations
Willner, John Mass Market Paperbound ISBN: 0312965516

Astrological Secrets For The New Millennium
Baum, Laurie A. Trade Cloth ISBN: 0517206552

Astrological Timing Of Critical Illness: Early Warning Patterns In The Horoscope
Tyl, Noel Trade Paper ISBN: 1567187382

Astrological Tryptich: Gifts Of The Spirit, The Illumined Road, The Way Through
Rudhyar, Dane Trade Paper ISBN: 0943358108

Astrologickal Magick
Daniels, Estelle Trade Paper ISBN: 0877288267

Astrology
Parker, Derek Trade Paper ISBN: 0789460440

Astrology
MQ Publications Trade Cloth ISBN: 1897954603

Astrology
Readings Research Dept Trade Cloth ISBN: 0876041594

Astrology
Grenard, Christine -Paperback-180 x 144 ISBN: 1842021273

Astrology
Starr, Amanda Trade Paper ISBN: 9654940973

Astrology
Golder, Carole Trade Paper ISBN: 0749920343

Astrology
Diagram Group Trade Paper ISBN: 0004709675

Astrology
Harvey, Charles Trade Cloth ISBN: 0007103328

Astrology & Relationships: Techniques For Harmonious Personal Connections
Pond, David Trade Paper ISBN: 0738700460

Astrology & Your Child: A Handbook For Parents
Star, Gloria Trade Paper ISBN: 1567186491

Astrology (The Pocket Prophecy Series)
Reid, Lori Hardcover ISBN: 186204483X

Astrology : A Beginner's Guide
Boston, Graham Paperback ISBN: 0340774851

Astrology : The Classic Guide to Understanding Your Horoscope
Davison, Ronald C. Paperback ISBN: 0916360377

Astrology : The Next Step : Complete Horoscope Interpretation
Pottenger, Maritha Paperback ISBN: 0935127631

Astrology And Childhood: A Parenting Guide
West, Peter Trade Paper ISBN: 190280922X

Astrology And Consciousness: The Wheel Of Light
Olesky, Rio Trade Paper ISBN: 1561841234

Astrology And Destiny
Morningstar, Sally Trade Paper ISBN: 1842154443

Astrology And Health
Geddes, Shelia Trade Paper ISBN: 0572018223

Astrology and Health : A Beginner's Guide
Warren-Davis, Dylan Paperback ISBN: 0340774843

Astrology And Reincarnation
Hall -Hardback- ISBN: 0893148059

Astrology and Reincarnation (Three Volumes in One Book)
Yott, Donald H. Paperback ISBN: 0877287015

Astrology And Sexual Analysis
Goodman, Morris C. Trade Paper ISBN: 087980405X

Astrology And Spiritual Awakening
Bogart, Gregory C. Trade Paper ISBN: 0963906836

Astrology And The Spiritual Path: The Spiritual Significance Of Age Progression
Huber, Bruno Trade Paper ISBN: 0877287066

Astrology And You
Righter, Carroll Trade Paper ISBN: 087980422X

Astrology Anyone?
Renee, Alyce (Ilt)/ Renee, Alyce Paperback ISBN: 1890035203

Astrology Beyond Ego
Lyons, Tim Trade Paper ISBN: 0835606120

Astrology Book
Bondi, Julia A. Trade Cloth ISBN: 0836247426

Astrology Book Of The Day: An Illustrated Perpetual Calendar
Miller, Susan Calendar ~ Other ISBN: 0446911313

Astrology Encyclopedia
Lewis, James R. Trade Paper ISBN: 081039460X

Astrology File
Sachs, Gunther -Hardback-216 x 135 ISBN: 0752817892

Astrology File : Scientific Proof of the Link Between Star Signs and Human Behavior
Sachs, Gunter Paperback ISBN: 0752826956

Astrology For Beginners: An Easy Guide To Understanding And Interpreting Your Chart
Hewitt, William Trade Paper ISBN: 0875423078

Astrology For Cats
Reyes, Simone Trade Paper ISBN: 1562453408

Astrology For Dogs
Reyes, Simone Trade Paper ISBN: 1562453440

Astrology For Dummies
Orion, Rae Trade Paper ISBN: 0764552171

Astrology For Initates: Astrological Secrets Of The Western Mystery Tradition
Translator Lehman, J. Lee Trade Paper ISBN: 0877288941

Astrology for Life
Hawthorne, David/ Choudhry, V. K. Paperback ISBN: 1887472754

Astrology For Living: Enhance You Well-Being, Your Relationships, Your Money And Professional Life, Your Home And Pastimes
Fenton, Sasha Trade Cloth ISBN: 0762102306

Astrology For Living: How To Maximise Your True Potential
Fenton, Sasha -Paperback- ISBN: 1855857510

Astrology For Lovers
Greene, Liz -Paperback-216 x 134 ISBN: 0722538278

Astrology For Lovers
Greene, Liz Trade Paper ISBN: 0877287023

Astrology For Regular People
Text by (Art/Photo Books) Pluto Project Trade Paper ISBN: 0966298276

Astrology For Self Empowerment: Techniques For Reclaiming Your Sacred Power
Strusiner, Dovid Trade Paper ISBN: 1567186440

Astrology for the Absolute Beginner : How to Interpret Your Own Birth Chart
Mann, Mark Paperback ISBN: 0964847000

Astrology For The Millions
Lewi, Grant Trade Paper ISBN: 0875424384


Astrology For The Soul
Spiller, Jan Trade Paper ISBN: 0553378384

Astrology for Women : Roles & Relationships (Llewellyns New World Astrology Series, Bk 16)
Star, Gloria (Edt) Paperback ISBN: 1567188605

Astrology For Yourself: How To Understand And Interpret Your Own Birth Chart: A Workbook For Personal Transformation
George, Demetra Trade Paper ISBN: 091472861X

Astrology In The Age Of Aquarius
Pelton, Robert W. Trade Paper ISBN: 0595192424

Astrology Kit
Lewi, Grant Trade Cloth ISBN: 0312013507

Astrology Kit
Lewi, Grant; Greene, Liz 2 x bk, zodiac wheel and chinagraph pencil-Mixed-m ISBN: 1859060129

Astrology Made Easy
Astarte Trade Paper ISBN: 0879800097

Astrology Of Family Dynamics
Sullivan, Erin Trade Paper ISBN: 1578631793

Astrology Of Fate
Greene, Liz Trade Paper ISBN: 0877286361

Astrology Of Human Relations
Sakoian, Frances Trade Paper ISBN: 0062720309

Astrology Of Personality: A Re-Formulation Of Astrological Concepts And Ideals, In Terms OfContemporary Psychology And Philosophy
Rudhyar, Dane Trade Paper ISBN: 0943358256

Astrology Of Relationships: A Humanistic Approach To The Practice Of Synastry
Meyer, Michael R. Trade Paper ISBN: 0595089348

Astrology of Self-Discovery
Marks, Tracy Paperback ISBN: 0916360202

Astrology Of Sexuality
Schulman, Martin Trade Paper ISBN: 0877284814

Astrology Of The Four Horseman: How You Can Heal Yourself And Planet Earth
Prophet, Elizabeth Clare Trade Paper ISBN: 0922729069

Astrology of the Golden Dawn (Golden Dawn Studies Number 10)
Brodie-Innes, J. W./ Kuntz, Darcy (Edt) Paperback ISBN: 1558183450

Astrology Of The Seers: A Guide To Vedic/Hindu Astrology
Frawley, David Trade Paper ISBN: 0914955896

Astrology On The Job
Reynolds, Carolyn Trade Paper ISBN: 0737305525

Astrology Revealed
Fenton-Smith, Paul -Paperback-198 x 127 ISBN: 0731806727

Astrology Revealed: A Simple Guide To Unlocking The Secrets Of Astrology
Fenton-Smith, Paul Trade Paper ISBN: 0684872080

Astrology Sourcebook: A Guide To The Symbolic Language Of The Stars
Soffer, Shirley Trade Paper ISBN: 1565658833

Astrology Through A Psychics Eyes
Browne, Sylvia Trade Paper ISBN: 1561707201

Astrology, A New Age Guide
Perrone, Ed Trade Paper ISBN: 0835605795

Astrology, Aleister And Aeon
Kipp, Charles Trade Paper ISBN: 1561841358

Astrology, How And Why It Works: An Introduction To Basic Astrology
Jones, Marc Edmund Trade Paper ISBN: 0943358388

Astrology, Karma And Transformation: The Inner Dimensions Of The Birth Chart
Arroyo, Stephen Trade Paper ISBN: 0916360547

Astrology, Psychology, And The Four Elements: An Energy Approach To Astrology And Its Use In The Counseling Arts
Arroyo, Stephen Trade Paper ISBN: 0916360016

Astrology, The Supernatural And The Beyond
Sri Chinmoy -Paperback-178 x 115 ISBN: 088497037X

Astrology... On The Move!
Fenton, Sasha -Paperback-216 x 138 ISBN: 095334780X

Astrology: A Cosmic Science
Hickey, Isabel M. Trade Paper ISBN: 0916360520

Astrology: A Guide To The Signs
Manufactured by Andrews Mcmeel Publishing Trade Cloth ISBN: 0836230140

Astrology: A History
Whitfield, Peter Trade Cloth ISBN: 0810942356

Astrology: A Key To Personality
Mayo, Jeff Trade Paper ISBN: 0852073399

Astrology: Astrology & Psychic Phenomena
Kole, Andre Smyth Sewn ISBN: 0310489210

Astrology: How To Chart Your Horoscope
Heindel, Max Trade Paper ISBN: 0879800054

Astrology: Romance, You And The Stars: Your Star-Guide To Happiness: How Astrology Can Help You Win Love, Wealth And Fame
Norvell, Anthony Trade Paper ISBN: 0879800119

Astrology: The Celestial Mirror
Kenton, Warren Trade Paper ISBN: 0500810044

Astrology: True Or False?: A Scientific Evaluation
Culver, Roger B. Trade Paper ISBN: 0879754834

Astrology: Understanding The Birth

Geef mijn taartpunt maar aan Pim!
pi_1904014
quote:
Op maandag 15 oktober 2001 08:34 schreef calvobbes het volgende:
Ja hehe, het moeten wel nieuwe teksten zijn en geen quote's of kopie en peest van dit topic... Mopper
sowwy
inu-oniichan : "The dog-eared bro"
  maandag 15 oktober 2001 @ 10:27:22 #108
10785 Smots
The Angriest Dog In The World
pi_1904096
Dus dit mag niet?




index / Onzin voor je leven! / Het grote copy en paste topic


Geplaatst door Topic: Het grote copy en paste topic Dit onderwerp is 2 pagina's lang: 1 2


MiSS_TiquE
ur mai lubbiedubbie

Door MiSS_TiquE - maandag 15 oktober 2001 02:23

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op maandag 15 oktober 2001 02:19 schreef nomis het volgende:
DE OVERTREFFENDE POST!


index / Onzin voor je leven! / Het grote copy en paste topic


Geplaatst door Topic: Het grote copy en paste topic Dit onderwerp is 4 pagina's lang: 1 2 3 4


Loedertje

Door Loedertje - maandag 15 oktober 2001 00:23

--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Friedrich Nietsche asks us not to read his books "like a looting soldiers," choosing appealing passages at random from his aphorisms; instead, we are to read ourselves into "a passionate mood" in order to perceive the short rays of light that will lead us onward and upward. .


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:26

--------------------------------------------------------------------------------
400 System Capacity Exceeded (Typhoon v1.2.3)
Configuratie:
Account: news
Server: news
Protocol: NNTP
Poort: 119
Beveiligd(SSL): 0
Foutnummer: 400
CODE: 800ccca0


kut

Loedertje


Door Loedertje - maandag 15 oktober 2001 00:28

--------------------------------------------------------------------------------
Why is noone discussing the war? Any been mailed powder yet?


Tackleberry
F1 - love it & live it!

Door Tackleberry - maandag 15 oktober 2001 00:28

--------------------------------------------------------------------------------
CUB meeting DWHN style

_______________________
Het leven is wat je gebeurt ... terwijl je andere plannen maakt.


Loedertje


Door Loedertje - maandag 15 oktober 2001 00:30

--------------------------------------------------------------------------------
The hijack-bombings of September 11 were politically criminal attacks on
innocent civilians. Whoever perpetrated this crime must be condemned as
enemies of the American and international working class. The fact that no
one has claimed responsibility only underscores the profoundly reactionary
character of these attacks.
But while the events of September 11 have served as the catalyst for the
assault on Afghanistan, the cause is far deeper. The nature of this or any
war, its progressive or reactionary character, is determined not by the
immediate events that preceded it, but rather by the class structures,
economic foundations and international roles of the states that are
involved. From this decisive standpoint, the present action by the United
States is an imperialist war.

The US government initiated the war in pursuit of far-reaching international
interests of the American ruling elite. What is the main purpose of the war?
The collapse of the Soviet Union a decade ago created a political vacuum in
Central Asia, which is home to the second largest deposit of proven reserves
of petroleum and natural gas in the world.

The Caspian Sea region, to which Afghanistan provides strategic access,
harbors approximately 270 billion barrels of oil, some 20 percent of the
world's proven reserves. It also contains 665 trillion cubic feet of natural
gas, approximately one-eighth of the planet's gas reserves.

These critical resources are located in the world's most politically
unstable region. By attacking Afghanistan, setting up a client regime and
moving vast military forces into the region, the US aims to establish a new
political framework within which it will exert hegemonic control.

These are the real considerations that motivate the present war. The
official version, that the entire American military has been mobilized
because of one individual, Osama bin Laden, is ludicrous. Bin Laden's brand
of ultra-nationalist and religious obscurantist politics is utterly
reactionary, a fact that is underscored by his glorification of the
destruction of the World Trade Center and murder of nearly 6,000 civilians.
But the US government's depiction of bin Laden as an evil demiurge serves a
cynical purpose-to conceal the actual aims and significance of the present
war.

The demonization of bin Laden is of a piece with the modus operandi of every
war waged by the US over the past two decades, in each of which-whether
against the Panamanian "drug lord" Manuel Noriega, the Somalian "war lord"
Mohamed Farrah Aidid, or the modern-day "Hitlers" Saddam Hussein and
Slobodan Milosevic-the American government and the media have sought to
manipulate public opinion by portraying the targeted leader as the
personification of evil.

In an October 8 op-ed column in the New York Times, Fawaz A. Gerges, a
professor at Sarah Lawrence College, pointed to the real aims that motivate
the US war drive. Describing a conference of Arab and Muslim organizations
held a week ago in Beirut, Gerges wrote:

"Most participants claimed that the United States aims at far more than
destroying Osama bin Laden's Al Qaeda organization and toppling the Taliban
regime. These representatives of the Muslim world were almost unanimously
suspicious of America's intentions, believing that the United States has an
overarching strategy which includes control of the oil and gas resources in
Central Asia, encroachment on Chinese and Russian spheres of influence,
destruction of the Iraqi regime, and consolidation of America's grip on the
oil-producing Persian Gulf regimes.

"Many Muslims suspected the Bush administration of hoping to exploit this
tragedy to settle old scores and assert American hegemony in the world."

These suspicions are entirely legitimate. Were the US to oust the Taliban,
capture or kill bin Laden and wipe out what Washington calls his terrorist
training camps, the realization of these aims would not be followed by the
withdrawal of American forces. Rather, the outcome would be the permanent
placement of US military forces to establish the US as the exclusive arbiter
of the region's natural resources. In these strategic aims lie the seeds of
future and even more bloody conflicts.

This warning is substantiated by a review of recent history. America's wars
of the past 20 years have invariably arisen from the consequences of
previous US policies. There is a chain of continuity, in which yesterday's
US ally has become today's enemy.

The list includes the one-time CIA asset Noriega, the former Persian Gulf
ally Saddam Hussein, and yesterday's American protégé Milosevic. Bin Laden
and the Taliban are the latest in the chain of US assets transformed into
targets for destruction.

In the case of Iraq, the US supported Saddam Hussein in the 1980s as an ally
against the Khomeini regime in Iran. But when the Iraqi regime threatened US
oil interests in the Persian Gulf, Saddam Hussein was transformed into a
demon and war was launched against Baghdad. The main purpose of the Gulf War
was to establish a permanent US military presence in the Persian Gulf, a
presence that remains in place more than a decade later.

Even more tragic is the outcome of US sponsorship of bin Laden and the
Taliban. They are products of the US policy, begun in the late 1970s and
continued throughout the 1980s, of inciting Islamic fundamentalism to weaken
the Soviet Union and undermine its influence in Central Asia. Bin Laden and
other Islamic fundamentalists were recruited by the CIA to wage war against
the USSR and destabilize Central Asia.

In the chaos and mass destruction that followed, the Taliban was helped
along and brought to power with the blessings of the American government.
Those who make US policy believed the Taliban would be useful in stabilizing
Afghanistan after nearly two decades of civil war.

American policy-makers saw in this ultra-reactionary sect an instrument for
furthering US aims in the Caspian basin and Persian Gulf, and placing
increasing pressure on China and Russia. If, as the Bush administration
claims, the hijack-bombing of the World Trade Center was the work of bin
Laden and his Taliban protectors, then, in the most profound and direct
sense, the political responsibility for this terrible loss of life rests
with the American ruling elite itself.

The rise of Islamic fundamentalist movements, infused with anti-American
passions, can be traced not only to US support for the Mujahedin in
Afghanistan and Pakistan, but also to American assaults on the Arab world.
At the same time that the CIA was arming the fundamentalists in Afghanistan,
it was supporting the Israeli invasion of Lebanon. This was followed in 1983
by the US bombing of Beirut, in which the battleship New Jersey lobbed
2,000-pound shells into civilian neighborhoods. This criminal action led
directly to retribution in the form of the bombing of the US barracks in
Beirut, which took the lives of 242 American soldiers.

The entire phenomenon associated with the figure of Osama bin Laden has its
roots, moreover, in Washington's alliance with Saudi Arabia. The US has for
decades propped up this feudalist autocracy, which has promoted its own
brand of Islamic fundamentalism as a means of maintaining its grip on power.

All of these twists and turns, with their disastrous repercussions, arise
from the nature of US foreign policy, which is not determined on the basis
of democratic principles or formulated in open discussion and public debate.
Rather, it is drawn up in pursuit of economic interests that are concealed
from the American people.

When the US government speaks of a war against terrorism, it is thoroughly
hypocritical, not only because yesterday's terrorist is today's ally, and
vice versa, but because American policy has produced a social catastrophe
that provides the breeding ground for recruits to terrorist organizations.
Nowhere are the results of American imperialism's predatory role more
evident than in the indescribable poverty and backwardness that afflict the
people of Afghanistan.

What are the future prospects arising from the latest eruption of American
militarism? Even if the US achieves its immediate objectives, there is no
reason to believe that the social and political tinderbox in Central Asia
will be any less explosive.

US talk of "nation-building" in Afghanistan is predicated on its alliance
with the anti-Taliban Northern Alliance, with whom the Pentagon is
coordinating its military strikes. Just as Washington used the Albanian
terrorist Kosovo Liberation Army as its proxy in Kosovo, so now it utilizes
the gang of war lords centered in the northeast of Afghanistan as its cat's
paw in Central Asia.

Since the Northern Alliance will now be portrayed as the champion of freedom
and humanitarianism, it is instructive to note recent articles in the New
York Times and elsewhere reporting that the vast bulk of the Afghan opium
trade comes from the meager territory controlled by the Alliance. The
military satraps of the Northern Alliance are, moreover, notorious for
killing thousands of civilians by indiscriminately firing rockets into Kabul
in the early 1990s.

The sordid and illusory basis upon which the US proposes to "rebuild"
Afghanistan, once it is finished pummeling the country, was suggested in a
New York Times article on the onset of the war. "The Pentagon's hope," wrote
the Times, "is that the combination of the psychological shock of the air
strike, bribes to anti-Taliban forces in Afghanistan covertly supported by
Washington and sheer opportunism will lead many of the Taliban's fighters to
put down their arms and defect."

Given the nature of the region, with its vast stores of critical resources,
it is self-evident that none of the powers in Central Asia will long accept
a settlement in which the US is the sole arbiter. Russia, Iran, China,
Pakistan and India all have their own interests, and they will seek to
pursue them. Furthermore, the US presence will inevitably conflict with the
interests of the emerging bourgeois regimes in the lesser states in the
region that have been carved out of the former Soviet Union.

At each stage in the eruption of American militarism, the scale of the
resulting disasters becomes greater and greater. Now the US has embarked on
an adventure in a region that has long been the focus of intrigue between
the Great Powers, a part of the world, moreover, that is bristling with
nuclear weapons and riven by social, political, ethnic and religious
tensions that are compounded by abject poverty.

The New York Times, in a rare moment of lucidity, described the dangers
implicit in the US war drive in an October 2 article headlined "In Pakistan,
a Shaky Ally." The author wrote: "By drafting this fragile and fractious
nation into a central role in the 'war on terrorism,' America runs the
danger of setting off a cataclysm in a place where civil violence is a
likely bet and nuclear weapons exist."

Neither in the proclamations of the US government, nor in the reportage of
the media, is there any serious examination of the real economic and
geo-strategic aims motivating the military assault. Nor is there any
indication that the US political establishment has seriously considered the
far-reaching and potentially catastrophic consequences of the course upon
which it has embarked.

Despite a relentless media campaign to whip up chauvinism and militarism,
the mood of the American people is not one of gung-ho support for the war.
At most, it is a passive acceptance that war is the only means to fight
terrorism, a mood that owes a great deal to the efforts of a thoroughly
dishonest media which serves as an arm of the state. Beneath the reluctant
endorsement of military action is a profound sense of unease and skepticism.
Tens of millions sense that nothing good can come of this latest eruption of
American militarism.

The United States stands at a turning point. The government admits it has
embarked on a war of indefinite scale and duration. What is taking place is
the militarization of American society under conditions of a deepening
social crisis.

The war will profoundly affect the conditions of the American and
international working class. Imperialism threatens mankind at the beginning
of the twenty-first century with a repetition on a more horrific scale of
the tragedies of the twentieth. More than ever, imperialism and its
depredations raise the necessity for the international unity of the working
class and the struggle for socialism.


--
PaRaDoX
Le Quebec aux Quebecois
(en tout cas,pas aux amaricains)

calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:34

--------------------------------------------------------------------------------
--------------------------------------------------------------------------------


SCRIBE
Home | Presentation | Teams | Publications | SCRIBE by CompAct

--------------------------------------------------------------------------------


SCRIBE PUBLICATIONS (1997-2000)
1997 1998 1999 2000


SCIENTIFIC PUBLICATIONS FOR 1997
Journal articles or published proceeding
Journal articles with reviewing comitee
Articles in published proceedings
Reviews
Chapter in a book
Book
Published proceedings

TRANSFERT PUBLICATIONS
Personal communications
Journal articles without reviewing comitee
Repports (including licences, expert evaluation)
Other writtings supervised by the author
Thesis
Dissertations


SCIENTIFIC PUBLICATIONS FOR 1997


--------------------------------------------------------------------------------


SCIENTIFIC PUBLICATIONS


--------------------------------------------------------------------------------


Journal articles or published proceeding


Journal articles with reviewing comitee


Alami-Durante H., Fauconneau B., Rouel M., Escaffre A.M., Bergot P., 1997. Growth and multiplication of white skeletal muscle fibres in carp larvae in relation to somatic growth rate. J. of Fish. Biology, 50, 1285-1302.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of confinement stress on circulating levels of Growth hormone and two prolactins in freshwater-adapted Tilapia Oreochromis niloticus. Gen. Comp. Endocrinol., 108, 35-44.

Blaise O., Le Bail P.Y., Weil C., 1997. Permissive effect of insulin-like growth factor I (IGF-I) on gonadotropin releasing-hormone action on in vitro growth hormone release in rainbow trout Oncorhynchus mykiss. Comp. Biochem. Physiol., 116 (1), 75-81.

Breton B., Sambroni E., Govoroun M., Weil C., 1997. Effets des steroides sur les concentrations plasmatique et hypophysaire des gonadotropines GTH I et GTH II chez la truite arc en-ciel immature, Academie des sciences Elsevier Paris. C.R. Acad. Sci. Paris Sciences de la vie, 320, 783-789.

Cauty, C.,1997. Apport d'une résine acrylique, l'unicryl à l'étude histologique et histochimique des gonades de poisson. Rev. Fr. Histotechnol, 10 (1), 65-73

Chereguini O., Cal R.M., Dreanno C., Ogier de Baulny B., Suquet M., Maisse G., 1997. Short term storage and cryopreservation of turbot sperm. Aquat. Living Resour., 10, 251-255.

Clergeau P., Burel F., 1997. The role of spatio-temporal patch connectivity at landscape level: an example in bird distribution. Landscape and Urban Planning, 38, 37-43.

Clergeau P, Sauvage A., Lemoine A., Marchand J.-P., Dubs F., Mennechez G., 1997. Quels oiseaux dans la ville ? Une étude pluridisciplinaire d'un même gradient urbain. Annales de la Recherche Urbaine, 74, 119-130.

Devaux A., Pesonen M., Monod G., 1997. Alkaline comet assay in rainbow trout hepatocytes. Toxicology in vitro, 11, 71-79.

Fauconneau B., Andre S., Chmaitilly J., Le Bail P.Y., Krieg F., Kaushik J., 1997. Control of skeletal muscle fibres and adipose cells size in the flesh of rainbow trout. J. Fish Biol., 50, 296-314.

Gomez J.M., Boujard T., Boeuf G., Solari A., Le Bail P.Y., 1997. Individual diurnal plasma profiles of thyroid hormones in rainbow trout (Oncorhynchus mykiss) in relation to cortisol GH and growth rate. Gen. Comp. Endocrinol., 107, 74-83.

Govoroun M., Huet J.C., Pernollet J.C., Breton B., 1997. Use of immobilized metal ion affinity chromatography and dye-ligand chromatography for the separation and purification of rainbow trout pituitary gonadotropins GTH I and GTH II. J. Chrom. Biomed. App., 698, 35-46.

Hogasen H.R., Prunet P., 1997. Plasma levels of thyroxine prolactin and cortisol in migrating and resident wild arctic char (Salvelinus alpinus). Can. J. Fish. Aquat. Sci., 54, 2947-2954.

Labbe C., Crowe L.M., Crowe J.H., 1997. Stability of the lipid component of trout sperm plasma membrane during freeze-thawing. Cryobiology, 34, 176-182.

Le Bail P.Y., Boeuf G., 1997. What hormones may regulate food intake in fish. Aquatic living ressources, 10, 371-379.

Mennechez G., Clergeau P. 1997. Analyse de la sélection du site de nid par l'étourneau Sturnus vulgaris au niveau du paysage. Ecologia Mediterranea, 23, 37-45.

Mugnier C., Gaignon J.L., Fostier A., 1997. In vitro synthesis of 1720 beta 21-trihydroxy-4-pregnen-3-one by ovaries of Turbot (Scophthalmus maximus L.) during oocyte maturation. Gen. Comp. Endocrinol., 107, 63-73.

Noel O, Le Bail P.Y, 1997. Does cyclicity of growth rate in rainbow trout exist ?. J.of Fish Biology, 51, 634-642.

Ogier de Baulny B., Le Vern Y., Kerboeuf D., Maisse G., 1997. Flow cytometric evaluation of mitochondrial activity and membrane integrity in fresh and cryopreserved rainbow trout (Oncorhynchus mykiss) spermatozoa. Cryobiology, 34, 141-149.

Rescan P.Y, 1997. Identification in a fish species of two Id (inhibitor of DNA binding/differentiation)-related helix-loop-helix factors expressed in the slow oxidative muscle fibers. Eur. J. Biochem, 247, 870-876.

Toguyeni A., Fauconneau B., Boujard T., Fostier A., Kuhn E.R., Mol K.A., Baroiller J.F., 1997. Feeding behaviour and food utilisation in tilapia Oreochromis niloticus: effect of sex ratio and relationship with the endocrine status. Physiology and Behavior, 62 (2), 273-279.


Articles in published proceedings


Auperin B, Goardon L, Quéméneur A, Thomas J.L, Aubin J, Valotaire C, Rouger Y, Maisse G, 1997. Effet d'un nouvel anesthésique sur differents parametres physiologiques de la truite arc-en-ciel suite a un stress lié au transport. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes (France), resumé

Baroiller J.F., Clota F., 1997. Interactions between temperature effects and genotype on Oreochromis niloticus sex determination. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds), resumé

Baroiller J.F., Guiguen Y., Iseki K., Fostier A., 1997. Physiological role of androgens on gonadal sex differentiation in two teleost fish Oncorhynchus mykiss and Oreochromis niloticus. Proceedings of the first international symposium on the biology of vertebrate sex determination . April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Eds.), résumé

Bennetau-Pelissero C., Kaushik S., Sumpter J., Fostier A., Le Gac F., Davail-Cuisset B., Le Menn F., 1997. Effet du soja et des phyto-oestrogènes sur la vitellogénèse et l'endocrinologie stéroidienne de la truite arc en ciel et de l' esturgeon sibérien, Approche in vivo et in vitro. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume.

Bonnet S., Haffray P., Blanc J.M., Vallee F., Vauchez C., Fauconneau B., 1997. Genetic variation in morphology carcass traits and fat content in diploid and triploid rainbow trout (Oncorhynchus mykiss) at two commercial sizes 300g and 900g. Sixth international Symposium on genetics in Aquaculture, 24-28 June 1997 Stirling (SCOTLAND), resume.

Bonnet S., Haffray P., Fauconneau B, 1997. Sex and triploidy effects on growth allometry of external morphology in rainbow trout. 5 th International Congress of Vertebrate Morphology 12-17 July 1997 Bristol (U.K). J. Morphology, 232 (3) 237.

Breton B., Roelants Y., Ollevier F., Epler P., Mikolajczyk T., 1997. Oral delivery systems in teleost fish for peptides and polypeptides : exemple for gonadoliberin (GnRH) and growth hormone (GH). International workshop : aquaculture application of controlled drug and vaccine delivery, communication.

Breton B., Gillet C., Jalabert B., 1997. Relations entre la température le blocage de la maturation ovocytaire et le fonctionnement de l'axe gonadotrope chez l'omble chevalier. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et biologie des poissons", 23-25 Septembre 1997, Rennes(France), resume

Breton B., Roelants I., Mikolajczyk T., Epler P., Ollevier F., 1997. Oral delivery systems in Teleost fish for peptides and polypeptides: example for gonadoliberin (GnRH) and growth hormone (GH). International workshop : Aquaculture application of controlled drug and vaccine delivery 21-23 may Villa Manin di Passariano (Italie) resume

Canario A.V.M., Pavlidis M., Mylonas C., Breton B., Kentouri M., Divanach P., 1997. Hormonal spawning induction of Pagrus pagrus. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Ao-t 1997 Barcelone (Espagne), resume.

Clergeau P., Mennechez G., Savard Jpl & Falardeau G., 1997. Biological exchanges between rural and urban areas: bird diversity and landscape structure. 25th congress of IALE, " Landscape Ecology: things to do ", Amsterdam, october 1997.

Duval H., Elies G., Pellerin I., Chesnel F., Le Bail P.Y., Boeuf G., Boujard D. D., 1997. L'IGF-I recombinant de turbot (Scophthalmus maximus): production purification et caractérisation. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Fauconneau B., Bobe J., Pereira V., Vallod D., 1997. External morphology of common carp at commercial size and its relationship with dressing yield. 5 th International Congress of Vertebrate morphology 12-17 July 1997 Bristol (U.K). J. of Morphology, 232 (3), 253. resume

Fauconneau B., Paboeuf G., Le Bail P.Y., Guttierez J., Castejon C., 1997. Preliminary data on binding and effects of IGFs on in vitro muscle satellite cells in rainbow trout. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne) resume

Gillet C., Rideau I., Breton B., 1997. Effets du conditionnement en jours longs sur la sécrétion gonadotrope (GtH2) et sur la période de reproduction chez l'omble chevalier (Salvelinus alpinus L). 1er Colloque IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (FRANCE), resume

Guiguen Y., Ricordel M.J., Fostier A., 1997. Involvment of estrogens in the process of sex differentiation in rainbow trout Oncorhynchus mykiss : in vivo treatments, aromatase activity and aromatase gene expression. Proceedings of the first international symposium on the biology of vertebrate sex determination. April 7-11 Honolulu Hawaii, V.A. Lance and M.H. Bogart (Ed.), resume

Herraez M.P., Labbe C., 1997. Sperm membrane regionalization in rainbow trout : a lectin binding study. CRYO'97 34th Annual of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 370 resume

Keith P., Jegu M., Le Bail P.Y., 1997. Inventories and distribution of french guiana fishes/. 9 th annual meeting of neotropical ichtyological association 20-26 juillet 1997 Porto Alegro Brasil, affiche.

Latonnelle K., Maisse G., Labbe C., 1997. Lipid modification of trout sperm plasma membrane in vitro : effect on membrane stability after cryopreservation . Cryo'97 34 th meeting of the soc for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 371 affiche

Leguen I., Prunet P., 1997. Effet d'un choc hyposmotique sur la régulation du volume et sur la mobilisation du calcium intracellulaire des cellules branchiales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Leveroni Calvi S., Maisse G., 1997. Cryopreservation of rainbow trout blastomeres. Cryo'97 34th meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne) . Cryobiology, 35 (4) 340 resume

Linard B., Breton B., Bailhache T., Mananos E., Govoroun M., Kah O., Jego P., Saligaut C., 1997. Contr"le dopaminergique central de la libération des hormones gonadotropes (GtH1, GtH2) chez la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Loir M., 1997. Etude de l'effet de xenobiotiques sur la prolifération des spermatogonides de truite présentes dans des cultures de cellules testiculaires totales. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G. Billard R., Cosson J., Labbe C., Loir M., Le Gac F., 1997. Influence du maintien en mer des mâles de saumon atlantique (Salmo salar) pendant la période de reproduction sur la qualité du sperme. 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes (France), resume

Maisse G., Noel O, Breton B., Goardon L., Jalabert B., Le Bail P.Y., Mourot B., 1997. Influence d'une période d'éclairement continu sur la première maturation sexuelle de la truite arc-en-ciel(Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Massa F., Prunet P., Grimaldi C., Baglinière J.L., 1997. Premiers éléments de caractérisation de l'impact des sédiments sur la survie embryo-larvaire de la truite (Salmo trutta) en milieu naturel, Etude sur deux petits ruisseaux de Basse Normandie. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Ogier de Beaulny B., Le Vern Y., Labbe C., Maisse G., 1997. Cryopreservation of fish semen : why does the most effective cryoprotectant differ from one species to another. Cryo'97 34th annual meeting of the society for cryobiology 8-12 juin 1997 Barcelone (Espagne). Cryobiology, 35 (4) 342 resume

Perez-Sanchez J, Le Bail P.Y, 1997. Endocrine and metabolic parameters as markers of growth performance and flesh quality. Third International Symposium on Research for Aquaculture fundamental and applied aspects 24-27 aout 1997 Barcelone (Espagne), p 81 resume

Rouger Y., Aubin J., Breton B., Fauconneau B., Fostier A., Le Bail P.Y., Loir M., Prunet P., Maisse G., 1997. Stress induit par le transport chez la truite Arc-en-ciel (Oncorhynchus mykiss). 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes (France), resume

Saligaut C., Linard B., Breton B., Anglade I, Bailhache T, Kah O, Jego P, 1997. Brain aminergic systems in salmonids and other teleosts in relation with steroid feedback and gonadotropin release. Third International Symposium on: Research for aquaculture fundamental and applied aspects, 24-27 Aout 1997-Barcelone (Espagne), resume

Sandra O., Lerouzic P., Cauty C., Prunet P., 1997. Influence de la salinité sur l'expression du recepteur de la prolactine(TIR-PRL) dans les organes osmorégulateurs chez le tilapia (Oreochromis niloticus). 1er Colloque de l'IFR 43, "Facteurs de l'environnement et Biologie des Poissons", 23-25 Septembre 1997, Rennes(France), resume

Valente L., Saglio P., Fauconneau B., 1997. Ontogénèse du comportement alimentaire chez deux souches à croissance lente et rapide de truite arc-en-ciel. 1er Colloque de l'IFR 43, "Facteurs de l'Environnement et Biologie des Poissons, 23-25 Septembre 1997, Rennes(France), resume


Reviews


Chapter in a book


Clergeau P. La gestion des oiseaux à risques in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " INRA Ed., Coll. "Un point sur", 7-24.

Clergeau P. Evolution numérique et comportementale des étourneaux; problèmes agricoles in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 27-42.

Clergeau P.,Mennechez G. L'étourneau sansonnet dans les villes in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations " : INRA Ed., Coll. "Un point sur", 85-100

Clergeau P. Le concept de gestion intégrée appliqué aux oiseaux in " Oiseaux à risques en ville et en campagne; vers une gestion intégrée des populations: " : INRA Ed., Coll. "Un point sur", 363-374

Flammarion P., Garric J., Monod G., 1997. Utilisation de l'activité enzymatique EROD chez les poissons des hydrosystèmes continentaux, Lagadic L., Caquet T., Amaird J.C., Ramade F in "utilisation des biomarqueurs pour la surveillance de la qualité de l'environnement ", 57-75.

Hochereau-De-Reviers M.T., Loir M., De Reviers M., 1997. Controle gonadotrope des cellules somatiques et de la spermatogenèse des vertébrés, Combarnous Y et Volland-Nail (Eds) Editions INRA. in " Les Gonadotropines ", 255-267.

Lagadic L., Caquet T., Amiard J.C., 1997. Intéret d'une approche multiparamétrique pour le suivi de la qualité de l'environnement, ( Lagadic L., Caquet T., Amiard J.C., Ramade F.Eds.). in " Biomarqueurs en ecotoxicologie ", 393-401.

Lagadic L., Caquet T., Amiard J.C., 1997. Biomarqueurs en ecotoxicologie : principes et définitions, Lagadic L., Caquet T., Amiard J.C., Ramade F.(Eds.).in " Biomarqueurs en ecotoxicologie ", 1-9.

Le Gal Y., Lagadic L., Le Bras S., Caquet T., 1997. Charge énergétique en adénylates (CEA) et autres biomarqueurs associés au métabolisme énergétique, MASSON in " Biomarqueurs en écotoxicologie ", 242-285.

Monod G., 1997. L'induction du cytochrome P4501A1, (Lagadic L., Caquet T., Amaird J.C., Ramade F (eds.).. " Biomarqueurs en ecotoxicologie-Aspects fondamentaux ", 33-54.

Pascal M., 1997. Echec à la colonisation : ce n'est pas faute d'avoir essayé !. In : Îles, vivre entre ciel et mer. Exposition Paris " D'îles en îles ", MNHN & Nathan Paris Ed. , 27.

Pascal M., Pisanu B., Beaucournu J.-C. 1997. Faunes parasitaires (Siphonaptères, Helminthes) des îles de la Mer d'Iroise. Colloque CEFE - CNRS Montpellier les 4 & 5 XII 1997 : 8 pp, 6 cartes, 2 tableaux, 1 figure

Rether B., Masfaraud J.F., Keith G., Devaux A., Monod G., 1997. Biomarqueurs de génotoxicité chez les végétaux et les animaux, (Lagadic L., Caquet T. Amiard J.C., Ramade F Eds.). Biomarqueurs en ecotoxicologie-Aspects fondamentaux, 185-208.


Book


Boujard T., Pascal M., Meunier F., P.-Y. Le Bail, 1997 : Poissons de Guyane - Guide écologique de l'Approuague et de la réserve des Nouragues. Edition INRA Paris : 219 pp.


Published proceedings


Alhassane M., Mikolasek O., Lazard J., Baroiller J.F., 1997. Intensification of nile tilapia oreochromis niloticus fry production in the african sahel - example of niger J.F.. Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), 294-304.

Amoros C., Uzbekova S., Hourrout D., Hew C.L., Prunet P., 1997. Transgenic rainbow trout as a model to study cell-specific gene expression driven by a salmon Prolactin promotor. Proceedings of the XIII th International Congress of Comparative Endocrinology, 17-21 Novembre 1997, Yokohama (Japon), MONDUZZI EDITORE. Advances in Comparative Endocrinology, 963-968.

Auperin B., Baroiller J.F., Ricordel M.J., Fostier A., Prunet P., 1997. Effect of social interactions and confinement stress on circulating levels of cortisol growth hormone and two prolactins in fresh water-adapted tilapia (Orecochromis niloticus). In Proceedings of the fourth International symposium on Tilapia in aquaculture 9-12 November 1997 Orlando (USA), K. Fitzsimmons (Ed.), 653-661.

Baroiller, J.F. 1997. Modalités des déterminismes du sexe chez les poissons téléostéens . Proceedings of the fourth workshop on sex determination and gonadal sex differentiation, 9-10 octobre 1997, Rennes (France). In. J. Dev. Biol., 14-15.

Baroiller J.F., Desprez D., Carteret Y., Tacon P., Hoareau M.C., Melard C., Jalabert B., 1997. Influence of environmental and social factors on the reproductive efficiency in three tilapia species Oreochromis niloticus, O.aureus and the red tilapia (red florida strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 238-252.

Desprez D., Briand C., Hoareau M.C., Malard C., Bosc P., Baroiller J.F., 1997. Sex determinism in red tilapia ("Red Florida" strain). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), F. Fitzsimmons (Ed.), 760-771.

Desprez D., Geraz E., Hoareau M.C., Melard C., Bosc P., Baroiller J.F., 1997. Optimisation of hormonal sex-reversal in red-tilapia ("Red Florida" strain) through the use of a natural androgen. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA), K. Fitzsimmons (Ed.), 719-728.

Fauconneau B., Toguyeni A., Fostier A., Le Bail P.Y., Baroiller J.F., 1997. New insigths on feedings and growth of tilapia (Oreochromis niloticus). In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November 1997 Orlando Florida (USA) Orlando Florida.USA, K. Fitzsimmons (Ed.), 151-168.

Guiguen Y., Baroiller J.F., Ricordel M.J., Iseki K., Jalabert B., Fostier A., 1997. Stéroidogénèse et différentiation sexuelle chez deux modèles de poissons : la truite arc-en-ciel Oncorhynchus mykiss et le tilapia Oreochromis noloticus. Proceedings of the fourth workshop on sex determination and gonadal sex differentiation 9-10 octobre 1997 Rennes (France). Int. J. Dev. Biol., 12-13.

Le Bail P.Y., 1997. Hormone and food intake in fish. First cost 827 workshop on voluntary food intake in fish 4 april 1997 Aberdeen UK, presentation

Lefevre, Fl., 1997. La qualite de la chair des poissons d'élevage. VII congresso de zootecnia, 25,26,27 de setembro, 1997, Braganca. Producao, qualidade e ambiente, resume

Toguyeni A. Fauconneau B. Melard C., Fostier A., Lazard J., Barras E., Kuhn E.R. Van der Geyten S., Baroiller J.F., 1997. Sexual dimorphism studies in tilapia using two pure species Oreochromis niloticus and Sarotherodon melanotheron and their inter-generic hybrids (S. melanotheranon x O. niloticus and S. melanotheron x O. niloticus ).. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida(USA), K. Fitzsimmons (Ed.), 200-212.

Toguyeni A., Fauconneau B., Fostier A., Abucay J., Mair G.C., Baroiller J.F., 1997. Influence of genotype and social behaviour on growth performance in tilapia O. niloticus. In "Proceedings of the fourth international symposium on tilapia in aquaculture 9-12 November Orlando Florida (USA), K. Fitzsimmons (Ed.). Int. J. Dev. Biol., 141-150.


--------------------------------------------------------------------------------


Transfert publications


--------------------------------------------------------------------------------


Personal communications


Journal articles without reviewing comitee


Clergeau P., 1997. De l'étourneau des champs à l'étourneau des villes. INRA mensuel 90, 8-9.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 1ere partie : les îles, des sites privilégiés. RESEAU, 130, 3.

Pascal M., 1997. L'archipel de Molène, réserve de la biosphère. 2eme partie : L'éradication du Surmulot. RESEAU, 131, 3.

Pascal M., 1997. Dératisation de Trielen. Ar Skreo (Bul. Amicale Molenaise), 56, 14-18.


Repports (including licences, expert evaluation)


Roelants I., Breton B., Mikolajczyk T., Ollevier , 1997. Oral delivery from having a high absorption efficiency and method for making the same., brevet.


Other writtings supervised by the author


Thesis


Leguen I., 1997, Mobilisation du calcium et des canaux mécano sensibles dans la régulation du volume des cellules épithéliales : lignée cellulaire de rein d'amphibien (cellule A6) et culture primaire de branchies de poissons. THESE DE DOCTORAT DE L'UNIVERSITE DE RENNES 1, Sciences Biologiques.

Lefevre F., 1997. Propriétés thermogélifiantes des myofibrilles et texture de la chair de truite. THESE DE DOCTORAT DE L'UNIVERSITE BLAISE PASCAL.

Ogier de Beaulny B., 1997. Cryoconservation du sperme de poissons (truite arc en ciel Oncorhynchus mykiss, Turbot (Scophtalmus maximus), Silure glane (Silurus Glanis) et Tilapia (Oreochromis niloticus).Evaluation des dommages cellulaires, amélioration de la technique de congélation, perméabilité membranaire aux cryoprotecteurs. THESE DE DOCTORAT DE L'ENSAR.

Sandra O., 1997. Caractérisation du récepteur de la prolactine (R-PRL) chez la truite arc-en-ciel (Oncorhynchus mykiss) et le Tilapia (Oreochromis niloticus) : clonage d'un ADN complémentaire codant pour le R-PRL et expression in vivo du gène codant pour ce R-PRL. THESE DE DOCTORAT DE L'UNIVERSITE PARIS VI.


Dissertations


Bobe J., 1997. Effet de la température sur le développement musculaire précoce des poissons. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bobe J, 1997. Effet de la température sur le développement musculaire précoce de la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Le collagène de poisson et son rôle dans la qualité de la chair. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Bugeon J. 1997. Collagène texture de la chair de truite fario (Salmo trutta) : effet de vitesse de croissance et de la vitamine C. MEMOIRE DE DEA Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Colombe L, 1997. Clonage et caractérisation de récepteurs stéroidiens chez la truite arc-en-ciel (Oncorhynchus mykiss). MEMOIRE présenté pour l'obtention du Diplôme d'Ingénieur C.N.A.M en Biologie en vue des Applications

Guillou Y., Manifacier G., 1997. Impact du Ragondin et de la faune mammalienne fouisseuse sur les levées de la Loire en Maine-et-Loire Elaboration d'outils destinés l'expertise de l'impact du comportement fouisseur de mammifères sauvages sur un ouvrage d'art : la levée de la Loire. Mémoire d'Ingénieur ENITHP Angers, 52 pp + 58pp annexes

Latonnelle K., 1997. Rôles et effets du cholestérol membranaire et différentes méthodes pour modifier le cholestérol membranaire. RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Latonnelle K, 1997. Modifications in vitro du rapport molaire cholestérol/phospholipides des spermatozoides et des erythrocytes de truite arc-en -ciel (Oncorhynchus mykiss) , Mises au point de techniques d'évaluation des propriétés mécaniques et biophysiques de la membrane plasmique des spermatozoides de truite. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Les gonadotropines et le contrôle gonadotrope de la reproduction des poissons. (facteurs de régulations endogènes). RAPPORT BIBLIOGRAPHIQUE DU DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

Yusnaini, 1997. Nouvelles données sur la régulation de la fonction gonadotrope hypophysaire chez la truite arc-en-ciel (Oncorhynchus mykiss) par mesure spécifique des GthI et GthII. MEMOIRE DE DEA de Biologie et Productions animales (option biologie aquacole). Université de RENNES I.

_______________________
" ik ben een 'hij' en heet Calvobbes "

Loedertje


Door Loedertje - maandag 15 oktober 2001 00:38

--------------------------------------------------------------------------------
I was almost shocked at reading this article in Norways largest national
newspaper (Dagbladet) today, but then, I've lived here for over thirty
years, so I've become accustomed to immediate support for the USA followed
by a stab in the back.
This politician is the equivalent of a congressman. His name is Olav Gunnar
Ballo, and his party is the Socialistic Left (Sosialistisk Venstre). His
party has supported his views, and they hold sway over 13% of the Norwegian
Congress.

I have nothing against his party, or at least I did'nt, in fact I kind of
liked them during the election when they really took a lot more votes than
expected.

He says that Americans are Satans murderers (no, he's not a muslim...), and
that the USA is a terrorist nation who have commited terrorist acts against
the world for decades! Furthermore, he says Americans have NO morals, that
they are now murdering hundreds of innocents and dropping care packaged
deliberately into mindfields! He also calls all countries and people who
support the USA hypocrites.

I can't go on. It's too much!

I ask EVERYONE who reads this to PLEASE!!!!! send him a short note and let
him know how you feel about his statements. I allready have, but I don't
think one e-mail will get his attention.

send it to sv.postmottak@stortinget.no

Mark it Olav Gunnar Ballo, or TO: Olav Gunnar Ballo, or else it will be
perceived as a message to the whole party (which might not be such a bad
Idea, either).

In cases like this, it doesn't cost much to be a patriot - just a short
email...

This is NOT a hoax!

I only ask what you are all already prepared to give: your reaction towards
anyone who thinks Americans don't have the right to defend themselves.


Sincerely,
M. Walsh
An American in Norway

Loedertje


Door Loedertje - maandag 15 oktober 2001 00:40

--------------------------------------------------------------------------------

quote:
--------------------------------------------------------------------------------
Op maandag 15 oktober 2001 00:34 schreef calvobbes het volgende:

Zullen we gaan slapen en dit topic morgen volplakken?


--------------------------------------------------------------------------------


Is goed, ben ook moe


calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:42

--------------------------------------------------------------------------------
IV.1 Spatial Patterns and Biodiversity - James Quinn, Alan Jassby, Peter Moyle
Goal:

To manage a large variety of GIS and biodiversity databases. This allows for a number of unique analyses that can be closely coupled with other modeling and ecosystem projects to help determine such things as species composition, habitat availability, population estimates, risks of toxic substances to wildlife, and non-point source loading to rivers.

Current Status:

The Cores computer center, created de novo at the beginning of the grant, has developed into a statewide center for GIS and environmental database design and dissemination. Work done in the core has proven of considerable value to a number of agencies, and the Core has attracted over 40 additional grants and contracts to extend Center work, including nine from EPA Region IX. In a cooperative agreement with the California EPA, we are developing a database of known toxic effects of chemical stressors on California vertebrate species. In addition, the Center houses and provides Internet access to biodiversity data covering a wide variety of protected lands, including state and national parks, UNESCO Biosphere Reserves, and Nature Conservancy preserves, and is taking the lead on developing Department of the Interior strategies for international data exchange on non-indigenous species.

See http://www.nbii.gov/iabin/meetings/invs_fr.htm and http://www.nbii.gov/iabin/meetings/tech_fr.htm.

Geographic Information System (GIS). A sophisticated GIS facility, supporting 11 graduate students, with 8 GIS-specialist staff, about 20 ArcInfo workstations, and a variety of peripheral equipment, is now well established. The facility has about 120 statewide GIS layers of environmental themes, especially land forms, land use, biodiversity and water quality, mostly online, and has become the most active California university GIS program in interagency GIS development (under the aegis of the California Biodiversity Council, the California Geographic Information Association, and the National Biological Information Infrastructure) . The Center is the major developer and repository in the state for the National Hydrography Database (the successor to the EPA River Reach Files), the EPA Waterbody system, and other systems used by EPA and collaborating state agencies in managing water quality, water supply, biodiversity issues, and ecological risk assessment. Many of the techniques developed by the Center and its collaborators in the Department of Fish and Game have now been adopted for national implementation.

Clean Water Act Repports. The Center recently completed a project with EPA Region IX to update, modernize, and disseminate the water body reports required under Sections 303(d) and 305(b) of the Clean Water Act for California. We installed the new ArcView-based system, Geo-WBS, in the Regional Water Quality Control Boards in March, and trained analysts to use the GIS to evaluate beneficial uses, sources of impairment, and TMDL issues. The State Water Board is now using the software to prepare Clean Water Act 303(d) (non-point source pollution) reports, and the results will be on-line for professional and public access. We now have new cooperative programs with Region 9, the California Department of Forestry, the California Department of Transportation and the SWRCB to make their non-point-source and stormwater assessment data interoperable.

World Wide Web. The Core facility has established a World Wide Web server to disseminate data and model results to collaborators, managers, and the general public. The Internet activities have been incorporated into a number of electronic data access initiatives, including CERES in California, and the National Biological Information Infrastructure and the Government Information Locator Service at the national level, and the Smithsonian and the UNESCO Man and the Biosphere program internationally.

Future Plans:

As a result of the variety of GIS and biodiversity databases managed by the Core, we have the ability to do a number of unique analyses, which will be closely coupled with and complementary to the other Core models and the ecosystem projects.

While occurrences of both indicator taxa and rare and endangered species are increasingly critical to environmental policy, most areas have not been adequately surveyed to document occurrences and populations of important species. As a result, Wildlife Habitat Relations (WHR) and Gap Analysis models are increasingly being used to infer the presence of species of concern on at least 90% of the landscape where biological surveys are lacking or inadequate. We have submitted a manuscript testing these predictions against either existing data on species in protected areas, or with respect to landscape characteristics, including the size or degree of isolation of "patches" of suitable habitat for rare species. Standard models prove very useful for large conservation areas and "charismatic" taxa such as large mammals and birds, and are in need of revision for urban fringe, riparian, and patchy habitats, and for "less popular" taxa.
In California, Wildlife Habitat Relations, Gap Analysis, and comparable models have only been developed and tested for terrestrial vertebrates. We believe we can develop formal models following the work of Moyle, Ellison, and colleagues, which will accurately predict the species composition and critical habitats for fish, amphibians, and some indicator invertebrates, in rivers and streams that have not been surveyed. Our growing databases of aquatic and riparian species occurrences (some 220,000 records to date) will allow us to both estimate the parameters of an "aquatic WHR" model and to test its accuracy. (Preliminary studies in three northern California watersheds suggest that the accuracy of pilot analyses exceeds 80%). We have just received funding to extensively test the results of the first generation of fish occurrence models in the Cosumnes River Watershed (the last major undammed river draining the Sierra Nevada into San Francisco Bay.)
Invasive species are increasingly being recognized as threats to biodiversity and ecosystem processes. The Core is coordinating data issues in California on the distributions of invasive plants and non-native fish. We have also just begun a partnership with the Department of Interior to develop strategies for assessing invasive species issues in the Western Hemisphere under the Inter-Americas Biodiversity Information Network (IABIN), an initiative begun under the Summit of the Americas, and are awaiting World Bank funds to develop a prototype for a data system. We recently organized an international workshop to plan this initiative at the National Center for Ecological Analysis and Synthesis, and will conduct two follow-up international workshops in the winter of 2000.
We recently completed a second phase of a cooperative study with CalEPA to develop a database and management models for risk analyses of the effects of toxic substances on California wildlife population responses. These have the potential to couple the exposure and effects data with the GIS-based distributional data described above, potentially allowing managers to identify risk elements and potential wildlife responses at particular sites (using the biodiversity databases and models) or for particular releases.
Understanding the impact of land use patterns on runoff has been a major uncertainty in constructing mass balance analyses at the watershed level for a variety of important waterborne constituents, including nitrogen, some pesticides and metals, and sediment load. These, in turn, are thought to be the major causes (other than dams) for declines in anadromous fish -- declines which have driven much of the habitat conservation planning efforts and TMDL (total maximum daily load) actions in Northern California. We are working with investigators in other projects (Mount, Schladow, Fogg) to integrate our spatial data with mechanistic models. We have completed a year of field work to test these assessments in two ambitious watershed-scale field tests, one in the Navarro River watershed (north coast, funded by CalTrans) and the other in the Cosumnes watershed (Sierra Nevada and Delta, funded by the Packard Foundation and CALFED). Data analysis for the first seasons is still underway.
These efforts are tightly interwoven with other Center projects. The runoff modeling provides inputs for the toxicological studies in the Clear Lake and Bay-Delta projects. Conversely, the chemical analysis of spatial sources of sediment load in the Clear Lake basin (Project IV.2) permits a refinement of the geography of non-point source inputs into the Sacramento River and Delta system. On another front, biomarker data from several other projects provides the most powerful test of the models. The predicted spatial extent of species effects studied in most of the Center projects can be mapped using the biodiversity GIS layers. Land cover and land forms affect all of the transport processes studied in both the Decision Support and the Fate and Transport Cores, and transport in many cases is essential to predicting species occurrences.

_______________________
" ik ben een 'hij' en heet Calvobbes "

calvobbes
Stupendous Man

Door calvobbes - maandag 15 oktober 2001 00:46

--------------------------------------------------------------------------------
* laatste, hierna *
Privacy Act


CHAPTER P-21

An Act to extend the present laws of Canada that protect the privacy of individuals and that provide individuals with a right of access to personal information about themselves

SHORT TITLE

Short title
1. This Act may be cited as the Privacy Act.

1980-81-82-83, c. 111, Sch. II "1".

