. . . inspecting the global underbelly: privacy, money laundering, espionage.
Dal Lake, Kashmir
I DO therefore humbly offer it to publick Consideration, that of the Hundred and Twenty Thousand Children, already computed, Twenty thousand may be reserved for Breed; whereof only one Fourth Part to be Males; which is more than we allow to Sheep, black Cattle, or Swine; and my Reason is, that these Children are seldom the Fruits of Marriage, a Circumstance not much regarded by our Savages; therefore, one Male will be sufficient to serve four Females. That the remaining Hundred thousand, may, at a Year old, be offered in Sale to the Persons of Quality and Fortune, through the Kingdom; always advising the Mother to let them suck plentifully in the last Month, so as to render them plump, and fat for a good Table. A Child will make two Dishes at an Entertainment for Friends; and when the Family dines alone, the fore or hind Quarter will make a reasonable Dish; and seasoned with a little Pepper or Salt, will be very good Boiled on the fourth Day, especially in Winter. ...
THOSE who are more thrifty (as I must confess the Times require) may flay the Carcase; the Skin of which, artificially dressed, will make admirable Gloves for Ladies, and Summer Boots for fine Gentlemen
AS to our City of Dublin; Shambles may be appointed for this Purpose, in the most convenient Parts of it; and Butchers we may be assured will not be wanting; although I rather recommend buying the Children alive, and dressing them hot from the Knife, as we do roasting Pigs.
In the Current Issue:
Ayn Rand, Smeared Again, by Wolf DeVoon
Echelon--Rights Violation in the Information Age, by Don Lobo Tiggre
Public Sector at the Expense of Private Life, by Peter Topolewski
Tibet: Obsessed with Money, by Richard S. Ehrlich
Tomorrow's Allies Today, by Sunni Maravillosa
Jack Parsons & the Curious Origins of the American Space Program
Part 17: Stab Your Demoniac Smile to My Brain!, by The Magician
|International Cryptography Freedom||Code & instruction on cryptology.|
|Report on Echelon and Communications Spying||European parliament: "Interception Capabilities 2000".|
|The Redacted Cox Report||All material implicating Clinton was classified by White House.|
|The Jack Parsons Story||A more accurate view of the origin of the Chinese missile program.|
|The Clinton Death List||All those wacky coincidences.|
|NSA vs. Congress over Echelon||NSA invokes "attorney-client" privilege to keep docs secret.|
|Child-Adult Sex Study||"Hi, Mom. What's for dinner?"|
|Need Target Practice?||Send away for free California photo.|
|Cryptography & Liberty 1999||EPIC's survey of crytography freedom around the world.|
|Rep. Weldon Adds to Cox Report||A refutation of the White House spin.|
|Geeks Not Worried About Y2K||The geeks don't like no freaks.|
|Can Government Gold Be Put to Better Use?||Sell it or lend it all now.|
|The Carlyle Group||The Richard King Mellon Family makes money from defense dollars.|
|Is MP3 the Future of Music?||Bankrupting the media monopolies (and the money monopoly also).|
|Nuclear Lab Security||The report of the President's Foreign Intelligence Advisory Board.|
Spy vs. Spy
U.S. Accused of 'Promis' Information Warfare Program
An Aspect of Echelon
[Interview with Fabrizio Calvi and Thierry Pfister, authors of book L'Oeil de Washington (The Eye of Washington), by Denis Jeambar and Yves Stavrides; place and date not given: "Espionage: How Washington Booby-Trapped All the World's Computers"]
[Translated from the French] How far can a government go? Democracies have settled that issue of the desire for power in principle: The state of law, situated at the heart of their institutional mechanisms, forms their boundaries. But that framework is in fact more virtual than real, and laws or treaties are very fragile barriers when it comes to containing the appetite for conquest. All democracies have their shadowy areas known as the secret police or as espionage networks. Those instruments for protecting national interests are also weapons of conquest. All states use them, but then again, might makes right. L'Oeil de Washington (The Eye of Washington) by Fabrizio Calvi and Thierry Pfister, soon to be published by the Albin Michel Publishing House, is an almost incredible illustration of that. Following an unusually rigorous investigation, the two journalists reveal how the United States penetrated and booby-trapped the computer systems of its enemies and allies. This unprecedented espionage operation, suddenly revealed in this flabbergasting book, shows that the democratic ideal remains a very weak rampart against the will to dominate.
[LE VIF/L'EXPRESS] Spies by the dozen, crooked politicians, games of consequences, bizarre suicides, arms merchants, drug traffickers, and all of it on a global scale! There is a shock right at the start: The U.S. and Israeli intelligence services reportedly have been booby-trapping all of the world's computer systems since the 1980's! After reading your book, one wonders if one might have been dreaming.
