OBAMA AND GEITHNER IN SORDID ‘TAKE IT OR LEAVE IT’ SCAM
Wednesday 1 July 2009 17:44
• DEADLINE OF CLOSE OF BUSINESS ON 1ST JULY APPARENTLY TREATED AS ‘BLUFF’
• INTERNATIONAL CURRENCY REVIEW, Volume 34, #s 3 & 4, will be ‘on machine’ shortly. It will be distributed to subscribers worldwide in July. It tells the incredible narrative of behind-the-scenes events associated with this criminal finance crisis (almost all of which have been missed by the so-called ‘mainstream’ press), since September 2008, when the practical consequences of the US Government’s financial criminality boomeranged worldwide. The journal provides a permanent record of these events, making it impossible for them to be expunged from the record.
• INTERNET SECURITY SOLUTION: see foot of this report and the World Reports catalogue.
By Christopher Story FRSA, Editor and Publisher, International Currency Review, World Reports Limited, London and New York. For earlier reports, press the ARCHIVE. Order your intelligence subscriptions and our ‘politically incorrect’ intelligence books online from this website.
NEW REPORT STARTS HERE:
EDITOR INFORMED OF DEADLINE OVER WEEKEND
Late on Saturday 27th June 2009, the Editor of International Currency Review was informed that a deadline for performance of officially hijacked and grossly overdue Settlement monies, had been advised. The deadline is close of business Dallas, TX, time on 1st July 2009.
Relevant parties were informed that failing Settlement in full by the deadline, exposures of crimes hitherto kept secret from the general public will proceed, and this service was requested to stand ready to receive a steady stream of compromising material which has been held back hitherto.
It has to be said that, as a publicist, the Editor of this service did recommend a long time ago that certain intelligence so far kept under wraps should be released, since, as Lenin taught, exposure is the ONLY weapon that ‘works’ when confronting recalcitrant serial criminal operatives who think they are protected from the consequences of their crimes (in this context, by the National Security Act of 1947 et seq). As a criminal operative himself, Lenin knew whereof he spoke on this score.
OBAMA PERSONALLY SABOTAGED THE LATEST PAYMENTS PROCESS
We have three separate authoritative reports to the effect that the allocation and distribution of monies compliant with the end of June payment scenario was aborted by President Barack Obama. The third confirmation of this provoking intervention was received as this urgent report was being finalised. For your information, THREE interferences had also been made by 5:30pm UK time to try to prevent us from posting this report. We assume that these US interventions are consistent with Obama’s now thrice-confirmed PERSONAL SABOTAGE OF THE SETTLEMENTS.
We further understand that the World Court have read the riot act to this man and that World Court personnel were despatched to the White House to inform this Obama fellow of the consequences of his continued intransigence. As the matter was put to us, these are liable to be dire.
‘STRUCTURED SETTLEMENTS’ DECEPTION PROMOTED BY THE WHITE HOUSE
Emulating the behaviour of the Bush II Administration, which at one stage was caught in flagrante parcelling out segments of the ‘Wanta’ tax payment in the clear expectation and intent that it would never be paid onto the books, with the tax monies annexed instead for illicit purposes, the Obama White House and the Geithner Treasury have put it about that the payees are to accept ‘Structured Settlements’ on a ‘take it or leave it’ basis.
In translation, that means ‘here, take this pittance and these IOUs which may promise payment in tranches over 30 years, and be grateful, and shut up’: which is exactly what certain parties would appear to be minded to do, or actually doing.
THE PURPOSE OF THE EXERCISE
The underlying objectives of this latest instance of White House and US Treasury Financial Terror are the same as have become apparent for months under the Obama Administration:
(1) The bulk of the Settlements money is retained by the criminal enterprises and their official associates and intermediaries for illicit financing purposes.
(2) Taxes payable as a consequence of implementation of the G-7-Approved Fully Transparent on-the-books taxable private sector Refunding Programme with no Government sector input, are to be DENIED to the US Treasury, which represents TREASON AND FINANCIAL/ECONOMIC TERRORISM COMMITTED AGAINST THE AMERICAN TAXPAYER and against future generations of Americans.
GOVERNMENT CAN ONLY CREATE DEBT: PRIVATE SECTOR GENERATES TAXABLE REVENUE
As we have reiterated here and in our financial intelligence publications:
• The Government Sector is capable ONLY of creating DEBT. Since it generates no revenue, it cannot tax itself (other than via income taxes levied on its employees). By contrast:
• Only the Private Sector generates REVENUE which the Government Sector can tax. In the financial trading context that we are talking about, transparent on-the-books trading generates transparent REVENUES which trigger transparent tax accruals.