PURPOSE OF ACT

Purpose
2. The purpose of this Act is to extend the present laws of Canada that protect the privacy of individuals with respect to personal information about themselves held by a government institution and that provide individuals with a right of access to that information.

1980-81-82-83, c. 111, Sch. II "2".

INTERPRETATION

Definitions
3. In this Act,

"administrative purpose" «fins administratives»
"administrative purpose", in relation to the use of personal information about an individual, means the use of that information in a decision making process that directly affects that individual;

"alternative format" « support de substitution »
"alternative format", with respect to personal information, means a format that allows a person with a sensory disability to read or listen to the personal information;

"Court" «Cour»
"Court" means the Federal Court--Trial Division;

"designated Minister" «ministre désigné»
"designated Minister", in relation to any provision of this Act, means such member of the Queen's Privy Council for Canada as is designated by the Governor in Council as the Minister for the purposes of that provision;

"government institution" «institution fédérale»
"government institution" means any department or ministry of state of the Government of Canada listed in the schedule or any body or office listed in the schedule;

"head" «responsable d'institution fédérale»
"head", in respect of a government institution, means

(a) in the case of a department or ministry of state, the member of the Queen's Privy Council for Canada presiding over that institution, or

(b) in any other case, the person designated by order in council pursuant to this paragraph and for the purposes of this Act to be the head of that institution;

"personal information" «renseignements personnels»
"personal information" means information about an identifiable individual that is recorded in any form including, without restricting the generality of the foregoing,

(a) information relating to the race, national or ethnic origin, colour, religion, age or marital status of the individual,

(b) information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved,

(c) any identifying number, symbol or other particular assigned to the individual,

(d) the address, fingerprints or blood type of the individual,

(e) the personal opinions or views of the individual except where they are about another individual or about a proposal for a grant, an award or a prize to be made to another individual by a government institution or a part of a government institution specified in the regulations,

(f) correspondence sent to a government institution by the individual that is implicitly or explicitly of a private or confidential nature, and replies to such correspondence that would reveal the contents of the original correspondence,

(g) the views or opinions of another individual about the individual,

(h) the views or opinions of another individual about a proposal for a grant, an award or a prize to be made to the individual by an institution or a part of an institution referred to in paragraph (e), but excluding the name of the other individual where it appears with the views or opinions of the other individual, and

(i) the name of the individual where it appears with other personal information relating to the individual or where the disclosure of the name itself would reveal information about the individual,

but, for the purposes of sections 7, 8 and 26 and section 19 of the Access to Information Act, does not include

(j) information about an individual who is or was an officer or employee of a government institution that relates to the position or functions of the individual including,

(i) the fact that the individual is or was an officer or employee of the government institution,

(ii) the title, business address and telephone number of the individual,

(iii) the classification, salary range and responsibilities of the position held by the individual,

(iv) the name of the individual on a document prepared by the individual in the course of employment, and

(v) the personal opinions or views of the individual given in the course of employment,

(k) information about an individual who is or was performing services under contract for a government institution that relates to the services performed, including the terms of the contract, the name of the individual and the opinions or views of the individual given in the course of the performance of those services,

(l) information relating to any discretionary benefit of a financial nature, including the granting of a licence or permit, conferred on an individual, including the name of the individual and the exact nature of the benefit, and

(m) information about an individual who has been dead for more than twenty years;

"personal information bank" «fichier de renseignements personnels»
"personal information bank" means a collection or grouping of personal information described in section 10;

"Privacy Commissioner" «Commissaire à la protection de la vie privée»
"Privacy Commissioner" means the Commissioner appointed under section 53;

"sensory disability" « déficience sensorielle »
"sensory disability" means a disability that relates to sight or hearing.

R.S., 1985, c. P-21, s. 3; 1992, c. 1, s. 144(F), c. 21, s. 34.

COLLECTION, RETENTION AND DISPOSAL OF PERSONAL INFORMATION

Collection of personal information
4. No personal information shall be collected by a government institution unless it relates directly to an operating program or activity of the institution.

1980-81-82-83, c. 111, Sch. II "4".

Personal information to be collected directly
5. (1) A government institution shall, wherever possible, collect personal information that is intended to be used for an administrative purpose directly from the individual to whom it relates except where the individual authorizes otherwise or where personal information may be disclosed to the institution under subsection 8(2).

Individual to be informed of purpose
(2) A government institution shall inform any individual from whom the institution collects personal information about the individual of the purpose for which the information is being collected.

Exception
(3) Subsections (1) and (2) do not apply where compliance therewith might

(a) result in the collection of inaccurate information; or

(b) defeat the purpose or prejudice the use for which information is collected.

1980-81-82-83, c. 111, Sch. II "5".

Retention of personal information used for an administrative purpose
6. (1) Personal information that has been used by a government institution for an administrative purpose shall be retained by the institution for such period of time after it is so used as may be prescribed by regulation in order to ensure that the individual to whom it relates has a reasonable opportunity to obtain access to the information.

Accuracy of personal information
(2) A government institution shall take all reasonable steps to ensure that personal information that is used for an administrative purpose by the institution is as accurate, up-to-date and complete as possible.

Disposal of personal information
(3) A government institution shall dispose of personal information under the control of the institution in accordance with the regulations and in accordance with any directives or guidelines issued by the designated minister in relation to the disposal of that information.

1980-81-82-83, c. 111, Sch. II "6".

PROTECTION OF PERSONAL INFORMATION

Use of personal information
7. Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be used by the institution except

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose; or

(b) for a purpose for which the information may be disclosed to the institution under subsection 8(2).

1980-81-82-83, c. 111, Sch. II "7".

Disclosure of personal information
8. (1) Personal information under the control of a government institution shall not, without the consent of the individual to whom it relates, be disclosed by the institution except in accordance with this section.

Where personal information may be disclosed
(2) Subject to any other Act of Parliament, personal information under the control of a government institution may be disclosed

(a) for the purpose for which the information was obtained or compiled by the institution or for a use consistent with that purpose;

(b) for any purpose in accordance with any Act of Parliament or any regulation made thereunder that authorizes its disclosure;

(c) for the purpose of complying with a subpoena or warrant issued or order made by a court, person or body with jurisdiction to compel the production of information or for the purpose of complying with rules of court relating to the production of information;

(d) to the Attorney General of Canada for use in legal proceedings involving the Crown in right of Canada or the Government of Canada;

(e) to an investigative body specified in the regulations, on the written request of the body, for the purpose of enforcing any law of Canada or a province or carrying out a lawful investigation, if the request specifies the purpose and describes the information to be disclosed;

(f) under an agreement or arrangement between the Government of Canada or an institution thereof and the government of a

The dog who is so angry he cannot move. He cannot eat. He cannot sleep. He can just barely growl. ...Bound so tightly with tension and anger, he approaches the state of rigor mortis.
  † In Memoriam † maandag 15 oktober 2001 @ 14:07:45 #109
13819 Loedertje
Trotse GILF.
pi_1906130
Fatima : In 1917, Our Lady of Fatima foretold that Russia would cause the annihilation of many Nations. To prevent this she returned in 1929 and asked that Russia be consecrated to her Immaculate Heart, promising to save it (and us) by this means. This requested consecration has never been made. The Blessed Mother has therefore chosen to show us the Spiritual Battle in the Spiritual Language that we may understand that Russia&#8217;s annihilation of many nations is now upon us. Our only recourse is the long overdue consecration. And Heaven awaits :

WEBMASTER NOTE: PLEASE ENSURE YOU HAVE THE MOST RECENT COPY OF ADOBE ACROBAT READER. Click on Adobe icon below to download the latest free version:
Please Note: In order to view the .pdf document, you may have to click 'Refresh' or 'Reload' in your browser after selecting one of the following options:

China Moves Muslim Troops into Afghanistan to Support Taliban and Bin Laden Against US Assault

Headlines Debka Intelligence Oct. 6, First Day of Beam Calendar Cross:
US and Russia Strike Reciprocal Deal on
Tactical Nuclear Weapons Deployment Against Afghanistan and Chechnya

URGENT UPDATE - OCTOBER 6, 2001
GOD IS SCREAMING AT US SEPTEMBER 24, 2001
THE WARNING

SEPTEMBER 20, 2001


WORLD ALERT USA CRISIS POSTED SEPTEMBER 16, 2001


Addendum 1 World Wide Alert: Exposure 2000 Events of Conspiracy Cross
History I Common Purpose: the 5 Countries of 5 Point Star Conspiracy
Russia&#8217;s Cross The Triple Cross on the Jewish-Gregorian Intercalated Calendar
Addendum 11 Russia&#8217;s Betrayal of 5 Point Star Conspiracy: Mar.-Sept. 2001
Heaven&#8217;s Cross 1 Correct Latin Cross versus Russia&#8217;s Triple Cross
Addendum III Heaven&#8217;s Response I detailed: re: Russia&#8217;s Triple Cross
Addendum 1V Heaven&#8217;s Message to the Church
Heaven&#8217;s Cross 11 Versus Russia&#8217;s Cross re: Aug. when 5 Pt. Star Cross begins
Addendum V Heaven&#8217;s Response II detailed: to both Crosses in effect Aug.
History II Years of Conspiracy History: revealed in Heaven&#8217;s Response II

History III The Infiltration of Christ&#8217;s Church through monasticism
The Masterplan The Blueprint of 5 Plans from 1998 to 2002
Addendum V (ii) Completion of Heaven&#8217;s Response II Cross II versus Russia
Oklahoma The Bombing and McVeigh :Integral to the 1998 Masterplan
5 Pt. Star Cross Based on the 1998 Masterplan: Aug 12 to Dec. 14, 2001
Addendum VI The Five Point Star Conspiracy: Target Day, Dec. 13, 2001
Heaven&#8217;s Cross 111 Corrected Cross versus the 5 Point Star Cross
Addendum V11 Heaven&#8217;s Response III detailed: to totality of both Crosses
The Battle The Battle Between Good and Evil : Part I
Troubadours: Their Present Reality on Our News Channels
Shame on Durban Shame on the World : Sept 3, 2001

The Battle The Battle of Good and Evil : Part II (and New York)
AddendumVI11 Summation of All Plans: what they indicate

2000 Site Link

Addendum VII Link

1999 Site Link

Calculations of the Pyramid Formula, Gematria, Sum Formula and Prime Number Chronology, were automated through the computer program Mathematica of Wolfram Research. The many programs, based on my research of the various methods of understanding the language, were set up as executable Mathematica files by a physicist interested in my research, Mr. Edwin Wright. In addition to the months he spent automating these programs, Mr. Wright also fully designed and set up the five Calendars contained on this site. Further, the calculations required to obtain the cumulative day counts were executed by him through the software program, Excel. Without his unusual and dedicated assistance I could never have fully unlocked this conspiracy, for I had gone as far as I could with manual calculations on larger numbers. I&#8217;ve never met Edwin Wright, but I classify him as a friend in the true sense of the word, for his help was forthcoming, direct, totally voluntary, and kind in every sense of the word. I owe him much more than a thank you or an acknowledgment, for in August of 1999, it was he who inspired me to keep researching. This site, written for the glory of Jesus and His Blessed Mother, is the end result of that research.



--------------------------------------------------------------------------------

Addendum VIII - Summation of All Plans - uploaded 28 September 2001 at 6:30 pm (AST)
Shame on Durban, uploaded Sept.4 (8 PM AST) 2001

The Battle and Troubadours uploaded 10 PM (AST) August 19, 2001

Addendum VII uploaded August 2, 2001 (00:30 hrs AST)
Addendum VI uploaded July 12, 2001 (00:30 hours AST )
Russia&#8217;s Betrayal Plan exposed and uploaded February 27, 2001
Mary&#8217;s Plans revealed and uploaded March 17, 2001
History III &#8211;UK-US Conspiracy Roots uploaded April 13, revised April 16, 2001
The Masterplan Exposed and uploaded 6 PM (AST) May 18, 2001
Mary's Plan II Part 2 and Oklahoma uploaded (time AST ) June 17, 2001 00:30 hrs AST

  † In Memoriam † maandag 15 oktober 2001 @ 16:01:41 #110
13819 Loedertje
Trotse GILF.
pi_1907167
COINTELPRO: The Untold American Story



Compilation by Paul Wolf with contributions from Robert Boyle, Bob Brown, Tom Burghardt, Noam Chomsky, Ward Churchill, Kathleen Cleaver, Bruce Ellison, Cynthia McKinney, Nkechi Taifa, Laura Whitehorn, Nicholas Wilson, and Howard Zinn.
Presented to U.N. High Commissioner for Human Rights Mary Robinson at the World Conference Against Racism in Durban, South Africa by the members of the Congressional Black Caucus attending the conference: Donna Christianson, John Conyers, Eddie Bernice Johnson, Barbara Lee, Sheila Jackson Lee, Cynthia McKinney, and Diane Watson, September 1, 2001.



Table of Contents

Overview
Victimization
COINTELPRO Techniques
Murder and Assassination
Agents Provocateurs
The Ku Klux Klan
The Secret Army Organization
Snitch Jacketing
The Subversion of the Press
Political Prisoners
Leonard Peltier
Mumia Abu Jamal
Geronimo ji Jaga Pratt
Dhoruba Bin Wahad
Marshall Eddie Conway
Justice Hangs in the Balance
Appendix: The Legacy of COINTELPRO
CISPES
The Judi Bari Bombing
Bibliography


Overview
We're here to talk about the FBI and U.S. democracy because here we have this peculiar situation that we live in a democratic country - everybody knows that, everybody says it, it's repeated, it's dinned into our ears a thousand times, you grow up, you pledge allegiance, you salute the flag, you hail democracy, you look at the totalitarian states, you read the history of tyrannies, and here is the beacon light of democracy. And, of course, there's some truth to that. There are things you can do in the United States that you can't do many other places without being put in jail.
But the United States is a very complex system. It's very hard to describe because, yes, there are elements of democracy; there are things that you're grateful for, that you're not in front of the death squads in El Salvador. On the other hand, it's not quite a democracy. And one of the things that makes it not quite a democracy is the existence of outfits like the FBI and the CIA. Democracy is based on openness, and the existence of a secret policy, secret lists of dissident citizens, violates the spirit of democracy.
Despite its carefully contrived image as the nation's premier crime fighting agency, the Federal Bureau of Investigation has always functioned primarily as America's political police. This role includes not only the collection of intelligence on the activities of political dissidents and groups, but often times, counterintelligence operations to thwart those activities. The techniques employed are easily recognized by anyone familiar with military psychological operations. The FBI, through the use of the criminal justice system, the postal system, the telephone system and the Internal Revenue Service, enjoys an operational capability surpassing even that of the CIA, which conducts covert actions in foreign countries without having access to those institutions.
Although covert operations have been employed throughout FBI history, the formal COunter INTELligence PROgrams (COINTELPRO's) of the period 1956-1971 were the first to be both broadly targeted and centrally directed. According to FBI researcher Brian Glick, "FBI headquarters set policy, assessed progress, charted new directions, demanded increased production, and carefully monitored and controlled day-to-day operations. This arrangement required that national COINTELPRO supervisors and local FBI field offices communicate back and forth, at great length, concerning every operation. They did so quite freely, with little fear of public exposure. This generated a prolific trail of bureaucratic paper. The moment that paper trail began to surface, the FBI discontinued all of its formal domestic counterintelligence programs. It did not, however, cease its covert political activity against U.S. dissidents." 1
Of roughly 20,000 people investigated by the FBI solely on the basis of their political views between 1956-1971, about 10 to 15% were the targets of active counterintelligence measures per se. Taking counterintelligence in its broadest sense, to include spreading false information, it's estimated that about two-thirds were COINTELPRO targets. Most targets were never suspected of committing any crime.
The nineteen sixties were a period of social change and unrest. Color television brought home images of jungle combat in Vietnam and protesters and priests burning draft cards and American flags. In the spring and summer months of 1964, 1965, 1966, 1967 and 1968, massive black rebellions swept across almost every major US city in the Northeast, Midwest and California. 2 Presidents Johnson and Nixon, and many others feared violent revolution and denounced the protesters. President Kennedy had felt the opposite: "Those who make peaceful revolution impossible will make violent revolution inevitable."
The counterculture of the sixties, and the FBI's reaction to it, were in many ways a product of the 1950s, the so-called "Age of McCarthyism." John Edgar Hoover, longtime Director of the FBI, was a prominent spokesman of the anti-communist paranoia of the era:
The forces which are most anxious to weaken our internal security are not always easy to identify. Communists have been trained in deceit and secretly work toward the day when they hope to replace our American way of life with a Communist dictatorship. They utilize cleverly camouflaged movements, such as peace groups and civil rights groups to achieve their sinister purposes. While they as individuals are difficult to identify, the Communist party line is clear. Its first concern is the advancement of Soviet Russia and the godless Communist cause. It is important to learn to know the enemies of the American way of life. 3
Throughout the 1960s, Hoover consistently applied this theory to a wide variety of groups, on occasion reprimanding agents unable to find "obvious" communist connections in civil rights and anti-war groups. 4 During the entire COINTELPRO period, no links to Soviet Russia were uncovered in any of the social movements disrupted by the FBI.
The commitment of the FBI to undermine and destroy popular movements departing from political orthodoxy has been extensive, and apparently proportional to the strength and promise of such movements, as one would expect in the case of the secret police organization of any state, though it is doubtful that there is anything comparable to this record among the Western industrial democracies.
In retrospect, the COINTEPRO's of the 1960s were thoroughly successful in achieving their stated goals, "to expose, disrupt, misdirect, discredit, or otherwise neutralize" the enemies of the State.

Victimization
The most serious of the FBI disruption programs were those directed against "Black Nationalists." Agents were instructed to undertake actions to discredit these groups both within "the responsible Negro community" and to "Negro radicals," also "to the white community, both the responsible community and to `liberals' who have vestiges of sympathy for militant black nationalists simply because they are Negroes..."
A March 4th, 1968 memo from J Edgar Hoover to FBI field offices laid out the goals of the COINTELPRO - Black Nationalist Hate Groups program: "to prevent the coalition of militant black nationalist groups;" "to prevent the rise of a messiah who could unify and electrify the militant black nationalist movement;" "to prevent violence on the part of black nationalist groups;" "to prevent militant black nationalist groups and leaders from gaining respectability;" and "to prevent the long-range growth of militant black nationalist organizations, especially among youth." Included in the program were a broad spectrum of civil rights and religious groups; targets included Martin Luther King, Malcolm X, Stokely Carmichael, Eldridge Cleaver, and Elijah Muhammad.
A top secret Special Report 5 for President Nixon, dated June 1970 gives some insight into the motivation for the actions undertaken by the government to destroy the Black Panther party. The report describes the party as "the most active and dangerous black extremist group in the United States." Its "hard-core members" were estimated at about 800, but "a recent poll indicates that approximately 25 per cent of the black population has a great respect for the BPP, incuding 43 per cent of blacks under 21 years of age." On the basis of such estimates of the potential of the party, counterintelligence operations were carried out to ensure that it did not succeed in organizing as a substantial social or political force.
Another memorandum explains the motivation for the FBI operations against student protesters: "the movement of rebellious youth known as the 'New Left,' involving and influencing a substantial number of college students, is having a serious impact on contemporary society with a potential for serious domestic strife." The New Left has "revolutionary aims" and an "identification with Marxism-Leninism." It has attempted "to infiltrate and radicalize labor," and after failing "to subvert and control the mass media" has established "a large network of underground publications which serve the dual purpose of an internal communication network and an external propaganda organ." Its leaders have "openly stated their sympathy with the international communist revolutionary movements in South Vietnam and Cuba; and have directed others into activities which support these movements."
The effectiveness of the state disruption programs is not easy to evaluate. Black leaders estimate the significance of the programs as substantial. Dr. James Turner of Cornell University, former president of the African Heritage Studies Association, assessed these programs as having "serious long-term consequences for black Americans," in that they "had created in blacks a sense of depression and hopelessness." 6
He states that "the F.B.I. set out to break the momentum developed in black communities in the late fifties and early sixties"; "we needed to put together organizational mechanisms to deliver services," but instead, "our ability to influence things that happen to us internally and externally was killed." He concludes that "the lack of confidence and paranoia stimulated among black people by these actions" is just beginning to fade.
The American Indian Movement, arguably the most hopeful vehicle for indigenous pride and self-determination in the late 20th century, was also destroyed. As AIM leader Dennis Banks has observed:
"The FBI's tactics eventually proved successful in a peculiar sort of way. It's remarkable under the circumstances - and a real testament to the inner strength of the traditional Oglalas - that the feds were never really able to divide them from us, to have the traditionals denouncing us and working against us. But, in the end, the sort of pressure the FBI put on people on the reservation, particularly the old people, it just wore 'em down. A kind of fatigue set in. With the firefight at Oglala, and all the things that happened after that, it was easy to see we weren't going to win by direct confrontation. So the traditionals asked us to disengage, to try and take some of the heaviest pressure off. And, out of respect, we had no choice but to honor those wishes. And that was the end of AIM, at least in the way it had been known up till then. The resistance is still there, of course, and the struggle goes on, but the movement itself kind of disappeared." 7
The same can be said for socialist movements targeted by COINTELPRO. Alone among the parliamentary democracies, the United States has no mass-based socialist party, however mild and reformist, no socialist voice in the media, and virtually no departure from Keynesian economics in American universities and journals. The people of the United States have paid dearly for the enforcement of domestic privilege and the securing of imperial domains. The vast waste of social wealth, miserable urban ghettos, the threat and reality of unemployment, meaningless work in authoritarian institutions, standards of health and social welfare that should be intolerable in a society with such vast productive resources -- all of this must be endured and even welcomed as the "price of freedom" if the existing order is to stand without challenge.

COINTELPRO Techniques
From its inception, the FBI has operated on the doctrine that the "preliminary stages of organization and preparation" must be frustrated, well before there is any clear and present danger of "revolutionary radicalism."
At its most extreme dimension, political dissidents have been eliminated outright or sent to prison for the rest of their lives. There are quite a number of individuals who have been handled in that fashion.
Many more, however, were "neutralized" by intimidation, harassment, discrediting, snitch jacketing, a whole assortment of authoritarian and illegal tactics.
Neutralization, as explained on record by the FBI, doesn't necessarily pertain to the apprehension of parties in the commission of a crime, the preparation of evidence against them, and securing of a judicial conviction, but rather to simply making them incapable of engaging in political activity by whatever means.
For those not assessed as being in themselves, necessarily a security risk, but engaged in what the Bureau views to be politically objectionable activity, those techniques might consist of disseminating derogatory information to the target's family, friends and associates, visiting and questioning them, basically, making it clear that the FBI are paying attention to them, to try to intimidate them.
If the subject continues their activities, and particularly if they respond by escalating them, the FBI will escalate its tactics as well. Maybe they'll be arrested and prosecuted for spurious reasons. Maybe there will be more vicious rumors circulated about them. False information may be planted in the press. The targets' efforts to speak in public are frustrated, employers may be contacted to try to get them fired. Anonymous letters have been sent by the FBI to targets' spouses, accusing them of infidelity. Others have contained death threats.
And if the subject persists then there will be a further escalation.
According to FBI memoranda of the 1960s, "Key black activists" were repeatedly arrested "on any excuse" until "they could no longer make bail." The FBI made use of informants, often quite violent and emotionally disturbed individuals, to present false testimony to the courts, to frame COINTELPRO targets for crimes they knew they did not commit. In some cases the charges were quite serious, including murder.
Another option is "snitch jacketing" - making the target look like a police informant or a CIA agent. This serves the dual purposes of isolating and alienating important leaders, and increasing the general level of fear and factionalism in the group.
"Black bag jobs" are burglaries performed in order to obtain the written materials, mailing lists, position papers, and internal documents of an organization or an individual. At least 10,000 American homes have been subjected to illegal breaking and entering by the FBI, without judicial warrants.
Group membership lists are used to expand the operation. Anonymous mailings of newspaper and magazine articles may be mailed to group members and supporters to convince them of the error of their ways. Anonymous or spurious letters and cartoons are sent to promote factionalism and widen rifts in or between organizations.
According to the FBI's own records, agents have been directed to use "established local news media contacts" and other "sources available to the Seat of Government" to "disrupt or neutralize" organizations and to "ridicule and discredit" them.
Many counterintelligence techniques involve the use of paid informants. Informants become agents provocateurs by raising controversial issues at meetings to take advantage of ideological divisions, by promoting emnity with other groups, or by inciting the group to violent acts, even to the point of providing them with weapons.
Over the years, FBI provocateurs have repeatedly urged and initiated violent acts, including forceful disruptions of meetings and demonstrations, attacks on police, bombings, and so on, following an old strategy of Tsarist police director TC Zubatov: "We shall provoke you to acts of terror and then crush you."
A concise description of political warfare is given in a passage from a CIA paper entitled "Nerve War Against Individuals," referring to the overthrowing of the government of Guatemala in 1954:
The strength of an enemy consists largely of the individuals who occupy key positions in the enemy organization, as leaders, speakers, writers, organizers, cabinet members, senior government officials, army commanders and staff officers, and so forth. Any effort to defeat the enemy must therefore concentrate to a great extent upon these key enemy individuals.
If such an effort is made by means short of physical violence, we call it "psychological warfare." If it is focussed less upon convincing those individuals by logical reasoning, but primarily upon moving them in the desired direction by means of harassment, by frightening, confusing and misleading them, we speak of a "nerve war". 8
The COINTELPROs clearly met the above definition of "nerve wars," and, in the case of the American Indian Movement in Pine Ridge, South Dakota, the FBI conducted a full-fledged counterinsurgency war, complete with death squads, disappearances and assassinations, recalling Guatemala in more recent years.
The full story of COINTELPRO may never be told. The Bureau's files were never seized by Congress or the courts or sent to the National Archives. Some have been destroyed. Many counterintelligence operations were never committed to writing as such, or involve open investigations, and ex-operatives are legally prohibited from talking about them. Most operations remain secret until long after the damage has been done.

Murder and Assassination
Among the most remarkable of the COINTELPRO revelations are those relating to the FBI's attempts to incite gang warfare and murderous attacks on Black Panther leaders. For example, a COINTELPRO memo from FBI Headquarters mailed November 25, 1968, informs recipient offices that:
a serious struggle is taking place between the Black Panther Party (BPP) and the US [United Slaves] organization. The struggle has reached such proportions that it is taking on the aura of gang warfare with attendant threats of murder and reprisals.
In order to fully capitalize upon BPP and US differences as well as to exploit all avenues of creating further dissension in the ranks of the BPP, recipient offices are instructed to submit imaginative and hard-hitting counterintelligence measures aimed at crippling the BPP. 9
According to the national chairman of the US organization, who became a professor at San Diego State, the US and the Panthers had been negotiating to avoid bloodshed: "Then the F.B.I. stepped in and the shooting started."
A series of cartoons were produced in an effort to incite violence between the Black Panther Party and the US; for example, one showing Panther leader David Hilliard hanging dead with a rope around his neck from a tree. The San Diego office reported to the director that:
in view of the recent killing of BPP member SYLVESTER BELL, a new cartoon is being considered in the hopes that it will assist in the continuance of the rift between BPP and US. This cartoon, or series of cartoons, will be similar in nature to those formerly approved by the Bureau and will be forwarded to the Bureau for evaluation and approval immediately upon their completion.
Under the heading "TANGIBLE RESULTS" the memo continues:
Shootings, beatings, and a high degree of unrest continues to prevail in the ghetto area of southeast San Diego. Although no specific counterintelligence action can be credited with contributing to this over-all situation, it is felt that a substantial amount of the unrest is directly attributable to this program.
Between 1968-1971, FBI-initiated terror and disruption resulted in the murder of Black Panthers Arthur Morris, Bobby Hutton, Steven Bartholomew, Robert Lawrence, Tommy Lewis, Welton Armstead, Frank Diggs, Alprentice Carter, John Huggins, Alex Rackley, John Savage, Sylvester Bell, Larry Roberson, Nathaniel Clark, Walter Touré Pope, Spurgeon Winters, Fred Hampton, Mark Clark, Sterling Jones, Eugene Anderson, Babatunde X Omarwali, Carl Hampton, Jonathan Jackson, Fred Bennett, Sandra Lane Pratt, Robert Webb, Samuel Napier, Harold Russell, and George Jackson.
One of the more dramatic incidents occurred on the night of December 4, 1969, when Panther leaders Fred Hampton and Mark Clark were shot to death by Chicago policemen in a predawn raid on their apartment. Hampton, one of the most promising leaders of the Black Panther party, was killed in bed, perhaps drugged. Depositions in a civil suit in Chicago revealed that the chief of Panther security and Hampton's personal bodyguard, William O'Neal, was an FBI infiltrator. O'Neal gave his FBI contacting agent, Roy Mitchell, a detailed floor plan of the apartment, which Mitchell turned over to the state's attorney's office shortly before the attack, along with "information" -- of dubious veracity -- that there were two illegal shotguns in the apartment. For his services, O'Neal was paid over $10,000 from January 1969 through July 1970, according to Mitchell's affidavit.
The availability of the floor plan presumably explains why "all the police gunfire went to the inside corners of the apartment, rather than toward the entrances," and undermines still further the pretense that the barrage was caused by confusion in unfamiliar surroundings that led the police to believe, falsely, that they were being fired upon by the Panthers inside. 10
Agent Mitchell was named by the Chicago Tribune as head of the Chicago COINTELPRO directed against the Black Panthers and other black groups. Whether or not this is true, there is substantial evidence of direct FBI involvement in this Gestapo-style political assassination. O'Neal continued to report to Agent Mitchell after the raid, taking part in meetings with the Hampton family and their discussion with their lawyers.
There has as yet been no systematic investigation of the FBI campaign against the Black Panther Party in Chicago, as part of its nationwide program against the Panthers.
Malcolm X was supposedly murdered by former colleagues in the Nation of Islam (NOI) as a result of the faction-fighting which had led to his splitting away from that movement, and their "natural wrath" at his establishment of a separate mosque, the Muslim Mosque, Inc.
However, the NOl factionalism at issue didn't just happen. It had been developed by deliberate Bureau actions, through infiltration and the "sparking of acrimonious debates within the organization," rumor-mongering, and other tactics designed to foster internal disputes. 11 The Chicago Special Agent in Charge, Marlin Johnson, who also oversaw the assassinations of Fred Hampton and Mark Clark, makes it quite obvious that he views the murder of Malcolm X as something of a model for "successful" counterintelligence operations.
"Over the years considerable thought has been given, and action taken with Bureau approval, relating to methods through which the NOI could be discredited in the eyes of the general black populace or through which factionalism among the leadership could be created. Serious consideration has also been given towards developing ways and means of changing NOI philosophy to one whereby the members could be developed into useful citizens and the organization developed into one emphasizing religion - the brotherhood of mankind - and self improvement. Factional disputes have been developed - most notable being Malcolm X Little." 12
In an internal FBI monograph dated September 1963 found that, given the scope of support it had attracted over the preceding five years, civil rights agitation represented a clear threat to "the established order" of the U.S., and that Martin Luther "King is growing in stature daily as the leader among leaders of the Negro movement ... so goes Martin Luther King, and also so goes the Negro movement in the United States." This accorded well with COINTELPRO specialist William C. Sullivan's view, committed to writing shortly after King's landmark "I Have a Dream" speech during the massive civil rights demonstration in Washington, D.C., on August 28 of the same year:
We must mark [King] now, if we have not before, as the most dangerous Negro in the future of this Nation from the standpoint of communism, the Negro, and national security ... it may be unrealistic to limit [our actions against King] to legalistic proofs that would stand up in court or before Congressional Committees.
The stated objective of the SCLC, and the nature of its practical activities, was to organize for the securing of black voting rights across the rural South, with an eye toward the ultimate dismantlement of at least the most blatant aspects of the southern U.S. system of segregation. Even this seemingly innocuous agenda was, however, seen as a threat by the FBI. In mid-September of 1957, FBI supervisor J.G. Kelly forwarded a newspaper clipping describing the formation of the SCLC to the Bureau's Atlanta field office - that city being the location of SCLC headquarters - informing local agents, for reasons which were never specified, the civil rights group was "a likely target for communist infiltration," and that "in view of the stated purpose of the organization you should remain alert for public source information concerning it in connection with the racial situation." 13
The Atlanta field office "looked into" the matter and ultimately opened a COMINFIL (communist-inflitrated group) investigation of the SCLC, apparently based on the fact that a single SWP member, Lonnie Cross, had offered his services as a clerk in the organization's main office. 14 By the end of the first year of FBI scrutiny, in September of 1958, a personal file had been opened on King himself, ostensibly because he had been approached on the steps of a Harlem church in which he'd delivered a guest sermon by black CP member Benjamin J. Davis. 15 By October 1960, as the SCLC call for desegregation and black voting rights in the south gained increasing attention and support across the nation, the Bureau began actively infiltrating organizational meetings and conferences. 16
By July of 1961, FBI intelligence on the group was detailed enough to recount that, while an undergraduate at Atlanta's Morehouse College in 1948, King had been affiliated with the Progressive Party, and that executive director Wyatt Tee Walker had once subscribed to a CP newspaper, The Worker. 17
Actual counterintelligence operations against King and the SCLC seem to have begun with a January 8, 1962 letter from Hoover to Attorney General Robert F. Kennedy, contending that the civil rights leader enjoyed a "close relationship" with Stanley D. Levison, "a member of the Communist Party, USA," and that Isadore Wofsy, "a high ranking communist leader," had written a speech for King. 18
On the night of March 15-16,1962, FBI agents secretly broke into Levison's New York office and planted a bug; a wiretap of his office phone followed on March 20. 19 Among the other things picked up by the surveillance was information that Jack ODell, who also had an alleged "record of ties to the Communist party," had been recommended by both King and Levison to serve as an assistant to Wyatt Tee Walker. 20 Although none of these supposed communist affiliations were ever substantiated, it was on this basis that SCLC was targeted within the Bureau's ongoing COINTELPRO-CP,USA, beginning with the planting of five disinformational "news stories" concerning the organization's "communist connections" on October 24, 1962. 21 By this point, Martin Luther King's name had been placed in Section A of the FBI Reserve Index, one step below those individuals registered in the Security Index and scheduled to be rounded up and "preventively detained" in the event of a declared national emergency; Attorney General Kennedy had also authorized round-the-clock surveillance of all SCLC offices, as well as King's home. 22 Hence, by November 8,1963, comprehensive telephone taps had been installed at all organizational offices, and King's residence. 23
By 1964, King was not only firmly established as a preeminent civil rights leader, but was beginning to show signs of pursuing a more fundamental structural agenda of social change. Meanwhile, the Bureau continued its efforts to discredit King, maintaining a drumbeat of mass media-distributed propaganda concerning his supposed "communist influences" and sexual proclivities, as well as triggering a spate of harassment by the Internal Revenue Service (IRS). 24 When it was announced on October 14 of that year that King would receive a Nobel Peace Prize as a reward for his work in behalf of the rights of American blacks, the Bureau - exhibiting a certain sense of desperation - dramatically escalated its efforts to neutralize him.
Two days after announcement of the impending award, COINTELPRO specialist William Sullivan caused a composite audio tape to be produced, supposedly consisting of "highlights" taken from the taps of King's phones and bugs placed in his various hotel rooms over the preceding two years.
The result, prepared by FBI audio technician John Matter, purported to demonstrate the civil rights leader had engaged in a series of "orgiastic" trysts with prostitutes and, thus, "the depths of his sexual perversion and depravity." The finished tape was packaged, along with an accompanying anonymous letter (prepared by Bureau Internal Security Supervisor Seymore F. Phillips on Sullivan's instruction), informing King that the audio material would be released to the media unless he committed suicide prior to bestowal of the Nobel Prize.
King, look into your heart. You know you are a complete fraud and a great liability to all of us Negroes. White people in this country have enough frauds of their own but I am sure that they don't have one at this time that is any where near your equal. You are no clergyman and you know it. I repeat you are a colossal fraud and an evil, vicious one at that. ...
King, there is only one thing left for you to do. You know what it is. You have just 34 days in which to do (this exact number has been selected for a specific reason, it has definite practical significant. You are done. There is but one way out for you. You better take it before your filthy, abnormal fraudulent self is bared to the nation. [sic]. 25
Sullivan then instructed veteran COINTELPRO operative Lish Whitson to fly to Miami with the package; once there, Whitson was instructed to address the parcel and mail it to the intended victim. 26 When King failed to comply with Sullivan's anonymous directive that he kill himself, FBI Associate Director Cartha D. "Deke" DeLoach attempted to follow through with the threat to make the contents of the doctored tape public:
The Bureau Crime Records Division, headed by DeLoach, initiated a major campaign to let newsmen know just what the Bureau [claimed to have] on King. DeLoach personally offered a copy of the King surveillance transcript to Newsweek Washington bureau chief Benjamin Bradlee. Bradlee refused it, and mentioned the approach to a Newsday colleague, Jay Iselin. 27
Bradlee's disclosure of what the FBI was up to served to curtail the effectiveness of DeLoach's operation, and Bureau propagandists consequently found relatively few takers on this particular story. More, in the face of a planned investigation of electronic surveillance by government agencies announced by Democratic Missouri Senator Edward V. Long, J. Edgar Hoover was forced to order the rapid dismantling of the electronic surveillance coverage of both King and the SCLC, drying up much of the source material upon which Sullivan and his COINTELPRO specialists depended for "authenticity."
Still, the Bureau's counterintelligence operations against King continued apace, right up to the moment of the target's death by sniper fire on a Memphis hotel balcony on April 4, 1968. 28 By 1969, "[FBI] efforts to 'expose' Martin Luther King, Jr., had not slackened even though King had been dead for a year." 29
Those seeking independence for Puerto Rico were similarly attacked. The Bureau considered independentista leader Juan Mari Bras' near-fatal heart attack during April of 1964 to have been brought on, at least in part, by an anonymous counterintelligence letter:
[deleted] stated that MARI BRAS' heart attack on April 21, 1964, was obviously brought on by strain and overwork and opinioned that the anonymous letter certainly did nothing to ease his tensions for he felt the effects of the letter deeply. The source pointed out that with MARI BRAS' illness and effects of the letter on the MPIPR leaders, that the organization's activities had come to a near halt.
[paragraph deleted]
It is clear from the above that our anonymous letter has seriously disrupted the MPIPR ranks and created a climate of distrust and dissension from which it will take them some time to recover. This particular technique has been outstandingly successful and we shall be on the lookout to further exploit the achievements in this field. The Bureau will be promptly advised of other positive results of this program that may come to our attention. 30
The pattern remained evident more than a decade later when, after reviewing portions of the 75 volumes of documents the FBI had compiled on him, Mari Bras testified before the United Nations Commission on Decolonization:
[The documents] reflect the general activity of the FBI toward the movement. But some of the memos are dated 1976 and 1977; long after COINTELPRO was [supposedly] ended as an FBI activity ... At one point, there is a detailed description of the death of my son, in 1976, at the hands of a gun-toting assassin. The bottom of the memo is fully deleted, leaving one to wonder who the assassin was. The main point, however, is that the memo is almost joyful about the impact his death will have upon me in my Gubernatorial campaign, as head of our party, in 1976. 31
When Mari Bras suffered from an attack of severe depression the same year, the San Juan Special Agent in Charge noted in a memo to FBI headquarters that, "It would hardly be idle boasting to say that some of the Bureau's activities have provoked the situation of Mari Bras." Given the context established by the Bureau's own statements vis a vis Mari Bras, it also seems quite likely that one of the means by which the FBI continued to "exploit its achievements" in "provoking the situation" of the independentista leader was to arrange for the firebombing of his home in 1978.
Lethal COINTELPRO operations against the independentistas continued well into the 1980s. As Alfredo Lopez recounted in 1988:
[O]ver the past fifteen years, 170 attacks - beatings, shootings, and bombings of independence organizations and activists - have been documented ... there have been countless attacks and beatings of people at rallies and pickets, to say nothing of independentistas walking the streets. The 1975 bombing of a rally at Mayaguez that killed two restaurant workers was more dramatic, but like the other 170 attacks remains unsolved. Although many right-wing organizations claimed credit for these attacks, not one person has been arrested or brought to trial. 32
A clear instance of direct FBI involvement in anti-independentista violence is the "Cerro Maravilla Episode" of July 25,1978. On that date, two young activists, Arnaldo Dario Rosado and Carlos Soto Arrivi, accompanied a provocateur named Alejandro Gonzalez Malave, were lured into a trap and shot to death by police near the mountain village. Official reports claimed the pair had been on the way to blow up a television tower near Cerro Maravilla, and had fired first when officers attempted to arrest them. A taxi driver who was also on the scene, however, adamantly insisted that this was untrue, that neither independentista had offered resistance when captured, and that the police themselves had fired two volleys of shots in order to make it sound from a distance as if they'd been fired upon. "It was a planned murder," the witness said, "and it was carried out like that." What had actually happened became even more obvious when a police officer named Julio Cesar Andrades came forward and asserted that the assassination had been planned "from on high" and in collaboration with the Bureau. This led to confirmation of Gonzalez Molave's role as an infiltrator reporting to both the local police and the FBI, a situation which prompted him to admit "having planned and urged the bombing" in order to set the two young victim up for execution. In the end, it was shown that:
Dario and Soto [had] surrendered. Police forced the men to their knees, handcuffed their arms behind their backs, and as the two independentistas pleaded for justice, the police tortured and murdered them. 33
None of the police and other officials involved were ever convicted of the murders and crimes directly involved in this affair. However, despite several years of systematic coverup by the FBI and U.S. Justice Department, working in direct collaboration with the guilty officers, ten of the latter were finally convicted on multiple counts of perjury and sentenced to prison terms ranging from six to 30 years apiece. Having evaded legal responsibility for his actions altogether, provocateur Gonzalez Molave was shot to death in front of his home on April 29,1986, by "party or parties unknown." This was followed, on February 28,1987, by the government's payment of $575,000 settlements to both victims' families, a total of $1,150,000 in acknowledgment of the official misconduct attending their deaths and the subsequent investigation(s).
Despite tens of thousands of pages of documentary evidence, the idea that the Bureau would utilize private right-wing operatives and terrorists is a chilling, alien concept to most Americans. Nevertheless, the FBI has financed, organized, and supplied arms to right-wing groups that carried out fire-bombings, burglaries, and shootings. 34
This was the case during the FBI's COINTELPRO in South Dakota in the 1970's against the Oglala Sioux Nation and the American Indian Movement. Right-wing vigilantes were used to disrupt the American Indian Movement (AIM) and selectively terrorize and murder the Oglala Sioux people 35, in what could only be described as a counter-insurgency campaign. During the 36 months roughly beginning with the 1973 seige of Wounded Knee and continuing through the first of May 1976, more than sixty AIM members and supporters died violently on or in locations immediately adjacent to the Pine Ridge Reservation. A minimum of 342 others suffered violent physical assaults. As Roberto Maestas and Bruce Johansen have observed:
Using only these documented political deaths, the yearly murder rate on Pine Ridge Reservation between March 1, 1973, and March 1, 1976, was 170 per 100,000. By comparison, Detroit, the reputed "murder capital of the United States," had a rate of 20.2 in 1974. ... The political murder rate at Pine Ridge between March 1, 1973, and March 1, 1976, was almost equivalent to that in Chile during the three years after the military coup supported by the United States deposed and killed President Salvador Allende. 36
To commemorate the 1890 massacre of Wounded Knee, in which 300 Minnecojou Lakota were slaughtered by the U.S. Seventh Cavalry, hundreds of Native Americans from reservations across the West gathered in Wounded Knee, on the Pine Ridge Reservation in South Dakota, during the winter of 1972-73. 37
This situation was already tense due to a series of unsolved murders on the reservation, and a struggle between the administration of the Oglala Sioux tribal president, Dick Wilson, and opposition organizations on the reservation, including AIM. Wilson had been bestowed with a $62,000 Bureau of Indian Affairs (BIA) grant for purposes of establishing a "tribal ranger group" - an entity which designated itself as "Guardians Of the OgIala Nation" (GOONs). Wilson's "goon squads" patrolled the reservation, unleashing a reign of terror against Wilson's enemies. When victims attempted to seek the protection of the BIA police, they quickly discovered that perhaps a third of its roster - including its head, Delmar Eastman (Crow), and his second-in-command, Duane Brewer (OgIala) - were doubling as GOON leaders or members. For their part, BIA officials - who had set the whole thing up - consistently turned aside requests for assistance from the traditionals as being "purely internal tribal matters," beyond the scope of BIA authority.
On Feb 28th, 1973, residents of Wounded Knee, South Dakota found the roads to the hamlet blockaded by GOONs, later reinforced by marshals service Special Operations Group (SOG) teams and FBI personnel. By 10 p.m., Minneapolis SAC Joseph Trimbach had flown in to assume personal command of the GOONs and BIA police, while Wayne Colburn, director of the U.S. Marshals Service, had arrived to assume control over his now reinforced SOG unit. Colonel Volney Warner of the 82nd Airborne Division and 6th Army Colonel Jack Potter - operating directly under General Alexander Haig, military liaison in the Nixon White House - had also been dispatched from the Pentagon as "advisors" coordinating a flow of military personnel, weapons and equipment to those besieging Wounded Knee. As Rex Weyler has noted:
Documents later subpoenaed from the Pentagon revealed that Colonel Potter directed the employment of 17 APCs [armored personnel carriers], 130,000 rounds of M-16 ammunition, 41,000 rounds of M-40 high explosive, as well as helicopters, Phantom jets, and personnel. Military officers, supply sergeants, maintenance technicians, chemical officers, and medical teams remained on duty throughout the 71 day siege, all working in civilian clothes [to conceal their unconstitutional involvement in this "civil disorder"]. 38
On March 5, Dick Wilson - with federal officials present - held a press conference to declare "open season" on AIM members on Pine Ridge, declaring "AIM will die at Wounded Knee." For their part, those inside the hamlet announced their intention to remain where they were until such time as Wilson was removed from office, the GOONs disbanded, and the massive federal presence withdrawn.
Beginning on March 13, federal forces directed fire from heavy .50 caliber machineguns into the AIM positions. The following month was characterized by alternating periods of negotiation, favored by the army and the marshals - which the FBI and GOONs did their best to subvert - and raging gun battles when the latter held sway. Several defenders were severely wounded in a firefight on March 17, and on March 23 some 20,000 more rounds were fired into Wounded Knee in a 24-hour period.
The FBI's "turf battle" with the "soft" elements of the federal government rapidly came to a head. On April 23, Chief U.S. Marshal Colburn and federal negotiator Kent Frizzell were detained at a GOON roadblock and a gun pointed at Frizzell's head. By his own account, Frizzell was saved only after Colburn leveled a weapon at the GOON and said, "Go ahead and shoot Frizzell, but when you do, you're dead." The pair were then released. Later the same day, a furious Colburn returned with several of his men, disarmed and arrested eleven GOONs, and dismantled the roadblock. However, "that same night... some of Wilson's people put it up again. The FBI, still supporting the vigilantes, had [obtained the release of those arrested and] supplied them with automatic weapons." The GOONs were being armed by the FBI with fully automatic M-16 assault rifles, apparently limitless quantifies of ammunition, and state-of-the-art radio communications gear. When Colburn again attempted to dismantle the roadblock:
FBI [operations consultant] Richard [G.] Held arrived by helicopter to inform the marshals that word had come from a high Washington source to let the roadblock stand ... As a result the marshals were forced to allow several of Wilson's people to be stationed at the roadblock and to participate in ... patrols around the village. 39
On the evening of April 26, the marshals reported that they were taking automatic weapons fire from behind their position, undoubtedly from GOON patrols. The same "party or parties unknown" was also pumping bullets into the AIM/ION positions in front of the marshals, a matter which caused return fire from AIM. The marshals were thus caught in a crossfire. At dawn on the 27th, the marshals, unnerved at being fired on all night from both sides, fired tear gas cannisters from M-79 grenade launchers into the AIM/ION bunkers. They followed up with some 20,000 rounds of small arms ammunition. AIM member Buddy Lamont (Oglala), driven from a bunker by the gas, was hit by automatic weapons fire and bled to death before medics, pinned down by the barrage, could reach him.
When the siege finally ended through a negotiated settlement on May 7, 1973, the AIM casualty count stood at two dead and fourteen seriously wounded. An additional eight-to-twelve individuals had been "disappeared" by the GOONs. They were in all likelihood murdered and - like an untold number of black civil rights workers in the swamps of Mississippi and Louisiana - their bodies secretly buried somewhere in the remote vastness of the reservation.
Of the 60-plus murders occurring in an area in which the FBI held "preeminent jurisdiction," not one was solved by the Bureau. In most instances, no active investigation was ever opened, despite eye-witnesses identifying members of the Wilson GOON squad as killers.
U.S. Court of Appeals Judge Gerald Heaney, after reviewing numerous court transcripts and FBI documents, concluded that the United States Government overreacted at Wounded Knee. Instead of carefully considering the legitimate grievances of Native Americans, the response was essentially a military one.
While Judge Heaney believed that the "Native Americans" had some culpability in the firefight that day, he concluded the United States must share the responsibility. It never has. The FBI has never been held accountable or even publicly investigated for what one Federal petit jury and Judge Heaney concluded was complicity in the creation of a climate of fear and terror on the Pine Ridge Reservation.
Other AIM casualties include Richard Oaks, leader of the 1970 occupation of Alcatraz Island by "Indians of All Tribes," who was gunned down in California the following year. Larray Cacuse, a Navajo AIM leader, was shot to death in Arizona in 1972. In 1979, AIM leader John Trudell, preparing to make a speech in Washington, was told by FBI personnel that, if he gave the speech, there would be "consequences." Trudell not only made his speech, calling for the U.S. to get out of North America and detailing the nature of federal repression in Indian country, he burned a U.S. flag as well. That night, his wife, mother-in-law, and three children were "mysteriously" burned to death at their home on the Duck Valley Reservation in Nevada.


