Blog Archives

US spies on everybody worldwide: Commentator

Press-TV-StewWebb-2015-05-11

Press-TV-StewWebb-2015-05-11

Click on link below to watch interview:

http://www.presstv.ir/Detail/2015/05/11/410468/US-NSA-espionage-Germany-BND

Press TV has conducted an interview with Stew Webb, a columnist and US federal whistle-blower, in Kansas City, to get his take on the scandalous collaboration between the German Intelligence Agency (BND) and the US’s National Security Agency (NSA).

The following is a rough transcription of the interview.

Press TV: It seems the scandal is getting deeper as far as the collaboration between the German intelligence agencies goes as well as the NSA. What do you make of it, specifically now that it has moved beyond just individuals to governments and even corporations?

Webb: Well, first of all, the spying has always been here and will continue to be here, but here is where the results are. In 1991, George Herbert Walker Bush installed a backdoor trap in what was known as the Inslaw/the Promise Software and he sold it to the German intelligence agencies, he sold it to the French, he sold it to everybody worldwide that would buy it. And it allowed the back door for the NSA to be a spy on anyone, anywhere in the world.

Now Israel, they installed in 1991 in an NSA satellite base and allowed Israel – which uses espionage against the United States of America – they allowed them to be able to hit into our spy agencies network. And as a result of that, everybody worldwide is spied upon. If they would just get rid of their Inslaw, their Promise Software that they bought from daddy Bush in 1991, it would stop the spying worldwide; otherwise, it is not going to stop.

Press TV: Right, now Mr. Webb, considering it can be done, the stopping of the spying, the fact that governments around the world haven’t taken that step goes to show some form of collusion, wouldn’t you agree?

Webb: I would agree, the new world order is upon us, this is put, and this is their agenda, is one more government eventually, with the capital being in Jerusalem. Now, I might add a couple of things.

The spying over here is so ridiculous. Federal courts have ruled – several of them, appeal courts – that it is illegal spying on American people, and yet it continues. And the NSA satellite base that they have in Utah is beyond belief the amount of computers six floors below ground and it’s run by private contractors tied to daddy Bush, I call him George Herbert Walker Bush, and this has to stop.

We ourselves have been inundated. The media over here is so fake. We do not have any real media. They own and control the media. As an example, six of us, columnists on Veterans Today, recently left because we found out that this is an FBI troll operation run by Gordon Duff, also known as Bob Foote.

And it is just unbelievable, even the alternative so-called media over here is so infiltrated and the garbage comes out to the American people is unreal. Now, we are trying to create a network here of independent journalists and former CIA personnel that are telling the truth and have been, http://www.veteranstruthnetwork.com and of course I have my site, http://www.stewwebb.com

ABN/HJL




Sarah McClendon’s Washington Report December 24 1991

Sarah-McClendon

June 1992 Sarah McClendon interview George HW Bush in the Oval Office:
Sarah McClendon said: George Bush what will the American People do if they ever find out the truth about Iran Contra and Iraq Gate?
George Bush replied: Sarah if the People ever find out the truth we will be chased down the streets and lynched.

 

 




Illuminati Council of 13 Human Sacrifice Denver Colorado Dec 20-21

Satan

with introduction by Gordon Duff

Gordon Duff Veterans Today Editor’s note :  With the current meltdown of the British government tied to an almost identical scandal, and it is very much about satanic human sacrifice, not just butchering and killing children “for no reason,” as reported, one would think a publication other than VT would have the guts to carry these stories.

These ritual killings are part of a belief system on the part of the Black nobility and key families, you can name them easily, where they cement their relationships with the demonic/non-corporeal entities that help them maintain control over our government and media.

Choose to believe or not, you and your family live in slavery because of this, we fight wars to feed their blood frenzy.  All of this is very real.  An excerpt from a private secure comm:

“It is important to be aware of non-physical lifeforms – but it is not necessary to fear them.   However, the demons LOVE fear, and have every interest in spreading crap about satan and demonic possession etc etc.

Humans CAN and DO pick up non-physical parasites, and over the years some of the more intelligent ones actually feel like they are inside your head.  But they are not, and they can be removed, but not easily.
After a non-physical entity attaches to a human (who HAS to have some major trauma for this to happen!!!) over time it syncs with the human – and can become a voice in the head.
However, there is another situation which seems the same but is different, although some think not: … You see, humans are actually multidimensional in the fullest sense of the word, and if a compartmentalised part of you is separated and reintroduced to an ‘old’ you – it would come across or seem to be a completely different entity (i.e. possession).  But can another aspect of you, ‘possess’ you?
Christian mythology is the pinnacle of millennia of perfected mind control.   Look around you and see just how many intelligent people still buy this insane psychobabble – or who even want to hang on to it, in case it might be ‘right’.
All the Abrahamic religions are a ET mind-control op – how much simpler can I say it.”

Another aspect of this dynamic are traditional/multi-generational family “infestations” which are more than voluntary.  VT insiders have attended infestation rituals.  These occur on Corfu for the Rothchilds or at Skull and Bones (Yale/Bush family and others) or Bohemian grove or at the Denver solstice.  In Washington, the evangelical “prayer breakfast” cult outings help not only “bond” power brokers to one another but to their “non-corporeal” associates as well.

As Jim W. Dean so often says:  “You can’t just make this stuff up.”

Why do you think the ADL, AIPAC, the Koch/Adelson crowd and others demonstrate such blatant inhumanity?

By Stew Webb

Related Illuminati Busted June 21

Illuminati Council of 13 Human Sacrifice Denver Colorado June 21, 2013

VT Was Right: Illuminati Sacrifice Busted! June 21, 2013

http://www.news9.com/story/22633102/suspect-mentioned-satanic-cult-while-holding-toddler-hostage-at-mwc-walmart

 

Daddy Bush the Illuminati Wizard of Oz

Warning kidnapping of new born infant between December 20-21 2014, check all aircraft for any infants ask for birth certificates from parents.

Denver Colorado on June 20 and December 21 each year at 12:00am-3:00am mountain time known as the “Summer and Winter Solstice” the Illuminati Council of 13 Bankers hold their “Tiffany Lamp meetings”. These known Satanists perform Human Sacrifices as part of their satanic rituals at the Old Navarre a former Whore House and Casino located at 1725-1727 Tremont Pl, Denver, Colorado, across from the Ships Tavern at the Brown Palace Hotel in downtown Denver, Colorado.

The_Navarre_1  The_Navarre_2

1727 Tremont Pl, Denver, Colorado 80202

They enter the Old Navarre through the Ships Tavern at the Brown Palace Hotel down a ramp between the Restrooms is a door that is unlocked that enters a tunnel that goes across the street to The Navarre.

During these rituals a Human Infant is killed and sacrificed to Satan, the Satanist drink the blood of the Infant Human they sacrifice, and appears before them and goes out to kill the enemies of those Satanist who perform this Human Sacrifice.

This group is known as the Illuminati Bankers the U.S. “Shadow Government” leaders who dictate U.S. World Policy, that are known as Satanists, George HW Bush, Leonard Millman, Larry Mizel, Henry Kissinger, Meyer Rothchild, David Rockefeller, Grace of Grace and Company, Answer Bin Shari the head Rabbi of Israel and others unnamed.

They hold a Pre Ritual parties were they have sex with children many of these pre-ritual parties were held at Leonard & Elaine Millman’s house.

Illuminati

Anthony Lavey son of Anton Levey Founder Church of Satan in America was castrated by George H. W. Bush and Leonard Millman among others at age 13 at the Ritual Party. Listen to full one hour interview below.

MDC Holdings (MDC-NYSE) CEO Larry Mizel the Bank Bail Out Scamster Satanist Illuminati Banker now Hosts the Pre-ritual child pedophilia party. MDC was the parent company of defunct Silverado Savings and Loan were Neil Bush was a Director, Neil the son of George HW Bush.

Further after these Satanists do their murder of the kidnapped Human Infant at 12:00am-3:00am during the witching hour on June 21 and December 22 each year you will normally find them the next day at “Cherry Creek Country Club ” playing Golf sometimes for a Children’s Charity Golf Tournament. It is their cover story to be there in Colorado.

They further are known to stay at the Brown Palace Hotel Downtown Denver.

They have been seen at the Freemasons Temple across from the Colorado State Capitol, directly east of the Governor’s Mansion.

A report of these events was given to the Agent Mark Hostlaw of the FBI-Denver Field Office on November 20th, 2001, under 18 USC 4 Federal Reporting Crimes Act by Stewart Webb Federal Whistleblower, stating the above and that a murder of a child (infant) would take place, and that this Satanic murder would involve the above named persons which the FBI did nothing to stop the murder and this reporter-Whistleblower has come to know that Mark Hostlaw was in charge of a special FBI Division #5 team that has targeted this Whistleblower for over 15 years.

Stew Webb and Veterans Today was right June 21, 2013

http://www.veteranstoday.com/2013/06/12/illuminati-council-of-13-human-sacrifice-denver-colorado

VT was right Illuminati Sacrifice Busted

http://www.veteranstoday.com/2013/06/22/vt-was-right-illuminati-sacrifice-busted

Suspect Mentioned Satanic Cult While Holding Toddler Hostage At MWC Walmart

http://www.news9.com/story/22633102/suspect-mentioned-satanic-cult-while-holding-toddler-hostage-at-mwc-walmart
News9.com – Oklahoma City, OK – News, Weather, Video and Sports |
Daddy Bush Illuminati Wizard of Oz

http://www.veteranstoday.com/2013/09/17/daddy-bush-the-illuminati-wizard-of-oz

baphomet_the_devil

Satan Statue in Denver Airport

History: In Rome, over 300 years AFTER the resurrection of our Lord, there was a yearly feast celebrated by the Romans who worshipped the god Saturn. This was a carry over from Babylon. This time of celebration was always situated around the December 17-24 time frame, coinciding with the winter solstice and the time when Saturn was close to earth. The Pagan Romans called this celebration “The Feast of Saturnalia.” It was always celebrated with gifts on the last two days, then on the 25th of December they began the new celebration of “The Birth of the Unconquerable Sun,” as the days of light would begin to lengthen and the sun would begin to regain its dominance. They believed the sun would die during the winter solstice then arise again from death as the solstice ended by the revolving of the earth in nature. This festival was one of drunkenness, revelry and debauchery. When the Roman Catholic Church had been born in Rome they incorporated this day of celebration so these Pagans would become a part of this Catholic (means universal or one world) church. The Catholic priests told the Christians that God had reveled to them that Dec. 25 was really Christ’s birthday and that is how this fable started. I will enjoy seeing the wonders that God has created in this planet Saturn, but not fall for this Pagan celebration that goes with it.

George_Bush_Chased_Down_Streets_and_Lynched

December 20, 2012 9:00pm MST Denver, Colorado:

Human Sacrifice begins during Witching Hour December 21, 2013 12:00am – 3:00am Mountain Standard Time

The Illuminati Council of 13

1. George HW Bush

2. Henry Kissinger

3. Leonard Yale Millman

4. Larry A Mizel  (MDC-NYSE) (Mizel Director of AIPAC, The Cell and Simon Wiesenthal Center )

5. Meyer Rothchild

6. Answar BenShari (Israelis Head Rabbi)

7. Bill Grace

8. Paul Warburg

9. Pope Benidict (the former Vatican Pope)

10. David Rockefeller

11. Patrick WU aka Patrick Wy

12. ?????????????

13. Baphomet the Goat Headed Demon aka Satan

Click on links below and read about the history of the Old Navarre

http://digital.denverlibrary.org/cdm/singleitem/collection/p15330coll27/id/195718/rec/48
http://www.waymarking.com/logs/details.aspx?f=1&guid=a43dc850-3651-4e44-9a1c-ead7197bfe82
Stayed at the Brown Palace hotel just across the street, and next door to the Navarre House/Brinker Collegiate Institute. During the tour of the hotel, there was mention of the old tunnel supposedly connecting the two buildings. There is evidence the could be one, but it is filled in if it did exist. There is a modern tunnel under the glassed in raised walkway that is used by the hotel and kitchen staff to go from the Brown Palace to the hotel across Tremont street.
Museum of Western Art Old Navarre

Brinker_Collegiate_Institute_Old_Navarre_Denver_CO

1727 Tremont Pl, Denver, Colorado 80202

Information from Leonard Millman’s Waymark Foundation who finance the Israel 911 attack on America through Jack Abramoff and Hank Greenburg of AIG via the Isle Brokerage in Las Vegas.

Brinker Collegiate Institute (Old Navarre) – Denver, CO – U.S. National Register of Historic Places on Waymarking.com

Brinker Collegiate Institute (Old Navarre) – Denver, CO in U.S. National Register of Historic Places

Posted by: FSU*Noles

N 39° 44.681 W 104° 59.286

13S E 501019 N 4399420

Quick Description: This is the Brinker Collegiate Institute, also known as The Navarre, in downtown Denver – listed on the National Register of Historic Places as Building #77000365.

Location: Colorado, United States

Date Posted: 4/14/2008 7:17:12 PM

Waymark Code: WM3K8W

Published By: BruceS

Views: 103

Download this waymark:

.GPX File
.LOC File
.KML File (Google Earth)
Long Description:

This four-story brick Victorian structure was built in 1880, and served as the permanent edifice of the Brinker Collegiate Institute until 1889. From 1889 until 1904, the property was remodeled and opened first as the Richelieu Hotel, then the Navarre. In 1893, owner Owen LeFevre had an underground rail system built to the Brown Palace Hotel across the street which accommodated unseen passage as well as coal delivery. Beginning in 1914, the Navarre served as a private club or restaurant. This building with a diverse history, ranging from collegiate institution to Denver’s classiest bordello and gambling hall, is currently in use as the Museum of Western Art.

Street address:
1727 Tremont Place
Denver, CO USA
80202County / Borough / Parish: DenverYear listed: 1977
Historic significance: Event

Period of significance: 1875-1899, 1900-1924

Historic function: Commerce/Trade, Domestic, Education

Current function: Commerce/Trade, Museum

Privately owned?: yes

[U.S.] National Register of Historic Places URL: [Web Link]

Season start / Season finish: Not listed

Hours of operation: Not listed

Website (secondary): Not listed

Visit Instructions:

To log a waymark in this category, please provide a photograph that shows you (or your GPS receiver, if you’re waymarking solo) and the place.

Posted by: FSU*Noles

N 39° 44.681 W 104° 59.286

13S E 501019 N 4399420

Note about Old Navarre

Owned by Waymark Foundation aka Illuminati Banker Leonard Millman Reportedly deceased 2004 and alive in Cuba. Larry Mizel of Denver took over the Title Illuminati Banker

Check out this link About Brown Palace Hotel from waymarking.com

Haunted Brown Palace Hotel

http://www.stewwebb.com/2013/12/19/illuminati-council-of-13-human-sacrifice-denver-colorado-dec-22

Remember for those who believe in GOD and JESUS Pray that GODS will be done with these Satanic Animals.

Veterans Today Radio News Reports
Stew Webb Federal Whistleblower Host
Mondays 6-8 pm Eastern and Thurdays 8-10 pm Eastern
Listen Live by phone 716-748-0112
Mondays 6-8 PM Eastern
http://www.freedomslips.com (Studio B)
Thursdays 8-10 PM Eastern
http://www.freedomslips.com (Studio B)
http://www.stewwebb.com/stew-webb-veterans-today-radio-archives
http://www.stewwebb.com
http://www.veteranstoday.com/author/swebb
Radio Archives
http://www.stewwebb.com/stew-webb-veterans-today-radio-archives

Radio Archives on Youtub.com
http://www.youtube.com/stewwebb1
https://www.youtube.com/user/veteranstodayradio2
https://www.youtube.com/user/glennleecanady




Cyber Terrorism report over 5 million felonies coming soon

DCS_Goon2

By Stew Webb
The below is just one example of three days of evidence that this author and Federal Whistleblower has logged for over 1 ½ years of evidence. The report will be available this week after up streaming to proper authorities for prosecution.
Some of the main address who are involved and committing cyber terrorism against stewwebb.com
are 324 E. 11th Street Kansas City, Missouri, 201 E. 16th Street North Kansas City, Missouri and Burling Street Kansas City Missouri.

 

Cyber Terrorism Report Over 5 Million Felonies Coming Soon


Stay tuned for final report of over one year of evidence this will be turned over to proper authority for prosecution this week.
http://www.stewwebb.com
http://www.veteranstoday.com/author/swebb

Veterans Today Radio News Reports Whistleblower Stew Webb Host
http://www.stewwebb.com/stew-webb-veterans-today-radio-archives

 

 




Breaking News Terror Alert Inside America?

Veterans_Today_Radio_Programs

Breaking News Terror Alert inside America?
August 8, 2014 two hour Radio Breaking News broadcast a must hear Veterans Today Senior Editor Gordon Duff, Managing Editor Jim Dean, Author Dr. Preston James and Author Stew Webb.

First Hour

Second Hour

Veterans Today Radio News Reports Archives

 

Stew Webb Veterans Today

Stew Webb Website

 

 

 




Radio Stew Webb interviews JB Campbell of the American Defense Party

John_Stokes

March 31 2014 Stew Webb interviews Bruce Campbell of The American Defense Party

2 hours

JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
To those Truth tellers I am carrying my load are you?
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/

 

 




Seattle TV interviews CIA Whistleblower Gene Chip Tatum and Whistleblower Stew Webb

Seattle_TV_Call_4_Investigations

March 27, 2014 Call for Investigations Seattle Television interviews Gene Chip Tatum and Stew Webb

1 hour

 

http://www.chiptatum.com

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Scientific Mold Expert Attacked by Insurance Industry

Scientific_Mold_Expert_Attacked_by_Insurance_Industry_1

By Stew Webb

Scientific_Mold_Expert_Attacked_by_Insurance_Industry_DrWilliamCroft

I interviewed Dr. William Croft, DVM, PhD pathologist in Madison, Wisconsin the other day. He was granted a DVM or veterinary degree in 1970, and PhD in 1975 as a research pathologist. Dr. William Croft is a Consulting Scientist who specializes in environmental chemical poisonings with an emphasis on human and animal health problems relating to toxicology, anatomical pathology, carcinogenesis involving Trichothecene Mycotoxicosis (toxic mold), arsenic, asbestos, pesticides, and chronic wasting disease in humans and animals based on cellular changes.

 

Dr. Croft has been studying the cause and effect of highly poisonous chemicals concerning humans using animal models, and monitors the community concerning new developing diseases. He has been successful in identifying illness utilizing anatomic pathology for over 38 years, during which time the scientific community has requested assistance regarding 7,500 sick people and their physicians in successfully diagnosing toxic mold, arsenic, petroleum, asbestos, and Chronic Wasting Disease.

 

He has obtained over $900,000 in research funds from the NIH, EPA, and other agencies during 1980 and 1983 while he was an assistant professor at the University of Wisconsin.  Dr. Croft studied many toxic chemicals that could cause cancer. He studied fibrous asbestos within dairy cattle and that clearly demonstrated that the dairy cattle developed mesothelioma after drinking asbestos in water. He also demonstrated that homes that were using contaminated asbestos water with 1.5 asbestos fibers per liter in the air were observed.

 

The normal homes were negative. Dr. Croft received a grant from the EPA to study mesotheliomas in dairy cattle. Today over 250,000 miles of asbestos cement pipe remain in the ground, or 1/3 of the United States drinks from asbestos contaminated water. This study took place in the early 1980’s. To replace one mile of a/c pipe with plastic or ductile iron will cost one million dollars per mile and does not cover the cost of mesothelioma or other health problems in humans.

