Thursday, March 05, 2009

Playing the Banking Game

How Cash Starved States can Create their Own Credit

By Ellen Brown

Global Research, March 3, 2009
webofdebt.com


“He that will not apply new remedies must expect new evils; for time is the greatest innovator.”

~~~ Francis Bacon

On February 19, 2009, California narrowly escaped bankruptcy, when Governor Arnold Schwarzenneger put on his Terminator hat and held the state senate in lockdown mode until they signed a very controversial budget.1 If the vote had failed, the state was going to be reduced to paying its employees in I.O.U.s. California avoided bankruptcy for the time being, but 46 of 50 states are insolvent and could be filing Chapter 9 bankruptcy proceedings in the next two years.2

One of the four states that is not insolvent is an unlikely candidate for the distinction – North Dakota. As Michigan management consultant Charles Fleetham observed last month in an article distributed to his local media:

“North Dakota is a sparsely populated state of less than 700,000, known for cold weather, isolated farmers and a hit movie – Fargo. Yet, for some reason it defies the real estate cliché of location, location, location. Since 2000, the state’s GNP has grown 56%, personal income has grown 43%, and wages have grown 34%. This year the state has a budget surplus of $1.2 billion!”

What does the State of North Dakota have that other states don’t? The answer seems to be: its own bank. In fact, North Dakota has the only state-owned bank in the nation. The state legislature established the Bank of North Dakota in 1919. Fleetham writes that the bank was set up to free farmers and small businessmen from the clutches of out-of-state bankers and railroad men. By law, the state must deposit all its funds in the bank, and the state guarantees its deposits. Three elected officials oversee the bank: the governor, the attorney general, and the commissioner of agriculture. The bank’s stated mission is to deliver sound financial services that promote agriculture, commerce and industry in North Dakota. The bank operates as a bankers’ bank, partnering with private banks to loan money to farmers, real estate developers, schools and small businesses. It loans money to students (over 184,000 outstanding loans), and it purchases municipal bonds from public institutions.

Still, you may ask, how does that solve the solvency problem? Isn’t the state still limited to spending only the money it has? The answer is no. Certified, card-carrying bankers are allowed to do something nobody else can do: they can create “credit” with accounting entries on their books.

Read Now: http://www.globalresearch.ca/index.php?context=va&aid=12522

Endurance

“Find out just what the people will submit to and you will have found out the exact amount of injustice and wrong which will be imposed upon them; and these will continue until they are resisted with either words or blows, or both. The limits of tyrants are prescribed by the endurance of those whom they oppress.”

~~~ Frederick Douglas

Reputations

“One of the best ways to get yourself a reputation as a dangerous citizen these days is to go about repeating the very phrases which our founding fathers used in the great struggle for independence.”

~~~ Charles Austin Beard (1874-1948)

Lions

"Until lions have their historians, tales of the hunt shall always glorify the hunter"

~~~African proverb

‘Accidental’ Contamination Of Vaccine With Live Avian Flu Virus Virtually Impossible

Paul Joseph Watson
Prison Planet.com
Thursday, March 5, 2009

Czech newspapers are questioning if the shocking discovery of vaccines contaminated with the deadly avian flu virus which were distributed to 18 countries by the American company Baxter were part of a conspiracy to provoke a pandemic.

The claim holds weight because, according to the very laboratory protocols that are routine for vaccine makers, mixing a live virus biological weapon with vaccine material by accident is virtually impossible.

“The company that released contaminated flu virus material from a plant in Austria confirmed Friday that the experimental product contained live H5N1 avian flu viruses,” reports the Canadian Press.

Baxter flu vaccines contaminated with H5N1 - otherwise known as the human form of avian flu, one of the most deadly biological weapons on earth with a 60% kill rate - were received by labs in the Czech Republic, Germany, and Slovenia.

Initially, Baxter attempted to stonewall questions by invoking “trade secrets” and refused to reveal how the vaccines were contaminated with H5N1. After increased pressure they then claimed that pure H5N1 batches were sent by accident. This was seemingly an attempt to quickly change the story and hide the fact that the accidental contamination of a vaccine with a deadly biological agent like avian flu is virtually impossible and the only way it could have happened was by wilful gross criminal negligence.

Go Here Now: copy/paste

http://www.prisonplanet.com/accidental-contamination-of-vaccine-with-live-avian-flu-virus-virtually-impossible.html

SSD Project

The SSD Project

The Electronic Frontier Foundation (EFF) has created this Surveillance Self-Defense site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.

Surveillance Self-Defense (SSD) exists to answer two main questions: What can the government legally do to spy on your computer data and communications? And what can you legally do to protect yourself against such spying?

After an introductory discussion of how you should think about making security decisions — it's all about risk management — we'll be answering those two questions for three types of data:

First, we're going to talk about the threat to the data stored on your computer posed by searches and seizures by law enforcement, as well as subpoenas demanding your records.

Second, we're going to talk about the threat to your data on the wire — that is, your data as it's being transmitted — posed by wiretapping and other real-time surveillance of your telephone and Internet communications by law enforcement.

Third, we're going to describe the information about you that is stored by third parties like your phone company and your Internet service provider, and how law enforcement officials can get it.

In each of these three sections, we're going to give you practical advice about how to protect your private data against law enforcement agents.

In a fourth section, we'll also provide some basic information about the U.S. government's expanded legal authority when it comes to foreign intelligence and terrorism investigations.

Finally, we've collected several articles about specific defensive technologies that you can use to protect your privacy, which are linked to from the other sections or can be accessed individually. So, for example, if you're only looking for information about how to securely delete your files, or how to use encryption to protect the privacy of your emails or instant messages, you can just directly visit that article.

Legal disclaimer: This guide is for informational purposes only and does not constitute legal advice. EFF's aim is to provide a general description of the legal and technical issues surrounding you or your organization's computer and communications security, and different factual situations and different legal jurisdictions will result in different answers to a number of questions. Therefore, please do not act on this legal information alone; if you have any specific legal problems, issues, or questions, seek a complete review of your situation with a lawyer licensed to practice in your jurisdiction.

Get The Info Here: https://ssd.eff.org/