U.S. TREASURY WILL BE IN DEFAULT IF NO SETTLEMENTS BY SATURDAY MIDNIGHT
Friday 12 February 2010 02:35
• THE TWO SETS OF BOOKS
• THERE’S THE DUPLICATED $4.2+ TRILLION
• TAX IS PAYABLE WITHIN 45 DAYS MAXIMUM OF PAYMENT
• THE QUESTION THE TREASURY SECRETARY CANNOT ANSWER
• THEY DIVERTED THE TAX MONEY, THEN PUT IT OUT
• DIVERTED $4.2+ TRILLION WILL BECOME EMBEZZLED $4.3+ TRILLION
• EMBEZZLEMENT OF $4.2+ TRILLION OF TAXPAYERS’ FUNDS
• THE CMKM/CMKX LAWSUIT AND THE PENDING JOHN DOE CASE
• A LETHAL COMBINATION WITH NO HISTORICAL PRECEDENT
• NEW [NOT REALLY]: THE PRINCIPALITY OF SNAKE HILL DECEPTION
There is no such entity as ‘the Principality of Snake Hill’, notwithstanding the ongoing delusions of fake ‘Ambassador’ Leo/Lee Emil Wanta. He ‘needs’ ‘Snake Hill’ inter alia so that he can continue to designate himself as ‘Ambassador’ of The Principality of Snake Hill to the United States; but as we reported when first exposing this crude lie in our report dated 20 September 2009 (repeated in our reports dated 22nd October and 17th November 2009), since this virtual entity does not exist, he is not an Ambassador. When asked to proffer his Ambassadorial credentials signed by the Secretary of State, his lawyer, Thomas Henry, could not do so. Mr Henry intimidated this Editor in a typically unpleasant letter in which he asserted that he represented Mr Wanta and representatives of The Principality of Snake Hill, which does not exist. He therefore committed fraud against the Editor of this service. The US Department of Transportation have told Mr Wanta in no uncertain terms that they will not deal with him in respect of any project: yet Wanta is continuing to email large numbers of people styling himself as ‘Ambassador’ and using the fake, virtual ‘Principality of Snake Hill’ as his address/provenance, in an attempt to latch onto High Speed Rail. THIS IS FRAUD. The man is a felon, cannot own a bank account, has stolen money from others (including this Editor’s loan funds which he should have repaid with interest on 11th June 2007) and is completely duplicitous. He operates as a de facto ‘sib’ for the cornered Bush kleptocracy. ‘Sib’: The Victim = The Perpetrator.
• Furthermore, the 202 number that Wanta uses to display his fake virtual ‘Snake Hill’ garbage is a number supplied by the FRENCH EMBASSY IN WASHINGTON. As previously demonstrated, France and Germany are joined at the hip by the Treaty of the Elysee [January 1963], of indefinite duration, which requires both powers to reach ‘an analogous position’ in respect of ALL international issues. The French FRONT FOR THE GERMANS, and Germany is in fact directed by the modern heirs of the Abwehr, namely DVD, Dachau. Mr Leo Wanta is an agent for the DVD: he answers the phone in DEUTSCH, and he spells telephone TELEFON. This appears to be something that is too hard for American operatives to understand. So what master do such people serve, then? The DVD or the United States? And what master do the duplicitous MI-6 operatives who are supposed to be fixing this serve? The Queen, or DEUTSCHE VERTEIDIGUNGS DIENST?
MISPRISION OF FELONY: U.S. CODE, TITLE 18, PART 1, CHAPTER 1, SECTION 4:
‘Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some Judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both’.
‘Seeing what’s at the end of one’s nose requires constant effort’. George Orwell.
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
• BOOKS: Edward Harle Limited has so far published FIVE intelligence titles: The Perestroika Deception, by Anatoliy Golitsyn; Red Cocaine, by Dr Joseph D. Douglass, Jr.; The European Union Collective, by Christopher Story; The New Underworld Order, by Christopher Story; and The Red Terror in Russia, by Sergei Melgounov. All titles are permanently in stock. We sell books DIRECT.