 

He was placed in prison for one year for theft of human services, or misappropriation of funds, not by him but by the department chairman, especially when the cost of replacement of a/c pipe was 25 trillion.  The insurance company just needed a scape goat to blame, so Dr. Croft became court fodder. What happened to allow such behavior?

 

The early research work within the shipbuilders demonstrated that fibrous asbestos was causing mesothelioma.  Asbestos was used as insulation and represented a health hazard with exposure to asbestos fibers in the air.  Industry claimed that exposure to asbestos fibers in the water from asbestos cement pipe did not cause a health problem because it was not in the air, which was a false claim because asbestos fibers were found in the homes that were using the asbestos cement pipes.

 

Dr. Croft has also studied petroleum exposure in dairy animals from underground contaminated water wells, underground storage tanks and pipe line leakage causing poisoning and cancer in humans and animals.  The pathological effects of benzene and other solvents were recorded in dairy animals, large hog farming operations that were observed within contaminated water lagoons, buildings, and human exposure from working in contaminated environments.

 

Using anatomical pathology the expression of benzene and asbestos exposure in US military fighter jets, F16s, was also established in army personnel that developed mesothelioma and phenol poisoning resulting in death from gasoline exposure. Dr. Croft’s diagnosis is based on anatomical pathology and has been accepted by the Department of Defense. Dr. Croft has always tried to help the men and women in the armed services.  Phenol, a metabolite of benzene that has also been established in military human tissue, has also been demonstrated in his laboratory using gas chromatography.  Phenol is q very elusive vapor. In his studies Dr. Croft clearly demonstrated that the EPA 8020 method of determining phenol in water is 40,000 times off, so it would not detect poisonous phenol  levels saving the petroleum industry large amounts of money in insurance settlements.

 

Dr. Croft has also been involved in demonstrating the poisoning effects of arsenic, chromium and copper.  These metals were exposed to humans in ashes as dust and from improper release of wet wood vapors (treated wood used on outdoor decks) allowing humans to become intoxicated, which caused severe acute and chronic health effects. No warning labels were placed on this treated wood that allowed for the exposure to such toxic and carcinogenic products.

 

Dr. Croft and his team have studied toxic mold for over 31 years and he is regarded as a world expert in the “Trichothecene Mycotoxins”. These toxic fungi produce the most poisonous neurotoxin in the world today.  This neurotoxin was identified in the 1940’s in southern Russia when the snow came early and did not allow the grain to be harvested. This event resulted in the death of over 250,000 people and the acceptance by the third countries as a poison with great magnitude. The mycotoxin shuts down the cellular factory so repair, maintenance or reproduction of cells cannot occur.  Ingestion of the mycotoxin results in bleeding to death through the skin.  Inhalation of the mycotoxin will cause the loss of intestinal mucosa and result in death from starvation.

 

In homes where this mycotoxin is generated results in the home being filled with this poison via gas chamber effect.  The mycotoxin is cumulative in its health effects and over time will cause the organs to shut down leading to the demise of the person.

 

?????????????????????????????????????????????????????????????????????????????

 

 

Trichothecene Mycotoxin is the most poisonous neurotoxin in the world today.

 

The Defense Department has reported that Trichothecene Mycotoxins are used as a war weapon today. The publication of “Airborne Outbreak of Trichothecene Toxicosis, Atmospheric Environment 20:549-552, l986” was the first publication in the North American Continent by Dr. Croft.  This Scientific publication has been referenced by other scientists over 218 times, which establishes Dr. Croft as a World Expert and indicates acceptance of the data by other scientific investigators.

 

The publication of this paper by Dr. Croft and other scientists led to the “sick building syndrome” which put the insurance industry into a panic mode.  A jury awarded a family in Texas $32 million for their human health damage. The insurance industry proceeded to totally deny the sick building syndrome and this highly poisonous mycotoxin as a cause of human disease or poisoning.  The American Medical Association does not recognize Trichothecene Mycotoxicosis as a disease and it is not taught in medical schools across the country.  Therefore, when people are sick and seek out their doctor to help them determine the cause, they are told that they do not know what it may be, or suggest they seek the help of a psychiatrist.  People will be persistent and seek other doctors with little help.  Today the mycotoxins are infecting 50-55% of the population.

 

The presence of this mycotoxin in a family represents a public health emergency and may even can be called a “breach of national security”.

 

??????????????????????????????????????????????????????????????????

 

 

Urine sample demonstrating high levels of Trichothecene Mycotoxins. Please note the dark surface of mycotoxins and the protein on the bottom of jar.

 

Dr. Croft’s team developed a Urine Assay to detect Trichothecene Mycotoxins in the urine of humans and animals that have been exposed to these mycotoxins.  (This method has been patented: U.S. Patent No. 6,703,244—Method for Confirming the Presence of Trichothecene Mycotoxicosis in humans).  In 2003, the National Academy of Press recognized this Urine Assay as the only biomarker in existence at the time for the detection of mycotoxins in humans.  The test correlates the concentrations of the Trichothecene Mycotoxins to the various stages of the disease found in the respective human patient.

 

The Urine Assay is still being used as a great research tool to study toxic mold, and recently has shown a way to establish what is called “Connective Diagnosis” based on the observation of the finger print of mycotoxins found in the ambient environment and in the clothing worn by humans. The fungi growing organism in the ambient environment will generate mycotoxins as a vapor and cause depression of the immune system and display a mycotoxin fingerprint. The inhaled fungal spores shed the outer coat and then generate a yeast coat that invades the body and settles within the small arteries.  Extracting the urine of infected person will display the same fingerprint of the outer fungi within the building.

 

Because Trichothecene Mycotoxins have been used as a biological weapon, the U.S. Department of Defense awarded a grant to Dr. Bruce Jarvis, and his colleague Dr Croft, to study the pathological fingerprint to establish the diagnosis of toxic mold.  The U.S. Army now recommends the use of such urine tests to determine the exposure of humans to Trichothecene Mycotoxins (as noted in the Field Manual Treatment of Biological Warfare Agents Casualties).  The reliability of the urine test was validated in the study conducted by W.J. Rea, et al.: Effects of Toxic Exposure to Molds and Mycotoxins in Building—Related Illnesses, Archives of Environmental Health Vol. 58.)  This urine assay is the only determination of the 180 Trichothecene Mycotoxins and the amount expressed in mg amounts on strong scientific basis. Other urine assays are qualitative but do not measure quantities in the sample and are not accepted by the FDA.

 

Dr. Croft and his team have conducted research of toxic mold in humans and animals. He has developed a method to detect the Trichothecene Mycotoxins within urine. 

 

He has developed an animal model to study the direct effects of this Trichothecene Mycotoxins development a pathological finger print to study the histological effect in humans. He has developed the lethal exposure in people at 500 parts per billion per kilogram for adults and 0.500 parts per billion per kilogram.  Dr. Croft has studied the mechanism of action of this mycotoxin in humans and animal as to the method oF exposure. If the person is exposed to the Trichothecene Mycotoxin via ingestion or within the food, the person will die from bleeding from the skin or small arteries within the body.  If a person inhales the Trichothecene Mycotoxins, the person will have the mucosa slough off the intestine and the person will starve to death.

 

Dr. Croft has put together the pathology concerning man of how these mycotoxins affect the tissue in each organ.  Dr. Croft has also studied the toxic effect of the Trichothecene Mycotoxin with regards to how it attacks the human body, attacking the cellular body.  The epoxide binds to the endoplasmic reticulum (cellular factory) and shuts it down.

 

Dr. Croft also has studied the effects of chlorine on the 9-10 unsaturated bond to form a molecule similar to chlordane, in molecular action to a cause brain tumors. Dr. Croft also knows how to neutralize this war weapon with no effects to the human.

 

??????????????????????????????????????????????????????????????????????

 

 

(Young baby in ammonia bath to neutralize the Trichothecene Mycotoxins very safe for the child as shown by her mother resulting from Dr. Croft’s Research)

 

Mother was a US Marine Corps Sergeant.

 

Dr. Croft’s research is discovering more information about this war weapon and getting people to understand this disease.  The insurance industry is attempting to shut the door on this disease, so they will not have to pay claims concerning toxic mold.

 

Attorney Kim M. Kluck from the Department of Safety and Professional Services, which is a service for medical doctors to keep them in order, claimed that Dr. Croft was practicing medicine.  Ms. Kluck stated “It just sounds like he is practicing medicine as a pathologist.”  Ms. Kluck came from American Family Insurance Company in Madison, WI and is now working in the Department of Safety and Professional Services, so the action concerning Dr. Croft is coming from the insurance industry again.

 

Dr. Croft attempted to explain that he was a scientist and not a medical doctor and people came to him for help with their illness because their doctor had no idea of what they were suffering from. A hearing was scheduled and the finding of the judge was that he was practicing medicine.  Ms. Kluck used the rules related to the medical society, not the federal rules regarding a scientist.  She used the wrong playbook and he had no chance of winning that hearing because the cards were stacked against him. In any event, the result of the hearing was that Dr. Croft was practicing medicine and then he applied for another hearing.  Ms Kluck did not recognize the fact that Dr. Croft had a PhD in pathology, which is required to do research on human disease.

 

Dr. Croft requests a new hearing based on the following:

 

  1. A.    Exception of Practicing Medicine Pursuant to 448.03(2)(k)
    1. After reviewing the referenced statutes, an exception is provided that is applicable to Dr. Croft pursuant to 448.03(2)(k) that is applicable to any persons, other than physician assistants or perfusionists, who assist physicians.  This exemption removes Dr. Croft from practicing medicine that was not accepted by the ALJ (judge) decision.
    2. Dr. Croft has not practiced medicine as a medical professional but has assisted licensed physicians by providing research data and reports as requested by the physician.  Conclusions, diagnoses and treatment that their patients receive are determined by the physician.  The physicians receiving the information use the report at their discretion, with no force or coercion from Dr. Croft. Since physicians are prohibited from doing animal research and research directly on humans, they have no other way to obtain such information other than through research studies, of which Dr. Croft is a Research Scientist (Pathologist) and therefore, they ask for his assistance.  Dr Croft feels that when assisting physicians, he has a fiduciary duty to maintain the highest ethical and moral standards in providing the information on a scientific basis to the physician.  In providing information, Dr. Croft has never harmed any patient in releasing this data to a physician. It is the physician’s responsibility to the patient as to the diagnosis and treatment and as to whether they accept Dr. Croft’s science and scientific diagnosis.
    3. Dr. Croft generated a scientific report concerning the cause and effect relationship to Dr. Sprouse, medical doctor that requested Dr. Croft assist her by providing his research that he has conducted over the last 29 years after Dr. Sprouse learned of Dr. Croft while attending international meetings. PL 107-188, sec. 123 grants Dr. Croft full access to the human tissue. No laws were found involving these specimens requiring Dr. Croft to be licensed as a medical pathologist, for Dr. Croft is a Research Scientist not a Medical Doctor. Examination of biopsy specimens are allowed during the cause and effect to transfer the animal’s data to the human data so advancement of human disease can be accomplished, which Dr. Croft has reported many times at international meetings and as publications in the scientific literature.

 

4.      In the conclusions, AlJ found that Dr. Croft’s ability to give expert testimony at trial does not permit him to engage in the practice of medicine. PL 107-188, sec. 123, inhibits the direct study of toxic agents in humans,   therefore, animals must be used.  These studies are carried out in animal species applicable to the human enzyme composition and are demonstrated within the animal tissue.  The biopsy of human specimens are allowed to compare the animal to human when that type of exposure happens in humans.  This process occurs on a scientific basis, process and procedure.  This scientific data is reported, in report form for study for the scientific community to observe and give to the medical world for them to assist their patients if they so desire.

 

When Dr. Croft does a study on a scientific basis, he does the study that would apply to a scientific protocol that all actions would be accepted by the court and the scientific community. 

 

Dr. Croft works in the scientific community not the medical community, but has the exception of 448.03(2)(k), assisting medical doctors, that removes the accusation of practicing without a license.  Federal law 107-188, sec. 123 also allows Dr. Croft to evaluate to transfer the cause and effect observation from animal tissue to the human tissue, which is not practicing medicine. The Scientific method is clearly demonstrated by his description of the biopsy and the autopsy tissue that was described and presented.  Henry C. Pitot, M.D., Ph.D. Professor of Oncology and of Pathology and Laboratory Medicine testified that in his opinion Dr. William A. Croft is a pathologist qualified to diagnosis and study the pathology of human tissues. Respondent’s Affidavit, page 2.

 

  1. B.    The state did not prove their case that Dr. Croft was practicing medicine.
    1. Petitioner’s experts were not qualified to render opinions that Dr. Croft’s actions constituted the practice of medicine.
    2. There is a peer review process among scientists and any scientist can review and comment on Dr. Croft’s findings.  If parties are in disagreement of the scientist data, research must be done to confirm or disagree with the data. Dr. Mitchell and Dr. Eastman and medical doctors are prohibited from doing research on humans PL 107-188, sec. 123, and cannot perform research on animals for they require a DVM, and therefore, they are not qualified to render Dr. Croft’s studies invalid.  The exception pursuant to 448.03(2)(k) allows Dr. Croft to assist physicians by providing scientific research.  The acceptance of his research by the physician is up to the physician.  Whether or not Drs. Mitchell and Eastman accept or disagree with Dr. Croft’s scientific research is for the individual doctors to determine.  However, the fact that Drs. Mitchell and Eastman are not in agreement with Dr. Croft’s scientific research does not mean that they have the final determination as to whether or not Dr. Croft’s science is valid.
    3. Dr. Mitchell’s medical education in clinical pathology National Board of Medical Examiners test was required for licensure.  Dr. Mitchell and Dr. Eastman are not medical doctors and require licensing to allow them to practice medicine. Their function is to help deal with ill humans on a clinical level, not conduct research, for they are not trained in scientific methods and do not qualify as Research Scientists for they do not have a Ph.D.
    4. Drs. Mitchell and Eastman are not board certified in toxic mold because it is not accepted by the medical society, not taught in medical school, and they have no knowledge of the mycotoxins as they have admitted. (T. Page 80, 20-23,  T. Page 119- line 2-20).  Dr. Croft is an anatomic pathologist as a Research Scientist that studies human and animal disease and has spent five years in graduate school obtaining the tools to study human and animal disease.  Board certification does not grant the doctors information on the same level of understanding as the PhD, making Dr. Croft a highly schooled and accepted scientist around the world.  Dr. Croft has conducted numerous animal studies and correlated with human disease as allowed in the federal law PL 107-188, sec. 123. Dr. Croft has published over 30 research papers on toxic chemicals. Dr. Croft has published the first reporting on toxic mold in the North American continent, cited in the scientific literature 206 times indicating acceptance of the data. Dr. Croft has published many other scientific papers on toxic mold.
    5. Drs. Eastman and Mitchell testified “examining into the fact, cause or conditions of human health or disease.” And accumulating clinical history, looking at the gross appearance of surgical specimens, preparing microscopic descriptions and offering a scientific diagnosis is standard scientific protocol as medical doctors does not mean they are practicing medicine.  When examining the pathological reports by Dr. Croft a complete anatomical description of what the biopsy represented based on the study of cause and effect relationship represents scientific protocol.  MD pathologists have no basis to describe the tissue they observe, so they usually use one word to render their diagnosis, not a scientific diagnosis based on scientific data.
    6. Again, based on rule 702, these doctors were not qualified to testify regarding Dr. Croft scientific data: 1. They were not scientists nor qualified to evaluate the scientific data in these reports, 2. They had no pathological knowledge of the illness that they were testifying to on a scientific basis, 3. They had no scientific principles that they expressed in this study, for they are not scientists, but expressing medical falsities, 4.  They falsely concluded that the words reported in the three reports involving using pathological examination of fluid and tissue was the result of medical observation, when in fact was data based on the scientific process, 5. the data presented was the result of cause and effect study in animal and human correlation data , 6. It is unethical for Drs Eastman and Mitchell to render an opinion concerning such a study as reported Pl 107-188, sec.123. Drs. Eastman and Mitchell are not qualified to testify reqarding scientific data generated by Dr. Croft.  Dr. Croft has shown that the medical doctors are not qualified to testify regarding scientific data, and were prohibited by law from doing so. In rule 104 it is clear that the predominance of the evidence demonstrates that they are not qualified to testify.
    7. This autopsy case was completed, the dissection was by a medical pathologist , but the family wanted a second opinion because,“The pathologist reported that there was essentially no remarkable pathology reported in the deceased”.  According to the family, the deceased was exposed to chemical poisons within his contaminated environment. Therefore, the family requested Dr. Croft to review the autopsy tissue  because of his scientific expertise concerning chemical poisons because this death could represent a possible public health emergency for his son Tom who was very sick during this time. The review of tissues was based on animal pathology related to the cause and effect relationship, which is the normal course of study as a scientist. Dr. Croft completed 25 human autopsies as a requirement in graduate school, teaching Dr. Croft how to review human disease on a pathological basis.  Dr. Croft did not do any dissections concerning autopsies since that time.  Dr. Croft has reviewed 14 cases concerned with Toxic Mold over the last 29 years of study. Reviewing autopsy tissue is a primary method by which scientists obtain information on human disease.
    8. In contrast to Dr. Croft, Drs. Erik Mitchell and James Eastman are not experts per se concerning Trichothecene Mycotoxins at their own admission when they testified that they had no knowledge concerning these mycotoxins.  Drs. Mitchell and Eastman even admitted that they did not have any pathological or experimental experience working with mycotoxins (T. Page 80, 20-23,  T. Page 119- line 2-20).  Therefore, it can be concluded that Drs. Mitchell and Eastman are not qualified to testify under rule 702 and 104 since their testimony was not (1) based upon sufficient facts or data, (2) is not the product of reliable principles and methods, and (3) the witnesses did not apply the principles and methods reliably to the facts of the case. It is unethical for Drs Eastman and Mitchell to render an opinion concerning direct research in humans as reported Pl 107-188, sec.123.  This process itself clearly demonstrated that there was no medical practice performed by Dr. Croft based on in the fact the medical doctors were not qualified to testify regarding scientist data, and were inhibited by law in doing so. Dr. Croft does have the proper creditionals to function as a Research Scientist.
    9. Therefore Dr. Croft was not practicing medicine as first determined by the ALJ.  The interpretation of the data by ALJ is in error and Dr. Croft’s objection should be accepted, for Dr. Croft was not practicing medicine.

 

                                                Conclusion

 

  1. 1.     An exception is provided pursuant to 448.03(2)(k) that is applicable to any persons, other than physician assistants or perfusionists, who assist physicians.. 448.01(9)(a), and (d) provided a pertinent part of the practice of medicine excluding the flowing activities of the practice of medicine and were not applicable to Dr. Croft.
  2. Dr. Croft is a research pathologist, the highest position of study in the human world and is allowed to do direct research in animals and then determine the cause and effect relationship in human tissue by observing the skin biopsy tissue. This is not considered practicing medicine because this is a scientific process, not a medical process. Direct exposure is unethical to be tested in humans and requires an animal study to complete the safety procedure for humans. PL107-188, sec. 123.
  3. It is unethical for Drs. Eastman and Mitchell to render an opinion concerning direct research in humans as reported Pl 107-188, sec.123.  This process itself clearly demonstrated that there was no medical practice performed by Dr. Croft based on in the fact the medical doctors were not qualified to testify regarding a scientist data, and were inhibited by law by doing so. Dr. Croft does have the proper creditionals to function as a Research Scientist.
  4. Based on rule 702 and rule 104, these doctors were not qualified to testify regarding Dr. Croft’s scientific data.
  5. Based on the above data Dr. Croft was not practicing medicine, has done nothing wrong and should be free to function as a research pathologist

 

Then Ms. Kluck reported Dr. Croft to the United States Attorney to put added pressure on Dr. Croft.  Dr. Croft wrote a letter to the US attorney in response to Ms. Kluck accusations.