Agents Provocateurs
Many details are now available concerning these extensive campaigns of terror and disruption, in part through right-wing paramilitary groups organized and financed by the national government, but primarily through the much more effective means of infiltration and provocation of existing groups. In particular, much of the violence that occurred on college campuses can be attributed to government provocateurs.
The Alabama branch of the ACLU argued in court that in May 1970 an FBI agent "committed arson and other violence that police used as a reason for declaring that university students were unlawfully assembled" -- 150 students were arrested. The court ruled that the agent's role was irrelevant unless the defense could establish that he was instructed to commit the violent acts, but this was impossible, according to defense counsel, since the FBI and police thwarted his efforts to locate the agent who had admitted the acts to him. 40
William Frapolly, who surfaced as a government informer in the Chicago Eight conspiracy trial, an active member of student and off-campus peace groups in Chicago, "during an antiwar rally at his college, ... grabbed the microphone from the college president and wrestled him off the stage" and "worked out a scheme for wrecking the toilets in the college dorms...as an act of antiwar protest." 41
One FBI provocateur resigned when he was asked to arrange the bombing of a bridge in such a way that the person who placed the booby-trapped bomb would be killed. This was in Seattle, where it was revealed that FBI infiltrators had been engaged in a campaign of arson, terrorism, and bombings of university and civic buildings, and where the FBI arranged a robbery, entrapping a young black man who was paid $75 for the job and killed in a police ambush. 42
In another case, an undercover operative who had formed and headed a pro-Communist Chinese organization "at the direction of the bureau" reports that at the Miami Republican convention he incited "people to turn over one of the buses and then told them that if they really wanted to blow the bus up, to stick a rag in the gas tank and light it." They were unable to overturn the vehicle. 43

The Ku Klux Klan
During the 1960's, the FBI's role was not to protect civil rights workers, but rather, through the use of informants, the Bureau actively assisted the Ku Klux Klan in their campaign of racist murder and terror.
Church Committee hearings and internal FBI documents revealed that more than one quarter of all active Klan members during the period were FBI agents or informants. 44 However, Bureau intelligence "assets" were neither neutral observers nor objective investigators, but active participants in beatings, bombings and murders that claimed the lives of some 50 civil rights activists by 1964. 44
Bureau spies were elected to top leadership posts in at least half of all Klan units. 45 Needless to say, the informants gained positions of organizational trust on the basis of promoting the Klan's fascist agenda. Incitement to violence and participation in terrorist acts would only confirm the infiltrator's loyalty and commitment.
Unlike slick Hollywood popularizations of the period, such as Alan Parker's film, "Mississippi Burning," the FBI was instrumental in building the Ku Klux Klan in the South,
"...setting up dozens of Klaverns, sometimes being leaders and public spokespersons. Gary Rowe, an FBI informant, was involved in the Klan killing of Viola Liuzzo, a civil rights worker. He claimed that he had to fire shots at her rather than 'blow his cover.' One FBI agent, speaking at a rally organized by the Klavern he led, proclaimed to his followers, 'We will restore white rights if we have to kill every negro to do it.'" 46
Throughout its history, the Klan has had a contradictory relationship with the national government: as a defender of white privilege and the patriarchal status quo, and as an implicit threat, however provisional, to federal power. Depending on political conditions in society as a whole, vigilante terror can be supplemental to official violence, or kept on the proverbial shortleash. 47 As a surrogate army in the field of terror against official enemies, the Klan enjoys wide latitude. But when it moves into an oppositional mode and attacks key institutions of national power, Klan paramilitarism - but not its overt white supremacist ideology - is treated as an imminent threat to the social order, suppressed, but never destroyed, unlike other COINTELPRO target groups.
These roles are not mutually exclusive. As anti-racist researcher Michael Novick warns: "The KKK and its successor and fraternal organizations are deeply rooted in the actual white supremacist power relations of US society. They exist as a supplement to the armed power of the state, available to be used when the rulers and the state find it necessary." 48
The Klan's "supplemental" role, particularly as a private armed force sporadically deployed to arrest the development of movements for Black freedom, is best considered by comparison to other Bureau operations. Unlike other COINTELPROs, the "Klan - White Hate Groups" program was of a different order entirely. Senior FBI management and a majority of agents in the field endorsed the Klan's values, if not the vigilante character of their tactics; from militaristic anti-communism to extreme racial hatred; from ultra-nationalism to misogynist puritanism. 49
This was evident during the civil rights struggles of the sixties, when Freedom Riders and local community activists directly confronted hostile police forces - many of whom were openly allied with the Klan. Despite clear jurisdictional authority to enforce federal law, the FBI consistently refused to protect civil rights workers under attack across the South. More than once, the Bureau refused to warn those under imminent threat of violence.
FBI inaction in the area of civil rights enforcement wasn't simply a matter of what the Pike Committee of the House of Representatives dubbed "FBI racism." Rather, FBI bureaucratic lethargy, when it came to protecting Black lives, underscored its mission against subversion for constituents whose privileges and power were threatened by a militant movement for Black rights. 50
Strikingly different from anti-communist COINTELPROs that enmeshed broad social sectors in a web of entanglements, FBI monitoring of the Klan was strictly confined to the organization itself. No serious efforts were made to explore the supplemental role of White Citizens' Councils, many of which were active Klan fronts, let alone investigate the obvious and widespread police complicity in racist violence. 51 Bureau surveillance of the Klan was purely passive, hardly the directed aggression reserved for left-wing targets.
In May, 1961, as civil rights activists turned up the heat, the FBI passed information to the Klan about Freedom Rider buses on their way to Birmingham, Alabama. A police sergeant, Thomas Cook, attached to the Birmingham police intelligence branch was plied with reports by Bureau informants. A Klan member himself, Cook furnished this information to Robert Shelton's Alabama Knights and arranged several meetings to discuss "matters of interest." Cook supplied Klan leaders with the names of "inter-racial organizations," the location of meetings, and the membership lists of civil rights groups for circulation in Klan publications. FBI informant Gary Thomas Rowe wrote a confidential memo to the Birmingham Special Agent in Charge (SAC) stating that Cook had handed over inter-office intelligence memos on civil rights activists during a Klan meeting. Rowe insisted that Cook not only gave him relevant information that police had in their files, but urged Rowe to "help himself to any material he thought he would need for the Klan." 52
According to documents obtained by the American Civil Liberties Union, the Birmingham SAC called Cook and informed him of the progress that Freedom Rider buses had made and when they were scheduled to arrive in the city. According to Rowe, Cook and Birmingham's public safety director, arch-segregationist Eugene "Bull" Connor conspired with Klan leaders and directly organized physical attacks on Freedom Riders when the buses reached their destination. According to one FBI memo, Connor declared: "By God, if you are going to do this thing, do it right." 53
In consultation with Shelton's group, Birmingham police agreed not to show up for 15 or 20 minutes after the buses pulled in, to give Klansmen sufficient time to carry out their attack. Assailants were promised lenient treatment if through some fluke, they managed to get arrested. During a planning meeting that finalized logistical details, Grand Titan Hubert Page advised Klansmen that Imperial Wizard Shelton had spoken with Detective Cook, and was informed that Freedom Rider buses were scheduled to arrive at 11:00 am.
Earlier that day, the KKK intercepted another bus on its way to Birmingham, beating the passengers and setting the vehicle ablaze. As agreed during consultations with Klan leadership, when the buses arrived no police were present at either of Birmingham's bus terminals, but 60 Klansmen - including Rowe - were waiting. Klansmen attacked civil rights workers, reporters and photographers, viciously beating anyone within reach with chains, pipes and baseball bats.
According to ACLU attorney Howard Simon, "We found that the FBI knew that the Birmingham Police Department was infiltrated by the Klan, that many members of the police department were Klan members, that they knew a person in intelligence was passing information directly to leaders of the Klan, and they also knew their undercover agent had worked out an agreement with the police department to stay away from the terminals. They knew all that and still continued their relationship with the police department." 54
Though the Bureau claimed that its "Klan - White Hate Groups" COINTELPRO was launched in order to stifle white supremacist activities, the historical record proves otherwise. The more well known, but by no means only examples of Klan terror during the period - the 1963 bombing of the Sixteenth Street Baptist Church that killed four black children; the 1964 murders of civil rights workers Goodman, Chaney and Schwerner in Mississippi: and the 1965 assassination of Viola Liuzzo and her companion near Selma, Alabama, point to knowledge of the crimes, and complicity in subsequent cover-ups by FBI officials.
Bureau informant Gary Thomas Rowe was a central figure in some of the most publicized crimes of the period, indulging in freelance acts of racist terror. He was suspected of involvement in firebombing the home of a wealthy Black Birmingham resident, the detonation of shrapnel bombs in Black neighborhoods and the murder of a Black man during a 1963 demonstration. He became a prime suspect in the Birmingham church bombing after he failed two polygraph tests. His answers were described by investigators as "deceptive" when he denied having been with the Klan group that planted the bomb. 55
Despite enough evidence to open a preliminary investigation, the FBI refused, covering-up for Rowe even when another informant, John Wesley Hall, named him as a member of a three-man Klan security committee holding veto power over all proposed acts of violence. Years later, an independent inquiry uncovered evidence that Hall became a Bureau informant two months after the bombing and despite the fact that a polygraph test convinced the Alabama FBI that he was probably involved in the attack himself, Hall admitted to having moved dynamite for the plot's ringleader, Robert E. Chambliss, a Klan member since 1924. Even though court testimony and a wealth of evidence linked Hall, Rowe and other members of the Alabama Knight's to the bombing, the suspects were convicted on a misdemeanor charge - "possession of an explosive without a permit." It took more than a decade and three bungled investigations to finally convict Chambliss of the crime. 56
In July 1997, almost 35 years after the Sixteenth Street Baptist Church bombing, the FBI re-opened its investigation based on "new information." However, mainstream news accounts failed to report the pivotal role played by Bureau informants. The Rev. Fred Shuttlesworth, a target of a 1963 Klan assassination plot, believes he knows why only one man was convicted for the bombing. "It is well known," the 75-year old civil rights leader said, "there was collusion all along between the FBI, local law enforcement and the Klan." Rev. Shuttlesworth should know: Bureau informant John Wesley Hall was the man who proposed killing the minister. 57
New light was shed on Rowe's privileged position as an FBI provocateur tasked to "disrupt and neutralize" the civil rights struggle. During a subsequent investigation into the murder of Viola Liuzzo, evidence surfaced that it was Rowe who actually fired the fatal shots that took her life. But instead of prosecuting Rowe, the Bureau placed him in a federal witness protection program. 58
In 1978, Rowe was indicted by an Alabama grand jury as Liuzzo's killer. But complicity in shielding Rowe and the Bureau from exposure came to light when the contents of a J. Edgar Hoover memo to President Lyndon Johnson became public. Hours after the killings Hoover wrote: "A Negro man was with Mrs. Liuzzo and reportedly was sitting close to her." In a subsequent memo to aides, Hoover said he informed the President that "she was sitting very, very close to the Negro in the car, that it had the appearance of a necking party." 59 While providing a glimpse into the pathological nature of Hoover's racism and misogyny, the Director fails to enlighten us as to the mechanics of a "necking party" during a 100 mph car chase in the dead of night, a "party" by terrorized individuals fleeing armed Klan thugs intent on killing them in cold blood. However twisted, Hoover's slander was calculated to establish a motive; one that would "justify" Mrs. Liuzzo's murder on grounds of breaking one of nativism's primal laws: the prohibition against sex between the races.
On November 3, 1979, a posse organized by Klansmen and neo-Nazis murdered five members of the Communist Workers Party (CWP) in broad daylight. The CWP had organized a "Smash the Klan" demonstration in Greensboro, North Carolina among the city's mostly black and working class mill workers. CWP members included union organizers and activists who had upset "the fundamental order of things." 60
An essential component for the operation, organized by night-riding Klansmen, was U.S. Bureau of Alcohol, Tobacco, and Firearms (BATF) agent, Bernard Butkovich. The BATF agent, a Vietnam veteran and demolitions expert undercover in the local branch of the American Nazi Party, helped the Klan obtain automatic weapons, and also in making their escape. 61
The posse had been organized and led by an FBI infiltrator, Edward Dawson. Dawson was also a paid informant for the Greensboro Police Department. 62 Dawson reported to his handlers that eighty-five Klansmen meeting in nearby Lincolnton had expressed their intent to counter-demonstrate on November 3. 63
The night-riders had stated they intended to arm themselves for their counter-demonstration and that Klan leader, Grand Dragon Virgil Griffin, was actively calling out Klansmen from other states to participate. It was also rumored that neo-Nazis from the Winston-Salem area had obtained a machine gun and other weapons. Dawson reported to Greensboro detective Jerry Cooper that Klansmen and neo-Nazis were assembling at the home of a local Klan member and that they were armed. 64
The police/FBI informant had received a copy of the parade route the day before the CWP-initiated march; a map had been supplied by Detective Cooper. Dawson had driven over the parade route three hours earlier with a contingent of out-of-town Klansmen. Dawson also alerted Cooper that the Klansmen and neo- Nazis possessed three handguns and nine long-barrelled rifles, including automatic weapons supplied by BATF agent Bernard Butkovich. 65
Prior to the beginning of the CWP's march and demonstration, Cooper and other police officials drove by the house where the Klansmen and neo-Nazis were assembling. They jotted down license plate numbers and then declared a lunch break -- at approximately 10 a.m. 66 Less than an hour later, Cooper, trailing behind the Klan caravan reported, "shots fired" and then "heavy gunfire." The tactical squad assigned to monitor the march were still out to lunch. 67
Two other officers, responding to a domestic disturbance call, noted the absence of patrol cars usually assigned to the area. They arrived at the Morningside projects, the site of the CWP march. Officer Wise later reported having received a most unusual call from the police communications center. The officers were asked how long they anticipated being at their call; they were subsequently advised to "clear the area as soon as possible." 68
Moments later, five demonstrators lay dead, murdered in broad daylight by members of the Ku Klux Klan and the American Nazi Party. 69 According to Michael Novick, the Greensboro massacre "set the tone for neo-Nazi organizing by the KKK and other white supremacists in the ensuing decade." 70
A subsequent civi

  † In Memoriam † maandag 15 oktober 2001 @ 16:04:08 #111
13819 Loedertje
Trotse GILF.
pi_1907197
Cryptome
OCTOBER 2001

| + File at Cryptome.org | ^ File at Cartome.org | Echelon | NSA TEMPEST Series | USA v. Bin Laden | AEBPR | Search |

| Mirrors of Cryptome |


antrhax-biz.htm + Anthrax Business: Nass, Greene, Schneier October 15, 2001
patriot-usa.htm + House Approved PATRIOT/USA Anti-Terrorism Bills Ocotber 14, 2001
riaa-anongo.htm + RIAA Safeweb Proxy: Anongo.com October 13, 2001

za-masondo.txt + Secret Hearing on ZA/NDF General Masondo October 12, 2001
riaa-declan.htm + Tracking Declan's Hoax of the RIAA "Hoax" October 12, 2001
riaa-safeweb.htm + RIAA Safeweb Trace Route October 12, 2001
s1510-debate.txt + Senate Debate on Anti-Terrorism Bill October 11, 2001
secnews101001.htm + Bush Coup Secrecy News October 10, 2001

eo13228.txt + Exec Order on Homeland Security Office/Council October 10, 2001
nara101001.txt + National Industrial Information Security Meet October 10, 2001
dod101001.txt + DoD Secret Meet on Threat Reduction October 10, 2001
za-mthembu.txt + Secret Hearing on ZA/NIA's Gabriel Mthembu October 10, 2001
faa100901.txt + FAA Rule on Cockpit Door Security October 10, 2001

hr3026ih.txt + Homeland Security Agency Bill October 10, 2001
hr3016ih.txt + Chem Bio Anti-Terrorism Bill October 10, 2001
fbi100901.txt + FBI Security Program Secret Meet October 10, 2001
dsb100901.txt + Defense Science Board Secret meet October 10, 2001
riaa-secret.htm + RIAA Secret Meeting October 10, 2001

brain-scan.htm + Debate: Can Brain Scans Defeat Terrorism? October 8, 2001
al-stego-rot.htm + Ross Anderson Rebuts Al-Qaida Stego Rot October 8, 2001
ccia-gregg.htm + CCIA Letter to Sen. Gregg on Encryption Policy Ocotber 5, 2001
uk-bin-laden.htm + UK Foreign Office Evidence Against Bin Laden October 5, 2001
s1510is.txt + Senate Anti-Terrorism Bill - USA Act of 2001 October 5, 2001

fbi100501.txt + FBI CALEA Cost Recovery Regulations October 5, 2001
fcc100501.txt + FCC CALEA Compliance Extension Date October 5, 2001
dos100501.txt + State Dept List of Terrorist Organizations October 5, 2001
za-sap.htm + Secret South African Hearing on Security Police October 4, 2001
juster100401.htm + Commerce Dept on Multilateral Export Regimes October 4, 2001

patriot2.htm + Status of Anti-terrorism Bills October 4, 2001
hr2975ih.txt + House Introduced Version of PATRIOT Act 2001 October 4, 2001
wtc-photos.htm + WTC Photographs 3 October 2001 October 4, 2001
patriot.htm + PATRIOT Act of 2001 - Antiterrorism Bill October 2, 2001
torr092601.txt + Sen. Torricelli on Civil Liberties Peace October 1, 2001

hr2896ih.txt + Paul's War Sires Ashcroft's War October 1, 2001
bush-smoke.txt + Bush Stokes War Economy October 1, 2001
dot100101.txt + Airport/Aircraft War Secret Meet October 1, 2001
mms100101.txt + Minerals Energy War Meet October 1, 2001
bxa100101.txt + War Sanctions Lifted on India and Pakistan October 1, 2001


O f f s i t e

RI DIRTy RIAA Wants to DIRTy Your PC /RF October 15, 2001
FBI Tool FBI: Carnivore Diagnostic Tool October 13, 2001
HomeSec GAO on Homeland Security: Risk Management October 12, 2001
OBL Osama Bin Laden MP3 Song Collection /M October 10, 2001

Choke GAO Testimony on Food Safety and Security October 10, 2001
Radiant Radiant Games infowar/intelligence/espionage /AC October 10, 2001
FBI KLS Scarfo Case FBI Key Logger System Affidavit /DS October 10, 2001
HoC House of Commons on Al Qaeda Evidence /OB October 4, 2001
CG SI Crypto-Gram Special Issue October 1, 2001


--------------------------------------------------------------------------------

"Bottom Line for Anthrax Protection:

1. Environmental sampling needs to be made more accurate, using known techniques, and more widespread. Forensic testing of samples needs to be decentralized, so it can be done in a timely manner, and so the federal authorities are not overwhelmed. The federal government should pay the salaries of additional technicians in every state and possibly in large hospitals, who would be trained as forensic experts, and provide the materials and methodologies used by our federal experts at Fort Detrick, CDC and the FBI, among others.

2. Methods which go from most highly sensitive to most highly specific need to be used, in the proper order, so potential anthrax cases can be identified and treated in a timely manner. This means that existing tests that take hours, not days, need to be the primary ones used.

3. All questionable materials must be tested using sensitive techniques. We do not yet know how to select those which can be ignored.

4. The public needs to be reassured that in fact, the government will address these incidents promptly and effectively, so that the public is not responsible for its own antibiotics and treatment strategies.

5. Biosensors in development need to be assessed now, and the best ones need to be put into mass production.

6. Pharmaceutical companies should increase production of a variety of antibiotics, and government stockpiles of these materials should increase.

7. Novel approaches to treatment should be investigated and prepared or obtained in advance. This might include antiserum, monoclonal antibodies, and other materials currently being developed. The utility of bronchoalveolar lavage in monkeys should be investigated. The sensitivity of nasal swab testing, sputum, urine and blood antigen tests, stains and cultures should be assessed in animal models immediately.

8. Information on safe methods for inactivating spores found in or on contaminated clothes, surfaces and other environmental materials should be provided to the public immediately.

9. Information on cheap masks, like those worn by lab techs working under hoods, that have high efficacy for anthrax, should be provided to the public. Production should be increased."

-- Meryl Nass, MD, Anthrax Business, October 15, 2001


--------------------------------------------------------------------------------

"I hope I'm wrong, but the recent spate of anthrax mail strikes me as a red herring intended to preoccupy us while a more dangerous attack is carried out.

The chance of anthrax being used for mass infection is negligible. But it does command extraordinary press and popular attention because Americans are inclined toward hypochondria. People who agonize about carpal tunnel syndrome, and who buckle to pharmaceutical company come-ons urging them to perceive shyness as 'social anxiety disorder' for which they should seek 'treatment', and who shovel Ritalin down their children's throats because they act like children, are an easy mark for distraction by a fatal bacterium which can arrive in their letter boxes."

-- Thomas Greene, Anthrax Biz: A Red Herring?, October 14, 2001


--------------------------------------------------------------------------------

"I am writing this after the fourth case of anthrax has been diagnosed in the United States. At this point, we don't know if this is 1) an extremely bizarre coincidence, 2) a terrorist attack gone bad, or 3) field tests for a terrorist attack to come. I am hoping for the first, and am worried about the third.

A few minutes of speculation should be enough to convince anyone that we cannot make the United States, let alone the world, safe from terrorism. It doesn't matter what draconian counterterrorism legislation we enact, or how many civil liberties we sacrifice. We cannot stop terrorism within a country. We cannot block it at the borders. We have always been at risk, and we always will be."

-- Bruce Schneier, Anthrax Biz: Fear is Good, October 14, 2001


--------------------------------------------------------------------------------

Date: Mon, 15 Oct 2001 01:25:32 -0700
Subject: Secret RIAA Meeting
From: N
To: jya@pipeline.com

I can say without a doubt that this meeting was a hoax, as Strauss Zelnick not only resigned from his post from BMG, but absolutely hates the company at this point. He was pretty pissed after Middlehoff made the Napster deal, and would like nothing better than to see BMG go down in flames after he quit managing it. (To show that they are nothing without him). The guy has an ego the size of Alaska, and would *never* be at a meeting as their representative.

Better to just admit that this meeting was false than to lose credibility and give those music industry wankers a good laugh. Oh yeah, this was anonymous and you never got this email. :-)

---

Yes, Cryptome was told about Strauss Zelnick a couple of hours after posting the allegations. As with other quick second-hand denials about the meeting, which is the obligatory response to embarrassing revelations, as is denying overly much, then panicking when the denials are not believed, which is ususally when unintended revelations are exposed.

Now the task is to try to determine who made the allegations, whether as a truth-telling leak or a deliberate ploy to give RIAA some room for future abuses, as is now a possibility in either case should the leak be proven to be a hoax -- which has not yet been done. So far there has been only spin for the hoax theory propounded by those with little information of what was in the messages of allegations not yet published. What is needed is more evidence for a hoax than has so far come to light, at least to Cryptome, with only four individuals claiming the meeting is a hoax, or as with Declan, "to have satisfied themselves" it was. Lying is institutionalized in large organizations, and hiring fast-draw liars for spinning and inducing others to spin is a highly profitable business. Strauss Zelnick can speak for himself, as can the others ostensibly maligned by the allegations, and, as far as I know, none of them have done so publicly.

This is the reason for pursuing a "leak" or a "hoax" whichever it was, or maybe something not yet identified. The powerful spin against the allegations is itself most interesting and is worth pursuing as well. Since you seem to know Zelnick personally see if you can persuade him to make a public statement, or if he prefers anonymity have him send it to Cryptome through you. :-)

All sources for all pursuits remain anonymous except those who beg for exposure like the meeting alleger, Declan, RIAA, the meeting attendees and a host of others who are waffling depending on how the story goes. At the moment Cryptome has received more support for the allegations than against them, even more support for pursuing deceptions used to cloak hoaxes and spin, and most of that has come after the spin machine aroused interest by allegations of hoax.

Cryptome is open-minded on the outcome, but no way will the pursuit and expose of hoaxers and spinners be abandoned, for that is a principal purpose of Cryptome, to show how intitutionalized deception is done and how to combat it. Doubting reputation is a good thing, for it requires working to maintain trust, rather than taking it for granted that spin will satisfy.

--------------------------------------------------------------------------------

October 14, 2001

Thanks for much help in tracing the Safeweb/Hotmail thing.

With some covert tools provided by people who we never want to cross online, we're proceeding in a special ops mode, deploying dirty trick tracking devices to find, corner and cut off the head of our source, or if source is proven a noble leaker to hide identity as an unannounced success, a DC Bush couper cum Declan woolpuller.

-- Cryptome

--------------------------------------------------------------------------------

Safeweb's proxy server Anongo.com is, in part, a Department of Defense domain:

Trace route and DNS by Cryptome.

The DoD domain could be a cover for the Central Intelligence Agency, an acknowledged Safeweb supporter.

==================================================
=== VisualRoute report on 13-Oct-01 9:39:35 AM ===
==================================================

Real-time report for anongo.com [215.104.228.144] (80% done)

Analysis: IP packets are being lost past network "Qwest Communications" at hop 13. There is insufficient cached information to determine the next network at hop 14.

-------------------------------------------------------------------------------------------------------------------------------------------------------
| Hop | %Loss | IP Address | Node Name | Location | Tzone | ms | Graph | Network |
-------------------------------------------------------------------------------------------------------------------------------------------------------
| 1 | | 206.115.154.10 | tnt10.nyc3.da.uu.net | New York, NY, USA | -05:00 | 164 | --x-- | UUNET Dial-Up Networks |
| 2 | | 206.115.245.2 | - | ?Fairfax, VA 22031 | | 152 | -x-- | UUNET Dial Access Network |
| 3 | | 152.63.23.190 | 230.at-2-1-0.HR2.NYC9.ALTER.NET | New York, NY, USA | -05:00 | 156 | -x-- | UUNET Technologies, Inc. |
| 4 | | 152.63.15.198 | 0.so-2-3-0.XL2.NYC9.ALTER.NET | New York, NY, USA | -05:00 | 168 | --x-- | UUNET Technologies, Inc. |
| 5 | | 152.63.23.142 | 0.so-7-0-0.XR2.NYC9.ALTER.NET | New York, NY, USA | -05:00 | 173 | --x---- | UUNET Technologies, Inc. |

| 6 | | 152.63.18.205 | 280.at-1-0-0.XR2.NYC8.ALTER.NET | New York, NY, USA | -05:00 | 159 | -x-- | UUNET Technologies, Inc. |
| 7 | | 152.63.23.173 | 182.ATM6-0.BR1.NYC8.ALTER.NET | New York, NY, USA | -05:00 | 128 | x----- | UUNET Technologies, Inc. |
| 8 | | 205.171.4.9 | jfk-brdr-02.inet.qwest.net | New York, NY, USA | -05:00 | 129 | x---- | Colorado Supernet, Inc. |
| 9 | | 205.171.230.26 | jfk-core-03.inet.qwest.net | New York, NY, USA | -05:00 | 125 | x-- | Colorado Supernet, Inc. |
| 10 | | 205.171.230.5 | jfk-core-01.inet.qwest.net | New York, NY, USA | -05:00 | 123 | x-- | Colorado Supernet, Inc. |
| 11 | | 205.171.5.236 | wdc-core-01.inet.qwest.net | Washington, DC, USA | -05:00 | 129 | x-- | Colorado Supernet, Inc. |
| 12 | | 205.171.24.82 | wdc-edge-05.inet.qwest.net | Washington, DC, USA | -05:00 | 127 | x-- | Colorado Supernet, Inc. |
| 13 | | 63.148.66.222 | - | ?Arlington, VA 22203 | | 133 | -x--- | Qwest Communications |
| ... | | | | | | | | |
| ? | | 215.104.228.144 | anongo.com | ?Vienna, VA 22183 | | | | DoD Network Information Center |
-------------------------------------------------------------------------------------------------------------------------------------------------------
Roundtrip time to 63.148.66.222, average = 133ms, min = 112ms, max = 234ms -- 13-Oct-01 9:39:35 AM

--------------

Look-up 215.104.228.144:

DoD Network Information Center (NETBLK-DDN-NIC16)
7990 Boeing Court M/S CV-50
Vienna, VA 22183
US

Netname: DDN-NIC16
Netblock: 215.0.0.0 - 215.255.255.255
Maintainer: DNIC

Coordinator:
DoD, Network (MIL-HSTMST-ARIN) HOSTMASTER@NIC.MIL
(703) 676-1051 (800) 365-3642 (FAX) (703) 676-1749

Domain System inverse mapping provided by:

AAA-VIENNA.NIPR.MIL 207.132.116.60
AAA-KELLY.NIPR.MIL 199.252.162.251
AAA-WHEELER.NIPR.MIL 199.252.180.251
AAA-VAIHINGEN.NIPR.MIL 199.252.154.251

Record last updated on 09-Jun-1998.
Database last updated on 12-Oct-2001 23:25:26 EDT.

--------------------------------------------------------------------------------

"The last one in the list is the flavour of proxy Safeweb uses:

Squid/2.3.stable3

And the DNS name of the source box for the HTTP request is anongo.com, which I don't believe showed up in your trace logs. [See http://cryptome.org/riaa-safeweb.htm]

Basically a caching proxy server's header set.

The authoritative name servers for anongo.com are

ns3.above.net

www.anongo.com redirects to Safeweb. The boxes are standard UNIX/Apache with SSL. They have written scripts to replace the originating address header and keep track of the connection, receive requested files to their cache, and then serve from that cache to your browser.

The Safeweb machines would absolutely be configured to do sophisticated logging; there is no free lunch on the Net. While they appear to do a nice job, their server logs would be a goldmine. Everyone who uses a commercial web browser agrees to have their information gathered the first time they use the Safeweb browser - do you want to continue? When you say yes, you mean it!"

-- SC, RIAA Safeweb Anonymizing Proxy: Anongo.com, October 13, 2001
Comments welcome, especially on the collection of user data by Safeweb and by other anonymizers; send to: jya@pipeline.com

--------------------------------------------------------------------------------

"A good risk management approach includes three primary elements: a threat assessment, a vulnerability assessment, and a criticality assessment. Threat assessments are important decision support tools that can assist organizations in security-program planning and key efforts. A threat assessment identifies and evaluates threats based on various factors, including capability and intentions as well as the potential lethality of an attack. Over the past several years, we have recommended that a comprehensive, national threat assessment be conducted by the appropriate federal agencies. Nonetheless, we will never know whether we have identified every threat, nor will we have complete information about the threats that we have identified. Consequently, we believe that the two other elements of the approach, vulnerability assessments and criticality assessments, are essential and required to prepare better against terrorist attacks. A vulnerability assessment is a process that identifies weaknesses that may be exploited by terrorists and suggests options to eliminate or mitigate those weaknesses. A criticality assessment is a process designed to systematically identify and evaluate an organization&#8217;s assets based on the importance of its mission or function, the group of people at risk, or the significance of a structure. Criticality assessments are important because they provide a basis for prioritizing which assets and structures require higher or special protection from an attack. The approach that we have described could help prepare us against the threat we face and permit better direction of our resources to areas of highest priority."

-- Raymond Decker, GAO Report on Homeland Security: Key Elements of a Risk Management Approach, October 12, 2001 (offsite)


--------------------------------------------------------------------------------

Date: Fri, 12 Oct 2001 11:38:43 -0400
To: cypherpunks@lne.com, fight-censorship@vorlon.mit.edu
From: Declan McCullagh <declan@well.com>
Subject: House update on anti-terror bills: Look out

From a House staffer:

>Friends, less than 20 minutes ago the House leadership announced we would
>be considering the Senate bill which has none of the privacy protections
>that Bob Barr and others worked to put in the House bill and contains
>language attacking financial privacy and even allowing the government
>expanded access to educational records. Votes on the rule are expected
>soon and killing the rule is the best way to kill this bill.

--------------------------------------------------------------------------------

[Congressional Record: October 11, 2001 (Digest)]

Thursday, October 11, 2001

Daily Digest

HIGHLIGHTS

Senate passed Anti-Terrorism Act.

Anti-Terrorism Act: By 96 yeas to 1 nay (Vote No. 302), Senate passed
S. 1510, to deter and punish terrorist acts in the United States and
around the world, to enhance law enforcement investigatory tools, after
taking action on the following amendments proposed thereto:

Rejected:
Feingold Amendment No. 1899, to make amendments to the provision
relating to interception of computer trespasser communications. (By 83
yeas to 13 nays (Vote No. 299), Senate tabled the amendment.)
Feingold Amendment No. 1900, to limit the roving wiretap authority
under FISA. (By 90 yeas to 7 nays (Vote No. 300), Senate tabled the
amendment.)
Feingold Amendment No. 1901, to modify the provisions relating to
access to business records under the Foreign Intelligence Surveillance
Act of 1978. (By 89 yeas to 8 nays (Vote No. 301), Senate tabled the
amendment.)

"Tabled" means the amendment is dead. R.I.P. Too bad this Bush-coup skyfalling bill wasn't tabled.

--------------------------------------------------------------------------------

October 12, 2001

Based some three dozen pings of Safeweb IP address 64.124.150.130 (- .144) from locations in the US and overseas, all pings conclude with variations on these 5 or 6 hops:

lga1-lhr3-stm64.lga1.above.net (64.125.31.182) (New York, NY)
core2-lga1-oc192.lga2.above.net (208.184.232.198) (New York, NY)
main1colo45-core2-oc48.lga2.above.net (216.200.127.174) (New York, NY)

About half the pings timed out before the last hop (or variation of):

208.184.48.173.safeweb.com (San Jose, CA)

A few hit a "private" address after 208.184.48.173:

10.100.0.2 (no location)

before ending at:

64.124.150.130.safeweb.com (San Jose, CA)

(The station locations were provided by trace route program VisualRoute.)

Interpretation of the pings is needed for:

1. How much about the Safeweb stations is true and how much cloaking.
2. Why some pings timed out and others didn't.

3. Phantom station 10.100.0.2

4. Whether the San Jose hops actually go to San Jose or are spoofed.

5. Why go to New York then hop across the continent unless the last hops are just administrative not physical.

6. How is cloaking done on addresses and physical locations.

Is cloaking done by a Safeweb program, say by address spoofer or by phantom proxies, or is there a way to do this by special agreement with Network Central (whatever that is), say, as Intel Web and other classified systems do for cover use of the Web.

Recall that Safeweb was selected for financial support by the CIA so intel officers could use it to cloak their Net use. And other programs such as Onion make use of sub-Net features not easily available to the surface user.

-- Cryptome, RIAA Safeweb Trace Route, October 12, 2001


--------------------------------------------------------------------------------

11 October 2001

From 14 users of Safeweb scattered around the US and several overseas, the same range of IP addresses were used to log onto Cryptome. Which makes sense if all users logged into the same Safeweb home page and from there logged onto Cryptome. A few users logged in from their own addresses just before or after using Safeweb for comparison.

No triangulation with that method.

One thing our expert found by pinging Safeweb is that a few of the last hops leading up to Safeweb appear to be in the NYC area:

13 lga1-ord2-oc48-2.lga1.above.net (208.185.156.158) 112.562 ms 111.984 ms 112.53 ms
14 core2-lga1-oc192.lga2.above.net (208.184.232.198) 114.423 ms 113.431 ms 112.688 ms
15 main1colo45-core2-oc48.lga2.above.net (216.200.127.174) 113.138 ms 113.855 ms 111.581 ms
16 208.184.48.189.safeweb.com (208.184.48.189) 113.78 ms 115.876 ms 113.534 ms
17 64.124.150.130.safeweb.com (64.124.150.130) 112.797 ms 112.937 ms 112.228 ms

This is on the assumption that "lga2" refers to "La Guardia," but that is not certain for the tag may have nothing to do with physical location. However other above.net hops used airport tags.

If you would like to ping Safeweb from your location we would appreciate getting the logs for comparison. Just be alert to this being a scam to snarf your true identity, so leave off the first hop if you like, or just send in the last four or five hops leading up to Safeweb.

The IP addresses of 64.124.150.130 et seq. is what we are tracking, but note the other Safeweb address in the ping log. So we would like to get any fresh safeweb addresses in ping logs beyond this range (and altogether different domains):

64.124.150.130 - 64.124.150.144

Send logs to: jya@pipeline.com

Thanks.

--------------------------------------------------------------------------------

October 11, 2001

Thanks to help from an expert Cryptome has developed a likely source for the RIAA meeting messages, and at the moment it appears likely Safeweb.com was used to send the messages as well as to check on this file.

Safeweb appears to dynamically assign addresses to users, though within a limited range which might be set by the location of the user, but we are not sure of that. Indeed, if Safeweb does not cloak location by avoiding a predictable range that would be a serious weakness. But we need to test that.

Safeweb is hosted, at least in part, by the giant ISP Abovenet, home-based in San Jose, CA, with facilities all around the US and overseas. To help us triangulate a likely location from which the messages were sent, we need to log Safeweb accesses to Cryptome from a variety of US and overseas locations.

For example Cryptome gets the same range of addresses as those of the RIAA messages and file accesses by logging in from New York City to Safeweb.com then using Safeweb's browser to request a Cryptome file. What we don't know is whether those same addresses would be used from other physical locations around the world.

For anybody who wants to risk giving away their own location we ask that accesses be made from the Safeweb.com from any location in the world to request a fictitious file on Cryptome:

http://cryptome.org/this-is-safeweb-xxxxxxxx.htm
Replace xxxxxxx with a clue to your location, say, texas, germany, whereever I could identify.

The request will generate an error code and an originating address from Safeweb which we can use to compare to what we've got for the RIAA messages and for NYC. Presumably Safeweb will cloak your actual IP address.

Let us emphasize that we do not yet believe the source was perpetrating a hoax, or if so whether the hoax was run to benefit RIAA which is the current outcome. Our intention is not to expose the source if the leak is legitimate, but we damn well want to broadcast it if RIAA, its friends or a TLA cooked up the ruse.

Declan McCullagh has jumped the gun on assigning blame to The Register, apparently doing little more checking on the source of the alleged hoax than The Register did to check the original leak. But hell that's snotty Net journalism competition at its best: fire, aim, oh, the safety was off.

-- Cryptome

--------------------------------------------------------------------------------

10 October 2001: Cryptome writes to the source of the RIAA meeting allegation:

Response to your message last evening:
The Register has today recanted its story about the RIAA meeting.

How do you want to handle this now? Ready to be named, your full messages published on Cryptome, or do you want to provide substantiation for your messages and keep your identity concealed? Or perhaps another thoughtful approach to loft this story to a higher level. Interest will be high for a few more hours -- or many days if you come through with authentic evidence. Want to talk on the phone, be on TV with a mask, then fax us your meeting notes for one of the prime participants, provide proof of employment with a media corporation. All as easily done as this message.

John

Tel: 212-873-8700
Fax: 212-787-6102

10 October 2001. Tony Smith with The Register claims his October 8 story about a secret RIAA meeting was in error:

http://www.theregister.co.uk/content/31/22138.html
10 October 2001: The source of this message on the RIAA secret meeting has provided Cryptome additional information which gives credence to the message: specific role in the meeting; reaction by attendees to reports of the meeting; investigations into who leaked information about the meeting; why there are denials the meeting took place; and measures used beforehand and aftewards to conceal attendance at the meeting.

"On Thursday [October 4] there was a closed-door RIAA meeting at the Ritz-Carlton, which was 'a direction setting' meeting. The individuals of note attending were:

Hillary Rosen - RIAA Chief
Steve Heckler - Sony Music
Strauss Zelnick - BMG
Edgar Bronfman - Universal
Gerald Levin - AOL Time-Warner
Ken Berry - EMI
Leonardo Chiariaglione - SDMI Chair (Leaving Soon)
Francis Jones - Codex Data Systems
Fritz Hollings - Senator
Ted Stevens - Senator
Michael Eisner - Disney CEO
Jack Valenti - President, MPAA
Andy Grove - Intel CEO
Lou Gerstner - IBM
Yoishi Morishita - CEO Matsushita
Tsutomo Kawata - CEO Toshiba
Jay Berman - IFPI Chair
Paul England - Microsoft Advanced Cryptography research group
One particularly disturbing fact is that Codex Data System's DIRT software is supposed to be restricted to law enforcement agencies, yet the RIAA, MPAA, and IFPI have all purchased it, and use it routinely to monitor servers which are suspected of infringing content, yet are password protected such as servers which require one to sign up for a password account like hotline servers that have no guest download."

-- RIAA Secret Meeting, October 8, 2001


--------------------------------------------------------------------------------

7 October 2001

> You are saying that 4 martyrs in strategically selected corner
> offices on the top floor could bring the building down ?

> Come to think of it, no martyrs needed, just fedex packages addressed
> to appropriate offices.

> It's a fragile world.

It would not take a lot of explosives to breakaway an entire floor constructed with steel joists like WTC; it is often done in planned demolitions with a small charge placed at each joist support -- customarily a shelf angle either continuous or segmented.

What would do it though without explosives is the twisting torque and vertical flexing in the tower tubes caused by an aircraft hitting off center of the tower's axis at 300 mph.

Survivors tell of the tower swaying several feet, but they are not likely to have perceived the torque as such. The hit on the South Tower (the second hit) was more off center than that on the North Tower.

Tall buildings are designed with some torque resistance against turbulent weather and earthquake but probably not for torque coupled with high impact.

The WTC towers were made of two tubes, the exterior wall system (the more flexible) and the interior core (the more rigid), the two tubes connected by light-weight floor structures and at about 1/3 intervals, heavy-weight transfer and mechanical equipment floors.

From examining the wreckage the steel floor joists rested on shelf angles welded to vertical supports. These angles are designed to support vertical loads not much twisting.

The joists could have lost their support by tower twisting of no more than a few inches, the shelf angle welding beads popping, or the joists slipping off the angles that did not break loose (as photos show many did not).

If the floor slab concrete was not reinforced it would have crumbled easily under torque. Again, most building structure is designed to resist vertical loading not substantial twisting. (Structural connections are designed to resist relatively minor twisting caused by static and dynamic loading.)

There is a valid question of why the buildings did not collapse immediately if floor structures were damaged and serial pancaking set in motion. The raging fires surely contributed to further weakening of the building structure, but probably due to adverse effect on floor structures and in particular on the light-weight shelf-angle welded connections between the floor system and the heavy-weight vertical supports.

It is at these connections that demolition designers place light-weight charges, as well as heavy-weight cutting charges on vertical supports.

For comparison, a WTC shelf angle may be 1/2 to 3/4 inches thick welded with a bead about the same while a vertical columnon WTC could average 2-3 inches thick, increasing in thickness from top to bottom.

The WTC designers claim the buildings were capable of withstanding a 727 hit, asserted at original building and after the 1993 bombing. But until the design criteria for that protection have been published it cannot be determined what crash scenario was used for design. -- John Young

--------------------------------------------------------------------------------

6 October 2001

What is odd about the WTC debris is how few larger fragments of concrete it contains. Reports on the structure say reinforced concrete was used for floor slabs and customarily in demolition such material breaks apart in relatively large chunks, the broken concrete remaining attached by steel reinforcing bars or wire mesh.

However, there is a structural design where plain concrete is placed on metal floor decking with little or no reinforcing. Also, lightweight concrete, whose course aggregate is cinder rather than stone, is often used to limit the weight of the structure, especially in high-rise buildings. This lightweight material does not usually have the strength of regular concrete and strength is provided by metal decking below it. The large amount of dust produced by the towers' collapse and the relative lack of larger concrete shards raise the possibility that the building disintegrated at least in part due to lesser strength of the type of concrete used in the floors. That remains to be examined.

Observation of the towers' remains show that while main steel vertical structural members of the exterior wall and central core withstood the collapse, the horizontal floor-supporting trusses broke away from these vertical supports at the points of attachment (probably made by welding). One view of the North Tower (1 WTC) shows the exterior and core remnants and the ruptured points of floor structure attachment.

Photo: http://cryptome.org/wtc/wtc044.jpg
What this suggests is the possibility that the structure of each floor collapsed due to load of collapsing floors above them, and that only afterwards did the vertical supports at the exterior and core collapse. Review of video of the collapse appears to confirm this sequence as well as the consequent supposition that the floor structure was the weakest part of the buildings -- which would not be uncommon for floor structure supports only a single floor while the vertical members support all floors above them. However, a slow motion examination of visual recording would be needed to confirm exactly what collapsed first.

There has been speculation about the initial step in the collapse of the buildings, most commonly attributed to the intense heat of burning jet fuel softening structural steel, usually the steel of the core. However, it is possible that collapse of the core steel was not the initial phase, but instead it was the floor structure breaking away from vertical supports. The collapse in this scenario would be that of floors dropping one after the other onto floors below, the load of the upper floors overwhelming the relatively weak attachments of floors to vertical supports -- the attachments customarily being designed to support only a single floor load.

For example, a single floor dropping onto the one below could have ruptured the next lower attachment, thus setting off a disastrous sequence. This could have occurred without fire initially weakening the vertical steel structure as has been speculated. The impact of the crash, and/or subsequent swaying of the buildings, could have ruptured floor structure attachments, and only one floor breaking away would have been enough to precipitate the collapse.

Alternatively, the fuel fire, and flaming building contents, could have weakened floor structure and/or its attachment to vertical supports, in particular if the crash destroyed fire-protection materials of the floor structure. Thus, with heat weakening floor structure along with the attachments being ruptured by the crash, the collapse sequence commenced.

One significance of these speculations is that weakening of the core steel by intense heat may not have been the initial cause of collapse. A New York Times report of October 6 describes an investigative engineer "finding what appears to be a few pieces of the south tower that were directly hit by the Boeing 767 jetliner, and the discovery poses a few new puzzles. While the impact sliced through half the column, the column did not buckle; each column is designed to support the weight even if half is missing. The column also exhbits no outward signs of smoke or heat damage."

Another signficance is that more steel reinforcing in the concrete could have increased the strength of the floor structure and better withstood the initial step in the floor-by-floor collapse sequence. And, the immediate and long-term adverse affects of the huge dust clouds of the collapse might have been lessened. It is likely that some victims were suffocated by these clouds.

-- John Young, Cryptome

Comments welcome: jya@pipeline.com

--------------------------------------------------------------------------------

Date: Fri, 5 Oct 2001 16:47:32 -0400 (EDT)
From: DCI/CIA Web Site Update <updates@ucia.gov>

October 5 - Statement by CIA Spokesman Bill Harlow regarding recent reports on the CIA's relationship with Usama Bin Laden.

http://www.cia.gov/cia/public_affairs/press_release/pr10052001.html
October 5 - Posted The War on Terrorism web pages.

http://www.cia.gov/terrorism/index.html


--------------------------------------------------------------------------------

"If this Congress surrenders civil liberties and rearranges constitutional rights to deal with these terrorists, then their greatest victory will not have been won in New York but in Washington. Any administration can defeat terrorism by surrendering civil liberties and changing the Constitution. Our goal is to defeat terrorism, remain who we are, and retain the best about ourselves while defeating terrorism. It is more difficult, but it is what history requires us to do. The history of our Nation is replete with contrary examples, and we need to learn by them. They are instructive. For even the greats of American political life have given in to the temptation of our worst instincts to defeat our worst enemies and lose the best about ourselves.

Indeed, the very architect of our independence, John Adams, under the threat of British and French subversion, supported the Alien and Sedition Acts, compromising the very freedom of expression he had helped to bring to the American people only a decade before. He lived with the blemish of those acts on his public life until the day he died. Abraham Lincoln, the Great Emancipator, the savior of our Union suspended the Constitution, its right of habeas corpus, imprisoning political opponents to save the Union. Franklin Delano Roosevelt, who had the honor of saving the Nation not once but through the Great Depression and the Second World War, imprisoned Japanese Americans and some German and Italian Americans in a hasty effort at national security which has lived as a national shame. If these great men, pillars of our democracy, compromised better judgment in time of national crisis, it should temper our instincts. Their actions should speak volumes about the need for caution at a time of national challenge.

There is another side. There are better instincts among us. The American people are speaking of them all across the Nation. They recognize the need to balance security and civil liberties, to change that which is required to assure victory, but recognizing that victory is measured not only by security but also by our liberties. Across the Nation, the American people have provided us many measures of their strength as they exercise those liberties, engaging in open debate about how the Nation responds, giving unprecedented levels of donations--$200 million to the Red Cross alone. They reached out across races and religions to express concern about each other and for the safety of Arab Americans and Muslim Americans. They are reminders of how much the Nation has grown from previous successes.

I rise in recognition of these national strengths and these concerns and commend in particular Senator Leahy who has extended, on behalf of the Senate, our desire to work with the administration to enhance the powers of law enforcement and to provide the necessary resources. But I think he speaks for many Members of the Senate--he certainly speaks for me--when he also asks that we act deliberately and prudently. I ask we expand that debate because history will require, and I believe the American people will demand, that we not merely review what new powers must be given to law enforcement and the intelligence community, we must not simply debate what new resources financially are required, but there is some need for some accounting of those previous powers and resources."

-- Senator Robert Torricelli, Congressional Remarks, September 26, 2001


--------------------------------------------------------------------------------

Blocks of massive downloads are being reinstituted; innocents affected complain to jya.
______________________________

Thanks to A for mirror:

http://www.lessgov.org/cryptome
Thanks to SC for crypto software:

http://cnsint01.senecac.on.ca:8140/
Thanks to AJ for mirrors:

http://cryptome.sabotage.org
ftp://ftp.zedz.net/pub/varia/Cryptome/cryptome.org/

the whole shebang is available at:
ftp://ftp.zedz.net/pub/varia/Cryptome/
Thanks to mb for mirror:

http://while1.org/~xm/cryptome.tgz
Thanks to VP for mirror:

http://munitions.vipul.net/documents/cryptome/
Thanks to GB:

People who want/need a copy of Cryptome as of Sep 16 2001 can get a copy at
http://www.parrhesia.com/cryptome.tgz (248 Mb!)
or bit-by-bit at

http://www.parrhesia.com/cryptome/
For people who can do FTP, which usually transfers faster than HTTP, it's also at

ftp://bivens.parrhesia.com/cryptome.tgz
Quintessenz mirror located in Vienna, Austria:

http://cryptome.lo-res.org/

______________________________

Note: Cryptome is nearly shutdown by excessive downloading of the full archive. Most of Cryptome is non-essential stuff and doesn't deserve archiving elsewhere or mirroring. The crypto programs listed at http://jya.com/crypto-free.htm are much more important and should be widely mirrored.

We will distribute a few compressed copies of Cryptome for hosting elsewhere and those URLs will be publicized when ready.

We would appreciate limiting downloads to recent material and not the whole wad; our modest server cannot handle the overload. Otherwise to avoid unintentional shutdown we will have to reinstitute blocks recently lifted.

______________________________

Cryptome and a host of other crypto resources are likely to be shutdown if the war panic continues. What methods could be used to assure continued access to crypto for homeland and self-defense by citizens of all nations against communication transgressors?

A while back a list of global sites for accessing crypto and privacy tools was set up:

http://jya.com/crypto-free.htm
This list of crypto sources, and additions to it, should be mirrored and the mirrors widely publicized to aid citizen access to tools for personal and homeland protection worldwide from those urging war and terrorism at home and around the globe.

To supplement that, Cryptome would appreciate hearing by encrypted mail (anonymous remail too) what others have done or could do to stockpile and distribute self-dense tools. We've sent out a few hundred CDs of the Cryptome collection, and are considering offering here a ~100MB compressed package of the ~8000 files. If so, we would first make more of the packages available to other global sites to offset our bandwidth limitations.

There are only a few crypto programs in the files, mostly PGP since 2.62. We might grab more for inclusion unless others are doing that. To comply with law we'd have to notify BXA of any new program offerings.

Responses welcome: jya

Pipeline.com is owned by Earthlink, one of the ISPs reportedly now intercepted by Carnivore; Verio, host of this site, may be as well, your hosts too.

John Young PK below.


Advanced eBook Processor (AEBPR)

"Colleen Pouliot, Senior Vice President and General Counsel for Adobe, said, 'ElcomSoft's Advanced eBook Processor software is no longer available in the United States.' "

-- Adobe, EFF Call for Release of Dmitry Sklyarov, July 23, 2001
For background information and to download a trial version of the Adobe eBook-cracking program, AEBPR, see the ElcomSoft site: http://www.elcomsoft.com

Cryptome mirror of the AEBPR trial version: http://cryptome.org/aebpr/aebpr22.zip (746KB)

For cryptographic scientific research allowed under the DMCA here is a key from Anonymous to boost the trial version -- which decrypts 25% of an eBook -- to its 100% capability (though not verified):

LEPR-T2K7-NA8Z-3DUE-EVDQS-TMPV-MBAUB
Thanks to ET:

"To verify the unlock key for Dimitry Sklyarov's AEBPR application create the following STRING VALUE in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Elcom\Advanced eBook Processor\Registration\Code

and assign it the value of the registration key provided on your site:

LEPR-T2K7-NA8Z-3DUE-EVDQS-TMPV-MBAUB

Start the AEPBR application and you will be all set."

Dmitry needs funds for legal defense. If you use AEBPR consider contributing to EFF or to Dmitry through PayPal.

"Call for Technical Submissions

I am interested in receiving and publishing the following kinds of information:


Technical descriptions of the access control and encryption mechanisms associated with PDF files and/or eBooks.
Technical descriptions of remedies for these mechanisms, e.g., patches, key recovery algorithms, modified plug-ins, etc.
Source code for implementing these remedies.
Mail submissions to Dave Touretzky. Anonymous submissions are fine."

-- Gallery of Adobe Remedies (offsite)


"Ever-more subtle and sophisticated Panoptic mechanisms continue to reduce the individual's privacy and integrity. Panopticism continues to limit the space in which civil liberties can be freely deployed. In the face of manipulative technologies, inventive reverse-engineering strategies are necessarily distributed, multiple, simultaneous, hybrid, interdisciplinary, opportunistic. We recall the dazzling efficacy of Ariadne's fragile silk thread in the face of the Minotaur's brutality. Last night, panelists reviewing the challenges to civil liberties wrought by SDMI and DMCA underscored the need for resistance through collaborations that reach across disciplinary boundaries and specializations. Institutional and disciplinary isolation -- and preaching to the choir -- constitute a prison of their own. Unexpected collaborations can offer productive strategies, and it is hoped that Cryptome and Cartome libraries offer useful tools towards the conceptualization of such novel strategies."
-- Deborah Natsios, Reversing the Panopticon, August 16, 2001 (at Cartome)


--------------------------------------------------------------------------------

"A sparsely attended trial which unfolded in Tacoma&#8217;s US district courthouse the first week of April 2001 hardly seemed an event that might open a small but revealing view onto the shifting national security apparatus. But to outside observers following the criminal prosecution of Washington State resident Jim Bell, accused of stalking and intimidating local agents of the IRS, Treasury Department and BATF, the defendant was a symptomatic target, and the government&#8217;s stated case against him only a fragment of a more complex campaign linked to the evolving landscape of national and homeland defense.

In the government&#8217;s estimation, Bell had placed its Pacific Northwest agents "in reasonable fear of death or serious bodily injury". But for some trial-watchers, the case against James Dalton Bell, 43, was underpinned by a constellation of factors that made him more than the disaffected neighbor projecting antigovernment bile. Bell had invited the government&#8217;s fullest prosecutorial zeal because his technical skills placed him in more ambiguous terrain, that of untested gray zones within emerging national defense landscapes, which, by calling into question the impregnability of the national border, have been taking national security tactics incountry in unprecedented ways, deploying new rules of engagement to challenge national security threats within the US domestic interior."

-- Deborah Natsios, Homeland Defense and the Prosecution of Jim Bell, June 8, 2001 (At Cartome.org)


Cartome, a companion site to Cryptome, has been inaugurated. It is an archive of spatial and geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence -- communicated by imagery systems: cartography, photography, photogrammetry, steganography, climatography, seismography, geography, camouflage, maps, images, drawings, charts, diagrams, imagery intelligence (IMINT) and their reverse-panopticon and counter-deception potential. Administrator is architect Deborah Natsios, longtime Cryptome partner.
"But Admiral Wilson wins the award for the most creative neologism, C3D2, which stands for 'cover, concealment, camouflage, denial and deception,' as in: 'Many potential adversaries -- nations, groups, and individuals -- are undertaking more and increasingly sophisticated C3D2 operations against the United States.' "

-- Vernon Loeb, CIA's Tenet Finds the Going Easier in 2001, February 19, 2001 (offsite)


Note: Due to recurring problems with abuse by spiders, bots, siphons and various automatic download programs, the originating addresses of all such programs will now be blocked. Please help stop burgeoning spider abuse.


--------------------------------------------------------------------------------


Cryptome Archives

| Echelon | MI6 | TEMPEST | DVD-DeCSS | GSM | PGP |

Cryptout
Post-Latest
Cryptomb 9
Jan-Jun 2001
Cryptomb 8
Jun-Dec 2000
Cryptomb 7
Jan-May 2000
Cryptomb 6
Jul-Dec 1999

Cryptomb 5
Jan-Jun 1999
Cryptomb 4
Jun-Dec 1998
Cryptomb 3
Jan-May 1998
Cryptomb 2
Jun-Dec 1997
Cryptomb 1
To May 1997


Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security and intelligence -- open, secret and classified documents -- but not limited to those.
Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order will be published here or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.

Send by e-mail, fax or mail:
Cryptome Administrator: John Young
E-mail: jya
Tel: (US) 212-873-8700
Fax: (US) 212-787-6102
Mail: 251 West 89th Street, New York, NY 10024

August 26, 2000: To avoid the ADK bug use PGP 2.6.2:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCNAzHMJLAAAAEEALQamOmaVP3dWAxTWAtoK6SMp8smRTcLweBSLerX0BAAK5s8
c87yZSxKNGHwIejM0MpqbcpTOO5KwMSxAbefGfbOe815TB43pnHMET+itOCmwYsL
lHiuy12o63wETsr1d5EdqWh+dS+p35Ne3qiapoADm1KktJcqIudR7MF7a6tdAAUR
tB1Kb2huIFlvdW5nIDxqeWFAcGlwZWxpbmUuY29tPg==
=c8jN
-----END PGP PUBLIC KEY BLOCK-----

August 27, 2000: New PGP 6.5.8 Key:

ID: 0xC3207009
Fingerprint:
3791 CC39 66E8 EF1D CCA4 CA48 0C56 D974 C320 7009

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
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=0rDn
-----END PGP PUBLIC KEY BLOCK-----



JYA is a companion archive of Cryptome. Information there describes the sites' operator.

  † In Memoriam † maandag 15 oktober 2001 @ 16:08:22 #112
13819 Loedertje
Trotse GILF.
pi_1907251
10 July 2001
Source: Digital file from the Court Reporters Office, Southern District of New York; (212) 805-0300.

This is the transcript of Day 76 of the trial, July 10, 2001.

The transcript for Day 75 was not sent by the Court Reporter. By difference of page numbers of Day 74 and 76 it appears to consist of 2 pages.

See other transcripts: http://cryptome.org/usa-v-ubl-dt.htm

--------------------------------------------------------------------------------

8752


1 UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
2 ------------------------------x

3 UNITED STATES OF AMERICA

4 v. S(7) 98 Cr. 1023

5 USAMA BIN LADEN, et al.,

6 Defendants.

7 ------------------------------x

8
New York, N.Y.
9 July 10, 2001
10:00 a.m.
10

11

12 Before:

13 HON. LEONARD B. SAND,

14 District Judge

15 APPEARANCES

16 MARY JO WHITE
United States Attorney for the
17 Southern District of New York
BY: PATRICK FITZGERALD
18 MICHAEL GARCIA
Assistant United States Attorneys
19

20

21 DAVID RUHNKE
DAVID STERN
22 Attorneys for defendant Khalfan Khamis Mohamed

23

24

25

8753


1 (The jury was assembled at 10:00 a.m. and

2 deliberations resumed.)

3 THE COURT: Good morning.

4 THE JURY: Good morning.

5 THE COURT: Mr. Kenneally, will you take attendance,

6 please.

7 DEPUTY CLERK: Ladies and gentlemen of the jury,

8 please answer to your presence as your name is called.

9 (July roll called; all present)

10 DEPUTY CLERK: Madame Forelady, has the jury reached

11 a verdict on the Special Verdict Form?

12 THE FORELADY: Yes, we have.

13 DEPUTY CLERK: On Section I, The Gateway Factors,

14 Part A, Question 1, your answer is? How do you find?

15 THE FORELADY: The first one: We unanimously find

16 that this factor has been proved beyond a reasonable doubt

17 with regard to all of the capital counts.

18 DEPUTY CLERK: With the continuation on Part A of

19 Section I, Question 2.

20 THE FORELADY: Yes. 2, also the first one: We

21 unanimously find that this factor has been proved beyond a

22 reasonable doubt with regard to all of the capital counts.

23 DEPUTY CLERK: Question 3 of Part A, Section I.

24 THE FORELADY: Question 3, also the first one: We

25 unanimously find that this factor has been proved beyond a

8754


1 reasonable doubt with regard to all the capital counts.

2 DEPUTY CLERK: Part A, Question 4.

3 THE FORELADY: Question 4, the first one also: We

4 unanimously find that this factor has been proved beyond a

5 reasonable doubt with regard to all of the capital counts.

6 DEPUTY CLERK: Going to Section II, Statutory

7 Aggravating Factors, Part A, what is your answer?

8 THE FORELADY: The first one: We unanimously find

9 that this factor has been proved beyond a reasonable doubt

10 with regard to all the capital counts.

11 DEPUTY CLERK: Part A, Question 2.

12 THE FORELADY: Also the first one: We unanimously

13 find that this factor has been proved beyond a reasonable

14 doubt with regard to all of the capital counts.

15 DEPUTY CLERK: Part A, Question 3, your answer is?

16 THE FORELADY: Also the first one: We unanimously

17 find that this factor has been proved beyond a reasonable

18 doubt with regard to all of the capital counts.

19 DEPUTY CLERK: Continuing on Part A, Question 4.

20 THE FORELADY: Question 4, also the first one: We

21 unanimously find that this factor has been proved beyond a

22 reasonable doubt with regard to all of the capital counts.

23 DEPUTY CLERK: Skipping Part B, we go to Section III,

24 the Non-Statutory Aggravating Factors, Part A.

25 THE FORELADY: Part A is the last one: We do not

8755


1 unanimously find that this factor has been proved beyond a

2 reasonable doubt with regard to any of the capital counts.

3 DEPUTY CLERK: Continuing on Section III, Part B,

4 your answer is?

5 THE FORELADY: Is the first one: We unanimously find

6 that this factor has been proved beyond a reasonable doubt

7 with regard to all of the capital counts.

8 DEPUTY CLERK: Continuing Part A, Question C.

9 THE FORELADY: Question C is the first one: We

10 unanimously find that this factor has been proved beyond a

11 reasonable doubt with regard to all of the capital counts.

12 DEPUTY CLERK: Section IV, the Mitigating Factors,

13 how do you find as to A(1) through (3)?

14 THE FORELADY: A(1) through (3), the number of jurors

15 is ten.

16 DEPUTY CLERK: Part B, the number of jurors?

17 THE FORELADY: B, number of jurors is 11.

18 DEPUTY CLERK: Part C(1) through (3)?

19 I'm sorry. Part C, Question C(1) through (3), number

20 of jurors?

21 THE FORELADY: Number of jurors is nine.

22 DEPUTY CLERK: E, number of jurors you so find?

23 THE FORELADY: Number of jurors for E is nine.

24 DEPUTY CLERK: F?

25 THE FORELADY: Number of jurors for F is 12.

8756


1 DEPUTY CLERK: G?

2 THE FORELADY: For G the number of jurors is zero.

3 DEPUTY CLERK: Continuing on Section IV, Mitigating

4 Factors, H?

5 THE FORELADY: For H, number of jurors is nine.

6 DEPUTY CLERK: I'm sorry, nine?

7 THE FORELADY: Nine.

8 DEPUTY CLERK: Going to I.

9 THE FORELADY: I, the number of jurors is 12.

10 DEPUTY CLERK: J?

11 THE FORELADY: J, the number of jurors is seven.

12 DEPUTY CLERK: L? That's L(1) through (3).

13 THE FORELADY: L(1) through (3) is ten.


14 DEPUTY CLERK: Madame Forelady, do you have

15 additional mitigating factors?

16 THE FORELADY: Yes, there were two additional

17 mitigating factors. The first one is that Khalfan Mohamed's

18 last psychological report dated March 2001 judged his

19 potential of harm to others to be low.

20 DEPUTY CLERK: Continue.

21 THE FORELADY: And the number of jurors who so find

22 is nine.

