Why is the Federal Government destroying National Security ?

by researcher Tuesday, Sep. 20, 2005 at 7:35 PM

Federal officials are more responsive to foreign interests than to American citizens ! The President believes in unprotected borders. The Congress aids foreign governments. The Supreme Court evicts private citizens from their property to enrich foreign private profiteers. WHY?



Our generosity of giving national foreign aid to
foreign countries is screwing our own national security.
Congress depends on political contrbution$ to get elected. Since Americans are paying such high taxes they can't contribute. So Lobbies have funded and Congress has responded by passing favorable laws for lobbies, even foreign countries goals at the expense of destroying America's security.See: http://www.wrmea.com/archives/July_Aug_2004/0407027.html
excerpts:2004 Top Ten Career Recipients of Pro-Israel PAC Funds
Compiled by Hugh Galford

House: Current Cycle
Hoyer, Steny (D-MD) $37,500
Ros-Lehtinen, Ileana (R-FL) 36,000
Berkley, Shelley (D-NV) 35,100
Lantos, Tom (D-CA) 31,600
Frost, Martin (D-TX) 31,300
for example.

Likewise the Supreme Court Justices are wined and dined by members of these powerful lobbies. They too are being duped by rich financial manipulators.

The executive branch has allowed foreign countries to compromise our communications centers. See Notes below:

Even Congress rejected today an inquiry into the Katrina fiasco, just like they welcomed the 911 commission findings, and just like they gleefully accepted the Warren Commission report. The Kennedy assination records along with Dr. King's assination won't be opened until most of them are dead.
America's elite is motivated by greed. See article
seattle.indymedia.org/en/2005/08/247435.shtml
Who has the elite allied itself with, and read through the comments for specific proof.

Now, with the elite's criminal bankers, in the Federal Reserve system, supported and endorsed by Rockefeller's monopolies, they have Americans dangling from ropes. How these private banks that make up the Federal Reserve system print money, (paying only for the cost of the printing, and lend it out at high interest, to the federal government and individuals. Hence the drive up the national debt. Americans are forced to pay about 1/3 their salaries to federal, state and local taxes. They barely have enough money to live. So they take advantage of credit cards. Very few Americans can contribute to political campaigns. Congress gets most of their campaign monies from lobbies. The Israeli lobby is very powerful, since their funded by US foreign aid. Other powerful lobbies, corporations, and other foreign countries, ie China, give substantial money to Congressmen, and they're voting into reality, these foreign interests.

On October 17, Congress has approved for the bankers to double your minimum payments on your credit cards. If your paying 300 a month now on credit cards, after October 17 you'll be paying 600 a month, and if you don't you'll be assesed charges for not making the minimum payments, and your credit ratings will drop.

This is bound to burst the housing bubble, since so many Americans are just making ends meet, and will lead to foreclosures for some, and an increase in the already high unemployment rate, thanls to Congressional approval of CAFTA and NAFTA and other goals of the greedy elite.

There may even be a depression around the corner with the increased energy costs.

The Federal government wants your sons and daughters to fight Israel's wars of expansion. Just today, Sharon said he wants more settlement in the West Bank.
Until people realize this situation and read up on Assassinations of Kennedy, King and others, you will not see how this came about in the land of the free and the home of the brave.After Kennedy's death by the CIA, the CIA got into dealing drugs to pay for their covert operations and noiw this is big business.Oil and drugs, led by the Rockefellers, and the Bushes.

Our own government was responsible for Oklahoma, 911, and the war in Iraq(), and Iran is on their front burner.

President Bush is too busy appointing people who cover up his lies, to appoint competent people to head National Security.From Wilkpedia:

Most recently Chertoff has managed the FEMA response to Hurricane Katrina. On the third of September, several days after the initial strike of the hurricane many (including the New Orleans mayor, Ray Nagin) indicated severe dissatisfaction with the response from Washington, citing the delay between the general knowledge of the storm's likely impact and any effective federal response. Lousiana's Governor Blanco declared a state a state of emergency on August 26 [1]; a week later, New Orleans remained in a state of chaos.

Chertoff himself appeared misinformed about the situation, presumably because of the LA governor, even calling the situation at the Convention Center "rumors" after it had been in the news most of the day. NO BODY IN HOMELAND SECURITY WAS WATCHING LIVE BROADCASTS OF NEWS on CNN THAT DAY? THIS IS UNBELEVABLE!While defending the federal government's response in a September 3, 2005 press conference, Chertoff asserted that no one had ever predicted a disaster of this magnitude; however, warnings had in fact come for years from experts in the private sector as well as government agencies at all levels, including FEMA itself, who had identified a disaster such as this as one of the three most likely catastrophes to strike the US. CNN: [2] Houston Chronicle: [3]. Critics (both in the media and political body) of Chertoff's actions say the response to the disaster was inadequate in terms of leadership and promptness. To illustrate a typical view of those critical of the department, New Hampshire State Representative Peter Sullivan said, "Director Brown and Secretary Chertoff have given incompetence a bad name. Their planning was nonexistent. Their response to the crisis was lethargic. Their attempt to shirk responsibility is revolting. At a time when our country needs forthright leaders, this administration [has given] us two men more concerned with partisan spin than with human suffering. Brown and Chertoff failed America, and they must be fired immediately."

Chertoff defended Islamic terrorists and deported the Israeli Mossad who were caught after 911. (Over two hundred Mossad agents found in America after 911 were deported with his help. Are they all back now, with his help? It is
reported today on waynemadsenreport.com Dominick Sutter, the owner of the Urban moving Systems, head of the dancing Israeli mossad, who gleefully celebrated and videotaped the WTC burnings, to be back in FLORIDA,(see Notes below), the staging center for the coming Chinese invasion of biological warfare, and along our southern UNPROTECTED BORDER> See China's Defence Minister's speech! http://www.halturnershow.com/ChineseDefenseMinisterTalksWarAgainstUS.html
EXcerpts:
Only by using non-destructive weapons that can kill many people will we be able to reserve America for ourselves. There has been rapid development of modern biological technology, and new bio weapons have been invented one after another. Of course we have not been idle; in the past years we have seized the opportunity to master weapons of this kind. We are capable of achieving our purpose of “cleaning up” America all of a sudden. When Comrade Xiaoping was still with us, the Party Central Committee had the perspicacity to make the right decision not to develop aircraft carrier groups and focus instead on developing lethal weapons that can eliminate mass populations of the enemy country.
......................
We must prepare ourselves for two scenarios. If our biological weapons succeed in the surprise attack [on the United States, the Chinese people will be able to keep their losses at a minimum in the fight against the United States
........................................................It is indeed brutal to kill one or two hundred million Americans. But that is the only path that will secure a Chinese century, a century in which the CCP leads the world




You asked what happened to America, study history and you will know!