 

June 20, 2013

 

PETER M. JAROSZ

 

Assistant U.S. Attorney

 

Suite 303, City Station

 

Madison, Wisconsin 53703-4703

 

Dear Peter Jarosz:

 

Under the umbrella regarding human health there are two communities, Research and the Medical.  In the research community we work under federal law that requires one to have a Ph.D. as a scientist in pathology because all disease has a histological diagnostic fingerprint identifying the poison or the causative agent. Direct research on humans is unethical so the research must be initiated in animals to identify the diagnostic fingerprint using that data to establish safety.  Additional information is accomplished in the human and animal to understand the causative agent.  The data is collected on a scientific basis and then is published in the appropriate journals. I do have the credentials to study human disease. Since animals are used a veterinarian is required to determine which animal model is the best to use for the study. I completed all the required course work including completing 25 autopsies complied in a report as to cause of death and the histological changes identified for graduate school.  I was granted a PhD in Pathology from the Medical school University of Wisconsin in 1975.  Since that time I have conducted numerous animal studies to determine safety of human exposure.

 

FEDERAL AUTHORITY

 

By the authority granted under Public Law 107-188-June 12, 2002, TITLE 42—PUBLIC HEALTH Sec. 85a.7: Imminent dangers, Title 21, Chapter 1, Part 2, sec. 2.5, Imminent hazard to the Public Health.  

 

The Office of Public Health Preparedness directs HHS Operating and Staff Division implementation of a comprehensive HHS strategy to protect the civilian population from acts of bioterrorism and other public health emergencies.  The OPHP will work with the OPDIVS and STAFFDIVs to ensure the adequacy of HHA strategy for preparing, preventing, responding to, and recovering from acts of bioterrorism and other public health emergencies.  

 

 

SCOPE

 

Congress clearly authorizes that Research Pathologists are qualified to determine Efficacy, Safety of New Drug and Biological Drug Products, and issue a final diagnosis in human disease, and has the final rule or decision. To promulgate the rule or put the law into formal public announcement, In Public Law 107-188, 2002 is observed.

 

“(B) …prioritizing counter measures required to treat, prevent, or identify exposure to a biological agent or toxin pursuant to section 351A:

 

“(C)… facilitation of the awarding of grants, contracts, or cooperative agreements for the development, manufacture, distribution, supply-chain management, and purchase of priority countermeasures;

 

SEC.123 Issuance of Rule on Animal Trials:

 

Not later than 90 days after the date of the enactment of this Act, the Secretary of Health and Human Services shall complete the process of rulemaking that was commenced under authority of section 505 of the Federal Food, Drug, and Cosmetic Act and section 351 of the Public Health Service act with the issuance of the proposed rule entitled “New Drug and Biological Drug Products, Evidence Needed to Demonstrate Efficacy of New Drugs for Use Against Lethal or Permanently Disabling Toxic Substances When Efficacy Studies in Humans Ethically Cannot be Conducted” published in the Federal Register on October 5, 1999 (64 Fed. Reg. 53960), and shall promulgate a final rule.

 

Using the correct animal model, comparing the pathology observed in humans and animals, the cause-and-effect can be and must be studied on a scientific basis.  We study diseases that are caused by toxic chemicals to determine mechanism of action, metabolism, and whether they are direct acting or if they need metabolic activation to affect the tissue cells.  We study different routes of exposure, i.e., inhalation, dermal exposure and ingestion of substances causing disease.  We study if other influencing toxic chemicals increase the toxicity of these substances.  We study the scientific literature to understand other scientific information on other human exposure by other scientists. We complete autopsies and obtain biopsies to determine the terminal stages of death in an attempt to understand the pathogenesis of the disease.  Human tissues and specimens from ill people are taken and compared to animal specimens to establish scientific data concerning a human disease.  This process is consistent with normal research or scientific methods used by a research pathologist in the scientific community.

 

The Medical community’s main function is to help as many people as they can with what information they have.  They are not scientists and cannot conduct cause and effect relation studies in every case.

 

It is unethical for anyone from the medical community to interfere or dictate behavior to the scientist from the scientific community on how to conduct scientific research or his interest concerning human disease especially a bioterrorist’s mycotoxins.  People within the medical community are not scientists and are not aware of protocols within the scientist community. This includes anyone working within the medical community, including doctors, med techs and including attorneys who do not understand the process.

 

If someone disagrees with the scientific data then they must generate a scientific study to establish their point and then discussed between the parties.

 

Forcing a scientist to conform to statute 42 USC. 263a(b), which pertains to the medicine clinical operation concerning the medical community is unethical.  Because the scientific community uses a process that is much more accurate based on science, why would they go back to an archaic method. This is a good example of interference by the medical community. The medical society is using medical laws to falsely charge the scientific community.  The scientific community uses animals and a research pathologist to determine the cause and effect, and the method is many times more accurate to determine cause and effect. Congress put into law 42 USC 263a(b) to strengthen the work completed by the personnel working in the medical community.  You phoned me and stated “that all were included”, which meant all those in the medical field, not the scientific community for the scientific community already had much more accurate procedures backed by federal laws.  This type of behavior by the medical community is totally unethical.  I work in the scientific community, why am I being dragged back into the medical community? I believe it is to interfere with the research that I am conducting, especially to toxic Trichothecene Mycotoxins.  I must be doing something significant othe wise Ms. Kluck would not be interested in me.

 

We have been asked by the U.S.Department of Defense to conduct research on Trichothecene Mycotoxins.  We have received a small grant and in response have put together “The Pathology of Trichothecene Mycotoxins at Autopsy.” This scientific data is important, for these mycotoxins which are the most poisonous neurotoxins on the planet, and are considered a bioterrorist agent.

 

This process of scientific study of human disease has not changed at the University of Wisconsin, Madison, WI, where I trained as a research pathologist.  I was on the facility and obtained over $900,000 in research funds to conduct scientific studies.

 

“(C)…facilitation of the awarding of grants, contracts, or cooperative agreements for the development, manufacture, distribution, supply-chain management, and purchase of priority countermeasures;

 

(b) Use of Animal Trials.—A drug for which approval is sought under section 505(b) of the Federal Food, Drug, and Cosmetic Act or section 351 of the Public Health Service Act on the basis of evidence of effectiveness that is derived from animal studies pursuant to section 123 may be designated as a fast track product for purposes of this section. 

 

Also, please note, we obtain our authority to work as a scientific Research Pathologist from federal law as stated above to observe and study human tissue and disease working in the scientific community. The medical community does not have the ability to study human disease directly, cannot study human disease using animals, and they are not scientists. Introduction of medical processes would be considered interference by the scientific community and is unethical.  What determines a laboratory as research or clinical is just another case of interference from the medical community.

 

Congress has clearly authorizes that Research Pathologists are qualified to determine Efficacy, Safety of New Drug and Biological Drug Products, and issue a final diagnosis in human disease, and has the final rule or decision. To promulgate the rule or put the law into formal public announcement, In Public Law 107-188, 2002 is observed.

 

Therefore, I will remain a Scientific Pathologist and study human and animal disease as I have over the last 35 years. I am asking the medical profession to stop their action against me.

 

Dr. Croft did not hear anything from the state or federal government for seven months, then in mid February the veterinary board was going to do disciplinary proceedings against him.  Dr. Croft asked for 30 more days to get legal opinions  before the State of Wisconsin suspended his veterinary license, and requiring him to pay for their investigation, a sum of $850.00, to be paid in a specific time.

 

On May 14, 2012, the administrative law judge issued a special order stating that Dr. Croft was not supposed to become involved in any manner with people concerning their illness.  On or about October 2012, Dr. Croft was contacted by a Worker involving a Workman’s Compensation case to help establish his case in court. Dr. Croft visited the Worker and observed the home and the occupants within. The worker’s grandchild was severally poisoned with Trichothecene Mycotoxins as he demonstrated severe autism and brain illness.  At this time in my mind this family became a public health emergency.  The worker provided a urine sample and pathology slides for Dr. Croft to examine to confirm the diagnosis and the cause of the illness.  The case for the worker was settled out of court and the man wanted his money returned for testifying in court.  It appears Dr. Croft was set up, but he was concerned about his grandson that was severely poisoned with the mycotoxins that he brought home on his clothing via cross-contamination.  When children are exposed to Trichothecene Mycotoxin they only survive 10 years and about 3-4 years have already passed.

 

Under federal law Congress clearly authorizes that Research Pathologists, are qualified to determine Efficacy, Safety of New Drug and Biological Drug Products, and issue a final diagnosis in human disease, and has the final rule or decision. To promulgate the rule or put the law into formal public announcement, In Public Law 107-188, 2002 is observed.

 

“(B) …prioritizing counter measures required to treat, prevent, or identify exposure to a biological agent or toxin pursuant to section 351A”.  Remember at this point the medical society has not even accepted the toxic mold as an illness and does not even teach doctors in medical school about the poisoning. 

 

In any event Dr. Croft’s Veterinary license is suspended indefinitely. Where does he go from here?  He never thought he would ever be destroyed by terrorists in the United States of America. He never thought that the insurance companies would be pushing and assisting the terrorists. That is why one should read the book that my editor and I wrote to inform the public about the disguised disease. They tell how single handedly the pharmaceutical companies and the insurance dealt with terrorists in generating disease that draws attention from the real cause. As a pathologist Dr. Croft uncovered the real cause of these diseases that would not have been uncovered without a highly skilled pathologist.  You can order the book called “Operation Synapse” on Dr. Croft’s website, www.williamcroft.com.

 

I Stew Webb highly recommend the book and you will be glad you did get it.  These scientists are attempting to inform the people and the United States as to what is happening in the world.

 

Radio: Stew Webb interviews Dr. William Croft Friday March 14, 2014 on John Stokes The Edge on Micro Effect Radio Network

 

First Hour

 


 

Second Hour

 

 

?????????????????????????

 

 

The Edge with John Stokes

 

The Micro Effect Radio

 

???????????????????????????????

 

 

 

 

Hardback, Soft Cover or Electronic Download Special $3.99

 

Dr. William Croft’s website buy his book:

 

For Scientific, TV or Radio interviews:

 

Contact Dr. William Croft

 

Stew Webb Columnist Veterans Today

 

Stew Webb’s Website stewwebb.com

 

Contact Stew Webb Federal Whistleblower-Activist for TV or Radio interviews:

 

stewwebb@stewwebb.com

March 17, 2014

Kim Kluck

dsps@wisconsin.gov

State of Wisconsin

I would like an immediate response to the below detailed article. What is your and the State of Wisconsin’s position on the material evidence and the charges filed by you and your agency against Dr. William Croft?

I await your reply!

Stew Webb Veterans Today

http://www.veteranstoday.com/author/swebb

http://www.stewwebb.com

federalwhistleblower@gmail.com

816 478 3267

Scientific Mold Expert Attacked by Insurance Industry

http://www.veteranstoday.com/2014/03/14/scientific-mold-expert-attacked-by-insurance-industry/

 




Seattle TV Will Wilson interviews Dr William Croft and Stew Webb

Seattle_TV_Call_4_Investigations

Seattle Television Will Wilson interviews Dr. William Croft and Whistleblower Stew Webb (1 hour)

Dr. William Croft

http://www.williamcroft.com

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Seattle TV Will Wilson interviews JB Campbell and Stew Webb

Seattle_TV_Call_4_Investigations

Seattle Television Will Wilson interviews J.B. Campbell and Stew Webb (1 hour)

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Seattle TV Will Wilson interviews Gene Chip Tatum and Stew Webb

Seattle_TV_Call_4_Investigations

Seattle Television Will Wilson interviews CIA Whistleblower Gene Chip Tatum and Federal Whistleblower Stew Webb. 1 hour

Gene Chip Tatum

http://www.chiptatum.com

http://www.veteranstoday.com/author/tatum/

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Seattle TV interviews Professor James Fetzer and Stew Webb

Seattle_TV_Call_4_Investigations

 

Seattle Television interviews Professor Jim Fetzer and Whistleblower Stew Webb

one hour

Professor James Fetzer

http://www.veteranstoday.com/author/fetzer/

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Seattle TV interviews Gene Chip Tatum and Stew Webb

Seattle_TV_Call_4_Investigations

Seattle Television interviews CIA Whistleblower Gene Chip Tatum and Whistleblower Stew Webb

1 hour February 25, 2014

Gene Chip Tatum

http://www.chiptatum.com

http://www.veteranstoday.com/author/tatum/

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Seattle TV interviews Dr William Croft and Stew Webb

Seattle_TV_Call_4_Investigations

 

Seattle Television interviews Stew Webb and Dr. William Croft 1 hour March 11, 2014

 

Dr. William Croft

http://www.williamcroft.com

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Seattle TV interviews JB Campbell and Stew Webb

Seattle_TV_Call_4_Investigations

 

March 18, 2014 Call 4 Investigations interviews J.B. Campbell and Stew Webb

1 hour

J.B. Campbell

http://www.americandefenseparty.com

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Radio Vinny Eastwood interviews CIA Whistleblower Gene Chip Tatum and Stew Webb

Vinny_Eastwood_Show

 

Vinny Eastwood interviews CIA-DIA Whistleblower Gene Chip Tatum and Federal Whistleblower Stew Webb

3 hours. Click on link below to listen to interview:

Gene “Chip” Tatum

http://www.chiptatum.com

Gene Tatum Columnist Veterans Today

http://www.veteranstoday.com/author/tatum/

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

To those Truth tellers I am carrying my load are you?

Would you consider a small donation to help support the cause?

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

 




Meet John McCain Notorious Gun Runner

John_McCain_Notorious_Gun_Runner

What name can we give to this spring’s uprising in Ukraine?

We can always expect a diversion when the US is in a hole domestically, and Ukraine and the compliant media have provided that. That has been pretty much the story of US foreign policy under the Obama administration, regardless of the long term consequences. Using one part of the country to destroy the other and create two separate zones of influence is not what any protestor is campaigning for, but that hardly matters when a grand scheme is required to show that you, and not its democratically-elected government, are still in charge of someone else’s country.

What is more revealing are the links between the so-called democracy movements and the agendas of international arms dealers. The protestors are objecting to Yanukovych’s methods, the US to his foreign policy orientation, the EU to the fact he put Ukraine’s interests before its own imperatives and the media to the violence perpetrated by both sides. All these stakeholders want to achieve different things at the end of the day, whether or not they have articulated these, and whatever the outcome is most of them will end up dissatisfied.

Arms dealers, on the other hand, are delighted to have found a new market and gained heavyweight political backing for their trade. Paid in drugs and pallets of cash, they are the major winners in the battle for Ukraine.

Arms markets don’t disappear when conflicts end, trusted suppliers are prevailed upon even more to ensure the survival of new regimes and cleanse their deeds by turning street fighters into legitimate armed forces. Of all the players in Ukraine the arms dealers will end up achieving the greatest percentage of their goals. The protestors are “Maidan Puppets” indeed.

We know quite a lot about how the protestors in Ukraine are being armed, not because the arms trade has become more transparent but because the protestors have so many ‘friends’ in high places whose connections can be traced. We can almost follow an individual weapon as it departs from Arizona and takes a “fast and furious” pass through Mexico, England, Germany, Georgia, Turkmenistan and then on to Syria or Maidan Square.

We can do this because a large number of these weapons are connected with one man – the former Republican presidential candidate SENATOR JOHN McCAIN. The man who betrayed his comrades in North Vietnam and called it patriotism still can’t help himself, it seems.

McCain and his friends

The US State of Arizona can be politely described as ‘unreconstructed’. To put it more bluntly, it is still run by the Mob, as it has been since Prohibition days, with all politicians beholden unto it. At least two of its sitting governors have faced federal criminal charges, later strangely dropped, ranging from extortion to misuse of public funds whilst in office. This is the state Senator John McCain represents.

McCain makes much of his service record in Vietnam and elsewhere. What he doesn’t talk about much is the fact he dumped his Navy wife to marry into a mob-owned Budweiser distributorship, a $200 million-a-year business, which bankrolled his political career. Voters did not seem to be bothered by that, as they expect these sorts of connections in Arizona. Brewing, Prohibition, the Mob, http://www.wnd.com/2008/02/57354/ – just keep it out of our faces, make the odd sacrificial prosecution, and you can do what you like.

Amy Silverman and John Doherty, writing in the Phoenix New Times for a multi-news agency team called Investigative Reporters and Editors Incorporated, have reported that the father of McCain’s wife, James Hensley, was convicted by a federal jury in the U.S. District Court of Arizona in March 1948 on seven counts of filing false liquor records. Hensley was also charged with conspiracy to hide from the federal authorities the names of persons involved in liquor industry racketeering undertaken by two companies he managed.

McCain’s wife has a sordid financial record of her own, littered with offshore accounts and side deals which consistently go unaudited and do not appear among McCain’s registered interests. The Russians have made it known that they have a bulky file of information concerning his co-operation with the North Vietnamese and various other matters, which they might one day release. Over in the UK most people were unaware that Prince Charles has a huge bald patch until a few years ago because an agreement had been made to only film him from certain angles. What sort of deal has John McCain made to prevent the release of this information?

Of course McCain and his wife know that, as well as a scandal-free record, you also need plenty of money to run a political campaign in the US. Just look up the contributions made to McCain’s presidential campaign in 2008 and count the number of Arizona-based arms manufacturers on the list.

McCain ran for the presidency in 2008, the same year as the Georgia-Russia War. He made no secret of the fact that part of his campaign strategy was to present himself as an experienced global figure able to handle a crisis. That one came along at just the right time. Several members of the Georgian government openly campaigned for McCain in that election, even though none of them could vote in the US and neither could more than a handful of their citizens.

One of the Arizona arms manufacturers which contributed to McCain’s campaign is Dillon Aero, based in Scottsdale, which supplies miniguns to one of the US Army’s airborne special operations units. A government contract, of course. The Dillon M134D Gatling Gun is the finest small calibre defence suppression weapon available. It is a six barrelled, electrically driven machine gun which fires at a fixed rate of a maximum of 3,000 shots per minute.

Another is Century International Arms, Inc., listed as an importer of historic firearms into the United States. Both these companies are represented by a legal firm called MarkBarnes & Associates, based in Washington DC, which also admits to doubling as a lobbying organisation. While lawyers take an oath to serve justice, lobbyists are employed to get the best deal for their client regardless of the justice of their case – even if it involves circumventing a law, the lobbyist has done his job if he gets what the client wants. Despite the multiple conflicts of interest this contradiction creates this firm happily fulfils both roles.

Mark Barnes is registered by the US Senate as an arms lobbyist, his ID Number being 5426-24, and his House of Representative arms lobbyist ID is 311050001. He does not list who his clients are, whether they be individuals, government bodies or commercial concerns. Thus any weapons his clients deal in are being imported and re-exported without knowing for whom, and under what legal authority, as can be gleaned from records obtained from the Clerk of the House of Representatives and the Secretary of the Senate Office of Public Records.

Dillon Aero arms have been tracked entering Georgia via an intermediary company, alongside otherwise legal imports. UKRS, the Ukrainian State Arms Exporter, has also sent arms to Georgia which its military have never seen. A dossier on these deals is now in the hands of the Georgian Prosecutor’s Office. This details how Dillon Aero was caught red handed by an agency of the United States Government (Customs Enforcement), while it was in the process of catching another department of the same government blatantly circumventing arms export controls.

