goto end.....up one level.....
"All truth passes through 3 stages.
First, it is ridiculed, second it is violently opposed, and third, it is accepted as self-evident."
- - - Arthur Schopenhauer, Philosopher, 1788-1860

Whatever the evil (poison) is, it must be presented in a mix of something good, or good for you.
Rat poison is like this, 99.5% of the ingredients are tasty and nutritious for the rat
(otherwise, they wouldn't eat it, would they?).  Only .5% (1/2 percent) is deadly.
 


of
News, Current Events
& Comment
for
February 2005
 October 2004
November 2004
December 2004
January
2005

the URL for this page can be found by returning to the previous page

(if a contributing editor, wishes recognition, they should so indicate with their submission)
Best printing w/a black only printer is accomplished when your settings are for "black text and black lines"

 
To save on the amount of forced emails that consume MEGA bytes of HD space, 
these pages are created for your convenience.

Pictures can be saved by right clicking then follow the yellow brick road,
and original of reports can be located by available links in the articles
and saved as you would other web pages.

I am reminded of Dad's special brownies.  It is the same truth.
 

If you want to remain in your ignorance then take this blue pill -

01 \Archeologist Unearths Biblical Controversy
\Those were the Good Ole Days
\The Secret List of ID Theft Victims
02 .
03 . 04 \Humans Used as Guinea Pigs by US Government and Milita
\Ban Bridges
05 . 06 .
07 . 08 .
09 . 10 \Safeway Club Card Leads to Bogus Arson Arrest
\Where are the Wings?
11 . 12 \Refuse the National I.D. Card
\Here We Go Again, Threats Without Substantial Grounds
13 . 14 .
15 \Taxing By The Mile
\The Pentagon Attack and American Airlines Flight 77
16 .
17 . 18 \The Cure Zone
19 . 20 .
21 . 22 .
23 . 24 .
25 \Vere are your paers???? 26 .
27 . 28 .
29 . 30 .
31 . . .

Since many reports herein are from other sources, a copyright would be of little use in those cases.
But, all reports herein, reprints are permitted if proper credit is given as to source - Rocky  View
with URL of this page or the homepage listed above.



 
 
 

20050225

 
I am from the gubment, 
& am here to help you - NOT
Vere are your paers????
Patriot Act spawns Ohio bill - Critics of proposal fear for civil liberties if anti-terrorism restrictions become law
Jon Craig  - Thursday, February 24, 2005 - The Columbus Dispatch
Anti-terrorism measure
contributing editors to   - Bob

[The Dispatch online is a subscriber based publication and without paying for pages, the article is not viewable.  But, here is the text of the article.  --  Tribble]

Anyone near a "terroristsensitive site" in Ohio would be required to provide identification on demand to police or private security officers under a proposed "Patriot Act" for Ohio.

Authorities also would revoke or deny any state-issued license to anyone suspected of aiding terrorist organizations.

Jeffrey M. Gamso, legal director for the American Civil Liberties Union in Ohio, said football stadiums and places of worship could be labeled "terrorist sensitive" and therefore be off-limits to people who might be suspected of espionage.

Gamso also questioned proposed restrictions on lasers and chemical agents, saying garden shears and walking sticks can be dangerous, too.

"Under the definitions, it may be illegal to possess household bleach or turpentine in large quantities," he said.

The measure, sponsored by Sen. Jeff Jacobson, was given a prime designation as Senate Bill 9 — which indicates it is among the legislative leadership’s top priorities this year.

"Recent headlines describing alleged terror plots at central Ohio shopping malls and lasers targeting airliner cockpits in Cleveland are chilling reminders that terrorism is not an issue that can be dealt with once and for all," said Jacobson, a Republican from suburban Dayton.

"Just as terrorist networks evolve and adapt their strategies over time, we must also revise and update our laws to avoid any future attacks and to ensure the safety of every Ohio citizen."

During a legislative hearing yesterday, critics questioned the intrusion into civil liberties and said the measure would punish legal immigrants while discouraging them from cooperating with police.

Angela Plummer, director of Community Refugee & Immigration Services in Columbus, said some of her clients have sent money to relatives in Africa via businesses under heightened federal scrutiny since the Sept. 11 attack.

Under the new law, to get a driver’s license, those clients would have to check a box saying they gave "material assistance" to an organization on the U.S. State Department’s terrorist-exclusion list.

Failure to check the box can lead to a license revocation and fifth-degree felony charge, Plummer said.

"It’s a back-end way to convict them of a felony," she said.

Columbus resident Susan Harrell, a Liberian who renewed her legal immigration status last week, had been beaten by her American husband but was hesitant to contact police, according to Plummer. Harrell’s permanent residency was threatened once the couple separated, she said.

The mother of three small children feared deportation when she called police during a domestic squabble, causing her husband to flee.

"We are especially concerned about the chilling effect it would have on battered immigrant women, who will not contact the police when they are in need of protection if they fear immigration consequences," Plummer testified.

Under Senate Bill 20, local law-enforcement agencies would risk losing federal funds if they fail to aggressively enforce immigration laws, she said. The legislation jeopardizes public safety and could lead to harassment by untrained law officers, she added.

"I’m the last person who wants a refugee to do something improper," Plummer said, but some of the confusing provisions of the bill "haven’t been thought through."

Plummer was joined at yesterday’s hearing by two Somali immigrants who sent money to their relatives in Africa, something that could be misconstrued as aiding terrorism.

Mohamed Ali and Dunia Hashi, who now live in Columbus, had sent funds via a moneytransfer business for education and food for a brother and aunt, respectively.

Shortly after the Sept. 11 attack, police and federal agents raided another money-transfer business, Hussein’s Barakaat Enterprises. At the time, government officials said the operation could be tied to al-Qaida through an international Al Barakaat enterprise that wired money overseas.

Hussan Haji Hussein was never charged, but about $160,000 from his business was frozen by the government for nearly a year.

Hussein’s name and business were cleared in August 2002 by President Bush when he removed both from a U.S. list of suspected supporters of terrorism.

At a Senate Judiciary and Criminal Justice Committee hearing last week, attorneys for the Ohio chapter of the American Immigration Lawyers Association and ACLU of Ohio also criticized the requirement to disclose any assistance provided to any organization on the State Department’s terrorist-exclusion list. Those applying for school-bus or hazardous-waste driver’s licenses would be automatically denied.

jcraig@dispatch.com

Anti-terrorism measure
Thursday, February 24, 2005

Senate Bill 9, dubbed the Ohio Patriot Act, enacts or requires:
• An offense of ‘‘failure to disclose one’s personal information," which prohibits a person who is in a public place from refusing to disclose their name, address or date of birth when requested by a law-enforcement officer who reasonably suspects the person is about to commit a criminal offense or has witnessed a felony.

• Any law-enforcement officer, prosecutor or judge to notify the Immigration and Naturalization Service when an illegal alien has been convicted of a felony.

• A person in or near an airport, train station, chemical plant, utility or ‘‘any other terrorist-sensitive site" to show identification when requested by law-enforcement or security personnel.

• The state Department of Rehabilitation and Correction to transfer any convict who is an illegal alien to the custody of the INS.

• Offenses of money laundering in support of terrorism and criminal use or possession of a chemical weapon or biological weapon.

• An offense of ‘‘unlawful possession of a powerful laser."

• Animal or ecological terrorism be included on the list of offenses considered ‘‘corrupt activity." SOURCE: Senate Committee on the Judiciary and Criminal Justice
 
 

20050218

 
Health / nutrition
The Cure Zone
contributing editors to   - Wendell

Here is a newly discovered web site for health/medicine related matters. Cure Zone

Do not forget about this long time health/medicine related site Mercola
 
 

20050215

 
a r t i c l e   /   c o m m e n t a r y
The Pentagon Attack and American Airlines Flight 77
by John Judge, researcher and founder for 9/11 CitizensWatch
21 February 2004
contributing editors to   - Scott

[Here is counterpoint to the usual conspiracy articles.  What usually seems missing, is a salient presentation by those who support the gubment/media position.  Naturally, there are going to remain points and concerns which do not seem adequately answered by any explanation.  This of course will continue the suspicions of conspiracy.  This article/commentary with its associated links do a good job of presenting a challenge to the conspiracy theories.  --  Tribble]

        On the morning of September 11, 2001 I was at home in Washington, DC, about half a mile from the Pentagon, in Anacostia. I had been called by a friend to inform me of the first plane hitting the WTC tower in New York City. He sits on a transportation board for the county in Fairfax, Virginia, which includes Dulles Airport. He was immediately alarmed because he knew that no commercial flights come close to those buildings on their normal routes, and he suspected this was a terrorist attack. As we spoke, the second plane hit the second WTC tower at approximately 9:05 am, and at that point people across the United States were forced to agree with his thesis, since neither accident nor coincidence would have explained two such tragedies happening nearly simultaneously.

        At that point, other planes that had gone off course and turned off communications with their control towers were still in the air. All four planes involved in the attacks had been identified as emergencies and potential hijackings by the FAA, NORAD, the National Military Command Center at the Pentagon, the Secret Service and other agencies linked into a phone bridge that was in place by at least 8:24 am, sharing critical information with the air traffic controllers and eventually with military pilots. By 8:18 am, according to published reports, they were aware of four commercial passenger planes off course and not responding normally, two from United and two from American Airlines.

