lien us treasury 20091216

Upload: trueace

Post on 30-May-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Lien Us Treasury 20091216

    1/6

    http://worldreports.org/news/252_treasury_secretary_read_his_rights_and_tagged

    Back to Archive Print Donate

    Send email linkto this report

    TREASURY SECRETARY READ HIS RIGHTS AND TAGGED

    FORMER TREASURY SECRETARY PAULSON FORCIBLY TAKEN BY MI-6 TO BERMUDA

    Wednesday 16 December 2009 07:00PLUS: THE NOTORIOUS BOX GANG HAS BEEN DESTROYED

    NOTE: This is to be read in the context of the report dated 14th December [Archive]

    TIMOTHY GEITHNER CONFRONTED, PASSPORT AND DRIVERS LICENSE REMOVED

    GEITHNER HAD FAILED TO LISTEN TO THE ENFORCEMENT WARNINGS AND INSTRUCTIONS DELIVERED TO HIM ONSUNDAY. HE THOUGHT HE WAS ABOVE INTERNATIONAL LAW

    U.S. TREASURY SECRETARY: YOU CANT DO THIS TO ME: YES WE CAN

    CRIMINAL FINANCIER PAULSON HAD BEEN PULLING GEITHNERS STRINGS

    MI-6 AND INTERPOL REMOVE PAULSON TO BERMUDA

    CURRENCY BOXES SEIZED FROM THE BOX GANG

    NONE OF BOX GANG MEMBERS WILL RECEIVE A PENNY

    CONTENTS OF THEIR BOXES DESTROYED AS CONTRABAND

    TREASURY ASKED FOR MORE CHINESE CURRENCY BOXES ON LOAN.THE CHINESE REFUSAL AND WHY: FUNDS WERE BEING SWITCHED TO ACKERMANN

    CORRUPT LEGISLATORS AND ANOTHER: NOT BEING PAID EITHER.

    MISPRISION OF FELONY: U.S. CODE, TITLE 18, PART 1, CHAPTER 1, SECTION 4:Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, concealsand does not as soon as possible make known the same to some Judge or other person in civil or military authorityunder the United States, shall be fined under this title or imprisoned not more than three years, or both.

    BOOKS: Edward Harle Limited has so far published FIVE intelligence titles: The Perestroika Deception, by AnatoliyGolitsyn; Red Cocaine, by Dr Joseph D. Douglass, Jr.; The European Union Collective, by Christopher Story; The NewUnderworld Order, by Christopher Story; and The Red Terror in Russia, by Sergei Melgounov. All titles are permanentlyin stock. We sell books DIRECT.

    Globalist hegemony ideology and practice are comprehensively debunked in the Editor's study entitled The NewUnderworld Order, which can be ordered via the books section of this website. If you want to see what may well happenif the angle of decline steepens much further, you could do worse than also order a copy of The Red Terror in Russia, bythe contemporary Russian eyewitness Sergei Melgounov, another Edward Harle Limited book available direct from thiswebsite. Also, the Editor's study entitled The European Union Collective, which proves that the EU is a long-rangestrategic entrapment operation to reduce European countries to satrap status within a German empire using economicstrategy for relentless economic warfare purposes, can be bought here.

    Please Make a Donation, if you feel able to do so, to help finance Christopher Story's ongoing global financialcorruption investigations. Your assistance will be very sincerely appreciated and will make a real difference, hasteningthe OVERDUE resolution of the worst financial corruption and linked financial fallout in world history. Just press Make aDonation, which is live, and it takes you straight to our ultra-safe ordering system, which accepts Visa and MasterCard.Or press the live Donate link at the top right-hand corner of this page. See also the ADVERTISEMENT below.

    See the SECOND WHITE PANEL ON THE HOME PAGE for updated information on our very latest subscription-based

  • 8/14/2019 Lien Us Treasury 20091216

    2/6

  • 8/14/2019 Lien Us Treasury 20091216

    3/6

    economic and financial terrorism policies espoused by Paulson when he was US Treasury Secretary policies that havewantonly saddled American taxpayers with colossal extra official debts that have to be serviced down the years throughtax revenues.

