Alexander Galloway
Since the beginning
Works in New York, New York United States of America

PORTFOLIO (2)
BIO
Alex works with RSG. Projects include the surveillance tool "Carnivore," "Low Level All Stars" a DVD collection of C64 intros, and the computer game Kriegspiel.
Discussions (75) Opportunities (0) Events (0) Jobs (0)
DISCUSSION

artport July 2002


artport gate page July 2002
Lew Baldwin's "GoodWorld"
http://artport.whitney.org

GoodWorld is a browser that 'wraps' the Web by wiping out content and
unifying all pages into one creation. GoodWorld takes a site and
re-appropriates the text and images, forming an entirely new work. The most
prominent image on the page becomes an abstracted reproduction of the
original while the remaining images are turned into yellow 'wrappers' and
the text and links are transformed into '* __ *' -- symbolizing a
complacent face. The Web becomes a neutralized "good world" or possibly an
unsettled dilution of the safe and familiar we've come to expect.

DISCUSSION

Re: Re: Mail Delivery Status Notification


yeah, i've never heard of anything called "Mail Essentials" on our server.
but i'll ask our ISP just to be sure..

it's also possible it's on the user's end of things.

best,

-ag

At 07:27 AM 6/20/2002 -0400, you wrote:
>MAIL ESSENTIALS SENDER NOTIFICATION
>
>The following message:
>
>TO: postmaster@ipass.com
>FROM: info@furtherfield.org
>DATE: Fri, 21 Jun 2002 11:24:10 +0100
>Subject: Re: Mail Delivery Status Notification
>
>
>Has been deleted by Mail Essentials for the following reason(s):
>
>Body contains word(s)/phrase(s) 'sex'
>
>
>Mail essentials
>
>
>SEX = PLEASURE= LOVE OF ONE SELF = LOVE FOR OTHERS = MUTUAL ACCEPTANCE = NON
>BIGOTRY = EMOTIONAL INTELLIGENCE = NON CONFORMITY = NON - THOUGHT CRIME =
>PLAYFUL LOVING = DISCOVER OUR OWN GENIUS = QUESTION MORALITY = QUESTION ONE
>SELF = RE-EVALUATE = FIGHT FOR PERSONAL LIBERTY = FIGHT FOR COLLECTIVE
>FREEDOMS = FIGHT AGAINST CENSORSHIP = FIGHT AGAINST KILLERS OF CIVILIANS =
>FIGHT AGAINST NUCLEAR ARMS POSTURING = MAKE OUR OUR WORLDS = THINK BEYOND
>THE BOREDOM OF INSTITUTIONAL RESTRAINT = LIVE LIFE = ENJOY LIFE = LOVE LIFE
>= DEVELOP ONE'S MIND = BE INTIMATE = HUMANITY BEFORE CONTROL = HUMANITY
>BEFORE MONEY = BE PEPETUALLY CREATIVE = ENJOY OUR IMAGINATIONS = SHARE OUR
>IMAGINATIVE REASONINGS = OPEN OUR MINDS = THINK BEYOND THE PROTOCOL = LOVE
>REACHES FURTHER THAN WARS...
>
>MARC GARRETT
>
>
> > MAIL ESSENTIALS SENDER NOTIFICATION
> >
> > The following message:
> >
> > TO: postmaster@ipass.com
> > FROM: info@furtherfield.org
> > DATE: Fri, 21 Jun 2002 12:14:10 +0100
> > Subject: Re: Mail Delivery Status Notification
> >
> >
> > Has been deleted by Mail Essentials for the following reason(s):
> >
> > Body contains word(s)/phrase(s) 'sex'
> >
> >
> > Mail essentials
> >
>
>
>
>
>+
>-> Rhizome.org
>-> post: list@rhizome.org
>-> questions: info@rhizome.org
>-> subscribe/unsubscribe: http://rhizome.org/subscribe.rhiz
>-> give: http://rhizome.org/support
>+
>Subscribers to Rhizome are subject to the terms set out in the
>Membership Agreement available online at http://rhizome.org/info/29.php3

DISCUSSION

How We Made Our Own "Carnivore"


Disobedience to authority is one of the most natural and
healthy acts."
-Empire, Hardt & Negri

Ethernet was invented at the University of Hawaii. Scientists there in
the early 1970s faced a unique problem: How to network different
campuses, each on different islands separated by water.[1] The solution
was to use the free airwaves, to transmit data through the air, or
"ether," using radio. There were no wires. Like a radio station, each
node sent messages broadly over the sea to other islands. A protocol was
developed to avoid collision between simultaneous communications. Ever
since, Ethernet has been based on an open transmission model. The
protocol translated well to wire-based networks too, and is now the most
widely used local networking protocol in the world.

Since Ethernet is based on an open broadcast model, it is trivial for
listeners to make themselves "promiscuous" and eavesdrop on all
communications, not simply those specifically addressed to them. This
technique is called packet-sniffing and has been used by systems
administrators and hackers alike for decades. Ethernet, sniffers, and
hacking are at the heart of a public domain surveillance suite called
Carnivore (http://rhizome.org/carnivore) developed by RSG and now used
in a civilian context by many artists and scientists around the world.

Hacking

Today there are generally two things said about hackers. They are either
terrorists or libertarians. Historically the word meant an amateur
tinkerer, an autodictat who might try a dozen solutions to a problem
before eking out success.[2] Aptitude and perseverance have always
eclipsed rote knowledge in the hacking community. Hackers are the type
of technophiles you like to have around in a pinch, for given enough
time they generally can crack any problem (or at least find a suitable
kludge). Thus, as Bruce Sterling writes, the term hacker "can signify
the free-wheeling intellectual exploration of the highest and deepest
potential of computer systems."[3] Or as the glowing Steven Levy
reminisces of the original MIT hackers of the early sixties, "they were
such fascinating people. [...] Beneath their often unimposing exteriors,
they were adventurers, visionaries, risk-takers, artists...and the ones
who most clearly saw why the computer was a truly revolutionary
tool."[4] These types of hackers are freedom fighters, living by the
dictum that data wants to be free.[5] Information should not be owned,
and even if it is, non-invasive browsing of such information hurts no
one. After all, hackers merely exploit preexisting holes made by
clumsily constructed code.[6] And wouldn't the revelation of such holes
actually improve data security for everyone involved?

