Question about Commons

Charles Clover, writing in the Transatlantic Edition of Internationale Politik (4 / 2005, Vol 6, p32), reminds us that law, especially international law, is written to address political and social demands at the time it’s written and framed through technological limitations (not many laws governing the territory on Mars… although I think there are some general "for mankind" feel-good "laws" for the moon). His article "Who Owns the Sea?" considers the roots of international laws of the sea, questioning their validity and applicability in modernity. Comparing the causes of the reduction of shared commons on land with the current conditions in fishing and other activity can lead to interesting explorations into a variety of areas, including telecommunications and privacy.

The laws of the sea, based on Grotius’s Mare Liberum, established the ocean as a common. Clover writes "John Selden, an English jurist, asserted in Mare Clausum the right of the crown to claim sovereignty over sea closest to its territory." This was the basis of the three-mile limit, Clover continues, as based by the distance a shore battery could lob a cannon ball. Modern technology, such as radar, sonar, and the Gloria trawl (64m opening), exceeds the limitors of ancient law, stripping resources down to the nub.

As I was reading Clover’s piece, I received an email about the deaths of whales off Gibraltar.

There are 3 more beaked whale deaths in the beach…(last October 2005 one more whale stranded during the passsage of the aircarrier Invincible in his way from the Mediterraneasn to the naval exercises Noble Javalin of the Nato response Force in the Canary Islands)

This was followed by this

We got some information now, the H. M. S. Kent, of the UK Royal Navy, together with the Gibraltar squadron, was dong manoeuvres in the area and carried a mid frequency active sonar (similar to the SQ 53 present in the strandings of Bahamas and Canaries)

There are 4 dead beaked whales by now, searching for a fifth, necropsyes are being done and all indicates the sonar is related to the deaths

The US Navy has dealt with similar issues with proposed sonar systems.

The conflict between man and nature, outside of the global warming debate, will continue to escalate. However, such fights are generally limited to countries with at certain amount of institutional capacity. Somali fish stocks are being plundered by China and other countries without any credible response. As someone pointed out to me a while ago when the Top Cat Marine Security fiasco first appeared, Somalia has tremendous natural resources (beyond energy supplies) that could finance a legitimate government. That particular discussion started from the point of lacking maritime security inhibiting the growth of a legitimate fishing fleet.

Something to think about.

Google and American Foreign Policy

Where does Google fit in the scheme of US foreign policy? It is a US company and yet how much does it need the US Government to expand abroad? Does it have a role in trade negotiations, and should the US Government support its expansion abroad as the government does with oil companies and other industries?

Google can launch a Bengali / Bangla language server with little to no government intervention, either local or at home. Independence from the US Government is more apparent when server resides at the US-based Googleplex (which many of the foreign language/country specific servers do). If we ask “what is Google’s foreign policy and how should we anticipate their actions” we need to ask “who and what is Google?” I suggest Google is unlike anything that has come before (perhaps excepting Yahoo!). But the penetration and scale of Google, shown by “verbification” and ubiquity of Google, far exceeds Yahoo!’s reach.

Google isn’t 1950’s General Motors (“what’s good for GM is good for America”). Nor is it 1990’s Boeing who desperately wanted to sell to the Chinese and pressured State / White House to do it (without success). This is not marketplace eBay with a foundation in exchange of tangible goods. For Google, the buyer and seller relationship exist but without a physical transfer. Google is like American credit reporting agencies, accept, as a colleague pointed out in a conversation over this, reporting agencies are very close, one step away, from your money. Google is not nearly that close to your pocketbook or is at best indirectly as it serves as a matchmaker connecting the user with an advertiser.

Google is not like Microsoft, with desktop and server operating systems and software suites. Microsoft is concerned about reverse engineering and intellectual property rights (IPR). It isn’t like CISCO providing boxes and knowledge that can be copied or reverse engineered and likewise concerned about IPR.

How about TiVO? Users can exercise a Lockean choice to time-shift, but it is solidly based on a hardware device and a revenue model based largely on end-user subscription. TiVO would make a logical contribution to the Google information base.

Wal-Mart? Wal-Mart is well known for having a tremendously interconnected knowledge system to precisely understand and react to customer buying habits to maximize (milk) every penny spent in their store. However, Wal-Mart still has mortar, trucks, inventory, and plenty of disgruntled employees and unhappy displaced former store owners.