DEMAND OF YOUR LOCAL OFFICIALS ANSWERS!
NOTES:
From waynemadsenreport.orgSeptember 14, 2005 -- Is Urban Moving Systems chief back in US? There are indications that Israeli national Dominik Suter, the former head of Urban Moving Systems in Weehawken, NJ is back in the United States, this time in south Florida and may be using his actual name. An informed source claims that Suter is working for an aviation-related firm in south Florida.

Suter ran the Weehawken, NJ-based moving company on 9-11 when a number of Urban Moving Systems vans were spotted around north Jersey before and after the hijacked planes struck the World Trade Center. One Urban Moving van was seen at Liberty State Park in Jersey City as the first plane hit the towers. The five occupants, all Israeli nationals, were seen videotaping and celebrating the attack and were dressed in Arab clothing. The five were later arrested near Giant Stadium in East Rutherford, NJ. One of the Israelis told police they were at Liberty State Park to "document the event."



Mysterious 911 moving van operator reportedly back in the US

After the Israelis were detained for several months in Brooklyn as terrorist suspects, they were quickly deported to Israel. After the FBI questioned Suter on September 11, he fled the United States on September 14, 2001. The FBI was due to question Suter again before he fled the country. Later, Federal law enforcement agents discovered pipes, caps, explosive chemical materials, and traces of anthrax at the Weehawken warehouse. Suter's name and those of some of his moving employees turned up in a CIA database of foreign intelligence agents. Suter's name also appeared on an FBI 9-11 terrorism suspect list. Suter's year of birth is listed as 1970 with a social security number of 129-78-0926. His addresses before 9-11 are listed as 28 Harlow Crescent Rd., Fairlawn, NJ 07410; 312 Pavonia Ave., Jersey City, NJ 07302; and 15000 Dickens, Suite 11, Sherman Oaks CA. If Suter has been permitted to re-enter the United States, the FBI and the Department of Homeland Security and its chief Michael Chertoff have a lot of explaining to do.



.............................................................................................................................................................................................



Isn't it illegal for foreign countries to give contributions via lobbies to Congressional campaigns?






Kennedy was murdered by CIA

The following is a realplayer clip:

jfkmurdersolved.com/film/JFK2003.rm

trafford.com/4dcgi/browseaisles.html?15083526-5025aaa



drugs, oil, killings
Posted by: Sandra at Sep 17, 2005 23:56
Comment #17: Sandra said on 9/17/05 @ 3:31pm ET...
RESIGN NOW OR BE FORCIBLY REMOVED BY OUR MILITARY!

WE THE PEOPLE DEMAND THE QUEEN OF ENGLAND'S HEAD ON A PIKE PACKED IN DRY ICE WITH ALAN GREENSPAN!

WE THE PEOPLE DEMAND THAT THE ORIGINAL ARTICLES OF IMPEACHMENT OF GEORGE HERBERT WALKER BUSH AND HIS ENTIRE CRIMINAL INTERNATIONAL CARTEL BE ENACTED AND TRIED FOR TREASON AND GENOCIDE AT THE HAGUE.

WE THE PEOPLE DEMAND THAT THE ENTIRE CLINTON ADMINSTRATION BE APPREHENDED AND TRIED FOR TREASON, MURDER, AND OBSTRUCTION OF JUSTICE.

WE THE PEOPLE DEMAND THAT ALL US TROOPS BE BROUGHT HOME IMMEDIATELY TO OVERTHROW THIS TYRANNY OF THE MADNESS OF KING GEORGE AND THE QUEEN OF ENGLAND.

WE THE PEOPLE DEMAND THAT ALL MILITARY PERSONNEL BE AT THE AID AND SERVICE TO THE PEOPLE OF THE UNITED STATES; MILITARY CODE AND CONSTITUTIONAL OATH BE BROUGHT FORTH TO PROTECT, AND DEFEND AMERICA FROM THE COUP THAT INHABITS.

WE THE PEOPLE DEMAND TOTAL RESIGNATION OR REMOVAL BY FORCE OF ALL CONGRESS AND SENATE REPRESENTATIVES THAT HAVE DIVERTED THE US CONSTITUTION AND THE US TREASURY AGAINST THE PEOPLE OF THE UNITED STATES.

WE THE PEOPLE DEMAND THAT THE ENTIRE US SUPREME COURT STEP DOWN NOW.

WE THE PEOPLE WILL NOT ADHERE TO YOUR IMPOSED RULES OR ORDER. YOU NO LONGER REPRESENT US.

Queen of England with George Herbert Walker Bush - Acts of Treason

The United States Government is Killing Men of Honor

Bush-Clinton-Bush Fianacial Terrorism / Cash Payoffs Bonds and Murder

--------------

HANDS OFF VENEZUELA

Sep. 17, 2005 5:57
Venezuelan President says US planning invasion
By ASSOCIATED PRESS
WASHINGTON

Venezuelan President Hugo Chavez said he has documentary evidence that the United States plans to invade his country.

Chavez, interviewed Friday on ABC television's "Nightline," said the plan is called "Balboa" and involves aircraft carriers and planes. A transcript of the interview was made available by "Nightline."

He said US soldiers recently went to Curacao, an island off Venezuela's northwest coast. He described as a "lie" the official US explanation that they visited Curacao for rest and recreation.

"They were doing movements. They were doing maneuvers," Chavez said, speaking through a translator.

He added: "We are coming up with the counter-Balboa plan. That is to say if the government of the United States attempts to commit the foolhardy enterprise of attacking us, it would be embarked on a 100-year war. We are prepared."

