Friday 25 December 2009 03:15

CHRISTMAS GREETINGS: The Editor would like to thank warmly the many readers who have very spontaneously sent him kind messages for Christmas: these messages are ALL greatly appreciated and indicate what immense support there is for the measures necessary to turn the tide in the face of the evils that we are jointly facing down. HAPPY CHRISTMAS TO ALL OUR READERS!

Your support is generous and thoughtful. Given current pressures it is not possible to respond individually, but each message has been placed in our ‘support files’! They confirm the certainty, which we all know, that these crude monsters are confronting DEFEAT. Remember: THEY NEVER THOUGHT THERE WOULD EVER BE ANY OPPOSITION THAT COULD BE EFFECTIVE.

‘Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some Judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both’.


• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.

• BOOKS: Edward Harle Limited has so far published FIVE intelligence titles: The Perestroika Deception, by Anatoliy Golitsyn; Red Cocaine, by Dr Joseph D. Douglass, Jr.; The European Union Collective, by Christopher Story; The New Underworld Order, by Christopher Story; and The Red Terror in Russia, by Sergei Melgounov. All titles are permanently in stock. We sell books DIRECT.

• Globalist hegemony ideology and practice are comprehensively debunked in the Editor’s study entitled The New Underworld Order, which can be ordered via the books section of this website. If you want to see what may well happen if the angle of decline steepens much further, you could do worse than also order a copy of The Red Terror in Russia, by the contemporary Russian eyewitness Sergei Melgounov, another Edward Harle Limited book available direct from this website. Also, the Editor’s study entitled The European Union Collective, which proves that the EU is a long-range strategic entrapment operation to reduce European countries to satrap status within a German empire using economic strategy for relentless economic warfare purposes, can be bought here.

• Please Make a Donation, if you feel able to do so, to help finance Christopher Story‘s ongoing global financial corruption investigations. Your assistance will be very sincerely appreciated and will make a real difference, hastening the OVERDUE resolution of the worst financial corruption and linked financial fallout in world history. Just press Make a Donation, which is live, and it takes you straight to our ultra-safe ordering system, which accepts Visa and MasterCard. Or press the live Donate link at the top right-hand corner of this page. See also the ADVERTISEMENT below.

• See the SECOND WHITE PANEL ON THE HOME PAGE for updated information on our very latest subscription-based print publications, including Economic Intelligence Review, Arab-Asian Affairs, Soviet Analyst and Global Analyst. The updates provide outline summaries of the subjects covered, most of which are immediately relevant to these reports, which supplement the serials.

• ADVERTISEMENT: Details of the INTERNET SECURITY SOLUTION software offered by this service in conjunction with a donation, are appended at the foot of this report, below the legal data. See also our catalogue by clicking on World Reports Limited and scrolling down to the bottom.

By Christopher Story FRSA, Editor and Publisher, International Currency Review, World Reports Limited, London and New York. For earlier reports, press the ARCHIVE. Order your intelligence subscriptions and our ‘politically incorrect’ intelligence books online from this website.


Unfortunately, it appears from the latest special information made available to us since we last reported, and assembled by the Editor of this service during his New York visit and after returning to London on 20th December, that a recalcitrant spirit of unmitigated evil stalks the world because the head of the CIA-DVD serpent has not yet been severed from its repulsive and slithering body.

Moreover our sources imply that the President of the United States is being openly defied by his appointed colleagues, especially by Mr Leon Panetta, the Director of Central Intelligence, who is malevolently, with great arrogance, continuing to take his instructions from the decaying serpent, a.k.a. Adolf Schickelbusch Sr. and his conniving wife Barbara Bush, reported to be the illegitimate daughter of the notorious late ‘Black’ British operative, Aleisteir Crowley. There was a report that this evil couple had been ordered to ‘pack light’ as they would be ‘going away’, but our follow-up enquiries have led nowhere, so we are assuming that this was yet another diversionary lie.