[Answer] The story seems incredible, but it is true. It is backed by two investigating committees in the United States: the one in the House of Representatives and the one in the Senate. By three trials. By proof. By statements by the participants, although they are not necessarily presentable--that is typical of secret operations of this kind. The Inslaw case is a taboo subject, with its load of disinformation and with its gray areas, unverifiable statements, and ghosts. We had to clean things up. Because it is a shameful affair. The manipulators and especially the manipulated cannot be proud of it. In THE NEW YORK TIMES on 21 April 1991, an honest man whose integrity is beyond dispute and who--for good reason--had access to the CIA published a fantastic article titled "A High-Tech Watergate." That man knows what he is talking about. He is Elliot Richardson, a former attorney general under Richard Nixon, and at the time he refused to cover up the Watergate scandal and resigned in a blaze of publicity. Today Richardson is the attorney for the victim in that crazy story: Bill Hamilton, owner of the Inslaw computer company.
[LE VIF/L'EXPRESS] In his case, everything started with an ordinary industrial property lawsuit.
[Answer] Exactly. Hamilton is a former agent of the National Security Agency (NSA). The NSA, based at Fort Meade, Maryland, is the electronic wiretapping center of the planet. Trained as an engineer, Hamilton worked for the NSA in Vietnam. He left the NSA and started his company in the early 1970's. That was before the era of minicomputers. Microcomputers had not yet appeared. To combat crime, the Justice Department--like the CIA and the FBI--was dreaming of a software package that would make incompatible things compatible. Every prosecutor's office had its own data, files, and day-to-day operations. In plain language, was it possible to devise software that would interconnect all the prosecutors' offices and all their files and data? The department then issued a call for tenders and launched a program to finance the project. So, using public money, Bill Hamilton developed software known as Promis. There were fantastic breakthroughs in computers in the late 1970's and early 1980's, as computers went from eight to 16 bits--bits being a reflection of the power of the machines: their speed of execution.
[LE VIF/L'EXPRESS] That did not prevent Carter from halting the program.
[Answer] True. When Reagan arrived at the White House in 1980, the program had been halted. But using private funds--and that is another ambiguous aspect of the affair--Hamilton developed a 32-bit version using a Vax VMS computer. His improved software, Promis, then became a miraculous object. From one state to another and from one country to another, it could read utility bills, check up on financial flows in and out of bank accounts, and track people as they entered and left territories. It could do everything! It could learn everything about anyone! Hamilton got the contract to equip U.S. prosecutors' offices. Price: $3 billion!
[LE VIF/L'EXPRESS] And then his troubles began.
[Answer] The Justice Department did everything possible to kill his company, Inslaw. To bring it to its knees. It quibbled, it split hairs, and payments were delayed. It demanded that he hand over the manufacturing secrets regarding Promis in its new Vax VMS version. To get his money, he yielded in 1982 and gave the Justice Department a copy of the 32-bit version. He still did not get paid. He was accused of financing the "miracle" with public money. It did him no good to deny it: He was pushed to bankruptcy. They sent the IRS after him, and he was dragged into bankruptcy court. He did not understand what was happening.
[LE VIF/L'EXPRESS] Unknown to him, Promis would be sold all over the planet. And the affair took on its dual dimension: wheeling and dealing on one hand, and espionage on the other.
[Answer] We should note, first of all, that at the center of the department's decisionmaking apparatus was Lowell Jensen, Hamilton's competitor. Then a key figure appeared: Dr. Earl Brian. A former CIA man in Vietnam, he was very close to Reagan, whom he had served as secretary of health in California--and incidentally, he took all the department's files with him when he left. As financial backer of the Republican Party and owner of the UPI agency, Brian picked up a good many government contracts-- the infrared systems along the Mexican border, for example-- thanks to his direct line to the new president. Brian also owned a computer company called Hadron. And he controlled a genius in the field, Michael Riconosciuto, a contract employee of the CIA who had a weakness for drugs. That expert could--and did--adapt the Promis software to suit the needs of potential customers. The Canadian police were the first to place an order.
[LE VIF/L'EXPRESS] But who in the department was behind that piracy--that swindle?
[Answer] It is noted that Ed Meese, adviser to the White House and an expert on Promis, the merits of which he had praised publicly as early as 1981, was named attorney general. And Ed Meese's wife owned stock in Earl Brian's holding company, which controlled the Hadron firm. But the affair also concerned --primarily--the White House Secret Service.