Chavez has been attending the summit of world leaders at the United Nations in New York this week. On Thursday, he denounced the US-led war in Iraq and told other leaders they should consider moving the UN headquarters out of the United States.

To prove US intentions to invade Venezuela, Chavez offered to send "Nightline" host Ted Koppel maps and other documentation.

"What I can't tell you is how we got it, to protect the sources, how we got it through military intelligence," he said.

In the event of a US invasion, Chavez said the United States can "just forget" about receiving any more oil from his country.

----- Original Message -----
Michael Chertoff The Enemy Within - Linked to 9/11 Obstruction of Justice and Death of Thousands (DOJ Gag Orders)

Well, it looks like Congressman Curt Weldon (R-PA) is finally asking the right questions!

(But, is it too late as FBI and Michael Chertoff have not responded to the notice that they're back in the United States in South Florida? Wayne Madsen Report)

How Mossad Deceived the U.S. Military on 9/11
Posted By: ChristopherBollyn
Date: Friday, 1 April 2005, 11:13 p.m.

Mossad, Israel's military intelligence agency, infiltrated the most sensitive computer networks in the United States through a little start-up company known as Ptech, in Quincy, Massachusetts.

Most notably, it was this infiltration that allowed the events of September 11, 2001 to occur.

If the crimes of 9/11 had been properly investigated, these people would have been investigated and booked long ago. The Mossad connection is obvious; read on:

In order to facilitate the computer network penetration, Mossad set up a IT consultancy and software provider named Ptech using Lebanese and Arabs as the front-man financiers and founders and keeping their Jewish American "sayan" in a secondary, but critical position.

First a note of background on what Ptech did, from the January 2005 article "Michael Chertoff and the sabotage of the Ptech investigation" on the Rigorous Intuition weblog:Rumor Mill News.com

----

August 31, 2005
Israel and 9/11: New Report Connects the Dots - What the 9/11 Commission didn't tell us
by Justin Raimondo

This news report in the Philadelphia Times Herald might shock the average reader, but its subject is surely familiar to longtime readers of Antiwar.com:

"A memorandum sent to the 9/11 Commission, and Senate and House intelligence committees in September 2004, suggests that young Israelis who canvassed dozens of U.S. Drug Enforcement Administration (DEA) offices in 2000 and 2001 trying to sell paintings to federal workers, may have been spying not only on the DEA, but also on Arab extremists in the United States – including the Sept. 11 hijackers who were living in Florida and New Jersey."

The author of this memorandum [.pdf] is Gerald Shea, a retired corporate lawyer. Shea – an alumnus of Phillips Academy, Yale (1964), and Columbia Law School – was associated for many years with one of New York's most prominent law firms, in New York and Paris, and his memo reads like a lawyer's brief: it is written with the same meticulous attention to details of time and place, and with a lawyerly regard for maintaining a high standard of evidence.

The "Able Danger" data-mining operation that supposedly uncovered the New Jersey cell of the 9/11 plotters was – for some reason yet to be determined – blocked and prevented from apprehending key figures in the plot, according to the testimony of at least three people who have direct knowledge of this matter. Shea's memo opens up a possibility that may relate to (and explain) the "Able Danger" blockage: was surveillance of Arab terrorist groups in the U.S. subcontracted out to the Israelis, with the knowledge and complicity of the CIA, so that "Able Danger" was considered poaching on the Israelis' preserve? Shea cites a piece in The Forward that describes Israeli covert activities in the U.S. as a violation of "a secret gentleman's agreement between the two countries," and avers:

"The real question today, however, appears to be whether the 'gentlemen's agreement' did indeed prevail here and, because we lacked adequate warning from our surrogates who were keeping the Arabs under surveillance, helped bring us to disaster."

More here: Antiwar.com

------

PENTAGON AFFIRMS WELDONS CONCERNS; TROUBLING QUESTIONS REMAIN UNANSWERED

(Um, Congressman, the last time I checked Dick Cheney and Donald Rumsfeld were still in charge of the Pentagon... expect delays and obstruction!)

WASHINGTON, Sep 2 - Today, Congressman Curt Weldon (R-Pa.), Vice Chairman of the House Armed Services and Homeland Security Committees, released the following statement in response to an informal briefing held by the Pentagon yesterday on their investigation into Able Danger - a Department of Defense planning effort to identify and target the linkages and relationships of Al-Qaeda worldwide.

"The Pentagon confirmed that five credible witnesses did see the 9-11 ringleader, Mohammad Atta, in data produced by Able Danger prior to the 9-11 attacks. These new facts bring to light an ever-widening accounting of the information produced by Able Danger and raises serious concerns about the failure of that information getting to the proper authorities.

The Pentagon also confirmed that, due to strict domestic privacy protocol, it destroyed documents during and following Able Danger containing information on U.S. persons - information that would have included the Brooklyn linkages, particularly to Atta.

These preliminary results are troubling, and the fact that the our government had this information at one time, and possibly destroyed it, is haunting.

I encourage the Pentagon to continue its investigation and to exhaust all of its resources in gaining a full accounting of Able Danger and what its findings could have prevented.

Able Danger: Curt Weldon.House.Gov/News

More here about Able Danger, Senator Specter's Hearing scheduled for September 21st, and other articles including Speaker of the House Dennis Hassert BRIBES and Tom Delay's obstruction... exposing them all 911 Citizens Watch.org
Michael Chertoff The Enemy Within - Linked to 9/11 Obstruction of Justice and Death of Thousands (DOJ Gag Orders)

Well, it looks like Congressman Curt Weldon (R-PA) is finally asking the right questions!

(But, is it too late as FBI and Michael Chertoff have not responded to the notice that they're back in the United States in South Florida? Wayne Madsen Report)

How Mossad Deceived the U.S. Military on 9/11
Posted By: ChristopherBollyn
Date: Friday, 1 April 2005, 11:13 p.m.

Mossad, Israel's military intelligence agency, infiltrated the most sensitive computer networks in the United States through a little start-up company known as Ptech, in Quincy, Massachusetts.

Most notably, it was this infiltration that allowed the events of September 11, 2001 to occur.

