FORT HOOD: RECOVERY OF THE CHINESE CURRENCY BOXES

cropped-chrisstory

OPERATION TO SEIZE BACK BOX GANG’S LOOT MASKED BY SHOOTINGS

Friday 6 November 2009 02:15

• BARACK OBAMA PLAYS HARDBALL AT LONG LAST

• BUSH SR. STORED THE STOLEN CHINESE CURRENCY BOXES AT TEXAS ARMY BASE

• BUSH CRIME FAMILY’S MONEY IN THE CARIBBEAN HAS ALSO BEEN SEIZED

• ADOLF SHICKELBUSCH TOLD: ‘YOU WON’T BE PAID ANYTHING AT ALL. IT’S OVER’.

• DID BUSH SR. FLY INTO FORT HOOD, AND WAS HE ARRESTED OR HORIZONTALISED?

• THE FORT HOOD SHOOTINGS: THE COVER STORY

• THE FORT HOOD SHOOTINGS: THE REAL STORY

• PART OF PREVIOUSLY REFERENCED INTERNATIONAL CLEAN-UP OPERATION: SEE BELOW

• WATCH THIS SPACE: UPDATED INFORMATION: MIDDAY UK TIME 6TH NOVEMBER:

MISPRISION OF FELONY: U.S. CODE, TITLE 18, PART 1, CHAPTER 1, SECTION 4:
‘Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some Judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both’.

• BOOKS: Edward Harle Limited has so far published FIVE intelligence titles: The Perestroika Deception, by Anatoliy Golitsyn; Red Cocaine, by Dr Joseph D. Douglass, Jr.; The European Union Collective, by Christopher Story; The New Underworld Order, by Christopher Story; and The Red Terror in Russia, by Sergei Melgounov. All titles are permanently in stock. We sell books DIRECT.

• Globalist hegemony ideology and practice are comprehensively debunked in the Editor’s study entitled The New Underworld Order, which can be ordered via the books section of this website. If you want to see what may well happen if the angle of decline steepens much further, you could do worse than also order a copy of The Red Terror in Russia, by the contemporary Russian eyewitness Sergei Melgounov, another Edward Harle Limited book available direct from this website. Also, the Editor’s study entitled The European Union Collective, which proves that the EU is a long-range strategic entrapment operation to reduce European countries to satrap status within a German empire using economic strategy for relentless economic warfare purposes, can be bought here.

• Please Make a Donation, if you feel able to do so, to help finance Christopher Story‘s ongoing global financial corruption investigations. Your assistance will be very sincerely appreciated and will make a real difference, hastening the OVERDUE resolution of the worst financial corruption and linked financial fallout in world history. Just press Make a Donation, which is live, and it takes you straight to our ultra-safe ordering system, which accepts Visa and MasterCard. Or press the live Donate link at the top right-hand corner of this page. See also the ADVERTISEMENT below.

• See the second white panel for details of our latest distributed intelligence publications. This has its own Archive, giving details of earlier publications. A notice about the Postal Strike in the United Kingdom is displayed at present, for the benefit fo subscribers to the print services.

• ADVERTISEMENT: Details of the INTERNET SECURITY SOLUTION software offered by this service in conjunction with a donation, are appended at the foot of this report, below the legal data. See also our catalogue by clicking on World Reports Limited and scrolling down to the bottom.

By Christopher Story FRSA, Editor and Publisher, International Currency Review, World Reports Limited, London and New York. For earlier reports, press the ARCHIVE. Order your intelligence subscriptions and our ‘politically incorrect’ intelligence books online from this website.

New report starts here:

THE FORT HOOD SHOOTINGS: THE COVER STORY
At 2:30 eastern, 1:30 local time, a mass shooting occurred at the Fort Hood army base, the largest American military installation in the world, covering some 15 square miles. Army Lieutenant Colonel Christopher Garver confirmed that the violence erupted at or near the Howze Theatre, next door to the Folgers Soldier Readiness Processing Center contained within a former sports dome at the base, located in Killeen, Texas, some 50 miles from Waco.

Initial reports indicated that seven personnel were dead and that 12 had been wounded. These reports also indicated that one gunman was in custody and that another was being sought. Later reports have confirmed that the total number of personnel who died is twelve, with 31 injured.