Panetta is therefore, on behalf of the unhappy, corrupt US Intelligence Power which thinks it holds the whole world in its grip, destructively and purposefully insulting humanity, in order to preserve the CIA’s status as the unruly ‘State within the State’, its usurped hegemony, and its irresponsible capacity to hypothecate fiat money to infinity.

It has been doing this ever since it collaborated with the US military to denude Japanese Emperor Hirohito’s Imperial Palace vaults and the Philippine gold hiding places constructed by slave labour (which was buried alive in the secret holes) for the Japanese Imperial Princes.

This was a process begun at once by the corrupt US General Douglas Macarthur, who even operated a joint bank account with Hirohito. The CIA’s arrogant, serpentine power is derived originally from its custody of the gold and wealth that the Japanese had stolen from 12 Asian countries on an industrial scale during the years of their empire (1895-1945).

Now if we are correctly informed and read the latest implications aright, the consequences of this state of affairs, which will be explained in the next report (1), will be beyond catastrophic, as these malevolent forces, having failed to consolidate the intended globally sanctified, deceptive Climate Change cover for their next round of Fraudulent Finance, are nevertheless still criminally intent on developing a substitute fiat money derivatives trading system – having (as we detect) enticed the younger Chinese elements, who are impatient to make giga-fake money now, and to hell with the consequences, in defiance of the will of the Chinese Elders, who operate in accordance with a 100-year view and know that what is intended will lead to a catastrophe – not just for the United States but for the whole world.

And very rapidly, too.

The wiseheads among them know that this is a cynical, planned Nazi-Fascist operation, designed to precipitate a global collapse – after which the serpent and its disciples hope to be able to release the illegitimate fiat money conjured out of thin air that they have been manufacturing through their immense past hypothecation operations.

• The stashed fiat money can’t be mobilised until the whole system has crashed, see.

Therefore the serpent and its associates think they have an incentive to engineer the collapse of the system – with the US Treasury already in or about to be in manifest DEFAULT, US Government Departments closed down from 21st December, and indications of undercover Fraudulent Finance trading going on as though there had been no discontinuity.

• Specifically, $50 million CDs are being traded under the radar based on derivatives based in turn on Collateralised Debt Obligations (CDOs) that are based on nothing because it is impossible to tell to whom such a fake ‘asset’ belongs.

So what is being traded under the radar, and was intended to be escalated behind the Copenhagen deception, mandated by the whole world, is a menu of wholly spurious, false assets – a fact known to the participants and criminal financial enterprises concerned.

Unsurprisingly, we are being told from all responsible sides in the United States that the CEOs of these criminal enterprises and their co-conspirators holding high office and who have held high office should be taken out and given the modern equivalent of the lamp post treatment, at dawn.

The main product of these people, apart from spiritual and physical death, is DELAY.

• If they can achieve DELAY, they figure they have won, until the next hurdle appears.

These people are operating in a living hell of their own creation, and they know NOTHING but Fraudulent Finance; and no doubt they assume that their obtuse, ongoing recalcitrance will wear the opposition (such as ourselves) down by exhaustion.

If that is an element of their calculations, we and others have news for them: not only do Psy-Ops not work on us, but we understand that the horizontalisation programme, which we don’t want to talk about on Christmas Day, has been and will be elevated to a new level of viciousness.

There is also a bitter renewed split within the highest level of the British Government which appears, like everything else, to be directly connected to this crisis. Copenhagen collapsed because of it, a satisfactory development. The Editor will expand on these dimensions.

On a more positive note, the Editor attended, on 19th December 2009, a magnificent Messiah at the Central Presbyterian Church at 64th Street and Park New York City, in the snow. The avenues were packed with glistening whiteness and the only cab, which stopped for the Editor, crawled at about ten miles an hour to the church. The Editor thought he would be alone, but the church was packed.

This was a performance of exceptional quality, such as one is liable to encounter only in this great city. The Editor has no hesitation in saying that this was by far the most inspiring and exquisitely executed performance of Handel’s masterpiece that he has experienced in his entire life, even at Eton and Christ Church, which are renowned for the quality of their music.