If the crimes of 9/11 had been properly investigated, these people would have been investigated and booked long ago. The Mossad connection is obvious; read on:

In order to facilitate the computer network penetration, Mossad set up a IT consultancy and software provider named Ptech using Lebanese and Arabs as the front-man financiers and founders and keeping their Jewish American "sayan" in a secondary, but critical position.

First a note of background on what Ptech did, from the January 2005 article "Michael Chertoff and the sabotage of the Ptech investigation" on the Rigorous Intuition weblog:Rumor Mill News.com

----

August 31, 2005
Israel and 9/11: New Report Connects the Dots - What the 9/11 Commission didn't tell us
by Justin Raimondo

This news report in the Philadelphia Times Herald might shock the average reader, but its subject is surely familiar to longtime readers of Antiwar.com:

"A memorandum sent to the 9/11 Commission, and Senate and House intelligence committees in September 2004, suggests that young Israelis who canvassed dozens of U.S. Drug Enforcement Administration (DEA) offices in 2000 and 2001 trying to sell paintings to federal workers, may have been spying not only on the DEA, but also on Arab extremists in the United States – including the Sept. 11 hijackers who were living in Florida and New Jersey."

The author of this memorandum [.pdf] is Gerald Shea, a retired corporate lawyer. Shea – an alumnus of Phillips Academy, Yale (1964), and Columbia Law School – was associated for many years with one of New York's most prominent law firms, in New York and Paris, and his memo reads like a lawyer's brief: it is written with the same meticulous attention to details of time and place, and with a lawyerly regard for maintaining a high standard of evidence.

The "Able Danger" data-mining operation that supposedly uncovered the New Jersey cell of the 9/11 plotters was – for some reason yet to be determined – blocked and prevented from apprehending key figures in the plot, according to the testimony of at least three people who have direct knowledge of this matter. Shea's memo opens up a possibility that may relate to (and explain) the "Able Danger" blockage: was surveillance of Arab terrorist groups in the U.S. subcontracted out to the Israelis, with the knowledge and complicity of the CIA, so that "Able Danger" was considered poaching on the Israelis' preserve? Shea cites a piece in The Forward that describes Israeli covert activities in the U.S. as a violation of "a secret gentleman's agreement between the two countries," and avers:

"The real question today, however, appears to be whether the 'gentlemen's agreement' did indeed prevail here and, because we lacked adequate warning from our surrogates who were keeping the Arabs under surveillance, helped bring us to disaster."

More here: Antiwar.com

------

PENTAGON AFFIRMS WELDONS CONCERNS; TROUBLING QUESTIONS REMAIN UNANSWERED

(Um, Congressman, the last time I checked Dick Cheney and Donald Rumsfeld were still in charge of the Pentagon... expect delays and obstruction!)

WASHINGTON, Sep 2 - Today, Congressman Curt Weldon (R-Pa.), Vice Chairman of the House Armed Services and Homeland Security Committees, released the following statement in response to an informal briefing held by the Pentagon yesterday on their investigation into Able Danger - a Department of Defense planning effort to identify and target the linkages and relationships of Al-Qaeda worldwide.

"The Pentagon confirmed that five credible witnesses did see the 9-11 ringleader, Mohammad Atta, in data produced by Able Danger prior to the 9-11 attacks. These new facts bring to light an ever-widening accounting of the information produced by Able Danger and raises serious concerns about the failure of that information getting to the proper authorities.

The Pentagon also confirmed that, due to strict domestic privacy protocol, it destroyed documents during and following Able Danger containing information on U.S. persons - information that would have included the Brooklyn linkages, particularly to Atta.

These preliminary results are troubling, and the fact that the our government had this information at one time, and possibly destroyed it, is haunting.

I encourage the Pentagon to continue its investigation and to exhaust all of its resources in gaining a full accounting of Able Danger and what its findings could have prevented.

Able Danger: Curt Weldon.House.Gov/News

More here about Able Danger, Senator Specter's Hearing scheduled for September 21st, and other articles including Speaker of the House Dennis Hassert BRIBES and Tom Delay's obstruction... exposing them all 911 Citizens Watch.org
RESIGN NOW OR BE FORCIBLY REMOVED BY OUR MILITARY!

WE THE PEOPLE DEMAND THE QUEEN OF ENGLAND'S HEAD ON A PIKE PACKED IN DRY ICE WITH ALAN GREENSPAN!

WE THE PEOPLE DEMAND THAT THE ORIGINAL ARTICLES OF IMPEACHMENT OF GEORGE HERBERT WALKER BUSH AND HIS ENTIRE CRIMINAL INTERNATIONAL CARTEL BE ENACTED AND TRIED FOR TREASON AND GENOCIDE AT THE HAGUE.

WE THE PEOPLE DEMAND THAT THE ENTIRE CLINTON ADMINSTRATION BE APPREHENDED AND TRIED FOR TREASON, MURDER, AND OBSTRUCTION OF JUSTICE.

WE THE PEOPLE DEMAND THAT ALL US TROOPS BE BROUGHT HOME IMMEDIATELY TO OVERTHROW THIS TYRANNY OF THE MADNESS OF KING GEORGE AND THE QUEEN OF ENGLAND.

WE THE PEOPLE DEMAND THAT ALL MILITARY PERSONNEL BE AT THE AID AND SERVICE TO THE PEOPLE OF THE UNITED STATES; MILITARY CODE AND CONSTITUTIONAL OATH BE BROUGHT FORTH TO PROTECT, AND DEFEND AMERICA FROM THE COUP THAT INHABITS.

WE THE PEOPLE DEMAND TOTAL RESIGNATION OR REMOVAL BY FORCE OF ALL CONGRESS AND SENATE REPRESENTATIVES THAT HAVE DIVERTED THE US CONSTITUTION AND THE US TREASURY AGAINST THE PEOPLE OF THE UNITED STATES.

WE THE PEOPLE DEMAND THAT THE ENTIRE US SUPREME COURT STEP DOWN NOW.

WE THE PEOPLE WILL NOT ADHERE TO YOUR IMPOSED RULES OR ORDER. YOU NO LONGER REPRESENT US.