Yet after a combination of public technophobia and aggressive government
legislation, the identity of the hacker changed in the US in the mid to
late eighties from do-it-yourself hobbyist to digital outlaw.[7] Such
legislation includes the Computer Fraud and Abuse Act of 1986 which made
it a felony to break into federal computers. "On March 5, 1986,"
reported Knight Lightning of Phrack magazine, "the following seven
phreaks were arrested in what has come to be known as the first computer
crime `sting' operation. Captain Hacker Doctor Bob Lasertech The
Adventurer [] The Highwayman The Punisher The Warden."[8] "[O]n
Tuesday, July 21, 1987," Knight Lightning continued, "[a]mong 30-40
others, Bill From RNOC, Eric NYC, Solid State, Oryan QUEST, Mark
Gerardo, The Rebel, and Delta-Master have been busted by the United
States Secret Service."[9] Many of these hackers were targeted due to
their "elite" reputations, a status granted only to top hackers. Hackers
were deeply discouraged by their newfound identity as outlaws, as
exemplified in the famous 1986 hacker manifesto written by someone
calling himself[10] The Mentor: "We explore... and you call us
criminals. We seek after knowledge... and you call us criminals."[11]
Because of this semantic transformation, hackers today are commonly
referred to as terrorists, nary-do-wells who break into computers for
personal gain. So by the turn of the millennium, the term hacker had
lost all of its original meaning. Now when people say hacker, they mean
terrorist.

Thus, the current debate on hackers is helplessly throttled by the
discourse on contemporary liberalism: should we respect data as private
property, or should we cultivate individual freedom and leave computer
users well enough alone? Hacking is more sophisticated than that. It
suggests a future type of cultural production, one that RSG seeks to
embody in Carnivore.

Collaboration

Bruce Sterling writes that the late Twentieth Century is a moment of
transformation from a modern control paradigm based on centralization
and hierarchy to a postmodern one based on flexibility and
horizontalization:

"For years now, economists and management theorists have
speculated that the tidal wave of the information revolution
would destroy rigid, pyramidal bureaucracies, where everything
is top-down and centrally controlled. Highly trained "employees"
would take on greater autonomy, being self-starting and self-
motivating, moving from place to place, task to task, with great
speed and fluidity. "Ad-hocracy" would rule, with groups of
people spontaneously knitting together across organizational
lines, tackling the problem at hand, applying intense computer-
aided expertise to it, and then vanishing whence they came."[12]

From Manuel Castells to Hakim Bey to Tom Peters this rhetoric has become
commonplace. Sterling continues by claiming that both hacker groups and
the law enforcement officials that track hackers follow this new
paradigm: "they all look and act like `tiger teams' or `users' groups.'
They are all electronic ad-hocracies leaping up spontaneously to attempt
to meet a need."[13] By "tiger teams" Sterling refers to the employee
groups assembled by computer companies trying to test the security of
their computer systems. Tiger teams, in essence, simulate potential
hacker attacks, hoping to find and repair security holes. RSG is a type
of tiger team.

The term also alludes to the management style known as Toyotism
originating in Japanese automotive production facilities. Within
Toyotism, small pods of workers mass together to solve a specific
problem. The pods are not linear and fixed like the more traditional
assembly line, but rather are flexible and reconfigurable depending on
whatever problem might be posed to them.

Management expert Tom Peters notes that the most successful contemporary
corporations use these types of tiger teams, eliminating traditional
hierarchy within the organizational structure. Documenting the
management consulting agency McKinsey & Company, Peters writes:
"McKinsey is a huge company. Customers respect it. [...] But there is no
traditional hierarchy. There are no organizational charts. No job
descriptions. No policy manuals. No rules about managing client
engagements. [...] And yet all these things are well understood-make no
mistake, McKinsey is not out of control! [...] McKinsey works. It's
worked for over half a century."[14]

As Sterling suggests, the hacker community also follows this
organizational style. Hackers are autonomous agents that can mass
together in small groups to attack specific problems. As the influential
hacker magazine Phrack was keen to point out, "ANYONE can write for
Phrack Inc. [...] we do not discriminate against anyone for any
reason."[15] Flexible and versatile, the hacker pod will often dissolve
itself as quickly as it formed and disappear into the network. Thus,
what Sterling and others are arguing is that whereby older resistive
forces were engaged with "rigid, pyramidal bureaucracies," hackers
embody a different organizational management style (one that might be
called "protocological"). In this sense, while resistance during the
modern age forms around rigid hierarchies and bureaucratic power
structures, resistance during the postmodern age forms around the
protocological control forces existent in networks.

Coding

In 1967 the artist Sol LeWitt outlined his definition of conceptual art:

"In conceptual art the idea or concept is the most important
aspect of the work. When an artist uses a conceptual form of
art, it means that all of the planning and decisions are made
beforehand and the execution is a perfunctory affair. The idea
becomes a machine that makes the art."[16]

LeWitt's perspective on conceptual art has important implications for
code, for in his estimation conceptual art is nothing but a type of code
for artmaking. LeWitt's art is an algorithmic process. The algorithm is
prepared in advance, and then later executed by the artist (or another
artist, for that matter). Code thus purports to be multidimensional.
Code draws a line between what is material and what is active, in
essence saying that writing (hardware) cannot do anything, but must be
transformed into code (software) to be affective. Northrop Frye says a
very similar thing about language when he writes that the process of
literary critique essentially creates a meta text, outside of the
original source material, that contains the critic's interpretations of
that text.[17] In fact Kittler defines software itself as precisely that
"logical abstraction" that exists in the negative space between people
and the hardware they use.[18]

How can code be so different than mere writing? The answer to this lies
in the unique nature of computer code. It lies not in the fact that code
is sub-linguistic, but rather that it is hyper-linguistic. Code is a
language, but a very special kind of language. Code is the only language
that is executable. As Kittler has pointed out, "[t]here exists no word
in any ordinary language which does what it says. No description of a
machine sets the machine into motion."[19] So code is the first language
that actually does what it says-it is a machine for converting meaning
into action.[20] Code has a semantic meaning, but it also has an
enactment of meaning. Thus, while natural languages such as English or
Latin only have a legible state, code has both a legible state and an
executable state. In this way, code is the summation of language plus an
executable meta-layer that encapsulates that language.

Dreaming

Fredric Jameson said somewhere that one of the most difficult things to
do under contemporary capitalism is to envision utopia. This is
precisely why dreaming is important. Deciding (and often struggling) for
what is possible is the first step for a utopian vision based in our
desires, based in what we want.

Pierre Levy is one writer who has been able to articulate eloquently the
possibility of utopia in the cyberspace of digital computers.[21]
"Cyberspace," he writes, "brings with it methods of perception, feeling,
remembering, working, of playing and being together. [...] The
development of cyberspace [...] is one of the principle aesthetic and
political challenges of the coming century."[22] Levy's visionary tone
is exactly what Jameson warns is lacking in much contemporary discourse.
The relationship between utopia and possibility is a close one. It is
necessary to know what one wants, to know what is possible to want,
before a true utopia may be envisioned.