Google is different. Google is an information broker. Consider Google’s corporate social responsibility. Does one even consider CSR when speaking of Google like you do with Wal-Mart, Ford, HP, or even RAND? What is the Google footprint in the world of political, social, and economic ecologies?

Google is a young company with its stock trading at $358 as of this writing (look up the price on Yahoo!). They use virtual teams of developers residing in multiple countries, but their product does not require tariff negotiations, safety tests, or other legal conformity. Google’s products don’t even need to be finished products when delivered, staying in beta for inordinate lengths of time.

Google is a world wide brand that, because of its localizing (or glocalizing), is less attached to the US as an “industrial age” firm with tangible products that interfere with local manufactures or growers or crowd the streets or pound the ear drums. There will not be any French farmers torching Google.fr or crowds protesting NATO or the ICC in front of Google srpski (Serbian). The good people of Cymru (Wales) can say ‘bording da’ with their morning tea while searching Google Cymraeg. There’s also the odd Google H4x0r (Hacker)… Uighur, and over 100 languages serving over 110 distinct countries.

The recent controversy about two decisions by Google are interesting in how they differ. The first is Google’s challenge to a US subpoena on their data. The poor people scared away from the search engine (I’m sure it was only a brief and temporary flight) are likely not aware of the amount of information Google collects on them and re-purposes, usually in exchange for a few coins dropped in their pocket. Most people don’t understand or take the time to ponder or learn about Google, Yahoo, MSN Search, or any of these tools. Search engines are seen as black box appliances (in fact, you can purchase their systems for corporate intranets as blackbox with varying degrees of customization).

However, the personalization of Google is apparent w/ their search home and search history. It is also seen in searches themselves (at the top, shaded recommended links) and in AdWords, the customized-by-search precision guided marketing (PGM in kinetic war; PGM in gaining eyeballs). The information collected on “named” individuals (i.e. you) is substantial, but not as substantial as the collection on unnamed individuals (i.e. somebody at an IP address). Remember when ads were going to appear within GoogleMail messages? So, there’s information to be collected and then sold. This collection and selling is a brokerage focused on information, metadata. How they distribute this data is up to them, right? How about image searches for Tiananmen? There might be something political on what the China server and the US (default) server retrieves (or this, China / World). Now, what claim do we have to say the difference is wrong? Is it within Google’s right pursue a policy with states that is required? Being a sort of pay for play, it’s illegal in the US, but where in international law does is it codified? One of the many human rights declarations?

From Street and Aerial Maps to Froogle to Scholar to News to Books to Video and more, Google peddles information. Concerns over terrorist use of what amounts to a cheap, GIS package has focused on GoogleEarth, not TerraServer (with its greater control over image selection and resolution) or other photo sites (threads at DefenseTech on Googling Area 51 were entertaining and so is the flying car contest). And then there are the mash-ups of other data into GoogleMaps, using say, FAA real-time data and conspiracy theories. Is this aggregation the democraticization of intelligence and general information?

Ease of use is of course easy through the main user interface (“I’m Feeling Lucky”) and through toolbars. Interesting side note is the new toolbar available for IE (this version is not yet ready for Firefox) allows new, content specific buttons to be added. Now Google can track your searching of the New York Times, MovieFone, Saskatoon StarPhoenix, AOL News, and even other search engines (among probably at least one hundred buttons). You can even search while offline w/ Google Alert and GoogleAlerts (two distinctly different things).

The second decision was Google’s decision to acquiesce to Chinese requirements in order to get behind the Great Firewall. Was there lobbying by Google on the US? Probably. Which department? Who knows. Does it really matter? Maybe. Lobbying on China? Yes, definitely. Does it matter? Probably less so unless you’re a China specialist. Is this unique in Google’s foreign (which implies a “domestic”) policy? Darn right. Did they sell their soul? Maybe, but it’s not the same soul as we came to know and love in the industrial economy. So what if they did? What is it to us? Unless they are selling US-citizen search data (who cares about non-US citizens, right? do you think there will be an uproar in the US if China demanded Mongolian query data?).