Queen of England with George Herbert Walker Bush - Acts of Treason

The United States Government is Killing Men of Honor

Bush-Clinton-Bush Fianacial Terrorism / Cash Payoffs Bonds and Murder

--------------
HANDS OFF VENEZUELA

Sep. 17, 2005 5:57
Venezuelan President says US planning invasion
By ASSOCIATED PRESS
WASHINGTON

Venezuelan President Hugo Chavez said he has documentary evidence that the United States plans to invade his country.

Chavez, interviewed Friday on ABC television's "Nightline," said the plan is called "Balboa" and involves aircraft carriers and planes. A transcript of the interview was made available by "Nightline."

He said US soldiers recently went to Curacao, an island off Venezuela's northwest coast. He described as a "lie" the official US explanation that they visited Curacao for rest and recreation.

"They were doing movements. They were doing maneuvers," Chavez said, speaking through a translator.

He added: "We are coming up with the counter-Balboa plan. That is to say if the government of the United States attempts to commit the foolhardy enterprise of attacking us, it would be embarked on a 100-year war. We are prepared."

Chavez has been attending the summit of world leaders at the United Nations in New York this week. On Thursday, he denounced the US-led war in Iraq and told other leaders they should consider moving the UN headquarters out of the United States.

To prove US intentions to invade Venezuela, Chavez offered to send "Nightline" host Ted Koppel maps and other documentation.

"What I can't tell you is how we got it, to protect the sources, how we got it through military intelligence," he said.

In the event of a US invasion, Chavez said the United States can "just forget" about receiving any more oil from his country.

VIOLATIONS OF THE UNITED STATES CONSTITUTION

Title 3
Executive order 12803 of April 30, 1992
57 FR 19063 / May 4, 1992

TEXT: By the authority vested in me as president by the laws of the United States of America, end in order to ensure that the United States achieves the most beneficial economic use of its resources, it is hereby ordered as follows:
Section 1. Definitions. For purposes of this order: (a) “Privatization” means the disposition or transfer of an infrastructure asset, such as by sale or by long-term lease, from a State or local government to a private party.

(b) “infrastructure asset” means any asset financed in whole or in part by the Federal Government and needed for the functioning of the economy. Examples of such assets include, but are not limited to: roads, tunnels, bridges, electricity supply facilities. mass transit, rail transportation, airports, ports. waterways, water supply facilities, recycling and wastewater treatment facilities, solid waste disposal facilities, housing, schools, prisons, and hospitals.

(c) “Originally authorized purposes” means the general objectives of the original grant program; however, the term is not intended to include every condition requires for a grantee to have obtained the original grant.

(d) “Transfer price” means: (i) the amount paid or to be paid by a private party for an infrastructure asset, if the asset is transferred as a result of a competitive bidding; of (ii) the appraised value of an infrastructure asset, as determined by the head of the executive department or agency and the Director of the Office of Management and Budget, if the asset is not transferred as a result of competitive bidding.

(e) “state and local governments” means the government of any state of the United States, the District of Columbia. any commonwealth. territory, or possession of the United States, and any country, municipality, city, town. township, local public authority, school district, special district, intrastate district, regional or interstate governmental entity, council of governments, and any agency or instrumentality of a local government, and any federally recognized Indian Tribe.

Sec. 2. Fundamental Principles. Executive departments and agencies shall be guided by the following objectives and principles: (a) Adequate and well-maintained infrastructure is critical to economic growth. Consistent with the principles of federalism enumerated in Executive Order No. 12612, and in order to allow the private sector to Provide for infrastructure modernization and expansion, State and local governments should have greater freedom to privatize infrastructure assets.

(b) Private enterprise and competitively driven improvements are the foundation of our Nation’s economy and economic growth. Federal financing of infrastructure assets should not act as a barrier to the achievement of economic efficiencies through additional private market financing or competitive practices, or both.

(c) State and local governments are in the best position to assess and respond to local needs. States and local governments should, subject to assuring continued compliance with Federal requirements that public use be on reasonable and nondiscriminatory terms, have maximum possible freedom to make decisions concerning the maintenance and disposition of their federally financed infrastructure assets.

(d) User fees are generally more efficient than general taxes as a means to support infrastructure assets. Privatization transactions should be structured so as not to result in unreasonable increases in charges to users.

BACK TO POLICY HOMEPAGE
Sec. 3. Privatization initiative. To the extent permitted by law, the head of each executive department and agency shall undertake the following actions: (a) Review those procedures affecting the management and disposition of federally financed infrastructure assets owned by State and local governments and modify those procedures to encourage appropriate privatization of such assets consistent: with this order;
(b) Assist State and Local governments in their efforts to advance the objectives of this order; and

(c) Approve State and local governments’ requests to Privatize infrastructure assets, consistent with the criteria in section 4 of this order and, where necessary, grant exceptions to the disposition requirements of the “Uniform Administration Requirements for Grants and Cooperative Agreements to State and Local Governments” common rule, or other relevant rules or regulations for infrastructure assets; provided that the transfer price shall be distributed, as paid, in the following manner: (i) State and local governments shall first recoup in full the unadjusted dollar amount of their portion of total project costs (including any transaction and fix-up costs they incur) associated with the infrastructure assets involved; (ii) if proceeds remain, then the Federal Government shall recoup in full the amount of Federal grant awards, associated with the infrastructure assets, less the applicable share of accumulated depreciation on such asset (calculating using the Internal Revenue Service accelerated depreciation schedule far the categories of assets in question); and (iii) finally, the State and local governments shall keep any remaining proceeds,

Sec. 4. Criteria. To the extent permitted by law, the head of an executive department or agency shall approve a request in accordance with section 3(c) of this order only if the grantee: (a) Agrees to use the proceeds described in section 3 (e)(iii) of this order only far investment in additional infrastructure assets (after public notice of the proposed investment) or for debt or tax reduction; and

(b) Demonstrates that a market mechanism, legally enforceable agreement, or regulatory mechanism will ensure that: (i) the infrastructure asset or assets will continue to be used for their originally authorized purposes; and (ii) user charges will be consistent with any current Federal conditions that protect users and the public by limiting the charges.