Once of the most important signs of this utopian instinct is the hacking
community's anti-commercial bent. Software products have long been
developed and released into the public domain, with seemingly no profit
motive on the side of the authors, simply for the higher glory of the
code itself. "Spacewar was not sold," Steven Levy writes, referring to
the early video game developed by several early computer enthusiasts at
MIT. "Like any other program, it was placed in the drawer for anyone to
access, look at, and rewrite as they saw fit."[23] The limits of
personal behavior become the limits of possibility to the hacker. Thus,
it is obvious to the hacker that one's personal investment in a specific
piece of code can do nothing but hinder that code's overall development.
"Sharing of software [...] is as old as computers," writes free software
guru Richard Stallman, "just as sharing of recipes is as old as
cooking."[24] Code does not reach its apotheosis for people, but exists
within its own dimension of perfection. The hacker feels obligated to
remove all impediments, all inefficiencies that might stunt this quasi-
aesthetic growth. "In its basic assembly structure," writes Andrew Ross,
"information technology involves processing, copying, replication, and
simulation, and therefore does not recognize the concept of private
information property."[25] Commercial ownership of software is the
primary impediment hated by all hackers because it means that code is
limited-limited by intellectual property laws, limited by the profit
motive, limited by corporate "lamers."

However, greater than this anti-commercialism is a pro-protocolism.
Protocol, by definition, is "open source," the term given to a
technology that makes public the source code used in its creation. That
is to say, protocol is nothing but an elaborate instruction list of how
a given technology should work, from the inside out, from the top to the
bottom, as exemplified in the RFCs, or "Request For Comments" documents.
While many closed source technologies may appear to be protocological
due to their often monopolistic position in the market place, a true
protocol cannot be closed or proprietary. It must be paraded into full
view before all, and agreed to by all. It benefits over time through its
own technological development in the public sphere. It must exist as
pure, transparent code (or a pure description of how to fashion code).
If technology is proprietary it ceases to be protocological.

This brings us back to Carnivore, and the desire to release a public
domain version of a notorious surveillance tool thus far only available
to government operatives. The RSG Carnivore levels the playing field,
recasting art and culture as a scene of multilateral conflict rather
than unilateral domination. It opens the system up for collaboration
within and between client artists. It uses code to engulf and modify the
original FBI apparatus.

Carnivore Personal Edition

On October 1, 2001, three weeks after the 9/11 attacks in the US, the
Radical Software Group (RSG) announced the release of Carnivore, a
public domain riff on the notorious FBI software called DCS1000 (which
is commonly referred to by its nickname "Carnivore"). While the FBI
software had already been in existence for some time, and likewise RSG
had been developing it's version of the software since January 2001,
9/11 brought on a crush of new surveillance activity. Rumors surfaced
that the FBI was installing Carnivore willy-nilly on broad civilian
networks like Hotmail and AOL with the expressed purpose of intercepting
terror-related communication. As Wired News reported on September 12,
2001, "An administrator at one major network service provider said that
FBI agents showed up at his workplace on [September 11] `with a couple
of Carnivores, requesting permission to place them in our core.'"
Officials at Hotmail were reported to have been "cooperating" with FBI
monitoring requests. Inspired by this activity, the RSG's Carnivore
sought to pick up where the FBI left off, to bring this technology into
the hands of the general public for greater surveillance saturation
within culture. The first RSG Carnivore ran on Linux. An open source
schematic was posted on the net for others to build their own boxes. New
functionality was added to improve on the FBI-developed technology
(which in reality was a dumbed-down version of tools systems
administrators had been using for years). An initial core (Alex
Galloway, Mark Napier, Mark Daggett, Joshua Davis, and others) began to
build interpretive interfaces. A testing venue was selected: the private
offices of Rhizome.org at 115 Mercer Street in New York City, only 30
blocks from Ground Zero. This space was out-of-bounds to the FBI, but
open to RSG.

The initial testing proved successful and led to more field-testing at
the Princeton Art Museum (where Carnivore was quarantined like a virus
into its own subnet) and the New Museum in New York. During the weekend
of February 1st 2002, Carnivore was used at Eyebeam to supervise the
hacktivists protesting the gathering of the World Economic Forum.

Sensing the market limitations of a Linux-only software product, RSG
released Carnivore Personal Edition (PE) for Windows on April 6, 2002.
CarnivorePE brought a new distributed architecture to the Carnivore
initiative by giving any PC user the ability to analyze and diagnose the
traffic from his or her own network. Any artist or scientist could now
use CarnivorePE as a surveillance engine to power his or her own
interpretive "Client." Soon Carnivore Clients were converting network
traffic to sound, animation, and even 3D worlds, distributing the
technology across the network.

The prospect of reverse-engineering the original FBI software was
uninteresting to RSG. Crippled by legal and ethical limitations, the FBI
software needed improvement not emulation. Thus CarnivorePE features
exciting new functionality including artist-made diagnosic clients,
remote access, full subject targetting, full data targetting, volume
buffering, transport protocol filtering, and an open source software
license. Reverse-engineering is not necessarily a simple mimetic
process, but a mental upgrade as well. RSG has no desire to copy the FBI
software and its many shortcomings. Instead, RSG longs to inject
progressive politics back into a fundamentally destabilizing and
transformative technology, packet sniffing. Our goal is to invent a new
use for data surveillance that breaks out of the hero/terrorist dilemma
and instead dreams about a future use for networked data.

http://rhizome.org/carnivore
http://rhizome.org/RSG

-----------------------------------------------------------

[1] The system at the University of Hawaii was called ALOHAnet and was
created by Norman Abramson. Later the technology was further developed
by Robert Metcalfe at Xerox PARC and dubbed "Ethernet."

[2] Robert Graham traces the etymology of the term to the sport of golf:
"The word `hacker' started out in the 14th century to mean somebody who
was inexperienced or unskilled at a particular activity (such as a golf
hacker). In the 1970s, the word `hacker' was used by computer
enthusiasts to refer to themselves. This reflected the way enthusiasts
approach computers: they eschew formal education and play around with
the computer until they can get it to work. (In much the same way, a
golf hacker keeps hacking at the golf ball until they get it in the
hole)" (http://www.robertgraham.com/pubs/hacking-dict.html).