        American Airlines (AA) Flight 77 left Dulles airport that morning on its regular route to LAX airport in Los Angeles. For a few minutes it was lost to radar tracking when it turned off course and headed back to the east. But in a short time radar contact was renewed and its course was visible. It was coming towards Washington, DC. Much of the city is under P-56, one of the most secure airspaces in the world, protected under federal regulations from any over-flight by unauthorized planes, private or commercial, and guarded by fighter jets from Andrews Air Force Base (AFB) and Anacostia Naval Air Station, where the Air National Guard is located.

        Not only did authorities know it was headed to DC, it was announced publicly on local TV and radio stations, and evacuation was ordered at the White House, the Capitol, the Pentagon and other federal buildings. This notice was given well in advance of the plane's arrival in DC airspace. I stood watching television news reports that morning, anticipating its arrival. A large explosion at approximately 9:43 am shook my windows, though it was not visible to me.

        When newscasters announced the identity of the plane involved, American Airlines Flight 77 and its Dulles/LAX route, my heart sank. A dear friend and fellow researcher had been working as a flight attendant for American for many years, and that was her regular route, several times a week. I feared she had been trapped on the plane and died in the crash. Attempts to reach her by phone that day got her answering machine, nothing more.

        Local reporters continued to cover the event on radio and TV. There was footage of the rescue and fire crews at the Pentagon site, and the smoke plume was visible across the city. Hundreds of witnesses had been stuck in traffic during the attack along major highway routes into the city that border the Pentagon, and had seen and heard the event close-up, as well as office workers in nearby buildings, others along the route who were outside and ducked because the plane was flying so low, and workers at the Pentagon site, both at the heliport and in the construction crews who had been reinforcing the building walls for several years. Many of these people were interviewed by local and national media and the press.

        "Continuity of Government" was declared, bypassing Constitutional governing structures in favor of a small number of executive and legislative leaders working together with FEMA, the National Security Council and the Pentagon from a secure bunker in Bluemont, VA to function in the emergency. Metro, AMTRAK trains, and commercial flights were cancelled and government employees were excused from work and told to go home. Local highways became one-way routes out of town. Park Police could be seen on the streets with machine guns at ready.

        DC came very close to martial law. And all day long, local witnesses to the event at the Pentagon were interviewed, describing the plane and its collision with the Pentagon and the explosion that resulted. Later, survivors from inside the building were interviewed, along with rescue crew. A massive rescue and clean-up operation began once the fire was contained.

        As it turned out, my friend had not been on Flight 77, having taken the day off work to care for her sick father, and to my relief she had survived. She had lost her entire regular crew, both pilots and all the attendants, including her best friend at work. She was immediately invited in to a series of briefings and grief counseling sessions by both the airline and the Pentagon. These briefings continue to this day. She also attended a long series of memorial events at the gravesites of her co-workers and friends following the event. Her own father died shortly after that in November. I attended his funeral service at National Cemetery and got to meet some of her American Airline co-workers.

        When questions arose about Flight 77, I contacted her to raise the issues that concerned me and the speculations of others who denied the plane hit the Pentagon. She was adamant in saying it had, and told me she had been to the crash site and had seen parts of the plane. I asked her about the speculation that the plane would have made a larger hole due to the wingspan. She informed me that the fuel was stored in the wings and that they would have exploded and broken off, as the fuselage slammed through the building walls.

        I have spoken to dozens of other witnesses to the event, and to others who know the reports. Wayne Madsen, a respected local journalist, spoke to a camera person at WJLA-TV 7 who had been driving to the Pentagon on instructions from his office, expecting a public statement from authorities there in response to the events in New York City. Shortly after the crash he saw a woman standing by the road at the edge of the Pentagon, next to her car, and apparently in shock. He stopped to help her and found she could not speak. But she pointed him to the far side of her car. The passenger side had been sheared off in part and sections of the landing gear from the plane were on the ground nearby. Others I have spoken to, including pilots, either saw the crash happen and identified the plane, or saw parts of the plane in the wreckage days afterwards.

        At the funeral service on September 20th in Annapolis for Charles Burlingame, the pilot of AA Flight 77, my friend was approached by another flight attendant to assist in support work for the rescue crews at the site. This work was being organized by the Salvation Army. The Pentagon was seeking people with security clearances that they could trust to be near the site and all the airline attendants qualified for that level of clearance. The shifts ran from 10 am to 10 pm, and then for the next twelve hours. She and her mother signed up for an overnight shift on Friday, September 21st.

        She and her mother spent the entire night continuously providing drinks to rescuers from North Carolina. Burger King, McDonald's, Pepsi and Outback Steak House were the selected food and drink providers. She and her mother were given a special T-shirt to wear for the night, with red lettering for "Operation Noble Eagle". They did not wear the traditional Salvation Army outfits. No break came until early morning, the crews were large and worked continuously. The work was tedious and slow. She was in the second of five groups that were sent in that week. Rescue and clean-up work continued for months.

        At the end of her shift on Saturday morning, September 22nd, she was approached along with other attendants to visit the crash site. One declined, but she and two others took a van driven by the Salvation Army to the area. They were forced to wait almost 45 minutes at a safety fence around the area before being admitted into the area of destruction. As they waited, members of a psychological support group talked to them about their feelings. She will never forget what she saw there.

        The area was covered with rescue equipment, fire trucks, small carts, and ambulances. They were still hoping to find survivors. Small jeeps with wagons attached were being used to transport workers and others at the site. One flight attendant was driving one of these around the site. Once inside the fence, she was unable to clearly discern where the original wall had been. There was just a gaping hole. She got off the van and walked inside the crash site. The other attendants broke down crying once they were inside. But my friend went in further than the others and kept her emotions in check as she has been trained to do and usually does in emergency situations.

        She saw parts of the fuselage of an American Airlines plane, a Boeing 757 plane. She identified the charred wreckage in several ways. She recognized the polished aluminum outer shell, an unpainted silver color that is unique to American Airline planes, and the red and blue trim that is used to decorate the fuselage. She saw parts of the inside of the plane, which she easily identified since she flew and worked in them for years. Upholstery, drapes and carpeting she could identify by both color and design. The soft carpeting and padding of the inner walls had a cloud design and color she recognized from American Airline planes, though it has since been replaced. The blue coloring of drapes and carpet were also specific to the 757 or 767 larger planes, and were not used on the smaller planes. Seating upholstery also matched the AA 757 planes, including the blue color, tan squares and hints of white.

        She saw other parts of the plane and engine parts at a distance but they were familiar to her. She did not see any galley supplies, which she would have recognized as well, nor any jump seats. All the parts were charred but colors were still visible. She also saw charred human bones but not any flesh or full body parts.

        One area of fuselage had remaining window sections and the shape of the windows, curved squares not ovals, was also distinct to the 757's she had flown. She also saw parts with the A/A logo, including parts of the tail of the plane. Smaller A/A logos and "American" logos are also on the planes and she saw parts of those. One website shows pictures of wreckage inside the building, including sections of the fuselage with bright lime and yellow coloring, which is distinctive to Boeing parts. My friend confirmed this, having visited a Boeing plant where she saw the bright colors on the production line marking the inside of fuselage parts. She did not notice this coloring at the site, but the photos show it in some pieces of the plane.

        She spent approximately 15 minutes in the crash area looking at parts of the wreckage, all of which she recognized as coming from a Boeing 757 American Airline plane, the same planes she flew regularly. She did not see any rubber, only metal pieces of fuselage, engine parts and sections of the inside of the plane.

        She went to briefings by Pentagon people at the Sheraton for 3 months afterwards, and the clean-up lasted for a long period. She is a union representative for attendants as well, and briefings continue. Families and attendants were at the briefings, along with Pentagon and airline people. Hundreds of people saw the plane from windows of nearby buildings, from cars along the nearby highways, and some ducked because it flew over so low. Pentagon employees and construction workers at the site saw the events unfold before their eyes. Hundreds more took part in the clean-up operation and saw the wreckage. It is not difficult to find eyewitnesses to the event in DC.

        The crew of Flight 77 who died in the crash included her personal friend Renee May. She had spoken to Renee's mother after the crash, and Renee had used a cell phone to call her mother during the hijacking. Her mother noted specific phone numbers to call American Airlines operations to report a hijacking. "There are six of them," Renee had told her, one more than in the official version. Her mother also heard the voices of other attendants calling out contact numbers for American Airlines during the call. At the time attendants had been trained to cooperate during a hijacking event, and it seems a group of them were at the back of the plane together as it approached DC. She was told at a briefing that pilot Charles Burlingame's throat was slit, but had no way to confirm it. She believes the co-pilot may have been forced to the rear with the attendants. She does not know exactly what happened to her friend Renee.

        Cell phone calls made from the planes that day have become an area of contention as well. However, my friend told me that attendants regularly hear cell phones ringing during flights, despite the prohibition. In fact, the airlines are now ending the restriction while on the ground, having discovered that these devices do not actually interfere with communications or functions aboard the plane before take off. Some cell phones do not work as well as others at high altitudes and speeds, but major carriers have multiple towers and the calls do not even roam in connection. Other people I know have tested Verizon and other cell phones crossing the country and found them to work normally. In addition, many of the calls made that day were to family members who clearly recognized their relatives' voices.

        Other American ground crew workers saw some of the suspects board American Airline Flight 77 and recognized them from the published photos. While questions remain about the identities of the hijackers, it is not the case that none of them were on the planes. The airlines have yet to release full passenger manifests, and those they have released are short of the total count, and do not contain the suspects' names. Rather than speculate that none were aboard, the more interesting question is why the names have not been released if they indeed match the official story.