Sec. 5. Government-wide coordination and Review. In implementing Executive Order Nos. 12291 and 12498 and OMB Circular No. A-19, the Office of Management and Budget, to the extent permitted by law and consistent with the provisions of those authorities, shall take action to ensure that the policies of the executive department and agencies are consistent with the principles, criteria. and requirements of this order. me Office of Management and Budget shall review the results of implementing this order and report thereon to the President one year after the date of this order.

Sec. 6. Preservation of Existing m Authority. Nothing in this order is in any way intended to limit any existing authority of the heads of executive departments and agencies to approve privatization proposals that are otherwise consistent with law.

Sec. 7. Judicial Review. This order is intended only to improve the internal management of the executive branch, and is not intended to create any right or benefit, substantive or procedural, enforceable by a party against the United States, its agencies or instrumentality’s, its officers or employees, or any other person.

/a/ George Bush

THE WHITE HOUSE

April 30, 1992.


Criminal charges of TREASON
Posted by: T at Sep 18, 2005 00:15
On May 23, 1933 , Congressman Louis T. McFadden brought formal

charges against the Board of Governors of the Federal Reserve Bank

system, The Comptroller of the Currency and the Secretary of United

States Treasury for numerous criminal acts, including but not limited to,

CONSPIRACY, FRAUD, UNLAWFUL CONVERSION, AND

TREASON .

The petition for Articles of Impeachment was thereafter referred to the

Judiciary Committee and has YET TO BE ACTED ON.



(This information should be reprinted, reposted, set up on

other web pages, and circulated


Stop the Cover uppers
Posted by: Sandra at Sep 18, 2005 00:22
The very word "secrecy" is repugnant in a free and open society - John F. Kennedy

It is axiomatic that secrecy is the handmaiden of mischief, especially by government. When we are facing a foreign threat, the government tends to toss around terms like "national security" as a justification for increased secrecy. But often, such an invocation is not as much about making our nation safe as protecting the government from embarrassment or challenge by critics.

The Dangers of Keeping Secrets

---------

New - September 9, 2005
FAA Believed Second 9/11 Plane Heading Towards NY for Emergency Landing
Released 9/11 Hijacking Reports Further Detail Confused U.S. Response

REMOVE ALL SEALS OF SECRECY FROM THE NATIONAL SECURITY ARCHIVES

Re: Why Oklahoma, 911, Iraq war, lack of response to Katrina?Current rating: 0
19 Sep 2005
by Wayne Madsen
Reply to this comment
EXCLUSIVE REPORT: THE DEMISE OF GLOBAL COMMUNICATIONS SECURITY

The Neo-Cons’ Unfettered Access to America’s Secrets

By Wayne Madsen
©2005, WayneMadsenReport.com. All Rights Reserved.

During the Cold War, if the United States suffered a massive compromise of its own cryptographic security and, at the same, time experienced a thorough penetration of its communications intelligence yielding the sensitive sources and methods whereby the U.S. intelligence community tapped and decrypted the communications of its adversaries, the Soviet Union would have been able to dictate surrender terms for America and its allies.

For years, the National Security Agency (NSA) maintained highly classified back doors into the encrypted communications of worldwide foreign ministries, military commands, banks, international organizations, and even the Vatican, the International Committee of the Red Cross, and the United Nations. In addition, the United States spent billions of dollars to develop highly secure cryptographic systems to protect its military, intelligence, and diplomatic communications from the prying ears and eyes of its enemies.

However, according to U.S. intelligence sources with connections to both the Reagan and Clinton administrations, America’s most sensitive communications security and cryptologic secrets have been totally compromised by a Fifth Column embedded within the recent past and current administrations – the group generally identified as “neo-conservatives,” political ideologues rooted in a peculiar blend of Trotskyism and fascism -- ideologues who are neither “new” nor “conservative” in ideology but whose intentions are to weaken America’s national security to a degree that ruins the very foundations on which the nation was built.

One of the major NSA success stories since its establishment on October 24, 1952 was the rigging of the encryption machines of the Swiss company Crypto AG in a secret deal cut between NSA’s William Friedman and Boris Hagelin, the developer of the Hagelin cipher machine used by the Allies in World War II. In 1958, Hagelin, who founded Crypto AG in 1950, agreed to the deal with NSA. It was the height of the Cold War.

For U.S. intelligence, the Hagelin-NSA deal was an intelligence coup on the level of the U.S. breaking of Germany’s Enigma code and Japan’s Purple code in World War II. Neutral nations trusted a Swiss company to sell encryption machines as highly-reliable as Swiss watches and as trusted as Swiss bank accounts. Non-aligned nations like Egypt, Indonesia, Algeria, Afghanistan, Iraq, Mexico, Yemen, Venezuela, Yugoslavia, and Argentina became contented Crypto AG users. Upon independence, Britain’s Commonwealth Office offered the British Empire’s newly-independent states a sweetheart deal. They could protect their sensitive diplomatic communications with free surplus Hagelin cryptographic machines like the C-52 cipher machine once used by Britain. Nations like India, Pakistan, Ghana, Burma, Ceylon, Nigeria, Kenya, Kuwait, and Jordan enthusiastically accepted the offer along with mechanical modifications to handle non-Latin alphabets like Arabic, Burmese, Thai, and Farsi. The users were unaware that all their coded traffic was an open book to NSA and Britain’s Government Communications Headquarters (GCHQ), NSA’s British signals intelligence partner in a secret intelligence-sharing pact known as the UK-USA Agreement. French-speaking Crypto AG salesmen had tremendous success in francophone former French and Belgian African colonies to use their ciphering machines after independence. Soon, governments in the Central African Republic, Morocco, Tunisia, Gabon, Upper Volta, Dahomey, Cameroon, Togo, Congo (Brazzaville), Congo (Kinshasa), Senegal, Malagasy Republic, and Chad were encrypting their communications not aware that everything was being decoded and read by NSA.

Eventually, Crypto AG’s encryption machines went digital. The encryption mechanisms, according to a U.S. intelligence source, were contained in an electronically programmable read-only memory (EPROM) unit known as HC6800 (the “HC” standing for “Hagelin Cipher”). As Crypto AG sold more and more of its units to some 120 countries around the world, the NSA’s ability to read encrypted traffic was a virtual gold mine of intelligence. Convinced the Swiss firm was an honest broker, the Iranian Islamic regime, Libya’s Muammar el Qaddafi, Iraq’s Saddam Hussein, the Philippine’s Ferdinand Marcos, Ethiopia’s Mengistu Haile Mariam, Equatorial Guinea’s brutal dictator Francisco Macias Nguema, and Uganda’s Idi Amin all scrambled their secret money movements, assassination orders, and clandestine arms deals with Crypto’s machines. And everything was known to Washington.

