Back to Archive
Print
Donate
Send email link
to this report
D.C.I. LEON PANETTA IS BLOCKING THE SETTLEMENTS
AND THE U.S. INTELLIGENCE POWER MAY BE PLOTTING ANOTHER ATROCITY
Friday 5 February 2010 21:00
• WHAT PANETTA FORGOT TO TELL THE SENATE PANEL
• A BLATANT THREAT TO THOSE PRESSURISING HIM TO DISGORGE THE MONEY AND GOLD
MISPRISION OF FELONY: U.S. CODE, TITLE 18, PART 1, CHAPTER 1, SECTION 4:
‘Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some Judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both’.
'Seeing what's at the end of one's nose requires constant effort'. George Orwell.
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
• BOOKS: Edward Harle Limited has so far published FIVE intelligence titles: The Perestroika Deception, by Anatoliy Golitsyn; Red Cocaine, by Dr Joseph D. Douglass, Jr.; The European Union Collective, by Christopher Story; The New Underworld Order, by Christopher Story; and The Red Terror in Russia, by Sergei Melgounov. All titles are permanently in stock. We sell books DIRECT.
• ADVERTISEMENT: Details of the INTERNET SECURITY SOLUTION software offered by this service in conjunction with a donation can be accessed immediately: See the Home Page World Reports Limited serials catalogue by clicking World Reports Limited and scrolling to foot of page. Scroll to the foot of THIS page to read our extended Ad. for the INTERNET SECURITY SOLUTION.
• Christopher Story FRSA, Editor and Publisher, International Currency Review, World Reports Limited, London and New York. For earlier reports, press the ARCHIVE. Order your intelligence subscriptions and 'politically incorrect' [i.e., correct] intelligence books online from this website.
• CMKM/CMKX CASE DOCUMENTS:
Press Archive for this report [29th January 2010]
Case Number CV10-00031 JVS (MLGx):
SERVICE OF CMKM.CMKX $3.87 TRILLION SUIT VS. S.E.C.
The biggest lawsuit in world legal history: The phantom share giga-scandal.
Note: If the current report [5th February 2010] is displayed, access the Archive for immediate display of our CMKM/CMKX report dated 29th January. All preceding reports, at least back to December, are also relevant to the current state of tension brought about by these gangsters.
• IMPORTANT: This report may be alternated with the report dated 4th February 2010, which inter alia revealed that Mikhail Gorbachev is a Financial Tarrorist, having benefited, as a partner in Deutsche AG (formerly Barrington Investment Group, Switzerland) from transactions derived from the still unresolved STEALING OF THE QUEEN'S GOLD and from a contract stolen by Bush Sr. from the corporation owned by Michael C. Cottrell, B.A., M.S., Pennsylvania Investments, Inc.: the other key partners being the Financial Terrorists George Bush Sr., former German Chancellor Helmut Kohl, and Dr Joseph Ackermann, CEO of Deutsche Bank AG. Following the posting of this report, the Editor realised that Americans have been so dumbed down that they have forgotten all about Gorbachev, whose antics this Editor, as Editor of Soviet Analyst, followed in the 1990s.
NEW REPORT STARTS HERE:
LEON PANETTA IS BLOCKING THE SETTLEMENTS
The US Director of Central Intelligence, Leon Panetta, is blocking the Settlements. This information, from impeccable inside sources, was conveyed to us at 7:13pm UK time on 5th February 2010. It confirms back-up information sourced several days ago by this service.
It also confirms the pin-point accuracy of the central theme of these reports, which is summarised again here as follows:
• The US Government is modelled on the Soviet blueprint: that is to say, it is controlled by the Intelligence Power (the CIA and its myriad ‘subsidiaries’, including, although they hate this to be known, the FBI). The Intelligence Power selects operatives for the highest offices and, as a self-financing ‘State within the State’, has usurped the power of the Executive Branch of Government. It has also deeply compromised the confused and corrupted Legislative Branch.