Later reports said that more than 30 personnel were injured, that the base was in ‘lockdown’ and that the assailant, named as Major Malik Nadal Hassan, a US Army mental health psychologist or psychiatrist, had been shot dead. Two other assailants were arrested and are in custody, according to a briefing by Army Lieutenant General Robert Cone, the post commander.

British press sources state that Major Hassan had walked into the training centre armed with two handguns and had opened fire on fellow military personnel who were having last-minute medical and dental checks before being deployed to Afghanistan – whereupon gunfire erupted around the base as the two accomplices were captured.

The Daily Telegraph says that one of the assailants had holed himself up in a brain injury unit, where he was surrounded by SWAT teams, Four police officers were wounded before he was arrested. 500+ troops were deployed to lock down Fort Hood as helicopters swept overhead.

Lieutenant Commander Cone mouthed for the eager press:

‘It’s been a terrible tragedy. It’s stunning. We are absolutely devastated. The shooter was killed. He was a soldier. We since then have apprehended two additional soldiers who are suspects. There were eyewitness accounts that there may have been more than one shooter’.

The violence erupted shortly before a graduate ceremony for soldiers was due to start at the base. Enter President Barack Obama with this bromide for public consumption:

“These are men and women who have made the selfless and courageous decision to risk, and at times give, their lives to protect us’.

‘It‘s difficult enough when we lose these brave men and women overseas. It is horrifying when we lose them on American soil’.

Step forward, also, Texas Senator Kay Bailey Hutchison, who pronounced:

‘Our dedicated military personnel have sacrificed so much in service to our country and it sickens me that the men and women of Fort Hood have been subjected to this senseless, random violence’.

Okay, that’s enough. Base commanders and the Pentagon stated that they had no early indication of the motive for the shootings. As the story ‘line’ matured, though, it was being said that the killer, aged 39, was ‘upset about being ordered to be deployed to Iraq’.

Note the convenient Islamic name description of the now assailant, who was initially declared dead. However some British reports mid-morning were saying that the assailant has survived.

THE FORT HOOD SHOOTINGS: THE REAL STORY
The shootings were staged in order to cover up what was really happening behind the scenes which was as follows:

(1): George H. W. D. V. D. Bush, the head of THE BOX GANG working with the Clintons, had stored some or all of the stolen/diverted 1933 dollar currency Chinese currency boxes referenced in our reports dated 4th and 5th November 2009 at Fort Hood. These boxes form part of the Settlement negotiated with the Chinese parties, who were immediately double-crossed by the Americans.

(2): We do not know at the time of posting whether George Bush Sr. had flown in to Fort Hood from Germany, but as this base is located close to Crawford and other Bush Crime Family locations, we believe this to be HIGHLY PROBABLE.

(3): Whether Bush Sr. flew into Fort Hood to be joined with the stolen/diverted Chinese-sourced currency boxes, or was accompanying stolen boxes on the plane, is not strictly material, because what we DO KNOW is as follows:

(4): An operation was mounted at Fort Hood to CONFISCATE THE STOLEN CHINESE CURRENCY BOXES FROM BUSH SR., which achieved its objective. The currency boxes, forming part of the Settlement that Adolf Schickelbusch sabotaged with the duplicitous assistance of his agent, Chancellor Angela Merkel [see preceding reports], were retrieved.

(5): It is likely that the shoot-out which occurred for public consumption was a diversionary operation masking a parallel shoot-out involving Bush bodyguards and US military, although we cannot confirm this. Certainly, the ‘mainstream’ media, as usual, is running the wrong story.

(6): The deployment of 500+ heavily armed troops, and the fact that military helicopters were called in, implies a sizeable operation, which would be make little sense in the context of a shooting such as is described in the media. That does not diminish the nastiness and tragedy of the loss of life as reported: but when this operation was planned, loss of life was factored into the equation.

• It’s called cynically: COLLATERAL DAMAGE.