        My friend is therefore a credible and very knowledgeable eyewitness to the fact that American Airlines Flight 77 crashed into the Pentagon on September 11, 2001. She has been vilified by those who refuse to believe the obvious, as have the many witnesses to the event. We lack clear footage of the event, some of which was confiscated by the FBI, or pictures showing all the wreckage and plane parts. Working from a few un-timed photographs, others have speculated that not only did AA77 not hit the Pentagon, but that a cruise missile or smaller plane did.

        My friend is herself a researcher for many years into government misdeeds and cover-ups. If she did not see the parts, she would say so. She has no reason to lie about it. Nor is she confused about what she saw. She is a professional and is used to looking at evidence. Families of victims and others who work at the airlines, as well as many witnesses I have spoken to, are offended and shocked by these unfounded speculations. Those willing to do a modicum of investigative work here in DC will be quickly disabused of this disinformation. For a more thorough presentation of the range of witness testimonies, and linking sites, see the work on Flight 77 and the Pentagon attack by Penny Schoner at www.ratical.org.

        My attendant friend knows and has put me in touch with other American Airline employees and pilots who were at the site and took photographs. We are busy locating these, as well as another attendant who was at the site with her that day. 9/11 CitizensWatch has also been pushing for public release of all photographic evidence relating to the Pentagon attack from federal agencies and other sources and plans to file a Freedom of Information request to get records from all federal agencies that might hold them.

        There are many legitimate unanswered questions about the events of September 11, 2001, its sponsorship, and the official version of events. We benefit from serious research and the issues raised by victim's families seeking accountability. Not the least of these is the apparent lack of standard FAA/NORAD response to these emergency events. Rather than use our time proving and belaboring the obvious, or focusing on areas of total speculation that can only hurt our public credibility, I encourage serious researchers to focus on the historical context of the event, the alleged conspirators, the funding, and the government response or lack of it.

        American Airlines Flight 77 hit the Pentagon, killing passengers and crew, along with construction workers and a small number of Pentagon employees. It made an amazing spiraling descent, curving 270-degrees around the open area, and then flew dangerously close to the ground, skidding into the ground floor of the Pentagon. A huge fireball could be seen outside the building as it hit. Employees inside the building were also burned by jet fuel, which covered the lawn and front of the building. One employee saw the nose of the plane crash through her office wall. Pilots have disagreed about the piloting skills necessary to carry out this maneuver in a large commercial plane. Questions about the actual events remain but I hope that credible witnesses and the existing evidence will at least put to rest the wild speculation that have replaced Flight 77 with flights of fancy.
 
 
I am from the gubment, 
& am here to help you - NOT
Taxing By The Mile
States Mull Taxing Drivers By Mile
Corvallis, Oregon, Feb. 14, 2005
http://www.cbsnews.com/stories/2005/02/14/eveningnews/main674120.shtml

[This story and the excuses used by those promoting the "Tax by the Mile" agenda is a show and distraction.  They claim the increased use of hybrid cars (those which use less gas by augmenting with electric or hydrogen or something) are causing a substantial loss of road tax revenue.  Therefore, they must find a why to tax everyone regardless of the type car used.

They say  "The new tax would be charged each time you fill up. A computer inside the gas pump would communicate with your car's odometer to calculate how much you owe."  If you couple the means they will have to use to determine how much tax you must pay with the fast implementing technology of RFID, then you will literally be tracked EVERYWHERE you go.  They naturally will have to know at least the car (truck, motorcycle or such) in a database to be able to properly assess the tax.  Of course, that car is register to someone and that someone will most likely be the one using the car.  They do not need GPS, which would be more accurate, to know your general patterns.  Most people refuel in the same neighborhoods regularly.  Then when you deviate from the norm, a flag (in a computer) will raise.  --  Tribble]

Jayson Just commutes 2,000 miles a month.

"Drivers will get charged for how many miles they use the roads, and it's as simple as that."David Kim, engineer

(CBS) College student Jayson Just commutes an odometer-spinning 2,000 miles a month. As CBS News Correspondent Sandra Hughes reports, his monthly gas bill once topped his car payment.

"I was paying about $500 a month," says Just.

So Just bought a fuel efficient hybrid and said goodbye to his gas-guzzling BMW.

And what kind of mileage does he get?

"The EPA estimate is 60 in the city, 51 on the highway," says Just.

And that saves him almost $300 a month in gas. It's great for Just but bad for the roads he's driving on, because he also pays a lot less in gasoline taxes which fund highway projects and road repairs. As more and more hybrids hit the road, cash-strapped states are warning of rough roads ahead.

Officials in car-clogged California are so worried they may be considering a replacement for the gas tax altogether, replacing it with something called "tax by the mile."

Seeing tax dollars dwindling, neighboring Oregon has already started road testing the idea.

"Drivers will get charged for how many miles they use the roads, and it's as simple as that," says engineer David Kim.

Kim and his team at Oregon State University equipped a test car with a global positioning device to keep track of its mileage. Eventually, every car would need one.

"So, if you drive 10 miles you will pay a certain fee which will be, let's say, one tenth of what someone pays if they drive 100 miles," says Kim.

The new tax would be charged each time you fill up. A computer inside the gas pump would communicate with your car's odometer to calculate how much you owe.

The system could also track how often you drive during rush hour and charge higher fees to discourage peak use. That's an idea that could break the bottleneck on California's freeways.

"We're getting a lot of interest from other states," says Jim Whitty of the Oregon Department of Transportation. "They're watching what we're doing.

"Transportation officials across the country are concerned about what's going to happen with the gas tax revenues."

Privacy advocates say it's more like big brother riding on your bumper, not to mention a disincentive to buy fuel-efficient cars.

"It's not fair for people like me who have to commute, and we don't have any choice but take the freeways," says Just. "We shouldn't have to be taxed."

But tax-by-mile advocates say it may be the only way to ensure that fuel efficiency doesn't prevent smooth sailing down the road.
 
 

20050212

 
duh
Here We Go Again, Threats Without Substantial Grounds
ABC reported Thursday, February 10, 2005, that U.S. Secretary of State Condoleezza Rice threatened Iran to stop what she (U.S.) SUSPECTS they are doing.  Is this rather like someone IMAGINING that you are stealing, but has no proof, yet they admonish you to stop doing it.

What follows is a link to the audio of the ABC report.  It is about 64Kb and download time in dialup maybe about 20 seconds.
http://www.tellme1st.net/rockyview/common/wnn 20050210 Rice on suspected weapons.mp3
 
 
I am from the gubment, 
& am here to help you - NOT
Refuse the National I.D. Card
http://www.newswithviews.com/iserbyt/iserbyt22.htm
By Charlotte Iserbyt  February 12, 2005
contributing editors to   - Jeanne

[Text of the House Bill can be found athttp://thomas.loc.gov/cgi-bin/query/C?c109:./temp/~c109jhBO7I]

The drivers license (semantic deception for internal passport) legislation (H.R. 418), which passed the Congress and is on its way for passage in the Senate, is more serious than one may think due to the fact it was designed by two ex-KGB Chiefs, one of whom,Yvgeny Primakov, was the President of totalitarian Russia in the late nineties. (The merger of the KGB and the FBI has been in the works since 1985 when President Reagan signed numerous agreements with Gorbachev, one of which was the infamous education agreement which merged our two education systems. Another agreement was signed between the Soviet Police and New York City Police which allowed Soviet policmen to assist in the arrest of fare beaters in the New York City subway system.These activities, unknown to most Americans, represent just the tip of the U.S.-Soviet exchange agreements iceberg. )

TIME magazine, 7/5/93, in an article entitled "A New World for Spies", illustrates the extent of the partnership between the United States and Russia. It states: "The Chairman of the Senate Intelligence Committee, D\Concini, and CIA Director Woolsey, met with Yvgeny Primakov, head of the Russian Foreign Intelligence service (KGB), over a period of several days. Members of the House and Senate Intelligence Committees were present. Woolsey and Primakov discussed how their organizations can cooperate and share information on worldwide threats, such as terrorism, the spread of weapons of mass destruction, and drug trafficking. Former head of the CIA Gates visited Moscow in October, 1993. Yuri Kobaladze, chief spokesman of the Russian Intelligence Service, is quoted in this same article as saying 'We are partners now." This same article continues as follows: "Were he still alive, James Jesus Angleton, the CIA's consummmate cold war spook, would have launched a full-scale internal investigation condemning a conversation of any substance between Primakov, a long time Kremlin Middle East expert and Woolsey, as treasonous."

Don't forget this same criminal , Primakov, was in Baghdad two weeks prior to our invasion of Iraq, advising Saddam Hussein on how to deal with the Americans! And the Bush Administration's Office of Homeland Security invited Primakov and Karpov to help in the design of the internal passport (drivers license) for Americans, which was approved by the U.S. Congress Wednesday, Februar 9.

There is one issue which is forbidden for discussion by traditional conservative writers, neoconservatives writers, establishment (Council on Foreign Relations) writers, and the TV and radio media. It is the merger between the United States and Russia (former Soviet Union which never collapsed) as the primary pillar of Leninist world government. These controlled writers are allowed to talk about everything else, including the unconstitutional United Nations, but not about the merger which is taking place in front of our eyes, and not just between the USA and Soviets, but between the USA and China as well. The Soviets and Chinese have joined together formally and have submitted joint agreements to the United Nations in which they spell out in detail their plans to lead the forthcoming communist world government which is being assembled as I write. The European Union (region) is the model for the rest of the world as it becomes regionalized (communized). Gorbachev referred to the European Union as The New European Soviet in a speech in London in 2002. President Bush is implementing The New American Soviet in this hemisphere. The new drivers license (internal passport) will extend throughout this hemisphere.

