Archive for the 'Uncategorized' Category

TBR News July 25, 2016

Jul 25 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 25, 2016:” This is rapidly becoming a decade of official deceit and public disillusion.

The issue under discussion here is MERS (Mortgage Electronic Registration System).

MERS, set up by the government  in 1995, now claims to be a privately-held company and their official function is stated to be ‘keeping track of a confidential electronic registry of mortgages and the modifications to servicing rights and ownership of the loans.’  MERS is actually a U.S. government initiated organization like Fannie Mae and Freddy Mac and its current shareholders include AIG, Fannie Mae, Freddie Mac, WaMu, CitiMortgage, Countrywide, GMAC, Guaranty Bank, and Merrill Lynch. All of these entities have been intimately, and disastrously, involved with the so-called “housing bubble,” and were subsequently quickly bailed out by the supportive Bush administration

In addition to its publicly stated purpose of simplifying mortgage registration MERS was also set up to assist in the creation of so-called  Collateralized debt obligations (CDOs) and Structured investment Vehicles (SIV). The CDOs is a type of structured asset-backed security (ABS) whose value and payments are derived from a portfolio of fixed-income underlying assets. CDOs securities are split into different risk classes, or tranches, which permits these entities to be minced into tiny tranches and sold off by the big investment banks to pensions, foreign investors and retail investors. who in turn have discounted and resold them over and over.

It is well-known inside the American banking institutions that these highly questionable, potentially unsafe investment packages were deliberately marketed to countries, such as China and Saudi Arabia, that are not in favor with elements of the American government and banking industry and were, and are, marketed with full knowledge of their fragility.

The basic problem with this MERS system that while it does organize the mortgage market, it also knowingly permits fiscal sausage-making whereby a huge number of American domestic and business mortgages, (59 million by conservative estimate) are sliced up, put into the aforesaid “investment packages” and sold to customers both domestic and foreign.

This results in the frightening fact that the holders of mortgages, so chopped and packed, are not possible to identify by MERS or anyone else, at any time and by any agency. This means that any property holder, be they a domestic home owner or a business owner, is paying their monthly fees for property they can never own. Because of the diversity of the packaging, it is totally and completely impossible to ascertain what person or organization owns a specific mortgage and as a result, a clear title to MERS-controlled property is impossible to get at any time, even if a mortgage is fully paid. No person or entity, has been, or never can be, identified who can come forward and legally release the lien on the property once the loan is paid.

In short, MERS conceals this fact from the public with the not-unreasonable assumption that by the time the owner of the home or business discovers that they have only been paying rent on property they can never get clear title to, all the primary parties;  the banks, the government agencies, the mortgage companies, or the title companies, will be dead and gone. MERS is set up to guarantee this fact but, gradually, little by little, mostly by word of mouth, the public is beginning to realize that their American dream of owning a house is nothing but a sham and a delusion.

The solution to this is quite simple. If a home or business American mortgage payer , goes to the property offices in their county and looks at their registered property, they can clearly see if MERS is the purported holder of the mortgage. This is fraudulent – MERS has never advanced any funds in the transaction and owns nothing. It is merely a registry. If MERS is the listed holder, the mortgage payers will never, ever, get clear title to their property.

In this case, the property occupier has two choices: They can either turn the matter over to a real estate attorney or simply continue pouring good money after bad. And is there relief? Indeed there is. In case after case (95% by record) if the matter is brought to the attention of a court of law, Federal or state, the courts rule that if the actual owner of the mortgage cannot be located after a reasonable period of time, the owner receives a clear title from the court and does not need to make any further payments to an unidentified creditor! It will stop any MERS based foreclosure mid process and further, any person who was fraudulently foreclosed by MERS, which never held their mortgage, and forced from their home can sue MERS and, through the courts, regain their lost homes.” Continue Reading »