23 DEPUTY CLERK: Any further mitigating factors?

24 THE FORELADY: Yes. The next one, the last one, is

25 that life imprisonment is a harsher punishment than being put

8757


1 to death, and the number of jurors who so find is three.

2 DEPUTY CLERK: Three.

3 Section V, Determination of Sentence. Madame

4 Forelady, can you please read out loud your determination of

5 sentence?

6 THE FORELADY: Certainly. It's the last one: We,

7 the jury, are unable to reach a unanimous verdict either in

8 favor of a life sentence or in favor of a death sentence for

9 any of the capital counts. We understand that the consequence

10 of this is that Khalfan Khamis Mohamed will be sentenced to

11 life imprisonment without the possibility of release.

12 THE COURT: Ladies and gentlemen, let me summarize

13 your findings and make sure that we have reported them

14 correctly.

15 With respect to the gateway factors, you have

16 answered that you have unanimously found the gateway factors

17 to have been proven beyond a reasonable doubt with regard to

18 all of the capital counts, and you made a similar finding with

19 respect to the statutory aggravating factors.

20 With respect to the non-statutory aggravating

21 factors, you do not unanimously find that the defendant poses

22 a continuing and serious threat to the life and safety of

23 others with whom he will come in contact. You do find that

24 the non-statutory aggravating factors B and C have been proven

25 beyond a reasonable doubt.

8758


1 With respect to the mitigating factors, with respect

2 to A, ten jurors so found; B, eleven jurors; C, nine jurors;

3 E, nine jurors; F, twelve jurors; no jurors found as to G;

4 nine as to H; twelve as to I; seven as to J; ten as to L.

5 You have found as two additional mitigating factors

6 that K.K. Mohamed's last psychological report showed that

7 danger of harm to others was low, and nine jurors so found.

8 THE FORELADY: Correct.

9 THE COURT: And you also found as a mitigating factor

10 that life imprisonment was a harsher punishment than death,

11 and three jurors so found.

12 THE FORELADY: Yes.

13 THE COURT: And with respect to sentence, you are

14 unable to reach a unanimous verdict either in favor of a life

15 sentence or in favor of death sentence for any of the capital

16 counts. You understand that the consequence of this is that

17 Khalfan Khamis Mohamed will be sentenced to life imprisonment

18 without the possibility of release.

19 THE FORELADY: Correct.

20 THE COURT: And have each of you put your number on

21 the last sheet, indicating that that reflects your unanimous

22 determination; and have you completed the certification which

23 appears as Section VI, dated and signed the special Special

24 Verdict Form?

25 THE FORELADY: Yes, sir.

8759


1 THE COURT: Have you also signed your real name and

2 placed that certificate in the envelope?

3 THE FORELADY: Yes, sir.

4 THE COURT: Mr. Kenneally, will you poll the jury?

5 DEPUTY CLERK: Ladies and gentlemen of the jury, you

6 have heard your verdict as it has been --

7 JUROR NO. 7: I'm sorry, your Honor. I'm sorry. I

8 need clarification. In the polling of the jury, are you

9 asking us individually how we voted or if we are in agreement

10 that this is the sentence that is being imposed?

11 THE COURT: The question is whether this is an

12 accurate statement of the verdict reached by the jury.

13 JUROR NO. 7: Thank you.

14 THE COURT: You are saying no more but no less than

15 the verdict as announced by the foreperson and as summarized

16 by the Court is an accurate statement of the verdict rendered

17 by the jury.

18 Mr. Kenneally, poll the jury.

19 (Jury polled; each juror responded in the

20 affirmative)

21 THE COURT: Is there anything further that counsel

22 requests with respect to the jury before I discharge them with

23 the thanks of the Court?

24 MR. FITZGERALD: No, Judge.

25 MR. RUHNKE: No, your Honor.

8760


1 THE COURT: Ladies and gentlemen, some parting

2 comment seems appropriate, and I know you have had some

3 questions that have been relayed to me through the marshal.

4 First, let me extend my appreciation to all of those

5 who have enabled these proceedings to move forward

6 expeditiously and with minimal disruption. Our thanks to the

7 deputy marshals, the security officers, court reporters,

8 interpreters, Mr. Kenneally.

9 This difficult and emotionally-charged case has

10 proceeded with no virtually no petty bickering among counsel,

11 and it has been a rare occasion where we have had to interrupt

12 the taking of testimony for sidebars or matters that we have

13 not dealt with before you arrived or after you left.

14 Above all, and on behalf of all the participants in

15 this trial, our thanks to you, the jury. You have been

16 patient, conscientious and good-natured, as you devoted more

17 than half a year to this extraordinary civic duty. Thanks,

18 too, to your family, your employers, your co-workers, who have

19 also been called upon to make sacrifices.

20 We have heard the view expressed, for a variety of

21 reasons, a case of this type could not receive a fair trial

22 before an American jury. You know how wrong that view was.

23 The amount of time, effort, and resources that have been

24 expended to protect everyone's rights has been apparent. No

25 one who has carefully followed these proceedings can entertain

8761


1 any doubt that you have based your decisions solely on the

2 meticulous scrutiny of the evidence and the issues.

3 You have asked about taking material home, and I'm

4 sorry, but, no, everything should be left in the jury room and

5 it will all go into the shredder.

6 One final observation, and that is with respect to

7 talking to the media, to the press. First, it should be clear

8 that once you leave this courthouse, you have every right, if

9 you wish, to contact the press and discuss what occurred in

10 the jury room. You also have an absolute right not to do so.

11 The press has a right to seek you out and encourage

12 you to discuss what went on during your deliberations. That

13 is the roll of the press, and I intend no criticism of them if

14 they seek to contact you. A free and informed press is a

15 mainstay of our system of government. I am not questioning

16 that. But if you decline to speak to the press, you are not

17 to be badgered or called repeatedly. If this occurs, please

18 advise the marshal and I will take appropriate action.

19 Having said that you have a right to seek out and to

20 talk to the press, if you wish to do so, let me urge that you

21 not do so, for several reasons: The American jury system is

22 an amazing institution, and having observed it closely as a

23 trial judge for over 20 years, I am more and more convinced of

24 its value and its important role in our society.

25 One of the keystones of the jury system is the

8762


1 secrecy given to jury deliberations. Every juror in this case

2 and every juror in cases that will follow should be secure in

3 the knowledge that the views he or she candidly expresses

4 during jury deliberations will not be emblazoned in the print

5 or the electronic media.

6 Moreover, for good reason, you are an anonymous jury.

7 We promised that we would make every reasonable effort to keep

8 your identity secret. Obviously, if press accounts begin to

9 appear and other jurors, perhaps disagreeing with what was

10 said, begin responding in the press, there is a real danger

11 that your anonymity will be jeopardized.

12 As I have said, please leave your notes and papers in

13 the jury room and they will all be shredded.

14 I don't know your names and may never see you again,

15 but I am very appreciative of the service that you have

16 rendered and I would like to shake your hands and wish you

17 Godspeed.

18 (Jury excused)

19 THE COURT: We will set September 19th at 10 a.m. in

20 this courtroom for sentencing.

21 MR. RUHNKE: Yes, your Honor.

22 THE COURT: We will order a full pre-sentence report.

23 I assume counsel wish to be present --

24 MR. RUHNKE: Yes.

25 THE COURT: -- for the interview for the pre-sentence

8763


1 report, and that will be noted.

2 Is there anything else?

3 MR. FITZGERALD: No, Judge. Thank you.

4 THE COURT: That being the case, we are adjourned

5 until September 19th at 10 a.m.

6 Thank you all.

7 (Adjourned)

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

pi_1907927
en?
.
  † In Memoriam † maandag 15 oktober 2001 @ 18:32:39 #114
13819 Loedertje
Trotse GILF.
pi_1908873
Television is a corrupt tool for the sole purpose of making the uncorrupt very corrupt!
pi_1909069
wooow jullie hebben vette ctrl v ctrl c knoppuh!!!
bla bla
We're Jammin', I hope you like Jammin' too!
  maandag 15 oktober 2001 @ 18:58:44 #116
12652 -Mellowdy-
Mellowcholie.
pi_1909094
(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P(K):P
Quiet!!
Shhh, hush your mouth
Silence when I spit it out, ... in your face
Open your mouth, give you a taste
  † In Memoriam † maandag 15 oktober 2001 @ 19:25:15 #117
13819 Loedertje
Trotse GILF.
pi_1909316
Al Qaeda vows serious consequences for U.S.
Oct 15, 2001
CNN

Osama bin Laden believes he has successfully defined the terms of the conflict with the U.S.-led coalition as a battle for saving Islam, representatives of bin Laden's al Qaeda organization told CNN on Monday.



Anti-U.S. Sentiment Spreading In Pakistan
Oct 15, 2001
The Washington Post

As Secretary of State Colin L. Powell arrives here Monday to reinforce Pakistan's new anti-terrorist alliance with the United States, anti-American sentiment is growing rapidly across Pakistan, with a wide cross-section of the public expressing concern about the short-term human damage and long-term political consequences of the U.S. military campaign against next-door Afghanistan.



Countrywide strike on Powell's arrival today
Oct 15, 2001
The News

ISLAMABAD: Major religious political parties of Pakistan have called for a general strike all over Pakistan on Monday to protest against US Secretary of State Colin Powell's visit to Islamabad.


US will suffer more than Russia: Omar
Oct 15, 2001
The News

RIYADH: Taliban supreme leader Mullah Muhammad Omar on Sunday said his Islamic militia will teach the United States "a much more bitter lesson" than that taught to the Soviet Union in 1980s.


Bombing damages three Ariana passenger planes
Oct 15, 2001
The News

ISLAMABAD: The US-led joint attacks against 'terrorist targets' in Afghanistan have successfully damaged three Ariana civilian planes parked at the Logor airport, further impairing its capability to operate.


An Afghan Family Survives With Only Its Hopes Intact
Oct 15, 2001
The New York Times

At the age of 11, he moved with his family from this mountain village to the capital, Kabul, in search of a better life. At 22, he married. When he was 25, in 1979, the Soviet Union invaded his country. At 32, he became a father when his wife gave birth to their first child.


Explosions Rock Afghan Cities in Daylight Raids
Oct 15, 2001
AP

KABUL, Afghanistan (AP) -- Explosions shook Kabul and the eastern city of Jalalabad on Monday morning, ushering in the second week of a U.S.-led air campaign to force the handover of Osama bin Laden. The White House rebuffed yet another offer by Afghanistan's Taliban rulers to negotiate the terror suspect's fate.


Afghanistan pounded in second week of airstrikes
Oct 15, 2001
CNN

The U.S.-led military campaign in Afghanistan entered its second week Sunday night with airstrikes targeting artillery and heavy armor that had been moved to the mountains outside of Kabul, sources said.



President Rejects Offer by Taliban for Negotiations
Oct 15, 2001
The New York Times

President Bush forcefully rejected another offer from the Taliban today to begin talks about the surrender of Osama bin Laden if the United States stopped bombing Afghanistan.



Taliban Says Bin Laden Can Be Given to Neutral Country
Oct 15, 2001
Reuters

JALALABAD, Afghanistan (Reuters) - Afghanistan's ruling Taliban said Sunday militant fugitive Osama bin Laden could be handed to a neutral country for trial if the United States provided sufficient evidence.


US refuses to discuss N. Alliance's role
Oct 15, 2001
Daily Dawn

The United States continues to refuse publicly to take a stand on the help it is providing or it may provide in a post-Taliban set-up to the Northern Alliance. Asked directly at his Press briefing on Friday afternoon as to whether the US considered the Northern Alliance as allies "in the war against terror in Afghanistan",


Taliban troops prepare for underground fight
Oct 15, 2001
The Sunday Times

AFGHANISTAN'S leading cave-fighting veteran from its 1980s war with the Soviet Union has been appointed head of the Taliban army.


Battle of Kabul delayed by US row with Pakistan
Oct 15, 2001
The Sunday Times

A DEEPENING diplomatic rift between Washington and Islamabad has threatened to weaken the American-led campaign against Osama Bin Laden and the Taliban regime in Afghanistan.


U.S. Raid Leaves Afghanistan's Kandahar in Darkness
Oct 15, 2001
Reuters

ISLAMABAD (Reuters) - Afghanistan (news - web sites)'s southern city of Kandahar was plunged into darkness and enveloped in dust after a second wave of U.S.-led bombing on Sunday, that also hit an army complex, a Pakistan-based Afghan news service reported.


Reporters Tour Damaged Afghan Town
Oct 15, 2001
AP

KARAM, Afghanistan (news - web sites) (AP) - Waving shovels and sticks, enraged villagers surged toward foreign journalists brought here Sunday by Afghanistan's ruling Taliban militia to see what officials say was the devastation of a U.S. air attack.


No U.S. Comment on Reported Miss on Taliban Leader
Oct 15, 2001
Reuters

WASHINGTON (Reuters) - The Pentagon and CIA would not comment on Sunday on a report in The New Yorker magazine that an unmanned U.S. aircraft equipped with missiles had the Taliban leader in its sights on the first night of bombing raids on Afghanistan but a hit was not authorized.


U.S. may have let Taliban chief get away
Oct 15, 2001
The LA Time

U.S. forces had the leader of the Taliban in their gun sights on the first day of the American bombing of Afghanistan but chose not to fire at him, it was reported Saturday.


Taliban Urges Northern Foes to Switch Sides
Oct 15, 2001
Reuters

KABUL/JALALABAD, Afghanistan (news - web sites) (Reuters) - Their air defenses faltering at the start of a second week of U.S. strikes, Afghanistan's ruling Taliban said Sunday the raids had killed hundreds and urged opposition fighters to join their ranks.


Bombing Stuns Ordinary Afghans
Oct 15, 2001
AP

QUETTA, Pakistan (AP) - Fazal Mohammed, a cart-pusher from Kandahar, missed the televised briefing where U.S. generals apologized for accidental bomb damage, which included his 5-year-old son, Taj.


Strategic targets not hit, says envoy
Oct 15, 2001
Daily Dawn

QUETTA, Oct 13: The Afghan Ambassador to Pakistan, Mulla Abdul Salam Zaeef, said on Saturday that the US warplanes were not able to hit strategic targets in his country but were responsible for killing of hundreds of innocent citizens.



Growing Impatient With U.S., Rebels Plan Attack on Kabul
Oct 14, 2001
The Washington Post

BAGRAM, Afghanistan, Oct. 13 -- Fed up with waiting, Afghan rebel commanders say they are preparing to launch a drive to recapture Kabul within days even without U.S. military help or a political agreement on the shape of a post-Taliban government.


Taliban Gives Reporters War Zone Tour
Oct 14, 2001
AP

KARAM, Afghanistan &#8211;&#8211; Waving shovels and sticks, enraged villagers surged toward foreign journalists brought here Sunday by Afghanistan's ruling Taliban militia to see what officials say was the devastation of a U.S. air attack.



Life Inside Afghanistan: Chaos, Fear and Refugees
Oct 14, 2001
The Washington Post

ISLAMABAD, Pakistan, Oct. 13 -- A week of methodical pounding by U.S. warplanes has demolished what little modern weaponry the Taliban had and ripped apart its military infrastructure. But the bombing has done little to prompt mass desertions or kill the Taliban fighters, many of whom are now reported to be dispersed in residential neighborhoods and across the forbidding terrain of Afghanistan waiting for American troops to arrive.


U.S. Operated Secret Alliance With Uzbekistan
Oct 14, 2001
The Washington Post

The United States and Uzbekistan have quietly conducted joint covert operations aimed at countering Afghanistan's ruling Taliban regime and its terrorist allies since well over a year before the Sept. 11 attacks, according to officials from both nations.


U.S. to Target Elite Taliban Assault Force In Next Phase
Oct 14, 2001
The Washington Post

The Pentagon is planning an extensive range of actions during the next phase of the war in Afghanistan, including covert raids, continued bombing and large-scale helicopter attacks conducted partly to signal that the U.S. military is engaged on the ground in pursuing terrorists, defense officials and outside military experts said.


One killed, 12 injured in Pakistani protest
Oct 14, 2001
CNN

JACOBABAD, Pakistan (CNN) -- At least one person was killed and 12 were injured during a pro-Taliban demonstration Sunday in the Pakistani city of Jacobabad, a police source told CNN.


Kandahar bombed for seven hours Sunday
Oct 14, 2001
CNN

WASHINGTON (CNN) -- U.S. warplanes pounded Afghanistan's southern city of Kandahar on Sunday after the ruling Taliban's spiritual leader rejected a new call to turn over suspected terrorist leader Osama bin Laden.


Airstrikes jolt Kandahar, Kabul
Oct 14, 2001
CNN

Warplanes bombarded Afghanistan's two largest cities on Sunday, as the U.S.-led campaign against terrorist targets entered its second week.


Afghan Opposition Forms Police Force
Oct 14, 2001
AP

CHARIKAR, Afghanistan (news - web sites) (AP) - A general with the Afghan opposition alliance said Sunday it has set aside about 2,000 security officers as part of a plan to administer the capital, Kabul, if the ruling Taliban is pushed out.


U.S. Planes Hit Afghanistan; Villagers Mourn Dead
Oct 14, 2001
Reuters

KABUL/WASHINGTON (Reuters) - U.S. warplanes pounded Afghanistan Sunday in a relentless campaign to root out Osama bin Laden while some survivors of a bombed village pleaded for their lives and others vowed holy war on the United States.


U.S. Opens Second Week of Strikes
Oct 14, 2001
AP

KABUL, Afghanistan (AP) - Opening their second week of air strikes on Afghanistan, U.S. jets Sunday pounded Kabul's airport, the Taliban military academy and an artillery garrison. The Taliban ``are paying a price'' for refusing to turn over Osama bin Laden President Bush declared.


U.S. takes control of Pakistan airspace, wants more
Oct 14, 2001
Gulf News Online

There are credible reports that control of the country's air space has been handed over to a U.S. command system and to U.S. warships stationed in the Gulf, some 25 to 30 nautical miles off the port city of Karachi.



Al-Qaeda threatens US and UK
Oct 14, 2001
BBC

The al-Qaeda organisation of Islamic militant Osama Bin Laden has said it will hit back against the United States and the United Kingdom in retaliation for the air strikes on Afghanistan.


Anti-U.S. Riots Rock Nigeria; Protests Elsewhere
Oct 14, 2001
Reuters

KANO, Nigeria (Reuters) - At least 20 people were killed in Nigeria in anti-American riots Saturday and thousands of demonstrators joined peace marches in London and Berlin.



U.S. Carrier Fighters Hit Afghan Planes, Airfields
Oct 14, 2001
Reuters

ABOARD THE USS CARL VINSON (Reuters) - U.S. Navy fighters based on this aircraft carrier in the northern Arabian Sea hit airfields and fighter aircraft on the ground in Afghanistan on Saturday and continued to encounter little to no resistance, a senior officer said.



Taliban Say U.S. Raids Killing Scores of Civilians
Oct 14, 2001
Reuters

KABUL/JALALABAD, Afghanistan (Reuters) - Afghanistan's ruling Taliban said Sunday that U.S. air raids had killed scores of civilians but they would still not be bullied into handing over Saudi-born fugitive Osama bin Laden.



Explosions Light Afghan Night, Taliban Defiant
Oct 14, 2001
Reuters

KABUL/JALALABAD, Afghanistan (Reuters) - Afghanistan was assessing the damage on Sunday after a seventh straight night of U.S. bombing raids, as the ruling Taliban defiantly snubbed U.S. demands to surrender Osama bin Laden.



US Warplanes Hit Afghanistan, Al Qaeda Vows Revenge
Oct 14, 2001
Reuters

KABUL/WASHINGTON (Reuters) - U.S. warplanes pounded Afghanistan Sunday in a relentless campaign to root out Osama bin Laden and his shadowy al Qaeda group which threatened to retaliate against Britain and the United States.


Day 7 of airstrikes in Afghanistan
Oct 14, 2001
CNN

The Pentagon confirmed that day seven of airstrikes was under way in Afghanistan in the battle to root out accused terrorist mastermind Osama bin Laden and his al Qaeda organization.



Taliban Arming Backers Along Border
Oct 14, 2001
AP

CHAMAN, Pakistan (AP) - Girding for a U.S. ground attack, Afghanistan's Taliban fighters are arming supporters along both sides of the border and ordering people to evacuate towns and villages in the area, residents and Pakistani officials said Saturday.


Pentagon Says Error Led to Bombing of Houses in Kabul
Oct 14, 2001
The New York Times

Navy jet mistakenly dropped a 2,000-pound bomb today into a residential neighborhood of Kabul, the Pentagon said. Initial reports from the Afghan capital said four people had been killed and eight others wounded in the attack, which occurred as the bombing of Afghanistan resumed after a pause for the Muslim holy day on Friday.



U.S. Raid Kills Unknown Number in an Afghan Village
Oct 14, 2001
The New York Times

Karam is a village in the hills of eastern Afghanistan, barely an hour from the border with Pakistan. Villagers say a training camp for Islamic guerrillas was once situated nearby, though it has been closed for several years.



Omar's car 'hit by US bomb'
Oct 14, 2001
Daily Telegraph

THE Pentagon last night appeared to confirm a report that a car belonging to Mullah Mohammed Omar, the leader of the Taliban, had been hit by an American bomb, possibly killing the occupants.



Military Preparing for Next Phase
Oct 14, 2001
AP

WASHINGTON (AP) - American soldiers are poised for another phase in the strikes against Taliban and terrorist targets in Afghanistan action on the ground, rather than just from the air.



UN Security Council President Calls for Afghan 'Nation Building' Talks
Oct 13, 2001
VOA

The president of the United Nations Security Council has called for discussion of a possible U.N. nation-building role in Afghanistan. Council President Richard Ryan of Ireland welcomed President Bush's statement on the United Nations.


Afghans 'dying of hunger'
Oct 13, 2001
BBC

The hungriest and poorest Afghans are dying of hunger and cold, aid workers say, at rates far higher than aid agencies consider to be crisis levels.


'Weakened' Kabul under fresh attack
Oct 13, 2001
BBC

The United States has been carrying out further air strikes against Afghanistan, meeting little resistance around the capital, Kabul, from its Taleban defenders.


Warplanes Pound Kabul Neighborhood
Oct 13, 2001
AP

KABUL, Afghanistan (news - web sites) (AP) - Warplanes took to the skies early Saturday after a daylong lull, pounding areas around Kabul and Kandahar in a seventh straight day of airstrikes. People living near the scene of the Kabul strikes said at least one civilian was killed and four hurt.


Afghan Night Attacks Resume
Oct 13, 2001
AP

KABUL, Afghanistan &#8211;&#8211; U.S. jets launched fresh attacks Saturday night against the Kabul area, firing at least seven missiles at targets at the northern end of the capital.



Pakistan Warns Journalists
Oct 13, 2001
AP

ISLAMABAD, Pakistan &#8211;&#8211; Pakistan will deport any foreign journalists who visit its prohibited border region or travel to Afghanistan without proper documents, the government said Saturday.



Grand Council Envisioned for Afghans
Oct 13, 2001
The Washington Post

After the 21st-century satellites and fighter jets are done in Afghanistan, Bush administration officials are planning to turn to a 2,000-year-old political model that was used by Genghis Khan in the 13th century and was last summoned by a Soviet puppet regime 14 years ago.


Kamal Hyder: Apprehension among Afghans
Oct 13, 2001
CNN

Journalist Kamal Hyder has been reporting from Afghanistan from an undisclosed location throughout the onset of U.S.-led airstrikes against military targets in Afghanistan that began on Sunday.


UK minister rules out invasion
Oct 13, 2001
CNN

LONDON, England -- Military strikes against Afghanistan is not the precursor to a mass invasion, a member of the UK's war cabinet has said.


Taliban reject Bush's ceasefire trade
Oct 13, 2001
CNN

Afghanistan's ruling Taliban on Saturday rejected an offer by U.S. President George W. Bush to halt air strikes if they handed over Saudi-born fugitive Osama bin Laden, saying they will fight to their last breath.



Al-Jazeera Ascends to World Stage
Oct 13, 2001
The Washington Post

DOHA, Qatar -- The phone rings, bringing a rumor that the government of Pakistan has fallen. Word arrives that maybe Osama bin Laden is about to unload another videotaped call for holy war. Then, from Washington comes news that the United States wants an end to broadcasts of statements from Taliban authorities and bin Laden.


Not So Full of Fight
Oct 13, 2001
The Washington Post

KALAI NAW, Afghanistan, Oct. 12 -- The militia swept in before anyone realized what was going on. Zalmai, a 20-year-old merchant, was tending to the apples and cucumbers and other produce at his Kabul store when the officers began grilling him.


Uzbekistan to Let U.S. Use Bases in Return for Promise of Security
Oct 13, 2001
The New York Times

The United States and Uzbekistan today announced an agreement that would give the American military flexibility in operating from bases in the former Soviet republic in return for Washington's assurance to protect Uzbekistan's security.



Taliban allow media men to cover US strikes at civilian population at Jalalabad
Oct 13, 2001
NNI

JALALABAD: The Afghanistan ruling Taliban have allowed the international media to cover the estimated damage and loss of human lives caused by the US-led strikes at Jalalabad.



Afghan Capital Kabul Attacked; Airport Hit
Oct 13, 2001
Reuters

KABUL (Reuters) - The Afghan capital Kabul came under attack from U.S.-led forces for the sixth night in the early hours of Saturday, with eight powerful explosions heard and at least one bomb dropped on the airport, witnesses said.


Kabul under fresh bombardment
Oct 13, 2001
BBC

Loud explosions have been reported in and around the Afghan capital Kabul as US-led air raids resume.


U.S. Resumes Strikes; Afghan Capital Kabul, Airport Hit
Oct 13, 2001
The Washington Post

KABUL, Oct 13&#8212;The Afghan capital Kabul came under attack from U.S.-led forces for the sixth night in the early hours of Saturday, with eight powerful explosions heard and at least one bomb dropped on the airport, witnesses said.


Air Campaign Resumes After Lull on Muslim Holy Day
Oct 13, 2001
The New York Times

KABUL, Afghanistan (AP) -- A Taliban report that 200 villagers were killed in a missile strike this week opened a contentious exchange of claims and counter-claims Friday over civilian casualties from the U.S.-led air campaign against Afghanistan.


New Anthrax Scare, Muslims Protest at Raids
Oct 13, 2001
Reuters


WASHINGTON/KABUL (Reuters) - A new case of anthrax, a potential germ warfare agent, added to American alarm on Friday as U.S. warplanes reduced their bombing raids on Afghanistan in deference to the Muslim Sabbath.



Taliban stiffens troops with Al-Qaeda fighters: official
Oct 13, 2001
AFP

The Taliban is salting its rank-and-file forces with highly motivated fighters from the Al Qaeda terrorist group to stiffen their resistance amid signs of defections and the loss of a provincial capital, a senior defense official said Friday.


Large Explosions in Kabul Saturday
Oct 13, 2001
AP

A Taliban report that 200 villagers were killed in a missile strike this week opened a contentious exchange of claims and counter-claims Friday over civilian casualties from the U.S.-led air campaign against Afghanistan.



Are Taliban having second thoughts, or is it the US?
Oct 13, 2001
The News

ISLAMABAD: At a sumptuous villa in Rome, Zahir Shah, the 86-year-old deposed king of Afghanistan, is sitting all-dressed-up. But, yet not sure how to reach Kabul after spending 28 years in exile.


Taliban claim recovering 160 bodies from bombed village
Oct 13, 2001
The News

ISLAMABAD: At least 160 bodies, mostly of women and children, have been recovered from a village in eastern Afghanistan that was bombed by US planes during a failed attack on an alleged terrorist training camp, the Taliban said on Friday.


Differences surface between UNHCR, govt
Oct 13, 2001
The News

Serious differences surfaced on Friday between the Government of Pakistan and United Nations High Commission for Refugees (UNHCR).



Govt ready to open border for refugees
Oct 13, 2001
The News

NWFP Commissioner for Afghan Refugees Muhammad Naeem Khan on Friday said that government was ready to review its policy on opening of its borders for Afghans provided there is a sudden influx of refugees and the UNHCR sets up camps to accommodate these displaced families.



UN for overhaul of system in Afghanistan
Oct 13, 2001
The News

The UN's new pointman on Afghanistan called on Friday for a total overhaul of the war-torn country's social, political and economic systems, through internal democratic reform and external aid.



Britain's Afghan Community Worried
Oct 13, 2001
AP

LONDON &#8211;&#8211; Attending Friday prayers, watching their children kick a soccer ball or serving up kebabs to hungry customers, Britain's large Afghan community is striving to carry on as usual.



Large Explosions in Kabul Saturday
Oct 13, 2001
AP

KABUL, Afghanistan &#8211;&#8211; A Taliban report that 200 villagers were killed in a missile strike this week opened a contentious exchange of claims and counter-claims Friday over civilian casualties from the U.S.-led air campaign against Afghanistan.



Anti-American Demonstrators Riot in Karachi
Oct 13, 2001
The Washington Post

PESHAWAR, Pakistan, Oct. 12 &#8211; Thousands of angry demonstrators destroyed a Kentucky Fried Chicken outlet in Karachi today, ripped up American flags as anti-terrorist police surrounded them in Quetta, and pummeled effigies of President Bush to bits in this northwest Pakistani city.


Flow of Afghan Refugees Is Stalled by Pakistan
Oct 13, 2001
The New York Times

The United Nations refugee agency said today that preparations for an expected influx of Afghan refugees had been stalled by security concerns and restrictions imposed by the government of Pakistan.



Anti-Taliban Fighters Seize Areas
Oct 13, 2001
The New York Times / AP

DUSHANBE, Tajikistan (AP) -- Anti-Taliban fighters in Afghanistan seized strategic points in the country's west-central region to block Taliban supply routes, a spokesman for the fighters claimed Friday.


Respite in Air Campaign in Afghanistan During Muslim Holy Day
Oct 13, 2001
The New York Times

KABUL, Afghanistan (AP) -- A Taliban report that 200 villagers were killed in a missile strike this week opened a contentious exchange of claims and counter-claims Friday over civilian casualties from the U.S.-led air campaign against Afghanistan.


Britain:Taliban Exaggerate Casualties
Oct 13, 2001
AP

LONDON (AP) - British officials said Friday they believe Afghanistan (news - web sites)'s Taliban government has exaggerated the number of civilian casualties in U.S.-led raids.


Daytime raids add to the level of pressure
Oct 13, 2001
Inquirer

American warplanes pounded Afghanistan again yesterday, hitting targets around the country and delivering the first daytime assault on the capital city of Kabul.



Uzbek Says Afghanistan Bridge Secure
Oct 13, 2001
AP

At the bridge across which Soviet troops retreated at the end of their failed 10-year occupation of Afghanistan, a lone Uzbek border guard slowly paces behind a rusting red-and-white bridge.



Escape takes treacherous route
Oct 13, 2001
Detroit Free Press

Refugees from Kabul said Thursday that Taliban militants have practically disappeared from the streets of the capital.


Two Hurt as Mob Attacks Pakistan Consulate in Iran
Oct 13, 2001
Reuters

TEHRAN (Reuters) - Two people were hurt as police tried to stop a crowd of mainly Afghan refugees from attacking the Pakistani consulate in a southwestern Iranian town on Friday, an official said.


Violence, Bureaucracy Hinder Afghan Aid Effort
Oct 13, 2001
Reuters

PESHAWAR, Pakistan (Reuters) - The United Nations (news - web sites) said on Friday that violent protests and a lack of cooperation from local authorities were hindering efforts to prepare sites for Afghan refugee camps in Pakistan's border areas.


Weary Afghans Emerge After U.S. Bombs Arms Dumps
Oct 13, 2001
Reuters

KABUL (Reuters) - Angry clerics vented their rage at Friday prayers in the Afghan capital, Kabul, urging people to fight to the last breath after a fifth night of U.S. air strikes brought the ruling Taliban's death toll estimate to nearly 300.


British ministers speculate on ground forces in Afghanistan
Oct 13, 2001
AFP

British ministers and military officials added fuel to increasing speculation Friday that ground troops may be sent into Afghanistan before the onset of winter in a few weeks.


Allies Cloak Afghan Campaign in Secrecy
Oct 13, 2001
Reuters

LONDON (Reuters) - Washington and London are keen to cloak the details of their war against terrorism in secrecy, but key aspects of the campaign could be forced into the open if Afghanistan (news - web sites)'s rulers start using the media to their advantage.


Guards beat refugees as they flee Afghanistan
Oct 13, 2001
Daily Telegraph

PAKISTANI border guards, firing pistols and wielding bamboo staves, beat back hundreds of Afghan refugees trying to pour through mountain passes south and south-east of Kabul yesterday.


Al-Jazeera repels US attacks citing press freedom
Oct 12, 2001
The News


Qatar's Al-Jazeera satellite channel has firmly rebuffed US attacks on its coverage of the Afghan crisis, vowing to continue to give air time to prime terror suspect Osama bin Laden in the name of press freedom. "We will continue our work in a professional manner whether it be in Afghanistan or elsewhere ... offering a margin of freedom in the Arab world," Al-Jazeera chairman Sheikh Hamad bin Thamer al-Thani pledged on Thursday.



US under pressure to bar opposition from taking Kabul
Oct 12, 2001
The News

The United States is under intense pressure from the United Nations, its allies in Europe, the Middle East and, of course, Pakistan to prevent the Northern Alliance from capturing Kabul before a consensus was developed on an interim government.



Battle of Kabul is days away
Oct 12, 2001
The Times ( London )

A GROUND assault on Kabul appeared imminent last night after the Pentagon said it was bombing Taleban forces around the Afghan capital and Northern Alliance commanders said they expected to move on the city within days. Donald Rumsfeld, the US Defence Secretary, said American planes were dropping bombs to assist the Northern Alliance, and working from intelligence from the rebel forces. He said: &#8220;We are certainly encouraging the forces that are opposing the Taleban.&#8221;


CIA doesn't see eye-to-eye with ISI
Oct 12, 2001
The Times of India

The United States could well consider naming Pakistan's Inter-Services Intelligence (ISI) a foreign terrorist organisation judging by the revelations spilling out now about its nefarious activities that have not only troubled India but also jeopardised Washington's battle against terrorism.



Bush Singles Out U.N. as Key to Afghan Revival
Oct 12, 2001
Reuters

WASHINGTON (Reuters) - President Bush on Thursday identified the United Nations as the key player in Afghanistan once military action ends against its ruling Taliban.



US planes pound Afghanistan
Oct 12, 2001
BBC

The Afghan capital, Kabul, has come under further attack during the night and into the day as American warplanes launched a series of raids, drawing anti-aircraft fire from Taleban forces.



Rumsfeld: Attacks Haven't Rid Threat
Oct 12, 2001
AP

WASHINGTON (AP) - American bombing has yet to eliminate the danger to U.S. warplanes over Afghanistan, and the United States is working with anti-Taliban forces on the ground to pinpoint threatening military targets, Defense Secretary Donald H. Rumsfeld said Thursday.



Rocca blames Taliban for humanitarian disaster in Afghanistan
Oct 12, 2001
NNI

The US Assistant Secretary of State for South Asian Affairs Christian Roca has said the Taliban regime is responsible for the humanitarian disaster in Afghanistan.



Northern Alliance captures Ghore Province
Oct 12, 2001
NNI

The Afghan opposition United Front has claimed its forces captured Chekhcheran, the provincial Capital of Ghore.


Military Afghan source confirms Taliban commanders' defection
Oct 12, 2001
NNI

Afghan opposition has claimed that forty Taliban commanders have been defected to the Afghan opposition Unified Front, reports IRNA.



Bush Extends 'Second Chance' to Taleban
Oct 12, 2001
VOA

President Bush has offered Afghanistan's ruling Taleban a second chance to surrender suspected terrorist Osama bin Laden and members of his al-Qaida network.



Refugee agency 'failing Afghans'
Oct 12, 2001
BBC

The United Nations Refugee Agency, UNHCR, says it is failing in its struggle to assist Afghan refugees who may try to flee to Iran and Pakistan.



Weary Afghans Emerge After U.S. Bombs Strike Dumps
Oct 12, 2001
Reuters

KABUL (Reuters) - Weary Afghans emerged on Friday after a fifth straight night of U.S. air strikes that rocked their cities with giant explosions in an assault the hardline Taliban say has killed more than 200 people.



Jets Bring New Afghan Night Strikes
Oct 12, 2001
AP

KABUL, Afghanistan (AP) - The first daylight raid on the Afghan capital in the 5-day-old U.S.-led air campaign sent shoppers scattering in panic Thursday, jumping on donkey carts and bicycles to flee heavy explosions. In the Taliban stronghold of Kandahar, a hit on a munitions dump set off a series of deafening blasts - and an exodus of civilians toward the Pakistani border.



Taliban Says Will Not Handover Bin Laden
Oct 12, 2001
Reuters

DUBAI (Reuters) - The leader of Afghanistan's ruling Taliban movement said in remarks published on Friday that Osama bin Laden could not be handed over to the United States because it was against Afghan principles and religion.



Sattar, Kharrazi discuss Afghan crisis
Oct 12, 2001
NNI

DOHA: Iran's Foreign Minister Kamal Kharrazi has said here that efforts should be made to ensure the formation of a broad-based government in Afghanistan which would guarantee the rights of all minorities and be free from domination by a particular group.



Residents of Afghan Capital Scramble to Flee Explosions
Oct 12, 2001
The New York Times

KABUL, Afghanistan (AP) -- The first daylight raid on the Afghan capital in the 5-day-old U.S.-led air campaign sent shoppers scattering in panic Thursday, jumping on donkey carts and bicycles to flee heavy explosions. In the Taliban stronghold of Kandahar, a hit on a munitions dump set off a series of deafening blasts -- and an exodus of civilians toward the Pakistani border.


Kabul Rocked by New Bombing Raids
Oct 12, 2001
The New York Times

The heaviest airstrikes of the United States-led campaign continued against Afghanistan for a fifth day today, as a new wave of intense nighttime attacks pounded Kabul, the capital, after the first daylight-hour strikes around the city.



Iran Says U.S. Attacks Are 'Useless'
Oct 12, 2001
The Washington Post


TEHRAN, Iran&#8212;Iran said Thursday it approved of punishing those behind the suicide attacks in the United States but described the U.S. retaliatory attacks on Afghanistan as useless.


Taliban Claim Large Civilian Casualties
Oct 12, 2001
The Washington Post


ISLAMABAD, Pakistan, Oct. 11 &#8211; Seeking solidarity in the Islamic world and beyond, Afghanistan's beleaguered Taliban rulers said today large numbers of civilians were killed overnight in the heaviest U.S. air raids to date against cities and towns across their battered country.


U.S. Jets Strike Kabul in Daylight
Oct 12, 2001
AP


KABUL, Afghanistan (news - web sites) (AP) - The first daylight raid on the Afghan capital in the 5-day-old U.S.-led air campaign sent shoppers scattering in panic Thursday, jumping on donkey carts and bicycles to flee heavy explosions. In the Taliban stronghold of Kandahar, a hit on a munitions dump set off a series of deafening blasts - and an exodus of civilians toward the Pakistani border.


Britain: Campaign Could Go Till Summer
Oct 12, 2001
AP


LONDON (AP) - The bombardment of Afghanistan (news - web sites) has prompted some Taliban supporters to desert their leaders, but the military campaign could run until next summer if the hard-line Islamic government doesn't accede to U.S. and British demands, defense officials said Thursday.


Taliban Forces Reported Under Pressure in North
Oct 12, 2001
Reuters


KHOJA BAHAWUDDIN, Afghanistan (news - web sites) (Reuters) - Accounts of gains by opposition commanders in Afghanistan are impossible to confirm, but they are starting to paint a picture of Taliban forces under pressure -- at least in the north where their grip is weakest.


Refugees: Taliban Head's Son and Stepfather Killed
Oct 12, 2001
Reuters


QUETTA, Pakistan (Reuters) - Two relatives of Taliban leader Mullah Mohammad Omar killed in a U.S. raid on his house this week were his 10-year-old son and his stepfather, residents fleeing Kandahar said on Thursday.


Afghans Skeptical of U.S. Aid
Oct 12, 2001
AP


QUETTA, Pakistan (AP) - In their clinic at the edge of town, Afghan volunteers with no love for terrorists or the Taliban offer their own damage assessment of an allied campaign they hope may free Afghanistan.


Afghans Fear U.S. Will Drop Them Again
Oct 12, 2001
AP


QUETTA, Pakistan (AP) - In their clinic at the edge of town, Afghan volunteers with no love for terrorists or the Taliban offer their own damage assessment of an allied campaign they hope may free Afghanistan.


US planes pound Afghanistan
Oct 12, 2001
BBC


American warplanes have staged more daytime and evening attacks on the Afghan capital, Kabul, with bombs reported to have fallen near the airport and a military base in the east of the city.


Taliban border forces rebuff Iranian Red Crescent aid workers
Oct 12, 2001
AFP


Taliban border guards rebuffed Iran's Red Crescent aid workers inspecting a site on Afghan soil to set up a refugee camp, a Red Crescent official said Thursday.


Taliban claim hundreds of civilians killed in heavy US attacks
Oct 12, 2001
AFP


US forces engaged Thursday in the heaviest bombing so far of their air campaign on Afghanistan to punish the planners of terror attacks that struck at the heart of the United States exactly one month ago.


Over 50 Bodies Pulled From Bombed Afghan Village
Oct 12, 2001
Reuters


ISLAMABAD (Reuters) - More than 140 people have been killed as a result of U.S. raids on Afghanistan (news - web sites) in the last 24 hours, including dozens in one strike on a village near Jalalabad, Afghan Islamic Press said on Thursday.


Anti-Taliban Afghans Call Strategy Meet in Pakistan
Oct 12, 2001
Reuters


PESHAWAR, Pakistan (Reuters) - Afghan exiles opposed to the ruling Taliban called on Thursday for a meeting in Pakistan this month of all opposition forces to unite to depose the fundamentalist movement now under fire from U.S.-led attacks.


Night Air Raids Hit Kabul, Kandahar
Oct 12, 2001
AP


KABUL, Afghanistan (news - web sites) (AP) - U.S. planes returned to the skies over Kabul late Thursday, and several strong detonations could be heard in the east of the city near the Taliban military academy.


Refugee recalls Afghan horrors
Oct 12, 2001
Denver Post


It was 1989, and the bomb was not supposed to hit the neighborhood park in Bagmani, where women stood in a long line, waiting to fetch water from the Afghan village's only functioning pump as children played nearby.


OIC concerned over civilian casualties in Afghanistan
Oct 12, 2001
The Arabic News


The world's largest Islamic body expressed concern yesterday at the prospect of civilian casualties in Afghanistan but steered clear of condemning US strikes against the Taliban rulers sheltering Osama bin Laden.


US bomb falls on Afghan village, child killed
Oct 12, 2001
AFP


A bomb dropped during a US raid on Kabul airport hit a nearby village, destroying several houses and killing a 12-year-old child, witnesses told AFP on Thursday.


U.S. Steps Up Afghan Raids, Reprisal Jitters Grow
Oct 11, 2001
Reuters

KABUL/WASHINGTON (Reuters) - U.S. planes unleashed their biggest raid to date on Afghanistan's ruling Taliban as the killing of a Westerner in Kuwait fueled fears of reprisals by Muslim radicals inspired by Osama bin Laden.


Residents Seen Fleeing Afghan City Kandahar -CNN
Oct 11, 2001
Reuters

ISLAMABAD (Reuters) - Residents of the southern Afghan city of Kandahar were fleeing the city, their belongings loaded onto donkeys and carts, after a night of intense bombing, CNN pictures showed on Thursday.


U.S. Personnel Said in Pakistan
Oct 11, 2001
AP

ISLAMABAD, Pakistan (AP) - U.S. personnel are on the ground in Pakistan in connection with the ongoing confrontation over Osama bin Laden Pakistani government officials said Thursday.


Spies wage secret war for hearts and minds
Oct 11, 2001
The Guardian

In a country where treachery and intrigue have long been weapons of war as effective as the Kalashnikov and the Stinger missile, Jalil is a precious asset, the very type of seasoned operator whom the western powers would kill for in their campaign to throttle Afghanistan's Taliban regime.


Northern city may hold key to toppling Taliban
Oct 11, 2001
The Guardian

A northern Afghan city nearly 200 miles from the capital, Kabul, is key to American plans to topple the Taliban.


Taliban leaders believed killed in raids
Oct 11, 2001
CNN

U.S. jets continued their bombing runs over Afghanistan early Thursday, one day after a U.S. official told CNN several Taliban leaders were believed to have been killed during the first round of attacks Sunday night.



A City of Exiles Dreams of Power Regained
Oct 11, 2001
The New York Times

They hold meetings, drink green tea, hold more meetings, drink more tea. Occasionally, they call Washington or Islamabad or Rome. These are exciting days. The world seems to have turned upside down, and that means they may be back on top.



Taliban's Troops Hit as Allies Plan for Commando Raid
Oct 11, 2001
The New York Times

American warplanes pounded barracks, garrisons and troop encampments across Afghanistan today in the heaviest airstrikes yet against ground forces of the Taliban regime, the protectors of the suspected terrorist Osama bin Laden and his network.



Even After Death, 'Lion' Remains King of the Rebels
Oct 11, 2001
The Washington Post

JABAL SARAJ, Afghanistan &#8211; As attention focuses on who will lead Afghanistan if the Taliban falls, an obvious candidate emerges from the opposition that has fought the radical Islamic movement for years. His face appears on posters in every building in every village of rebel-held territory. His voice rings out in the bazaars and in the guerrilla posts.


After 23 Years, Warlord Soldiers On
Oct 11, 2001
The Washington Post

TASHKENT, Uzbekistan, Oct. 10 &#8211; The warlord's lament suggests that victory will be neither swift nor easy.


Rebels Delay Move Against Kabul
Oct 11, 2001
The Washington Post

JABAL SARAJ, Afghanistan, Oct. 10 &#8211; Afghan opposition forces said today they have agreed to delay a crucial offensive to take control of Kabul until an interim government can be established to replace the ruling Taliban regime, a decision that could prolong military action in Afghanistan for weeks.


Pakistan Grants Airfield Use; U.S. Pounds Taliban Bunkers
Oct 11, 2001
The Washington Post

Pakistan has significantly deepened its involvement in the U.S.-led air campaign in neighboring Afghanistan by allowing American forces to begin using a pair of airfields, and a senior Pakistani military official said yesterday hundreds of troops have already moved in.


Afghans threatened with deportation
Oct 11, 2001
BBC

The government in Pakistan has warned that it will deport any Afghan refugees found to be involved in pro-Taleban demonstrations.


US targets Taleban bunkers
Oct 11, 2001
BBC

The United States has launched further air strikes on the Afghan capital, Kabul, in what eye witnesses describe as the most intense military bombardment since the campaign started on Sunday.


Big powers set out hopes for post-Taliban regime
Oct 11, 2001
The Financial Times

The US on Wednesday signalled that it expected a long-term involvement in Afghanistan as the big powers began turning their attention to how the country should be run after the expected collapse of Taliban rule.


Islamic Countries Warn U.S. About Expanding Attacks
Oct 11, 2001
The Washington Post

DOHA, Qatar, Oct. 10--A major conference of Islamic countries warned the United States today not to extend military action beyond Afghanistan to other Muslim or Arab countries, but made no criticism of the ongoing bombing campaign, with its evident goal of toppling the Taliban government.


U.S. Pounds Taliban; Mullah Calls for Muslim Help
Oct 11, 2001
Reuters

WASHINGTON/KABUL (Reuters) - U.S. warplanes pounded Afghanistan for a fourth day on Wednesday and the country's reclusive Islamic leader called for help from the Muslim world but seemed unlikely to get much official aid.



Ready for the land war
Oct 11, 2001
The Economist

Now that US-led forces have claimed air supremacy over the country, the Taliban's Afghan foes, the Northern Alliance, are ready to advance. Meanwhile, Osama bin Laden and the Taliban are claiming that a wider war, far beyond Afghanistan, is about to begin.


In Next Phase of Attacks, an Emphasis on Helicopter Strikes
Oct 11, 2001
The New York Times

The Pentagon is preparing to launch risky raids into Afghanistan using low-flying Army helicopter gunships to find and attack forces allied with Osama bin Laden's terrorist network and the Taliban government, two senior Pentagon officials said today.



Raids on Kabul Called Most Intense Since Bombing Began
Oct 11, 2001
The New York Times

American warplanes pounded Afghanistan for a fourth straight day hitting targets in and around the capital, Kabul, and Kandahar, the ruling Taliban's spiritual headquarters.



Bush: Time to 'Draw the Line in the Sand'
Oct 11, 2001
The Washington Post

As another day of bombing shook the Afghan capital of Kabul, President Bush declared Wednesday that "our calling" is the eradication of terrorism around the globe. "Now is the time to draw the line in the sand against the evil ones," he said.


OIC rejects strike against any Muslim country
Oct 11, 2001
The News

DOHA, Qatar: US-led strikes have begun, but Muslim leaders question whether the evidence supports the onslaught on Afghanistan or if ``innocent civilians'' are being caught up in the war on terrorism.


Pakistan assisting CIA in splitting Taliban: report
Oct 11, 2001
The News

WASHINGTON: The American Central Intelligence Agency (CIA) is being assisted by Pakistan in launching the covert operation of breaking away Taliban commanders, which constitutes a pivot of American strategy in Afghanistan.


French newsman, 2 Pakistanis to be tried for espionage
Oct 11, 2001
The News

ISLAMABAD: Taliban on Wednesday charged an arrested French reporter and two Pakistani guides with espionage, Islamabad-based Afghan Islamic Press (AIP) said.


Mulla Omar calls for Jihad
Oct 11, 2001
The News

PESHAWAR: Speaking publicly for the first time after surviving a US aerial strike on his home in Kandahar three days ago, Taliban supreme leader Mulla Mohammad Omar said on Wednesday that the Muslims worldwide should wage a jehad against America.


Zahir's family for demilitarisation of Kabul
Oct 11, 2001
The News

ROME: Afghanistan's former royal family has called for the immediate demilitarisation of the Afghan capital Kabul and expressed concern that chaos could return if US-led military strikes force the ouster of the country's ruling Taliban regime.


Cruise Missile Kills Several in Kabul - Taliban
Oct 11, 2001
Reuters

KABUL (Reuters) - Afghanistan (news - web sites)'s ruling Taliban said on Wednesday a U.S. cruise missile had hit a residential area in overnight bombing on the capital, Kabul, killing several people and destroying houses.


UNHCR Says Pakistan Protests Hamper Relief Effort
Oct 11, 2001
Reuters

GENEVA (Reuters) - The United Nations refugee agency said Wednesday demonstrations in Pakistan against military action in neighboring Afghanistan were seriously hampering relief efforts.


Officials: U.S. Jets Continue Raids on Afghanistan
Oct 11, 2001
Reuters

WASHINGTON (Reuters) - U.S. warplanes on Wednesday launched a fourth night of bombing raids on military targets across Afghanistan (news - web sites), including strikes around the capital of Kabul and the Taliban stronghold of Kandahar, Pentagon officials said.


Pentagon Adds 'Bunker-Buster' Bombs
Oct 11, 2001
AP

WASHINGTON (AP) - The Pentagon is adding 5,000-pound ``bunker-buster'' bombs to the mix of weapons aimed at shaking up the Taliban and laying ground for commando raids in Afghanistan, officials said Wednesday.


International street protest swells against US air attacks
Oct 11, 2001
AFP

Arab foreign ministers voiced support for the anti-terrorism fight while giving only a muted response to attacks on Afghanistan Wednesday, as Osama bin Laden's network urged all Muslims to join in a holy war against the United States.


Explosions Shake Afghan Capital
Oct 11, 2001
AP

KABUL, Afghanistan (news - web sites) (AP) - Heavy explosions from around the airport shook windows and anti-aircraft guns blazed overhead in the Afghan capital late Wednesday, after earlier U.S. strikes on the Taliban's home base of Kandahar in the south.


Front Line Now Haven for Taliban
Oct 11, 2001
The LA Times

JABAL OS SARAJ, Afghanistan -- Each evening just after sundown, convoys of heavily armed Taliban fighters push out of their bases in the Afghan capital, Kabul, and drive to the safest place they know: the front line.



Heaviest attacks yet shake Kabul
Oct 11, 2001
BBC

US jets have launched the heaviest air strikes yet on Kabul, as a fourth night of attacks gets underway.


Ousted Afghan Leader Says Taliban Must Be Destroyed
Oct 11, 2001
Reuters

DUSHANBE, Tajikistan (Reuters) - Burhanuddin Rabbani, ousted as Afghan president by the Taliban, said Wednesday the future of Afghanistan (news - web sites) could only be determined after the Taliban had been destroyed and peace restored.


WFP Steps Up Food Deliveries Into Afghanistan
Oct 11, 2001
Reuters

ROME (Reuters) - The U.N. World Food Program (WFP) said Wednesday it would step up its overland deliveries into Afghanistan (news - web sites), with convoys scheduled to cross the border from Pakistan, Iran, Turkmenistan and Tajikistan.


Relief agencies call for opening of aid corridors
Oct 11, 2001
The Irish Times

Aid corridors should be opened into Afghanistan to enable humanitarian organisations deliver supplies, according to the relief and development agencies Trócaire, Concern and GOAL.


Taliban Backs Down From Earlier Bin Laden Statement
Oct 11, 2001
Reuters

KABUL, Afghanistan (news - web sites) (Reuters) - U.S. warplanes pounded the Afghan capital for a fourth night Wednesday just after the ruling Taliban retreated from earlier remarks and insisted it had not lifted curbs on the world's most wanted man, Osama bin Laden.


Afghan Reports Says 76 Dead, 100 Injured in Raids
Oct 11, 2001
Reuters

ISLAMABAD (Reuters) - U.S. strikes on Afghanistan (news - web sites) since the attacks began Sunday night have killed 76 people across the country and injured about 100, the Afghan Islamic Press (AIP) and officials said Wednesday.


Explosions, Gunfire Near Kabul
Oct 11, 2001
AP

KABUL, Afghanistan (news - web sites) (AP) - Heavy explosions were heard from around Kabul's airport, and Taliban anti-aircraft batteries opened fire on high-flying jets over the Afghan capital Wednesday in the fourth night of the U.S.-led air campaign.


Afghan Rebels Head South
Oct 11, 2001
AP

WASHINGTON (AP) -- Since the U.S. bombing campaign began, anti-Taliban rebels in northern Afghanistan have begun moving south with their weapons, including Scud missiles, to prepare for a major offensive against the capital, Kabul.



UN Official Concerned Over Humanitarian Situation in Afghanistan
Oct 11, 2001


A top United Nations official says he is alarmed by the rapidly deteriorating humanitarian situation in Afghanistan.



Arab, Muslim Leaders Urge Caution in Anti-Terror Campaign
Oct 11, 2001
VOA

Islamic leaders meeting in Qatar Wednesday have urged the United States to restrict its military offensive against terrorist and Taleban facilities in Afghanistan.



Ousted Afghan President to Meet Tajik Leader
Oct 11, 2001
Reuters

DUSHANBE (Reuters) - Burhanuddin Rabbani, ousted as Afghan president by the Taliban, will meet Tajikistan President Imomali Rakhmanov on Wednesday to discuss U.S.-led military strikes on Afghanistan, a senior Tajik official said.



Islamic Group Says Blair 'Legitimate Target'
Oct 10, 2001
Reuters

DUBAI (Reuters) - A spokesman for a radical Islamic group was quoted on Wednesday as saying that British Prime Minister Tony Blair had become a "legitimate target" for Muslims because Britain joined U.S.-led strikes on Muslim Afghanistan.



CIA's Stealth War Centers on Eroding Taliban Loyalty and Aiding Opposition
Oct 10, 2001
The Washington Post

The United States announced its war in Afghanistan with dramatic airstrikes Sunday but the campaign could ultimately be won by the covert efforts of American and Pakistani agents to win over commanders in the south and east of the country who are the base of Taliban support, according to current and former U.S. officials.


Rebels Capture Northern Areas, Cut Off Taliban Supply Route
Oct 10, 2001
The Washington Post

JABAL SARAJ, Afghanistan, Oct. 9 -- Afghan rebels have capitalized on U.S. airstrikes to advance against Taliban military positions, capturing several northern districts and cutting off a key supply route in a bid to control a large swath of northern Afghanistan, rebel leaders said today.


Bin Laden Spokesman Threatens More Strikes
Oct 10, 2001
The New York Times

Al Qaeda, the embattled terrorist network of Osama bin Laden, appealed passionately today to Muslims everywhere to mobilize for a "jihad," or holy war, against the United States and its interests around the world.



Pakistan, in a Border Clash, Turns Back Taliban Forces
Oct 10, 2001
The New York Times

ISLAMABAD, Pakistan, Oct. 9 &#8212; Border troops fought a two-hour gun battle today with Taliban soldiers at a frontier crossing with Afghanistan. The fighting increased pressures on President Pervez Musharraf as he struggled to keep the lid on spreading pro-Taliban protests across Pakistan.