Also in the dossier provided the Government of Georgia is the transcript of a tape one of these deals, made by two undercover US Customs agents, [their names withheld for security reasons] which has since been broadcast on Youtube and elsewhere, under the title Illegal Arms Trafficking Caught on Tape. A snippet of the transcript of the two and a half hour recording reads:

Agent:

“We’re going to make a contract on the basis of this not being illegal. We are going to – what we’re going to do is, Dillon will not do this deal unless I have paperwork for them that checks out. That being said, Dillon’s gonna look at it; not care that it’s – not even pay attention to who it’s goin’, he is selling me this deal that I’ve put together. So, there’s a few ways we can do it and I’ll let you decide. It’s easiest if I could get an export license – can’t happen. Number two, next easiest, is you guys, do you guys have the ability to get me – I-I have your end-user. It’s worth nothing to me, because I can’t get that part there. This is where the vehicle you want is, so there is … the way that we have to do it is, can you come up with an end-user from a different country? Is that something you can do? Or do you need me to falsify documents to get it to where I need to go?”

McCain and other places

Source: Flickr

Source: Flickr

So we can link Senator McCain with arms dealers from his home state, at least one of whom is operating illegally, and other arms dealers and agencies in Ukraine, Georgia, Turkey and Jordan. If McCain does not know about the illegal activities of his campaign contributors he should, as he has a legal responsibility not to accept donations which are the proceeds of crime. But it is highly likely that he does know, as his connection with them is not limited to campaign cheques.

A dispute arose between McCain and Obama during the 2008 presidential debates when McCain wholeheartedly supported the US taking action against Iran and objected to Obama being willing to talk to the Iranian leadership without precondition. Compare this with this account of American journalist Jeffrey Silverman, who was behind Russian lines during the Georgia-Russia War:

“The Georgian media and the Human Rights Centre confirm that I found Russian (knocked-off and designed) and German made weapons there, and some of these had been imported from Mexico, others had been imported from Serbia via Jordan – RPGs, mortars, etc.

Based on an end user certificate that had previously been provided by a representative of Interpol, these had been part of the same shipment brought in from Jordan via an intermediate company, Melville, alongside otherwise legal imports. The representative adamantly contends that the weapons were never intended for the Georgian army, as stated, but had been positioned for possible use against Iran.”

Who wants to use weapons against Iran? Who has no authority to do so, but has connections with arms dealers caught evading the rules? Who has the connections with the country these arms were allegedly destined for?

The plain fact is that if you are connected to illegal arms dealing via Georgia you are connected to where such arms end up. We know where – they have been traced to Syria, Egypt, Sudan, Congo – everywhere there is, or has recently been, a high profile civil conflict. Most of these conflicts McCain has personally intervened in by openly siding with one side or another and tacitly or explicitly supporting their armed struggle. Funny how the arms always seem to get there around the same time as McCain, when those with genuine perceived grievances who are prepared to resort to violence have been crying out for them for years.

Thanks to the McCain paper trail we know the names of some of the dealers who supply weapons to these groups. Two of them are Ruslan Gilchenko and Victor Dobregaiev, who are now in a US Federal Prison thanks to an undercover investigation involving attempted weapons transfers via Georgia, the route taken by Dillon Aero.

A United States District Judge, Frederick J, Martone, attempted to stop this investigation by issuing a protective order dated July 18, 2012. However, he failed to follow Federal Rules regarding Service of Process and Jurisdiction, which he might be presumed to have known, so his efforts to kill the investigation were unsuccessful, although various bits of incriminating evidence were still pulled off the internet, and a journalist, Tim Brynes, lost his job with a government agency in Australia for knowing something about the investigation as he was deemed a national security risk. (Ruslan Gilchenko, and Victor Dobrogaiev), Defendents Case 2:10-cr-00233-FJM Document 141 Filed 07/19/12. More.

Frederick Martone, though born in Massachusetts, is a judge in the District of Arizona.

No causes, just guns

With rapid increases in attempts to violently overthrow governments one must consider the larger pattern and venue. Consider how the Syrian opposition held covert meetings with western and local arms traffickers in late 2010, as has since been reported, even before the current crisis erupted.

Nor is there any ideological consistency about who is armed, which might justify this action as a well-intentioned foreign policy intervention. The only thing consistent is the profits of the arms dealers linked to McCain. As Gordon Duff of Veterans Today, a partner online journal to NEO. has written: “picture yourself an American. One day you awaken and find Senator John McCain not only meeting with Al-Qaeda leaders but openly backing arming them, not just with guns but missiles capable of downing airliners anywhere in the world.”

Many successful politicians initially entered that profession because they cannot function outside the world of politics, however dirty and compromised that world is. John McCain is a product of the Cold War, and seemingly unable to function outside that world either. There always has to be an enemy, and he always has to be in the thick of the fight. How he does that, and what he gets out of it, will always be secondary considerations. Unless the day comes when one of his friends’ guns is pointed at him.

Henry Kamens, columnist, expert on Central Asia and Caucasus, exclusively for the online magazine “New Eastern Outlook”.

 

http://journal-neo.org/2014/02/28/meet-john-mccain-a-notorious-gun-runner/

 




Seattle TV interviews Gene Chip Tatum and Stew Webb

Seattle_TV_Call_4_Investigations

Will Wilson interviews CIA Whistleblower Gene Chip Tatum and Federal Whistleblower Stew Webb

http://www.chiptatum.com

http://www.veteranstoday.com/author/tatum

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
To those Truth tellers I am carrying my load are you?
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/

 

 

 

 




Seattle TV interviews CIA Whistleblower Chip Tatum and Whistleblower Stew Webb

Seattle_TV_Call_4_Investigations

Feb 24 2014 Call 4 Investigations interviews CIA Whistleblower Chip Tatum and Federal Whistleblower Stew Webb

CIA Illegal Blackops Iran-Contra Gungs and Drugs, Murders, Mortgage Frauds by George HW Bush and Col. Oliver North, AIPAC Thefts, Bill Clinton the Coke Head and more.

http://seattlecommunitymedia.org/series/call-4-investigation/episode/c4i-feb-25-omg-chip-tatum-and-stew-webb-patricia-don-and-will
Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
To those Truth tellers I am carrying my load are you?
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/

 




FBI Whistleblower Darlene Novenger exposed George HW Bush’s Drug usage

Darlene_Novenger_FBI_Operative

By Stew Webb 

Former FBI Operative Darlene Novinger who was my friend since 1991 and we did many radio interviews together as co-guests during the early 1990s to mid 1990s died July 27, 2003 from cancer related to a anthrax attack she suffered in 1994. There were 28 of us Whistleblowers and Witnesses who suffered anthrax attacks between 1994 and 1997 14 survived and several have died since of cancer. Darlene personally witnesses the delivery of 99.9% pure cocaine to then Vice President George HW Bush in the 1980s as an FBI Operative. Darlene was hired by the FBI to infiltrate the Smatt Brothers the Jamaican Narcotics importation in the US run by Florida Governor Jeb Bush.

The day after Darlene filed here report of the cocaine delivery to the Vice President Bush, Darlene’s superiors at the FBI tried to talk her out of the report and forget what she saw. She refused and wrote the report the next day George HW Bush fired his entire staff in order to put the blame on the cocaine delivery on someone else.

Darlene Novinger’s operation was named Operation Neumbus and the files after her husband was murdered were sent to Red Wood City, California’s famous U.S. Government paper shredder base. Darlene shared those files with this Whistleblower. Darlene’s entire family, her husband, father, mother were all killed, and Darlene died July 2003 from cancer after Bushes anthrax her home in Harrisburg, PA., which was put on the Pennsylvania, EPA BIO cleanup list. The home was torn down and before it was 2 mysteries deaths occurred in the neighborhood similar to sudden anthrax deaths.

Darlene was written about in the book The Blue Grass Conspiracy.

Both Darlene and this Whistleblower are written about in the book Defrauding America by Former FAA Whistleblower Rodney Stitch

Defrauding_America

 

Radio June 1996 Stew Webb Whistleblower and Darlene Novenger FBI Whistleblower




DEA-CIA Drug Trafficking Exposed by Whistleblower DEA Pilot Beau Abbott

Dea_CIA_Drug_Trafficking_Exposed_by_Whistleblower_DEA_Pilot_Beau_Abbott_VT

By Stew Webb

This interview with Beau Abbott was done by John Gentry a wannabe cameraman at Stew Webb’s request in the 1990s and recently loaded on you tube by John Gentry of Dallas, Texas. I, Stew Webb was held as a Political Prisoner from 1992-1993 and meet and talked for weeks with Beau Abbott who was also a Political Prisoner at the Federal Prison in Springfield, Missouri also known as Siberia- USA.

Beau Abbott, a former DEA Pilot was forced into and compromised into flying weapons to the Nicaragua Contras. Beau girlfriend who just had his child was murdered in Switzerland.  Beau Abbott’s boss was DEA Agent Santiberio who was murdered after being illegally arrested in San Antonia, Texas and feed a peanut butter sandwich laces with arsenic.

Beau Abbott’s, story is written about in the Book: Defrauding America by Rodney Stich

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/




AIPAC Millman Bush Clinton China Organized Crime Syndicate and Hackers trying to stop the truth on StewWebbcom

DCS GOON

AIPAC Millman Bush Clinton China Organized Crime Syndicate and Hackers trying to stop the truth on StewWebbcom

This public posting is for US intel and FBI who are after you. Yippa Kia Mother  Fuc_ er.

 

IP Range: Block visitors with IP addresses in the range: 94.23.252.112 – 94.23.252.113Browser Pattern: Allow all browsersReason: Trodelled Feb 5 1230am FranceDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 36.250.224.180 – 36.250.224.181Browser Pattern: Allow all browsersReason: Trodelled Feb 5 1230am ChinaDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 221.8.221.132 – 221.8.221.133Browser Pattern: Allow all browsersReason: Trodelled Feb 5 1230am Costa RicaDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 201.191.199.52 – 201.191.199.53Browser Pattern: Allow all browsersReason: Trodelled Feb 5 1230am Costa RicaDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 172.56.11.75 – 172.56.11.76Browser Pattern: Allow all browsersReason: Trodelled Feb 5 1230am unknownDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 203.126.111.10 – 203.126.111.111Browser Pattern: Allow all browsersReason: Throdell site Feb 5 1230am singaporeDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 36.250.224.180 – 36.250.224.181Browser Pattern: Allow all browsersReason: Jan 25 2014 China Throttling siteDelete this blocking pattern 12 blocked hitsLast blocked: 11 days 17 hours ago
IP Range: Block visitors with IP addresses in the range: 209.208.23.178 – 209.208.23.179Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 74.125.225.234 – 74.125.225.236Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 74.125.225.236 – 74.125.225.237Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 75.126.104.177 – 75.126.104.178Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 208.43.192.33 – 208.43.192.34Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 213.171.219.4 – 213.171.219.5Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 67.210.111.5 – 67.210.111.6Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 213.171.219.4 – 213.171.219.5Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 192.185.148.102 – 192.185.148.103Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 88.208.252.131 – 88.208.252.132Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 162.209.88.192 – 162.209.88.193Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 162.209.88.193 – 162.209.88.194Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 162.209.89.75 – 162.209.89.76Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 162.209.88.58 – 162.209.88.59Browser Pattern: Allow all browsersReason: Ken adachi aka john_w_allman@hotmail.com Jan 252014Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.211.209.244 – 10.211.209.245Browser Pattern: Allow all browsersReason: Jan192014 LoginsDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 65.52.117.19 – 65.52.117.20Browser Pattern: Allow all browsersReason: Brute force attack by Microsoft Nov 27,2013Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 222.139.129.243 – 222.139.129.244Browser Pattern: Allow all browsersReason: Brute force attack china dec 2,2013Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 192.168.1.10 – 192.168.1.11Browser Pattern: Allow all browsersReason: Dec 19 2013 20 Login attemptsDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 106.32.0.0 – 106.47.255.255Browser Pattern: Allow all browsersReason: bruteforceattack onserver china nov 8, 2013Delete this blocking pattern 2 blocked hitsLast blocked: 5 days 8 hours ago
IP Range: Block visitors with IP addresses in the range: 208.110.64.0 – 208.110.95.255Browser Pattern: Allow all browsersReason: Oct 18 JTFG KCMO 324 e 11th suit 56 login attemptsDelete this blocking pattern 86 blocked hitsLast blocked: 6 days 3 hours ago
IP Range: Block visitors with IP addresses in the range: 173.208.165.88 – 173.208.165.95Browser Pattern: Allow all browsersReason: Oct 18 JTFG KCMO 324 e 11th suit 100 NKF DivisionDelete this blocking pattern 17 blocked hitsLast blocked: 12 days 15 hours ago
IP Range: Block visitors with IP addresses in the range: 110.80.0.0 – 110.87.255.255Browser Pattern: Allow all browsersReason: oct 15, 2013 China Tried to registe and login 200 attemptsDelete this blocking pattern 326 blocked hitsLast blocked: 7 hours 11 mins ago
IP Range: Block visitors with IP addresses in the range: 173.45.108.112 – 173.45.108.127Browser Pattern: Allow all browsersReason: oct 15, 2013 phone call from 816 298-0721 verify numberDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 110.75.0.0 – 110.75.127.255Browser Pattern: Allow all browsersReason: oct 15, 2013 phone call from 816 298-0721 verify numberDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 60.176.0.0 – 60.176.255.255Browser Pattern: Allow all browsersReason: Oct 15, 2013 China Logins from these lotsDelete this blocking pattern 23 blocked hitsLast blocked: 1 month 14 days ago
IP Range: Block visitors with IP addresses in the range: 130.185.72.0 – 130.185.75.255Browser Pattern: Allow all browsersReason: Oct 6 2013 Brute force attack ??JTFG IndepDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 77.220.192.0 – 77.220.223.255Browser Pattern: Allow all browsersReason: Oct 6 2013 Brute force attack ??JTFG IndepDelete this blocking pattern 2 blocked hitsLast blocked: 3 months 15 days ago
IP Range: Block visitors with IP addresses in the range: 192.168.1.198 – 192.168.1.199Browser Pattern: Allow all browsersReason: Oct 2 login attempt white listDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 198.50.179.32 – 198.50.179.63Browser Pattern: Allow all browsersReason: Sept 26 Private residence server login attemptDelete this blocking pattern 7 blocked hitsLast blocked: 2 days 1 hour ago
IP Range: Block visitors with IP addresses in the range: 222.32.0.0 – 222.63.255.255Browser Pattern: Allow all browsersReason: China Sept 24 2013 Brut Force attackDelete this blocking pattern 14 blocked hitsLast blocked: 6 days 20 hours ago
IP Range: Block visitors with IP addresses in the range: 27.40.0.0 – 27.47.255.255Browser Pattern: Allow all browsersReason: China Sept 24 2013 Brut Force attackDelete this blocking pattern 15 blocked hitsLast blocked: 14 days 22 hours ago
IP Range: Block visitors with IP addresses in the range: 112.88.0.0 – 112.95.255.255Browser Pattern: Allow all browsersReason: Sept23 brute force attack chinaDelete this blocking pattern 37 blocked hitsLast blocked: 23 days 10 hours ago
IP Range: Block visitors with IP addresses in the range: 183.192.0.0 – 183.255.255.255Browser Pattern: Allow all browsersReason: Sept23 brute force attack chinaDelete this blocking pattern 138 blocked hitsLast blocked: 15 hours 6 mins ago
IP Range: Block visitors with IP addresses in the range: 58.248.0.0 – 58.255.255.255Browser Pattern: Allow all browsersReason: Sept 23 2013 forced attack on server ChinaDelete this blocking pattern 56 blocked hitsLast blocked: 1 month 1 day ago
IP Range: Block visitors with IP addresses in the range: 36.250.160.0 – 36.250.191.255Browser Pattern: Allow all browsersReason: china 52 hits Private Sept 23?????Delete this blocking pattern 122 blocked hitsLast blocked: 1 day 19 hours ago
IP Range: Block visitors with IP addresses in the range: 183.0.0.0 – 183.63.255.255Browser Pattern: Allow all browsersReason: Guangzhou China 78 hits Private Sept 23????Delete this blocking pattern 827 blocked hitsLast blocked: 1 hour 53 mins ago
IP Range: Block visitors with IP addresses in the range: 50.115.160.0 – 50.115.175.255Browser Pattern: Allow all browsersReason: 324 E. 11th KC Mo Office BldgDelete this blocking pattern 81 blocked hitsLast blocked: 59 mins ago
IP Range: Block visitors with IP addresses in the range: 184.154.221.156 – 184.154.253.56Browser Pattern: Allow all browsersReason: Sept 19 JTFG stooges loginsDelete this blocking pattern 45 blocked hitsLast blocked: 1 day 7 hours ago
IP Range: Block visitors with IP addresses in the range: 173.0.48.0 – 173.0.63.255Browser Pattern: Allow all browsersReason: KCMO Gov. Sept 19 loginDelete this blocking pattern 111 blocked hitsLast blocked: 8 hours 43 mins ago
IP Range: Block visitors with IP addresses in the range: 115.194.0.0 – 115.195.255.255Browser Pattern: Allow all browsersReason: Sept 18 2013 China log in after mass attackDelete this blocking pattern 31 blocked hitsLast blocked: 23 days 15 hours ago
IP Range: Block visitors with IP addresses in the range: 120.32.0.0 – 120.39.255.255Browser Pattern: Allow all browsersReason: 120.37.210.91 Brute Force attack Sept 16 ChinaDelete this blocking pattern 420 blocked hitsLast blocked: 13 hours 16 mins ago
IP Range: Block visitors with IP addresses in the range: 115.196.0.0 – 115.196.255.255Browser Pattern: Allow all browsersReason: Sept 15 login hackers 100s chinaDelete this blocking pattern 14 blocked hitsLast blocked: 3 months 11 days ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.13 – 10.0.0.14Browser Pattern: Allow all browsersReason: sept 15,2013 mass login attackDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 37.236.0.0 – 37.239.255.255Browser Pattern: Allow all browsersReason: Sept 15 mass login attacksDelete this blocking pattern 59 blocked hitsLast blocked: 6 days 15 hours ago
IP Range: Block visitors with IP addresses in the range: 10.10.0.253 – 10.10.0.254Browser Pattern: Allow all browsersReason: Sept 15 mass login attacksDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: loginhackers 9-13-2013Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.1.61 – 10.0.1.62Browser Pattern: Allow all browsersReason: login hacker 9-13-2013Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 27.57.0.1 – 27.57.255.254Browser Pattern: Allow all browsersReason: India Porno Spamming Aug 5Delete this blocking pattern 1 blocked hitsLast blocked: 5 months 3 days ago
IP Range: Block visitors with IP addresses in the range: 175.44.32.0 – 175.44.63.255Browser Pattern: Allow all browsersReason: China aug 2 large hits private serverDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 119.48.0.0 – 119.55.255.255Browser Pattern: Allow all browsersReason: Private Network logins aug 2Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 119.48.0.0 – 119.55.255.255Browser Pattern: Allow all browsersReason: China Private network Aug 2Delete this blocking pattern 9 blocked hitsLast blocked: 2 months 14 days ago
IP Range: Block visitors with IP addresses in the range: 175.44.32.0 – 175.44.63.255Browser Pattern: Allow all browsersReason: china top hits private networkDelete this blocking pattern 159 blocked hitsLast blocked: 23 days 11 hours ago
IP Range: Block visitors with IP addresses in the range: 192.168.0.0 – 192.168.255.255Browser Pattern: Allow all browsersReason: August 1 2013 Porno RainpowDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: china wordpress whitelist porno july 30Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 220.181.0.0 – 220.181.255.255Browser Pattern: Allow all browsersReason: China July 31Delete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 5.133.192.0 – 5.133.223.255Browser Pattern: Allow all browsersReason: China July 31 Fake GooglebotDelete this blocking pattern 68 blocked hitsLast blocked: 1 month 16 days ago
IP Range: Block visitors with IP addresses in the range: 220.181.0.0 – 220.181.255.255Browser Pattern: Allow all browsersReason: China July 31Delete this blocking pattern 2617 blocked hitsLast blocked: 28 mins ago
IP Range: Block visitors with IP addresses in the range: 110.152.0.0 – 110.155.255.255Browser Pattern: Allow all browsersReason: China Porno July 31Delete this blocking pattern 53 blocked hitsLast blocked: 1 month 12 days ago
IP Range: Block visitors with IP addresses in the range: 222.208.0.0 – 222.215.255.255Browser Pattern: Allow all browsersReason: China Porno July 31Delete this blocking pattern 65 blocked hitsLast blocked: 1 month 12 days ago
IP Range: Block visitors with IP addresses in the range: 192.119.150.0 – 192.119.151.255Browser Pattern: Allow all browsersReason: Register and login July 31Delete this blocking pattern 53 blocked hitsLast blocked: 10 days 10 hours ago
IP Range: Block visitors with IP addresses in the range: 1.202.0.0 – 1.203.255.255Browser Pattern: Allow all browsersReason: China July 31 pornoDelete this blocking pattern 139 blocked hitsLast blocked: 2 months 13 days ago
IP Range: Block visitors with IP addresses in the range: 221.192.0.0 – 221.195.255.255Browser Pattern: Allow all browsersReason: China Pornp Rainpow July 31Delete this blocking pattern 14 blocked hitsLast blocked: 5 days 7 hours ago
IP Range: Block visitors with IP addresses in the range: 113.136.0.0 – 113.143.255.255Browser Pattern: Allow all browsersReason: China July 31Delete this blocking pattern 107 blocked hitsLast blocked: 15 days 18 hours ago
IP Range: Block visitors with IP addresses in the range: 222.76.0.0 – 222.79.255.255Browser Pattern: Allow all browsersReason: China Brute-Force Attack detectedDelete this blocking pattern 686 blocked hitsLast blocked: 8 days 23 hours ago
IP Range: Block visitors with IP addresses in the range: 59.56.0.0 – 59.61.255.255Browser Pattern: Allow all browsersReason: China to hitsDelete this blocking pattern 676 blocked hitsLast blocked: 6 days 8 hours ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: ChinaDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 79.142.64.0 – 79.142.67.255Browser Pattern: Allow all browsersReason: Porno pelauts.comDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 37.46.112.61 – 37.46.117.255Browser Pattern: Allow all browsersReason: Porno duoliphotography.comDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 188.165.192.0 – 188.165.255.255Browser Pattern: Allow all browsersReason: Porno graffitigraffiti.comDelete this blocking pattern 228 blocked hitsLast blocked: 1 day 7 hours ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: Porno Rainpow.comDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 110.88.0.0 – 110.91.255.255Browser Pattern: Allow all browsersReason: cHINA 163data.com.cnDelete this blocking pattern 333 blocked hitsLast blocked: 11 hours 5 mins ago
IP Range: Block visitors with IP addresses in the range: 202.46.32.0 – 202.46.63.255Browser Pattern: Allow all browsersReason: China blocked july 30Delete this blocking pattern 972 blocked hitsLast blocked: 2 days 7 hours ago
IP Range: Block visitors with IP addresses in the range: 220.178.0.0 – 220.180.255.255Browser Pattern: Allow all browsersReason: China blocked july 30Delete this blocking pattern 55 blocked hitsLast blocked: 1 month 5 days ago
IP Range: Block visitors with IP addresses in the range: 199.96.156.0 – 199.96.159.255Browser Pattern: Allow all browsersReason: Porno begladyouhavechildrens.orgDelete this blocking pattern 7 blocked hitsLast blocked: 14 hours 32 mins ago
IP Range: Block visitors with IP addresses in the range: 198.27.64.0 – 198.27.127.255Browser Pattern: Allow all browsersReason: Porno and china sales kootation.comDelete this blocking pattern 1614 blocked hitsLast blocked: 1 hour 12 mins ago
8 blocked hitsLast blocked: 17 days 11 hours ago
IP Range: Block visitors with IP addresses in the range: 79.142.64.0 – 79.142.67.255Browser Pattern: Allow all browsersReason: porno rainpow.comDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 72.29.64.0 – 72.29.95.255Browser Pattern: Allow all browsersReason: Porno kateledesign.comDelete this blocking pattern 27 blocked hitsLast blocked: 1 month 11 days ago
IP Range: Block visitors with IP addresses in the range: 192.168.0.0 – 192.168.255.255Browser Pattern: Allow all browsersReason: Rainpow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: Rainpow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 23.27.195.192 – 23.27.195.255Browser Pattern: Allow all browsersReason: china hackerDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 27.152.0.0 – 27.159.255.255Browser Pattern: Allow all browsersReason: china hackerDelete this blocking pattern 1567 blocked hitsLast blocked: 2 hours 29 mins ago
IP Range: Block visitors with IP addresses in the range: 180.76.0.0 – 180.76.255.255Browser Pattern: Allow all browsersReason: china hackerDelete this blocking pattern 7851 blocked hitsLast blocked: 2 mins ago
IP Range: Block visitors with IP addresses in the range: 67.210.96.0 – 67.210.127.255Browser Pattern: Allow all browsersReason: Adachi Educate-yourselfDelete this blocking pattern 15 blocked hitsLast blocked: 1 month 19 days ago
IP Range: Block visitors with IP addresses in the range: 172.16.0.0 – 172.31.255.255Browser Pattern: Allow all browsersReason: rainpow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 192.168.0.0 – 192.168.255.255Browser Pattern: Allow all browsersReason: Rainpow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 79.142.64.0 – 79.142.67.255Browser Pattern: Allow all browsersReason: Rainpow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: Rainpow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: Rainbow pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 192.168.0.0 – 192.168.255.255Browser Pattern: Allow all browsersReason: Rainpow porno crawlersDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 10.0.0.0 – 10.255.255.255Browser Pattern: Allow all browsersReason: whitelisted pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 112.111.176.0 – 112.111.191.255Browser Pattern: Allow all browsersReason: china hackersDelete this blocking pattern 152 blocked hitsLast blocked: 21 days 2 hours ago
IP Range: Block visitors with IP addresses in the range: 220.241.128.0 – 220.241.255.255Browser Pattern: Allow all browsersReason: china hackersDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 74.206.185.128 – 74.206.185.191Browser Pattern: Allow all browsersReason: pornoDelete this blocking pattern 0 blocked hitsLast blocked: Never ago
IP Range: Block visitors with IP addresses in the range: 79.142.64.0 – 79.142.67.255Browser Pattern: Allow all browsersReason: pornoDelete this blocking pattern 147 blocked hitsLast blocked: 3 months 10 days ago