No responses yet

TBR News July 24, 2016

Jul 24 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 24, 2016:”The left wing and liberal section of the world’s media has been loud in praise of the Clinton woman and even louder in snide remarks about Mr. Trump. The general public, obviously, is not listening and Trump has an excellent chance at the Oval Office. The liberal wing does not like to talk about the flood of illegals in this country or the looming and terrible mortgage problem that the government orders them to be silent about. The mortgage swindle and the rising unemployment problems in the United States, plus the weakening American positions in world affairs are never addressed in the media. They are indeed discussed in public but only on an Internet that Obama and Sunstein have desperately wanted to control (but can’t). And then there is what is often called the ‘Deep Internet’ which governmental snoopers cannot access and this entity allows all manner of secure communications to flow back and forth. Why, one asks, are the government agencies so frantic to spy on the general public? They do not want a reprise of the Vietnam protests that came very close to open rebellion.”

Thoughts of the Forbidden Man

Only through his capacity for adaptability does the force of the written word approach that of oral speech. The orator may deal with the samesubject as a book deals with; but if he has the genius of a great and popular orator he will scarcely ever repeat the same argument or the same material in the same form on two consecutive occasions. He will always follow the lead of the great mass in such a way that from the living emotion of his hearers the apt word which he needs will be suggested to him and in its turn this will go straight to the hearts of his hearers. Should he make even a slight mistake he has the living correction before him. As I have already said, he can read the play of expression on the faces of his hearers, first to see if they understand what he says, secondly to see if they take in the whole of his argument, and, thirdly, in how far they are convinced of the justice of what has been placed before them. Should he observe, first, that his hearers do not understand him he will make his explanation so elementary and clear that they will be able to grasp it, even to the last individual.

Secondly, if he feels that they are not capable of following him he will make one idea follow another carefully and slowly until the most slow-witted hearer no longer lags behind. Thirdly, as soon as he has the feeling that they do not seem convinced that he is right in the way he has put things to them he will repeat his argument over and over again, always giving fresh illustrations, and he himself will state their unspoken objection. He will repeat these objections, dissecting them and refuting them, until the last group of the opposition show him by their behaviour and play of expression that they have capitulated before his exposition of the case.

Not infrequently it is a case of overcoming ingrained prejudices which are mostly unconscious and are supported by sentiment rather than reason. It is a thousand times more difficult to overcome this barrier of instinctive aversion, emotional hatred and preventive dissent than to correct opinions which are founded on defective or erroneous knowledge. False ideas and ignorance may be set aside by means of instruction, butemotional resistance never can. Nothing but an appeal to these hiddenforces will be effective here. And that appeal can be made by scarcely any writer. Only the orator can hope to make it. Continue Reading »

No responses yet

TBR News July 23, 2016

Jul 23 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 23, 2016:” The French are very quietly establishing military defense treaties with the Russian Federation, and in order to deal with the problems of high energy costs, the E.E.C. is trying to work with the Russians to establish an oil industry [in the Arctic] that will enable Europe to free itself from the need for Middle Eastern oil. Reserves of oil believed to be located both in the Russian Arctic, the Crimea  and north of the Caspian may turn out to be larger than the reserves in the Middle East and if the Europeans can get the upper hand over the United States in helping develop these reserves, the geopolitical balance may rapidly shift from U.S. domination to the Eurobloc domination.”

Thoughts of the Forbidden Man

Man completed his first discovery by making a second. Among other things he learned how to master other living beings and make them serve him in his struggle for existence. And thus began the real inventive activity of mankind, as it is now visible before our eyes. Those material inventions, beginning with the use of stones as weapons, which led to the domestication of animals, the production of fire by artificial means, down to the marvellous inventions of our own days, show clearly that an individual was the originator in each case. The nearer we come to our own time and the more important and revolutionary the inventions become, the more clearly do we recognize the truth of that statement.

All the material inventions which we see around us have been produced by the creative powers and capabilities of individuals. And all these inventions help man to raise himself higher and higher above the animal world and to separate himself from that world in an absolutely definite way. Hence they serve to elevate the human species and continually to promote its progress. And what the most primitive artifice once did for man in his struggle for existence, as he went hunting through the primeval forest, that same sort of assistance is rendered him to-day in the form of marvellous scientific inventions which help him in the present day struggle for life and to forge weapons for future struggles.