Taliban: Fresh Strikes on Kandahar
Oct 10, 2001
AP

KABUL, Afghanistan (news - web sites) (AP) - Jets dropped three bombs Wednesday morning near the airport in the southern city of Kandahar, Taliban sources said. It was the second straight morning of daylight raids on the Taliban stronghold.


Anti-war groups widen protests
Oct 10, 2001
The Guardian

The British anti-war movement shifted into high gear last night with a nationwide series of vigils and demonstrations against the bombing of Afghanistan.


Fears grow over true intentions of Northern Alliance
Oct 10, 2001
The Guardian

Doubts were surfacing within the international coalition yesterday over the wisdom of using Afghanistan's Northern Alliance opposition as a proxy vehicle to topple the Taliban from power.


More Combat Near Tajik Border
Oct 10, 2001
AP

DUSHANBE, Tajikistan (AP) - Fighting between Afghanistan (news - web sites)'s opposition northern alliance and the ruling Taliban intensified Tuesday as the U.S. continued its airstrikes.


Fear and goading on the frontline
Oct 10, 2001
The Guardian

It is the first light after the first night of bombing and the men of the Northern Alliance are back on their walkie-talkies, speaking across a distance not much longer than a village high street. They have some questions from foreigners to put to the Taliban. At first they begin with the usual teasing.


The book they are all reading
Oct 10, 2001
The Guardian

Tony Blair's plans for post-Taliban Afghanistan are heavily influenced by a book that argues that the country's stability lies in a multi-tribal government in which bordering states do not seek predominant influence.


Afghan Refugees Say Taliban Arming Young Boys
Oct 10, 2001
Reuters

CHAMAN, Pakistan (Reuters) - Afghanistan (news - web sites)'s ruling Taliban movement is arming young boys with guns and stopping families from fleeing a country under U.S.-led air attacks, refugees trickling into neighboring Pakistan said Tuesday.


Civilians Mourn Dead in Kabul
Oct 10, 2001
AP

KABUL, Afghanistan (AP) -- In the rubble of what had been an unassuming two-story building on Kabul's outskirts, Mohammed Afzl wept Tuesday for his brother -- one of the first four confirmed civilian casualties of the U.S.-led air war against the Taliban and Osama bin Laden.


U.S., Al Qaeda Both See Long War Ahead
Oct 10, 2001
Reuters

WASHINGTON/KABUL - The United States claimed control of the Afghan skies on Tuesday as the al Qaeda network that it is trying to destroy issued a defiant warning of more attacks like the ones that demolished the World Trade Center four weeks ago.



Alliance plans assault on key cities
Oct 10, 2001
Daily Telegraph

THE Northern Alliance is preparing a multi-pronged attack to try to seize several key cities in northern Afghanistan and cut off thousands of Taliban fighters.



Arab Foreign Ministers Mull Response to US-Led Air Strikes
Oct 10, 2001
VOA

The Organization of the Islamic Conference meets Wednesday in Qatar to discuss terrorism and an official response to the U.S.-led air strikes against the Taleban.



US Soldier Injured in Afghanistan-Related Mission
Oct 10, 2001
Reuters

WASHINGTON (Reuters) - A U.S. soldier involved in supporting U.S. strikes on Afghanistan was injured at an undisclosed location on Tuesday when he became trapped between two military vehicles, U.S. Central Command said.



Taliban Guest Bin Laden Free to Wage Holy War
Oct 10, 2001
Reuters

KABUL (Reuters) - Afghanistan's ruling Taliban said on Wednesday they had lifted all restrictions on the world's most wanted man, Osama bin Laden, and he was free to wage a holy war against the United States.



Indian hospital for Afghan refugees on Tajik border
Oct 10, 2001
NNI

NEW DELHI: A hospital built with Indian aid for Afghan refugees has become operational near Parakhor town on the Tajkistan-Afghan border, Defence Minister Jaswant Singh said here today.


Allied Airstrikes Aimed at Taliban
Oct 9, 2001
AP

WASHINGTON (AP) - The U.S.-led assault on Afghanistan has rained bombs and missiles on the meager military forces of the Taliban, disabling all but one of their air bases, blinding their air defenses and pounding a pocket of ground troops and several suspected terrorist training camps, officials said Tuesday.



Pakistan Police Kill 4 Youths
Oct 9, 2001
AP

QUETTA, Pakistan &#8211;&#8211; Besieged police officers in a restive border province fatally shot a 13-year-old boy and three other students in a second day of violence as Muslim mullahs fanned sentiment against U.S. air raids on neighboring Afghanistan.



Next Phase To Include More Troops
Oct 9, 2001
The Washington Post

When the U.S. bombing campaign in Afghanistan starts to wind down at the end of this week, the Pentagon plans to begin the next phase of the war on terrorism by sending a significant number of additional ground troops to the Mideast and Central Asia, defense officials said yesterday.


U.S. Air Attack Kills 4 Civilians at U.N. Office in Kabul
Oct 9, 2001
The Washington Post

ISLAMABAD, Pakistan, Oct. 9&#8212;U.S. warplanes mistakenly bombed offices of a land mine removal organization near Kabul early today, killing four guards&#8212;the first independently confirmed civilian deaths of the three-day-old anti-terrorism attacks against Afghanistan.


Blair Tells Afghans: We Will Not Abandon You Again
Oct 9, 2001
Reuters

LONDON (Reuters) - British Prime Minister Tony Blair (news - web sites) told the Afghan people in a targeted radio interview Tuesday that the West would not abandon them after U.S.-led air and missile raids on Taliban targets had been completed.


In Afghanistan, Anti-Taliban Forces See U.S. Airstrikes as Falling Short
Oct 9, 2001
The LA Times

JABAL OS SARAJ, Afghanistan -- In the shabby teahouses of northern Afghanistan, men with Kalashnikovs gathered Monday to drink sugary green tea, talk about the U.S. attack on the enemy Taliban, to pray and remember the dead.



Pentagon investigating report of strike on de-mining agency
Oct 9, 2001
AFP

The Pentagon is investigating whether a stray US cruise missile hit an Afghan de-mining agency in Kabul where four civilians were killed in Monday night's air strikes, a Pentagon official said Tuesday.


Afghan Taliban Accuse French Reporter of Spying
Oct 9, 2001
Reuters

ISLAMABAD, Pakistan (Reuters) - The ruling Taliban have accused a burqa-clad French reporter arrested in eastern Afghanistan (news - web sites) of spying and said they will try him in a special court, the Afghan Islamic Press agency reported Tuesday.


Former Afghan Leader Criticizes US
Oct 9, 2001
AP

TEHRAN, Iran (AP) - A former Afghan prime minister whose forces once laid siege to Kabul claimed Tuesday the U.S.-led attacks aim to install a ``puppet regime'' to extend American influence in the region.


Afghan Opposition Says Defectors Close Main Road
Oct 9, 2001
Reuters

JABAL-US-SARAJ, Afghanistan (news - web sites) (Reuters) - A group of commanders from the ruling Taliban militia have switched sides and closed the only road linking north and south Afghanistan, a senior opposition Northern Alliance official said Tuesday.


Rumsfeld Says Allied Planes Can Fly 'Around the Clock'
Oct 9, 2001
The New York Times

The United States unleashed a third round of air strikes in the evening hours of Afghanistan today, and Defense Secretary Donald H. Rumsfeld said the attacks since Sunday had been so successful that American and British warplanes could fly "more or less around the clock, as we wish."


Taliban says 35 have died in missile strikes, bin Laden alive
Oct 9, 2001
AFP

Three days of US-led strikes in Afghanistan have failed to track down either Osama bin Laden, the world's most wanted man, or the Taliban's supreme leader, but have left scores of civilian casualties, the regime said Tuesday.



Angry Kabul residents turn to God and the Taliban after US bombings
Oct 9, 2001
AFP

While many residents of Afghanistan's increasingly deserted capital begged for God's protection Tuesday after US bombs killed four civilians, some began building home-made shelters and others turned to the Taliban.



Africa's near-silence over Afghanistan reflects deep worries
Oct 9, 2001
AFP

The almost total silence of African governments over US-led air and missile strikes against Afghanistan reflects widespread alarm over the likely economic and social fallout of the conflict for Africa.



UN mine disposal team killed in Kabul as US launches daytime strikes
Oct 9, 2001
AFP

US airstrikes killed a small number of Afghan civilians Tuesday, the United Nations and the Taliban said, but the regime claimed its supreme leader had escaped an attack on his home.



Afghanistan Aid Called Propaganda
Oct 9, 2001
AP

PARIS &#8211;&#8211; Nobel Peace Prize winner Medecins Sans Frontieres condemned the humanitarian operation accompanying the U.S.-led strikes on Afghanistan as "military propaganda" designed to justify the strikes.



'Trapping US in Afghanistan a Russian ploy'
Oct 9, 2001
Daily Dawn

Notwithstanding the government stand to join the global coalition against terrorism, the public sentiment in the Frontier province, as elsewhere in the country, created in the backdrop of the American military action in Afghanistan signifies that the conflict could drag on for years.


Jet Drops Bomb Near Kabul Airport
Oct 9, 2001
AP

KABUL, Afghanistan &#8211;&#8211; After a second night of air attacks, a lone jet woke up Kabul about dawn Tuesday with a single bomb dropped near the airport. A missile streaked into the eastern edge of the capital minutes later.



Arab Militants Ready to Fight to Death
Oct 9, 2001
AP

ISLAMABAD, Pakistan &#8211;&#8211; Thousands of Arab militants, unable to return to their homelands where they are considered enemies of the state, will choose to fight to the death against the U.S.-led offensive, according former Afghan fighters.



Taliban Leaders Say Stronghold Bombed
Oct 9, 2001
AP

KABUL, Afghanistan (AP) - Jets bombed the stronghold of Afghanistan's ruling Taliban militia in southern Kandahar hours after dawn Tuesday, Taliban officials said. It was the first daylight raid since U.S.-led attacks began.



Kandahar Hit in First Day-Time Bombing
Oct 9, 2001
VOA

Western warplanes are reported to have bombed the southern Afghan city of Kandahar again this morning, drawing heavy anti-aircraft fire. It was the first day-time raid since the U.S. led military strikes in Afghanistan began Sunday.



Taleban Vows Hard Fight Against US
Oct 9, 2001
VOA

Afghanistan's ruling Taleban has vowed to fight hard against the U.S. and British military action. The Afghan Islamic Press agency quotes a Taleban spokesman as making the pledge Monday after a meeting of the Taleban cabinet.



Tajikistan Opens Airspace To US
Oct 9, 2001
VOA

Tajikistan says it is opening its airspace for U.S. wa

  † In Memoriam † maandag 15 oktober 2001 @ 19:28:06 #118
13819 Loedertje
Trotse GILF.
pi_1909335
das Leben, mal rückwärts betrachtet


Das Leben sollte mit dem Tod beginnen, nicht andersherum.

Zuerst gehst du ins Altersheim,
wirst rausgeschmissen, wenn du zu jung wirst,
spielst danach ein paar Jahre Golf,
kriegst eine goldene Uhr und beginnst zu arbeiten.
Anschließend geht's auf die Uni.
Du hast inzwischen genug Erfahrung,
das Studentenleben richtig zu genießen,
nimmst Drogen und säufst.
Nach der Schule spielst du fünf, sechs Jahre,
dümpelst neun Monate in einer Gebärmutter
und beendest dein Leben
als Orgasmus

  † In Memoriam † maandag 15 oktober 2001 @ 19:29:27 #119
13819 Loedertje
Trotse GILF.
pi_1909346
Die meisten Menschen denken hauptsächlich über das nach,
was die anderen Menschen über sie denken

  † In Memoriam † maandag 15 oktober 2001 @ 19:43:31 #120
13819 Loedertje
Trotse GILF.
  † In Memoriam † maandag 15 oktober 2001 @ 19:44:33 #121
13819 Loedertje
Trotse GILF.
  † In Memoriam † maandag 15 oktober 2001 @ 19:47:39 #122
13819 Loedertje
Trotse GILF.
pi_1909513
code:
Public Function LoadFile(FileName As String) As Boolean
    'Declare private variables
    Dim Text As String 'Variable to store input from file
    Dim ErrorOccured As Boolean 'Variable used as returnVariable
    
    'Clear all project Variables
    Project.Files.Clear
    Project.ProjectFile = ""
    Project.ProjectHome = ""
    Project.ProjectName = ""
    Project.ProjectOutput = ""
    
    'Read File
    On Error Resume Next
    Open FileName For Input As #1
        If Err Then ErrorOccured = True: GoTo LeaveLoadFile 'Return False if file does not exist or any other error occures while trying to load the file
        
        'No Errors occured when loading the file. ProjectFile can be set to FileName
        Project.ProjectFile = FileName
        'Read lines from files until end of file
        Do
            If EOF(1) Then Exit Do
            Line Input #1, Text
            r = InStr(Text, "=")
            If r > 0 Then
                Select Case Left(Text, r - 1)
                Case "ProjectName": Project.ProjectName = Right(Text, Len(Text) - r)
                Case "ProjectHome": Project.ProjectHome = Right(Text, Len(Text) - r)
                Case "ProjectOutput": Project.ProjectOutput = Right(Text, Len(Text) - r)
                Case "File": Project.Files.AddItem Right(Text, Len(Text) - r)
            End If
        Loop
    Close
    On Error GoTo 0
LeaveLoadFile:
    LoadFile = Not ErrorOccured
End Function

  † In Memoriam † maandag 15 oktober 2001 @ 19:48:42 #124
13819 Loedertje
Trotse GILF.
  † In Memoriam † maandag 15 oktober 2001 @ 21:17:30 #125
13819 Loedertje
Trotse GILF.
  maandag 15 oktober 2001 @ 21:18:01 #126
16972 Davilex
haak me dan!!!
pi_1910575
Een hoogslaper? of stapelbed?
http://homocultuur.startkabel.nl
pi_1911197
quote:
Op maandag 15 oktober 2001 10:27 schreef Smots het volgende:
Dus dit mag niet?

[knip]


NEE
quote:
Nee, JIJ trekt volle zalen!
OHOHOHO, die heb jij van Studio Spaan gejat!!! (denk ik)
  † In Memoriam † maandag 15 oktober 2001 @ 22:03:21 #128
13819 Loedertje
Trotse GILF.
pi_1911237
quote:
Op maandag 15 oktober 2001 21:18 schreef Davilex het volgende:
Een hoogslaper? of stapelbed?
Jij hebt toch een hoogslaper met allemaal wasrekjes aan de buitenkant d8 ik ?

(kunnen die handoekjes alle 12 zelfstandig rechtop blijven staan ??)

pi_1911239
* ah fijn, effe weer wat frustratie weggooien *

Protection des renseignements personnels, Loi sur la


CHAPITRE P-21

Loi visant à compléter la législation canadienne en matière de protection des renseignements personnels et de droit d'accès des individus aux renseignements personnels qui les concernent

TITRE ABRÉGÉ

Titre abrégé
1. Loi sur la protection des renseignements personnels.

1980-81-82-83, ch. 111, ann. II «1».

OBJET DE LA LOI

Objet
2. La présente loi a pour objet de compléter la législation canadienne en matière de protection des renseignements personnels relevant des institutions fédérales et de droit d'accès des individus aux renseignements personnels qui les concernent.

1980-81-82-83, ch. 111, ann. II «2».

DÉFINITIONS

Définitions
3. Les définitions qui suivent s'appliquent à la présente loi.

«Commissaire à la protection de la vie privée» "Privacy Commissioner"
«Commissaire à la protection de la vie privée» Le commissaire nommé en vertu de l'article 53.

«Cour» "Court"
«Cour» La Section de première instance de la Cour fédérale.

« déficience sensorielle » "sensory disability"
« déficience sensorielle » Toute déficience liée à la vue ou à l'ouïe.

«fichier de renseignements personnels» "personal information bank"
«fichier de renseignements personnels» Tout ensemble ou groupement de renseignements personnels défini à l'article 10.

«fins administratives» "administrative purpose"
«fins administratives» Destination de l'usage de renseignements personnels concernant un individu dans le cadre d'une décision le touchant directement.

«institution fédérale» "government institution"
«institution fédérale» Tout ministère ou département d'État relevant du gouvernement du Canada, ou tout organisme, figurant à l'annexe.

«ministre désigné» "designated Minister"
«ministre désigné» Le membre du Conseil privé de la Reine pour le Canada chargé par le gouverneur en conseil de l'application d'une ou de plusieurs dispositions de la présente loi.

«renseignements personnels» "personal information"
«renseignements personnels» Les renseignements, quels que soient leur forme et leur support, concernant un individu identifiable, notamment :

a) les renseignements relatifs à sa race, à son origine nationale ou ethnique, à sa couleur, à sa religion, à son âge ou à sa situation de famille;

b) les renseignements relatifs à son éducation, à son dossier médical, à son casier judiciaire, à ses antécédents professionnels ou à des opérations financières auxquelles il a participé;

c) tout numéro ou symbole, ou toute autre indication identificatrice, qui lui est propre;

d) son adresse, ses empreintes digitales ou son groupe sanguin;

e) ses opinions ou ses idées personnelles, à l'exclusion de celles qui portent sur un autre individu ou sur une proposition de subvention, de récompense ou de prix à octroyer à un autre individu par une institution fédérale, ou subdivision de celle-ci visée par règlement;

f) toute correspondance de nature, implicitement ou explicitement, privée ou confidentielle envoyée par lui à une institution fédérale, ainsi que les réponses de l'institution dans la mesure où elles révèlent le contenu de la correspondance de l'expéditeur;

g) les idées ou opinions d'autrui sur lui;

h) les idées ou opinions d'un autre individu qui portent sur une proposition de subvention, de récompense ou de prix à lui octroyer par une institution, ou subdivision de celle-ci, visée à l'alinéa e), à l'exclusion du nom de cet autre individu si ce nom est mentionné avec les idées ou opinions;

i) son nom lorsque celui-ci est mentionné avec d'autres renseignements personnels le concernant ou lorsque la seule divulgation du nom révélerait des renseignements à son sujet;

toutefois, il demeure entendu que, pour l'application des articles 7, 8 et 26, et de l'article 19 de la Loi sur l'accès à l'information, les renseignements personnels ne comprennent pas les renseignements concernant :

j) un cadre ou employé, actuel ou ancien, d'une institution fédérale et portant sur son poste ou ses fonctions, notamment :

(i) le fait même qu'il est ou a été employé par l'institution,

(ii) son titre et les adresse et numéro de téléphone de son lieu de travail,

(iii) la classification, l'éventail des salaires et les attributions de son poste,

(iv) son nom lorsque celui-ci figure sur un document qu'il a établi au cours de son emploi,

(v) les idées et opinions personnelles qu'il a exprimées au cours de son emploi;

k) un individu qui, au titre d'un contrat, assure ou a assuré la prestation de services à une institution fédérale et portant sur la nature de la prestation, notamment les conditions du contrat, le nom de l'individu ainsi que les idées et opinions personnelles qu'il a exprimées au cours de la prestation;

l) des avantages financiers facultatifs, notamment la délivrance d'un permis ou d'une licence accordés à un individu, y compris le nom de celui-ci et la nature précise de ces avantages;

m) un individu décédé depuis plus de vingt ans.

«responsable d'institution fédérale» "head"
«responsable d'institution fédérale»

a) Le membre du Conseil privé de la Reine pour le Canada sous l'autorité de qui est placé un ministère ou un département d'État;

b) la personne désignée par décret, conformément au présent alinéa, en qualité de responsable, pour l'application de la présente loi, d'une institution fédérale autre que celles mentionnées à l'alinéa a).

« support de substitution » "alternative format"
« support de substitution » Tout support permettant à une personne ayant une déficience sensorielle de lire ou d'écouter des renseignements personnels.

L.R. (1985), ch. P-21, art. 3; 1992, ch. 1, art. 144(F), ch. 21, art. 34.

COLLECTE, CONSERVATION ET RETRAIT DES RENSEIGNEMENTS PERSONNELS

Collecte des renseignements personnels
4. Les seuls renseignements personnels que peut recueillir une institution fédérale sont ceux qui ont un lien direct avec ses programmes ou ses activités.

1980-81-82-83, ch. 111, ann. II «4».

Origine des renseignements personnels
5. (1) Une institution fédérale est tenue de recueillir auprès de l'individu lui-même, chaque fois que possible, les renseignements personnels destinés à des fins administratives le concernant, sauf autorisation contraire de l'individu ou autres cas d'autorisation prévus au paragraphe 8(2).

Mise au courant de l'intéressé
(2) Une institution fédérale est tenue d'informer l'individu auprès de qui elle recueille des renseignements personnels le concernant des fins auxquelles ils sont destinés.

Exceptions
(3) Les paragraphes (1) et (2) ne s'appliquent pas dans les cas où leur observation risquerait :

a) soit d'avoir pour résultat la collecte de renseignements inexacts;

b) soit de contrarier les fins ou de compromettre l'usage auxquels les renseignements sont destinés.

1980-81-82-83, ch. 111, ann. II «5».

Conservation des renseignements personnels utilisés à des fins administratives
6. (1) Les renseignements personnels utilisés par une institution fédérale à des fins administratives doivent être conservés après usage par l'institution pendant une période, déterminée par règlement, suffisamment longue pour permettre à l'individu qu'ils concernent d'exercer son droit d'accès à ces renseignements.

Exactitude des renseignements
(2) Une institution fédérale est tenue de veiller, dans la mesure du possible, à ce que les renseignements personnels qu'elle utilise à des fins administratives soient à jour, exacts et complets.

Retrait des renseignements personnels
(3) Une institution fédérale procède au retrait des renseignements personnels qui relèvent d'elle conformément aux règlements et aux instructions ou directives applicables du ministre désigné.

1980-81-82-83, ch. 111, ann. II «6».

PROTECTION DES RENSEIGNEMENTS PERSONNELS

Usage des renseignements personnels
7. À défaut du consentement de l'individu concerné, les renseignements personnels relevant d'une institution fédérale ne peuvent servir à celle-ci :

a) qu'aux fins auxquelles ils ont été recueillis ou préparés par l'institution de même que pour les usages qui sont compatibles avec ces fins;

b) qu'aux fins auxquelles ils peuvent lui être communiqués en vertu du paragraphe 8(2).

1980-81-82-83, ch. 111, ann. II «7».

Communication des renseignements personnels
8. (1) Les renseignements personnels qui relèvent d'une institution fédérale ne peuvent être communiqués, à défaut du consentement de l'individu qu'ils concernent, que conformément au présent article.

Cas d'autorisation
(2) Sous réserve d'autres lois fédérales, la communication des renseignements personnels qui relèvent d'une institution fédérale est autorisée dans les cas suivants :

a) communication aux fins auxquelles ils ont été recueillis ou préparés par l'institution ou pour les usages qui sont compatibles avec ces fins;

b) communication aux fins qui sont conformes avec les lois fédérales ou ceux de leurs règlements qui autorisent cette communication;

c) communication exigée par subpoena, mandat ou ordonnance d'un tribunal, d'une personne ou d'un organisme ayant le pouvoir de contraindre à la production de renseignements ou exigée par des règles de procédure se rapportant à la production de renseignements;

d) communication au procureur général du Canada pour usage dans des poursuites judiciaires intéressant la Couronne du chef du Canada ou le gouvernement fédéral;

e) communication à un organisme d'enquête déterminé par règlement et qui en fait la demande par écrit, en vue de faire respecter des lois fédérales ou provinciales ou pour la tenue d'enquêtes licites, pourvu que la demande précise les fins auxquelles les renseignements sont destinés et la nature des renseignements demandés;

f) communication aux termes d'accords ou d'ententes conclus d'une part entre le gouvernement du Canada ou un de ses organismes et, d'autre part, le gouvernement d'une province ou d'un État étranger, une organisation internationale d'États ou de gouvernements, ou un de leurs organismes, en vue de l'application des lois ou pour la tenue d'enquêtes licites;

g) communication à un parlementaire fédéral en vue d'aider l'individu concerné par les renseignements à résoudre un problème;

h) communication pour vérification interne au personnel de l'institution ou pour vérification comptable au bureau du contrôleur général ou à toute personne ou tout organisme déterminé par règlement;

i) communication aux Archives nationales du Canada pour dépôt;

j) communication à toute personne ou à tout organisme, pour des travaux de recherche ou de statistique, pourvu que soient réalisées les deux conditions suivantes :

(i) le responsable de l'institution est convaincu que les fins auxquelles les renseignements sont communiqués ne peuvent être normalement atteintes que si les renseignements sont donnés sous une forme qui permette d'identifier l'individu qu'ils concernent,

(ii) la personne ou l'organisme s'engagent par écrit auprès du responsable de l'institution à s'abstenir de toute communication ultérieure des renseignements tant que leur forme risque vraisemblablement de permettre l'identification de l'individu qu'ils concernent;

k) communication à tout gouvernement autochtone, association d'autochtones, bande d'Indiens, institution fédérale ou subdivision de celle-ci, ou à leur représentant, en vue de l'établissement des droits des peuples autochtones ou du règlement de leurs griefs;

l) communication à toute institution fédérale en vue de joindre un débiteur ou un créancier de Sa Majesté du chef du Canada et de recouvrer ou d'acquitter la créance;

m) communication à toute autre fin dans les cas où, de l'avis du responsable de l'institution :

(i) des raisons d'intérêt public justifieraient nettement une éventuelle violation de la vie privée,

(ii) l'individu concerné en tirerait un avantage certain.

Communication de renseignements personnels par les Archives nationales
(3) Sous réserve des autres lois fédérales, les renseignements personnels qui relèvent des Archives nationales du Canada et qui y ont été versés pour dépôt ou à des fins historiques par une institution fédérale peuvent être communiqués conformément aux règlements pour des travaux de recherche ou de statistique.

Copie des demandes faites en vertu de l'al. (2)e)
(4) Le responsable d'une institution fédérale conserve, pendant la période prévue par les règlements, une copie des demandes reçues par l'institution en vertu de l'alinéa (2)e) ainsi qu'une mention des renseignements communiqués et, sur demande, met cette copie et cette mention à la disposition du Commissaire à la protection de la vie privée.

Avis de communication dans le cas de l'al. (2)m)
(5) Dans le cas prévu à l'alinéa (2)m), le responsable de l'institution fédérale concernée donne un préavis écrit de la communication des renseignements personnels au Commissaire à la protection de la vie privée si les circonstances le justifient; sinon, il en avise par écrit le Commissaire immédiatement après la communication. La décision de mettre au courant l'individu concerné est laissée à l'appréciation du Commissaire.

Définition de «bande d'Indiens»
(6) L'expression «bande d'Indiens» à l'alinéa (2)k) désigne :

a) soit une bande au sens de la Loi sur les Indiens;

b) soit une bande au sens de la Loi sur les Cris et les Naskapis du Québec, chapitre 18 des Statuts du Canada de 1984;

c) soit la bande au sens de la Loi sur l'autonomie gouvernementale de la bande indienne sechelte, chapitre 27 des Statuts du Canada de 1986;

d) la première nation dont le nom figure à l'annexe II de la Loi sur l'autonomie gouvernementale des premières nations du Yukon.

Définition de « gouvernement autochtone »
(7) L'expression « gouvernement autochtone » à l'alinéa (2)k) s'entend du gouvernement nisga'a, au sens de l'Accord définitif nisga'a mis en vigueur par la Loi sur l'Accord définitif nisga'a.

L.R. (1985), ch. P-21, art. 8; L.R. (1985), ch. 20 (2e suppl.), art. 13, ch. 1 (3e suppl.), art. 12; 1994, ch. 35, art. 39; 2000, ch. 7, art. 26.

Relevé
9. (1) Le responsable d'une institution fédérale fait un relevé des cas d'usage, par son institution, de renseignements personnels versés dans un fichier de renseignements personnels, ainsi que des usages ou fins auxquels ils ont été communiqués par son institution si ceux-ci ne figurent pas parmi les usages et fins énumérés dans le répertoire prévu au paragraphe 11(1), en vertu du sous-alinéa 11(1)a)(iv) et du paragraphe 11(2); il joint le relevé aux renseignements personnels.

Exception
(2) Le paragraphe (1) ne s'applique pas aux renseignements communiqués en vertu de l'alinéa 8(2)e).

Appartenance du relevé aux renseignements personnels
(3) Le relevé mentionné au paragraphe (1) devient lui-même un renseignement personnel qui fait partie des renseignements personnels utilisés ou communiqués.

Usages compatibles
(4) Dans les cas où des renseignements personnels versés dans un fichier de renseignements personnels relevant d'une institution fédérale sont destinés à un usage, ou communiqués pour un usage, compatible avec les fins auxquelles les renseignements ont été recueillis ou préparés par l'institution, mais que l'usage n'est pas l'un de ceux qui, en vertu du sous-alinéa 11(1)a)(iv), sont indiqués comme usages compatibles dans le répertoire visé au paragraphe 11(1), le responsable de l'institution fédérale est tenu :

a) d'aviser immédiatement le Commissaire à la protection de la vie privée de l'usage qui a été fait des renseignements ou pour lequel ils ont été communiqués;

b) de faire insérer une mention de cet usage dans la liste des usages compatibles énumérés dans l'édition suivante du répertoire.

1980-81-82-83, ch. 111, ann. II «9»; 1984, ch. 21, art. 89.

FICHIERS DE RENSEIGNEMENTS PERSONNELS

Renseignements personnels versés dans les fichiers de renseignements personnels
10. (1) Le responsable d'une institution fédérale veille à ce que soient versés dans des fichiers de renseignements personnels tous les renseignements personnels qui relèvent de son institution et qui :

a) ont été, sont ou peuvent être utilisés à des fins administratives;

b) sont marqués de façon à pouvoir être retrouvés par référence au nom d'un individu ou à un numéro, symbole ou autre indication identificatrice propre à cet individu.

Exception dans le cas des Archives nationales du Canada
(2) Le paragraphe (1) ne s'applique pas aux renseignements personnels qui relèvent des Archives nationales du Canada et qui y ont été versés par une institution fédérale pour dépôt ou à des fins historiques.

L.R. (1985), ch. P-21, art. 10; L.R. (1985), ch. 1 (3e suppl.), art. 12.

RÉPERTOIRE DE RENSEIGNEMENTS PERSONNELS

Publication du répertoire
11. (1) Le ministre désigné fait publier, selon une périodicité au moins annuelle, un répertoire :

a) d'une part, de tous les fichiers de renseignements personnels, donnant, pour chaque fichier, les indications suivantes :

(i) sa désignation, son contenu, la cote qui lui a été attribuée par le ministre désigné, conformément à l'alinéa 71(1)b), ainsi que la désignation des catégories d'individus sur qui portent les renseignements personnels qui y sont versés,

(ii) le nom de l'institution fédérale de qui il relève,

(iii) les titre et adresse du fonctionnaire chargé de recevoir les demandes de communication des renseignements personnels qu'il contient,

(iv) l'énumération des fins auxquelles les renseignements personnels qui y sont versés ont été recueillis ou préparés de même que l'énumération des usages, compatibles avec ces fins, auxquels les renseignements sont destinés ou pour lesquels ils sont communiqués,

(v) l'énumération des critères qui s'appliquent à la conservation et au retrait des renseignements personnels qui y sont versés,

(vi) s'il y a lieu, le fait qu'il a fait l'objet d'un décret pris en vertu de l'article 18 et la mention de la disposition des articles 21 ou 22 sur laquelle s'appuie le décret;

b) d'autre part, de toutes les catégories de renseignements personnels qui relèvent d'une institution fédérale mais ne sont pas versés dans des fichiers de renseignements personnels, donnant, pour chaque catégorie, les indications suivantes :

(i) son contenu, en termes suffisamment précis pour faciliter l'exercice du droit d'accès prévu par la présente loi,

(ii) les titre et adresse du fonctionnaire de l'institution chargé de recevoir les demandes de communication des renseignements personnels qu'elle contient.

Énumération des usages et fins
(2) Le ministre désigné peut insérer, dans le répertoire, des usages ou fins non prévus au sous-alinéa (1)a)(iv) mais s'appliquant, dans le cadre de communications courantes, à des renseignements personnels versés dans les fichiers de renseignements personnels.

Diffusion
(3) Le ministre désigné est responsable de la diffusion du répertoire dans tout le Canada, étant entendu que toute personne a le droit d'en prendre normalement connaissance.

1980-81-82-83, ch. 111, ann. II «11».

ACCÈS AUX RENSEIGNEMENTS PERSONNELS

Droit d'accès

Droit d'accès
12. (1) Sous réserve des autres dispositions de la présente loi, tout citoyen canadien et tout résident permanent, au sens de la Loi sur l'immigration, a le droit de se faire communiquer sur demande :

a) les renseignements personnels le concernant et versés dans un fichier de renseignements personnels;

b) les autres renseignements personnels le concernant et relevant d'une institution fédérale, dans la mesure où il peut fournir sur leur localisation des indications suffisamment précises pour que l'institution fédérale puisse les retrouver sans problèmes sérieux.

Autres droits
(2) Tout individu qui reçoit communication, en vertu de l'alinéa (1)a), de renseignements personnels qui ont été, sont ou peuvent être utilisés à des fins administratives, a le droit :

a) de demander la correction des renseignements personnels le concernant qui, selon lui, sont erronés ou incomplets;

b) d'exiger, s'il y a lieu, qu'il soit fait mention des corrections qui ont été demandées mais non effectuées;

c) d'exiger :

(i) que toute personne ou tout organisme à qui ces renseignements ont été communiqués pour servir à des fins administratives dans les deux ans précédant la demande de correction ou de mention des corrections non effectuées soient avisés de la correction ou de la mention,

(ii) que l'organisme, s'il s'agit d'une institution fédérale, effectue la correction ou porte la mention sur toute copie de document contenant les renseignements qui relèvent de lui.

Extension par décret
(3) Le gouverneur en conseil peut, par décret, étendre, conditionnellement ou non, le droit d'accès visé au paragraphe (1) à des individus autres que ceux qui y sont mentionnés.

1980-81-82-83, ch. 111, ann. II «12».

Demandes de communication

Demande de communication prévue à l'al. 12(1)a)
13. (1) La demande de communication des renseignements personnels visés à l'alinéa 12(1)a) se fait par écrit auprès de l'institution fédérale de qui relève le fichier de renseignements personnels où ils sont versés et doit comporter la désignation du fichier.

Demande de communication prévue à l'al. 12(1)b)
(2) La demande de communication des renseignements personnels visés à l'alinéa 12(1)b) se fait par écrit auprès de l'institution fédérale de qui relèvent les renseignements; elle doit contenir sur leur localisation des indications suffisamment précises pour que l'institution puisse les retrouver sans problèmes sérieux.

1980-81-82-83, ch. 111, ann. II «13».

Notification
14. Le responsable de l'institution fédérale à qui est faite une demande de communication de renseignements personnels en vertu du paragraphe 12(1) est tenu, dans les trente jours suivant sa réception, sous réserve de l'article 15 :

a) d'aviser par écrit la personne qui a fait la demande de ce qu'il sera donné ou non communication totale ou partielle des renseignements personnels;

b) le cas échéant, de procéder à la communication.

1980-81-82-83, ch. 111, ann. II «14».

Prorogation du délai
15. Le responsable d'une institution fédérale peut proroger le délai mentionné à l'article 14 :

a) d'une période maximale de trente jours dans les cas où :

(i) l'observation du délai entraverait de façon sérieuse le fonctionnement de l'institution,

(ii) les consultations nécessaires pour donner suite à la demande rendraient pratiquement impossible l'observation du délai;

b) d'une période qui peut se justifier dans les cas de traduction ou dans les cas de transfert sur support de substitution.

Dans l'un ou l'autre de ces cas, le responsable de l'institution fédérale envoie à la personne qui a fait la demande, dans les trente jours suivant sa réception, un avis de prorogation de délai en lui faisant part du nouveau délai ainsi que de son droit de déposer une plainte à ce propos auprès du Commissaire à la protection de la vie privée.

L.R. (1985), ch. P-21, art. 15; 1992, ch. 21, art. 35.

Refus de communication
16. (1) En cas de refus de communication de renseignements personnels demandés en vertu du paragraphe 12(1), l'avis prévu à l'alinéa 14a) doit mentionner, d'une part, le droit de la personne qui a fait la demande de déposer une plainte auprès du Commissaire à la protection de la vie privée et, d'autre part :

a) soit le fait que le dossier n'existe pas;

b) soit la disposition précise de la présente loi sur laquelle se fonde le refus ou sur laquelle il pourrait vraisemblablement se fonder si les renseignements existaient.

Dispense de divulgation de l'existence du document
(2) Le paragraphe (1) n'oblige pas le responsable de l'institution fédérale à faire état de l'existence des renseignements personnels demandés.

Présomption de refus
(3) Le défaut de communication de renseignements personnels demandés en vertu du paragraphe 12(1) dans les délais prévus par la présente loi vaut décision de refus de communication.

1980-81-82-83, ch. 111, ann. II «16».

Exercice de l'accès

Exercice de l'accès
17. (1) Sous réserve des règlements pris en vertu de l'alinéa 77(1)o), une institution fédérale donne communication des renseignements personnels de la façon suivante :

a) soit par la permission de consulter les renseignements conformément aux règlements;

b) soit par la délivrance de copies.

Version de la communication
(2) Un individu reçoit communication des renseignements personnels dans la langue officielle qu'il a précisée dans les cas suivants :

a) il en existe une version dans cette langue et elle relève d'une institution fédérale;

b) il n'en existe pas de version dans cette langue mais le responsable de l'institution fédérale dont ils relèvent juge nécessaire de les faire traduire ou de fournir à l'individu les services d'un interprète afin qu'il puisse les comprendre.

Communication sur support de substitution
(3) Un individu ayant une déficience sensorielle qui a demandé que communication des renseignements personnels lui soit faite sur un support de substitution reçoit communication de ceux-ci sur un tel support dans les cas suivants :

a) une version des renseignements existe sur un support de substitution qui lui soit acceptable et elle relève d'une institution fédérale;

b) le responsable de l'institution fédérale dont relèvent les renseignements juge nécessaire de communiquer les renseignements sur un support de substitution afin que la personne puisse exercer ses droits en vertu de la présente loi et raisonnable de les transférer sur un tel support.

L.R. (1985), ch. P-21, art. 17; 1992, ch. 21, art. 36.

EXCEPTIONS

Fichiers inconsultables

Fichiers inconsultables
18. (1) Le gouverneur en conseil peut, par décret, classer parmi les fichiers de renseignements personnels inconsultables, dénommés fichiers inconsultables dans la présente loi, ceux qui sont formés de dossiers dans chacun desquels dominent les renseignements visés aux articles 21 ou 22.

Autorisation de refuser
(2) Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui sont versés dans des fichiers inconsultables.

Éléments que doit contenir le décret
(3) Tout décret pris en vertu du paragraphe (1) doit porter :

a) une mention de l'article sur lequel il se fonde;

b) de plus, dans le cas d'un fichier de renseignements personnels formé de dossiers dans chacun desquels dominent des renseignements visés au sous-alinéa 22(1)a)(ii), la mention de la loi dont il s'agit.

1980-81-82-83, ch. 111, ann. II «18».

Responsabilités de l'État

Renseignements personnels obtenus à titre confidentiel
19. (1) Sous réserve du paragraphe (2), le responsable d'une institution fédérale est tenu de refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui ont été obtenus à titre confidentiel :

a) des gouvernements des États étrangers ou de leurs organismes;

b) des organisations internationales d'États ou de leurs organismes;

c) des gouvernements provinciaux ou de leurs organismes;

d) des administrations municipales ou régionales constituées en vertu de lois provinciales ou de leurs organismes.

Cas où la divulgation est autorisée
(2) Le responsable d'une institution fédérale peut donner communication des renseignements personnels visés au paragraphe (1) si le gouvernement, l'organisation, l'administration ou l'organisme qui les a fournis :

a) consent à la communication;

b) rend les renseignements publics.

1980-81-82-83, ch. 111, ann. II «19».

Affaires fédéro-provinciales
20. Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) dont la divulgation risquerait vraisemblablement de porter préjudice à la conduite par le gouvernement du Canada des affaires fédéro-provinciales.

1980-81-82-83, ch. 111, ann. II «20».

Affaires internationales et défense
21. Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) dont la divulgation risquerait vraisemblablement de porter préjudice à la conduite des affaires internationales, à la défense du Canada ou d'États alliés ou associés avec le Canada, au sens du paragraphe 15(2) de la Loi sur l'accès à l'information, ou à ses efforts de détection, de prévention ou de répression d'activités hostiles ou subversives, au sens du paragraphe 15(2) de la même loi, notamment les renseignements visés à ses alinéas 15(1)a) à i).

1980-81-82-83, ch. 111, ann. II «21».

Enquêtes
22. (1) Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) :

a) soit qui remontent à moins de vingt ans lors de la demande et qui ont été obtenus ou préparés par une institution fédérale, ou par une subdivision d'une institution, qui constitue un organisme d'enquête déterminé par règlement, au cours d'enquêtes licites ayant trait :

(i) à la détection, la prévention et la répression du crime,

(ii) aux activités destinées à faire respecter les lois fédérales ou provinciales,

(iii) aux activités soupçonnées de constituer des menaces envers la sécurité du Canada au sens de la Loi sur le Service canadien du renseignement de sécurité;

b) soit dont la divulgation risquerait vraisemblablement de nuire aux activités destinées à faire respecter les lois fédérales ou provinciales ou au déroulement d'enquêtes licites, notamment :

(i) des renseignements relatifs à l'existence ou à la nature d'une enquête déterminée,

(ii) des renseignements qui permettraient de remonter à une source de renseignements confidentielle,

(iii) des renseignements obtenus ou préparés au cours d'une enquête;

c) soit dont la divulgation risquerait vraisemblablement de nuire à la sécurité des établissements pénitentiaires.

Fonctions de police provinciale ou municipale
(2) Le responsable d'une institution fédérale est tenu de refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui ont été obtenus ou préparés par la Gendarmerie royale du Canada, dans l'exercice de fonctions de police provinciale ou municipale, qui lui sont conférées par une entente conclue sous le régime de l'article 20 de la Loi sur la Gendarmerie royale du Canada, si, à la demande de la province ou de la municipalité, le gouvernement du Canada a consenti à ne pas divulguer ces renseignements.

Définition de «enquête»
(3) Pour l'application de l'alinéa (1)b), «enquête» s'entend de celle qui :

a) se rapporte à l'application d'une loi fédérale;

b) est autorisée sous le régime d'une loi fédérale;

c) fait partie d'une catégorie d'enquêtes précisée dans les règlements.

1980-81-82-83, ch. 111, ann. II «22»; 1984, ch. 21, art. 90.

Enquêtes de sécurité
23. Le responsable d'une institution fédérale peut, dans les cas où leur communication risquerait vraisemblablement d'entraîner la divulgation de l'identité de l'informateur à l'origine des renseignements en question, refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) et qui ont été recueillis ou préparés, par un organisme d'enquête déterminé par règlement, lors des enquêtes de sécurité :

a) qu'exige le gouvernement fédéral ou une institution fédérale à l'égard des individus qu'ils emploient ou qu'emploient des personnes ou organismes qui leur prêtent leurs services, des individus qui prêtent leurs services au gouvernement ou à l'institution ou à ces personnes ou organismes ou de ceux qui sont candidats à ces emplois ou désireux de prêter ces services;

b) qu'exigent des administrations provinciales ou étrangères ou leurs organismes.

1980-81-82-83, ch. 111, ann. II «23».

Individus condamnés pour une infraction
24. Le responsable d'une institution fédérale peut refuser à un individu la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui ont été recueillis ou obtenus par le Service correctionnel du Canada ou la Commission nationale des libérations conditionnelles pendant qu'il était sous le coup d'une condamnation à la suite d'une infraction à une loi fédérale, dans les cas où la communication risquerait vraisemblablement :

a) soit d'avoir de graves conséquences sur son programme pénitentiaire, son programme de libération conditionnelle ou son programme de libération d'office;

b) soit d'entraîner la divulgation de renseignements qui, à l'origine, ont été obtenus expressément ou implicitement à titre confidentiel.

L.R. (1985), ch. P-21, art. 24; 1994, ch. 26, art. 56.

Sécurité des individus
25. Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) dont la divulgation risquerait vraisemblablement de nuire à la sécurité des individus.

1980-81-82-83, ch. 111, ann. II «25».

Renseignements personnels

Renseignements concernant un autre individu
26. Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui portent sur un autre individu que celui qui fait la demande et il est tenu de refuser cette communication dans les cas où elle est interdite en vertu de l'article 8.

1980-81-82-83, ch. 111, ann. II «26».

Secret professionnel des avocats

Secret professionnel des avocats
27. Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui sont protégés par le secret professionnel qui lie un avocat à son client.

1980-81-82-83, ch. 111, ann. II «27».

Dossiers médicaux

Dossiers médicaux
28. Le responsable d'une institution fédérale peut refuser la communication des renseignements personnels demandés en vertu du paragraphe 12(1) qui portent sur l'état physique ou mental de l'individu qui en demande communication, dans les cas où la prise de connaissance par l'individu concerné des renseignements qui y figurent desservirait celui-ci.

1980-81-82-83, ch. 111, ann. II «28».

PLAINTES

Réception des plaintes et enquêtes
29. (1) Sous réserve des autres dispositions de la présente loi, le Commissaire à la protection de la vie privée reçoit les plaintes et fait enquête sur les plaintes :

a) déposées par des individus qui prétendent que des renseignements personnels les concernant et détenus par une institution fédérale ont été utilisés ou communiqués contrairement aux articles 7 ou 8;

b) déposées par des individus qui se sont vu refuser la communication de renseignements personnels, demandés en vertu du paragraphe 12(1);

c) déposées par des individus qui se prétendent lésés des droits que leur accorde le paragraphe 12(2) ou qui considèrent comme non fondé le refus d'effectuer les corrections demandées en vertu de l'alinéa 12(2)a);

d) déposées par des individus qui ont demandé des renseignements personnels dont les délais de communication ont été prorogés en vertu de l'article 15 et qui considèrent la prorogation comme abusive;

e) déposées par des individus qui n'ont pas reçu communication de renseignements personnels dans la langue officielle qu'ils ont demandée en vertu du paragraphe 17(2);

e.1) déposées par des individus qui n'ont pas reçu communication des renseignements personnels sur un support de substitution en application du paragraphe 17(3);

f) déposées par des individus qui considèrent comme contre-indiqué le versement exigé en vertu des règlements;

g) portant sur le répertoire visé au paragraphe 11(1);

h) portant sur toute autre question relative à :

(i) la collecte, la conservation ou le retrait par une institution fédérale des renseignements personnels,

(ii) l'usage ou la communication des renseignements personnels qui relèvent d'une institution fédérale,

(iii) la demande ou l'obtention de renseignements personnels en vertu du paragraphe l2(1).

Entremise de représentants
(2) Le Commissaire à la protection de la vie privée peut recevoir les plaintes visées au paragraphe (1) par l'intermédiaire d'un représentant du plaignant. Dans les autres articles de la présente loi, les dispositions qui concernent le plaignant concernent également son représentant.

Plaintes émanant du Commissaire
(3) Le Commissaire à la protection de la vie privée peut lui-même prendre l'initiative d'une plainte s'il a des motifs raisonnables de croire qu'une enquête devrait être menée sur une question relative à l'application de la présente loi.

L.R. (1985), ch. P-21, art. 29; 1992, ch. 21, art. 37.

Plaintes écrites
30. Les plaintes sont, sauf dispense accordée par le Commissaire à la protection de la vie privée, déposées devant lui par écrit.

1980-81-82-83, ch. 111, ann. II «30».

ENQUÊTES

Avis d'enquête
31. Le Commissaire à la protection de la vie privée, avant de procéder aux enquêtes prévues par la présente loi, avise le responsable de l'institution fédérale concernée de son intention d'enquêter et lui fait connaître l'objet de la plainte.

1980-81-82-83, ch. 111, ann. II «31».

Procédure
32. Sous réserve des autres dispositions de la présente loi, le Commissaire à la protection de la vie privée peut établir la procédure à suivre dans l'exercice de ses pouvoirs et fonctions.

1980-81-82-83, ch. 111, ann. II «32».

Secret des enquêtes
33. (1) Les enquêtes menées sur les plaintes par le Commissaire à la protection de la vie privée sont secrètes.

Droit de présenter des observations
(2) Au cours d'une enquête relative à une plainte, le plaignant et le responsable de l'institution fédérale concernée doivent avoir la possibilité de présenter leurs observations au Commissaire à la protection de la vie privée; toutefois, nul n'a le droit absolu d'être présent lorsqu'une autre personne présente des observations au Commissaire, ni d'en recevoir communication ou de faire des commentaires à leur sujet.

1980-81-82-83, ch. 111, ann. II «33».

Pouvoirs du Commissaire à la protection de la vie privée pour la tenue des enquêtes
34. (1) Le Commissaire à la protection de la vie privée a, pour l'instruction des plaintes déposées en vertu de la présente loi, le pouvoir :

a) d'assigner et de contraindre des témoins à comparaître devant lui, à déposer verbalement ou par écrit sous la foi du serment et à produire les pièces qu'il juge indispensables pour instruire et examiner à fond les plaintes dont il est saisi, de la même façon et dans la même mesure qu'une cour supérieure d'archives;

b) de faire prêter serment;

c) de recevoir des éléments de preuve ou des renseignements par déclaration verbale ou écrite sous serment ou par tout autre moyen qu'il estime indiqué, indépendamment de leur admissibilité devant les tribunaux;

d) de pénétrer dans les locaux occupés par une institution fédérale, à condition de satisfaire aux normes de sécurité établies par l'institution pour ces locaux;

e) de s'entretenir en privé avec toute personne se trouvant dans les locaux visés à l'alinéa d) et d'y mener, dans le cadre de la compétence que lui confère la présente loi, les enquêtes qu'il estime nécessaires;

f) d'examiner ou de se faire remettre des copies ou des extraits des livres ou autres documents contenant des éléments utiles à l'enquête et trouvés dans les locaux visés à l'alinéa d).

Accès aux renseignements
(2) Nonobstant toute autre loi fédérale ou toute immunité reconnue par le droit de la preuve, le Commissaire à la protection de la vie privée a, pour les enquêtes qu'il mène en vertu de la présente loi, accès à tous les renseignements, quels que soient leur forme et leur support, qui relèvent d'une institution fédérale, à l'exception des renseignements confidentiels du Conseil privé de la Reine pour le Canada auxquels s'applique le paragraphe 70(1); aucun des renseignements auxquels il a accès en vertu du présent paragraphe ne peut, pour quelque motif que ce soit, lui être refusé.

Inadmissibilité de la preuve dans d'autres procédures
(3) Sauf les cas où une personne est poursuivie soit pour une infraction à l'article 131 du Code criminel (parjure) se rapportant à une déclaration faite en vertu de la présente loi, soit pour infraction à la présente loi, ou sauf les cas de recours prévus par la présente loi devant la Cour ou les cas d'appel de la décision rendue par la Cour, les dépositions faites au cours de procédures prévues par la présente loi ou le fait de l'existence de ces procédures ne sont pas admissibles contre le déposant devant les tribunaux ni dans aucune autre procédure.

Frais des témoins
(4) Les témoins assignés à comparaître devant le Commissaire à la protection de la vie privée en vertu du présent article peuvent recevoir, si le Commissaire le juge indiqué, les frais et indemnités accordés aux témoins assignés devant la Cour fédérale.

Renvoi des documents, etc.
(5) Les personnes ou les institutions fédérales qui produisent des pièces demandées en vertu du présent article peuvent exiger du Commissaire à la protection de la vie privée qu'il leur renvoie ces pièces dans les dix jours suivant la requête qu'elles lui présentent à cette fin, mais rien n'empêche le Commissaire d'en réclamer une nouvelle production.

L.R. (1985), ch. P-21, art. 34; L.R. (1985), ch. 27 (1er suppl.), art. 187.

Conclusions et recommandations du Commissaire à la protection de la vie privée
35. (1) Dans les cas où il conclut au bien-fondé d'une plainte portant sur des renseignements personnels, le Commissaire à la protection de la vie privée adresse au responsable de l'institution fédérale de qui relèvent les renseignements personnels un rapport où :

a) il présente les conclusions de son enquête ainsi que les recommandations qu'il juge indiquées;

b) il demande, s'il le juge à propos, au responsable de lui donner avis, dans un délai déterminé, soit des mesures prises ou envisagées pour la mise en oeuvre de ses recommandations, soit des motifs invoqués pour ne pas y donner suite.

Compte rendu au plaignant
(2) Le Commissaire à la protection de la vie privée rend compte au plaignant des conclusions de son enquête; toutefois, dans les cas prévus à l'alinéa (1)b), le Commissaire à la protection de la vie privée ne peut faire son compte rendu qu'après l'expiration du délai imparti au responsable de l'institution fédérale.

Éléments à inclure dans le compte rendu
(3) Le Commissaire à la protection de la vie privée mentionne également dans son compte rendu au plaignant, s'il y a lieu, le fait que, dans les cas prévus à l'alinéa (1)b), il n'a pas reçu d'avis dans le délai imparti ou que les mesures indiquées dans l'avis sont, selon lui, insuffisantes, inadaptées ou non susceptibles d'être prises en temps utile. Il peut en outre y inclure tous commentaires qu'il estime utiles.

Communication accordée
(4) Dans les cas où il fait suite à la demande formulée par le Commissaire à la protection de la vie privée en vertu de l'alinéa (1)b) en avisant le Commissaire qu'il donnera communication de renseignements personnels au plaignant, le responsable d'une institution fédérale est tenu de donner cette communication sur le champ.

Recours en révision
(5) Dans les cas où l'enquête portait sur un refus de communication et que, à l'issue de l'enquête, communication n'est pas donnée au plaignant, le Commissaire à la protection de la vie privée informe celui-ci de l'existence de son droit de recours en révision devant la Cour.

1980-81-82-83, ch. 111, ann. II «35».

EXAMEN DES FICHIERS INCONSULTABLES

Enquêtes sur les fichiers inconsultables
36. (1) Le Commissaire à la protection de la vie privée peut, à son appréciation, tenir des enquêtes sur les dossiers versés dans les fichiers inconsultables classés comme tels en vertu de l'article 18.

Application des art. 31 à 34
(2) Les articles 31 à 34 s'appliquent, si c'est indiqué et compte tenu des adaptations de circonstance, aux enquêtes menées en vertu du paragraphe (1).

Rapport des conclusions et recommandations
(3) Dans les cas où, à l'issue de son enquête, il considère que les dispositions du décret de classement ne justifient pas la présence de certains dossiers dans le fichier inconsultable, le Commissaire à la protection de la vie privée adresse au responsable de l'institution fédérale de qui relève le fichier un rapport où :

a) il présente ses conclusions ainsi que les recommandations qu'il juge indiquées;

b) il demande, s'il le juge à propos, de lui donner avis, dans un délai déterminé, soit des mesures prises ou envisagées pour la mise en oeuvre de ses recommandations, soit des motifs invoqués pour ne pas y donner suite.

Incorporation des rapports
(4) Les rapports établis par le Commissaire à la protection de la vie privée en vertu du paragraphe (3), de même que les réponses qu'il a obtenues, peuvent être incorporés dans les rapports prévus aux articles 38 ou 39.

Révision des fichiers inconsultables par la Cour
(5) Dans les cas où il a demandé l'avis prévu à l'alinéa (3)b), mais qu'il ne l'a pas reçu dans le délai imparti ou que les mesures indiquées dans l'avis sont, selon lui, insuffisantes, inadaptées ou non susceptibles d'être prises en temps utile, le Commissaire à la protection de la vie privée peut exercer un recours devant la Cour en vertu de l'article 43.

1980-81-82-83, ch. 111, ann. II «36».

CONTRÔLE D'APPLICATION DES ARTICLES 4 À 8

Enquêtes
37. (1) Pour le contrôle d'application des articles 4 à 8, le Commissaire à la protection de la vie privée peut, à son appréciation, tenir des enquêtes quant aux renseignements personnels qui relèvent des institutions fédérales.

Application des art. 31 à 34
(2) Les articles 31 à 34 s'appliquent, si c'est indiqué et compte tenu des adaptations de circonstance, aux enquêtes menées en vertu du paragraphe (1).

Rapport des conclusions et recommandations du Commissaire
(3) Le Commissaire à la protection de la vie privée, s'il considère à l'issue de son enquête qu'une institution fédérale n'a pas appliqué les articles 4 à 8, adresse au responsable de l'institution un rapport où il présente ses conclusions ainsi que les recommandations qu'il juge indiquées.

Incorporation des rapports
(4) Les rapports établis par le Commissaire à la protection de la vie privée en vertu du paragraphe (3) peuvent être incorporés dans les rapports prévus aux articles 38 ou 39.

1980-81-82-83, ch. 111, ann. II «37».

RAPPORTS AU PARLEMENT

Rapport annuel
38. Dans les trois mois suivant la fin de chaque exercice, le Commissaire à la protection de la vie privée présente au Parlement le rapport des activités du commissariat au cours de l'exercice.

1980-81-82-83, ch. 111, ann. II «38».