• The Intelligence Power’s stand-alone finances are derived from innumerable gross scamming operations, of which the CMKM/CMKX Phantom Shares abomination perpetrated from within the Securities and Exchange Commission itself, and the twin Halliburton operations inside the CIA and the Pentagon (which were simultaneously scamming each other) that we have exposed, are just two examples. The CIA controls much of the world’s drug trade and is a scar of the face of the earth. It masks its criminal operations extensively by means of a 24/7 barrage of agitation and propaganda, including Nazi-style hate propaganda, via a portfolio of controlled websites which spew out contrived confusion, diversionary New Age claptrap, lies and disinformation.
• The Central Intelligence Agency was penetrated decades ago in a reverse takeover by a Fifth Column of Nazis from Germany, as has been well documented (Operation Paperclip, etc). This operation was masterminded by the former Hitler intelligence chief in the German-occupied areas of the Soviet Union, General Reinhard Gehlen, who ‘sold’ the US Establishment on the fabrication that Stalin was poised to invade Western Europe.
In reality Stalin had precisely one and a half mechanised divisions left: all his other divisions were still horse-drawn. After the war Gehlen re-activated his networks and they were backed into the CIA with full US accommodation. In a typically bold, brazen ‘give-away’ boast, the Langley base of the CIA was renamed the George Bush Center for Intelligence some years ago.
• George H. W. Bush Senior, an agent for Deutsche Verteidigungs Dienst (DVD), Dachau, and implicated in the assassination of President Kennedy, was levered into the post of Director of Central Intelligence (DCI) after Dr Henry Kissinger, George Bush Sr.’s secret DVD and triple-agent ‘handler’, persuaded President Gerald Ford (really: Leslie Lynch King Jr., pornographer) to sack the incumbent DCI, William Colby, and to replace him with Bush.
With the arrival of George H. W. Bush Sr. as DCI, the DVD had consolidated its grip in the Central Intelligence Agency. The much more recent renaming of the Langley CIA base represents a typically Bosch-type proclamation of a successfully completed operation.
• The Settlements process financially challenges the usurped power stolen from the American people and the United States by this arrogant and abominable self-financing ‘State within the State’: which is why Mr Leon Panetta is blocking the Settlements, according to our latest updated information. All intelligence communities are penetrated and the presence of Panetta in the top slot also implies very close links with Tel Aviv. This is not a matter for surprise, as the long-range pan-German heirs of the Abwehr (DVD) have worked hand in hand with Zionazis since the Second World War, as has been clearly explained with documentation and illustrations in the Editor’s own detailed study The New Underworld Order, which shows inter alia that Adolf Eichmann and other Jewish Nazis were engaged in an ethnic cleansing operation within the Jewish community itself.
• Mr Obama is a creature, like all his predecessors, of the Intelligence Power, and takes his orders from the CIA, not the other way round. As previously reported, the Bush Crime Family have uttered threats against Mr Obama and his family, just to make sure that he remembers who put him there.
AND THE U.S. INTELLIGENCE POWER MAY BE PLOTTING ANOTHER ATROCITY
On 3rd February, Mr Leon Panetta told Congress that 'Al Qaeda can be expected to attempt an attack on the United States in the next three to six months'. The DCI stated that this amorphous terror organisation was deploying operatives in the United States to carry out new attacks from inside the country, using so-called ‘clean’ recruits with a negligible trail of terrorist contacts. Al Qaeda was also encouraging ‘homegrown’ extremists to trigger violence independently.
This information, leaked from the Senate Intelligence Committee to the controlled [please note] US ‘News’ Agency, Associated Press [AP], included the following statement attributed to Panetta:
‘The biggest threat is not so much that we face an attack like 9/11. It is that Al Qaeda is adapting its methods in ways that oftentimes make it difficult to detect’.
In other words, none of us can know what’s coming next. But HE does.
Panetta also highlighted the threat from terrorists acting ‘on their own’. ‘It is the lone-wolf strategy that I think we have to pay attention to as the main threat to this country’.
WHAT PANETTA FORGOT TO TELL THE SENATE PANEL
However what Panetta did not tell the Senate panel was that:
• The CIA invented Al Qaeda in the first place.