Consider the amount of Google data flowing on the Internet. Verizon “accused Google of freeloading“, claiming backbone and last-mile providers are bearing the cost of Google’s information peddling from “cheap servers”. Will Google go vertical? If they do, they’d be smart to do it enough to simply insulate themselves against these types of threats. Is Verizon trying to switch the fee scheme? What will that mean to iTunes? CNNWatch? Tony Blair (watch the PMQs and then picture W standing in Blair’s shoes)? Is Verizon looking at some sliding scale? Regardless, it would be interesting to analyze and quantify the Google-transacted / sourced traffic on # of transactions and gb’s served. Should Verizon be grateful for Google for putting their users in touch with content and therefore wanting to upgrade to higher speed networks?

On a side note, I was told first hand GTE, old SoCal phone company, was working on a fibre roll out and had already started training their technicians to support it. However, when they realized they were about to sell out to Verizon, all work was stopped. That was six years ago. We are still no better than 3mb service, which we’re supposed to be excited about, meanwhile 45mb service is common in Japan.

Another side consideration on what Google has become. Microsoft was known for pre-pre- (sometimes add another pre-) release product announcement. Early mention of a potential upcoming product to inhibit competition. Google has taken the art of beta to a new level. They’re granted an effective license to provide unfinished software without users complaining. Now, the software works, but they allow themselves the theoritical (and ethical?) excuse on failure: it wasn’t a final product. Who else can get away with this for such a long time? Who cares?

So, if Google can defy or give-in at will, it seems fairly independent, right? It has some ability to establish rules on the Internet, considering its heft, right? What if your site doesn’t match the ‘standard of fair play’? Remember when website loaded their metadata header tags with unrelated tags? Or loaded pages with unrelated words or heavily repeated pertinent and related words. Ok, maybe you don’t or don’t want to admit it. Called webspam, BMW in Germany (BMW.de) apparently did try to mess with Google. They got caught. See the post from Matt Cutts with what the Googlebot saw and what humans saw and read his comments at the bottom (Hat tip to Collective Conversation).

When considering the impact of Google’s ability to retrieve, publicize, and broker both content and usage information, the impact on ICT (information communication technology) is significant. Likewise, when a Bengali server goes online, Google steps closer into obvious ICT4D (ICT for development) ramifications. A paucity of content in non-G8 languages is arguably an invisible ‘firewall’ (the ceiling metaphor doesn’t “hack” it) to cultural and social input. Does this mean UNESCO, with its charge to protect culture, should take an increased interest in Google? Would countries begin to lay claim on their national content in a neutral, or less than neutral, internet similar to copyright issues in the Gutenburg Project?

Google has the right to control the quality of the inputs, but at what
point might Google become a public good? Or too big? Can it become too
big? Might it become a new Common, in the traditional almost quaint
notion? Charles Clover, writing in Internationale Politik, reminded me of Grotius’s Mare Liberum that established the ocean as a common and of John Selden’s refinement, Mare Clausum, establishing sovereignty over sea closest to its territory.

Could remanding into the classification of a Common be in Google’s future? Doubtful, but besides predicting Google’s behavior, what can we do to predict the layout of the uncharted “waters” of cyberspace? What will Google’s foreign policy look like and how much will the United States be involved or even the target of it? Will anywhere be domestic, or foreign, to Google?

Technorati Tags:
Google,
Internet,
NetNeutrality,
Politics

Net Infrastructure Requiring Tolls?

This is a potentially concerning development: Verizon Executive Calls for End to Google’s ‘Free Lunch’.

A Verizon Communications Inc. executive yesterday accused Google Inc. of freeloading for gaining access to people’s homes using a network of lines and cables the phone company spent billions of dollars to build.

The "middle men" in the internet are looking to make some additional money. If they are allowed to proceed, the costs of access, already ridicuolously high for low quality and low speed service will likely go up. America lives in a fantasy of having a great and highspeed computer network, just like we think we have a great cellular service (some people do at least). A good read on this is Bleha’s May/June 2005 Foreign Affairs article, Down to the Wire. A rebuttal and response in a latter issue is also interesting, if not for the redirection of factors and failure to address the core issue of government involvement. I learned our local phone company was already training its people on the fibre optic wire is about run to home when they pulled the plug because they were getting bought out. That was at least 6 years ago and still no fibre. No incentive. Public-private partnerships are required and have been required for major innovation. Meanwhile, we pay handsomely for services we think are the best.