[3] Bruce Sterling The Hacker Crackdown (New York: Bantam, 1992), p. 51.
See also Hugo Cornwall's Hacker's Handbook (London: Century, 1988),
which characterizes the hacker as a benign explorer. Cornwall's position
highlights the differing attitudes between the US and Europe, where
hacking is much less criminalized and in many cases prima facie legal.

[4] Steven Levy, Hackers: Heroes of the Computer Revolution (New York:
Anchor Press/Doubleday, 1984), p. ix.

[5] This slogan is attributed to Stewart Brand, who wrote that "[o]n the
one hand information wants to be expensive, because it's so valuable.
The right information in the right place just changes your life. On the
other hand, information wants to be free, because the cost of getting it
out is getting lower and lower all the time. So you have these two
fighting against each other." See Whole Earth Review, May 1985, p. 49.

[6] Many hackers believe that commercial software products are less
carefully crafted and therefore more prone to exploits. Perhaps the most
infamous example of such an exploit, one which critiques software's
growing commercialization, is the "BackOrifice" software application
created by the hacker group Cult of the Dead Cow. A satire of
Microsoft's "Back Office" software suite, BackOrifice acts as a Trojan
Horse to allow remote access to personal computers running Microsoft's
Windows operating system.

[7] For an excellent historical analysis of this transformation see
Sterling's The Hacker Crackdown. Andrew Ross explains this
transformation by citing, as do Sterling and others, the increase of
computer viruses in the late eighties, especially "the viral attack
engineered in November 1988 by Cornell University hacker Robert Morris
on the national network system Internet. [.] While it caused little in
the way of data damage [.], the ramifications of the Internet virus have
helped to generate a moral panic that has all but transformed everyday
`computer culture.'" See Andrew Ross, Strange Weather: Culture, Science,
and Technology in the Age of Limits (New York: Verso, 1991), p. 75.

[8] Knight Lightning, "Shadows Of A Future Past," Phrack, vol. 2, no.
21, file 3.

[9] Knight Lightning, "The Judas Contract," Phrack, vol. 2, no. 22, file
3.

[10] While many hackers use gender neutral pseudonyms, the online
magazine Phrack, with which The Mentor was associated, was characterized
by its distinctly male staff and readership. For a sociological
explanation of the gender imbalance within the hacking community, see
Paul Taylor, Hackers: Crime in the digital sublime (New York: Routledge,
1999), pp. 32-42.

[11] The Mentor, "The Conscience of a Hacker," Phrack, vol. 1, no. 7,
file 3. http://www.iit.edu/~beberg/manifesto.html

[12] Sterling, The Hacker Crackdown, p. 184.

[13] Ibid.

[14] Tom Peters, Liberation Management: Necessary Disorganization for
the Nanosecond Nineties (New York: Knopf, 1992), pp. 143-144. An older,
more decentralized (rather than distributed) style of organizational
management is epitomized by Peter Drucker's classic analysis of General
Motors in the thirties and forties. He writes that "General Motors
considers decentralization a basic and universally valid concept of
order." See Peter Drucker, The Concept of the Corporation (New
Brunswick: Transaction, 1993), p. 47.

[15] "Introduction," Phrack, v. 1, no. 9, phile [sic] 1.

[16] Sol LeWitt, "Paragraphs on Conceptual Art," in Alberro, et al.,
eds., Conceptual Art: A Critical Anthology (Cambridge: MIT Press, 1999),
p. 12. Thanks to Mark Tribe for bring this passage to my attention.

[17] See Northrop Frye, Anatomy of Criticism (Princeton: Princeton UP,
1957). See also Fredric Jameson's engagement with this same subject in
"From Metaphor to Allegory" in Cynthia Davidson, Ed., Anything
(Cambridge: MIT Press, 2001).

[18] Friedrich Kittler, "On the Implementation of Knowledge-Toward a
Theory of Hardware," nettime
(http://www.nettime.org/nettime.w3archive/199902/msg00038.html).

[19] Kittler, "On the Implementation of Knowledge."

[20] For an interesting commentary on the aesthetic dimensions of this
fact see Geoff Cox, Alex McLean and Adrian Ward's "The Aesthetics of
Generative Code" (http://sidestream.org/papers/aesthetics/).

[21] Another is the delightfully schizophrenic Ted Nelson, inventor of
hypertext. See Computer Lib/Dream Machines (Redmond, WA:
Tempus/Microsoft, 1987).

[22] Pierre Levy, L'intelligence collective: Pour une anthropologie du
cyberspace (Paris: Editions la Decouverte, 1994), p. 120, translation
mine.

[23] Levy, Hackers, p. 53. In his 1972 Rolling Stone article on the
game, Steward Brand went so far as to publish Alan Kay's source code for
Spacewar right along side his own article, a practice rarely seen in
popular publications. See Brand, "SPACEWAR," p. 58.

[24] Richard Stallman, "The GNU Project," available online at
http://www.gnu.org/gnu/thegnuproject.html and in Chris Dibona (Editor),
et al, Open Sources: Voices from the Open Source Revolution (Sebastopol,
CA: O'Reilly, 1999).

[25] Ross, Strange Weather, p. 80.

DISCUSSION

Burpee Shopper's Preview: Gear up for summer!


test

--21318239.1002883361319.JavaMail.eb.spanky
Content-Type: text/html
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>

<head>

<title>Shockwave - 4 Pod</title>

</head>

<body background="white" topmargin="0" leftmargin="0" marginheight="0" marginwidth="0" bgcolor="#FFFFFF">
<table width="595" border="0" cellspacing="0" cellpadding="0">
<tr>
<td bgcolor="#003366" valign="bottom" width="2"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="2" height="25"></td>
<td width="313" align="left" bgcolor="#003366" valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d00"><img src="http://mms.shockwave.com/190/images/shockwave\_logo\_white.gif" width="243" height="22" vspace="3" hspace="3" border="0"></a></td>
<td width="140" align="right" valign="bottom" bgcolor="003366">&nbsp;</td>
<td bgcolor="#003366" valign="bottom" width="2"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="2" height="25"></td>
</tr>
<tr>
<td bgcolor="#003366" colspan=4><img src="http://mms.shockwave.com/190/images/spacer.gif" width="121" height="2"></td>
</tr>
</table>

<table width="595" border="0" cellspacing="0" cellpadding="0" bgcolor="white" valign="top">
<tr>
<td align="center" bgcolor="006699">
<A HREF="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d92" target="\_top"><IMG SRC="http://by.advertising.com/sitee679/ejob0536/bnum'644536/bins=1/mnum(460/rich=0" border="0" alt="Click to learn more..."></A>
</td>
</tr>
</table>