Ps: I posted this because I stuck a pipe in your As_.

Welcome to the US Constitution f____ the New World Order.

We will win you are toast.

Stew Webb Federal Whistleblower.

 

 

 




Radio: Stew Webb and Remmic Lewis interviews Ambassador Leo Wanta

John_Stokes

This exclusive interview is a must hear:

first hour

second hour

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/

 




Seattle Community TV interviews CIA Black ops Gene “Chip” Tatum and Stew Webb

Seattle_TV_Call_4_Investigations

January 30, 2001 Will Wilson interviews CIA Whistleblower Super Spook Gene “Chip” Tatum and Federal Whistleblower Stew Webb 45 minutes.

http://www.seattlecommunitymedia.com/node/386212

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/

 

 




AIPAC the Denver Illuminati Wizard’s Espionage and Frauds

bushdance

AIPAC_the_Denver_Illuminati_Wizards_Espionage_and_Frauds

By Stew Webb

Connecting some Financial Frauds the U.S. Justice Department does not want you to know about but U.S. Attorney Eric Holder does know.

The Denver Illuminati Connection and Leonard Millman one of the 12 Illuminati Wizards’ of Oz.

Convicted HUD Scamster Phil Winn who this Whistleblower helped the HUD Independent Prosecutor Arlen Adams in 1989 get the conviction and plea bargain in 1991 against Winn who agreed to pay a $1.5 million dollar fine and was to be sentence to prison for 5-7 years that never happened, instead Denver-U.S. District Court Judge Sherman Finesilver who had been bribed years earlier with his ownership of Westward Newspaper in Denver by Leonard Millman got Judge Finesilver to seal Phil Winn’s case from 1991 until 2001 when CIA Bill Clinton the day before leaving office as the U.S. President gave convicted criminal Phil Winn a illegal Presidential Pardon.

Denver Post controlled by Dean Singleton, Phil Winn and Larry Mizel good buddy does a spin story on Phil Winn.

Just think Phil Winn helped steal over 500,000 apartment units from HUD over 20 years for Denver Illuminati Wizard Len Millman and gets a presidential pardon.

Those apartments are hidden under thousand of entities one of the largest is AMICO run by Terri Constadine and Norman Brownstein, who is the attorney for Illuminati Wizards of Oz Leonard Millman and Wizard George HW Bush. Brownstein was one of the six CIA Council to George HW Bush when he was CIA Director in the mid 1970s and Brownstein was on the Board of Directors of M.D.C. Holdings, Inc., and now MDC-NYSE Corporate attorney the parent company of Imperial Savings and Silverado Saving and Loan of Denver which collapsed where Neil Bush the U.S. President’s son was a Director and in charge of Narcotics Money Laundering from Iran- Contra, nearly 12 Trillion Dollars in 9 years was laundered.

Phil Winn’s, Winn Financial was an MDC-NYSE subsidiary company. Phil Winn’s “Buffers-Stooges” were caught selling 4,000 stolen repossessed HUD houses in Arizona in 1992 and served time in Federal detention in Denver.

These were stolen in the late 1970s from HUD computers and re-deeded to Leonard Millman and his attorney Norman Brownstein who was in charge of the stolen houses for Millman and Bush.

Don Boles, a Phoenix, Arizona Investigative Journalist was murdered over his investigations of some of these stolen HUD houses that were being sold in Arizona.

Listen to a January 29, 2014 interview with CIA Gene Chip Tatum who stated he delivered those deeds to Norman Brownstein.

Gene “Chip’ Tatum is now a Columnist on Veterans Today and you will be reading things you have never heard before or do not remember when Gene did hundreds of Radio interviews between 1995-1997.

Super Spook Gene “Chip” Tatum is back and speaking out here is his information and website.

Phil Winn had served on the Board of Directors of MDC-NYSE and served on the Board of Directors of MDC Asset Investors that caused the 2008 Bank Bailout.

Asset Investors created Mortgages on houses that were never built and duplicate mortgages up to 9 times that they bought from Mortgage Brokers around the United States then sold those Mortgages in bundles as Securities bundled as derivatives those Mortgages which had cause the worldwide financial meltdown in 2008.

Norman Brownstein was the Director and Vice President of HSBC Bank of Canada in charge of Derivatives which bundled the Fake Mortgaged Backed Securities and sold them throughout the world as Mortgage Backed Derivatives.

Stew Webb SEC Whistleblower Filings and Letter to NY Attorney General which has been covered-up with no prosecutions

The current Denver U.S. Attorney is part of U.S. Attorney General Eric Holder’s special Task force to prosecute the Bankers frauds the Denver U.S. Attorney’s office has been a revolving door from the Norman Brownstein law firm.

Ask the former U.S. Denver Attorney who covered up Enron or former U.S. Attorney Michael Norton who covered up the Millman-Bush stolen 2,000 pounds of Uranium from Rocky Flats Nuclear arsenal west of Denver that was shipped in Ocean Spray Cranberry Juice Trucks to Apex Aviation in St. Louis, Missouri to keep from triggering Nuclear material transport detectors and flown to Israeli Prime Minister Benjamin Netanyahu and sold to North Korea that gave North Korea the Nuke Bomb.

Leonard Millman’s CITI Bank’s subsidiary did the fake clean up of Rocky Flats, the cover story was 2,000 pounds of Uranium was spilled on the hillside, cost to U.S. Taxpayer $2.5 Billion what a scam.

Then guess who builds a subdivision on that contaminated land and a great view of the Denver skyline?

MDC’s Richmond American Homes run by Millman’s “Buffer-Stooge” Larry Mizel.

Larry Mizel alias Larry Mizell is the Chairman of MDC-NYSE who dreamed up the Mortgage frauds for Leonard Millman his boss.

In a recent $13 Billion dollar settlement with JP Morgan Bank, Home America Mortgage a MDC Subsidiary had been named in the original suit to cover the whole frauds up in one sweep.

Former FSLIC Attorney and Professor of law at UMKC questions why is there no prosecutions?

The US Attorney Who Prosecutes JPMorgan Will Be Its First Witness

Illegally created Mortgage Securities by MDC-Asset Investors estimated at $100 Trillion.

Illegally created Derivatives backed by illegal fake Mortgage Securities estimated at $5,000 Trillion Dollars.

Illegally stealing Americans houses that were paying their Mortgages to other mortgage companies and on time and up to date on their mortgage when the Denver Illuminati Wizard Leonard Millman alias Leonard Hillman alias Michael Donavan would send his crooked attorneys in saying they owned the Mortgage and that it was registered with Meirs and I own the property. 12.5 million American have had their homes stolen from them with crooked attorneys, Judges and others, only the Kentucky Attorney General seems to be doing his job.

Bank of America has 80% of their mortgages on their books are non-performing assets, meaning they got stuck with the false mortgages and Bank of America is cooking their books, which is against the law yet they trade on the NYSE.

Meirs the privately owned Mortgage registration was set up in 1993 by Millman’s “Buffer-Stooge” M.D.C. Holdings, Inc. Director Larry Mizel.

Why was Meirs set up in 1993?

Because these same named criminals above were doing the same thing during the 1980s except they were selling fake Mortgages to their Colorado controlled banks and Mortgage Companies then they triggered the FSLIC, Fannie Mae, Freddie Mac and FDIC Insurance to scam the U.S. Government and investors. Thirty one years of fraud and no one has gone to jail because all U.S. Attorney Generals and Colorado’s US Attorney and Colorado State Attorney Generals since 1981 have been controlled by these two Illuminati Wizards Leonard Millman and George HW Bush who both Graduated from Yale University together and were both Skull and Bone Buddies and members a known Satanic Occult.

Cradle to Cabal The Secret Life of Gale Norton The Denver Illuminati Zionist Connection

Ask yourself a question?

Why did Leonard Millman pay a $80,000 Million Dollar fine in 1997 over a grand jury indictment for bribing Government Officials and never went to jail and the case was sealed under National Security by then President Bill Clinton?

Because Bill Clinton and Hillary Clinton are part of the Denver Illuminati Zionist Organized Crime Syndicate, their attorney James M. Lyons was on the Board of Directors of MDC-NYSE.

The Bush-Millman Organized Crime Family Flow Chart No: 1

Bill Clinton’s fines that were paid over the Monica Lewinsky scandal and oral sex in the Whitehouse and lying before a grand jury saying a blow job and stuffing Monica with cigars is not sex, it did happen but this was the Spin Doctor story to keep the truth about Iran Contra and the Arkansas involvement from coming out.

Judge Lawrence Walsh had them nailed in late 1992 and he was replaced by Independent Prosecutor Kenny Star who obstructed Justice and covered up Iran- Contra frauds. Stars father started Star International the parent company of AIG Insurance the Millman’s “Buffer-Stooge” Maurice Hank Greenberg runs AIG and was directly involved with Meyer Blinder of Blinder-Robinson the world largest penny stock frauds which collapsed in 1990. Millman’s “Buffers-Stooges” Blinder and Greenberg ran National Brokerage Company, on Pine Street, Denver, Colorado. National Brokerage did massive securities frauds in the 1980s with ties to Balcor Securities, Stinger Securities, and gave Iran Contra drug smugglers-pilots stock in dummy companies to pledge as collateral for loans made by Neil Bush a Director at Silverado Savings. Those loans were never repaid, the stock was bogus and the FDIC out of Dallas picked up the tab. FDIC employees out of the Dallas offices were in on the take.

Chubb Insurance Company of Denver paid Bill Clinton’s fines and paid off others including Paula Jones in Clinton’s affairs. Chubb’s Board of Directors at the time was Norman Phillip Brownstein.

Do you really want Hillary Clinton a known 4th Degree Satanic Witch, Lesbian, and Killer of over 300 witnesses and the Jewish Mob attorney (Rose law firm) to be your next President in 2016?

Ask Larry Mizel why he had a meeting with former Rose Law Firm Partner and White House Aid Vince Foster on the day he was murdered in Washington, D.C.

Ask Leonard Millman who controlled Hensel-Phelps Construction Company based out of Greeley, Colorado a nationwide contractor who committed frauds at the Denver Airport why a Helsel-Phelps Construction Company yellow pickup truck license number RCG-702 Arkansas tag was at the White House the evening Vice Foster was murdered.

Guess who sits on the Board of Directors of AIPAC-American Israeli Public Affairs Committee, which is Zionist Espionage against the United States and controls 99% of the U.S. Congress and Senate?

Brownstein and Mizel…..

[edit] Notable Board members

AIPAC’s National Board has approximately 50 members. By tradition, previous Presidents serve as Board members, and are not listed separately here. (Asher, Levy, Mitchell, and Weinberg were sometimes referred to as the “Gang of Four”.[2]) There are also state-level and some city-level AIPAC boards.

Other notable National Board members include:

Why does Norman Brownstein have office in Washington, Denver and Mexico City, Mexico?

Remember the Mexico President who fled Mexico over his Drugs and Frauds scandal?

Remember CITI Bank was questioned why they laundered the Mexican Presidents Drug profits?

Did you know Norman Brownstein was on the Board of Directors of CITI Bank?

I cannot put all the blame on Norman Brownstein we must include Leonard Millman’s other attorneys hiding the stolen and laundered Drug profits.

Leonard Millman’s brother in law Allen Karsh of Denver and Steven Hoth of Denver are also culprits.

Who is one of the worst Zionist Israeli Senator who answers directly to and takes orders from Illuminati Zionist Larry Mizel?

Yes you guessed it Keating Five John McCain.

John McCain’s Wife Hiding War Profits, Untaxed Off-Shore Accounts?

Connecting some Financial Frauds the U.S. Justice Department does not want you to know about but U.S. Attorney Eric Holder does know.

The Denver Illuminati Connection and Leonard Millman one of the 12 Illuminati Wizards’ of Oz:

Frauds Are US at MDC

Junk Bond Daisy Chain Frauds The Denver Illuminati Zionist Connection

The Zionist Gang Behind New York’s 9-11 Conference

TV 9 News Denver asked what is under the Denver Airport

VT Was Right: Illuminati Sacrifice Busted!

Iran Contra Frauds and The Denver Illuminati Zionist Connection

“Stew you’re the only person to go after the pinnacle of the Zionist Organized Crime Leonard Millman, your-ex-in-law and Larry Mizel, Millman’s Buffer.”—Gordon Duff May 16, 2013

Gordon Duff Interview with Stew Webb 3 Hour Marathon (Video)

“Stew you’re the only person to go after the pinnacle of the Zionist Organized Crime Leonard Millman, your-ex-in-law and Larry Mizel, Millman’s Buffer.”—Gordon Duff Editor Veterans Today May 16, 2013

This interview of Gordon Duff and Stew Webb made in December 2012 was rated as one of 2013 most listened to interview now on Stew Webb’s youtube site.

