MICHAEL C. COTTRELL’S LINE-ITEM FOR THE U.S. DOLLAR REFUNDING PROGRAMME
Monday 11 January 2010 02:00
• FALSE ALLEGATIONS ABOUT THE EDITOR OF THESE SERVICES
• PRIOR WARNING THAT WE WOULD ‘RATCHET UP’ THE EXPOSURES
• SOURCES OF INFORMATION ON ‘OPERATION STILLPOINT’ ET AL.
• REASONS WE ARE REVEALING A KEY SOURCE NOW
• THE CRITICAL INFORMATION THAT IS NOW DIVULGED
• CYNICAL ABUSE OF PROFESSIONAL PROTECTION OF OUR SOURCES
• OPERATION STILLPOINT AND THE PONZI VICTIMS
• ‘DISTRIBUTION LAW FIRM CLOSED DOWN BY INTERPOL’
• SOURCES THREATENED • MANY PEOPLE ‘TAKEN OUT’ AT THE WEEKEND
• WHEN READING THIS NEW REPORT, PLEASE REFER TO THE FOLLOWING POSTINGS
ON THIS WEBSITE, all of which can be accessed immediately by pressing ARCHIVE:
• 28 December 2009:
OFFICIAL: MONEY SABOTEURS = ECONOMIC TERRORISTS
• 07 January 2010:
OPERATION STILLPOINT TO DESTROY AMERICA STOPPED
• 09 January 2010:
U.S. INTELLIGENCE POWER ‘STEALS $1.3++ TRILLION’
• 09 January 2010:
TEXT OF THE CMKM/CMKX LAWSUIT FILED AGAINST THE S.E.C.: CASE NUMBER CV10-00031-JVS (MLGx): ‘Money Demanded in Complaint: $3.87 trillion’: THIS IS THE BIGGEST FRAUDULENT FINANCE LAWSUIT IN HISTORY: MASSIVE SCAMMING PLATFORM RUN BY BUSH JR.’s S.E.C.
MISPRISION OF FELONY: U.S. CODE, TITLE 18, PART 1, CHAPTER 1, SECTION 4:
‘Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some Judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both’.
‘Seeing what’s at the end of one’s nose requires constant effort’. George Orwell.
‘If you think you’re too small to make a difference,
try sleeping in a closed room with a mosquito’. African proverb.
• FOR SEVERAL YEARS WE HAVE CARRIED THIS RUBRIC AT THE FOOT OF EACH REPORT:
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
• BOOKS: Edward Harle Limited has so far published FIVE intelligence titles: The Perestroika Deception, by Anatoliy Golitsyn; Red Cocaine, by Dr Joseph D. Douglass, Jr.; The European Union Collective, by Christopher Story; The New Underworld Order, by Christopher Story; and The Red Terror in Russia, by Sergei Melgounov. All titles are permanently in stock. We sell books DIRECT.
• Globalist hegemony ideology and practice are comprehensively debunked in the Editor’s study entitled The New Underworld Order, which can be ordered via the books section of this website. If you want to see what may well happen if the angle of decline steepens much further, you could do worse than also order a copy of The Red Terror in Russia, by the contemporary Russian eyewitness Sergei Melgounov, another Edward Harle Limited book available direct from this website. Also, the Editor’s study entitled The European Union Collective, which proves that the EU is a long-range strategic entrapment operation to reduce European countries to satrap status within a German empire using economic strategy for relentless economic warfare purposes, can be bought here.
• Please Make a Donation, if you feel able to do so, to help finance Christopher Story‘s ongoing global financial corruption investigations. Your assistance will be very sincerely appreciated and will make a real difference, hastening the OVERDUE resolution of the worst financial corruption and linked financial fallout in world history. Just press Make a Donation, which is live, and it takes you straight to our ultra-safe ordering system, which accepts Visa and MasterCard. Or press the live Donate link at the top right-hand corner of this page. See also the ADVERTISEMENT below.
• See the SECOND WHITE PANEL ON THE HOME PAGE for updated information on our very latest subscription-based print publications, including Economic Intelligence Review, Arab-Asian Affairs, Soviet Analyst and Global Analyst. The updates provide outline summaries of the subjects covered, most of which are immediately relevant to these reports, which supplement the serials.