[LE VIF/L'EXPRESS] And the Israeli intelligence service entered the fray. Who gave them Promis and why?
[Answer] Why? All one can do is guess. Israel was a privileged partner of the United States and of the Reagan administration. From the moment that the--booby-trapped--software began to be sold all over the world, it was clear that the Israelis would have an easier time selling it to the "enemies" of the United States and that the Americans would be able to sell it more easily to Israel's "enemies." That was why they were offered Promis. To whom in particular? To a legend in the world of intelligence, Rafi Eitan. It was he who had trapped Adolf Eichmann in Buenos Aires on 11 May 1960. A loner. In 1982, Minister of Defense Ariel Sharon put him in charge of the most secret of Israeli intelligence services: Lakam (one of Lakam's achievements was its stealing of the plans for the Mirage F1). Rafi Eitan brought in a military intelligence ace who had participated in the Entebbe raid and was an expert on terrorism for Shamir: Ari Ben-Menashe. Rafi and Ari knew each other well. They had worked together during the U.S. hostage crisis in Tehran. And with whom? With the good Dr. Brian and his henchman, Michael Riconosciuto--the man who had repaired the computer systems sabotaged by the shah's men just before they left. So those four were all back in the same family again. They were the source of what was called the October Surprise--that is, the failure to free the U.S. hostages held in Iran in October 1980 even though everything appeared to have been arranged. With millions of dollars and arms deliveries to back them up, they negotiated with Tehran to delay the release until after Carter's departure so that Reagan would get credit for it in January 1981.
[LE VIF/L'EXPRESS] What role did Promis play in the Near East?
[Answer] To begin with, when the Intifada took off, Israel used it to open files on the Palestinians living the occupied territories. Next, one of Brian's teams sold it to Jordan. But that software was booby-trapped. Everything that Jordanian security had stored and did store regarding the Palestinians ended up in the hands of the Americans and the Israelis.
[LE VIF/L'EXPRESS] And how was the product booby-trapped?
[Answer] Originally, it was a very makeshift job. A matter of tinkering. The only thing necessary was to add a line of code--buried in the ocean of lines in the software--to order the machine to spit out the information to a telephone number in Jordan: that of an apartment managed by Israeli intelligence. Which downloaded the data from the computer. At first it was a businessman--on his way to Vienna--who carried Jordanian intelligence's listing in his attache case. Things later became more sophisticated. A "smart chip"--the spy chip, the "emergency exit"--was slipped into an ocean of completely identical microchips. Apparently the information becomes part of the electric current, and from there a satellite picks up the information and transmits it down to the NSA. What it meant was that unless the computer were completely disassembled, it was impossible to detect that damned chip.
[LE VIF/L'EXPRESS] Who were the next customers?
[Answer] There was Chile by way of the Israelis. Dina [National Intelligence Directorate], the fearsome Chilean police, even entrusted part of the management of Promis to a German sect called Colonia Dignidad--made up of real Nazis. In the case of Guatemala and South Africa, Israel went through a third party: the man who laundered the money from their arms sales--the late Robert Maxwell, the fiendish press lord. It must be said that by checking utility consumption, Promis makes it possible to know whether a place is inhabited or not--whether it is a potential hideout. In itself, the software is neutral. But it is a tool that makes repression more effective. And makes it easier. The civil war in Guatemala resulted in 20,000 dead. Anyone whose name was on file in Promis had a very good chance of winding up in a grave. The same was true in South Africa. Intelligence gathered regarding the ANC [African National Congress] was given to Buthelezi's men, the Zulus in Inkatha--after which it was fire at will!
[LE VIF/L'EXPRESS] Ari Ben-Menashe claims that Robert Maxwell --whose handling agent he was--sold Promis to the Soviets.
[Answer] There are 20 pages on that subject in the FBI's files. Twenty pages with everything blacked out except the words "Maxwell," "Promis," and "Russians." In fact, the booby-trapped software was sold to the GRU, the Soviet military intelligence service. Meanwhile, the Israelis discovered that the Americans were selling arms to Saddam Husayn. Speaking through Ben-Menashe, Shamir warned the CIA: Either you stop, or we will denounce you to the Russians. The sales continued. And as if by chance, the GRU's computers were mysteriously out of order for a week. It is likely that the Soviets dismantled and dissected their machines.
[LE VIF/L'EXPRESS] Did the sales continue?