[Do they CARE that at least seven personnel lost their lives and over 30 were injured in a parallel cover-up operation? That’s like asking whether the sacrifice of over 100 special US operatives who spearheaded the Bush-directed seizure of the Central Bank of Iraq in Baghdad in 2003, all of whom were massacred immediately afterwards so that none of them would survive to report for posterity what actually happened, was an accident. That operation went badly wrong, and was exposed, too: reliable Iraqi eyewitnesses supplied the necessary reports and confirmation].

It is impossible at this juncture to be sure whether the gunfire was part of the main operation, i.e., the whole operation was synchronised, or whether two separate operations were run in parallel. But that is hardly material, given the momentous details and substance of this report.

(7): Separately, we understand that George Bush Sr.’s assets in the Caribbean – ‘his’ money – was seized at the same time, or at least at some stage on 5th November 2009.

(8): Adolf Schickelbusch has also been informed that ‘you are not going to get a penny. You will be paid NOTHING’. [Assuming, that is, that he’s still vertical. But that’s all we know right now].

This reflects the fact identified earlier, namely that these Germans ALWAYS go too far. Bush Sr. WENT TOO FAR by sabotaging EVEN the carefully nuanced arrangements worked out with the Chinese authorities and parties, and with the other sovereign powers, including the British Monarchical Power. He thought he could carry on carrying on, blind to the fact that IT’S OVER.

• As a consequence, HE HAS LOST EVERYTHING. HE HAS BEEN CLEANED OUT.

NOW. As indicated, we cannot yet confirm that GEORGE BUSH HIMSELF flew into Fort Hood. If he did, it stands to reason, given the above FACTS, which have themselves been CONFIRMED, that George H. W. Bush would have been arrested OR HORIZONTALISED.

We may yet learn that this took place.

All we can do at this stage is to remind you of the phrase ‘Not YET’ in the preceding report.

Was Bush 43 also arrested, horizontalised or all of the above during this showdown?

WE HAVE TO TELL YOU THAT WHEN CERTAIN STRUCTURES WERE MADE AWARE THAT WE HAD WORKED THIS OUT, THERE WAS A STUNNED SILENCE.

• THE STRUCTURES CONCERNED WERE ‘SHOCKED TO HEAR IT FROM US’, WE WERE TOLD.

PART OF THE PREVIOUSLY REFERENCED INTERNATIONAL CLEAN-UP OPERATION
Who ordered this operation? It would have been ordered, or at least condoned (see below) by the ‘President ‘of the United States, Barack Hussein Obama, who, we have repeatedly been told, has been anxious to complete the Settlements and was known to be fretting under the weight of the general contempt in which he was being held by all ‘in the know’, concerning his apparent inability to get his ARROGANT inferiors to carry out his instructions on this score.

At the same time, this operation implies the likelihood that it forms part of the INTERNATIONAL clean-up associated inter alia with the presence in the United States of 72 heavily armed cadres tasked with ENFORCEMENT of the Writ of Execution by all means, including the use of FORCE. Therefore to state that the operation will have been ordered by President Obama may be too simplistic. There are further major developments in the pipeline, and further revelations too.

Nevetheless, Mr Obama has been systematically sabotaged by penetration operatives, including Rahm Emanuel, Lawrence Summers, Timothy Geithner, Mrs Hillary Clinton, and Dr Ben Bernanke.

If this assessment is correct, we would anticipate some high-level dismissals or resignations from the US Government soon, if it turns out that this DECISIVE ACTION has indeed broken the impasse and destabilised the opposition beyond any likelihood of recovery. We shall (soon) see.

More to the point, the President had been placed in an impossible position by the Nazi Fifth Column within the US Intelligence Power owing allegiance to the Box Gang, not least given the horrendous implications for national security arising from the sabotage operation mounted by Bush Sr. and his lackey, Chancellor Frau(d) Merkel. Was she arrested, as ordered by the World Court? Don’t know yet. One would expect the German police to have snubbed the World Court.

• The British press implies, but does not confirm, that George Bush’s agent, Frau Merkel, is back in Germany, which is to be expected since the likelihood of the German police arresting her was always minimal. But she may have problems if she strays outside Europe any time soon.