<table width="595" border="0" cellspacing="0" cellpadding="0" bgcolor="white" valign="top">
<tr>
<td width="123" height="23" align="center" valign="middle" bgcolor="#999900">&nbsp;</td>
<td width="7" bgcolor="#999900"><img src="http://mms.shockwave.com/190/images/spacer.gif" width=7 height=1 border=0 alt=""></td>
<td width="261" align="LEFT" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="#FFCC33"><b><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d83"><font size="2" face="arial" color="white"><b>DARK
ORBIT </b></font></a></b></font></td>
<td width="197" align="right" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="white">Oct
11, 2001</font></td>
<td width="7" align="right" valign="middle" bgcolor="#999900"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="3" height="5"></td>
</tr>
<tr>
<td bgcolor="#FFFFFF" colspan=5><img src="http://mms.shockwave.com/190/images/spacer.gif" width="121" height="2"></td>
</tr>
<tr>
<td width="123" height="58" align="center" valign="middle" bgcolor="#006699"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d83"><img src="http://mms.shockwave.com/190/images/preview\_darkorbit.jpg" border="0" width="121" height="62" hspace="1"></a></td>
<td width="7" bgcolor="#006699"><img src="http://mms.shockwave.com/190/images/spacer.gif" width=7 height=1 border=0 alt=""></td>
<td valign="middle" bgcolor="#006699" colspan="3"><font face="Arial" size="2" color="white">
Our new space shooter delivers the best 3D action you'll find on the Web
-- or just about anywhere else. Take the online version for a test drive,
and then download the entire game to your hard drive. You'll be blown away!</font></td>
</tr>
<tr>
<td bgcolor="#FFFFFF" width="123"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="121" height="2"></td>
<td bgcolor="#FFFFFF" width="7"></td>
<td bgcolor="#FFFFFF" colspan="3"></td>
</tr>
<tr>
<td width="123" align="center" valign="top" bgcolor="#003366">
<!-- left column menu -->
<table width="121" border="0" cellspacing="0" cellpadding="0" valign="top" bordercolor="black">
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="white"><b>ATOMFILMS
HITS </b></font></td>
</tr>
<tr>
<td height="2" width="114" align="center" valign="middle" bgcolor="#FFFFFF"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d80"><font size="2" face="arial" color="white">Sweet
Release</font></a></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d84"><font size="2" face="arial" color="white">Break
Stuff</font></a></font></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC">
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d85"><font size="2" face="arial" color="white">Greedy
#4</font></a></font></td>
</tr>
<tr>
<td height="2" width="114" align="center" valign="middle" bgcolor="#FFFFFF"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="white"><b>SHOCKWAVE.COM<br>
GAMES</b></font></td>
</tr>
<tr>
<td height="2" width="114" align="center" valign="middle" bgcolor="#FFFFFF"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d89"><font size="2" face="arial" color="white">Blix</font></a></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d77"><font size="2" face="arial" color="white">InkLink</font></a></font></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC">
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d78"><font size="2" face="arial" color="white">Tamale
Loco: Rumble</font></a></font></td>
</tr>

<tr>
<td height="1" width="114" bgcolor="#CCCCCC">
</tr>
<tr>
<td height="13" width="114" align="center" valign="middle" bgcolor="#999900">
</tr>
</table>
<br>
<a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d90"><img src="http://mms.shockwave.com/190/images/120x60tm1.gif" width="120" height="60" border="0"></a>
</td>
<td width="7" bgcolor="white">
<td valign="top" bgcolor="white" colspan="3">
<!-- main body -->
<table width="100\%" border="0" cellspacing="0" cellpadding="0">
<tr>
<td colspan=3><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td width="70" valign="top" align="center"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d61"><img src="http://mms.shockwave.com/190/images/picon\_sw\_waterballoon5\_sml.gif" border="0" width="73" height="50"></a></td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d61"><font size="2" face="arial" color="black"><b>WATERBALLOON
DROP 5</b></font></a><br>
<font face="Arial" size="2" color="black">Slick new graphics and a
precarious setting atop the Golden Gate Bridge have made this updated
classic one of the most popular games at Shockwave.com.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
<tr>
<td colspan="3" height="5" bgcolor="white"></td>
</tr>
<tr>
<td width="70" valign="top" align="center"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d60"><img src="http://mms.shockwave.com/190/images/picon\_sw\_gears\_sml.gif" border="0" width="73" height="50"></a></td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d60"><font size="2" face="arial" color="black"><b>GEARS<br>
</b></font></a><font face="Arial" size="2" color="black">You're the
ghost in the machine in our new puzzle game -- but only if you can
get all the wheels turning in the right direction.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
<tr>
<td colspan="3" height="5" bgcolor="white"></td>
</tr>
<tr>
<td width="70" valign="top" align="center">
<h3><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d91"><img src="http://mms.shockwave.com/190/images/picon\_af\_greedy01\_sml.gif" border="0" width="73" height="50"></a></h3>
</td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d91"><font size="2" face="arial" color="black"><b>THE
GREEDY SHOW</b></font></a><br>
<font size="2" face="arial" color="black">Toilet humor reigns as Jim
Belushi and friends unleash their new animated comedy series on our
partner site, AtomFilms.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
<tr>
<td colspan="3" height="5" bgcolor="white"></td>
</tr>
<tr>
<td width="70" valign="top" align="center"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d76"><img src="http://mms.shockwave.com/190/images/picon\_sw\_photojam\_sml.gif" border="0" width="73" height="50"></a></td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d76"><font size="2" face="arial" color="black"><b>PHOTOJAM</b></font></a><br>
<font size="2" face="arial" color="black">Download PhotoJam, put YOUR
digital photos to music, and share 'em with friends and family around
the Web! It's the killer app for great Halloween and holiday moments.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
</table>
<p><font

color=black face=arial size=1>Unsubscribe Instructions:<br>
To unsubscribe from the Shockwave.com newsletter, click <a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d=-1&e=test@nothing.org">here</a>.</font></p>

<p>&nbsp;</p>
</td>
</tr>
</table>
<img src="http://www.shockwave.com/images/campaign.gif?k263040&c0&w=1 "width="1" height="1">

</body>

</html>

--21318239.1002883361319.JavaMail.eb.spanky--

From uwa9800g@yahoo.co.uk Sat Nov 10 16:22:05 2001
Return-Path: <uwa9800g@yahoo.co.uk>
Received: from mail.rhizome.org (host213-120-126-30.in-addr.btopenworld.com [213.120.126.30])
by rhizome1.client.dti.net (8.10.2/8.10.2) with SMTP id fAALM5009856
for <test@nothing.org>; Sat, 10 Nov 2001 16:22:05 -0500
Message-Id: <200111102122.fAALM5009856@rhizome1.client.dti.net>
From: "uwa9800g@yahoo.co.uk" <uwa9800g@yahoo.co.uk>
Date: Sat, 10 Nov 2001 09:19:20
To: test@nothing.org
Subject: BUSINESS PROPOSAL
MIME-Version: 1.0
Content-Type: text/plain;charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

From:Dr.Malenge Uwa
Tel:44-775-281-5820(Satellite phone).
Lagos-Nigeria.
email:uwa9800a@mailcity.com(confidential)

Attn:President/Ceo.