• ADVERTISEMENT: Details of the INTERNET SECURITY SOLUTION software offered by this service in conjunction with a donation, are appended at the foot of this report, below the legal data. See also our catalogue by clicking on World Reports Limited and scrolling down to the bottom.
By Christopher Story FRSA, Editor and Publisher, International Currency Review, World Reports Limited, London and New York. For earlier reports, press the ARCHIVE. Order your intelligence subscriptions and our ‘politically incorrect’ intelligence books online from this website.
NEW REPORT STARTS HERE:
FALSE ALLEGATIONS ABOUT THE EDITOR OF THESE SERVICES
People who are not sitting on their brains will easily understand that the Editor of these services, Christopher Story FRSA, is a veteran reporter, analyst, author and publisher, as clearly revealed by the fact that we have been publishing independently since the 1970s [see Testimonials] and is not an agent of a foreign power – as has of course been reiterated at the foot of almost every report in this series for a long time. The statement requires no elaboration or explanation.
People who ARE sitting on their brains typically imagine fantastic scenarios which bear no relation to reality – the most laughable to date being a correspondent from Canada who emailed the Editor on 9th January [received at 20:08], with reference to the Editor’s weekend absence at our second grandchild’s christening in Cambridge this past weekend: ‘Is it not strange, all the details you give as to your exact whereabouts at a given moment?’
Such people pooh-pooh conspiracy ‘theories’ (as opposed to conspiracies: the two are not the same, of course) but then weave their own conspiracy theories about the Editor! Obviously it has never occurred to this particular correspondent that since everything that we do and publish is in the open, and is above board, the Editor has no concern about his whereabouts being known. If he had something to hide, that would be a different matter. He recalls that in the very early days of this ongoing research, the people he was in contact with were paranoid about revealing their identities and whereabouts. That was because they had a great deal to hide.
PRIOR WARNING THAT WE WOULD ‘RATCHET UP’ THE EXPOSURES
In November 2009, we warned that if these official cynical stealing and monetary diversion games continued, we would ‘ratchet up’ our exposures so that those engaged in this serial criminal activity would start to feel real pain. This is not because the Editor enjoys such activity: it is because, in the face of the atrocious non-stop provocations of these US criminalist cadres and their hangers-on, we have had no alternative.
SOURCES OF INFORMATION ON ‘OPERATION STILLPOINT’ ET AL.
The latest outburst of tripe, which materialised while we were enjoying the occasion of our little grandson’s christening, concerns the ‘Black’ innuendo that by exposing OPERATION STILLPOINT, the Editor has crossed a line between investigative reporting and spying.
That is absolutely not the case, as will now be revealed. First, the detailed basic information about OPERATION STILLPOINT was, as we stated in explicit terms in the report dated 7th January 2010, revealed by the US-based spy Leo/Lee Wanta – who, separately, not only ‘burned’ a great deal of information to this Editor in the course of the Editor’s normal investigative reporting duties, but used our website platform for more than a year to further his own agenda.
As a result both of this and of the Editor’s prolonged research over many years, we hold a very large file of documents on Mr Wanta’s past activities, and on issues and developments related to the ‘taking down’ of both the Soviet Union AND the United States. Many of these documents have been published in facsimile format in successive issues of International Currency Review, and are accordingly held in libraries, government offices and institutions all over the world. Self-evidently, it is both foolish and hazardous for controlled agents of disinformation with axes to grind to take it upon themselves to contradict what we state on the basis of documented information and sources.
Secondly, since some malicious US gossips associated with the CIA’s failing disinformation and obfuscation apparat have taken it upon themselves rashly to insinuate that this information was obtained (a) other than in the normal course of investigative reporting and (b) from UK intelligence sources, the further implication being the old US lie (which suits the US disinformation apparat’s agenda) that the Editor is a UK intelligence operative – and that no-one could possibly obtain this information other than in a clandestine manner – we will now divulge the US source of the detailed exposures concerning OPERATION STILLPOINT and related matters revealed to us to date in the format of sworn Affidavits and a signed, sworn Affirmation and Statement of Facts.
In so doing we will reconfirm that the Editor is exactly what he is advertised to be, namely an Editor, analyst, author and publisher – and for the purposes of these reports, a REPORTER – and nothing else. The source of the recently detailed exposures, including the published detail of OPERATION STILLPOINT, is American, namely:
Michael C. Cottrell, B.A., M.S.
Pennsylvania Investments, Inc.