• He is blocking the Settlements in order to preserve the free-wheeling financial independence and illegitimate ‘State within the State’ status of the Intelligence Power of which he is the chief.
• In blocking the Settlements payouts, he is KNOWINGLY jamming up the entire financial works, both domestically and abroad, and is thus himself engaged in perpetrating Financial Terrorism.
• Since he purports to know the timeframe for the next attack by this studiedly vague organisation that the CIA ITSELF developed, he must know a great deal more about the planned attack than he has divulged to Congress: otherwise he wouldn’t have been able to state that he knows roughly when it is going to happen.
• His ‘warning’ to Congress can be interpreted as a THREAT to the foreign and other forces that are insisting on the Settlements payouts, the disgorging of The Queen’s gold, and all the other rectifications that need to be effected in order for the United States’ sovereignty to be restored, and for its pariah status to be diminished.
A BLATANT THREAT TO THOSE PRESSURISING HIM TO DISGORGE THE MONEY AND GOLD
In short, his message is not hard to interpret:
‘Lay off pressurising me to release the Settlements, or I'll open the Gates of Hell'.
LIST OF U.S. STATUTES, SECURITIES REGULATIONS AND LEGAL PRINCIPLES OF WHICH THE CRIMINALISTS, ASSOCIATES AND ALL THE MAIN FINANCIAL INSTITUTIONS REMAIN IN BREACH:
LEGAL TUTORIAL: The Steps of Common Fraud:
Step 1: Fraud in the Inducement: “… is intended to and which does cause one to execute an instrument, or make an agreement… The misrepresentation involved does not mislead one as the paper he signs but rather misleads as to the true facts of a situation, and the false impression it causes is a basis of a decision to sign or render a judgment”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Hauppauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
Step 2: Fraud in Fact by Deceit (Obfuscation and Denial) and Theft:
• “ACTUAL FRAUD. Deceit. Concealing something or making a false representation with an evil intent [scanter] when it causes injury to another…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Fraud’.
• “THE TORT OF FRAUDULENT DECEIT… The elements of actionable deceit are: A false representation of a material fact made with knowledge of its falsity, or recklessly, or without reasonable grounds for believing its truth, and with intent to induce reliance thereon, on which plaintiff justifiably relies on his injury…”. Source: Steven H. Gifis, ‘Law Dictionary’, 5th Edition, Happauge: Barron’s Educational Series, Inc., 2003, s.v.: ‘Deceit’.
Step 3: Theft by Deception and Fraudulent Conveyance:
THEFT BY DECEPTION:
• “FRAUDULENT CONCEALMENT… The hiding or suppression of a material fact or circumstance which the party is legally or morally bound to disclose…”.
• “The test of whether failure to disclose material facts constitutes fraud is the existence of a duty, legal or equitable, arising from the relation of the parties: failure to disclose a material fact with intent to mislead or defraud under such circumstances being equivalent to an actual ‘fraudulent concealment’…”.
• To suspend running of limitations, it means the employment of artifice, planned to prevent inquiry or escape investigation and mislead or hinder acquirement of information disclosing a right of action, and acts relied on must be of an affirmative character and fraudulent…”.
Source: Black, Henry Campbell, M.A., 'Black’s Law Dictionary’, Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Concealment’.
FRAUDULENT CONVEYANCE:
• “FRAUDULENT CONVEYANCE… A conveyance or transfer of property, the object of which is to defraud a creditor, or hinder or delay him, or to put such property beyond his reach…”.
• “Conveyance made with intent to avoid some duty or debt due by or incumbent or person (entity) making transfer…”.
Source: Black, Henry Campbell, M.A., ‘Black’s Law Dictionary', Revised 4th Edition, St Paul: West Publishing Company, 1968, s.v. ‘Fraudulent Conveyance’.
U.S. SECURITIES REGULATIONS OF WHICH INSTITUTIONS
HAVE BEEN SHOWN TO BE IN BREACH [SEE REPORTS]:
• NASD Rule 3120, et al.