    This new US official debt is ALL unnecessary, given that if the fully transparent, private sector taxable Dollar RefundingProgramme had been implemented as signed off by the Group of Seven Financial Powers in 2006 and 2007, none of thepermissive Obamadebt would have been incurred.

    We have repeatedly explained why this is the case: a government, by definition, can only generate debt, as it can not tax

    itself; whereas the private sector creates profits that the government can tax to finance its operations. Elementaryeconomics.

    MI-6 AND INTERPOL REMOVE PAULSON TO BERMUDAAnyway, we now understand that, as of Monday 14th December, Mr Henry M. Paulson Jr. was no longer present in theUnited States. This is because he had been physically transported by MI-6 plus appropriately armed internationalenforcement personnel to Bermuda a British Overseas Territory, where the former US Treasury Secretary is being heldunder British law within British jurisdiction and therefore within the overall power of Her Majesty the Queen, whomPaulson has defrauded of her $6.2 trillion LOAN extended in June 2007 pro bono publico to the United States.

    To sum up, therefore, the two hands-on characters who have been blocking the Settlements have been confronted andeither physically removed from the United States, or placed under extreme constraints that preclude further interferencewith the requirements of the Lien Powers and the international community. This should facilitate completion of thepayments process at last.

    CURRENCY BOXES SEIZED FROM THE BOX GANG, WHICH HAS BEEN DESTROYEDPaulson, it now transpires, was a de facto member of the Box Gang now understood to have consisted of ELEVENoperatives, including of course Bush 41, Clinton 42, Bush 43, Mrs Hillary Clinton, Dr Henry Kissinger, and Dr AlanGreenspan.

    We can now report that this notorious Box Gang has effectively been destroyed a development that requires someexplanation. The members of the Box Gang had custody of a quantity of boxes measuring 2ft by 2ft by about 8 inchesdeep, containing old US currency notes bagged and wrapped in continuous plastic bags (like a string of sausages),plus some gold and miscellaneous precious materials. These boxes are NOT to be confused with the previouslyreferenced currency boxes, including the Chinese boxes rescued with US military assistance from Fort Hood.

    NONE OF BOX GANG MEMBERS WILL RECEIVE A PENNYThe Bushes and other Box Gang members had intended and expected to be paid a fee of 2% for redemption of thevalue of these boxes (which was where the previously reported 2% fee comes from). Since the Box Gang memberscontinued interfering with the Settlements process, as we have laboriously had to report ad nauseam, they were sharplywarned by the international Writ and Lien enforcers that if they continued with their sabotage operations each blamingother members of the gang, according to the familiar criminal pass the parcel method then their boxes would beseized, they would lose their lucrative 2% of the value of the boxes, and they would be prosecuted.

    CONTENTS OF THEIR BOXES DESTROYED AS CONTRABAND

    Since, as we have learned by tiresome experience, these people thought they were above the law, they maintained thisarrogant attitude even when the law that mattered became international law.

    As a consequence, their boxes have been removed from their custody and grasp and, after any gold and other treasurewere extracted, the boxes and their contents have been DESTROYED.

    Under US legislation passed in 2000 and ironically signed into law by President Clinton, all such materials areCONTRABAND.

    Their value (or a fraction thereof) could ONLY be redeemed, if at all, with the Federal Reserve, although in practice theboxes would be confiscated on the spot (as contraband).

    The Box Gang had negotiated a contract for 2% of the boxes face value, which they have now lost, along with theboxes themselves: so the Bushes, Clintons, Kissinger, Paulson, Greenspan et al. will not be receiving a penny. THE'BOX GANG' BITES THE DUST AT LONG LAST.

    With the boxes having been confiscated, the Box Gang members cannot prove that they ever possessed them; so theyhave been dispossessed: or rather, their extreme greed, arrogance and stupidity has left them with no payment (thank

    goodness) and facing pending or actual prosecution.

    We are advised that any such prosecutions would proceed, more likely than not, in camera at the Old Bailey, London.Certainly, such prosecutions will take place behind the scenes.

    TREASURY ASKED FOR MORE CHINESE CURRENCY BOXES ON LOAN.THE CHINESE REFUSAL AND WHY: FUNDS WERE BEING SWITCHED TO ACKERMANNConcerning the entirely separate Chinese boxes rescued inter alia from Fort Hood in dramatic and bloodycircumstances in November, some of these, we now understand, were placed ON LOAN with the Treasury a foolisharrangement on the part of the Chinese parties, who should by that stage have understood that one cannot reachagreements with serpents.