Seated in the cab which miraculously appeared outside the church when he exited, the Editor understood anew the words of the Lord Jesus, who told his friends:

‘All power is given unto me in heaven and in earth (2) … and, lo, I am with you always, even unto the end of the world’ (3) . ‘In my name… they shall take up serpents, and if they drink any deadly thing, it shall not hurt them’ (4), (5).

And it is true that if we truly believe on the Name of the Lord, and place our faith totally in him, trying to walk in His ways, we ARE protected.

• A certainty that the Workers of Darkness cannot understand:

‘In the beginning was the Word, and the Word was with God, and the Word was God.

The same was in the beginning with God.

All things were made by him; and without him was not any thing made that was made (6).

In him was life; and the life was the light of men.

And the light shineth in darkness: AND THE DARKNESS COMPREHENDED IT NOT’ (7).

See above.

Notes and References:

(1) The Editor returned from New York amid the snowstorm on Sunday 20th December and has had no time to prepare the next report. However we have assembled intelligence for the report, which will be prepared as soon as possible, bearing in mind the necessity to cuddle our grandchildren who are staying with us, which is more important!

The forthcoming report will contain information hardly suitable for Christmas. Even this ‘trailer’ has displaced the time that the Editor had intended to use in order to prepare another Scripture-based Christmas message. See our report dated 26th December 2008 in the interim: if time permits a new one will appear, but this is not a promise. It’s an aspiration at this point.

(2): The Gospel according to Matthew, Chapter 28, verse 18.

(3): The Gospel according to Matthew, Chapter 28, verse 20.

(4): The Gospel according to Mark, Chapter 16, from verses 17-18.

(5): Several years ago, the Editor was summoned, for a second time, to the Washington, DC, office of Mr Bill Hamilton (NSA), of PROMIS ‘fame’. The meeting was supposed to take place in his office boardroom, but after a minute a man in jeans entered the room and asked Hamilton if he could work at a computer that was positioned alone in a corner. This was clearly pre-arranged. Hamilton then closed the meeting and ushered the Editor into an adjacent office suite, saying: leave your jacket and briefcase here. First mistake. The Editor was then left alone in the empty adjacent office suite for ten minutes. It was full of archive boxes, nothing else.

Ten minutes later, the receptionist who had been very pleasant on the Editor’s first visit, but was surly and quite rude on the second occasion, brought a tray, an opened bottle of Coke and a glass. Second mistake: The Editor drank the Coke.

After a completely pointless discussion lasting a few minutes, Hamilton ended the session. Hours later, a chip was found on the inside right lapel of the Editor’s jacket, and it was burned in a candle at a table in a diner. The Editor survived the Coke with no symptoms at all.

(6). I.e., some things were and are made in accordance with the pattern made by God.

(7). The Gospel according to John, Chapter 1, verses 1-5.


LEGAL TUTORIAL: The Steps of Common Fraud:

Step 1: Fraud in the Inducement: “… is intended to and which does cause one to execute an instrument, or make an agreement… The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to the true facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.

Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:

• “ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when it causes injury to another…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.

• “THE TORT OF FRAUDULENT DECEIT… The elements of actionable deceit are: A false representation of a material fact made with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent to induce reliance thereon, on which plaintiff justifiably relies on his injury…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Deceit’.

Step 3: Theft by Deception and Fraudulent Conveyance:


• “FRAUDULENT CONCEALMENT… The hiding or suppression of a material fact or circumstance which the party is legally or morally bound to disclose…”.

• “The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable, arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under such circumstances being equivalent to an actual ‘fraudulent concealment’…”.

• To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escape investigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be of an affirmative character and fraudulent…”.

Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Concealment’.


• “FRAUDULENT CONVEYANCE… A conveyance or transfer of property, the object of which is to defraud a creditor, or hinder or delay him, or to put such property beyond his reach…”.

• “Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer…”.

Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Conveyance’.


• NASD Rule 3120, et al.
• NASD Rule 2330, et al
• NASD Conduct Rules 2110 and 3040
• NASD Conduct Rules 2110 and IM-2110-1
• NASD Conduct Rules 2110 and SEC Rule 15c3-1
• NASD Conduct Rules 2110 and 3110
• SEC Rules 17a-3 and 17a-4
• NASD Conduct Rules 2110 and Procedural Rule 8210
• NASD Conduct Rules 2110 and 2330 and IM-2330
• NASD Conduct Rules 2110 and IM-2110-5
• NASD Systems and Programme Rules 6950 through 6957
• 97-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.


• Annunzio-Wylie Anti-Money Laundering Act
• Anti-Drug Abuse Act
• Applicable international money laundering restrictions
• Bank Secrecy Act
• Crimes, General Provisions, Accessory After the Fact [Title 18, USC]
• Currency and Foreign Transactions Reporting Act
• Economic Espionage Act
• Hobbs Act
• Imparting or Conveying False Information [Title 18, USC]
• Maloney Act
• Misprision of Felony [Title 18, USC] (1)
• Money-Laundering Control Act
• Money-Laundering Suppression Act
• Organized Crime Control Act of 1970
• Perpetration of repeated egregious felonies by State and Federal public employees and their Departments and agencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustain fraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours by present and former holders of high office under the United States
• Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R. 3723]
• Provisions prohibiting the bribing of foreign officials [F.I.S.A.]
• Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]
• Securities Act 1933
• Securities Act 1934
• Terrorism Prevention Act
• Treason legislation, especially in time of war.

• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.

We are a private intelligence publishing house and have no connections to any outside parties including intelligence agencies. The word ‘intelligence’ on this website and in all our marketing material is used for marketing/sales purposes only and has no other connotations whatsoever: see ‘About Us’ on the red panels under the Notes on the Editor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor, Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreign power, suggestions to the contrary being actionable for libel in the English Court.

Press Internet Security Solution or go to the World Reports Limited serials catalogue and scroll down until you come to this product. Then proceed through the simple and ultra-safe ordering procedure [Visa or MasterCard only]. Send a donation as you order this RECOMMENDED solution.

It has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, and others, in pursuit of the Pentagon’s vast BIG BROTHER objective, directed from the ‘highest’ levels (not the levels usually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA’s master computers.

This should come as no real surprise since the cynical spooks even assert this ‘in-your-face’ by advertising ‘INTEL INSIDE’, which says exactly what it means. More specifically, NSA have made great strides in this direction by having a back door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the ‘fully collaborating’ firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling of personal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable ‘file and printer sharing’ under any circumstances. If you say ‘YES’, so to speak, to ‘file and printer sharing’, your computer becomes a slave at once to NSA’s master computers. DO NOT ENABLE SHARING.

Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. As long as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spying system which assists the criminalised structures, and thus hitherto the Bush-Clinton ‘Box Gang’ and its connections, with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge of data theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracy regards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much more problematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virus software. Having been attacked and abused so often, we offer a solution.

We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack and virus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends, at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, you will be helping us finance ongoing exposures of the DVD’s World Revolution and the financial corruption that has been financing it.

The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOT to solve your Internet security problems, but to spy on you and to report what you write about, to centralised US electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same time helping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, by ordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertising on this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appear to have a collective mental age of about five years, judging by their output.

• To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, or else press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scroll right down to the foot of that section, where you will see details of this service. When you buy this special product, you will also, as we clearly state above, be paying a special premium by way of a donation to help us finance these exposures.

The premium contains a donation for our exposure work and also covers our recommendation based on the Editor’s own experience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has an invaluable ‘Preview before downloading’ feature.

• It is suitable for PC’s but not Mac computers. As with all such programs, the License is renewable at a modest fee annually. This is done on-line in the usual way [with the supplier direct].

*VISTA: Virtual Instant Surveillance Tactical Application.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s