[Answer] Under the name of Promis or some other name, it was sold to Egypt and Cyprus and throughout the Middle East. In Australia. In Southeast Asia. To the World Bank. To two French banks: the Credit Lyonnais and the BNP. To the Swiss banks, including the UBS. Why spy on the banking system? Two reasons. First, to protect the dollar and keep an eye on competing currencies. The second reason dates back to 1981 and the fight against the laundering of drug money. That was the "Follow the Money" operation launched by Reagan. In a different situation, this time in France, one of our sources told us that the DGSE (the intelligence service) had acquired Promis. Whatever the case, the DST (the counterespionage agency) got its hands on the famous microchip that downloads data from computers. In addition, obviously, the software found room for all its applications within the U.S. institutions themselves: from the CIA to the FBI and from the Air Force to the Navy--the nuclear-powered submarines and stealth bombers are equipped with them. Not to mention the laboratories where nuclear tests are simulated.
[LE VIF/L'EXPRESS] To everyone's surprise, the Clintons are part of the story!
[Answer] Jackson Stevens--Arkansas billionaire, financial backer of the Democratic Party, and a friend and partner of the Clintons in the Whitewater real estate scandal--sells (surprise) Promis software! In short, he took up the torch from Californian Earl Brian. Vince Foster, the White House attorney who was linked with Stevens and even more so with the Clintons, committed suicide on 20 July 1993. A few days earlier, he had requested two files: one on the NSA and the other on Promis. His secretary confirms this--it was she who opened them and put them in the safe. They were never seen again. The safe had been cleaned out.
[LE VIF/L'EXPRESS] And all of that at Hamilton's expense! What is the situation with him now?
[Answer] At the first trial, the government was convicted of having forced the Inslaw firm into bankruptcy by unfair practices. The judge who handed down that ruling was not reappointed. That is something rarely seen. He was replaced by the lawyer who was defending the government's interests! That is something never seen. The second trial upheld the unfair practices ruling. At the third trial, the first two trials were not called into question, but it was ruled that a court specializing in bankruptcies was not qualified to judge the merits of the case--that is, piracy. It kicked the case up to the Supreme Court. Which declared itself to be lacking jurisdiction and passed the ball back in the direction of Congress. Which passed a special law expanding the jurisdiction of commercial courts. A new trial was held, and the verdict is expected within the next few weeks. Hamilton is expecting millions of dollars. And he may wait for them for a long, very long time. The "espionage" angle is not part of the trial. It is the intelligence services which use Promis, and it is the White House Secret Service which played a role in spreading Promis all over the planet. But the only issue in the trial will be industrial property. None of the rest exists. It will be impossible go any further. By itself, the investigation by Congress--the Brooks Commission--is damning for the U.S. Government. In a roundabout way--and backed by implacable testimony---it hints that theft and an intelligence operation are involved. But it does not say so in black and white in its conclusions. We met with the former cop from Los Angeles who headed that commission. He gave us his impression: "We could have pulled out all the stops. We were not given the means to do so. No one really wanted to see us go all the way with that investigation."
[LE VIF/L'EXPRESS] In that affair, Hamilton is the grain of sand that brought the machinery to a halt. Why didn't the government buy Promis at the start? And did the U.S. press say nothing about the affair?
[Answer] Beyond the controversy over public funds as opposed to private funds, the Justice Department would have been wiser to let him have a few million dollars. Hamilton would have kept quiet. He would not have tried to find out. And that says a lot about the arrogance of the government in general. They told themselves: Why pay him when we can crush him? They also did not foresee that Elliot Richardson, the former attorney general who was honesty itself, would get involved. As for the press, Hamilton went to see Bob Woodward, the Watergate star and star of the Washington Post, who eventually told him: "This involves state security. Kathy Graham, the owner, will never let me publish such a story." Seymour Hersh, the Pulitzer Prize winner who revealed the atrocities at My Lai, Vietnam and who has been responsible for exceptional investigations, did investigate. For the first time in his life, he was thrown out by every publisher.
LE VIF/L'EXPRESS, May 9, 97, pp 74-82
India vs. Pakistan
Indian Generals Ready to Escalate Kashmir Conflict
THE deadly brinksmanship between India and Pakistan escalated sharply yesterday with India putting four divisions of strike forces - as well as its navy - on high alert, in preparation for a possible attack across the international border, south of Kashmir.
India said the alert had been sounded in response to reports of substantial Pakistani troop movements along the frontier. With 40,000 Indian soldiers already in Kashmir, the build-up of troops on both sides of the border represents the largest mobilisation of forces since military manoeuvres in 1987 almost brought the two countries to war.
India also appears increasingly prepared to strike across the Line of Control dividing Kashmir, using warplanes, ground and helicopter borne troops to cut off supplies to Pakistani intruders still occupying positions within India. Either move - whether an attack by India or Pakistan across the Punjab or Rajasthan-Sindh borders, or a strategic operation across the LOC - would be an act of war.