    We understand that after further sabotage and intransigence by the Geithner Treasury and other US obstructionists,

  • 8/14/2019 Lien Us Treasury 20091216

    4/6

    Chinas enforcement personnel assisted by Interpol may have arrived at the relevant Treasury location and taken someof the currency boxes back. Last week, the Treasury asked for more boxes to be deposited on its site(s), but the Chineseauthorities refused. (They were also stated on CNN on 15th December to have refused to purchase any more UStreasuries).

    In addition to the general sabotage operations that were continuing, the primary reason that the Chinese authoritiesrefused this Treasury request for more boxes was that Mr Geithner had been removing the cash from the boxes andsiphoning it electronically to the Box Gangs' primary bank companion-in-crime, Dr Joseph Ackermann, CEO ofDeutsche Bank, the leading DVD institution.

    CORRUPT LEGISLATORS, PLUS ANOTHER: NOT BEING PAID EITHERWe have also been informed that NONE of the corrupt US Legislators will be receiving any payments. Mr Lieberman isreported to us to have allegedly been paid a large sum of money to block President Obamas healthcare legislation: butthats a separate corrupt deal that is not connected with the foregoing statement.

    Finally, the Swiss have determined that a certain well-known character will not be paid either resolving that issue fromthe equation, too.

    So, were getting there.

    LIST OF U.S. STATUTES, SECURITIES REGULATIONS AND LEGAL PRINCIPLES OF WHICH THE CRIMINALISTS,ASSOCIATES AND ALL THE MAIN FINANCIAL INSTITUTIONS REMAIN IN BREACH:

    LEGAL TUTORIAL: The Steps of Common Fraud:

    Step 1: Fraud in the Inducement: is intended to and which does cause one to execute an instrument, or make anagreement The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to thetrue facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment.Source: Steven H. Gifis, Law Dictionary, 5th Edition, Happauge: Barrons Educational Series, Inc., 2003, s.v.: Fraud.

    Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:

    ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when itcauses injury to another. Source: Steven H. Gifis, Law Dictionary, 5th Edition, Happauge: Barrons EducationalSeries, Inc., 2003, s.v.: Fraud.

    THE TORT OF FRAUDULENT DECEIT The elements of actionable deceit are: A false representation of a material factmade with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent toinduce reliance thereon, on which plaintiff justifiably relies on his injury. Source: Steven H. Gifis, Law Dictionary, 5thEdition, Happauge: Barrons Educational Series, Inc., 2003, s.v.: Deceit.

    Step 3: Theft by Deception and Fraudulent Conveyance:

    THEFT BY DECEPTION:

    FRAUDULENT CONCEALMENT The hiding or suppression of a material fact or circumstance which the party islegally or morally bound to disclose.

    The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable,arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under suchcircumstances being equivalent to an actual fraudulent concealment.

    To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escapeinvestigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be ofan affirmative character and fraudulent.

    Source: Black, Henry Campbell, M.A., 'Blacks Law Dictionary, Revised 4th Edition, St Paul: West Publishing Company,1968, s.v. Fraudulent Concealment.

    FRAUDULENT CONVEYANCE:

    FRAUDULENT CONVEYANCE A conveyance or transfer of property, the object of which is to defraud a creditor, orhinder or delay him, or to put such property beyond his reach.

    Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer.

    Source: Black, Henry Campbell, M.A., Blacks Law Dictionary', Revised 4th Edition, St Paul: West Publishing Company,1968, s.v. Fraudulent Conveyance.

    U.S. SECURITIES REGULATIONS OF WHICH INSTITUTIONS

  • 8/14/2019 Lien Us Treasury 20091216

    5/6

    HAVE BEEN SHOWN TO BE IN BREACH [SEE REPORTS]:

    NASD Rule 3120, et al.NASD Rule 2330, et alNASD Conduct Rules 2110 and 3040NASD Conduct Rules 2110 and IM-2110-1

    NASD Conduct Rules 2110 and SEC Rule 15c3-1NASD Conduct Rules 2110 and 3110SEC Rules 17a-3 and 17a-4NASD Conduct Rules 2110 and Procedural Rule 8210NASD Conduct Rules 2110 and 2330 and IM-2330NASD Conduct Rules 2110 and IM-2110-5NASD Systems and Programme Rules 6950 through 695797-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.