In their final consequences all human thought and invention help man in his life-struggle on this planet, even though the so-called practical utility of an invention, a discovery or a profound scientific theory, may not be evident at first sight. Everything contributes to raise man higher and higher above the level of all the other creatures that surround him, thereby strengthening and consolidating his position; so that he develops more and more in every direction as the ruling being on this earth.

Hence all inventions are the result of the creative faculty of the individual. And all such individuals, whether they have willed it or not, are the benefactors of mankind, both great and small. Through their work millions and indeed billions of human beings have been provided with means and resources which facilitate their struggle for existence. Continue Reading »

No responses yet

TBR News July 22, 2016

Jul 21 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 22, 2016:” When an empire slips into decline, it does so in clearly idenfiable stages. This is the case with the American empire at the present time. Franklin Roosevelt pushed the US into what became the Second World War for personal reasons. (The Roosevelt family were Jewish on both sides and Hitler’s anti-Jewish policies enraged the president) and the result of this was that at its conclusion there were two dominent nations left in the rubble. These were the United States and Russia and the struggle then began to see which would dominate. Initially, the United States was successful, and through duplicity and threats, reduced Russia to a squabbling and disintegrating state. But those in power in the United States also saw that Russia had enormous natural resosurces and so a frantic effort was made to not only subjugage Russia but also get physical control of her oil, gas and other assets. America was initally a democracy, then a republic and finally, an oligarchy. The men who controlled the policies of this country are a handful of very rich and powerful people; bankers and the oil industry predominent. And to secure America’s world leadership designs, small wars were fought to gain control of natural resources and establish American business interests and the American dollar as the world standards. The British Empire had achieved this goal at one point but lost everything through arrogance and carelessness and now the American empire finds itself in the same position as Britain did in 1914. Like the British, America has fought a series of wars against small and relatively defenseless countries to gain control of their resources. As an example of this, America attacked Iraq, not because we disliked Saddam Hussein (whom we captured and subsequently executed) but to gain control of the enormous but untapped Iraqi oil reserves. Iraq slipped through American control because of religious infighting and with that defeat, the next goal was Russia and her Arctic and Black Sea oil reserves.”

Thoughts of the Forbidden Man

When men have lost their natural instincts and ignore the obligationsimposed on them by Nature, then there is no hope that Nature will correct the loss that has been caused, until recognition of the lost instincts has been restored. Then the task of bringing back what has been lost will have to be accomplished. But there is serious danger that those who have become blind once in this respect will continue more and more to break down racial barriers and finally lose the last remnants of what is best in them. What then remains is nothing but a uniform mish-mash, which seems to be the dream of our fine Utopians. But that mish-mash would soon banish all ideals from the world. Certainly a great herd could thus be formed. One can breed a herd of animals; but from a mixture of this kind men such as have created and founded civilizations would not be produced. The mission of humanity might then be considered at an end. Continue Reading »

No responses yet

TBR News July 21, 2016

Jul 21 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 21, 2016: “We have just received a notice from a firm that specializes in digging electronic information out of the woodwork. The firm lists several pages of topics, some of which are unbelievable. They are very expensive but one must assume that their data is correct. We are excerpting some of this list and have included their address for those who have the money to learn the truth as, according to the précis, it has never been available before.

  • Successor to the NSA ‘Harvest” programs that catalog important overseas telephone calls made via communications satellites.
  • In depth information on the DoD’s DISA sytems / VIPER and others
  • USIA/Warrentown files
  • In depth dossiers on members of Congress. These, the list advises us, consists of medical and financial records.
  • A 250 page report on the fake Anthrax scare
  • Firms and individuals in foreign countries known to be friendly sources.
  • Scanned copies of Governor George W. Bush’s personal correspondence and financial records, now hidden in the George H.W.Bush Presidential Library
  • Lists of offshore bank accounts for senior political and military figures
  • The so-called ‘Wilson Blvd.’ technical and scientific records

There are many more fascinating offerings but it should be noted that on the list we were sent, prices are very high indeed but approved credit cards, especially American Express, can be used. We have not availed ourselves of this reported service but as it might prove to be interesting to our many readers, especially those with large amounts of cash, we are including the address for your general information: www.spywarelabs.inc and one must apply for an entrance code.