That was, until 1993, when the Soviets became aware of the Crypto AG secret project courtesy of the classified information passed to Israel by convicted Israeli spy Jonathan Pollard. The Naval Intelligence Field Operational Intelligence Office employee, in the course of passing a garage-full of classified documents and computer disks to Israeli intelligence, compromised one of NSA’s most important sources and methods of intelligence gathering. Included among the classified NSA documents passed to Israel was RASIN (Radio-Signal Notations), the multi-volume TOP SECRET UMBRA encyclopedia of how the NSA collected signals around the world. However, the Crypto AG disclosures were contained in an even higher classified set of documents compromised by Pollard.

Pollard’s Scientific Liaison Unit (LAKAM) handler Rafael (“Rafi”) Eitan spirited Pollard’s intelligence take off to Israel where some of it was traded to the Soviet Union in return for an increase in the number of Soviet Jews permitted to emigrate to Israel. America’s ability to read the encrypted traffic of all of Israel’s neighbors (Jordan, Egypt, Syria, Lebanon, and Saudi Arabia) was immediately compromised to the detriment of United States interests in the Middle East. Pollard’s intelligence also included details of the Pakistani atomic bomb project and the A. Q. Khan nuclear proliferation network. According to a 1999 New Yorker article by Seymour Hersh, Pollard had also been involved in trying to broker arms sales to the Afghan rebels in 1985 – an activity that would have put the Israeli spy in direct contact with the Mujaheddin, which was then bankrolled by the Saudis and included Osama Bin Laden and his nascent future “Al Qaeda” terrorists.

Thanks to Pollard’s disclosures to the Soviets, NSA’s prized collection project was immediately compromised to the KGB and GRU military intelligence. The KGB and GRU found out about the “seed key” used by NSA as a master key” to unlock encoded communications transmitted by Crypto AG machines.

For a while NSA’s secret was only known to the Soviets and Israelis. However, in March 1992, after Hans Buehler, Crypto AG’s marketing representative in Iran was arrested by Iranian counter-intelligence for spying for the “intelligence services of the Federal Republic of Germany and the United States of America,” NSA’s operations were truly out of the bag and thrust into the public limelight. Buehler was jailed in Tehran’s infamous Evin prison for nine months. Eventually, Crypto AG paid a $1 million bail for Buehler’s release. After returning to Switzerland, Buehler documented his experience and the NSA rigging program in a book titled Verschluesselt.

Although it is undetermined who tipped off the Iranians about the NSA Trojan horse embedded in their Crypto AG machines, U.S. intelligence sources have revealed that Israel gained the most from the disclosure of the Crypto operation, originally compromised by their American spy Pollard. Ex-CIA agents report that the Russian intelligence successors to the former KGB were actually tipped off about the Crypto AG project CIA spy Aldrich Ames. While still acting as a spy for the Russians after the Soviet collapse, Ames reportedly told the Russians about the Crypto machines. The Russians, in turn, tipped off the Iranians that their Crypto AG units were rigged by the NSA. The Russians may have received additional information on the Crypto units from longtime Soviet and Russian FBI spy Robert Hanssen. CIA sources claim Hanssen could not have gotten his job without high-level support from more senior FBI officials, including his Opus Dei co-religionist and personal friend Louis Freeh, Jr., the FBI Director.

Although Crypto AG (and its secret partner Siemens of Germany) paid Buehler’s bail and tried to bury the story, the effect of Crypto AG’s sales was immediate. Country after country and bank after bank began to have reservations about the equipment despite Crypto’s assurances. Spain and Japan reportedly canceled sales. A number of longtime customers switched to high grade Russian encryption gear.

According to U.S. intelligence sources, shortly after the revelations by Buehler and other Crypto engineers about the NSA project, Switzerland-based international billionaire fugitive and suspected Mossad asset Marc Rich stepped in and invested heavily in Crypto AG’s to boost its deflated stock values. Rich was pardoned by President Clinton in January 2001 in an eleventh hour deal partly negotiated by Rich’s attorney (and current Vice President Dick Cheney’s chief of staff and CIA “Leakgate” suspect) I. Lewis “Scooter” Libby.

The deal with Rich was a Faustian one for Crypto AG. NSA was forced to abandon its prized signals intelligence operation. Communications currently encoded by Crypto AG machines are now, according to U.S. intelligence sources, routinely read by Rich and his Israeli intelligence contacts. Although the encryption technology graduated from computerized central processing units to surface mounted encryption boards, the security trap doors still exist, according to intelligence sources.

Encrypted cables between oil companies and buyers, including spot market dealers, allegedly allow Rich and his friends to underbid lucrative oil contracts. In addition, compromised “secure” bank networks have permitted fake wire transfers to loot numbered bank accounts, including those held by Saudi and Vatican officials. These revelations apparently resulted in the mysterious murder three years ago of the Crypto AG salesman in Saudi Arabia. Moreover, the ability by the Israelis to monitor diplomatic, intelligence, and financial traffic prior to the 911 terrorist attacks permitted international speculators to place “put” options on the stocks of American and United Airlines just prior to September 11, 2001 – an operation that yielded hundreds of millions in profits.

The deal with Rich was a Faustian one for Crypto AG. NSA was forced to abandon its prized signals intelligence operation.


In the early 1990s, a transfer of five KY-78 encryption devices by Canada to a NATO base in Germany resulted in a disastrous compromise of U.S. communications security (COMSEC) secrets to the Israelis. According to U.S. intelligence sources, the Canadians transferred the five of the machines to their CANLOG (Canadian Logistics) United Nations Truce Supervision Organization (UNTSO) post at Camp Ziounai (nicknamed by the Canadians “Camp Roofless”) on the Golan Heights in the Separation Zone between Israeli and Syrian forces. During a rotation of Canadian personnel, two of the encryption machines went missing. After a COMSEC audit was conducted, the Canadian communications supervisor reported he had “at least four” of the KY-78s on the books but could only account for two. Since only one was required for communications, he shipped one back to Germany. However, three of the highly classified units remained missing. Two of the units ended up in the hands of Israeli intelligence and were taken apart and fully examined by Mossad crypto experts. Israeli human intelligence agents procured the machine’s key codes from other sources.