1157 West 7th Street
ERIE, PA 16502, USA
Telephone: 814-455 9218
Facsimile: 814-453 4453
REASONS WE ARE REVEALING A KEY SOURCE NOW
On the Editor’s return from Cambridge on Sunday 10th January, Mr Cottrell requested that we reveal this information. The reasoning is as follows:
• If people have a problem with any information provided by him that we have published in our NEWS reports, they are at liberty to contact Mr Cottrell direct. [Last time we revealed Mr Cottrell as a source, which most people have chosen to ignore, NOBODY CALLED HIM: in other words, these people feel safe attacking the messenger (this reporter): but when it comes to checking with the source behind the message, they suddenly seem to get cold feet].
• FACT: The Editor naturally has multiple sources for intelligence published in these reports. The fact that we have revealed the identity of this source does NOT mean that we are about to reveal the identity of other sources. The identity of Mr Cottrell is being revealed here for the specific reasons explained in this summary.
• The Editor would have been quite content to leave matters as they are, because what has been revealed immediately above could have been divulged by us, if necessary, had anyone serving the interests of the obfuscation apparat, bothered to ask. But such people usually prefer to weave lies, libels, innuendoes and idiotic make-believe scenarios on their web platforms precisely so as to intensify the fog of confusion which is ‘needed’ in order to ‘enable’ the scamsters to continue with their thefts, diversions and Fraudulent Finance operations.
However there are timely reasons now why Mr Cottrell thinks it is appropriate for the above to be revealed for the whole world to see. Again, the muckrakers won’t know this, but their controllers most certainly do: and we judge that they have calculated that because the Editor has not revealed what follows, and Mr Cottrell as the expert and qualified source, they have figured that they can continue their financial diversionary operations covered both by compartmentalisation, and by the false fog of diversionary claptrap on the disinformation websites.
THE CRITICAL INFORMATION THAT IS NOW DIVULGED
And the information that we refer to is as follows:
• In December 2009, following an earlier decision and stipulation dated the end of January 2009 which we have referred to in previous reports, the specifics of the agreed-upon, fully transparent, taxable, on-balance sheet US Dollar Refunding Programme were allocated by means of a Line-Item specification to Mr Michael C. Cottrell, B.A., M.S., and his corporation.
This was mandated by the World Court, the Bank for International Settlements (B.I.S., Basel), and representatives of the British Monarchical Power.
• In December 2009, Mr Leo/Lee Wanta was scratched off the list in question.
CYNICAL ABUSE OF PROFESSIONAL PROTECTION OF OUR SOURCES
The Editor has hitherto used his skills and discretion to withhold this sensitive information from the public domain, which the Editor thought, professionally, was the right thing to do.
However it has come to our specific notice that the official US criminalist cadres and their banking sector fraudster associates have in fact been USING THE FACT THAT WE HAVE WITHHELD THIS INFORMATION FROM THE PUBLIC DOMAIN, as cover for the continued illegal and criminal misuse of funds which do not belong to them and which should have been disgorged a very long time ago. They have brazenly sought to exploit this Editor’s professional caution as cover for the continued exploitation of the funds that they have systematically diverted, stolen, misused, leveraged and otherwise criminally expropriated contrary to the Rule of Law.
• IN SUMMARY, THEREFORE:
(1): The referenced detailed exposures, duly ‘ratcheted up’ as we warned in advance, should the criminal diversions continue, are sourced from Michael C. Cottrell, B.A., M.S., who is of course in a position to back up everything that we have published.
(2): Furthermore, cheap and libellous insinuations that the Editor has invented the information in question and that because he is a Brit he is not entitled to the information, are not only deserving of contempt, but indicate the scurrilous mindset of certain parties, some of whom have been stupid enough (given the circumstances that we have publicised) to email the Editor with their complaints along these lines. The detailed exposures are contained in the documents provided to us by the above-mentioned impeccable source. Behind those documents are Mr Cottrell’s own papers and recorded, dated and timed information. Only a fraction of the identities of people involved in these criminal financial shenanigans has so far been revealed.
(3): The shilly-shallying, serial dishonesty, false promises, deliberately misleading undertakings, scurrilous website insinuations, ‘Black’ libels and lies, the false ‘release’ starts and schedules, and all the rest of the familiar abominations that these exposed criminalists have been perpetrating, and which we have been recording, are ALL intended to try to PREVENT application of the Line-Item payment in favour of Mr Cottrell, triggering the Dollar Refunding Programme which is mandated as specified above – while enabling the crooks to continue their exploitation of the stolen funds.