•FACT: Revenues arising from private sector trading cascade into the Treasury with NO INPUT FROM GOVERNMENT WHATSOEVER. The Government DOES NOTHING: all it does is collect the windfall revenues. NO UNNECESSARY DEBT WHATSOEVER IS GENERATED.
• QUESTION: Then why do the Obama White House and the Geithner Treasury prefer to burden current and future generations of American taxpayers with a colossal portfolio of UNNECESSARILY INCURRED OFFICIAL DEBT THAT CAN NEVER BE REPAID?
• ANSWER: Because they are evidently NOT INTERESTED in resolving the colossal problems facing Americans, but PREFER INSTEAD to retain control of trading so that they and their corrupt cronies and criminal enterprises/intermediaries can continue (so they assume) to benefit financially, to fund the colossal ‘Black Ops’ budget of the controlling CIA Intelligence Power, and to refloat the moribund and fraudulent derivatives sector which represents a gigantic pile of Ponzi operations.
DERIVATIVES SECTOR BASED ON PONZI PRINCIPLES
The derivatives menace which has been found wanting by this service reflects the hegemony of the FALSE PROSPECTUS. The prospectus underlying a derivatives ‘product’ is false because it represents to the targeted investor that it encapsulates value, whereas the REALITY is that the promoter of the ‘derived’ product has NO RECOURSE to real underlying cash flow. THEREFORE derivatives operations are based, like Madoff’s marketing, on the familiar classic PONZI FRAUD.
How is a derivatives operation funded? Why, by pouring more funds into the Ponzipot, just like Madoffism. And when, as happened last September, NO MORE REAL HEAVY MONEY IS AVAILABLE, the derivatives Ponzi operation collapses. Last September’s collapse occurred because the Editor of this service advised that the LOAN funds made available by sovereign parties to finance the G-7-Approved Dollar Refunding Programme be placed into ‘lockdown’, as they had been systematically exploited by these US official crooks since the funds were originally made available by the Bank of England to the Bank of New York Mellon on 19th-20th June 2007.
• When it became apparent that the Obama Administration could no more be trusted to honour its international obligations than its discredited criminal predecessor, the entire $14.0+ trillion LOAN funding was finally withdrawn altogether on 29th January 2009, again consistently with our advice.
Bernard Madoff can look forward to being released from jail on 29th June 2159, having received the full tariff of 150 years’ incarceration applicable to the counts against him. Those who will follow him, beginning no doubt with Stanford, can expect a similar 100% tariff, given the Madoff Judge’s clear warning that his rejection of pleas for a lower tariff reflected inter alia the need to provide a strong deterrent against further such abuses.
On the basis of the Madoff tariff, the crimes now being committed against the American people by the Financial Terrorists in the White House, the US Treasury, the US State Department and the Federal Reserve cannot be expected to fall much short of a millennium of incarceration a piece.
SUMMARY OF WHITE HOUSE/TREASURY FINANCIAL TERRORISM
In a nutshell, instead of facilitating the G-7-Approved Private Sector fully transparent taxable, revenue-generating US Dollar Refunding Programme, which requires ZERO Government input and yields a cascade of ongoing tax revenues which will be more than enough to finance all of Obama’s programmes and to resolve all US financial issues, while at the same time reliquefying the banks ON THE BOOKS, the Obama White House prefers instead to pursue a flawed strategy of Fraudulent Finance based upon a Ponzi-model False Prospectus to revive the dead derivatives horse so that these people can continue indefinitely to control trading (as they see it). This is a flawed policy that is destined to fail and collapse, as well as representing a wanton act of Financial Terrorism.
NEGOTIATED SETTLEMENTS ‘SOLUTION’ REJECTED
While we cannot speak for other parties who may fall for Obama’s ‘sugar tips’ guile, offering payees a ‘negotiated settlement’ implying a small down payment and worthless promises to pay (spaced way out into the future), we are in a position to state that certain specific undertakings have to be met by close of business Dallas-time today, if a very serious escalation of the crime exposures, and of international tensions generally, are to be avoided.
As noted above, it has been mooted that ‘Structured Settlements’ are on the table: take it or leave it. The purpose of this notice is to advise those concerned that full implementation of undertakings agreed on 17th May 2008 at Madison, Ohio, regarding Payables Due within specified Due Diligence Documentation Parts 1 and 2 and dated 19th November 2004 to 23rd November 2008 is expected by close of business today.
The details of the relevant Due Diligence papers are, in outline, as follows:
• Due Diligence Documentation, Part 1: regarding Ameritrust Groupe, Inc., A Commonwealth of Virginia Corporation and Michael C. Cottrell, B.A., M.S., then Director, Executive Vice President and Treasurer: 19th November 2004-March 2008, with the following segments: Payorders; ATG-PII JV; MCC Due Diligence; Director History; Morgan Stanley Securities Account; ATG Tax Documents; LEW Permits; Commonwealth of Virginia Tax Department.