Yes, folks, what is going on now, supported by both Republican and Democrat leadership, has been going on ever since President Eisenhower signed the first agreements with the Soviets in 1958, at the peak of the Cold War. This unconstitutional planning for a communist world government is, as Angleton would have said, 'TREASONOUS'. Everything going on in this regard was discussed during the 1953 Reece Committee's Congressional investigation of the tax-exempt foundations. The Research Director, Norman Dodd, was told by the President of the Ford Foundation, Rowan Gaither, that the foundations received their instructions on how to spend their money from the White House. Those instructions were to use their money to change America so it could be comfortably merged with the Soviet Union. Ask yourselves why this issue has not being dealt with and why very few, if any, conservative writers ever deal with this issue. Because the leadership of the Republican and Democrat parties, the leadership of the national conservative organizations, with a very few notable exceptions, and the conservative media are involved in furthering the merger.

In my opinion, there is only one book, " Perestroika Deception...The World's Slide Towards The Second October Revolution", by Anatoliy Golitsyn, who defected from the former Soviet Union in 1961. Golitsyn, who also wrote "New Lies for Oldl", in his latest book explains exactly what is going on in the world, and how and why all of us, including the rest of the world, are in a fast fall toward world communism. In the late fifties Anatoliy Golitsyn, a Soviet official, sat in on high level meetings in the Kremlin during which the grand deception of the West was planned. This deception, which included the planned phoney demise of communism, succeeded in hoodwinking Prime Minister Margaret Thatcher and President Ronald Reagan, resulting in their enthusiastically endorsing Gorbachev's Perestroika. It was Golitsyn who provided sensitive documents, over many years, to the CIA warning it of the merger I am discussing in this article. It was Golitsyn who warned President Reagan not to attend his scheduled visit to Moscow in 1988. James Angleton, the Director of CIA's Counter Intelligence was one of the few CIA agents, who believed Golitsyn. In dedicating his book to Angleton, Golitsyn said: "In Memory of Jim Angleton, Founder and outstanding chief of the Central Intelligence Agency's Counter-intelligence, a man of vision and courage, a warrior and comrade-in-arms, who recognised the dangers of the Soviets' new strategic challenge".

In his book "Wedge: The Secret War between the FBI and CIA", Alfred A. Knopf, New York, 1994, Mark Riebling, who carried out a methodical analysis of Golitsyn's predictions in "New Lies for Old", credited Golitsyn with "an accuracy record of nearly 94%" in his predictions, some years ahead of the events, of the phoney "break with the Past" which took place in Eastern Europe and the Soviet Union in 1989-1991. One can buy Golitsyn's "Perestroika Deception" by going to my website and clicking on home page "Other Orders". www.deliberatedumbingdown.com

If Americans do not have the information in Golitsyn's important book, and continue to focus EXCLUSIVELY on other issues, important as they may be, such as tragic Tsunamis, the Ukrainian elections, dumbed down education, gun controls, abortion,property rights, disarmament, the Constitution, 9/11, etc., they are playing directly into the hands of the Insiders, who are cooperating with the Russians and Chinese, who count on Americans to remain unaware of the real agenda , the planned merger of the United States of America with the Soviet Union and Communist China.

Once the United States is down, under a totalitarian world communist government, with our Constitution a thing of the past, do we really believe we will be able to stop abortion, euthanasia, mental health screening, etc., that we will be able to get rid of the internal passport, or that we will be able to reclaim any of our other freedoms formerly guaranteed by the Bill of Rights?

There is a solution to this vitally important problem. Hopefully, some day in the future, our children and grandchildren will look back on February 9, 2005 the day our Congress passed the infamous H.R. 418, as the day which triggered the movement to take our country back. Should the U.S. Senate pass H.R. 418's companion legislation, all Americans, when they have to renew their drivers licenses, should refuse to accept this drivers license which is nothing more nor less than an internal passport similar to those required in totalitarian countries.

All Americans, who cherish their freedoms guaranteed under The Bill of Rights, MUST refuse to accept this totalitarian identification card which will contain information, lifelong, on all aspects of our persons, what we have written, associations, and actions, past, present and future, and which will be used to identify and penalize those who disagree with government policies.

Let's turn H.R. 418 into the vehicle by which we can reverse our nation's march toward totalitarian dictatorship under world government. May God bless all Americans who understand the severity of this issue. May they have the courage to stand firm in the face of this latest evil and others which are sure to come if we do not take a stand...NOW.
 
 

20050210

 
a r t i c l e   /   c o m m e n t a r y
Where are the Wings?
[This is the one of the questions we have been asking since 9/11/2001, when something crashed into the Pentagon.  A couple things are conspicuously missing from the lawn of the Pentagon.  There was NO evidence of wings or engines on the lawn immediately after the incident.  We even saw a line of people walking the lawn looking for SMALL debris, but obviously missing the wings and engines.  I would not expect either wing to be in a whole piece, but at least recognizable portions should be on the lawn.  Then of course there are the engines.  Jet engines are too massive to be in pieces, and after most any other plane crash, at least one of the engines is found in substantially whole condition.

Why raise this now?   Because on February 2, 2005, a plane ran off a runway during takeoff.  Admittedly, this plane was not moving as fast as whatever hit the Pentagon, but it gives an idea what might be expected from a plane hitting the Pentagon.

Notice in the following pictures, the wings are in whole pieces.  Notice how they ripped from the plane on impact.  Where is ANY evidence of wings at the Pentagon?  There is NONE.  Look again at the early pictures at the Pentagon.  Where are the wings?]
 

The wings are nearly whole, but more importantly, they are in one piece.  Even if a plane was going faster or hit a harder wall, the wings should be evident somewhere (in noticeable parts), not to mention the engines.

 
I am from the gubment, 
& am here to help you - NOT
Safeway Club Card Leads to Bogus Arson Arrest
If-you're-innocent-you-have-nothing-to-fear
http://www.computerbytesman.com/privacy/safewaycard.htm
contributing editors to   - JJ

Tukwila, Washington firefighter, Philip Scott Lyons found out the hard way that supermarket loyalty cards can come with a huge price. Lyons was arrested last August and charged with attempted arson. Police alleged at the time that Lyons tried to set fire to his own house while his wife and children were inside. According to the KOMO-TV and the Seattle Times, a major piece of evidence used against Lyons in his arrest was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type used in the arson attempt.

For Lyons, the story did have a happy ending. All charges were dropped against him in January 2005 because another person stepped forward saying he or she set the fire and not Lyons. Lyons is now back at work after more than 5 months of being on administrative leave from his firefighter job.

The moral of this story is that even the most innocent database can be used against a person in a criminal investigation turning their lives completely upside down.

Safeway needs to more up-front with customers about the potential downsides of shopper cards. They should also provide the details of their role in the arrest or Mr. Lyons and other criminal cases in which the company provided Club Card purchase information to police investigators.

Here is how Safeway currently describes their Club Card program in the Club Card application:

    http://www.safeway.com/app.pdf

"We respect your privacy. Safeway does not sell or lease personally identifying information (i.e., your name, address, telephone number, and bank and credit card account numbers) to non-affiliated companies or entities. We do record information regarding the purchases made with your Safeway Club Card to help us provide you with special offers and other information. Safeway also may use this information to provide you with personally tailored coupons, offers or other information that may be provided to Safeway by other companies. If you do not wish to receive personally tailored coupons, offers or other information, please check the box below. Must be at least 18 years of age."

Links

    * Firefighter Arrested For Attempted Arson, August 28, 2004
      http://www.komotv.com/stories/32785.htm

    * Fireman attempted to set fire to house, charges say, October 6, 2004
      http://seattletimes.nwsource.com/html/localnews/2002055245_arson06m.html

    * Tukwila Firefighter Cleared Of Arson Charges, January 28, 2005
      http://www.komotv.com/news/story.asp?ID=35019

    * Arson charges dropped against firefighter, January 28, 2005
      http://heraldnet.com/stories/05/01/28/100loc_arson001.cfm

    * Safeway Club Card
      http://www.safeway.com/club_card.asp

    * Consumers Against Supermarket Privacy Invasion and Numbering
      http://www.nocards.org/
 
 

20050204

 
a r t i c l e   /   c o m m e n t a r y
Ban Bridges
'STOP SUICIDES, CLOSE GOLDEN GATE BRIDGE,' GUN RIGHTS GROUP SUGGESTS
contributing editors to   - Bob

The Second Amendment Foundation (SAF) today called upon the San Francisco Board of Supervisors to "take an important step for public safety" and close the Golden Gate Bridge, which has been a popular suicide platform for more than 65 years.

"Several city supervisors want to ban handguns in San Francisco on the mere presumption that such a law would prevent crimes, accidents and suicides," said SAF Founder Alan M. Gottlieb. "Well, it is an absolute certainty that closing the bridge would prevent suicides, and perhaps many accidents, as well. And just for the sake of argument, one seriously might question whether any of the more than 1,300 fatal falls from the bridge since 1937 were cleverly-concealed homicides."

As gun rights groups and activists began putting momentum to their efforts to defeat a gun ban initiative, Gottlieb turned his attention to the bridge and its horrendous body count. USAToday reported that suicides have tarnished the bridge's reputation. The newspaper recounted how the San Francisco news media created a macabre circus atmosphere in the 1970s and again the 1990s as the body count approached 500 and then 1,000 victims, respectively.

