From:

http://www.worldnetdaily.com/bluesky_smith/20000621_xcsof_bill_clint.shtml

The recent loss of nuclear weapon secrets at Los Alamos shows
exactly how far we have come under President Clinton.  Much like
Hillary Clinton's billing records from the Rose Office Law firm,
the disks containing nuclear weapon secrets have suddenly
reappeared from the Twilight Zone.

One media pundit noted that there was more security to check out
a "Winnie the Pooh" book from your local library than nuclear
secrets at the nuclear weapons labs.  This comment brought a fast
response from Energy Secretary Richardson, who noted on a Sunday
talk show that the stories comparing Winnie the Pooh and nuclear
secrets were simply "false."

However, on May 7, 1999, addressing the National Academy of
Sciences, U.S. Energy Secretary Bill Richardson urged scientists
to fight congressional efforts to restrict foreign scientific
exchanges and cautioned against an "overreaction" by the Congress
to the China nuclear spy scandal.

"I need your help in fighting some very unguided efforts in
Congress to curb the foreign scientist program," Richardson
pleaded. "I think it would hurt our national security if there
were restrictions on sensitive countries like Russia and China. I
don't want those restrictions."

The single most glaring flaw at Los Alamos is that nuclear
secrets can be checked out by anyone inside a secure area - an
honor system requiring neither log nor signature.  The problem
with an honor system for nuclear weapons is that unauthorized
people can and often do get inside high security areas.

The most recent example occurred earlier this year when FBI
officials caught a Russian agent using an electronic listening
device hidden inside a secure meeting room inside the State
Department.  The bugging incident was immediately followed by the
discovery that a State Department laptop filled with top-secret
data was also missing.  The State Department laptop has not been
recovered.

There were warnings about the national security threats and lack
of action inside the Clinton administration.  In 1999 the General
Accounting Office tested the physical security of both the State
Department, and the Federal Aviation Administration. GAO
inspectors were able to penetrate secure areas including the
offices of the Secretary of State, and critical air traffic
computer rooms inside FAA facilities.  The GAO auditors warned of
the growing security problems during congressional testimony.

"We found significant weaknesses that compromise the integrity of
FAA's air traffic control operations," stated the GAO auditor.
"This review resulted in a number of findings too sensitive to
discuss in today's open hearing; accordingly, my statement will
refer only to findings and recommendations contained in the
unclassified version of our limited official use report.  We can
tell you openly, though, that we found evidence of air traffic
control systems that had been penetrated, and critical ATC data
had been compromised."

The compromise of security at the Federal Aviation
Administration, the State Department and the Energy Department is
symptomatic of the entire U.S. government under President
Clinton.  Energy Secretary Richardson was not the only Clinton
administration cabinet member to choke on security problems
during the Sunday talk shows.  Newly appointed Gore campaign
chairman William Daley noted that his experience as Commerce
Secretary had led him to the conclusion that there were simply
"too many secrets."

Ironically, the Commerce Department under William Daley approved
the sale of hundreds of super-computers to Indian, Chinese and
Russian nuclear weapons labs.  More than half of all computer
exports to China consisted of high-performance computers.  China
now has over 400 high-performance machines, needed to process the
American nuclear codes and to simulate the workings of our
arsenal, as well as to test Chinese nuclear weapons.

For example, Daley's Commerce Department approved super-computer
exports to:

* The National University of Defense Technology, which helps the
Chinese military design advanced weapons;

* The University of Electronic Science and Technology, which
helps develop stealth aircraft and advanced military radar; and

* The Beijing University of Aeronautics and Astronautics, which
helps develop missiles and specializes in guidance, navigation
and flight dynamics.

In his world of too many secrets, Secretary Daley also failed to
mention Commerce employee Ira Sockowitz who walked out of a
secure area with over 2,000 pages of secrets.  Ira Sockowitz was
not suppose to remove the secrets from the secure area inside the
Commerce Department but did so using an honor system, requiring
no check out procedures.  Sockowitz removed data on uranium deals
with Russia, exports of satellites to China, a top-secret report
from the National Security Agency on encryption and the complete
dossiers of the entire Bosnian/Croat leadership.  Ira Sockowitz
has never been prosecuted nor even charged for his violation by
the politically sensitive Secretary Daley.

Recent events at Los Alamos are part of a long string of national
security failures inside the Clinton administration. One
lesser-known violation occurred in August 1999 when U.S. Attorney
Joan Evans released a secret Defense Intelligence Agency report
by mistake.  The document contained the names of Defense
Intelligence Agency officers.  The document was sent to this
reporter and published on the Internet as part of the China-Gate
lawsuit.

The security breach by U.S. Attorney Joan Evans disclosed the
identity of the DIA agents and posed a direct threat to their
lives.  Once the mistake was discovered, the DIA requested that
the names of the agents be withheld under "Title 10, United
States Code" to protect their identity.

In response to the threat, the Clinton administration acted
quickly - to cover the whole affair up.  U.S. Attorney Evans
successfully pressed Federal Judge Robert Payne to issue a court
order against this reporter to remove the secret Defense
Intelligence Agency report from the Internet.  Judge Payne did
note that the document had been compromised because it had been
downloaded from the Internet several thousand times.  Ms. Evans
has not been investigated, reprimanded, removed nor demoted for
the security breach.

The Clinton administration, however, often is not so quick to
protect national security.  President Clinton signed the Fowler
Amendment into law on October 17, 1998, requiring that a list of
companies controlled by Communist China's People's Liberation
Army be published in the Federal Register by January 15, 1999. So
far, President Clinton has ignored the law and refused to reveal
the Chinese Army-owned businesses operating in America.

According to House members, the Clinton White House claimed in
September 1999 to have assigned the task of identifying the
Chinese Army companies to the Defense Intelligence Agency.  The
DIA, however, has quietly informed congressional leaders that the
White House did not ask them to prepare such a list.  Thus, the
identity of the Chinese Army front companies operating inside the
United States continues to go unreported.

The loss of top secret nuclear weapons data at the U.S. Energy
Department has inspired mainstream media pundits to equate the
Clinton administration with the Keystone Cops, a silent film
comedy act.  Unfortunately, the comparison is incorrect since the
Keystone Cops had to work hard to be a comedy act.  The comedy of
national security errors under President Clinton appears to come
naturally.

=================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

  FROM THE DESK OF:                    <[EMAIL PROTECTED]>
                      *Mike Spitzer*     <[EMAIL PROTECTED]>
                         ~~~~~~~~          <[EMAIL PROTECTED]>

   The Best Way To Destroy Enemies Is To Change Them To Friends
       Shalom, A Salaam Aleikum, and to all, A Good Day.
=================================================================

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html
<A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to