-Caveat Lector- --- In [EMAIL PROTECTED], [EMAIL PROTECTED] wrote: In a message dated 7/20/2002 10:52:29 PM Pacific Daylight Time, [EMAIL PROTECTED] writes:
> > Why blame China for the WTC, why not Star Wars > technology, or is it not available yet in the United > States? > > Janis > > I am not blaming China alone. I am blaming the US, Israel AND China. All three countries have Star Wars Technology. All 3 have DIFFERENT Star Wars technology. The US and Israeli programs do not work particularly well alone or together. China's Star War Technology works better so all three countries are trying to merge that technology. I would not even object to them merging the technology EXCEPT (I am listing this chronologically so that you can see the crimes leading up to 911. 911 was only that last horror) 1. The technology they are trying to merge was STOLEN from my company. The similar program is also being stolen from Iraq and the Iraqis are being blackmailed for more information by US Sanctions. To show you the split in the covert Chinese/ Israeli/ US program- China is cultivating Iraq on the Security Council while still insisting that the sanctions remain in place. Then they filter the information and sell it piecemeal to the US and Israel. Great friends. Believe me the Iraqis beg the Chinese for everything they get from them. 2. My Company itself was seized. 3. illegal contracts were made through my company CAAC and it's parent CWM without my knowledge or approval CWM. Illegal transfers of sensitive US information were made through company couriers without my knowledge or approval from LORAL, Los Alamos, Hughes to a Chinese weapons program that would eventually be used against the US according to Chinese Military sources and Chinese scientists who had more moral character than ANY American I ever came across. I know how many people made it to tell me what was going on. I don't know how many died trying. 4. Money to fund technology transfers and scientific junkets came from drug networks, gun weapons dealing and prostitution. Those drug networks use school systems. Like Iran Contra only the funds are hidden by school districts. 5. In order to discredit us, my husband's ID was stolen and used by meth rings and Chinese dope rings in San Bernadino and Alta Dena California. Those rings were put in business by San Bernadino Sheriff's Office and LAPD. 4. People I care about were arrested and taken to jail in China..members of their family were sold into slavery or used for organ harvest. This included My best friend's sister who was in her 20s and an art student. In order to force us to give information to the Chinese Military (and US and Israeli Military, they just did it in China so that no one would see it) Li Su was taken into prostitution and drug dealing. We found her through Chinese Gangs in a brothel in Singapore where we were able to pay her pimps money to hold off Beijing long enough to get her on a flight to Canada with visa. Instead Beijing held her long enough to remove 1 lung and 1 kidney and then fill her full of pain killers and put her on a plane. She died in a Canadian Hospital after 5 days of brain seizures. DR Guo Baiping and his family are under arrest since 1999. Their status is unknown. Dr. Wen Ho Lee of Los Alamos who has the misfortune of having a name similar to the CAAC courier who was used by the White House to transfer the information to China. Chinese names are reversed-Lee Wen Ho. Try this, Lee Wen looks an awful lot like Lewinsky with a little bit of doctoring. Did any one every see the Lewinsky entries in the White House log to see if anyone doctored the signature? Because someone I trust with my life told me an interesting story about what can be seen from knee level in the Clinton White house. Seems she was an eye witness. her theme song these days is "Stay Alive". Falun Gong computer technicians were used in the 1996 war games with Taiwan because APPLE and SONY had developed a neural interface that allowed direct neural access to the super computers. We were part of that team but not the weapons portion. In fact we actually created the interface for the Falun gong to use because the Falun Gong have a unique set of neuro responses related to their Tai Chi positions. The APPLE Sony components are part of the weapons program. We used a different operating system, different hardware and firmware. The mainland Falun Gong are being hunted down and executed to make sure no one ever can use them again and that they will never be able to access to central INTERNET nodes. We created the program in the 1990s to make free access to ecologically sustainable free energy, and free telecommunications FOR EVERYONE. Iraq was working on the same program in the 1980s in conjunction with Israel, the US and China. Gerald Bull was the ONE of the archetects of the Iraqi program but the Iraqi techs were the key not Bull. The kidnappings and assassinations don't end with Chinese. Princess Diana went to a child prostitution camp in Cambodia to check out part of my story. Fayad made inquiries into Iraq to validate what I was saying. They are both dead. John Kennedy's sister-in-law Lauren Basset just returned from China in early July 1999 where she met with Dr. Guo Baiping of CAAC. Dr Guo was arrested shortly after the visit. John Kennedy was on his way to speak to his uncle regarding that conversation and Dr. Guo's subsequent arrest. He was to verify certain information with Naval Intelligence on Long Island regarding the existence of a US mole in naval intelligence on Taiwan and take that information to his uncle. His plane crashed after takeoff from Long Island July 16, 1999. He, his wife and sister in law were killed. 5. I am object that I am under constant surveillance by all 3 countries as if I am a criminal 6. the 3 countries are in cyber weapons race to control the telecommunications using stolen technology. That stolen technology is being used to make weapons of mass destruction. Would you trust these people to have technology that would make them omnipotent? If they were trustworthy they would have made a treaty with Hussein in 1988 when he fast asked. If they were trustworthy they would not have seized and arrested our people. (I am not even counting the Israelis as a serious contender in this) But they cannot ask us for this information. No one trusts them. So they have to steal it and test it on their own. They cannot make it work and God help us if they ever do. I believe 911 was a test of that system. And it failed. I sent someone to NY the week of Sept 11 to talk to Chinese about why I was told Murdoch transferred information from our company Sept 6th 2001 to the DOD. Since the 2 systems are significantly different, the CAAC system has to be adapted to the US operating system and hardware and it has to be tested. The Chinese military acts as an intermediary. They are trying to create interfaces between the stolen program and the US and Israeli weapon systems. --- End forwarded message --- <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance�not soap-boxing�please! These are sordid matters and 'conspiracy theory'�with its many half-truths, mis- directions and outright frauds�is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