India's Strike Corps, comprising about 10,000 mechanised troops, armoured formations and infantry divisions, as well as additional troops, have not yet moved from their bases in Haryana, Punjab and Uttar Pradesh states. But the Indian army said that they "have been warned to make preparations". Its navy has also been put on high alert.
Military analysts now believe that in the absence of a political resolution to the Kashmir crisis, which seems unlikely, the Indian army has two options: either to fight a lengthy war of attrition in the Himalayas - with both the winter and a general election looming in three months' time - or to seek permission for an offensive against Pakistan.
So far, India's military has been restrained by its politicians, who still hope international pressure will make Pakistan remove its forces from Indian territory. Last week, President Clinton told Pakistan - which still maintains the intruders are Indian Kashmiri militants - to remove its forces. India is hoping for a similarly strong response from the G8 nations meeting this weekend.
But there are increasing calls from the Indian military, hampered by its inability to cross the LOC, to mount a strike on the Pakistan side of the Kashmir border. An Internet poll of 4,400 Indians published last week showed 81 per cent in favour of an attack across the LOC.
"The restraints we've put on ourselves are out of strength, not weakness," said a senior army officer. "But as of today," he added, emphasising the last word, "we are not crossing the LOC." Last week, after bloody fighting, Indian soldiers finally captured their first key Pakistani-held positions: Tololing, a 15,000ft mountain and the strategic highway between Srinagar and Leh; and another mountain-top further north near the town of Batalik.
Fierce fighting is now raging on the cliffs of Tiger Hills, a 17,000ft peak, beyond Tololing, where about 250 intruders are believed to be dug in, and on another 17,000ft peak north of Batalik. The army says it has pushed the intruders within two miles of the de facto border and the air force, which is flying in a perilously narrow corridor between the mountains and the LOC, also said that it had destroyed the intruders' largest administration and supply camp near Batalik last week.
But while the assaults have provided stirring accounts of individual bravery, they have also produced an endless procession of flag-covered coffins. The official figure of about 150 dead and 500 wounded Indian soldiers is believed to be far lower than the real number; and the army has said it expects that 2,000 soldiers will die if the conflict continues until September. It is particularly concerned about the number of officers it is losing and is already short of about 14,000 commissioned and non-commissioned men.
None the less, the response of the Indian public - to the death toll and the war - has been overwhelmingly patriotic. Bereaved mothers have vowed to send more children to fight; young widows have responded with tearful pride; ordinary Indians have been donating blood as well as money; and the government of one state has promised to rename a village after each dead soldier. However, while India can sustain a war more easily than Pakistan - which despite being on the verge of bankruptcy raised its defence budget 11 per cent last week - it is costing the country an estimated £3 million a day, an enormous amount for a poor nation.
Moreover, the Indian army believes that the intrusion in Kargil, which appears to consist of Pakistani regular soldiers in mufti, supported by Afghan mercenaries and Islamic militants, is part of a larger, longer-term strategy by Pakistan to seize large parts of Indian Kashmir; and that the heights, once recaptured, will require an enormous outlay of men and armaments.
"The quickest way to finish this off would be to mount an attack elsewhere - and we can do it," said a senior army officer. "We didn't have to confine ourselves to this area or to these lines."