• ADVERTISEMENT: Details of the INTERNET SECURITY SOLUTION software offered by this service in conjunction with a donation can be accessed immediately: See the Home Page World Reports Limited serials catalogue by clicking World Reports Limited and scrolling to foot of page. Scroll to the foot of THIS page to read our extended Ad. for the INTERNET SECURITY SOLUTION.
• Christopher Story FRSA, Editor and Publisher, International Currency Review, World Reports Limited, London and New York. For earlier reports, press the ARCHIVE. Order your intelligence subscriptions and ‘politically incorrect’ [i.e., correct] intelligence books online from this website.
• CMKM/CMKX CASE DOCUMENTS:
Press Archive for this report [29th January 2010]
Case Number CV10-00031 JVS (MLGx):
SERVICE OF CMKM.CMKX $3.87 TRILLION SUIT VS. S.E.C.
You can also access the CMKM/CMKX text at: http://viewer.zoho.com/docs/paKdda
The biggest lawsuit in world legal history: The phantom share giga-scandal.
• See also: Legal moves to sue those blocking the Settlements: 7th February report [Archive].
NEW REPORT STARTS HERE
WHAT ARE THEY COVERING UP?
A line of enquiry that we should perhaps have used more often is to ask ourselves: ‘What are they covering up?’. In the prevailing context, it can be surmised that the answer to that question will probably have contributed to William Jefferson Rockefeller-Clinton’s heart problems.
What are they covering up?
As we reported earlier, the TAX was deducted from the Settlements monies effective from 31st December 2009. If we assume for current purposes that the Settlement monies aggregate about $14.0 trillion, then tax at 30% yields $4.2 trillion. In our report dated 28th December, we flagged the reported intent to divert $4.0 trillion of public funds [see Archive].
THE TWO SETS OF BOOKS
In order for diversion of funds to be ‘successful’, the source of the funds targeted for diversion must be obfuscated. These professional criminal financiers normally do this by creating two sets of books, which may entail two actual batches of cash, as in this case.
In the report dated 28th December 2009, we identified the second amount of about $4.0 trillion needed for this corrupt purpose. Specifically, it would consist of:
• The difference between the Debt Subject to Statutory Limit of $9,959,850 million for Fiscal Year 2008, which was raised in December 2009, to $12.4 trillion. The difference is $2.4 trillion. The 2010 Federal Budget documentation estimated that the 2010 Debt Subject to Statutory Limit would be raised to $12,843,344 million, representing an increase from the previous cap of $2,884 billion: so there’s another $400 billion in the wings.
• The debt cap of $400 billion previously applicable to the former GSEs (Government-Sponsored Enterprises), Fannie Mae and Freddie Mac, was removed. Therefore, another $400 billion or so of official background debt based on Collateralised Debt Obligations and Collateralised Mortgage Obligations ‘can be’ floated, as the old cap has been discontinued.
• Obama’s 2,000+ page social engineering healthcare legislation will not only create brand new permanent cash pipelines, ripe for diversion by the kleptocracy into Fraudulent Finance trading operations, but will also be financed by an initial $1.0 trillion of ‘seed money’.
THERE’S THE DUPLICATED $4.2+ TRILLION
$2.9 trillion (taking the Statutory Debt Ceiling total estimated for FY 2010) plus $0.4 trillion from the removal of the cap applicable to the former GSEs plus the $1.0 trillion playmoney to be released with the Leninist healthcare legislation, yields $4.3 trillion = the counterpart to the diverted tax monies of approximately $4.2 trillion identified above.
TAX IS PAYABLE WITHIN 45 DAYS MAXIMUM OF PAYMENT
Now although the tax WAS taken from the Settlements monies effective 31st December – so that, as we pointed out, the taxes would be technically applicable to the 2009 calendar year – the hijacked Settlements payments had not been made by the time this report was posted.
Which may explain Clinton’s heart attack, because:
• Taxes must be remitted within 30 days, plus an extension of 15 days, i.e. 45 days. Now 45 days after 31st December is Sunday 14th February 2010.
• The tax accruals that were taken out on 31st December have not been reflected in the US Treasury’s ledgers because these funds ‘appeared out of nowhere’. If the tax accruals from this source were to have been credited to the Treasury’s accounts, all the fancy creative accounting perpetrated by the Office of Management and Budget would be toast – as would all concerned, because the Treasury Secretary and everyone beneath him would be asked in unison:
‘What is the source of these funds?’