Rapports spéciaux
39. (1) Le Commissaire à la protection de la vie privée peut, à toute époque de l'année, présenter au Parlement un rapport spécial sur toute question relevant de ses pouvoirs et fonctions et dont l'urgence ou l'importance sont telles, selon lui, qu'il serait contre-indiqué d'en différer le compte rendu jusqu'à l'époque du rapport annuel suivant.

Cas des enquêtes
(2) Le Commissaire à la protection de la vie privée ne peut présenter de rapport spécial sur des enquêtes qu'après observation des formalités prévues à leur sujet aux articles 35, 36 ou 37.

1980-81-82-83, ch. 111, ann. II «39».

Remise des rapports
40. (1) La présentation des rapports du Commissaire à la protection de la vie privée au Parlement s'effectue par remise au président du Sénat et à celui de la Chambre des communes pour dépôt devant leurs chambres respectives.

Renvoi en comité
(2) Les rapports visés au paragraphe (1) sont, après leur dépôt, renvoyés devant le comité désigné ou constitué par le Parlement en application du paragraphe 75(1).

1980-81-82-83, ch. 111, ann. II «40».

RÉVISION PAR LA COUR FÉDÉRALE

Révision par la Cour fédérale dans les cas de refus de communication
41. L'individu qui s'est vu refuser communication de renseignements personnels demandés en vertu du paragraphe 12(1) et qui a déposé ou fait déposer une plainte à ce sujet devant le Commissaire à la protection de la vie privée peut, dans un délai de quarante-cinq jours suivant le compte rendu du Commissaire prévu au paragraphe 35(2), exercer un recours en révision de la décision de refus devant la Cour. La Cour peut, avant ou après l'expiration du délai, le proroger ou en autoriser la prorogation.

1980-81-82-83, ch. 111, ann. II «41».

Exercice du recours par le Commissaire à la protection de la vie privée, etc.
42. Le Commissaire à la protection de la vie privée a qualité pour :

a) exercer lui-même, à l'issue de son enquête et dans les délais prévus à l'article 41, le recours en révision pour refus de communication de renseignements personnels, avec le consentement de l'individu qui les avait demandés;

b) comparaître devant la Cour au nom de l'individu qui a exercé un recours devant elle en vertu de l'article 41;

c) comparaître, avec l'autorisation de la Cour, comme partie à une instance engagée en vertu de l'article 41.

1980-81-82-83, ch. 111, ann. II «42».

Recours concernant les fichiers inconsultables
43. Dans les cas visés au paragraphe 36(5), le Commissaire à la protection de la vie privée peut demander à la Cour d'examiner les dossiers versés dans un fichier inconsultable classé comme tel en vertu de l'article 18.

1980-81-82-83, ch. 111, ann. II «43».

Procédure sommaire
44. Les recours prévus aux articles 41, 42 ou 43 sont entendus et jugés en procédure sommaire conformément aux règles de pratique spéciales adoptées à leur égard en vertu de l'article 46 de la Loi sur la Cour fédérale.

1980-81-82-83, ch. 111, ann. II «44».

Accès aux renseignements
45. Nonobstant toute autre loi fédérale ou toute immunité reconnue par le droit de la preuve, la Cour a, pour les recours prévus aux articles 41, 42 ou 43, accès à tous les renseignements, quels que soient leur forme et leur support, qui relèvent d'une institution fédérale, à l'exception des renseignements confidentiels du Conseil privé de la Reine pour le Canada auxquels s'applique le paragraphe 70(1); aucun des renseignements auxquels la Cour a accès en vertu du présent article ne peut, pour quelque motif que ce soit, lui être refusé.

1980-81-82-83, ch. 111, ann. II «45».

Précautions à prendre contre la divulgation
46. (1) À l'occasion des procédures relatives aux recours prévus aux articles 41, 42 ou 43, la Cour prend toutes les précautions possibles, notamment, si c'est indiqué, par la tenue d'audiences à huis clos et l'audition d'arguments en l'absence d'une partie, pour éviter que ne soient divulgués de par son propre fait ou celui de quiconque :

a) des renseignements qui justifient un refus de communication de renseignements personnels demandés en vertu du paragraphe 12(1) ou de renseignements contenus dans un document demandé sous le régime de la Loi sur l'accès à l'information;

b) des renseignements faisant état de l'existence de renseignements personnels que le responsable d'une institution fédérale a refusé de communiquer sans indiquer s'ils existaient ou non.

Autorisation de dénoncer des infractions
(2) Dans les cas où, à son avis, il existe des éléments de preuve touchant la perpétration d'infractions aux lois fédérales ou provinciales par un cadre ou employé d'une institution fédérale, la Cour peut faire part à l'autorité compétente des renseignements qu'elle détient à cet égard.

1980-81-82-83, ch. 111, ann. II «46».

Charge de la preuve
47. Dans les procédures découlant des recours prévus aux articles 41, 42 ou 43, la charge d'établir le bien-fondé du refus de communication de renseignements personnels ou le bien-fondé du versement de certains dossiers dans un fichier inconsultable classé comme tel en vertu de l'article 18 incombe à l'institution fédérale concernée.

1980-81-82-83, ch. 111, ann. II «47».

Ordonnance de la Cour dans les cas où le refus n'est pas autorisé
48. La Cour, dans les cas où elle conclut au bon droit de l'individu qui a exercé un recours en révision d'une décision de refus de communication de renseignements personnels fondée sur des dispositions de la présente loi autres que celles mentionnées à l'article 49, ordonne, aux conditions qu'elle juge indiquées, au responsable de l'institution fédérale dont relèvent les renseignements d'en donner communication à l'individu; la Cour rend une autre ordonnance si elle l'estime indiqué.

1980-81-82-83, ch. 111, ann. II «48».

Ordonnance de la Cour dans les cas où le préjudice n'est pas démontré
49. Dans les cas où le refus de communication des renseignements personnels s'appuyait sur les articles 20 ou 21 ou sur les alinéas 22(1)b) ou c) ou 24a), la Cour, si elle conclut que le refus n'était pas fondé sur des motifs raisonnables, ordonne, aux conditions qu'elle juge indiquées, au responsable de l'institution fédérale dont relèvent les renseignements d'en donner communication à l'individu qui avait fait la demande; la Cour rend une autre ordonnance si elle l'estime indiqué.

1980-81-82-83, ch. 111, ann. II «49».

Ordonnance visant à exclure des dossiers d'un fichier
50. La Cour, saisie d'un recours en vertu de l'article 43, ordonne au responsable de l'institution fédérale dont relève le fichier inconsultable qui contient le dossier en litige de retirer celui-ci du fichier, ou rend toute autre ordonnance qu'elle estime indiquée, si elle conclut :

a) dans le cas d'un dossier contenant des renseignements personnels visés à l'alinéa 22(1)a) ou au paragraphe 22(2), que le dossier n'aurait pas dû être versé dans le fichier;

b) dans le cas d'un dossier contenant des renseignements personnels visés à l'article 21 ou aux alinéas 22(1)b) ou c), qu'il n'y a pas de motifs raisonnables justifiant le versement du dossier dans le fichier.

1980-81-82-83, ch. 111, ann. II «50»; 1984, ch. 40, art. 60.

Affaires internationales et défense
51. (1) Les recours visés aux articles 41 ou 42 et portant sur les cas où le refus de donner communication de renseignements personnels est lié aux alinéas 19(1)a) ou b) ou à l'article 21 et sur les cas concernant la présence des dossiers dans chacun desquels dominent des renseignements visés à l'article 21 dans des fichiers inconsultables classés comme tels en vertu de l'article 18 sont exercés devant le juge en chef adjoint de la Cour fédérale ou tout autre juge de cette Cour qu'il charge de leur audition.

Règles spéciales
(2) Les recours visés au paragraphe (1) font, en premier ressort ou en appel, l'objet d'une audition à huis clos; celle-ci a lieu dans la région de la capitale nationale définie à l'annexe de la Loi sur la capitale nationale si le responsable de l'institution fédérale concernée le demande.

Présentation d'arguments en l'absence d'une partie
(3) Le responsable de l'institution fédérale concernée a, au cours des auditions en première instance ou en appel et sur demande, le droit de présenter des arguments en l'absence d'une autre partie.

1980-81-82-83, ch. 111, ann. II «51».

Frais et dépens
52. (1) Sous réserve du paragraphe (2), les frais et dépens sont laissés à l'appréciation de la Cour et suivent, sauf ordonnance contraire de la Cour, le sort du principal.

Idem
(2) Dans les cas où elle estime que l'objet du recours a soulevé un principe important et nouveau quant à la présente loi, la Cour accorde les frais et dépens à la personne qui a exercé le recours devant elle, même si cette personne a été déboutée de son recours.

1980-81-82-83, ch. 111, ann. II «52».

COMMISSARIAT À LA PROTECTION DE LA VIE PRIVÉE

Commissaire à la protection de la vie privée

  † In Memoriam † maandag 15 oktober 2001 @ 22:15:12 #130
13819 Loedertje
Trotse GILF.
pi_1911412
Desprados -RIP-
62 x 2,8 MB Uploaded by: Vasco
I loved the fact that the characters know how to hide behind corners, pop out to shoot and then return to cover immediately, and the fact that you have to calm your hand for some time before you can fire a sniper-shot. The trajectories that display the path of dynamite or gas-capsules have also been well conceived.

Download: [1 T/M 62]

Fate Of The Dragon -RIP-

4 x 14 MB Uploaded by: Vasco
Will being a warlord in Three Kingdoms put China in your hands or leave it shattered on the unforgiving floor of history?


Download: [1 T/M 4]

Airport Tycoon -RIP-
6 x 10 MB Uploaded by: Dark-Warez
Setup Your Own Airport buy planes and sell them design your chairs diners etc


Download: 1 2 3 4 5 6

Moon Tycoon -RIP-


31 x 2,8 MB Uploaded by: Vasco
You will soon be able to develop colonies on the moon. Legacy Interactive, Anarchy Enterprises and Unique Entertainment are teaming up together to bring you Moon Tycoon. If you have a curiosity for space and are lover of SimCity this just may be the game for you.


Download: down



Championship Manarge 01/02 -RIP-

13 x 2,8 MB Uploaded by: CxByTe
Sorry No Review



Download: [1T/M13]


Gedget Tycoon -RIP-

7 x 5 MB Uploaded by: Dark-Warez
Gadget Tycoon

Build your own gadget's it's very cool


Download: 1 2 3 4 5 6 7



Street Tennis -RIP-

13 x 2,8 MB Uploaded by: Vasco
No Review Sorry

Download: Down


F1 2001 -ISO-

37 x 14 MB Uploaded by: CxByTe
With just one race to go, the F1 2001 season is done and dusted. Michael Schumacher and the Prancing Horse have galloped away with both Driver and Constructor titles for the second year in a row, with the rest of the grid trailing home a very distant second to the all-conquering Maranello team. The only way to change the result now, for us virtual F1 drivers anyway, comes in the shape of F1 2001, EA Sports' latest take on the official game licence. The series made a fairly impressive debut last year but was largely overshadowed by F1 maestro Geoff Crammond's Grand Prix 3, so how does this season's incarnation fare?

Download: Down





different Server

Zoo Tycoon -RIP-

45 x 2,7 MB Uploaded by: Vasco
Will being a warlord in Three Kingdoms put China in your hands or leave it shattered on the unforgiving floor of history?



Download: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45


Max Payne -RIP-


7 x 5 MB Uploaded by: Vasco
Sorry No Review


Download: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88



Red Alert 2 -RIP-

63 x 3 MB Uploaded by: Vasco
Will being a warlord in Three Kingdoms put China in your hands or leave it shattered on the unforgiving floor of history?



Download: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63


Oil Tycoon -RIP-

7 x 5 MB Uploaded by: Vasco
Sorry No Review

Download:(mirror 1)1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Download: (mirror 2)1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32



____________________________________________________
[sub] ik ben een "zij" en heet geen Calvélikker[/sub}

pi_1912207
* gaat weer op zoek *

* Gevonden - hoppa *

[DOCID:188578tx_xxx-31]
From the Government Manual Online via GPO Access
[wais.access.gpo.gov]
[Page 131-153]

[[Page 131]]

DEPARTMENT OF COMMERCE

Fourteenth Street and Constitution Avenue NW., Washington, DC 20230

Phone, 202-482-2000. Internet, www.doc.gov.
SECRETARY OF COMMERCE Donald L. Evans
Chief of Staff Laurie Fenton
Counselor to the Secretary (vacancy)
Assistant to the Secretary and Donald Trigg
Director, Office of Policy
and Strategic Planning
Director, Office of White House Cathie Martin
Liaison
Director, Executive Secretariat Tracy B. McKibben
Deputy Secretary of Commerce (vacancy)
Director, Office of Small and T.J. Garcia
Disadvantaged Business
Utilization
General Counsel Theodore W. Kassinger
Deputy General Counsel Margaret Wilson
Assistant General Counsel for Barbara S. Fredericks
Administration
Assistant General Counsel for Michael A. Levitt
Legislation and
Regulation
Assistant General Counsel for Alden F. Abbott
Finance and Litigation
Chief Financial Officer and (vacancy)
Assistant Secretary for
Administration
Deputy Assistant Secretary for (vacancy)
Administration
Deputy Assistant Secretary for K. David Holmes, Jr.
Security
Deputy Director for Security M. Lee Ballard
Chief Information Officer Thomas N. Pyke, Acting
Deputy Chief Information Officer Karen Hogan, Acting
Director, Office of Budget Barbara A. Retzlaff
Deputy Director Samuel Calderon
Director for Management and John J. Phelan III
Organization
Director, Office of Civil Rights Suzan J. Aramaki
Deputy Director Lawrence N. Self
Director for Executive Budgeting and Robert F. Kugelman
Assistance Management
Director for Financial Management James L. Taylor
and Deputy Chief Financial
Officer
Director for Human Resources Debra M. Tomchek
Management
Deputy Director Deborah Jefferson
Director for Administrative Services Anthony A. Fleming
Deputy Director Denise Wells
Director for Acquisition Management Michael S. Sade
Assistant Secretary for Legislative Brenda Becker
and Intergovernmental
Affairs
Deputy Assistant Secretary for (vacancy)
Legislative Affairs

[[Page 132]]
Deputy Assistant Secretary for Christopher S. Furlow
Intergovernmental
Affairs
Inspector General Johnnie E. Frazier
Deputy Inspector General Edward L. Blansitt
Assistant Inspector General for Larry Gross, Acting
Auditing
Assistant Inspector General for Stephen E. Garmon
Investigations
Assistant Inspector General for Judith J. Gordon
Systems Evaluation
Assistant Inspector General for Jill A. Gross
Inspections and Program
Evaluations
Assistant Inspector General for (vacancy)
Compliance and
Administration
Director, Office of Public Affairs Mary M. Crawford
Deputy Director (vacancy)
Press Secretary Jim Dyke
Director, Office of Business Liaison (vacancy)
Deputy Director Jennifer Andberg
Assistant Secretary for Economic (vacancy)
Development
Deputy Assistant Secretary (vacancy)
Chief Financial Officer/Chief Mary C. Pleffner
Administrative Officer
Assistant Secretary for (vacancy)
Communications and
Information
Deputy Assistant Secretary John F. Sopko

ECONOMICS AND STATISTICS ADMINISTRATION

Department of Commerce, Washington, DC 20230

Phone, 800-782-8872
Under Secretary for Economic Affairs Kathleen B. Cooper
Deputy Under Secretary Lee Price
Associate Under Secretary (vacancy)
Chief Economist (vacancy)
Director, Bureau of the Census William G. Barron,
Acting
Director, Bureau of Economic J. Steven Landefeld
Analysis

BUREAU OF EXPORT ADMINISTRATION

Fourteenth Street and Constitution Avenue NW., Washington, DC 20230

Phone, 202-482-2721
Under Secretary for Export Kenneth I. Juster
Administration
Deputy Under Secretary Thomas S. Bunton
Assistant Secretary for Export Matthew S. Borman,
Administration Acting
Assistant Secretary for Export Lisa Prager, Acting
Enforcement

INTERNATIONAL TRADE ADMINISTRATION

Department of Commerce, Washington, DC 20230

Phone, 202-482-3809
Under Secretary for International Grant D. Aldonas
Trade
Deputy Under Secretary Timothy J. Hauser
Assistant Secretary for Import Bernard T. Carreau,
Administration Acting
Assistant Secretary for Market Patrick A. Mulloy
Access and Compliance

[[Page 133]]
Assistant Secretary for Trade Jonathan C. Menes,
Development Acting
Assistant Secretary and Director Maria Cino
General of the U.S. and
Foreign Commercial
Service

MINORITY BUSINESS DEVELOPMENT AGENCY

Department of Commerce, Washington, DC 20230

Phone, 202-482-5061. Internet, www.mbda.gov.
Director, Minority Business Ronald N. Langston
Development Agency
Deputy Director Ruth E. Sandoval

NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION

Department of Commerce, Washington, DC 20230

Phone, 202-482-2985. Internet, www.noaa.gov.
Under Secretary for Oceans and (vacancy)
Atmosphere
Assistant Secretary for Oceans (vacancy)
and Atmosphere and
Deputy Administrator
Deputy Under Secretary for Scott B. Gudes
Oceans and Atmosphere
Chief Scientist (vacancy)
Chief Financial Officer/Chief Sonya G. Stewart
Administrative Officer
Assistant Administrator for (vacancy)
Fisheries Services
Assistant Administrator for (vacancy)
Ocean Services and
Coastal Zone Management
Assistant Administrator for Gregory W. Whithee
Environmental Satellite,
Data, and Information
Services
Assistant Administrator for John J. Kelly, Jr.
Weather Services
Assistant Administrator for David L. Evans
Oceanic and Atmospheric
Research

U.S. PATENT AND TRADEMARK OFFICE

2121 Crystal Drive, Arlington, VA 22202

Phone, 703-305-8341. Internet, www.uspto.gov.
Under Secretary for Intellectual (vacancy)
Property and Director of the
U.S. Patent and Trademark
Office
Deputy Under Secretary and (vacancy)
Deputy Director
Commissioner for Patents Nicholas P. Godici
Commissioner for Trademarks Anne H. Chasser

TECHNOLOGY ADMINISTRATION

Department of Commerce, Washington, DC 20230

Phone, 202-482-1575
Under Secretary for Technology (vacancy)
Deputy Under Secretary (vacancy)
Assistant Secretary for Bruce P. Mehlman
Technology Policy
Director, National Institute of Karen H. Brown, Acting
Standards and Technology

[[Page 134]]
Director, National Technical Ronald E. Lawson
Information Service

------------------------------------------------------------------------

The Department of Commerce encourages, serves, and promotes the Nation's
international trade, economic growth, and technological advancement. The
Department provides a wide variety of programs through the competitive
free enterprise system. It offers assistance and information to increase
America's competitiveness in the world economy; administers programs to
prevent unfair foreign trade competition; provides social and economic
statistics and analyses for business and government planners; provides
research and support for the increased use of scientific, engineering,
and technological development; works to improve our understanding and
benefits of the Earth's physical environment and oceanic resources;
grants patents and registers trademarks; develops policies and conducts
research on telecommunications; provides assistance to promote domestic
economic development; and assists in the growth of minority businesses.

[GRAPHIC] [TIFF OMITTED] T188578.014

The Department was designated as such by act of March 4, 1913 (15 U.S.C.
1501), which reorganized the Department of Commerce and Labor, created
by act of February 14, 1903 (15 U.S.C. 1501), by transferring all labor
activities into a new, separate Department of Labor.

Office of the Secretary

Secretary The Secretary is responsible for the administration of all
functions and authorities assigned to the Department of Commerce and for
advising the President on Federal policy and programs affecting the
industrial and commercial segments of the national economy. The
Secretary is served by the offices of Deputy Secretary, Inspector
General, General Counsel, and the Assistant Secretaries of
Administration, Legislative and Intergovernmental Affairs, and Public
Affairs. Other offices whose public purposes are widely administered are
detailed below.

Business Liaison This office develops and promotes a cooperative
working relationship and ensures effective communication between the
Department of Commerce and the business community. It also promotes
business involvement in departmental policymaking and program
development, and provides technical assistance to businesses that desire
help in dealing with the Government.

For further information, call 202-482-1360.

Economics and Statistics Administration

The Under Secretary for Economic Affairs advises the Secretary and other
Government officials on matters relating to economic developments and
forecasts and on the development of macroeconomic and microeconomic
policy. The Under Secretary, as Administrator of the Economics and
Statistics Administration, exercises general supervision over the Bureau
of the Census and the Bureau of Economic Analysis.
Current economic data are available to the public through the STAT-
USA website (Internet, www.stat-usa.gov), the National Trade Data Bank,
and the Economic Bulletin Board.

Bureau of the Census

[For the Bureau of the Census statement of organization, see the Federal
Register of Sept. 16, 1975, 40 FR 42765]

The Bureau of the Census was established as a permanent office by act of
March 6, 1902 (32 Stat. 51). The major functions of the Bureau are
authorized by the Constitution, which provides that a census of
population


[[Page 136]]
shall be taken every 10 years, and by laws codified as title 13 of the
United States Code. The law also provides that the information collected
by the Bureau from individual persons, households, or establishments be
kept strictly confidential and be used only for statistical purposes.
The Bureau is responsible for:
--the decennial censuses of population and housing;
--the quinquennial censuses of State and local governments,
manufacturers, mineral industries, distributive trades, construction
industries, and transportation;
--current surveys that provide information on many of the subjects
covered in the censuses at monthly, quarterly, annual, or other
intervals;
--compilation of current statistics on U.S. foreign trade, including
data on imports, exports, and shipping;
--special censuses at the request and expense of States and local
government units;
--publication of estimates and projections of the population;
--publication of current data on population and housing
characteristics; and
--current reports on manufacturing, retail and wholesale trade,
services, construction, imports and exports, State and local government
finances and employment, and other subjects.
The Bureau makes available statistical results of its censuses,
surveys, and other programs to the public through printed reports,
computer tape, CD-ROM's, the Internet, and other media and prepares
special tabulations sponsored and paid for by data users. It also
produces statistical compendia, catalogs, guides, and directories that
are useful in locating information on specific subjects. Upon request,
the Bureau makes searches of decennial census records and furnishes
certificates to individuals for use as evidence of age, relationship, or
place of birth. A fee is charged for searches.

For further information, contact the Human Resources Division, Bureau of
the Census, Department of Commerce, Washington, DC 20233. Phone, 301-
457-8353. Fax, 301-457-1906.

Field Organization--Bureau of the Census
----------------------------------------------------------------------------------------------------------------
Regional Office (Areas Served) Address
----------------------------------------------------------------------------------------------------------------
Atlanta, GA (AL, FL, GA) Suite 3200, 101 Marietta St. NW., 30303-2700
Boston, MA (CT, MA, ME, NH, NY (all counties not listed under Suite 301, 2 Copley Pl., 02117-9108
the New York Regional Office), PR, RI, VI, and VT)
Charlotte, NC (KY, NC, SC, TN, VA) Suite 106, 901 Ctr. Park Dr., 28217-2935
Chicago, IL (IL, IN, WI) Suite 5501, 2255 Enterprise Dr., Westchester, IL
60154-5800
Dallas, TX (LA, MS, TX) Suite 210, 6303 Harry Hines Blvd., 75235-5269
Denver, CO (AZ, CO, MT, NE, ND, NM, NV, SD, UT, and WY) Suite 100, 6900 W. Jefferson Ave., 80235-2032
Detroit, MI (MI, OH, WV) P.O. Box 33405, 1395 Brewery Park Blvd., 48232-
5405
Kansas City, KS (AR, IA, KS, MN, MO, OK) Suite 600, 400 State Ave., 66101-2410
Los Angeles, CA (CA (counties of Fresno, Imperial, Inyo, Suite 300, 15350 Sherman Way, Van Nuys, CA 91406-
Kern, Kings, Los Angeles, Madera, Mariposa, Merced, 4224
Monterey, Orange, Riverside, San Benito, San Bernadino, San
Diego, San Luis Obispo, Santa Barbara, Tulare, and Ventura),
HI)
New York, NY (NJ (counties of Bergen, Essex, Hudson, Rm. 37-130, 26 Federal Plz., 10278-0044
Middlesex, Morris, Passaic, Somerset, Sussex, Union, and
Warren), NY (counties of Bronx, Kings, Nassau, New York,
Queens, Richmond, Rockland, Suffolk, and Westchester))
Philadelphia, PA (DC, DE, MD, NJ (all counties not listed 21st Fl., 1601 Market St., 19106
under the New York Regional Office), PA)
Seattle, WA (AK, CA (all counties not listed under the Los Rm. 5100, 700 5th Ave., 98101
Angeles Regional Office), ID, OR, WA)
----------------------------------------------------------------------------------------------------------------

Bureau of Economic Analysis

[For the Bureau of Economic Analysis statement of organization, see the
Federal Register of Dec. 29, 1980, 45 FR 85496]

The Bureau of Economic Analysis (BEA) is the Nation's economic
accountant, integrating and interpreting a variety of source data to
draw a complete and


[[Page 137]]
consistent picture of the U.S. economy. Its economic accounts provide
information on such key issues as economic growth, regional development,
and the Nation's position in the world economy.
The national income and product accounts, featuring the gross
domestic product, provide a quantitative view of the production,
distribution, and use of the Nation's output. The Bureau also prepares
estimates of the Nation's tangible wealth and input-output tables that
show how industries interact.
The regional economic accounts provide estimates of personal income,
population, and employment for regions, States, and metropolitan areas.
The Bureau also prepares estimates of gross State product.
The international economic accounts encompass U.S. international
transactions (balance of payments) with foreign countries and the
international investment position of the United States. The Bureau
provides survey-based data on foreign direct investment in the U.S. and
U.S. direct investment abroad.

For further information, contact the Public Information Office, Bureau
of Economic Analysis, Department of Commerce, Washington, DC 20230.
Phone, 202-606-9900. Fax, 202-606-5310.

For further information, contact the Economics and Statistics
Administration, Department of Commerce, Washington, DC 20230. Phone,
800-782-8872.

Bureau of Export Administration

[For the Bureau of Export Administration statement of organization, see
the Federal Register of June 7, 1988, 53 FR 20881]

The Bureau of Export Administration was established as a separate agency
within the Department of Commerce on October 1, 1987, to separate the
functions of export promotion and export control as mandated by the
Export Administration Act (50 U.S.C. app. 2401 et seq.).
The Bureau directs the Nation's dual-use export control policy.
Major functions include processing license applications and enforcing
export control laws. These activities are central not only to fighting
proliferation, but also to pursuing national security, short supply, and
foreign policy goals.
Export Administration The Office of Export Administration is
responsible for export control policy and licensing activities relating
to dual-use commodities, technologies, software, and weapons of mass
destruction. The Office is responsible for overseeing compliance by the
U.S. business community with the Chemical Weapons Convention treaty,
ensuring a strong defense industrial base, implementing the Nation's
computer and encryption policy, and enhancing export regulatory
effectiveness by educating exporters.
Export Enforcement The Office investigates suspected violations of U.S.
export control laws, enforces the antiboycott regulations, and develops
and implements preventive enforcement measures. Enforcement agents work
with the export industry to detect and prevent illegal shipments, and
they work with other U.S. Government agencies and foreign governments on
export enforcement issues.
Nonproliferation and Export Control The Nonproliferation and Export
Control International Cooperation Team participates in the Government
initiative to help other countries strengthen national export control
systems and to help reduce the threat of proliferation of weapons of
mass destruction.
Critical Infrastructure Assurance The Office was created by a
presidential directive to coordinate actions both within the Federal
Government and with the private sector to protect critical
infrastructure. The national plan for information systems protection for
the year 2000 was the first attempt by any national government to
protect electric systems, communications, and


[[Page 138]]
transportation networks, all of which are computer controlled, from
deliberate attack and sabotage.

Field Offices--Bureau of Export Administration
------------------------------------------------------------------------
Field Area Address
------------------------------------------------------------------------
Export Enforcement
Boston, MA.............................. Rm. 350, 10 Causeway St.,
02222
Dallas, TX.............................. Rm. 622, 525 S. Griffin St.,
75202
Des Plaines, IL......................... Suite 300, 2400 E. Devon Ave.,
60018
El Segundo, CA.......................... Suite 720, 222 N. Sepulveda
Blvd., 90245
Fort Lauderdale, FL..................... Suite 2060, 200 E. Lasolas
Blvd., 33301
Herndon, VA............................. Suite 1125, 381 Elden St.,
20170
Irvine, CA.............................. Suite 310, 2601 Main St.,
92714
Jamaica, NY............................. Rm. 204A, Halnar Cargo Bldg.
75, JFK Airport, 11430
San Jose, CA............................ Suite 250, 96 N. 3d St., 95112-
5519
Staten Island, NY....................... Suite 104, 1200 South Ave.,
10314
Export Administration
Newport Beach, CA....................... Suite 345, 3300 Irvine Ave.,
92660
San Jose, CA............................ Suite 1001, 101 Park Ctr.
Plz., 95115
------------------------------------------------------------------------

For further information, contact the Bureau of Export Administration,
Office of Public Affairs, Room 3897, Fourteenth Street and Constitution
Avenue NW., Washington, DC 20230. Phone, 202-482-2721.

Economic Development Administration

The Economic Development Administration (EDA) was created in 1965 under
the Public Works and Economic Development Act (42 U.S.C. 3121) as part
of an effort to target Federal resources to economically distressed
areas and to help develop local economies in the United States. It was
mandated to assist rural and urban communities that were outside the
mainstream economy and that lagged in economic development, industrial
growth, and personal income.
The Administration provides grants for public works and development
facilities, planning and coordination, economic adjustment, and other
financial assistance to reduce substantial and persistent unemployment
in economically distressed areas.
Public works and development facilities grants support
infrastructure projects that foster the establishment or expansion of
industrial and commercial businesses, supporting the retention and
creation of jobs.
Planning grants support the design and implementation of effective
economic development policies and programs, by local development
organizations, in States and communities. EDA funds a network of over
300 planning districts throughout the country.
Technical assistance rovide for local feasibility and industry
studies, management and operational assistance, natural resource
development, and export promotion. In addition, EDA funds a network of
university centers that provides technical assistance.
Research, evaluation, and demonstration funds are used to support
studies about the causes of economic distress and to seek solutions to
counteract and prevent such problems.
Economic adjustment grants help communities adjust to a gradual
erosion or sudden dislocation of their local economic structure.
Defense conversion grants assist communities adversely affected by
Department of Defense base closures and defense contract cutbacks, as
well as Department of Energy realignments, by providing development
tools that can be effectively and easily implemented.


[[Page 139]]
Regional Offices--Economic Development Administration
------------------------------------------------------------------------
Region (Areas Served) Address
------------------------------------------------------------------------
Atlanta, GA (AL, FL, GA, MS, TN)........ Suite 1820, 401 W. Peachtree
St. NW., 30308-3610
Kentucky.............................. Suite 200, 771 Corporate Dr.,
Lexington, 40503-5477
North Carolina and South Carolina..... P.O. Box 1707, Lugoff, SC
29078
Austin, TX (NM, OK, TX)................. Suite 200, 327 Congress Ave.,
78701-4037
Arkansas.............................. Rm. 2509, 700 W. Capital St.,
Little Rock, 72201
Louisiana............................. Rm. 1025, 501 Magazine St.,
New Orleans, 70130
Chicago, IL............................. Suite 855, 111 N. Canal, 60606-
7204
Illinois and Minnesota................ Rm. 104, 515 W. 1st St.,
Duluth, MN 55802
Indiana and Ohio...................... Rm. 740, 200 N. High St.,
Columbus, OH 43215
Michigan and Wisconsin................ P.O. Box 517, Acme, MI 49610-
0517
Denver, CO (CO, KS, UT)................. Rm. 670, 1244 Speer Blvd.,
80204
Iowa and Nebraska..................... Rm. 823, 210 Walnut St., Des
Moines, IA 50309
Missouri.............................. Rm. B-2, 608 E. Cherry St.,
Columbia, 65201
Montana and Wyoming................... Rm. 196, 301 S. Park Ave.,
Helena, MT 59626
North Dakota and South Dakota......... Rm. 216, 102 4th Ave.,
Aberdeen, SD 57401
Philadelphia, PA (DC, DE, NJ)........... Suite 140 S., Independence Sq.
W., 19106
Connecticut, Maine, and Rhode Island.. 48 Highland Ave., Bangor, ME
04401-4656
Maryland and Virginia................. Rm. 474, 400 N. 8th St.,
Richmond, VA 23240-1001
Massachusetts and New Hampshire....... Suite 209, 143 N. Main St.,
Concord, NH 03301-5089
New York and Vermont.................. Suite 104, 620 Erie Blvd. W.,
Syracuse, NY 13204-2442
Pennsylvania.......................... 525 N. Broad St., W. Hazelton,
18201-1107
Puerto Rico and Virgin Islands........ Suite 602, 654 Munoz Rivera
Ave., Hato Rey, PR 00918-1738
West Virginia......................... Rm. 411, 405 Capital St.,
Charleston, 25301-1727
Seattle, WA (AZ, WA).................... Rm. 1856, 915 2d Ave., 98174
Alaska................................ Suite 1780, 550 W. 7th Ave.,
Anchorage, 99501-7594
California and Oregon................. Suite 244, 121 SW. Salmon St.,
Portland, OR 97204
Hawaii, Guam, American Samoa, Marshall Rm. 5180, 300 Ala Moana Blvd.,
Islands, Micronesia, Northern Marianas Honolulu, HI 96850
and Republic of Palau.
Idaho and Nevada...................... Rm. 441, 304 N. 8th St.,
Boise, ID 83702
------------------------------------------------------------------------

For further information, contact the Economic Development
Administration, Department of Commerce, Washington, DC 20230. Phone,
202-482-2309. Fax, 202-482-0995.

International Trade Administration

[For the International Trade Administration statement of organization,
see the Federal Register of Jan. 25, 1980, 45 FR 6148]

The International Trade Administration was established on January 2,
1980, by the Secretary of Commerce to promote world trade and to
strengthen the international trade and investment position of the United
States.
The Administration is headed by the Under Secretary for
International Trade, who coordinates all issues concerning trade
promotion, international commercial policy, market access, and trade law
enforcement. The Administration is responsible for nonagricultural trade
operations of the U.S. Government and supports the trade policy
negotiation efforts of the U.S. Trade Representative.
Imports The Office of the Assistant Secretary for Import Administration
defends American industry against injurious and unfair trade practices
by administering efficiently, fairly, and in a manner consistent with
U.S. international trade obligations the antidumping and countervailing
duty laws of the United States. The Office ensures the proper
administration of foreign trade zones and advises the Secretary on
establishment of new zones; and administers programs governing watch
assemblies, and other statutory import programs.
Market Access and Compliance The Office of the Assistant Secretary for
Market Access and Compliance advises on the analysis, formulation, and
implementation of U.S. international economic policies and carries out
programs to promote international trade, improve access by U.S.
companies to overseas markets, and strengthen the international trade
and investment position of the United States. The Office


[[Page 140]]
analyzes and develops recommendations for region- and country-specific
international economic, trade, and investment policy strategies and
objectives. In addition, the Office is responsible for implementing,
monitoring, and enforcing foreign compliance with bilateral and
multilateral trade agreements.
Trade Development The Office of the Assistant Secretary for Trade
Development advises on international trade and investment policies
pertaining to U.S. industrial sectors, carries out programs to
strengthen domestic export competitiveness, and promotes U.S. industry
participation in international markets. The Office manages an integrated
trade development program that includes industry analysis, major
projects, advocacy support, and trade assistance organized by industry
sectors.
U.S. and Foreign Commercial Service The U.S. and Foreign Commercial
Service develops, produces, markets, and manages an effective line of
high-quality products and services geared to the marketing information
needs of the U.S. exporting and international business community. The
Service delivers programs through 100 U.S. export assistance centers
located in the United States, and 140 posts located in 78 countries
throughout the world. It supports overseas trade promotion events;
manages a variety of export promotion services and products; promotes
U.S. products and services throughout the world market; conducts
conferences and seminars in the United States; and assists State and
private-sector organizations on export financing.

Export Assistance Centers--International Trade Administration
----------------------------------------------------------------------------------------------------------------
Address Director/Manager Telephone Fax
----------------------------------------------------------------------------------------------------------------
Alabama (Rm. 707, 950 22d St. N., Birmingham, George Norton................... 205-731-1331 205-731-0076
35203).
Alaska (Suite 1770, 550 W. 7th Ave., Chuck Becker.................... 907-271-6237 907-271-6242
Anchorage, 99501).
Arizona (Suite 970, 2901 N. Central Ave., Frank Woods..................... 602-640-2513 602-640-2518
Phoenix, 85701).
(166 W. Alameda, Tucson, 85726)............. Eric Nielsen.................... 520-670-5540 520-791-5413
Arkansas (Suite 700, 425 W. Capitol Ave., Lon J. Hardin................... 501-324-5794 501-324-7380
Little Rock, 72201).
California (390-B Fir Ave., Clovis, 93611).... Eduardo Torres.................. 559-325-1619 559-325-1647
(Suite 1670, 1 World Trade Ctr., Long Beach, Mary Boscia..................... 562-980-4550 562-980-4561
90831).
(Suite 509, 305 S. Figueroa St., Los Rachid Sayouty.................. 213-894-8784 213-894-8789
Angeles, 90071).
(Suite 320, 411 Pacific St., Monterey, Mark Weaver..................... 408-641-9850 408-641-9849
93940).
(Suite 305, 3300 Irvine Ave., Newport Beach, Paul Tambakis................... 949-660-1338 949-660-8039
92660).
(Suite 102, 330 Ignacio Blvd., Novato, Elizabeth Krauth................ 415-883-1966 415-883-2711
94949).
(Suite 740, 530 Water St., Oakland, 94607).. Rod Hirch....................... 510-273-7350 510-273-7352
(Suite 121, 2940 Inland Empire Blvd., Fred Latuperissa................ 909-466-4134 909-466-4140
Ontario, 91764).
(Suite 2090, 300 Esplanade Dr., Oxnard, Gerald Vaughn................... 805-981-8150 805-981-1855
93030).
(2d Fl., 917 7th St., Sacramento, 95814).... Dale Wright..................... 916-498-5155 916-498-5923
(Suite 230, 6363 Greenwich Dr., San Diego, Matt Andersen................... 619-557-5395 619-557-6176
92122).
(14th Fl., 250 Montgomery St., San Stephan Crawford................ 415-705-2300 415-705-2297
Francisco, 94104).
(Suite 1001, 125 S. Market St., San Jose, Greg Mignano.................... 408-271-7300 408-271-7307
95113).
(Suite 200, 440 Civic Center Dr., San Elizabeth Krauth................ 415-492-4546 415-492-4549
Rafael, 94903).
(Rm. 456, 5201 Great America Pkwy., Santa R.J. Donovan.................... 408-970-4610 408-970-4618
Clara, 95054).
(Suite 310, 5700 Ralston St., Ventura, Gerald Vaughn................... 805-676-1573 805-676-1892
93003).
(Suite 975, 11150 Olympic Blvd., West Los Julie Anne Hennesey............. 310-235-7104 310-235-7220
Angeles, 90064).
Colorado (Suite 680, 1625 Broadway, Denver, Stephan Craver.................. 303-844-6622 303-844-5651
80202).
Connecticut (Suite 903, 213 Court St., Carl Jacobsen................... 860-638-6950 860-638-6970
Middletown, 06457-3346).
Florida (1130 Cleveland St., Clearwater, George Martinez................. 727-893-3738 727-449-2889
33755).
(Suite 1600, 200 E. Las Olas Blvd., Ft. John McCartney.................. 954-356-6640 954-356-6644
Lauderdale 33301.
(777 NW. 72d Ave., Box 3L2, Miami, 33126- John McCartney.................. 305-526-7425 305-526-7434
3009).
(Suite 1270, 200 E. Robinson St., Orlando, Philip A. Ouzts................. 407-648-6235 407-648-6756
32801).
(Suite 201, 325 John Knox Rd., Tallahassee, Michael Higgins................. 850-942-9635 850-922-9595
32303).
Georgia (Suite 900, 285 Peachtree Ctr. Ave. Samuel P. Troy.................. 404-657-1900 404-657-1970
NE., Atlanta, 30303-1229).
(Suite 100, 6001 Chatham Ctr. Dr., Savannah, Barbara Myrick.................. 912-652-4204 912-652-4241
31405).
Hawaii (Suite 1140, 1001 Bishop St., Honolulu, Robert Murphy................... 808-522-8040 808-522-8045
96813).
Idaho (2d Fl., 700 W. State St., Boise, 83720) James Hellwig................... 208-334-3857 208-334-2783
Illinois (Suite 2440, 55 W. Monroe St., Mary N. Joyce................... 312-353-8045 312-353-8120
Chicago, 60603).
(Suite 150, 610 Central Ave., Highland Park, Robin F. Mugford................ 847-681-8010 847-681-8012
60035).
(Rm. 141, 922 N. Glenwood Ave., Peoria, David Genovese.................. 309-671-7815 309-671-7818
61606).
(515 N. Court St., Rockford, 61103)......... (Vacancy)....................... 815-987-8123 815-963-7943

[[Page 141]]
Indiana (Suite 106, 11405 N. Pennsylvania St., Mark Cooper, Acting............. 317-582-2300 317-582-2301
Carmel, 46032).
Iowa (Suite 100, 601 Locust St., Des Moines, Allen Patch..................... 515-288-8614 515-288-1437
50309-3739).
Kansas (Suite 300, 209 E. William, Wichita, George D. Lavid................. 316-263-4067 316-263-8306
67202-4012).
Kentucky (4th Fl., 140 E. Main St., Lexington Sara Melton..................... 859-225-7001 859-225-6501
Central Library, Lexington 40507).
(Rm. 634B, 601 W. Broadway, Louisville, John Autin...................... 502-582-5066 502-582-6573
40202).
(Suite 240, 2292 S. Hwy. 27, Somerset, Sandra Munsey................... 606-677-6160 606-677-6161
42501).
Louisiana (Suite 1170, 365 Canal St., New Donald Van De Werken............ 504-589-6546 504-589-2337
Orleans, 70130).
(7100 W. Park Dr., Shreveport, 71129)....... Patricia Holt................... 318-676-3064 318-676-3063
Maine (511 Congress St., Portland, 04101)..... Jeffrey Porter.................. 207-541-7400 207-541-7420
Maryland (Suite 2432, 401 E. Pratt St., Tom Cox......................... 410-962-4539 410-962-4529
Baltimore, 21202).
Massachusetts (Suite 307, 164 Northern Ave., Frank J. O'Connor............... 617-424-5990 617-424-5992
Boston, 02210).
Michigan (Suite 103, 425 S. Main St., Ann Paul E. Litton.................. 734-741-2430 734-741-2432
Arbor, 48104).
(Suite 2220, 211 W. Fort St., Detroit, Neil Hesse...................... 313-226-3650 313-226-3657
48226).
(Suite 718-S, 301 W. Fulton St., Grand Thomas Maguire.................. 616-458-3564 616-458-3872
Rapids, 49504).
(250 Elizabeth Lake Rd., Pontiac, 48341).... Richard Corson.................. 248-975-9600 248-975-9606
Minnesota (Suite 2240, 45 S. 7th St., Ronald E. Kramer................ 612-348-1638 612-348-1650
Minneapolis, 55402).
Mississippi (704 E. Main St., Raymond, 39154). Harrison Ford................... 601-857-0128 601-857-0026
Missouri (Suite 650, 2345 Grand, Kansas City, Thomas A. Strauss............... 816-410-9201 816-410-9208
64108).
(Suite 303, 8182 Maryland Ave., St. Louis, Randall J. LaBounty............. 314-425-3302 314-425-3381
63105).
Montana (Suite 257, Gallagher Business Bldg., Mark Peters..................... 406-243-2098 406-243-5259
MT World Trade Ctr., Missoula, 59812).
Nebraska (11135 O St., Omaha, 68137).......... Meredith Bond................... 402-221-3664 402-221-3668
Nevada (Suite 152, 1755 E. Plumb Lane, Reno, Jere Dabbs...................... 775-784-5203 775-784-5343
89502).
New Hampshire (17 New Hampshire Ave., Susan Berry..................... 603-334-6074 603-334-6110
Portsmouth, 03801-2838).
New Jersey (9th Fl., 1 Gateway Ctr., Newark, William Spitler................. 973-645-4682 973-645-4783
07102).
(Suite 105, Bldg. 4, 3131 Princeton Pk., Rod Stuart...................... 609-989-2100 609-989-2395
Trenton, 08648-2319).
New Mexico (1100 St. Francis Dr., Santa Fe, Sandra Necessary................ 505-827-0350 505-827-0263
87503).
New York (Rm. 1304, 111 W. Huron St., Buffalo, James Mariano................... 716-551-4191 716-551-5290
14202).
(Rm. 207, 1550 Franklin Ave., Mineola, George Soteros.................. 516-739-1765 516-739-3310
11501).
(Suite 904, 163 W. 125th St., New York, K.L. Fredericks................. 212-860-6200 212-860-6203
10027).
(Rm. 635, 6 World Trade Ctr., New York, Paul Smith...................... 212-466-5222 212-264-1356
10048).
(Suite 209, 707 Westchester Ave., White Joan Kanlian.................... 914-682-6712 914-682-6698
Plains, 10604).
North Carolina (Suite 435, 521 E. Morehead Roger Fortner................... 704-333-4886 704-332-2681
St., Charlotte, 28202).
(Suite 102, 400 W. Market St., Greensboro, Roger Fortner, Acting........... 336-333-5345 336-333-5158
27401).
(Suite 1150, 333 Fayetteville Street Mall, Debbie Strader.................. 919-715-7373 919-715-7777
Raleigh, 27601).
Ohio (Suite 2650, 36 E. 7th St., Cincinnati, Dao Le.......................... 513-684-2944 513-684-3227
45202).
(Suite 700, 600 Superior Ave. E., Cleveland, Michael Miller.................. 216-522-4750 216-522-2235
44114).
(Suite 1400, 2 Nationwide Plz., Columbus, (Vacancy)....................... 614-365-9510 614-365-9598
43215).
(300 Madison Ave., Toledo, 43604)........... Robert Abrahams................. 419-241-0683 419-241-0684
Oklahoma (Suite 330, 301 NW. 63d St., Oklahoma Ronald L. Wilson................ 405-608-5302 405-608-4211
City, 73116).
(Suite 1400, 700 N. Greenwood Ave., Tulsa, Jim Williams.................... 918-581-7650 918-581-6263
74106).
Oregon (1401 Williamette St., Eugene, 97401... (Vacancy)....................... 503-326-3001 503-326-6351
(Suite 242, 121 SW. Salmon St., Portland, Scott Goddin.................... 503-326-3001 503-326-6351
97204).
Pennsylvania (Rm. 850, 228 Walnut St., Deborah Doherty................. 717-221-4510 717-221-4505
Harrisburg, 17108-1698).
(Suite B, 1 Montage Mt. Rd., Moosic, 18507). (Vacancy)....................... 717-969-2530 717-969-2539
(Suite 850 West, Independence Sq. W., Edward Burton................... 215-597-6101 215-597-6123
Philadelphia, 19105).
(2002 Federal Bldg, 1000 Liberty Ave., Ted Amn......................... 412-395-5050 412-395-4875
Pittsburgh, 15222).
Puerto Rico (Suite 905, 525 F.D. Roosevelt Robert Bucalo................... 787-766-5555 787-766-5692
Ave., Hato Rey, 00918).
Rhode Island (1 W. Exchange St., Providence, Keith Yatsuhashi................ 401-528-5104 401-528-5067
02903).
South Carolina (Suite 201C, 5300 International Phil Menard..................... 843-760-3794 843-760-3798
Blvd., North Charleston, 29418).
(Suite 172, 1835 Assembly St., Columbia, Ann Watts....................... 803-765-5345 803-253-3614
29201).
(Suite 109, 555 N. Pleasantburg Dr., Denis Csizmadia................. 864-271-1976 864-271-4171
Greenville, 29607).
South Dakota (Rm. SS-29A, 2001 S. Summit Ave., Cinnamon King................... 605-330-4264 605-330-4266
Sioux Falls, 57197).
Tennessee (Suite 300, 601 W. Summit Hill Dr., George Frank.................... 865-545-4637 615-541-4435
Knoxville, 37902-2011).
(Suite 348, 650 E. Pkwy. S., Memphis, 38104) Ree Russell..................... 901-323-1543 901-320-9128
(Suite 100, 3d Fl., 211 Commerce St., Dean Peterson................... 615-259-6060 615-259-6064
Nashville, 37201).
Texas (Suite 430, 2000 E. Lamar Blvd., (Vacancy)....................... 817-277-1313 817-299-9601
Arlington 76006).
(2d Fl., 1700 Congress, Austin, 78701)...... Karen Parker.................... 512-916-5939 512-916-5940
(Suite 170, 2050 N. Stemmons Fwy., Dallas, Loree Silloway.................. 214-767-0542 214-767-8240
75207).
(711 Houston St., Fort Worth, 76102)........ Vavie Sellschopp................ 817-212-2673 817-978-0178
(Suite 1160, 500 Dallas, Houston, 77002).... James D. Cook................... 713-718-3062 713-718-3060
(Suite 360, 203 S. St. Mary's St., San Daniel G. Rodriquez............. 210-228-9878 210-228-9874
Antonio, 78205).

[[Page 142]]
Utah (Suite 221, 324 S. State St., Salt Lake Stanley Rees.................... 801-524-5116 801-524-5886
City, 84111).
Vermont (Drawer 20, National Life Bldg., Susan Murray.................... 802-828-4508 802-828-3258
Montpelier, 05620-0501).
Virginia (Suite 601, 1911 N. Fort Myer Dr., Ellen Moore, Acting............. 703-524-2885 703-524-2649
Arlington, 22209).
(Rm. 540, 400 N. 8th St., Richmond, 23240- Helen D. Lee-Hwang.............. 804-771-2246 804-771-2390
0026).
Washington (Suite 650, 2001 6th Ave., Seattle, David Spann..................... 206-553-5615 206-553-7253
98121).
(Suite 400, 801 W. Riverside Ave., Spokane, Janet Daubel.................... 509-353-2625 509-353-2449
99201).
(Suite 410, 950 Pacific Ave., Tacoma, 98401) Bob Deane....................... 253-593-6736 253-383-4676
West Virginia (Suite 807, 405 Capitol St., Harvey Timberlake............... 304-347-5123 304-347-5408
Charleston, 25301).
(316 Washington Ave., Wheeling, 26003)...... David Koller.................... 304-243-5493 304-243-5494
Wisconsin (Rm. 596, 517 E. Wisconsin Ave., Paul D. Churchill............... 414-297-3473 414-297-3470
Milwaukee, 53202).
Wyoming (Suite 680, 1625 Broadway, Denver, CO Nancy Charles-Parker............ 303-844-6622 303-844-5651
80202).
----------------------------------------------------------------------------------------------------------------


Regional Offices--International Trade Administration
----------------------------------------------------------------------------------------------------------------
Region (Address) Director/Manager Telephone Fax
----------------------------------------------------------------------------------------------------------------
Eastern Region, (Suite 2450, 401 E. Pratt St., Thomas McGinty.................. 410-962-2805 410-962-2799
Baltimore, MD 21202).
Mid-Eastern Region, (Suite 2025, 36 E. 7th James Kennedy................... 513-684-2944 513-684-3200
St., Cincinnati, OH 45202).
Mid-Western Region, (Suite 1011, 8182 Maryland Sandra Gerley................... 314-425-3300 314-425-3375
Ave., St. Louis, MO 63105).
Western Region, (14th Fl., 250 Montgomery St., Mary Delmage, Acting............ 619-557-7303 619-557-6176
San Francisco, CA 94104).
----------------------------------------------------------------------------------------------------------------

For further information, contact the International Trade Administration,
Department of Commerce, Washington, DC 20230. Phone, 202-482-3809.

Minority Business Development Agency

[For the Minority Business Development Agency statement of organization,
see the Federal Register of Mar. 17, 1972, 37 FR 5650, as amended]

The Minority Business Development Agency was established by Executive
order in 1969. The Agency develops and coordinates a national program
for minority business enterprise.
The Agency was created to assist minority businesses in achieving
effective and equitable participation in the American free enterprise
system and in overcoming social and economic disadvantages that have
limited their participation in the past. The Agency provides national
policies and leadership in forming and strengthening a partnership of
business, industry, and government with the Nation's minority
businesses.
Business development services are provided to the minority business
community through three vehicles: the minority business opportunity
committees which disseminate information on business opportunities; the
minority business development centers that provide management and
technical assistance and other business development services; and
electronic commerce which includes a webpage on the Internet that will
show how to start a business and use the service to electronically match
business with contract opportunities.
The Agency promotes and coordinates the efforts of other Federal
agencies in assisting or providing market opportunities for minority
business. It coordinates opportunities for minority firms in the private
sector. Through such public and private cooperative activities, the
Agency promotes the participation of Federal, State, and local
governments, and business and industry in directing resources for the
development of strong minority businesses.


[[Page 143]]
Regional Offices--Minority Business Development Agency
----------------------------------------------------------------------------------------------------------------
Region Address Director Telephone
----------------------------------------------------------------------------------------------------------------
Atlanta, GA..................... Suite 1715, 401 W. Robert Henderson................. 404-730-3300
Peachtree St. NW., 30308-
3516.
Chicago, IL..................... Suite 1406, 55 E. Monroe Carlos Guzman.................... 312-353-0182
St., 60603.
Dallas, TX...................... Suite 7B23, 1100 Commerce John Iglehart.................... 214-767-8001
St., 75242.
New York, NY.................... Suite 3720, 26 Federal Heyward Davenport................ 212-264-3262
Plz., 10278.
San Francisco, CA............... Rm. 1280, 221 Main St., Melda Cabrera.................... 415-744-3001
94105.
----------------------------------------------------------------------------------------------------------------


District Offices--Minority Business Development Agency
----------------------------------------------------------------------------------------------------------------
District Address Officer Telephone
----------------------------------------------------------------------------------------------------------------
Boston, MA........................ Rm. 418, 10 Causeway St., Rochelle K. Schwartz........... 617-565-6850
02222-1041.
El Monte, CA...................... Suite 455, 9660 Flair Dr., Rodolfo Guerra................. 818-453-8636
91713.
Miami, FL......................... Rm. 1314, 51 SW. 1st Ave., Rodolfo Suarez................. 305-536-5054
33130.
Philadelphia, PA.................. Rm. 10128, 600 Arch St., Alfonso C. Jackson............. 215-597-9236
19106.
----------------------------------------------------------------------------------------------------------------

For further information, contact the Office of the Director, Minority
Business Development Agency, Department of Commerce, Washington, DC
20230. Phone, 202-482-5061. Internet, www.mbda.gov.

National Oceanic and Atmospheric Administration

Department of Commerce, Washington, DC 20230

Phone, 202-482-2985. Internet, www.noaa.gov.

[For the National Oceanic and Atmospheric Administration statement of
organization, see the Federal Register of Feb. 13, 1978, 43 FR 6128]

The National Oceanic and Atmospheric Administration (NOAA) was formed on
October 3, 1970, by Reorganization Plan No. 4 of 1970 (5 U.S.C. app.).
NOAA's mission entails environmental assessment, prediction, and
stewardship. It is dedicated to monitoring and assessing the state of
the environment in order to make accurate and timely forecasts to
protect life, property, and natural resources, as well as to promote the
economic well-being of the United States and to enhance its
environmental security. NOAA is committed to protecting America's ocean,
coastal, and living marine resources while promoting sustainable
economic development.

National Weather Service

The National Weather Service (NWS) provides daily forecasts and warnings
for severe weather events such as hurricanes, tornadoes, winter storms,
flooding, and tsunamis. With its modernization program, NWS is able to
maximize its use of advanced computer technology to capture, integrate,
and analyze Doppler radar imagery and data from satellites and automated
surface instruments, and to speed up the dissemination of its forecasts
and warnings. This allows NWS to provide the public with more localized,
timely, and accurate forecasts, increasing the lead time it has to
prepare for severe weather events. NWS also provides services in support
of aviation and marine activities, agriculture, forestry, and urban air
quality control.

For further information, contact the National Weather Service, 1325
East-West Highway, Silver Spring, MD 20910-3283. Phone, 301-713-0689.
Fax, 301-713-0610. Internet, www.nws.noaa.gov.

National Environmental Satellite, Data, and Information Service

The National Environmental Satellite, Data, and Information Service
(NESDIS) operates the Nation's civilian geostationary and polar-orbiting
environmental satellites. It also manages the largest collection of
atmospheric, geophysical, and oceanographic data in the world. From
these sources, NESDIS develops and provides, through various media,
environmental data for forecasts, national security, and weather
warnings to protect life and property. This data is also used to assist
in energy distribution,


[[Page 144]]
the development of global food supplies, the management of natural
resources, and in the recovery of downed pilots and mariners in
distress.

For further information, contact the National Environmental Satellite,
Data, and Information Service, 1335 East-West Highway, Silver Spring, MD
20910-3283. Phone, 301-713-3578. Fax, 301-713-1249. Internet,
www.noaa.gov/nesdis/nesdis.html.