The London Telegraph, June 20, 1999
|A series explaining the use of the monetary system for government surveillance, and why the growth of the information superspyway will increasingly lead to a system of anonymous digital cash. "The End of Ordinary Money, Part 1" appeared in Liberty (July 1995) with the title "The End of Ordinary Money." Part 2 was published in Liberty (November 1995) under the title "The Money Laundromat."|
|The End of Ordinary Money, Part 1||Read this if you want to know what this web page is about.|
|The End of Ordinary Money, Part 2||And this one also.|
|How to Launder Money||Learning the basic skills.|
|How to Launder Money in the Futures Market||How to give Hillary a bribe via cattle futures.|
|Another Whack Against GAK||The government's grip on cryptology slips.|
|Plot to Spy on Banks Outlined in White House Email||Memo from 1986 details NSC/DOJ plot to spy on banks.|
|Changing the Currency||Is it counterfeit, or is it just foreign?|
|History of the Euro||The single European currency.|
|Clipper Chip Banking||Sandia National Laboratories create non-anonymous "anonymity."|
|Money Laundering Through Casinos||The Nevada advantage.|
|Money Laundering Through CHIPS and SWIFT||Wholesale cleansing.|
|Money Laundering: The BCCI Affair: Senate Report||The Bank of Criminals and Covert-Agents International knew a thing or two about laundering.|
|Two articles explaining how to do your own financial investigations of politicians, government officials, judges, and law enforcement people. The first part, a motivational piece, is my introduction to a Jim Norman article explaining the efforts of a group of Fifth Column hackers who do just that. I don't agree with everything in Norman's article, but it's a good intro to the second article, which explains the basics of detecting unexplained sources of wealth (which often as not may be bribes, kickbacks, or payoffs from the Cali cartel). The second article appeared (without my permission) in Media Bypass (March 1996) under the title "Hackers vs. Politicians."|
|America's Dreyfus Affair: The Case of the Death of Vince Foster||Parts 1-5. Essay by David Martin.|
|Waco Holocaust Electronic Museum||An investigation put together by an inquisitive citizen, Carol Valentine, without benefit of subpoenas and wiretaps. After you visit the Museum, reflect on the shabby "investigation" conducted by the House of Representatives in 1995.|
|The John Doe Times||Info on the Oklahoma City bombing.|
|General Benton K. Partin's Report on the Oklahoma City Bomb||Demolition charges on at least four Murrah Federal Building columns.|
|Softwar||Charles R. Smith follows the money trail of U.S. crypto policy.|
|John Young Architect's Cryptome||Document collection on privacy, cryptology, military technology.|
|Interim Report on the Crash of TWA Flight 800 and the Actions of the NTSB and the FBI||The report of Commander William S. Donaldson, USN Ret. in cooperation with Associated Retired Aviation Professionals.|
|This section includes many articles on the news I wrote beginning in 1996 after my
Vince Foster series ran into too many national security information blackouts for
satisfactory completion. Most of the articles involve one or another of the principal
topics introduced in "The End of Ordinary Money." The unifying theme is individual freedom and privacy in a world of
government malfeasance, government surveillance, and increasing tyranny.
In addition to my own articles, I have collected a lot of hard-to-find material written by others. Within each news section, the articles are mostly listed chronologically.
|The "Angel of Death" is an Internet term applied to Charles S. Hayes because of his role in bringing about the resignation of many a corrupt politician. Hayes is also the head and public representative of the Fifth Column group of hackers who track political payoffs through money-laundering channels.|
|Angel of Death Gives Deposition to DOJ in Inslaw Case||An argument for the resignation of the entire Justice Department.|
|The Dickheads Are Getting Desperate||Federal agents show up in Nancy, Kentucky.|
|Sticky Fingers at the DOJ and U.S. Customs||The government steals and doesn't pay its bills.|
|Earl Brian Convicted in California||The chief marketeer of the PROMIS software is convicted of financial fraud.|
|Angel of Death Arrested||Don't talk about PROMIS. Don't help the Special Prosecutor.|
|Chuck Hayes Versus Bill Clinton||The progress of the war of Clinton's resignation.|
|Chuck Hayes Versus Bill Clinton 2||FBI director Louis Freeh doesn't like Chuck Hayes.|
|Chuck Hayes and Me, Part 1||The House Committee on Banking asks the NSA about PROMIS software and money-laundering.|
|Chuck Hayes and Me, Part 2||Hayes investigates drug-money laundering, while the House Committee
on Banking kisses
|Chuck Hayes and Me, Part 3||Why the Fifth Column is necessary: "I don't want another Danny Casolaro on my hands.|
|The Metaphysics of Political Illusion||U.S. Attorney Joseph Famularo is a kook.|
|Orlin Grabbe Versus Joseph Famularo||My letter to U.S. Attorney Joseph Famularo, demanding reasons for his falsified claims.|
|Orlin Grabbe Versus Joseph Famularo 2||Famularo's chief witness is also a liar.|
|Orlin Grabbe Versus Joseph Famularo 3||Famularo says it's all Martin Hatfield's fault.|
|The FBI Conspiracy Against Chuck Hayes||FBI agent David Keller overrules the Court and the Assistant US Attorney.|
|FBI Agent David "Killer" Keller Rides Again||Keller struggles with the English language.|
|Chuck Hayes and Me, Part 4||Bert Lance Visits Kentucky.|
|Chuck Hayes and Me, Part 5||The deal with Gingrich.|
|Jailed Chuck Hayes Claims FBI Setup, by James Norman||Notes from underground.|
|Famularo's Case Against Chuck Hayes Begins to Crumble||Department of Justice under scrutiny.|
|Hayes Claims He Will Sue FBI Agent||By Sherry Price of Pulaski Week.|
|Three Motions Filed by Chuck Hayes||The Kentucky saga continues.|
|Murder on the World Wide Web||More Gobbledegook from FBI Agent David "Killer" Keller.|
|Federal Justice in London, Kentucky||Indicted jailer, but not Chuck Hayes, free on bond.|
|The Dickheads Are Still Desperate||Why Congress should withdraw all funding from the FBI.|
|Judge Jennifer B. Coffman's Kangaroo Court||Hayes' testimony confirms Fifth Column-induced retirements. Former
drug dealer and former
mental patient testify on behalf of government.