Technorati Tags: ICT,
Internet,
Technology

Tracking stuff is just about to get easier

A new thinner-than-paper-thin RFID (radio frequency identification) chip has been developed by Hitachi Ltd. “Ten or more times thinner than a sheet of paper” (shouldn’t that be 1/10 the thickness?), it is 0.15mm x 0.15mm x 0.01mm. Paper is .08mm-.1mm thick so the new chip could actually be used as a watermark.Applications could easily include enhanced document security. The chip could be embedded in optical media (would RFID interfere w/ electronic media?) such as DVD, CD, etc. What about embedding in clothing, jewelry and watches, etc. Making the tracker inconspicuous raises the possibilities.

Searching for information… just got easier

The Google Toolbar has just gotten better w/ enhanced search add-ons. Information becomes knowledge if its timely. Making information retrieval easier across disparate silos of content is key in the knowledge economy. This is a great step forward. Unfortunately, I primarily use Firefox and these buttons are not available for Firefox, just IE. (BTW – IE7 is apparently taken cues from Firefox.)

Continue reading “Searching for information… just got easier

Blogging’s Six Pillars

News brief on blogging (which could / is leveraged in the media diplomacy sphere). Robert Scoble is perhaps Microsoft’s chief evangelist, promoting new tech. He’s just published a blogging book, Naked Conversations, in which he describes "six pillars" that distinguish blogging from every other communication channel:

  1. Publishable
  2. Findable
  3. Social
  4. Viral
  5. Syndicatable
  6. Linkable

If you’re reading this, you probably agree with all six above. No further editorial from me on this, at least not right now…

CIA: new FBIS for DNI OSC

News brief on repositioning the useful FBIS (Foreign Broadcast Information Service), available these days through World News Connection, among others. A great tool to read non-English and non-US journals, CIA is apparently looking to better leverage OSI (open source intelligence). The WashingtonPost, back in 25 November 05, (ok, so I’ve got a backlog) noted:

By the 1990s, the office [FBIS] had fallen on hard times. Some advocated abolishing FBIS, saying it was irrelevant in the age of 24-hour cable news. It survived, but had its personnel slashed 60 percent, according to Naquin. Sept. 11 gave it new purpose, as “open source” became an intelligence buzzword. Across government, policymakers began to debate how to find the nuggets of genuine information hidden in the Internet avalanche.

Other interesting news in the article, but mostly old news as far as an institutional appreciation of open vs clandestine sources. Reading Silent Warfare, For the President’s Eyes Only, Imperial Hubris, or a myriad of other books will confirm information flow “issues” in the intelligence services (not just in the CIA).  

Congressional Staffers messing w/ Wiki?

News brief from Slashdot – Wikipedia vs Congressional Staffers [Update]:

There has been quite a bit of recent reporting on the recent troubles between Wikipedia and certain Congressional staffers. In response, abdulzis mentions that "an RFC, Wikipedia’s mediation method to deal with ‘disharmonious users’, has been opened to take action against US Congressional staffers who repeatedly blank content and engage in revert wars and slanderous or libelous behavior which violates Wikiepdia code. The IP ranges of US Congress have been currently blocked, but only for a week until the issue can be addressed more directly."

What is commonly used as the reference of first resort by many, Wikipedia, is being tweaked and modified by Congressional staffers?

According to the Lowell Sun, U.S. Rep Marty Meehan’s staff has been heavily editing his Wikipedia bio, among other things removing criticisms. In total, more than one thousand Wikipedia edits in various articles have been traced back to congressional staffers at the U.S. House of Representatives in the past six months.

If you’re curious what Wikipedia will do… check out their Request for Comment here.

Using URL typos for political gain

Surfing to the German journal Internationale Politik, I found an (outdated) Kurdish independence website. Registering domain names that closely resemble another is an old trick, usually used by savvy marketers for competiting or less ethical redirects. I remember that when AT&T held a promotion in the United States for long distance based on calling 1-800-OPERATOR, a competitor registered 1-800-OPERATER. All those that didn’t know how to spell were directed not to AT&T but to someone else, MCI was it? Sprint?

Returning to Internationale Politik, the proper URL is http://www.internationalepolitik.de/. However, if you insert a hypen between Internationale and Politik, you get the Kurdish site. Clever and old.

Picking ICT Targets

Space65What do we mean when we want to use information communication technology? Do we want to bring light to the dark areas? This metaphor from colonial times brings with it certain implications that may or may not mean progress.

