-Caveat Lector-

--- In [EMAIL PROTECTED], [EMAIL PROTECTED] wrote:
In a message dated 7/20/2002 10:52:29 PM Pacific Daylight Time,
[EMAIL PROTECTED] writes:


>
>      Why blame China for the WTC, why not Star Wars
> technology, or is it not available yet in the United
> States?
>
> Janis
>
>

I am not blaming China alone. I am blaming the US, Israel AND China.
All
three countries have Star Wars Technology. All 3 have DIFFERENT Star
Wars
technology. The US and Israeli programs do not work particularly well
alone
or together. China's Star War Technology works better so all three
countries
are trying to merge that technology.


I would not even object to them merging the technology EXCEPT

(I am listing this chronologically so that you can see the crimes
leading up
to 911. 911 was only that last horror)

1. The technology they are trying to merge was STOLEN from my
company.  The
similar program is also being stolen from  Iraq and the Iraqis are
being
blackmailed for more information by US Sanctions. To show you the
split in
the covert Chinese/ Israeli/ US program- China is cultivating Iraq on
the
Security Council while still insisting that the sanctions remain in
place.
Then they filter the information and sell it piecemeal to the US and
Israel.
Great friends. Believe me the Iraqis beg the Chinese for everything
they get
from them.

2. My Company itself was seized.

3. illegal  contracts were made through my company CAAC and it's
parent CWM
without my knowledge or approval  CWM. Illegal transfers of
sensitive US
information were made through company couriers  without my knowledge
or
approval from LORAL, Los Alamos, Hughes to a  Chinese weapons program
that
would eventually be used against the US according to Chinese Military
sources
and Chinese scientists who had more moral character than ANY American
I ever
came across. I know how many people made it to tell me what was going
on. I
don't know how many died trying.

4. Money to fund technology transfers and scientific junkets came
from drug
networks, gun weapons dealing and prostitution. Those drug networks
use
school systems. Like Iran Contra only the funds are hidden by school
districts.

5. In order to discredit us, my husband's ID was stolen and used by
meth
rings and Chinese dope rings in San Bernadino and Alta Dena
California. Those
rings were put in business by San Bernadino Sheriff's Office and
LAPD.

4. People I care about were arrested and taken to jail in
China..members of
their family were sold into slavery or used for organ harvest.

This included

My best friend's sister who was in her 20s and an art student. In
order to
force us to give information to the Chinese Military (and US and
Israeli
Military, they just did it in China so that no one would see it) Li
Su was
taken into prostitution and drug dealing. We found her through
Chinese Gangs
in a brothel in Singapore where we were able to pay her pimps money
to hold
off Beijing long enough to get her on a flight to Canada with visa.
Instead
Beijing held her long enough to remove 1 lung and 1 kidney and then
fill her
full of pain killers and put her on a plane.

She died in a Canadian Hospital after 5 days of brain seizures.

DR Guo Baiping and his family are under arrest since 1999. Their
status is
unknown.

Dr. Wen Ho Lee of Los Alamos who has the misfortune of having a name
similar
to the CAAC courier who was used by the White House to transfer the
information to China. Chinese names are reversed-Lee Wen Ho. Try
this, Lee
Wen looks an awful lot like Lewinsky with a little bit of doctoring.
Did any
one every see the Lewinsky  entries in the White House log to see if
anyone
doctored the signature? Because someone I trust with my life told me
an
interesting story about what can be seen from knee level in the
Clinton White
house. Seems she was an eye witness.

her theme song these days is "Stay Alive".

Falun Gong computer technicians were used in the 1996 war games with
Taiwan
because APPLE and SONY had developed a neural interface  that allowed
direct
neural access to the super computers.  We were part of that team but
not the
weapons portion. In fact we actually created the interface for the
Falun gong
to use because the Falun Gong have a unique set of neuro responses
related to
their Tai Chi positions.  The APPLE Sony components are part of the
weapons
program. We used a different operating system, different hardware and
firmware. The mainland Falun Gong are being hunted down and executed
to make
sure no one ever can use them again and that they will never be able
to
access to central INTERNET nodes.

We created the program in the 1990s to make free access to
ecologically
sustainable free energy, and free telecommunications FOR EVERYONE.
Iraq was
working on the same program in the 1980s in conjunction with Israel,
the US
and China. Gerald Bull was the ONE of the  archetects of the Iraqi
program
but the Iraqi techs were the key not Bull.

The kidnappings and assassinations don't end with Chinese.

Princess Diana went to a child prostitution camp in Cambodia to check
out
part of my story. Fayad made inquiries into Iraq to validate what I
was
saying. They are both dead.

John Kennedy's sister-in-law Lauren Basset just returned from China
in early
July 1999 where she met with  Dr. Guo Baiping of CAAC. Dr Guo was
arrested
shortly after the visit. John Kennedy was on his way to speak to his
uncle
regarding that conversation and Dr. Guo's subsequent arrest.  He was
to
verify certain information with Naval Intelligence on Long Island
regarding
the existence of a US mole in naval intelligence on Taiwan and take
that
information to his uncle. His plane crashed after takeoff from Long
Island
July 16, 1999. He, his wife and sister in law were killed.

5. I am object that I am under constant surveillance  by all 3
countries as
if I am a criminal



6. the 3 countries are in cyber weapons race to control the
telecommunications using stolen technology.  That stolen technology
is being
used to make weapons of mass destruction. Would you trust these
people to
have technology that would make them omnipotent?  If they were
trustworthy
they would have made a treaty with Hussein in 1988 when he fast
asked. If
they were trustworthy they would not have seized and arrested our
people. (I
am not even counting the Israelis as a serious contender in this)


But they cannot ask us for this information. No one trusts them.  So
they
have to steal it and test it on their own.  They cannot make it work
and God
help us if they ever do.

I believe 911 was a test of that system.  And  it failed. I sent
someone to
NY the week of Sept 11 to talk to Chinese about  why I was told
Murdoch
transferred information from our company Sept 6th 2001  to the DOD.
Since
the 2 systems are significantly different, the CAAC system has to be
adapted
to the US operating system and hardware and it has to be tested.  The
Chinese
military acts as an intermediary. They are trying to create
interfaces
between the stolen program  and the US and Israeli weapon systems.
--- End forwarded message ---

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to