“I have known Stew for many years and have yet to meet a more energetic Whistleblower and investigator. Stew has suffered persecutions, beatings, verbal abuse and much more for standing up for what he believes in. Stew Webb is loyal to the cause of exposing corruption, not online in America but around the world. January 30, 2014—Gene “Chip” Tatum

Super Spook Gene Chip Tatum 1996 interview with Stew Webb

AIG Harken Energy Winn Financial Group

By Al Martin

There were about 100 such projects in all which were ultimately bailed out by some public guarantee institution.

It wasn’t necessarily the FDIC or the FSLIC, but in some cases, very esoteric public guaranteed funds were used to bail these deals out.

George Jr. naturally specialized in oil since he controlled the Bush family oil portfolio including Harken Energy stock, Tidewater Development stock, and Apache and Zapata stock.

These were all deals where George Sr. had formerly been on the Board of Directors. Now George Jr. was on the Board of Directors, since Sr. as Vice President couldn’t have that capacity.

Harken Energy was a classic fraud. The stock still trades on the AMEX at five or six dollars a share. It’s been pumped up recently because there’s a new fraud going on with those Bahrainian Leases that Richard Secord originally had ten years ago.

The stock will shortly collapse back to two dollars again, as soon as everybody gets out. A lot of Republicans will make money on the deal. ….

I also have a lot of documentation pursuant to George, Sr.’s involvement in fraudulent deals surrounding Zapata and Apache Energy. I have a lot of stuff with him in Harken Energy, also including a lot with George, Jr. in Harken Energy. That’s another possibility. But again, these weren’t large frauds. They were little security frauds, the fraudulent diversion of monies in those bogus Bahrainian leases when they temporarily ensconced Richard Secord to be their Middle Eastern Director for Bahrainian Operations which existed in a file drawer.

What that Bahrainian deal came down to was George Bush, Sr.’s close friend, former Saudi intelligence chief and major Iran­Contra figure, Ghaith Pharaon. That was just a donation to Iran­Contra by the Saudi government. And that’s what the bogus Bahrainian lease deal effectively comes down to. It wasn’t much ­­ $38 million, something like that.

Secord received about $3 million for his own pocket. Harry Aderholt was thrown a bone out of the deal. It was no big deal really. I also want to discuss an overview of Bush family fraud, ala Iran­Contra profiteering. …….

The Tri­Lateral Investment Group, Ltd. is also one of the deals (one of the very few deals, perhaps only a few dozen deals in that era by this group of guys) that you could connect Jeb, Neil, George, Jr., Prescott, and Wally Bush.

All five ­­ you can put in the Tri­Lateral Investment Group, Ltd. You can put Neil in it vis­a­vis Tri­Lateral’s dealings with Neil’s Gulf Stream Realty.

Then you back up a step and put Neil Bush into Tri­Lateral Investment Group’s dealings with the Winn Financial Group of Denver run by the infamous former Ambassador to Switzerland, Phillip Winn. You can put George, Jr. in the deal vis­a­vis the Tri­Lateral Group Ltd.’s fraudulent relationship with American Insurance General (AIG) , of which George, Jr. was a part through the same series of fraudulent fidelity guarantee instruments issued on behalf of Harken Energy from American Insurance General.

Tri­Lateral Investment Group then sold bogus oil and gas leases to AIG. This is a direct fraud that George, Jr. profited to the extent of (not a lot) $1.6 or $1.7 million. But it was a clear out­and­out fraud.

Rolling Stone magazine did a good piece on George Bush, Jr. and three of his oil and gas companies which failed. But the article really didn’t go far enough.

It did not go really into Harken and Tidewater and other public corporations which George, Jr. was involved in and in which securities fraud was committed. He was able to neatly skirt the laws ­­ or should we say ­­ deflect the shit away from himself through a whole series of contrivances. The way he was able to do this, by the way, was to post these essentially bogus fidelity and guaranty instruments, so the deals wouldn’t be scrutinized until long after they had collapsed.

This was one of George Jr’s specialities ­­ and I did this myself, by the way. It was a common tactic in Iran­Contra Securities Fraud. As the expression goes, it was to “back in” fraudulent assets, normally of a real estate nature, to back in fraudulent assets into a public shell. More commonly, they were known by their regulatory names in those days as a Reg D offering, or a Reg 501 or 505, or an S1, S3 or S18 offering. These were the common euphemisms used in the day. This is, of course, Security and Exchange Commission language, or “SEC speak” as we used to call it, for various types of offerings, which govern how large these offerings could be, how many states they could be ‘blue­skied’ in (meaning how many states they could be sold in), the total amount of money that could be raised, the market making regulation that was necessary to maintain a market in the shares thereinafter.

Anyway, a very common securities fraud was the use of 144 stock. 144 stock refers to Rule 144, or Restricted Shares (shares that are not free to trade under the two­year restriction rule). Often a company that would nominally have ten million shares outstanding could issue a hundred million shares of 144 stock that would then be sold at a steep discount to the market price. If you had a stock trading at a dollar, you would issue scads and scads of 144 stock, and you sell it for twenty cents a share. This stock would get bounced out into offshore bank loans, principally through the Union Bank of Switzerland, but also through a whole host of offshore banks through the Caribbean.

The large French bank, Banque Paribas, for instance, was notorious for this because of George, Sr.’s relationship with the bank. What would happen is you would raise an enormous amount of money, but you would also have an enormous amount of restricted stock, out of which at some point, the letter (what is known as the restriction or the letter) would come off that stock, and that stock is going to come bouncing back at some point to the market makers.

Because the scheme was at the banks, this was only meant to be interim financing. We are now talking about cooperative banks who were not meant to be burnt. They were just meant to provide bridge financing. This was very, very true with Union Bank of Switzerland, Royal Trust of Canada, and Imperial of Canada, Banque Z of Curaao, Banco de Populare. These were banks that you did not burn. These banks just acted as facilitator banks. But you have to make them “whole” in the end. Now, if you bury them under a pile of 144 stock, how did you make them “whole” in the end? How you made them “whole” is by pumping up the deal as the letter began to expire on the 144 stock that was out.

You would pump up the shares artificially in the marketplace and begin to bleed the stock back through your market makers at forty or fifty cents on the dollar. You would make money again. You had originally borrowed twenty cents on the dollar. You perhaps would bleed the stock back into the marketplace at forty cents on the dollar by the tactic of what is known as “back­dooring” the stock to your market makers and dealers, and issuing certain guarantees to them that they in turn would be made whole. The ultimate bag-holder in these deals, of course, are the people that bought the hype, the people that bought the endless press releases, most of which were all bogus.

In some cases, we would have to make the representation that Company A has a tremendous new product or that it just has a contract with the International Monetary Finance Corporation. And boy, this is just going to be the greatest since sliced bread. Of course, what the prospective hypee didn’t know is that the International Monetary Corporation was in fact a shell that had been formed by the very same people who had perpetrated the original fraud. It is the only way you could keep control of the hype. So you would have one bogus company signing a contract to purchase ten zillion widgets from another bogus company. Not only did the widgets not exist, but both the companies themselves were essentially worthless. In this way, you could pump up the price of the shares and be able to create enough liquidity, enough excitement in the shares to distribute all of the stock, all of this 144 stock that you had bouncing back. Since the problem was obvious, you would vastly expand the flow to the shares ­­ in some cases, by a factor of ten.

There were previously, let’s say, 10 million shares authorized, but usually there was 300,000 or 400,000 shares that were actually out. The rest of it was buried in the hands of dealers or constituted restricted stock. So what would happen is towards the end, when the deal would falter, you could always give the deal a second shot by instituting a reverse stock split, which would bring the stock back up to a level where penny stock investors and speculators felt more comfortable, and also back to a level where the shares would then again meet certain regulatory hurdles, thus making it easier to distribute the stock. You took the stock that was originally done and pumped it up to a dollar. In order to maintain it at a dollar and absorb all the stock, you needed a constant flow of hype.

When the shares eventually sank (because the distribution began to back up on the dealers a little bit), you would give the stock a secondary chance by instituting a reverse stock split. That would boost the price of the shares back up to where they were, usually even higher. Of course the spreads would widen out, and as anyone knows in reverse stock split penny deal, the spreads always get very, very wide. But you simply disguise those spreads.

The dealers can very easily disguise those spreads by either not posting Bids and Asks on the pink sheets, or just posting so­called nominal Bids and Asks which would give the appearance to the would­be investor that the stock was substantially more liquid than it was. But the reverse stock split was always the last link in the chain of the fraud of the underlying deal. Because the last time you would pump it up would be through this artifice, this device using a reverse stock split. It wouldn’t be long thereafter that simply the deal would fall apart, and you could distribute the stock all the way back down to a penny bid, three cents offered, which we did on a lot of deals.

Once the broker/dealers were out ­­ or were “whole” financially ­­ as well as your other market makers and specialists, once you had made them whole financially, because you had so severely discounted the stock to them to begin with, then there would always be 30 million or 40 million shares left over. And the Bids and Asks would quickly go to like a penny bid, three cents offered, but with that, you would get a whole new crop of potential investors. You would keep a little bit of hype there. You’d keep a little bit of activity and spread on the sheets. And there’s a whole lot of people that will buy 10,000, 20,000 shares of a two or three cent stock in hopes that it might be a twenty or thirty cent stock. You do open yourself up at a penny ­­ making a market of one and three cents ­­ you open yourself up to a whole new crop of speculators that will be sellers of a deal at twenty cents, not buyers of a deal at twenty cents.

We use to call these type of penny speculators “green feet.” We used to delineate them by where the stocks traded, on what sheets, in other words. For instance, a pink sheet speculator is someone who bought higher priced penny stocks and shares that traded in the low dollars. Of course, when the stock fell down below the pink sheet regulatory level, it would be kicked down to the green sheets. That’s where you find the one cent, three cent, five cent stocks. When they could no longer be maintained at that level, they would be kicked down to the yellow sheets. That’s where you would sometimes see stocks trading in mils ­­ so many mils bid, so many mils offered. As long as there was still somebody willing to buy it, a market could be maintained, particularly since the stock, by this point, did not cost anything to the broker/dealers or those who initiated the fraud. Everybody was out and clean and made their money, and public shareholders were the ultimate bag holders. But you could actually keep these deals floating and alive for a long time before they absolutely fell apart.

Al Martin Iran Contra Whistleblowers Website

Iran Contra Frauds and The Denver Illuminati Zionist Connection

Biography
Stew Webb Federal Whistleblower-Activist of 29 years has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams for in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. NYSE Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings to name a few. Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill and Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman is a member of the “Illuminati Council of 13”
Stew Webb Official Website
“Stew you’re the only person to go after the pinnacle of the Zionist Organized Crime Leonard Millman, your-ex-in-law and Larry Mizel, Millman’s Buffer.”—Gordon Duff May 16, 2013 (Stew Webb USMC Honorable Discharge)

All logos and trademarks in this site are property of their respective owner. FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: www.law.cornell.edu/uscode/17/107.shtml

 

 




Snowden Revelations nothing new: Whistleblowers who reported spying

GopEchelon

GOP using Echelon software to spy on Americans; NSA bribing media

U.S. news media execs, hosts reportedly taking NSA bribes via Singapore trades to manipulate news and polls as ‘Kabuki Congress’ covers up spy agency’s use of satellites to delay financial markets 7-10 seconds, stealing investment capital from citizens throughout the world.

By Stew Webb and Original by Tom Flocco

Washington—March 9, 2006—U.S. intelligence sources within the Special Operations Group (SOG) are reporting that National Security Agency (NSA) computers have been downloading financial and personal files of all American citizens as a result of upgrades to the Echelon satellite network and software program which is part of the Prosecutor’s Management Information System (PROMIS-Inslaw).

SOG says that NSA also has a “7-10 second lead time” which effectively affords the agency the opportunity to delay the release of currency, stock and bond sales transactions which permits a criminal advantage to agency officials and other high-level associates who game the system of the world’s financial markets.

The intelligence sources say that NSA utilizes the lead time delay in virtually every major financial market in the world, as brokerage computers around the globe are connected to satellites which are vulnerable to the NSA software program, that is, capable of being manipulated.

The intelligence revelations may shed further light on how such financial transactions permitted those with prior knowledge of the September 11 attacks to profit from the deaths of 3,000 people at the World Trade Center via insider trading.

MSNBC host Keith Olbermann (8 pm & Midnight nightly) partially confirmed the NSA spy reports Monday, revealing that GOP Senate Judiciary Chairman Arlen Specter is now aware of new revelations regarding additional activities concerning the Bush Administration spy program; however, GOP senators are reportedly rejecting an investigation for fear of what might become public knowledge.

The NSA citizen-based financial and industrial dragnet is also reportedly being used to spy on all American domestic and foreign financial transactions, including downloading bank accounts and intra bank currency transactions—both foreign and domestic.

According to a US Intel Officer and federal whistleblower, Stew Webb leaked intelligence reports are alleging that U.S. media executives and talk show hosts were given favors and tips on currency movements along with the ability to unobtrusively trade offshore using the Singapore Stock Exchange (SYMEX) in order to provide cover for their transactions away from U.S. jurisdiction.

Whistleblower Stew Webb said that NBC—General Electric [GE owns 80 % of NBC] is heavily involved in the offshore trading activity according to the intelligence reports.

According to the sources, congressional investigators have discovered that media executives are also allowing the NSA a 7-10 second delay mechanism or trigger which allows the national security group to have some control over content in media reports and what is said by certain hosts, controversial guests and other individuals during national broadcasts.

Members of the congressional team probing the Bush spy program also know that major U.S. networks have been helping the NSA with phone numbers of “activists who complain about media coverage or the lack thereof” regarding important issues.

Specter took issue with a Monday New York Times editorial which criticized his new spy program bill for “granting legal cover retroactively, to the one spying program that Mr. Bush has acknowledged,” and that the Specter bill “covers any other illegal wiretapping we don’t know about.”

This, following on the heels of multiple C-Span broadcasts of a Harpers Magazine Impeachment Forum www.c-span.org in which the issue of presidential spying on citizens was one of the main topics of discussion and one of a few recommended articles of impeachment for President Bush.

Specter complained that the Times called the Senate and House a “Kabuki Congress,” writing to the editor, “I have reserved judgment on whether the president has Article II inherent power, which would trump the Foreign Intelligence Surveillance Act [FISA] statute, because I don’t know what the program is, and the administration will not tell us.”

Specter was not prepared to say whether the GOP senators would take some other action to force the president to come clean about the full extent and nature of his citizen spy program, and whether GOP senators could be accused of running cover for Bush to prevent their own failed oversight from being exposed.

Late Tuesday, Senate Republicans proposed a bill to create terrorist surveillance subcommittees in both the House and Senate to oversee the process; however, GOP legislators were intent upon rejecting a full investigation of the administration’s spy program to hold the president accountable.

In a closed meeting on Tuesday, the Senate Intelligence Committee voted to reject Senator Jay Rockefeller’s request to have a “careful and fact-based review of the NSA surveillance eavesdropping activities inside the United States.”

Rockefeller called the move an “unprecedented bow to political pressure,” adding, “you can’t legislate properly if you don’t know what’s going on.”

Rockefeller was complaining about a political fact of life: the GOP controls the House, Senate, White House and Supreme Court—a difficult proposition for a minority senator without subpoena power or public outrage.

Original Story StewWebb.com: GOP using echelon software to spy on Americans nsa bribing media

http://www.stewwebb.com/2013/06/13/gop-using-echelon-software-to-spy-on-americans-nsa-bribing-media/

PROJECT CAMELOT : STEW WEBB : THE OCTOPUS

Promise-Inslaw Software

May 15, 2012

Stew Webb reveals how E-Systems a George HW Bush Secret Shadow Government Contractor Company stole and used the Inslaw software on Weststar satellite to spy on the American People and control the electronic voting machines to rig elections.

NSA Whistleblower Says “People Are Going To Be Shocked” By His Testimony Next Week…”This Is Only The Tip Of The Iceberg”
May 12, 2006

CongressDaily reports that former NSA staffer Russell Tice will testify to the Senate Armed Services Committee next week that not only do employees at the agency believe the activities they are being asked to perform are unlawful, but that what has been disclosed so far is only the tip of the iceberg. Tice will tell Congress that former NSA head Gen. Michael Hayden, Bush’s nominee to be the next CIA director, oversaw more illegal activity that has yet to be disclosed:

“A former intelligence officer for the National Security Agency said Thursday he plans to tell Senate staffers next week that unlawful activity occurred at the agency under the supervision of Gen. Michael Hayden beyond what has been publicly reported, while hinting that it might have involved the illegal use of space-based satellites and systems to spy on U.S. citizens. …”

The NSA Is Building the Country’s Biggest Spy Center Watch What You Say

March 22, 2012

NSA_Bluffdale_Utah

Bluff Dale, Utah

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

By James Bamford

Original wired

Photo: Name Withheld; Digital Manipulation: Jesse Lenz

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives.

Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978—and the number of plural marriages has tripled—so the sect has recently been looking for ways to purchase more land and expand throughout the town.

But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries. Once built, it will be more than five times the size of the US Capitol.

Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.

The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

UTAH DATA CENTER

When construction is completed in 2013, the heavily fortified $2 billion facility in Bluffdale will encompass 1 million square feet.

NSA_Visitors_Control_Center_1

1 Visitor control center

A $9.7 million facility for ensuring that only cleared personnel gain access.

2 Administration

Designated space for technical support and administrative personnel.

3 Data halls

Four 25,000-square-foot facilities house rows and rows of servers.

4 Backup generators and fuel tanks

Can power the center for at least three days.

5 Water storage and pumping

Able to pump 1.7 million gallons of liquid per day.

6 Chiller plant

About 60,000 tons of cooling equipment to keep servers from overheating.

7 Power substation

An electrical substation to meet the center’s estimated 65-megawatt demand.

8 Security

Video surveillance, intrusion detection, and other protection will cost more than $10 million.

Source: U.S. Army Corps of Engineers Conceptual Site plan

A swath of freezing fog blanketed Salt Lake City on the morning of January 6, 2011, mixing with a weeklong coating of heavy gray smog. Red air alerts, warning people to stay indoors unless absolutely necessary, had become almost daily occurrences, and the temperature was in the bone-chilling twenties. “What I smell and taste is like coal smoke,” complained one local blogger that day. At the city’s international airport, many inbound flights were delayed or diverted while outbound regional jets were grounded. But among those making it through the icy mist was a figure whose gray suit and tie made him almost disappear into the background. He was tall and thin, with the physique of an aging basketball player and dark caterpillar eyebrows beneath a shock of matching hair. Accompanied by a retinue of bodyguards, the man was NSA deputy director Chris Inglis, the agency’s highest-ranking civilian and the person who ran its worldwide day-to-day operations.

A short time later, Inglis arrived in Bluffdale at the site of the future data center, a flat, unpaved runway on a little-used part of Camp Williams, a National Guard training site. There, in a white tent set up for the occasion, Inglis joined Harvey Davis, the agency’s associate director for installations and logistics, and Utah senator Orrin Hatch, along with a few generals and politicians in a surreal ceremony. Standing in an odd wooden sandbox and holding gold-painted shovels, they made awkward jabs at the sand and thus officially broke ground on what the local media had simply dubbed “the spy center.” Hoping for some details on what was about to be built, reporters turned to one of the invited guests, Lane Beattie of the Salt Lake Chamber of Commerce. Did he have any idea of the purpose behind the new facility in his backyard? “Absolutely not,” he said with a self-conscious half laugh. “Nor do I want them spying on me.”