Good hunting!

Thoughts of the Forbidden Man

The art of leadership, as displayed by really great popular leaders in all ages, consists in consolidating the attention of the people against a single adversary and taking care that nothing will split up that attention into sections. The more the militant energies of the people are directed towards one objective the more will new recruits join the movement, attracted by the magnetism of its unified action, and thus the striking power will be all the more enhanced. The leader of genius must have the ability to make different opponents appear as if they belonged to the one category; for weak and wavering natures among a leader’s following may easily begin to be dubious about the justice of their own cause if they have to face different enemies.

As soon as the vacillating masses find themselves facing an opposition that is made up of different groups of enemies their sense of objectivity will be aroused and they will ask how is it that all the others can be in the wrong and they themselves, and their movement, alone in the right?

Such a feeling would be the first step towards a paralysis of their fighting vigour. Where there are various enemies who are split up into divergent groups it will be necessary to block them all together as forming one solid front, so that the mass of followers in a popular movement may see only one common enemy against whom they have to fight. Such uniformity intensifies their belief in the justice of their own cause and strengthens their feeling of hostility towards the opponent. Continue Reading »

No responses yet

TBR News July 20, 2016

Jul 20 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 20, 2016: “ Question from a reader: ‘Any chance the robotics could be used to improve the standard of living, make things cheaper and reduce the need to work and so on? Seems like if the productivity gains could benefit everyone it could be a good thing in the long run. They often talk about post-scarcity economics. Think that’s feasible?’

My answer: ‘In a sense, we have that now. Individuals with computer and allied skills can easily obtain good paying employment while students with degrees in business administration, history, goat breeding and other useless subjects are now scrubbing toilets in MacDonalds. he use of AI and robots will only marginalize everyone else, make more money for the operators and further enlarge the numbers of unemployed.’” Continue Reading »

No responses yet

TBR News July 19, 2016

Jul 19 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 19, 2016:” The fury of the liberal media over the nomination of Donald Trump is highly entertaining to observe. Right wing Evangelical Christians and oligarchy-sponsored delegates to the Republican convention are in a state of hysteria in their attempts to derail Trump’s elevation to the candidacy. The oligarchs and the entrenched bureaucrats are worried that Trump would not be cooperative with their usual swindles against the taxpayers and even foreign entitles like the PRC do not want him in the Oval Office because he has said he would force American business entities to return to this country from countries with minimal labor costs and provide employment for Americans. Continue Reading »

No responses yet

TBR News July 18, 2016

Jul 18 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 18, 2016:” For the past ten years, there have been growing fears that somehow, outsiders have been able to penetrate into the confidential computer files of government agencies, business entities such as banks and defense contractors and individuals.

Some of this appeared to be an attempt to obtain highly classified information that could be of use to others and in other instances, attempts to get into the personal, and corporate, bank accounts of individuals and corporations.

This is a brief study of some of the salient aspects of this problem of computer theft and espionage and we will start with the discovery of massive computer penetration in Israel. We will then consider further penetrations of American business and intelligence computer systems by agents of a foreign government as opposed to confidence men and then conclude with the use of the same methods to commit frauds on the gullible in the United States and elsewhere.

Some of the first public notice of this problem surfaced first in Israel in 2004 when  Israeli law enforcement cyber crime experts discovered that what is known as a Trojan Horse (illicit spyware planted on an unsuspecting computer) had been inserted into about 60 major Israeli businesses. Isreali law enforcement subsequently indicted various members of three of Israel’s largest private investigative agencies on charges of criminal fraud. These spyware plants were in various commercial areas such as : Israeli military contracting, telephone systems, cable television, finance, automobile and cigarette importing, journalism and high technology. These intrusive spyware plants were nearly identical with ones developed by the American NSA and widely used inside the United States to glean political, economic and counter-intelligence information from a huge number of American businesses and agencies. Israeli investigators believed that there was illicit cooperation between the American agency and a counterpart in Israel.