"Social do-gooders have gone on the warpath repeatedly against firearms for the most tenuous of reasons," Gottlieb stated. "The Golden Gate Bridge is a proven killer, and media fascination with jumpers is sickening. It has inspired hundreds of people to end their lives. Anyone can simply walk out there and jump, or be pushed. There are no barriers, no waiting in line, and there is nobody assigned to the bridge who can check the mental and emotional history of bridge visitors. It's far easier to walk out on the bridge and jump to your death than it is to purchase a firearm in California. At least when a person buys a gun, he or she must complete a background check and endure a waiting period. But nobody screens possible Golden Gate jumpers. Unlike a gun, you can't even use the bridge to defend yourself against a criminal.

"The only way to prevent future tragedies," Gottlieb said, "is to close the bridge. We need to stop the growing body count. It's up to the Board of Supervisors to act, and they should do it immediately. If it saves just one life, closing the Golden Gate Bridge is the right thing to do."

-END-
--------------------------------------------------------------------------------
< Please e-mail, distribute, and circulate to friends and family >
Copyright © 2005 Second Amendment Foundation, All Rights Reserved.

Second Amendment Foundation
James Madison Building
12500 N.E. Tenth Place
Bellevue, WA 98005
 
 
I am from the gubment, 
& am here to help you - NOT
Humans Used as Guinea Pigs by US Government and Milita
contributing editors to   - Viv
http://www.WantToKnow.infohumanguineapigs

[There are many people in the uSA who do not believe their own gubment would not do harm to the people.  They obviously have not learned historical nature of events like Pearl Harbor.  They probably have not read 50USC1520a, where it says they may perform any experiment on a community.  --  Tribble]

Dear friends,

Below is the most comprehensive list I've seen of the use of humans as guinea pigs in biological experiments. Unfortunately, there are no links to confirm everything presented. However, having researched this subject quite thoroughly, I can tell you that I have read about almost all of these experiments in reliable books with footnotes providing information on how to verify these facts. The three books mentioned in the mind control section of our resources list at www.WantToKnow.info/resources#mindcontrol contain most of this information, which you can verify using the relevant footnotes.

The government and military obviously feel no compulsion to inform us of when they use us secretly  in experiments. Note that a number of these experiments specifically targeted minorities and those in poor areas. By exposing this information, we can help to build the critical mass necessary to put a stop to all of this. Please help to spread the word.
http://www.worldnewsstand.net/health/humanexperiments.htm

1931 - Dr. Cornelius Rhoads, under the auspices of the Rockefeller Institute for Medical Investigations, infects human subjects with cancer cells. He later goes on to establish the U.S. Army Biological Warfare facilities in Maryland, Utah, and Panama, and is named to the U.S. Atomic Energy Commission. While there, he begins a series of radiation exposure experiments on American soldiers and civilian hospital patients.

1932 - The Tuskegee Syphilis Study begins. 200 black men diagnosed with syphilis are never told of their illness, are denied treatment, and instead are used as human guinea pigs in order to follow the progression and symptoms of the disease. They all subsequently die from syphilis, their families never told that they could have been treated.

1935 - The Pellagra Incident. After millions of individuals die from Pellagra over a span of two decades, the U.S. Public Health Service finally acts to stem the disease. The director of the agency admits it had known for at least 20 years that Pellagra is caused by a niacin deficiency but failed to act since most of the deaths occurred within poverty-stricken black populations.

1940 - Four hundred prisoners in Chicago are infected with Malaria in order to study the effects of new and experimental drugs to combat the disease. Nazi doctors later on trial at Nuremberg cite this American study to defend their own actions during the Holocaust.

1942 - Chemical Warfare Services begins mustard gas experiments on approximately 4,000 servicemen. The experiments continue until 1945 and made use of Seventh Day Adventists who chose to become human guinea pigs rather than serve on active duty.

1943 - In response to Japan's full-scale germ warfare program, the U.S. begins research on biological weapons at Fort Detrick, MD.

1944 - U.S. Navy uses human subjects to test gas masks and clothing. Individuals were locked in a gas chamber and exposed to mustard gas and lewisite.

1945 - Project Paperclip is initiated. The U.S. State Department, Army intelligence, and the CIA recruit Nazi scientists and offer them immunity and secret identities in exchange for work on top secret government projects in the United States.

1945 - "Program F" is implemented by the U.S. Atomic Energy Commission (AEC). This is the most extensive U.S. study of the health effects of fluoride, which was the key chemical component in atomic bomb production. One of the most toxic chemicals known to man, fluoride, it is found, causes marked adverse effects to the central nervous system but much of the information is squelched in the name of national security because of fear that lawsuits would undermine full-scale production of atomic bombs.

1946 - Patients in VA hospitals are used as guinea pigs for medical experiments. In order to allay suspicions, the order is given to change the word "experiments" to "investigations" or "observations" whenever reporting a medical study performed in one of the nation's veteran's hospitals.

1947 - Colonel E.E. Kirkpatrick of the U.S. Atomic Energy Commission issues a secret document (Document 07075001, January 8, 1947) stating that the agency will begin administering intravenous doses of radioactive substances to human subjects.

1947 - The CIA begins its study of LSD as a potential weapon for use by American intelligence. Human subjects (both civilian and military) are used with and without their knowledge.

1950 - Department of Defense begins plans to detonate nuclear weapons in desert areas and monitor downwind residents for medical problems and mortality rates.

1950 - In an experiment to determine how susceptible an American city would be to biological attack, the U.S. Navy sprays a cloud of bacteria from ships over San Francisco. Monitoring devices are situated throughout the city in order to test the extent of infection. Many residents become ill with pneumonia-like symptoms.

1951 - Department of Defense begins open air tests using disease-producing bacteria and viruses. Tests last through 1969 and there is concern that people in the surrounding areas have been exposed.

1953 - U.S. military releases clouds of zinc cadmium sulfide gas over Winnipeg, St. Louis, Minneapolis, Fort Wayne, the Monocacy River Valley in Maryland, and Leesburg, Virginia. Their intent is to determine how efficiently they could disperse chemical agents.

1953 - Joint Army-Navy-CIA experiments are conducted in which tens of thousands of people in New York and San Francisco are exposed to the airborne germs Serratia marcescens and Bacillus glogigii.

1953 - CIA initiates Project MKULTRA. This is an eleven year research program designed to produce and test drugs and biological agents that would be used for mind control and behavior modification. Six of the subprojects involved testing the agents on unwitting human beings.

1955 - The CIA, in an experiment to test its ability to infect human populations with biological agents, releases a bacteria withdrawn from the Army's biological warfare arsenal over Tampa Bay, Fl.

1956 - U.S. military releases mosquitoes infected with Yellow Fever over Savannah, Ga and Avon Park, Fl. Following each test, Army agents posing as public health officials test victims for effects.

1960 - The Army Assistant Chief-of-Staff for Intelligence (ACSI) authorizes field testing of LSD in Europe and the Far East. Testing of the European population is code named Project THIRD CHANCE; testing of the Asian population is code named Project DERBY HAT.

1965 - Project CIA and Department of Defense begin Project MKSEARCH, a program to develop a capability to manipulate human behavior through the use of mind-altering drugs.

1965 - Prisoners at the Holmesburg State Prison in Philadelphia are subjected to dioxin, the highly toxic chemical component of Agent Orange used in Viet Nam. The men are later studied for development of cancer, which indicates that Agent Orange had been a suspected carcinogen all along.

1966 - CIA initiates Project MKOFTEN, a program to test the toxicological effects of certain drugs on humans and animals.

1966 - U.S. Army dispenses Bacillus subtilis variant niger throughout the New York City subway system. More than a million civilians are exposed when army scientists drop lightbulbs filled with the bacteria onto ventilation grates.

1967 - CIA and Department of Defense implement Project MKNAOMI, successor to MKULTRA and designed to maintain, stockpile and test biological and chemical weapons.

1968 - CIA experiments with the possibility of poisoning drinking water by injecting chemicals into the water supply of the FDA in Washington, D.C.

1969 - Dr. Robert MacMahan of the Department of Defense requests from congress $10 million to develop, within 5 to 10 years, a synthetic biological agent to which no natural immunity exists.

1970 - Funding for the synthetic biological agent is obtained under H.R. 15090. The project, under the supervision of the CIA, is carried out by the Special Operations Division at Fort Detrick, the army's top secret biological weapons facility. Speculation is raised that molecular biology techniques are used to produce AIDS-like retroviruses.

1970 - United States intensifies its development of "ethnic weapons" (Military Review, Nov., 1970), designed to selectively target and eliminate specific ethnic groups who are susceptible due to genetic differences and variations in DNA.

1975 - The virus section of Fort Detrick's Center for Biological Warfare Research is renamed the Fredrick Cancer Research Facilities and placed under the supervision of the National Cancer Institute (NCI) . It is here that a special virus cancer program is initiated by the U.S. Navy, purportedly to develop cancer-causing viruses. It is also here that retrovirologists isolate a virus to which no immunity exists. It is later named HTLV (Human T-cell Leukemia Virus).

1977 - Senate hearings on Health and Scientific Research confirm that 239 populated areas had been contaminated with biological agents between 1949 and 1969. Some of the areas included San Francisco, Washington, D.C., Key West, Panama City, Minneapolis, and St. Louis.

1978 - Experimental Hepatitis B vaccine trials, conducted by the CDC, begin in New York, Los Angeles and San Francisco. Ads for research subjects specifically ask for promiscuous homosexual men.