• She’s scheduled to hold a triumphant meeting in Berlin next week as the Germans overplay their hand AGAIN, humiliating the British (through a French Cabinet mouthpiece) by lecturing us to the effect that Britain has no choice but to integrate itself, whether it likes it or not, within the Greater German Empire. The British don’t like it. There will be repercussions.

Story’s Third Law reads: ‘Sooner or later, all covers and operations are blown’.

Recently, it would appear that the qualifying ‘sooner or later’ has become redundant.

As the late lamented Sherman Skolnik used to say, bless him: WATCH THIS SPACE.

WATCH THIS SPACE: UPDATED INFORMATION: MIDDAY UK TIME 6TH NOVEMBER:
Public domain information gleaned by several sources confirms that Hasan was single, with no children. He graduated from the notorious Virginia Tech, where he received his bachelor’s degree in biochemistry in 1997. He received his medical degree from the American military’s Uniformed Services University of the Health Sciences in Bethesda, MD, in 2001. He worked at the notorious Walter Reed Hospital for six years for his internship, residency, and a fellowship.

In 2007, a ‘Korean’ gunman murdered a number of students at the Virginia Tech campus, which has a mind control centre at or very close to the campus. Both Fort Hood and Waco are satanic, long established Himmlerian mind-control centres.

By ‘mind-control’ in this context, read: MK-UKTRA-style Himmlerian demonism using personality splitting techniques to create operatives with ‘alters’ that can be manipulated remotely by means of ‘triggers’, in this case an OMEGA (killing) trigger that can be activated to procure a spectacle, such as occurred at Fort Hood on 5th November, usually for diversionary purposes to bamboozle the media, while something ‘more important’ goes on in parallel behind the scenes.

• Update, 3:30pm UK time, 6th November: The total number of deaths is now said to be the familiar satanic-esoteric-geomasonic numerological number THIRTEEN. We expect this total death count to remain unchanged, confirming that this is an operation. You may recall that the total death count of the Virginia Tech massacre in 2007 wound up with the satanic-esoteric-geomasonic numerological number THIRTY-THREE. These mind-controlled demoniacs and their controllers, as they play with death, which is their only product [see The New Underworld Order], attribute magical powers to these ‘special’ numbers, which reflect their brainwashed superstition and death-focused ideology. These subjects are examined and exposed, in a True Christian context, in the Editor’s cited study.

Separate information was received overnight from top payee sources confirming highest-level information to the effect that ‘the issues have been resolved’ and matters should ‘go forward’.

LIST OF U.S. STATUTES, SECURITIES REGULATIONS AND LEGAL PRINCIPLES OF WHICH THE CRIMINALISTS, ASSOCIATES AND ALL THE MAIN FINANCIAL INSTITUTIONS REMAIN IN BREACH:

LEGAL TUTORIAL: The Steps of Common Fraud:

Step 1: Fraud in the Inducement: “… is intended to and which does cause one to execute an instrument, or make an agreement… The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to the true facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.

Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:

• “ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when it causes injury to another…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.

• “THE TORT OF FRAUDULENT DECEIT… The elements of actionable deceit are: A false representation of a material fact made with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent to induce reliance thereon, on which plaintiff justifiably relies on his injury…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Deceit’.

Step 3: Theft by Deception and Fraudulent Conveyance:

THEFT BY DECEPTION:

• “FRAUDULENT CONCEALMENT… The hiding or suppression of a material fact or circumstance which the party is legally or morally bound to disclose…”.

• “The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable, arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under such circumstances being equivalent to an actual ‘fraudulent concealment’…”.

• To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escape investigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be of an affirmative character and fraudulent…”.

Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Concealment’.

FRAUDULENT CONVEYANCE:

• “FRAUDULENT CONVEYANCE… A conveyance or transfer of property, the object of which is to defraud a creditor, or hinder or delay him, or to put such property beyond his reach…”.

• “Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer…”.

Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Conveyance’.