• Due Diligence Documentation, Part 2: Accounts Payable regarding Ameritrust Groupe, Inc., A Commonwealth of Virginia Corporation and Michael C. Cottrell, B.A., M.S., then Director, Executive Vice President and Treasurer: 19th November 2004- March 2008, with the following segments: Payable 1; Payable 2; Payable 3; Payable 4; Payable 5; ATG Payorders; ATG Corporate Resolutions; ATG By-Laws. These Due Diligence documents contain binding signed obligations.
• Supplementary Documentation: Pennsylvania Investments, Inc.: A Pennsylvania Corporation incorporated in December 1984: Due Diligence regarding Michael C. Cottrell, President and CEO, and Delmarva Timber Trust, et al: Secretary/Trustee: May 2003.
Referencing again the meeting dated 17th May 2008 at Madison, Ohio, Michael C. Cottrell was authoritatively informed that ‘the plan is to be followed’ involving Mr Cottrell and Pennsylvania Investments, Inc. This information, confirmed in an Affidavit dated 5th September 2008, was made available to highest-level British authorities, with the advice proffered by the Editor of this service concerning the absolute necessity for the abuse of the sovereign LOAN funds to be brought to an immediate end, which is what happened on 10th-12th September 2008 (after which the Editor of this service received the triple gunshot voicemail, as previously reported).
Two subsequent packages of related information and advice that were forwarded to highest-level British authorities were intercepted and aborted by a British agent. This matter was reported in detail to Thames Valley Police, Special Branch, Kidlington, Oxfordshire, two weeks ago; and the packages, dated 30th January 2009 and 3rd March 2009 were simultaneously resubmitted.
The above information references the arrangements that have been made to operate the G-7 Refunding Programme out of London, given the refusal of the Obama White House and of the Geithner Treasury to permit implementation of SOUND FINANCE, in favour of Fraudulent Financing operations based upon a false Ponzi-style Prospectus model
PERVERSE STANCE DOOMED TO CATASTROPHIC FAILURE
Believe it or not, the ‘designers’ of the Obama/Geithner False Prospectus formula PREFER DEBT for a sinister reason: debt presupposes cash flow. DEBT implies cash flow.
And cash flow within debt CAN BE STOLEN. Underlying this stance is a reckless determination to maintain control of illicit, off-balance sheet, corrupt trading and stealing, regardless of the other side of the balance sheet: IMMENSE AND COMPLETELY UNNECESSARY U.S. TREASURY DEBT.
By contrast, the British authorities are extremely interested in the London-based Refunding Programme, given that all trading monies resident within the British jurisdiction for 24 hours or more are taxable in the United Kingdom.
The London-based Refunding is the answer to the British Government’s desperate financial problems, which explains why the sabotage of our conveyance of materials to the highest UK levels has been reported in detail to Thames Valley Police (Special Branch), Kidlington.
PARTICIPATING IN ‘STRUCTURED SETTLEMENT’ = CO-CONSPIRACY
Those who may decide to fall for the blandishments of the US pied piper and who agree to ‘settle’ on his corrupt ‘take it or leave it’ (a down payment now and IOUs out to infinity) terms, immediately become co-conspirators with the official perpetrators of this latest variant extracted from the US Treasury’s box of scams. They will be participating with the corrupt US authorities in an operation designed to pillage the American taxpayer and to burden future generations of Americans. As such, these co-conspirators become financial terrorists along with Obama, Geithner, Clinton, Clinton, Bush, Bush, Bernanke, Kissinger, Greenspan and the rest of the Syndicate which is holding not just the United States and its people to ransom, but the whole of the Rest of the World, as well.
Promises were made on 17th May 2008 at Madison, Ohio and on 15th May 2009 in Erie, Pennsylvania. Failure to deliver on these promises will trigger:
(1) Wide-ranging exposures of criminal financial operations that have hitherto been withheld in order to assist the Settlement process.
(2) Court action on both sides of the Atlantic.
The deadline is close of business, Dallas time, TODAY.
LIST OF U.S. STATUTES, SECURITIES REGULATIONS AND LEGAL PRINCIPLES OF WHICH THE CRIMINALISTS, ASSOCIATES AND ALL THE MAIN FINANCIAL INSTITUTIONS REMAIN IN BREACH:
LEGAL TUTORIAL: The Steps of Common Fraud:
Step 1: Fraud in the Inducement: “… is intended to and which does cause one to execute an instrument, or make an agreement… The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to the true facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:
• “ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when it causes injury to another…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
• “THE TORT OF FRAUDULENT DECEIT… The elements of actionable deceit are: A false representation of a material fact made with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent to induce reliance thereon, on which plaintiff justifiably relies on his injury…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Deceit’.