1981 - First cases of AIDS are confirmed in homosexual men in New York, Los Angeles and San Francisco, triggering speculation that AIDS may have been introduced via the Hepatitis B vaccine.

1985 - According to the journal Science (227:173-177), HTLV and VISNA, a fatal sheep virus, are very similar, indicating a close taxonomic and evolutionary relationship.

1986 - According to the Proceedings of the National Academy of Sciences (83:4007-4011), HIV and VISNA are highly similar and share all structural elements, except for a small segment which is nearly identical to HTLV. This leads to speculation that HTLV and VISNA may have been linked to produce a new retrovirus to which no natural immunity exists.

1986 - A report to Congress reveals that the U.S. Government's current generation of biological agents includes: modified viruses, naturally occurring toxins, and agents that are altered through genetic engineering to change immunological character and prevent treatment by all existing vaccines.

1987 - Department of Defense admits that, despite a treaty banning research and development of biological agents, it continues to operate research facilities at 127 facilities and universities around the nation.

1990 - More than 1500 six-month old black and Hispanic babies in Los Angeles are given an "experimental" measles vaccine that had never been licensed for use in the United States. CDC later admits that parents were never informed that the vaccine being injected to their children was experimental.

1994 - With a technique called "gene tracking," Dr. Garth Nicolson at the MD Anderson Cancer Center in Houston, TX discovers that many returning Desert Storm veterans are infected with an altered strain of Mycoplasma incognitus, a microbe commonly used in the production of biological weapons. Incorporated into its molecular structure is 40 percent of the HIV protein coat, indicating that it had been man-made.

1994 - Senator John D. Rockefeller issues a report revealing that for at least 50 years the Department of Defense has used hundreds of thousands of military personnel in human experiments and for intentional exposure to dangerous substances. Materials included mustard and nerve gas, ionizing radiation, psychochemicals, hallucinogens, and drugs used during the Gulf War.

1995 - U.S. Government admits that it had offered Japanese war criminals and scientists who had performed human medical experiments salaries and immunity from prosecution in exchange for data on biological warfare research.

1995 - Dr. Garth Nicolson, uncovers evidence that the biological agents used during the Gulf War had been manufactured in Houston, TX and Boca Raton, Fl and tested on prisoners in the Texas Department of Corrections.

1996 - Department of Defense admits that Desert Storm soldiers were exposed to chemical agents.

1997 - Eighty-eight members of Congress sign a letter demanding an investigation into bioweapons use & Gulf War Syndrome.

For more on these important matters, see our two-page mind control summary at http://www.WantToKnow.info/mindcontrol or even better, the information-packed 10-page summary at http://www.WantToKnow.info/mindcontrol10pg. By informing your friends and colleagues of these little-reported facts, you can help to build the critical mass necessary to force the media to give adequate coverage and stop these abuses. Let us work towards ever greater transparency both in government and in our own personal lives. Thanks for caring.

With very best wishes,
Fred Burks for the WantToKnow.info team
See our archive of deep insider emails at http://www.WantToKnow.info/coveruparchive

Explore these empowering websites coordinated by Fred:
http://www.momentoflove.org - Every person in the world has a heart
http://www.WantToKnow.info - Revealing major cover-ups & working together for the good of all
http://www.gcforall.org - Building a Global Community for All
http://www.weboflove.org - Strengthening the Web of Love that interconnects us all
Together, we are creating a new paradigm of love and cooperation on Earth
 
 

20050201

 
the offices of
Dewey, Cheetum & Howe
The Secret List of ID Theft Victims
Consumers could be warned, but U.S government isn't talking
By Bob Sullivan - Technology correspondent - Updated: 12:22 p.m. ET Jan. 29, 2005
http://www.msnbc.msn.com/id/6814673
contributing editors to   - Rodger

Linda Trevino, who lives in a Chicago suburb, applied for a job last year at a local Target department store, and was denied.  The reason? She already worked there -- or rather, her Social Security number already worked there.

Follow-up investigation revealed the same Social Security number had been used to obtain work at 37 other employers, mostly by illegal immigrants trying to satisfy government requirements to get a job.

Trevino is hardly alone. MSNBC.com research and government reports suggest hundreds of thousands of American citizens are in the same spot -- unknowingly lending their identity to illegal immigrants so they can work. And while several government agencies and private corporations sometimes know whose Social Security numbers are being ripped off, they won't notify the victims. That is, until they come after the victims for back taxes or unpaid loans owed by the imposter.

It's a thorny problem that cuts to the heart of America's undocumented worker issue. Immigration opponents say it's another reason to shut the borders tight; immigrant rights groups point out that identity theft is an inevitable outcome of unfair labor laws that push foreign visitors deeper into the shadows.

Either way, immigrant imposters with the least nefarious of intentions -- simply a desire to work -- often unknowingly victimize the rightful Social Security number holders. The problem is compounded by how often ripped-off numbers are used. James Lee, chief marketing officer for private data collection firm ChoicePoint, said the average victim of immigrant-based identity theft sees their Social Security number shared about 30 times.

"The numbers get passed around a family, and around neighborhoods," he said.

"People need to wake up to this problem," said Richard Hamp, an assistant attorney general for the state of Utah who has prosecuted several cases involving stolen IDs and illegal immigrants. "They are destroying people's credit, Social Security benefits, and everything else. This problem has been ignored by the federal government, and it's enormous."

But could Trevino, and all the other victims, be warned by the government? After all, several agencies and corporations found her when they wanted her money. Until then, not a single one had bothered to warn her that someone else was using her Social Security number.

Melody Millet's husband Steve was the victim of immigrant identity theft. None of the agencies involved are trying to tackle the problem because they all benefit from it, as does corporate America, she said. The IRS and Social Security collect extra taxes, lenders sell more loans and employers get inexpensive workers. Fixing the problem and telling all the victimized consumers would upset the delicate apple cart that is America's immigration policy, she said.

"The government is forcing people to share identities because they want to provide cheap labor to corporate America," Melody Millet said.

An undocumented immigrant worker managed to use Steve Millet's Social Security number for more than 10 years before the incident was discovered. Millet said the imposter managed to obtain a dozen credit cards, buy a car, and even a house using the stolen number and his own name.  All the while, that imposter paid taxes, paid into Social Security, and took out loans using the stolen Social Security Number. All of those agencies had a record of the abused SSN; none bothered to tell Steve Millet.

"You can't find out except by accident," Melody Millet said. "They are not required to notify us. No one is required to notify you. The way it sits now, our lives were ruined. We will never have again a normal financial life."

$420 billion in accounting limbo
Quantifying the problem of immigrant imposters is a challenge; neither the IRS nor the Social Security Administration has tried. But there are some solid hints suggesting hundreds of thousands of people are currently at risk, right now lending their identity to an undocumented worker.

With every paycheck, U.S. workers pay FICA taxes, destined for Social Security funds. But each year, millions of payments are made to the agency with mismatched names and numbers. The Social Security Administration has no idea who deserves credit for the taxes paid by those wage earnings -- so no one gets it. The amount of uncredited Social Security wages is now an enormous $420 billion, an amount that sits in what's called the Earnings Suspense File, an accounting limbo.

During 2002, the year with the most recent figures available, 9 million people paid taxes with mismatched names and Social Security Numbers. Some were women who had failed to notify the agency that their name changed after marriage. Some were the result of typographical errors.

But most -- between 50 and 80 percent depending on whom you talk to -- represent illegal immigrants using a stolen or manufactured Social Security number at the workplace.

The amount of money headed for the Earnings Suspense File began to skyrocket after 1986, when a new federal law required workers to produce Social Security cards to get employment.

In 2001, Social Security reports indicated 35 percent of the wages in the fund were earned by workers in California. In 2002, about 46 percent of the wages that ended up in the fund come from immigrant-heavy industries like agriculture, restaurants and other services, according to Social Security's Office of Inspector General. Both facts suggest to analysts that much of the fund is the result of payments made by undocumented immigrant workers.

What's unclear is how many of those millions of payments made by undocumented workers are made using someone else's Social Security numbers. Audits show that many are made with manufactured numbers, such as 000-00-0000. But people familiar with the data say the list would point to hundreds of thousands of identity theft victims.

“(The list) would be a terrific source of leads for the identity remediation effort, but there are so many other compelling workloads in front of (SSA) I don't know what can they do with that today," he said. "Also, the politics of immigration get involved in this.”

A spokesman for the Social Security Administration said the agency simply couldn't disclose the information to consumers because doing so would run afoul of federal law.

"That information is considered to be tax return information, and it's governed under the Internal Revenue code," said Social Security's Mark Lassiter.  "There are strict limitations on disclosure.  Can someone see if anyone else has reported earnings under their Social Security number? The answer would be no."

The IRS also receives payments from mismatched names and numbers, and has access to the same no-match list created by Social Security. But according to IRS spokesman Anthony Burke, the agency doesn't check for number-name mismatches until it processes tax returns.  And it does not have a mechanism for informing the rightful Social Security number holder that someone else has filed a return using that number.

When tax returns are filed with wrong Social Security numbers -- some 500,000 were filed last year -- the agency simply notifies the filer in writing. The rightful number holder isn't told, because there is no way to know why the wrong number was used, Burke said.

Credit reports don't help
How can a consumer unravel the secret life of their Social Security number? In fact, since neither the government nor private industry is speaking out, there is no way. Asking the Social Security Administration or IRS won't help.