STRICTLY CONFIDENTIAL BUSINESS PROPOSAL
RE: TRANSFER OF US$21.5 MILLION (TWENTY ONE MILLION,
FIVE HUNDRED THOUSAND US DOLLARS ONLY).

I know this email will reach you as a surprise, but
need not to worry
as
we are using the only secured and confidential medium
available to seek
for foreign assistance/partnership in a business
transaction which is
of
mutual benefit.

I am a member of the Federal Government of Nigeria
Contract Award and
Monitoring Committee in the Nigeria National Petroleum

Corporatio(NNPC).
Sometime ago, a contract was awarded to a foreign firm
in NNPC by my
Committee. This contract was over invoiced to the tune
of US$21.5M.
U.S.
Dollars. This was done deliberately. The
over-invoicing was a deal by
my
committee to benefit from the project. We now want to
transfer this
money which is in a suspense Account with NNPC into
any Overseas
Account
which we expect you to provide for us.

SHARE: -
For assisting us in this deal, you will be entitled to
30\% of the
money,60\% will be for me and my partners while 10\% has
been mapped out
from the total sum to cover any expenses that maybe
incurred by us
during the course of this transfer, both locally and
international
expenses. It may interest you to know that a similar
transaction was
carried out with one MR. PATRICE MILLER, President of
Crane
International Trading Corp. of 153 East 57th St., 28th
floor, NY10022,
TEL:(212)-308-7788 AND TELEX: 6731689. The deal was
concluded and all
covering documents were forwarded to MR. MILLER to
authenticate the
claim. Once the funds were transferred, MR. MILLER
presented his Bank
with all the legal documents and remitted the whole
funds to another
Bank Account and disappeared completely. My colleagues
were shattered,
as such opportunities do not come all the time.
I would require your company's name,address,telephone
cell phone and
fax
numbers and also,
your banking details where the funds will be remitted
to.

The above information would be used to make formal
applications as a
matter of procedure for the release of the money.
It does not matter whether or not your company does
contract projects
of
this nature described here. The assumption is that
your company won the
major contract and subcontracted it out to other
companies. More often
than not, big trading companies or firms of unrelated
fields win major
contracts and subcontracts to more specialized firms
for execution of
such contracts.

We have strong reliable connections and contacts at
the Central Bank of
Nigeria, as well as the Federal Ministry of Finance
and we have no
doubt
that all the money will be released and transferred if
we get the
necessary foreign partner to assist us in this deal.
Therefore,when the
business is successfully concluded we shall through
our same
connections
withdraw all documents used from all the concerned
Government
Ministries
for 100\% security.

We are ordinary civil servants and we will not want to
miss this once
in
a lifetime opportunity to get rich. We want this money
to be
transferred
to your nominated bank for us, before the present
Democratic Government
start Auditing all Federal Government owned
Parastatals.

Please contact me immediately through my confidential email address
whether or not you
are interested in this deal.If you are not,it will
enable me scout for
another foreign partner to carry out this deal. But
where you are
interested, send the required documents aforementioned
herein through
my
above confidential email address, as time is of the essence in this
business.
I wait in anticipation of your fullest co-operation.

Yours faithfully,
Dr.Malenge Uwa.

NB:Please when dialing my number, don't include 234,
just dail your
country access number+44-775-281-5820.

From shockwave@mms.shockwave.com Tue Nov 13 18:20:32 2001
Return-Path: <shockwave@mms.shockwave.com>
Received: from out.mms.shockwave.com (out.mms.shockwave.com [63.251.52.67])
by rhizome1.client.dti.net (8.10.2/8.10.2) with ESMTP id fADNKV010676
for <test@nothing.org>; Tue, 13 Nov 2001 18:20:31 -0500
Received: from spanky (unknown [192.168.164.112])
by out.mms.shockwave.com (Postfix) with ESMTP id C8CBA28F2
for <test@nothing.org>; Tue, 13 Nov 2001 15:14:41 -0800 (PST)
Message-ID: <28584271.1005693281822.JavaMail.eb@spanky>
Date: Tue, 13 Nov 2001 15:14:41 -0800 (PST)
From: "Shockwave.com" <shockwave@mms.shockwave.com>
To: test@nothing.org
Subject: Blend grooves, download jigsaws, and more!
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary 445407.1005693281816.JavaMail.eb.spanky

--20445407.1005693281816.JavaMail.eb.spanky
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

SHOCKWAVE.COM NEWSLETTER
November 9, 2001

GROOVE BLENDER: GIMME A BEAT!
The all-new Groove Blender is a rave party in a box! Take phat beats, synth=
stabs, and bass lines, and blend them into a unique musical experience tha=
t you can share with all your friends -- and all for free! Presented by the=
Intel

DISCUSSION

Burpee Shopper's Preview: Gear up for summer!


test

--21318239.1002883361319.JavaMail.eb.spanky
Content-Type: text/html
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>

<head>

<title>Shockwave - 4 Pod</title>

</head>

<body background="white" topmargin="0" leftmargin="0" marginheight="0" marginwidth="0" bgcolor="#FFFFFF">
<table width="595" border="0" cellspacing="0" cellpadding="0">
<tr>
<td bgcolor="#003366" valign="bottom" width="2"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="2" height="25"></td>
<td width="313" align="left" bgcolor="#003366" valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d00"><img src="http://mms.shockwave.com/190/images/shockwave\_logo\_white.gif" width="243" height="22" vspace="3" hspace="3" border="0"></a></td>
<td width="140" align="right" valign="bottom" bgcolor="003366">&nbsp;</td>
<td bgcolor="#003366" valign="bottom" width="2"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="2" height="25"></td>
</tr>
<tr>
<td bgcolor="#003366" colspan=4><img src="http://mms.shockwave.com/190/images/spacer.gif" width="121" height="2"></td>
</tr>
</table>