These Trojan horses that penetrated the Israeli computers came packaged inside a compact disc or were sent as an e-mail message that appeared to be from an institution or a person that the victims thought they knew very well. Once the program was installed, it functioned every time the victim’s computer system was in use, logging keystrokes or collecting sensitive documents and passwords before transmitting the information elsewhere.

This clandestine theft of valuable commercial, military and political secrets is certainly not limited to Israel and many important agencies and individuals have become increasingly concerned about what is called “phishing” in which both con men and foreign (and domestic) intelligence agencies can locate, capture and use valuable personal, political and financial information. In September of 2005, the Anti-Phishing Working Group, an ad hoc group  of corporate and law enforcement groups that track identity theft and other online crimes, said it had received more than 13,000 unique reports of phishing schemes in that month alone, up from nearly 7,000 in the month of October, 2004..

In late 2005, a new form of phishing, called “spear-phishing” emerged.

So-called spear-phishing is a highly concentrated and far more effectove version of phishing. That’s because those behind the schemes bait their hooks for specific victims instead of casting a broad, ill-defined net across cyberspace hoping to catch throngs of unknown victims.

Spear-phishing, say security specialists, is much harder to detect than phishing. Bogus e-mail messages and Web sites not only look like near perfect replicas of communiqués from e-commerce companies like eBay or its PayPal service, banks or even a victim’s employer, but are also targeted at people known to have an established relationship with the sender being mimicked. American banks such as Chase and Bank of America are among those whose names are faked and also the online auction house of Ebay and the international money transfer firm of PayPal receive considerable attention from the international conmen and credit thieves. These thieves are not necessarily gangs operating for financial gain but also include theft of trade secrets, private corporate banking and highly sensitive military and political information.

While some of these phishers are merely out to make money, others are interested in securing military secrets and political activities, all at the highest and what is hopefully considered as the most secure.

As a case in point, in June of 2005 , the National Infrastructure Security Coordination Centre, a British government agency that monitors national UK computer security, took the step of publicly warning about a spear-phishing campaign of “targeted Trojan e-mail attacks” aimed at industrial and government computer networks. The warning noted that the e-mail messages appeared to come from a trusted sender, that antivirus software and firewalls was completely incapable of  protecting  recipients, and that, in fact, there was no way to completely protect any computer connected to the Internet from the Trojan attacks once recipients opened and downloaded a faked e-mail message containing a virus.

The report noted that: “Files used by the attackers are often publicly available on the Web or have been sent to distribution lists,” the warning said. “The attackers are able to receive, trojanise and resend a document within 120 minutes of its release, indicating a high level of sophistication.”

Also,a more traditional phishing scam infected about 30,000 individual computers worldwide, according to CipherTrust, a computer security firm. Consisting of what CipherTrust said was about 50 million e-mail messages that a German hacker deployed simultaneously, the communiqués purported to come from the Federal Bureau of Investigation, the Central Intelligence Agency and a German intelligence agency and tried to convince recipients to provide personal information and open a file containing a virus. The F.B.I. issued a warning about the scheme and a spokeswoman said that thousands of people swamped the agency with phone calls inquiring about it. Public awareness and FBI actions sharply reduced and finally obliterated this specific form of fraud but no information has been released to the public by the FBI concerning the identity or motives of many of the hackers. No bank or financial institution ever contacts their depositors and customers by email with warnings about misuse of their credit cards or errors in their personal accounts. The phishers have advanced technologically to the point where actual company logos can be snatched from Web sites to build customized databases of corporate logos. Any email message purporting to come from any bank or financial institution, most especially one that has the proper company logo and format but contains grammatical errors should ever  be responded to.