|Chuck Hayes vs. Lawrence W. Myers||By Gail Gibson. Witness' past prompts delay in murder-plot trial|
|Sex with Hillary||What one has to do to get a press conference.|
|Letter to Chairman, House Judiciary Committee||A request to look into the activities of the Justice Department/FBI in Kentucky.|
|How You Can Help Charles Hayes||Three things to do.|
|Police Reports on Lawrence W. Meyers||Background of Lawrence "Myers" of Media Bypass fame. What he did to his friend.|
|Judge Jennifer Coffman's Kangaroo Court Continues||I be de judge.|
|The Make-Believe World of Charles Hayes||Jury decides Charles Hayes never worked for the CIA.|
|Lawrence Meyers Pleads Guilty to Grand Theft||Court record from 1986.|
|Charles Hayes: Motion for a Directed Verdict or Mistrial||The U.S. Attorney hides Lawrence "Myers" background.|
|Letter of Charles Hayes to Montana Senate||Drugs and money laundering in Montana.|
|Government Used False CIA Affidavits, Defense Says||Lawrence Myers dismissed from military for mental condition.|
|Letter of Chip Tatum to Montana Senate||More on FBI drug-smuggling in Montana.|
|Spook Wars in Cyberspace, by Dick Russell||Is the FBI Railroading Charles Hayes?|
|Is Bill Clinton Obstructing Justice in Hayes Case?||Judge has tête-à-tête with President at the Watergate Hotel.|
|Mexican Madness||Pendejo in paradise.|
|Chuck Hayes Testimony Regarding His CIA Files|
|Letter re Charles Hayes|
|Hayes on CIA, PROMIS, Fifth Column, Foster, and DOJ|
|Chuck Hayes Prognosticates from Prison, by Rich Azar|
|Charles Hayes: A Prison Interview, by Wesley Phelan||The Future of Politics.|
|Letter to Chuck Hayes|
|Court Testimony Regarding Lawrence Myers||Why is this convicted thief and psychiatric case running free while Chuck Hayes is in jail?|
|James Norman's Letter to Warden of Manchester Prison|
|New Address for Chuck Hayes|
On July 25, 1997, despite a pre-sentencing report that recommended that Charles Hayes be sentenced to time served (i.e. immediately released), Judge Jennifer B. Coffman sentenced Charles Hayes to the federal maximum of 10 years in prison.
|A series exploring the murder of Vince Foster, who--among other duties-- was an
overseer of an NSA project to spy on banking transactions. The series begins with a memo
by Jim Norman, Senior Editor at Forbes, to Mike McCurry of the White House Press Office
inquiring about the espionage activities of Vince Foster. Then (reflecting my own on-going
investigation) it gradually branches out into relevant background issues necessary to
understand pieces of the story. Finally, it converges back to Foster's final days.
Most of the people who have an opinion on this issue have never done any investigation themselves, and the few who have long ago buried their heads in the flora of Ft. Marcy Park and never looked at the larger picture.
Foster was under counter-intelligence investigation when he died. Nearly every investigator misses this part of the picture. Did these activities lead to his death? Or did others take advantage of the circumstances to rid themselves of someone who might talk? Neither question can be answered until the actual killer(s) is (are) identified.