(4): The Editor’s reticence, for professional reasons, in respect of revealing the above information earlier, has been cynically exploited by these unspeakable US criminal operatives so as to provide themselves with cover for a continued cascade of illegal financial trading operations, prolonging the situation. Therefore, it is time to put a stop to this by revealing what we have now revealed.
OPERATION STILLPOINT AND THE PONZI VICTIMS
In our report dated 7th January 2010, we described the Five Stages of OPERATION STILLPOINT, of which Stage 1 was as follows:
• Stage 1:
Developing myriad Ponzi schemes and giga-thefts, of infinite variety, and BY ANY MEANS,
in order to procure ‘base money’ for open-ended unreported, off-balance sheet leveraging
and hypothecation operations.
All contributors to the ‘programs’ were USED and ABUSED. The essence of a Ponzi scheme is that the principal is STOLEN. That is what happened. However, the following is ALSO true:
• A proficient criminal mind ALWAYS seeks to ensure that his target IS CRIMINALISED TOO. His objective is to compromise the target so that as soon as the target yields to the pressure and starts to participate, he is CAUGHT, like a fish – and CANNOT ESCAPE.
Once the target has been compromised, the criminal mind believes that its owner is protected from the consequences of his criminal behaviour, and from exposure.
Excluding the CMKM/CMKX victims, many participants in Ponzi schemes, in addition to being USED and ABUSED by these swine, were converted at once into becoming de facto CO-CONSPIRATORS – because they were, wittingly or unwittingly (and ignorance of the law is no excuse), contributing funds for exploitation under OPERATION STILLPOINT, one ultimate purpose of which was to ‘take down’ the United States. Ignoring the investment ‘Prudent Man Rule’ is not illegal: it’s just foolish. But involvement, even inadvertently, in a scheme to ‘take down’ the United States, is TREASON.
Now, harsh though this REALITY may seem, here is an even HARSHER reality. Hitherto, we have tended to assume that the underlying purpose of the never-ending muckraking, idiotic nonsense about ‘packages’ posted on certain US websites, has been (metaphorically speaking) to ‘prevent 320,000 injured parties in the United States reaching for their guns simultaneously’: in other words, to keep the lid on these victims’ understandable resentment at having been fleeced, scammed, ransacked, ravaged, and all of the above by the serpents we have exposed.
But it’s worse. In the light of the foregoing new understanding, it is now clear that the purpose of this cruel, cynical and odious CIA operation to bamboozle the Ponzi scheme victims has been to keep them on a leash, expecting ultimate payout – because in fact the victims themselves were made co-conspirators, and the perpetrators have been anxious for this not to be understood.
• And WHY is that? Because, if the Ponzi victims are co-conspirators, then, by definition, the perpetrators of these scams are criminals: AND UNDER THE NEW POLICY at the US Department of Justice, they get investigated and prosecuted, and go to jail. The cynical controlled websites have been trying to bamboozle the bitter victims by obfuscating these unpleasant realities – which have indeed become much more pertinent since the formal CHANGE OF POLICY at the US Department of Justice that occurred, under pressure from the Lien Holders, in December 2009.
• GUIDANCE NOTE: The CMKM/CMKX victims/participants recognised that they had been misled and scammed, took legal action, obtained Court approval, and thereby acquired STANDING which has enabled the class action filed in the United States District Court, Central District of California, Case #: CV10-00031-JVS (MLGx), to proceed. See Complaint text as filed: 9th January 09: ARCHIVE. The plaintiffs are suing the Securities and Exchange Commission for no less than $3.87 trillion.
• CRITICAL CONSIDERATION: With the law firm handling the supposed ‘distribution’ having been taken over by INTERPOL and shut down, with all its computers and files removed, USE OF FUNDS can no longer be hidden. The corrupt law firm was hiding use of funds. SEE BELOW:
‘DISTRIBUTION LAW FIRM CLOSED DOWN BY INTERPOL’
In our report dated 9th January 2010, under the heading ‘The Troutman Sanders LLP dimension’
we stated as follows:
‘On both 7th and 8th January 2010, it was emphasised to us by several sources that if a single penny [of the funds that the law firm in question was reportedly entrusted to distribute] were misrouted or misappropriated, then (a) the key personnel [of this firm] would be arrested and (b) the firm’s doors would have to be closed and it would cease to be in business come next week.