THE TREASURY SECRETARY CANNOT ANSWER THAT QUESTION
Neither the Treasury Secretary nor anyone else in authority can answer that question without lying; and they are not about to come clean and say: ‘The money on which the tax was based represents restitution monies to recompense victims for what officials and office-holders inside successive US Governments stole from them from 1984 onwards’.
THEY DIVERTED THE TAX MONEY, THEN PUT IT OUT
So the criminal financiers in the Treasury did what criminal financiers do: they diverted the money first, and then worked out what to do with it afterwards (in a manner of speaking). When they had decided what to do with the money, they:
• Bunged $100 billion of it to a well-known false-religion outside collaborating party, we’re told.
• Placed the bulk of it into contract: indeed we told you where they would be bunging it: into trading operations involving China Trust Bank (run by the ‘bad’ Chinese), Deutsche Bank, and Barclays Bank. As we know, Deutsche Bank AG is controlled by Dr Joseph Ackermann, who’s a partner in Deutsche AG (aka Barrington Investment Group) with Godfather George H. W. D. V. D. Bush Sr., Mikhail Gorbachëv (Orbach or Korbach), the former Soviet President who maintains a large office inside the Kremlin to this day, and Dr Helmut Kohl, former Chancellor of Germany.
• These are the three leading Illuminated Ones who created the scamming free-for-all stealing-fest with the take-down of the Soviet Union – the precursor to the second leg of the same intelligence operation: the take-down of the United States.
As we have also proved, these gentlemen (Financial Terrorists, rather) handle stolen funds, from which they benefit inter alia through their partnerships in Deutsche AG, St Gallen, Schweitz.
DIVERTED $4.2+ TRILLION WILL BECOME EMBEZZLED $4.3+ TRILLION
The problem here is that the Settlements MUST be paid out by midnight this Saturday, or else:
• The tax monies of approximately $4.2 trillion which have so far been diverted, will become EMBEZZLED FUNDS OVERNIGHT by Sunday morning 14th February 2010, which is to say:
• The criminal financiers holding highest offices will stand accused of having STOLEN $4.2+ trillion (approximately) from the US taxpayer – since these funds should be credited to the US Treasury’s books, and those who have been stealing and fiddling the books should face the consequences (the rest of their lives in jail, or execution at dawn for embezzlement in time of war).
• Alternatively, the diverted tax monies will need to have been recredited to the bank accounts holding the hijacked Settlements funds on 14th February at the very latest.
EMBEZZLEMENT OF $4.2+ TRILLION OF TAXPAYERS’ FUNDS
So, in the prevailing context, if we ask the straightforward question: ‘What are they covering up?’, we wind up with the following answers:
(1): An intent to embezzle $4.3 trillion of tax accruals belonging to the US taxpayer.
(2): If they don’t pay out the Settlements funds by midnight on 13th February 2010, a TECHNICAL DEFAULT BY THE U.S. TREASURY, as well; with the $4.3 trillion of tax monies belonging to the US taxpayer, ‘missing’: a US Government ‘insider’ scandal even bigger than CMKM/CMKX.
THE CMKM/CMKX LAWSUIT AND THE PENDING JOHN DOE CASE
You will of course have taken on board from this website that the lawyers for the CMKM/CMKX victims are suing the Securities and Exchange Commission and SEC personnel, past and present, for a money payment of $3.87 trillion in connection with the fraudulent floatation of 2.25 trillion of Phantom Shares in CMKM/CMKX, and that Kathleen Cody, of the SEC’s Office of General Counsel, has accepted service of the Summons on behalf of defendants in their official capacities.
You will also doubtless have taken on board that a John Doe case will follow, associated with the CMKM/CMKX case, demanding inter alia payment of monies due to Pennsylvania Investments, Inc. and the disgorging of the diverted $6.2 trillion sovereign LOAN funds required for the US Dollar Refunding Programme. This John Doe case will enable ten alleged perpetrators BY NAME to be subpoenaed, starting with the President of the United States. Further ‘John Doe’ extensions may also be allowed at the discretion of the court.