For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: “It’s a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nation’s cybersecurity.” While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how it’s collected, and what is done with the material are far more important issues. Battling hackers makes for a nice cover—it’s easy to explain, and who could be against it? Then the reporters turned to Hatch, who proudly described the center as “a great tribute to Utah,” then added, “I can’t tell you a lot about what they’re going to be doing, because it’s highly classified.”

And then there was this anomaly: Although this was supposedly the official ground-breaking for the nation’s largest and most expensive cybersecurity project, no one from the Department of Homeland Security, the agency responsible for protecting civilian networks from cyberattack, spoke from the lectern. In fact, the official who’d originally introduced the data center, at a press conference in Salt Lake City in October 2009, had nothing to do with cybersecurity. It was Glenn A. Gaffney, deputy director of national intelligence for collection, a man who had spent almost his entire career at the CIA. As head of collection for the intelligence community, he managed the country’s human and electronic spies.

Within days, the tent and sandbox and gold shovels would be gone and Inglis and the generals would be replaced by some 10,000 construction workers. “We’ve been asked not to talk about the project,” Rob Moore, president of Big-D Construction, one of the three major contractors working on the project, told a local reporter. The plans for the center show an extensive security system: an elaborate $10 million antiterrorism protection program, including a fence designed to stop a 15,000-pound vehicle traveling 50 miles per hour, closed-circuit cameras, a biometric identification system, a vehicle inspection facility, and a visitor-control center.

Inside, the facility will consist of four 25,000-square-foot halls filled with servers, complete with raised floor space for cables and storage. In addition, there will be more than 900,000 square feet for technical support and administration. The entire site will be self-sustaining, with fuel tanks large enough to power the backup generators for three days in an emergency, water storage with the capability of pumping 1.7 million gallons of liquid per day, as well as a sewage system and massive air-conditioning system to keep all those servers cool. Electricity will come from the center’s own substation built by Rocky Mountain Power to satisfy the 65-megawatt power demand. Such a mammoth amount of energy comes with a mammoth price tag—about $40 million a year, according to one estimate.

Given the facility’s scale and the fact that a terabyte of data can now be stored on a flash drive the size of a man’s pinky, the potential amount of information that could be housed in Bluffdale is truly staggering. But so is the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies. As a result of this “expanding array of theater airborne and other sensor networks,” as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)

It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Google’s former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the world’s 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.

The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”

The NSA’S SPY NETWORK

Once it’s operational, the Utah Data Center will become, in effect, the NSA’s cloud. The center will be fed data collected by the agency’s eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the US. All that data will then be accessible to the NSA’s code breakers, data-miners, China analysts, counterterrorism specialists, and others working at its Fort Meade headquarters and around the world. Here’s how the data center appears to fit into the NSA’s global puzzle.—J.B.

NSA_Geostationary_Satellites

1 Geostationary satellites

Four satellites positioned around the globe monitor frequencies carrying everything from walkie-talkies and cell phones in Libya to radar systems in North Korea. Onboard software acts as the first filter in the collection process, targeting only key regions, countries, cities, and phone numbers or email.

2 Aerospace Data Facility, Buckley Air Force Base, Colorado

Intelligence collected from the geostationary satellites, as well as signals from other spacecraft and overseas listening posts, is relayed to this facility outside Denver. About 850 NSA employees track the satellites, transmit target information, and download the intelligence haul.

3 NSA Georgia, Fort Gordon, Augusta, Georgia

Focuses on intercepts from Europe, the Middle East, and North Africa. Codenamed Sweet Tea, the facility has been massively expanded and now consists of a 604,000-square-foot operations building for up to 4,000 intercept operators, analysts, and other specialists.

4 NSA Texas, Lackland Air Force Base, San Antonio

Focuses on intercepts from Latin America and, since 9/11, the Middle East and Europe. Some 2,000 workers staff the operation. The NSA recently completed a $100 million renovation on a mega-data center here—a backup storage facility for the Utah Data Center.

5 NSA Hawaii, Oahu

Focuses on intercepts from Asia. Built to house an aircraft assembly plant during World War II, the 250,000-square-foot bunker is nicknamed the Hole. Like the other NSA operations centers, it has since been expanded: Its 2,700 employees now do their work aboveground from a new 234,000-square-foot facility.

6 Domestic listening posts

The NSA has long been free to eavesdrop on international satellite communications. But after 9/11, it installed taps in US telecom “switches,” gaining access to domestic traffic. An ex-NSA official says there are 10 to 20 such installations.

7 Overseas listening posts

According to a knowledgeable intelligence source, the NSA has installed taps on at least a dozen of the major overseas communications links, each capable of eavesdropping on information passing by at a high data rate.

8 Utah Data Center, Bluffdale, Utah

At a million square feet, this $2 billion digital storage facility outside Salt Lake City will be the centerpiece of the NSA’s cloud-based data strategy and essential in its plans for decrypting previously uncrackable documents.

9 Multiprogram Research Facility, Oak Ridge, Tennessee

Some 300 scientists and computer engineers with top security clearance toil away here, building the world’s fastest supercomputers and working on cryptanalytic applications and other secret projects.

10 NSA headquarters, Fort Meade, Maryland

Analysts here will access material stored at Bluffdale to prepare reports and recommendations that are sent to policymakers. To handle the increased data load, the NSA is also building an $896 million supercomputer center here.

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping network. A tall man with strands of black hair across the front of his scalp and dark, determined eyes behind thick-rimmed glasses, the 68-year-old spent nearly four decades breaking codes and finding new ways to channel billions of private phone calls and email messages from around the world into the NSA’s bulging databases. As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications.

He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says. “That’s not just San Francisco; they have them in the middle of the country and also on the East Coast.”

The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations, satellite receivers in locations that include Roaring Creek and Salt Creek. Tucked away on a back road in rural Catawissa, Pennsylvania, Roaring Creek’s three 105-foot dishes handle much of the country’s communications to and from Europe and the Middle East. And on an isolated stretch of land in remote Arbuckle, California, three similar dishes at the company’s Salt Creek station service the Pacific Rim and Asia.

The former NSA official held his thumb and forefinger close together: “We are that far from a turnkey totalitarian state.”

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there. According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.

The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.

The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSA’s recorders. “Anybody you want, route to a recorder,” Binney says. “If your number’s in there? Routed and gets recorded.” He adds, “The Narus device allows you to take it all.” And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis.

According to Binney, one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex.

Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agency’s domestic eavesdropping. “That multiplies the call rate by at least a factor of five,” he says. “So you’re over a billion and a half calls a day.” (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.)

After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.

Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.

The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.

In secret listening rooms nationwide, NSA software examines every email, phone call, and tweet as they zip by.

But there is, of course, reason for anyone to be distressed about the practice. Once the door is open for the government to spy on US citizens, there are often great temptations to abuse that power for political purposes, as when Richard Nixon eavesdropped on his political enemies during Watergate and ordered the NSA to spy on antiwar protesters. Those and other abuses prompted Congress to enact prohibitions in the mid-1970s against domestic spying.

Before he gave up and left the NSA, Binney tried to persuade officials to create a more targeted system that could be authorized by a court. At the time, the agency had 72 hours to obtain a legal warrant, and Binney devised a method to computerize the system. “I had proposed that we automate the process of requesting a warrant and automate approval so we could manage a couple of million intercepts a day, rather than subvert the whole process.” But such a system would have required close coordination with the courts, and NSA officials weren’t interested in that, Binney says. Instead they continued to haul in data on a grand scale. Asked how many communications—”transactions,” in NSA’s lingo—the agency has intercepted since 9/11, Binney estimates the number at “between 15 and 20 trillion, the aggregate over 11 years.”

When Barack Obama took office, Binney hoped the new administration might be open to reforming the program to address his constitutional concerns. He and another former senior NSA analyst, J. Kirk Wiebe, tried to bring the idea of an automated warrant-approval system to the attention of the Department of Justice’s inspector general. They were given the brush-off. “They said, oh, OK, we can’t comment,” Binney says.

Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.

There is still one technology preventing untrammeled government access to private digital data: strong encryption. Anyone—from terrorists and weapons dealers to corporations, financial institutions, and ordinary email senders—can use it to seal their messages, plans, photos, and documents in hardened data shells. For years, one of the hardest shells has been the Advanced Encryption Standard, one of several algorithms used by much of the world to encrypt data. Available in three different strengths—128 bits, 192 bits, and 256 bits—it’s incorporated in most commercial email programs and web browsers and is considered so strong that the NSA has even approved its use for top-secret US government communications. Most experts say that a so-called brute-force computer attack on the algorithm—trying one combination after another to unlock the encryption—would likely take longer than the age of the universe. For a 128-bit cipher, the number of trial-and-error attempts would be 340 undecillion (1036).

Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale. That kind of cryptanalysis requires two major ingredients: super-fast computers to conduct brute-force attacks on encrypted messages and a massive number of those messages for the computers to analyze. The more messages from a given target, the more likely it is for the computers to detect telltale patterns, and Bluffdale will be able to hold a great many messages. “We questioned it one time,” says another source, a senior intelligence manager who was also involved with the planning. “Why were we building this NSA facility? And, boy, they rolled out all the old guys—the crypto guys.” According to the official, these experts told then-director of national intelligence Dennis Blair, “You’ve got to build this thing because we just don’t have the capability of doing the code-breaking.” It was a candid admission. In the long war between the code breakers and the code makers—the tens of thousands of cryptographers in the worldwide computer security industry—the code breakers were admitting defeat.

So the agency had one major ingredient—a massive data storage facility—under way. Meanwhile, across the country in Tennessee, the government was working in utmost secrecy on the other vital element: the most powerful computer the world has ever known.

The plan was launched in 2004 as a modern-day Manhattan Project. Dubbed the High Productivity Computing Systems program, its goal was to advance computer speed a thousandfold, creating a machine that could execute a quadrillion (1015) operations a second, known as a petaflop—the computer equivalent of breaking the land speed record. And as with the Manhattan Project, the venue chosen for the supercomputing program was the town of Oak Ridge in eastern Tennessee, a rural area where sharp ridges give way to low, scattered hills, and the southwestward-flowing Clinch River bends sharply to the southeast. About 25 miles from Knoxville, it is the “secret city” where uranium- 235 was extracted for the first atomic bomb. A sign near the exit read: what you see here, what you do here, what you hear here, when you leave here, let it stay here. Today, not far from where that sign stood, Oak Ridge is home to the Department of Energy’s Oak Ridge National Laboratory, and it’s engaged in a new secret war. But this time, instead of a bomb of almost unimaginable power, the weapon is a computer of almost unimaginable speed.

In 2004, as part of the supercomputing program, the Department of Energy established its Oak Ridge Leadership Computing Facility for multiple agencies to join forces on the project. But in reality there would be two tracks, one unclassified, in which all of the scientific work would be public, and another top-secret, in which the NSA could pursue its own computer covertly. “For our purposes, they had to create a separate facility,” says a former senior NSA computer expert who worked on the project and is still associated with the agency. (He is one of three sources who described the program.) It was an expensive undertaking, but one the NSA was desperate to launch.

Known as the Multiprogram Research Facility, or Building 5300, the $41 million, five-story, 214,000-square-foot structure was built on a plot of land on the lab’s East Campus and completed in 2006. Behind the brick walls and green-tinted windows, 318 scientists, computer engineers, and other staff work in secret on the cryptanalytic applications of high-speed computing and other classified projects. The supercomputer center was named in honor of George R. Cotter, the NSA’s now-retired chief scientist and head of its information technology program. Not that you’d know it. “There’s no sign on the door,” says the ex-NSA computer expert.

At the DOE’s unclassified center at Oak Ridge, work progressed at a furious pace, although it was a one-way street when it came to cooperation with the closemouthed people in Building 5300. Nevertheless, the unclassified team had its Cray XT4 supercomputer upgraded to a warehouse-sized XT5. Named Jaguar for its speed, it clocked in at 1.75 petaflops, officially becoming the world’s fastest computer in 2009.

Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.

The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”

In addition to giving the NSA access to a tremendous amount of Americans’ personal data, such an advance would also open a window on a trove of foreign secrets. While today most sensitive communications use the strongest encryption, much of the older data stored by the NSA, including a great deal of what will be transferred to Bluffdale once the center is complete, is encrypted with more vulnerable ciphers. “Remember,” says the former intelligence official, “a lot of foreign government stuff we’ve never been able to break is 128 or less. Break all that and you’ll find out a lot more of what you didn’t know—stuff we’ve already stored—so there’s an enormous amount of information still in there.”

The NSA believes it’s on the verge of breaking a key encryption algorithm—opening up hoards of data.

That, he notes, is where the value of Bluffdale, and its mountains of long-stored data, will come in. What can’t be broken today may be broken tomorrow. “Then you can see what they were saying in the past,” he says. “By extrapolating the way they did business, it gives us an indication of how they may do things now.” The danger, the former official says, is that it’s not only foreign government information that is locked in weaker algorithms, it’s also a great deal of personal domestic communications, such as Americans’ email intercepted by the NSA in the past decade.

But first the supercomputer must break the encryption, and to do that, speed is everything. The faster the computer, the faster it can break codes. The Data Encryption Standard, the 56-bit predecessor to the AES, debuted in 1976 and lasted about 25 years. The AES made its first appearance in 2001 and is expected to remain strong and durable for at least a decade. But if the NSA has secretly built a computer that is considerably faster than machines in the unclassified arena, then the agency has a chance of breaking the AES in a much shorter time. And with Bluffdale in operation, the NSA will have the luxury of storing an ever-expanding archive of intercepts until that breakthrough comes along.

But despite its progress, the agency has not finished building at Oak Ridge, nor is it satisfied with breaking the petaflop barrier. Its next goal is to reach exaflop speed, one quintillion (1018) operations a second, and eventually zettaflop (1021) and yottaflop.

These goals have considerable support in Congress. Last November a bipartisan group of 24 senators sent a letter to President Obama urging him to approve continued funding through 2013 for the Department of Energy’s exascale computing initiative (the NSA’s budget requests are classified). They cited the necessity to keep up with and surpass China and Japan. “The race is on to develop exascale computing capabilities,” the senators noted. The reason was clear: By late 2011 the Jaguar (now with a peak speed of 2.33 petaflops) ranked third behind Japan’s “K Computer,” with an impressive 10.51 petaflops, and the Chinese Tianhe-1A system, with 2.57 petaflops.

But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center, the buildings will be low and wide like giant warehouses, a design necessary for the dozens of computer cabinets that will compose an exaflop-scale machine, possibly arranged in a cluster to minimize the distance between circuits. According to a presentation delivered to DOE employees in 2009, it will be an “unassuming facility with limited view from roads,” in keeping with the NSA’s desire for secrecy. And it will have an extraordinary appetite for electricity, eventually using about 200 megawatts, enough to power 200,000 homes. The computer will also produce a gargantuan amount of heat, requiring 60,000 tons of cooling equipment, the same amount that was needed to serve both of the World Trade Center towers.

In the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. It’s a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops.

Yottabytes and exaflops, septillions and undecillions—the race for computing speed and data storage goes on. In his 1941 story “The Library of Babel,” Jorge Luis Borges imagined a collection of information where the entire world’s knowledge is stored but barely a single word is understood. In Bluffdale the NSA is constructing a library on a scale that even Borges might not have contemplated. And to hear the masters of the agency tell it, it’s only a matter of time until every word is illuminated.

James Bamford (washwriter@gmail.com) is the author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America.

See also:

 

 

NSA Chief Denies Domestic Spying But Whistleblowers Say Otherwise

By James Bamford

NSA_Chief_General_Keith_Alexander

NSA chief General Keith Alexander, Courtesy NSA

Original Wired NSA Whistleblower

In a rare break from the NSA’s tradition of listening but not speaking, NSA chief General Keith Alexander was grilled Tuesday on the topic of eavesdropping on Americans in front of a House subcommittee.

The questioning from Rep. Hank Johnson (D-Georgia) was prompted by Wired’s cover story this month on the NSA’s growing reach and capabilities, but leaves Americans with as many questions about the reach of spy agency’s powers as they had before Alexander spoke.

Alexander denied, in carefully parsed words, that the NSA has the power to monitor Americans’ communications without getting a court warrant.

But Alexander’s comments fly in the face of people who actually helped create the agency’s eavesdropping and data mining infrastructure. Few people know that system as well as William Binney, who served as the technical director for the agency’s M Group, which stood for World Geopolitical Military Analysis and Reporting, the giant 6,000-person organization responsible for eavesdropping on most of the world.

He was also the founder and co-director of the agency’s Signals Intelligence Automation Research Center, which helped automate that eavesdropping network. Binney decided to leave after a long career rather than be involved in the agency warrantless eavesdropping program, a program he said involves secret monitoring facilities in ten to twenty large telecom switches around the country, such as the one discovered in San Francisco’s AT&T installation a few years ago.

Historically, the NSA’s initial response has always been to either deny or evade when confronted with issues involving eavesdropping on Americans. For decades the agency secretly hid from Congress the fact that it was copying, without a warrant, virtually every telegram traveling through the United States, a program known as Project Shamrock. Then it hid from Congress the fact that it was illegally targeting the phone calls of anti-war protesters during the Vietnam War, known as Project Minaret.

More recently, President Bush said falsely that no American had been wiretapped without a warrant at the same time the agency was eavesdropping on thousands of Americans without a warrant as part of the later revealed Operation Stellar Wind. The Congress then passed a bill granting immunity from prosecution and law suits to the telecom companies involved in the illegal program.

Also, in the same way that General Alexander carefully parsed his words, the agency has always maintained its own secret definition of words in a document known as United States Signals Intelligence Directive 18, a document classified above top secret.

For example, NSA can intercept millions of domestic communications and store them in a data center like Bluffdale and still be able to say it has not “intercepted” any domestic communications. This is because of its definition of the word. “Intercept,” in NSA’s lexicon, only takes place when the communications are “processed” “into an intelligible form intended for human inspection,” not as they pass through NSA listening posts and transferred to data warehouses.

Complicating matters is the senseless scenario made up for the questioning by Congress, which makes it difficult to make sense of his answers, especially since many seem very parsed, qualified, and surrounded in garbled syntax.

That scenario involved NSA targeting U.S. citizens for making fun of a President Dick Cheney for shooting a fellow hunter in the face with a shotgun, and then the fun-makers being waterboarded for their impertinence.

Asked whether the NSA has the capability of monitoring the communications of Americans, he never denies it – he simply says, time and again, that NSA can’t do it “in the United States.” In other words it can monitor those communications from satellites in space, undersea cables, or from one of its partner countries, such as Canada or Britain, all of which it has done in the past.

In my article I quote from a former NSA intercept operator, Adrienne Kinne, who was posted at the NSA’s giant listening post in Georgia and who eavesdropped on many communications between Americans overseas and in the U.S., including personal calls between journalists and their families. But while she was in Georgia, satellites deep in space did the actual interception.

“Basically all rules were thrown out the window and they would use any excuse to justify a waiver to spy on Americans,” she said. She added, “A lot of time you could tell they were calling their families, waking them up in the middle of the night because of the time difference. And so they would be talking all quiet and soft and their family member is like half asleep and incredibly intimate, personal conversations.” Kinne protested both within NSA and then in a letter to the Senate Intelligence Committee, but neither took any action.