    U.S. LAWS ROUTINELY BREACHED BY THE CRIMINAL OPERATIVES AND INSTITUTIONS:

    Annunzio-Wylie Anti-Money Laundering ActAnti-Drug Abuse ActApplicable international money laundering restrictionsBank Secrecy ActCrimes, General Provisions, Accessory After the Fact [Title 18, USC]Currency and Foreign Transactions Reporting ActEconomic Espionage ActHobbs ActImparting or Conveying False Information [Title 18, USC]Maloney Act

    Misprision of Felony [Title 18, USC] (1)

    Money-Laundering Control ActMoney-Laundering Suppression ActOrganized Crime Control Act of 1970Perpetration of repeated egregious felonies by State and Federal public employees and their Departments andagencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustainfraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours bypresent and former holders of high office under the United States

    Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R.3723]

    Provisions prohibiting the bribing of foreign officials [F.I.S.A.]Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]

    Securities Act 1933Securities Act 1934Terrorism Prevention ActTreason legislation, especially in time of war.

    Please be advised that the Editor of International Currency Review and associated intelligence services cannot enterinto email correspondence related to this or to any of the earlier reports.

    We are a private intelligence publishing house and have no connections to any outside parties including intelligence

  • 8/14/2019 Lien Us Treasury 20091216

    6/6

    agencies. The word intelligence on this website and in all our marketing material is used for marketing/sales purposesonly and has no other connotations whatsoever: see About Us on the red panels under the Notes on theEditor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor,Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreignpower, suggestions to the contrary being actionable for libel in the English Court.

    ADVERTISEMENT: INTERNET SECURITY SOLUTIONYOU CAN ORDER THIS DIRECT FROM THIS WEBSITE. Summary:

    Press Internet Security Solution or go to the World Reports Limited serials catalogue and scroll down until you come tothis product. Then proceed through the simple and ultra-safe ordering procedure [Visa or MasterCard only]. Send adonation as you order this RECOMMENDED solution.

    NON-U.S. INTERNET SECURITY SOLUTION CD AVAILABLE: FAR BETTER THAN NORTON ETCIt has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, andothers, in pursuit of the Pentagon's vast BIG BROTHER objective, directed from the 'highest' levels (not the levelsusually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA's mastercomputers.

    This should come as no real surprise since the cynical spooks even assert this 'in-your-face' by advertising 'INTELINSIDE', which says exactly what it means. More specifically, NSA have made great strides in this direction by having aback door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the 'fullycollaborating' firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling ofpersonal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable 'fileand printer sharing' under any circumstances. If you say 'YES', so to speak, to 'file and printer sharing', your computerbecomes a slave at once to NSA's master computers. DO NOT ENABLE SHARING.

    Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. Aslong as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spyingsystem which assists the criminalised structures, and thus hitherto the Bush-Clinton 'Box Gang' and its connections,with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge ofdata theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracyregards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much moreproblematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virussoftware. Having been attacked and abused so often, we offer a solution.

    We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack andvirus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends,at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, youwill be helping us finance ongoing exposures of the DVD's World Revolution and the financial corruption that has beenfinancing it.

    The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOTto solve your Internet security problems, but to spy on you and to report what you write about, to centralised US

    electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same timehelping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, byordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertisingon this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appearto have a collective mental age of about five years, judging by their output.

    To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, orelse press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scrollright down to the foot of that section, where you will see details of this service. When you buy this special product, youwill also, as we clearly state above, be paying a special premium by way of a donation to help us finance theseexposures.

    The premium contains a donation for our exposure work and also covers our recommendation based on the Editor's ownexperience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has aninvaluable 'Preview before downloading' feature.

    It is suitable for PC's but not Mac computers. As with all such programs, the License is renewable at a modest feeannually. This is done on-line in the usual way [with the supplier direct].

    *VISTA: Virtual Instant Surveillance Tactical Application.