A LETHAL COMBINATION WITH NO HISTORICAL PRECEDENT
And you will also readily understand that the combination of the factors itemised above (plus other damning dimensions of this corruption which will inevitably emerge in the court, with devastating consequences for all those concerned) with the revelation that the Secretary of the Treasury, the President of the United States, the US Secretary of State, the Director of Central Intelligence and others have EMBEZZLED $4.3 trillion of monies belonging to the account of the US taxpayer, will most certainly create a situation without precedent in the history of the United States.
If this is accompanied this weekend by a TECHNICAL DEFAULT on the Settlements (because the Settlements are not paid and taxes taken off the Settlements have been stolen from them and from the US taxpayer and not restored within the timeframe), the developing situation in the financial markets may likewise have no precedent in history. As for the reactions of US taxpayers to any such gross theft of funds which should be credited to their account, one can only speculate.
Last-ditch criminal attempts to leverage the Jewish (by his own admission) Iranian, President Ahmadinejad, whose family name is Sabourjian (the Jewish maker of the prayer shawl, sabour meaning ‘Jewish prayer shawl’ and ‘jian’ meaning Jew in Farsi) into providing Israel and the United States with a pretext for an illegal satanic attack on Iran, will not make the slightest difference to any of the above – except by diverting attention and setting half the world alight in the process.
The fact is: time’s up for the crims. No wonder Mr Rockefeller-Clinton’s got pains in his chest.
LIST OF U.S. STATUTES, SECURITIES REGULATIONS AND LEGAL PRINCIPLES OF WHICH THE CRIMINALISTS, ASSOCIATES AND ALL THE MAIN FINANCIAL INSTITUTIONS REMAIN IN BREACH:
LEGAL TUTORIAL: The Steps of Common Fraud:
Step 1: Fraud in the Inducement: “… is intended to and which does cause one to execute an instrument, or make an agreement… The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to the true facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Hauppauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:
• “ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when it causes injury to another…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
• “THE TORT OF FRAUDULENT DECEIT… The elements of actionable deceit are: A false representation of a material fact made with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent to induce reliance thereon, on which plaintiff justifiably relies on his injury…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Deceit’.
Step 3: Theft by Deception and Fraudulent Conveyance:
THEFT BY DECEPTION:
• “FRAUDULENT CONCEALMENT… The hiding or suppression of a material fact or circumstance which the party is legally or morally bound to disclose…”.
• “The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable, arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under such circumstances being equivalent to an actual ‘fraudulent concealment’…”.
• To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escape investigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be of an affirmative character and fraudulent…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Concealment’.
• “FRAUDULENT CONVEYANCE… A conveyance or transfer of property, the object of which is to defraud a creditor, or hinder or delay him, or to put such property beyond his reach…”.
• “Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Conveyance’.
U.S. SECURITIES REGULATIONS OF WHICH INSTITUTIONS
HAVE BEEN SHOWN TO BE IN BREACH [SEE REPORTS]:
• NASD Rule 3120, et al.
• NASD Rule 2330, et al
• NASD Conduct Rules 2110 and 3040
• NASD Conduct Rules 2110 and IM-2110-1
• NASD Conduct Rules 2110 and SEC Rule 15c3-1
• NASD Conduct Rules 2110 and 3110
• SEC Rules 17a-3 and 17a-4
• NASD Conduct Rules 2110 and Procedural Rule 8210
• NASD Conduct Rules 2110 and 2330 and IM-2330
• NASD Conduct Rules 2110 and IM-2110-5
• NASD Systems and Programme Rules 6950 through 6957
• 97-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.
U.S. LAWS ROUTINELY BREACHED BY THE CRIMINAL OPERATIVES AND INSTITUTIONS:
• Annunzio-Wylie Anti-Money Laundering Act
• Anti-Drug Abuse Act
• Applicable international money laundering restrictions
• Bank Secrecy Act
• Crimes, General Provisions, Accessory After the Fact [Title 18, USC]
• Currency and Foreign Transactions Reporting Act
• Economic Espionage Act
• Hobbs Act
• Imparting or Conveying False Information [Title 18, USC]
• Maloney Act
• Misprision of Felony [Title 18, USC] (1)
• Money-Laundering Control Act
• Money-Laundering Suppression Act
• Organized Crime Control Act of 1970
• Perpetration of repeated egregious felonies by State and Federal public employees and their Departments and agencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustain fraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours by present and former holders of high office under the United States
• Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R. 3723]
• Provisions prohibiting the bribing of foreign officials [F.I.S.A.]
• Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]
• Securities Act 1933
• Securities Act 1934
• Terrorism Prevention Act
• Treason legislation, especially in time of war.
• BEWARE OF MALICIOUS IMITATIONS: It has come to our notice that certain websites have been in the habit of copying reports from this site, attributing the reports to the Editor of this service, but at the same time AMENDING AND INSERTING TEXT NOT WRITTEN BY THE EDITOR.
• This is a very old, malevolent US counterintelligence DIRTY TRICK.
Therefore, you should be advised that the GENUINE ORIGINAL REPORT is, by obvious definition, accessible ONLY FROM THIS WEBSITE. If you come across an article elsewhere that is attributed to the Editor of this service, you should refer to the ORIGINAL ARTICLE HERE and you should bear in mind that the illegally duplicated article may contain text that was NOT written by the Editor of this service, but which was inserted for malicious purposes by counterintelligence.
Likewise, although we haven’t yet had time to elaborate this issue, we have taken drastic steps around the world to close off the malicious piracy of our books. One technique used by several disreputable sites (in the United States, the Netherlands and Switzerland) is to copy our title(s) and (a) to display an image of the front cover WITHOUT THE ISBN DATA at the top of the cover; and (b) to DELETE THE COPYRIGHT PAGE. In so doing, the criminal pirates proclaimed that they knew perfectly well that they were/are engaged in theft and can be prosecuted for stealing copyright.
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
We are a private intelligence publishing house and have no connections to any outside parties including intelligence agencies. The word ‘intelligence’ on this website and in all our marketing material is used for marketing/sales purposes only and has no other connotations whatsoever: see ‘About Us’ on the red panels under the Notes on the Editor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor, Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreign power, suggestions to the contrary being actionable for libel in the English Court.
ADVERTISEMENT: INTERNET SECURITY SOLUTION
YOU CAN ORDER THIS DIRECT FROM THIS WEBSITE. Summary:
Press Internet Security Solution or go to the World Reports Limited serials catalogue and scroll down until you come to this product. Then proceed through the simple and ultra-safe ordering procedure [Visa or MasterCard only]. Send a donation as you order this RECOMMENDED solution.
NON-U.S. INTERNET SECURITY SOLUTION CD AVAILABLE: FAR BETTER THAN NORTON ETC
It has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, and others, in pursuit of the Pentagon’s vast BIG BROTHER objective, directed from the ‘highest’ levels (not the levels usually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA’s master computers.
This should come as no real surprise since the cynical spooks even assert this ‘in-your-face’ by advertising ‘INTEL INSIDE’, which says exactly what it means. More specifically, NSA have made great strides in this direction by having a back door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the ‘fully collaborating’ firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling of personal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable ‘file and printer sharing’ under any circumstances. If you say ‘YES’, so to speak, to ‘file and printer sharing’, your computer becomes a slave at once to NSA’s master computers. DO NOT ENABLE SHARING.
Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. As long as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spying system which assists the criminalised structures, and thus hitherto the Bush-Clinton ‘Box Gang’ and its connections, with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge of data theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracy regards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much more problematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virus software. Having been attacked and abused so often, we offer a solution.
We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack and virus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends, at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, you will be helping us finance ongoing exposures of the DVD’s World Revolution and the financial corruption that has been financing it.
The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOT to solve your Internet security problems, but to spy on you and to report what you write about, to centralised US electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same time helping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, by ordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertising on this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appear to have a collective mental age of about five years, judging by their output.
• To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, or else press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scroll right down to the foot of that section, where you will see details of this service. When you buy this special product, you will also, as we clearly state above, be paying a special premium by way of a donation to help us finance these exposures.
The premium contains a donation for our exposure work and also covers our recommendation based on the Editor’s own experience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has an invaluable ‘Preview before downloading’ feature.
• It is suitable for PC’s but not Mac computers. As with all such programs, the License is renewable at a modest fee annually. This is done on-line in the usual way [with the supplier direct].
*VISTA: Virtual Instant Surveillance Tactical Application.