Her allegations were confirmed by a second source I interviewed several years ago. David Murfee Faulk was also an intercept operator at NSA Georgia, but at a later date than Kinne, whom he never met. While there, a colleague told him about being instructed to begin warrantless targeting of Americans overseas calling the U.S. “The calls were all in English, they were all American, and the guy goes back to his supervisor, a warrant officer, and says, ‘Sir, these people are all Americans,’” according to Faulk. “He said, ‘No, just transcribe it, that’s an order, transcribe everything.’ . . . A lot of these people were having personal phone calls, calling their families back home, having all kinds of personal discussions, and everything just disappeared somewhere, someone’s got it.”

Like Kinne, Faulk’s fellow intercept operator also complained. “After a few days he said he didn’t want to do it anymore, didn’t think it was right. And in a situation like that the officer just gets someone else to do it. So they got somebody else to do it. There is always somebody else who will do something like that. The whole agency down here, at least the way it operates in Georgia, there’s a lot of intimidation, everybody’s afraid of getting in trouble, and people just follow orders.” Like Kinne, Faulk also told his story privately to the Senate Intelligence Committee.

The agency can also do the actual domestic eavesdropping from foreign countries, such as Canada, or from its greatly expanding listening post in Central England, and then just retransmit the data to the U.S. A former NSA deputy director, Louis Tordella, once referred to this technique when testifying before Congress. He noted that the NSA had asked the CIA to conduct illegal domestic eavesdropping but was turned down because the monitoring would take place “on U.S. soil.”

He added, “I was told that if they could move a group of Cubans up to Canada it would be quite all right, but they would not do it in the United States.” And the U.S. frequently asks its very close foreign partners, Canada, the U.K., Australia, and New Zealand, to conduct eavesdropping on its behalf and vice versa. The countries call themselves, the “Five Eyes.” Prior to 9/11, says Kinne, these countries were not supposed to monitor citizens in each other’s countries, but that also changed. “We listened to Australians, Canadians, Brits. And so it wasn’t just the Americans but that whole idea that you weren’t supposed to monitor those five countries either – citizens of those five countries.” With the borderlessness of modern digital communications, where the actual eavesdropping is done becomes almost irrelevant.

For years, public interest groups such as the ACLU, the Electronic Frontier Foundation, and the Electronic Privacy Information Center have been trying through court suits to find out the extend of NSA’s eavesdropping on Americans, only to be rebuffed at every turn with claims of secrecy, while whistleblowers such as Adrienne Kinne, David Murfee Faulk, and William Binney have risked going to prison in order to expose NSA’s actions.

Now that General Alexander has broached the subject in an open session of Congress, it is time for the American people to know the real truth about their communications, not heavily parsed, qualified denials about an unlikely hypothetical. Let Congress call an open panel where whistleblowers such as Kinne, Faulk, and Binney give sworn testimony, and NSA, at last, responds fully concerning its domestic involvement.

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives.

 

Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978—and the number of plural marriages has tripled—so the sect has recently been looking for ways to purchase more land and expand throughout the town.

But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries. Once built, it will be more than five times the size of the US Capitol.

Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.

The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

Everyone is chipped or will be by December 2014

Chips in everyone under Obama’s new Health Care law. Your will have insurance and take the chip or you go to Jail and will be chipped there.

Chips In worldwide vaccinations since the early 1980s through the World Health Organization.

Chips in Passports

Chips in Drivers Licenses since 2002 under the Compact Laws

Chips in TVs

Chips in Computers

Chips in Toaster

Chips in Coffeemakers

Chips in Light Bulbs

Chips in the Flue Shots

Chips in some foods we eat or have eaten that stick to the lining of your Intestines since the early 2000s

All tied to the NSA Spying and the Bluffdale, Utah base and guess who is next door?

The Richfield Utah Alein Base is that a surprise?

Now they control you through your TV, your internet, your cell phone and ground line.

That is what Daddy Bush’s AIPAC-Illuminati-Zionists Pigs did to you.

Guess what? Now they can make you a Naval Yard killer, when will Americans and the Human Race wake up to the Evil Control and say I have had enought time for Justice and the Guiltiness?

Question?

What are you going to do about it?

Stew Webb website

http://www.veteranstoday.com/2014/01/29/snowden-revelations-nothing-new-whistleblowers-who-reported-spying/

Stew Webb Federal Whistleblower-Activist

http://www.stewwebb.com

Stew Webb Columnist Veterans Today

http://www.veteranstoday.com/author/swebb/

Stew Webb Youtube

http://www.youtube.com/stewwebb1

Stew Webb working 24/7 for you

Donations always welcome

http://www.stewwebb.com

January 2014 America you have one year to take back your Government Solutions below:

Stew Webb Founder

Recall Your Congress and Senate

http://www.recallpetitions.com

The Recall Sword Used Against Those that Violate the U.S. Constitution!

http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

JB Campbell Solutions for America Get involved

http://www.americandefenseparty.com

http://www.veteranstoday.com/author/campbell/

All logos and trademarks in this site are property of their respective owner. FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: www.law.cornell.edu/uscode/17/107.shtml

 




Defending Israel is Elemental to Being an American

Defending_Israel_is_Elemental_to_Bing_an_America

NY City Mayor De Blasio: Defending Israel is Elemental to Being an American … by  Bob Johnson

New York City’s Mayor Bill De Blasio is among the much too large herd of US politicians who believe America and Americans need to defend the Jewish state of Israel.

In a secret speech to the most powerful arm of the Israel lobby, the American Israel Public Affairs Committee, DeBlasio said, “There is a philosophical grounding to my belief in Israel and it is my belief, it is our obligation, to defend Israel. But it is also something that is elemental to being an American because there is no greater ally on earth, and that’s something we can say proudly.”

Soulless politicians like De Blasio don’t really love Israel; they love their powerful political careers and the cash and influence that comes with them. They know that if they want to keep their political careers they need to please the overly powerful Israel lobby by putting the Jewish state’s interests above the interests of Americans and America. This selling out of America and Americans virtually guarantees them positive press coverage in the media which is top-heavy with Jewish movers and shakers.

De Blasio is a Gentile. When we hear Jewish politicians in the US say such things we should not really be shocked by it, although we should realize the profound danger it is to America, Americans and to the world. When US Senator Chuck Schumer said on a New York Jewish radio show that he’s on a mission from God to protect Israel, it demonstrated his loyalty to his own people and to their nation.

However, when a Gentile goy-boy like De Blasio makes such statements it strongly indicates that he is ignorant of Judaism OR that he doesn’t care for or love his own children. Judaism, as expressed in the Hebrew Bible/Old Testament, is what the Jewish state of Israel is based on.

Whether or not the Jews of today are genetically the same as the Jews of the Bible doesn’t matter because the Jews of today in present day Israel have adapted the Hebrew Bible/Old Testament and have based Israel on it. This is made clear by Israel not even having a constitution due to religious reasons. Israeli PM Netanyahu makes it clear on a regular basis every time he makes statements like, “[Jerusalem] is not a settlement. It is the sovereign capital of the State of Israel. We have been building in Jerusalem for 3,000 years.”

If De Blasio and all the other Gentile politicians who promote Israel over all do know what is in the Jewish “holy” book, the Hebrew Bible/Old Testament, then they have to be so cold-hearted and selfish that they don’t care about the future of their own families and children, let alone their fellow Gentiles and nation. This is because the Hebrew Bible/Old Testament is a blueprint for Jewish superiority over all Gentiles and for putting Israel “on high above all nations of the earth” (Deuteronomy 28:1).

These soulless politicians like Bill De Blasio, if they are aware of the contents and teachings in the Hebrew Bible/Old Testament which they are obligated to be if they’re going to promote a foreign nation that is based upon it, must not care that this Jewish “holy” book teaches Jews that they should not own fellow Jews as slaves, but that they should own Gentiles and our children as slaves “for ever.”

It plainly teaches this ungodly command (and does so in a manner which indicates God/The Supreme Intelligence is giving the command) at Leviticus 25:44-46:

Both thy bondmen, and thy bondmaids, which thou shalt have, shall be of the heathen that are round about you; of them shall ye buy bondmen and bondmaids. Moreover of the children of the strangers that do sojourn among you, of them shall ye buy, and of their families that are with you, which they begat in your land: and they shall be your possession.  And ye shall take them as an inheritance for your children after you, to inherit them for a possession; they shall be your bondmen for ever: but over your brethren the children of Israel, ye shall not rule one over another with rigour.

I never heard any Israeli official or rabbi repudiate this Hebrew Bible/Old Testament teaching which reeks of anti-Gentileism. US politicians, and politicians from all of the Gentile nations, should demand that Israel and Judaism make very clear that they disavow this ungodly and anti-Gentile teaching. Any Gentile who supports Israel and/or Judaism must not care if they and their children and grandchildren become slaves and property of Jews based on Leviticus 25:44-46.

A teaching from the Hebrew Bible/Old Testament which makes clear any politician or member of the military of a Gentile nation who supports the Jewish state of Israel is committing treason to their own nation and people is Isaiah 60:12 which goes hand in hand with the Gentiles as slaves teaching of the above quote from Leviticus.

Isaiah 60:12 states regarding Israel, “For the nation and kingdom that will not serve thee shall perish; yea, those nations shall be utterly wasted.” This means that if the US or any other Gentile nation will not prostrate itself before the Jewish state of Israel and become its slave/servant, the Jewish god will utterly waste and destroy that Gentile nation.

When De Blasio and others of his ilk tie America to the foreign religious state of Israel, they are in violation of a principle of neutrality promoted by the Deist and America’s best general and first president, George Washington. In his farewell address George Washington warned America about the dangers of not being neutral in foreign affairs. He said:

So likewise, a passionate attachment of one nation for another produces a variety of evils. Sympathy for the favorite nation, facilitating the illusion of an imaginary common interest

 

 




WEF: the Real Bilderberg meeting Conspiracy Wing nut Alex Jones where are you?

Netanyahu and Rohani in Davos

Netanyahu_and_Rohani_in_Davos

 

 

 

Davos, Switzerland hosts the annual World Economic Forum (WEF). It’s a money power celebration. It’s a billionaire’s ball. It’s a convocation of rich, powerful, privileged elites.

 

They’re “committed to improving the state of the world” for greater personal power and enrichment.

 

Numerous heads of state show up. Central bankers and other policymakers join them. So do hundreds of corporate bosses, investors and economists.

 

IMF head Christine Lagarde arrived. US Treasury Secretary Jacob Lew is participating. So is World Bank boss Jim Yong Kim. John Kerry came.

 

Privileged journalists and celebrities are invited. Matt Damon, Bono and Margaret Atwood are there. So is Al Gore. About 2,500 participants arrived. They’re from nearly 100 countries. Monied interests run things. They take victory laps. They do it annually. Sessions this year run from January 22 – 25. “The Reshaping of the World: Consequences for Society, Politics and Business” is this year’s theme.

 

Davos is an exercise in self-congratulatory excess. It’s an embarrassment of riches and power. It reflects hubris writ large. It’s ongoing at a time of epic inequality and human misery.Monied interests never had it so good. Poverty and unemployment in much of the world are worse than ever.

 

Predatory capitalism works this way. It benefits the few. It harms the great majority. A new Oxfam report said the richest 85 elites have more wealth than half the world’s population.

 

Imagine: Their total net worth exceeds what 3.5 billion people combined have. With a modest annual rate of return, they could spend millions of dollars daily and never dent their principal. A new Gilded Age reflects unprecedented wealth/poverty extremes in much of the developed world.

 

Davos hills are alive with the sound of wealth, power and privilege. Power brokers strut their stuff. Ordinary folks aren’t welcome. Annual World Economic Forum (WEF) gatherings began in 1971. This year marks the 44th time.

 

WEF calls itself “an independent international organization committed to improving the state of the world by engaging leaders in partnerships to shape global, regional and industry agendas.” It aims for greater wealth and power. It wants unchallenged global dominance. It wants powerful movers and shakers alone benefitting. It claims otherwise.

 

Israeli Prime Minister Benjamin Netanyahu attended this year. So did Iranian President Hassan Rohani. Their worldviews are polar opposite and then some. Both leaders spoke.

 

Ahead of his address, Rohani said he prioritizes “constructive engagement with the world.” He wants normalized relations with all countries. He called sanctions imposed illegal. He knows AIPAC wants stiffer ones. “We are not afraid of threats, and the language of threats is ineffective when it comes to Iran,” he said. Treating Iran respectfully benefits the region and other countries, he added.

He believes rapprochement with Washington is possible. It requires both sides making a sincere effort, he stressed.

“No animosity lasts eternally. No friendship either lasts eternally. So we have to transform animosities into friendship….This effort is necessary to create confidence on both sides. Iran is in fact stretching out its hand in peace and friendship to all countries of the world and wants friendly, good relations with all countries” in return.

 

On Thursday, Rohani addressed the World Economic Forum. He said resolving Syria’s conflict requires combatting terrorism.”There is no military solution to the crisis in Syria and the spreading of terrorism doesn’t deserve the interest of any country.”

 

He urged all parties to work for peace and stability. At the same time, he doubts Geneva II talks will resolve things. He sees little chance for success because most participants “are behind (Syrian conflict and) instability.” They “support terrorism. They are responsible for the instability in the region.”

 

Iran seeks regional peace and security. It wants it restored. Geneva II could work if participating countries pursued the same goals, he said. Their agenda is polar opposite. Peace remains a distant hope. Rohani said he came to Davos to convey Iran’s message of friendship, interaction and peace to WEF participants.

 

No country can solve its problems on its own, he stressed. None can do it while ignoring others. “We are all on board one boat,” he said. “If we do not choose a wise captain, storm will hit us.”

 

Iran wants constructive engagement with other countries on environmental issues, nuclear safety, joint economic initiatives, expanding trade, Palestinian rights, resolving Syria’s conflict, regional security, and combatting extremism and terrorism.

 

“I believe that expansion of economic, social, cultural and tourism cooperation plays a pivotal role in establishing peace and security in the region,” Rohani said. Iran won’t sacrifice its legitimate nuclear rights, he stressed. He’ll do all he can to reach a comprehensive final agreement later this year.

 

Tehran will observe all international regulations. Legitimate nuclear rights won’t be sacrificed. Iran’s program has no military component. It seeks none, Rohani stressed. He took issue with Western and Israeli accusations otherwise. He hopes “constructive engagement” will resolve things equitably.

 

He wants Iran’s economy to be one of the world’s top 10 in 30 years. He sees it “as the most congruent, capable and closest to that of successful emerging” countries. He called Davos a good opportunity to exchange views on vital world issues. He wants Iran to engage more countries in trade.

 

On January 23, the Financial Times headlined “Iran courts western oil majors at Davos,” saying:

 

Rohani “asked a group of western oil majors to detail the conditions under which they would return to his country, as Tehran continues its drive to win back international business amid a thaw in sanctions.”

 

He held meetings with BP, Eni, Royal Dutch Shell and Total. His oil minister, Bijan Namdar Zangeneh joined him. The asked oil officials to submit contracts they’d like Iran to adopt. Follow-up meetings are planned. They’ll take place in London this summer. Contracts will be prepared in September.

 

According to Eni CEO Paolo Scaroni:

 

“The very fact that the president of Iran chose to spend an hour with us shows how interested he is in attracting international oil companies into the country.”

 

The FT said he wants international companies for new projects. They include developing “the giant South Pars gasfield.” Rohani wants more oil production from existing sites and new ones. Iran ranks fourth in proved reserves after Venezuela, Saudi Arabia and Canada.

 

Scaroni said contractual terms are as important as sanctions. “If we don’t have a good contract, we won’t go into Iran even if sanctions are lifted.”

 

China is Iran’s major foreign oil producer. Other countries are interested. According to he FT: “Executives from state oil companies, including Pemex of Mexico, Lukoil and Gazprom Neft of Russia and Petrobras of Brazil” met with Rohani.

 

Netanyahu’s WEF address didn’t surprise. “Israel is not what’s wrong in the Middle East,” he said. It’s “what right.” “I am ready for peace. I’m ready for a real secure genuine peace…”

 

His notion of peace is unconditional Palestinian surrender. It’s continued occupation harshness. It’s more land theft and ethnic cleansing. It’s stealing Palestinian resources. It’s exploiting its people. It’s confining them to isolated bantustans. It’s wanting all valued Judea and Samaria areas Judaized.

 

It’s wanting Jerusalem as Israel’s exclusive capital. It’s denying diaspora Palestinians their legal right of return. It’s what no responsible Palestinian leader would accept.Netanyahu is a world class thug. Why Israelis put up with him, they’ll have to explain.

 

He lied saying Arab countries “understand that Iran remains aggressive, supports terror, that it participates in the slaughter in Syria, (and) that is pursuing the development of ballistic missile and plutonium for nuclear weapons.”

 

He said Rohani’s address had

 

 




Maryland Mall Shooting Israeli Mossad behind attack; Israeli Sub off Coast

Israel_zionist_bomb

By Stew Webb

I was given Intel information several weeks back that the Israel Zionists are unhappy with America.

American Military has stopped the Syria War and Iran War, Israel wanted us to wage in their behalf.

They are behind the recent Bombing in Russia to interrupt the Olympics and payback Russian President Putin for his role in stopping the War with Syria.

Is Netanyahu Getting Back at Putin with Volgograd Bombings?

http://www.stewwebb.com/2014/01/24/is-netanyahu-getting-back-at-putin-with-volgograd-bombings/

I was told AIPAC the Treason Illuminati Zionist Punks who control the US Congress and Senate and have infiltrated the US Government at all levels who would orchestrate attacks on shopping malls and sporting events real soon.

Could the Super Bowl be next?

They have begun with this Maryland Mall shooting that just occurred.

There is a Israeli Sub off the coast of Washington, D.C. plotting an attack on the Whitehouse with a cruise missile and they will blame the Arabs and Iran.

Empty threats, sad day for America

http://www.stewwebb.com/2014/01/25/empty-threats-sad-day-for-america/

The Saudi Royal Family and George HW Bush are behind the Israeli Mossad and financing these attacks and future attacks using Arab kids as a cover.

More will be posted here on stewwebb.com as information is warranted.

Stew Webb

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/




Seattle TV interviews Dr Jim Fetzer and Stew Webb Jan 23 2014

Seattle_Community_Television_JimFetzer_StewWebb

 

 

http://youtu.be/k-2cbM4XWxA

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb Youtube
http://www.youtube.com/stewwebb1
Would you consider a small donation to help support the cause?
http://www.stewwebb.com
January 2014 America you have one year to take back your Government Solutions below:
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/
JB Campbell Solutions for America Get involved
http://www.americandefenseparty.com
http://www.veteranstoday.com/author/campbell/








flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Network Store

President Donald Trump, Drain the Swamp and Lock them Up Sir.

Stew Webb Whistle blower Grand Jury Demand Still Active against Hillary Clinton aka “HildaBeast”.
Obama-admits-US-trains-ISIS-july-2015-stewwebb
Bush, Obama, Clinton Founders of ISIS, ISIL, See Obama Video July 2015
George-W-Bush-Arrest
George W. Bush Faces War Crimes December 12 2016 In U.S. Federal Court

(C) Israel Prime Minister Benjamin Netanyahu (R) Organized Crime Boss Hog Larry Mizel

911 World Trade Center Bush Guilty

Stew Webb


Spot Dog is on the loose he loves to eat Illuminati, Zionist, Satanists and Lying Media Political Whores.
Stew Webb 32 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower-Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebbradionetwork.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the "Illuminati Council of 13".

Stew Webb Breaking News

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton’s Assassins. There were two more crashed and attempts one year later.
Contributions are much appreciated Thank You.– Stew Webb





Archives