Consider UK’s Digital Strategy and Prime Minister Tony Blair’s leading statement: “Universal internet access is vital if we are not only to avoid social divisions over the new economy but to create a knowledge economy of the future which is for everyone. Because it’s likely that the internet will be as ubiquitous and as normal as electricity is today. For business. Or for individuals.”

Is this a portable desire? What does this do to solve core-gap problems, as described by Dr Thomas Barnett? Is the goal to connect all the networks ala Castells? How, as Younghusband at ComingAnarchy asked me, can we use ICT to defeat terrorist networks? ICT seems like it should be able to short-circuit the supply of recruits to the other side. Do wind-up laptops for teachers and/or students contribute to the development of social awareness, including human rights, and the importance of the environment? If people "upgrade", will the dark go away?

Laying foundations for wider ICT implementation

TnlaptophandsideNews brief from the Times of India on Microsoft’s train-the-trainers program. Details on the $100 laptop referenced in the article, pictured at right, can be found here.

Microsoft’s India division has committed to train 20,000 teachers in India as part of the Partners-In-Learning program. The goal is to educate government teachers on how to use computers and technology so they can teach their students more effectively. Tech-savvy teachers create a learning environment with more possibilities. Everyone talks about the digital divide, and the problem is that not everyone has an equal chance at knowledge. To address this issue from the hardware side, many companies have teamed up to produce an inexpensive laptop that is hand-crank powered so even those in the remotest locations can experience the power of the PC for learning and entertainment. Having the hardware is only part of the solution. Kids can only do so much without a teacher’s help. The hardware and software are just tools. Thanks to Microsoft’s new program, these teachers get an "upgrade" which in turn helps the students upgrade themselves as well.

Your friendly internet police

News brief on the Great Firewall of China from RConversation. The internet police Jingjing_1Chachaof Shenzhen now, as they fly on manhole covers, a "face" to go with the name. The Chinese "Big Brother" and "Big Sister" of the Cyberworld would look out of the place in the Matrix, but not in China. Check out the details.

Probably the only interesting perceptual change on information communications technology is that having a "face" makes the threat or intimidation that much more real. Anytime something is branded, you further its recognition. Will they make these characters into avatars for the massive multiplayer games? Will Chinese gold harvesters see one of these soon?

War News Radio

News brief for those interested in information communication technology and cultural diplomacy. A recent story on NPR’s Day to Day highlighted a college’s attempt to reachout and communicate directly with Iraqis.

War News Radio uses Skype and Yahoo messenging, and their respective directory systems, to contact English-speaking Iraqis. This type of grassroots outreach demonstrates more than journalism adapting to technology and barriers to interview (another story on NPR’s Morning Edition interviewed a reporter who no longer interviews the "person on the street" due to security problems). Technology may enable the so-called CNN Effect, but it also facilitates this type of peer to peer grassroots communication.

The online awareness and recruiting the led to the "Battle in Seattle", cultural diplomacy outreach could be advantaged by leveraging these technologies at the individual level. The Cold War United States Information Service facilities, vast (and less micromanaged) VOA broadcasts, and other cultural reachouts (thanks to the Honorable Helms) may be past relics, but these technology options may fill an important niche in the modern security-challenged era.

Technorati Tags: ICT, Public Diplomacy, Technology

China’s R&D and Arms Industry

From eWeek.com comes this item on US R&D opening up in China.

Hewlett-Packard Co. opened a research lab, HP Labs China, in November, joining Microsoft Corp. and IBM and other IT companies that have set up research labs in the country to tap the increasing number of technical graduates Chinese universities are turning out.

By itself this may not be too interesting, but Defense Industry Daily reports on a RAND report on the Chinese defense industry increasing its quality and overcoming its weaknesses. Drawing from a WindsOfChange.net posting last year and updated today, the information on both the DID and Winds posts are enlightening. A suggested read.

Now, consider a growing China and consider American corporations so hungry to get into the market they would do nearly anything to do so. Besides opening up R&D facilities right on our competitor’s turf, stress between enterprise and our security may be greater than Boeing’s attempt to sell to China during the Cold War. Microsoft has spent a few years getting in with China because of the size of the market and piracy.