Step 3: Theft by Deception and Fraudulent Conveyance:
THEFT BY DECEPTION:
• “FRAUDULENT CONCEALMENT… The hiding or suppression of a material fact or circumstance which the party is legally or morally bound to disclose…”.
• “The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable, arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under such circumstances being equivalent to an actual ‘fraudulent concealment’…”.
• To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escape investigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be of an affirmative character and fraudulent…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Concealment’.
• “FRAUDULENT CONVEYANCE… A conveyance or transfer of property, the object of which is to defraud a creditor, or hinder or delay him, or to put such property beyond his reach…”.
• “Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Conveyance’.
U.S. SECURITIES REGULATIONS OF WHICH INSTITUTIONS
HAVE BEEN SHOWN TO BE IN BREACH [SEE REPORTS]:
• NASD Rule 3120, et al.
• NASD Rule 2330, et al
• NASD Conduct Rules 2110 and 3040
• NASD Conduct Rules 2110 and IM-2110-1
• NASD Conduct Rules 2110 and SEC Rule 15c3-1
• NASD Conduct Rules 2110 and 3110
• SEC Rules 17a-3 and 17a-4
• NASD Conduct Rules 2110 and Procedural Rule 8210
• NASD Conduct Rules 2110 and 2330 and IM-2330
• NASD Conduct Rules 2110 and IM-2110-5
• NASD Systems and Programme Rules 6950 through 6957
• 97-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.
U.S. LAWS ROUTINELY BREACHED BY THE CRIMINAL OPERATIVES AND INSTITUTIONS:
• Annunzio-Wylie Anti-Money Laundering Act
• Anti-Drug Abuse Act
• Applicable international money laundering restrictions
• Bank Secrecy Act
• Crimes, General Provisions, Accessory After the Fact [Title 18, USC]
• Currency and Foreign Transactions Reporting Act
• Economic Espionage Act
• Hobbs Act
• Imparting or Conveying False Information [Title 18, USC]
• Maloney Act
• Misprision of Felony [Title 18, USC] (1)
• Money-Laundering Control Act
• Money-Laundering Suppression Act
• Organized Crime Control Act of 1970
• Perpetration of repeated egregious felonies by State and Federal public employees and their Departments and agencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustain fraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours by present and former holders of high office under the United States
• Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R. 3723]
• Provisions prohibiting the bribing of foreign officials [F.I.S.A.]
• Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]
• Securities Act 1933
• Securities Act 1934
• Terrorism Prevention Act
• Treason legislation, especially in time of war.
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
We are a private intelligence publishing house and have no connections to any outside parties including intelligence agencies. The word ‘intelligence’ on this website and in all our marketing material is used for marketing/sales purposes only and has no other connotations whatsoever: see ‘About Us’ on the red panels under the Notes on the Editor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor, Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreign power, suggestions to the contrary being actionable for libel in the English Court.
ADVERTISEMENT: INTERNET SECURITY SOLUTION
NON-U.S. INTERNET SECURITY SOLUTION CD AVAILABLE: FAR BETTER THAN NORTON ETC
It has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, and others, in pursuit of the Pentagon’s vast BIG BROTHER objective, directed from the ‘highest’ levels (not the levels usually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA’s master computers.
This should come as no real surprise since the cynical spooks even assert this ‘in-your-face’ by advertising ‘INTEL INSIDE’, which says exactly what it means. More specifically, NSA have made great strides in this direction by having a back door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the ‘fully collaborating’ firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling of personal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable ‘file and printer sharing’ under any circumstances. If you say ‘YES’, so to speak, to ‘file and printer sharing’, your computer becomes a slave at once to NSA’s master computers. DO NOT ENABLE SHARING.
Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. As long as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spying system which assists the criminalised structures, and thus hitherto the Bush-Clinton ‘Box Gang’ and its connections, with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge of data theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracy regards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much more problematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virus software. Having been attacked and abused so often, we offer a solution.
We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack and virus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends, at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, you will be helping us finance ongoing exposures of the DVD’s World Revolution and the financial corruption that has been financing it.
The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOT to solve your Internet security problems, but to spy on you and to report what you write about, to centralised US electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same time helping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, by ordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertising on this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appear to have a collective mental age of about five years, judging by their output.
• To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, or else press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scroll right down to the foot of that section, where you will see details of this service. When you buy this special product, you will also, as we clearly state above, be paying a special premium by way of a donation to help us finance these exposures.
The premium contains a donation for our exposure work and also covers our recommendation based on the Editor’s own experience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has an invaluable ‘Preview before downloading’ feature.
*VISTA: Virtual Instant Surveillance Tactical Application.