The results were disastrous for U.S. and NATO secure communications. During Operation Desert Storm, the Israelis were able to read all of the encrypted traffic in and out of the U.S. Embassy in Tel Aviv. U.S. intelligence sources report the only secured communications to and from the embassy was by diplomatic pouch. To cover the fact that they had obtained the codes from the Canadian Golan post, Israeli intelligence began setting up U.S. Marine guards at the Tel Aviv embassy with local prostitutes as a feint to divert attention away from the KY-78 compromise on the Golan to the unwitting Marines as possible crypto thieves in the eyes of U.S. counter-intelligence agents.

Ironically, after the compromise the Canadian peacekeepers replaced their KY-78s with similarly compromised Crypto AG equipment. As for the U.S. Embassy in Tel Aviv, after its coded communications were compromised and this became known to NSA, the embassy’s encryption devices were rewired and the codes were changed.

The Israelis were then forced to rely on human intelligence assets within the embassy to feed them classified information. Enter Air Force Reserve officer Larry Franklin – a Defense Intelligence Agency analyst who was first detailed in 1993 to perform his reserve active duty at the U.S. Embassy in Tel Aviv. Franklin would serve repeated tours of duty at the embassy. Earlier this year, Franklin and two officials of the American Israel Public Affairs Committee (AIPAC) were indicted for mishandling highly classified U.S. intelligence. Franklin was discovered to have stashed 83 classified documents, including Sensitive Compartmented Information (SCI) files at his West Virginia home. Franklin was accused of passing classified documents to the AIPAC officials who had maintained a liaison with an Israeli intelligence official at the Israeli embassy in Washington.

Soon, Franklin would have some intelligence assistance at the Tel Aviv embassy. Enter U.S. ambassador Martin Indyk, a naturalized U.S. citizen from Australia. Strangely, Indyk had two tours of duty as U.S. ambassador to Israel – from 1995 to 1997 and from 2000 to 2001. According to U.S. intelligence sources, Indyk was a valued supplier of classified U.S. intelligence to Israel. In 2000, Indyk had his security clearance yanked. Although Secretary of State Madeleine Albright denied that Indyk was suspected of espionage, U.S. intelligence sources tell an entirely different story. State Department Bureau of Diplomatic Security agents discovered that Indyk routinely took home classified materials where they were left to be photocopied by his maid who doubled as a Mossad operative. Indyk also reportedly allowed his Israeli dinner guests to read other classified documents. Knowing this, State Diplomatic Security agents planted some “classified” documents on Indyk and waited for them to appear. After they turned up through the suspected channels, Indyk’s security clearance was lifted.

CIA sources have confirmed that the neo-con penetration of NSA’s raw telecommunications intercept data by John Bolton was part of a multi-pronged attempt by Israeli intelligence to access the “Fort Knox” of America’s cryptologic secrets: the massive repository database of global intercepts of phone calls, email, faxes, and telexes now known as “ANCHORY” but will soon be expanded into a super database code named “OCEANARIUM.” As a result of former NSA Director Michael Hayden’s outsourcing contracts named “Groundbreaker” and “Trailblazer,” companies with ties to Israeli intelligence are gaining increased access to NSA’s operations and its massive archives of secrets.

The FBI also had severe problems with communications compromises during the lead up to 911. FBI agents tailing Israeli agents in the United States (who, in turn, were living and working in close proximity to the Al Qaeda hijackers) were stymied by the compromise of secure FBI and Justice Department communications systems by Israeli contractor telecommunications companies such as AMDOCS and Comverse Infosys. In addition, Israeli software companies had permitted Mossad unfettered access to credit card and telephone records of U.S. counter-intelligence agents. America’s counter-intelligence community was trying to do its job with one hand tied behind its back.

The Mossad operatives the FBI’s New York Joint Terrorism Task Force (JTTF) was tailing in the New York and New Jersey areas covered their communications by using untraceable Verizon pre-paid cellular phones and Nextel two-way walkie-talkie devices. Mossad agents were also trailing and harassing CIA agents assigned to track people like lead hijacker Mohammed Atta, especially in Fort Lee, New Jersey where Atta lived for a while. An attempt by the FBI to penetrate New York and New Jersey Israeli intelligence-connected office moving companies, such as Urban Moving Systems, which was discovered to have conducted an emergency move of the Israeli Zim-American Israeli Shipping Company from the World Trade Center’s North Tower just weeks prior to 911, were disrupted by communications compromises and pressure from FBI and Justice Department headquarters in Washington, DC. Much of that pressure reportedly originated from then-U.S. Attorney for Northern New Jersey Michael Chertoff, the current Secretary of Homeland Security.

U.S. intelligence sources report that the late FBI agent John O’Neill was well aware of the suspicious Israeli activity in the lead up to 911. One FBI was taken off the Israeli surveillance operations and sent to Pakistan to investigate the kidnapping and murder of Wall Street Journal reporter Daniel Pearl. According to U.S. intelligence sources, Pearl was killed not by Al Qaeda but by paid foreign hit men hired to get rid of someone who was getting “too close” to the actual money sources that paid for the 911 attack.

U.S. intelligence sources report that the one Israeli who is considered an extreme threat to U.S. national security is former Prime Minister and current Prime Minister hopeful Binyamin Netanyahu. Not only has Netanyahu visited convicted Israeli spy Jonathan Pollard in his North Carolina prison cell and advocated strenuously for his release but he was once overheard by an ex-CIA agent as saying to a group of his supporters, “Once we squeeze all we can out of the United States, it can dry up and blow away.” Considering the damage the neo-cons and their Israeli facilitators are causing for U.S. national security, Netanyahu may soon have his wish.

Download Article (PDF)

Add to PDF Compilation

Download PDF Compilation
Email Article