Some computer security specialists suggest at least one basic approach that might allow e-mail recipients to learn right away that a communiqué appearing to come from a company like Amazon.com actually originated somewhere in the Ukraine, Romania, Bulgaria, Poland, Russia or any of the other places that law enforcement officials say are hot spots for phishing scams.
According to CipherTrust, a spear-phisher can rent a server for about $300 month after paying a $100 setup fee; install spam-sending software on the server for about $1,200 a month; and get spam-sending proxies, a database of e-mail addresses, and other necessary add-ons for another $1,900 a month. How much phishers make depends on how many victims they hook, but the relatively small expense means the work can be lucrative. According to a research report issued in June by Gartner Inc., a consulting firm, about 2.4 million Americans reported losing about $929 million to phishing schemes during the previous year.

In 2016, is has been estimated by the FBI and private cyper-protection agencies that about 82 million American adults who use the Internet believed that they received an average of more than 50 phishing e-mails during the prior 12 months. And that, of course, is just what Internet users actually know might be happening.

Phishers main goal is to obtain a victim’s checking-account number and, in addition, credit card and A.T.M. card numbers, which they can copy onto bogus cards they have manufactured for the purpose of extracting money and goods from a victim’s account.

It should be noted that many American banks have serious security gaps in the software used to analyze magnetic stripe coding on the back of A.T.M. cards, and these gaps have permitted card hijackers to use bogus copies. American regulators, concerned about online vulnerabilities at the country’s banks, have sharply tightened security requirements at financial institutions.

Although Interner Provider (IP) numbers lead to Italy, the Netherlands, the Ukraine, Romania, Bulgaria, Poland, and Russia, a secret investigation by NSA and other American domestic and foreign intelligence agencies has disclosed that almost all of the scams originate inside Israel and that while the Israeli authorities are aware of this, the fact that information considered “vital to the interests of the State of Israel” is part of the intercepts, no action has been taken against operations that are not directed against Israeli agencies or individuals.  Further, one of the caveats to the continued functioning of these enormously profitable computer frauds is that any monies gleaned from them must be deposited in Israeli, and not foreign, banks.

Isreali intelligence, having formed a cooperative association with Israeli internet swindlers, has, according to an NSA report, not hesitated to spy on their American counterparts.

Among the Israeli corporations on the receiving end of stolen information were two telecommunications affiliates of Bezeq, the country’s largest telephone company. The Israeli government held a controlling interest in Bezeq until it sold most of its stake to private investors, including Los Angeles media mogul Haim Saban, shortly before the Trojan horse scandal became public. A lawyer representing Bezeq and the two affiliates, YES and Pele-Phone, declined to comment on the investigation; Mr. Wismonsky said that Bezeq itself appeared to have been a victim, not a recipient, of stolen information.”  Continue Reading »

No responses yet

TBR News July 17, 2016

Jul 17 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 17, 2016:”The Turks, always arrogant and violent, have seized an Amerian air base in Turkey and are using this to order the American government to deport a Turkish religious leader whom their dictatorial president dislikes and who claims instigated the failed military revolt recently put down by force. The Turks are walking on a soda cracker bridge and it is starting to rain. They have alienated the Russians and now they are ordering the US government to obey them. The Achilles Heel of Turkey lies in her conflicts with their Kurdish population. The Kurds represent 25% of Turkish population and are organizing for a separatist movement. Turkey will not allow this and, true to form, are murdering Kurdish civilians in a most brutal manner and destroying their villages. An outside entity has been clandestinely arming the Kurds and much more will be heard about this in the coming months.” Continue Reading »

No responses yet

TBR News July 16, 2016

Jul 16 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 16, 2016: “Fanatics never think about the future, only the present. By their recent spate of mass murder in France, Sunni IS is unifying, not breaking, Western resistance to their Saudi-supported dreams of religious empire. IS does not consider their own death tolls but in the end, the American and Russian attacks on them, both in the Middle East and soon, in Europe, will destroy them, just as Genghis Kahn destroyed the Assassins in their mountain lairs.” Continue Reading »

No responses yet

Next »