We also asked these questions:
• Will this firm be in business next week [i.e, TODAY – Ed.]?
• IS INTERPOL doing its job adequately?
At 9.25pm UK time on Sunday 10th January 2010, we were informed in a transatlantic telephone call by usually reliable US sources (not Mr Michael C. Cottrell) that, EXACTLY as anticipated in our 9th January report, ‘INTERPOL took over Troutman Sanders at the weekend, has removed all their computers and files, and the firm is no longer operative’.
When this matter was put separately to another ‘inside’ US contact, the response (as though this development was known by the contact) was: ‘I wouldn’t find that surprising’.
This raises the key question, which we are now authorised to ask:
‘Who is instructed to pay the Basel-mandated Line-Item for the Dollar Refunding Programme to Mr Cottrell/his corporation’?
This relates to the following demand published with the report dated 9th January 2010 [given that the Line-Item is mandated by the specified authorities as indicated above]:
• MEMORANDUM TO MI-6 ET AL:
MAY THE RELEVANT PARTY HAVE CONFIRMATION OF THE LINE-ITEM PAYMENT PLEASE. CONSTANT SHILLY-SHALLYING BY STATESIDE SOURCES ON THIS SUBJECT HAS BEEN EXPERIENCED. WE HAVE BEEN ASKED TO SAY THAT THIS IS A DEMAND, NOT A REQUEST.
SOURCES THREATENED • MANY PEOPLE ‘TAKEN OUT’ AT THE WEEKEND
In addition to all of the above, the Editor also established as follows:
• Our deduction in the report dated 9th January that the sudden collective amnesia that infected all sources on 7th and 8th January following the diversion of about $1.3 trillion to and by the White House/CIA, may well have been attributable to bribery, was considered accurate by observers.
But sources have elaborated that there was some evidence that people had been THREATENED, which was why they fell silent. That is also very likely.
• According to sources, too, quote ‘quite a few people were taken out at the weekend’
[9th-10th January 2010]:
Editor: ‘Do you mean, in the ‘harshest’ sense of the term ‘taken out’?’
• Finally, a subscriber and correspondent well known to the Editor informed us on 10th January [at 01:51 UK time] that Bush Sr. and Barbara Bush were pointed out by the relevant broadcast network attending ‘Patriots’ playing Houston at Reliant Stadium in Houston, on Sunday 3rd January 2010.
‘Babs was at his side looking “intense”. What was interesting was that Senior had his mouth open though he was not speaking, hair disheveled [and] looking slightly perplexed… he had the ‘look’ of a person with an apparent mental incapacity’.
The correspondent thought that the fact that the Bushes were pointed out ‘seemed contrived, suggesting that the interested are watching/reading your every word’.
LIST OF U.S. STATUTES, SECURITIES REGULATIONS AND LEGAL PRINCIPLES OF WHICH THE CRIMINALISTS, ASSOCIATES AND ALL THE MAIN FINANCIAL INSTITUTIONS REMAIN IN BREACH:
LEGAL TUTORIAL: The Steps of Common Fraud:
Step 1: Fraud in the Inducement: “… is intended to and which does cause one to execute an instrument, or make an agreement… The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to the true facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:
• “ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when it causes injury to another…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
• “THE TORT OF FRAUDULENT DECEIT… The elements of actionable deceit are: A false representation of a material fact made with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent to induce reliance thereon, on which plaintiff justifiably relies on his injury…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Deceit’.
Step 3: Theft by Deception and Fraudulent Conveyance:
THEFT BY DECEPTION:
• “FRAUDULENT CONCEALMENT… The hiding or suppression of a material fact or circumstance which the party is legally or morally bound to disclose…”.
• “The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable, arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under such circumstances being equivalent to an actual ‘fraudulent concealment’…”.
• To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escape investigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be of an affirmative character and fraudulent…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Concealment’.
• “FRAUDULENT CONVEYANCE… A conveyance or transfer of property, the object of which is to defraud a creditor, or hinder or delay him, or to put such property beyond his reach…”.
• “Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Conveyance’.
U.S. SECURITIES REGULATIONS OF WHICH INSTITUTIONS
HAVE BEEN SHOWN TO BE IN BREACH [SEE REPORTS]:
• NASD Rule 3120, et al.