U.S. SECURITIES REGULATIONS OF WHICH INSTITUTIONS
HAVE BEEN SHOWN TO BE IN BREACH [SEE REPORTS]:

• NASD Rule 3120, et al.
• NASD Rule 2330, et al
• NASD Conduct Rules 2110 and 3040
• NASD Conduct Rules 2110 and IM-2110-1
• NASD Conduct Rules 2110 and SEC Rule 15c3-1
• NASD Conduct Rules 2110 and 3110
• SEC Rules 17a-3 and 17a-4
• NASD Conduct Rules 2110 and Procedural Rule 8210
• NASD Conduct Rules 2110 and 2330 and IM-2330
• NASD Conduct Rules 2110 and IM-2110-5
• NASD Systems and Programme Rules 6950 through 6957
• 97-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.

U.S. LAWS ROUTINELY BREACHED BY THE CRIMINAL OPERATIVES AND INSTITUTIONS:

• Annunzio-Wylie Anti-Money Laundering Act
• Anti-Drug Abuse Act
• Applicable international money laundering restrictions
• Bank Secrecy Act
• Crimes, General Provisions, Accessory After the Fact [Title 18, USC]
• Currency and Foreign Transactions Reporting Act
• Economic Espionage Act
• Hobbs Act
• Imparting or Conveying False Information [Title 18, USC]
• Maloney Act
• Misprision of Felony [Title 18, USC] (1)
• Money-Laundering Control Act
• Money-Laundering Suppression Act
• Organized Crime Control Act of 1970
• Perpetration of repeated egregious felonies by State and Federal public employees and their Departments and agencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustain fraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours by present and former holders of high office under the United States
• Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R. 3723]
• Provisions prohibiting the bribing of foreign officials [F.I.S.A.]
• Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]
• Securities Act 1933
• Securities Act 1934
• Terrorism Prevention Act
• Treason legislation, especially in time of war.

• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.

We are a private intelligence publishing house and have no connections to any outside parties including intelligence agencies. The word ‘intelligence’ on this website and in all our marketing material is used for marketing/sales purposes only and has no other connotations whatsoever: see ‘About Us’ on the red panels under the Notes on the Editor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor, Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreign power, suggestions to the contrary being actionable for libel in the English Court.

ADVERTISEMENT: INTERNET SECURITY SOLUTION
YOU CAN ORDER THIS DIRECT FROM THIS WEBSITE. Summary:
Press Internet Security Solution or go to the World Reports Limited serials catalogue and scroll down until you come to this product. Then proceed through the simple and ultra-safe ordering procedure [Visa or MasterCard only]. Send a donation as you order this RECOMMENDED solution.

NON-U.S. INTERNET SECURITY SOLUTION CD AVAILABLE: FAR BETTER THAN NORTON ETC
It has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, and others, in pursuit of the Pentagon’s vast BIG BROTHER objective, directed from the ‘highest’ levels (not the levels usually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA’s master computers.

This should come as no real surprise since the cynical spooks even assert this ‘in-your-face’ by advertising ‘INTEL INSIDE’, which says exactly what it means. More specifically, NSA have made great strides in this direction by having a back door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the ‘fully collaborating’ firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling of personal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable ‘file and printer sharing’ under any circumstances. If you say ‘YES’, so to speak, to ‘file and printer sharing’, your computer becomes a slave at once to NSA’s master computers. DO NOT ENABLE SHARING.

Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. As long as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spying system which assists the criminalised structures, and thus hitherto the Bush-Clinton ‘Box Gang’ and its connections, with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge of data theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracy regards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much more problematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virus software. Having been attacked and abused so often, we offer a solution.

We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack and virus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends, at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, you will be helping us finance ongoing exposures of the DVD’s World Revolution and the financial corruption that has been financing it.

The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOT to solve your Internet security problems, but to spy on you and to report what you write about, to centralised US electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same time helping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, by ordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertising on this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appear to have a collective mental age of about five years, judging by their output.

• To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, or else press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scroll right down to the foot of that section, where you will see details of this service. When you buy this special product, you will also, as we clearly state above, be paying a special premium by way of a donation to help us finance these exposures.

The premium contains a donation for our exposure work and also covers our recommendation based on the Editor’s own experience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has an invaluable ‘Preview before downloading’ feature.

*VISTA: Virtual Instant Surveillance Tactical Application.

Advertisements

One thought on “FORT HOOD: RECOVERY OF THE CHINESE CURRENCY BOXES

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s