Most consumers only discover the situation when their imposters take the next step up the economic ladder, securing credit using the stolen number. And even then, the victims may not be told unless the imposter misses a loan payment or otherwise sends creditors hunting for their money. That's because thanks to a quirk in the credit system, credit obtained by imposters using their real name but a stolen Social Security number doesn't appear on the victim's credit report.

This so-called "SSN-only" identity theft poses a unique set of problems for consumers and the nation's credit bureaus. If credit is granted by a lender, an entry is made in credit bureau files -- but not disclosed to the consumer who properly owns that number. Even when a consumer gets a copy of her credit report, such fraudulent accounts don't appear on the report. Instead, the bureaus create what are sometimes called "subfiles," which act like separate identities in their databases.

In fact, consumer credit reports obtained from the credit bureaus expressly leave off this kind of fraud. If an imposter is using a consumer's Social Security number but his own name and address to open up fraudulent accounts, a consumer-disclosed credit report won't include that information. The rightful number holder will never know.

Businesses interested in giving credit to a consumer can pay to see any activity connected to a particular Social Security number; consumers cannot.

A lender, however, might find out -- even see all the accounts an imposter has opened using a victim's Social Security number.

Millet, who has sued the credit bureaus, said her husband was denied a credit card even though his credit report was spotless, and he had a superb credit score of 700.

Businesses interested in giving credit to a consumer can pay to see any activity connected to a particular Social Security Number; consumers cannot.  All three credit bureaus sell specialized services with names like "Social Search," that track the entire history of a Social Security number. The services are not available to consumers.

Privacy concerns prevent consumers from seeing a Social Security number-only report, said Equifax's David Rubinger.

"Companies that have signed agreements with us can access data like that. But we can't let every consumer see it," he said. It would be difficult for the firm to establish definitively who the rightful Social Security number holder is, he said. And there would still be potentially sticky privacy issues related to revealing the imposter's information.

Don Girard, a spokesman for Experian, acknowledged his firm had seen the problem, but said it was extremely rare.

"I can tell you we have quite a few people looking into this," he said.

Trans Union did not respond to requests for interview for this report.

=---------------------------=
FACT FILE Your ID's been stolen. Now what?

Step 1: Protect your finances
Contact the fraud departments of each of the three major credit bureaus.
Get a copy of your credit report, which is free to ID theft victims. Ask that your file be flagged with a "fraud alert tag" and a "victim's statement." That will limit the thief’s ability to open new credit accounts, as new creditors will call you before granting credit, generally. Insist, in writing, that the fraud alert remain in place for seven years, the maximum, according to PrivacyRights.org.

Credit bureaus
Equifax
1-800-525-6285
www.equifax.com
Experian
1-888-397-3742
www.experian.com
TransUnion
1-800-680-7289
www.tuc.com

Step 2: File a police report
You will need a police report to dispute unauthorized charges and for any insurance claims. Be persistent; your local police department may suggest that this isn’t necessary, because they don’t want the paperwork hassle. Also, fill out an online ID Theft complaint with the Federal Trade Commission or call 1-877-ID-THEFT.
That enters your case in the FTC’s “Consumer Sentinel” database, a nationwide list of ID theft cases which can be used by law enforcement officers to find patterns and catch criminals.

Step 3: Close all compromised accounts
The list may be wider than you realize. This includes accounts with banks, credit card companies and other lenders, and phone companies, utilities, ISPs, and other service providers. Dispute all unauthorized charges – The FTC offers a sample dispute letter on its Web site. Disputes may require a sworn statement and a police report. The FTC also offers a form affidavit which can be used for the sworn statement at www.ftc.gov/bcp/conline/pubs/credit/affidavit.pdf .

More help

# More detailed 17-step plan to follow if your ID is stolen
www.privacyrights.org/identity.htm
# “When bad things happen to your good name” – FTC document full of sample dispute letters and other recovery procedures.
www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm
# U.S. Department of Justice ID Theft kit
www.usdoj.gov/criminal/fraud/idtheft.html
# Identity Theft Resource Center
www.idtheftcenter.org
# ID theft laws vary by state – here’s a list of state laws
www.consumer.gov/idtheft/federallaws.html#statelaws
# Michigan State University School of Criminal Justice ID Theft page
www.cj.msu.edu/~outreach/identity

=---------------------------=

'Total purgatory' for taxpayers
Frustration can mount for victims of this kind of fraud. Eventually, the government agencies involved do catch up with the legitimate consumers; but often, not until they are looking for money. Victims can have trouble getting disability or unemployment benefits, Utah's Hamp said.

Others find the Internal Revenue Service on their backs, looking for payment of back taxes for wages earned by their imposters. Some see refunds held up by the confusion; others see their wages garnished.

Trevino found herself in a financial nightmare. All those imitators made a mess out of her work history, her Social Security benefits records and her credit report. She was haunted by bills and creditors. She received threatening letters from the IRS, asking her to pay taxes on money earned by her imposters. She was told to re-pay unemployment benefits she had received, after the government discovered she was "working" while drawing benefits.

"At the time I'm thinking, 'I'm unemployed. I wish I could have at least one job, let alone all these different jobs,’" she said.

"This is total purgatory that this puts U.S. citizen taxpayers into," said Marti Dinerstein, president of Immigration Matters, a public-policy analysis firm in New York.  "It's a nightmare to get it stopped. And when they do get it stopped, it is only for that particular year. The whole mess could begin anew next tax season."

But neither the Social Security Administration nor the IRS tells consumers that something unusual is happening with their Social Security numbers.  It seems consumers are the last ones in on the joke.

“This is the schizophrenia of the federal government," Huse, the former Social Security inspector general said.  "The Homeland Security people are screaming about the accuracy of records, and you have the IRS taking money from wherever it comes."

Mismatches go unchecked
Since the Immigration Reform and Control Act of 1986, workers must produce a Social Security card or similar identity verification when obtaining employment.  Employers are supposed to verify that the card is legitimate, but many don't.

By creating a black market for counterfeit Social Security cards, the law may have inadvertently kicked off the identity theft crisis, experts say.

"It's truly an unintended consequences of the 1986 immigration law," said Marilanne Hincapie of the National Immigration Law Center. "That’s why there is this need for comprehensive immigration reform."

For now, with the tacit approval from all involved, undocumented workers buy counterfeit cards from suppliers who steal or simply manufacture Social Security numbers.

About 90 percent of the time in cases he's investigated, Utah's Hamp said, the numbers used belong to a real person. But even in the other cases, there's still harm done: the number may be issued in the future, meaning a baby may be born with a surprising financial past.

"You could end up at birth with a bad credit history and a work record," Hamp said.

The Social Security Administration has made some efforts to straighten out its records, sending letters to hundreds of thousands of businesses, asking that they follow-up on name/number mismatches.

In 2002, the agency sent 900,000 letters to companies that had workers using erroneous names or numbers. The letters confused employers and employees alike: some workers fled immediately, other employers fired workers on the spot.

Immigration rights groups objected, pointing out that inclusion in a no-match list was not an automatic indicator of illegal status. The effort did little to reduce the Earnings Suspense File or fix Social Security accounting, so the agency backed off.

Meanwhile, the IRS, which is charged with enforcing the requirement that employers collect accurate Social Security number data, has never once levied a fine against a corporation for failing to do so.

Change tied up with key policy shifts
The issue of Social Security number abuse is getting some attention as the Bush administration presses ahead on two related issues: Social Security reform and undocumented worker legalization.

The single best way to reduce the amount of entries into the Earnings Suspense File -- and remove the need for immigrant identity theft -- would be to provide a path to legal status for undocumented workers.

On the other hand, removing items from that file would actually increase future liabilities for Social Security, since more wage earners would have a claim on future Social Security payments, adding a bit of fuel for those who warn about Social Security deficits looming in the future.

As things stand, payments made by workers that land in the Earnings Suspense File -- for 2002, Social Security taxes paid on wages of $56 billion -- represent essentially free money to the system, since they come with no future payout liabilities.

In the meantime, neither the Social Security Administration nor the IRS has any public plans to attempt to notify consumers who might be sharing their identity with an undocumented worker -- or 30.

Telling the number's rightful holder that someone else is using it might create more panic then necessary, some Social Security investigators said -- and there's not a lot of good advice the agency could offer, anyway. There's little a victim could do at that point. Uncovering just who is the rightful owner of the Social Security number -- and who is the imposter -- could also pose a challenge. So would finding correct contact information for victims.

Betsy Broder, the attorney in charge of the Federal Trade Commission's efforts to combat identity theft, said more government coordination is surely needed, but she sympathized with the challenge facing the IRS and SSA.

"Of course consumers are always better off if they know how their information is being misused. But having said that, it's really complex with federal agencies," she said. "There are restrictions under the Privacy Act. You can't release to one person another person's information. And the agencies are often not in a position to know with any certainty who was the right person and who was the imposter, leading to possible problems with unauthorized disclosure of information."

The credit bureaus cite much the same concerns, indicating they simply couldn't sell Social Security number-search tools to any consumer who wants them. Even data aggregators like ChoicePoint don't sell such a product to consumers.

Millet thinks there's another motivation for agencies to not deal with the problem. Everyone except the consumer is profiting from the situation, she said. Notifying every consumer whose number is being misused by someone else would be disruptive to the American workforce, and would force government agencies to face the sticky undocumented worker problem.

"If there was no issue, the government would issue work visas to all of them," she said. "But if we gave them all their own Social Security numbers, they'd be able to compete for real wages. That's why no one is dealing with this."

Bob Sullivan is author of Your Evil Twin: Behind the Identity Theft Epidemic.
 