|Part 1||Jim Norman sends a memo to the White House, which leaks it to a Starr assistant.|
|Part 2||Charles O. Morgan threatens to sue anyone who says Systematics has a relationship with the NSA.|
|Part 3||Vince Foster oversaw covert money laundering at Systematics.|
|Part 4||Hillary Clinton and Web Hubbell represented Systematics during the BCCI takeover of First American.|
|Part 5||Philosophical musings on the meaning of this investigation.|
|Part 6||The curious tenacles (and strange denials) of Systematics.|
|Part 7||Virtual realities in the media and banking. Israel as a virtual nuclear power.|
|Part 8||Caspar Weinberger's Swiss account. Israel's nuclear spying.|
|Part 9||Cover-up by House Banking Committee investigators.|
|Part 10||BCCI, money laundering, and the nuclear weapons programs of Pakistan and Israel.|
|Part 11||Money laundering and the intelligence community.|
|Part 12||The Cabazon Indian reservation, PROMIS, BCCI, and the death of Danny Casolaro.|
|Part 13||NSA's PROMIS virus, Mellon money laundering, and Vince Foster's blue NSA notebook.|
|Part 14||Letter of advice to the Pittsburgh-based nuclear network.|
|Part 15||What role is really being played by Richard Mellon Scaife?|
|Part 16||The NSA worm. Federal Reserve money laundering.|
|Part 17||Sheila Foster Anthony effects a $286,000 wire transfer to her sister-in-law Lisa Foster four days before Vince Foster's death.|
|Part 18||Gaping holes in the investigation of the death of Vince Foster.|
|Part 19||The modern triangular trade, the parallels between Arkansas and Pittsburgh, and why Jim Norman is in trouble.|
|Part 20||Genealogy--mine and the Mellons.|
|Part 21||The Meadors hearing and the problems of Mellon bank.|
|Part 22||James Hamilton doesn't get a chance to deny the $286,000 wire transfer by Sheila Anthony.|
|Part 23||Bush spies on Perot. The blonde hairs found on Foster's body.|
|Part 24||The Foster hit appears unprofessional, and to have taken the White House by surprise.|
|Part 25||The global money laundering operation.|
|Part 26||Abner Mikva resigns. Did Foster have knowledge of too many felonies?|
|Part 27||Earl Brian, who sold the PROMIS software around the world, is under indictment in California.|
|Part 28||SIOP: the Single Integrated Operational Plan for Nuclear War.|
|Part 29||How Jackson Stephens brought the Global Laundry to America.|
|Part 30||The National Programs Office and the drugs- for-arms operation at Mena and other secured facilities.|
|Part 31||Death and the empire of Jackson Stephens.|
|Part 32||Questions concerning the death of Vince Foster.|
|Part 33||How to launder money. Clinton's CIA connection. The Mossad panics.|
|Part 34||Mossad agents forced to leave the country after putting out a contract on a Foster investigator.|
|Part 35||The Mossad team in Vince Foster's apartment, and Foster's final movements.|
|Part 36||Mike Wallace accepts a $150,000 bribe from the DNC to debunk the notion Vince Foster was murdered.|
|Part 37||The House Committee on Banking asks the NSA about PROMIS software and money-laundering in Arkansas.|
|Part 38||Chuck Hayes investigates drug-money laundering, while the House Committee on Banking kisses NSA butt.|
|Part 39||Why the Fifth Column is necessary: "I don't want another Danny Casolaro on my hands."|
|Part 40||Bert Lance visits Kentucky.|
|Part 41||The deal with Gingrich.|
|America's Dreyfus Affair: The Case of the Death of Vince Foster||Parts 1-5. Essay by David Martin.|
|Vince Foster and the NSA||Charles R. Smith on Vince Foster and the Clipper Chip.|
|Parallels Between the Deaths of Tommy Burkett and Vince Foster||Hugh Turley shows there is consistency in the technology of assisted "suicide".|
|Ft. Marcy Park Witness Patrick Knowlton Lawsuit||Second Amended Complaint, October 1998|
|Clinton Meets Columbo||Oval office showdown.|
|The Starr Report with the Knowlton Appendix||Microsoft Word document. Includes exhibits.|
|Vince Foster FBI Files Online|
|My Resume||I do consulting. Unlike the free information on this web page, it comes at a high price.|
|In Praise of Chaos||Speech given to the Eris Society in August 1993. Since reprinted in Liberty (March 1994) and the SIRS
electronic data base (1995).
|Eloge du Chaos||French translation of "In Praise of Chaos"|
|Cuba de mi Amor||Music to your ears.|
|Keys||Published in Laissez Faire City Times, Vol 2, No 34, Oct 19, 1998.|
|Agrarian Life||Published in Laissez Faire City Times, Vol 2, No 35, Oct 26, 1998.|
|A Hundred Eighty Dollars||Published in Laissez Faire City Times, Vol 2, No 36, Nov. 2, 1998.|
|Karma Accountant||Problems in spiritual reckoning. Published in Liberty (August 1993).|
|Cover Girl||Published in Laissez Faire City Times (November 1997).|
|The Hat||How to Survive in the East Village. Appeared in Art Times (November 1992).|
|Connections||The relationship between sex and quantum mechanics. Generated some
fan mail from physicists. First appeared
in Beet #6 (Spring 1992).
|Feed the Children||Saving the world and saving oneself. Published in Liberty (May 1995).|