National Marine Fisheries Service

The National Marine Fisheries Service (NMFS) supports the management,
conservation, and sustainable development of domestic and international
living marine resources. NMFS is involved in the stock assessment of the
Nation's multi-billion dollar marine fisheries, protecting marine
mammals and threatened species, habitat conservation operations, trade
and industry assistance, and fishery enforcement activities.

For further information, contact the National Marine Fisheries Service,
1315 East-West Highway, Silver Spring, MD 20910. Phone, 301-713-2239.
Fax, 301-713-2258. Internet, kingfish.ssp.nmfs.gov.

National Ocean Service

The National Ocean Service (NOS), works to balance the Nation's use of
coastal resources through research, management, and policy. NOS monitors
the health of U.S. coasts by examining how human use and natural events
impact coastal ecosystems. Coastal communities rely on NOS for
information about natural hazards so they can more effectively reduce or
eliminate the destructive effects of coastal hazards. NOS assesses the
damage caused by hazardous material spills and works to restore or
replace the affected coastal resources. Through varied programs, NOS
protects wetlands, water quality, beaches, and wildlife. In addition,
NOS provides a wide range of navigational products and data that help
vessels move safely through U.S. waters and provides the basic set of
information that establishes the latitude, longitude, and elevation
framework necessary for the Nation's surveying, navigation, positioning,
and mapping activities.

For further information, contact the National Ocean Service, Room 13231,
SSMC 4, 1305 East-West Highway, Silver Spring, MD 20910. Phone, 301-713-
3070. Fax, 301-713-4307. Internet, www.nos.noaa.gov.

Office of Oceanic and Atmospheric Research

The Office of Oceanic and Atmospheric Research (OAR) carries out
research into such phenomena as El Nino, global warming, ozone
depletion, solar storms that can disrupt telecommunications and
electrical power systems, and coastal and Great Lakes ecosystems. OAR
conducts and directs its research programs in coastal, marine,
atmospheric, and space sciences through its own laboratories and
offices, as well as through networks of university-based programs across
the country.

For further information, contact the Office of Oceanic and Atmospheric
Research, Room 11627, 1315 East-West Highway, Silver Spring, MD 20910.
Phone, 301-713-2458. Fax, 301-713-0163. Internet, www.oar.noaa.gov.

Office of Marine and Aviation Operations

NOAA also maintains a fleet of ships and aircraft under the auspices of
its Office of Marine and Aviation Operations (OMAO). These are used for
scientific, engineering, and technical services, as well as to serve as
research platforms for gathering critical marine and atmospheric data in
support of a number of NOAA's research programs. This includes flying
``hurricane hunter'' aircraft into nature's most turbulent storms to
collect data critical to hurricane research.

For further information, contact the Office of Marine and Aviation
Operations, Room 12857, 1315 East-West Highway, Silver Spring, MD 20910-
3282. Phone, 301-713-1045.


[[Page 145]]
Field Organization--National Oceanic and Atmospheric Administration
------------------------------------------------------------------------
Organization Address/Telephone Director
------------------------------------------------------------------------
National Weather Service
Headquarters............... 1325 East-West John J. Kelly, Jr.
Hwy., Silver
Spring, MD 20910-
3283. Phone, 301-
713-0689. Fax, 301-
713-0610.
Office of Climate, Water, 1325 East-West Gregory A. Mandt,
and Weather Service. Hwy., Silver Acting
Spring, MD 20910-
3283. Phone, 301-
713-0700. Fax, 301-
713-1598.
Office of Science and 1325 East-West Jack Hayes
Technology. Hwy., Silver
Spring, MD 20910-
3283. Phone, 301-
713-1658. Fax, 301-
713-0963.
Office of Hydrologic 1325 East-West Gary M. Carter
Development. Hwy., Silver
Spring, MD 20910-
3283. Phone, 301-
713-0745. Fax, 301-
713-0003.
Office of Systems 1325 East-West Walter Telesetsky
Operations. Hwy., Silver
Spring, MD 20910-
3283. Phone, 301-
713-0165. Fax, 301-
713-0657.
National Centers for 5200 Auth Rd., Camp Louis W. Uccellini
Environmental Prediction. Springs, MD 20746-
4304. Phone, 301-
763-8016. Fax, 301-
763-8434.
Eastern region............. 630 Johnson Ave., Dean P. Gulezian
Bohemia, NY 11716-
2626. Phone, 516-
244-0100. Fax, 516-
244-0109.
Southern region............ Rm. 10A26, 819 X. William Proenza
Taylor St., Fort
Worth, TX 76102-
6171. Phone, 817-
978-2651. Fax, 817-
334-4187.
Central region............. Rm. 1836, 601 E. Dennis H. McCarthy
12th St., Kansas
City, MO 64106-
2897. Phone, 816-
426-5400. Fax, 816-
426-3270.
Training center............ 7220 NW. 101st John L. Vogel
Terrace, Kansas
City, MO 64153.
Phone, 816-880-
9595. Fax, 816-8

pi_1915094
* ook goedemorgen *

[DOCID:188578tx_xxx-112]
From the Government Manual Online via GPO Access
[wais.access.gpo.gov]
[Page 597-652]

[[Page 597]]

APPENDIX B: Federal Executive Agencies Terminated, Transferred, or
Changed in Name Subsequent to March 4, 1933

Note: Italicized terms indicate obsolete agencies, organizations, and
entities. In most instances, explanatory remarks are written at those
terms elsewhere in this appendix. Dates prior to March 4, 1933, are
included to provide additional information about the agencies.

This appendix is indexed in a format considered to be useful to the
reader. Entries are carried at the most significant term in their
titles, or when there is more than one significant term, the entry is
carried at the first significant term. Thus, Bureau of the Budget is
found at Budget, Bureau of the, and Annual Assay Commission is found at
Assay Commission, Annual. Reader comments on the format are encouraged
and should be sent to the address shown on page iv of the Manual.

ACTION Established by Reorg. Plan No. 1 of 1971 (5 U.S.C. app.),
effective July 1, 1971. Reorganized by act of Oct. 1, 1973 (87 Stat.
405). Functions relating to SCORE and ACT programs transferred to Small
Business Administration by EO 11871 of July 18, 1975 (40 FR 30915).
Functions exercised by the Director of ACTION prior to Mar. 31, 1995,
transferred to the Corporation for National and Community Service (107
Stat. 888 and Proclamation 6662 of Apr. 4, 1994 (57 FR 16507)).

Acts of Congress See State, Department of

Administrative Conference of the United States Established by act of
Aug. 30, 1964 (78 Stat. 615). Terminated by act of Nov. 19, 1995 (109
Stat. 480).

Advanced Research Projects Agency See Defense Advanced Research
Projects Agency

Advisory Board, Commission, Committee. See other part of title

Aeronautical Board Organized in 1916 by agreement of War and Navy
Secretaries. Placed under supervision of President by military order of
July 5, 1939. Dissolved by Secretary of Defense letter of July 27, 1948,
and functions transferred to Munitions Board and Research and
Development Board. Military order of July 5, 1939, revoked by military
order of Oct. 18, 1948.

Aeronautics, Bureau of Established in the Department of the Navy by act
of July 12, 1921 (42 Stat. 140). Abolished by act of Aug. 18, 1959 (73
Stat. 395) and functions transferred to Bureau of Naval Weapons.

Aeronautics, National Advisory Committee for Established by act of Mar.
3, 1915 (38 Stat. 930). Terminated by act of July 29, 1958 (72 Stat.
432), and functions transferred to National Aeronautics and Space
Administration, established by same act.

Aeronautics Administration, Civil See Aeronautics Authority, Civil

Aeronautics Authority, Civil Established under act of June 23, 1938 (52
Stat. 973). Renamed Civil Aeronautics Board and Administrator
transferred to the Department of Commerce by Reorg. Plan Nos. III and IV
of 1940, effective June 30, 1940. Office of Administrator designated
Civil Aeronautics Administration by Department Order 52 of Aug. 29,
1940. Administration transferred to Federal Aviation Agency by act of
Aug. 23, 1958 (72 Stat. 810). Functions of Board under act of Aug. 23,
1958 (72 Stat. 775), transferred to National Transportation Safety Board
by act of Oct. 15, 1966 (80 Stat. 931). Functions of Board terminated or
transferred--effective in part Dec. 31, 1981; in part Jan. 1, 1983; and
in part Jan. 1, 1985--by act of Aug. 23, 1958 (92 Stat. 1744). Most
remaining functions transferred to Secretary of Transportation,
remainder to U.S. Postal Service. Termination of Board finalized by act
of Oct. 4, 1984 (98 Stat. 1703).

Aeronautics Board, Civil See Aeronautics Authority, Civil

Aeronautics Branch Established in the Department of Commerce to carry
out provisions of act of May 20, 1926 (44 Stat. 568). Renamed Bureau of
Air Commerce by Secretary's administrative order of July 1, 1934.
Personnel and property transferred to Civil Aeronautics Authority by EO
7959 of Aug. 22, 1938.

Aeronautics and Space Council, National Established by act of July 29,
1958 (72 Stat. 427). Abolished by Reorg. Plan No. 1 of 1973, effective
June 30, 1973.

Aging, Administration on Established by Secretary of Health, Education,
and Welfare on Oct. 1, 1965, to carry out provisions of act of July 14,
1965 (79 Stat. 218). Reassigned to Social and Rehabilitation Service by
Department reorganization of Aug. 15,


[[Page 598]]
1967. Transferred to Office of Assistant Secretary for Human Development
by Secretary's order of June 15, 1973. Transferred to the Office of the
Secretary of Health and Human Services by Secretary's reorganization
notice dated Apr. 15, 1991.

Aging, Federal Council on Established by Presidential memorandum of
Apr. 2, 1956. Reconstituted at Federal level by Presidential letter of
Mar. 7, 1959, to Secretary of Health, Education, and Welfare. Abolished
by EO 11022 of May 15, 1962, which established President's Council on
Aging.

Aging, Office of Established by Secretary of Health, Education, and
Welfare June 2, 1955, as Special Staff on Aging. Terminated Sept. 30,
1965, and functions assumed by Administration on Aging.

Aging, President's Council on Established by EO 11022 of May 14, 1962.
Terminated by EO 11022, which was revoked by EO 12379 of Aug. 17, 1982.

Agricultural Adjustment Administration Established by act of May 12,
1933 (48 Stat. 31). Consolidated into Agricultural Conservation and
Adjustment Administration as Agricultural Adjustment Agency, Department
of Agriculture, by EO 9069 of Feb. 23, 1942. Grouped with other agencies
to form Food Production Administration by EO 9280 of Dec. 5, 1942.
Transferred to War Food Administration by EO 9322 of Mar. 26, 1943.
Administration terminated by EO 9577 of June 29, 1945, and functions
transferred to Secretary of Agriculture. Transfer made permanent by
Reorg. Plan No. 3 of 1946, effective July 16, 1946. Functions of
Agricultural Adjustment Agency consolidated with Production and
Marketing Administration by Secretary's Memorandum 1118 of Aug. 18,
1945.

Agricultural Adjustment Agency See Agricultural Adjustment
Administration

Agricultural Advisory Commission, National Established by EO 10472 of
July 20, 1953. Terminated Feb. 4, 1965, on resignation of members.

Agricultural Chemistry and Engineering, Bureau of See Agricultural
Engineering, Bureau of

Agricultural Conservation and Adjustment Administration Established by
EO 9069 of Feb. 23, 1942, consolidating Agricultural Adjustment Agency,
Sugar Agency, Federal Crop Insurance Corporation, and Soil Conservation
Service. Consolidated into Food Production Administration by EO 9280 of
Dec. 5, 1942.

Agricultural Conservation Program Service Established by Secretary of
Agriculture Jan. 21, 1953, from part of Production and Marketing
Administration. Merged with Commodity Stabilization Service by
Secretary's Memorandum 1446, supp. 2, of Apr. 19, 1961.

Agricultural Developmental Service, International Established by
Secretary of Agriculture memorandum of July 12, 1963. Functions and
delegations of authority transferred to Foreign Agricultural Service by
Secretary's memorandum of Mar. 28, 1969. Functions transferred by
Secretary to Foreign Economic Development Service Nov. 8, 1969.

Agricultural Economics, Bureau of Established by act of May 11, 1931
(42 Stat. 532). Functions transferred to other units of the Department
of Agriculture, including Consumer and Marketing Service and
Agricultural Research Service, under Secretary's Memorandum 1320, supp.
4, of Nov. 2, 1953.

Agricultural Engineering, Bureau of Established by act of Feb. 23, 1931
(46 Stat. 1266). Merged with Bureau of Chemistry and Soils by
Secretarial order of Oct. 16, 1938, to form Bureau of Agricultural
Chemistry and Engineering.

Agricultural and Industrial Chemistry, Bureau of Bureau of Chemistry
and Bureau of Soils, created in 1901, combined into Bureau of Chemistry
and Soils by act of Jan. 18, 1927 (44 Stat. 976). Soils units
transferred to other agencies of the Department of Agriculture and
remaining units of Bureau of Chemistry and Soils and Bureau of
Agricultural Engineering consolidated with Bureau of Agricultural
Chemistry and Engineering by Secretary's order of Oct. 16, 1938. In
February 1943 agricultural engineering research made part of Bureau of
Plant Industry, Soils, and Agricultural Engineering, and organization
for continuing agricultural chemistry research relating to crop
utilization named Bureau of Agricultural and Industrial Chemistry, in
accordance with Research Administration Memorandum 5 issued pursuant to
EO 9069 of Feb. 23, 1942, and in conformity with Secretary's Memorandums
960 and 986. Functions transferred to Agricultural Research Service
under Secretary's Memorandum 1320, supp. 4, of Nov. 2, 1953.

Agricultural Library, National Established by Secretary of Agriculture
Memorandum 1496 of Mar. 23, 1962. Consolidated into Science and
Education Administration by Secretary's order of Jan. 24, 1978.
Reestablished as National Agricultural Library by Secretary's order of
June 16, 1981. Became part of Agricultural Research Service in 1994
under Department of Agriculture reorganization.

Agricultural Marketing Administration Established by EO 9069 of Feb.
23, 1942, consolidating Surplus Marketing Administration, Agricultural
Marketing Service, and Commodity Exchange Administration. Division of
Consumers' Counsel transferred to Administration by Secretary's
memorandum of Feb. 28, 1942. Consolidated into Food Distribution
Administration in the Department of Agriculture by EO 9280 of Dec. 5,
1942.

Agricultural Marketing Service Established by the Secretary of
Agriculture pursuant to act of June 30, 1939 (53 Stat. 939). Merged into
Agricultural Marketing Administration by EO 9069 of Feb. 23, 1942.
Renamed Consumer and Marketing Service by Secretary's Memorandum 1567,
supp. 1, of Feb. 8, 1965. Reestablished as Agricultural Marketing
Service by the Secretary of Agriculture on Apr. 2, 1972, under authority
of Reorg. Plan No. 2 of 1953 (67 Stat. 633).

Agricultural Relations, Office of Foreign See Agricultural Service,
Foreign


[[Page 599]]
Agricultural Research Administration Established by EO 9069 of Feb. 23,
1942. Superseded by Agricultural Research Service.

Agricultural Research Service Established by Secretary of Agriculture
Memorandum 1320, supp. 4, of Nov. 2, 1953. Consolidated into Science and
Education Administration by Secretary's order of Jan. 24, 1978.
Reestablished as Agricultural Research Service by Secretarial order of
June 16, 1981.

Agricultural Service, Foreign Established by act of June 5, 1930 (46
Stat. 497). Economic research and agricultural attache activities
administered by Foreign Agricultural Service Division, Bureau of
Agricultural Economics, until June 29, 1939. Transferred by Reorg. Plan
No. II of 1939, effective July 1, 1939, from the Department of
Agriculture to the Department of State. Economic research functions of
Division transferred to Office of Foreign Agricultural Relations June
30, 1939. Functions of Office transferred to Foreign Agricultural
Service Mar. 10, 1953. Agricultural attaches placed in the Department of
Agriculture by act of Aug. 28, 1954 (68 Stat. 908).

Agricultural Stabilization and Conservation Service Established June 5,
1961, by the Secretary of Agriculture under authority of revised
statutes (5 U.S.C. 301) and Reorg. Plan No. 2 of 1953 (5 U.S.C. app.).
Abolished and functions assumed by the Farm Service Agency by
Secretary's Memorandum 1010-1 dated Oct. 20, 1994 (59 FR 60297, 60299).

Agricultural Statistics Division Transferred to Bureau of Agricultural
Economics by EO 9069 of Feb. 23, 1942.

Agriculture, Division of See Farm Products, Division of

Air Commerce, Bureau of See Aeronautics Branch

Air Coordinating Committee Established Mar. 27, 1945, by
interdepartmental memorandum; formally established by EO 9781 of Sept.
19, 1946. Terminated by EO 10883 of Aug. 11, 1960, and functions
transferred for liquidation to Federal Aviation Agency.

Air Force Management Engineering Agency Established in 1975 in Air
Force as separate operating unit. Made subordinate unit of Air Force
Military Personnel Center (formerly Air Force Manpower and Personnel
Center) in 1978. Reestablished as separate operating unit of Air Force,
effective Mar. 1, 1985, by Secretarial order.

Air Force Manpower and Personnel Center Certain functions transferred
on activation of Air Force Management Engineering Agency, which was made
separate operating unit from Air Force Manpower and Personnel Center
(later Air Force Military Personnel Center) in April 1985 by general
order of Chief of Staff.

Air Force Medical Service Center Renamed Air Force Office of Medical
Support by Program Action Directive 85-1 of Mar. 6, 1985, approved by
Air Force Vice Chief of Staff.

Air Mail, Bureau of Established in Interstate Commerce Commission to
carry out provisions of act of June 12, 1934 (48 Stat. 933). Personnel
and property transferred to Civil Aeronautics Authority by EO 7959 of
Aug. 22, 1938.

Air Patrol, Civil Established in Civilian Defense Office by
Administrative Order 9 of Dec. 8, 1941. Transferred to Department of War
as auxiliary of Army Air Forces by EO 9339 of Apr. 29, 1943. Transferred
to the Department of the Air Force by Secretary of Defense order of May
21, 1948. Established as civilian auxiliary of U.S. Air Force by act of
May 26, 1948 (62 Stat. 274).

Air Safety Board Established by act of June 23, 1938 (52 Stat. 973).
Functions transferred to Civil Aeronautics Board by Reorg. Plan No. IV
of 1940, effective June 30, 1940.

Airways Modernization Board Established by act of Aug. 14, 1957 (71
Stat. 349). Transferred to Federal Aviation Agency by EO 10786 of Nov.
1, 1958.

Alaska, Board of Road Commissioners for Established in Department of
War by act of Jan. 27, 1905 (33 Stat. 616). Functions transferred to the
Department of Interior by act of June 30, 1932 (47 Stat. 446), and
delegated to Alaska Road Commission. Functions transferred to the
Department of Commerce by act of June 29, 1956 (70 Stat. 377), and
terminated by act of June 25, 1959 (73 Stat. 145).

Alaska, Federal Field Committee for Development Planning in Established
by EO 11182 of Oct. 2, 1964. Abolished by EO 11608 of July 19, 1971.

Alaska, Federal Reconstruction and Development Planning Commission for
Established by EO 11150 of Apr. 2, 1964. Abolished by EO 11182 of Oct.
2, 1964, which established President's Review Committee for Development
Planning in Alaska and Federal Field Committee for Development Planning
in Alaska.

Alaska, President's Review Committee for Development Planning in
Established by EO 11182 of Oct. 2, 1964. Superseded by Federal Advisory
Council on Regional Economic Development established by EO 11386 of Dec.
28, 1967. EO 11386 revoked by EO 12553 of Feb. 25, 1986.

Alaska Communication System Operational responsibility vested in
Secretary of the Army by act of May 26, 1900 (31 Stat. 206). Transferred
to Secretary of the Air Force by Secretary of Defense reorganization
order of May 24, 1962.

Alaska Engineering Commission See Alaska Railroad

Alaska Game Commission Established by act of Jan. 13, 1925 (43 Stat.
740). Expired Dec. 31, 1959, pursuant to act of July 7, 1958 (72 Stat.
339).

Alaska International Rail and Highway Commission Established by act of
Aug. 1, 1956 (70 Stat. 888). Terminated June 30, 1961, under terms of
act.

Alaska Power Administration Established by the Secretary of the
Interior in 1967. Transferred to the


[[Page 600]]
Department of Energy by act of Aug. 4, 1977 (91 Stat. 578).

Alaska Railroad Built pursuant to act of Mar. 12, 1914 (38 Stat. 305),
which created Alaska Engineering Commission. Placed under the Secretary
of the Interior by EO 2129 of Jan. 26, 1915, and renamed Alaska Railroad
by EO 3861 of June 8, 1923. Authority to regulate tariffs granted to
Interstate Commerce Commission by EO 11107 of Apr. 25, 1963. Authority
to operate Railroad transferred to the Secretary of Transportation by
act of Oct. 15, 1966 (80 Stat. 941), effective Apr. 1, 1967. Railroad
purchased by State of Alaska, effective Jan. 5, 1985.

Alaska Road Commission See Alaska, Board of Road Commissioners for

Alcohol, Bureau of Industrial Established by act of May 27, 1930 (46
Stat. 427). Consolidated into Bureau of Internal Revenue by EO 6166 of
June 10, 1933. Consolidation deferred until May 11, 1934, by EO 6639 of
Mar. 10, 1934. Order also transferred to Internal Revenue Commissioner
certain functions imposed on Attorney General by act of May 27, 1930,
with relation to enforcement of criminal laws concerning intoxicating
liquors remaining in effect after repeal of 18th amendment; personnel
of, and appropriations for, Bureau of Industrial Alcohol; and necessary
personnel and appropriations of Bureau of Prohibition, Department of
Justice.

Alcohol, Drug Abuse, and Mental Health Administration Established by
the Secretary of Health, Education, and Welfare by act of May 21, 1972
(88 Stat. 134). Redesignated as an agency of the Public Health Service
from the National Institute of Mental Health Sept. 25, 1973, by the
Secretary of Health, Education, and Welfare. Functions transferred to
the Department of Health and Human Services by act of Oct. 17, 1979 (93
Stat. 695). Established as an agency of the Public Health Service by act
of Oct. 27, 1986 (100 Stat. 3207-106). Renamed Substance Abuse and
Mental Health Services Administration by act of July 10, 1992 (106 Stat.
325).

Alcohol Abuse and Alcoholism, National Institute on Established within
the National Institute of Mental Health, Department of Health,
Education, and Welfare by act of Dec. 31, 1970 (84 Stat. 1848). Removed
from within the National Institute of Mental Health and made an entity
within the Alcohol, Drug Abuse, and Mental Health Administration by act
of May 14, 1974 (88 Stat. 1356). Functions transferred to the Department
of Health and Human Services by act of Oct. 17, 1979 (93 Stat. 695).
(See also act of Oct. 27, 1986; 100 Stat. 3207-106.) Abolished by act of
July 10, 1992 (106 Stat. 331). Reestablished by act of July 10, 1992
(106 Stat. 359).

Alcohol Administration, Federal See Alcohol Control Administration,
Federal

Alcohol Control Administration, Federal Established by EO 6474 of Dec.
4, 1933. Abolished Sept. 24, 1935, on induction into office of
Administrator, Federal Alcohol Administration, as provided in act of
Aug. 29, 1935 (49 Stat. 977). Abolished by Reorg. Plan No. III of 1940,
effective June 30, 1940, and functions consolidated with activities of
Internal Revenue Service.

Alexander Hamilton Bicentennial Commission Established by act of Aug.
20, 1954 (68 Stat. 746). Terminated Apr. 30, 1958.

Alien Property Custodian Appointed by President Oct. 22, 1917, under
authority of act of Oct. 6, 1917 (40 Stat. 415). Office transferred to
Alien Property Division, Department of Justice, by EO 6694 of May 1,
1934. Powers vested in President by act delegated to Attorney General by
EO 8136 of May 15, 1939. Authority vested in Attorney General by EO's
6694 and 8136 transferred by EO 9142 of Apr. 21, 1942, to Office of
Alien Property Custodian, Office for Emergency Management, as provided
for by EO 9095 of Mar. 11, 1942.

American Republics, Office for Coordination of Commercial and Cultural
Relations between the Established by Council of National Defense order
approved by President Aug. 16, 1940. Succeeded by Office of the
Coordinator of Inter-American Affairs, Office for Emergency Management,
established by EO 8840 of July 30, 1941. Renamed Office of Inter-
American Affairs by EO 9532 of Mar. 23, 1945. Information functions
transferred to the Department of State by EO 9608 of Aug. 31, 1945.
Terminated by EO 9710 of Apr. 10, 1946, and functions transferred to the
Department of State, functioning as Institute of Inter-American Affairs.
Transferred to Foreign Operations Administration by Reorg. Plan No. 7,
effective Aug. 1, 1953.

American Revolution Bicentennial Administration See American Revolution
Bicentennial Commission

American Revolution Bicentennial Commission Established by act of July
4, 1966 (80 Stat. 259). American Revolution Bicentennial Administration
established by act of Dec. 11, 1973 (87 Stat. 697), to replace
Commission. Administration terminated June 30, 1977, pursuant to terms
of act. Certain continuing functions transferred to the Secretary of the
Interior by EO 12001 of June 29, 1977.

Anacostia Neighborhood Museum Renamed Anacostia Museum by Smithsonian
Institution announcement of Apr. 3, 1987.

Animal Industry, Bureau of Established in the Department of Agriculture
by act of May 29, 1884 (23 Stat. 31). Functions transferred to
Agricultural Research Service by Secretary's Memorandum 1320, supp. 4,
of Nov. 2, 1953.

Apprenticeship, Federal Committee on Previously known as Federal
Committee on Apprentice Training, established by EO 6750-C of June 27,
1934. Functioned as part of Division of Labor Standards, Department of
Labor, pursuant to act of Aug. 16, 1937 (50 Stat. 664). Transferred to
Office of Administrator, Federal Security Agency, by EO 9139 of Apr. 18,
1942. Transferred to Bureau of Training, War Manpower Commission, by EO
9247 of Sept. 17, 1942. Returned to the Department of Labor by EO 9617
of Sept. 19, 1945.


[[Page 601]]
Archive of Folksong Renamed Archive of Folk Culture by administrative
order of Deputy Librarian of Congress, effective Sept. 21, 1981.

Archives Council, National Established by act of June 19, 1934 (48
Stat. 1122). Transferred to General Services Administration by act of
June 30, 1949 (63 Stat. 378). Terminated on establishment of Federal
Records Council by act of Sept. 5, 1950 (64 Stat. 583).

Archives Establishment, National Office of Archivist of the U.S. and
National Archives created by act of June 19, 1934 (48 Stat. 1122).
Transferred to General Services Administration by act of June 30, 1949
(63 Stat. 381), and incorporated as National Archives and Records
Service by order of General Services Administrator, together with
functions of Division of the Federal Register, National Archives
Council, National Historical Publications Commission, National Archives
Trust Fund Board, Trustees of the Franklin D. Roosevelt Library, and
Administrative Committee of the Federal Register. Transferred from
General Services Administration to National Archives and Records
Administration by act of Oct. 19, 1984 (98 Stat. 2283), along with
certain functions of Administrator of General Services transferred to
Archivist of the United States, effective Apr. 1, 1985.

Archives and Records Service, National See Archives Establishment,
National

Archives Trust Fund Board, National See Archives Establishment,
National

Area Redevelopment Administration Established May 8, 1961, by the
Secretary of Commerce pursuant to act of May 1, 1961 (75 Stat. 47) and
Reorg. Plan No. 5 of 1950, effective May 24, 1950. Terminated Aug. 31,
1965, by act of June 30, 1965 (79 Stat. 195). Functions transferred to
Economic Development Administration in the Department of Commerce by
Department Order 4-A, effective Sept. 1, 1965.

Arlington Memorial Amphitheater Commission Established by act of Mar.
4, 1921 (41 Stat. 1440). Abolished by act of Sept. 2, 1960 (74 Stat.
739), and functions transferred to the Secretary of Defense.

Arlington Memorial Bridge Commission Established by act of Mar. 4, 1913
(37 Stat. 885; D.C. Code (1951 ed.) 8-158). Abolished by EO 6166 of June
10, 1933, and functions transferred to Office of National Parks,
Buildings, and Reservations.

Armed Forces Medical Library Founded in 1836 as Library of the Surgeon
General's Office, U.S. Army. Later known as Army Medical Library, then
Armed Forces Medical Library in 1952. Personnel and property transferred
to National Library of Medicine established in Public Health Service by
act of Aug. 3, 1956 (70 Stat. 960).

Armed Forces Museum Advisory Board, National Established by act of Aug.
30, 1961 (75 Stat. 414). Functions discontinued due to lack of funding.

Armed Forces Staff College Renamed Joint Forces Staff College by act of
Oct. 30, 2000 (144 Stat. 165A-230).

Armed Services Renegotiation Board Established by Secretary of Defense
directive of July 19, 1948. Abolished by Secretary's letter of Jan. 18,
1952, and functions transferred to Renegotiation Board.

Arms Control and Disarmament Agency, U.S. Established by act of Sept.
26, 1961 (75 Stat. 631). Abolished by act of Oct. 21, 1998 (112 Stat.
2681-767) and functions transferred to the Secretary of State.

Army Communications Command, U.S. Renamed U.S. Army Information Systems
Command by Department General Order No. 26 of July 25, 1984.

Army Materiel Development and Readiness Command, U.S. Renamed U.S. Army
Materiel Command by Department General Order No. 28 of Aug. 15, 1984.

Army and Navy, Joint Board Placed under direction of President by
military order of July 5, 1939. Abolished Sept. 1, 1947, by joint letter
of Aug. 20, 1947, to President from Secretaries of War and Navy.

Army and Navy Staff College Established Apr. 23, 1943, and operated
under Joint Chiefs of Staff. Redesignated the National War College,
effective July 1, 1946.

Army Specialist Corps Established in Department of War by EO 9078 of
Feb. 26, 1942. Abolished by the Secretary of War Oct. 31, 1942, and
functions merged into central Officer Procurement Service.

Arthritis, Diabetes, and Digestive and Kidney Diseases, National
Institute of See Arthritis, Metabolism, and Digestive Diseases,
National Institute of

Arthritis, Metabolism, and Digestive Diseases, National Institute of
Renamed National Institute of Arthritis, Diabetes, and Digestive and
Kidney Diseases by Secretary's order of June 15, 1981, pursuant to act
of Dec. 19, 1980 (94 Stat. 3184). Renamed National Institute of Diabetes
and Digestive and Kidney Diseases and National Institute of Arthritis
and Musculoskeletal and Skin Diseases by act of Nov. 20, 1985 (99 Stat.
820).

Arts, Advisory Committee on the Established under authority of act of
Sept. 20, 1961 (75 Stat. 527). Terminated July 1973 by act of Oct. 6,
1972. Formally abolished by Reorg. Plan No. 2 of 1977, effective Apr. 1,
1978.

Arts, National Council on the Established in Executive Office of the
President by act of Sept. 3, 1964 (78 Stat. 905). Transferred to
National Foundation on the Arts and the Humanities by act of Sept. 29,
1965 (79 Stat. 845).

Assay Commission, Annual Established initially by act of Apr. 2, 1792
(1 Stat. 250) and by act of Feb. 12, 1873 (Revised Statute sec. 3647; 17
Stat. 432). Terminated and functions transferred to the Secretary of the
Treasury by act of Mar. 14, 1980 (94 Stat. 98).


[[Page 602]]
Assistance, Bureau of Public Renamed Bureau of Family Services by order
of the Secretary of Health, Education, and Welfare, effective Jan. 1,
1962. Functions redelegated to Social and Rehabilitation Service by
Secretary's reorganization of Aug. 15, 1967.

Assistance Coordinating Committee, Adjustment Established by act of
Jan. 3, 1975 (88 Stat. 2040). Inactive since 1981.

Assistance Payments Administration Established by Secretary of Health,
Education, and Welfare reorganization of Aug. 15, 1967. Transferred by
Secretary's reorganization of Mar. 8, 1977 (42 FR 13262), from Social
and Rehabilitation Service to Social Security Administration.

Athletics, Interagency Committee on International Established by EO
11117 of Aug. 13, 1963. Terminated by EO 11515 of Mar. 13, 1970.

Atlantic-Pacific Interoceanic Canal Study Commission Established by act
of Sept. 22, 1964 (78 Stat. 990). Terminated Dec. 1, 1970, pursuant to
terms of act.

Atomic Energy Commission Established by act of Aug. 1, 1946 (60 Stat.
755). Abolished by act of Oct. 11, 1974 (88 Stat. 1237) and functions
transferred to Energy Research and Development Administration and
Nuclear Regulatory Commission.

Aviation, Interdepartmental Committee on Civil International
Established by Presidential letter of June 20, 1935. Terminated on
organization of Civil Aeronautics Authority.

Aviation Agency, Federal Established by act of Aug. 23, 1958 (72 Stat.
731). Transferred to Secretary of Transportation by act of Oct. 15, 1966
(80 Stat. 931). Agency reestablished as Federal Aviation Administration
by act of Jan 12, 1983 (96 Stat. 2416).

Aviation Commission, Federal Established by act of June 12, 1934 (48
Stat. 938). Terminated Feb. 1, 1935, under provisions of act.

Beltsville Research Center Established to operate with other agencies
of the Department of Agriculture under Agricultural Research
Administration. Consolidated into Agricultural Research Administration,
the Department of Agriculture, by EO 9069 of Feb. 23, 1942.

Biological Service, National Established in the the Department of the
Interior in 1995 by Secretarial order. Transferred to U.S. Geological
Survey as new Biological Resources Division by Secretarial Order No.
3202, Sept. 30, 1996.

Biological Survey, Bureau of Established by Secretary's order July 1,
1885, as part of Division of Entomology, Department of Agriculture. Made
separate bureau by act of Apr. 23, 1904 (33 Stat. 276). Transferred to
the Department of the Interior by Reorg. Plan No. II of 1939, effective
July 1, 1939. Consolidated with Bureau of Fisheries into Fish and
Wildlife Service by Reorg. Plan No. III of 1940, effective June 30,
1940.

Biological Survey, National Established in the the Department of the
Interior by Secretarial Order 3173 of Sept. 29, 1993. Renamed National
Biological Service by Secretarial order in 1995.

Blind, Inc., American Printing House for the Established in 1858 as
privately owned institution in Louisville, KY. Functions of the
Secretary of the Treasury, except that relating to perpetual trust
funds, transferred to Federal Security Agency by Reorg. Plan No. II of
1939, effective July 1, 1939. Functions performed by Department of
Health, Education, and Welfare transferred to the Department of
Education.

Blind-made Products, Committee on Purchases of Established by act of
June 25, 1938 (52 Stat. 1196). Renamed Committee for Purchase of
Products and Services of the Blind and Other Severely Handicapped by act
of June 23, 1971 (85 Stat. 77). Renamed Committee for Purchase from the
Blind and Other Severely Handicapped by act of July 25, 1974 (88 Stat.
392). Renamed Committee for Purchase From People Who Are Blind or
Severely Disabled by act of Oct. 29, 1992 (106 Stat. 4486).

Blind and Other Severely Handicapped, Committee for Purchase of Products
and Services of the See Blind-made Products, Committee on Purchases of

Board. See other part of title

Bond and Spirits Division Established as Taxes and Penalties Unit, as
announced by Assistant to Attorney General in departmental circular of
May 25, 1934, pursuant to EO 6639 of May 10, 1934. Abolished by
administrative order of October 1942, and functions transferred to Tax,
Claims, and Criminal Divisions, Department of Justice.

Bonneville Power Administration Established by the Secretary of the
Interior pursuant to act of Aug. 20, 1937 (50 Stat. 731). Transferred to
the Department of Energy by act of Aug. 4, 1977 (91 Stat. 578).

Boston National Historic Sites Commission Established by joint
resolution of June 16, 1955 (69 Stat. 137). Terminated June 16, 1960, by
act of Feb. 19, 1957 (71 Stat. 4).

Brazil-U.S. Defense Commission, Joint Established in May 1942 by
agreement between the U.S. and Brazil. Terminated in September 1977 at
direction of Brazilian Government.

Broadcast Bureau Merged with Cable Television Bureau to form Mass Media
Bureau by Federal Communications Commission order, effective Nov. 30,
1982.

Broadcast Intelligence Service, Foreign See Broadcast Monitoring
Service, Foreign

Broadcast Monitoring Service, Foreign Established in Federal
Communications Commission by Presidential directive of Feb. 26, 1941.
Renamed Foreign Broadcast Intelligence Service by FCC order of July 28,
1942. Transferred to Department of War by Secretarial order of Dec. 30,
1945. Act of May 3, 1945 (59 Stat. 110), provided for liquidation 60
days after Japanese armistice. Transferred to Central


[[Page 603]]
Intelligence Group Aug. 5, 1946, and renamed Foreign Broadcast
Information Service.

Budget, Bureau of the Established by act of June 10, 1921 (42 Stat.
20), in the Department of the Treasury under immediate direction of
President. Transferred to Executive Office of the President by Reorg.
Plan No. I of 1939, effective July 1, 1939. Reorganized by Reorg. Plan
No. 2 of 1970, effective July 1, 1970, and renamed Office of Management
and Budget.

Buildings Administration, Public Established as part of Federal Works
Agency by Reorg. Plan No. I of 1939, effective July 1, 1939. Abolished
by act of June 30, 1949 (63 Stat. 380), and functions transferred to
General Services Administration.

Buildings Branch, Public Organized in Procurement Division, established
in the Department of the Treasury by EO 6166 of June 10, 1933.
Consolidated with Branch of Buildings Management, National Park Service,
to form Public Buildings Administration, Federal Works Agency, under
Reorg. Plan No. I of 1939, effective July 1, 1939.

Buildings Commission, Public Established by act of July 1, 1916 (39
Stat. 328). Abolished by EO 6166 of June 10, 1933, and functions
transferred to Office of National Parks, Buildings, and Reservations,
Department of the Interior. Functions transferred to Public Buildings
Administration, Federal Works Agency, under Reorg. Plan No. I of 1939,
effective July 1, 1939.

Buildings Management, Branch of Functions of National Park Service
(except those relating to monuments and memorials) consolidated with
Public Buildings Branch, Procurement Division, Department of the
Treasury, to form Public Buildings Administration, Federal Works Agency,
in accordance with Reorg. Plan No. I of 1939, effective July 1, 1939.

Buildings and Public Parks of the National Capital, Office of Public
Established by act of Feb. 26, 1925 (43 Stat. 983), by consolidation of
Office of Public Buildings and Grounds under Chief of Engineers, U.S.
Army, and Office of Superintendent of State, War, and Navy Department
Buildings. Abolished by EO 6166 of June 10, 1933, and functions
transferred to Office of National Parks, Buildings, and Reservations,
Department of the Interior.

Bureau. See other part of title

Business, Cabinet Committee on Small Established by Presidential letter
of May 31, 1956. Dissolved January 1961.

Business Administration, Domestic and International See Business and
Defense Services Administration

Business and Defense Services Administration Established by the
Secretary of Commerce Oct. 1, 1953, and operated under Department
Organization Order 40-1. Abolished by Department Organization Order 40-
1A of Sept. 15, 1970, and functions transferred to Bureau of Domestic
Commerce. Functions transferred to Domestic and International Business
Administration, effective Nov. 17, 1972. Administration terminated by
Secretary's order of Dec. 4, 1977, and functions assumed by Industry and
Trade Administration.

Business Economics, Office of Established by the Secretary of Commerce
Jan. 17, 1946. Renamed Office of Economic Analysis Dec. 1, 1953.
Transferred to the Administration of Social and Economic Statistics
along with Bureau of the Census and renamed Bureau of Economic Analysis
on Jan. 1, 1972.

Business Operations, Bureau of International Established by the
Secretary of Commerce Aug. 8, 1961, by Departmental Orders 173 and 174.
Abolished by Departmental Order 182 of Feb. 1, 1963, which established
Bureau of International Commerce. Functions transferred to Domestic and
International Business Administration, effective Nov. 17, 1972.

Cable Television Bureau Merged with Broadcast Bureau by Federal
Communications Commission order to form Mass Media Bureau, effective
Nov. 30, 1982.

California Debris Commission Established by act of Mar. 1, 1893 (27
Stat. 507). Abolished by act of Nov. 17, 1986 (100 Stat. 4229), and
functions transferred to the Secretary of the Interior.

Canal Zone Government Established by act of Aug. 24, 1912 (37 Stat.
561). Abolished by act of Sept. 27, 1979 (93 Stat. 454).

Capital Housing Authority, National Established by act of June 12, 1934
(48 Stat. 930). Made agency of District of Columbia government by act of
Dec. 24, 1973 (87 Stat. 779), effective July 1, 1974.

Capital Park Commission, National Established by act of June 6, 1924
(43 Stat. 463). National Capital Park and Planning Commission named
successor by act of Apr. 30, 1926 (44 Stat. 374). Functions transferred
to National Capital Planning Commission by act of July 19, 1952 (66
Stat. 781).

Capital Park and Planning Commission, National See Capital Park
Commission, National

Capital Regional Planning Council, National Established by act of July
19, 1952 (66 Stat. 785). Terminated by Reorg. Plan No. 5 of 1966,
effective Sept. 8, 1966.

Capital Transportation Agency, National Established by act of July 14,
1960 (74 Stat 537). Authorized to establish rapid rail transit system by
act of Sept. 8, 1965 (79 Stat. 663). Functions transferred to Washington
Metropolitan Area Transit Authority by EO 11373 of Sept. 20, 1967.

Career Executive Board Established by EO 10758 of Mar. 4, 1958.
Terminated July 1, 1959, and EO 10758 revoked by EO 10859 of Feb. 5,
1960.

Caribbean Organization Act of June 30, 1961 (75 Stat. 194), provided
for acceptance by President of Agreement for the Establishment of the
Caribbean Organization, signed at Washington, June 21, 1960. Article III
of Agreement provided for termination of


[[Page 604]]
Caribbean Commission, authorized by Agreement signed Oct. 30, 1946, on
first meeting of Caribbean Council, governing body of Organization.
Terminated, effective Dec. 31, 1965, by resolution adopted by Council.

Cemeteries and Memorials in Europe, National Supervision transferred
from Department of War to American Battle Monuments Commission by EO
6614 of Feb. 26, 1934, which transfer was deferred to May 21, 1934, by
EO 6690 of Apr. 25, 1934.

Cemeteries and Parks, National Department of War functions regarding
National Cemeteries and Parks located in continental U.S. transferred to
Office of National Parks, Buildings, and Reservations, Department of the
Interior, by EO 6166 of June 10, 1933.

Cemetery System, National Established in the Veterans' Administration
by act of June 18, 1973 (87 Stat. 75). Redesignated as the National
Cemetery Administration by act of Nov. 11, 1998 (112 Stat. 3337).

Censorship, Office of Established by EO 8985 of Dec. 19, 1941.
Terminated by EO 9631 of Sept. 28, 1945.

Censorship Policy Board Established by EO 8985 of Dec. 19, 1941.
Terminated by EO 9631 of Sept. 28, 1945.

Census, Bureau of the See Census Office

Census Office Established temporarily within the the Department of the
Interior in accordance with act of Mar. 3, 1899. Established as a
permanent office by act of Mar. 6, 1902. Transferred from the Department
of the Interior to Department of Commerce and Labor by act of Feb. 14,
1903. Remained in the Department of Commerce under provisions of
Reorganization Plan No. 5 of May 24, 1950, effective May 24, 1950.

Center. See other part of title

Central. See other part of title

Chemistry and Soils, Bureau of See Agricultural and Industrial
Chemistry, Bureau of

Chesapeake Bay Center for Environmental Studies Established in 1965 in
Annapolis, MD, as part of Smithsonian Institution by Secretarial order.
Merged with Radiation Biology Laboratory by Secretarial Order July 1,
1983, to form Smithsonian Environmental Research Center.

Child Development, Office of See Children's Bureau

Children's Bureau Established by act of Apr. 9, 1912 (37 Stat. 79).
Placed in the Department of Labor by act of Mar. 4, 1913 (37 Stat. 737).
Transferred, with exception of child labor functions, to Social Security
Administration, Federal Security Agency, by Reorg. Plan No. 2 of 1946,
effective July 16, 1946. Continued under Administration when Agency
functions assumed by the Department of Health, Education, and Welfare.
Reassigned to Welfare Administration by Department reorganization of
Jan. 28, 1963. Reassigned to Social and Rehabilitation Service by
Department reorganization of Aug. 15, 1967. Reassigned to Office of
Child Development by Department reorganization order of Sept. 17, 1969.

China, U.S. Court for Established by act of June 30, 1906 (34 Stat.
814). Transferred to the Department of Justice by EO 6166 of June 10,
1933, effective Mar. 2, 1934. Act of June 30, 1906, repealed effective
Sept. 1, 1948 (62 Stat. 992).

Christopher Columbus Quincentenary Jubilee Commission Established by
act of Aug. 7, 1984 (98 Stat. 1257). Terminated pursuant to terms of
act.

Civil defense. See Defense

Civil Rights, Commission on Established by act of Sept. 9, 1957 (71
Stat. 634). Terminated in 1983 and reestablished by act of Nov. 30, 1983
(97 Stat. 1301). Renamed United States Commission on Civil Rights by act
of Nov. 2, 1994 (108 Stat. 4683).

Civil Service Commission, U.S. Established by act of Jan. 16, 1883 (22
Stat. 403). Redesignated as Merit Systems Protection Board and functions
transferred to Board and Office of Personnel Management by Reorg. Plan
No. 2 of 1978, effective Jan. 1, 1979.

Civil War Centennial Commission Established by act of Sept. 7, 1957 (71
Stat. 626). Terminated May 1, 1966, pursuant to terms of act.

Civilian Conservation Corps Established by act of June 28, 1937 (50
Stat. 319). Made part of Federal Security Agency by Reorg. Plan No. I of
1939, effective July 1, 1939. Liquidation provided for by act of July 2,
1942 (56 Stat. 569), not later than June 30, 1943.

Civilian Health and Medical Program of the United States, Office of
Established as field activity in the Department of Defense in 1974.
Functions consolidated into the TRICARE Management Activity in November
1997 by Defense Reform Initiative.

Civilian Production Administration Established by EO 9638 of Oct. 4,
1945. Consolidated with other agencies to form Office of Temporary
Controls, Office for Emergency Management, by EO 9809 of Dec. 12, 1946.

Civilian Service Awards Board, Distinguished Established by EO 10717 of
June 27, 1957. Terminated by EO 12014 of Oct. 19, 1977, and functions
transferred to U.S. Civil Service Commission.

Claims, U.S. Court of Established Feb. 25, 1855 (10 Stat. 612).
Abolished by act of Apr. 2, 1982 (96 Stat. 26) and trial jurisdiction
transferred to U.S. Claims Court and appellate functions merged with
those of U.S. Court of Customs and Patent Appeals to form U.S. Court of
Appeals for the Federal Circuit. U.S. Claims Court renamed U.S. Court of
Federal Claims by act of Oct. 29, 1992 (106 Stat. 4516).

Claims Commission of the United States, International Established in
the Department of State by act of Mar. 10, 1950 (64 Stat. 12). Abolished
by Reorg. Plan No. 1 of 1954, effective


[[Page 605]]
July 1, 1954, and functions transferred to Foreign Claims Settlement
Commission of the United States.

Claims Settlement Commission of the United States, Foreign Established
by Reorg. Plan No. 1 of 1954, effective July 1, 1954. Transferred to the
Department of Justice by act of Mar. 14, 1980 (94 Stat. 96).

Clark Sesquicentennial Commission, George Rogers Established by Public
Resolution 51 (45 Stat. 723). Expenditures ordered administered by the
Department of the Interior by EO 6166 of June 10, 1933.

Classification Review Committee, Interagency Established by EO 11652 of
Mar. 8, 1972. Abolished by EO 12065 of June 28, 1978.

Clemency Board, Presidential Established in Executive Office of the
President by EO 11803 of Sept. 16, 1974. Final recommendations submitted
to President Sept. 15, 1975, and Board terminated by EO 11878 of Sept.
10, 1975.

Coal Commission, National Bituminous Established under authority of act
of Aug. 30, 1935 (49 Stat. 992). Abolished by Reorg. Plan No. II of
1939, effective July 1, 1939, and functions transferred to Bituminous
Coal Division, Department of the Interior.

Coal Consumers' Counsel, Office of the Bituminous Established by act of
Apr. 11, 1941 (55 Stat. 134), renewing provisions of act of Apr. 23,
1937 (50 Stat. 72) for 2 years to continue functions of Consumers'
Counsel Division, Department of the Interior. Functions continued by
acts of Apr. 24, 1943 (57 Stat. 68), and May 21, 1943 (57 Stat. 82).
Terminated Aug. 24, 1943.

Coal Division, Bituminous Established July 1, 1939, by Secretary of the
Interior Order 1394 of June 16, 1939, as amended by Order 1399, of July
5, 1939, pursuant to act of Apr. 3, 1939 (53 Stat. 562) and Reorg. Plan
No. II of 1939, effective July 1, 1939. Administered functions vested in
National Bituminous Coal Commission by act of Apr. 23, 1937 (50 Stat.
72). Act extended to Aug. 24, 1943, on which date it expired.

Coal Labor Board, Bituminous Established by act of July 12, 1921 (42
Stat. 140). Abolished as result of U.S. Supreme Court decision, May 18,
1936, in case of Carter v. Carter Coal Company et al.

Coal Mine Safety Board of Review, Federal Established by act of July
16, 1952 (66 Stat. 697). Inactive after Mar. 30, 1970, pursuant to act
of Dec. 30, 1969 (83 Stat. 803).

Coal Mines Administration Established by the Secretary of the Interior
July 1, 1943. Abolished by Secretary's Order 1977 of Aug. 16, 1944, as
amended by Order 1982 of Aug. 31, 1944, and functions assumed by Solid
Fuels Administration for War. Administration reestablished in the
Department of the Interior by EO 9728 of May 21, 1946. Terminated June
30, 1947, by act of Mar. 27, 1942 (56 Stat. 176).

Coal Research, Office of Established in the Department of the Interior
by act of July 7, 1960 (74 Stat. 336). Functions transferred to Energy
Research and Development Administration by act of Oct. 11, 1974 (88
Stat. 1237).

Coast and Geodetic Survey See Coast Survey

Coast Guard, U.S. Transferred from the Department of the Treasury to
the Department of the Navy by EO 8929 of Nov. 1, 1941. Returned to the
Department of the Treasury by EO 9666 of Dec. 28, 1945. Transferred to
the Department of Transportation by act of Oct. 15, 1966 (80 Stat. 931).

Coast Survey Established by act of Feb. 10, 1807 (2 Stat. 413).
Redesignated as Coast and Geodetic Survey by act of June 20, 1878 (20
Stat. 206). Transferred to Environmental Science Services Administration
by Reorg. Plan No. 2 of 1965, effective July 13, 1965.

Codification Board Established by act of June 19, 1937 (50 Stat. 304).
Abolished by Reorg. Plan No. II of 1939, effective July 1, 1939, and
functions transferred to Division of the Federal Register.

Coinage, Joint Commission on the Established by act of July 23, 1965
(79 Stat. 258). Expired Jan. 4, 1975, pursuant to act of Oct. 6, 1972
(88 Stat. 776).

Collection of Fine Arts, National Established within Smithsonian
Institution by act of Mar. 24, 1937 (50 Stat. 51). Renamed National
Museum of American Art in Smithsonian Institution by act of Oct. 13,
1980 (94 Stat. 1884).

Columbia Institution for the Instruction of the Deaf and Dumb, and the
Blind Established by act of Feb. 16, 1857 (11 Stat. 161). Renamed
Columbia Institution for the Instruction of the Deaf and Dumb by act of
Feb. 23, 1865 (13 Stat. 436). Renamed Columbia Institution for the Deaf
by act of Mar. 4, 1911 (36 Stat. 1422). Renamed Gallaudet College by act
of June 18, 1954 (68 Stat. 265). Functions of the Department of Health,
Education, and Welfare transferred to the Department of Education by act
of Oct. 17, 1979 (93 Stat. 695). Renamed Gallaudet University by act of
Aug. 4, 1986 (100 Stat. 781).

Commander in Chief, U.S. Fleet, and Chief of Naval Operations Duties
of two positions prescribed by EO 8984 of Dec. 18, 1941. Combined under
one officer by EO 9096 of Mar. 12, 1942.

Commerce, Bureau of Domestic See Business and Defense Services
Administration

Commerce, Bureau of Foreign Established by the Secretary of Commerce
Oct. 12, 1953, by Reorg. Plan No. 5 of 1950, effective May 24, 1950.
Abolished by department order of Aug. 7, 1961, and functions vested in
Bureau of International Programs and Bureau of International Business
Operations.

Commerce, Bureau of Foreign and Domestic Established by act of Aug. 23,
1912 (37 Stat. 407). Functions reassigned to other offices of the
Department of Commerce due to internal reorganizations.

Commerce, Bureau of International See Business Operations, Bureau of
International


[[Page 606]]
Commerce Service, Foreign Established in Bureau of Foreign and Domestic
Commerce, Department of Commerce, by act of Mar. 3, 1927 (44 Stat.
1394). Transferred to the Department of State as part of Foreign Service
by Reorg. Plan No. II of 1939, effective July 1, 1939.

Commercial Company, U.S. Established Mar. 27, 1942, as subsidiary of
Reconstruction Finance Corporation. Transferred to Office of Economic
Warfare by EO 9361 of July 15, 1943. Office consolidated into Foreign
Economic Administration by EO 9380 of Sept. 25, 1943. Functions returned
to Corporation by EO 9630 of Sept. 27, 1945, until June 30, 1948.

Commercial Policy, Executive Committee on Established by Presidential
letter of Nov. 11, 1933, to Secretary of State. Abolished by EO 9461 of
Aug. 7, 1944.

Commercial Standards Division Transferred with Division of Simplified
Trade Practice from National Bureau of Standards to the Secretary of
Commerce by Reorg. Plan No. 3 of 1946, effective July 16, 1946, to
permit reassignment to Office of Domestic Commerce. Functions
transferred to National Bureau of Standards by the Department of
Commerce Order 90, June 7, 1963, pursuant to Reorg. Plan No. 5 of 1950,
effective May 24, 1950.

Commission. See other part of title

Committee. See also other part of title

Committee Management Secretariat Established in the Office of
Management and Budget Jan. 5, 1973, by act of Oct. 6, 1972 (86 Stat.
772). Functions transferred to General Services Administrator by Reorg.
Plan No. 1 of 1977, effective Apr. 1, 1978. Reassigned to the National
Archives and Records Service by GSA order of Feb. 22, 1979. Transferred
in Archives to Office of the Federal Register by GSA order of Oct. 14,
1980. Transferred to Office of the Archivist of the United States by GSA
order of Sept. 24, 1982. Reassigned to Office of Program Initiatives,
GSA, by GSA order of May 18, 1984. Transferred to Office of Management
Services, GSA, by GSA order of Apr. 7, 1986.

Commodities Corporation, Federal Surplus See Relief Corporation,
Federal Surplus

Commodity Credit Corporation Organized by EO 6340 of Oct. 16, 1933, and
managed in close affiliation with Reconstruction Finance Corporation.
Transferred to the Department of Agriculture by Reorg. Plan No. I of
1939, effective July 1, 1939.

Commodity Exchange Administration See Grain Futures Administration

Commodity Exchange Authority See Grain Futures Administration

Commodity Exchange Commission Established by act of Sept. 21, 1922 (42
Stat. 998). Functions transferred to Commodity Futures Trading
Commission by act of Oct. 23, 1974 (88 Stat. 1414).

Commodity Stabilization Service Established in the Department of
Agriculture Nov. 2, 1953, by Secretary's Memorandum 1320, supp. 4.
Renamed Agricultural Stabilization and Conservation Service by
Secretary's Memorandum 1458 of June 14, 1961, effective June 5, 1961.

Communication Agency, International See Information Agency, U.S.

Communications Program, Joint Tactical Combined with Joint
Interoperability of the Tactical Command and Control Systems Programs to
form Joint Tactical Command, Control, and Communications Agency in July
1984, pursuant to DOD Directive 5154.28.

Community Development Corporation Established in the Department of
Housing and Urban Development by act of Dec. 31, 1970 (84 Stat. 1791).
Renamed New Community Development Corporation by act of Aug. 22, 1974
(88 Stat. 725). Abolished Nov. 30, 1983, by act of Nov. 30, 1983 (97
Stat. 1238), and functions transferred to Assistant Secretary for
Community Planning and Development, Department of Housing and Urban
Development.

Community Development Corporation, New See Community Development
Corporation

Community Facilities, Bureau of Established in 1945 by Federal Works
Administrator. Transferred by act of June 30, 1949 (63 Stat. 380), to
General Services Administration, functioning as Community Facilities
Service. Certain functions transferred to various agencies, including
the Department of the Interior, Housing and Home Finance Agency, and
Federal Security Agency by Reorg. Plans Nos. 15, 16, and 17 of 1950,
effective May 24, 1950.