• NASD Rule 2330, et al
• NASD Conduct Rules 2110 and 3040
• NASD Conduct Rules 2110 and IM-2110-1
• NASD Conduct Rules 2110 and SEC Rule 15c3-1
• NASD Conduct Rules 2110 and 3110
• SEC Rules 17a-3 and 17a-4
• NASD Conduct Rules 2110 and Procedural Rule 8210
• NASD Conduct Rules 2110 and 2330 and IM-2330
• NASD Conduct Rules 2110 and IM-2110-5
• NASD Systems and Programme Rules 6950 through 6957
• 97-13 Bank Secrecy Act, Recordkeeping Rule for funds transfers and transmittals of funds, et al.
U.S. LAWS ROUTINELY BREACHED BY THE CRIMINAL OPERATIVES AND INSTITUTIONS:
• Annunzio-Wylie Anti-Money Laundering Act
• Anti-Drug Abuse Act
• Applicable international money laundering restrictions
• Bank Secrecy Act
• Crimes, General Provisions, Accessory After the Fact [Title 18, USC]
• Currency and Foreign Transactions Reporting Act
• Economic Espionage Act
• Hobbs Act
• Imparting or Conveying False Information [Title 18, USC]
• Maloney Act
• Misprision of Felony [Title 18, USC] (1)
• Money-Laundering Control Act
• Money-Laundering Suppression Act
• Organized Crime Control Act of 1970
• Perpetration of repeated egregious felonies by State and Federal public employees and their Departments and agencies, which are co-responsible with the said employees for ONGOING illegal and criminal actions, to sustain fraudulent operations and crimes in order to cover up criminalist activities and High Crimes and Misdemeanours by present and former holders of high office under the United States
• Provisions pertaining to private business transactions being protected under both private and criminal penalties [H.R. 3723]
• Provisions prohibiting the bribing of foreign officials [F.I.S.A.]
• Racketeer Influenced and Corrupt Organizations Act [R.I.C.O.]
• Securities Act 1933
• Securities Act 1934
• Terrorism Prevention Act
• Treason legislation, especially in time of war.
• BEWARE OF MALICIOUS IMITATIONS: It has come to our notice that certain websites have been in the habit of copying reports from this site, attributing the reports to the Editor of this service, but at the same time AMENDING AND INSERTING TEXT NOT WRITTEN BY THE EDITOR.
• This is a very old, malevolent US counterintelligence DIRTY TRICK.
Therefore, you should be advised that the GENUINE ORIGINAL REPORT is, by obvious definition, accessible ONLY FROM THIS WEBSITE. If you come across an article elsewhere that is attributed to the Editor of this service, you should refer to the ORIGINAL ARTICLE HERE and you should bear in mind that the illegally duplicated article may contain text that was NOT written by the Editor of this service, but which was inserted for malicious purposes by counterintelligence.
Likewise, although we haven't yet had time to elaborate this issue, we have taken drastic steps around the world to close off the malicious piracy of our books. One technique used by several disreputable sites (in the United States, the Netherlands and Switzerland) is to copy our title(s) and (a) to display an image of the front cover WITHOUT THE ISBN DATA at the top of the cover; and (b) to DELETE THE COPYRIGHT PAGE. In so doing, the criminal pirates proclaimed that they knew perfectly well that they were/are engaged in theft and can be prosecuted for stealing copyright.
• Please be advised that the Editor of International Currency Review and associated intelligence services cannot enter into email correspondence related to this or to any of the earlier reports.
We are a private intelligence publishing house and have no connections to any outside parties including intelligence agencies. The word ‘intelligence’ on this website and in all our marketing material is used for marketing/sales purposes only and has no other connotations whatsoever: see ‘About Us’ on the red panels under the Notes on the Editor, Christopher Story FRSA, who has been solely and exclusively engaged as an investigative journalist, Editor, Author and private financial and current affairs Publisher since 1963 and is not and never has been an agent for a foreign power, suggestions to the contrary being actionable for libel in the English Court.