 
H U M O R
Those were the Good Ole Days
What Was My Mother Thinking?
contributing editors to   - Dan and Diana

My Mom used to cut chicken, chop eggs and spread mayo on the same cutting board with the same knife and no bleach, but we didn't seem to get food poisoning.

My Mom used to defrost hamburger on the counter AND I used to eat it raw sometimes too, our school sandwiches were wrapped in wax paper in a brown paper bag not in icepack coolers, but I can't remember getting e coli?

Almost all of us would have rather gone swimming in the lake instead of a pristine pool (talk about boring), no beach closures then.

The term cell phone would have conjured up a phone in a jail cell, and a pager was the school PA system.

We all took gym, not PE... and risked permanent injury with a pair of high top Ked's (only worn in gym) instead of having cross-training athletic shoes with air cushion soles and built in light reflectors. I can't recall any injuries but they must have happened because they tell us how much safer we are now.

Flunking gym was not an option... even for stupid kids! I guess PE must be much harder than gym.

Every year, someone taught the whole school a lesson [and provided comic relief] by running in the halls with leather soles on linoleum tile and hitting the wet spot. How much better off would we be today if we only knew we could have sued the school system.

Speaking of school, we all said prayers and sang the national anthem and staying in detention after school caught all sorts of negative attention. We must have had horribly damaged psyches.

I can't understand it. Schools didn't offer 14 year olds an abortion or condoms (we wouldn't have known what either was anyway) but they did give us a couple of baby aspirin and cough syrup if we started getting the sniffles.

What an archaic health system we had then. Remember school nurses? Ours wore a hat and everything.

I thought that I was supposed to accomplish something before I was allowed to be proud of myself.

I just can't recall how bored we were without computers, Play Station, Nintendo, X-box or 270 digital TV cable stations.

I must be repressing that memory as I try to rationalize through the denial of the dangers could have befallen us as we trekked off each day about a mile down the road to some guy's vacant lot, built forts out of branches and pieces of plywood, made trails, and fought over who got to be the Lone Ranger. What was that property owner thinking, letting us play on that lot? He should have been locked up for not putting up a fence around the property, complete with a self-closing gate and an infrared intruder alarm.

Oh yeah... and where was the Benadryl and sterilization kit when I got that bee sting? I could have been killed!

We played king of the hill on piles of gravel left on vacant construction sites and when we got hurt, Mom pulled out the 48 cent bottle of Mercurochrome (kids liked it better because it didn't sting like iodine did) and then we got our butt spanked. Now it's a trip to the emergency room, followed by a 10-day dose of a $49 bottle of antibiotics and then Mom calls the attorney to sue the contractor for leaving a horribly vicious pile of gravel where it was such a threat.

We didn't act up at the neighbor's house either because if we did, we got our butt spanked (physical abuse) here too .. and then we got butt spanked again when we got home.

Mom invited the door to door salesman inside for coffee, kids choked down the dust from the gravel driveway while playing with Tonka trucks (Remember why Tonka trucks were made tough ... it wasn't so that they could take the rough Berber in the family room), and Dad drove a car with leaded gas.

Our music had to be left inside when we went out to play and I am sure that I nearly exhausted my imagination a couple of times when we went on two week vacations. I should probably sue the folks now for the danger they put us in when we all slept in campgrounds in the family tent.

Summers were spent behind the push lawn mower and I didn't even know that mowers came with motors until I was 13 and we got one without an automatic blade-stop or an auto-drive.

How sick were my parents? Of course my parents weren't the only psychos. I recall Donny Reynolds from next door coming over and doing his tricks on the front stoop just before he fell off. Little did his Mom know that she could have owned our house. Instead she picked him up and swatted him for being such a goof. It was a neighborhood run amuck.

To top it off, not a single person I knew had ever been told that they were from a dysfunctional family. How could we possibly have known that? We needed to get into group therapy and anger management classes?

We were obviously so duped by so many societal ills, that we didn't even notice that the entire country wasn't taking Prozac! How did we survive?

Wonder why the dramatic change in our society in such a few short years?  Wonder who profits from these new "regulations"?
 
 
I N S I G H T
Archeologist Unearths Biblical Controversy
http://www.stevequayle.com/Giants/Ancient.Civ_Technol/050128.Bible.contro.html
January 26, 2005 - Globe and Mail

Canadian archeologist Russell Adams's interest is in Bronze Age and Iron Age copper production. He never intended to walk into archeology's vicious debate over the historical accuracy of the Old Testament -- a conflict likened by one historian to a pack of feral canines at each other's throats.

Yet by coincidence, Prof. Adams of Hamilton's McMaster University says, he and an international team of colleagues fit into place a significant piece of the puzzle of human history in the Middle East -- unearthing information that points to the existence of the Bible's vilified Kingdom of Edom at precisely the time the Bible says it existed, and contradicting widespread academic belief that it did not come into being until 200 years later.

Their findings mean that those scholars convinced that the Hebrew Old Testament is at best a compendium of revisionist, fragmented history, mixed with folklore and theology, and at worst a piece of outright propaganda, likely will have to apply the brakes to their thinking.

Because, if the little bit of the Old Testament's narrative that Prof. Adams and his colleagues have looked at is true, other bits could be true as well.

References to the Kingdom of Edom -- almost none of them complimentary -- are woven through the Old Testament. It existed in what is today southern Jordan, next door to Israel, and the relationship between the biblical Edomites and Israelites was one of unrelenting hostility and warfare.

The team led by Prof. Adams, Thomas Levy of the University of California at San Diego and Mohammad Najjar of the Jordanian Department of Antiquities was investigating copper mining and smelting at a site called Khirbat en-Nahas, by far the largest copper-production site in the region.

They applied high-precision radiocarbon-dating methods to some of their finds, and as they say in the British journal Antiquities, "The results were spectacular."

They firmly established that occupation of the site began in the 11th century BC and a monumental fortress was built in the 10th century BC, supporting the argument for existence of an Edomite state at least 200 years earlier than had been assumed.

What is particularly exciting about their find is that it implies the existence of an Edomite state at the time the Bible says King David and his son Solomon ruled over a powerful united kingdom of Israel and Judah.

It is the historical accuracy -- the very existence of this united kingdom and the might and splendour of David and Solomon, as well as the existence of surrounding kingdoms -- that lies at the heart of the archeological dispute.

Those scholars known as minimalists argue that what is known as "state formation" -- the emergence of regional governments and kings -- did not take place in the area until the imperialistic expansion of the Assyrian empire in the 8th century BC, so David and Solomon, rather than being mighty monarchs, were mere petty chieftains.

And because everything that takes place in the Middle East inevitably is political, the minimalist argument is seen as weakening modern Israel's claim to Palestine.

In the biblical narrative, the Edomites are the descendents of Esau, whose blessing from his father, Isaac, was stolen by his younger brother, Jacob, ancestor of the Israelites. (Fans of the British satirical-comedy group Beyond the Fringe will recall how Jacob pulled off the theft by presenting himself as the hirsute Esau to their blind father, saying in an aside: "My brother Esau is an hairy man, but I am a smooth man.")

The Edomites are lambasted in the Bible for refusing to let the Israelites rest on their land as they flee Egypt. God declares obscurely: "Over Edom will I cast out my shoe." The Israelites grumble enviously that there were kings of Edom before there were kings of Israel -- a highly significant passage because it implies that state formation occurred in Edom before it happened in Israel.

Finally, there is the biblical account of David's war against the Edomites, in which David and his general, Joab, kill 18,000 Edomites and establish military control over them by "putting garrisons throughout all Edom."

Irish scholar John Bartlett, one of the world's great experts on the Edomites, dates the battle at 990 to 980 BC, precisely when Prof. Adams and his colleagues date the fortress.

Says Prof. Adams: "This battle between the Israelites and the Edomites, although not possible to document, is typical of the sort of border conflicts between Iron Age states. And the evidence of our new dates at least proves that it may, in fact, be possible to place the Edomites in the 10th century [BC] or earlier, which now supports the chronology of the biblical accounts.

"It is intriguing that at Khirbat en-Nahas, our large Iron Age fort is dated to just this period, suggesting conflict as a central concern even at a remote copper-production site."

He concludes: "We're not out to prove the Bible right or wrong. We're not trying to be controversial. We're just trying to be good anthropologists and scientists, and tell the story of our archeological site."

Source : The Globe and Mail
http://www.chn.ir/english/eshownews.asp?no=4648

The original paper is located at this site
http://weber.ucsd.edu/Depts/Anthro/classes/tlevy/Fidan/JHF/Publiish.htm

and one of the specific papers is here
http://weber.ucsd.edu/Depts/Anthro/classes/tlevy/Fidan/JHF/KHI_antiquity.pdf
a copy is also available here on this domain

and another of the specific papers is here
http://weber.ucsd.edu/Depts/Anthro/classes/tlevy/Fidan/JHF/Shasu.pdf
a copy is also available here on this domain
 
 



for our use
 
the offices of
Dewey, Cheetum & Howe

 
I am from the gubment, 
& am here to help you - NOT

 
a r t i c l e   /   c o m m e n t a r y

 
I N S I G H T

 
H U M O R

 
Health / nutrition

 
The Flat Earth Report

 
duh

 
R e s p o n s e

goto top .....mailto: rockyview@tellme#&1st.net
The above addresss is NOT correct.  For security reasons, the "#&" characters must be removed to be a correct address.  This reduces the possibility of a hacker autosearching for address links.
Simply copy and paste this address in your mail program, BUT remember to delete the "#&" characters.