This month, Microsoft censored a blog at the request of Chinese authorities. Is this ethical? What will happen in future conflicts when US corporations have a greater stake to prevent (or worse allow) certain political actions, including war, that is in the best interest of the United States? Is this taking the Liberal Democratic theory to the next step? Democracies / liberal market countries do not fight each other? This would actually turn that theory since China’s openness may still be questionable at the time any conflict occurs. Looming resource conflicts may be altered by US corporate interests less concerned about big industry.

Leveraging the Internet, part I

It is not just pornographers that purchase domain names that are similar to mainstream companies, publications, etc that people may want to visit. I was trying to surf to a German political journal, International Politik. So I naturally typed in: http://www.internationale-politik.de.  However, that link is a redirect to an old Kurdish freedom page, http://kurdistan-solidaritaet.de. This site, btw is out of date some five years…. but it is an example that it is not just non-terrorists that can use the Net. More to come on this.

Bush’s Priorities: is this really what we should be working on?

Further demonstrating the priorities of the Bush Administration’s post-9/11 security mindset, it has abandoned efforts to stop police from using "10-codes" (10-4 etc) to standardize communications. Nevermind that significant communication problems, such as incompatible radios and failure to establish frequencies for the jargon to be even used, has failed miserably, as demonstrated in post-Katrina rescue ops.

The Bush administration has abandoned its plan to require policedepartments around the country to stop using traditional “10-codes” for
communication or risk losing federal antiterrorism funding, Homeland
Security Secretary Michael Chertoff announced yesterday (see GSN, Aug.
26).
Under the new National Incident Management System, a post-9/11 project
designed to establish consistent practices among police departments and
other emergency response agencies, codes such as “10-4” for “message
received” are to be replaced with “plain English.”
from Global Security Newswire

The Net and Terrorists

The Washington Post published an update on al-Qaeda’s successful venture into the world of knowledge management (KM) and its child, Computer-based training (CBT). While many businesses in America look for obstacles when deploying effective KM solutions (refusing to see the cost benefit of an imperfect deployment over no deployment over the wrong deployment), these ad hoc "franchises" of AQ latch on with vim and vigor, exploring the various opportunities available in cyberspace.

al Qaeda has become the first guerrilla movement in history to migrate from physical space to cyberspace. With laptops and DVDs, in secret hideouts and at neighborhood Internet cafes, young code-writing jihadists have sought to replicate the training, communication, planning and preaching facilities they lost in Afghanistan with countless new locations on the Internet.

Flexible, anonymous, collaborative knowledge sharing environments is what the web does best. Without being bogged down by bureucratic infighting to create the best practices before deployment, AQ and its affiliated nodes learn by trial and error, developing best practices the old fashioned way.

While easily identifiable items in the WP article are the Computer Based Training (CBT) examples, the real underlying concern is the information and knowledge sharing to build a smarter enterprise. These practices must be met with the same in our matching and superceding efforts, as they increasingly are. Decades old infighting between intelligence services that have led to ossified barriers between knowledge stores, including antiquated information systems, must be torn down and replaced.

The FBI’s Virtual Case File system was a disaster, an expensive ($170m) and time-consuming Dilbert-esque failure. The new Sentinel system is not expected to be in-place until 2009. This is not to say we are failing at every effort, but critical knokwledge hubs are not being addressed quick enough. Designing the perfect system takes time, providing an open platform that may be imperfect allows for expansion to meet the needs that are really necessary and develop after design milestones.

Collaborative methodologies take hold when users understand, demand, are heard, and responded to. A flatter organization, like AQ, with its transforming entrepreneurs will continue to evolve into a more formidable enemy because of reduced bureaucratic drag.

CBT for Terrorists

Computer games are actively deployed in the training, debriefing, and counseling forces. The US, for example, is using computer-based training (CBT) in the form of a computer game to reduce post-traumatic stress disorder, PTSD. On the other hand, terrorists and insurgents (or freedom fighter, depending on whose side you sit) are using CBT too.

ABC News ran an item about Iraqi insurgents providing online sniper training. Knowledge sharing is what the internet is based on, as is filesharing. Defense and National Interest translated and posted the  powerpoints of training exercises

 

Other technology is of course used by the modern collaborative terrorist: CD and DVD media. MSNBC reported on this offline technology to share knowledge and lessons learned to improve future efforts. Included on this CD are instructions on

how to make anti-personnel mines, anti-tank grenades
and armor-piercing mines, along with the exact chemical formula to
create RDX — a high-powered explosive which could increase the
lethality of major attacks.