ADVERTISEMENT: INTERNET SECURITY SOLUTION
YOU CAN ORDER THIS DIRECT FROM THIS WEBSITE. Summary:
Press Internet Security Solution or go to the World Reports Limited serials catalogue and scroll down until you come to this product. Then proceed through the simple and ultra-safe ordering procedure [Visa or MasterCard only]. Send a donation as you order this RECOMMENDED solution.
NON-U.S. INTERNET SECURITY SOLUTION CD AVAILABLE: FAR BETTER THAN NORTON ETC
It has now been established that the National Security Agency (NSA) works with/controls Microsoft, Norton, McAfee, and others, in pursuit of the Pentagon's vast BIG BROTHER objective, directed from the 'highest' levels (not the levels usually referred to) which seek to have every computer in the world talk direct to the Pentagon or to NSA's master computers.
This should come as no real surprise since the cynical spooks even assert this 'in-your-face' by advertising 'INTEL INSIDE', which says exactly what it means. More specifically, NSA have made great strides in this direction by having a back door built into Microsoft VISTA. Certain computers, especially those labelled with the logo of the 'fully collaborating' firm Hewlett Packard, have hard-core setups which facilitate the remote monitoring and controlling of personal computers by NSA, Fort Meade. We now understand that if you are using VISTA* you MUST NOT enable 'file and printer sharing' under any circumstances. If you say 'YES', so to speak, to 'file and printer sharing', your computer becomes a slave at once to NSA's master computers. DO NOT ENABLE SHARING.
Unfortunately, this abomination is so far advanced that this may not be the only precaution that needs to be taken. As long as Microsoft continues its extensive cooperation with NSA and the NSC (National Security Council), the spying system which assists the criminalised structures, and thus hitherto the Bush-Clinton 'Box Gang' and its connections, with their fraudulent finance operations, NSA may be able to steal data from your computer. The colossal scourge of data theft is associated with this state of affairs: data stolen usually include Credit Card data, which the kleptocracy regards as almost as good as real estate for hypothecation purposes. Even so, you can make life very much more problematical for these utterly odious people by NOT USING U.S.-sourced so-called Internet Security and anti-virus software. Having been attacked and abused so often, we offer a solution.
We use a proprietary FOREIGN Internet Security program which devours every PC Trojan, worm, scam, porn attack and virus that the National Security Agency (NSA) throws at us. We are offering this program (CD) to our clients and friends, at a premium. The program comes with our very strong recommendation, but at the same time, if you buy from us, you will be helping us finance ongoing exposures of the DVD's World Revolution and the financial corruption that has been financing it.
The familiar US proprietary Internet Security programs are by-products of US counterintelligence, and are intended NOT to solve your Internet security problems, but to spy on you and to report what you write about, to centralised US electronic facilities set up for the purpose. You can now BREAK FREE from this syndrome while at the same time helping us to MAINTAIN THE VERY HEAVY PRESSURE UPON THE CRIMINALISTS WE HAVE BEEN EXPOSING, by ordering this highest quality FOREIGN (i.e., non-US) INTERNET SECURITY SOLUTION that we have started advertising on this website. This offer has been developed in response to attacks we have suffered from the NSA nerds who appear to have a collective mental age of about five years, judging by their output.
• To access details about the INTERNET SECURITY SOLUTION, just press THE LIVE LINK YOU HAVE JUST READ, or else press SERIALS in the red panel below. This opens up our mini-catalogue of printed intelligence publications. Scroll right down to the foot of that section, where you will see details of this service. When you buy this special product, you will also, as we clearly state above, be paying a special premium by way of a donation to help us finance these exposures.
The premium contains a donation for our exposure work and also covers our recommendation based on the Editor's own experience that this INTERNET SECURITY SOLUTION will make your Internet life much easier. The program has an invaluable 'Preview before downloading' feature.
• It is suitable for PC's but not Mac computers. As with all such programs, the License is renewable at a modest fee annually. This is done on-line in the usual way [with the supplier direct].
*VISTA: Virtual Instant Surveillance Tactical Application.