<table width="595" border="0" cellspacing="0" cellpadding="0" bgcolor="white" valign="top">
<tr>
<td align="center" bgcolor="006699">
<A HREF="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d92" target="\_top"><IMG SRC="http://by.advertising.com/sitee679/ejob0536/bnum'644536/bins=1/mnum(460/rich=0" border="0" alt="Click to learn more..."></A>
</td>
</tr>
</table>

<table width="595" border="0" cellspacing="0" cellpadding="0" bgcolor="white" valign="top">
<tr>
<td width="123" height="23" align="center" valign="middle" bgcolor="#999900">&nbsp;</td>
<td width="7" bgcolor="#999900"><img src="http://mms.shockwave.com/190/images/spacer.gif" width=7 height=1 border=0 alt=""></td>
<td width="261" align="LEFT" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="#FFCC33"><b><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d83"><font size="2" face="arial" color="white"><b>DARK
ORBIT </b></font></a></b></font></td>
<td width="197" align="right" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="white">Oct
11, 2001</font></td>
<td width="7" align="right" valign="middle" bgcolor="#999900"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="3" height="5"></td>
</tr>
<tr>
<td bgcolor="#FFFFFF" colspan=5><img src="http://mms.shockwave.com/190/images/spacer.gif" width="121" height="2"></td>
</tr>
<tr>
<td width="123" height="58" align="center" valign="middle" bgcolor="#006699"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d83"><img src="http://mms.shockwave.com/190/images/preview\_darkorbit.jpg" border="0" width="121" height="62" hspace="1"></a></td>
<td width="7" bgcolor="#006699"><img src="http://mms.shockwave.com/190/images/spacer.gif" width=7 height=1 border=0 alt=""></td>
<td valign="middle" bgcolor="#006699" colspan="3"><font face="Arial" size="2" color="white">
Our new space shooter delivers the best 3D action you'll find on the Web
-- or just about anywhere else. Take the online version for a test drive,
and then download the entire game to your hard drive. You'll be blown away!</font></td>
</tr>
<tr>
<td bgcolor="#FFFFFF" width="123"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="121" height="2"></td>
<td bgcolor="#FFFFFF" width="7"></td>
<td bgcolor="#FFFFFF" colspan="3"></td>
</tr>
<tr>
<td width="123" align="center" valign="top" bgcolor="#003366">
<!-- left column menu -->
<table width="121" border="0" cellspacing="0" cellpadding="0" valign="top" bordercolor="black">
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="white"><b>ATOMFILMS
HITS </b></font></td>
</tr>
<tr>
<td height="2" width="114" align="center" valign="middle" bgcolor="#FFFFFF"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d80"><font size="2" face="arial" color="white">Sweet
Release</font></a></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d84"><font size="2" face="arial" color="white">Break
Stuff</font></a></font></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC">
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d85"><font size="2" face="arial" color="white">Greedy
#4</font></a></font></td>
</tr>
<tr>
<td height="2" width="114" align="center" valign="middle" bgcolor="#FFFFFF"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#999900"><font size="2" face="arial" color="white"><b>SHOCKWAVE.COM<br>
GAMES</b></font></td>
</tr>
<tr>
<td height="2" width="114" align="center" valign="middle" bgcolor="#FFFFFF"><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d89"><font size="2" face="arial" color="white">Blix</font></a></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC"></td>
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d77"><font size="2" face="arial" color="white">InkLink</font></a></font></td>
</tr>
<tr>
<td height="1" width="114" bgcolor="#CCCCCC">
</tr>
<tr>
<td height="21" width="114" align="center" valign="middle" bgcolor="#003366"><font size="2" face="arial" color="white"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d78"><font size="2" face="arial" color="white">Tamale
Loco: Rumble</font></a></font></td>
</tr>

<tr>
<td height="1" width="114" bgcolor="#CCCCCC">
</tr>
<tr>
<td height="13" width="114" align="center" valign="middle" bgcolor="#999900">
</tr>
</table>
<br>
<a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d90"><img src="http://mms.shockwave.com/190/images/120x60tm1.gif" width="120" height="60" border="0"></a>
</td>
<td width="7" bgcolor="white">
<td valign="top" bgcolor="white" colspan="3">
<!-- main body -->
<table width="100\%" border="0" cellspacing="0" cellpadding="0">
<tr>
<td colspan=3><img src="http://mms.shockwave.com/190/images/spacer.gif" width="1" height="2"></td>
</tr>
<tr>
<td width="70" valign="top" align="center"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d61"><img src="http://mms.shockwave.com/190/images/picon\_sw\_waterballoon5\_sml.gif" border="0" width="73" height="50"></a></td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d61"><font size="2" face="arial" color="black"><b>WATERBALLOON
DROP 5</b></font></a><br>
<font face="Arial" size="2" color="black">Slick new graphics and a
precarious setting atop the Golden Gate Bridge have made this updated
classic one of the most popular games at Shockwave.com.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
<tr>
<td colspan="3" height="5" bgcolor="white"></td>
</tr>
<tr>
<td width="70" valign="top" align="center"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d60"><img src="http://mms.shockwave.com/190/images/picon\_sw\_gears\_sml.gif" border="0" width="73" height="50"></a></td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d60"><font size="2" face="arial" color="black"><b>GEARS<br>
</b></font></a><font face="Arial" size="2" color="black">You're the
ghost in the machine in our new puzzle game -- but only if you can
get all the wheels turning in the right direction.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
<tr>
<td colspan="3" height="5" bgcolor="white"></td>
</tr>
<tr>
<td width="70" valign="top" align="center">
<h3><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d91"><img src="http://mms.shockwave.com/190/images/picon\_af\_greedy01\_sml.gif" border="0" width="73" height="50"></a></h3>
</td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d91"><font size="2" face="arial" color="black"><b>THE
GREEDY SHOW</b></font></a><br>
<font size="2" face="arial" color="black">Toilet humor reigns as Jim
Belushi and friends unleash their new animated comedy series on our
partner site, AtomFilms.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
<tr>
<td colspan="3" height="5" bgcolor="white"></td>
</tr>
<tr>
<td width="70" valign="top" align="center"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d76"><img src="http://mms.shockwave.com/190/images/picon\_sw\_photojam\_sml.gif" border="0" width="73" height="50"></a></td>
<td>&nbsp;&nbsp;</td>
<td valign="middle"><a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d76"><font size="2" face="arial" color="black"><b>PHOTOJAM</b></font></a><br>
<font size="2" face="arial" color="black">Download PhotoJam, put YOUR
digital photos to music, and share 'em with friends and family around
the Web! It's the killer app for great Halloween and holiday moments.</font><br>
<br>
</td>
</tr>
<tr>
<td colspan="3" height="1" bgcolor="#99A7B5"><img src="http://mms.shockwave.com/190/images/spacer.gif" height="1"></td>
</tr>
</table>
<p><font

color=black face=arial size=1>Unsubscribe Instructions:<br>
To unsubscribe from the Shockwave.com newsletter, click <a href="http://www.shockwave.com/rd/cr.cgi?k263040&c0&w=1&d=-1&e=test@nothing.org">here</a>.</font></p>