• NASD Rule 2330, et al
• NASD Conduct Rules 2110 and 3040
• NASD Conduct Rules 2110 and IM-2110-1
• NASD Conduct Rules 2110 and SEC Rule 15c3-1
• NASD Conduct Rules 2110 and 3110
• SEC Rules 17a-3 and 17a-4
• NASD Conduct Rules 2110 and Procedural Rule 8210
• NASD Conduct Rules 2110 and 2330 and IM-2330
• NASD Conduct Rules 2110 and IM-2110-5
• NASD Systems and Programme Rules 6950 through 6957
• 97-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.
U.S. LAWS ROUTINELY BREACHED BY THE CRIMINAL OPERATIVES AND INSTITUTIONS:
• Annunzio-Wylie Anti-Money Laundering Act
• Anti-Drug Abuse Act
• Applicable international money laundering restrictions
• Bank Secrecy Act
• Crimes, General Provisions, Accessory After the Fact [Title 18, USC]
• Currency and Foreign Transactions Reporting Act
• Economic Espionage Act
• Hobbs Act
• Imparting or Conveying False Information [Title 18, USC]
• Maloney Act
• Misprision of Felony [Title 18, USC] (1)
• Money-Laundering Control Act
• Money-Laundering Suppression Act
• Organized Crime Control Act of 1970
• Perpetration of repeated egregious felonies by State and Federal public employees and their Departments and agencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustain fraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours by present and former holders of high office under the United States
• Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R. 3723]
• Provisions prohibiting the bribing of foreign officials [F.I.S.A.]
• Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]
• Securities Act 1933
• Securities Act 1934
• Terrorism Prevention Act
• Treason legislation, especially in time of war.
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
We are a private intelligence publishing house and have no connections to any outside parties including intelligence agencies. The word ‘intelligence’ on this website and in all our marketing material is used for marketing/sales purposes only and has no other connotations whatsoever: see ‘About Us’ on the red panels under the Notes on the Editor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor, Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreign power, suggestions to the contrary being actionable for libel in the English Court.
ADVERTISEMENT: INTERNET SECURITY SOLUTION
YOU CAN ORDER THIS DIRECT FROM THIS WEBSITE. Summary:
Press Internet Security Solution or go to the World Reports Limited serials catalogue and scroll down until you come to this product. Then proceed through the simple and ultra-safe ordering procedure [Visa or MasterCard only]. Send a donation as you order this RECOMMENDED solution.
NON-U.S. INTERNET SECURITY SOLUTION CD AVAILABLE: FAR BETTER THAN NORTON ETC
It has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, and others, in pursuit of the Pentagon’s vast BIG BROTHER objective, directed from the ‘highest’ levels (not the levels usually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA’s master computers.
This should come as no real surprise since the cynical spooks even assert this ‘in-your-face’ by advertising ‘INTEL INSIDE’, which says exactly what it means. More specifically, NSA have made great strides in this direction by having a back door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the ‘fully collaborating’ firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling of personal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable ‘file and printer sharing’ under any circumstances. If you say ‘YES’, so to speak, to ‘file and printer sharing’, your computer becomes a slave at once to NSA’s master computers. DO NOT ENABLE SHARING.
Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. As long as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spying system which assists the criminalised structures, and thus hitherto the Bush-Clinton ‘Box Gang’ and its connections, with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge of data theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracy regards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much more problematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virus software. Having been attacked and abused so often, we offer a solution.
We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack and virus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends, at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, you will be helping us finance ongoing exposures of the DVD’s World Revolution and the financial corruption that has been financing it.
The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOT to solve your Internet security problems, but to spy on you and to report what you write about, to centralised US electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same time helping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, by ordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertising on this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appear to have a collective mental age of about five years, judging by their output.
• To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, or else press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scroll right down to the foot of that section, where you will see details of this service. When you buy this special product, you will also, as we clearly state above, be paying a special premium by way of a donation to help us finance these exposures.
The premium contains a donation for our exposure work and also covers our recommendation based on the Editor’s own experience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has an invaluable ‘Preview before downloading’ feature.
• It is suitable for PC’s but not Mac computers. As with all such programs, the License is renewable at a modest fee annually. This is done on-line in the usual way [with the supplier direct].
*VISTA: Virtual Instant Surveillance Tactical Application.