Community Facilities Administration Established in Housing and Home
Finance Agency by Administrator's Organizational Order 1 of Dec. 23,
1954. Terminated by act of Sept. 9, 1965 (79 Stat. 667), and functions
transferred to the Department of Housing and Urban Development.

Community Organization, Committee on Established in Office of Defense
Health and Welfare Services Sept. 10, 1941. Functions transferred to
Federal Security Agency by EO 9338 of Apr. 29, 1943.

Community Relations Service Established in the Department of Commerce
by act of July 2, 1964 (78 Stat. 241). Transferred to the Department of
Justice by Reorg. Plan No. 1 of 1966, effective Apr. 22, 1966.

Community Service, Commission on National and Established by act of
Nov. 16, 1990 (104 Stat. 3168). Abolished by act of Sept. 21, 1993, and
functions vested in the Board of Directors or the Executive Director
prior to Oct. 1, 1993, transferred to the Corporation for National and
Community Service (107 Stat. 873, 888).

Community Services Administration Established by act of Jan. 4, 1975
(88 Stat. 2291) as successor to Office of Economic Opportunity.
Abolished as independent agency through repeal of act of Aug. 20, 1964
(except titles VIII and X of such act) by act of Aug. 13, 1981 (95 Stat.
519).


[[Page 607]]
Community Services Administration Functions concerning Legal Services
Program transferred to Legal Services Corporation by act of July 25,
1974 (88 Stat. 389). Renamed Public Services Administration by Health,
Education, and Welfare departmental notice of Nov. 3, 1976. Transferred
to Office of Human Development by Secretary's reorganization of Mar. 8,
1977 (42 FR 13262).

Community War Services Established in Office of the Administrator under
EO 9338 of Apr. 29, 1943, and Federal Security Agency order. Terminated
Dec. 31, 1946, by act of July 26, 1946 (60 Stat. 695).

Conciliation Service, U.S. Established by act of Mar. 4, 1913 (37 Stat.
738). Functions transferred to Federal Mediation and Conciliation
Service, established by act of June 23, 1947 (61 Stat. 153).

Conference on Security and Cooperation in Europe Renamed Organization
for Security and Cooperation in Europe by EO 13029, Dec. 3, 1996 (61 FR
64591).

Consolidated Farm Service Agency Established by act of Oct. 13, 1994
(108 Stat. 3214). Renamed Farm Service Agency (61 FR 1109), effective
Jan. 16, 1996.

Constitution, Commission on the Bicentennial of the United States
Established by act of Sept. 29, 1983, as amended (97 Stat. 722).
Terminated by act of Dec. 3, 1991 (105 Stat. 1232).

Constitution, transfer of functions See Statutes at Large and other
matters

Construction, Collective Bargaining Committee in Established by EO
11849 of Apr. 1, 1975. Inactive since Jan. 7, 1976. Formally abolished
by EO 12110 of Dec. 28, 1978.

Construction, Equipment and Repairs, Bureau of Established in the
Department of the Navy by act of Aug. 31, 1842 (5 Stat. 579). Abolished
by act of July 5, 1862 (12 Stat. 510), and functions distributed among
Bureau of Equipment and Recruiting, Bureau of Construction and Repair,
and Bureau of Steam Engineering.

Construction Branch Established in the Department of the Treasury in
1853 and designated Bureau of Construction under control of Office of
Supervising Architect by Sept. 30, 1855. Office incorporated into Public
Buildings Branch, Procurement Division, by EO 6166 of June 10, 1933.
Transferred to Federal Works Agency by Reorg. Plan No. I of 1939,
effective July 1, 1939, when Public Buildings Branch of Procurement
Division, Bureau of Buildings Management, National Park Service,
Department of the Interior--so far as latter concerned with operation of
public buildings for other departments or agencies--and U.S. Housing
Corporation consolidated with Public Buildings Administration, Federal
Works Agency.

Construction Industry Stabilization Committee Established by EO 11588
of Mar. 29, 1971. Abolished by EO 11788 of June 18, 1974.

Construction and Repair, Bureau of Established by act of July 5, 1862
(12 Stat. 510), replacing Bureau of Construction, Equipment and Repairs.
Abolished by act of June 20, 1940 (54 Stat. 492), and functions
transferred to Bureau of Ships.

Consumer Advisory Council Established by EO 11136 of Jan. 3, 1964.
Office of Consumer Affairs established in Executive Office of the
President by EO 11583 of Feb. 24, 1971, and Council reestablished in
Office.

Consumer Affairs, Office of Established by EO 11583 of Feb. 24, 1971.
Transferred to the Department of Health, Education, and Welfare by EO
11702 of Jan. 25, 1973.

Consumer Affairs Staff, National Business Council for Established in
the Department of Commerce by departmental organization order of Dec.
16, 1971. Terminated by departmental order of Dec. 6, 1973, due to lack
of funding.

Consumer agencies Consumer agencies of National Emergency Council and
National Recovery Administration reorganized and functions transferred,
together with those of Consumers' Advisory Board, NRA, and Cabinet
Committee on Price Policy, to Consumers' Division, NRA, by EO 7120 of
July 30, 1935. Division transferred to the Department of Labor by EO
7252 of Dec. 21, 1935. Transferred to Division of Consumers' Counsel,
Agricultural Adjustment Administration, Department of Agriculture, by
Secretary of Labor letter of Aug. 30, 1938, to the Secretary of
Agriculture. Continued as Consumer Standards Project until June 30,
1941. Research on consumer standards continued by Consumer Standards
Section, Consumers' Counsel Division, transferred to Agricultural
Marketing Administration by administrative order of Feb. 28, 1942. Other
project activities discontinued.

Consumer Cooperative Bank, National Established by act of Aug. 20, 1978
(92 Stat. 499). Removed from mixed-ownership, Government corporation
status by acts of Sept. 13, 1982 (96 Stat. 1062) and Jan. 12, 1983 (96
Stat. 2478).

Consumer Interests, President's Committee on Established by EO 11136 of
Jan. 3, 1964. Abolished by EO 11583 of Feb. 24, 1971.

Consumer and Marketing Service Established by the Secretary of
Agriculture Feb. 2, 1965. Renamed Agricultural Marketing Service Apr. 2,
1972, by Secretary's order and certain functions transferred to Animal
and Plant Health Inspection Service.

Consumers' Counsel Established in National Bituminous Coal Commission
by act of Aug. 30, 1935 (49 Stat. 993). Office abolished by Reorg. Plan
No. II of 1939, effective July 1, 1939, and functions transferred to
Office of Solicitor, Department of the Interior, to function as
Consumers' Counsel Division under direction of the Secretary of the
Interior. Functions transferred to Office of the Bituminous Coal
Consumers' Counsel June 1941 by act of Apr. 11, 1941 (55 Stat. 134).

Consumers' Counsel Division See Consumers' Counsel

Consumers' Counsel, Division of Established by act of May 12, 1933 (48
Stat. 31). Transferred by order


[[Page 608]]
of the Secretary of Agriculture from Agricultural Adjustment
Administration to supervision of Director of Marketing, effective Feb.
1, 1940. Transferred to Agricultural Marketing Administration by
administrative order of Feb. 28, 1942.

Consumers' Problems, Adviser on See Consumer agencies

Contract Committee Government See Contract Compliance, Committee on
Government

Contract Compliance, Committee on Government Established by EO 10308 of
Dec. 3, 1951. Abolished by EO 10479 of Aug. 13, 1953, which established
successor Government Contract Committee. Abolished by EO 10925 of Mar.
6, 1961, and records and property transferred to President's Committee
on Equal Employment Opportunity.

Contract Settlement, Office of Established by act of July 1, 1944 (58
Stat. 651). Transferred to Office of War Mobilization and Reconversion
by act of Oct. 3, 1944 (58 Stat. 785). Terminated by EO 9809 of Dec. 12,
1946, and Reorg. Plan No. 1 of 1947, effective July 1, 1947, and
functions transferred to the Department of the Treasury. Functions
transferred to General Services Administration by act of June 30, 1949
(63 Stat. 380).

Contract Settlement Advisory Board Established by act of July 1, 1944
(58 Stat. 651). Transferred to the Department of the Treasury by EO 9809
of Dec. 12, 1946, and by Reorg. Plan No. 1 of 1947, effective July 1,
1947. Transferred to General Services Administration by act of June 30,
1949 (63 Stat. 380) and established as Contract Review Board. Renamed
Board of Contract Appeals in 1961 by Administrator's order. Board
established as independent entity within General Services Administration
Feb. 27, 1979, pursuant to act of Nov. 1, 1978 (92 Stat. 2383).

Contract Settlement Appeal Board, Office of Established by act of July
1, 1944 (58 Stat. 651). Transferred to the Department of the Treasury by
EO 9809 of Dec. 12, 1946, and by Reorg. Plan No. 1 of 1947, effective
July 1, 1947. Functions transferred to General Services Administration
by act of June 30, 1949 (63 Stat. 380). Abolished by act of July 14,
1952 (66 Stat. 627).

Contract Termination Board, Joint Established Nov. 12, 1943, by
Director of War Mobilization. Functions assumed by Office of Contract
Settlement.

Contracts Division, Public Established in the Department of Labor to
administer act of June 30, 1936 (49 Stat. 2036). Consolidated with Wage
and Hour Divis

  dinsdag 16 oktober 2001 @ 14:50:45 #133
16972 Davilex
haak me dan!!!
pi_1916890
maar ik dacht dat <censuur> zei dat ze verschillende mensen waren...
http://homocultuur.startkabel.nl
  † In Memoriam † vrijdag 19 oktober 2001 @ 13:57:40 #134
13819 Loedertje
Trotse GILF.
pi_1947977
quote:
Op vrijdag 19 oktober 2001 12:20 schreef nietzman het volgende:

[..]

Hoe genuanceerd
in onzin grote lappen bullshit neerpleuren is spam, en als het hier gebeurt schijnt het trés normaal te zijn.


pi_2227019
* nostalgie *

GENERAL LAWS OF MASSACHUSETTS
PART I.
ADMINISTRATION OF THE GOVERNMENT.

--------------------------------------------------------------------------------

TITLE I.
JURISDICTION AND EMBLEMS OF THE COMMONWEALTH, THE GENERAL COURT, STATUTES AND PUBLIC DOCUMENTS.
CHAPTER 1. JURISDICTION OF THE COMMONWEALTH AND OF THE UNITED STATES.

CHAPTER 2. ARMS, GREAT SEAL AND OTHER EMBLEMS OF THE COMMONWEALTH.

CHAPTER 3. THE GENERAL COURT.

CHAPTER 4. STATUTES.

CHAPTER 5. PRINTING AND DISTRIBUTION OF LAWS AND PUBLIC DOCUMENTS.


--------------------------------------------------------------------------------

TITLE II.
EXECUTIVE AND ADMINISTRATIVE OFFICERS OF THE COMMONWEALTH.
CHAPTER 6. THE GOVERNOR, LIEUTENANT GOVERNOR AND COUNCIL, CERTAIN OFFICERS UNDER THE GOVERNOR AND COUNCIL, AND STATE LIBRARY.

CHAPTER 6A. EXECUTIVE OFFICES.

CHAPTER 6B. ACUTE HOSPITAL FINANCE. [Repealed, 1996, 151, Sec. 32]

CHAPTER 7. EXECUTIVE OFFICE FOR ADMINISTRATION AND FINANCE.

CHAPTER 7A. OFFICE OF THE COMPTROLLER.

CHAPTER 7B. ASSET MANAGEMENT BOARD.

CHAPTER 8. STATE SUPERINTENDENT OF BUILDINGS, AND STATE HOUSE.

CHAPTER 9. DEPARTMENT OF THE STATE SECRETARY.

CHAPTER 10. DEPARTMENT OF THE STATE TREASURER.

CHAPTER 11. DEPARTMENT OF THE STATE AUDITOR.

CHAPTER 12. DEPARTMENT OF THE ATTORNEY GENERAL, AND THE DISTRICT ATTORNEYS.

CHAPTER 12A. OFFICE OF INSPECTOR GENERAL.

CHAPTER 12B. STATE GAMBLING ADVISORY COMMISSION.

CHAPTER 13. DIVISION AND BOARDS OF REGISTRATION.

CHAPTER 14. DEPARTMENT OF REVENUE.

CHAPTER 15. DEPARTMENT OF EDUCATION.

CHAPTER 15A. PUBLIC EDUCATION.

CHAPTER 15B. THE NEW ENGLAND EDUCATIONAL LOAN MARKETING CORPORATION ACT. [Repealed, 1982, 356, Sec. 2.]

CHAPTER 15C. MASSACHUSETTS COLLEGE STUDENT LOAN AUTHORITY.

CHAPTER 16. DEPARTMENT OF HIGHWAYS.

CHAPTER 17. DEPARTMENT OF PUBLIC HEALTH.

CHAPTER 18. DEPARTMENT OF TRANSITIONAL ASSISTANCE.

CHAPTER 18A. DEPARTMENT OF YOUTH SERVICES.

CHAPTER 18B. DEPARTMENT OF SOCIAL SERVICES.

CHAPTER 19. DEPARTMENT OF MENTAL HEALTH.

CHAPTER 19A. DEPARTMENT OF ELDER AFFAIRS.

CHAPTER 19B. DEPARTMENT OF MENTAL RETARDATION.

CHAPTER 19C. DISABLED PERSONS PROTECTION COMMISSION.

CHAPTER 19D. ASSISTED LIVING.

CHAPTER 20. DEPARTMENT OF FOOD AND AGRICULTURE.

CHAPTER 21. DEPARTMENT OF ENVIRONMENTAL MANAGEMENT.

CHAPTER 21A. EXECUTIVE OFFICE OF ENVIRONMENTAL AFFAIRS.

CHAPTER 21B. MINING REGULATION AND RECLAMATION.

CHAPTER 21C. MASSACHUSETTS HAZARDOUS WASTE MANAGEMENT ACT.

CHAPTER 21D. MASSACHUSETTS HAZARDOUS WASTE FACILITY SITING ACT.

CHAPTER 21E. MASSACHUSETTS OIL AND HAZARDOUS MATERIAL RELEASE PREVENTION AND RESPONSE ACT.

CHAPTER 21F. COASTAL FACILITIES IMPROVEMENT.

CHAPTER 21G. MASSACHUSETTS WATER MANAGEMENT ACT.

CHAPTER 21H. SOLID WASTE FACILITIES.

CHAPTER 21I. MASSACHUSETTS TOXICS USE REDUCTION ACT.

CHAPTER 21J. UNDERGROUND STORAGE TANK PETROLEUM PRODUCT CLEANUP FUND.

CHAPTER 21K. MITIGATION OF HAZARDOUS MATERIALS. [ Added by 1998, 194, Sec. 64 effective July 1, 1998. See 1998, 194, Sec. 443.]

CHAPTER 22. DEPARTMENT OF PUBLIC SAFETY.

CHAPTER 22A. CENTRAL REGISTER FOR MISSING CHILDREN.

CHAPTER 22B. CAPITOL POLICE. [Repealed, 1991, 412, Sec. 21.]

CHAPTER 22C. THE DEPARTMENT OF STATE POLICE.

CHAPTER 22D. DEPARTMENT OF FIRE SERVICES.

CHAPTER 22E. STATE DNA DATABASE.

CHAPTER 23. DEPARTMENT OF LABOR AND WORKFORCE DEVELOPMENT.

CHAPTER 23A. DEPARTMENT OF ECONOMIC DEVELOPMENT.

CHAPTER 23B. DIVISION OF HOUSING AND COMMUNITY DEVELOPMENT.

CHAPTER 23C. BOARD OF CONCILIATION AND ARBITRATION.

CHAPTER 23D. MASSACHUSETTS INDUSTRIAL SERVICE PROGRAM.

CHAPTER 23E. DIVISION OF INDUSTRIAL ACCIDENTS.

CHAPTER 23F. [TECHNOLOGY TWO THOUSAND (2000) PARTNERSHIP.]

CHAPTER 23G. THE MASSACHUSETTS DEVELOPMENT FINANCE AGENCY. [ Added by 1998, 289, Sec. 24 effective September 30, 1998. See 1998, 289, Sec. 33.]

CHAPTER 24. DEPARTMENT OF INDUSTRIAL ACCIDENTS. [Repealed, 1953, 314, Sec. 14.]

CHAPTER 24A. OFFICE OF CONSUMER AFFAIRS AND BUSINESS REGULATION.

CHAPTER 25. DEPARTMENT OF PUBLIC UTILITIES.

CHAPTER 25A. DIVISION OF ENERGY RESOURCES.

CHAPTER 25B. MASSACHUSETTS APPLIANCE EFFICIENCY STANDARDS ACT.

CHAPTER 26. DEPARTMENT OF BANKING AND INSURANCE.

CHAPTER 27. DEPARTMENT OF CORRECTION.

CHAPTER 28. METROPOLITAN DISTRICT COMMISSION.

CHAPTER 28A. OFFICE FOR CHILDREN.


--------------------------------------------------------------------------------

TITLE III.
LAWS RELATING TO STATE OFFICERS.
CHAPTER 29. STATE FINANCE.

CHAPTER 29A. FINANCING OF THE JUDICIAL SYSTEM.

CHAPTER 29B. STATE REVENUE GROWTH CONTROL. [ Chapter 29B repealed by 1998, 194, Sec. 103 effective July 1, 1999. See 1998, 194, Sec. 433.]

CHAPTER 29C. WATER POLLUTION ABATEMENT REVOLVING LOAN PROGRAM.

CHAPTER 30. GENERAL PROVISIONS RELATIVE TO STATE DEPARTMENTS, COMMISSIONS, OFFICERS AND EMPLOYEES.

CHAPTER 30A. STATE ADMINISTRATIVE PROCEDURE.

CHAPTER 30B. UNIFORM PROCUREMENT ACT.


--------------------------------------------------------------------------------

TITLE IV.
CIVIL SERVICE, RETIREMENTS AND PENSIONS.
CHAPTER 31. CIVIL SERVICE.

CHAPTER 31A. MUNICIPAL PERSONNEL SYSTEMS.

CHAPTER 32. RETIREMENT SYSTEMS AND PENSIONS.

CHAPTER 32A. CONTRIBUTORY GROUP GENERAL OR BLANKET INSURANCE FOR PERSONS IN THE SERVICE OF THE COMMONWEALTH.

CHAPTER 32B. CONTRIBUTORY GROUP GENERAL OR BLANKET INSURANCE FOR PERSONS IN THE SERVICE OF COUNTIES, CITIES, TOWNS AND DISTRICTS, AND THEIR DEPENDENTS.


--------------------------------------------------------------------------------

TITLE V.
MILITIA.
CHAPTER 33. MILITIA.


--------------------------------------------------------------------------------

TITLE VI.
COUNTIES AND COUNTY OFFICERS.
CHAPTER 34. COUNTIES AND COUNTY COMMISSIONERS.

CHAPTER 34A. COUNTY CHARTER PROCEDURES.

CHAPTER 35. COUNTY TREASURERS, STATE SUPERVISION OF COUNTY ACCOUNTS AND COUNTY FINANCES.

CHAPTER 36. REGISTERS OF DEEDS.

CHAPTER 37. SHERIFFS.

CHAPTER 38. MEDICAL EXAMINERS AND INQUESTS.


--------------------------------------------------------------------------------

TITLE VII.
CITIES, TOWNS AND DISTRICTS.
CHAPTER 39. MUNICIPAL GOVERNMENT.

CHAPTER 40. POWERS AND DUTIES OF CITIES AND TOWNS.

CHAPTER 40A. ZONING.

CHAPTER 40B. REGIONAL PLANNING.

CHAPTER 40C. HISTORIC DISTRICTS.

CHAPTER 40D. INDUSTRIAL DEVELOPMENT OF CITIES AND TOWNS.

CHAPTER 40E. MASSACHUSETTS INDUSTRIAL DEVELOPMENT AUTHORITY.

CHAPTER 40F. THE MASSACHUSETTS COMMUNITY DEVELOPMENT FINANCE CORPORATION. [ Chapter 40F effective until July 1, 2000. Repealed by 1987, 324, Sec. 6. See, also, 1990, 528, Sec. 6.]

CHAPTER 40G. MASSACHUSETTS TECHNOLOGY DEVELOPMENT CORPORATION.

CHAPTER 40H. COMMUNITY ECONOMIC DEVELOPMENT ASSISTANCE CORPORATION.

CHAPTER 40I. THE BAY STATE SKILLS CORPORATION ACT. [Repealed by 1996, 151, Sec. 196.]

CHAPTER 40J. MASSACHUSETTS TECHNOLOGY PARK CORPORATION.

CHAPTER 40K. MASSACHUSETTS PRODUCT DEVELOPMENT CORPORATION. [Repealed by 1996, 58, Sec. 23.]

CHAPTER 40L. AGRICULTURAL INCENTIVE AREAS.

CHAPTER 40M. GOVERNMENTAL UNITS POOLED INSURANCE.

CHAPTER 40N. MODEL WATER AND SEWER COMMISSION.

CHAPTER 40O. BUSINESS IMPROVEMENT DISTRICTS.

CHAPTER 40P. THE MASSACHUSETTS RENT CONTROL PROHIBITION ACT.

CHAPTER 41. OFFICERS AND EMPLOYEES OF CITIES, TOWNS AND DISTRICTS.

CHAPTER 42. BOUNDARIES OF CITIES AND TOWNS.

CHAPTER 43. CITY CHARTERS.

CHAPTER 43A. STANDARD FORM OF REPRESENTATIVE TOWN MEETING GOVERNMENT.

CHAPTER 43B. HOME RULE PROCEDURES.

CHAPTER 43C. OPTIONAL FORMS OF MUNICIPAL ADMINISTRATION ACT.

CHAPTER 44. MUNICIPAL FINANCE.

CHAPTER 44A. QUALIFIED BOND ACT.

CHAPTER 45. PUBLIC PARKS, PLAYGROUNDS AND THE PUBLIC DOMAIN.

CHAPTER 46. RETURN AND REGISTRY OF BIRTHS, MARRIAGES AND DEATHS.

CHAPTER 47. INFIRMARIES.

CHAPTER 48. FIRES, FIRE DEPARTMENTS AND FIRE DISTRICTS.

CHAPTER 49. FENCES, FENCE VIEWERS, POUNDS AND FIELD DRIVERS.

CHAPTER 49A. USE OF CERTAIN ANIMALS FOR SCIENTIFIC INVESTIGATION, EXPERIMENT OR INSTRUCTION. [Repealed, 1983, 631, Sec. 1.]


--------------------------------------------------------------------------------

TITLE VIII.
ELECTIONS.
CHAPTER 50. GENERAL PROVISIONS RELATIVE TO PRIMARIES, CAUCUSES AND ELECTIONS.

CHAPTER 51. VOTERS.

CHAPTER 52. POLITICAL COMMITTEES.

CHAPTER 53. NOMINATIONS, QUESTIONS TO BE SUBMITTED TO THE VOTERS, PRIMARIES AND CAUCUSES.

CHAPTER 54. ELECTIONS.

CHAPTER 54A. ELECTION OF CERTAIN CITY AND TOWN OFFICERS BY PROPORTIONAL REPRESENTATION OR PREFERENTIAL VOTING. [Repealed, 1972, 596, Sec. 2.]

CHAPTER 55. DISCLOSURE AND REGULATION OF CAMPAIGN EXPENDITURES AND CONTRIBUTIONS.

CHAPTER 55A. LIMITED PUBLIC FINANCING OF CAMPAIGNS FOR STATEWIDE ELECTIVE OFFICE.

CHAPTER 55B. THE STATE BALLOT LAW COMMISSION.

CHAPTER 56. VIOLATIONS OF ELECTION LAWS.

CHAPTER 57. CONGRESSIONAL, COUNCILLOR AND SENATORIAL DISTRICTS, AND APPORTIONMENT OF REPRESENTATIVES.


--------------------------------------------------------------------------------

TITLE IX.
TAXATION.
CHAPTER 58. GENERAL PROVISIONS RELATIVE TO TAXATION.

CHAPTER 58A. APPELLATE TAX BOARD.

CHAPTER 59. ASSESSMENT OF LOCAL TAXES.

CHAPTER 59A. CLASSIFICATION OF REAL PROPERTY. [Repealed, 1980, 261, Sec. 16.]

CHAPTER 60. COLLECTION OF LOCAL TAXES.

CHAPTER 60A. EXCISE TAX ON REGISTERED MOTOR VEHICLES IN LIEU OF LOCAL TAX.

CHAPTER 60B. EXCISE ON BOATS, SHIPS AND VESSELS IN LIEU OF LOCAL PROPERTY TAX.

CHAPTER 61. CLASSIFICATION AND TAXATION OF FOREST LANDS AND FOREST PRODUCTS.

CHAPTER 61A. ASSESSMENT AND TAXATION OF AGRICULTURAL AND HORTICULTURAL LAND.

CHAPTER 61B. CLASSIFICATION AND TAXATION OF RECREATIONAL LAND.

CHAPTER 62. TAXATION OF INCOMES.

CHAPTER 62A. SIMPLIFIED METHOD OF COMPUTING INDIVIDUAL INCOME TAXES. [Repealed, 1972, 590.]

CHAPTER 62B. WITHHOLDING OF TAXES ON WAGES AND DECLARATION OF ESTIMATED INCOME TAX.

CHAPTER 62C. ADMINISTRATIVE PROVISIONS RELATIVE TO STATE TAXATION.

CHAPTER 62D. SET-OFF DEBT COLLECTION.

CHAPTER 62E. WAGE REPORTING SYSTEM.

CHAPTER 62F. LIMITATION ON THE GROWTH OF STATE TAX REVENUES.

CHAPTER 63. TAXATION OF CORPORATIONS.

CHAPTER 63A. TAXATION OF CERTAIN CORPORATIONS, ASSOCIATIONS AND ORGANIZATIONS ENGAGED IN THE SALE OF ALCOHOLIC BEVERAGES.

CHAPTER 63B. DECLARATION OF ESTIMATED TAX BY CORPORATIONS.

CHAPTER 63C. TAXATION OF INCOME OF CERTAIN CORPORATIONS. [Repealed, 1976, 415, Sec. 105; 1985, 593, Sec. 24.]

CHAPTER 64. TAXATION OF STOCK TRANSFERS. [Repealed, 1954, 353, Sec. 1.]

CHAPTER 64A. TAXATION OF SALES OF GASOLINE.

CHAPTER 64B. EXCISE UPON CHARGES FOR MEALS SERVED TO THE PUBLIC. [Repealed, 1977, 363A, Sec. 43.]

CHAPTER 64C. CIGARETTE EXCISE.

CHAPTER 64D. EXCISE ON DEEDS, INSTRUMENTS AND WRITINGS.

CHAPTER 64E. TAXATION OF SPECIAL FUELS USED IN THE PROPULSION OF MOTOR VEHICLES.

CHAPTER 64F. TAXATION OF FUEL AND SPECIAL FUELS ACQUIRED OUTSIDE AND USED WITHIN THE COMMONWEALTH.

CHAPTER 64G. ROOM OCCUPANCY EXCISE.

CHAPTER 64H. TAX ON RETAIL SALES OF CERTAIN TANGIBLE PERSONAL PROPERTY.

CHAPTER 64I. TAX ON THE STORAGE, USE OR OTHER CONSUMPTION OF CERTAIN TANGIBLE PERSONAL PROPERTY.

CHAPTER 64J. TAXATION OF FUELS USED IN THE PROPULSION OF AIRCRAFT.

CHAPTER 64K. CONTROLLED SUBSTANCES TAX.

CHAPTER 65. TAXATION OF LEGACIES AND SUCCESSIONS.

CHAPTER 65A. TAXATION OF TRANSFERS OF CERTAIN ESTATES.

CHAPTER 65B. SETTLEMENT OF DISPUTES RESPECTING THE DOMICILE OF DECEDENTS FOR DEATH TAX PURPOSES.

CHAPTER 65C. MASSACHUSETTS ESTATE TAX.


--------------------------------------------------------------------------------

TITLE X.
PUBLIC RECORDS.
CHAPTER 66. PUBLIC RECORDS.

CHAPTER 66A. FAIR INFORMATION PRACTICES.


--------------------------------------------------------------------------------

TITLE XI.
CERTAIN RELIGIOUS AND CHARITABLE MATTERS.
CHAPTER 67. PARISHES AND RELIGIOUS SOCIETIES.

CHAPTER 68. DONATIONS AND CONVEYANCES FOR PIOUS AND CHARITABLE USES.

CHAPTER 68A. LIMITATIONS UPON THE CONDUCT OF CERTAIN TRUSTS AND CORPORATIONS HAVING CHARITABLE INTERESTS.


--------------------------------------------------------------------------------

TITLE XII.
EDUCATION.
CHAPTER 69. POWERS AND DUTIES OF THE DEPARTMENT OF EDUCATION.

CHAPTER 70. SCHOOL FUNDS AND STATE AID FOR PUBLIC SCHOOLS.

CHAPTER 70A. EQUAL EDUCATIONAL OPPORTUNITY GRANTS. [Repealed, 1993, 71, Sec. 33.]

CHAPTER 71. PUBLIC SCHOOLS.

CHAPTER 71A. TRANSITIONAL BILINGUAL EDUCATION.

CHAPTER 71B. CHILDREN WITH SPECIAL NEEDS.

CHAPTER 72. SCHOOL REGISTERS AND RETURNS.

CHAPTER 73. STATE COLLEGES AND COMMUNITY COLLEGES.

CHAPTER 74. VOCATIONAL EDUCATION.

CHAPTER 75. UNIVERSITY OF MASSACHUSETTS.

CHAPTER 75A. UNIVERSITY OF LOWELL. [Repealed, 1991, 142, Sec. 23.]

CHAPTER 75B. SOUTHEASTERN MASSACHUSETTS UNIVERSITY. [Repealed, 1991, 142, Sec. 24.]

CHAPTER 75C. PRIVATE CORRESPONDENCE SCHOOLS.

CHAPTER 75D. PRIVATE BUSINESS SCHOOLS.

CHAPTER 76. SCHOOL ATTENDANCE.

CHAPTER 77. SCHOOL OFFENDERS AND COUNTY TRAINING SCHOOLS. [Repealed, 1973, 1073, Sec. 2.]

CHAPTER 78. LIBRARIES.

CHAPTER 78A. YOUTH CONSERVATION AND SERVICE CORPS.


--------------------------------------------------------------------------------

TITLE XIII.
EMINENT DOMAIN AND BETTERMENTS.
CHAPTER 79. EMINENT DOMAIN.

CHAPTER 79A. RELOCATION ASSISTANCE.

CHAPTER 80. BETTERMENTS.

CHAPTER 80A. EMINENT DOMAIN TAKINGS AND BETTERMENT ASSESSMENTS BY JUDICIAL PROCEEDINGS.


--------------------------------------------------------------------------------

TITLE XIV.
PUBLIC WAYS AND WORKS.
CHAPTER 81. STATE HIGHWAYS.

CHAPTER 81A. THE MASSACHUSETTS TURNPIKE AUTHORITY AND THE METROPOLITAN HIGHWAY SYSTEM.

CHAPTER 82. THE LAYING OUT, ALTERATION, RELOCATION AND DISCONTINUANCE OF PUBLIC WAYS, AND SPECIFIC REPAIRS THEREON.

CHAPTER 83. SEWERS, DRAINS AND SIDEWALKS.

CHAPTER 84. REPAIR OF WAYS AND BRIDGES.

CHAPTER 85. REGULATIONS AND BY-LAWS RELATIVE TO WAYS AND BRIDGES.

CHAPTER 86. BOUNDARIES OF HIGHWAYS AND OTHER PUBLIC PLACES, AND ENCROACHMENTS THEREON.

CHAPTER 87. SHADE TREES.

CHAPTER 88. FERRIES, CANALS AND PUBLIC LANDINGS.

CHAPTER 89. LAW OF THE ROAD.

CHAPTER 90. MOTOR VEHICLES AND AIRCRAFT.

CHAPTER 90A. THE HIGHWAY SAFETY ACT.

CHAPTER 90B. MOTORBOATS AND OTHER VESSELS.

CHAPTER 90C. PROCEDURE FOR MOTOR VEHICLE OFFENSES.

CHAPTER 90D. MOTOR VEHICLE CERTIFICATES OF TITLE.

CHAPTER 90E. BIKEWAYS.

CHAPTER 90F. UNIFORM OPERATION OF COMMERCIAL MOTOR VEHICLES ACT.

CHAPTER 90G. CIVIL INFRACTIONS. [Repealed by 1993, 182, Sec. 8.]

CHAPTER 90H. GATEWAY ROADS PROGRAM.

CHAPTER 91. WATERWAYS.

CHAPTER 91A. PORT OF BOSTON COMMISSION. [Inoperative February 17, 1959 upon title vesting in the Massachusetts Port Authority. See 1956, 465, Sec. 33.]

CHAPTER 92. METROPOLITAN SEWERS, WATER AND PARKS.

CHAPTER 92A. COMMONWEALTH ZOOLOGICAL CORPORATION. [Renumbered as Chapter 92B by 1992, 286, Sec. 165. Another Chapter 92A was repealed by 1953, 612, Sec. 8.]

CHAPTER 92B. COMMONWEALTH ZOOLOGICAL CORPORATION.


--------------------------------------------------------------------------------

TITLE XV.
REGULATION OF TRADE.
CHAPTER 93. REGULATION OF TRADE AND CERTAIN ENTERPRISES.

CHAPTER 93A. REGULATION OF BUSINESS PRACTICES FOR CONSUMERS PROTECTION.

CHAPTER 93B. REGULATION OF BUSINESS PRACTICES BETWEEN MOTOR VEHICLE MANUFACTURERS, DISTRIBUTORS AND DEALERS.

CHAPTER 93C. PROTECTION OF CONSUMERS AGAINST CARELESS AND ERRONEOUS BILLINGS. [Repealed, 1978, 480, Sec. 7.]

CHAPTER 93D. CONTROL OF OUTDOOR ADVERTISING ADJACENT TO THE INTERSTATE AND PRIMARY HIGHWAY SYSTEMS.

CHAPTER 93E. REGULATION OF DEALERS' AGREEMENTS FOR THE SALE OF GASOLINE.

CHAPTER 93F. REGULATION OF CERTAIN BUSINESS PRACTICES BETWEEN MOTION PICTURE DISTRIBUTORS AND EXHIBITORS.

CHAPTER 93G. EQUIPMENT DEALERS.

CHAPTER 94. INSPECTION AND SALE OF FOOD, DRUGS AND VARIOUS ARTICLES.

CHAPTER 94A. MILK CONTROL.

CHAPTER 94B. HAZARDOUS SUBSTANCES.

CHAPTER 94C. CONTROLLED SUBSTANCES ACT.

CHAPTER 94D CONTROLLED SUBSTANCES THERAPEUTIC RESEARCH ACT.

CHAPTER 95. MEASURING OF LEATHER.

CHAPTER 96. MEASUREMENT OF LUMBER.

CHAPTER 97. SURVEYING OF LAND.

CHAPTER 98. WEIGHTS AND MEASURES.

CHAPTER 99. THE METRIC SYSTEM OF WEIGHTS AND MEASURES.

CHAPTER 100. AUCTIONEERS.

CHAPTER 100A. MOTOR VEHICLE DAMAGE REPAIR SHOPS.

CHAPTER 101. TRANSIENT VENDORS, HAWKERS AND PEDLERS.

CHAPTER 102. SHIPPING AND SEAMEN, HARBORS AND HARBOR MASTERS.

CHAPTER 103. PILOTS.

CHAPTER 104. AGENTS, CONSIGNEES AND FACTORS.

CHAPTER 104A. CONSIGNMENT OF FINE ART.

CHAPTER 105. PUBLIC WAREHOUSES.

CHAPTER 105A. SELF-SERVICE STORAGE FACILITIES.


--------------------------------------------------------------------------------

CHAPTER 106. UNIFORM COMMERCIAL CODE (links to all Articles).
ARTICLE 1. GENERAL PROVISIONS.
ARTICLE 2. SALES.
ARTICLE 2A. LEASES.
ARTICLE 3. NEGOTIABLE INSTRUMENTS.
ARTICLE 4. BANK DEPOSITS AND COLLECTIONS.
ARTICLE 4A. FUNDS TRANSFERS.
ARTICLE 5. LETTERS OF CREDIT. [1997, 224, Sec. 3 strikes out Article 5, as amended, and inserts a new Article 5 effective March 19, 1998.]
ARTICLE 6. BULK TRANSFERS.
ARTICLE 7. WAREHOUSE RECEIPTS, BILLS OF LADING AND OTHER DOCUMENTS OF TITLE.
ARTICLE 8. INVESTMENT SECURITIES.
ARTICLE 9. SECURED TRANSACTIONS; SALES OF ACCOUNTS AND CHATTEL PAPER.
CHAPTER 107A. ASSIGNMENTS OF ACCOUNTS RECEIVABLE. [Repealed, 1957, 765, Sec. 2.]

CHAPTER 108. CRIMINAL OFFENCES RELATIVE TO BILLS OF LADING.

CHAPTER 108A. PARTNERSHIPS.

CHAPTER 109. LIMITED PARTNERSHIPS.

CHAPTER 109A. UNIFORM FRAUDULENT TRANSFER ACT.

CHAPTER 110. LABELS, TRADE MARKS, NAMES AND REGISTRATION THEREOF.

CHAPTER 110A. UNIFORM SECURITIES ACT.

CHAPTER 110B. REGISTRATION AND PROTECTION OF TRADEMARKS.

CHAPTER 110C. REGULATION OF TAKE-OVER BIDS IN THE ACQUISITION OF CORPORATIONS.

CHAPTER 110D. REGULATION OF CONTROL SHARE ACQUISITIONS.

CHAPTER 110E. REGULATION OF CONTROL SHARE ACQUISITIONS OF FOREIGN CORPORATIONS.

CHAPTER 110F. BUSINESS COMBINATIONS WITH INTERESTED SHAREHOLDERS.


--------------------------------------------------------------------------------

TITLE XVI.
PUBLIC HEALTH.
CHAPTER 111. PUBLIC HEALTH.

CHAPTER 111A. DRUG ADDICTION REHABILITATION. [Repealed, 1969, 889, Sec. 23A.]

CHAPTER 111B. ALCOHOLISM.

CHAPTER 111C. EMERGENCY MEDICAL CARE.

CHAPTER 111D. CLINICAL LABORATORIES.

CHAPTER 111E. DRUG REHABILITATION.

CHAPTER 111F. HAZARDOUS SUBSTANCES DISCLOSURE BY EMPLOYERS.

CHAPTER 111G. EARLY CHILDHOOD INTERVENTION SERVICES.

CHAPTER 111H. MASSACHUSETTS LOW-LEVEL RADIOACTIVE WASTE MANAGEMENT ACT.

CHAPTER 111I. WOMEN'S, INFANTS AND CHILDREN PROGRAM.

CHAPTER 112. REGISTRATION OF CERTAIN PROFESSIONS AND OCCUPATIONS.

CHAPTER 113. PROMOTION OF ANATOMICAL SCIENCE.

CHAPTER 114. CEMETERIES AND BURIALS.


--------------------------------------------------------------------------------

TITLE XVII.
PUBLIC WELFARE.
CHAPTER 115. VETERANS' BENEFITS.

CHAPTER 115A. SOLDIERS' HOMES.

CHAPTER 116. SETTLEMENT. [Repealed, 1974, 260, Sec. 17.]

CHAPTER 117. SUPPORT BY THE COMMONWEALTH. [Repealed 1991, 255, Sec. 3.]

CHAPTER 117A. SUPPORT BY THE COMMONWEALTH.

CHAPTER 118. AID TO FAMILIES WITH DEPENDENT CHILDREN.

CHAPTER 118A. ASSISTANCE TO THE AGED AND DISABLED.

CHAPTER 118B. THE MERIT SYSTEM IN THE ADMINISTRATION OF AID TO FAMILIES WITH DEPENDENT CHILDREN AND OLD AGE ASSISTANCE. [Repealed, 1967, 658, Sec. 55.]

CHAPTER 118C. COVERAGE OF CERTAIN EMPLOYEES UNDER THE FEDERAL SOCIAL SECURITY ACT.

CHAPTER 118D. ASSISTANCE TO PERSONS WHO ARE DISABLED. [Repealed, 1973, 1210, Sec. 24.]

CHAPTER 118E. DIVISION OF MEDICAL ASSISTANCE.

CHAPTER 118F. DEPARTMENT OF MEDICAL SECURITY. [Repealed 1996, 151, Sec. 274.]

CHAPTER 118G. HEALTH CARE FINANCE AND POLICY.

CHAPTER 119. PROTECTION AND CARE OF CHILDREN, AND PROCEEDINGS AGAINST THEM.

CHAPTER 119A. CHILD SUPPORT ENFORCEMENT.

CHAPTER 120. DEPARTMENT OF YOUTH SERVICES AND MASSACHUSETTS TRAINING SCHOOLS.

CHAPTER 121. POWERS AND DUTIES OF THE DEPARTMENT OF PUBLIC WELFARE, AND THE MASSACHUSETTS HOSPITAL SCHOOL. [Repealed, 1931, 426, Sec. 24; 1933, 364, Sec. 7; 1948, 310, Sec. 27; 1948, 618, Sec. 2; 1954, 508, Sec. 2; 1958, 613, Sec. 4; 1960, 313, Sec. 3; 1966, 214, Sec. 1; 1967, 658, Sec. 77; 1969, 751, Sec. 2.]

CHAPTER 121A. URBAN REDEVELOPMENT CORPORATIONS.

CHAPTER 121B. HOUSING AND URBAN RENEWAL.

CHAPTER 121C. ECONOMIC DEVELOPMENT AND INDUSTRIAL CORPORATIONS.

CHAPTER 122. TEWKSBURY HOSPITAL.

CHAPTER 123. MENTAL HEALTH.

CHAPTER 123A. CARE, TREATMENT AND REHABILITATION OF SEXUALLY DANGEROUS PERSONS.

CHAPTER 123B. MENTAL RETARDATION.


--------------------------------------------------------------------------------

TITLE XVIII.
PRISONS, IMPRISONMENT, PAROLES AND PARDONS.
CHAPTER 124. POWERS AND DUTIES OF THE DEPARTMENT OF CORRECTION.

CHAPTER 125. CORRECTIONAL INSTITUTIONS OF THE COMMONWEALTH.

CHAPTER 126. JAILS, HOUSES OF CORRECTION AND REFORMATION, AND COUNTY INDUSTRIAL FARMS.

CHAPTER 127. OFFICERS AND INMATES OF PENAL AND REFORMATORY INSTITUTIONS. PAROLES AND PARDONS.


--------------------------------------------------------------------------------

TITLE XIX.
AGRICULTURE AND CONSERVATION.
CHAPTER 128. AGRICULTURE.

CHAPTER 128A. HORSE AND DOG RACING MEETINGS.

CHAPTER 128B. CONSERVATION OF SOIL AND SOIL RESOURCES AND PREVENTION AND CONTROL OF EROSION. [Repealed, 1963, 664, Sec. 4.]

CHAPTER 128C. SIMULCAST WAGERING OF HORSE AND DOG RACING. [Text effective until December 31, 1999. See 1992, 101, Sec. 13 as amended by 1995, 268, Sec. 20.]

CHAPTER 129. LIVESTOCK DISEASE CONTROL.

CHAPTER 129A. MARINE FISH AND FISHERIES, INLAND FISH AND FISHERIES, BIRDS AND MAMMALS. GENERAL PROVISIONS. [Repealed, 1941, 599, Sec. 1.]

CHAPTER 130. MARINE FISH AND FISHERIES.

CHAPTER 131. INLAND FISHERIES AND GAME AND OTHER NATURAL RESOURCES.

CHAPTER 131A. MASSACHUSETTS ENDANGERED SPECIES ACT.

CHAPTER 132. FORESTRY.

CHAPTER 132A. STATE RECREATION AREAS OUTSIDE OF THE METROPOLITAN PARKS DISTRICT.

CHAPTER 132B. MASSACHUSETTS PESTICIDE CONTROL ACT.


--------------------------------------------------------------------------------

TITLE XX.
PUBLIC SAFETY AND GOOD ORDER.
CHAPTER 133. DISPOSITION OF OLD AND INFIRM ANIMALS.

CHAPTER 134. LOST GOODS AND STRAY BEASTS.

CHAPTER 135. UNCLAIMED AND ABANDONED PROPERTY.

CHAPTER 136. OBSERVANCE OF A COMMON DAY OF REST AND LEGAL HOLIDAYS.

CHAPTER 137. GAMING.

CHAPTER 138. ALCOHOLIC LIQUORS.

CHAPTER 139. COMMON NUISANCES.

CHAPTER 140. LICENSES.

CHAPTER 140A. REGULATION OF CERTAIN CREDIT TRANSACTIONS. [Repealed, 1969, 517, Sec. 2.]

CHAPTER 140B. CONTROL OF CERTAIN JUNKYARDS.

CHAPTER 140C. CONSUMER CREDIT COST DISCLOSURE. [Repealed, 1981, 733, Sec. 1.]

CHAPTER 140D. CONSUMER CREDIT COST DISCLOSURE.

CHAPTER 140E. CONSUMER ACCOUNT DISCLOSURE.

CHAPTER 141. SUPERVISION OF ELECTRICIANS.

CHAPTER 142. SUPERVISION OF PLUMBING.

CHAPTER 142A. REGULATION OF HOME IMPROVEMENT CONTRACTORS.

CHAPTER 143. INSPECTION AND REGULATION OF, AND LICENSES FOR, BUILDINGS, ELEVATORS AND CINEMATOGRAPHS.

CHAPTER 144. TENEMENT HOUSES IN CITIES.

CHAPTER 145. TENEMENT HOUSES IN TOWNS.

CHAPTER 146. INSPECTION OF BOILERS, AIR TANKS, ETC. LICENSES OF ENGINEERS, FIREMEN, AND OPERATORS OF HOISTING MACHINERY.

CHAPTER 147. STATE AND OTHER POLICE, AND CERTAIN POWERS AND DUTIES OF THE DEPARTMENT OF PUBLIC SAFETY.

CHAPTER 148. FIRE PREVENTION.


--------------------------------------------------------------------------------

TITLE XXI.
LABOR AND INDUSTRIES.
CHAPTER 149. LABOR AND INDUSTRIES.

CHAPTER 150. CONCILIATION AND ARBITRATION OF INDUSTRIAL DISPUTES.

CHAPTER 150A. LABOR RELATIONS.

CHAPTER 150B. PEACEFUL SETTLEMENT OF INDUSTRIAL DISPUTES DANGEROUS TO PUBLIC HEALTH AND SAFETY.

CHAPTER 150C. COLLECTIVE BARGAINING AGREEMENTS TO ARBITRATE.

CHAPTER 150D. REGISTRATION OF LABOR REPLACEMENTS OR STRIKE BREAKERS. [Repealed, 1969, 448, Sec. 2.]

CHAPTER 150E. LABOR RELATIONS: PUBLIC EMPLOYEES.

CHAPTER 151. MINIMUM FAIR WAGES.

CHAPTER 151A. EMPLOYMENT AND TRAINING.

CHAPTER 151B. UNLAWFUL DISCRIMINATION BECAUSE OF RACE, COLOR, RELIGIOUS CREED, NATIONAL ORIGIN, ANCESTRY OR SEX.

CHAPTER 151C. FAIR EDUCATIONAL PRACTICES.

CHAPTER 151D. HEALTH, WELFARE AND RETIREMENT FUNDS.

CHAPTER 151E. PROHIBITION OF CERTAIN DISCRIMINATION BY BUSINESSES.

CHAPTER 152. WORKMEN'S COMPENSATION.

CHAPTER 153. LIABILITY OF EMPLOYERS TO EMPLOYEES FOR INJURIES NOT RESULTING IN DEATH.

CHAPTER 154. ASSIGNMENT OF WAGES.


--------------------------------------------------------------------------------

TITLE XXII.
CORPORATIONS.
CHAPTER 155. GENERAL PROVISIONS RELATIVE TO CORPORATIONS.

CHAPTER 156. BUSINESS CORPORATIONS.

CHAPTER 156A. PROFESSIONAL CORPORATIONS.

CHAPTER 156B. CERTAIN BUSINESS CORPORATIONS.

CHAPTER 156C. LIMITED LIABILITY COMPANY ACT.

CHAPTER 157. CO-OPERATIVE CORPORATIONS.

CHAPTER 157A. EMPLOYEE COOPERATIVE CORPORATIONS.

CHAPTER 157B. COOPERATIVE HOUSING CORPORATIONS.

CHAPTER 158. CERTAIN MISCELLANEOUS CORPORATIONS.

CHAPTER 159. COMMON CARRIERS.

CHAPTER 159A. COMMON CARRIERS OF PASSENGERS BY MOTOR VEHICLE.

CHAPTER 159B. CARRIERS OF PROPERTY BY MOTOR VEHICLE.

CHAPTER 160. RAILROADS.

CHAPTER 161. STREET RAILWAYS.

CHAPTER 161A. MASSACHUSETTS BAY TRANSPORTATION AUTHORITY.

CHAPTER 161B. TRANSPORTATION FACILITIES, HIGHWAY SYSTEMS AND URBAN DEVELOPMENT PLANS.

CHAPTER 161C. RAIL TRANSPORTATION IN THE COMMONWEALTH.

CHAPTER 161D. THE MASSACHUSETTS INTERCITY BUS CAPITAL ASSISTANCE PROGRAM.

CHAPTER 162. ELECTRIC RAILROADS.

CHAPTER 163. TRACKLESS TROLLEY COMPANIES.

CHAPTER 164. MANUFACTURE AND SALE OF GAS AND ELECTRICITY.

CHAPTER 164A. NEW ENGLAND POWER POOL.

CHAPTER 165. WATER AND AQUEDUCT COMPANIES.

CHAPTER 166. TELEPHONE AND TELEGRAPH COMPANIES, AND LINES FOR THE TRANSMISSION OF ELECTRICITY.

CHAPTER 166A. COMMUNITY ANTENNA TELEVISION SYSTEMS.

CHAPTER 167. SUPERVISION OF BANKS.

CHAPTER 167A. BANK HOLDING COMPANIES.

CHAPTER 167B. ELECTRONIC BRANCHES AND ELECTRONIC FUND TRANSFERS.

CHAPTER 167C. BANK LOCATIONS.

CHAPTER 167D. DEPOSITS AND ACCOUNTS.

CHAPTER 167E. MORTGAGES AND LOANS.

CHAPTER 167F. INVESTMENTS AND OTHER POWERS.

CHAPTER 167G. TRUST DEPARTMENT.

CHAPTER 167H. MUTUAL HOLDING COMPANIES.

CHAPTER 168. SAVINGS BANKS.

CHAPTER 169. RECEIPTS OF DEPOSITS FOR TRANSMITTAL TO FOREIGN COUNTRIES.

CHAPTER 169A. LICENSING OF CHECK CASHERS.

CHAPTER 170. CO-OPERATIVE BANKS.

CHAPTER 171. CREDIT UNIONS.

CHAPTER 172. TRUST COMPANIES.

CHAPTER 172A. BANKING COMPANIES.

CHAPTER 173. MORTGAGE LOAN INVESTMENT COMPANIES. [Repealed, 1975, 126.]

CHAPTER 174. BOND AND INVESTMENT COMPANIES. [Repealed, 1950, 822, Sec. 1.]

CHAPTER 174A. REGULATION OF RATES FOR FIRE, MARINE AND INLAND MARINE INSURANCE, AND RATING ORGANIZATIONS.

CHAPTER 174B. REGULATION OF AUTOMOBILE CLUBS.

CHAPTER 175. INSURANCE.

CHAPTER 175A. REGULATION OF RATES FOR CERTAIN CASUALTY INSURANCE, INCLUDING FIDELITY, SURETY AND GUARANTY BONDS, AND FOR ALL OTHER FORMS OF MOTOR VEHICLE INSURANCE, AND REGULATION OF RATING ORGANIZATIONS.

CHAPTER 175B. UNAUTHORIZED INSURER'S PROCESS ACT.

CHAPTER 175C. URBAN AREA INSURANCE PLACEMENT FACILITY.

CHAPTER 175D. MASSACHUSETTS INSURERS INSOLVENCY FUND.

CHAPTER 175E. REGULATION OF RATES FOR MOTOR VEHICLE INSURANCE.

CHAPTER 175F. MEDICAL MALPRACTICE SELF-INSURANCE TRUST FUNDS.

CHAPTER 175G. THE POLLUTION LIABILITY REINSURANCE CORPORATION.

CHAPTER 175H. FALSE HEALTH CARE CLAIMS.

CHAPTER 175I. INSURANCE INFORMATION AND PRIVACY PROTECTION.

CHAPTER 175J. ADMINISTRATIVE SUPERVISION AND HAZARDOUS FINANCIAL CONDITIONS OF INSURITIES.

CHAPTER 176. FRATERNAL BENEFIT SOCIETIES.

CHAPTER 176A. NON-PROFIT HOSPITAL SERVICE CORPORATIONS.

CHAPTER 176B. MEDICAL SERVICE CORPORATIONS.

CHAPTER 176C. NON-PROFIT MEDICAL SERVICE PLANS.

CHAPTER 176D. UNFAIR METHODS OF COMPETITION AND UNFAIR AND DECEPTIVE ACTS AND PRACTICES IN THE BUSINESS OF INSURANCE.

CHAPTER 176E. DENTAL SERVICE CORPORATIONS.

CHAPTER 176F. OPTOMETRIC SERVICE CORPORATIONS.

CHAPTER 176G. HEALTH MAINTENANCE ORGANIZATIONS.

CHAPTER 176H. LEGAL SERVICES PLANS.

CHAPTER 176I. PREFERRED PROVIDER ARRANGEMENTS.

CHAPTER 176J. SMALL GROUP HEALTH INSURANCE.

CHAPTER 176K. MEDICARE SUPPLEMENT INSURANCE PLANS.

CHAPTER 176L. RISK RETENTION AND RISK PURCHASING GROUPS.

CHAPTER 176M. NONGROUP HEALTH INSURANCE.

CHAPTER 176N. PORTABILITY OF HEALTH INSURANCE.

CHAPTER 177. ASSESSMENT INSURANCE. [Repealed, 1924, 406, Sec. 17; 1929, 24, Sec. 1.]

CHAPTER 178. SAVINGS BANK LIFE INSURANCE. [Repealed, 1990, 499, Sec. 22.]

CHAPTER 178A. SAVINGS BANK LIFE INSURANCE.

CHAPTER 179. PROPRIETORS OF WHARVES, REAL ESTATE LYING IN COMMON, AND GENERAL FIELDS.

CHAPTER 180. CORPORATIONS FOR CHARITABLE AND CERTAIN OTHER PURPOSES.

CHAPTER 180A. MANAGEMENT OF INSTITUTIONAL FUNDS.

CHAPTER 181. FOREIGN CORPORATIONS.

CHAPTER 182. VOLUNTARY ASSOCIATIONS AND CERTAIN TRUSTS.


--------------------------------------------------------------------------------

Return to:


** Next Part TOC ** Legislative Home Page

pi_2227036
I will light the match this mornin' so I won't be alone.
Watch as she lies silent, for soon that will be gone.
I will stand arms outstretched, pretend I'm free to roam.
I will make my way through one more day in Hell.
How much difference does it make?

I will hold the candle till it burns up my arm.
I'll keep takin' punches until their will grows tired.
I will stare the sun down until my eyes go blind.
I won't change direction, and I won't change my mind.
How much difference does it make?

I'll swallow poison, until I grow immune.
I will scream my lungs out till it fills this room.
How much difference...?
How much difference does it make?

Soms zit het mee, voor de rest zit het tegen. Dat is geen pessimisme, dat is realisme.
  zondag 18 november 2001 @ 20:55:24 #137
11799 Gerdy
Pronounce as Gurdy
pi_2227068
Gerdy
pi_2227071
heb je niks beters dit is echt veel te weinig!
pi_2227088
quote:
Op zondag 18 november 2001 20:55 schreef Gerdy het volgende:
Gerdy
Offtopic!
  zaterdag 20 juli 2002 @ 21:55:20 #140
25996 gtsoftware
Source off all evil
pi_5092073
weet je waar pas veel ge copy end gepast wordt in programma's dat is gewoon niet normaal.
I'm all that you fear all that you hate i a'm the end.
  zondag 21 juli 2002 @ 19:17:02 #142
4921 blup
Shoarma Sin Farma
pi_5100809
aha
pi_5129062
Bide the Wiccan law we must,
In Perfect love and Perfect trust.
Eight words the Wiccan Rede fullfil:
AN YE HARM NONE,
DO WHAT THOU WILT.
lest in thy self-defence it be
keep in mind the rule of three
follow this with mind and heart,
MERRY YE MEET
&
MERRY YE PART

jups ik was bezig met de Wiccan Redes

Protected by Witchcraft
abonnement Unibet Coolblue Bitvavo
Forum Opties
Forumhop:
Hop naar:
(afkorting, bv 'KLB')