<p>&nbsp;</p>
</td>
</tr>
</table>
<img src="http://www.shockwave.com/images/campaign.gif?k263040&c0&w=1 "width="1" height="1">

</body>

</html>

--21318239.1002883361319.JavaMail.eb.spanky--

From uwa9800g@yahoo.co.uk Sat Nov 10 16:22:05 2001
Return-Path: <uwa9800g@yahoo.co.uk>
Received: from mail.rhizome.org (host213-120-126-30.in-addr.btopenworld.com [213.120.126.30])
by rhizome1.client.dti.net (8.10.2/8.10.2) with SMTP id fAALM5009856
for <test@nothing.org>; Sat, 10 Nov 2001 16:22:05 -0500
Message-Id: <200111102122.fAALM5009856@rhizome1.client.dti.net>
From: "uwa9800g@yahoo.co.uk" <uwa9800g@yahoo.co.uk>
Date: Sat, 10 Nov 2001 09:19:20
To: test@nothing.org
Subject: BUSINESS PROPOSAL
MIME-Version: 1.0
Content-Type: text/plain;charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

From:Dr.Malenge Uwa
Tel:44-775-281-5820(Satellite phone).
Lagos-Nigeria.
email:uwa9800a@mailcity.com(confidential)

Attn:President/Ceo.

STRICTLY CONFIDENTIAL BUSINESS PROPOSAL
RE: TRANSFER OF US$21.5 MILLION (TWENTY ONE MILLION,
FIVE HUNDRED THOUSAND US DOLLARS ONLY).

I know this email will reach you as a surprise, but
need not to worry
as
we are using the only secured and confidential medium
available to seek
for foreign assistance/partnership in a business
transaction which is
of
mutual benefit.

I am a member of the Federal Government of Nigeria
Contract Award and
Monitoring Committee in the Nigeria National Petroleum

Corporatio(NNPC).
Sometime ago, a contract was awarded to a foreign firm
in NNPC by my
Committee. This contract was over invoiced to the tune
of US$21.5M.
U.S.
Dollars. This was done deliberately. The
over-invoicing was a deal by
my
committee to benefit from the project. We now want to
transfer this
money which is in a suspense Account with NNPC into
any Overseas
Account
which we expect you to provide for us.

SHARE: -
For assisting us in this deal, you will be entitled to
30\% of the
money,60\% will be for me and my partners while 10\% has
been mapped out
from the total sum to cover any expenses that maybe
incurred by us
during the course of this transfer, both locally and
international
expenses. It may interest you to know that a similar
transaction was
carried out with one MR. PATRICE MILLER, President of
Crane
International Trading Corp. of 153 East 57th St., 28th
floor, NY10022,
TEL:(212)-308-7788 AND TELEX: 6731689. The deal was
concluded and all
covering documents were forwarded to MR. MILLER to
authenticate the
claim. Once the funds were transferred, MR. MILLER
presented his Bank
with all the legal documents and remitted the whole
funds to another
Bank Account and disappeared completely. My colleagues
were shattered,
as such opportunities do not come all the time.
I would require your company's name,address,telephone
cell phone and
fax
numbers and also,
your banking details where the funds will be remitted
to.

The above information would be used to make formal
applications as a
matter of procedure for the release of the money.
It does not matter whether or not your company does
contract projects
of
this nature described here. The assumption is that
your company won the
major contract and subcontracted it out to other
companies. More often
than not, big trading companies or firms of unrelated
fields win major
contracts and subcontracts to more specialized firms
for execution of
such contracts.

We have strong reliable connections and contacts at
the Central Bank of
Nigeria, as well as the Federal Ministry of Finance
and we have no
doubt
that all the money will be released and transferred if
we get the
necessary foreign partner to assist us in this deal.
Therefore,when the
business is successfully concluded we shall through
our same
connections
withdraw all documents used from all the concerned
Government
Ministries
for 100\% security.

We are ordinary civil servants and we will not want to
miss this once
in
a lifetime opportunity to get rich. We want this money
to be
transferred
to your nominated bank for us, before the present
Democratic Government
start Auditing all Federal Government owned
Parastatals.

Please contact me immediately through my confidential email address
whether or not you
are interested in this deal.If you are not,it will
enable me scout for
another foreign partner to carry out this deal. But
where you are
interested, send the required documents aforementioned
herein through
my
above confidential email address, as time is of the essence in this
business.
I wait in anticipation of your fullest co-operation.

Yours faithfully,
Dr.Malenge Uwa.

NB:Please when dialing my number, don't include 234,
just dail your
country access number+44-775-281-5820.

From shockwave@mms.shockwave.com Tue Nov 13 18:20:32 2001
Return-Path: <shockwave@mms.shockwave.com>
Received: from out.mms.shockwave.com (out.mms.shockwave.com [63.251.52.67])
by rhizome1.client.dti.net (8.10.2/8.10.2) with ESMTP id fADNKV010676
for <test@nothing.org>; Tue, 13 Nov 2001 18:20:31 -0500
Received: from spanky (unknown [192.168.164.112])
by out.mms.shockwave.com (Postfix) with ESMTP id C8CBA28F2
for <test@nothing.org>; Tue, 13 Nov 2001 15:14:41 -0800 (PST)
Message-ID: <28584271.1005693281822.JavaMail.eb@spanky>
Date: Tue, 13 Nov 2001 15:14:41 -0800 (PST)
From: "Shockwave.com" <shockwave@mms.shockwave.com>
To: test@nothing.org
Subject: Blend grooves, download jigsaws, and more!
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary 445407.1005693281816.JavaMail.eb.spanky

--20445407.1005693281816.JavaMail.eb.spanky
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

SHOCKWAVE.COM NEWSLETTER
November 9, 2001

GROOVE BLENDER: GIMME A BEAT!
The all-new Groove Blender is a rave party in a box! Take phat beats, synth=
stabs, and bass lines, and blend them into a unique musical experience tha=
t you can share with all your friends -- and all for free! Presented by the=
Intel